Sample records for protection system based

  1. 44 CFR 65.14 - Remapping of areas for which local flood protection systems no longer provide base flood protection.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... local flood protection systems no longer provide base flood protection. 65.14 Section 65.14 Emergency... § 65.14 Remapping of areas for which local flood protection systems no longer provide base flood protection. (a) General. (1) This section describes the procedures to follow and the types of information...

  2. 44 CFR 65.14 - Remapping of areas for which local flood protection systems no longer provide base flood protection.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... local flood protection systems no longer provide base flood protection. 65.14 Section 65.14 Emergency... § 65.14 Remapping of areas for which local flood protection systems no longer provide base flood protection. (a) General. (1) This section describes the procedures to follow and the types of information...

  3. 44 CFR 65.14 - Remapping of areas for which local flood protection systems no longer provide base flood protection.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... local flood protection systems no longer provide base flood protection. 65.14 Section 65.14 Emergency... § 65.14 Remapping of areas for which local flood protection systems no longer provide base flood protection. (a) General. (1) This section describes the procedures to follow and the types of information...

  4. Advanced microprocessor based power protection system using artificial neural network techniques

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Z.; Kalam, A.; Zayegh, A.

    This paper describes an intelligent embedded microprocessor based system for fault classification in power system protection system using advanced 32-bit microprocessor technology. The paper demonstrates the development of protective relay to provide overcurrent protection schemes for fault detection. It also describes a method for power fault classification in three-phase system based on the use of neural network technology. The proposed design is implemented and tested on a single line three phase power system in power laboratory. Both the hardware and software development are described in detail.

  5. Protective-antigen (PA) based anthrax vaccines confer protection against inhalation anthrax by precluding the establishment of a systemic infection

    PubMed Central

    Merkel, Tod J; Perera, Pin-Yu; Lee, Gloria M; Verma, Anita; Hiroi, Toyoko; Yokote, Hiroyuki; Waldmann, Thomas A; Perera, Liyanage P

    2013-01-01

    An intense effort has been launched to develop improved anthrax vaccines that confer rapid, long lasting protection preferably with an extended stability profile amenable for stockpiling. Protective antigen (PA)-based vaccines are most favored as immune responses directed against PA are singularly protective, although the actual protective mechanism remains to be unraveled. Herein we show that contrary to the prevailing view, an efficacious PA-based vaccine confers protection against inhalation anthrax by preventing the establishment of a toxin-releasing systemic infection. Equally importantly, antibodies measured by the in vitro lethal toxin neutralization activity assay (TNA) that is considered as a reliable correlate of protection, especially for PA protein-based vaccines adjuvanted with aluminum salts appear to be not absolutely essential for this protective immune response. PMID:23787486

  6. Protective-antigen (PA) based anthrax vaccines confer protection against inhalation anthrax by precluding the establishment of a systemic infection.

    PubMed

    Merkel, Tod J; Perera, Pin-Yu; Lee, Gloria M; Verma, Anita; Hiroi, Toyoko; Yokote, Hiroyuki; Waldmann, Thomas A; Perera, Liyanage P

    2013-09-01

    An intense effort has been launched to develop improved anthrax vaccines that confer rapid, long lasting protection preferably with an extended stability profile amenable for stockpiling. Protective antigen (PA)-based vaccines are most favored as immune responses directed against PA are singularly protective, although the actual protective mechanism remains to be unraveled. Herein we show that contrary to the prevailing view, an efficacious PA-based vaccine confers protection against inhalation anthrax by preventing the establishment of a toxin-releasing systemic infection. Equally importantly, antibodies measured by the in vitro lethal toxin neutralization activity assay (TNA) that is considered as a reliable correlate of protection, especially for PA protein-based vaccines adjuvanted with aluminum salts appear to be not absolutely essential for this protective immune response.

  7. An E-Hospital Security Architecture

    NASA Astrophysics Data System (ADS)

    Tian, Fang; Adams, Carlisle

    In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.

  8. Adaptive protection algorithm and system

    DOEpatents

    Hedrick, Paul [Pittsburgh, PA; Toms, Helen L [Irwin, PA; Miller, Roger M [Mars, PA

    2009-04-28

    An adaptive protection algorithm and system for protecting electrical distribution systems traces the flow of power through a distribution system, assigns a value (or rank) to each circuit breaker in the system and then determines the appropriate trip set points based on the assigned rank.

  9. Crossed SMPS MOSFET-based protection circuit for high frequency ultrasound transceivers and transducers

    PubMed Central

    2014-01-01

    Background The ultrasonic transducer is one of the core components of ultrasound systems, and the transducer’s sensitivity is significantly related the loss of electronic components such as the transmitter, receiver, and protection circuit. In an ultrasonic device, protection circuits are commonly used to isolate the electrical noise between an ultrasound transmitter and transducer and to minimize unwanted discharged pulses in order to protect the ultrasound receiver. However, the performance of the protection circuit and transceiver obviously degrade as the operating frequency or voltage increases. We therefore developed a crossed SMPS (Switching Mode Power Supply) MOSFET-based protection circuit in order to maximize the sensitivity of high frequency transducers in ultrasound systems. The high frequency pulse signals need to trigger the transducer, and high frequency pulse signals must be received by the transducer. We therefore selected the SMPS MOSFET, which is the main component of the protection circuit, to minimize the loss in high frequency operation. The crossed configuration of the protection circuit can drive balanced bipolar high voltage signals from the pulser and transfer the balanced low voltage echo signals from the transducer. Methods The equivalent circuit models of the SMPS MOSFET-based protection circuit are shown in order to select the proper device components. The schematic diagram and operation mechanism of the protection circuit is provided to show how the protection circuit is constructed. The P-Spice circuit simulation was also performed in order to estimate the performance of the crossed MOSFET-based protection circuit. Results We compared the performance of our crossed SMPS MOSFET-based protection circuit with a commercial diode-based protection circuit. At 60 MHz, our expander and limiter circuits have lower insertion loss than the commercial diode-based circuits. The pulse-echo test is typical method to evaluate the sensitivity of ultrasonic transducers. Therefore, we performed a pulse-echo test using a single element transducer in order to utilize the crossed SMPS MOSFET-based protection circuit in an ultrasound system. Conclusions The SMPS-based protection circuit could be a viable alternative that provides better sensitivity, especially for high frequency ultrasound applications. PMID:24924595

  10. Crossed SMPS MOSFET-based protection circuit for high frequency ultrasound transceivers and transducers.

    PubMed

    Choi, Hojong; Shung, K Kirk

    2014-06-12

    The ultrasonic transducer is one of the core components of ultrasound systems, and the transducer's sensitivity is significantly related the loss of electronic components such as the transmitter, receiver, and protection circuit. In an ultrasonic device, protection circuits are commonly used to isolate the electrical noise between an ultrasound transmitter and transducer and to minimize unwanted discharged pulses in order to protect the ultrasound receiver. However, the performance of the protection circuit and transceiver obviously degrade as the operating frequency or voltage increases. We therefore developed a crossed SMPS (Switching Mode Power Supply) MOSFET-based protection circuit in order to maximize the sensitivity of high frequency transducers in ultrasound systems.The high frequency pulse signals need to trigger the transducer, and high frequency pulse signals must be received by the transducer. We therefore selected the SMPS MOSFET, which is the main component of the protection circuit, to minimize the loss in high frequency operation. The crossed configuration of the protection circuit can drive balanced bipolar high voltage signals from the pulser and transfer the balanced low voltage echo signals from the transducer. The equivalent circuit models of the SMPS MOSFET-based protection circuit are shown in order to select the proper device components. The schematic diagram and operation mechanism of the protection circuit is provided to show how the protection circuit is constructed. The P-Spice circuit simulation was also performed in order to estimate the performance of the crossed MOSFET-based protection circuit. We compared the performance of our crossed SMPS MOSFET-based protection circuit with a commercial diode-based protection circuit. At 60 MHz, our expander and limiter circuits have lower insertion loss than the commercial diode-based circuits. The pulse-echo test is typical method to evaluate the sensitivity of ultrasonic transducers. Therefore, we performed a pulse-echo test using a single element transducer in order to utilize the crossed SMPS MOSFET-based protection circuit in an ultrasound system. The SMPS-based protection circuit could be a viable alternative that provides better sensitivity, especially for high frequency ultrasound applications.

  11. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    ERIC Educational Resources Information Center

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…

  12. Superconducting Magnet Power Supply and Hard-Wired Quench Protection at Jefferson Lab for 12 GeV Upgrade

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ghoshal, Probir K.; Bachimanchi, Ramakrishna; Fair, Ruben J.

    The superconducting magnet system in Hall B being designed and built as part of the Jefferson Lab 12 GeV upgrade requires powering two conduction cooled superconducting magnets - a torus and a solenoid. The torus magnet is designed to operate at 3770 A and solenoid at 2416 A. Failure Modes and Effects Analysis (FMEA) determined that voltage level thresholds and dump switch operation for magnet protection should be tested and analyzed before incorporation into the system. The designs of the quench protection and voltage tap sub-systems were driven by the requirement to use a primary hard-wired quench detection sub-system togethermore » with a secondary PLC-based protection. Parallel path voltage taps feed both the primary and secondary quench protection sub-systems. The PLC based secondary protection is deployed as a backup for the hard-wired quench detection sub-system and also acts directly on the dump switch. Here, we describe a series of tests and modifications carried out on the magnet power supply and quench protection system to ensure that the superconducting magnet is protected for all fault scenarios.« less

  13. Superconducting Magnet Power Supply and Hard-Wired Quench Protection at Jefferson Lab for 12 GeV Upgrade

    DOE PAGES

    Ghoshal, Probir K.; Bachimanchi, Ramakrishna; Fair, Ruben J.; ...

    2017-10-05

    The superconducting magnet system in Hall B being designed and built as part of the Jefferson Lab 12 GeV upgrade requires powering two conduction cooled superconducting magnets - a torus and a solenoid. The torus magnet is designed to operate at 3770 A and solenoid at 2416 A. Failure Modes and Effects Analysis (FMEA) determined that voltage level thresholds and dump switch operation for magnet protection should be tested and analyzed before incorporation into the system. The designs of the quench protection and voltage tap sub-systems were driven by the requirement to use a primary hard-wired quench detection sub-system togethermore » with a secondary PLC-based protection. Parallel path voltage taps feed both the primary and secondary quench protection sub-systems. The PLC based secondary protection is deployed as a backup for the hard-wired quench detection sub-system and also acts directly on the dump switch. Here, we describe a series of tests and modifications carried out on the magnet power supply and quench protection system to ensure that the superconducting magnet is protected for all fault scenarios.« less

  14. The complexity of child protection recurrence: The case for a systems approach.

    PubMed

    Jenkins, Brian Q; Tilbury, Clare; Mazerolle, Paul; Hayes, Hennessey

    2017-01-01

    Research on child protection recurrence has found consistent child, family, and case characteristics associated with repeated involvement with the child protection system. Despite the considerable body of empirical research, knowledge about why recurrence occurs, and what can be done to reduce it, is limited. This paper reviews the empirical literature and analyses the approaches of prior recurrence research. Four related conceptual challenges are identified: (1) a tendency to conflate child protection recurrence with repeated child maltreatment; (2) uncertainty about how best to operationalize and measure child protection recurrence in research; (3) inconsistency between prevailing explanations for the most frequently observed patterns of recurrence; and (4) difficulty in developing coherent strategies to address child protection recurrence based on research. Addressing these challenges requires a greater consideration of the effects of decision-making in the child protection system on recurrence. This paper proposes a methodology based in systems theory and drawing on existing administrative data to examine the characteristics of the child protection system that may also produce recurrence. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. National Infrastructure Protection Plan

    DTIC Science & Technology

    2006-01-01

    effective and efficient CI/KR protection; and • Provide a system for continuous measurement and improvement of CI/KR...information- based core processes, a top-down system -, network-, or function- based approach may be more appropri- ate. A bottom-up approach normally... e - commerce , e -mail, and R&D systems . • Control Systems : Cyber systems used within many infrastructure and industries to monitor and

  16. The Development of HfO2-Rare Earth Based Oxide Materials and Barrier Coatings for Thermal Protection Systems

    NASA Technical Reports Server (NTRS)

    Zhu, Dongming; Harder, Bryan James

    2014-01-01

    Advanced hafnia-rare earth oxides, rare earth aluminates and silicates have been developed for thermal environmental barrier systems for aerospace propulsion engine and thermal protection applications. The high temperature stability, low thermal conductivity, excellent oxidation resistance and mechanical properties of these oxide material systems make them attractive and potentially viable for thermal protection systems. This paper will focus on the development of the high performance and high temperature capable ZrO2HfO2-rare earth based alloy and compound oxide materials, processed as protective coating systems using state-or-the-art processing techniques. The emphasis has been in particular placed on assessing their temperature capability, stability and suitability for advanced space vehicle entry thermal protection systems. Fundamental thermophysical and thermomechanical properties of the material systems have been investigated at high temperatures. Laser high-heat-flux testing has also been developed to validate the material systems, and demonstrating durability under space entry high heat flux conditions.

  17. A digital protection system incorporating knowledge based learning

    NASA Astrophysics Data System (ADS)

    Watson, Karan; Russell, B. Don; McCall, Kurt

    A digital system architecture used to diagnoses the operating state and health of electric distribution lines and to generate actions for line protection is presented. The architecture is described functionally and to a limited extent at the hardware level. This architecture incorporates multiple analysis and fault-detection techniques utilizing a variety of parameters. In addition, a knowledge-based decision maker, a long-term memory retention and recall scheme, and a learning environment are described. Preliminary laboratory implementations of the system elements have been completed. Enhanced protection for electric distribution feeders is provided by this system. Advantages of the system are enumerated.

  18. The influence of protection system failures and preventive maintenance on protection systems in distribution systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meeuwsen, J.J.; Kling, W.L.; Ploem, W.A.G.A.

    1997-01-01

    Protection systems in power systems can fail either by not responding when they should (failure to operate) or by operating when they should not (false tripping). The former type of failure is particularly serious since it may result in the isolation of large sections of the network. However, the probability of a failure to operate can be reduced by carrying out preventive maintenance on protection systems. This paper describes an approach to determine the impact of preventive maintenance on protection systems on the reliability of the power supply to customers. The proposed approach is based on Markov models.

  19. 44 CFR 61.12 - Rates based on a flood protection system involving Federal funds.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program INSURANCE COVERAGE AND RATES § 61.12 Rates based on a flood protection system involving... 44 Emergency Management and Assistance 1 2013-10-01 2013-10-01 false Rates based on a flood...

  20. 44 CFR 61.12 - Rates based on a flood protection system involving Federal funds.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program INSURANCE COVERAGE AND RATES § 61.12 Rates based on a flood protection system involving... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Rates based on a flood...

  1. 44 CFR 61.12 - Rates based on a flood protection system involving Federal funds.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program INSURANCE COVERAGE AND RATES § 61.12 Rates based on a flood protection system involving... 44 Emergency Management and Assistance 1 2014-10-01 2014-10-01 false Rates based on a flood...

  2. 44 CFR 61.12 - Rates based on a flood protection system involving Federal funds.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program INSURANCE COVERAGE AND RATES § 61.12 Rates based on a flood protection system involving... 44 Emergency Management and Assistance 1 2011-10-01 2011-10-01 false Rates based on a flood...

  3. 44 CFR 61.12 - Rates based on a flood protection system involving Federal funds.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program INSURANCE COVERAGE AND RATES § 61.12 Rates based on a flood protection system involving... 44 Emergency Management and Assistance 1 2012-10-01 2011-10-01 true Rates based on a flood...

  4. Objective Metric Based Assessments for Efficient Evaluation of Auditory Situation Awareness Characteristics of Tactical Communications and Protective Systems (TCAPS) and Augmented Hearing Protective Devices (HPDs)

    DTIC Science & Technology

    2015-11-30

    Assessments for Efficient Evaluation of Auditory Situation Awareness Characteristics of Tactical Communications and Protective Systems (TCAPS) and Augmented...Hearing Protective Devices (HPDs) W81XWH-13-C-0193 John G. Casali, Ph.D, CPE & Kichol Lee, Ph.D Auditory Systems Lab, Industrial and Systems ...Suite 1 JBSA Lackland, TX 78236-9908 Approved for public release: distribution unlimited. The Virginia Tech Auditory Systems Laboratory (ASL

  5. Wavelet Based Protection Scheme for Multi Terminal Transmission System with PV and Wind Generation

    NASA Astrophysics Data System (ADS)

    Manju Sree, Y.; Goli, Ravi kumar; Ramaiah, V.

    2017-08-01

    A hybrid generation is a part of large power system in which number of sources usually attached to a power electronic converter and loads are clustered can operate independent of the main power system. The protection scheme is crucial against faults based on traditional over current protection since there are adequate problems due to fault currents in the mode of operation. This paper adopts a new approach for detection, discrimination of the faults for multi terminal transmission line protection in presence of hybrid generation. Transient current based protection scheme is developed with discrete wavelet transform. Fault indices of all phase currents at all terminals are obtained by analyzing the detail coefficients of current signals using bior 1.5 mother wavelet. This scheme is tested for different types of faults and is found effective for detection and discrimination of fault with various fault inception angle and fault impedance.

  6. An empirical analysis of thermal protective performance of fabrics used in protective clothing.

    PubMed

    Mandal, Sumit; Song, Guowen

    2014-10-01

    Fabric-based protective clothing is widely used for occupational safety of firefighters/industrial workers. The aim of this paper is to study thermal protective performance provided by fabric systems and to propose an effective model for predicting the thermal protective performance under various thermal exposures. Different fabric systems that are commonly used to manufacture thermal protective clothing were selected. Laboratory simulations of the various thermal exposures were created to evaluate the protective performance of the selected fabric systems in terms of time required to generate second-degree burns. Through the characterization of selected fabric systems in a particular thermal exposure, various factors affecting the performances were statistically analyzed. The key factors for a particular thermal exposure were recognized based on the t-test analysis. Using these key factors, the performance predictive multiple linear regression and artificial neural network (ANN) models were developed and compared. The identified best-fit ANN models provide a basic tool to study thermal protective performance of a fabric. © The Author 2014. Published by Oxford University Press on behalf of the British Occupational Hygiene Society.

  7. Advanced Protected Services: A Concept Paper on Survivable Service-Oriented Systems

    DTIC Science & Technology

    2010-05-07

    resiliency and protection of such systems to a level where they can withstand sustained attacks from well-motivated adversaries. In this paper we...that are designed for the protection of systems that are based on service-oriented architectures. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF...resilient against malicious attacks , and to demonstrate the utility of the developed advanced protection techniques in settings that exhibit various

  8. A Risk-Based Approach for Aerothermal/TPS Analysis and Testing

    NASA Technical Reports Server (NTRS)

    Wright, Michael J.; Grinstead, Jay H.; Bose, Deepak

    2007-01-01

    The current status of aerothermal and thermal protection system modeling for civilian entry missions is reviewed. For most such missions, the accuracy of our simulations is limited not by the tools and processes currently employed, but rather by reducible deficiencies in the underlying physical models. Improving the accuracy of and reducing the uncertainties in these models will enable a greater understanding of the system level impacts of a particular thermal protection system and of the system operation and risk over the operational life of the system. A strategic plan will be laid out by which key modeling deficiencies can be identified via mission-specific gap analysis. Once these gaps have been identified, the driving component uncertainties are determined via sensitivity analyses. A Monte-Carlo based methodology is presented for physics-based probabilistic uncertainty analysis of aerothermodynamics and thermal protection system material response modeling. These data are then used to advocate for and plan focused testing aimed at reducing key uncertainties. The results of these tests are used to validate or modify existing physical models. Concurrently, a testing methodology is outlined for thermal protection materials. The proposed approach is based on using the results of uncertainty/sensitivity analyses discussed above to tailor ground testing so as to best identify and quantify system performance and risk drivers. A key component of this testing is understanding the relationship between the test and flight environments. No existing ground test facility can simultaneously replicate all aspects of the flight environment, and therefore good models for traceability to flight are critical to ensure a low risk, high reliability thermal protection system design. Finally, the role of flight testing in the overall thermal protection system development strategy is discussed.

  9. Evaluation of Alternative Altitude Scaling Methods for Thermal Ice Protection System in NASA Icing Research Tunnel

    NASA Technical Reports Server (NTRS)

    Lee, Sam; Addy, Harold E. Jr.; Broeren, Andy P.; Orchard, David M.

    2017-01-01

    A test was conducted at NASA Icing Research Tunnel to evaluate altitude scaling methods for thermal ice protection system. Two new scaling methods based on Weber number were compared against a method based on Reynolds number. The results generally agreed with the previous set of tests conducted in NRCC Altitude Icing Wind Tunnel where the three methods of scaling were also tested and compared along with reference (altitude) icing conditions. In those tests, the Weber number-based scaling methods yielded results much closer to those observed at the reference icing conditions than the Reynolds number-based icing conditions. The test in the NASA IRT used a much larger, asymmetric airfoil with an ice protection system that more closely resembled designs used in commercial aircraft. Following the trends observed during the AIWT tests, the Weber number based scaling methods resulted in smaller runback ice than the Reynolds number based scaling, and the ice formed farther upstream. The results show that the new Weber number based scaling methods, particularly the Weber number with water loading scaling, continue to show promise for ice protection system development and evaluation in atmospheric icing tunnels.

  10. An Optimized Integrator Windup Protection Technique Applied to a Turbofan Engine Control

    NASA Technical Reports Server (NTRS)

    Watts, Stephen R.; Garg, Sanjay

    1995-01-01

    This paper introduces a new technique for providing memoryless integrator windup protection which utilizes readily available optimization software tools. This integrator windup protection synthesis provides a concise methodology for creating integrator windup protection for each actuation system loop independently while assuring both controller and closed loop system stability. The individual actuation system loops' integrator windup protection can then be combined to provide integrator windup protection for the entire system. This technique is applied to an H(exp infinity) based multivariable control designed for a linear model of an advanced afterburning turbofan engine. The resulting transient characteristics are examined for the integrated system while encountering single and multiple actuation limits.

  11. System and method for quench protection of a superconductor

    DOEpatents

    Huang, Xianrui; Sivasubramaniam, Kiruba Haran; Bray, James William; Ryan, David Thomas

    2008-03-11

    A system and method for protecting a superconductor from a quench condition. A quench protection system is provided to protect the superconductor from damage due to a quench condition. The quench protection system comprises a voltage detector operable to detect voltage across the superconductor. The system also comprises a frequency filter coupled to the voltage detector. The frequency filter is operable to couple voltage signals to a control circuit that are representative of a rise in superconductor voltage caused by a quench condition and to block voltage signals that are not. The system is operable to detect whether a quench condition exists in the superconductor based on the voltage signal received via the frequency filter and to initiate a protective action in response.

  12. Enhancing durability of wood-based composites with nanotechnology

    Treesearch

    Carol Clausen

    2012-01-01

    Wood protection systems are needed for engineered composite products that are susceptible to moisture and biodeterioration. Protection systems using nano-materials are being developed to enhance the durability of wood-based composites through improved resistance to biodeterioration, reduced environmental impact from chemical leaching, and improved resistance to...

  13. Silicone Polymer Composites for Thermal Protection System: Fiber Reinforcements and Microstructures

    DTIC Science & Technology

    2010-01-01

    angles were tested. Detailed microstructural, mass loss, and peak erosion analyses were conducted on the phenolic -based matrix composite (control) and...silicone-based matrix composites to understand their protective mechanisms. Keywords silicone polymer matrix composites, phenolic polymer matrix...erosion analyses were conducted on the phenolic -based matrix composite (control) and silicone-based matrix composites to understand their protective

  14. Video copy protection and detection framework (VPD) for e-learning systems

    NASA Astrophysics Data System (ADS)

    ZandI, Babak; Doustarmoghaddam, Danial; Pour, Mahsa R.

    2013-03-01

    This Article reviews and compares the copyright issues related to the digital video files, which can be categorized as contended based and Digital watermarking copy Detection. Then we describe how to protect a digital video by using a special Video data hiding method and algorithm. We also discuss how to detect the copy right of the file, Based on expounding Direction of the technology of the video copy detection, and Combining with the own research results, brings forward a new video protection and copy detection approach in terms of plagiarism and e-learning systems using the video data hiding technology. Finally we introduce a framework for Video protection and detection in e-learning systems (VPD Framework).

  15. Reconfigurable fault tolerant avionics system

    NASA Astrophysics Data System (ADS)

    Ibrahim, M. M.; Asami, K.; Cho, Mengu

    This paper presents the design of a reconfigurable avionics system based on modern Static Random Access Memory (SRAM)-based Field Programmable Gate Array (FPGA) to be used in future generations of nano satellites. A major concern in satellite systems and especially nano satellites is to build robust systems with low-power consumption profiles. The system is designed to be flexible by providing the capability of reconfiguring itself based on its orbital position. As Single Event Upsets (SEU) do not have the same severity and intensity in all orbital locations, having the maximum at the South Atlantic Anomaly (SAA) and the polar cusps, the system does not have to be fully protected all the time in its orbit. An acceptable level of protection against high-energy cosmic rays and charged particles roaming in space is provided within the majority of the orbit through software fault tolerance. Check pointing and roll back, besides control flow assertions, is used for that level of protection. In the minority part of the orbit where severe SEUs are expected to exist, a reconfiguration for the system FPGA is initiated where the processor systems are triplicated and protection through Triple Modular Redundancy (TMR) with feedback is provided. This technique of reconfiguring the system as per the level of the threat expected from SEU-induced faults helps in reducing the average dynamic power consumption of the system to one-third of its maximum. This technique can be viewed as a smart protection through system reconfiguration. The system is built on the commercial version of the (XC5VLX50) Xilinx Virtex5 FPGA on bulk silicon with 324 IO. Simulations of orbit SEU rates were carried out using the SPENVIS web-based software package.

  16. Design of a Thermal and Micrometeorite Protection System for an Unmanned Lunar Cargo Lander

    NASA Technical Reports Server (NTRS)

    Hernandez, Carlos A.; Sunder, Sankar; Vestgaard, Baard

    1989-01-01

    The first vehicles to land on the lunar surface during the establishment phase of a lunar base will be unmanned lunar cargo landers. These landers will need to be protected against the hostile lunar environment for six to twelve months until the next manned mission arrives. The lunar environment is characterized by large temperature changes and periodic micrometeorite impacts. An automatically deployable and reconfigurable thermal and micrometeorite protection system was designed for an unmanned lunar cargo lander. The protection system is a lightweight multilayered material consisting of alternating layers of thermal and micrometeorite protection material. The protection system is packaged and stored above the lander common module. After landing, the system is deployed to cover the lander using a system of inflatable struts that are inflated using residual fuel (liquid oxygen) from the fuel tanks. Once the lander is unloaded and the protection system is no longer needed, the protection system is reconfigured as a regolith support blanket for the purpose of burying and protecting the common module, or as a lunar surface garage that can be used to sort and store lunar surface vehicles and equipment. A model showing deployment and reconfiguration of the protection system was also constructed.

  17. Performance of a conductive-paint anode in cathodic protection systems for inland concrete bridge piers in Virginia.

    DOT National Transportation Integrated Search

    1997-01-01

    As part of efforts to identify effective and durable anodes for use in cathodic protection (CP) of reinforced concrete members, a water-based, electrically conductive paint was evaluated for use as the secondary anode in CP systems for protecting inl...

  18. Safety Analysis and Protection Measures of the Control System of the Pulsed High Magnetic Field Facility in WHMFC

    NASA Astrophysics Data System (ADS)

    Shi, J. T.; Han, X. T.; Xie, J. F.; Yao, L.; Huang, L. T.; Li, L.

    2013-03-01

    A Pulsed High Magnetic Field Facility (PHMFF) has been established in Wuhan National High Magnetic Field Center (WHMFC) and various protection measures are applied in its control system. In order to improve the reliability and robustness of the control system, the safety analysis of the PHMFF is carried out based on Fault Tree Analysis (FTA) technique. The function and realization of 5 protection systems, which include sequence experiment operation system, safety assistant system, emergency stop system, fault detecting and processing system and accident isolating protection system, are given. The tests and operation indicate that these measures improve the safety of the facility and ensure the safety of people.

  19. Relay Protection and Automation Systems Based on Programmable Logic Integrated Circuits

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lashin, A. V., E-mail: LashinAV@lhp.ru; Kozyrev, A. V.

    One of the most promising forms of developing the apparatus part of relay protection and automation devices is considered. The advantages of choosing programmable logic integrated circuits to obtain adaptive technological algorithms in power system protection and control systems are pointed out. The technical difficulties in the problems which today stand in the way of using relay protection and automation systems are indicated and a new technology for solving these problems is presented. Particular attention is devoted to the possibility of reconfiguring the logic of these devices, using programmable logic integrated circuits.

  20. Evaluation of several corrosion protective coating systems on aluminum

    NASA Technical Reports Server (NTRS)

    Higgins, R. H.

    1981-01-01

    A study of several protective coating systems for use on aluminum in seawater/seacoast environments was conducted to review the developments made on protective coatings since early in the Space Shuttle program and to perform comparative studies on these coatings to determine their effectiveness for providing corrosion protection during exposure to seawater/seacoast environments. Panels of 2219-T87 aluminum were coated with 21 different systems and exposed to a 5 percent salt spray for 4000 hr. Application properties, adhesion measurements, heat resistance and corrosion protection were evaluated. For comparative studies, the presently specified Bostik epoxy system used on the SRB structures was included. Results of these tests indicate four systems with outstanding performance and four additional systems with protection almost as good. These systems are based on a chromated pretreatment, a chromate epoxy primer, and a polyurethane topcoat. Consideration for one of these systems should be included for those applications where superior corrosion protection for aluminum surfaces is required.

  1. A microcomputer-based testing station for dynamic and static testing of protective relay systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lee, W.J.; Li, R.J.; Gu, J.C.

    1995-12-31

    Dynamic and static relay performance testing before installation in the field is a subject of great interest to utility relay engineers. The common practice in utility testing of new relays is to put the new unit to be tested in parallel with an existing functioning relay in the system, wait until an actual transient occurs and then observe and analyze the performance of new relay. It is impossible to have a thorough test of the protective relay system through this procedure. An equipment, Microcomputer-Based Testing Station (or PC-Based Testing Station), that can perform both static and dynamic testing of themore » relay is described in this paper. The Power System Simulation Laboratory at the University of Texas at Arlington is a scaled-down, three-phase, physical power system which correlates well with the important components for a real power system and is an ideal facility for the dynamic and static testing of protective relay systems. A brief introduction to the configuration of this laboratory is presented. Test results of several protective functions by using this laboratory illustrate the usefulness of this test set-up.« less

  2. Tourism and recreation system planning in Alberta provincial parks

    Treesearch

    Paul F.J. Eagles; Angela M. Gilmore; Luis X. Huang; Denise A. Keltie; Kimberley Rae; Hong Sun; Amy K. Thede; Meagan L. Wilson; Jennifer A. Woronuk; Ge Yujin

    2007-01-01

    Traditionally, system planning in parks and protected areas concentrated on biogeographical concepts, while neglecting tourism and recreation. The existing system plan for parks and protected areas in Alberta, Canada, divides the province into six natural regions based on a geographic classifi cation system (Grassland, Parkland, Foothills, Rocky Mountains, Boreal...

  3. Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source

    NASA Astrophysics Data System (ADS)

    Kelkboom, Emile J. C.; Breebaart, Jeroen; Buhan, Ileana; Veldhuis, Raymond N. J.

    2010-04-01

    Template protection techniques are used within biometric systems in order to protect the stored biometric template against privacy and security threats. A great portion of template protection techniques are based on extracting a key from or binding a key to a biometric sample. The achieved protection depends on the size of the key and its closeness to being random. In the literature it can be observed that there is a large variation on the reported key lengths at similar classification performance of the same template protection system, even when based on the same biometric modality and database. In this work we determine the analytical relationship between the system performance and the theoretical maximum key size given a biometric source modeled by parallel Gaussian channels. We consider the case where the source capacity is evenly distributed across all channels and the channels are independent. We also determine the effect of the parameters such as the source capacity, the number of enrolment and verification samples, and the operating point selection on the maximum key size. We show that a trade-off exists between the privacy protection of the biometric system and its convenience for its users.

  4. Arcjet Testing of Micro-Meteoroid Impacted Thermal Protection Materials

    NASA Technical Reports Server (NTRS)

    Agrawal, Parul; Munk, Michelle M.; Glaab, Louis J.

    2013-01-01

    There are several harsh space environments that could affect thermal protection systems and in turn pose risks to the atmospheric entry vehicles. These environments include micrometeoroid impact, extreme cold temperatures, and ionizing radiation during deep space cruise, all followed by atmospheric entry heating. To mitigate these risks, different thermal protection material samples were subjected to multiple tests, including hyper velocity impact, cold soak, irradiation, and arcjet testing, at various NASA facilities that simulated these environments. The materials included a variety of honeycomb packed ablative materials as well as carbon-based non-ablative thermal protection systems. The present paper describes the results of the multiple test campaign with a focus on arcjet testing of thermal protection materials. The tests showed promising results for ablative materials. However, the carbon-based non-ablative system presented some concerns regarding the potential risks to an entry vehicle. This study provides valuable information regarding the capability of various thermal protection materials to withstand harsh space environments, which is critical to sample return and planetary entry missions.

  5. Use of Precious Metal-Modifed Nickel-Base Superalloys for Thin Gage Applications (Preprint)

    DTIC Science & Technology

    2011-04-01

    superalloys are being investigated for use in thin gage applications, such as thermal protection systems or heat exchangers, due to their strength and...atomic % total) in place of the platinum and iridium. 15. SUBJECT TERMS thermal protection systems, nickel, superalloy, thermomechanical processing...use in thin gage applications, such as thermal protection systems or heat exchangers, due to their strength and inherent oxidation resistance at

  6. The framework for simulation of bioinspired security mechanisms against network infrastructure attacks.

    PubMed

    Shorov, Andrey; Kotenko, Igor

    2014-01-01

    The paper outlines a bioinspired approach named "network nervous system" and methods of simulation of infrastructure attacks and protection mechanisms based on this approach. The protection mechanisms based on this approach consist of distributed procedures of information collection and processing, which coordinate the activities of the main devices of a computer network, identify attacks, and determine necessary countermeasures. Attacks and protection mechanisms are specified as structural models using a set-theoretic approach. An environment for simulation of protection mechanisms based on the biological metaphor is considered; the experiments demonstrating the effectiveness of the protection mechanisms are described.

  7. An arc control and protection system for the JET lower hybrid antenna based on an imaging system.

    PubMed

    Figueiredo, J; Mailloux, J; Kirov, K; Kinna, D; Stamp, M; Devaux, S; Arnoux, G; Edwards, J S; Stephen, A V; McCullen, P; Hogben, C

    2014-11-01

    Arcs are the potentially most dangerous events related to Lower Hybrid (LH) antenna operation. If left uncontrolled they can produce damage and cause plasma disruption by impurity influx. To address this issue an arc real time control and protection imaging system for the Joint European Torus (JET) LH antenna has been implemented. The LH system is one of the additional heating systems at JET. It comprises 24 microwave generators (klystrons, operating at 3.7 GHz) providing up to 5 MW of heating and current drive to the JET plasma. This is done through an antenna composed of an array of waveguides facing the plasma. The protection system presented here is based primarily on an imaging arc detection and real time control system. It has adapted the ITER like wall hotspot protection system using an identical CCD camera and real time image processing unit. A filter has been installed to avoid saturation and spurious system triggers caused by ionization light. The antenna is divided in 24 Regions Of Interest (ROIs) each one corresponding to one klystron. If an arc precursor is detected in a ROI, power is reduced locally with subsequent potential damage and plasma disruption avoided. The power is subsequently reinstated if, during a defined interval of time, arcing is confirmed not to be present by image analysis. This system was successfully commissioned during the restart phase and beginning of the 2013 scientific campaign. Since its installation and commissioning, arcs and related phenomena have been prevented. In this contribution we briefly describe the camera, image processing, and real time control systems. Most importantly, we demonstrate that an LH antenna arc protection system based on CCD camera imaging systems works. Examples of both controlled and uncontrolled LH arc events and their consequences are shown.

  8. Verification of an IGBT Fusing Switch for Over-current Protection of the SNS HVCM

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Benwell, Andrew; Kemp, Mark; Burkhart, Craig

    2010-06-11

    An IGBT based over-current protection system has been developed to detect faults and limit the damage caused by faults in high voltage converter modulators. During normal operation, an IGBT enables energy to be transferred from storage capacitors to a H-bridge. When a fault occurs, the over-current protection system detects the fault, limits the fault current and opens the IGBT to isolate the remaining stored energy from the fault. This paper presents an experimental verification of the over-current protection system under applicable conditions.

  9. Simulating the Mechanical Response of Titanium Alloys Through the Crystal Plasticity Finite Element Analysis of Image-Based Synthetic Microstructures

    DTIC Science & Technology

    2012-01-01

    2002. [2] Max Blosser. Fundamental Modeling and Thermal Performance Issues for Metal- lic Thermal Protection System Concept. Journal of Spacecraft and...Directorate (AFRL/RX, Metallic Thermal Protection System Program, Universal Technology Corporation/AFRL Grant, ProgramManagers: Todd Warren and Reji John...retired Space Shuttle program were built with a Thermal Protection System (TPS) to withstand heating during atmo- spheric reentry. The partially

  10. A special protection scheme utilizing trajectory sensitivity analysis in power transmission

    NASA Astrophysics Data System (ADS)

    Suriyamongkol, Dan

    In recent years, new measurement techniques have provided opportunities to improve the North American Power System observability, control and protection. This dissertation discusses the formulation and design of a special protection scheme based on a novel utilization of trajectory sensitivity techniques with inputs consisting of system state variables and parameters. Trajectory sensitivity analysis (TSA) has been used in previous publications as a method for power system security and stability assessment, and the mathematical formulation of TSA lends itself well to some of the time domain power system simulation techniques. Existing special protection schemes often have limited sets of goals and control actions. The proposed scheme aims to maintain stability while using as many control actions as possible. The approach here will use the TSA in a novel way by using the sensitivities of system state variables with respect to state parameter variations to determine the state parameter controls required to achieve the desired state variable movements. The initial application will operate based on the assumption that the modeled power system has full system observability, and practical considerations will be discussed.

  11. Development of computer-based analytical tool for assessing physical protection system

    NASA Astrophysics Data System (ADS)

    Mardhi, Alim; Pengvanich, Phongphaeth

    2016-01-01

    Assessment of physical protection system effectiveness is the priority for ensuring the optimum protection caused by unlawful acts against a nuclear facility, such as unauthorized removal of nuclear materials and sabotage of the facility itself. Since an assessment based on real exercise scenarios is costly and time-consuming, the computer-based analytical tool can offer the solution for approaching the likelihood threat scenario. There are several currently available tools that can be used instantly such as EASI and SAPE, however for our research purpose it is more suitable to have the tool that can be customized and enhanced further. In this work, we have developed a computer-based analytical tool by utilizing the network methodological approach for modelling the adversary paths. The inputs are multi-elements in security used for evaluate the effectiveness of the system's detection, delay, and response. The tool has capability to analyze the most critical path and quantify the probability of effectiveness of the system as performance measure.

  12. Havens: Explicit Reliable Memory Regions for HPC Applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hukerikar, Saurabh; Engelmann, Christian

    2016-01-01

    Supporting error resilience in future exascale-class supercomputing systems is a critical challenge. Due to transistor scaling trends and increasing memory density, scientific simulations are expected to experience more interruptions caused by transient errors in the system memory. Existing hardware-based detection and recovery techniques will be inadequate to manage the presence of high memory fault rates. In this paper we propose a partial memory protection scheme based on region-based memory management. We define the concept of regions called havens that provide fault protection for program objects. We provide reliability for the regions through a software-based parity protection mechanism. Our approach enablesmore » critical program objects to be placed in these havens. The fault coverage provided by our approach is application agnostic, unlike algorithm-based fault tolerance techniques.« less

  13. Advanced approach to information security management system model for industrial control system.

    PubMed

    Park, Sanghyun; Lee, Kyungho

    2014-01-01

    Organizations make use of important information in day-to-day business. Protecting sensitive information is imperative and must be managed. Companies in many parts of the world protect sensitive information using the international standard known as the information security management system (ISMS). ISO 27000 series is the international standard ISMS used to protect confidentiality, integrity, and availability of sensitive information. While an ISMS based on ISO 27000 series has no particular flaws for general information systems, it is unfit to manage sensitive information for industrial control systems (ICSs) because the first priority of industrial control is safety of the system. Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. This new ISMS must be mutually exclusive of an ICS. This paper provides a new paradigm of ISMS for ICSs, which will be shown to be more suitable than the existing ISMS.

  14. Advanced Approach to Information Security Management System Model for Industrial Control System

    PubMed Central

    2014-01-01

    Organizations make use of important information in day-to-day business. Protecting sensitive information is imperative and must be managed. Companies in many parts of the world protect sensitive information using the international standard known as the information security management system (ISMS). ISO 27000 series is the international standard ISMS used to protect confidentiality, integrity, and availability of sensitive information. While an ISMS based on ISO 27000 series has no particular flaws for general information systems, it is unfit to manage sensitive information for industrial control systems (ICSs) because the first priority of industrial control is safety of the system. Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. This new ISMS must be mutually exclusive of an ICS. This paper provides a new paradigm of ISMS for ICSs, which will be shown to be more suitable than the existing ISMS. PMID:25136659

  15. Stream protection with small cable yarding systems

    Treesearch

    Penn A. Peters; Chris B. LeDoux

    1984-01-01

    Small cable yarder systems that can be purchased and operated by independent logging contractors have less potential negative impact on water quality than ground-based systems operating on steep terrain because they do not require such an intense road system. Stream protection costs were estimated at $3.78 per lineal foot of stream when a typical small yarder (Koller K...

  16. Fault Analysis in a Grid Integrated DFIG Based Wind Energy System with NA CB_P Circuit for Ridethrough Capability and Power Quality Improvement

    NASA Astrophysics Data System (ADS)

    Swain, Snehaprava; Ray, Pravat Kumar

    2016-12-01

    In this paper a three phase fault analysis is done on a DFIG based grid integrated wind energy system. A Novel Active Crowbar Protection (NACB_P) system is proposed to enhance the Fault-ride through (FRT) capability of DFIG both for symmetrical as well as unsymmetrical grid faults. Hence improves the power quality of the system. The protection scheme proposed here is designed with a capacitor in series with the resistor unlike the conventional Crowbar (CB) having only resistors. The major function of the capacitor in the protection circuit is to eliminate the ripples generated in the rotor current and to protect the converter as well as the DC-link capacitor. It also compensates reactive power required by the DFIG during fault. Due to these advantages the proposed scheme enhances the FRT capability of the DFIG and also improves the power quality of the whole system. Experimentally the fault analysis is done on a 3hp slip ring induction generator and simulation results are carried out on a 1.7 MVA DFIG based WECS under different types of grid faults in MATLAB/Simulation and functionality of the proposed scheme is verified.

  17. Design and performance evaluation of collision protection-based safety operation for a haptic robot-assisted catheter operating system.

    PubMed

    Zhang, Linshuai; Guo, Shuxiang; Yu, Huadong; Song, Yu; Tamiya, Takashi; Hirata, Hideyuki; Ishihara, Hidenori

    2018-02-23

    The robot-assisted catheter system can increase operating distance thus preventing the exposure radiation of the surgeon to X-ray for endovascular catheterization. However, few designs have considered the collision protection between the catheter tip and the vessel wall. This paper presents a novel catheter operating system based on tissue protection to prevent vessel puncture caused by collision. The integrated haptic interface not only allows the operator to feel the real force feedback, but also combines with the newly proposed collision protection mechanism (CPM) to mitigate the collision trauma. The CPM can release the catheter quickly when the measured force exceeds a certain threshold, so as to avoid the vessel puncture. A significant advantage is that the proposed mechanism can adjust the protection threshold in real time by the current according to the actual characteristics of the blood vessel. To verify the effectiveness of the tissue protection by the system, the evaluation experiments in vitro were carried out. The results show that the further collision damage can be effectively prevented by the CPM, which implies the realization of relative safe catheterization. This research provides some insights into the functional improvements of safe and reliable robot-assisted catheter systems.

  18. The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks

    PubMed Central

    Kotenko, Igor

    2014-01-01

    The paper outlines a bioinspired approach named “network nervous system" and methods of simulation of infrastructure attacks and protection mechanisms based on this approach. The protection mechanisms based on this approach consist of distributed prosedures of information collection and processing, which coordinate the activities of the main devices of a computer network, identify attacks, and determine nessesary countermeasures. Attacks and protection mechanisms are specified as structural models using a set-theoretic approach. An environment for simulation of protection mechanisms based on the biological metaphor is considered; the experiments demonstrating the effectiveness of the protection mechanisms are described. PMID:25254229

  19. A Risk-Based Approach for Aerothermal/TPS Analysis and Testing

    DTIC Science & Technology

    2007-07-01

    RTO-EN-AVT-142 17 - 1 A Risk-Based Approach for Aerothermal/ TPS Analysis and Testing Michael J. Wright∗ and Jay H. Grinstead† NASA Ames...of the thermal protection system ( TPS ) is to protect the payload (crew, cargo, or science) from this entry heating environment. The performance of...the TPS is determined by the efficiency and reliability of this system, typically measured

  20. A 21st century approach to assessing the protection of workers' health.

    PubMed

    Rosskam, Ellen

    2011-01-01

    This article presents a rights-based approach to the way occupational health and safety is understood, departing from medical, engineering, and technocratic approaches that dominated the field throughout the 20th century. Moving toward a 21st century concept of the good society - based on citizenship rights and principles of universalism - a social protection-based system of assessing governments' performance in protecting workers' health and well-being is proffered. A Work Security Index (WSI) is used as a benchmarking system for evaluating national or local level governments' performance in this domain. Data from 95 countries in all regions of the world were used. A pioneering tool the WSI grouped and ranked countries based on governments' protection of workers' health and safety. Data represent findings from 95 national governments, as well as workers and employers. Among 95 countries, most have much work to do to provide the minimum measures to protect their working populations. Results reveal that women workers face particular social and economic insecurities and inequalities. We attempt to inform a broad audience about the WSI, how it can be used at multiple levels in any country for the protection of workers' health, safety, and well-being, and the need to do so.

  1. Aerodynamic heating environment definition/thermal protection system selection for the HL-20

    NASA Astrophysics Data System (ADS)

    Wurster, K. E.; Stone, H. W.

    1993-09-01

    Definition of the aerothermal environment is critical to any vehicle such as the HL-20 Personnel Launch System that operates within the hypersonic flight regime. Selection of an appropriate thermal protection system design is highly dependent on the accuracy of the heating-environment prediction. It is demonstrated that the entry environment determines the thermal protection system design for this vehicle. The methods used to predict the thermal environment for the HL-20 Personnel Launch System vehicle are described. Comparisons of the engineering solutions with computational fluid dynamic predictions, as well as wind-tunnel test results, show good agreement. The aeroheating predictions over several critical regions of the vehicle, including the stagnation areas of the nose and leading edges, windward centerline and wing surfaces, and leeward surfaces, are discussed. Results of predictions based on the engineering methods found within the MINIVER aerodynamic heating code are used in conjunction with the results of the extensive wind-tunnel tests on this configuration to define a flight thermal environment. Finally, the selection of the thermal protection system based on these predictions and current technology is described.

  2. 10 CFR 50.48 - Fire protection.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... suppression systems; and (iii) The means to limit fire damage to structures, systems, or components important...) Standard 805, “Performance-Based Standard for Fire Protection for Light Water Reactor Electric Generating... pressurized-water reactors (PWRs) is not permitted. (iv) Uncertainty analysis. An uncertainty analysis...

  3. 10 CFR 50.48 - Fire protection.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... suppression systems; and (iii) The means to limit fire damage to structures, systems, or components important...) Standard 805, “Performance-Based Standard for Fire Protection for Light Water Reactor Electric Generating... pressurized-water reactors (PWRs) is not permitted. (iv) Uncertainty analysis. An uncertainty analysis...

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    This manual is a guide to use the file protection mechanisms available on the Martin Marietta Energy Systems, Inc. Scientific and Technical Computing (STC) System VAXes. User identification codes (UICs) and general identifiers are discussed as a basis for understanding UIC-based and access control list (ACL) protection. 5 figs.

  5. Risk Based Reliability Centered Maintenance of DOD Fire Protection Systems

    DTIC Science & Technology

    1999-01-01

    2.2.3 Failure Mode and Effect Analysis ( FMEA )............................ 2.2.4 Failure Mode Risk Characterization...Step 2 - System functions and functional failures definition Step 3 - Failure mode and effect analysis ( FMEA ) Step 4 - Failure mode risk...system). The Interface Location column identifies the location where the FMEA of the fire protection system began or stopped. For example, for the fire

  6. Implementation of Pilot Protection System for Large Scale Distribution System like The Future Renewable Electric Energy Distribution Management Project

    NASA Astrophysics Data System (ADS)

    Iigaya, Kiyohito

    A robust, fast and accurate protection system based on pilot protection concept was developed previously and a few alterations in that algorithm were made to make it faster and more reliable and then was applied to smart distribution grids to verify the results for it. The new 10 sample window method was adapted into the pilot protection program and its performance for the test bed system operation was tabulated. Following that the system comparison between the hardware results for the same algorithm and the simulation results were compared. The development of the dual slope percentage differential method, its comparison with the 10 sample average window pilot protection system and the effects of CT saturation on the pilot protection system are also shown in this thesis. The implementation of the 10 sample average window pilot protection system is done to multiple distribution grids like Green Hub v4.3, IEEE 34, LSSS loop and modified LSSS loop. Case studies of these multi-terminal model are presented, and the results are also shown in this thesis. The result obtained shows that the new algorithm for the previously proposed protection system successfully identifies fault on the test bed and the results for both hardware and software simulations match and the response time is approximately less than quarter of a cycle which is fast as compared to the present commercial protection system and satisfies the FREEDM system requirement.

  7. Intelligent, Self-Diagnostic Thermal Protection System for Future Spacecraft

    NASA Technical Reports Server (NTRS)

    Hyers, Robert W.; SanSoucie, Michael P.; Pepyne, David; Hanlon, Alaina B.; Deshmukh, Abhijit

    2005-01-01

    The goal of this project is to provide self-diagnostic capabilities to the thermal protection systems (TPS) of future spacecraft. Self-diagnosis is especially important in thermal protection systems (TPS), where large numbers of parts must survive extreme conditions after weeks or years in space. In-service inspections of these systems are difficult or impossible, yet their reliability must be ensured before atmospheric entry. In fact, TPS represents the greatest risk factor after propulsion for any transatmospheric mission. The concepts and much of the technology would be applicable not only to the Crew Exploration Vehicle (CEV), but also to ablative thermal protection for aerocapture and planetary exploration. Monitoring a thermal protection system on a Shuttle-sized vehicle is a daunting task: there are more than 26,000 components whose integrity must be verified with very low rates of both missed faults and false positives. The large number of monitored components precludes conventional approaches based on centralized data collection over separate wires; a distributed approach is necessary to limit the power, mass, and volume of the health monitoring system. Distributed intelligence with self-diagnosis further improves capability, scalability, robustness, and reliability of the monitoring subsystem. A distributed system of intelligent sensors can provide an assurance of the integrity of the system, diagnosis of faults, and condition-based maintenance, all with provable bounds on errors.

  8. Protecting sensitive systems and data in an open agency

    NASA Technical Reports Server (NTRS)

    Hunt, Douglas B.; Tompkins, Frederick G.

    1987-01-01

    This paper focuses on the policy and definitional issues associated with providing adequate and reasonable levels of protection for sensitive systems and data in an agency whose basic charter mandates the open sharing of information and transfer of technology into the market economy. An information model based on current Federal regulatory issuances is presented. A scheme for determining sensitivity levels, based on a categorization taxonomy,is provided.

  9. A continuous operating protection system called COPS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chaperon, G.

    1987-01-01

    The continuous operating protection system called COPS is a diverless solution to achieve the stabilization and protection of subsea pipelines and cables: the system is based on the use of a continuous fabric form work mattress which is spread on the sea bed over the pipeline or cable to be protected by a remotely controlled underwater crawler and simultaneously filled with cement grout. The method has been successfully used in the GULLFAKS field where about 3.6 km of grout mattresses having a cross section of 2 meters by 0.2 meters have been laid. The performances of the system are presentedmore » as well as a trade off comparison with the other stabilization and protection methods currently used: burying, rock dumping or placement of covers.« less

  10. Electromagnetic shielding of thermal protection system for hypersonic vehicles

    NASA Astrophysics Data System (ADS)

    Albano, M.; Micheli, D.; Gradoni, G.; Morles, R. B.; Marchetti, M.; Moglie, F.; Mariani Primiani, V.

    2013-06-01

    The numerical simulation and the measurement of electromagnetic shielding at microwave frequencies of thermal protection system for hypersonic vehicles is presented using nested reverberation chamber. An example of a possible thermal protection system for a re-entry vehicle is presented. This system based on carbon material is electromagnetically characterized. The characterization takes into account not only the materials but also the final assembly configuration of the thermal protection system. The frequency range is 2-8 GHz. The results of measurements and simulations show that the microwave shielding effectiveness of carbon materials is above 60 dB for a single tile and that the tile inter-distance is able to downgrade the shielding effectiveness on the average to about 40 dB.

  11. High performance protection circuit for power electronics applications

    NASA Astrophysics Data System (ADS)

    Tudoran, Cristian D.; Dǎdârlat, Dorin N.; Toşa, Nicoleta; Mişan, Ioan

    2015-12-01

    In this paper we present a high performance protection circuit designed for the power electronics applications where the load currents can increase rapidly and exceed the maximum allowed values, like in the case of high frequency induction heating inverters or high frequency plasma generators. The protection circuit is based on a microcontroller and can be adapted for use on single-phase or three-phase power systems. Its versatility comes from the fact that the circuit can communicate with the protected system, having the role of a "sensor" or it can interrupt the power supply for protection, in this case functioning as an external, independent protection circuit.

  12. Development of FIAT-Based Parametric Thermal Protection System Mass Estimating Relationships for NASA's Multi-Mission Earth Entry Concept

    NASA Astrophysics Data System (ADS)

    Sepka, S. A.; Samareh, J. A.

    2014-06-01

    Mass estimating relationships have been formulated to determine a vehicle's Thermal Protection System material and required thickness for safe Earth entry. We focus on developing MERs, the resulting equations, model limitations, and model accuracy.

  13. 32 CFR 806b.35 - Balancing protection.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...

  14. 32 CFR 806b.35 - Balancing protection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...

  15. 32 CFR 806b.35 - Balancing protection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...

  16. 32 CFR 806b.35 - Balancing protection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...

  17. 32 CFR 806b.35 - Balancing protection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...

  18. Partially annotated bibliography for computer protection and related topics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Huskamp, J.C.

    1976-07-20

    References for the commonly cited technical papers in the area of computer protection are given. Great care is taken to exclude papers with no technical content or merit. For the purposes of this bibliography, computer protection is broadly defined to encompass all facets of the protection problem. The papers cover, but are not limited to, the topics of protection features in operating systems (e.g., MULTICS and HYDRA), hardware implementations of protection facilities (e.g., Honeywell 6180, System 250, BCC 5000, B6500), data base protection controls, confinement and protection models. Since computer protection is related to many other areas in computer sciencemore » and electrical engineering, a bibliography of related areas is included after the protection bibliography. These sections also include articles of general interest in the named areas which are not necessarily related to protection.« less

  19. 40 CFR 264.178 - Closure.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Closure. 264.178 Section 264.178 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) STANDARDS FOR... from the containment system. Remaining containers, liners, bases, and soil containing or contaminated...

  20. Unconventional High-Performance Laser Protection System Based on Dichroic Dye-Doped Cholesteric Liquid Crystals

    NASA Astrophysics Data System (ADS)

    Zhang, Wanshu; Zhang, Lanying; Liang, Xiao; Le Zhou; Xiao, Jiumei; Yu, Li; Li, Fasheng; Cao, Hui; Li, Kexuan; Yang, Zhou; Yang, Huai

    2017-02-01

    High-performance and cost-effective laser protection system is of crucial importance for the rapid advance of lasers in military and civilian fields leading to severe damages of human eyes and sensitive optical devices. However, it is crucially hindered by the angle-dependent protective effect and the complex preparation process. Here we demonstrate that angle-independence, good processibility, wavelength tunability, high optical density and good visibility can be effectuated simultaneously, by embedding dichroic anthraquinone dyes in a cholesteric liquid crystal matrix. More significantly, unconventional two-dimensional parabolic protection behavior is reported for the first time that in stark contrast to the existing protection systems, the overall parabolic protection behavior enables protective effect to increase with incident angles, hence providing omnibearing high-performance protection. The protective effect is controllable by dye concentration, LC cell thickness and CLC reflection efficiency, and the system can be made flexible enabling applications in flexible and even wearable protection devices. This research creates a promising avenue for the high-performance and cost-effective laser protection, and may foster the development of optical applications such as solar concentrators, car explosion-proof membrane, smart windows and polarizers.

  1. Heath Monitoring of Thermal Protection Systems - Preliminary Measurements and Design Specifications

    NASA Technical Reports Server (NTRS)

    Scott, D. A.; Price, D. C.

    2007-01-01

    The work reported here is the first stage of a project that aims to develop a health monitoring system for Thermal Protection Systems (TPS) that enables a vehicle to safely re-enter the Earth's atmosphere. The TPS health monitoring system is to be integrated into an existing acoustic emissions-based Concept Demonstrator, developed by CSIRO, which has been previously demonstrated for evaluating impact damage of aerospace systems.

  2. Protection of Renewable-dominated Microgrids: Challenges and Potential Solutions.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Elkhatib, Mohamed; Ellis, Abraham; Milan Biswal

    keywords : Microgrid Protection, Impedance Relay, Signal Processing-based Fault Detec- tion, Networked Microgrids, Communication-Assisted Protection In this report we address the challenge of designing efficient protection system for inverter- dominated microgrids. These microgrids are characterised with limited fault current capacity as a result of current-limiting protection functions of inverters. Typically, inverters limit their fault contribution in sub-cycle time frame to as low as 1.1 per unit. As a result, overcurrent protection could fail completely to detect faults in inverter-dominated microgrids. As part of this project a detailed literature survey of existing and proposed microgrid protection schemes were conducted. The surveymore » concluded that there is a gap in the available microgrid protection methods. The only credible protection solution available in literature for low- fault inverter-dominated microgrids is the differential protection scheme which represents a robust transmission-grade protection solution but at a very high cost. Two non-overcurrent protection schemes were investigated as part of this project; impedance-based protection and transient-based protection. Impedance-based protection depends on monitoring impedance trajectories at feeder relays to detect faults. Two communication-based impedance-based protection schemes were developed. the first scheme utilizes directional elements and pilot signals to locate the fault. The second scheme depends on a Central Protection Unit that communicates with all feeder relays to locate the fault based on directional flags received from feeder relays. The later approach could potentially be adapted to protect networked microgrids and dynamic topology microgrids. Transient-based protection relies on analyzing high frequency transients to detect and locate faults. This approach is very promising but its implementation in the filed faces several challenges. For example, high frequency transients due to faults can be confused with transients due to other events such as capacitor switching. Additionally, while detecting faults by analyzing transients could be doable, locating faults based on analyzing transients is still an open question.« less

  3. Project FIRES [Firefighters' Integrated Response Equipment System]. Volume 2: Protective Ensemble Performance Standards, Phase 1B

    NASA Technical Reports Server (NTRS)

    Abeles, F. J.

    1980-01-01

    The design of the prototype protective ensemble was finalized. Prototype ensembles were fabricated and then subjected to a series of qualification tests which were based upon the protective ensemble performance standards PEPS requirements. Engineering drawings and purchase specifications were prepared for the new protective ensemble.

  4. Patient information, consents and privacy protection scheme for an information system dedicated to pervasive developmental disorders.

    PubMed

    Ben Said, Mohamed; Robel, Laurence; Messiaen, Claude; Craus, Yann; Jais, Jean Philippe; Golse, Bernard; Landais, Paul

    2014-01-01

    Patients explicit and unambiguous information, patients consents and privacy protection are reviewed in this article, in the frame of the deployment of the information system TEDIS dedicated to autism spectrum disorders. The role of the Delegate to the Protection of Data is essential at this stage. We developed a privacy protection scheme based on storing encrypted patients personal data on the server database and decrypting it on the Web browser. It tries to respond to the end-users request to manage nominative data in a human readable form and to meet with privacy protection framework.

  5. Rethinking Environmental Protection: Meeting the Challenges of a Changing World.

    PubMed

    Burke, Thomas A; Cascio, Wayne E; Costa, Daniel L; Deener, Kacee; Fontaine, Thomas D; Fulk, Florence A; Jackson, Laura E; Munns, Wayne R; Orme-Zavaleta, Jennifer; Slimak, Michael W; Zartarian, Valerie G

    2017-03-01

    From climate change to hydraulic fracturing, and from drinking water safety to wildfires, environmental challenges are changing. The United States has made substantial environmental protection progress based on media-specific and single pollutant risk-based frameworks. However, today’s environmental problems are increasingly complex and new scientific approaches and tools are needed to achieve sustainable solutions to protect the environment and public health. In this article, we present examples of today’s environmental challenges and offer an integrated systems approach to address them. We provide a strategic framework and recommendations for advancing the application of science for protecting the environment and public health. We posit that addressing 21st century challenges requires transdisciplinary and systems approaches, new data sources, and stakeholder partnerships. To address these challenges, we outline a process driven by problem formulation with the following steps: a ) formulate the problem holistically, b ) gather and synthesize diverse information, c ) develop and assess options, and d ) implement sustainable solutions. This process will require new skills and education in systems science, with an emphasis on science translation. A systems-based approach can transcend media- and receptor-specific bounds, integrate diverse information, and recognize the inextricable link between ecology and human health.

  6. Rethinking Environmental Protection: Meeting the Challenges of a Changing World

    PubMed Central

    Burke, Thomas A.; Cascio, Wayne E.; Costa, Daniel L.; Deener, Kacee; Fontaine, Thomas D.; Fulk, Florence A.; Jackson, Laura E.; Munns, Wayne R.; Orme-Zavaleta, Jennifer; Slimak, Michael W.; Zartarian, Valerie G.

    2017-01-01

    Summary: From climate change to hydraulic fracturing, and from drinking water safety to wildfires, environmental challenges are changing. The United States has made substantial environmental protection progress based on media-specific and single pollutant risk-based frameworks. However, today’s environmental problems are increasingly complex and new scientific approaches and tools are needed to achieve sustainable solutions to protect the environment and public health. In this article, we present examples of today’s environmental challenges and offer an integrated systems approach to address them. We provide a strategic framework and recommendations for advancing the application of science for protecting the environment and public health. We posit that addressing 21st century challenges requires transdisciplinary and systems approaches, new data sources, and stakeholder partnerships. To address these challenges, we outline a process driven by problem formulation with the following steps: a) formulate the problem holistically, b) gather and synthesize diverse information, c) develop and assess options, and d) implement sustainable solutions. This process will require new skills and education in systems science, with an emphasis on science translation. A systems-based approach can transcend media- and receptor-specific bounds, integrate diverse information, and recognize the inextricable link between ecology and human health. PMID:28248180

  7. Advanced Protection & Service Restoration for FREEDM Systems

    NASA Astrophysics Data System (ADS)

    Singh, Urvir

    A smart electric power distribution system (FREEDM system) that incorporates DERs (Distributed Energy Resources), SSTs (Solid State Transformers - that can limit the fault current to two times of the rated current) & RSC (Reliable & Secure Communication) capabilities has been studied in this work in order to develop its appropriate protection & service restoration techniques. First, a solution is proposed that can make conventional protective devices be able to provide effective protection for FREEDM systems. Results show that although this scheme can provide required protection but it can be quite slow. Using the FREEDM system's communication capabilities, a communication assisted Overcurrent (O/C) protection scheme is proposed & results show that by using communication (blocking signals) very fast operating times are achieved thereby, mitigating the problem of conventional O/C scheme. Using the FREEDM System's DGI (Distributed Grid Intelligence) capability, an automated FLISR (Fault Location, Isolation & Service Restoration) scheme is proposed that is based on the concept of 'software agents' & uses lesser data (than conventional centralized approaches). Test results illustrated that this scheme is able to provide a global optimal system reconfiguration for service restoration.

  8. An arc control and protection system for the JET lower hybrid antenna based on an imaging system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Figueiredo, J., E-mail: joao.figueiredo@jet.efda.org; Mailloux, J.; Kirov, K.

    Arcs are the potentially most dangerous events related to Lower Hybrid (LH) antenna operation. If left uncontrolled they can produce damage and cause plasma disruption by impurity influx. To address this issue an arc real time control and protection imaging system for the Joint European Torus (JET) LH antenna has been implemented. The LH system is one of the additional heating systems at JET. It comprises 24 microwave generators (klystrons, operating at 3.7 GHz) providing up to 5 MW of heating and current drive to the JET plasma. This is done through an antenna composed of an array of waveguidesmore » facing the plasma. The protection system presented here is based primarily on an imaging arc detection and real time control system. It has adapted the ITER like wall hotspot protection system using an identical CCD camera and real time image processing unit. A filter has been installed to avoid saturation and spurious system triggers caused by ionization light. The antenna is divided in 24 Regions Of Interest (ROIs) each one corresponding to one klystron. If an arc precursor is detected in a ROI, power is reduced locally with subsequent potential damage and plasma disruption avoided. The power is subsequently reinstated if, during a defined interval of time, arcing is confirmed not to be present by image analysis. This system was successfully commissioned during the restart phase and beginning of the 2013 scientific campaign. Since its installation and commissioning, arcs and related phenomena have been prevented. In this contribution we briefly describe the camera, image processing, and real time control systems. Most importantly, we demonstrate that an LH antenna arc protection system based on CCD camera imaging systems works. Examples of both controlled and uncontrolled LH arc events and their consequences are shown.« less

  9. Early Leakage Protection System of LPG (Liquefied Petroleum Gas) Based on ATMega 16 Microcontroller

    NASA Astrophysics Data System (ADS)

    Sriwati; Ikhsan Ilahi, Nur; Musrawati; Baco, Syarifuddin; Suyuti'Andani Achmad, Ansar; Umrianah, Ejah

    2018-04-01

    LPG (Liquefied Petroleum Gas). LPG is a hydrocarbon gas production from refineries and gas refinery with the major components of propane gas (C3H8) and butane (C4H10). Limit flame (Flammable Range) or also called gas with air. Value Lower Explosive Limit (LEL) is the minimum limit of the concentration of fuel vapor in the air which if there is no source of fire, the gas will be burned. While the value of the Upper Explosive Limit (UEL), which limits the maximum concentration of fuel vapor in the air, which if no source of fire, the gas will be burned. Protection system is a defend mechanism of human, equipment, and buildings around the protected area. Goals to be achieved in this research are to design a protection system against the consequences caused by the leakage of LPG gas based on ATmega16 microcontroller. The method used in this research is to reduce the levels of leaked LPG and turned off the power source when the leakage of LPG is on the verge of explosive limit. The design of this protection system works accurately between 200 ppm up to 10000 ppm, which is still below the threshold of explosive. Thus protecting the early result of that will result in the leakage of LPG gas.

  10. The rise and fall of an opt-out system.

    PubMed

    Nordfalk, Francisca; Hoeyer, Klaus

    2018-04-01

    In Denmark, citizens participate in register-based research without the possibility of opting out. However, in 1995 it was made possible for Danish citizens to register an opt-out called 'researcher protection' [ forskerbeskyttelse], which implied that researchers could not contact people to invite them to participate in research projects, such as clinical trials or questionnaries, based on their registrations in national registers. Data already registered could still be used for research. In 2014, this possibility of opt-out was revoked by law. The aims of this paper are to understand how the Danish researcher protection system came about, why it was terminated and what we can we learn from this example. We conducted a descriptive analysis of a copy of the former researcher protection register along with policies and media debate surrounding the rise and revocation of the researcher protection system. Our results show how both the inception and the abolishment of researcher protection appear to be ad hoc and without specified criteria of success. An examination of the recorded entries in the researcher protection registry could have led to changes in its administration as an alternative to its total abolition. In future opt-out systems, there should be focus on monitoring register practices and the purpose and criteria for evaluation must be defined prior to implementation.

  11. 40 CFR 749.68 - Hexavalent chromium-based water treatment chemicals in cooling systems.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... tower used to remove heat from industrial processes, chemical reactions, or plants producing electrical... treatment chemicals in cooling systems. 749.68 Section 749.68 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT WATER TREATMENT CHEMICALS Air Conditioning and...

  12. 40 CFR 749.68 - Hexavalent chromium-based water treatment chemicals in cooling systems.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... tower used to remove heat from industrial processes, chemical reactions, or plants producing electrical... treatment chemicals in cooling systems. 749.68 Section 749.68 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT WATER TREATMENT CHEMICALS Air Conditioning and...

  13. 40 CFR 749.68 - Hexavalent chromium-based water treatment chemicals in cooling systems.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... tower used to remove heat from industrial processes, chemical reactions, or plants producing electrical... treatment chemicals in cooling systems. 749.68 Section 749.68 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT WATER TREATMENT CHEMICALS Air Conditioning and...

  14. 40 CFR 749.68 - Hexavalent chromium-based water treatment chemicals in cooling systems.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... tower used to remove heat from industrial processes, chemical reactions, or plants producing electrical... treatment chemicals in cooling systems. 749.68 Section 749.68 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT WATER TREATMENT CHEMICALS Air Conditioning and...

  15. 47 CFR 80.385 - Frequencies for automated systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... must notify the American Radio Relay League in writing at least 30 days prior to initiation of... protection will be provided to a site-based licensee's predicted 38 dBu signal level contour. The site-based... differential. The 18 dB protection to the site-based licensee's predicted 38 dBu signal level contour shall be...

  16. 47 CFR 80.385 - Frequencies for automated systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... must notify the American Radio Relay League in writing at least 30 days prior to initiation of... protection will be provided to a site-based licensee's predicted 38 dBu signal level contour. The site-based... differential. The 18 dB protection to the site-based licensee's predicted 38 dBu signal level contour shall be...

  17. Development of computer-based analytical tool for assessing physical protection system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mardhi, Alim, E-mail: alim-m@batan.go.id; Chulalongkorn University, Faculty of Engineering, Nuclear Engineering Department, 254 Phayathai Road, Pathumwan, Bangkok Thailand. 10330; Pengvanich, Phongphaeth, E-mail: ppengvan@gmail.com

    Assessment of physical protection system effectiveness is the priority for ensuring the optimum protection caused by unlawful acts against a nuclear facility, such as unauthorized removal of nuclear materials and sabotage of the facility itself. Since an assessment based on real exercise scenarios is costly and time-consuming, the computer-based analytical tool can offer the solution for approaching the likelihood threat scenario. There are several currently available tools that can be used instantly such as EASI and SAPE, however for our research purpose it is more suitable to have the tool that can be customized and enhanced further. In this work,more » we have developed a computer–based analytical tool by utilizing the network methodological approach for modelling the adversary paths. The inputs are multi-elements in security used for evaluate the effectiveness of the system’s detection, delay, and response. The tool has capability to analyze the most critical path and quantify the probability of effectiveness of the system as performance measure.« less

  18. A novel chaotic stream cipher and its application to palmprint template protection

    NASA Astrophysics Data System (ADS)

    Li, Heng-Jian; Zhang, Jia-Shu

    2010-04-01

    Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher.

  19. Novel Directional Protection Scheme for the FREEDM Smart Grid System

    NASA Astrophysics Data System (ADS)

    Sharma, Nitish

    This research primarily deals with the design and validation of the protection system for a large scale meshed distribution system. The large scale system simulation (LSSS) is a system level PSCAD model which is used to validate component models for different time-scale platforms, to provide a virtual testing platform for the Future Renewable Electric Energy Delivery and Management (FREEDM) system. It is also used to validate the cases of power system protection, renewable energy integration and storage, and load profiles. The protection of the FREEDM system against any abnormal condition is one of the important tasks. The addition of distributed generation and power electronic based solid state transformer adds to the complexity of the protection. The FREEDM loop system has a fault current limiter and in addition, the Solid State Transformer (SST) limits the fault current at 2.0 per unit. Former students at ASU have developed the protection scheme using fiber-optic cable. However, during the NSF-FREEDM site visit, the National Science Foundation (NSF) team regarded the system incompatible for the long distances. Hence, a new protection scheme with a wireless scheme is presented in this thesis. The use of wireless communication is extended to protect the large scale meshed distributed generation from any fault. The trip signal generated by the pilot protection system is used to trigger the FID (fault isolation device) which is an electronic circuit breaker operation (switched off/opening the FIDs). The trip signal must be received and accepted by the SST, and it must block the SST operation immediately. A comprehensive protection system for the large scale meshed distribution system has been developed in PSCAD with the ability to quickly detect the faults. The validation of the protection system is performed by building a hardware model using commercial relays at the ASU power laboratory.

  20. 18 CFR 3b.204 - Safeguarding information in manual and computer-based record systems.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... information in manual and computer-based record systems. 3b.204 Section 3b.204 Conservation of Power and Water... Collection of Records § 3b.204 Safeguarding information in manual and computer-based record systems. (a) The administrative and physical controls to protect the information in the manual and computer-based record systems...

  1. 18 CFR 3b.204 - Safeguarding information in manual and computer-based record systems.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... information in manual and computer-based record systems. 3b.204 Section 3b.204 Conservation of Power and Water... Collection of Records § 3b.204 Safeguarding information in manual and computer-based record systems. (a) The administrative and physical controls to protect the information in the manual and computer-based record systems...

  2. 18 CFR 3b.204 - Safeguarding information in manual and computer-based record systems.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... information in manual and computer-based record systems. 3b.204 Section 3b.204 Conservation of Power and Water... Collection of Records § 3b.204 Safeguarding information in manual and computer-based record systems. (a) The administrative and physical controls to protect the information in the manual and computer-based record systems...

  3. 18 CFR 3b.204 - Safeguarding information in manual and computer-based record systems.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... information in manual and computer-based record systems. 3b.204 Section 3b.204 Conservation of Power and Water... Collection of Records § 3b.204 Safeguarding information in manual and computer-based record systems. (a) The administrative and physical controls to protect the information in the manual and computer-based record systems...

  4. High performance protection circuit for power electronics applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tudoran, Cristian D., E-mail: cristian.tudoran@itim-cj.ro; Dădârlat, Dorin N.; Toşa, Nicoleta

    2015-12-23

    In this paper we present a high performance protection circuit designed for the power electronics applications where the load currents can increase rapidly and exceed the maximum allowed values, like in the case of high frequency induction heating inverters or high frequency plasma generators. The protection circuit is based on a microcontroller and can be adapted for use on single-phase or three-phase power systems. Its versatility comes from the fact that the circuit can communicate with the protected system, having the role of a “sensor” or it can interrupt the power supply for protection, in this case functioning as anmore » external, independent protection circuit.« less

  5. A multibiometric face recognition fusion framework with template protection

    NASA Astrophysics Data System (ADS)

    Chindaro, S.; Deravi, F.; Zhou, Z.; Ng, M. W. R.; Castro Neves, M.; Zhou, X.; Kelkboom, E.

    2010-04-01

    In this work we present a multibiometric face recognition framework based on combining information from 2D with 3D facial features. The 3D biometrics channel is protected by a privacy enhancing technology, which uses error correcting codes and cryptographic primitives to safeguard the privacy of the users of the biometric system at the same time enabling accurate matching through fusion with 2D. Experiments are conducted to compare the matching performance of such multibiometric systems with the individual biometric channels working alone and with unprotected multibiometric systems. The results show that the proposed hybrid system incorporating template protection, match and in some cases exceed the performance of corresponding unprotected equivalents, in addition to offering the additional privacy protection.

  6. Cryogenic filters for RFI protection

    NASA Technical Reports Server (NTRS)

    Bautista, J. J.; Petty, S. M.

    1981-01-01

    The increased bandwidth and sensitivity of the DSN maser-based receiver systems along with the increase in worldwide microwave spectrum usage dictated the need for employing additional measures to protect these systems from RFI (radio frequency inerference). Both in-band and out-of-band microwave signals at the input of the Deep Space Network (DSN) traveling wave masers (TWM) can adversely affect the maser performance in a variety of ways. Filters fabricated from superconducting materials operating below their superconducting transition temperature (Tc) possess the most potential for providing the necessary RFI protection without degrading the system performance.

  7. Kestrel: force protection and Intelligence, Surveillance, and Reconnaissance (ISR) persistent surveillance on aerostats

    NASA Astrophysics Data System (ADS)

    Luber, David R.; Marion, John E.; Fields, David

    2012-05-01

    Logos Technologies has developed and fielded the Kestrel system, an aerostat-based, wide area persistent surveillance system dedicated to force protection and ISR mission execution operating over forward operating bases. Its development included novel imaging and stabilization capability for day/night operations on military aerostat systems. The Kestrel system's contribution is a substantial enhancement to aerostat-based, force protection systems which to date have relied on narrow field of view ball gimbal sensors to identify targets of interest. This inefficient mechanism to conduct wide area field of view surveillance is greatly enhanced by Kestrel's ability to maintain a constant motion imagery stare of the entire forward operating base (FOB) area. The Kestrel airborne sensor enables 360° coverage out to extended ranges which covers a city sized area at moderate resolution, while cueing a narrow field of view sensor to provide high resolution imagery of targets of interest. The ground station exploitation system enables operators to autonomously monitor multiple regions of interest in real time, and allows for backtracking through the recorded imagery, while continuing to monitor ongoing activity. Backtracking capability allows operators to detect threat networks, their CONOPS, and locations of interest. Kestrel's unique advancement has already been utilized successfully in OEF operations.

  8. Comet/Asteroid Protection System (CAPS): A Space-Based System Concept for Revolutionizing Earth Protection and Utilization of Near-Earth Objects

    NASA Technical Reports Server (NTRS)

    Mazanek, Daniel D.; Roithmayr, Carlos M.; Antol, Jeffrey; Kay-Bunnell, Linda; Werner, Martin R.; Park, Sang-Young; Kumar, Renjith R.

    2002-01-01

    There exists an infrequent, but significant hazard to life and property due to impacting asteroids and comets. There is currently no specific search for long-period comets, smaller near-Earth asteroids, or smaller short-period comets. These objects represent a threat with potentially little or no warning time using conventional ground-based telescopes. These planetary bodies also represent a significant resource for commercial exploitation, long-term sustained space exploration, and scientific research. The Comet/Asteroid Protection System (CAPS) would expand the current detection effort to include long-period comets, as well as small asteroids and short-period comets capable of regional destruction. A space-based detection system, despite being more costly and complex than Earth-based initiatives, is the most promising way of expanding the range of detectable objects, and surveying the entire celestial sky on a regular basis. CAPS is a future spacebased system concept that provides permanent, continuous asteroid and comet monitoring, and rapid, controlled modification of the orbital trajectories of selected bodies. CAPS would provide an orbit modification system capable of diverting kilometer class objects, and modifying the orbits of smaller asteroids for impact defense and resource utilization. This paper provides a summary of CAPS and discusses several key areas and technologies that are being investigated.

  9. Future Interoperability of Camp Protection Systems (FICAPS)

    NASA Astrophysics Data System (ADS)

    Caron, Sylvie; Gündisch, Rainer; Marchand, Alain; Stahl, Karl-Hermann

    2013-05-01

    The FICAPS Project has been established as a Project of the European Defence Agency based on an initiative of Germany and France. Goal of this Project was to derive Guidelines, which by a proper implementation in future developments improve Camp Protection Systems (CPS) by enabling and improving interoperability between Camp Protection Systems and its Equipments of different Nations involved in multinational missions. These Guidelines shall allow for: • Real-time information exchange between equipments and systems of different suppliers and nations (even via SatCom), • Quick and easy replacement of equipments (even of different Nations) at run-time in the field by means of plug and play capability, thus lowering the operational and logistic costs and making the system highly available, • Enhancement of system capabilities (open and modular systems) by adding new equipment with new capabilities (just plug-in, automatic adjustment of the HMI Human Machine Interface) without costly and time consuming validation and test on system level (validation and test can be done on Equipment level), Four scenarios have been identified to summarize the interoperability requirements from an operational viewpoint. To prove the definitions given in the Guideline Document, a French and a German Demonstration System, based on existing national assets, were realized. Demonstrations, showing the capabilities given by the defined interoperability requirements with respect to the operational scenarios, were performed. Demonstrations included remote control of a CPS by another CPS, remote sensor control (Electro-Optic/InfraRed EO/IR) and remote effector control. This capability can be applied to extend the protection area or to protect distant infrastructural assets Demonstrations have been performed. The required interoperability functionality was shown successfully. Even if the focus of the FICAPS project was on camp protection, the solution found is also appropriate for other force protection and ISR (Intelligence Surveillance Reconnaissance) tasks not only due to its flexibility but also due to the chosen interfacing.

  10. Architecture design of the national plant treasure management information system based on GIS: a case study of Gugong Date Garden in Hebei province

    NASA Astrophysics Data System (ADS)

    Shen, Shaoling; Li, Renjie; Shen, Dongdong; Tong, Chunyan; Fu, Xueqing

    2007-06-01

    "Gugong Date Garden", lies in Juguan Village, Qijiawu County, Huanghua City, China. It is the largest forest of winter date in this world, which is the longest in history, largest in area and best in quality and it is also included in the first group of national main protected units of botanic cultural relics. However, it is lacking of uniform management platform and modes. According to the specific characteristics of botanic cultural relics preservation, the author sets up the "Plant Treasure Management Information System" for "Gugong Date Garden", based on the Geographic information system (GIS), Internet, database and virtual reality technologies, along with the idea of modern customer management systems. This system is designed for five types of users, named system administrators, cultural relic supervisors, researchers, farmers and tourists, with the aim of realizing integrated managements of ancient trees' protection, scientific researches, tourism and explorations altogether, so as to make better management, protection, and utilizations.

  11. Medical social work practice in child protection in China: A multiple case study in Shanghai hospitals.

    PubMed

    Zhao, Fang; Hämäläinen, Juha; Chen, Yu-Ting

    2017-01-01

    With the rapid development of the child welfare system in China over recent years, medical social work has been increasingly involved in providing child protection services in several hospitals in Shanghai. Focusing on five cases in this paper, the exploratory study aims to present a critical overview of current practices and effects of medical social work for child protection, based on a critical analysis of the multidimensional role of social work practitioners engaged in the provision of child protection services as well as potential challenges. Implications and suggestions for future improvements of China's child protection system are also discussed.

  12. Protection of Renewable-dominated Microgrids: Challenges and Potential Solutions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Elkhatib, Mohamed; Ellis, Abraham; Biswal, Milan

    In this report we address the challenge of designing efficient protection system for inverter- dominated microgrids. These microgrids are characterised with limited fault current capacity as a result of current-limiting protection functions of inverters. Typically, inverters limit their fault contribution in sub-cycle time frame to as low as 1.1 per unit. As a result, overcurrent protection could fail completely to detect faults in inverter-dominated microgrids. As part of this project a detailed literature survey of existing and proposed microgrid protection schemes were conducted. The survey concluded that there is a gap in the available microgrid protection methods. The only crediblemore » protection solution available in literature for low- fault inverter-dominated microgrids is the differential protection scheme which represents a robust transmission-grade protection solution but at a very high cost. Two non-overcurrent protection schemes were investigated as part of this project; impedance-based protection and transient-based protection. Impedance-based protection depends on monitoring impedance trajectories at feeder relays to detect faults. Two communication-based impedance-based protection schemes were developed. the first scheme utilizes directional elements and pilot signals to locate the fault. The second scheme depends on a Central Protection Unit that communicates with all feeder relays to locate the fault based on directional flags received from feeder relays. The later approach could potentially be adapted to protect networked microgrids and dynamic topology microgrids. Transient-based protection relies on analyzing high frequency transients to detect and locate faults. This approach is very promising but its implementation in the filed faces several challenges. For example, high frequency transients due to faults can be confused with transients due to other events such as capacitor switching. Additionally, while detecting faults by analyzing transients could be doable, locating faults based on analyzing transients is still an open question.« less

  13. Research on Green Manufacturing Innovation Based on Resource Environment Protection

    NASA Astrophysics Data System (ADS)

    Jie, Xu

    2017-11-01

    Green manufacturing is a trend of manufacturing industry in the future, and is of great significance to resource protection and environmental protection. This paper first studies the green manufacturing innovation system, and then decomposes the green manufacturing innovation dimensions, and constructs the green manufacturing innovation dimension space. Finally, from the view of resource protection and environmental protection, this paper explores the path of green manufacturing innovation.

  14. Multisensor system for the protection of critical infrastructure of a seaport

    NASA Astrophysics Data System (ADS)

    Kastek, Mariusz; Dulski, Rafał; Zyczkowski, Marek; Szustakowski, Mieczysław; Trzaskawka, Piotr; Ciurapinski, Wiesław; Grelowska, Grazyna; Gloza, Ignacy; Milewski, Stanislaw; Listewnik, Karol

    2012-06-01

    There are many separated infrastructural objects within a harbor area that may be considered "critical", such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons and explosives) as well as underwater ones (manned or unmanned submarines, scuba divers). The paper will present the concept of multisensor security system for a harbor protection, capable of complex monitoring of selected critical objects within the protected area. The proposed system consists of a command centre and several different sensors deployed in key areas, providing effective protection from land and sea, with special attention focused on the monitoring of underwater zone. The initial project of such systems will be presented, its configuration and initial tests of the selected components. The protection of surface area is based on medium-range radar and LLTV and infrared cameras. Underwater zone will be monitored by a sonar and acoustic and magnetic barriers, connected into an integrated monitoring system. Theoretical analyses concerning the detection of fast, small surface objects (such as RIB boats) by a camera system and real test results in various weather conditions will also be presented.

  15. Displacements of Metallic Thermal Protection System Panels During Reentry

    NASA Technical Reports Server (NTRS)

    Daryabeigi, Kamran; Blosser, Max L.; Wurster, Kathryn E.

    2006-01-01

    Bowing of metallic thermal protection systems for reentry of a previously proposed single-stage-to-orbit reusable launch vehicle was studied. The outer layer of current metallic thermal protection system concepts typically consists of a honeycomb panel made of a high temperature nickel alloy. During portions of reentry when the thermal protection system is exposed to rapidly varying heating rates, a significant temperature gradient develops across the honeycomb panel thickness, resulting in bowing of the honeycomb panel. The deformations of the honeycomb panel increase the roughness of the outer mold line of the vehicle, which could possibly result in premature boundary layer transition, resulting in significantly higher downstream heating rates. The aerothermal loads and parameters for three locations on the centerline of the windward side of this vehicle were calculated using an engineering code. The transient temperature distributions through a metallic thermal protection system were obtained using 1-D finite volume thermal analysis, and the resulting displacements of the thermal protection system were calculated. The maximum deflection of the thermal protection system throughout the reentry trajectory was 6.4 mm. The maximum ratio of deflection to boundary layer thickness was 0.032. Based on previously developed distributed roughness correlations, it was concluded that these defections will not result in tripping the hypersonic boundary layer.

  16. Evolution of thiol protective systems in prokaryotes

    NASA Technical Reports Server (NTRS)

    Fahey, R. C.; Newton, G. L.

    1986-01-01

    Biological thiols are essential elements in most aspects of cell function but undergo rapid oxidation to disulfides in the presence of oxygen. The evolution of systems to protect against such oxygen toxicity was essential to the emergence of aerobic life. The protection system used by eukaryotes is based upon glutathione (GSH) and GSH-dependent enzymes but many bacteria lack GSH and apparently use other mechanisms. The objective of this research is to elaborate the thiol protective mechanisms employed by prokaryotes of widely divergent evolutionary origin and to understand why GSH became the central thiol employed in essentially all higher organisms. Thiol-selective fluorescent labeling and HPLC analysis has been used to determine key monothiol components.

  17. Advanced extravehicular protective systems

    NASA Technical Reports Server (NTRS)

    Sutton, J. G.; Heimlich, P. F.; Tepper, E. H.

    1972-01-01

    New technologies are identified and recommended for developing a regenerative portable life support system that provides protection for extravehicular human activities during long duration missions on orbiting space stations, potential lunar bases, and possible Mars landings. Parametric subsystems analyses consider: thermal control, carbon dioxide control, oxygen supply, power supply, contaminant control, humidity control, prime movers, and automatic temperature control.

  18. 75 FR 62847 - Notice of Issuance of Final Determination Concerning an ADFLOTM

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-13

    ... country of origin of an Adflo TM Respiration System used in a welding environment. Based upon the facts... used for respiratory protection in a welding environment. The Adflo TM respiration system utilizes a... by the user in a welding environment. The helmet provides the primary protection for the user's head...

  19. Motivating Power System Protection Course Students by Practical and Computer-Based Activities

    ERIC Educational Resources Information Center

    Shahnia, Farhad; Moghbel, Moayed; Yengejeh, Hadi Hosseinian

    2016-01-01

    This paper presents several methods for motivating students taking a power system protection (PSP) course. The paper reviews the laboratory activities developed for the PSP course at Curtin University, Australia; these methods are applicable and can be used for PSP course instruction at any institution. These activities were developed to improve…

  20. Reactor protection system with automatic self-testing and diagnostic

    DOEpatents

    Gaubatz, Donald C.

    1996-01-01

    A reactor protection system having four divisions, with quad redundant sensors for each scram parameter providing input to four independent microprocessor-based electronic chassis. Each electronic chassis acquires the scram parameter data from its own sensor, digitizes the information, and then transmits the sensor reading to the other three electronic chassis via optical fibers. To increase system availability and reduce false scrams, the reactor protection system employs two levels of voting on a need for reactor scram. The electronic chassis perform software divisional data processing, vote 2/3 with spare based upon information from all four sensors, and send the divisional scram signals to the hardware logic panel, which performs a 2/4 division vote on whether or not to initiate a reactor scram. Each chassis makes a divisional scram decision based on data from all sensors. Automatic detection and discrimination against failed sensors allows the reactor protection system to automatically enter a known state when sensor failures occur. Cross communication of sensor readings allows comparison of four theoretically "identical" values. This permits identification of sensor errors such as drift or malfunction. A diagnostic request for service is issued for errant sensor data. Automated self test and diagnostic monitoring, sensor input through output relay logic, virtually eliminate the need for manual surveillance testing. This provides an ability for each division to cross-check all divisions and to sense failures of the hardware logic.

  1. Reactor protection system with automatic self-testing and diagnostic

    DOEpatents

    Gaubatz, D.C.

    1996-12-17

    A reactor protection system is disclosed having four divisions, with quad redundant sensors for each scram parameter providing input to four independent microprocessor-based electronic chassis. Each electronic chassis acquires the scram parameter data from its own sensor, digitizes the information, and then transmits the sensor reading to the other three electronic chassis via optical fibers. To increase system availability and reduce false scrams, the reactor protection system employs two levels of voting on a need for reactor scram. The electronic chassis perform software divisional data processing, vote 2/3 with spare based upon information from all four sensors, and send the divisional scram signals to the hardware logic panel, which performs a 2/4 division vote on whether or not to initiate a reactor scram. Each chassis makes a divisional scram decision based on data from all sensors. Automatic detection and discrimination against failed sensors allows the reactor protection system to automatically enter a known state when sensor failures occur. Cross communication of sensor readings allows comparison of four theoretically ``identical`` values. This permits identification of sensor errors such as drift or malfunction. A diagnostic request for service is issued for errant sensor data. Automated self test and diagnostic monitoring, sensor input through output relay logic, virtually eliminate the need for manual surveillance testing. This provides an ability for each division to cross-check all divisions and to sense failures of the hardware logic. 16 figs.

  2. Performance analysis of microcomputer based differential protection of UHV lines under selective phase switching

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bhatti, A.A.

    1990-04-01

    This paper examines the effects of primary and secondary fault quantities as well s of mutual couplings of neighboring circuits on the sensitivity of operation and threshold settings of a microcomputer based differential protection of UHV lines under selective phase switching. Microcomputer based selective phase switching allows the disconnection of minimum number of phases involved in a fault and requires the autoreclosing of these phases immediately after the extinction of secondary arc. During a primary fault a heavy current contribution to the healthy phases tends to cause an unwanted tripping. Faulty phases physically disconnected constitute an isolated fault which beingmore » coupled to the system affects the current and voltage levels of the healthy phases still retained in the system and may cause an unwanted tripping. The microcomputer based differential protection, appears to have poor performance when applied to uncompensated lines employing selective pole switching.« less

  3. Connecting Vulnerable Children and Families to Community-Based Programs Strengthens Parents' Perceptions of Protective Factors

    ERIC Educational Resources Information Center

    Hughes, Marcia; Joslyn, Allison; Wojton, Morella; O'Reilly, Mairead; Dworkin, Paul H.

    2016-01-01

    We employed principles from a nationally recognized prevention model on family support to investigate whether connecting vulnerable children to community-based programs and services through a statewide intervention system, the "Help Me Grow" program, strengthens parents' perceptions of protective factors. We used a parent survey modeled…

  4. Alternative High Performance Polymers for Ablative Thermal Protection Systems

    NASA Technical Reports Server (NTRS)

    Boghozian, Tane; Stackpoole, Mairead; Gonzales, Greg

    2015-01-01

    Ablative thermal protection systems are commonly used as protection from the intense heat during re-entry of a space vehicle and have been used successfully on many missions including Stardust and Mars Science Laboratory both of which used PICA - a phenolic based ablator. Historically, phenolic resin has served as the ablative polymer for many TPS systems. However, it has limitations in both processing and properties such as char yield, glass transition temperature and char stability. Therefore alternative high performance polymers are being considered including cyanate ester resin, polyimide, and polybenzoxazine. Thermal and mechanical properties of these resin systems were characterized and compared with phenolic resin.

  5. Design development and testing of high voltage power supply with crowbar protection for IOT based RF amplifier system in VECC

    NASA Astrophysics Data System (ADS)

    Thakur, S. K.; Kumar, Y.

    2018-05-01

    This paper described the detailed design, development and testing of high voltage power supply (‑30 kV, 3.2 A) and different power supplies for biasing electrodes of Inductive Output Tube (IOT) based high power Radio Frequency (RF) amplifier. This IOT based RF amplifier is further used for pursuing research and development activity in superconducting RF cavity project at Variable Energy Cyclotron Centre (VECC) Kolkata. The state-of-the-art technology of IOT-based high power RF amplifier is designed, developed, and tested at VECC which is the first of its kind in India. A high voltage power supply rated at negative polarity of 30 kV dc/3.2 A is required for biasing cathode of IOT with crowbar protection circuit. This power supply along with crowbar protection system is designed, developed and tested at VECC for testing the complete setup. The technical difficulties and challenges occured during the design of cathode power supply, its crowbar protection techniques along with other supported power supplies i.e. grid and ion pump power supplies are discussed in this paper.

  6. Toward a Model-Based Approach to Flight System Fault Protection

    NASA Technical Reports Server (NTRS)

    Day, John; Murray, Alex; Meakin, Peter

    2012-01-01

    Fault Protection (FP) is a distinct and separate systems engineering sub-discipline that is concerned with the off-nominal behavior of a system. Flight system fault protection is an important part of the overall flight system systems engineering effort, with its own products and processes. As with other aspects of systems engineering, the FP domain is highly amenable to expression and management in models. However, while there are standards and guidelines for performing FP related analyses, there are not standards or guidelines for formally relating the FP analyses to each other or to the system hardware and software design. As a result, the material generated for these analyses are effectively creating separate models that are only loosely-related to the system being designed. Development of approaches that enable modeling of FP concerns in the same model as the system hardware and software design enables establishment of formal relationships that has great potential for improving the efficiency, correctness, and verification of the implementation of flight system FP. This paper begins with an overview of the FP domain, and then continues with a presentation of a SysML/UML model of the FP domain and the particular analyses that it contains, by way of showing a potential model-based approach to flight system fault protection, and an exposition of the use of the FP models in FSW engineering. The analyses are small examples, inspired by current real-project examples of FP analyses.

  7. Staged-Fault Testing of Distance Protection Relay Settings

    NASA Astrophysics Data System (ADS)

    Havelka, J.; Malarić, R.; Frlan, K.

    2012-01-01

    In order to analyze the operation of the protection system during induced fault testing in the Croatian power system, a simulation using the CAPE software has been performed. The CAPE software (Computer-Aided Protection Engineering) is expert software intended primarily for relay protection engineers, which calculates current and voltage values during faults in the power system, so that relay protection devices can be properly set up. Once the accuracy of the simulation model had been confirmed, a series of simulations were performed in order to obtain the optimal fault location to test the protection system. The simulation results were used to specify the test sequence definitions for the end-to-end relay testing using advanced testing equipment with GPS synchronization for secondary injection in protection schemes based on communication. The objective of the end-to-end testing was to perform field validation of the protection settings, including verification of the circuit breaker operation, telecommunication channel time and the effectiveness of the relay algorithms. Once the end-to-end secondary injection testing had been completed, the induced fault testing was performed with three-end lines loaded and in service. This paper describes and analyses the test procedure, consisting of CAPE simulations, end-to-end test with advanced secondary equipment and staged-fault test of a three-end power line in the Croatian transmission system.

  8. Effects of Water Sprinklers on the Performance of Low Level AFFF Aircraft Hangar Fire Suppression Systems

    DTIC Science & Technology

    2000-05-22

    AFFF fire suppression system. The combined overhead water-only sprinkler and low level AFFF system is being considered as a new protection scheme for...performance of a low level system during AFFF discharge (4.0 Lpm/sq m (0.1 gpm/sq ft)). Based on the results of these tests, the design criteria for...Navy hangar protection may be revised to incorporate AFFF application from only the low level system, combined with overhead closed-head guide response water sprinklers.

  9. Design of Remote Heat-Meter System Based on Trusted Technology

    NASA Astrophysics Data System (ADS)

    Yu, Changgeng; Lai, Liping

    2018-03-01

    This article presents a proposal of a heat meter and remote meter reading system for the disadvantages of the hackers very easily using eavesdropping, tampering, replay attack of traditional remote meter reading system. The system selects trusted technology such as, the identity authentication, integrity verifying, and data protection. By the experiments, it is proved that the remote meter reading system of the heat meter can be used to verify the feasibility of the technology, and verify the practicability and operability of data protection technology.

  10. A protection system for the JET ITER-like wall based on imaging diagnostics.

    PubMed

    Arnoux, G; Devaux, S; Alves, D; Balboa, I; Balorin, C; Balshaw, N; Beldishevski, M; Carvalho, P; Clever, M; Cramp, S; de Pablos, J-L; de la Cal, E; Falie, D; Garcia-Sanchez, P; Felton, R; Gervaise, V; Goodyear, A; Horton, A; Jachmich, S; Huber, A; Jouve, M; Kinna, D; Kruezi, U; Manzanares, A; Martin, V; McCullen, P; Moncada, V; Obrejan, K; Patel, K; Lomas, P J; Neto, A; Rimini, F; Ruset, C; Schweer, B; Sergienko, G; Sieglin, B; Soleto, A; Stamp, M; Stephen, A; Thomas, P D; Valcárcel, D F; Williams, J; Wilson, J; Zastrow, K-D

    2012-10-01

    The new JET ITER-like wall (made of beryllium and tungsten) is more fragile than the former carbon fiber composite wall and requires active protection to prevent excessive heat loads on the plasma facing components (PFC). Analog CCD cameras operating in the near infrared wavelength are used to measure surface temperature of the PFCs. Region of interest (ROI) analysis is performed in real time and the maximum temperature measured in each ROI is sent to the vessel thermal map. The protection of the ITER-like wall system started in October 2011 and has already successfully led to a safe landing of the plasma when hot spots were observed on the Be main chamber PFCs. Divertor protection is more of a challenge due to dust deposits that often generate false hot spots. In this contribution we describe the camera, data capture and real time processing systems. We discuss the calibration strategy for the temperature measurements with cross validation with thermal IR cameras and bi-color pyrometers. Most importantly, we demonstrate that a protection system based on CCD cameras can work and show examples of hot spot detections that stop the plasma pulse. The limits of such a design and the associated constraints on the operations are also presented.

  11. A protection system for the JET ITER-like wall based on imaging diagnosticsa)

    NASA Astrophysics Data System (ADS)

    Arnoux, G.; Devaux, S.; Alves, D.; Balboa, I.; Balorin, C.; Balshaw, N.; Beldishevski, M.; Carvalho, P.; Clever, M.; Cramp, S.; de Pablos, J.-L.; de la Cal, E.; Falie, D.; Garcia-Sanchez, P.; Felton, R.; Gervaise, V.; Goodyear, A.; Horton, A.; Jachmich, S.; Huber, A.; Jouve, M.; Kinna, D.; Kruezi, U.; Manzanares, A.; Martin, V.; McCullen, P.; Moncada, V.; Obrejan, K.; Patel, K.; Lomas, P. J.; Neto, A.; Rimini, F.; Ruset, C.; Schweer, B.; Sergienko, G.; Sieglin, B.; Soleto, A.; Stamp, M.; Stephen, A.; Thomas, P. D.; Valcárcel, D. F.; Williams, J.; Wilson, J.; Zastrow, K.-D.; JET-EFDA Contributors

    2012-10-01

    The new JET ITER-like wall (made of beryllium and tungsten) is more fragile than the former carbon fiber composite wall and requires active protection to prevent excessive heat loads on the plasma facing components (PFC). Analog CCD cameras operating in the near infrared wavelength are used to measure surface temperature of the PFCs. Region of interest (ROI) analysis is performed in real time and the maximum temperature measured in each ROI is sent to the vessel thermal map. The protection of the ITER-like wall system started in October 2011 and has already successfully led to a safe landing of the plasma when hot spots were observed on the Be main chamber PFCs. Divertor protection is more of a challenge due to dust deposits that often generate false hot spots. In this contribution we describe the camera, data capture and real time processing systems. We discuss the calibration strategy for the temperature measurements with cross validation with thermal IR cameras and bi-color pyrometers. Most importantly, we demonstrate that a protection system based on CCD cameras can work and show examples of hot spot detections that stop the plasma pulse. The limits of such a design and the associated constraints on the operations are also presented.

  12. Engineering Ultimate Self-Protection in Autonomic Agents for Space Exploration Missions

    NASA Technical Reports Server (NTRS)

    Sterritt, Roy; Hinchey, Mike

    2005-01-01

    NASA's Exploration Initiative (EI) will push space exploration missions to the limit. Future missions will be required to be self-managing as well as self-directed, in order to meet the challenges of human and robotic space exploration. We discuss security and self protection in autonomic agent based-systems, and propose the ultimate self-protection mechanism for such systems-self-destruction. Like other metaphors in Autonomic Computing, this is inspired by biological systems, and is the analog of biological apoptosis. Finally, we discus the role it might play in future NASA space exploration missions.

  13. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    NASA Astrophysics Data System (ADS)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  14. Corrosion inhibitors for solar heating and cooling systems

    NASA Technical Reports Server (NTRS)

    Humphries, T. S.

    1978-01-01

    Inhibitors which appeared promising in previous tests and additional inhibitors including several proprietary products were evaluated. Evaluation of the inhibitors was based on corrosion protection afforded an aluminum-mild steel-copper-stainless steel assembly in a hot corrosive water. Of the inhibitors tested two were found to be effective and show promise for protecting multimetallic solar heating systems.

  15. Protecting wood from mould, decay, and termites with multi-component biocide systems

    Treesearch

    Carol A. Clausen

    2007-01-01

    Biocides must be developed for controlling mould establishment on cellulose-based building materials. Accordingly, biocides intended for indoor applications must be non- toxic, non-volatile, odourless, hypoallergenic, and able to provide long-term protection under conditions of high humidity. Multi-component biocide systems were tested in American Wood-Preservers’...

  16. A Model for Communications Satellite System Architecture Assessment

    DTIC Science & Technology

    2011-09-01

    This is shown in Equation 4. The total system cost includes all development, acquisition, fielding, operations, maintenance and upgrades, and system...protection. A mathematical model was implemented to enable the analysis of communications satellite system architectures based on multiple system... implemented to enable the analysis of communications satellite system architectures based on multiple system attributes. Utilization of the model in

  17. The biogenetical revolution of the Council of Europe - twenty years of the Convention on Human Rights and Biomedicine (Oviedo Convention).

    PubMed

    Nawrot, Oktawian

    2018-05-16

    The Council of Europe's legal regulation concerning development of biology and medicine undoubtedly form the most interesting, but certainly not perfect, over-national system of protection of human beings in prenatal stages of development. The strength of the mentioned system is that it based on well-known and common acceptable values and rules such as human dignity and its protection. The aim of the paper is to present the reasons behind adopting such a system, as well as the consequences of the latter.The author argues that in such a way a revolution within the human rights system of the Council of Europe took place. This revolution caused a significant expansion of the Council of Europe's system of human rights' protection and changed the perspective of the protection from vertical to the horizontal.

  18. Anode protection system for shutdown of solid oxide fuel cell system

    DOEpatents

    Li, Bob X; Grieves, Malcolm J; Kelly, Sean M

    2014-12-30

    An Anode Protection Systems for a SOFC system, having a Reductant Supply and safety subsystem, a SOFC anode protection subsystem, and a Post Combustion and slip stream control subsystem. The Reductant Supply and safety subsystem includes means for generating a reducing gas or vapor to prevent re-oxidation of the Ni in the anode layer during the course of shut down of the SOFC stack. The underlying ammonia or hydrogen based material used to generate a reducing gas or vapor to prevent the re-oxidation of the Ni can be in either a solid or liquid stored inside a portable container. The SOFC anode protection subsystem provides an internal pressure of 0.2 to 10 kPa to prevent air from entering into the SOFC system. The Post Combustion and slip stream control subsystem provides a catalyst converter configured to treat any residual reducing gas in the slip stream gas exiting from SOFC stack.

  19. Thermal Protection System with Staggered Joints

    NASA Technical Reports Server (NTRS)

    Simon, Xavier D. (Inventor); Robinson, Michael J. (Inventor); Andrews, Thomas L. (Inventor)

    2014-01-01

    The thermal protection system disclosed herein is suitable for use with a spacecraft such as a reentry module or vehicle, where the spacecraft has a convex surface to be protected. An embodiment of the thermal protection system includes a plurality of heat resistant panels, each having an outer surface configured for exposure to atmosphere, an inner surface opposite the outer surface and configured for attachment to the convex surface of the spacecraft, and a joint edge defined between the outer surface and the inner surface. The joint edges of adjacent ones of the heat resistant panels are configured to mate with each other to form staggered joints that run between the peak of the convex surface and the base section of the convex surface.

  20. Non-Pilot Protection of the HVDC Grid

    NASA Astrophysics Data System (ADS)

    Badrkhani Ajaei, Firouz

    This thesis develops a non-pilot protection system for the next generation power transmission system, the High-Voltage Direct Current (HVDC) grid. The HVDC grid protection system is required to be (i) adequately fast to prevent damages and/or converter blocking and (ii) reliable to minimize the impacts of faults. This study is mainly focused on the Modular Multilevel Converter (MMC) -based HVDC grid since the MMC is considered as the building block of the future HVDC systems. The studies reported in this thesis include (i) developing an enhanced equivalent model of the MMC to enable accurate representation of its DC-side fault response, (ii) developing a realistic HVDC-AC test system that includes a five-terminal MMC-based HVDC grid embedded in a large interconnected AC network, (iii) investigating the transient response of the developed test system to AC-side and DC-side disturbances in order to determine the HVDC grid protection requirements, (iv) investigating the fault surge propagation in the HVDC grid to determine the impacts of the DC-side fault location on the measured signals at each relay location, (v) designing a protection algorithm that detects and locates DC-side faults reliably and sufficiently fast to prevent relay malfunction and unnecessary blocking of the converters, and (vi) performing hardware-in-the-loop tests on the designed relay to verify its potential to be implemented in hardware. The results of the off-line time domain transients studies in the PSCAD software platform and the real-time hardware-in-the-loop tests using an enhanced version of the RTDS platform indicate that the developed HVDC grid relay meets all technical requirements including speed, dependability, security, selectivity, and robustness. Moreover, the developed protection algorithm does not impose considerable computational burden on the hardware.

  1. Enhancement of observability and protection of smart power system

    NASA Astrophysics Data System (ADS)

    Siddique, Abdul Hasib

    It is important for a modern power grid to be smarter in order to provide reliable and sustainable supply of electricity. Traditional way of receiving data from the wired system is a very old and outdated technology. For a quicker and better response from the electric system, it is important to look at wireless systems as a feasible option. In order to enhance the observability and protection it is important to integrate wireless technology with the modern power system. In this thesis, wireless network based architecture for wide area monitoring and an alternate method for performing current measurement for protection of generators and motors, has been adopted. There are basically two part of this project. First part deals with the wide area monitoring of the power system and the second part focuses more on application of wireless technology from the protection point of view. A number of wireless method have been adopted in both the part, these includes Zigbee, analog transmission (Both AM and FM) and digital transmission. The main aim of our project was to propose a cost effective wide area monitoring and protection method which will enhance the observability and stability of power grid. A new concept of wireless integration in the power protection system has been implemented in this thesis work.

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    This manual is a guide to use of the file protection mechanisms available on the Martin Marietta Energy Systems, Inc. KSV VAXes. User identification codes (UICs) and general identifiers are discussed as a basis for understanding UIC-based and access control list (ACL) protection.

  3. 40 CFR 125.1 - Purpose and scope.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER PROGRAMS CRITERIA AND STANDARDS FOR THE NATIONAL POLLUTANT DISCHARGE ELIMINATION SYSTEM Criteria and Standards for Imposing Technology... subpart establishes criteria and standards for the imposition of technology-based treatment requirements...

  4. Data fusion concept in multispectral system for perimeter protection of stationary and moving objects

    NASA Astrophysics Data System (ADS)

    Ciurapiński, Wieslaw; Dulski, Rafal; Kastek, Mariusz; Szustakowski, Mieczyslaw; Bieszczad, Grzegorz; Życzkowski, Marek; Trzaskawka, Piotr; Piszczek, Marek

    2009-09-01

    The paper presents the concept of multispectral protection system for perimeter protection for stationary and moving objects. The system consists of active ground radar, thermal and visible cameras. The radar allows the system to locate potential intruders and to control an observation area for system cameras. The multisensor construction of the system ensures significant improvement of detection probability of intruder and reduction of false alarms. A final decision from system is worked out using image data. The method of data fusion used in the system has been presented. The system is working under control of FLIR Nexus system. The Nexus offers complete technology and components to create network-based, high-end integrated systems for security and surveillance applications. Based on unique "plug and play" architecture, system provides unmatched flexibility and simplistic integration of sensors and devices in TCP/IP networks. Using a graphical user interface it is possible to control sensors and monitor streaming video and other data over the network, visualize the results of data fusion process and obtain detailed information about detected intruders over a digital map. System provides high-level applications and operator workload reduction with features such as sensor to sensor cueing from detection devices, automatic e-mail notification and alarm triggering.

  5. Development of data acquisition and over-current protection systems for a suppressor-grid current with a neutral-beam ion source

    NASA Astrophysics Data System (ADS)

    Wei, LIU; Chundong, HU; Sheng, LIU; Shihua, SONG; Jinxin, WANG; Yan, WANG; Yuanzhe, ZHAO; Lizhen, LIANG

    2017-12-01

    Neutral beam injection is one of the effective auxiliary heating methods in magnetic-confinement-fusion experiments. In order to acquire the suppressor-grid current signal and avoid the grid being damaged by overheating, a data acquisition and over-current protection system based on the PXI (PCI eXtensions for Instrumentation) platform has been developed. The system consists of a current sensor, data acquisition module and over-current protection module. In the data acquisition module, the acquired data of one shot will be transferred in isolation and saved in a data-storage server in a txt file. It can also be recalled using NBWave for future analysis. The over-current protection module contains two modes: remote and local. This gives it the function of setting a threshold voltage remotely and locally, and the forbidden time of over-current protection also can be set by a host PC in remote mode. Experimental results demonstrate that the data acquisition and over-current protection system has the advantages of setting forbidden time and isolation transmission.

  6. Complex method to calculate objective assessments of information systems protection to improve expert assessments reliability

    NASA Astrophysics Data System (ADS)

    Abdenov, A. Zh; Trushin, V. A.; Abdenova, G. A.

    2018-01-01

    The paper considers the questions of filling the relevant SIEM nodes based on calculations of objective assessments in order to improve the reliability of subjective expert assessments. The proposed methodology is necessary for the most accurate security risk assessment of information systems. This technique is also intended for the purpose of establishing real-time operational information protection in the enterprise information systems. Risk calculations are based on objective estimates of the adverse events implementation probabilities, predictions of the damage magnitude from information security violations. Calculations of objective assessments are necessary to increase the reliability of the proposed expert assessments.

  7. A system-level approach for embedded memory robustness

    NASA Astrophysics Data System (ADS)

    Mariani, Riccardo; Boschi, Gabriele

    2005-11-01

    New ultra-deep submicron technologies are bringing not only new advantages such extraordinary transistor densities or unforeseen performances, but also new uncertainties such soft-error susceptibility, modelling complexity, coupling effects, leakage contribution and increased sensitivity to internal and external disturbs. Nowadays, embedded memories are taking profit of such new technologies and they are more and more used in systems: therefore as robustness and reliability requirement increase, memory systems must be protected against different kind of faults (permanent and transient) and that should be done in an efficient way. It means that reliability and costs, such overhead and performance degradation, must be efficiently tuned based on the system and on the application. Moreover, the new emerging norms for safety-critical applications such IEC 61508 are requiring precise answers in terms of robustness also in the case of memory systems. In this paper, classical protection techniques for error detection and correction are enriched with a system-aware approach, where the memory system is analyzed based on its role in the application. A configurable memory protection system is presented, together with the results of its application to a proof-of-concept architecture. This work has been developed in the framework of MEDEA+ T126 project called BLUEBERRIES.

  8. Multisensor interoperability for persistent surveillance and FOB protection with multiple technologies during the TNT exercise at Camp Roberts, California

    NASA Astrophysics Data System (ADS)

    Murarka, Naveen; Chambers, Jon

    2012-06-01

    Multiple sensors, providing actionable intelligence to the war fighter, often have difficulty interoperating with each other. Northrop Grumman (NG) is dedicated to solving these problems and providing complete solutions for persistent surveillance. In August, 2011, NG was invited to participate in the Tactical Network Topology (TNT) Capabilities Based Experimentation at Camp Roberts, CA to demonstrate integrated system capabilities providing Forward Operating Base (FOB) protection. This experiment was an opportunity to leverage previous efforts from NG's Rotorcraft Avionics Innovation Laboratory (RAIL) to integrate five prime systems with widely different capabilities. The five systems included a Hostile Fire and Missile Warning Sensor System, SCORPION II Unattended Ground Sensor system, Smart Integrated Vehicle Area Network (SiVAN), STARLite Synthetic Aperture Radar (SAR)/Ground Moving Target Indications (GMTI) radar system, and a vehicle with Target Location Module (TLM) and Laser Designation Module (LDM). These systems were integrated with each other and a Tactical Operations Center (TOC) equipped with RaptorX and Falconview providing a Common Operational Picture (COP) via Cursor on Target (CoT) messages. This paper will discuss this exercise, and the lessons learned, by integrating these five prime systems for persistent surveillance and FOB protection.

  9. 40 CFR 267.176 - What must I do when I want to stop using the containers?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 26 2010-07-01 2010-07-01 false What must I do when I want to stop using the containers? 267.176 Section 267.176 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... the containment system. You must decontaminate or remove remaining containers, liners, bases, and soil...

  10. Functional requirements for an intelligent RPC. [remote power controller for spaceborne electrical distribution system

    NASA Technical Reports Server (NTRS)

    Aucoin, B. M.; Heller, R. P.

    1990-01-01

    An intelligent remote power controller (RPC) based on microcomputer technology can implement advanced functions for the accurate and secure detection of all types of faults on a spaceborne electrical distribution system. The intelligent RPC will implement conventional protection functions such as overcurrent, under-voltage, and ground fault protection. Advanced functions for the detection of soft faults, which cannot presently be detected, can also be implemented. Adaptive overcurrent protection changes overcurrent settings based on connected load. Incipient and high-impedance fault detection provides early detection of arcing conditions to prevent fires, and to clear and reconfigure circuits before soft faults progress to a hard-fault condition. Power electronics techniques can be used to implement fault current limiting to prevent voltage dips during hard faults. It is concluded that these techniques will enhance the overall safety and reliability of the distribution system.

  11. Photocatalytic Nanocomposites for the Protection of European Architectural Heritage.

    PubMed

    Gherardi, Francesca; Roveri, Marco; Goidanich, Sara; Toniolo, Lucia

    2018-01-03

    In the field of stone protection, the introduction of inorganic nanoparticles, such as TiO₂, ZnO, and Ag in polymeric blends can enhance the protective action of pristine treatments, as well as confer additional properties (photocatalytic, antifouling, and antibacterial). In the framework of the "Nano-Cathedral" European project, nanostructured photocatalytic protective treatments were formulated by using different TiO₂ nanoparticles, solvents, and silane/siloxane systems in the blends. The results about the characterization and application of two promising nano-TiO₂ based products applied on Apuan marble and Ajarte limestone are here reported, aiming at investigating the complex system "treatment/stone-substrate". The nanocomposites show better performances when compared to a commercial reference siloxane based protective treatment, resulting in different performances once applied on different carbonatic substrates, with very low and high open porosity, confirming the necessity of correlating precisely the characteristics of the stone material to those of the protective formulations. In particular, the TiO₂ photocatalytic behavior is strictly linked to the amount of available nanoparticles and to the active surface area. The alkyl silane oligomers of the water-based formulation have a good penetration into the microstructure of Ajarte limestone, whereas the solvent-based and small size monomeric formulation shows better results for Apuan marble, granting a good coverage of the pores. The encouraging results obtained so far in lab will be confirmed by monitoring tests aiming at assessing the effectiveness of the treatments applied in pilot sites of historical Gothic Cathedrals.

  12. Photocatalytic Nanocomposites for the Protection of European Architectural Heritage

    PubMed Central

    Roveri, Marco; Goidanich, Sara; Toniolo, Lucia

    2018-01-01

    In the field of stone protection, the introduction of inorganic nanoparticles, such as TiO2, ZnO, and Ag in polymeric blends can enhance the protective action of pristine treatments, as well as confer additional properties (photocatalytic, antifouling, and antibacterial). In the framework of the “Nano-Cathedral” European project, nanostructured photocatalytic protective treatments were formulated by using different TiO2 nanoparticles, solvents, and silane/siloxane systems in the blends. The results about the characterization and application of two promising nano-TiO2 based products applied on Apuan marble and Ajarte limestone are here reported, aiming at investigating the complex system “treatment/stone-substrate”. The nanocomposites show better performances when compared to a commercial reference siloxane based protective treatment, resulting in different performances once applied on different carbonatic substrates, with very low and high open porosity, confirming the necessity of correlating precisely the characteristics of the stone material to those of the protective formulations. In particular, the TiO2 photocatalytic behavior is strictly linked to the amount of available nanoparticles and to the active surface area. The alkyl silane oligomers of the water-based formulation have a good penetration into the microstructure of Ajarte limestone, whereas the solvent-based and small size monomeric formulation shows better results for Apuan marble, granting a good coverage of the pores. The encouraging results obtained so far in lab will be confirmed by monitoring tests aiming at assessing the effectiveness of the treatments applied in pilot sites of historical Gothic Cathedrals. PMID:29301338

  13. Smart Grid Privacy through Distributed Trust

    NASA Astrophysics Data System (ADS)

    Lipton, Benjamin

    Though the smart electrical grid promises many advantages in efficiency and reliability, the risks to consumer privacy have impeded its deployment. Researchers have proposed protecting privacy by aggregating user data before it reaches the utility, using techniques of homomorphic encryption to prevent exposure of unaggregated values. However, such schemes generally require users to trust in the correct operation of a single aggregation server. We propose two alternative systems based on secret sharing techniques that distribute this trust among multiple service providers, protecting user privacy against a misbehaving server. We also provide an extensive evaluation of the systems considered, comparing their robustness to privacy compromise, error handling, computational performance, and data transmission costs. We conclude that while all the systems should be computationally feasible on smart meters, the two methods based on secret sharing require much less computation while also providing better protection against corrupted aggregators. Building systems using these techniques could help defend the privacy of electricity customers, as well as customers of other utilities as they move to a more data-driven architecture.

  14. A Multifactor Secure Authentication System for Wireless Payment

    NASA Astrophysics Data System (ADS)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  15. Probabilistic Design of a Mars Sample Return Earth Entry Vehicle Thermal Protection System

    NASA Technical Reports Server (NTRS)

    Dec, John A.; Mitcheltree, Robert A.

    2002-01-01

    The driving requirement for design of a Mars Sample Return mission is to assure containment of the returned samples. Designing to, and demonstrating compliance with, such a requirement requires physics based tools that establish the relationship between engineer's sizing margins and probabilities of failure. The traditional method of determining margins on ablative thermal protection systems, while conservative, provides little insight into the actual probability of an over-temperature during flight. The objective of this paper is to describe a new methodology for establishing margins on sizing the thermal protection system (TPS). Results of this Monte Carlo approach are compared with traditional methods.

  16. Status of native stream fishes within selected protected areas of Niobrara River in western Nebraska

    USGS Publications Warehouse

    Spurgeon, Jonathan J.; Stasiak, Richard H.; Cunningham, George R.; Pope, Kevin L.; Pegg, Mark A.

    2014-01-01

    Lotic systems within the Great Plains are characterized by highly fluctuating conditions through both space and time. Fishes inhabiting these systems have adopted specific life-history strategies to survive in such environments; however, anthropogenic disturbance to prairie streams has resulted in declines and extirpation of many native stream fishes. Terrestrial protected areas (i.e., parks and reserves) are designated to support native flora and fauna and, it is assumed, to provide protection to native fishes. We assessed the presence and relative abundance of stream fish populations within protected areas along the Niobrara River in western Nebraska based on data collected during 1979, 1989, 2008, and 2011. The spatial extent of protection, landscape changes resulting in degraded physiochemical parameters, and introduced species may reduce the effectiveness of these terrestrial protected areas in protecting native fishes in Great Plains stream environments.

  17. Urban gray vs. urban green vs. soil protection — Development of a systemic solution to soil sealing management on the example of Germany

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Artmann, Martina, E-mail: m.artmann@ioer.de

    Managing urban soil sealing is a difficult venture due to its spatial heterogeneity and embedding in a socio-ecological system. A systemic solution is needed to tackle its spatial, ecological and social sub-systems. This study develops a guideline for urban actors to find a systemic solution to soil sealing management based on two case studies in Germany: Munich and Leipzig. Legal-planning, informal-planning, economic-fiscal, co-operative and informational responses were evaluated by indicators to proof which strategy considers the spatial complexity of urban soil sealing (systemic spatial efficiency) and, while considering spatial complexity, to assess what the key management areas for action aremore » to reduce the ecological impacts by urban soil sealing (ecological impact efficiency) and to support an efficient implementation by urban actors (social implementation efficiency). Results suggest framing the systemic solution to soil sealing management through a cross-scale, legal-planning development strategy embedded in higher European policies. Within the socio-ecological system, the key management area for action should focus on the protection of green infrastructure being of high value for actors from the European to local scales. Further efforts are necessary to establish a systemic monitoring concept to optimize socio-ecological benefits and avoid trade-offs such as between urban infill development and urban green protection. This place-based study can be regarded as a stepping stone on how to develop systemic strategies by considering different spatial sub-targets and socio-ecological systems. - Highlights: • Urban soil sealing management is spatially complex. • The legal-planning strategy supports a systemic sealing management. • Urban green infrastructure protection should be in the management focus. • Soil protection requires policies from higher levels of government. • A systemic urban soil sealing monitoring concept is needed.« less

  18. GCD TechPort Data Sheets Thermal Protection System Materials (TPSM) Project

    NASA Technical Reports Server (NTRS)

    Chinnapongse, Ronald L.

    2014-01-01

    The Thermal Protection System Materials (TPSM) Project consists of three distinct project elements: the 3-Dimensional Multifunctional Ablative Thermal Protection System (3D MAT) project element; the Conformal Ablative Thermal Protection System (CA-TPS) project element; and the Heatshield for Extreme Entry Environment Technology (HEEET) project element. 3D MAT seeks to design, develop and deliver a game changing material solution based on 3-dimensional weaving and resin infusion approach for manufacturing a material that can function as a robust structure as well as a thermal protection system. CA-TPS seeks to develop and deliver a conformal ablative material designed to be efficient and capable of withstanding peak heat flux up to 500 W/ sq cm, peak pressure up to 0.4 atm, and shear up to 500 Pa. HEEET is developing a new ablative TPS that takes advantage of state-of-the-art 3D weaving technologies and traditional manufacturing processes to infuse woven preforms with a resin, machine them to shape, and assemble them as a tiled solution on the entry vehicle substructure or heatshield.

  19. Defense Infrastructure: DOD Should Improve Reporting and Communication on Its Corrosion Prevention and Control Activities

    DTIC Science & Technology

    2013-05-01

    Cycle Prediction for Equipment and Facilities 33.1 33.1 12 FAR16 Corrosion Prevention of Rebar in Concrete in Critical Facilities Located in Coastal...through 2007. 16 N-F-229 Integrated Concrete Pier Piling Repair and Corrosion Protection System 1.9 1.9 2006 17 FNV01 Corrosion Protection...Protection System 3.4 3.0 2007 21 F07NV03 Corrosion Inhibitor Evaluation for Concrete Repairs 16.8 16.8 22 F07NV04 Satellite Based Remote Monitoring

  20. A secure steganography for privacy protection in healthcare system.

    PubMed

    Liu, Jing; Tang, Guangming; Sun, Yifeng

    2013-04-01

    Private data in healthcare system require confidentiality protection while transmitting. Steganography is the art of concealing data into a cover media for conveying messages confidentially. In this paper, we propose a steganographic method which can provide private data in medical system with very secure protection. In our method, a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then divided into non-overlapping embedding units with three consecutive pixels. We use adaptive pixel pair match (APPM) method to embed digits in the pixel value differences (PVD) of the three pixels and the base of embedded digits is dependent on the differences among the three pixels. By solving an optimization problem, minimal distortion of the pixel ternaries caused by data embedding can be obtained. The experimental results show our method is more suitable to privacy protection of healthcare system than prior steganographic works.

  1. A second-generation expression system for tyrosine-sulfated proteins and its application in crop protection.

    PubMed

    Schwessinger, Benjamin; Li, Xiang; Ellinghaus, Thomas L; Chan, Leanne Jade G; Wei, Tong; Joe, Anna; Thomas, Nicholas; Pruitt, Rory; Adams, Paul D; Chern, Maw Sheng; Petzold, Christopher J; Liu, Chang C; Ronald, Pamela C

    2016-04-18

    Posttranslational modification (PTM) of proteins and peptides is important for diverse biological processes in plants and animals. The paucity of heterologous expression systems for PTMs and the technical challenges associated with chemical synthesis of these modified proteins has limited detailed molecular characterization and therapeutic applications. Here we describe an optimized system for expression of tyrosine-sulfated proteins in Escherichia coli and its application in a bio-based crop protection strategy in rice.

  2. A second-generation expression system for tyrosine-sulfated proteins and its application in crop protection

    DOE PAGES

    Schwessinger, Benjamin; Li, Xiang; Ellinghaus, Thomas L.; ...

    2015-11-27

    Posttranslational modification (PTM) of proteins and peptides is important for diverse biological processes in plants and animals. The paucity of heterologous expression systems for PTMs and the technical challenges associated with chemical synthesis of these modified proteins has limited detailed molecular characterization and therapeutic applications. Here we describe an optimized system for expression of tyrosine-sulfated proteins in Escherichia coli and its application in a bio-based crop protection strategy in rice.

  3. Overlay metallic-cermet alloy coating systems

    NASA Technical Reports Server (NTRS)

    Gedwill, M. A.; Levine, S. R.; Glasgow, T. K. (Inventor)

    1984-01-01

    A substrate, such as a turbine blade, vane, or the like, which is subjected to high temperature use is coated with a base coating of an oxide dispersed, metallic alloy (cermet). A top coating of an oxidation, hot corrosion, erosion resistant alloy of nickel, cobalt, or iron is then deposited on the base coating. A heat treatment is used to improve the bonding. The base coating serves as an inhibitor to interdiffusion between the protective top coating and the substrate. Otherwise, the protective top coating would rapidly interact detrimentally with the substrate and degrade by spalling of the protective oxides formed on the outer surface at elevated temperatures.

  4. Respiratory protective device design using control system techniques

    NASA Technical Reports Server (NTRS)

    Burgess, W. A.; Yankovich, D.

    1972-01-01

    The feasibility of a control system analysis approach to provide a design base for respiratory protective devices is considered. A system design approach requires that all functions and components of the system be mathematically identified in a model of the RPD. The mathematical notations describe the operation of the components as closely as possible. The individual component mathematical descriptions are then combined to describe the complete RPD. Finally, analysis of the mathematical notation by control system theory is used to derive compensating component values that force the system to operate in a stable and predictable manner.

  5. Intelligent process development of foam molding for the Thermal Protection System (TPS) of the space shuttle external tank

    NASA Technical Reports Server (NTRS)

    Bharwani, S. S.; Walls, J. T.; Jackson, M. E.

    1987-01-01

    A knowledge based system to assist process engineers in evaluating the processability and moldability of poly-isocyanurate (PIR) formulations for the thermal protection system of the Space Shuttle external tank (ET) is discussed. The Reaction Injection Molding- Process Development Advisor (RIM-PDA) is a coupled system which takes advantage of both symbolic and numeric processing techniques. This system will aid the process engineer in identifying a startup set of mold schedules and in refining the mold schedules to remedy specific process problems diagnosed by the system.

  6. Stateless and stateful implementations of faithful execution

    DOEpatents

    Pierson, Lyndon G; Witzke, Edward L; Tarman, Thomas D; Robertson, Perry J; Eldridge, John M; Campbell, Philip L

    2014-12-16

    A faithful execution system includes system memory, a target processor, and protection engine. The system memory stores a ciphertext including value fields and integrity fields. The value fields each include an encrypted executable instruction and the integrity fields each include an encrypted integrity value for determining whether a corresponding one of the value fields has been modified. The target processor executes plaintext instructions decoded from the ciphertext while the protection engine is coupled between the system memory and the target processor. The protection engine includes logic to retrieve the ciphertext from the system memory, decrypt the value fields into the plaintext instructions, perform an integrity check based on the integrity fields to determine whether any of the corresponding value fields have been modified, and provide the plaintext instructions to the target processor for execution.

  7. Protecting children from violence and maltreatment: a qualitative comparative analysis assessing the implementation of U.N. CRC Article 19.

    PubMed

    Svevo-Cianci, Kimberly A; Hart, Stuart N; Rubinson, Claude

    2010-01-01

    (1) To identify which United Nations Convention on the Rights of the Child (CRC) recommended child protection (CP) measures, such as policy, reporting systems, and services for child abuse and neglect (CAN) victims, individually or in combination, were most important in establishing a basic level of child protection in 42 countries; and (2) to assess whether these measures were necessary or sufficient to achieve basic child protection in developing and industrialized countries. Child protection and/or rights expert respondents from 42 countries completed a questionnaire on CRC Article 19 (CRC19) required CP measures implementation and rated their country's effectiveness in implementation, the current level of effectiveness of child protection, and the relevance of improvements in child protection since the CRC was adopted in 1989. Information from the Committee on the Rights of the Child Concluding Observations, as well as UNICEF and WHO indicators on child health and protection issues were used to check and supplement responses. Qualitative comparative analysis (QCA) was used to identify child protection measure implementation effectiveness. Results indicate that child protection judged as comparatively more successful among study countries is a result of having the following measures in place from two types of social programs: a CP infrastructure (legislation plus services) and at least one information-based intervention support program. Fourteen (33%) countries were determined to have established at least a basic CP system toward protection of children from violence and maltreatment. These countries reported having the three required elements described above. The study reinforces the need for governments to take a systems approach to child protection, including policy/legislation, information-based programs and social services, as well as professional training and public awareness raising. The top-ranked countries included: Australia, Bahrain, Belgium, Brazil, Canada, Estonia, Germany, Italy, Jordan, Lebanon, Malaysia, Republic of Korea, the Russian Federation, and the United Kingdom. Governments need to establish CP systems with multiple, well-integrated, effective CP measures as elaborated above, working with trained professionals and also raising public awareness to ensure successful protection for all children in every country. Partial measures are not effective. Further, in addition to establishing, implementing, and evaluating the effectiveness of professional interventions, the actual outcomes for children, not studied or reported on here, need to be the priority focus for child protection going forward. Copyright (c) 2009 Elsevier Ltd. All rights reserved.

  8. The Performance of Dammar-based Paint System Evaluated by Electrochemical Impedance Spectroscopy (EIS) and Potential Time Measurement (PTM)

    NASA Astrophysics Data System (ADS)

    Omar, N. M.; Ahmad, A. Hanom

    2009-06-01

    The coating resistance of the Dammar-based paint system was determined by using Electrochemical Impedance Spectroscopy (EIS), whereas, the corrosion potential analysis was determined by using potential time measurement (PTM) method. Carotenoid pigment obtained from Capsicum Annum (dried chili pepper) was added into the mixture of dammar and acrylic polyol resin and the paint systems were proofed on Aluminium steel Q-panels as a substrate. Result shows that the paint system with a composition of 35% dammar (CD35%) possessed the higher corrosion resistance after 30 days of exposure in 3% NaCl solution for electrochemical impedance spectroscopy and also can withstand the longest time for delimitation protection in PTM analysis. The results prove that the developed organic paint system can improve the electrochemical and corrosion protection properties of a paint system.

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clements, Abraham Anthony

    EPOXY is a LLVM base compiler that applies security protections to bare-metal programs on ARM Cortex-M series micro-controllers. This includes privilege overlaying, wherein operations requiring privileged execution are identified and only these operations execute in privileged mode. It also applies code integrity, control-flow hijacking defenses, stack protections, and fine-grained randomization schemes. All of its protections work within the constraints of bare-metal systems.

  10. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    PubMed Central

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  11. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    PubMed

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  12. Thermal, Radiation and Impact Protective Shields (TRIPS) for Robotic and Human Space Exploration Missions

    NASA Technical Reports Server (NTRS)

    Loomis, M. P.; Arnold, J. L.

    2005-01-01

    New concepts for protective shields for NASA s Crew Exploration Vehicles (CEVs) and planetary probes offer improved mission safety and affordability. Hazards include radiation from cosmic rays and solar particle events, hypervelocity impacts from orbital debris/ micrometeorites, and the extreme heating environment experienced during entry into planetary atmospheres. The traditional approach for the design of protection systems for these hazards has been to create single-function shields, i.e. ablative and blanket-based heat shields for thermal protection systems (TPS), polymer or other low-molecular-weight materials for radiation shields, and multilayer, Whipple-type shields for protection from hypervelocity impacts. This paper introduces an approach for the development of a single, multifunctional protective shield, employing nanotechnology- based materials, to serve simultaneously as a TPS, an impact shield and as the first line of defense against radiation. The approach is first to choose low molecular weight ablative TPS materials, (existing and planned for development) and add functionalized carbon nanotubes. Together they provide both thermal and radiation (TR) shielding. Next, impact protection (IP) is furnished through a tough skin, consisting of hard, ceramic outer layers (to fracture the impactor) and sublayers of tough, nanostructured fabrics to contain the debris cloud from the impactor before it can penetrate the spacecraft s interior.

  13. Knowledge management for the protection of information in electronic medical records.

    PubMed

    Lea, Nathan; Hailes, Stephen; Austin, Tony; Kalra, Dipak

    2008-01-01

    This paper describes foundational work investigating the protection requirements of sensitive medical information, which is being stored more routinely in repository systems for electronic medical records. These systems have increasingly powerful sharing capabilities at the point of clinical care, in medical research and for clinical and managerial audit. The potential for sharing raises concerns about the protection of individual patient privacy and challenges the duty of confidentiality by which medical practitioners are ethically and legally bound. By analysing the protection requirements and discussing the need to apply policy-based controls to discrete items of medical information in a record, this paper suggests that this is a problem for which existing privacy management solutions are not sufficient or appropriate to the protection requirements. It proposes that a knowledge management approach is required and it introduces a new framework based on the knowledge management techniques now being used to manage electronic medical record data. The background, existing work in this area, initial investigation methods, results to date and discussion are presented, and the paper is concluded with the authors' comments on the ramifications of the work.

  14. Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids

    PubMed Central

    Zhang, Liping; Tang, Shanyu; Luo, He

    2016-01-01

    In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham- Yahalom logic. PMID:27007951

  15. Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.

    PubMed

    Zhang, Liping; Tang, Shanyu; Luo, He

    2016-01-01

    In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham-Yahalom logic.

  16. Contracting of Samples for Chemical Analyses. What You Should Know about It

    DTIC Science & Technology

    1990-08-01

    Laboratory (AFSC) Human Systems Division Brooks Air Force Base , Texas 78235-5501 o O NOTICES When Government drawings, specifications, or other data...Assurance Efforts 3 Analyses Costs 3 Certifications 4 How To Protect Your Base And The Air Force 4 References 6 Appendix A - IG Writeup Of A Laboratory...their agency certifications showing the period of certitication and for what analyses. HOW TO PROTECT YOUR BASE AND THE AIR FORCE What I am wondering on

  17. Recommendation system to determine suitable and viable hiking routes: a prototype application in Sierra de las Nieves Nature Reserve (southern Spain)

    NASA Astrophysics Data System (ADS)

    Vías, Jesús; Rolland, José; Gómez, María Luisa; Ocaña, Carmen; Luque, Ana

    2018-05-01

    This paper describes a system for recommending hiking routes to help manage hiking activities in a protected area. The system proposes various routes, based on five criteria that maximize some aspects of hikers' requirements (by analyzing the viability and difficulty of the trails) and also those of protected areas managers (by proposals to relieve congestion in areas already used for hiking and to promote awareness of new ones, as a contribution to environmental education). The recommendation system uses network analysis, multi-criteria decision analysis and geographic information system by free software tools: PgRouting, PostgreSQL and PostGIS. This system has been tested in Sierra de las Nieves Nature Reserve (Andalusia, Spain). Of the 182 routes obtained by the system, 62 (34%) are considered viable for hikers in Sierra de las Nieves, taking into account the type of user most likely to visit this protected area. Most routes have a high difficulty level, which is coherent with the mountainous character of the protected area.

  18. [The Mexican health system: does it require a transformation?].

    PubMed

    Chertorivski Woldenberg, Salomón; Fajardo Dolci, German

    2012-01-01

    National health systems represent an organized social response that enables countries to improve, maintain and enhance the health status of their citizens. These evolve and are transformed according to changes in the biological, economic, political and social components of health. In Mexico there is currently a segmented health system, consisting of a bismarckian model of social security and a social protection in health model. The latter developed to comply with the fourth constitutional article by which health is no longer described as a right linked to the employment status of the individual. Given this reality at least three alternatives seem to emerge for the future: the permanence of a mixed health system with social security and social protection institutions with a similar weight within the national health system, or its opposite, the extension of social protection as a mechanism for widespread access. Given the challenges we face, it is desirable to establish a unified health system, the aim should be that health care is universally protected, as currently happens, but is guaranteed through a much more efficient and based in primary care health care system.

  19. Evaluation of Alternative Altitude Scaling Methods for Thermal Ice Protection System in NASA Icing Research Tunnel

    NASA Technical Reports Server (NTRS)

    Lee, Sam; Addy, Harold; Broeren, Andy P.; Orchard, David M.

    2017-01-01

    A test was conducted at NASA Icing Research Tunnel to evaluate altitude scaling methods for thermal ice protection system. Two scaling methods based on Weber number were compared against a method based on the Reynolds number. The results generally agreed with the previous set of tests conducted in NRCC Altitude Icing Wind Tunnel. The Weber number based scaling methods resulted in smaller runback ice mass than the Reynolds number based scaling method. The ice accretions from the Weber number based scaling method also formed farther upstream. However there were large differences in the accreted ice mass between the two Weber number based scaling methods. The difference became greater when the speed was increased. This indicated that there may be some Reynolds number effects that isnt fully accounted for and warrants further study.

  20. Monitoring and Protecting Health and Human Rights in Mexico.

    PubMed

    Gómez-Dantés; Frenk; Zorrilla

    1995-01-01

    This paper describes a unique system through which health care-related human rights are now being monitored and protected in Mexico. Based on the ombudsman concept, the system focuses on identifying and responding to violations of human rights and dignity which may occur in the context of health care delivery. Experience thus far has been encouraging; the Mexican population has identified and used the National Commission of Human Rights as a forum for a variety of health-related complaints. The Mexican system, while requiring strengthening and expansion, is an effort to integrate the monitoring and protection of health-related human rights into the broader field of human rights work in Mexico.

  1. Monte Carlo Computational Modeling of the Energy Dependence of Atomic Oxygen Undercutting of Protected Polymers

    NASA Technical Reports Server (NTRS)

    Banks, Bruce A.; Stueber, Thomas J.; Norris, Mary Jo

    1998-01-01

    A Monte Carlo computational model has been developed which simulates atomic oxygen attack of protected polymers at defect sites in the protective coatings. The parameters defining how atomic oxygen interacts with polymers and protective coatings as well as the scattering processes which occur have been optimized to replicate experimental results observed from protected polyimide Kapton on the Long Duration Exposure Facility (LDEF) mission. Computational prediction of atomic oxygen undercutting at defect sites in protective coatings for various arrival energies was investigated. The atomic oxygen undercutting energy dependence predictions enable one to predict mass loss that would occur in low Earth orbit, based on lower energy ground laboratory atomic oxygen beam systems. Results of computational model prediction of undercut cavity size as a function of energy and defect size will be presented to provide insight into expected in-space mass loss of protected polymers with protective coating defects based on lower energy ground laboratory testing.

  2. Complete filter-based cerebral embolic protection with transcatheter aortic valve replacement.

    PubMed

    Van Gils, Lennart; Kroon, Herbert; Daemen, Joost; Ren, Claire; Maugenest, Anne-Marie; Schipper, Marguerite; De Jaegere, Peter P; Van Mieghem, Nicolas M

    2018-03-01

    To evaluate the value of left vertebral artery filter protection in addition to the current filter-based embolic protection technology to achieve complete cerebral protection during TAVR. The occurrence of cerebrovascular events after transcatheter aortic valve replacement (TAVR) has fueled concern for its potential application in younger patients with longer life expectancy. Transcatheter cerebral embolic protection (TCEP) devices may limit periprocedural cerebrovascular events by preventing macro and micro-embolization to the brain. Conventional filter-based TCEP devices cover three extracranial contributories to the brain, yet leave the left vertebral artery unprotected. Patients underwent TAVR with complete TCEP. A dual-filter system was deployed in the brachiocephalic trunk and left common carotid artery with an additional single filter in the left vertebral artery. After TAVR all filters were retrieved and sent for histopathological evaluation by an experienced pathologist. Eleven patients received a dual-filter system and nine of them received an additional left vertebral filter. In the remaining two patients, the left vertebral filter could not be deployed. No periprocedural strokes occurred. We found debris in all filters, consisting of thrombus, tissue derived debris, and foreign body material. The left vertebral filter contained debris in an equal amount of patients as the Sentinel filters. The size of the captured particles was similar between all filters. The left vertebral artery is an important entry route for embolic material to the brain during TAVR. Selective filter protection of the left vertebral artery revealed embolic debris in all patients. The clinical value of complete filter-based TCEP during TAVR warrants further research. © 2017 Wiley Periodicals, Inc.

  3. Use of the ICRP system for the protection of marine ecosystems.

    PubMed

    Telleria, D; Cabianca, T; Proehl, G; Kliaus, V; Brown, J; Bossio, C; Van der Wolf, J; Bonchuk, I; Nilsen, M

    2015-06-01

    The International Commission on Radiological Protection (ICRP) recently reinforced the international system of radiological protection, initially focused on humans, by identifying principles of environmental protection and proposing a framework for assessing impacts of ionising radiation on non-human species, based on a reference flora and fauna approach. For this purpose, ICRP developed dosimetric models for a set of Reference Animals and Plants, which are representative of flora and fauna in different environments (terrestrial, freshwater, marine), and produced criteria based on information on radiation effects, with the aim of evaluating the level of potential or actual radiological impacts, and as an input for decision making. The approach developed by ICRP for flora and fauna is consistent with the approach used to protect humans. The International Atomic Energy Agency (IAEA) includes considerations on the protection of the environment in its safety standards, and is currently developing guidelines to assess radiological impacts based on the aforementioned ICRP approach. This paper presents the method developed by IAEA, in a series of meetings with international experts, to enable assessment of the radiological impact to the marine environment in connection with the Convention on the Prevention of Marine Pollution by Dumping of Wastes and Other Matter 1972 (London Convention 1972). This method is based on IAEA's safety standards and ICRP's recommendations, and was presented in 2013 for consideration by representatives of the contracting parties of the London Convention 1972; it was approved for inclusion in its procedures, and is in the process of being incorporated into guidelines. © The International Society for Prosthetics and Orthotics Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  4. Life Support and Habitation and Planetary Protection Workshop

    NASA Technical Reports Server (NTRS)

    Hogan, John A. (Editor); Race, Margaret S. (Editor); Fisher, John W. (Editor); Joshi, Jitendra A. (Editor); Rummel, John D. (Editor)

    2006-01-01

    A workshop entitled "Life Support and Habitation and Planetary Protection Workshop" was held in Houston, Texas on April 27-29, 2005 to facilitate the development of planetary protection guidelines for future human Mars exploration missions and to identify the potential effects of these guidelines on the design and selection of related human life support, extravehicular activity and monitoring and control systems. This report provides a summary of the workshop organization, starting assumptions, working group results and recommendations. Specific result topics include the identification of research and technology development gaps, potential forward and back contaminants and pathways, mitigation alternatives, and planetary protection requirements definition needs. Participants concluded that planetary protection and science-based requirements potentially affect system design, technology trade options, development costs and mission architecture. Therefore early and regular coordination between the planetary protection, scientific, planning, engineering, operations and medical communities is needed to develop workable and effective designs for human exploration of Mars.

  5. A prototype expert/information system for examining environmental risks of KSC activities

    NASA Technical Reports Server (NTRS)

    Engel, Bernard A.

    1993-01-01

    Protection of the environment and natural resources at the Kennedy Space Center (KSC) is of great concern. An expert/information system to replace the paper-based KSC Environmental Checklist was developed. The computer-based system requests information only as a required and supplies assistance as needed. The most comprehensive portion of the system provides information about endangered species habitat at KSC. This module uses geographic information system (GIS) data and tools, expert rules, color graphics, computer-based video, and hypertext to provide information.

  6. SUPERFUND SOILS DATA MANAGEMENT SYSTEM

    EPA Science Inventory

    This paper describes the Superfund Soil Data Management System (DMS), a PC-based data system being developed by the U.S. Environmental Protection Agency (EPA) in its effort to manage and evaluate treatment and performance data for contaminated soil, sludge, and debris. his system...

  7. A decision support system-based procedure for evaluation and monitoring of protected areas sustainability for the Mediterranean region

    NASA Astrophysics Data System (ADS)

    Pediaditi, K.; Buono, F.; Pompigna, F.; Bogliotti, C.; Nurlu, E.; Ladisa, G.; Petropoulos, G. P.

    2011-10-01

    Despite common acknowledgement of the value of protected areas as instruments in ensuring sustainability, and their promotion for the achievement of policies on halting the loss of biodiversity, there is no common approach today for monitoring and evaluating them. This paper presents a novel integrated nature conservation management procedure developed to monitor and evaluate the sustainability of Mediterranean protected areas. This procedure was successfully implemented and formally evaluated by protected area managers in six Mediterranean countries, results of which are presented here together with an overview of the web-based Decision Support System (DSS) developed to facilitate its wide adoption. The DSS and procedure has been designed and evaluated by managers as a useful tool, which facilitates and provides needed procedural guidance for protected area monitoring whilst minimizing input requirements to do so. The procedure and DSS were developed following a review of existing protected area assessment tools and a detailed primary investigation of the needs and capacity of its intended users. Essentially, the procedure and DSS guides provide the facilities for protected area managers, in following a participatory approach to develop a context-specific sustainability monitoring strategy, for their protected area. Consequently, the procedure is, by design, participatory, context specific, holistic and relevant to protected area management and institutional procedures. The procedure was piloted and formally evaluated in Greece, Italy, Turkey, Egypt, Malta and Cyprus. Feedback collected from the pilot evaluations is also summarised herein.

  8. Why Computer-Based Systems Should be Autonomic

    NASA Technical Reports Server (NTRS)

    Sterritt, Roy; Hinchey, Mike

    2005-01-01

    The objective of this paper is to discuss why computer-based systems should be autonomic, where autonomicity implies self-managing, often conceptualized in terms of being self-configuring, self-healing, self-optimizing, self-protecting and self-aware. We look at motivations for autonomicity, examine how more and more systems are exhibiting autonomic behavior, and finally look at future directions.

  9. Processing, Structure and High Temperature Oxidation Properties of Polymer-Derived and Hafnium Oxide Based Ceramic Systems

    NASA Astrophysics Data System (ADS)

    Terauds, Kalvis

    Demands for hypersonic aircraft are driving the development of ultra-high temperature structural materials. These aircraft, envisioned to sustain Mach 5+, are expected to experience continuous temperatures of 1200--1800°C on the aircraft surface and temperatures as high as 2800°C in combustion zones. Breakthroughs in the development of fiber based ceramic matrix composites (CMCs) are opening the door to a new class of high-tech UHT structures for aerospace applications. One limitation with current carbon fiber or silicon carbide fiber based CMC technology is the inherent problem of material oxidation, requiring new approaches for protective environmental barrier coatings (EBC) in extreme environments. This thesis focuses on the development and characterization of SiCN-HfO2 based ceramic composite EBC systems to be used as a protective layer for silicon carbide fiber based CMCs. The presented work covers three main architectures for protection (i) multilayer films, (ii) polymer-derived HfSiCNO, and (iii) composite SiCN-HfO 2 infiltration. The scope of this thesis covers processing development, material characterization, and high temperature oxidation behavior of these three SiCN-HfO2 based systems. This work shows that the SiCN-HfO 2 composite materials react upon oxidation to form HfSiO4, offering a stable EBC in streaming air and water vapor at 1600°C.

  10. Base-Level Management of Laser Radiation Protection Program

    DTIC Science & Technology

    1992-02-01

    safety eyewear . special considerations for medical lasers and optical fibers, and summary evaluations of common Air Force laser systems... optical density of 2. Laser safety eyewear should have the optical density clearly marked for ail wavelengths for which the eyewear provides protection. c...density of protective eyewear . The optical density required for laser safety eyewear is dependent on the irradiance or radiant exposure-of the

  11. Lightning protection design external tank /Space Shuttle/

    NASA Technical Reports Server (NTRS)

    Anderson, A.; Mumme, E.

    1979-01-01

    The possibility of lightning striking the Space Shuttle during liftoff is considered and the lightning protection system designed by the Martin Marietta Corporation for the external tank (ET) portion of the Shuttle is discussed. The protection system is based on diverting and/or directing a lightning strike to an area of the spacecraft which can sustain the strike. The ET lightning protection theory and some test analyses of the system's design are reviewed including studies of conductivity and thermal/stress properties in materials, belly band feasibility, and burn-through plug grounding and puncture voltage. The ET lightning protection system design is shown to be comprised of the following: (1) a lightning rod on the forward most point of the ET, (2) a continually grounded, one inch wide conductive strip applied circumferentially at station 371 (belly band), (3) a three inch wide conductive belly band applied over the TPS (i.e. the insulating surface of the ET) and grounded to a structure with eight conductive plugs at station 536, and (4) a two inch thick TPS between the belly bands which are located over the weld lands.

  12. Better protecting staff working alone.

    PubMed

    Swindlehurst, Darren

    2016-08-01

    Established four and a half years ago as a wholly-owned subsidiary of Dutch-headquartered personal security and critical communications solutions provider, Atus BV, Hereford-based Atus Systems has since established a strong UK-wide client base supplying personal pagers, wireless personal alarm units, and the associated infrastructure, predominantly to high secure mental health facilities, prisons, and detention centres. Recent months, however, mark a new chapter for it, with the launch of a 'unique' lone worker protection system able to identify such personnel's location even when they are indoors and out of range of GPS coverage, and a sophisticated two-way enterprise critical messaging system. As HEJ editor, Jonathan Baillie, discovered from MD, Darren Swindlehurst, the company will target both systems squarely at the NHS and private healthcare providers, as well as at its more 'traditional' customers.

  13. Recession Curve Generation for the Space Shuttle Solid Rocket Booster Thermal Protection System Coatings

    NASA Technical Reports Server (NTRS)

    Kanner, Howard S.; Stuckey, C. Irvin; Davis, Darrell W.; Davis, Darrell (Technical Monitor)

    2002-01-01

    Ablatable Thermal Protection System (TPS) coatings are used on the Space Shuttle Vehicle Solid Rocket Boosters in order to protect the aluminum structure from experiencing excessive temperatures. The methodology used to characterize the recession of such materials is outlined. Details of the tests, including the facility, test articles and test article processing are also presented. The recession rates are collapsed into an empirical power-law relation. A design curve is defined using a 95-percentile student-t distribution. based on the nominal results. Actual test results are presented for the current acreage TPS material used.

  14. An improved biometrics-based authentication scheme for telecare medical information systems.

    PubMed

    Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2015-03-01

    Telecare medical information system (TMIS) offers healthcare delivery services and patients can acquire their desired medical services conveniently through public networks. The protection of patients' privacy and data confidentiality are significant. Very recently, Mishra et al. proposed a biometrics-based authentication scheme for telecare medical information system. Their scheme can protect user privacy and is believed to resist a range of network attacks. In this paper, we analyze Mishra et al.'s scheme and identify that their scheme is insecure to against known session key attack and impersonation attack. Thereby, we present a modified biometrics-based authentication scheme for TMIS to eliminate the aforementioned faults. Besides, we demonstrate the completeness of the proposed scheme through BAN-logic. Compared to the related schemes, our protocol can provide stronger security and it is more practical.

  15. A study of biohazard protection for farming modules of lunar base CELSS.

    PubMed

    Fujii, T; Midorikawa, Y; Shiba, M; Terai, M; Omasa, K; Nitta, K

    1992-01-01

    For the Closed Ecological Life Support System (CELSS) of a manned lunar base which is planned to be built on the moon early in the 21st century, several proposed programs exist to grow vegetables inside a farming module. At the 40th IAF (Malaga, 1989) the author et al presented a proposal for supplying food and nutrients to a crew of eight members, a basic concept which is based on growing four kinds of vegetables. This paper describes measures for biohazard protection in farming modules. In this study, biohazard protection means prevention of the dispersion of plant diseases to other plant species or other portions of farming beds.

  16. Coating with overlay metallic-cermet alloy systems

    NASA Technical Reports Server (NTRS)

    Gedwill, M. A.; Levine, S. R.; Glasgow, T. K. (Inventor)

    1984-01-01

    A base layer of an oxide dispersed, metallic alloy (cermet) is arc plasma sprayed onto a substrate, such as a turbine blade, vane, or the like, which is subjected to high temperature use. A top layer of an oxidation, hot corrosion, erosion resistant alloy of nickel, cobalt, or iron is then arc plasma sprayed onto the base layer. A heat treatment is used to improve the bonding. The base layer serves as an inhibitor to interdiffusion between the protective top layer and the substrate. Otherwise, the 10 protective top layer would rapidly interact detrimentally with the substrate and degrade by spalling of the protective oxides formed on the outer surface at elevated temperatures.

  17. Low-Cost HTS Based Magnet System with an Inductively Coupled Pulsed Energy Extraction Protection System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agustsson, Ronald

    In this project, RadiaBeam Technologies was tasked with developing a novel solution for a cost effective quench protection based on fast expansion of the normal zone. By inductively coupling a strong electromagnetic pulse via a resonant LC circuit, we attempted to demonstrate accelerated normal zone propagation. The AC field induces currents in the superconducting layer with the current density exceeding that of the critical current density, J c. This creates a large normal zone, uniformly distributing the dissipation through the magnet body. The method does not rely on thermal heating of the conductor, thus enabling nearly instantaneous protection. Through themore » course of the Phase II project, RadiaBeam Technologies continued extensive numerical modeling of the inductive quench system, re-designed and built several iterations of the POC system for testing and observed evidence of a transient partial quench being induced. However the final device was not fabricated. This was a consequence of the fundamentally complex nature of the energy extraction process and the challenges associated even with demonstrating the proof of concept in a bench top device.« less

  18. Fuzzy-Wavelet Based Double Line Transmission System Protection Scheme in the Presence of SVC

    NASA Astrophysics Data System (ADS)

    Goli, Ravikumar; Shaik, Abdul Gafoor; Tulasi Ram, Sankara S.

    2015-06-01

    Increasing the power transfer capability and efficient utilization of available transmission lines, improving the power system controllability and stability, power oscillation damping and voltage compensation have made strides and created Flexible AC Transmission (FACTS) devices in recent decades. Shunt FACTS devices can have adverse effects on distance protection both in steady state and transient periods. Severe under reaching is the most important problem of relay which is caused by current injection at the point of connection to the system. Current absorption of compensator leads to overreach of relay. This work presents an efficient method based on wavelet transforms, fault detection, classification and location using Fuzzy logic technique which is almost independent of fault impedance, fault distance and fault inception angle. The proposed protection scheme is found to be fast, reliable and accurate for various types of faults on transmission lines with and without Static Var compensator at different locations and with various incidence angles.

  19. Evaluation of dispersion strengthened nickel-base alloy heat shields for space shuttle application

    NASA Technical Reports Server (NTRS)

    Johnson, R., Jr.; Killpatrick, D. H.

    1976-01-01

    The results obtained in a program to evaluate dispersion-strengthened nickel-base alloys for use in a metallic radiative thermal protection system operating at surface temperatures to 1477 K for the space shuttle were presented. Vehicle environments having critical effects on the thermal protection system are defined; TD Ni-20Cr characteristics of material used in the current study are compared with previous results; cyclic load, temperature, and pressure effects on sheet material residual strength are investigated; the effects of braze reinforcement in improving the efficiency of spotwelded joints are evaluated; parametric studies of metallic radiative thermal protection systems are reported; and the design, instrumentation, and testing of full scale subsize heat shield panels in two configurations are described. Initial tests of full scale subsize panels included simulated meteoroid impact tests, simulated entry flight aerodynamic heating, programmed differential pressure loads and temperatures simulating mission conditions, and acoustic tests simulating sound levels experienced during boost flight.

  20. Investigation of high temperature antennas for space shuttle

    NASA Technical Reports Server (NTRS)

    Kuhlman, E. A.

    1973-01-01

    The design and development of high temperature antennas for the space shuttle orbiter are discussed. The antenna designs were based on three antenna types, an annular slot (L-Band), a linear slot (C-Band), and a horn (C-Band). The design approach was based on combining an RF window, which provides thermal protection, with an off-the-shelf antenna. Available antenna window materials were reviewed and compared, and the materials most compatible with the design requirements were selected. Two antenna window design approaches were considered: one employed a high temperature dielectric material and a low density insulation material, and the other an insulation material usable for the orbiter thermal protection system. Preliminary designs were formulated and integrated into the orbiter structure. Simple electrical models, with a series of window configurations, were constructed and tested. The results of tests and analyses for the final antenna system designs are given and show that high temperature antenna systems consisting of off-the-shelf antennas thermally protected by RF windows can be designed for the Space Shuttle Orbiter.

  1. 16 CFR 1204.3 - Requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... omnidirectional CB base station antennas are required to comply with the following requirements. (a) Field joints. Parts or accessories intended to protect a field joint so that it will meet any other requirement of... of the cable shall be supplied by the manufacturer with the antenna system. (c) Electrical protection...

  2. 16 CFR 1204.3 - Requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... omnidirectional CB base station antennas are required to comply with the following requirements. (a) Field joints. Parts or accessories intended to protect a field joint so that it will meet any other requirement of... of the cable shall be supplied by the manufacturer with the antenna system. (c) Electrical protection...

  3. Health care and privacy law in electronic commerce.

    PubMed

    Wright, B

    1994-01-01

    As electronic data interchange (EDI) continues to gain acceptance and use, questions regarding protection of the confidentiality of private healthcare information have arisen. This article explains how a computer-based information system equipped with appropriate safeguards can be far better at ensuring privacy than a paper-based system.

  4. 75 FR 59686 - Proposed Information Collection; Comment Request; NOAA Space-Based Data Collection System (DCS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-28

    ... Collection; Comment Request; NOAA Space- Based Data Collection System (DCS) Agreements AGENCY: National Oceanic and Atmospheric Administration (NOAA). ACTION: Notice. SUMMARY: The Department of Commerce, as... to Kay Metcalf, 301-817-4558 or [email protected]noaa.gov . SUPPLEMENTARY INFORMATION: I. Abstract This...

  5. Finding the 'sweet spot' in value-based contracts.

    PubMed

    Eggbeer, Bill; Sears, Kevin; Homer, Ken

    2015-08-01

    Health systems pursing value-based contracts should address six important considerations: The definition of value. Contracting goals. Cost of implementation. Risk exposure. Contract structure and design. Essential contractual protections.

  6. System reliability analysis of granular filter for protection against piping in dams

    NASA Astrophysics Data System (ADS)

    Srivastava, A.; Sivakumar Babu, G. L.

    2015-09-01

    Granular filters are provided for the safety of water retaining structure for protection against piping failure. The phenomenon of piping triggers when the base soil to be protected starts migrating in the direction of seepage flow under the influence of seepage force. To protect base soil from migration, the voids in the filter media should be small enough but it should not also be too small to block smooth passage of seeping water. Fulfilling these two contradictory design requirements at the same time is a major concern for the successful performance of granular filter media. Since Terzaghi era, conventionally, particle size distribution (PSD) of granular filters is designed based on particle size distribution characteristics of the base soil to be protected. The design approach provides a range of D15f value in which the PSD of granular filter media should fall and there exist infinite possibilities. Further, safety against the two critical design requirements cannot be ensured. Although used successfully for many decades, the existing filter design guidelines are purely empirical in nature accompanied with experience and good engineering judgment. In the present study, analytical solutions for obtaining the factor of safety with respect to base soil particle migration and soil permeability consideration as proposed by the authors are first discussed. The solution takes into consideration the basic geotechnical properties of base soil and filter media as well as existing hydraulic conditions and provides a comprehensive solution to the granular filter design with ability to assess the stability in terms of factor of safety. Considering the fact that geotechnical properties are variable in nature, probabilistic analysis is further suggested to evaluate the system reliability of the filter media that may help in risk assessment and risk management for decision making.

  7. Availability of essential medicines in Ethiopia: an efficiency-equity trade-off?

    PubMed

    Carasso, Barbara S; Lagarde, Mylene; Tesfaye, Addis; Palmer, Natasha

    2009-11-01

    To investigate the availability and cost of essential medicines in health centres in rural Ethiopia, and to explore if the fee waiver system protects patients from having to pay for medicines. The study took place in five health centres in rural Ethiopia. Availability and price of selected key essential medicines was established in the budget and special pharmacy of the health centre, as well as private outlets. Information on availability and cost of prescribed drugs was obtained through patient exit-interviews. Availability based of essential drugs at facility level was 91% based on a list of selected drugs vs. 84% based on prescriptions filled. However, less than half the prescribed drugs were obtained from the budget pharmacy, and one in six patients was forced to purchase drugs in the private sector, where drugs are roughly twice as expensive. The waiver system did not safeguard against having to pay for medicines. A revolving drug fund system in Ethiopia seems to improve availability of medicines, and can improve affordability by protecting people from purchasing drugs in the private sector. However, it may result in a parallel system, whereby the poor cannot access drugs if these are not available in the budget pharmacy. Equity is a concern in the absence of an adequate mechanism to protect the poor from catastrophic health expenditure.

  8. Lightweight Thermal Protection System for Atmospheric Entry

    NASA Technical Reports Server (NTRS)

    Stewart, David; Leiser, Daniel

    2007-01-01

    TUFROC (Toughened Uni-piece Fibrous Reinforced Oxidation-resistant Composite) has been developed as a new thermal protection system (TPS) material for wing leading edge and nose cap applications. The composite withstands temperatures up to 1,970 K, and consists of a toughened, high-temperature surface cap and a low-thermal-conductivity base, and is applicable to both sharp and blunt leading edge vehicles. This extends the possible application of fibrous insulation to the wing leading edge and/or nose cap on a hypersonic vehicle. The lightweight system comprises a treated carbonaceous cap composed of ROCCI (Refractory Oxidation-resistant Ceramic Carbon Insulation), which provides dimensional stability to the outer mold line, while the fibrous base material provides maximum thermal insulation for the vehicle structure.

  9. LSD 36 Well Deck Fire Protection

    DTIC Science & Technology

    1991-05-30

    below, which are loaded with personnel, vehicles and supplies. Normally, an Aqueous Film Forming Foam ( AFFF ) sprinkler system would be recommended for...the foam to the center area and allow the AFFF film to spread out from there; or, some combination of the two approaches. Results Phase I Tests A...landing craft and vehicles stored in the well deck below. Based on these tests, the optimum fire protection system would involve an Aqueous Film

  10. Detection of impact damage on thermal protection systems using thin-film piezoelectric sensors for integrated structural health monitoring

    NASA Astrophysics Data System (ADS)

    Na, Jeong K.; Kuhr, Samuel J.; Jata, Kumar V.

    2008-03-01

    Thermal Protection Systems (TPS) can be subjected to impact damage during flight and/or during ground maintenance and/or repair. AFRL/RXLP is developing a reliable and robust on-board sensing/monitoring capability for next generation thermal protection systems to detect and assess impact damage. This study was focused on two classes of metallic thermal protection tiles to determine threshold for impact damage and develop sensing capability of the impacts. Sensors made of PVDF piezoelectric film were employed and tested to evaluate the detectability of impact signals and assess the onset or threshold of impact damage. Testing was performed over a range of impact energy levels, where the sensors were adhered to the back of the specimens. The PVDF signal levels were analyzed and compared to assess damage, where digital microscopy, visual inspection, and white light interferometry were used for damage verification. Based on the impact test results, an assessment of the impact damage thresholds for each type of metallic TPS system was made.

  11. Protecting a quantum state from environmental noise by an incompatible finite-time measurement

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brasil, Carlos Alexandre; Castro, L. A. de; Napolitano, R. d. J.

    We show that measurements of finite duration performed on an open two-state system can protect the initial state from a phase-noisy environment, provided the measured observable does not commute with the perturbing interaction. When the measured observable commutes with the environmental interaction, the finite-duration measurement accelerates the rate of decoherence induced by the phase noise. For the description of the measurement of an observable that is incompatible with the interaction between system and environment, we have found an approximate analytical expression, valid at zero temperature and weak coupling with the measuring device. We have tested the validity of the analyticalmore » predictions against an exact numerical approach, based on the superoperator-splitting method, that confirms the protection of the initial state of the system. When the coupling between the system and the measuring apparatus increases beyond the range of validity of the analytical approximation, the initial state is still protected by the finite-time measurement, according with the exact numerical calculations.« less

  12. Predicted and tested performance of durable TPS

    NASA Technical Reports Server (NTRS)

    Shideler, John L.

    1992-01-01

    The development of thermal protection systems (TPS) for aerospace vehicles involves combining material selection, concept design, and verification tests to evaluate the effectiveness of the system. The present paper reviews verification tests of two metallic and one carbon-carbon thermal protection system. The test conditions are, in general, representative of Space Shuttle design flight conditions which may be more or less severe than conditions required for future space transportation systems. The results of this study are intended to help establish a preliminary data base from which the designers of future entry vehicles can evaluate the applicability of future concepts to their vehicles.

  13. Atomic Oxygen Durability Evaluation of Protected Polymers Using Thermal Energy Plasma Systems

    NASA Technical Reports Server (NTRS)

    Banks, Bruce A.; Rutledge, Sharon K.; Degroh, Kim K.; Stidham, Curtis R.; Gebauer, Linda; Lamoreaux, Cynthia M.

    1995-01-01

    The durability evaluation of protected polymers intended for use in low Earth orbit (LEO) has necessitated the use of large-area, high-fluence, atomic oxygen exposure systems. Two thermal energy atomic oxygen exposure systems which are frequently used for such evaluations are radio frequency (RF) plasma ashers and electron cyclotron resonance plasma sources. Plasma source testing practices such as ample preparation, effective fluence prediction, atomic oxygen flux determination, erosion measurement, operational considerations, and erosion yield measurements are presented. Issues which influence the prediction of in-space durability based on ground laboratory thermal energy plasma system testing are also addressed.

  14. Emerging technologies for V&V of ISHM software for space exploration

    NASA Technical Reports Server (NTRS)

    Feather, Martin S.; Markosian, Lawrence Z.

    2006-01-01

    Systems1,2 required to exhibit high operational reliability often rely on some form of fault protection to recognize and respond to faults, preventing faults' escalation to catastrophic failures. Integrated System Health Management (ISHM) extends the functionality of fault protection to both scale to more complex systems (and systems of systems), and to maintain capability rather than just avert catastrophe. Forms of ISHM have been utilized to good effect in the maintenance phase of systems' total lifecycles (often referred to as 'condition-based mainte-nance'), but less so in a 'fault protection' role during actual operations. One of the impediments to such use lies in the challenges of verification, validation and certification of ISHM systems themselves. This paper makes the case that state-of-the-practice V&V and certification techniques will not suffice for emerging forms of ISHM systems; however, a number of maturing software engineering assurance technologies show particular promise for addressing these ISHM V&V challenges.

  15. An objective decision model of power grid environmental protection based on environmental influence index and energy-saving and emission-reducing index

    NASA Astrophysics Data System (ADS)

    Feng, Jun-shu; Jin, Yan-ming; Hao, Wei-hua

    2017-01-01

    Based on modelling the environmental influence index of power transmission and transformation project and energy-saving and emission-reducing index of source-grid-load of power system, this paper establishes an objective decision model of power grid environmental protection, with constraints of power grid environmental protection objectives being legal and economical, and considering both positive and negative influences of grid on the environmental in all-life grid cycle. This model can be used to guide the programming work of power grid environmental protection. A numerical simulation of Jiangsu province’s power grid environmental protection objective decision model has been operated, and the results shows that the maximum goal of energy-saving and emission-reducing benefits would be reached firstly as investment increasing, and then the minimum goal of environmental influence.

  16. Real World Data Driven Evolution of Volvo Cars’ Side Impact Protection Systems and their Effectiveness

    PubMed Central

    Jakobsson, Lotta; Lindman, Magdalena; Svanberg, Bo; Carlsson, Henrik

    2010-01-01

    This study analyses the outcome of the continuous improved occupant protection over the last two decades for front seat near side occupants in side impacts based on a real world driven working process. The effectiveness of four generations of improved side impact protection are calculated based on data from Volvo’s statistical accident database of Volvo Cars in Sweden. Generation I includes vehicles with a new structural and interior concept (SIPS). Generation II includes vehicles with structural improvements and a new chest airbag (SIPSbag). Generation III includes vehicles with further improved SIPS and SIPSbag as well as the new concept with a head protecting Inflatable Curtain (IC). Generation IV includes the most recent vehicles with further improvements of all the systems plus advanced sensors and seat belt pretensioner activation. Compared to baseline vehicles, vehicles of generation I reduce MAIS2+ injuries by 54%, generation II by 61% and generation III by 72%. For generation IV effectiveness figures cannot be calculated because of the lack of MAIS2+ injuries. A continuous improved performance is also seen when studying the AIS2+ pelvis, abdomen, chest and head injuries separately. By using the same real world driven working process, future improvements and possibly new passive as well as active safety systems, will be developed with the aim of further improved protection to near side occupants in side impacts. PMID:21050597

  17. 40 CFR 267.194 - What installation requirements must I follow?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... settlement, vibration, expansion, or contraction. (b) You must provide the type and degree of corrosion protection recommended by an independent corrosion expert, based on the information provided under § 267.191... corrosion expert must supervise the installation of a corrosion protection system that is field fabricated...

  18. 40 CFR 267.194 - What installation requirements must I follow?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... settlement, vibration, expansion, or contraction. (b) You must provide the type and degree of corrosion protection recommended by an independent corrosion expert, based on the information provided under § 267.191... corrosion expert must supervise the installation of a corrosion protection system that is field fabricated...

  19. 40 CFR 267.194 - What installation requirements must I follow?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... settlement, vibration, expansion, or contraction. (b) You must provide the type and degree of corrosion protection recommended by an independent corrosion expert, based on the information provided under § 267.191... corrosion expert must supervise the installation of a corrosion protection system that is field fabricated...

  20. 40 CFR 267.194 - What installation requirements must I follow?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... settlement, vibration, expansion, or contraction. (b) You must provide the type and degree of corrosion protection recommended by an independent corrosion expert, based on the information provided under § 267.191... corrosion expert must supervise the installation of a corrosion protection system that is field fabricated...

  1. 40 CFR 267.194 - What installation requirements must I follow?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... settlement, vibration, expansion, or contraction. (b) You must provide the type and degree of corrosion protection recommended by an independent corrosion expert, based on the information provided under § 267.191... corrosion expert must supervise the installation of a corrosion protection system that is field fabricated...

  2. 44 CFR 64.3 - Flood Insurance Maps.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... flood hazard that results from the decertification of a previously accredited flood protection system that is determined to be in the process of being restored to provide base flood protection V Area of... tidal floods (coastal high hazard area) V1-30, VE Area of special flood hazards, with water surface...

  3. Adaptive envelope protection methods for aircraft

    NASA Astrophysics Data System (ADS)

    Unnikrishnan, Suraj

    Carefree handling refers to the ability of a pilot to operate an aircraft without the need to continuously monitor aircraft operating limits. At the heart of all carefree handling or maneuvering systems, also referred to as envelope protection systems, are algorithms and methods for predicting future limit violations. Recently, envelope protection methods that have gained more acceptance, translate limit proximity information to its equivalent in the control channel. Envelope protection algorithms either use very small prediction horizon or are static methods with no capability to adapt to changes in system configurations. Adaptive approaches maximizing prediction horizon such as dynamic trim, are only applicable to steady-state-response critical limit parameters. In this thesis, a new adaptive envelope protection method is developed that is applicable to steady-state and transient response critical limit parameters. The approach is based upon devising the most aggressive optimal control profile to the limit boundary and using it to compute control limits. Pilot-in-the-loop evaluations of the proposed approach are conducted at the Georgia Tech Carefree Maneuver lab for transient longitudinal hub moment limit protection. Carefree maneuvering is the dual of carefree handling in the realm of autonomous Uninhabited Aerial Vehicles (UAVs). Designing a flight control system to fully and effectively utilize the operational flight envelope is very difficult. With the increasing role and demands for extreme maneuverability there is a need for developing envelope protection methods for autonomous UAVs. In this thesis, a full-authority automatic envelope protection method is proposed for limit protection in UAVs. The approach uses adaptive estimate of limit parameter dynamics and finite-time horizon predictions to detect impending limit boundary violations. Limit violations are prevented by treating the limit boundary as an obstacle and by correcting nominal control/command inputs to track a limit parameter safe-response profile near the limit boundary. The method is evaluated using software-in-the-loop and flight evaluations on the Georgia Tech unmanned rotorcraft platform---GTMax. The thesis also develops and evaluates an extension for calculating control margins based on restricting limit parameter response aggressiveness near the limit boundary.

  4. Creation of security engineering programs by the Southwest Surety Institute

    NASA Astrophysics Data System (ADS)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  5. The application of machine vision in fire protection system

    NASA Astrophysics Data System (ADS)

    Rong, Jiang

    2018-04-01

    Based on the previous research, this paper introduces the theory of wavelet, collects the situation through the video system, and calculates the key information needed in the fire protection system. That is, through the algorithm to collect the information, according to the flame color characteristics and smoke characteristics were extracted, and as the characteristic information corresponding processing. Alarm system set the corresponding alarm threshold, when more than this alarm threshold, the system will alarm. This combination of flame color characteristics and smoke characteristics of the fire method not only improve the accuracy of judgment, but also improve the efficiency of judgments. Experiments show that the scheme is feasible.

  6. System and method for quench and over-current protection of superconductor

    DOEpatents

    Huang, Xianrui; Laskaris, Evangelos Trifon; Sivasubramaniam, Kiruba Haran; Bray, James William; Ryan, David Thomas; Fogarty, James Michael; Steinbach, Albert Eugene

    2005-05-31

    A system and method for protecting a superconductor. The system may comprise a current sensor operable to detect a current flowing through the superconductor. The system may comprise a coolant temperature sensor operable to detect the temperature of a cryogenic coolant used to cool the superconductor to a superconductive state. The control circuit is operable to estimate the superconductor temperature based on the current flow and the coolant temperature. The system may also be operable to compare the estimated superconductor temperature to at least one threshold temperature and to initiate a corrective action when the superconductor temperature exceeds the at least one threshold temperature.

  7. Quality of protection evaluation of security mechanisms.

    PubMed

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.

  8. Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme.

    PubMed

    Zhang, Liping; Zhu, Shaohui; Tang, Shanyu

    2017-03-01

    Telecare medicine information systems (TMIS) provide flexible and convenient e-health care. However, the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.'s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.'s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.'s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient to enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.

  9. A study on metallic thermal protection system panel for Reusable Launch Vehicle

    NASA Astrophysics Data System (ADS)

    Caogen, Yao; Hongjun, Lü; Zhonghua, Jia; Xinchao, Jia; Yan, Lu; Haigang, Li

    2008-07-01

    A Ni-based superalloy honeycomb thermal protection system (TPS) panel has been fabricated. And a curved Ni-based superalloy honeycomb sandwich has also been fabricated. The preliminary thermal insulation results of a fabricated Ni-based superalloy honeycomb TPS panel (the areal density of this panel is 6.7 kg /m2 and total height is 32 mm) indicate that the maximum temperature of the lower surfaces of the panel is lower than 150∘ C when the temperature of outer surface is held at 650∘ C for 30 min. The flatwise tensile strength and compressive properties of a fabricated Ni-based superalloy honeycomb sandwich coupon was studied at room temperature. A multilayered coating has been developed on the surface of the superalloy honeycomb TPS panel for environmental protection and thermal control. The oxidation weight-change results show that the weight change of the Ni-based superalloy honeycomb sandwich with the oxidation resistant coating is extremely small at 1100∘ C in air for 10 h. The emittance layer of the multilayered coating imparts an emittance in excess of 0.85 during exposure at 850∘ C, which was at least 14% greater than that of the substrate with oxidation resistant alone.

  10. Reliability of digital reactor protection system based on extenics.

    PubMed

    Zhao, Jing; He, Ya-Nan; Gu, Peng-Fei; Chen, Wei-Hua; Gao, Feng

    2016-01-01

    After the Fukushima nuclear accident, safety of nuclear power plants (NPPs) is widespread concerned. The reliability of reactor protection system (RPS) is directly related to the safety of NPPs, however, it is difficult to accurately evaluate the reliability of digital RPS. The method is based on estimating probability has some uncertainties, which can not reflect the reliability status of RPS dynamically and support the maintenance and troubleshooting. In this paper, the reliability quantitative analysis method based on extenics is proposed for the digital RPS (safety-critical), by which the relationship between the reliability and response time of RPS is constructed. The reliability of the RPS for CPR1000 NPP is modeled and analyzed by the proposed method as an example. The results show that the proposed method is capable to estimate the RPS reliability effectively and provide support to maintenance and troubleshooting of digital RPS system.

  11. An Intrusion Detection System for the Protection of Railway Assets Using Fiber Bragg Grating Sensors

    PubMed Central

    Catalano, Angelo; Bruno, Francesco Antonio; Pisco, Marco; Cutolo, Antonello; Cusano, Andrea

    2014-01-01

    We demonstrate the ability of Fiber Bragg Gratings (FBGs) sensors to protect large areas from unauthorized activities in railway scenarios such as stations or tunnels. We report on the technological strategy adopted to protect a specific depot, representative of a common scenario for security applications in the railway environment. One of the concerns in the protection of a railway area centers on the presence of rail-tracks, which cannot be obstructed with physical barriers. We propose an integrated optical fiber system composed of FBG strain sensors that can detect human intrusion for protection of the perimeter combined with FBG accelerometer sensors for protection of rail-track access. Several trials were carried out in indoor and outdoor environments. The results demonstrate that FBG strain sensors bonded under a ribbed rubber mat enable the detection of intruder break-in via the pressure induced on the mat, whereas the FBG accelerometers installed under the rails enable the detection of intruders walking close to the railroad tracks via the acoustic surface waves generated by footsteps. Based on a single enabling technology, this integrated system represents a valuable intrusion detection system for railway security and could be integrated with other sensing functionalities in the railway field using fiber optic technology. PMID:25268920

  12. Risk-based flood protection planning under climate change and modeling uncertainty: a pre-alpine case study

    NASA Astrophysics Data System (ADS)

    Dittes, Beatrice; Kaiser, Maria; Špačková, Olga; Rieger, Wolfgang; Disse, Markus; Straub, Daniel

    2018-05-01

    Planning authorities are faced with a range of questions when planning flood protection measures: is the existing protection adequate for current and future demands or should it be extended? How will flood patterns change in the future? How should the uncertainty pertaining to this influence the planning decision, e.g., for delaying planning or including a safety margin? Is it sufficient to follow a protection criterion (e.g., to protect from the 100-year flood) or should the planning be conducted in a risk-based way? How important is it for flood protection planning to accurately estimate flood frequency (changes), costs and damage? These are questions that we address for a medium-sized pre-alpine catchment in southern Germany, using a sequential Bayesian decision making framework that quantitatively addresses the full spectrum of uncertainty. We evaluate different flood protection systems considered by local agencies in a test study catchment. Despite large uncertainties in damage, cost and climate, the recommendation is robust for the most conservative approach. This demonstrates the feasibility of making robust decisions under large uncertainty. Furthermore, by comparison to a previous study, it highlights the benefits of risk-based planning over the planning of flood protection to a prescribed return period.

  13. Beyond empiricism: informing vaccine development through innate immunity research.

    PubMed

    Levitz, Stuart M; Golenbock, Douglas T

    2012-03-16

    Although a great public heath success, vaccines provide suboptimal protection in some patient populations and are not available to protect against many infectious diseases. Insights from innate immunity research have led to a better understanding of how existing vaccines work and have informed vaccine development. New adjuvants and delivery systems are being designed based upon their capacity to stimulate innate immune sensors and target antigens to dendritic cells, the cells responsible for initiating adaptive immune responses. Incorporating these adjuvants and delivery systems in vaccines can beneficially alter the quantitative and qualitative nature of the adaptive immune response, resulting in enhanced protection. Copyright © 2012 Elsevier Inc. All rights reserved.

  14. Beyond empiricism: Informing vaccine development through innate immunity research

    PubMed Central

    Levitz, Stuart M.; Golenbock, Douglas T.

    2012-01-01

    Summary While a great public heath success, vaccines provide suboptimal protection in some patient populations and are not available to protect against many infectious diseases. Insights from innate immunity research have led to a better understanding of how existing vaccines work and informed vaccine development. New adjuvants and delivery systems are being designed based upon their capacity to stimulate innate immune sensors and target antigens to dendritic cells, the cells responsible for initiating adaptive immune responses. Incorporating these adjuvants and delivery systems in vaccines can beneficially alter the quantitative and qualitative nature of the adaptive immune response resulting in enhanced protection. PMID:22424235

  15. On the implementation of IP protection using biometrics based information hiding and firewall

    NASA Astrophysics Data System (ADS)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  16. Overview of ICRP Committee 5: protection of the environment.

    PubMed

    Larsson, C-M

    2016-06-01

    Protection of the environment is integral to the system of radiological protection, as outlined in the 2007 Recommendations of the International Commission on Radiological Protection (ICRP, Publication 103). The Commission's activities in this area are mainly pursued by Committee 5 and its associated Task Groups. Publication 91 broadly outlines the approach to radiological protection of the environment, and its alignment with approaches to environmental protection from hazardous substances in general. Publications 108 and 114 provide the cornerstones of the environmental protection system and relevant databases. Publication 124 considers its application in planned, existing, and emergency exposure situations. The system centres on 12 Reference Animals and Plants (RAPs) with broad relevance for environmental protection based on their ubiquity and significance as well as other criteria, as described in Publication 108 The databases comprise general biology of the RAPs, transfer parameters, dose conversion coefficients, and effects data. Derived Consideration Reference Levels (DCRLs) were established for each RAP; a DCRL represents a band of dose rates that might result in some deleterious effects in individuals of that type of RAP. Newly established Task Group 99 will compile the RAP-specific reference information into monographs, with the view of updating information and improving the applicability of the system in different exposure situations. For certain scenarios, more precise and ecosystem-specific protection benchmarks may be justified, which would have to be informed by consideration of representative organisms (i.e. representative of a particular ecosystem and relevant to the specific scenario; Publication 124). Committee 5 will explore this further, making use of a limited number of case studies. © The International Society for Prosthetics and Orthotics.

  17. 78 FR 68816 - Proposed Information Collection; Comment Request; NOAA Space-Based Data Collection System (DCS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-15

    ... Collection; Comment Request; NOAA Space- Based Data Collection System (DCS) Agreements AGENCY: National Oceanic and Atmospheric Administration (NOAA). ACTION: Notice. SUMMARY: The Department of Commerce, as... directed to Scott Rogerson, 301-817-4543 or [email protected]noaa.gov ; or Kay Metcalf, 301-817-4558 or kay...

  18. X-33 Base Region Thermal Protection System Design Study

    NASA Technical Reports Server (NTRS)

    Lycans, Randal W.

    1998-01-01

    The X-33 is an advanced technology demonstrator for validating critical technologies and systems required for an operational Single-Stage-to-Orbit (SSTO) Reusuable Launch Vehicle (RLV). Currently under development by a unique contractor/government team led by Lockheed- Martin Skunk Works (LMSW), and managed by Marshall Space Flight Center (MSFC), the X-33 will be the prototype of the first new launch system developed by the United States since the advent of the space shuttle. This paper documents a design trade study of the X-33 base region thermal protection system (TPS). Two candidate designs were evaluated for thermal performance and weight. The first candidate was a fully reusable metallic TPS using Inconel honeycomb panels insulated with high temperature fibrous insulation, while the second was an ablator/insulator sprayed on the metallic skin of the vehicle. The TPS configurations and insulation thickness requirements were determined for the predicted main engine plume heating environments and base region entry aerothermal environments. In addition to thermal analysis of the design concepts, sensitivity studies were performed to investigate the effect of variations in key parameters of the base TPS analysis.

  19. "SmartMonitor"--an intelligent security system for the protection of individuals and small properties with the possibility of home automation.

    PubMed

    Frejlichowski, Dariusz; Gościewska, Katarzyna; Forczmański, Paweł; Hofman, Radosław

    2014-06-05

    "SmartMonitor" is an intelligent security system based on image analysis that combines the advantages of alarm, video surveillance and home automation systems. The system is a complete solution that automatically reacts to every learned situation in a pre-specified way and has various applications, e.g., home and surrounding protection against unauthorized intrusion, crime detection or supervision over ill persons. The software is based on well-known and proven methods and algorithms for visual content analysis (VCA) that were appropriately modified and adopted to fit specific needs and create a video processing model which consists of foreground region detection and localization, candidate object extraction, object classification and tracking. In this paper, the "SmartMonitor" system is presented along with its architecture, employed methods and algorithms, and object analysis approach. Some experimental results on system operation are also provided. In the paper, focus is put on one of the aforementioned functionalities of the system, namely supervision over ill persons.

  20. Breastfeeding protection, promotion, and support in the United States: a time to nudge, a time to measure.

    PubMed

    Pérez-Escamilla, Rafael; Chapman, Donna J

    2012-05-01

    Strong evidence-based advocacy efforts have now translated into high level political support and concrete goals for improving breastfeeding outcomes among women in the United States. In spite of this, major challenge remain for promoting, supporting and especially for protecting breastfeeding in the country. The goals of this commentary are to argue in favor of: A) Changes in the default social and environmental systems, that would allow women to implement their right to breastfeed their infants, B) A multi-level and comprehensive monitoring system to measure process and outcomes indicators in the country. Evidence-based commentary. Breastfeeding rates in the United States can improve based on a well coordinated social marketing framework. This approach calls for innovative promotion through mass media, appropriate facility based and community based support (e.g., Baby Friendly Hospital Initiative, WIC-coordinated community based peer counseling), and adequate protection for working women (e.g., longer paid maternity leave, breastfeeding or breast milk extraction breaks during the working day) and women at large by adhering and enforcing the WHO ethics Code for the Marketing of Breast Milk Substitutes. Sound infant feeding practices monitoring systems, which include WIC administrative food package data, are needed. Given the current high level of political support to improve breastfeeding in the United States, a window of opportunity has been opened. Establishing breastfeeding as the social norm in the USA will take time, but the global experience indicates that it can be done.

  1. Privacy protection in surveillance systems based on JPEG DCT baseline compression and spectral domain watermarking

    NASA Astrophysics Data System (ADS)

    Sablik, Thomas; Velten, Jörg; Kummert, Anton

    2015-03-01

    An novel system for automatic privacy protection in digital media based on spectral domain watermarking and JPEG compression is described in the present paper. In a first step private areas are detected. Therefore a detection method is presented. The implemented method uses Haar cascades to detects faces. Integral images are used to speed up calculations and the detection. Multiple detections of one face are combined. Succeeding steps comprise embedding the data into the image as part of JPEG compression using spectral domain methods and protecting the area of privacy. The embedding process is integrated into and adapted to JPEG compression. A Spread Spectrum Watermarking method is used to embed the size and position of the private areas into the cover image. Different methods for embedding regarding their robustness are compared. Moreover the performance of the method concerning tampered images is presented.

  2. Face biometrics with renewable templates

    NASA Astrophysics Data System (ADS)

    van der Veen, Michiel; Kevenaar, Tom; Schrijen, Geert-Jan; Akkermans, Ton H.; Zuo, Fei

    2006-02-01

    In recent literature, privacy protection technologies for biometric templates were proposed. Among these is the so-called helper-data system (HDS) based on reliable component selection. In this paper we integrate this approach with face biometrics such that we achieve a system in which the templates are privacy protected, and multiple templates can be derived from the same facial image for the purpose of template renewability. Extracting binary feature vectors forms an essential step in this process. Using the FERET and Caltech databases, we show that this quantization step does not significantly degrade the classification performance compared to, for example, traditional correlation-based classifiers. The binary feature vectors are integrated in the HDS leading to a privacy protected facial recognition algorithm with acceptable FAR and FRR, provided that the intra-class variation is sufficiently small. This suggests that a controlled enrollment procedure with a sufficient number of enrollment measurements is required.

  3. Structure-based design of broadly protective group a streptococcal M protein-based vaccines.

    PubMed

    Dale, James B; Smeesters, Pierre R; Courtney, Harry S; Penfound, Thomas A; Hohn, Claudia M; Smith, Jeremy C; Baudry, Jerome Y

    2017-01-03

    A major obstacle to the development of broadly protective M protein-based group A streptococcal (GAS) vaccines is the variability within the N-terminal epitopes that evoke potent bactericidal antibodies. The concept of M type-specific protective immune responses has recently been challenged based on the observation that multivalent M protein vaccines elicited cross-reactive bactericidal antibodies against a number of non-vaccine M types of GAS. Additionally, a new "cluster-based" typing system of 175M proteins identified a limited number of clusters containing closely related M proteins. In the current study, we used the emm cluster typing system, in combination with computational structure-based peptide modeling, as a novel approach to the design of potentially broadly protective M protein-based vaccines. M protein sequences (AA 16-50) from the E4 cluster containing 17 emm types of GAS were analyzed using de novo 3-D structure prediction tools and the resulting structures subjected to chemical diversity analysis to identify sequences that were the most representative of the 3-D physicochemical properties of the M peptides in the cluster. Five peptides that spanned the range of physicochemical attributes of all 17 peptides were used to formulate synthetic and recombinant vaccines. Rabbit antisera were assayed for antibodies that cross-reacted with E4 peptides and whole bacteria by ELISA and for bactericidal activity against all E4GAS. The synthetic vaccine rabbit antisera reacted with all 17 E4M peptides and demonstrated bactericidal activity against 15/17 E4GAS. A recombinant hybrid vaccine containing the same E4 peptides also elicited antibodies that cross-reacted with all E4M peptides. Comprehensive studies using structure-based design may result in a broadly protective M peptide vaccine that will elicit cluster-specific and emm type-specific antibody responses against the majority of clinically relevant emm types of GAS. Copyright © 2016 Elsevier Ltd. All rights reserved.

  4. Child abuse and neglect in Turkey: professional, governmental and non-governmental achievements in improving the national child protection system.

    PubMed

    Akco, Seda; Dagli, Tolga; Inanici, Mehmet Akif; Kaynak, Hatice; Oral, Resmiye; Sahin, Figen; Sofuoglu, Zeynep; Ulukol, Betul

    2013-11-01

    Since ratification of the United Nations Convention on the Rights of the Child in 1995, significant efforts were made in Turkey to improve protection of children from abuse and neglect. The government took steps to amend relevant laws. Several state departments recognized the need for professional in-service training of relevant governmental agency staff. University hospitals established numerous hospital-based multidisciplinary child protection centres. The government established an Interministerial Higher Council, which has been overseeing the foundation of 13 child advocacy centres for a multidisciplinary and interagency response to child sexual abuse. In addition to undertaking research, non-governmental organizations contributed to this process by instituting professional and public education. These ground-breaking developments in the last decade give promise of even further improvement in the national child protection system from investigative, child protective and rehabilitative perspectives.

  5. The effect of moisture content within multilayer protective clothing on protection from radiation and steam.

    PubMed

    Su, Yun; Li, Jun; Song, Guowen

    2018-06-01

    The moisture from skin sweat and atmospheric water affects the thermal protective performance provided by multilayer protective clothing. Four levels of moisture content were selected to evaluate the impact of moisture on thermal protection under dry (thermal radiation) and wet (thermal radiation and low-pressure steam) heat exposure. Also, the role of moisture and its relationship with exposure time were analyzed based on skin heat flux and Henriques integral value. The addition of moisture to a fabric system was found to result in differences in second-degree and third-degree skin burn times. When moisture is added to a fabric system, it both acts as a thermal conductor to present a negative effect and provides a positive effect owing to thermal storage of water and evaporative heat loss. The positive or negative effects of moisture are mainly dependent on the thermal exposure time, the moisture content and the presence of hot steam.

  6. The Effectiveness of Shin Guards Used by Football Players

    PubMed Central

    Tatar, Yasar; Ramazanoglu, Nusret; Camliguney, Asiye Filiz; Saygi, Evrim Karadag; Cotuk, Hasan Birol

    2014-01-01

    In football, injuries from opponent contact occur commonly in the lower extremities. FIFA the world’s governing body for football requires players to wear shin guards. The aim of this study was to compare the protective effectiveness of polypropylene based shin guards with custom-made carbon fiber ones. Three commercial polypropylene shin guards (Adidas Predator™, Adidas UCL™, and Nike Mercurial™) and two custom-made carbon fiber shin guards were examined. The experimental setup had the following parts: 1) A pendulum attached a load cell at the tip (CAS Corp., Korea) and a fixed prosthetic foot equipped with a cleat to simulate an attacker’s foot. 2) An artificial tibia prepared by condensed foam and reinforced by carbon fibers protected with soft clothing. 3) A multifunctional sensor system (Tekscan Corp., F-Socket System, Turkey) to record the impact on the tibia. In the low impact force trials, only 2.79-9.63 % of the load was transmitted to the sensors. When comparing for mean force, peak force and impulse, both carbon fiber shin guards performed better than the commercial ones (Adidas Predator™, Adidas UCL™, and Nike Mercurial™) (p = 0.000). Based on these same parameters, the Nike Mercurial™ provided better protection than the Adidas Predator™ and the Adidas UCL™ (p = 0.000). In the high impact force trials, only 5.16-10.90 % of the load was transmitted to the sensors. For peak force and impulse, the carbon fiber shin guards provided better protection than all the others. Carbon fiber shin guards possess protective qualities superior to those of commercial polypropylene shin guards. Key Points Shin guards decrease the risk of serious injuries. Carbon shin guards provide sufficient protection against high impact forces. Commercially available Polypropylene based shin guards do not provide sufficient protection against high impact forces. PMID:24570615

  7. The effectiveness of shin guards used by football players.

    PubMed

    Tatar, Yasar; Ramazanoglu, Nusret; Camliguney, Asiye Filiz; Saygi, Evrim Karadag; Cotuk, Hasan Birol

    2014-01-01

    In football, injuries from opponent contact occur commonly in the lower extremities. FIFA the world's governing body for football requires players to wear shin guards. The aim of this study was to compare the protective effectiveness of polypropylene based shin guards with custom-made carbon fiber ones. Three commercial polypropylene shin guards (Adidas Predator™, Adidas UCL™, and Nike Mercurial™) and two custom-made carbon fiber shin guards were examined. The experimental setup had the following parts: 1) A pendulum attached a load cell at the tip (CAS Corp., Korea) and a fixed prosthetic foot equipped with a cleat to simulate an attacker's foot. 2) An artificial tibia prepared by condensed foam and reinforced by carbon fibers protected with soft clothing. 3) A multifunctional sensor system (Tekscan Corp., F-Socket System, Turkey) to record the impact on the tibia. In the low impact force trials, only 2.79-9.63 % of the load was transmitted to the sensors. When comparing for mean force, peak force and impulse, both carbon fiber shin guards performed better than the commercial ones (Adidas Predator™, Adidas UCL™, and Nike Mercurial™) (p = 0.000). Based on these same parameters, the Nike Mercurial™ provided better protection than the Adidas Predator™ and the Adidas UCL™ (p = 0.000). In the high impact force trials, only 5.16-10.90 % of the load was transmitted to the sensors. For peak force and impulse, the carbon fiber shin guards provided better protection than all the others. Carbon fiber shin guards possess protective qualities superior to those of commercial polypropylene shin guards. Key PointsShin guards decrease the risk of serious injuries.Carbon shin guards provide sufficient protection against high impact forces.Commercially available Polypropylene based shin guards do not provide sufficient protection against high impact forces.

  8. Flexible Foam Protection Materials for Portable Life Support System Packaging Study

    NASA Technical Reports Server (NTRS)

    Tang,Henry H.; Dillon, Paul A.; Thomas, Gretchen A.

    2009-01-01

    This paper discusses the phase I effort in evaluating and selecting a light weight impact protection material for the Constellation Space Suit Element (CSSE) Portable Life Support System (PLSS) conceptual packaging study. A light weight material capable of holding and protecting the components inside the PLSS is required to demonstrate the viability of the flexible PLSS packaging concept. The material needs to distribute, dissipate, and absorb the impact energy of the PLSS falling on the lunar surface. It must also be robust to consistently perform over several Extravehicular Activity (EVA) missions in the extreme lunar thermal vacuum environment. This paper documents the performance requirements for selecting a foam protection material, and the methodologies for evaluating some commercial off-the-shelf (COTS) foam material candidates. It also presents the mechanical properties and impact drop tests results of the foam material candidates. The results of this study suggest that a foam based flexible protection system is a viable solution for PLSS packaging. However, additional works are needed to optimize COTS foam or to develop a composite foam system that will meet all the performance requirements for the CSSE PLSS flexible packaging.

  9. IDENTIFYING SEXUAL HEALTH PROTECTIVE FACTORS AMONG NORTHERN PLAINS AMERICAN INDIAN YOUTH: AN ECOLOGICAL APPROACH UTILIZING MULTIPLE PERSPECTIVES

    PubMed Central

    Griese, Emily R.; Kenyon, DenYelle Baete; McMahon, Tracey R.

    2017-01-01

    This study examined aspects of the sociocultural context in which American Indian (AI) teen pregnancy occurs, focusing specifically on protective factors for Northern Plains AI youth. Principles of community-based participatory research guided the qualitative data collection from 185 community members (focus groups with AI youth, youth parents, and elders; interviews with health care providers and school personnel) from a reservation and an urban community. Results indicated three protective systems impacted the sexual health and behaviors of AI youth: school, family, and enculturation. These findings provide a better understanding of how specific protective factors within these systems may buffer AI youth from involvement in risky sexual behaviors and work to inform culturally relevant prevention and intervention efforts. PMID:27536896

  10. Exercise protects the cardiovascular system: effects beyond traditional risk factors

    PubMed Central

    Joyner, Michael J; Green, Daniel J

    2009-01-01

    In humans, exercise training and moderate to high levels of physical activity are protective against cardiovascular disease. In fact they are ∼40% more protective than predicted based on the changes in traditional risk factors (blood lipids, hypertension, diabetes etc.) that they cause. In this review, we highlight the positive effects of exercise on endothelial function and the autonomic nervous system. We also ask if these effects alone, or in combination, might explain the protective effects of exercise against cardiovascular disease that appear to be independent of traditional risk factor modification. Our goal is to use selected data from our own work and that of others to stimulate debate on the nature and cause of the ‘risk factor gap’ associated with exercise and physical activity. PMID:19736305

  11. Neutron Source Facility Training Simulator Based on EPICS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Park, Young Soo; Wei, Thomas Y.; Vilim, Richard B.

    A plant operator training simulator is developed for training the plant operators as well as for design verification of plant control system (PCS) and plant protection system (PPS) for the Kharkov Institute of Physics and Technology Neutron Source Facility. The simulator provides the operator interface for the whole plant including the sub-critical assembly coolant loop, target coolant loop, secondary coolant loop, and other facility systems. The operator interface is implemented based on Experimental Physics and Industrial Control System (EPICS), which is a comprehensive software development platform for distributed control systems. Since its development at Argonne National Laboratory, it has beenmore » widely adopted in the experimental physics community, e.g. for control of accelerator facilities. This work is the first implementation for a nuclear facility. The main parts of the operator interface are the plant control panel and plant protection panel. The development involved implementation of process variable database, sequence logic, and graphical user interface (GUI) for the PCS and PPS utilizing EPICS and related software tools, e.g. sequencer for sequence logic, and control system studio (CSS-BOY) for graphical use interface. For functional verification of the PCS and PPS, a plant model is interfaced, which is a physics-based model of the facility coolant loops implemented as a numerical computer code. The training simulator is tested and demonstrated its effectiveness in various plant operation sequences, e.g. start-up, shut-down, maintenance, and refueling. It was also tested for verification of the plant protection system under various trip conditions.« less

  12. Recent developments in aircraft protection systems for laser guide star operations

    NASA Astrophysics Data System (ADS)

    Stomski, Paul J.; Murphy, Thomas W.; Campbell, Randy

    2012-07-01

    The astronomical community's use of high power laser guide star adaptive optics (LGS-AO) systems presents a potential hazard to aviation. Historically, the most common and trusted means of protecting aircraft and their occupants has been the use of safety observers (aka spotters) armed with shut-off switches. These safety observers watch for aircraft at risk and terminate laser propagation before the aircraft can be adversely affected by the laser. Efforts to develop safer and more cost-effective automated aircraft protection systems for use by the astronomical community have been inhibited by both technological and regulatory challenges. This paper discusses recent developments in these two areas. Specifically, with regard to regulation and guidance we discuss the 2011 release of AS-6029 by the SAE as well as the potential impact of RTCA DO-278A. With regard to the recent developments in the technology used to protect aircraft from laser illumination, we discuss the novel Transponder Based Aircraft Detection (TBAD) system being installed at W. M. Keck Observatory (WMKO). Finally, we discuss our strategy for evaluating TBAD compliance with the regulations and for seeking appropriate approvals for LGS operations at WMKO using a fully automated, flexibly configured, multi-tier aircraft protection system incorporating this new technology.

  13. 40 CFR Appendix 4 to Subpart A of... - Determination of Biodegradation of Synthetic Base Fluids in a Marine Closed Bottle Test System...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 29 2010-07-01 2010-07-01 false Determination of Biodegradation of Synthetic Base Fluids in a Marine Closed Bottle Test System: Summary of Modifications to ISO 11734:1995 4..., Subpt. A, App. 4 Appendix 4 to Subpart A of Part 435—Determination of Biodegradation of Synthetic Base...

  14. 40 CFR Appendix 4 to Subpart A of... - Determination of Biodegradation of Synthetic Base Fluids in a Marine Closed Bottle Test System...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 30 2011-07-01 2011-07-01 false Determination of Biodegradation of Synthetic Base Fluids in a Marine Closed Bottle Test System: Summary of Modifications to ISO 11734:1995 4..., Subpt. A, App. 4 Appendix 4 to Subpart A of Part 435—Determination of Biodegradation of Synthetic Base...

  15. Protection of Nonhuman Primates Against Two Species of Ebola Virus Infection With a Single Complex Adenovirus Vector

    DTIC Science & Technology

    2010-04-01

    glycoproteins of Zaire ebolavirus (ZEBOV) and Sudan ebolavirus (SEBOV) in a single complex adenovirus -based vector (CAdVax). We evaluated our vaccine ...recombinant complex adenovirus vaccine (CAdVax) system, which provides multivalent protection of NHPs against multiple species of filoviruses (33). The...CAdVax vaccine platform is based on a complex, replication-defective adenovirus 5 (Ad5) vector (28–30, 37, 38) that allows for the incorporation of

  16. Comet/Asteroid Protection System (CAPS): Preliminary Space-Based Concept and Study Results

    NASA Technical Reports Server (NTRS)

    Mazanek, Daniel D.; Roithmayr, Carlos M.; Antol, Jeffrey; Park, Sang-Young; Koons, Robert H.; Bremer, James C.; Murphy, Douglas G.; Hoffman, James A.; Kumar, Renjith R.; Seywald, Hans

    2005-01-01

    There exists an infrequent, but significant hazard to life and property due to impacting asteroids and comets. There is currently no specific search for long-period comets, smaller near-Earth asteroids, or smaller short-period comets. These objects represent a threat with potentially little or no warning time using conventional ground-based telescopes. These planetary bodies also represent a significant resource for commercial exploitation, long-term sustained space exploration, and scientific research. The Comet/Asteroid Protection System (CAPS) is a future space-based system concept that provides permanent, continuous asteroid and comet monitoring, and rapid, controlled modification of the orbital trajectories of selected bodies. CAPS would expand the current detection effort to include long-period comets, as well as small asteroids and short-period comets capable of regional destruction. A space-based detection system, despite being more costly and complex than Earth-based initiatives, is the most promising way of expanding the range of detectable objects, and surveying the entire celestial sky on a regular basis. CAPS would provide an orbit modification system capable of diverting kilometer class objects, and modifying the orbits of smaller asteroids for impact defense and resource utilization. This Technical Memorandum provides a compilation of key related topics and analyses performed during the CAPS study, which was performed under the Revolutionary Aerospace Systems Concepts (RASC) program, and discusses technologies that could enable the implementation of this future system.

  17. 40 CFR 132.5 - Procedures for adoption and EPA review.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PROGRAMS WATER QUALITY GUIDANCE FOR THE GREAT LAKES SYSTEM § 132.5 Procedures for adoption and EPA review... water quality standards that were derived, or are as protective as or more protective than could be... procedure by which water quality-based effluent limits and total maximum daily loads are developed using the...

  18. Thermal Materials Protect Priceless, Personal Keepsakes

    NASA Technical Reports Server (NTRS)

    2014-01-01

    NASA astronaut Scott Parazynski led the development of materials and techniques for the inspection and repair of the shuttle’s thermal protection system. Parazynski later met Chris Shiver of Houston-based DreamSaver Enterprises LLC and used concepts from his work at Johnson Space Center to develop an enclosure that can withstand 98 percent of residential fires.

  19. Silicon-slurry/aluminide coating. [protecting gas turbine engine vanes and blades

    NASA Technical Reports Server (NTRS)

    Deadmore, D. L.; Young, S. G. (Inventor)

    1983-01-01

    A low cost coating protects metallic base system substrates from high temperatures, high gas velocity ovidation, thermal fatigue and hot corrosion and is particularly useful fo protecting vanes and blades in aircraft and land based gas turbine engines. A lacquer slurry comprising cellulose nitrate containing high purity silicon powder is sprayed onto the superalloy substrates. The silicon layer is then aluminized to complete the coating. The Si-Al coating is less costly to produce than advanced aluminides and protects the substrates from oxidation and thermal fatigue for a much longer period of time than the conventional aluminide coatings. While more expensive Pt-Al coatings and physical vapor deposited MCrAlY coatings may last longer or provide equal protection on certain substrates, the Si-Al coating exceeded the performance of both types of coatings on certain superalloys in high gas velocity oxidation and thermal fatigue and increased the resistance of certain superalloys to hot corrosion.

  20. The Cost Analysis of Corrosion Protection Solutions for Steel Components in Terms of the Object Life Cycle Cost

    NASA Astrophysics Data System (ADS)

    Kowalski, Dariusz; Grzyl, Beata; Kristowski, Adam

    2017-09-01

    Steel materials, due to their numerous advantages - high availability, easiness of processing and possibility of almost any shaping are commonly applied in construction for carrying out basic carrier systems and auxiliary structures. However, the major disadvantage of this material is its high corrosion susceptibility, which depends strictly on the local conditions of the facility and the applied type of corrosion protection system. The paper presents an analysis of life cycle costs of structures installed on bridges used in the road lane conditions. Three anti-corrosion protection systems were considered, analyzing their essential cost components. The possibility of reducing significantly the costs associated with anti-corrosion protection at the stage of steel barriers maintenance over a period of 30 years has been indicated. The possibility of using a new approach based on the life cycle cost estimation in the anti-corrosion protection of steel elements is presented. The relationship between the method of steel barrier protection, the scope of repair, renewal work and costs is shown. The article proposes an optimal solution which, while reducing the cost of maintenance of road infrastructure components in the area of corrosion protection, allows to maintain certain safety standards for steel barriers that are installed on the bridge.

  1. Degradation and protection of DNAzymes on human skin.

    PubMed

    Marquardt, Kay; Eicher, Anna-Carola; Dobler, Dorota; Höfer, Frank; Schmidts, Thomas; Schäfer, Jens; Renz, Harald; Runkel, Frank

    2016-10-01

    DNAzymes are catalytic nucleic acid based molecules that have become a new class of active pharmaceutical ingredients (API). Until now, five DNAzymes have entered clinical trials. Two of them were tested for topical application, whereby dermally applied DNAzymes had been prone to enzymatic degradation. To protect the DNAzymes the enzymatic activity of human skin has to be examined. Therefore, the enzymatic activity of human skin was qualitatively and quantitatively analyzed. Activity similar to that of DNase II could be identified and the specific activity was determined to be 0.59Units/mg. These results were used to develop an in vitro degradation assay to screen different kinds of protective systems on human skin. The chosen protective systems consisted of biodegradable chitosans or polyethylenimine, which forms polyplexes when combined with DNAzymes. The polyplexes were characterized in terms of particle size, zeta potential, stability and degree of complexation. The screening revealed that the protective efficiency of the polyplexes depended on the polycation and the charge ratio (ξ). At a critical ξ ratio between 1.0 and 4.1 and at a maximal zeta potential, sufficient protection of the DNAzyme was achieved. The results of this study will be helpful for the development of a protective dermal drug delivery systems using polyplexes. Copyright © 2016 Elsevier B.V. All rights reserved.

  2. Spray-Dried Nanoparticle-in-Microparticle Delivery Systems (NiMDS) for Gene Delivery, Comprising Polyethylenimine (PEI)-Based Nanoparticles in a Poly(Vinyl Alcohol) Matrix.

    PubMed

    Schulze, Jan; Kuhn, Stephanie; Hendrikx, Stephan; Schulz-Siegmund, Michaela; Polte, Tobias; Aigner, Achim

    2018-03-01

    Nucleic acid-based therapies rely on efficient formulations for nucleic acid protection and delivery. As nonviral strategies, polymeric and lipid-based nanoparticles have been introduced; however, biological efficacy and biocompatibility as well as poor storage properties due to colloidal instability and their unavailability as ready-to-use systems are still major issues. Polyethylenimine is the most widely explored and promising candidate for gene delivery. Polyethylenimine-based polyplexes and their combination with liposomes, lipopolyplexes, are efficient for DNA or siRNA delivery in vitro and in vivo. In this study, a highly potent spray-dried nanoparticle-in-microparticle delivery system is presented for the encapsulation of polyethylenimine-based polyplexes and lipopolyplexes into poly(vinyl alcohol) microparticles, without requiring additional stabilizing agents. This easy-to-handle gene delivery device allows prolonged nanoparticle storage and protection at ambient temperature. Biological analyses reveal further advantages regarding profoundly reduced cytotoxicity and enhanced transfection efficacies of polyethylenimine-based nanoparticles from the nanoparticle-in-microparticle delivery system over their freshly prepared counterparts, as determined in various cell lines. Importantly, this nanoparticle-in-microparticle delivery system is demonstrated as ready-to-use dry powder to be an efficient device for the inhalative delivery of polyethylenimine-based lipopolyplexes in vivo, as shown by transgene expression in mice after only one administration. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  3. On-Line Thermal Barrier Coating Monitoring for Real-Time Failure Protection and Life Maximization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dennis H. LeMieux

    2004-10-01

    Under the sponsorship of the U. S. Department of Energy's National Energy Laboratory, Siemens Westinghouse Power Corporation proposes a four year program titled, ''On-Line Thermal Barrier Coating (TBC) Monitor for Real-Time Failure Protection and Life Maximization'', to develop, build and install the first generation of an on-line TBC monitoring system for use on land -based advanced gas turbines (AGT). Federal deregulation in electric power generation has accelerated power plant owner's demand for improved reliability availability maintainability (RAM) of the land-based advanced gas turbines. As a result, firing temperatures have been increased substantially in the advanced turbine engines, and the TBCsmore » have been developed for maximum protection and life of all critical engine components operating at these higher temperatures. Losing TBC protection can therefore accelerate the degradation of substrate components materials and eventually lead to a premature failure of critical component and costly unscheduled power outages. This program seeks to substantially improve the operating life of high cost gas turbine components using TBC; thereby, lowering the cost of maintenance leading to lower cost of electricity. Siemens Westinghouse Power Corporation has teamed with Indigo Systems; a supplier of state-of-the-art infrared camera systems, and Wayne State University, a leading research organization.« less

  4. A plant-produced protective antigen vaccine confers protection in rabbits against a lethal aerosolized challenge with Bacillus anthracis Ames spores.

    PubMed

    Chichester, Jessica A; Manceva, Slobodanka D; Rhee, Amy; Coffin, Megan V; Musiychuk, Konstantin; Mett, Vadim; Shamloul, Moneim; Norikane, Joey; Streatfield, Stephen J; Yusibov, Vidadi

    2013-03-01

    The potential use of Bacillus anthracis as a bioterrorism weapon threatens the security of populations globally, requiring the immediate availability of safe, efficient and easily delivered anthrax vaccine for mass vaccination. Extensive research efforts have been directed toward the development of recombinant subunit vaccines based on protective antigen (PA), the principal virulence factor of B. anthracis. Among the emerging technologies for the production of these vaccine antigens is our launch vector-based plant transient expression system. Using this system, we have successfully engineered, expressed, purified and characterized full-length PA (pp-PA83) in Nicotiana benthamiana plants using agroinfiltration. This plant-produced antigen elicited high toxin neutralizing antibody titers in mice and rabbits after two vaccine administrations with Alhydrogel. In addition, immunization with this vaccine candidate protected 100% of rabbits from a lethal aerosolized B. anthracis challenge. The vaccine effects were dose-dependent and required the presence of Alhydrogel adjuvant. In addition, the vaccine antigen formulated with Alhydrogel was stable and retained immunogenicity after two-week storage at 4°C, the conditions intended for clinical use. These results support the testing of this vaccine candidate in human volunteers and the utility of our plant expression system for the production of a recombinant anthrax vaccine.

  5. Development of Protection and Control Unit for Distribution Substation

    NASA Astrophysics Data System (ADS)

    Iguchi, Fumiaki; Hayashi, Hideyuki; Takeuchi, Motohiro; Kido, Mitsuyasu; Kobayashi, Takashi; Yanaoka, Atsushi

    The Recently, electronics and IT technologies have been rapidly innovated and have been introduced to power system protection & control system to achieve high reliability, maintainability and more functionality. Concerning the distribution substation application, digital relays have been applied for more than 10 years. Because of a number of electronic devices used for it, product cost becomes higher. Also, products installed during the past high-growth period will be at the end of lifetime and will be replaced. Therefore, replacing market is expected to grow and the reduction of cost is demanded. Considering above mentioned background, second generation digital protection and control unit as a successor is designed to have following concepts. Functional integration based on advanced digital technologies, Ethernet LAN based indoor communication network, cost reduction and downsizing. Pondering above concepts, integration of protection and control function is adopted in contrary to the functional segregation applied to the previous system in order to achieve one-unit concept. Also the adoption of Ethernet LAN for inter-unit communication is objective. This report shows the development of second-generation digital relay for distribution substation, which is equipped with control function and Ethernet LAN by reducing the size of auxiliary transformer unit and the same size as previous product is realized.

  6. Sensor4PRI: A Sensor Platform for the Protection of Railway Infrastructures

    PubMed Central

    Cañete, Eduardo; Chen, Jaime; Díaz, Manuel; Llopis, Luis; Rubio, Bartolomé

    2015-01-01

    Wireless Sensor Networks constitute pervasive and distributed computing systems and are potentially one of the most important technologies of this century. They have been specifically identified as a good candidate to become an integral part of the protection of critical infrastructures. In this paper we focus on railway infrastructure protection and we present the details of a sensor platform designed to be integrated into a slab track system in order to carry out both installation and maintenance monitoring activities. In the installation phase, the platform helps operators to install the slab tracks in the right position. In the maintenance phase, the platform collects information about the structural health and behavior of the infrastructure when a train travels along it and relays the readings to a base station. The base station uses trains as data mules to upload the information to the internet. The use of a train as a data mule is especially suitable for collecting information from remote or inaccessible places which do not have a direct connection to the internet and require less network infrastructure. The overall aim of the system is to deploy a permanent economically viable monitoring system to improve the safety of railway infrastructures. PMID:25734648

  7. Marble Deterioration and Climate: Examples from the Schlossbrücke Berlin

    NASA Astrophysics Data System (ADS)

    Pirskawetz, S.; Siegesmund, S.; Weise, F.; Rieffel, Y.; Plagge, R.

    2012-04-01

    Protective structures for works of art or antique artefacts have a long architectural tradition and have been known in Germany since the 19th century. The effect of such covers on the microclimate around artworks of natural stone, and hence, their protective capability are insufficiently documented and understood. In 2007, an inter-disciplinary model project and part of a pilot study coordinated by the Berlin State Office for the Protection of Monuments was planned with the aim of developing an innovative winter covering system for marble statuaries located on the Schlossbrücke in Berlin. Such a system would need to fulfil the various requirements for structural stability, aesthetics, climate and practical use. This applied research represents the first complex scientific study of the sustainability of a winter covering system. A climate monitoring system was designed to create a dense database for the numerical prediction of the effect of protective systems, and to compare the given climate conditions to the known factors influencing the marble deterioration. Based on these findings a prototype of an innovative shelter was designed and tested. The project shows, that beside a temporary covering regular inspection and maintenance combined with regular cleaning ensures an effective and sustainable protection of marble sculptures. Such a maintenance program is the precondition for preserving the sculptures of the Schlossbrücke as a historical ensemble. Important scientific results of the project are transferable to similar objects of Carrara marble. The results throw a new light on the conventional protection of such objects and leads to a discussion on the necessity of an all-season protection.

  8. Development of FIAT-based Thermal Protection System Mass Estimating Relationships for NASA's Multi-Mission Earth Entry Concep

    NASA Technical Reports Server (NTRS)

    Sepka, Steven Andrew; Zarchi, Kerry Agnes; Maddock, Robert W.; Samareh, Jamshid A.

    2011-01-01

    Mass Estimating Relationships (MERs) have been developed for use in the Program to Optimize Simulated Trajectories II (POST2) as part of NASA's multi-mission Earth Entry Vehicle (MMEEV) concept. MERs have been developed for the thermal protection systems of PICA and of Carbon Phenolic atop Advanced Carbon-Carbon on the forebody and for SIRCA and Acusil II on the backshell. How these MERs were developed, the resulting equations, model limitations, and model accuracy are discussed herein.

  9. [The systemic approach to the health protection in the workers of industrial enterprises].

    PubMed

    Oransky, I E; Razumov, A N; Fedorov, A A

    This paper presents the results of the systemic approach to the protection of health and prophylaxis of disability in the workers of industrial enterprises. The leading role in the technologies of rehabilitation (both short-term and long-term one) is played by the natural and physical therapeutic factors. The priority in the implementation of the therapeutic and health-promoting measures is given to the treatment based on the spa and health resort facilities as well as the factory health centers.

  10. Development Of FIAT-Based Thermal Protection System Mass Estimating Relationships For NASA's Multi-Mission Earth Entry Concept

    NASA Technical Reports Server (NTRS)

    Sepka, Steven; Trumble, Kerry A.; Maddock, Robert W.; Samareh, Jamshid

    2012-01-01

    Mass Estimating Relationships (MERs) have been developed for use in the Program to Optimize Simulated Trajectories II (POST2) as part of NASA's multi-mission Earth Entry Vehicle (MMEEV) concept. MERs have been developed for the thermal protection systems of PICA and of Carbon Phenolic atop Advanced Carbon-Carbon on the forebody and for SIRCA and Acusil II on the backshell. How these MERs were developed, the resulting equations, model limitations, and model accuracy are discussed herein.

  11. Fault-tolerant reactor protection system

    DOEpatents

    Gaubatz, Donald C.

    1997-01-01

    A reactor protection system having four divisions, with quad redundant sensors for each scram parameter providing input to four independent microprocessor-based electronic chassis. Each electronic chassis acquires the scram parameter data from its own sensor, digitizes the information, and then transmits the sensor reading to the other three electronic chassis via optical fibers. To increase system availability and reduce false scrams, the reactor protection system employs two levels of voting on a need for reactor scram. The electronic chassis perform software divisional data processing, vote 2/3 with spare based upon information from all four sensors, and send the divisional scram signals to the hardware logic panel, which performs a 2/4 division vote on whether or not to initiate a reactor scram. Each chassis makes a divisional scram decision based on data from all sensors. Each division performs independently of the others (asynchronous operation). All communications between the divisions are asynchronous. Each chassis substitutes its own spare sensor reading in the 2/3 vote if a sensor reading from one of the other chassis is faulty or missing. Therefore the presence of at least two valid sensor readings in excess of a set point is required before terminating the output to the hardware logic of a scram inhibition signal even when one of the four sensors is faulty or when one of the divisions is out of service.

  12. Fault-tolerant reactor protection system

    DOEpatents

    Gaubatz, D.C.

    1997-04-15

    A reactor protection system is disclosed having four divisions, with quad redundant sensors for each scram parameter providing input to four independent microprocessor-based electronic chassis. Each electronic chassis acquires the scram parameter data from its own sensor, digitizes the information, and then transmits the sensor reading to the other three electronic chassis via optical fibers. To increase system availability and reduce false scrams, the reactor protection system employs two levels of voting on a need for reactor scram. The electronic chassis perform software divisional data processing, vote 2/3 with spare based upon information from all four sensors, and send the divisional scram signals to the hardware logic panel, which performs a 2/4 division vote on whether or not to initiate a reactor scram. Each chassis makes a divisional scram decision based on data from all sensors. Each division performs independently of the others (asynchronous operation). All communications between the divisions are asynchronous. Each chassis substitutes its own spare sensor reading in the 2/3 vote if a sensor reading from one of the other chassis is faulty or missing. Therefore the presence of at least two valid sensor readings in excess of a set point is required before terminating the output to the hardware logic of a scram inhibition signal even when one of the four sensors is faulty or when one of the divisions is out of service. 16 figs.

  13. Adaptation and Implementation of a Science-Based Prevention System in Colombia: Challenges and Achievements

    PubMed Central

    Pérez-Gómez, Augusto; Mejía-Trujillo, Juliana; Brown, Eric C.; Eisenberg, Nicole

    2016-01-01

    During the last 2 years, the Colombian government and the Nuevos Rumbos Corporation have been implementing an adapted version of the Communities That Care (CTC) prevention system, called Comunidades Que se Cuidan (CQC) in Spanish, for use in Colombia. This brief report presents the process of implementing CQC and identifies some of the main challenges and achievements of implementing the system in eight communities in Colombia. Preliminary results of a pilot study of CQC implementation in Colombia show that prevention system development, including a focus on measuring community risk and protection, can be established successfully in Latin American communities despite a lack of rigorously tested prevention programs and strategies. Moreover, mobilizing community coalitions toward science-based prevention, with a focus on examining local risk and protective factor data, can spur development and evaluation of prevention efforts in Latin America. PMID:28154437

  14. A design assessment of multiwall, metallic stand-off, and RSI reusable thermal protection systems including space shuttle application

    NASA Technical Reports Server (NTRS)

    Jackson, L. R.; Dixon, S. C.

    1980-01-01

    The design and assessment of reusable surface insulation (RSI), metallic stand off and multiwall thermal protection systems (TPS) is discussed. Multiwall TPS is described in some detail, and analyses useful for design of multiwall are included. Results indicate that multiwall has the potential to satisfy the TPS design goals better than the other systems. The total mass of the stand-off TPS and of the metallic systems require less primary structure mass than the RSI system, since the nonbuckling skin criteria required for RSI may be removed. Continued development of multiwall TPS is required to verify its potential and to provide the necessary data base for design.

  15. Research on numerical simulation and protection of transient process in long-distance slurry transportation pipelines

    NASA Astrophysics Data System (ADS)

    Lan, G.; Jiang, J.; Li, D. D.; Yi, W. S.; Zhao, Z.; Nie, L. N.

    2013-12-01

    The calculation of water-hammer pressure phenomenon of single-phase liquid is already more mature for a pipeline of uniform characteristics, but less research has addressed the calculation of slurry water hammer pressure in complex pipelines with slurry flows carrying solid particles. In this paper, based on the developments of slurry pipelines at home and abroad, the fundamental principle and method of numerical simulation of transient processes are presented, and several boundary conditions are given. Through the numerical simulation and analysis of transient processes of a practical engineering of long-distance slurry transportation pipeline system, effective protection measures and operating suggestions are presented. A model for calculating the water impact of solid and fluid phases is established based on a practical engineering of long-distance slurry pipeline transportation system. After performing a numerical simulation of the transient process, analyzing and comparing the results, effective protection measures and operating advice are recommended, which has guiding significance to the design and operating management of practical engineering of longdistance slurry pipeline transportation system.

  16. Evaluation of environmental impact assessment system in Pakistan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nadeem, Obaidullah; Hameed, Rizwan

    2008-11-15

    Environmental impact assessment (EIA) was first introduced in Pakistan based on the Environmental Protection Ordinance 1983. The EIA process was further strengthened under the Pakistan Environmental Protection Act 1997, which became operational under EIA Regulations 2000. Despite a sound legal basis and comprehensive guidelines, evidence suggests that EIA has not yet evolved satisfactorily in Pakistan. An evaluation of the EIA system against systematic evaluation criteria, based on interviews with EIA approval authorities, consulting firms and experts, reveals various shortcomings of the EIA system. These mainly include; inadequate capacity of EIA approval authorities, deficiencies in screening and scoping, poor EIA quality,more » inadequate public participation and weak monitoring. Overall, EIA is used presently as a project justification tool rather than as a project planning tool to contribute to achieving sustainable development. Whilst shortcomings are challenging, central government has recently shown a high degree of commitment to the environmental protection by making EIA compulsory for all the public sector projects likely to have adverse environmental impacts. The paper identifies opportunities for taking advantage of the current environment for strengthening the EIA process.« less

  17. Legal issues of the electronic dental record: security and confidentiality.

    PubMed

    Szekely, D G; Milam, S; Khademi, J A

    1996-01-01

    Computer-based, electronic dental record keeping involves complex issues of patient privacy and the dental practitioner's ethical duty of confidentiality. Federal and state law is responding to the new legal issues presented by computer technology. Authenticating the electronic record in terms of ensuring its reliability and accuracy is essential in order to protect its admissibility as evidence in legal actions. Security systems must be carefully planned to limit access and provide for back-up and storage of dental records. Carefully planned security systems protect the patient from disclosure without the patient's consent and also protect the practitioner from the liability that would arise from such disclosure. Human errors account for the majority of data security problems. Personnel security is assured through pre-employment screening, employment contracts, policies, and staff education. Contracts for health information systems should include provisions for indemnification and ensure the confidentiality of the system by the vendor.

  18. DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Maiden, Wendy M.; Dionysiou, Ioanna; Frincke, Deborah A.

    2011-02-01

    For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, trust management is important for the acceptance of the mobile agent sensors and to protect the system from malicious behavior by insiders and entities that have penetrated network defenses. This paper examines the trust relationships, evidence, and decisions in a representative system and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. We then propose the DualTrust conceptual trust model. By addressing themore » autonomic manager’s bi-directional primary relationships in the ACS architecture, DualTrust is able to monitor the trustworthiness of the autonomic managers, protect the sensor swarm in a scalable manner, and provide global trust awareness for the orchestrating autonomic manager.« less

  19. Development, description, and application of a geographic information system data base for water resources in Karst Terrane in Greene County, Missouri. Water resources investigation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Waite, L.A.; Thomson, K.C.

    1993-12-31

    A geographic information system data base was developed for Greene County, Missouri, to provide data for use in the planning for the protection of water resources. The data base contains the following map layers: geology, cave entrances and passages, county and quadrangle boundary, dye traces, faults, geographic names, hypsography, hydrography, lineaments. Ozark aquifer potentiometric surface, public land survey system, sinkholes, soils, springs, and transportation.

  20. Combined Use of Systematic Conservation Planning, Species Distribution Modelling, and Connectivity Analysis Reveals Severe Conservation Gaps in a Megadiverse Country (Peru)

    PubMed Central

    Fajardo, Javier; Lessmann, Janeth; Bonaccorso, Elisa; Devenish, Christian; Muñoz, Jesús

    2014-01-01

    Conservation planning is crucial for megadiverse countries where biodiversity is coupled with incomplete reserve systems and limited resources to invest in conservation. Using Peru as an example of a megadiverse country, we asked whether the national system of protected areas satisfies biodiversity conservation needs. Further, to complement the existing reserve system, we identified and prioritized potential conservation areas using a combination of species distribution modeling, conservation planning and connectivity analysis. Based on a set of 2,869 species, including mammals, birds, amphibians, reptiles, butterflies, and plants, we used species distribution models to represent species' geographic ranges to reduce the effect of biased sampling and partial knowledge about species' distributions. A site-selection algorithm then searched for efficient and complementary proposals, based on the above distributions, for a more representative system of protection. Finally, we incorporated connectivity among areas in an innovative post-hoc analysis to prioritize those areas maximizing connectivity within the system. Our results highlight severe conservation gaps in the Coastal and Andean regions, and we propose several areas, which are not currently covered by the existing network of protected areas. Our approach helps to find areas that contribute to creating a more representative, connected and efficient network. PMID:25479411

  1. Base drive for paralleled inverter systems

    NASA Technical Reports Server (NTRS)

    Nagano, S. (Inventor)

    1980-01-01

    In a paralleled inverter system, a positive feedback current derived from the total current from all of the modules of the inverter system is applied to the base drive of each of the power transistors of all modules, thereby to provide all modules protection against open or short circuit faults occurring in any of the modules, and force equal current sharing among the modules during turn on of the power transistors.

  2. An E-payment system based on quantum group signature

    NASA Astrophysics Data System (ADS)

    Xiaojun, Wen

    2010-12-01

    Security and anonymity are essential to E-payment systems. However, existing E-payment systems will easily be broken into soon with the emergence of quantum computers. In this paper, we propose an E-payment system based on quantum group signature. In contrast to classical E-payment systems, our quantum E-payment system can protect not only the users' anonymity but also the inner structure of customer groups. Because of adopting the two techniques of quantum key distribution, a one-time pad and quantum group signature, unconditional security of our E-payment system is guaranteed.

  3. Design and evaluation of safety operation VR training system for robotic catheter surgery.

    PubMed

    Wang, Yu; Guo, Shuxiang; Li, Yaxin; Tamiya, Takashi; Song, Yu

    2018-01-01

    A number of remote robotic catheter systems have been developed to protect physicians from X-ray exposure in endovascular surgery. However, the teleoperation prevents the physicians sensing the force directly which may easily result in healthy vessels injured. To realize the safe operation, a tissue protection-based VR training system has been developed in this paper to prevent collateral damage by collision. The integrated VR simulator cannot only remind the novice possible collisions by visual signs, but also cooperate with the newly designed tissue protection mechanism to remit collision trauma beforehand. Such mechanism exploits the diameter variable pulley in order to implement the safe interaction between catheter and vasculature. To testify the effectiveness of the tissue protection in training system, we invited four non-medical students to participate the successive 5 days training session. The evaluation results show that the average impingement distance (representing tissue damage) to vascular wall has been reduced to 0.6 mm, and the collision frequency is greatly decreased which implies the realization of relative safe catheterization.

  4. A probabilistic sizing tool and Monte Carlo analysis for entry vehicle ablative thermal protection systems

    NASA Astrophysics Data System (ADS)

    Mazzaracchio, Antonio; Marchetti, Mario

    2010-03-01

    Implicit ablation and thermal response software was developed to analyse and size charring ablative thermal protection systems for entry vehicles. A statistical monitor integrated into the tool, which uses the Monte Carlo technique, allows a simulation to run over stochastic series. This performs an uncertainty and sensitivity analysis, which estimates the probability of maintaining the temperature of the underlying material within specified requirements. This approach and the associated software are primarily helpful during the preliminary design phases of spacecraft thermal protection systems. They are proposed as an alternative to traditional approaches, such as the Root-Sum-Square method. The developed tool was verified by comparing the results with those from previous work on thermal protection system probabilistic sizing methodologies, which are based on an industry standard high-fidelity ablation and thermal response program. New case studies were analysed to establish thickness margins on sizing heat shields that are currently proposed for vehicles using rigid aeroshells for future aerocapture missions at Neptune, and identifying the major sources of uncertainty in the material response.

  5. Video Transmission for Third Generation Wireless Communication Systems

    PubMed Central

    Gharavi, H.; Alamouti, S. M.

    2001-01-01

    This paper presents a twin-class unequal protected video transmission system over wireless channels. Video partitioning based on a separation of the Variable Length Coded (VLC) Discrete Cosine Transform (DCT) coefficients within each block is considered for constant bitrate transmission (CBR). In the splitting process the fraction of bits assigned to each of the two partitions is adjusted according to the requirements of the unequal error protection scheme employed. Subsequently, partitioning is applied to the ITU-T H.263 coding standard. As a transport vehicle, we have considered one of the leading third generation cellular radio standards known as WCDMA. A dual-priority transmission system is then invoked on the WCDMA system where the video data, after being broken into two streams, is unequally protected. We use a very simple error correction coding scheme for illustration and then propose more sophisticated forms of unequal protection of the digitized video signals. We show that this strategy results in a significantly higher quality of the reconstructed video data when it is transmitted over time-varying multipath fading channels. PMID:27500033

  6. Engineering Aerothermal Analysis for X-34 Thermal Protection System Design

    NASA Technical Reports Server (NTRS)

    Wurster, Kathryn E.; Riley, Christopher J.; Zoby, E. Vincent

    1998-01-01

    Design of the thermal protection system for any hypersonic flight vehicle requires determination of both the peak temperatures over the surface and the heating-rate history along the flight profile. In this paper, the process used to generate the aerothermal environments required for the X-34 Testbed Technology Demonstrator thermal protection system design is described as it has evolved from a relatively simplistic approach based on engineering methods applied to critical areas to one of detailed analyses over the entire vehicle. A brief description of the trajectory development leading to the selection of the thermal protection system design trajectory is included. Comparisons of engineering heating predictions with wind-tunnel test data and with results obtained using a Navier-Stokes flowfield code and an inviscid/boundary layer method are shown. Good agreement is demonstrated among all these methods for both the ground-test condition and the peak heating flight condition. Finally, the detailed analysis using engineering methods to interpolate the surface-heating-rate results from the inviscid/boundary layer method to predict the required thermal environments is described and results presented.

  7. Engineering Aerothermal Analysis for X-34 Thermal Protection System Design

    NASA Technical Reports Server (NTRS)

    Wurster, Kathryn E.; Riley, Christopher J.; Zoby, E. Vincent

    1998-01-01

    Design of the thermal protection system for any hypersonic flight vehicle requires determination of both the peak temperatures over the surface and the heating-rate history along the flight profile. In this paper, the process used to generate the aerothermal environments required for the X-34 Testbed Technology Demonstrator thermal protection system design is described as it has evolved from a relatively simplistic approach based on engineering methods applied to critical areas to one of detailed analyses over the entire vehicle. A brief description of the trajectory development leading to the selection of the thermal protection system design trajectory is included. Comparisons of engineering heating predictions with wind-tunnel test data and with results obtained using a Navier- Stokes flowfield code and an inviscid/boundary layer method are shown. Good agreement is demonstrated among all these methods for both the ground-test condition and the peak heating flight condition. Finally, the detailed analysis using engineering methods to interpolate the surface-heating-rate results from the inviscid/boundary layer method to predict the required thermal environments is described and results presented.

  8. GIS Fuzzy Expert System for the assessment of ecosystems vulnerability to fire in managing Mediterranean natural protected areas.

    PubMed

    Semeraro, Teodoro; Mastroleo, Giovanni; Aretano, Roberta; Facchinetti, Gisella; Zurlini, Giovanni; Petrosillo, Irene

    2016-03-01

    A significant threat to the natural and cultural heritage of Mediterranean natural protected areas (NPAs) is related to uncontrolled fires that can cause potential damages related to the loss or a reduction of ecosystems. The assessment and mapping of the vulnerability to fire can be useful to reduce landscape damages and to establish priority areas where it is necessary to plan measures to reduce the fire vulnerability. To this aim, a methodology based on an interactive computer-based system has been proposed in order to support NPA's management authority for the identification of vulnerable hotspots to fire through the selection of suitable indicators that allow discriminating different levels of sensitivity (e.g. Habitat relevance, Fragmentation, Fire behavior, Ecosystem Services, Vegetation recovery after fire) and stresses (agriculture, tourism, urbanization). In particular, a multi-criteria analysis based on Fuzzy Expert System (FES) integrated in a GIS environment has been developed in order to identify and map potential "hotspots" of fire vulnerability, where fire protection measures can be undertaken in advance. In order to test the effectiveness of this approach, this approach has been applied to the NPA of Torre Guaceto (Apulia Region, southern Italy). The most fire vulnerable areas are the patch of century-old forest characterized by high sensitivity and stress, and the wetlands and century-old olive groves due to their high sensitivity. The GIS fuzzy expert system provides evidence of its potential usefulness for the effective management of natural protected areas and can help conservation managers to plan and intervene in order to mitigate the fire vulnerability in accordance with conservation goals. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Future Short Range Ground-Based Air Defence: System Drivers, Characteristics and Architectures

    DTIC Science & Technology

    2001-03-01

    vulnerable being on the right. Although for completeness the defended asset characteristics shown in Table 1 are based upon a conventional armoured formation...Camouflage scrimmed draped visual full/thermal EMCON 4 3 2 1 Visibility line of sight occulting/obscured non line of sight "Contact static FLOT fluid...confused mel~e Armour soft semi-hard hard defensive aids Protection Digging in open under cover dug in full o/h protection AD none AAAD CAD fully

  10. An implementation of a security infrastructure compliant with the Italian Personal Data Protection Code in a web-based cooperative work system.

    PubMed

    Eccher, Claudio; Eccher, Lorenzo; Izzo, Umberto

    2005-01-01

    In this poster we describe the security solutions implemented in a web-based cooperative work frame-work for managing heart failure patients among different health care professionals involved in the care process. The solution, developed in close collaboration with the Law Department of the University of Trento, is compliant with the new Italian Personal Data Protection Code, issued in 2003, that regulates also the storing and processing of health data.

  11. Hydrological Monitoring System Design and Implementation Based on IOT

    NASA Astrophysics Data System (ADS)

    Han, Kun; Zhang, Dacheng; Bo, Jingyi; Zhang, Zhiguang

    In this article, an embedded system development platform based on GSM communication is proposed. Through its application in hydrology monitoring management, the author makes discussion about communication reliability and lightning protection, suggests detail solutions, and also analyzes design and realization of upper computer software. Finally, communication program is given. Hydrology monitoring system from wireless communication network is a typical practical application of embedded system, which has realized intelligence, modernization, high-efficiency and networking of hydrology monitoring management.

  12. Quality of Protection Evaluation of Security Mechanisms

    PubMed Central

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol. PMID:25136683

  13. A manned lunar outpost. Design considerations for three key elements in an initial manned lunar outpost

    NASA Technical Reports Server (NTRS)

    Bell, Larry; Trotti, Guillermo; Brown, Jeff; Bhattacharya, Nilajan; Moore, Nathan; Polette, Tom; Toups, Larry

    1988-01-01

    The Initial Manned Lunar Outpost (IMLO) is proposed as the initial permanent base for manned activities on the Moon. The study concentrated on identifying the equipment, support systems, and initial base configuration necessary to accomplish the various science, industrial and exploration activities planned. The primary concepts of the MLO were the use of hard modules for habitation areas creating a flexible, modular transportation system; designing a multi-functional vehicle; and using an overhead radiation protection system. The transportation system, dubbed the Lunar Mobile Surface Transport System (LMSTS), carries the hard modules to the surface of the moon and provides a method to move them to the desired location through the use of interchangeable pallets. The avionics pallets are changed-out with wheel and hitch pallets, transforming the LMSTS into a "tractor trailer" used with the Multi-Functional Vehicle (MFV). The modules are placed under the Regolith Support Structure (RSS) which provides a stable environment and radiation protection for the entire base. The overhead structure was chosen over simply burying the modules to provide a study on the advantages and disadvantages of this type of system. The advantages include easy access to the exterior of the modules, providing a protected area for vehicles and equipment used in EVA, and creating an area of constant temperature. Disadvantages include a need for prefabrication of structural components, including the preconstruction and construction phases of the initial MLO. The design approach taken considered existing and near-term materials and technology only, without the consideration of possible future building technologies.

  14. Countering MANPADS: study of new concepts and applications

    NASA Astrophysics Data System (ADS)

    Maltese, Dominique; Robineau, Jacques; Audren, Jean-Thierry; Aragones, Julien; Sailliot, Christophe

    2006-05-01

    The latest events of ground-to-air Man Portable Air Defense (MANPAD) attacks against aircraft have revealed a new threat both for military and civilian aircraft. Consequently, the implementation of Protecting systems (i.e. Directed InfraRed Counter Measure - DIRCM) in order to face IR guided missiles turns out to be now inevitable. In a near future, aircraft will have to possess detection, tracking, targeting and jamming capabilities to face single and multiple MANPAD threats fired in short-range scenarios from various environments (urban sites, landscape...). In this paper, a practical example of a DIRCM system under study at SAGEM DEFENSE & SECURITY company is presented. The self-protection solution includes built-in and automatic locking-on, tracking, identification and laser jamming capabilities, including defeat assessment. Target Designations are provided by a Missile Warning System. Multiple Target scenarios have been considered to design the system architecture. The article deals with current and future threats (IR seekers of different generations...), scenarios and platforms for system definition. Plus, it stresses on self-protection solutions based on laser jamming capability. Different strategies including target identification, multi band laser, active imagery are described. The self-protection system under study at SAGEM DEFENSE & SECURITY company is also a part of this chapter. Eventually, results of self-protection scenarios are provided for different MANPAD scenarios. Data have been obtained from a simulation software. The results highlight how the system reacts to incoming IR-guided missiles in short time scenarios.

  15. The links between protected areas, faiths, and sacred natural sites.

    PubMed

    Dudley, Nigel; Higgins-Zogib, Liza; Mansourian, Stephanie

    2009-06-01

    Most people follow and are influenced by some kind of spiritual faith. We examined two ways in which religious faiths can in turn influence biodiversity conservation in protected areas. First, biodiversity conservation is influenced through the direct and often effective protection afforded to wild species in sacred natural sites and in seminatural habitats around religious buildings. Sacred natural sites are almost certainly the world's oldest form of habitat protection. Although some sacred natural sites exist inside official protected areas, many thousands more form a largely unrecognized "shadow" conservation network in many countries throughout the world, which can be more stringently protected than state-run reserves. Second, faiths have a profound impact on attitudes to protection of the natural world through their philosophy, teachings, investment choices, approaches to land they control, and religious-based management systems. We considered the interactions between faiths and protected areas with respect to all 11 mainstream faiths and to a number of local belief systems. The close links between faiths and habitat protection offer major conservation opportunities, but also pose challenges. Bringing a sacred natural site into a national protected-area system can increase protection for the site, but may compromise some of its spiritual values or even its conservation values. Most protected-area managers are not trained to manage natural sites for religious purposes, but many sacred natural sites are under threat from cultural changes and habitat degradation. Decisions about whether or not to make a sacred natural site an "official" protected area therefore need to be made on a case-by-case basis. Such sites can play an important role in conservation inside and outside official protected areas. More information about the conservation value of sacred lands is needed as is more informed experience in integrating these into wider conservation strategies. In addition, many protected-area staff need training in how to manage sensitive issues relating to faiths where important faith sites occur in protected areas. ©2009 Society for Conservation Biology.

  16. Assessment of groundwater quality using geographical information system (GIS), at north-east Cairo, Egypt.

    PubMed

    El-Shahat, M F; Sadek, M A; Mostafa, W M; Hagagg, K H

    2016-04-01

    The present investigation has been conducted to delineate the hydrogeochemical and environmental factors that control the water quality of the groundwater resources in the north-east of Cairo. A complementary approach based on hydrogeochemistry and a geographical information system (GIS) based protectability index has been employed for conducting this work. The results from the chemical analysis revealed that the groundwater of the Quaternary aquifer is less saline than that of the Miocene aquifer and the main factors that control the groundwater salinity in the studied area are primarily related to the genesis of the original recharging water modified after by leaching, dissolution, cation exchange, and fertilizer leachate. The computed groundwater quality index (WQI) falls into two categories: fair for almost all the Miocene groundwater samples, while the Quaternary groundwater samples are all have a good quality. The retarded flow and non-replenishment of the Miocene aquifer compared to the renewable active recharge of the Quaternary aquifer can explain this variation of WQI. The index and overlay approach exemplified by the DUPIT index has been used to investigate the protectability of the study aquifers against diffuse pollutants. Three categories (highly protectable less vulnerable, moderately protectable moderately vulnerable and less protectable highly vulnerable) have been determined and areally mapped.

  17. Security Systems Commissioning: An Old Trick for Your New Dog

    ERIC Educational Resources Information Center

    Black, James R.

    2009-01-01

    Sophisticated, software-based security systems can provide powerful tools to support campus security. By nature, such systems are flexible, with many capabilities that can help manage the process of physical protection. However, the full potential of these systems can be overlooked because of unfamiliarity with the products, weaknesses in security…

  18. Overview of Boundary Layer Transition Research in Support of Orbiter Return To Flight

    NASA Technical Reports Server (NTRS)

    Berry, Scott A.; Horvath, Thomas J.; Greene, Francis A.; Kinder, Gerald R.; Wang, K. C.

    2006-01-01

    A predictive tool for estimating the onset of boundary layer transition resulting from damage to and/or repair of the thermal protection system was developed in support of Shuttle Return to Flight. The boundary layer transition tool is part of a suite of tools that analyze the aerothermodynamic environment to the local thermal protection system to allow informed disposition of damage for making recommendations to fly as is or to repair. Using mission specific trajectory information and details of each damage site or repair, the expected time (and thus Mach number) at transition onset is predicted to help define the aerothermodynamic environment to use in the subsequent thermal and stress analysis of the local thermal protection system and structure. The boundary layer transition criteria utilized for the tool was developed from ground-based measurements to account for the effect of both protuberances and cavities and has been calibrated against select flight data. Computed local boundary layer edge conditions were used to correlate the results, specifically the momentum thickness Reynolds number over the edge Mach number and the boundary layer thickness. For the initial Return to Flight mission, STS-114, empirical curve coefficients of 27, 100, and 900 were selected to predict transition onset for protuberances based on height, and cavities based on depth and length, respectively.

  19. Fire Pumps: Time to Change NFPA 25 Weekly Churn Testing

    ERIC Educational Resources Information Center

    Saidi, John F.; Davis, Richard J.

    2010-01-01

    APPA, through its Code Advocacy Task Force (CATF), is active with code organizations such as the National Fire Protection Association (NFPA). This article reviews some of the recent work on NFPA 25, Standard for the Inspection, Testing, and Maintenance of Water-Based Fire Protection Systems, by the CATF and some members of the NFPA 25 Technical…

  20. Developing Evidence-Based Child Protection Practice: A View from Germany

    ERIC Educational Resources Information Center

    Kindler, Heinz

    2008-01-01

    The child welfare system in Germany has been described as family service-oriented because families in need are entitled to request family support services. If there is any form of child maltreatment, there may be some kind of mandatory state intervention to protect the child. Using trends in the number of children affected by maltreatment, the…

  1. How To: Protect against a Zero-Hour Attack

    ERIC Educational Resources Information Center

    McCarthy, Rob

    2005-01-01

    In the last year, a series of viruses and worms that caused damage across the Internet in record time has made very clear how vulnerable computer systems are. The MS Blaster, Slammer, Sasser, and Korgo.W worms have shown that signature-based antivirus software and traditional firewalls are not enough to protect networks. Everyone is worried about…

  2. AEROMETRIC INFORMATION RETRIEVAL SYSTEM (AIRS) - GRAPHICS

    EPA Science Inventory

    Aerometric Information Retrieval System (AIRS) is a computer-based repository of information about airborne pollution in the United States and various World Health Organization (WHO) member countries. AIRS is administered by the U.S. Environmental Protection Agency, and runs on t...

  3. Protected areas reduced poverty in Costa Rica and Thailand

    PubMed Central

    Andam, Kwaw S.; Ferraro, Paul J.; Sims, Katharine R. E.; Healy, Andrew; Holland, Margaret B.

    2010-01-01

    As global efforts to protect ecosystems expand, the socioeconomic impact of protected areas on neighboring human communities continues to be a source of intense debate. The debate persists because previous studies do not directly measure socioeconomic outcomes and do not use appropriate comparison groups to account for potential confounders. We illustrate an approach using comprehensive national datasets and quasi-experimental matching methods. We estimate impacts of protected area systems on poverty in Costa Rica and Thailand and find that although communities near protected areas are indeed substantially poorer than national averages, an analysis based on comparison with appropriate controls does not support the hypothesis that these differences can be attributed to protected areas. In contrast, the results indicate that the net impact of ecosystem protection was to alleviate poverty. PMID:20498058

  4. Dynamic state estimation assisted power system monitoring and protection

    NASA Astrophysics Data System (ADS)

    Cui, Yinan

    The advent of phasor measurement units (PMUs) has unlocked several novel methods to monitor, control, and protect bulk electric power systems. This thesis introduces the concept of "Dynamic State Estimation" (DSE), aided by PMUs, for wide-area monitoring and protection of power systems. Unlike traditional State Estimation where algebraic variables are estimated from system measurements, DSE refers to a process to estimate the dynamic states associated with synchronous generators. This thesis first establishes the viability of using particle filtering as a technique to perform DSE in power systems. The utility of DSE for protection and wide-area monitoring are then shown as potential novel applications. The work is presented as a collection of several journal and conference papers. In the first paper, we present a particle filtering approach to dynamically estimate the states of a synchronous generator in a multi-machine setting considering the excitation and prime mover control systems. The second paper proposes an improved out-of-step detection method for generators by means of angular difference. The generator's rotor angle is estimated with a particle filter-based dynamic state estimator and the angular separation is then calculated by combining the raw local phasor measurements with this estimate. The third paper introduces a particle filter-based dual estimation method for tracking the dynamic states of a synchronous generator. It considers the situation where the field voltage measurements are not readily available. The particle filter is modified to treat the field voltage as an unknown input which is sequentially estimated along with the other dynamic states. The fourth paper proposes a novel framework for event detection based on energy functions. The key idea is that any event in the system will leave a signature in WAMS data-sets. It is shown that signatures for four broad classes of disturbance events are buried in the components that constitute the energy function for the system. This establishes a direct correspondence (or mapping) between an event and certain component(s) of the energy function. The last paper considers the dynamic latency effect when the measurements and estimated dynamics are transmitted from remote ends to a centralized location through the networks.

  5. Gradient complex protective coatings for single-crystal turbine blades of high-heat gas turbine engines

    NASA Astrophysics Data System (ADS)

    Kuznetsov, V. P.; Lesnikov, V. P.; Muboyadzhyan, S. A.; Repina, O. V.

    2007-05-01

    Complex diffusion-condensation protective coatings characterized by gradient distribution of alloying elements over the thickness due to formation of a diffusion barrier layer on the surface of blades followed by deposition of condensation alloyed layers based on the Ni-Co-Cr-Al-Y system and an external layer based on a NiAl alloyed β-phase and a ZrO2: Y2O3 ceramics are presented. A complex gradient coating possessing unique protective properties at t = 1100-1200°C for single-crystal blades from alloy ZhS36VI for advanced gas turbine engines with gas temperature of 1550°C at the inlet to the turbine is described.

  6. Research on Harmonic Characteristic of Electronic Current Transformer Based on the Rogowski Coil

    NASA Astrophysics Data System (ADS)

    Shen, Diqiu; Hu, Bei; Wang, Xufeng; Zhu, Mingdong; Wang, Liang; Lu, Wenxing

    2017-05-01

    The nonlinear load present in the power system will cause the distortion of AC sine wave and generate the harmonic, which havea severe impact on the accuracy of energy metering and reliability of relay protection. Tosatisfy the requirements of energy metering and relay protection for the new generation of intelligent substation, based on the working principle of Rogowski coil current transformer, mathematical model and transfer characteristics of Rogowski coil sensors were studied in this paper, and frequency response characteristics of Rogowski coil current transformer system were analysed. Finally, the frequency response characteristics of the Rogowski coil current transformer at 2 to 13 harmonics was simulated and experimented. Simulation and experiments show that Rogowski coil current transformer couldmeet 0.2 accuracy requirements of harmonic power measurement of power system, and measure the harmonic components of the grid reliably.

  7. The New York City Neighborhood-Based Services Strategy

    ERIC Educational Resources Information Center

    Chahine, Zeinab; van Straaten, Justine; Williams-Isom, Anne

    2005-01-01

    The New York City Administration for Children's Services (ACS) instituted a neighborhood-based services system through the realignment of all foster care, preventive, and protective services along community district lines. ACS, with its community partners, also formed neighborhood-based networks to improve service coordination and collaboration…

  8. Numerical investigations of cooling holes system role in the protection of the walls of a gas turbine combustion chamber

    NASA Astrophysics Data System (ADS)

    Ben Sik Ali, Ahlem; Kriaa, Wassim; Mhiri, Hatem; Bournot, Philippe

    2012-05-01

    Numerical simulations in a gas turbine Swirl stabilized combustor were conducted to investigate the effectiveness of a cooling system in the protection of combustor walls. The studied combustion chamber has a high degree of geometrical complexity related to the injection system as well as the cooling system based on a big distribution of small holes (about 3,390 holes) bored on the flame tube walls. Two cases were considered respectively the flame tube without and with its cooling system. The calculations were carried out using the industrial CFD code FLUENT 6.2. The various simulations made it possible to highlight the role of cooling holes in the protection of the flame tube walls against the high temperatures of the combustion products. In fact, the comparison between the results of the two studied cases demonstrated that the walls temperature can be reduced by about 800°C by the mean of cooling holes technique.

  9. Advanced Extravehicular Protective System (AEPS) study

    NASA Technical Reports Server (NTRS)

    Williams, J. L.; Webbon, B. W.; Copeland, R. J.

    1972-01-01

    A summary is presented of Advanced Extravehicular Protective Systems (AEPS) for the future missions beyond Skylab in earth orbit, on the lunar surface, and on the Martian surface. The study concentrated on the origination of regenerable life support concepts for use in portable extravehicular protective systems, and included evaluation and comparison with expendable systems, and selection of life support subsystems. The study was conducted in two phases. In the first phase, subsystem concepts for performing life support functions in AEPS which are regenerable or partially regenerable were originated, and in addition, expendable subsystems were considered. Parametric data for each subsystem concept were evolved including subsystem weight and volume, power requirement, thermal control requirement; base regeneration equipment weight and volume, requirement. The second phase involved an evaluation of the impact of safety considerations involving redundant and/or backup systems on the selection of the regenerable life support subsystems. In addition, the impact of the space shuttle program on regenerable life support subsystem development was investigated.

  10. Research in DRM architecture based on watermarking and PKI

    NASA Astrophysics Data System (ADS)

    Liu, Ligang; Chen, Xiaosu; Xiao, Dao-ju; Yi, Miao

    2005-02-01

    Analyze the virtue and disadvantage of the present digital copyright protecting system, design a kind of security protocol model of digital copyright protection, which equilibrium consider the digital media"s use validity, integrality, security of transmission, and trade equity, make a detailed formalize description to the protocol model, analyze the relationship of the entities involved in the digital work copyright protection. The analysis of the security and capability of the protocol model shows that the model is good at security and practicability.

  11. Hybrid ququart-encoded quantum cryptography protected by Kochen-Specker contextuality

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cabello, Adan; Department of Physics, Stockholm University, S-10691 Stockholm; D'Ambrosio, Vincenzo

    2011-09-15

    Quantum cryptographic protocols based on complementarity are not secure against attacks in which complementarity is imitated with classical resources. The Kochen-Specker (KS) theorem provides protection against these attacks, without requiring entanglement or spatially separated composite systems. We analyze the maximum tolerated noise to guarantee the security of a KS-protected cryptographic scheme against these attacks and describe a photonic realization of this scheme using hybrid ququarts defined by the polarization and orbital angular momentum of single photons.

  12. The upgraded data acquisition system for beam loss monitoring at the Fermilab Tevatron and Main Injector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baumbaugh, A.; Briegel, C.; Brown, B.C.

    2011-11-01

    A VME-based data acquisition system for beam-loss monitors has been developed and is in use in the Tevatron and Main Injector accelerators at the Fermilab complex. The need for enhanced beam-loss protection when the Tevatron is operating in collider-mode was the main driving force for the new design. Prior to the implementation of the present system, the beam-loss monitor system was disabled during collider operation and protection of the Tevatron magnets relied on the quench protection system. The new Beam-Loss Monitor system allows appropriate abort logic and thresholds to be set over the full set of collider operating conditions. Themore » system also records a history of beam-loss data prior to a beam-abort event for post-abort analysis. Installation of the Main Injector system occurred in the fall of 2006 and the Tevatron system in the summer of 2007. Both systems were fully operation by the summer of 2008. In this paper we report on the overall system design, provide a description of its normal operation, and show a number of examples of its use in both the Main Injector and Tevatron.« less

  13. The upgraded data acquisition system for beam loss monitoring at the Fermilab Tevatron and Main Injector

    NASA Astrophysics Data System (ADS)

    Baumbaugh, A.; Briegel, C.; Brown, B. C.; Capista, D.; Drennan, C.; Fellenz, B.; Knickerbocker, K.; Lewis, J. D.; Marchionni, A.; Needles, C.; Olson, M.; Pordes, S.; Shi, Z.; Still, D.; Thurman-Keup, R.; Utes, M.; Wu, J.

    2011-11-01

    A VME-based data acquisition system for beam-loss monitors has been developed and is in use in the Tevatron and Main Injector accelerators at the Fermilab complex. The need for enhanced beam-loss protection when the Tevatron is operating in collider-mode was the main driving force for the new design. Prior to the implementation of the present system, the beam-loss monitor system was disabled during collider operation and protection of the Tevatron magnets relied on the quench protection system. The new Beam-Loss Monitor system allows appropriate abort logic and thresholds to be set over the full set of collider operating conditions. The system also records a history of beam-loss data prior to a beam-abort event for post-abort analysis. Installation of the Main Injector system occurred in the fall of 2006 and the Tevatron system in the summer of 2007. Both systems were fully operation by the summer of 2008. In this paper we report on the overall system design, provide a description of its normal operation, and show a number of examples of its use in both the Main Injector and Tevatron.

  14. 40 CFR 1065.1105 - Sampling system design.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 33 2014-07-01 2014-07-01 false Sampling system design. 1065.1105... Compounds § 1065.1105 Sampling system design. (a) General. We recommend that you design your SVOC batch... practical, adjust sampling times based on the emission rate of target analytes from the engine to obtain...

  15. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 33 2014-07-01 2014-07-01 false Vulnerable zone indicator system. 1400... INFORMATION Public Access § 1400.4 Vulnerable zone indicator system. (a) In general. The Administrator shall provide access to a computer-based indicator that shall inform any person located in any state whether an...

  16. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 34 2012-07-01 2012-07-01 false Vulnerable zone indicator system. 1400... INFORMATION Public Access § 1400.4 Vulnerable zone indicator system. (a) In general. The Administrator shall provide access to a computer-based indicator that shall inform any person located in any state whether an...

  17. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 34 2013-07-01 2013-07-01 false Vulnerable zone indicator system. 1400... INFORMATION Public Access § 1400.4 Vulnerable zone indicator system. (a) In general. The Administrator shall provide access to a computer-based indicator that shall inform any person located in any state whether an...

  18. 40 CFR 1400.4 - Vulnerable zone indicator system.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 33 2011-07-01 2011-07-01 false Vulnerable zone indicator system. 1400... INFORMATION Public Access § 1400.4 Vulnerable zone indicator system. (a) In general. The Administrator shall provide access to a computer-based indicator that shall inform any person located in any state whether an...

  19. Security of Personal Computer Systems: A Management Guide.

    ERIC Educational Resources Information Center

    Steinauer, Dennis D.

    This report describes management and technical security considerations associated with the use of personal computer systems as well as other microprocessor-based systems designed for use in a general office environment. Its primary objective is to identify and discuss several areas of potential vulnerability and associated protective measures. The…

  20. State-of the-art review on the renal and visceral protection during open thoracoabdominal aortic aneurysm repair.

    PubMed

    Waked, Karl; Schepens, Marc

    2018-01-01

    During open thoracoabdominal aortic aneurysm repair (OTAAAR), there is an inevitable organ ischemic period that occurs when the abdominal arteries are being reattached to the aortic graft. Despite various protective techniques, the incidence of renal and visceral complications remains substantial. This state-of-the-art review gives an overview of the current and most evidence-based organ protection methods during OTAAAR, based on the most recent publications and personal experience. An electronic search was performed in four medical databases, using the following MeSH terms: thoracoabdominal aneurysm, TAAAR, visceral protection, renal protection, kidney, perfusion, and intestines. Every publication type was considered. The literature search was ended on August 31st, 2017. The left heart bypass (LHB) is currently the most frequent adjunct to provide distal aortic perfusion (DAP) during aortic clamping. Together with systemic hypothermia, it forms the cornerstone in organ protection during aortic clamping. Further renal protection can be obtained by selective renal perfusion (SRP) with cold blood or cold crystalloid solution, the latter enriched with mannitol. The perfusion should be administered in a volume- and pressure-controlled way and, if possible, by use of a pulsatile pump. Selective visceral perfusion (SVP) is not routinely used, as it does not provide adequate blood flow for visceral protection. The best way to protect the intestines is by minimizing the ischemic time. The preservation of renal and visceral function after OTAAAR can only be obtained with specific strategies before, during, and after the operation. This involves a series of measures, including selective digestive decontamination (SDD), avoidance of nephrotoxic drugs, minimizing the renal and intestinal ischemic time, systemic cooling, avoidance of hemodynamic instability, and regional protective perfusion of the kidneys. Future innovations in catheters, cardiac bypass flow types, mechanical components, hybrid vascular grafts, and pharmaceutical protection measures will hopefully further reduce organ complications.

  1. Optimal and centralized reservoir management for drought and flood protection via Stochastic Dual Dynamic Programming on the Upper Seine-Aube River system

    NASA Astrophysics Data System (ADS)

    Chiavico, Mattia; Raso, Luciano; Dorchies, David; Malaterre, Pierre-Olivier

    2015-04-01

    Seine river region is an extremely important logistic and economic junction for France and Europe. The hydraulic protection of most part of the region relies on four controlled reservoirs, managed by EPTB Seine-Grands Lacs. Presently, reservoirs operation is not centrally coordinated, and release rules are based on empirical filling curves. In this study, we analyze how a centralized release policy can face flood and drought risks, optimizing water system efficiency. The optimal and centralized decisional problem is solved by Stochastic Dual Dynamic Programming (SDDP) method, minimizing an operational indicator for each planning objective. SDDP allows us to include into the system: 1) the hydrological discharge, specifically a stochastic semi-distributed auto-regressive model, 2) the hydraulic transfer model, represented by a linear lag and route model, and 3) reservoirs and diversions. The novelty of this study lies on the combination of reservoir and hydraulic models in SDDP for flood and drought protection problems. The study case covers the Seine basin until the confluence with Aube River: this system includes two reservoirs, the city of Troyes, and the Nuclear power plant of Nogent-Sur-Seine. The conflict between the interests of flood protection, drought protection, water use and ecology leads to analyze the environmental system in a Multi-Objective perspective.

  2. Microencapsulation of Self Healing Agents for Corrosion Control Coatings

    NASA Technical Reports Server (NTRS)

    Jolley, S. T.; Li, W.; Buhrow, J. W.; Calle, L. M.

    2011-01-01

    Corrosion, the environmentally induced degradation of materials, is a very costly problem that has a major impact on the global economy. Results from a 2-year breakthrough study released in 2002 by the U.S. Federal Highway Administration (FHWA) showed that the total annual estimated direct cost associated with metallic corrosion in nearly every U.S. industry sector was a staggering $276 billion, approximately 3.1% of the nation's Gross Domestic Product (GOP). Corrosion protective coatings are widely used to protect metallic structures from the detrimental effects of corrosion but their effectiveness can be seriously compromised by mechanical damage, such as a scratch, that exposes the metallic substrate. The incorporation of a self healing mechanism into a corrosion control coating would have the potential to significantly increase its effectiveness and useful lifetime. This paper describes work performed to incorporate a number of microcapsule-based self healing systems into corrosion control coatings. The work includes the preparation and evaluation of self-healing systems based on curable epoxy, acrylate, and siloxane resins, as well as, microencapsulated systems based on passive, solvent born, healing agent delivery. The synthesis and optimization of microcapsule-based self healing systems for thin coating (less than 100 micron) will be presented.

  3. Measuring the effectiveness of protected area networks in reducing deforestation.

    PubMed

    Andam, Kwaw S; Ferraro, Paul J; Pfaff, Alexander; Sanchez-Azofeifa, G Arturo; Robalino, Juan A

    2008-10-21

    Global efforts to reduce tropical deforestation rely heavily on the establishment of protected areas. Measuring the effectiveness of these areas is difficult because the amount of deforestation that would have occurred in the absence of legal protection cannot be directly observed. Conventional methods of evaluating the effectiveness of protected areas can be biased because protection is not randomly assigned and because protection can induce deforestation spillovers (displacement) to neighboring forests. We demonstrate that estimates of effectiveness can be substantially improved by controlling for biases along dimensions that are observable, measuring spatial spillovers, and testing the sensitivity of estimates to potential hidden biases. We apply matching methods to evaluate the impact on deforestation of Costa Rica's renowned protected-area system between 1960 and 1997. We find that protection reduced deforestation: approximately 10% of the protected forests would have been deforested had they not been protected. Conventional approaches to evaluating conservation impact, which fail to control for observable covariates correlated with both protection and deforestation, substantially overestimate avoided deforestation (by over 65%, based on our estimates). We also find that deforestation spillovers from protected to unprotected forests are negligible. Our conclusions are robust to potential hidden bias, as well as to changes in modeling assumptions. Our results show that, with appropriate empirical methods, conservation scientists and policy makers can better understand the relationships between human and natural systems and can use this to guide their attempts to protect critical ecosystem services.

  4. Out-of-pocket expenditure and financial protection in the Chilean health care system-A systematic review.

    PubMed

    Koch, Kira Johanna; Cid Pedraza, Camilo; Schmid, Andreas

    2017-05-01

    Protection against financial risk due to medical spending is an explicit health guarantee within Chile's AUGE health reform. This paper seeks to analyze the degree to which out-of-pocket expenditure still expose Chilean households to financial catastrophe and impoverishment, and to explore inequalities in financial protection. A systematic literature review was conducted to identify empirical studies analyzing financial protection in Chile. The search included databases as well as grey literature, i.e. governmental and institutional webpages. The indicators are based on the conceptual framework of financial protection, as portrayed in the World Health Report 2013. We identify n=16 studies that fulfill the inclusion criteria. Empirical studies indicate that 4% of Chilean households faced catastrophic health expenditure defined as out-of-pocket expenditure exceeding 30% of household's capacity to pay, while less than 1% were pushed into poverty in 2012. In contrast to prior studies, recent data report that even publicly insured who should be fully protected from co-payments were affected by catastrophic health expenditure. Also in the private insurance system financial catastrophe is a common risk. Despite health reform efforts, financial protection is insufficient and varies to the disadvantage of the poor and vulnerable groups. More research is required to understand why current mechanisms are not as effective as expected and to enable according reforms of the insurance system. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Interlock system for machine protection of the KOMAC 100-MeV proton linac

    NASA Astrophysics Data System (ADS)

    Song, Young-Gi

    2015-02-01

    The 100-MeV proton linear accelerator of the Korea Multi-purpose Accelerator Complex (KOMAC) has been developed. The beam service started this year after performing the beam commissioning. If the very sensitive and essential equipment is to be protected during machine operation, a machine interlock system is required, and the interlock system has been implemented. The purpose of the interlock system is to shut off the beam when the radio-frequency (RF) and ion source are unstable or a beam loss occurs. The interlock signal of the KOMAC linac includes a variety of sources, such as the beam loss, RF and high-voltage converter modulator faults, and fast closing valves of the vacuum window at the beam lines and so on. This system consists of a hardware-based interlock system using analog circuits and a software-based interlock system using an industrial programmable logic controller (PLC). The hardware-based interlock system has been fabricated, and the requirement has been satisfied with the results being within 10 µs. The software logic interlock system using the PLC has been connected to the framework of with the experimental physics and industrial control system (EPICS) to integrate a variety of interlock signals and to control the machine components when an interlock occurs. This paper will describe the design and the construction of the machine interlock system for the KOMAC 100-MeV linac.

  6. A test-based method for the assessment of pre-crash warning and braking systems.

    PubMed

    Bálint, András; Fagerlind, Helen; Kullgren, Anders

    2013-10-01

    In this paper, a test-based assessment method for pre-crash warning and braking systems is presented where the effectiveness of a system is measured by its ability to reduce the number of injuries of a given type or severity in car-to-car rear-end collisions. Injuries with whiplash symptoms lasting longer than 1 month and MAIS2+ injuries in both vehicles involved in the crash are considered in the assessment. The injury reduction resulting from the impact speed reduction due to a pre-crash system is estimated using a method which has its roots in the dose-response model. Human-machine interaction is also taken into account in the assessment. The results reflect the self-protection as well as the partner-protection performance of a pre-crash system in the striking vehicle in rear-end collisions and enable a comparison between two or more systems. It is also shown how the method may be used to assess the importance of warning as part of a pre-crash system. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. “SmartMonitor” — An Intelligent Security System for the Protection of Individuals and Small Properties with the Possibility of Home Automation

    PubMed Central

    Frejlichowski, Dariusz; Gościewska, Katarzyna; Forczmański, Paweł; Hofman, Radosław

    2014-01-01

    “SmartMonitor” is an intelligent security system based on image analysis that combines the advantages of alarm, video surveillance and home automation systems. The system is a complete solution that automatically reacts to every learned situation in a pre-specified way and has various applications, e.g., home and surrounding protection against unauthorized intrusion, crime detection or supervision over ill persons. The software is based on well-known and proven methods and algorithms for visual content analysis (VCA) that were appropriately modified and adopted to fit specific needs and create a video processing model which consists of foreground region detection and localization, candidate object extraction, object classification and tracking. In this paper, the “SmartMonitor” system is presented along with its architecture, employed methods and algorithms, and object analysis approach. Some experimental results on system operation are also provided. In the paper, focus is put on one of the aforementioned functionalities of the system, namely supervision over ill persons. PMID:24905854

  8. Referral criteria and clinical decision support: radiological protection aspects for justification.

    PubMed

    Pérez, M del Rosario

    2015-06-01

    Advanced imaging technology has opened new horizons for medical diagnostics and improved patient care. However, many procedures are unjustified and do not provide a net benefit. An area of particular concern is the unnecessary use of radiation when clinical evaluation or other imaging modalities could provide an accurate diagnosis. Referral criteria for medical imaging are consensus statements based on the best-available evidence to assist the decision-making process when choosing the best imaging procedure for a given patient. Although they are advisory rather than compulsory, physicians should have good reasons for deviation from these criteria. Voluntary use of referral criteria has shown limited success compared with integration into clinical decision support systems. These systems support good medical practice, can improve health service delivery, and foster safer, more efficient, fair, cost-effective care, thus contributing to the strengthening of health systems. Justification of procedures and optimisation of protection, the two pillars of radiological protection in health care, are implicit in the notion of good medical practice. However, some health professionals are not familiar with these principles, and have low awareness of radiological protection aspects of justification. A stronger collaboration between radiation protection and healthcare communities could contribute to improve the radiation protection culture in medical practice. © The Chartered Institution of Building Services Engineers 2014.

  9. Maximal physical work performance with European standard based fire-protective clothing system and equipment in relation to individual characteristics.

    PubMed

    Louhevaara, V; Ilmarinen, R; Griefahn, B; Künemund, C; Mäkinen, H

    1995-01-01

    Every fire fighter needs to wear fire-protective clothing and a self-contained breathing apparatus (SCBA) several times a year while carrying out various fire-fighting and rescue operations in hazardous work environments. The aim of the present study was to quantify the effects of a multilayer turnout suit designed to fulfil European standard EN 469 used over standardized (Nordic) clothing and with SCBA (total mass 25.9 kg) on maximal physical work performance, and to evaluate the relationship between individual characteristics and power output with the fire-protective clothing system and SCBA. The subjects were 12 healthy firemen aged 26-46 years. The range of their body mass, body fat and maximal oxygen consumption was 69-101 kg, 10-20% and 2.70-5.86 l.min-1, respectively. The maximal tests without (control) and with the fire-protective clothing system and SCBA were carried out on a treadmill in a thermoneutral environment. When compared to the control test, the decrease in the maximal power output in terms of maximal working time and walking speed averaged 25% (P < 0.001) varying from 18% to 34% with the fire-protective clothing system and SCBA. At maximum, no significant differences were found in pulmonary ventilation, absolute oxygen consumption, the respiratory exchange ratio, heart rate, systolic blood pressure, the rate-pressure product, mechanical efficiency, and the rating of perceived exertion between the tests with and without the fire-protective clothing system and SCBA. The reduction of the power output was related to the extra mass of the fire protective clothing and SCBA.(ABSTRACT TRUNCATED AT 250 WORDS)

  10. The Latina paradox: an opportunity for restructuring prenatal care delivery.

    PubMed

    McGlade, Michael S; Saha, Somnath; Dahlstrom, Marie E

    2004-12-01

    Latina mothers in the United States enjoy surprisingly favorable birth outcomes despite their social disadvantages. This "Latina paradox" is particularly evident among Mexican-born women. The social and cultural factors that contribute to this paradox are maintained by community networks--informal systems of prenatal care that are composed of family, friends, community members, and lay health workers. This informal system confers protective factors that provide a behavioral context for healthy births. US-born Latinas are losing this protection, although it could be maintained with the support of community-based informal care systems. We recommend steps to harness the benefits of informal systems of prenatal care in Latino communities to meet the increasing needs of pregnant Latina women.

  11. Finite Energy and Bounded Attacks on Control System Sensor Signals

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less

  12. [Assessment system for watershed ecological health in the United States: development and application].

    PubMed

    Zhang, Hua; Luo, Yong-Ming

    2013-07-01

    To meet the water quality goals of the Clean Water Act, the environmental agencies in the United States (U.S.) have developed a comprehensive ecological assessment system of watershed health in the last two decades. The system employs a watershed approach, and includes a large set of hydrological, chemical, and biological indices, having become an essential part of the watershed water quality management system in the U.S. and provided strong support for the protection of water environment and the restoration of aquatic system. In this paper, the development and application of the ecological assessment system of watershed health by the U.S. environmental regulators, especially the U.S. Environmental Protection Agency (US EPA), were overviewed from the aspects of related laws and regulations, ecosystem function analysis, ecological health indicators, comprehensive assessment system, and monitoring and data management systems, and the health assessment systems for the rivers, lakes, estuaries, coasts, and wetlands adopted by the National$t1-1-1 Aquatic Resource Surveys (NARS) were introduced. Some suggestions for the future development of the scientific ecological assessment system of watershed health in China were put forward based on the understanding of the protection and remediation practices of our water environment.

  13. Evaluation of the matrix effect on gas chromatography--mass spectrometry with carrier gas containing ethylene glycol as an analyte protectant.

    PubMed

    Fujiyoshi, Tomoharu; Ikami, Takahito; Sato, Takashi; Kikukawa, Koji; Kobayashi, Masato; Ito, Hiroshi; Yamamoto, Atsushi

    2016-02-19

    The consequences of matrix effects in GC are a major issue of concern in pesticide residue analysis. The aim of this study was to evaluate the applicability of an analyte protectant generator in pesticide residue analysis using a GC-MS system. The technique is based on continuous introduction of ethylene glycol into the carrier gas. Ethylene glycol as an analyte protectant effectively compensated the matrix effects in agricultural product extracts. All peak intensities were increased by this technique without affecting the GC-MS performance. Calibration curves for ethylene glycol in the GC-MS system with various degrees of pollution were compared and similar response enhancements were observed. This result suggests a convenient multi-residue GC-MS method using an analyte protectant generator instead of the conventional compensation method for matrix-induced response enhancement adding the mixture of analyte protectants into both neat and sample solutions. Copyright © 2016 Elsevier B.V. All rights reserved.

  14. Refractory Materials for Flame Deflector Protection System Corrosion Control: Coatings Systems Literature Survey

    NASA Technical Reports Server (NTRS)

    Calle, Luz M.; Hintze, Paul E.; Parlier, Christopher R.; Sampson, Jeffrey W.; Coffman, Brekke E.; Coffman, Brekke E.; Curran, Jerome P.; Kolody, Mark R.; Whitten, Mary; Perisich, Steven; hide

    2009-01-01

    When space vehicles are launched, extreme heat, exhaust, and chemicals are produced and these form a very aggressive exposure environment at the launch complex. The facilities in the launch complex are exposed to this aggressive environment. The vehicle exhaust directly impacts the flame deflectors, making these systems very susceptible to high wear and potential failure. A project was formulated to develop or identify new materials or systems such that the wear and/or damage to the flame deflector system, as a result of the severe environmental exposure conditions during launches, can be mitigated. This report provides a survey of potential protective coatings for the refractory concrete lining on the steel base structure on the flame deflectors at Kennedy Space Center (KSC).

  15. Environmentally Friendly Corrosion Preventative Compounds for Ground Support Structures

    NASA Technical Reports Server (NTRS)

    Montgomery Eliza L.; Calle, Luz, Marina; Curran, Jerome P.; Kolody, Mark R.

    2013-01-01

    The need to use environmentally friendly technologies throughout future space-related launch programs prompted a study aimed at replacing current petroleum and solvent-based Corrosion Preventive Compounds (CPCs) with environmentally friendly alternatives. The work in this paper focused on the identification and evaluation of environmentally friendly CPCs for use in protecting flight hardware and ground support equipment from atmospheric corrosion. CPCs are used as temporary protective coatings and must survive in the aggressive coastal marine environment that exists throughout the Kennedy Space Center, Florida. The different protection behaviors of fifteen different oily film CPCs, both common petroleum-based and newer environmentally friendly types, were evaluated on various steel and aluminum substrates. CPC and substrate systems were subjected to atmospheric testing at the Kennedy Space Center's Beachside Atmospheric Corrosion Test Site, as well as cyclic accelerated corrosion testing. Each CPC also underwent physical characterization and launch-related compatibility testing. The results for the fifteen CPC systems are presented in this paper.

  16. Environmentally friendly corrosion preventive compounds for ground support structures

    NASA Astrophysics Data System (ADS)

    Montgomery, Eliza; Curran, Jerome; Calle, Luz Marina; Kolody, Mark

    The need to use environmentally friendly technologies throughout future space-related launch programs prompted a study aimed at replacing current petroleum and solvent-based corrosion preventive compounds (CPCs) with environmentally friendly alternatives. The work in this paper focused on the identification and evaluation of environmentally friendly CPCs for use in protecting flight hardware and ground support equipment from atmospheric corrosion. CPCs are used as temporary protective coatings and must survive in the aggressive coastal marine environment that exists throughout the Kennedy Space Center, Florida. The different protection behaviors of fifteen different oily film CPCs, both common petroleum-based and newer environmentally friendly types, were evaluated on various steel and aluminum substrates. CPC and substrate systems were subjected to atmospheric testing at the Kennedy Space Center's Beachside Atmospheric Corrosion Test Site, as well as cyclic accelerated corrosion testing. Each CPC also underwent physical characterization and launch-related compatibility testing. The results for the fifteen CPC systems are presented in this paper.

  17. On-Line Thermal Barrier Coating Monitoring for Real-Time Failure Protection and Life Maximization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dennis H. LeMieux

    2005-04-01

    Under the sponsorship of the U. S. Department of Energy's National Energy Laboratory, Siemens Westinghouse Power Corporation proposes a four year program titled, ''On-Line Thermal Barrier Coating (TBC) Monitor for Real-Time Failure Protection and Life Maximization'', to develop, build and install the first generation of an on-line TBC monitoring system for use on land-based advanced gas turbines (AGT). Federal deregulation in electric power generation has accelerated power plant owner's demand for improved reliability availability maintainability (RAM) of the land-based advanced gas turbines. As a result, firing temperatures have been increased substantially in the advanced turbine engines, and the TBCs havemore » been developed for maximum protection and life of all critical engine components operating at these higher temperatures. Losing TBC protection can therefore accelerate the degradation of substrate components materials and eventually lead to a premature failure of critical component and costly unscheduled power outages. This program seeks to substantially improve the operating life of high cost gas turbine components using TBC; thereby, lowering the cost of maintenance leading to lower cost of electricity. Siemens Westinghouse Power Corporation has teamed with Indigo Systems, a supplier of state-of-the-art infrared camera systems, and Wayne State University, a leading research organization in the field of infrared non-destructive examination (NDE), to complete the program.« less

  18. ON-LINE THERMAL BARRIER COATING MONITORING FOR REAL-TIME FAILURE PROTECTION AND LIFE MAXIMIZATION

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dennis H. LeMieux

    2003-10-01

    Under the sponsorship of the U. S. Department of Energy's National Energy Laboratory, Siemens Westinghouse Power Corporation proposes a four year program titled, ''On-Line Thermal Barrier Coating (TBC) Monitor for Real-Time Failure Protection and Life Maximization,'' to develop, build and install the first generation of an on-line TBC monitoring system for use on land-based advanced gas turbines (AGT). Federal deregulation in electric power generation has accelerated power plant owner's demand for improved reliability, availability, and maintainability (RAM) of the land-based advanced gas turbines. As a result, firing temperatures have been increased substantially in the advanced turbine engines, and the TBCsmore » have been developed for maximum protection and life of all critical engine components operating at these higher temperatures. Losing TBC protection can, therefore, accelerate the degradation of substrate component materials and eventually lead to a premature failure of critical components and costly unscheduled power outages. This program seeks to substantially improve the operating life of high cost gas turbine components using TBC; thereby, lowering the cost of maintenance leading to lower cost of electricity. Siemens Westinghouse Power Corporation has teamed with Indigo Systems, a supplier of state-of-the-art infrared camera systems, and Wayne State University, a leading research organization in the field of infrared non-destructive examination (NDE), to complete the program.« less

  19. ON-LINE THERMAL BARRIER COATING MONITORING FOR REAL-TIME FAILURE PROTECTION AND LIFE MAXIMIZATION

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dennis H. LeMieux

    2003-07-01

    Under the sponsorship of the U. S. Department of Energy's National Energy Laboratory, Siemens Westinghouse Power Corporation proposes a four year program titled, ''On-Line Thermal Barrier Coating (TBC) Monitor for Real-Time Failure Protection and Life Maximization,'' to develop, build and install the first generation of an on-line TBC monitoring system for use on land-based advanced gas turbines (AGT). Federal deregulation in electric power generation has accelerated power plant owner's demand for improved reliability, availability, and maintainability (RAM) of the land-based advanced gas turbines. As a result, firing temperatures have been increased substantially in the advanced turbine engines, and the TBCsmore » have been developed for maximum protection and life of all critical engine components operating at these higher temperatures. Losing TBC protection can, therefore, accelerate the degradation of substrate component materials and eventually lead to a premature failure of critical components and costly unscheduled power outages. This program seeks to substantially improve the operating life of high cost gas turbine components using TBC; thereby, lowering the cost of maintenance leading to lower cost of electricity. Siemens Westinghouse Power Corporation has teamed with Indigo Systems, a supplier of state-of-the-art infrared camera systems, and Wayne State University, a leading research organization in the field of infrared non-destructive examination (NDE), to complete the program.« less

  20. On-Line Thermal Barrier Coating Monitoring for Real-Time Failure Protection and Life Maximization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dennis H. LeMieux

    2005-10-01

    Under the sponsorship of the U. S. Department of Energy's National Energy Laboratory, Siemens Power Generation, Inc proposed a four year program titled, ''On-Line Thermal Barrier Coating (TBC) Monitor for Real-Time Failure Protection and Life Maximization'', to develop, build and install the first generation of an on-line TBC monitoring system for use on land-based advanced gas turbines (AGT). Federal deregulation in electric power generation has accelerated power plant owner's demand for improved reliability availability maintainability (RAM) of the land-based advanced gas turbines. As a result, firing temperatures have been increased substantially in the advanced turbine engines, and the TBCs havemore » been developed for maximum protection and life of all critical engine components operating at these higher temperatures. Losing TBC protection can therefore accelerate the degradation of substrate components materials and eventually lead to a premature failure of critical component and costly unscheduled power outages. This program seeks to substantially improve the operating life of high cost gas turbine components using TBC; thereby, lowering the cost of maintenance leading to lower cost of electricity. Siemens Power Generation, Inc. has teamed with Indigo Systems, a supplier of state-of-the-art infrared camera systems, and Wayne State University, a leading research organization in the field of infrared non-destructive examination (NDE), to complete the program.« less

  1. Measuring the Effectiveness of Routine Child Protection Services: The Results from an Evidence Based Strategy

    ERIC Educational Resources Information Center

    O'Brien, Michael

    2011-01-01

    Most of what is known about the effectiveness of child welfare is found in studies of specific programs. Little is known about the effectiveness of the routine services provided in child protection systems. Family and Children's Services of Renfrew County is a Canadian child welfare agency that decided to expand its mission beyond protecting…

  2. Mobile code security

    NASA Astrophysics Data System (ADS)

    Ramalingam, Srikumar

    2001-11-01

    A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.

  3. [Analysis and research on cleaning points of HVAC systems in public places].

    PubMed

    Yang, Jiaolan; Han, Xu; Chen, Dongqing; Jin, Xin; Dai, Zizhu

    2010-03-01

    To analyze cleaning points of HVAC systems, and to provides scientific base for regulating the cleaning of HVAC systems. Based on the survey results on the cleaning situation of HVAC systems around China for the past three years, we analyzes the cleaning points of HVAC systems from various aspects, such as the major health risk factors of HVAC systems, the formulation strategy of the cleaning of HVAC systems, cleaning methods and acceptance points of the air ducts and the parts of HVAC systems, the onsite protection and individual protection, the waste treatment and the cleaning of the removed equipment, inspection of the cleaning results, video record, and the final acceptance of the cleaning. The analysis of the major health risk factors of HVAC systems and the formulation strategy of the cleaning of HVAC systems is given. The specific methods for cleaning the air ducts, machine units, air ports, coil pipes and the water cooling towers of HVAC systems, the acceptance points of HVAC systems and the requirements of the report on the final acceptance of the cleaning of HVAC systems are proposed. By the analysis of the points of the cleaning of HVAC systems and proposal of corresponding measures, this study provides the base for the scientific and regular launch of the cleaning of HVAC systems, a novel technology service, and lays a foundation for the revision of the existing cleaning regulations, which may generate technical and social benefits to some extent.

  4. Pharmacological Blockade of the Chemokine Receptor CCR1 Protects Mice from Systemic Candidiasis of Hematogenous Origin

    PubMed Central

    Albert, Nathaniel D.; Swamydas, Muthulekha; Lee, Chyi-Chia R.; Loetscher, Pius

    2016-01-01

    ABSTRACT Systemic candidiasis is a leading cause of nosocomial bloodstream infection with a high mortality rate despite treatment. Immune-based strategies are needed to improve outcomes. We previously reported that genetic deficiency in the chemokine receptor CCR1 improves survival and ameliorates tissue damage in Candida-infected mice. Here, we found that treatment of immunocompetent Candida-infected mice with the CCR1-selective antagonist BL5923 improves survival, decreases the kidney fungal burden, and protects from renal tissue injury. PMID:27993850

  5. Seeking systemic change: risk and protective factors affecting low-income urban youth.

    PubMed

    Meyerson, David A; Grant, Kathryn E

    2014-01-01

    This themed issue presents five articles tackling the topic of risk and protective processes affecting children and adolescents living in urban poverty. Through their research, the authors seek understanding of the particular challenges that low-income urban youth face, with the ultimate goal of understanding how best to intervene at various levels of the ecological system. Within this broad theme, studies examine specific stressors, mediators, and moderators that impact the mental health of youth living in urban poverty. The final article presents a data-driven, community-based intervention for this population.

  6. A Third-Party E-payment Protocol Based on Quantum Multi-proxy Blind Signature

    NASA Astrophysics Data System (ADS)

    Niu, Xu-Feng; Zhang, Jian-Zhong; Xie, Shu-Cui; Chen, Bu-Qing

    2018-05-01

    A third-party E-payment protocol is presented in this paper. It is based on quantum multi-proxy blind signature. Adopting the techniques of quantum key distribution, one-time pad and quantum multi-proxy blind signature, our third-party E-payment system could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. Furthermore, compared with the existing quantum E-payment systems, the proposed system could support the E-payment which using the third-party platforms.

  7. Layered virus protection for the operations and administrative messaging system

    NASA Technical Reports Server (NTRS)

    Cortez, R. H.

    2002-01-01

    NASA's Deep Space Network (DSN) is critical in supporting the wide variety of operating and plannedunmanned flight projects. For day-to-day operations it relies on email communication between the three Deep Space Communication Complexes (Canberra, Goldstone, Madrid) and NASA's Jet Propulsion Laboratory. The Operations & Administrative Messaging system, based on the Microsoft Windows NTand Exchange platform, provides the infrastructure that is required for reliable, mission-critical messaging. The reliability of this system, however, is threatened by the proliferation of email viruses that continue to spread at alarming rates. A layered approach to email security has been implemented across the DSN to protect against this threat.

  8. Manufacture and engine test of advanced oxide dispersion strengthened alloy turbine vanes. [for space shuttle thermal protection

    NASA Technical Reports Server (NTRS)

    Bailey, P. G.

    1977-01-01

    Oxide-Dispersion-strengthened (ODS) Ni-Cr-Al alloy systems were exploited for turbine engine vanes which would be used for the space shuttle thermal protection system. Available commercial and developmental advanced ODS alloys were evaluated, and three were selected based on established vane property goals and manufacturing criteria. The selected alloys were evaluated in an engine test. Candidate alloys were screened by strength, thermal fatigue resistance, oxidation and sulfidation resistance. The Ni-16Cr (3 to 5)Al-ThO2 system was identified as having attractive high temperature oxidation resistance. Subsequent work also indicated exceptional sulfidation resistance for these alloys.

  9. Method of protecting a surface with a silicon-slurry/aluminide coating. [coatings for gas turbine engine blades and vanes

    NASA Technical Reports Server (NTRS)

    Deadmore, D. L.; Young, S. G. (Inventor)

    1982-01-01

    A low cost coating for protecting metallic base system substrates from high temperatures, high gas velocity oxidation, thermal fatigue and hot corrosion is described. The coating is particularly useful for protecting vanes and blades in aircraft and land based gas turbine engines. A lacquer slurry comprising cellulose nitrate containing high purity silicon powder is sprayed onto the superalloy substrates. The silicon layer is then aluminized to complete the coating. The Si-Al coating is less costly to produce than advanced aluminides and protects the substrate from oxidation and thermal fatigue for a much longer period of time than the conventional aluminide coatings. While more expensive Pt-Al coatings and physical vapor deposited MCrAlY coatings may last longer or provide equal protection on certain substrates, the Si-Al coating exceeded the performance of both types of coatings on certain superalloys in high gas velocity oxidation and thermal fatigue. Also, the Si-Al coating increased the resistance of certain superalloys to hot corrosion.

  10. Economic efficiency of countries' clinical review processes and competitiveness on the market of human experimentation.

    PubMed

    Ippoliti, Roberto

    2013-01-01

    Clinical research is a specific phase of pharmaceutical industry's production process in which companies test candidate drugs on patients to collect clinical evidence about safety and effectiveness. Information is essential to obtain manufacturing authorization from the national drug agency and, in this way, make profits on the market. Considering this activity, however, the public stakeholder has to face a conflict of interests. On the one side, there is society's necessity to make advances in medicine and, of course, to promote pharmaceutical companies' investments in this specific phase (new generation). On the other side, there is the duty to protect patients involved in these experimental treatments (old generation). To abide by this moral duty, a protection system was developed through the years, based on two legal institutions: informed consent and institutional review board. How should an efficient protection system that would take human experimentation into account be shaped? Would it be possible for the national protection system of patients' rights to affect the choice of whether to develop a clinical trial in a given country or not? Looking at Europe and considering a protection system that is shaped around institutional review boards, this article is an empirical work that tries to give answers to these open questions. It shows how a protection system that can minimize the time necessary to start a trial can positively affect pharmaceutical clinical research, that is, the choice of pharmaceutical companies to start innovative medical treatments in a given country. Copyright © 2013 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  11. Micromechanical Characterization and Testing of Carbon Based Woven Thermal Protection Materials

    NASA Technical Reports Server (NTRS)

    Agrawal, Parul; Pham, John T.; Arnold, James O.; Peterson, Keith; Venkatapathy, Ethiraj

    2013-01-01

    Woven thermal protection system (TPS) materials are one of the enabling technologies for mechanically deployable hypersonic decelerator systems. These materials can be simultaneously used for thermal protection and as structural load bearing members during the entry, descent and landing operations. In order to ensure successful thermal and structural performance during the atmospheric entry, it is important to characterize the properties of these materials, once they have been subjected to entry like conditions. The present paper focuses on mechanical characteristics of pre-and post arc-jet tested woven TPS samples at different scales. It also presents the observations from scanning electron microscope and computed tomography images, and explains the changes in microstructure after being subjected to combined thermal-mechanical loading environments.

  12. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

    PubMed

    Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram

    2017-04-01

    Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.

  13. Research in biomechanics of occupant protection.

    PubMed

    King, A I; Yang, K H

    1995-04-01

    This paper discusses the biomechanical bases for occupant protection against frontal and side impact. Newton's Laws of Motion are used to illustrate the effect of a crash on restrained and unrestrained occupants, and the concept of ride down is discussed. Occupant protection through the use of energy absorbing materials is described, and the mechanism of injury of some of the more common injuries is explained. The role of the three-point belt and the airbag in frontal protection is discussed along with the potential injuries that can result from the use of these restraint systems. Side impact protection is more difficult to attain but some protection can be derived from the use of padding or a side impact airbag. It is concluded that the front seat occupants are adequately protected against frontal impact if belts are worn in an airbag equipped vehicle. Side impact protection may not be uniform in all vehicles.

  14. EVALUATING A COMPOSITE CARTRIDGE FOR SMALL SYSTEM DRINKING WATER TREATMENT

    EPA Science Inventory

    A multi-layer, cartridge-based system that combines physical filtration with carbon adsorption and ultraviolet (UV) light disinfection has been developed to perform as a water treatment security device to protect homes against accidental or intentional contaminant events. A seri...

  15. Understanding risk and protective factors for child maltreatment: the value of integrated, population-based data.

    PubMed

    Putnam-Hornstein, Emily; Needell, Barbara; Rhodes, Anne E

    2013-01-01

    In this article, we argue for expanded efforts to integrate administrative data systems as a "practical strategy" for developing a richer understanding of child abuse and neglect. Although the study of child maltreatment is often critiqued for being atheoretical, we believe that a more pressing concern is the absence of population-based and prospective epidemiological data that can be used to better understand the distribution and interacting nature of risk and protective factors for maltreatment. We begin by briefly addressing the relevance of empirical observations to etiological theories of child maltreatment. Although the latter is widely cited as critical to the development of effective prevention and intervention responses, less attention has been paid to the role of population-based data in the development of theories relevant to highly applied research questions such as those pertaining to child abuse and neglect. We then discuss how child protection data, in isolation, translates into a relatively narrow range of questions that can be asked and answered, with an inherently pathology-focused construction of risks and little attention paid to strengths or protective factors. We next turn to examples of recent findings--spanning multiple countries--emerging from information integrated across data systems, concluding by calling for expanded administrative data linkages in an effort to better understand and prevent child maltreatment. Copyright © 2012 Elsevier Ltd. All rights reserved.

  16. Protecting Against Damage from Refraction of High Power Microwaves in the DIII-D Tokamak

    NASA Astrophysics Data System (ADS)

    Lohr, John; Brambila, Rigo; Cengher, Mirela; Chen, Xi; Gorelov, Yuri; Grosnickle, William; Moeller, Charles; Ponce, Dan; Prater, Ron; Torrezan, Antonio; Austin, Max; Doyle, Edward; Hu, Xing; Dormier, Calvin

    2017-07-01

    Several new protective systems are being installed on the DIII D tokamak to increase the safety margins for plasma operations with injected ECH power at densities approaching cutoff. Inadvertent overdense operation has previously resulted in reflection of an rf beam back into a launcher causing extensive arcing and melt damage on one waveguide line. Damage to microwave diagnostics, which are located on the same side of the tokamak as the ECH launchers, also has occurred. Developing a reliable microwave based interlock to protect the many vulnerable systems in DIII-D has proved to be difficult. Therefore, multiple protective steps have been taken to reduce the risk of damage in the future. Among these is a density interlock generated by the plasma control system, with setpoint determined by the ECH operators based on rf beam trajectories and plasma parameters. Also installed are enhanced video monitoring of the launchers, and an ambient light monitor on each of the waveguide systems, along with a Langmuir probe at the mouth of each launcher. Versatile rf monitors, measuring forward and reflected power in addition to the mode content of the rf beams, have been installed as the last miter bends in each waveguide line. As these systems are characterized, they are being incorporated in the interlock chains, which enable the ECH injection permits. The diagnostics most susceptible to damage from the ECH waves have also been fitted with a variety of protective devices including stripline filters, thin resonant notch filters tuned to the 110 GHz injected microwave frequency, blazed grating filters and shutters. Calculations of rf beam trajectories in the plasmas are performed using the TORAY ray tracing code with input from kinetic profile diagnostics. Using these calculations, strike points for refracted beams on the vacuum vessel are calculated, which allows evaluation of the risk of damage to sensitive diagnostics and hardware.

  17. Protecting against damage from refraction of high power microwaves in the DIII-D tokamak

    DOE PAGES

    Lohr, John; Brambila, Rigo; Cengher, Mirela; ...

    2017-07-24

    Here, several new protective systems are being installed on the DIII D tokamak to increase the safety margins for plasma operations with injected ECH power at densities approaching cutoff. Inadvertent overdense operation has previously resulted in reflection of an rf beam back into a launcher causing extensive arcing and melt damage on one waveguide line. Damage to microwave diagnostics, which are located on the same side of the tokamak as the ECH launchers, also has occurred. Developing a reliable microwave based interlock to protect the many vulnerable systems in DIII-D has proved to be difficult. Therefore, multiple protective steps havemore » been taken to reduce the risk of damage in the future. Among these is a density interlock generated by the plasma control system, with setpoint determined by the ECH operators based on rf beam trajectories and plasma parameters. Also installed are enhanced video monitoring of the launchers, and an ambient light monitor on each of the waveguide systems, along with a Langmuir probe at the mouth of each launcher. Versatile rf monitors, measuring forward and reflected power in addition to the mode content of the rf beams, have been installed as the last miter bends in each waveguide line. As these systems are characterized, they are being incorporated in the interlock chains, which enable the ECH injection permits. The diagnostics most susceptible to damage from the ECH waves have also been fitted with a variety of protective devices including stripline filters, thin resonant notch filters tuned to the 110 GHz injected microwave frequency, blazed grating filters and shutters. Calculations of rf beam trajectories in the plasmas are performed using the TORAY ray tracing code with input from kinetic profile diagnostics. Using these calculations, strike points for refracted beams on the vacuum vessel are calculated, which allows evaluation of the risk of damage to sensitive diagnostics and hardware.« less

  18. Protecting against damage from refraction of high power microwaves in the DIII-D tokamak

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lohr, John; Brambila, Rigo; Cengher, Mirela

    Here, several new protective systems are being installed on the DIII D tokamak to increase the safety margins for plasma operations with injected ECH power at densities approaching cutoff. Inadvertent overdense operation has previously resulted in reflection of an rf beam back into a launcher causing extensive arcing and melt damage on one waveguide line. Damage to microwave diagnostics, which are located on the same side of the tokamak as the ECH launchers, also has occurred. Developing a reliable microwave based interlock to protect the many vulnerable systems in DIII-D has proved to be difficult. Therefore, multiple protective steps havemore » been taken to reduce the risk of damage in the future. Among these is a density interlock generated by the plasma control system, with setpoint determined by the ECH operators based on rf beam trajectories and plasma parameters. Also installed are enhanced video monitoring of the launchers, and an ambient light monitor on each of the waveguide systems, along with a Langmuir probe at the mouth of each launcher. Versatile rf monitors, measuring forward and reflected power in addition to the mode content of the rf beams, have been installed as the last miter bends in each waveguide line. As these systems are characterized, they are being incorporated in the interlock chains, which enable the ECH injection permits. The diagnostics most susceptible to damage from the ECH waves have also been fitted with a variety of protective devices including stripline filters, thin resonant notch filters tuned to the 110 GHz injected microwave frequency, blazed grating filters and shutters. Calculations of rf beam trajectories in the plasmas are performed using the TORAY ray tracing code with input from kinetic profile diagnostics. Using these calculations, strike points for refracted beams on the vacuum vessel are calculated, which allows evaluation of the risk of damage to sensitive diagnostics and hardware.« less

  19. Inactivated Influenza Vaccine That Provides Rapid, Innate-Immune-System-Mediated Protection and Subsequent Long-Term Adaptive Immunity.

    PubMed

    Chua, Brendon Y; Wong, Chinn Yi; Mifsud, Edin J; Edenborough, Kathryn M; Sekiya, Toshiki; Tan, Amabel C L; Mercuri, Francesca; Rockman, Steve; Chen, Weisan; Turner, Stephen J; Doherty, Peter C; Kelso, Anne; Brown, Lorena E; Jackson, David C

    2015-10-27

    The continual threat to global health posed by influenza has led to increased efforts to improve the effectiveness of influenza vaccines for use in epidemics and pandemics. We show in this study that formulation of a low dose of inactivated detergent-split influenza vaccine with a Toll-like receptor 2 (TLR2) agonist-based lipopeptide adjuvant (R4Pam2Cys) provides (i) immediate, antigen-independent immunity mediated by the innate immune system and (ii) significant enhancement of antigen-dependent immunity which exhibits an increased breadth of effector function. Intranasal administration of mice with vaccine formulated with R4Pam2Cys but not vaccine alone provides protection against both homologous and serologically distinct (heterologous) viral strains within a day of administration. Vaccination in the presence of R4Pam2Cys subsequently also induces high levels of systemic IgM, IgG1, and IgG2b antibodies and pulmonary IgA antibodies that inhibit hemagglutination (HA) and neuraminidase (NA) activities of homologous but not heterologous virus. Improved primary virus nucleoprotein (NP)-specific CD8(+) T cell responses are also induced by the use of R4Pam2Cys and are associated with robust recall responses to provide heterologous protection. These protective effects are demonstrated in wild-type and antibody-deficient animals but not in those depleted of CD8(+) T cells. Using a contact-dependent virus transmission model, we also found that heterologous virus transmission from vaccinated mice to naive mice is significantly reduced. These results demonstrate the potential of adding a TLR2 agonist to an existing seasonal influenza vaccine to improve its utility by inducing immediate short-term nonspecific antiviral protection and also antigen-specific responses to provide homologous and heterologous immunity. The innate and adaptive immune systems differ in mechanisms, specificities, and times at which they take effect. The innate immune system responds within hours of exposure to infectious agents, while adaptive immunity takes several days to become effective. Here we show, by using a simple lipopeptide-based TLR2 agonist, that an influenza detergent-split vaccine can be made to simultaneously stimulate and amplify both systems to provide immediate antiviral protection while giving the adaptive immune system time to implement long-term immunity. Both types of immunity induced by this approach protect against vaccine-matched as well as unrelated virus strains and potentially even against strains yet to be encountered. Conferring dual functionality to influenza vaccines is beneficial for improving community protection, particularly during periods between the onset of an outbreak and the time when a vaccine becomes available or in scenarios in which mass vaccination with a strain to which the population is immunologically naive is imperative. Copyright © 2015 Chua et al.

  20. Efficient expansion of global protected areas requires simultaneous planning for species and ecosystems

    PubMed Central

    Polak, Tal; Watson, James E. M.; Fuller, Richard A.; Joseph, Liana N.; Martin, Tara G.; Possingham, Hugh P.; Venter, Oscar; Carwardine, Josie

    2015-01-01

    The Convention on Biological Diversity (CBD)'s strategic plan advocates the use of environmental surrogates, such as ecosystems, as a basis for planning where new protected areas should be placed. However, the efficiency and effectiveness of this ecosystem-based planning approach to adequately capture threatened species in protected area networks is unknown. We tested the application of this approach in Australia according to the nation's CBD-inspired goals for expansion of the national protected area system. We set targets for ecosystems (10% of the extent of each ecosystem) and threatened species (variable extents based on persistence requirements for each species) and then measured the total land area required and opportunity cost of meeting those targets independently, sequentially and simultaneously. We discover that an ecosystem-based approach will not ensure the adequate representation of threatened species in protected areas. Planning simultaneously for species and ecosystem targets delivered the most efficient outcomes for both sets of targets, while planning first for ecosystems and then filling the gaps to meet species targets was the most inefficient conservation strategy. Our analysis highlights the pitfalls of pursuing goals for species and ecosystems non-cooperatively and has significant implications for nations aiming to meet their CBD mandated protected area obligations. PMID:26064645

  1. Current research trend on urban sewerage system in China

    NASA Astrophysics Data System (ADS)

    Ning, Yun-Fang; Dong, Wen-Yi; Lin, Lu-Sheng; Zhang, Qian

    2017-03-01

    The research emphasis has always been on sewerage treatment technology in China, though urban drainage system has gained little attention. In the context of urban drainage system and the problem associated with rain, the focus is still mainly toward the simple “emissions”. While the relationship between conservation and utilization of rainwater resources and urban ecology are popular, the relationship between rainwater discharge and non-point source pollution are often neglected. The reasonable choice of sewerage system is dependent on the collection and discharge of urban sewerage, the applicability and economic benefits, along with the ability to meet the water quality requirements and environmental protection. This paper analyzes and summarizes the development of urban drainage system in china, and introduces different drainage forms. The choice of drainage system should be based on the overall planning of the city, environmental protection requirements, the local natural conditions and water conditions, urban sewerage and water quality, the original drainage facilities, and local climatic conditions. It must be comprehensive to meet the environmental protection requirements, through technical and economic comparison.

  2. Biologically-Inspired Concepts for Autonomic Self-Protection in Multiagent Systems

    NASA Technical Reports Server (NTRS)

    Sterritt, Roy; Hinchey, Mike

    2006-01-01

    Biologically-inspired autonomous and autonomic systems (AAS) are essentially concerned with creating self-directed and self-managing systems based on metaphors &om nature and the human body, such as the autonomic nervous system. Agent technologies have been identified as a key enabler for engineering autonomy and autonomicity in systems, both in terms of retrofitting into legacy systems and in designing new systems. Handing over responsibility to systems themselves raises concerns for humans with regard to safety and security. This paper reports on the continued investigation into a strand of research on how to engineer self-protection mechanisms into systems to assist in encouraging confidence regarding security when utilizing autonomy and autonomicity. This includes utilizing the apoptosis and quiescence metaphors to potentially provide a self-destruct or self-sleep signal between autonomic agents when needed, and an ALice signal to facilitate self-identification and self-certification between anonymous autonomous agents and systems.

  3. 78 FR 979 - Petition for Positive Train Control Safety Plan Approval and System Certification of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-07

    ...] Petition for Positive Train Control Safety Plan Approval and System Certification of the Electronic Train... the Federal Railroad Administration (FRA) for Positive Train Control (PTC) Safety Plan (PTCSP...-based train control system safety overlay designed to protect against the consequences of train-to-train...

  4. A distributed control system for the lower-hybrid current drive system on the Tokamak de Varennes

    NASA Astrophysics Data System (ADS)

    Bagdoo, J.; Guay, J. M.; Chaudron, G.-A.; Decoste, R.; Demers, Y.; Hubbard, A.

    1990-08-01

    An rf current drive system with an output power of 1 MW at 3.7 GHz is under development for the Tokamak de Varennes. The control system is based on an Ethernet local-area network of programmable logic controllers as front end, personal computers as consoles, and CAMAC-based DSP processors. The DSP processors ensure the PID control of the phase and rf power of each klystron, and the fast protection of high-power rf hardware, all within a 40 μs loop. Slower control and protection, event sequencing and the run-time database are provided by the programmable logic controllers, which communicate, via the LAN, with the consoles. The latter run a commercial process-control console software. The LAN protocol respects the first four layers of the ISO/OSI 802.3 standard. Synchronization with the tokamak control system is provided by commercially available CAMAC timing modules which trigger shot-related events and reference waveform generators. A detailed description of each subsystem and a performance evaluation of the system will be presented.

  5. Compliance program data management system for The Idaho National Engineering Laboratory/Environmental Protection Agency

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hertzler, C.L.; Poloski, J.P.; Bates, R.A.

    1988-01-01

    The Compliance Program Data Management System (DMS) developed at the Idaho National Engineering Laboratory (INEL) validates and maintains the integrity of data collected to support the Consent Order and Compliance Agreement (COCA) between the INEL and the Environmental Protection Agency (EPA). The system uses dBase III Plus programs and dBase III Plus in an interactive mode to enter, store, validate, manage, and retrieve analytical information provided on EPA Contract Laboratory Program (CLP) forms and CLP forms modified to accommodate 40 CFR 264 Appendix IX constituent analyses. Data analysis and presentation is performed utilizing SAS, a statistical analysis software program. Archivingmore » of data and results is performed at appropriate stages of data management. The DMS is useful for sampling and analysis programs where adherence to EPA CLP protocol, along with maintenance and retrieval of waste site investigation sampling results is desired or requested. 3 refs.« less

  6. Methods and implementation of a central biosample and data management in a three-centre clinical study.

    PubMed

    Angelow, Aniela; Schmidt, Matthias; Weitmann, Kerstin; Schwedler, Susanne; Vogt, Hannes; Havemann, Christoph; Hoffmann, Wolfgang

    2008-07-01

    In our report we describe concept, strategies and implementation of a central biosample and data management (CSDM) system in the three-centre clinical study of the Transregional Collaborative Research Centre "Inflammatory Cardiomyopathy - Molecular Pathogenesis and Therapy" SFB/TR 19, Germany. Following the requirements of high system resource availability, data security, privacy protection and quality assurance, a web-based CSDM was developed based on Java 2 Enterprise Edition using an Oracle database. An efficient and reliable sample documentation system using bar code labelling, a partitioning storage algorithm and an online documentation software was implemented. An online electronic case report form is used to acquire patient-related data. Strict rules for access to the online applications and secure connections are used to account for privacy protection and data security. Challenges for the implementation of the CSDM resided at project, technical and organisational level as well as at staff level.

  7. Driving profile modeling and recognition based on soft computing approach.

    PubMed

    Wahab, Abdul; Quek, Chai; Tan, Chin Keong; Takeda, Kazuya

    2009-04-01

    Advancements in biometrics-based authentication have led to its increasing prominence and are being incorporated into everyday tasks. Existing vehicle security systems rely only on alarms or smart card as forms of protection. A biometric driver recognition system utilizing driving behaviors is a highly novel and personalized approach and could be incorporated into existing vehicle security system to form a multimodal identification system and offer a greater degree of multilevel protection. In this paper, detailed studies have been conducted to model individual driving behavior in order to identify features that may be efficiently and effectively used to profile each driver. Feature extraction techniques based on Gaussian mixture models (GMMs) are proposed and implemented. Features extracted from the accelerator and brake pedal pressure were then used as inputs to a fuzzy neural network (FNN) system to ascertain the identity of the driver. Two fuzzy neural networks, namely, the evolving fuzzy neural network (EFuNN) and the adaptive network-based fuzzy inference system (ANFIS), are used to demonstrate the viability of the two proposed feature extraction techniques. The performances were compared against an artificial neural network (NN) implementation using the multilayer perceptron (MLP) network and a statistical method based on the GMM. Extensive testing was conducted and the results show great potential in the use of the FNN for real-time driver identification and verification. In addition, the profiling of driver behaviors has numerous other potential applications for use by law enforcement and companies dealing with buses and truck drivers.

  8. Airframe Icing Research Gaps: NASA Perspective

    NASA Technical Reports Server (NTRS)

    Potapczuk, Mark

    2009-01-01

    qCurrent Airframe Icing Technology Gaps: Development of a full 3D ice accretion simulation model. Development of an improved simulation model for SLD conditions. CFD modeling of stall behavior for ice-contaminated wings/tails. Computational methods for simulation of stability and control parameters. Analysis of thermal ice protection system performance. Quantification of 3D ice shape geometric characteristics Development of accurate ground-based simulation of SLD conditions. Development of scaling methods for SLD conditions. Development of advanced diagnostic techniques for assessment of tunnel cloud conditions. Identification of critical ice shapes for aerodynamic performance degradation. Aerodynamic scaling issues associated with testing scale model ice shape geometries. Development of altitude scaling methods for thermal ice protections systems. Development of accurate parameter identification methods. Measurement of stability and control parameters for an ice-contaminated swept wing aircraft. Creation of control law modifications to prevent loss of control during icing encounters. 3D ice shape geometries. Collection efficiency data for ice shape geometries. SLD ice shape data, in-flight and ground-based, for simulation verification. Aerodynamic performance data for 3D geometries and various icing conditions. Stability and control parameter data for iced aircraft configurations. Thermal ice protection system data for simulation validation.

  9. Household portfolio choices, health status and health care systems: A cross-country analysis based on SHARE.

    PubMed

    Atella, Vincenzo; Brunetti, Marianna; Maestas, Nicole

    2012-05-01

    Health risk is increasingly viewed as an important form of background risk that affects household portfolio decisions. However, its role might be mediated by the presence of a protective full-coverage national health service that could reduce households' probability of incurring current and future out-of-pocket medical expenditures. We use SHARE data to study the influence of current health status and future health risk on the decision to hold risky assets, across ten European countries with different health systems, each offering a different degree of protection against out-of-pocket medical expenditures. We find robust empirical evidence that perceived health status matters more than objective health status and, consistent with the theory of background risk, health risk affects portfolio choices only in countries with less protective health care systems. Furthermore, portfolio decisions consistent with background risk models are observed only with respect to middle-aged and highly-educated investors.

  10. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  11. Guide for inservice inspection of ground-based pressure vessels and systems

    NASA Technical Reports Server (NTRS)

    1976-01-01

    This guide includes recommendations for inservice inspection and recertification of ground based, unfired pressure vessels and all pressurized systems including those served by fired pressure vessels hereinafter referred to as pressure vessels, systems and components of systems. It covers the vast array of pound based industrial and special purpose pressurized components and systems used at NASA field installations for research and development and those utility systems and components that require more than routine maintenance to insure continued structural integrity for their useful life. Through surveillance and correction of inservice deterioration, NASA will maintain a safe working environment for their own and contractor personnel, safety for the public sector and protection against loss of capital investment.

  12. Developing a new syndromic surveillance system for the London 2012 Olympic and Paralympic Games.

    PubMed

    Harcourt, S E; Fletcher, J; Loveridge, P; Bains, A; Morbey, R; Yeates, A; McCloskey, B; Smyth, B; Ibbotson, S; Smith, G E; Elliot, A J

    2012-12-01

    Syndromic surveillance is vital for monitoring public health during mass gatherings. The London 2012 Olympic and Paralympic Games represents a major challenge to health protection services and community surveillance. In response to this challenge the Health Protection Agency has developed a new syndromic surveillance system that monitors daily general practitioner out-of-hours and unscheduled care attendances. This new national system will fill a gap identified in the existing general practice-based syndromic surveillance systems by providing surveillance capability of general practice activity during evenings/nights, over weekends and public holidays. The system will complement and supplement the existing tele-health phone line, general practitioner and emergency department syndromic surveillance systems. This new national system will contribute to improving public health reassurance, especially to meet the challenges of the London 2012 Olympic and Paralympic Games.

  13. Coping capacities for improving adaptation pathways for flood protection in Can Tho, Vietnam

    NASA Astrophysics Data System (ADS)

    Pathirana, A.; Radhakrishnan, M.; Quan, N. H.; Gersonius, B.; Ashley, R.; Zevenbergen, C.

    2016-12-01

    Studying the evolution of coping and adaptation capacities is a prerequisite for preparing an effective flood management plan for the future, especially in the dynamic and fast changing cities of developing countries. The objectives, requirements, targets, design and performance of flood protection measures will have to be determined after taking into account, or in conjunction with, the coping capacities. A methodology is presented based on adaptation pathways to account for coping capacities and to assess the effect on flood protection measures. The adaptation pathways method determines the point of failure of a particular strategy based on the change in an external driver, a point in time or a socio economic situation where / at which the strategy can no longer meet its objective. Pathways arrived at based on this methodology reflect future reality by considering changing engineering standards along with future uncertainties, risk taking abilities and adaptation capacities. This pathways based methodology determines the Adaptation tipping points (ATP), `time of occurrence of ATP' of flood protection measures after accounting for coping capacities, evaluates the measures and then provides the means to determine the adaptation pathways. Application of this methodology for flood protection measures in Can Tho city in the Mekong delta reveals the effect of coping capacity on the usefulness of flood protection measures and the delay in occurrence of tipping points. Consideration of coping capacity in the system owing to elevated property floor levels lead to the postponement of tipping points and improved the adaptation pathways comprising flood protection measures such as dikes. This information is useful to decision makers for planning and phasing of investments in flood protection.

  14. A Protective Mechanism of Visible Red Light in Normal Human Dermal Fibroblasts: Enhancement of GADD45A-Mediated DNA Repair Activity.

    PubMed

    Kim, Yeo Jin; Kim, Hyoung-June; Kim, Hye Lim; Kim, Hyo Jeong; Kim, Hyun Soo; Lee, Tae Ryong; Shin, Dong Wook; Seo, Young Rok

    2017-02-01

    The phototherapeutic effects of visible red light on skin have been extensively investigated, but the underlying biological mechanisms remain poorly understood. We aimed to elucidate the protective mechanism of visible red light in terms of DNA repair of UV-induced oxidative damage in normal human dermal fibroblasts. The protective effect of visible red light on UV-induced DNA damage was identified by several assays in both two-dimensional and three-dimensional cell culture systems. With regard to the protective mechanism of visible red light, our data showed alterations in base excision repair mediated by growth arrest and DNA damage inducible, alpha (GADD45A). We also observed an enhancement of the physical activity of GADD45A and apurinic/apyrimidinic endonuclease 1 (APE1) by visible red light. Moreover, UV-induced DNA damages were diminished by visible red light in an APE1-dependent manner. On the basis of the decrease in GADD45A-APE1 interaction in the activating transcription factor-2 (ATF2)-knockdown system, we suggest a role for ATF2 modulation in GADD45A-mediated DNA repair upon visible red light exposure. Thus, the enhancement of GADD45A-mediated base excision repair modulated by ATF2 might be a potential protective mechanism of visible red light. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baker, J.; Modlin, C.W.; Frerking, C.J.

    HIPROTECT (pronounced High-protect) is a system designed to protect national archaeological and natural treasures from destruction by vandals or looters. The system is being developed jointly by the Lawrence Livermore National Laboratory and the University of California at Riverside under the DOD Legacy Resource Management Program. Thousands of archaeological sites are located on military bases and national park lands. Treasure hunters or vandals are pillaging and destroying these sites at will, since the sites are generally located in remote areas, unattended and unprotected. The HIPROTECT system is designed to detect trespassers at the protected sites and to alert park officialsmore » or military officials of intrusions. An array of sensors is used to detect trespassers. The sensors are triggered when a person or vehicle approaches the site. Alarm messages are transmitted to alert park officials or law enforcement officials by way of a cellular telephone link. A video and audio system is included to assist the officials in verifying that an intrusion has occurred and to allow two-way communication with the intruders.« less

  16. Protection of tokamak plasma facing components by a capillary porous system with lithium

    NASA Astrophysics Data System (ADS)

    Lyublinski, I.; Vertkov, A.; Mirnov, S.; Lazarev, V.

    2015-08-01

    Development of plasma facing material (PFM) based on the Capillary-Porous System (CPS) with lithium and activity on realization of lithium application strategy are addressed to meet the challenges under the creation of steady-state tokamak fusion reactor and fusion neutron source. Presented overview of experimental study of lithium CPS in plasma devices demonstrates the progress in protection of tokamak plasma facing components (PFC) from damage, stabilization and self-renewal of liquid lithium surface, elimination of plasma pollution and lithium accumulation in tokamak chamber. The possibility of PFC protection from the high power load related to cooling of the tokamak boundary plasma by radiation of non-fully stripped lithium ions supported by experimental results. This approach demonstrated in scheme of closed loops of Li circulation in the tokamak vacuum chamber and realized in a series of design of tokamak in-vessel elements.

  17. Thickness determination of polymeric multilayer surface protection systems for concrete by means of pulse thermography

    NASA Astrophysics Data System (ADS)

    Altenburg, S. J.; Krankenhagen, R.; Bavendiek, F.

    2017-02-01

    For thickness determination of polymer based surface protection systems for concrete surfaces, so far only destructive measurement techniques are available. Pulse thermography appears to be well suited for non-destructive thickness evaluation in these systems. Here, we present first results of the development of a respective measurement and analysis procedure. Since surface protection systems consist of a number of layers, a model for the calculation of the surface temperature of a multi-layer structure on a semi-infinite (concrete) substrate in pulse thermography setup was developed. It considers semitransparency of the upmost layer and thermal losses at the surface. It also supports the use of an arbitrary temporal shape of the heating pulse to properly describe the measurement conditions for different heat sources. Simulations for one and three layers on the substrate are presented and first results from fitting the model to experimental data for thickness determination and verification of the model are presented.

  18. Providing the full DDF link protection for bus-connected SIEPON based system architecture

    NASA Astrophysics Data System (ADS)

    Hwang, I.-Shyan; Pakpahan, Andrew Fernando; Liem, Andrew Tanny; Nikoukar, AliAkbar

    2016-09-01

    Currently a massive amount of traffic per second is delivered through EPON systems, one of the prominent access network technologies for delivering the next generation network. Therefore, it is vital to keep the EPON optical distribution network (ODN) working by providing the necessity protection mechanism in the deployed devices; otherwise, when failures occur it will cause a great loss for both network operators and business customers. In this paper, we propose a bus-connected architecture to protect and recover distribution drop fiber (DDF) link faults or transceiver failures at ONU(s) in SIEPON system. The proposed architecture provides a cost-effective architecture, which delivers the high fault-tolerance in handling multiple DDF faults, while also providing flexibility in choosing the backup ONU assignments. Simulation results show that the proposed architecture provides the reliability and maintains quality of service (QoS) performance in terms of mean packet delay, system throughput, packet loss and EF jitter when DDF link failures occur.

  19. AEROMETRIC INFORMATION RETRIEVAL SYSTEM (AIRS) -GEOGRAPHIC, COMMON, AND MAINTENANCE SUBSYSTEM (GCS)

    EPA Science Inventory

    Aerometric Information Retrieval System (AIRS) is a computer-based repository of information about airborne pollution in the United States and various World Health Organization (WHO) member countries. AIRS is administered by the U.S. Environmental Protection Agency, and runs on t...

  20. THE SCIENCE BEHIND THE ICRP 2005 RECOMMENDATIONS

    EPA Science Inventory

    The ICRP 2005 Recommendations are stated to be "based on a simple, but widely applicable, general system of protection that will clarify its objectives and will provide a basis for the more formal systems needed by operating managements and regulators". The Recommendati...

  1. Lessons Learned from Development of De-identification System for Biomedical Research in a Korean Tertiary Hospital.

    PubMed

    Shin, Soo-Yong; Lyu, Yongman; Shin, Yongdon; Choi, Hyo Joung; Park, Jihyun; Kim, Woo-Sung; Lee, Jae Ho

    2013-06-01

    The Korean government has enacted two laws, namely, the Personal Information Protection Act and the Bioethics and Safety Act to prevent the unauthorized use of medical information. To protect patients' privacy by complying with governmental regulations and improve the convenience of research, Asan Medical Center has been developing a de-identification system for biomedical research. We reviewed Korean regulations to define the scope of the de-identification methods and well-known previous biomedical research platforms to extract the functionalities of the systems. Based on these review results, we implemented necessary programs based on the Asan Medical Center Information System framework which was built using the Microsoft. NET Framework and C#. The developed de-identification system comprises three main components: a de-identification tool, a search tool, and a chart review tool. The de-identification tool can substitute a randomly assigned research ID for a hospital patient ID, remove the identifiers in the structured format, and mask them in the unstructured format, i.e., texts. This tool achieved 98.14% precision and 97.39% recall for 6,520 clinical notes. The search tool can find the number of patients which satisfies given search criteria. The chart review tool can provide de-identified patient's clinical data for review purposes. We found that a clinical data warehouse was essential for successful implementation of the de-identification system, and this system should be tightly linked to an electronic Institutional Review Board system for easy operation of honest brokers. Additionally, we found that a secure cloud environment could be adopted to protect patients' privacy more thoroughly.

  2. Modeling of Protection in Dynamic Simulation Using Generic Relay Models and Settings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Samaan, Nader A.; Dagle, Jeffery E.; Makarov, Yuri V.

    This paper shows how generic protection relay models available in planning tools can be augmented with settings that are based on NERC standards or best engineering practice. Selected generic relay models in Siemens PSS®E have been used in dynamic simulations in the proposed approach. Undervoltage, overvoltage, underfrequency, and overfrequency relays have been modeled for each generating unit. Distance-relay protection was modeled for transmission system protection. Two types of load-shedding schemes were modeled: underfrequency (frequency-responsive non-firm load shedding) and underfrequency and undervoltage firm load shedding. Several case studies are given to show the impact of protection devices on dynamic simulations. Thismore » is useful for simulating cascading outages.« less

  3. In vivo evaluation of an oral drug delivery system for peptides based on S-protected thiolated chitosan.

    PubMed

    Dünnhaupt, Sarah; Barthelmes, Jan; Iqbal, Javed; Perera, Glen; Thurner, Clemens C; Friedl, Heike; Bernkop-Schnürch, Andreas

    2012-06-28

    The aim of the present study was the development and evaluation in vitro as well as in vivo of an oral delivery system based on a novel type of thiolated chitosan, so-called S-protected thiolated chitosan, for the peptide drug antide. The sulfhydryl ligand thioglycolic acid (TGA) was covalently attached to chitosan (CS) in the first step of modification. In the second step, these thiol groups of thiolated chitosan were protected by disulfide bond formation with the thiolated aromatic residue 6-mercaptonicotinamide (6-MNA). Absorptive transport studies of antide were evaluated ex vivo using rat intestinal mucosa. Matrix tablets of each polymer sample were prepared and their effect on the absorption of antide evaluated in vivo in male Sprague-Dawley rats. In addition, tablets were examined in terms of their disintegration, swelling and drug release behavior. The resulting S-protected thiomer (TGA-MNA) exhibited 840μmol of covalently linked 6-MNA per gram thiomer. Based on the implementation of this hydrophobic ligand on the thiolated backbone, the disintegration behavior was reduced greatly and a controlled release of the peptide could be achieved. Furthermore, permeation studies with TGA-MNA on rat intestine revealed a 4.5-fold enhanced absorptive transport of the peptide in comparison to antide in solution. Additional in vivo studies confirmed the potential of this novel conjugate. Oral administration of antide in solution led to only very small detectable quantities in plasma with an absolute and relative bioavailability (BA) of 0.003 and 0.03%, only. In contrast, with antide incorporated in TGA-MNA matrix tablets an absolute and relative BA of 1.4 and 10.9% could be reached, resulting in a 421-fold increased area under the plasma concentration time curve (AUC) compared to the antide solution. According to these results, S-protected thiolated chitosan as oral drug delivery system might be a valuable tool for improving the bioavailability of peptides. Copyright © 2012 Elsevier B.V. All rights reserved.

  4. Automated enclosure and protection system for compact solar-tracking spectrometers

    NASA Astrophysics Data System (ADS)

    Heinle, Ludwig; Chen, Jia

    2018-04-01

    A novel automated enclosure for protecting solar-tracking atmospheric instruments was designed, constructed, and successfully tested under various weather conditions. A complete automated measurement system, consisting of a compact solar-tracking Fourier transform infrared (FTIR) spectrometer (EM27/SUN) and the enclosure, has been deployed in central Munich to monitor greenhouse gases since 2016 and withstood all critical weather conditions, including rain, storms, and snow. It provided ground-based measurements of column-averaged concentrations of CO2, CH4, O2, and H2O throughout this time.The enclosure protects the instrument from harmful environmental influences while allowing open-path measurements in sunny weather. The newly developed and patented cover, a key component of the enclosure, permits unblocked solar measurements while reliably protecting the instrument. This enables dynamic decision regarding taking measurements, and thus increases the number of data samples. This enclosure leads to a fully automated measurement system, which collects data whenever possible without any human interaction. In the long term, the enclosure will provide the foundation for a permanent greenhouse gas monitoring sensor network.

  5. A data protection scheme for a remote vital signs monitoring healthcare service.

    PubMed

    Gritzalis, D; Lambrinoudakis, C

    2000-01-01

    Personal and medical data processed by Healthcare Information Systems must be protected against unauthorized access, modification and withholding. Security measures should be selected to provide the required level of protection in a cost-efficient manner. This is only feasible if specific characteristics of the information system are examined on a basis of a risk analysis methodology. This paper presents the results of a risk analysis, based on the CRAMM methodology, for a healthcare organization offering a patient home-monitoring service through the transmission of vital signs, focusing on the identified security needs and the proposed countermeasures. The architectural and functional models of this service were utilized for identifying and valuating the system assets, the associated threats and vulnerabilities, as well as for assessing the impact on the patients and on the service provider, should the security of any of these assets is affected. A set of adequate organizational, administrative and technical countermeasures is described for the remote vital signs monitoring service, thus providing the healthcare organization with a data protection framework that can be utilized for the development of its own security plan.

  6. Decision Support System for Coastal Protection Layout Design (DSS4CPD) Using Genetic Algorithm (ga) and Multicriteria Analysis (mca)

    NASA Astrophysics Data System (ADS)

    Jinchai, Phinai; Chittaladakorn, Suwatana

    This research has its objective to develop the decision support system on GIS to be used in the coastal erosion protection management. The developed model in this research is called Decision Support System for Coastal Protection Layout Design (DSS4CPD). It has created both for systematic protection and solution measures to the problem by using Genetic Algorithm (GA) and Multicriteria Analysis (MCA) for finding the coastal structure layout optimal solution. In this research, three types of coastal structures were used as structure alternatives for the layout, which are seawall, breakwater, and groin. The coastal area in Nakornsrithammaraj, Thailand was used as the case study. The studied result has found the appropriate position of coastal structures considering the suitable rock size relied on the wave energy, and the appropriate coastal structure position based on the wave breaking line. Using GA and MCA in DSS4CPD, it found the best layout in this project. This DSS4CPD will be used by the authorized decision makers to find the most suitable erosion problem solution.

  7. How the Public Views Wilderness: More Results from the USA Survey on Recreation and the Environment

    Treesearch

    H. Ken Cordell; Michael A. Tarrant; John C. Bergstrom

    1998-01-01

    More than 1,900 people in the United States over age 15 were asked about their awareness of the National Wilderness Preservation System, adequacy of the amount of wilderness protected, and the importance of various benefits or values from wilderness protection. Findings indicate broad support for the concept of wilderness, based mostly on the ecological, environmental...

  8. Overview of current capabilities and research and technology developments for planetary protection

    NASA Astrophysics Data System (ADS)

    Frick, Andreas; Mogul, Rakesh; Stabekis, Pericles; Conley, Catharine A.; Ehrenfreund, Pascale

    2014-07-01

    The pace of scientific exploration of our solar system provides ever-increasing insights into potentially habitable environments, and associated concerns for their contamination by Earth organisms. Biological and organic-chemical contamination has been extensively considered by the COSPAR Panel on Planetary Protection (PPP) and has resulted in the internationally recognized regulations to which spacefaring nations adhere, and which have been in place for 40 years. The only successful Mars lander missions with system-level “sterilization” were the Viking landers in the 1970s. Since then different cleanliness requirements have been applied to spacecraft based on their destination, mission type, and scientific objectives. The Planetary Protection Subcommittee of the NASA Advisory Council has noted that a strategic Research & Technology Development (R&TD) roadmap would be very beneficial to encourage the timely availability of effective tools and methodologies to implement planetary protection requirements. New research avenues in planetary protection for ambitious future exploration missions can best be served by developing an over-arching program that integrates capability-driven developments with mission-driven implementation efforts. This paper analyzes the current status concerning microbial reduction and cleaning methods, recontamination control and bio-barriers, operational analysis methods, and addresses concepts for human exploration. Crosscutting research and support activities are discussed and a rationale for a Strategic Planetary Protection R&TD Roadmap is outlined. Such a roadmap for planetary protection provides a forum for strategic planning and will help to enable the next phases of solar system exploration.

  9. openEHR Based Systems and the General Data Protection Regulation (GDPR).

    PubMed

    Sousa, Mariana; Ferreira, Duarte; Santos-Pereira, Cátia; Bacelar, Gustavo; Frade, Samuel; Pestana, Olívia; Cruz-Correia, Ricardo

    2018-01-01

    The concerns about privacy and personal data protection resulted in reforms of the existing legislation in European Union (EU). The General Data Protection Regulation (GDPR) aims to reform the existing measures on the topic of personal data protection of the European Union citizens, with a strong input on the rights and freedoms of people and in the establishment of rules for the processing of personal data. OpenEHR is a standard that embodies many principles of interoperable and secure software for electronic health records. This work aims to understand to what extent the openEHR standard can be considered a solution for the requirements needed by GDPR. A list of requirements for a Hospital Information Systems (HIS) compliant with GDPR and an identification of openEHR specifications was made. The requirements were categorized and compared with the specifications. The requirements identified for the systems were matched with the openEHR specifications, which result in 16 requirements matched with openEHR. All the specifications identified matched at least one requirement. OpenEHR is a solution for the development of HIS that reinforce privacy and personal data protection, ensuring that they are contemplated in the system development. The institutions can secure that their Eletronic Health Record are compliant with GDPR while safeguarding the medical data quality and, as a result, the healthcare delivery.

  10. Mechanism analysis of Magnetohydrodynamic heat shield system and optimization of externally applied magnetic field

    NASA Astrophysics Data System (ADS)

    Li, Kai; Liu, Jun; Liu, Weiqiang

    2017-04-01

    As a novel thermal protection technique for hypersonic vehicles, Magnetohydrodynamic (MHD) heat shield system has been proved to be of great intrinsic value in the hypersonic field. In order to analyze the thermal protection mechanisms of such a system, a physical model is constructed for analyzing the effect of the Lorentz force components in the counter and normal directions. With a series of numerical simulations, the dominating Lorentz force components are analyzed for the MHD heat flux mitigation in different regions of a typical reentry vehicle. Then, a novel magnetic field with variable included angle between magnetic induction line and streamline is designed, which significantly improves the performance of MHD thermal protection in the stagnation and shoulder areas. After that, the relationships between MHD shock control and MHD thermal protection are investigated, based on which the magnetic field above is secondarily optimized obtaining better performances of both shock control and thermal protection. Results show that the MHD thermal protection is mainly determined by the Lorentz force's effect on the boundary layer. From the stagnation to the shoulder region, the flow deceleration effect of the counter-flow component is weakened while the flow deflection effect of the normal component is enhanced. Moreover, there is no obviously positive correlation between the MHD shock control and thermal protection. But once a good Lorentz force's effect on the boundary layer is guaranteed, the thermal protection performance can be further improved with an enlarged shock stand-off distance by strengthening the counter-flow Lorentz force right after shock.

  11. Design and Implementation of a Wireless Sensor Network-Based Remote Water-Level Monitoring System

    PubMed Central

    Li, Xiuhong; Cheng, Xiao; Gong, Peng; Yan, Ke

    2011-01-01

    The proposed remote water-level monitoring system (RWMS) consists of a field sensor module, a base station module, adata center module and aWEB releasing module. It has advantages in real time and synchronized remote control, expandability, and anti-jamming capabilities. The RWMS can realize real-time remote monitoring, providing early warning of events and protection of the safety of monitoring personnel under certain dangerous circumstances. This system has been successfully applied in Poyanghu Lake. The cost of the whole system is approximately 1,500 yuan (RMB). PMID:22319377

  12. Design and implementation of a wireless sensor network-based remote water-level monitoring system.

    PubMed

    Li, Xiuhong; Cheng, Xiao; Gong, Peng; Yan, Ke

    2011-01-01

    The proposed remote water-level monitoring system (RWMS) consists of a field sensor module, a base station module, a data center module and a WEB releasing module. It has advantages in real time and synchronized remote control, expandability, and anti-jamming capabilities. The RWMS can realize real-time remote monitoring, providing early warning of events and protection of the safety of monitoring personnel under certain dangerous circumstances. This system has been successfully applied in Poyanghu Lake. The cost of the whole system is approximately 1,500 yuan (RMB).

  13. New Encryption Scheme of One-Time Pad Based on KDC

    NASA Astrophysics Data System (ADS)

    Xie, Xin; Chen, Honglei; Wu, Ying; Zhang, Heng; Wu, Peng

    As more and more leakage incidents come up, traditional encryption system has not adapted to the complex and volatile network environment, so, there should be a new encryption system that can protect information security very well, this is the starting point of this paper. Based on DES and RSA encryption system, this paper proposes a new scheme of one time pad, which really achieves "One-time pad" and provides information security a new and more reliable encryption method.

  14. Feasibility Study of Economics and Performance of Solar Photovoltaics at the Ft. Hood Military Base Outside Killeen, Texas. A Study Prepared in Partnership with the Environmental Protection Agency for the RE-Powering America's Land Initiative: Siting Renewable Energy on Potentially Contaminated Land and Mine Sites

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Geiger, J.; Lisell, L.; Mosey, G.

    2013-10-01

    The U.S. Environmental Protection Agency (EPA), in accordance with the RE-Powering America's Land initiative through the Region 6 contract, selected Ft. Hood Army Base in Killeen, Texas, for a feasibility study of renewable energy production. The National Renewable Energy Laboratory (NREL) provided technical assistance for this project. The purpose of this study is to assess the site for possible photovoltaic (PV) system installations and estimate the cost, performance, and site impacts of different PV options. In addition, the report recommends financing options that could assist in the implementation of a PV system at the site.

  15. How Accumulated Real Life Stress Experience and Cognitive Speed Interact on Decision-Making Processes

    PubMed Central

    Friedel, Eva; Sebold, Miriam; Kuitunen-Paul, Sören; Nebe, Stephan; Veer, Ilya M.; Zimmermann, Ulrich S.; Schlagenhauf, Florian; Smolka, Michael N.; Rapp, Michael; Walter, Henrik; Heinz, Andreas

    2017-01-01

    Rationale: Advances in neurocomputational modeling suggest that valuation systems for goal-directed (deliberative) on one side, and habitual (automatic) decision-making on the other side may rely on distinct computational strategies for reinforcement learning, namely model-free vs. model-based learning. As a key theoretical difference, the model-based system strongly demands cognitive functions to plan actions prospectively based on an internal cognitive model of the environment, whereas valuation in the model-free system relies on rather simple learning rules from operant conditioning to retrospectively associate actions with their outcomes and is thus cognitively less demanding. Acute stress reactivity is known to impair model-based but not model-free choice behavior, with higher working memory capacity protecting the model-based system from acute stress. However, it is not clear which impact accumulated real life stress has on model-free and model-based decision systems and how this influence interacts with cognitive abilities. Methods: We used a sequential decision-making task distinguishing relative contributions of both learning strategies to choice behavior, the Social Readjustment Rating Scale questionnaire to assess accumulated real life stress, and the Digit Symbol Substitution Test to test cognitive speed in 95 healthy subjects. Results: Individuals reporting high stress exposure who had low cognitive speed showed reduced model-based but increased model-free behavioral control. In contrast, subjects exposed to accumulated real life stress with high cognitive speed displayed increased model-based performance but reduced model-free control. Conclusion: These findings suggest that accumulated real life stress exposure can enhance reliance on cognitive speed for model-based computations, which may ultimately protect the model-based system from the detrimental influences of accumulated real life stress. The combination of accumulated real life stress exposure and slower information processing capacities, however, might favor model-free strategies. Thus, the valence and preference of either system strongly depends on stressful experiences and individual cognitive capacities. PMID:28642696

  16. How Accumulated Real Life Stress Experience and Cognitive Speed Interact on Decision-Making Processes.

    PubMed

    Friedel, Eva; Sebold, Miriam; Kuitunen-Paul, Sören; Nebe, Stephan; Veer, Ilya M; Zimmermann, Ulrich S; Schlagenhauf, Florian; Smolka, Michael N; Rapp, Michael; Walter, Henrik; Heinz, Andreas

    2017-01-01

    Rationale: Advances in neurocomputational modeling suggest that valuation systems for goal-directed (deliberative) on one side, and habitual (automatic) decision-making on the other side may rely on distinct computational strategies for reinforcement learning, namely model-free vs. model-based learning. As a key theoretical difference, the model-based system strongly demands cognitive functions to plan actions prospectively based on an internal cognitive model of the environment, whereas valuation in the model-free system relies on rather simple learning rules from operant conditioning to retrospectively associate actions with their outcomes and is thus cognitively less demanding. Acute stress reactivity is known to impair model-based but not model-free choice behavior, with higher working memory capacity protecting the model-based system from acute stress. However, it is not clear which impact accumulated real life stress has on model-free and model-based decision systems and how this influence interacts with cognitive abilities. Methods: We used a sequential decision-making task distinguishing relative contributions of both learning strategies to choice behavior, the Social Readjustment Rating Scale questionnaire to assess accumulated real life stress, and the Digit Symbol Substitution Test to test cognitive speed in 95 healthy subjects. Results: Individuals reporting high stress exposure who had low cognitive speed showed reduced model-based but increased model-free behavioral control. In contrast, subjects exposed to accumulated real life stress with high cognitive speed displayed increased model-based performance but reduced model-free control. Conclusion: These findings suggest that accumulated real life stress exposure can enhance reliance on cognitive speed for model-based computations, which may ultimately protect the model-based system from the detrimental influences of accumulated real life stress. The combination of accumulated real life stress exposure and slower information processing capacities, however, might favor model-free strategies. Thus, the valence and preference of either system strongly depends on stressful experiences and individual cognitive capacities.

  17. Capacity and principles of participation of the provincial fund of environmental protection and water management in Cracow in Cracow program of elimination of low emission sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bolek, K.; Sarzynski, H.

    1995-12-31

    In general, the principles of environmental protection was determined by Law issued January 31, 1980. Certain detailed solutions have been included in several amendments in subsequent years and the uniformed text of the Law on Environmental Protection and Creation was published in 1994. The Provincial Fund of Environmental Protection and Water Management was established in 1989 but until 1993 the Fund has no legal status. The main purpose of the creation of such fund was to assign certain financial means to the defined tasks related to environmental protection. This way the fund accumulates financial means from the fees paid formore » the usage of the natural environmental for business purposes and from penalties becoming due in the case of non-observance of the environmental protection standards. On the other hand, the Fund spends money for tasks in the field of environmental protection requiring urgent implementation. It should be added that - after few amendments brought into force - the Provincial Funds are able to assign a greater amount of money to the implementation of these tasks. The basic purposes of Provincial Fund activity, defined by Law, determine the policy and criteria of the selection of undertaking. This is also a base for making programs of activity and for creation of the list of priorities. The environmental protection problems in the individual provinces are different. Therefore, the scope of works partly financed by the Fund is very differentiated both in essence and in the method of financing. The former system of subsidies is now being replaced with a wide range of partial financing of undertakings in the field of environmental protection. The system of selection of these undertakings has been changed essentially. The selection of tasks and methods of their financing is based on economic criteria.« less

  18. Lunar articulated remote transportation system

    NASA Technical Reports Server (NTRS)

    Beech, Geoffrey; Conley, Gerald; Diaz, Claudine; Dimella, Timothy; Dodson, Pete; Hykin, Jeff; Richards, Byron; Richardson, Kroy; Shetzer, Christie; Vandyke, Melissa

    1990-01-01

    A first generation lunar transportation vehicle was designed for use on the surface of the Moon between the years 2010 and 2020. Attention is focussed on specific design details on all components of the Lunar Articulated Remote Transportation System (Lunar ARTS). The Lunar ARTS will be a three cart, six-wheeled articulated vehicle. It's purpose will be for the transportation of astronauts and/or materials for excavation purposes at a short distance from the base (37.5 kilometers). The power system includes fuel cells for both the primary system and the back-up system. The vehicle has the option of being operated in a manned or unmanned mode. The unmanned mode includes stereo imaging with signal processing for navigation. For manned missions the display console is a digital readout displayed on the inside of the asronaut's helmet. A microprocessor is also on board the vehicle. Other components of the vehicle include: a double wishbone/flexible hemispherical wheel suspension; chassis; a steering system; motors; seat restraints, heat rejection systems; solar flare protection; dust protection; and meteoroid protection. A one-quarter scale dynamic model was built to study the dynamic behavior of the vehicle. The dynamic model closely captures the mechanical and electrical details of the total design.

  19. WriteShield: A Pseudo Thin Client for Prevention of Information Leakage

    NASA Astrophysics Data System (ADS)

    Kirihata, Yasuhiro; Sameshima, Yoshiki; Onoyama, Takashi; Komoda, Norihisa

    While thin-client systems are diffusing as an effective security method in enterprises and organizations, there is a new approach called pseudo thin-client system. In this system, local disks of clients are write-protected and user data is forced to save on the central file server to realize the same security effect of conventional thin-client systems. Since it takes purely the software-based simple approach, it does not require the hardware enhancement of network and servers to reduce the installation cost. However there are several problems such as no write control to external media, memory depletion possibility, and lower security because of the exceptional write permission to the system processes. In this paper, we propose WriteShield, a pseudo thin-client system which solves these issues. In this system, the local disks are write-protected with volume filter driver and it has a virtual cache mechanism to extend the memory cache size for the write protection. This paper presents design and implementation details of WriteShield. Besides we describe the security analysis and simulation evaluation of paging algorithms for virtual cache mechanism and measure the disk I/O performance to verify its feasibility in the actual environment.

  20. Ceramic-ceramic shell tile thermal protection system and method thereof

    NASA Technical Reports Server (NTRS)

    Riccitiello, Salvatore R. (Inventor); Smith, Marnell (Inventor); Goldstein, Howard E. (Inventor); Zimmerman, Norman B. (Inventor)

    1986-01-01

    A ceramic reusable, externally applied composite thermal protection system (TPS) is proposed. The system functions by utilizing a ceramic/ceramic upper shell structure which effectively separates its primary functions as a thermal insulator and as a load carrier to transmit loads to the cold structure. The composite tile system also prevents impact damage to the atmospheric entry vehicle thermal protection system. The composite tile comprises a structurally strong upper ceramic/ceramic shell manufactured from ceramic fibers and ceramic matrix meeting the thermal and structural requirements of a tile used on a re-entry aerospace vehicle. In addition, a lightweight high temperature ceramic lower temperature base tile is used. The upper shell and lower tile are attached by means effective to withstand the extreme temperatures (3000 to 3200F) and stress conditions. The composite tile may include one or more layers of variable density rigid or flexible thermal insulation. The assembly of the overall tile is facilitated by two or more locking mechanisms on opposing sides of the overall tile assembly. The assembly may occur subsequent to the installation of the lower shell tile on the spacecraft structural skin.

  1. Requiem for a Data Base System.

    DTIC Science & Technology

    1979-01-18

    were defined -- - 2) the final syntax and semantics of QUEL were defined 3) protection was figured out 14) EQUEL was designed 5) concurrency control and...features which were not thought about in the initial design (such as concurrency control and recovery) and began worrying about distributed data...made in progress rather than on eventual corrections. Some attention is also given to the role of structured design in a data base system implementation

  2. A Novel Wide-Area Backup Protection Based on Fault Component Current Distribution and Improved Evidence Theory

    PubMed Central

    Zhang, Zhe; Kong, Xiangping; Yin, Xianggen; Yang, Zengli; Wang, Lijun

    2014-01-01

    In order to solve the problems of the existing wide-area backup protection (WABP) algorithms, the paper proposes a novel WABP algorithm based on the distribution characteristics of fault component current and improved Dempster/Shafer (D-S) evidence theory. When a fault occurs, slave substations transmit to master station the amplitudes of fault component currents of transmission lines which are the closest to fault element. Then master substation identifies suspicious faulty lines according to the distribution characteristics of fault component current. After that, the master substation will identify the actual faulty line with improved D-S evidence theory based on the action states of traditional protections and direction components of these suspicious faulty lines. The simulation examples based on IEEE 10-generator-39-bus system show that the proposed WABP algorithm has an excellent performance. The algorithm has low requirement of sampling synchronization, small wide-area communication flow, and high fault tolerance. PMID:25050399

  3. Reliable inverter systems

    NASA Technical Reports Server (NTRS)

    Nagano, S.

    1979-01-01

    Base driver with common-load-current feedback protects paralleled inverter systems from open or short circuits. Circuit eliminates total system oscillation that can occur in conventional inverters because of open circuit in primary transformer winding. Common feedback signal produced by functioning modules forces operating frequency of failed module to coincide with clock drive so module resumes normal operating frequency in spite of open circuit.

  4. Development of Ion-Plasma Coatings for Protecting Intermetallic Refractory Alloys VKNA-1V and VKNA-25 in the Temperature Range of 1200 - 1250°C

    NASA Astrophysics Data System (ADS)

    Budinovskii, S. A.; Matveev, P. V.; Smirnov, A. A.

    2017-05-01

    Multilayer heat-resistant ion-plasma coatings for protecting the parts of the hot duct of gas-turbine engines produced from refractory nickel alloys based on VKNA intermetallics from high-temperature oxidation are considered. Coatings of the Ni - Cr - Al (Ta, Re, Hf, Y) + Al - Ni - Y systems are tested for high-temperature strength at 1200 and 1250°C. Metallographic and microscopic x-ray spectrum analyses of the structure and composition of the coatings in the initial condition and after the testing are performed. The effect of protective coatings of the Ni - Cr - Al - Hf + Al - Ni - Y systems on the long-term strength of alloys VKNA-1V and VKNA-25 at 1200°C is studied.

  5. Explosion safety in industrial electrostatics

    NASA Astrophysics Data System (ADS)

    Szabó, S. V.; Kiss, I.; Berta, I.

    2011-01-01

    Complicated industrial systems are often endangered by electrostatic hazards, both from atmospheric (lightning phenomenon, primary and secondary lightning protection) and industrial (technological problems caused by static charging and fire and explosion hazards.) According to the classical approach protective methods have to be used in order to remove electrostatic charging and to avoid damages, however no attempt to compute the risk before and after applying the protective method is made, relying instead on well-educated and practiced expertise. The Budapest School of Electrostatics - in close cooperation with industrial partners - develops new suitable solutions for probability based decision support (Static Control Up-to-date Technology, SCOUT) using soft computing methods. This new approach can be used to assess and audit existing systems and - using the predictive power of the models - to design and plan activities in industrial electrostatics.

  6. Spacecraft Water Exposure Guidelines (SWEGs)

    NASA Technical Reports Server (NTRS)

    James, John T.

    2008-01-01

    As the protection of crew health is a primary focus of the National Aeronautics and Space Administration, the Space and Life Sciences Directorate (SLSD) is vigilant in setting potable water limits for spaceflight that are health protective. Additional it is important that exposure limits not be set so stringently that water purification systems are unnecessarily over designed. With these considerations in mind, NASA has partnered with the National Research Council on Toxicology (NRCCOT) to develop spacecraft water exposure guidelines (SWEGs) for application in spaceflight systems. Based on documented guidance (NRC, 2000) NASA has established 28 SWEGs for chemical components that are particularly relevant to water systems on the International Space Station, the Shuttle and looking forward to Constellation.

  7. Pragmatic ethical basis for radiation protection in diagnostic radiology.

    PubMed

    Malone, Jim; Zölzer, Friedo

    2016-01-01

    Medical ethics has a tried and tested literature and a global active research community. Even among health professionals, literate and fluent in medical ethics, there is low recognition of radiation protection principles such as justification and optimization. On the other hand, many in healthcare environments misunderstand dose limitation obligations and incorrectly believe patients are protected by norms including a dose limit. Implementation problems for radiation protection in medicine possibly flow from apparent inadequacies of the International Commission on Radiological Protection (ICRP) principles taken on their own, coupled with their failure to transfer successfully to the medical world. Medical ethics, on the other hand, is essentially global, is acceptable in most cultures, is intuitively understood in hospitals, and its expectations are monitored, even by managements. This article presents an approach to ethics in diagnostic imaging rooted in the medical tradition, and alert to contemporary social expectations. ICRP and the International Radiation Protection Association (IRPA), both alert to growing ethical concerns, organized a series of consultations on ethics for general radiation protection in the last few years. The literature on medical ethics and implicit ICRP ethical values were reviewed qualitatively, with a view to identifying a system that will help guide contemporary behaviour in radiation protection of patients. Application of the system is illustrated in six clinical scenarios. The proposed system is designed, as far as is possible, so as not to be in conflict with the conclusions emerging from the ICRP/IRPA consultations. A widely recognized and well-respected system of medical ethics was identified that has global reach and claims acceptance in all cultures. Three values based on this system are grouped with two additional values to provide an ethical framework for application in diagnostic imaging. This system has the potential to be robust and to reach conclusions that are in accord with contemporary medical, social and ethical thinking. The system is not intended to replace the ICRP principles. Rather, it is intended as a well-informed interim approach that will help judge and analyse situations that arouse ethical concerns in radiology. Six scenarios illustrate the practicality of the value system in alerting one to possible deficits in practice. Five widely recognized values and the basis for them are identified to support the contemporary practice of diagnostic radiology. These are essential to complement the widely used ICRP principles pending further development in the area.

  8. Centrifugal compressor surge detecting method based on wavelet analysis of unsteady pressure fluctuations in typical stages

    NASA Astrophysics Data System (ADS)

    Izmaylov, R.; Lebedev, A.

    2015-08-01

    Centrifugal compressors are complex energy equipment. Automotive control and protection system should meet the requirements: of operation reliability and durability. In turbocompressors there are at least two dangerous areas: surge and rotating stall. Antisurge protecting systems usually use parametric or feature methods. As a rule industrial system are parametric. The main disadvantages of anti-surge parametric systems are difficulties in mass flow measurements in natural gas pipeline compressor. The principal idea of feature method is based on the experimental fact: as a rule just before the onset of surge rotating or precursor stall established in compressor. In this case the problem consists in detecting of unsteady pressure or velocity fluctuations characteristic signals. Wavelet analysis is the best method for detecting onset of rotating stall in spite of high level of spurious signals (rotating wakes, turbulence, etc.). This method is compatible with state of the art DSP systems of industrial control. Examples of wavelet analysis application for detecting onset of rotating stall in typical stages centrifugal compressor are presented. Experimental investigations include unsteady pressure measurement and sophisticated data acquisition system. Wavelet transforms used biorthogonal wavelets in Mathlab systems.

  9. Flexible Foam Protection Materials for Constellation Space Suit Element Portable Life Support Subsystem Packaging Study

    NASA Technical Reports Server (NTRS)

    Tang, Henry H.; Orndoff, Evelyne S.; Thomas, Gretchen A.

    2009-01-01

    This paper discusses the effort in evaluating and selecting a light weight impact protection material for the Constellation Space Suit Element (CSSE) Portable Life Support Subsystem (PLSS) conceptual packaging study. A light weight material capable of holding and protecting the components inside the PLSS is required to demonstrate the viability of the flexible PLSS packaging concept. The material needs to distribute, dissipate, and absorb the impact energy of the PLSS falling on the lunar surface. It must also be very robust and function in the extreme lunar thermal vacuum environment for up to one hundred Extravehicular Activity (EVA) missions. This paper documents the performance requirements for selecting a foam protection material, and the methodologies for evaluating commercial off-the-shelf (COTS) foam protection materials. It also presents the materials properties test results and impact drop test results of the various foam materials evaluated in the study. The findings from this study suggest that a foam based flexible protection system is a viable solution for PLSS packaging. However, additional works are needed to optimize COTS foam properties or to develop a composite foam system that will meet all the performance requirements for the CSSE PLSS flexible packaging.

  10. Software Engineering and Swarm-Based Systems

    NASA Technical Reports Server (NTRS)

    Hinchey, Michael G.; Sterritt, Roy; Pena, Joaquin; Rouff, Christopher A.

    2006-01-01

    We discuss two software engineering aspects in the development of complex swarm-based systems. NASA researchers have been investigating various possible concept missions that would greatly advance future space exploration capabilities. The concept mission that we have focused on exploits the principles of autonomic computing as well as being based on the use of intelligent swarms, whereby a (potentially large) number of similar spacecraft collaborate to achieve mission goals. The intent is that such systems not only can be sent to explore remote and harsh environments but also are endowed with greater degrees of protection and longevity to achieve mission goals.

  11. [Lipid peroxidation and antioxidant protection system in cosmonauts following short-term missions to the International Space Station].

    PubMed

    Zhuravleva, O A

    2011-01-01

    Blood serum of Russian members (n = 21) of the 8 to 12-day visiting missions to the ISS was analyzed before and after mission for products of lipid peroxidation, i.e. diene conjugates, malone dialdehyde, Schiff bases and tocopherol, the primary lipid antioxidant. No reliable change was found in the parameters postflight as compared with preflight values. It may be concluded that 14 days in orbital flight and the factors of re-entry and early recovery do not affect significantly the mechanisms of free radical lipid oxidation and functioning of the antioxidant protection system.

  12. Research on offense and defense technology for iOS kernel security mechanism

    NASA Astrophysics Data System (ADS)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  13. Creating Protected Areas on Public Lands: Is There Room for Additional Conservation?

    PubMed

    Arriagada, Rodrigo A; Echeverria, Cristian M; Moya, Danisa E

    2016-01-01

    Most evaluations of the effectiveness of PAs have relied on indirect estimates based on comparisons between protected and unprotected areas. Such methods can be biased when protection is not randomly assigned. We add to the growing literature on the impact of PAs by answering the following research questions: What is the impact of Chilean PAs on deforestation which occurred between 1986 and 2011? How do estimates of the impact of PAs vary when using only public land as control units? We show that the characteristics of the areas in which protected and unprotected lands are located differ significantly. To satisfactorily estimate the effects of PAs, we use matching methods to define adequate control groups, but not as in previous research. We construct control groups using separately non-protected private areas and non-protected public lands. We find that PAs avoid deforestation when using unprotected private lands as valid controls, however results show no impact when the control group is based only on unprotected public land. Different land management regimes, and higher levels of enforcement inside public lands may reduce the opportunity to add additional conservation benefits when the national systems for PAs are based on the protection of previously unprotected public lands. Given that not all PAs are established to avoid deforestation, results also admit the potential for future studies to include other outcomes including forest degradation (not just deforestation), biodiversity, wildlife, primary forests (not forests in general), among others.

  14. Creating Protected Areas on Public Lands: Is There Room for Additional Conservation?

    PubMed Central

    Arriagada, Rodrigo A.; Echeverria, Cristian M.; Moya, Danisa E.

    2016-01-01

    Most evaluations of the effectiveness of PAs have relied on indirect estimates based on comparisons between protected and unprotected areas. Such methods can be biased when protection is not randomly assigned. We add to the growing literature on the impact of PAs by answering the following research questions: What is the impact of Chilean PAs on deforestation which occurred between 1986 and 2011? How do estimates of the impact of PAs vary when using only public land as control units? We show that the characteristics of the areas in which protected and unprotected lands are located differ significantly. To satisfactorily estimate the effects of PAs, we use matching methods to define adequate control groups, but not as in previous research. We construct control groups using separately non-protected private areas and non-protected public lands. We find that PAs avoid deforestation when using unprotected private lands as valid controls, however results show no impact when the control group is based only on unprotected public land. Different land management regimes, and higher levels of enforcement inside public lands may reduce the opportunity to add additional conservation benefits when the national systems for PAs are based on the protection of previously unprotected public lands. Given that not all PAs are established to avoid deforestation, results also admit the potential for future studies to include other outcomes including forest degradation (not just deforestation), biodiversity, wildlife, primary forests (not forests in general), among others. PMID:26848856

  15. Coherent feedback control of a single qubit in diamond

    NASA Astrophysics Data System (ADS)

    Hirose, Masashi; Cappellaro, Paola

    2016-04-01

    Engineering desired operations on qubits subjected to the deleterious effects of their environment is a critical task in quantum information processing, quantum simulation and sensing. The most common approach relies on open-loop quantum control techniques, including optimal-control algorithms based on analytical or numerical solutions, Lyapunov design and Hamiltonian engineering. An alternative strategy, inspired by the success of classical control, is feedback control. Because of the complications introduced by quantum measurement, closed-loop control is less pervasive in the quantum setting and, with exceptions, its experimental implementations have been mainly limited to quantum optics experiments. Here we implement a feedback-control algorithm using a solid-state spin qubit system associated with the nitrogen vacancy centre in diamond, using coherent feedback to overcome the limitations of measurement-based feedback, and show that it can protect the qubit against intrinsic dephasing noise for milliseconds. In coherent feedback, the quantum system is connected to an auxiliary quantum controller (ancilla) that acquires information about the output state of the system (by an entangling operation) and performs an appropriate feedback action (by a conditional gate). In contrast to open-loop dynamical decoupling techniques, feedback control can protect the qubit even against Markovian noise and for an arbitrary period of time (limited only by the coherence time of the ancilla), while allowing gate operations. It is thus more closely related to quantum error-correction schemes, although these require larger and increasing qubit overheads. Increasing the number of fresh ancillas enables protection beyond their coherence time. We further evaluate the robustness of the feedback protocol, which could be applied to quantum computation and sensing, by exploring a trade-off between information gain and decoherence protection, as measurement of the ancilla-qubit correlation after the feedback algorithm voids the protection, even if the rest of the dynamics is unchanged.

  16. Integration & Validation of LCU with Different Sub-systems for Diacrode based amplifier

    NASA Astrophysics Data System (ADS)

    Rajnish, Kumar; Verma, Sriprakash; Soni, Dipal; Patel, Hriday; Suthar, Gajendra; Dalicha, Hrushikesh; Dhola, Hitesh; Patel, Amit; Upadhayay, Dishang; Jha, Akhil; Patel, Manoj; Trivedi, Rajesh; Machchhar, Harsha; Singh, Raghuraj; Mukherjee, Aparajita

    2017-04-01

    ITER-India is responsible to deliver nine (8+1 spare) ICH & CD Power Sources to ITER. Each power source is capable to deliver 2.5 MW at 35 to 65 MHz frequency range with a load condition up to VSWR 2:1. For remote operation of different subsystems, Local Control Unit (LCU) is developed. LCU is developed using PXI hardware and Schneider PLC with Lab VIEW-RT developmental environment. All the protection function of the amplifier is running on PXI 7841 R module that ensures hard wired protection logic. There are three level of protection function- first by power supply itself that detects overcurrent/overvoltage and trips itself and generate trip signal for further action. There are some direct hardwired signal interfaces between power supplies to protect the amplifier. Second level of protection is generated through integrated controller of amplifier i.e. Command Control Embedded (CCE) against arc and Anode over current. Third level of Protection is through LCU where different fault signals are received and processed to generate off command for different sub-systems. Before connecting different subsystem with High power RF amplifiers (Driver & Final stage), each subsystem is individually tested through LCU. All protection functions are tested before hooking up the subsystems with main amplifier and initiating RF operation.

  17. Report on the 2015 COSPAR Panel on Planetary Protection Colloquium

    NASA Astrophysics Data System (ADS)

    Hipkin, Victoria; Kminek, Gerhard

    2016-07-01

    In consultation with the COSPAR Scientific Commissions B (Space Studies of the Earth-Moon System, Planets, and Small Bodies of the Solar System) and F (Life Sciences as Related to Space), the COSPAR Panel on Planetary Protection organised a colloquium at the International Space Science Institute (ISSI) in Bern, Switzerland, in September 2015, to cover two pertinent topics: * Icy moon sample return planetary protection requirements * Mars Special Regions planetary protection requirements These two topics were addressed in two separate sessions. Participation from European, North American and Japanese scientists reflected broad expertise from the respective COSPAR Commissions, recent NASA MEPAG Science Analysis Group and National Academies of Sciences, Engineering, and Medicine/European Science Foundation Mars Special Regions Review Committee. The recommendations described in this report are based on discussions that took place during the course of the colloquium and reflect a consensus of the colloquium participants that participated in the two separate sessions. These recommendations are brought to the 2016 COSPAR Scientific Assembly for further input and discussion as part of the recognised process for updating COSPAR Planetary Protection Policy.

  18. Development, description, and application of a geographic information system data base for water resources in karst terrane in Greene County, Missouri

    USGS Publications Warehouse

    Waite, L.A.; Thomson, Kenneth C.

    1993-01-01

    A geographic information system data base was developed for Greene County, Missouri, to provide data for use in the protection of water resources. The geographic information system data base contains the following map layers: geology, cave entrances and passages, county and quadrangle boundary, dye traces, faults, geographic names, hypsography, hydrography, lineaments, Ozark aquifer potentio- metric surface, public land survey system, sink- holes, soils, springs, and transportation. Several serious incidents of ground-water contamination have been reported in the karst terrane developed in soluble carbonate rocks in Greene County. Karst terranes are environmentally sensitive because any contaminant carried by surface runoff has the potential for rapid transport through solution enlarged fractures to the ground-water system. In the karst terrane in Greene County, about 2,500 sinkholes have been located; these sinkholes are potential access points for contamination to the ground-water system. Recent examples of ground-water contamination by sewage, fertilizers, and hydrocarbon chemicals have demonstrated the sensitivity of ground water in the Greene County karst terrane to degradation. The ground-water system is a major source of drinking water for Greene County. The population in Greene County, which includes Springfield, the third largest city in Missouri, is rapidly increasing and the protection of the water resources of Greene County is an increasing concern.

  19. SiGe Based Low Temperature Electronics for Lunar Surface Applications

    NASA Technical Reports Server (NTRS)

    Mojarradi, Mohammad M.; Kolawa, Elizabeth; Blalock, Benjamin; Cressler, John

    2012-01-01

    The temperature at the permanently shadowed regions of the moon's surface is approximately -240 C. Other areas of the lunar surface experience temperatures that vary between 120 C and -180 C during the day and night respectively. To protect against the large temperature variations of the moon surface, traditional electronics used in lunar robotics systems are placed inside a thermally controlled housing which is bulky, consumes power and adds complexity to the integration and test. SiGe Based electronics have the capability to operate over wide temperature range like that of the lunar surface. Deploying low temperature SiGe electronics in a lander platform can minimize the need for the central thermal protection system and enable the development of a new generation of landers and mobility platforms with highly efficient distributed architecture. For the past five years a team consisting of NASA, university and industry researchers has been examining the low temperature and wide temperature characteristic of SiGe based transistors for developing electronics for wide temperature needs of NASA environments such as the Moon, Titan, Mars and Europa. This presentation reports on the status of the development of wide temperature SiGe based electronics for the landers and lunar surface mobility systems.

  20. Harbin 2020 R&D Personnel Demand Forecast Based on Manufacturing Green Innovation System

    NASA Astrophysics Data System (ADS)

    Jiang, Xin; Duan, Yu Ting; Shen, Jun Yi; Zhang, Dong Ying

    2018-06-01

    Because of the constraints of energy conservation and the impact on the environment, the manufacturing industry has adopted sustainable development as the goal, and a green manufacturing innovation system based on environmental protection has emerged. In order to provide R&D personnel support to manufacturing enterprises in Harbin, and in order to promote the construction of a green innovation system for manufacturing and the realization of the 13th Five-Year Plan, this article used the grey forecasting model and the univariate linear regression prediction to predict the number of R&D personnel in Harbin in 2020 based on the number of R&D personnel in 2010-2016, and the predicted values were 24,952 and 31,172 respectively. The results show that if Harbin continues to use its original development model, it will not be able to achieve the established development goals by 2020 because of the shortage of R&D personnel. Therefore, it is necessary to increase investment in R&D personnel so as to achieve the 13th Five-Year Plan of Harbin City and protect the ecological green development goals.

  1. [Study on emission standard system of air pollutants].

    PubMed

    Jiang, Mei; Zhang, Guo-Ning; Zhang, Ming-Hui; Zou, Lan; Wei, Yu-Xia; Ren, Chun

    2012-12-01

    Scientific and reasonable emission standard system of air pollutants helps to systematically control air pollution, enhance the protection of the atmospheric environment effect and improve the overall atmospheric environment quality. Based on the study of development, situation and characteristics of national air pollutants emission standard system, the deficiencies of system were pointed out, which were not supportive, harmonious and perfect, and the improvement measures of emission standard system were suggested.

  2. Meaningful participation for children in the Dutch child protection system: A critical analysis of relevant provisions in policy documents.

    PubMed

    Bouma, Helen; López López, Mónica; Knorth, Erik J; Grietens, Hans

    2018-05-01

    Policymakers are increasingly focusing on the participation of children in the child protection system (CPS). However, research shows that actual practice still needs to be improved. Embedding children's participation in legislation and policy documents is one important prerequisite for achieving meaningful participation in child protection practice. In this study, the participation of children in the Dutch CPS under the new Youth Act 2015 is critically analyzed. National legislation and policy documents were studied using a model of "meaningful participation" based on article 12 of the UNCRC. Results show that the idea of children's participation is deeply embedded in the current Dutch CPS. However, Dutch policy documents do not fully cover the three dimensions of what is considered to be meaningful participation for children: informing, hearing, and involving. Furthermore, children's participation differs among the organizations included in the child protection chain. A clear overall policy concerning the participation of children in the Dutch CPS is lacking. The conclusions of this critical analysis of policy documents and the framework of meaningful participation presented may provide a basis for the embedding of meaningful participation for children in child protection systems of other countries. Copyright © 2018 Elsevier Ltd. All rights reserved.

  3. A life cycle greenhouse gas inventory of a tree production system

    Treesearch

    Alissa Kendall; E. Gregory McPherson

    2012-01-01

    PurposeThis study provides a detailed, process-based life cycle greenhouse gas (GHG) inventory of an ornamental tree production system for urban forestry. The success of large-scale tree planting initiatives for climate protection depends on projects being net sinks for CO2 over their entire life cycle....

  4. ASSESSING UST CORRECTIVE ACTION TECHNOLOGIES: IN SITU SVE-BASED SYSTEMS FOR FREE PRODUCT RECOVERY AND RESIDUAL HYDROCARBON REMOVAL

    EPA Science Inventory

    The number of confirmed releases of petroleum products from underground storage tank (UST) systems has increased significantly since promulgation of the final UST regulations by the U.S. Environmental Protection Agency in December 1988. This increase has outpaced the resources of...

  5. INNOVATIVE TECHNOLOGY VERIFICATION REPORT "FIELD MEASUREMENT TECHNOLOGIES FOR TOTAL PETROLEUM HYDROCARBONS IN SOIL" DEXSIL CORPORATION PETROFLAG SYSTEM

    EPA Science Inventory



    The PetroFLAGTm System developed by Dexsilo Corporation (Dexsil) was demonstrated under the U.S. Environmental Protection Agency Superfund Innovative Technology Evaluation Program in June 2000 at the Navy Base Ventura County site in Port Hueneme, California. The purpose o...

  6. Adverse Outcome Pathways (AOPs) in Human Systems Biology: Gas-Phase Probes for Assessing In Vitro Enzyme System Perturbations

    EPA Science Inventory

    The Air, Climate, and Energy (ACE) and Chemical Safety for Sustainability (CSS) programs at the U.S. EnvironmentalProtection Agency (EPA) encompass broad-based research that includes assessment of the health and environmentalimpacts of anthropogenic and manufactured chemicals. On...

  7. A Study of Compaction and Deformation of a Powder Composite Material of the `Aluminum - Rare Earth Elements' System

    NASA Astrophysics Data System (ADS)

    Rudskoy, A. I.; Tsemenko, V. N.; Ganin, S. V.

    2015-01-01

    The possibility of fabrication of preforms of a composite material with special radiation-protective properties on the base of mechanically alloyed powders of the Al - REM system with the use of methods of severe plastic deformation is shown.

  8. Application research of rail transit safety protection based on laser detection

    NASA Astrophysics Data System (ADS)

    Wang, Zhifei

    2016-10-01

    Platform screen door can not only prevent the passengers fell or jumped the track danger, to passengers bring comfortable waiting environment, but also has the function of environmental protection and energy saving. But platform screen door and train the full-length gap region is insecure in the system design of a hidden, such as passengers for some reason (grab the train) in the interstitial region retention, is sandwiched between the intercity safety door and the door, and such as the region lacks security detection and alarm system, once the passengers in the gap region retention (caught), bring more serious threat to the safety of passengers and traffic safety. This paper from the point of view of the design presents the physical, infrared, laser three safety protection device setting schemes. Domestic intelligence of between rail transit shield door and train security clearance processing used is screen door system standard configuration, the obstacle detection function for avoid passengers stranded in the clearance has strong prevention function. Laser detection research and development projects can access to prevent shield door and train gap clamp safety measures. Rail safety protection method are studied applying laser detection technique. According to the laser reflection equation of foreign body, the characteristics of laser detection of foreign bodies are given in theory. By using statistical analysis method, the workflow of laser detection system is established. On this basis, protection methods is proposed. Finally the simulation and test results show that the laser detection technology in the rail traffic safety protection reliability and stability, And the future laser detection technology in is discussed the development of rail transit.

  9. The Law and Hiring Practices in Faith-Based Schools

    ERIC Educational Resources Information Center

    Russo, Charles J.

    2009-01-01

    A key concern of educational leaders in faith-based schools is their ability to hire faculty members who support institutional missions. Insofar as the American legal system protects the rights of leaders in faith-based schools to hire those who share in school goals, this article is divided into three substantive sections. The first section…

  10. Lowland forest loss in protected areas of Indonesian Borneo.

    PubMed

    Curran, L M; Trigg, S N; McDonald, A K; Astiani, D; Hardiono, Y M; Siregar, P; Caniago, I; Kasischke, E

    2004-02-13

    The ecology of Bornean rainforests is driven by El Niño-induced droughts that trigger synchronous fruiting among trees and bursts of faunal reproduction that sustain vertebrate populations. However, many of these species- and carbon-rich ecosystems have been destroyed by logging and conversion, which increasingly threaten protected areas. Our satellite, Geographic Information System, and field-based analyses show that from 1985 to 2001, Kalimantan's protected lowland forests declined by more than 56% (>29,000 square kilometers). Even uninhabited frontier parks are logged to supply international markets. "Protected" forests have become increasingly isolated and deforested and their buffer zones degraded. Preserving the ecological integrity of Kalimantan's rainforests requires immediate transnational management.

  11. Construction safety monitoring based on the project's characteristic with fuzzy logic approach

    NASA Astrophysics Data System (ADS)

    Winanda, Lila Ayu Ratna; Adi, Trijoko Wahyu; Anwar, Nadjadji; Wahyuni, Febriana Santi

    2017-11-01

    Construction workers accident is the highest number compared with other industries and falls are the main cause of fatal and serious injuries in high rise projects. Generally, construction workers accidents are caused by unsafe act and unsafe condition that can occur separately or together, thus a safety monitoring system based on influencing factors is needed to achieve zero accident in construction industry. The dynamic characteristic in construction causes high mobility for workers while doing the task, so it requires a continuously monitoring system to detect unsafe condition and to protect workers from potential hazards. In accordance with the unique nature of project, fuzzy logic approach is one of the appropriate methods for workers safety monitoring on site. In this study, the focus of discussion is based on the characteristic of construction projects in analyzing "potential hazard" and the "protection planning" to be used in accident prevention. The data have been collected from literature review, expert opinion and institution of safety and health. This data used to determine hazard identification. Then, an application model is created using Delphi programming. The process in fuzzy is divided into fuzzification, inference and defuzzification, according to the data collection. Then, the input and final output data are given back to the expert for assessment as a validation of application model. The result of the study showed that the potential hazard of construction workers accident could be analysed based on characteristic of project and protection system on site and fuzzy logic approach can be used for construction workers accident analysis. Based on case study and the feedback assessment from expert, it showed that the application model can be used as one of the safety monitoring tools.

  12. ECC-based grouping-proof RFID for inpatient medication safety.

    PubMed

    Lin, Qiping; Zhang, Fangguo

    2012-12-01

    Several papers were proposed in which symmetric cryptography was used to design RFID grouping-proof for medication safety in the Journal of Medical Systems. However, if we want to ensure privacy, authentication and protection against the tracking of RFID-tags without losing system scalability, we must design an asymmetric cryptography-based RFID. This paper will propose a new ECC-based grouping-proof for RFID. Our ECC-based grouping-proof reduces the computation of tags and prevents timeout problems from occurring in n-party grouping-proof protocol. Based on asymmetric cryptography, the proposed scheme is practical, secure and efficient for medication applications.

  13. Zein-alginate based oral drug delivery systems: Protection and release of therapeutic proteins.

    PubMed

    Lee, Sungmun; Kim, Yeu-Chun; Park, Ji-Ho

    2016-12-30

    Reactive oxygen species (ROS) play an important role in the development of inflammatory bowel diseases. Superoxide dismutase (SOD) has a great therapeutic potential by scavenging superoxide that is one of ROS; however, in vivo application is limited especially when it is orally administered. SOD is easily degraded in vivo by the harsh conditions of gastrointestinal tract. Here, we design a zein-alginate based oral drug delivery system that protects SOD from the harsh conditions of gastrointestinal tract and releases it in the environment of the small intestine. SOD is encapsulated in zein-alginate nanoparticles (ZAN) via a phase separation method. We demonstrate that ZAN protect SOD from the harsh conditions of the stomach or small intestine condition. ZAN (200:40) at the weight ratio of 200mg zein to 40mg of alginate releases SOD in a pH dependent manner, and it releases 90.8±1.2% of encapsulated SOD at pH 7.4 in 2h, while only 11.4±0.4% of SOD was released at pH 1.3. The encapsulation efficiency of SOD in ZAN (200:40) was 62.1±2.0%. SOD in ZAN (200:40) reduced the intracellular ROS level and it saved 88.9±7.5% of Caco-2 cells from the toxic superoxide in 4 hours. Based on the results, zein-alginate based oral drug delivery systems will have numerous applications to drugs that are easily degradable in the harsh conditions of gastrointestinal tract. Copyright © 2016 Elsevier B.V. All rights reserved.

  14. Groundwater pollution risk assessment. Application to different carbonate aquifers in south Spain

    NASA Astrophysics Data System (ADS)

    Jimenez Madrid, A.; Martinez Navarrete, C.; Carrasco Cantos, F.

    2009-04-01

    Water protection has been considered one of the most important environmental goals in the European politics since the 2000/60/CE Water Framework Directive came into force in 2000, and more specifically in 2006 with the 2006/118/CE Directive on groundwater protection. As one of the necessary requirements to tackle groundwater protection, a pollution risk assessment has been made through the analysis of both the existing hazard human activities map and the intrinsic aquifer vulnerability map, by applying the methodologies proposed by COST Action 620 in an experimental study site in south Spain containing different carbonated aquifers, which supply 8 towns ranging from 2000 to 2500 inhabitants. In order to generate both maps it was necessary to make a field inventory over a 1:10000 topographic base map, followed by Geographic Information System (GIS) processing. The outcome maps show a clear spatial distribution of both pollution risk and intrinsic vulnerability of the carbonated aquifers studied. As a final result, a map of the intensity of groundwater pollution risk is presented, representing and important base for the development of a proper methodology for the protection of groundwater resources for human consumption protection. Keywords. Hazard, Vulnerability, Risk, SIG, Protection

  15. ICRP PUBLICATION 122: radiological protection in geological disposal of long-lived solid radioactive waste.

    PubMed

    Weiss, W; Larsson, C-M; McKenney, C; Minon, J-P; Mobbs, S; Schneider, T; Umeki, H; Hilden, W; Pescatore, C; Vesterlind, M

    2013-06-01

    This report updates and consolidates previous recommendations of the International Commission on Radiological Protection (ICRP) related to solid waste disposal (ICRP, 1985, 1997b, 1998). The recommendations given apply specifically to geological disposal of long-lived solid radioactive waste. The report explains how the ICRP system of radiological protection described in Publication 103 (ICRP, 2007) can be applied in the context of the geological disposal of long-lived solid radioactive waste. Although the report is written as a standalone document, previous ICRP recommendations not dealt with in depth in the report are still valid. The 2007 ICRP system of radiological protection evolves from the previous process-based protection approach relying on the distinction between practices and interventions by moving to an approach based on the distinction between three types of exposure situation: planned, emergency and existing. The Recommendations maintains the Commission's three fundamental principles of radiological protection namely: justification, optimisation of protection and the application of dose limits. They also maintain the current individual dose limits for effective dose and equivalent dose from all regulated sources in planned exposure situations. They re-enforce the principle of optimisation of radiological protection, which applies in a similar way to all exposure situations, subject to restrictions on individual doses: constraints for planned exposure situations, and reference levels for emergency and existing exposure situations. The Recommendations also include an approach for developing a framework to demonstrate radiological protection of the environment. This report describes the different stages in the life time of a geological disposal facility, and addresses the application of relevant radiological protection principles for each stage depending on the various exposure situations that can be encountered. In particular, the crucial factor that influences the application of the protection system over the different phases in the life time of a disposal facility is the level of oversight or 'watchful care' that is present. The level of oversight affects the capability to control the source, i.e. the waste and the repository, and to avoid or reduce potential exposures. Three main time frames are considered: time of direct oversight, when the disposal facility is being implemented and is under active supervision; time of indirect oversight, when the disposal facility is sealed and oversight is being exercised by regulators or special administrative bodies or society at large to provide additional assurance on behalf of society; and time of no oversight, when oversight is no longer exercised in case memory of the disposal facility is lost. Copyright © 2013. Published by Elsevier Ltd.

  16. Algorithm-Based Fault Tolerance Integrated with Replication

    NASA Technical Reports Server (NTRS)

    Some, Raphael; Rennels, David

    2008-01-01

    In a proposed approach to programming and utilization of commercial off-the-shelf computing equipment, a combination of algorithm-based fault tolerance (ABFT) and replication would be utilized to obtain high degrees of fault tolerance without incurring excessive costs. The basic idea of the proposed approach is to integrate ABFT with replication such that the algorithmic portions of computations would be protected by ABFT, and the logical portions by replication. ABFT is an extremely efficient, inexpensive, high-coverage technique for detecting and mitigating faults in computer systems used for algorithmic computations, but does not protect against errors in logical operations surrounding algorithms.

  17. Development of a WebGIS-based monitoring and environmental protection and preservation system for the Black Sea: The ECO-Satellite project

    NASA Astrophysics Data System (ADS)

    Tziavos, Ilias N.

    2013-04-01

    The ECO-Satellite project has been approved in the frame of the Joint Operational Program "Black Sea Basin 2007-2013" and it is co-financed by the European Union through the European Neighborhood and Partnership Instrument and the Instrument for Pre-Accession Assistance and National Funds. The overall objective of the project is to contribute to the protection and preservation of the water system of the Black Sea, with its main emphasis given to river deltas and protected coastal regions at the seaside. More specifically, it focuses on the creation of an environmental monitoring system targeting the marine, coastal and wetland ecosystems of the Black Sea, thus strengthening the development of common research among the involved partners and increasing the intraregional knowledge for the corresponding coastal zones. This integrated multi-level system is based on the technological assets provided by satellite Earth observation data and Geo-Informatics innovative tools and facilities, as well as on the development of a unified, easy to update geodatabase including a wide range of appropriately selected environmental parameters. Furthermore, a Web-GIS system is under development aiming in principle to support environmental decision and policy making by monitoring the state of marine, coastal and wetland ecosystems of the Black Sea and managing all the aforementioned data sources and derived research results. The system is designed in a way that is easily expandable and adaptable for environmental management in local, regional national and trans-national level and as such it will increase the capacity of decision makers who are related to Black Sea environmental policy. Therefore, it is expected that administrative authorities, scientifically related institutes and environmental protection bodies in all eligible areas will show interest in the results and applications of the information system, since the ECO-Satellite project could serve as a support tool for the environmental monitoring, protection and preservation of the Black Sea system. In this presentation the design and development of the system architecture along with the innovative technologies for environmental monitoring implemented in the Web-GIS system of the ECO-Satellite project are presented and analyzed. Additionally, the collection and processing of current and historical data and the design and structure of the developed geodatabase are described. Finally, the testing of system components and geodatabase levels in different demonstration sites are also discussed in the frame of a variety of environmentally oriented project applications.

  18. The Behavior of Environmentally Friendly Corrosion Preventative Compounds in an Aggressive Coastal Marine Environment

    NASA Technical Reports Server (NTRS)

    Montgomery, Eliza L.; Calle, Luz Marina; Curran Jerome C.; Kolody, Mark R.

    2013-01-01

    The shift to use environmentally friendly technologies throughout future space-related launch programs prompted a study aimed at replacing current petroleum and solvent-based Corrosion Preventive Compounds (CPCs) with environmentally friendly alternatives. The work in this paper focused on the identification and evaluation of environmentally friendly CPCs for use in protecting flight hardware and ground support equipment from atmospheric corrosion. The CPCs, while a temporary protective coating, must survive in the aggressive coastal marine environment that exists throughout the Kennedy Space Center, Florida. The different protection behaviors of fifteen different soft film CPCs, both common petroleum-based and newer environmentally friendly types, were evaluated on various steel and aluminum substrates. The CPC and substrate systems were subjected to atmospheric testing at the Kennedy Space Center's Beachside Atmospheric Corrosion Test Site, as well as cyclic accelerated corrosion testing. Each CPC also underwent physical characterization and launch-related compatibility testing . The initial results for the fifteen CPC systems are reported : Key words: corrosion preventive compound, CPC, spaceport, environmentally friendly, atmospheric exposure, marine, carbon steel, aluminum alloy, galvanic corrosion, wire on bolt.

  19. "Security Theater" in the Pediatric Wing: The Case for RFID Protection for Infants in Hospitals

    NASA Astrophysics Data System (ADS)

    Wyld, David C.

    In a typical year, five infants are abducted by strangers from hospitals. These are devastating events for the families involved and for the health care facilities' staff and executives. This article looks at the nature of newborn and infant abductions, analyzing data on these kidnappings from the FBI and from the National Center for Missing & Exploited Children. Then, the article examines the potential for RFID (radio frequency identification) based systems to improve security in the pediatric area of hospitals, providing an overview of the technology on the market today for infant protection. The article concludes with an analysis of the ROI (return on investment) equation for health care administrators to consider in weighing their options on how to prevent a statistically unlikely, but potentially cataclysmic occurrence, at their facility. In the end, RFID-based infant protection systems can be seen as a form of "security theater," serving as a "palliative countermeasure" that will indeed work - both substantively and psychologically - to promote a more secure hospital environment for moms and their newborns.

  20. Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks

    PubMed Central

    Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada

    2015-01-01

    Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs). We evaluate our approach using a case study from the intelligent transportation system domain. PMID:25746093

  1. A Hybrid Approach to Protect Palmprint Templates

    PubMed Central

    Sun, Dongmei; Xiong, Ke; Qiu, Zhengding

    2014-01-01

    Biometric template protection is indispensable to protect personal privacy in large-scale deployment of biometric systems. Accuracy, changeability, and security are three critical requirements for template protection algorithms. However, existing template protection algorithms cannot satisfy all these requirements well. In this paper, we propose a hybrid approach that combines random projection and fuzzy vault to improve the performances at these three points. Heterogeneous space is designed for combining random projection and fuzzy vault properly in the hybrid scheme. New chaff point generation method is also proposed to enhance the security of the heterogeneous vault. Theoretical analyses of proposed hybrid approach in terms of accuracy, changeability, and security are given in this paper. Palmprint database based experimental results well support the theoretical analyses and demonstrate the effectiveness of proposed hybrid approach. PMID:24982977

  2. A hybrid approach to protect palmprint templates.

    PubMed

    Liu, Hailun; Sun, Dongmei; Xiong, Ke; Qiu, Zhengding

    2014-01-01

    Biometric template protection is indispensable to protect personal privacy in large-scale deployment of biometric systems. Accuracy, changeability, and security are three critical requirements for template protection algorithms. However, existing template protection algorithms cannot satisfy all these requirements well. In this paper, we propose a hybrid approach that combines random projection and fuzzy vault to improve the performances at these three points. Heterogeneous space is designed for combining random projection and fuzzy vault properly in the hybrid scheme. New chaff point generation method is also proposed to enhance the security of the heterogeneous vault. Theoretical analyses of proposed hybrid approach in terms of accuracy, changeability, and security are given in this paper. Palmprint database based experimental results well support the theoretical analyses and demonstrate the effectiveness of proposed hybrid approach.

  3. Evaluating watershed protection programs in New York City's Cannonsville Reservoir source watershed using SWAT-HS

    NASA Astrophysics Data System (ADS)

    Hoang, L.; Mukundan, R.; Moore, K. E.; Owens, E. M.; Steenhuis, T. S.

    2017-12-01

    New York City (NYC)'s reservoirs supply over one billion gallons of drinking water each day to over nine million consumers in NYC and upstate communities. The City has invested more than $1.5 billion in watershed protection programs to maintain a waiver from filtration for the Catskill and Delaware Systems. In the last 25 years, the NYC Department of Environmental Protection (NYCDEP) has implemented programs in cooperation with upstate communities that include nutrient management, crop rotations, improvement of barnyards and manure storage, implementing tertiary treatment for Phosphorus (P) in wastewater treatment plants, and replacing failed septic systems in an effort to reduce P loads to water supply reservoirs. There have been several modeling studies evaluating the effect of agricultural Best Management Practices (BMPs) on P control in the Cannonsville watershed in the Delaware System. Although these studies showed that BMPs would reduce dissolved P losses, they were limited to farm-scale or watershed-scale estimates of reduction factors without consideration of the dynamic nature of overland flow and P losses from variable source areas. Recently, we developed the process-based SWAT-Hillslope (SWAT-HS) model, a modified version of the Soil and Water Assessment Tool (SWAT) that can realistically predict variable source runoff processes. The objective of this study is to use the SWAT-HS model to evaluate watershed protection programs addressing both point and non-point sources of P. SWAT-HS predicts streamflow very well for the Cannonsville watershed with a daily Nash Sutcliffe Efficiency (NSE) of 0.85 at the watershed outlet and NSE values ranging from 0.56 - 0.82 at five other locations within the watershed. Based on good hydrological prediction, we applied the model to predict P loads using detailed P inputs that change over time due to the implementation of watershed protection programs. Results from P model predictions provide improved projections of P loads and form a basis for evaluating the cumulative and individual effects of watershed protection programs.

  4. Initial Assessment of Environmental Barrier Coatings for the Prometheus Project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    M. Frederick

    2005-12-15

    Depending upon final design and materials selections, a variety of engineering solutions may need to be considered to avoid chemical degradation of components in a notional space nuclear power plant (SNPP). Coatings are one engineered approach that was considered. A comprehensive review of protective coating technology for various space-reactor structural materials is presented, including refractory metal alloys [molybdenum (Mo), tungsten (W), rhenium (Re), tantalum (Ta), and niobium (Nb)], nickel (Ni)-base superalloys, and silicon carbide (Sic). A summary description of some common deposition techniques is included. A literature survey identified coatings based on silicides or iridium/rhenium as the primary methods formore » environmental protection of refractory metal alloys. Modified aluminide coatings have been identified for superalloys and multilayer ceramic coatings for protection of Sic. All reviewed research focused on protecting structural materials from extreme temperatures in highly oxidizing conditions. Thermodynamic analyses indicate that some of these coatings may not be protective in the high-temperature, impure-He environment expected in a Prometheus reactor system. Further research is proposed to determine extensibility of these coating materials to less-oxidizing or neutral environments.« less

  5. Intelligent vehicle electrical power supply system with central coordinated protection

    NASA Astrophysics Data System (ADS)

    Yang, Diange; Kong, Weiwei; Li, Bing; Lian, Xiaomin

    2016-07-01

    The current research of vehicle electrical power supply system mainly focuses on electric vehicles (EV) and hybrid electric vehicles (HEV). The vehicle electrical power supply system used in traditional fuel vehicles is rather simple and imperfect; electrical/electronic devices (EEDs) applied in vehicles are usually directly connected with the vehicle's battery. With increasing numbers of EEDs being applied in traditional fuel vehicles, vehicle electrical power supply systems should be optimized and improved so that they can work more safely and more effectively. In this paper, a new vehicle electrical power supply system for traditional fuel vehicles, which accounts for all electrical/electronic devices and complex work conditions, is proposed based on a smart electrical/electronic device (SEED) system. Working as an independent intelligent electrical power supply network, the proposed system is isolated from the electrical control module and communication network, and access to the vehicle system is made through a bus interface. This results in a clean controller power supply with no electromagnetic interference. A new practical battery state of charge (SoC) estimation method is also proposed to achieve more accurate SoC estimation for lead-acid batteries in traditional fuel vehicles so that the intelligent power system can monitor the status of the battery for an over-current state in each power channel. Optimized protection methods are also used to ensure power supply safety. Experiments and tests on a traditional fuel vehicle are performed, and the results reveal that the battery SoC is calculated quickly and sufficiently accurately for battery over-discharge protection. Over-current protection is achieved, and the entire vehicle's power utilization is optimized. For traditional fuel vehicles, the proposed vehicle electrical power supply system is comprehensive and has a unified system architecture, enhancing system reliability and security.

  6. A plant-based diet, atherogenesis, and coronary artery disease prevention.

    PubMed

    Tuso, Phillip; Stoll, Scott R; Li, William W

    2015-01-01

    A plant-based diet is increasingly becoming recognized as a healthier alternative to a diet laden with meat. Atherosclerosis associated with high dietary intake of meat, fat, and carbohydrates remains the leading cause of mortality in the US. This condition results from progressive damage to the endothelial cells lining the vascular system, including the heart, leading to endothelial dysfunction. In addition to genetic factors associated with endothelial dysfunction, many dietary and other lifestyle factors, such as tobacco use, high meat and fat intake, and oxidative stress, are implicated in atherogenesis. Polyphenols derived from dietary plant intake have protective effects on vascular endothelial cells, possibly as antioxidants that prevent the oxidation of low-density lipoprotein. Recently, metabolites of L-carnitine, such as trimethylamine-N-oxide, that result from ingestion of red meat have been identified as a potential predictive marker of coronary artery disease (CAD). Metabolism of L-carnitine by the intestinal microbiome is associated with atherosclerosis in omnivores but not in vegetarians, supporting CAD benefits of a plant-based diet. Trimethylamine-N-oxide may cause atherosclerosis via macrophage activation. We suggest that a shift toward a plant-based diet may confer protective effects against atherosclerotic CAD by increasing endothelial protective factors in the circulation while reducing factors that are injurious to endothelial cells. The relative ratio of protective factors to injurious endothelial exposure may be a novel approach to assessing an objective dietary benefit from a plant-based diet. This review provides a mechanistic perspective of the evidence for protection by a plant-based diet against atherosclerotic CAD.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Soubies, B.; Henry, J.Y.; Le Meur, M.

    1300 MWe pressurised water reactors (PWRs), like the 1400 MWe reactors, operate with microprocessor-based safety systems. This is particularly the case for the Digital Integrated Protection System (SPIN), which trips the reactor in an emergency and sets in action the safeguard functions. The softwares used in these systems must therefore be highly dependable in the execution of their functions. In the case of SPIN, three players are working at different levels to achieve this goal: the protection system manufacturer, Merlin Gerin; the designer of the nuclear steam supply system, Framatome; the operator of the nuclear power plants, Electricite de Francemore » (EDF), which is also responsible for the safety of its installations. Regulatory licenses are issued by the French safety authority, the Nuclear Installations Safety Directorate (French abbreviation DSIN), subsequent to a successful examination of the technical provisions adopted by the operator. This examination is carried out by the IPSN and the standing group on nuclear reactors. This communication sets out: the methods used by the manufacturer to develop SPIN software for the 1400 MWe PWRs (N4 series); the approach adopted by the IPSN to evaluate the safety software of the protection system for the N4 series of reactors.« less

  8. 47 CFR 80.385 - Frequencies for automated systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... a secondary, non-interference basis by amateur stations participating in digital message forwarding... protection will be provided to a site-based licensee's predicted 38 dBu signal level contour. The site-based licensee's predicted 38 dBu signal level contour shall be calculated using the F(50, 50) field strength...

  9. 47 CFR 80.385 - Frequencies for automated systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... a secondary, non-interference basis by amateur stations participating in digital message forwarding... protection will be provided to a site-based licensee's predicted 38 dBu signal level contour. The site-based licensee's predicted 38 dBu signal level contour shall be calculated using the F(50, 50) field strength...

  10. 47 CFR 80.385 - Frequencies for automated systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... a secondary, non-interference basis by amateur stations participating in digital message forwarding... protection will be provided to a site-based licensee's predicted 38 dBu signal level contour. The site-based licensee's predicted 38 dBu signal level contour shall be calculated using the F(50, 50) field strength...

  11. Comet/Asteroid Protection System: Concept Study Executive Summary

    NASA Technical Reports Server (NTRS)

    Mazanek, Daniel D.

    2005-01-01

    Many of the major issues have been identified for a futuristic capability to protect against impacting comets and asteroids, and a preliminary space-based concept has been envisioned. Some of the basic concept elements, approaches, methodologies, and features have been identified. When contemplating the ability to monitor comets and asteroids continuously, there are many trade-offs between orbiting observatories and detection systems on planetary bodies without an atmosphere. Future orbit modification techniques have the potential for rapid and controlled alteration of NEO orbits, provided that high-power, compatible thermal management systems are developed. Much additional work and analysis are required to identify a final system concept, and many trade studies need to be performed to select the best mix of system capability, reliability, maintainability, and cost. Finally, it is fully appreciated that at the present time space systems are much more costly than terrestrial-based systems. Hopefully, this will change in the future. Regardless, understanding what it would take to defend against a much wider range of the impact threat will foster ideas, innovations, and technologies that could one day enable the development of such a system. This understanding is vital to provide ways of reducing the costs and quantifying the benefits that are achievable with a system like CAPS.

  12. The NASA Firefighter's Breathing System Program: A Status Report

    NASA Technical Reports Server (NTRS)

    McLaughlan, Pat B.

    1973-01-01

    The National Aeronautics and Space Administration (NASA), through its Technology Utilization Program, has been making its advanced technology developments available to the public. This has coincided in recent years with a growing demand within the fire service for improved protective equipment. A better breathing system for firefighters was one of the more immediate needs identified by the firefighting organizations. The Johnson Space Center (JSC), based upon their experience in providing life support systems for space flight, was subsequently requested to determine the feasibility of providing an improved breathing system for firefighters. Such a system was determined to be well within the current state of the art, and the Center is well into a development program to provide design verification of this improved protective' equipment. This report - outlines the overall objectives of this program, progress to date, and future planned activities.

  13. Use of Fuzzy Logic Systems for Assessment of Primary Faults

    NASA Astrophysics Data System (ADS)

    Petrović, Ivica; Jozsa, Lajos; Baus, Zoran

    2015-09-01

    In electric power systems, grid elements are often subjected to very complex and demanding disturbances or dangerous operating conditions. Determining initial fault or cause of those states is a difficult task. When fault occurs, often it is an imperative to disconnect affected grid element from the grid. This paper contains an overview of possibilities for using fuzzy logic in an assessment of primary faults in the transmission grid. The tool for this task is SCADA system, which is based on information of currents, voltages, events of protection devices and status of circuit breakers in the grid. The function model described with the membership function and fuzzy logic systems will be presented in the paper. For input data, diagnostics system uses information of protection devices tripping, states of circuit breakers and measurements of currents and voltages before and after faults.

  14. Lessons Learned from Development of De-identification System for Biomedical Research in a Korean Tertiary Hospital

    PubMed Central

    Shin, Soo-Yong; Lyu, Yongman; Shin, Yongdon; Choi, Hyo Joung; Park, Jihyun; Kim, Woo-Sung

    2013-01-01

    Objectives The Korean government has enacted two laws, namely, the Personal Information Protection Act and the Bioethics and Safety Act to prevent the unauthorized use of medical information. To protect patients' privacy by complying with governmental regulations and improve the convenience of research, Asan Medical Center has been developing a de-identification system for biomedical research. Methods We reviewed Korean regulations to define the scope of the de-identification methods and well-known previous biomedical research platforms to extract the functionalities of the systems. Based on these review results, we implemented necessary programs based on the Asan Medical Center Information System framework which was built using the Microsoft. NET Framework and C#. Results The developed de-identification system comprises three main components: a de-identification tool, a search tool, and a chart review tool. The de-identification tool can substitute a randomly assigned research ID for a hospital patient ID, remove the identifiers in the structured format, and mask them in the unstructured format, i.e., texts. This tool achieved 98.14% precision and 97.39% recall for 6,520 clinical notes. The search tool can find the number of patients which satisfies given search criteria. The chart review tool can provide de-identified patient's clinical data for review purposes. Conclusions We found that a clinical data warehouse was essential for successful implementation of the de-identification system, and this system should be tightly linked to an electronic Institutional Review Board system for easy operation of honest brokers. Additionally, we found that a secure cloud environment could be adopted to protect patients' privacy more thoroughly. PMID:23882415

  15. Information security governance: a risk assessment approach to health information systems protection.

    PubMed

    Williams, Patricia A H

    2013-01-01

    It is no small task to manage the protection of healthcare data and healthcare information systems. In an environment that is demanding adaptation to change for all information collection, storage and retrieval systems, including those for of e-health and information systems, it is imperative that good information security governance is in place. This includes understanding and meeting legislative and regulatory requirements. This chapter provides three models to educate and guide organisations in this complex area, and to simplify the process of information security governance and ensure appropriate and effective measures are put in place. The approach is risk based, adapted and contextualized for healthcare. In addition, specific considerations of the impact of cloud services, secondary use of data, big data and mobile health are discussed.

  16. Development of single cell protectors for sealed silver-zinc cells, phase 1

    NASA Technical Reports Server (NTRS)

    Imamura, M. S.; Donovan, R. L.; Lear, J. W.; Murray, B.

    1976-01-01

    A single cell protector (SCP) assembly capable of protecting a single silver-zinc (Ag Zn) battery cell was designed, fabricated, and tested. The SCP provides cell-level protection against overcharge and overdischarge by a bypass circuit. The bypass circuit consists of a magnetic-latching relay that is controlled by the high and low-voltage limit comparators. Although designed specifically for secondary Ag-Zn cells, the SCP is flexible enough to be adapted to other rechargeable cells. Eighteen SCPs were used in life testing of an 18-cell battery. The cells were sealed Ag-Zn system with inorganic separators. For comparison, another 18-cell battery was subjected to identical life test conditions, but with battery-level protection rather than cell-level. An alternative approach to the SCP design in the form of a microprocessor-based system was conceptually designed. The comparison of SCP and microprocessor approaches is also presented and a preferred approach for Ag-Zn battery protection is discussed.

  17. Wireless device for activation of an underground shock wave absorber

    NASA Astrophysics Data System (ADS)

    Chikhradze, M.; Akhvlediani, I.; Bochorishvili, N.; Mataradze, E.

    2011-10-01

    The paper describes the mechanism and design of the wireless device for activation of energy absorber for localization of blast energy in underground openings. The statistics shows that the greatest share of accidents with fatal results associate with explosions in coal mines due to aero-methane and/or air-coal media explosion. The other significant problem is terrorist or accidental explosions in underground structures. At present there are different protective systems to reduce the blast energy. One of the main parts of protective Systems is blast Identification and Registration Module. The works conducted at G. Tsulukidze Mining Institute of Georgia enabled to construct the wireless system of explosion detection and mitigation of shock waves. The system is based on the constant control on overpressure. The experimental research continues to fulfill the system based on both threats, on the constant control on overpressure and flame parameters, especially in underground structures and coal mines. Reaching the threshold value of any of those parameters, the system immediately starts the activation. The absorber contains a pyrotechnic device ensuring the discharge of dispersed water. The operational parameters of wireless device and activation mechanisms of pyrotechnic element of shock wave absorber are discussed in the paper.

  18. Implementation of a Goal-Based Systems Engineering Process Using the Systems Modeling Language (SysML)

    NASA Technical Reports Server (NTRS)

    Breckenridge, Jonathan T.; Johnson, Stephen B.

    2013-01-01

    This paper describes the core framework used to implement a Goal-Function Tree (GFT) based systems engineering process using the Systems Modeling Language. It defines a set of principles built upon by the theoretical approach described in the InfoTech 2013 ISHM paper titled "Goal-Function Tree Modeling for Systems Engineering and Fault Management" presented by Dr. Stephen B. Johnson. Using the SysML language, the principles in this paper describe the expansion of the SysML language as a baseline in order to: hierarchically describe a system, describe that system functionally within success space, and allocate detection mechanisms to success functions for system protection.

  19. Amendment of water quality standards in China: viewpoint on strategic considerations.

    PubMed

    Zhao, Xiaoli; Wang, Hao; Tang, Zhi; Zhao, Tianhui; Qin, Ning; Li, Huixian; Wu, Fengchang; Giesy, John P

    2018-02-01

    Water quality standards (WQS) are the most important tool for protection of quality of aquatic environments in China and play a decisive role in the management of China's aquatic environments. Due to limited scientific information available previously, WQS were developed largely based on water quality criteria (WQC) or WQS recommended by developed countries, which may not be suitable for current circumstances in China. The Chinese government recently initiated the revision of Environmental Quality Standards for Surface Water (EQSSW) (GB3838-2002) to meet the challenge of environmental protection. This review analyzed how the WQS developed and applied in China differ from those of more developed countries and pointed out that the lack of strong scientific bases for China's WQC pose major limitations of current WQS. We focus on discussing the six aspects that require high attention on how to establish a national WQC system to support the revision of WQS (Table 1) such as development of methodology, refining water function zoning, establish priority pollutants list, improving protection drinking water sources, development of site-specific water quality criteria, and field toxicity test. It is essential that China and other developing countries established a relatively mature system for promulgating, applying, and enforcing WQC and to implement a dynamic system to incorporate most recent research results into periodically updated WQS.

  20. An improved fault detection classification and location scheme based on wavelet transform and artificial neural network for six phase transmission line using single end data only.

    PubMed

    Koley, Ebha; Verma, Khushaboo; Ghosh, Subhojit

    2015-01-01

    Restrictions on right of way and increasing power demand has boosted development of six phase transmission. It offers a viable alternative for transmitting more power, without major modification in existing structure of three phase double circuit transmission system. Inspite of the advantages, low acceptance of six phase system is attributed to the unavailability of a proper protection scheme. The complexity arising from large number of possible faults in six phase lines makes the protection quite challenging. The proposed work presents a hybrid wavelet transform and modular artificial neural network based fault detector, classifier and locator for six phase lines using single end data only. The standard deviation of the approximate coefficients of voltage and current signals obtained using discrete wavelet transform are applied as input to the modular artificial neural network for fault classification and location. The proposed scheme has been tested for all 120 types of shunt faults with variation in location, fault resistance, fault inception angles. The variation in power system parameters viz. short circuit capacity of the source and its X/R ratio, voltage, frequency and CT saturation has also been investigated. The result confirms the effectiveness and reliability of the proposed protection scheme which makes it ideal for real time implementation.

  1. ADVANCED WORKER PROTECTION SYSTEM

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Judson Hedgehock

    2001-03-16

    From 1993 to 2000, OSS worked under a cost share contract from the Department of Energy (DOE) to develop an Advanced Worker Protection System (AWPS). The AWPS is a protective ensemble that provides the user with both breathing air and cooling for a NIOSH-rated duration of two hours. The ensemble consists of a liquid air based backpack, a Liquid Cooling Garment (LCG), and an outer protective garment. The AWPS project was divided into two phases. During Phase 1, OSS developed and tested a full-scale prototype AWPS. The testing showed that workers using the AWPS could work twice as long asmore » workers using a standard SCBA. The testing also provided performance data on the AWPS in different environments that was used during Phase 2 to optimize the design. During Phase 1, OSS also performed a life-cycle cost analysis on a representative clean up effort. The analysis indicated that the AWPS could save the DOE millions of dollars on D and D activities and improve the health and safety of their workers. During Phase 2, OSS worked to optimize the AWPS design to increase system reliability, to improve system performance and comfort, and to reduce the backpack weight and manufacturing costs. To support this design effort, OSS developed and tested several different generations of prototype units. Two separate successful evaluations of the ensemble were performed by the International Union of Operation Engineers (IUOE). The results of these evaluations were used to drive the design. During Phase 2, OSS also pursued certifying the AWPS with the applicable government agencies. The initial intent during Phase 2 was to finalize the design and then to certify the system. OSS and Scott Health and Safety Products teamed to optimize the AWPS design and then certify the system with the National Institute of Occupational Health and Safety (NIOSH). Unfortunately, technical and programmatic difficulties prevented us from obtaining NIOSH certification. Despite the inability of NIOSH to certify the design, OSS was able to develop and successfully test, in both the lab and in the field, a prototype AWPS. They clearly demonstrated that a system which provides cooling can significantly increase worker productivity by extending the time they can function in a protective garment. They were also able to develop mature outer garment and LCG designs that provide considerable benefits over current protective equipment, such as self donning and doffing, better visibility, and machine washable. A thorough discussion of the activities performed during Phase 1 and Phase 2 is presented in the AWPS Final Report. The report also describes the current system design, outlines the steps needed to certify the AWPS, discusses the technical and programmatic issues that prevented the system from being certified, and presents conclusions and recommendations based upon the seven year effort.« less

  2. Identifying and assessing ecotourism visitor impacts at selected protected areas in Costa Rica and Belize

    USGS Publications Warehouse

    Farrell, T.A.; Marion, J.L.

    2001-01-01

    Protected area visitation is an important component of ecotourism, and as such, must be sustainable. However, protected area visitation may degrade natural resources, particularly in areas of concentrated visitor activities like trails and recreation sites. This is an important concern in ecotourism destinations such as Belize and Costa Rica, because they actively promote ecotourism and emphasize the pristine qualities of their natural resources. Research on visitor impacts to protected areas has many potential applications in protected area management, though it has not been widely applied in Central and South America. This study targeted this deficiency through manager interviews and evaluations of alternative impact assessment procedures at eight protected areas in Belize and Costa Rica. Impact assessment procedures included qualitative condition class systems, ratings systems, and measurement-based systems applied to trails and recreation sites. The resulting data characterize manager perceptions of impact problems, document trail and recreation site impacts, and provide examples of inexpensive, efficient and effective rapid impact assessment procedures. Interview subjects reported a variety of impacts affecting trails, recreation sites, wildlife, water, attraction features and other resources. Standardized assessment procedures were developed and applied to record trail and recreation site impacts. Impacts affecting the study areas included trail proliferation, erosion and widening, muddiness on trails, vegetation cover loss, soil and root exposure, and tree damage on recreation sites. The findings also illustrate the types of assessment data yielded by several alternative methods and demonstrate their utility to protected area managers. The need for additional rapid assessment procedures for wildlife, water, attraction feature and other resource impacts was also identified.

  3. A bioluminescent imaging mouse model for Marburg virus based on a pseudovirus system.

    PubMed

    Zhang, Li; Li, Qianqian; Liu, Qiang; Huang, Weijin; Nie, Jianhui; Wang, Youchun

    2017-08-03

    Marburg virus (MARV) can cause lethal hemorrhagic fever in humans. Handling of MARV is restricted to high-containment biosafety level 4 (BSL-4) facilities, which greatly impedes research into this virus. In this study, a high titer of MARV pseudovirus was generated through optimization of the HIV backbone vectors, the ratio of backbone vector to MARV glycoprotein expression vector, and the transfection reagents. An in vitro neutralization assay and an in vivo bioluminescent imaging mouse model for MARV were developed based on the pseudovirus. Protective serum against MARV was successfully induced in guinea pigs, which showed high neutralization activity in vitro and could also protect Balb/c mice from MARV pseudovirus infection in vivo. This system could be a convenient tool to enable the evaluation of vaccines and therapeutic drugs against MARV in non-BSL-4 laboratories.

  4. Air cleaning performance of a new environmentally controlled primary crusher operator booth.

    PubMed

    Organiscak, J A; Cecala, A B; Zimmer, J A; Holen, B; Baregi, J R

    2016-02-01

    The National Institute for Occupational Safety and Health (NIOSH) cooperated with 3M Company in the design and testing of a new environmentally controlled primary crusher operator booth at the company's Wausau granite quarry near Wausau, WI. This quarry had an older crusher booth without a central heating, ventilation and air conditioning (HVAC) system, and without an air filtration and pressurization system. A new replacement operator booth was designed and installed by 3M based on design considerations from past NIOSH research on enclosed cab filtration systems. NIOSH conducted pre-testing of the old booth and post-testing of the new booth to assess the new filtration and pressurization system's effectiveness in controlling airborne dusts and particulates. The booth's dust and particulate control effectiveness is described by its protection factor, expressed as a ratio of the outside to inside concentrations measured during testing. Results indicate that the old booth provided negligible airborne respirable dust protection and low particulate protection from the outside environment. The newly installed booth provided average respirable dust protection factors from 2 to 25 over five shifts of dust sampling with occasional worker ingress and egress from the booth, allowing some unfiltered contaminants to enter the enclosure. Shorter-term particle count testing outside and inside the booth under near-steady-state conditions, with no workers entering or exiting the booth, resulted in protection factors from 35 to 127 on 0.3- to 1.0-μm respirable size particulates under various HVAC airflow operating conditions.

  5. A regional waterway management system for balancing recreational boating and resource protection.

    PubMed

    Swett, Robert A; Listowski, Charles; Fry, Douglas; Boutelle, Stephen; Fann, David

    2009-06-01

    Florida's coasts have been transformed over the past three decades as population growth and unprecedented demand for individual shore access to bays and estuaries led to the creation of residential canal developments. Thousands of miles of channels and basins were dredged as a by-product of this urbanization process. The navigable waterways that resulted are now being stressed by increasing boat traffic and canal-side activities. Recognizing their common goal to preserve the recreational and ecological value of southwest Florida waterways, the Florida Department of Environmental Protection, the four-county West Coast Inland Navigation District, and the University of Florida Sea Grant College Program signed a Memorandum of Agreement. The signatories agreed to develop a science-based Regional Waterway Management System (RWMS), which is a new approach to waterway planning and permitting based on carefully mapped channel depths, a census of actual boat populations, and the spatial extent of natural resources. The RWMS provides a comprehensive, regional overview of channel conditions and the geographic distribution and severity of existing impediments to safe navigation and resource protection. RWMS information and analyses result in regional-scale permitting to accommodate water-dependent uses while minimizing environmental impacts and reducing public expenditures. Compared with traditional approaches to waterway management, the science-based RWMS is relatively unbiased, objective, transparent, ecologically sound, and fiscally prudent.

  6. Smart security and securing data through watermarking

    NASA Astrophysics Data System (ADS)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  7. Managing Analysis Models in the Design Process

    NASA Technical Reports Server (NTRS)

    Briggs, Clark

    2006-01-01

    Design of large, complex space systems depends on significant model-based support for exploration of the design space. Integrated models predict system performance in mission-relevant terms given design descriptions and multiple physics-based numerical models. Both the design activities and the modeling activities warrant explicit process definitions and active process management to protect the project from excessive risk. Software and systems engineering processes have been formalized and similar formal process activities are under development for design engineering and integrated modeling. JPL is establishing a modeling process to define development and application of such system-level models.

  8. Water Environment Assessment as an Ecological Red Line Management Tool for Marine Wetland Protection.

    PubMed

    Zhang, Yinan; Chu, Chunli; Liu, Lei; Xu, Shengguo; Ruan, Xiaoxue; Ju, Meiting

    2017-08-02

    A 'red line' was established, identifying an area requiring for ecological protection in Tianjin, China. Within the protected area of the red line area, the Qilihai wetland is an important ecotope with complex ecological functions, although the ecosystem is seriously disturbed due to anthropogenic activities in the surrounding areas. This study assesses the water quality status of the Qilihai wetlands to identify the pollution sources and potential improvements based on the ecological red line policy, to improve and protect the waters of the Qilihai wetlands. An indicator system was established to assess water quality status using single factor evaluation and a comprehensive evaluation method, supported by data from 2010 to 2013. Assessment results show that not all indicators met the requirement of the Environmental Quality Standards for Surface Water (GB3838-2002) and that overall, waters in the Qilihai wetland were seriously polluted. Based on these findings we propose restrictions on all polluting anthropogenic activities in the red line area and implementation of restoration projects to improve water quality.

  9. INEEL Source Water Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sehlke, Gerald

    2003-03-01

    The Idaho National Engineering and Environmental Laboratory (INEEL) covers approximately 890 mi2 and includes 12 public water systems that must be evaluated for Source water protection purposes under the Safe Drinking Water Act. Because of its size and location, six watersheds and five aquifers could potentially affect the INEEL’s drinking water sources. Based on a preliminary evaluation of the available information, it was determined that the Big Lost River, Birch Creek, and Little Lost River Watersheds and the eastern Snake River Plain Aquifer needed to be assessed. These watersheds were delineated using the United States Geologic Survey’s Hydrological Unit scheme.more » Well capture zones were originally estimated using the RESSQC module of the Environmental Protection Agency’s Well Head Protection Area model, and the initial modeling assumptions and results were checked by running several scenarios using Modflow modeling. After a technical review, the resulting capture zones were expanded to account for the uncertainties associated with changing groundwater flow directions, a thick vadose zone, and other data uncertainties. Finally, all well capture zones at a given facility were merged to a single wellhead protection area at each facility. A contaminant source inventory was conducted, and the results were integrated with the well capture zones, watershed and aquifer information, and facility information using geographic information system technology to complete the INEEL’s Source Water Assessment. Of the INEEL’s 12 public water systems, three systems rated as low susceptibility (EBR-I, Main Gate, and Gun Range), and the remainder rated as moderate susceptibility. No INEEL public water system rated as high susceptibility. We are using this information to develop a source water management plan from which we will subsequently implement an INEEL-wide source water management program. The results are a very robust set of wellhead protection areas that will protect the INEEL’s public water systems yet not too conservative to inhibit the INEEL from carrying out its missions.« less

  10. The Idaho National Engineering and Environmental Laboratory Source Water Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sehlke, G.

    2003-03-17

    The Idaho National Engineering and Environmental Laboratory (INEEL) covers approximately 890 square miles and includes 12 public water systems that must be evaluated for Source water protection purposes under the Safe Drinking Water Act. Because of its size and location, six watersheds and five aquifers could potentially affect the INEEL's drinking water sources. Based on a preliminary evaluation of the available information, it was determined that the Big Lost River, Birch Creek, and Little Lost River Watersheds and the eastern Snake River Plain Aquifer needed to be assessed. These watersheds were delineated using the United States Geologic Survey's Hydrological Unitmore » scheme. Well capture zones were originally estimated using the RESSQC module of the Environmental Protection Agency's Well Head Protection Area model, and the initial modeling assumptions and results were checked by running several scenarios using Modflow modeling. After a technical review, the resulting capture zones were expanded to account for the uncertainties associated with changing groundwater flow directions, a this vadose zone, and other data uncertainties. Finally, all well capture zones at a given facility were merged to a single wellhead protection area at each facility. A contaminant source inventory was conducted, and the results were integrated with the well capture zones, watershed and aquifer information, and facility information using geographic information system technology to complete the INEEL's Source Water Assessment. Of the INEEL's 12 public water systems, three systems rated as low susceptibility (EBR-1, Main Gate, and Gun Range), and the remainder rated as moderate susceptibility. No INEEL public water system rated as high susceptibility. We are using this information to develop a source water management plan from which we will subsequently implement an INEEL-wide source water management program. The results are a very robust set of wellhead protection areas that will protect the INEEL's public water systems yet not too conservative to inhibit the INEEL from carrying out its missions.« less

  11. Managing geometric information with a data base management system

    NASA Technical Reports Server (NTRS)

    Dube, R. P.

    1984-01-01

    The strategies for managing computer based geometry are described. The computer model of geometry is the basis for communication, manipulation, and analysis of shape information. The research on integrated programs for aerospace-vehicle design (IPAD) focuses on the use of data base management system (DBMS) technology to manage engineering/manufacturing data. The objectives of IPAD is to develop a computer based engineering complex which automates the storage, management, protection, and retrieval of engineering data. In particular, this facility must manage geometry information as well as associated data. The approach taken on the IPAD project to achieve this objective is discussed. Geometry management in current systems and the approach taken in the early IPAD prototypes are examined.

  12. Protection conferred by recombinant Yersinia pestis antigens produced by a rapid and highly scalable plant expression system

    PubMed Central

    Santi, Luca; Giritch, Anatoli; Roy, Chad J.; Marillonnet, Sylvestre; Klimyuk, Victor; Gleba, Yuri; Webb, Robert; Arntzen, Charles J.; Mason, Hugh S.

    2006-01-01

    Plague is still an endemic disease in different regions of the world. Increasing reports of incidence, the discovery of antibiotic resistance strains, and concern about a potential use of the causative bacteria Yersinia pestis as an agent of biological warfare have highlighted the need for a safe, efficacious, and rapidly producible vaccine. The use of F1 and V antigens and the derived protein fusion F1-V has shown great potential as a protective vaccine in animal studies. Plants have been extensively studied for the production of pharmaceutical proteins as an inexpensive and scalable alternative to common expression systems. In the current study the recombinant plague antigens F1, V, and fusion protein F1-V were produced by transient expression in Nicotiana benthamiana by using a deconstructed tobacco mosaic virus-based system that allowed very rapid and extremely high levels of expression. All of the plant-derived purified antigens, administered s.c. to guinea pigs, generated systemic immune responses and provided protection against an aerosol challenge of virulent Y. pestis. PMID:16410352

  13. Collaborative Protection and Control Schemes for Shipboard Electrical Systems

    DTIC Science & Technology

    2007-03-26

    VSCs ) for fault current limiting and interruption. Revisions needed on the VSCs to perform these functions have been identified, and feasibility of this...disturbances very fast - less than 3-4 ms [3]. Next section summarizes the details of the agent based protection scheme that uses the VSC as the...fault currents. In our previous work [2, 3], it has been demonstrated that this new functionally for VSC can be achieved by proper selection of

  14. Household portfolio choices, health status and health care systems: A cross-country analysis based on SHARE

    PubMed Central

    Atella, Vincenzo; Brunetti, Marianna; Maestas, Nicole

    2013-01-01

    Health risk is increasingly viewed as an important form of background risk that affects household portfolio decisions. However, its role might be mediated by the presence of a protective full-coverage national health service that could reduce households’ probability of incurring current and future out-of-pocket medical expenditures. We use SHARE data to study the influence of current health status and future health risk on the decision to hold risky assets, across ten European countries with different health systems, each offering a different degree of protection against out-of-pocket medical expenditures. We find robust empirical evidence that perceived health status matters more than objective health status and, consistent with the theory of background risk, health risk affects portfolio choices only in countries with less protective health care systems. Furthermore, portfolio decisions consistent with background risk models are observed only with respect to middle-aged and highly-educated investors. PMID:23885134

  15. Anti-islanding Protection of Distributed Generation Using Rate of Change of Impedance

    NASA Astrophysics Data System (ADS)

    Shah, Pragnesh; Bhalja, Bhavesh

    2013-08-01

    Distributed Generation (DG), which is interlinked with distribution system, has inevitable effect on distribution system. Integrating DG with the utility network demands an anti-islanding scheme to protect the system. Failure to trip islanded generators can lead to problems such as threats to personnel safety, out-of-phase reclosing, and degradation of power quality. In this article, a new method for anti-islanding protection based on impedance monitoring of distribution network is carried out in presence of DG. The impedance measured between two phases is used to derive the rate of change of impedance (dz/dt), and its peak values are used for final trip decision. Test data are generated using PSCAD/EMTDC software package and the performance of the proposed method is evaluated in MatLab software. The simulation results show the effectiveness of the proposed scheme as it is capable to detect islanding condition accurately. Subsequently, it is also observed that the proposed scheme does not mal-operate during other disturbances such as short circuit and switching event.

  16. New biphasic solvent system based on cyclopentyl methyl ether for the purification of a non-polar synthetic peptide by pH-zone refining centrifugal partition chromatography.

    PubMed

    Amarouche, Nassima; Boudesocque, Leslie; Borie, Nicolas; Giraud, Matthieu; Forni, Luciano; Butte, Alessandro; Edwards, Florence; Renault, Jean-Hugues

    2014-06-01

    A new type 1 ternary biphasic system composed of cyclopentyl methyl ether, dimethylformamide and water was developed, characterized and successfully used for the purification of a lipophilic, protected peptide by pH-zone refining centrifugal partition chromatography. The protected peptide is an 8-mer, key intermediate in bivalirudin (Angiomax®) synthesis and shows a very low solubility in the solvents usually used in liquid chromatography. All ionic groups, except the N-terminal end of the peptide, are protected by a benzyl group. The purification of this peptide was achieved with a purity of about 99.04% and a recovery of 94% using the new ternary biphasic system cyclopentyl methyl ether/dimethylformamide/water (49:40:11, v/v) in the descending pH-zone refining mode with triethylamine (28 mM) as the retainer and methanesulfonic acid (18 mM) as the eluter. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  17. A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems

    NASA Astrophysics Data System (ADS)

    Lee, Sanghan; Yang, Hae-Yong; Yeom, Yongjin; Park, Jongsik

    The security level of an internet protocol television (IPTV) digital right management (DRM) system ultimately relies on protection of secret keys. Well known devices for the key protection include smartcards and battery backup SRAMs (BB-SRAMs); however, these devices could be vulnerable to various physical attacks. In this paper, we propose a secure and cost-effective design of a cryptographic system on chip (SoC) that integrates the BB-SRAM with a cell-based design technique. The proposed SoC provides robust safeguard against the physical attacks, and satisfies high-speed and low-price requirements of IPTV set-top boxes. Our implementation results show that the maximum encryption rate of the SoC is 633Mb/s. In order to verify the data retention capabilities, we made a prototype chip using 0.18µm standard cell technology. The experimental results show that the integrated BB-SRAM can reliably retain data with a 1.4µA leakage current.

  18. Woven Thermal Protection System (WTPS) a Novel Approach to Meet NASA's Most Demanding Reentry Missions

    NASA Technical Reports Server (NTRS)

    Stackpoole, Mairead

    2014-01-01

    NASA's future robotic missions to Venus and outer planets, namely, Saturn, Uranus, Neptune, result in extremely high entry conditions that exceed the capabilities of current mid-density ablators (PICA or Avcoat). Therefore mission planners assume the use of a fully dense carbon phenolic heat shield similar to what was flown on Pioneer Venus and Galileo. Carbon phenolic (CP) is a robust Thermal Protection System (TPS) however its high density and thermal conductivity constrain mission planners to steep entries, high heat fluxes, pressures and short entry durations, in order for CP to be feasible from a mass perspective. The high entry conditions pose certification challenges in existing ground based test facilities. In 2012 the Game Changing Development Program in NASA's Space Technology Mission Directorate funded NASA ARC to investigate the feasibility of a Woven Thermal Protection System (WTPS) to meet the needs of NASA's most challenging entry missions. This presentation will summarize maturation of the WTPS project.

  19. A visual servo-based teleoperation robot system for closed diaphyseal fracture reduction.

    PubMed

    Li, Changsheng; Wang, Tianmiao; Hu, Lei; Zhang, Lihai; Du, Hailong; Zhao, Lu; Wang, Lifeng; Tang, Peifu

    2015-09-01

    Common fracture treatments include open reduction and intramedullary nailing technology. However, these methods have disadvantages such as intraoperative X-ray radiation, delayed union or nonunion and postoperative rotation. Robots provide a novel solution to the aforementioned problems while posing new challenges. Against this scientific background, we develop a visual servo-based teleoperation robot system. In this article, we present a robot system, analyze the visual servo-based control system in detail and develop path planning for fracture reduction, inverse kinematics, and output forces of the reduction mechanism. A series of experimental tests is conducted on a bone model and an animal bone. The experimental results demonstrate the feasibility of the robot system. The robot system uses preoperative computed tomography data to realize high precision and perform minimally invasive teleoperation for fracture reduction via the visual servo-based control system while protecting surgeons from radiation. © IMechE 2015.

  20. Experimental Aerothermodynamics In Support Of The Columbia Accident Investigation

    NASA Technical Reports Server (NTRS)

    Horvath, Thomas J.

    2004-01-01

    The technical foundation for the most probable damage scenario reported in the Columbia Accident Investigation Board's final report was largely derived from synergistic aerodynamic/aerothermodynamic wind tunnel measurements and inviscid predictions made at NASA Langley Research Center and later corroborated with engineering analysis, high fidelity numerical viscous simulations, and foam impact testing near the close of the investigation. This report provides an overview of the hypersonic aerothermodynamic wind tunnel program conducted at NASA Langley and illustrates how the ground-based heating measurements provided early insight that guided the direction and utilization of agency resources in support of the investigation. Global surface heat transfer mappings, surface streamline patterns, and shock shapes were measured on 0.0075 scale models of the Orbiter configuration with and without postulated damage to the thermal protection system. Test parametrics include angle of attack from 38 to 42 degs, sideslip angles of 38 to 42 degs, sideslip angles of plus or minus 1 deg, Reynolds numbers based upon model length from 0.05 x 10(exp 6) to 6.5 x 10(exp 6), and normal shock density ratios of 5 (Mach 6 Air) and 12 (Mach 6 CF4). The primary objective of the testing was to provide surface heating characteristics on scaled Orbiter models with outer mold line perturbations to simulate various forms of localized surface damage to the thermal protection system. Initial experimental testing conducted within two weeks of the accident simulated a broad spectrum of thermal protection system damage to the Orbiter windward surface and was used to refute several hypothesized forms of thermal protection system damage, which included gouges in the windward thermal protection system tiles, breaches through the wing new the main landing gear door, and protuberances along the wing leading edge that produced asymmetric boundary layer transition. As the forensic phase of the investigation developed and the condition of recovered debris was examined, increasing emphasis was placed on identifying wing leading edge damage (partially and fully missing reinforced carbon-carbon panels, and eventually holes in the wing leading edge with venting to the wing upper surface) that produced off-nominal heating trends consistent with extracted Orbiter flight recorder temperature data.

  1. Altitude Effects on Thermal Ice Protection System Performance; a Study of an Alternative Approach

    NASA Technical Reports Server (NTRS)

    Addy, Harold E., Jr.; Orchard, David; Wright, William B.; Oleskiw, Myron

    2016-01-01

    Research has been conducted to better understand the phenomena involved during operation of an aircraft's thermal ice protection system under running wet icing conditions. In such situations, supercooled water striking a thermally ice-protected surface does not fully evaporate but runs aft to a location where it freezes. The effects of altitude, in terms of air pressure and density, on the processes involved were of particular interest. Initial study results showed that the altitude effects on heat energy transfer were accurately modeled using existing methods, but water mass transport was not. Based upon those results, a new method to account for altitude effects on thermal ice protection system operation was proposed. The method employs a two-step process where heat energy and mass transport are sequentially matched, linked by matched surface temperatures. While not providing exact matching of heat and mass transport to reference conditions, the method produces a better simulation than other methods. Moreover, it does not rely on the application of empirical correction factors, but instead relies on the straightforward application of the primary physics involved. This report describes the method, shows results of testing the method, and discusses its limitations.

  2. Evidence-based health policy: three generations of reform in Mexico.

    PubMed

    Frenk, Julio; Sepúlveda, Jaime; Gómez-Dantés, Octavio; Knaul, Felicia

    2003-11-15

    The Mexican health system has evolved through three generations of reform. The creation of the Ministry of Health and the main social security agency in 1943 marked the first generation of health reforms. In the late 1970s, a second generation of reforms was launched around the primary health-care model. Third-generation reforms favour systemic changes to reorganise the system through the horizontal integration of basic functions-stewardship, financing, and provision. The stability of leadership in the health sector is emphasised as a key element that allowed for reform during the past 60 years. Furthermore, there has been a transition in the second generation of reforms to a model that is increasingly based on evidence; this has been intensified and extended in the third generation of reforms. We also examine policy developments that will provide social protection in health for all. These developments could be of interest for countries seeking to provide their citizens with universal access to health care that incorporates equity, quality, and financial protection.

  3. Passively operated spool valve for drain-down freeze protection of thermosyphon water heaters. Final technical report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    1982-04-30

    The work done to extend the existing drain-down valve technology to provide passive drain-down freeze protection for thermosyphon-based solar water heaters is described. The basic design of the existing valve model is that of a spool valve, employing a cylindrical spool which moves axially in a mating cartridge to open and close o-rings at the two operating extremes (drain and operate) to perform the valving function. Three passive actuators to drive the basic valving mechanism were designed, fabricated, and tested. Two piping configurations used to integrate the spool valve with the thermosyphon system are described, as are the passive actuators.more » The three actuator designs are: photovoltaic driven, refrigerant-based bellows, and heat motor cable-drive designs. Costs are compared for the alternative actuator designs, and operating characteristics were examined for the thermosyphon system, including field tests. The market for the valve for thermosyphon systems is then assessed. (LEW)« less

  4. 78 FR 77574 - Protection System Maintenance Reliability Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ... protection system component type, except that the maintenance program for all batteries associated with the... Electric System reliability and promoting efficiency through consolidation [of protection system-related... ITC that PRC-005-2 promotes efficiency by consolidating protection system maintenance requirements...

  5. 29 CFR 1915.507 - Land-side fire protection systems.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 7 2013-07-01 2013-07-01 false Land-side fire protection systems. 1915.507 Section 1915... Protection in Shipyard Employment § 1915.507 Land-side fire protection systems. (a) Employer responsibilities. The employer must ensure all fixed and portable fire protection systems needed to meet an OSHA...

  6. 29 CFR 1915.507 - Land-side fire protection systems.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 7 2012-07-01 2012-07-01 false Land-side fire protection systems. 1915.507 Section 1915... Protection in Shipyard Employment § 1915.507 Land-side fire protection systems. (a) Employer responsibilities. The employer must ensure all fixed and portable fire protection systems needed to meet an OSHA...

  7. 29 CFR 1915.507 - Land-side fire protection systems.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 7 2011-07-01 2011-07-01 false Land-side fire protection systems. 1915.507 Section 1915... Protection in Shipyard Employment § 1915.507 Land-side fire protection systems. (a) Employer responsibilities. The employer must ensure all fixed and portable fire protection systems needed to meet an OSHA...

  8. 29 CFR 1915.507 - Land-side fire protection systems.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 7 2014-07-01 2014-07-01 false Land-side fire protection systems. 1915.507 Section 1915... Protection in Shipyard Employment § 1915.507 Land-side fire protection systems. (a) Employer responsibilities. The employer must ensure all fixed and portable fire protection systems needed to meet an OSHA...

  9. Passive intrusion detection system

    NASA Technical Reports Server (NTRS)

    Laue, E. G. (Inventor)

    1980-01-01

    An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume. The system is based on the discovery that the frequency of an oscillator whose crystal is humidity sensitive, varies at a frequency or rate which is within a known frequency band, due to the entry of an intruder into the protected volume. The variable frequency is converted into a voltage which is then filtered by a filtering arrangement which permits only voltage variations at frequencies within the known frequency band to activate an alarm, while inhibiting the alarm activation when the voltage frequency is below or above the known frequency band.

  10. Protection against Experimental Cryptococcosis following Vaccination with Glucan Particles Containing Cryptococcus Alkaline Extracts.

    PubMed

    Specht, Charles A; Lee, Chrono K; Huang, Haibin; Tipper, Donald J; Shen, Zu T; Lodge, Jennifer K; Leszyk, John; Ostroff, Gary R; Levitz, Stuart M

    2015-12-22

    A vaccine capable of protecting at-risk persons against infections due to Cryptococcus neoformans and Cryptococcus gattii could reduce the substantial global burden of human cryptococcosis. Vaccine development has been hampered though, by lack of knowledge as to which antigens are immunoprotective and the need for an effective vaccine delivery system. We made alkaline extracts from mutant cryptococcal strains that lacked capsule or chitosan. The extracts were then packaged into glucan particles (GPs), which are purified Saccharomyces cerevisiae cell walls composed primarily of β-1,3-glucans. Subcutaneous vaccination with the GP-based vaccines provided significant protection against subsequent pulmonary infection with highly virulent strains of C. neoformans and C. gattii. The alkaline extract derived from the acapsular strain was analyzed by liquid chromatography tandem mass spectrometry (LC-MS/MS), and the most abundant proteins were identified. Separation of the alkaline extract by size exclusion chromatography revealed fractions that conferred protection when loaded in GP-based vaccines. Robust Th1- and Th17-biased CD4(+) T cell recall responses were observed in the lungs of vaccinated and infected mice. Thus, our preclinical studies have indicated promising cryptococcal vaccine candidates in alkaline extracts delivered in GPs. Ongoing studies are directed at identifying the individual components of the extracts that confer protection and thus would be promising candidates for a human vaccine. The encapsulated yeast Cryptococcus neoformans and its closely related sister species, Cryptococcus gattii, are major causes of morbidity and mortality, particularly in immunocompromised persons. This study reports on the preclinical development of vaccines to protect at-risk populations from cryptococcosis. Antigens were extracted from Cryptococcus by treatment with an alkaline solution. The extracted antigens were then packaged into glucan particles, which are hollow yeast cell walls composed mainly of β-glucans. The glucan particle-based vaccines elicited robust T cell immune responses and protected mice from otherwise-lethal challenge with virulent strains of C. neoformans and C. gattii. The technology used for antigen extraction and subsequent loading into the glucan particle delivery system is relatively simple and can be applied to vaccine development against other pathogens. Copyright © 2015 Specht et al.

  11. Experiences of Teacher Evaluation Systems on High School Physical Education Programs

    ERIC Educational Resources Information Center

    Phillips, Sharon R.; Mercier, Kevin; Doolittle, Sarah

    2017-01-01

    Primary objective: Teacher evaluation is being revamped by policy-makers. The marginalized status of physical education has protected this subject area from reform for many decades, but in our current era of system-wide, data-based decision-making, physical education is no longer immune. Standardized and local testing, together with structured…

  12. 78 FR 10686 - Notice of Receipt of Petition for Decision That Nonconforming Long-Wheel Base 2005 Mercedes-Benz...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-14

    ...; 124 Accelerator Control Systems; 201 Occupant Protection in Interior Impact; 202 Head Restraints; 204... systems. Standard No. 108 Lamps, Reflective Devices and Associated Equipment: Installation of U.S.- model headlamps and front and rear side marker lamps. Standard No. 111 Rearview Mirrors: Replacement of the...

  13. INNOVATIVE TECHNOLOGY VERIFICATION REPORT "FIELD MEASUREMENT TECHNOLOGIES FOR TOTAL PETROLEUM HYDROCARBONS IN SOIL" STRATEGIC DIAGNOSTICS INC. ENSYS PETRO TEST SYSTEM

    EPA Science Inventory



    The EnSys Petro Test System developed by Strategic Diagnostics Inc. (SDI), was demonstrated under the U.S. Environmental Protection Agency Superfund Innovative Technology Evaluation Program in June 2000 at the Navy Base Ventura County site in Port Hueneme, California. The...

  14. 75 FR 67919 - Hazardous Waste Management System; Proposed Exclusion for Identifying and Listing Hazardous Waste

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-04

    ...-R05-RCRA-2010-0843; SW-FRL-9221-2] Hazardous Waste Management System; Proposed Exclusion for Identifying and Listing Hazardous Waste AGENCY: Environmental Protection Agency (EPA). ACTION: Proposed rule... hazardous wastes. The Agency has tentatively decided to grant the petition based on an evaluation of waste...

  15. 78 FR 77726 - Exelon Generation Company, LLC Three Mile Island Nuclear Station, Unit 1

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    [email protected] . NRC's Agencywide Documents Access and Management System (ADAMS): You may access publicly... safety during any condition of normal operation, including anticipated operational occurrences and system... for exemption is based on the use of the 1997 and 2002, editions of American Society for Testing and...

  16. Thermal protection performance of magnetohydrodynamic heat shield system based on multipolar magnetic field

    NASA Astrophysics Data System (ADS)

    Kai, Li; Jun, Liu; Weiqiang, Liu

    2017-07-01

    In order to cover the shortage of dipole magnetic field in the magnetohydrodynamic(MHD) heat shield system, physical model of a multipolar magnetic field with central and peripheral solenoids is constructed. By employing the governing equations of three dimensional thermochemical nonequilibrium flow with electromagnetic source terms based on the low magneto-Reynolds assumption, the flow control performance of the dipole and multipolar magnetic fields are numerically simulated. To make the results comparable, two groups of cases are designed by first assuming equal stagnation magnetic induction strength and secondly assuming equal ampere-turns. Results show that, the five-magnet system, whose central polar orientation is the same with the peripheral ones, have stronger work capability and better shock control and thermal protection performance. Moreover, the five-solenoid systems are the best when the ampere-turns of the central solenoid are twice and fourth of the peripheral ones under those two circumstances respectively. Compared with the dipole magnetic field, the stagnation non-catalytic heat fluxes are decreased by a factor of 47.5% and 34.0% respectively.

  17. Selection criteria for wastewater treatment technologies to protect drinking water.

    PubMed

    von Sperling, M

    2000-01-01

    The protection of water bodies used as sources for drinking water is intimately linked to the adoption of adequate technologies for the treatment of the wastewater generated in the catchment area. The paper presents a general overview of the main technologies used for the treatment of domestic sewage, with a special emphasis on developing countries, and focussing on the main parameters of interest, such as BOD, coliforms and nutrients. A series of tables, figures and charts that can be used for the preliminary selection of treatment technologies is presented. The systems analysed are: stabilisation ponds, activated sludge, trickling filters, anaerobic systems and land disposal. Within each system, the main process variants are covered. Two summary tables are presented, one for quantitative analysis, including easily usable information based on per capita values (US$/cap, Watts/cap, m2 area/cap, m3 sludge/cap), and another for a qualitative comparison among the technologies, based on a one-to-five-star scoring system. The recent trend in tropical countries in the use of UASB (Upflow Anaerobic Sludge Blanket) reactors is also discussed.

  18. Innovative Use of Cr(VI) Plume Depictions and Pump-and-Treat Capture Analysis to Estimate Risks of Contaminant Discharge to Surface Water at Hanford Reactor Areas

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miller, Chuck W.; Hanson, James P.; Ivarson, Kristine A.

    2015-01-14

    The Hanford Site nuclear reactor operations required large quantities of high-quality cooling water, which was treated with chemicals including sodium dichromate dihydrate for corrosion control. Cooling water leakage, as well as intentional discharge of cooling water to ground during upset conditions, produced extensive groundwater recharge mounds consisting largely of contaminated cooling water and resulted in wide distribution of hexavalent chromium (Cr[VI]) contamination in the unconfined aquifer. The 2013 Cr(VI) groundwater plumes in the 100 Areas cover approximately 6 km2 (1500 acres), primarily in the 100-HR-3 and 100-KR-4 groundwater operable units (OUs). The Columbia River is a groundwater discharge boundary; wheremore » the plumes are adjacent to the Columbia River there remains a potential to discharge Cr(VI) to the river at concentrations above water quality criteria. The pump-and-treat systems along the River Corridor are operating with two main goals: 1) protection of the Columbia River, and 2) recovery of contaminant mass. An evaluation of the effectiveness of the pump-and-treat systems was needed to determine if the Columbia River was protected from contamination, and also to determine where additional system modifications may be needed. In response to this need, a technique for assessing the river protection was developed which takes into consideration seasonal migration of the plume and hydraulic performance of the operating well fields. Groundwater contaminant plume maps are generated across the Hanford Site on an annual basis. The assessment technique overlays the annual plume and the capture efficiency maps for the various pump and treat systems. The river protection analysis technique was prepared for use at the Hanford site and is described in detail in M.J. Tonkin, 2013. Interpolated capture frequency maps, based on mapping dynamic water level observed in observation wells and derived water levels in the vicinity of extraction and injection wells, are developed initially. Second, simulated capture frequency maps are developed, based on transport modelling results. Both interpolated and simulated capture frequency maps are based on operation of the systems over a full year. These two capture maps are then overlaid on the plume distribution maps for inspection of the relative orientation of the contaminant plumes with the capture frequency. To quantify the relative degree of protection of the river from discharges of Cr(VI) (and conversely, the degree of threat) at any particular location, a systematic method of evaluating and mapping the plume/capture relationship was developed. By comparing the spatial relationship between contaminant plumes and hydraulic capture frequency, an index of relative protectiveness is developed and the results posted on the combined plume/capture plan view map. Areas exhibiting lesser degrees of river protection are identified for remedial process optimization actions to control plumes and prevent continuing discharge of Cr(VI) to the river.« less

  19. Space Launch System Base Heating Test: Environments and Base Flow Physics

    NASA Technical Reports Server (NTRS)

    Mehta, Manish; Knox, Kyle; Seaford, Mark; Dufrene, Aaron

    2016-01-01

    NASA MSFC and CUBRC designed and developed a 2% scale SLS propulsive wind tunnel test program to investigate base flow effects during flight from lift-off to MECO. This type of test program has not been conducted in 40+ years during the NASA Shuttle Program. Dufrene et al paper described the operation, instrumentation type and layout, facility and propulsion performance, test matrix and conditions and some raw results. This paper will focus on the SLS base flow physics and the generation and results of the design environments being used to design the thermal protection system.

  20. Modelling Risk to US Military Populations from Stopping Blanket Mandatory Polio Vaccination.

    PubMed

    Burgess, Colleen; Burgess, Andrew; McMullen, Kellie

    2017-01-01

    Transmission of polio poses a threat to military forces when deploying to regions where such viruses are endemic. US-born soldiers generally enter service with immunity resulting from childhood immunization against polio; moreover, new recruits are routinely vaccinated with inactivated poliovirus vaccine (IPV), supplemented based upon deployment circumstances. Given residual protection from childhood vaccination, risk-based vaccination may sufficiently protect troops from polio transmission. This analysis employed a mathematical system for polio transmission within military populations interacting with locals in a polio-endemic region to evaluate changes in vaccination policy. Removal of blanket immunization had no effect on simulated polio incidence among deployed military populations when risk-based immunization was employed; however, when these individuals reintegrated with their base populations, risk of transmission to nondeployed personnel increased by 19%. In the absence of both blanket- and risk-based immunization, transmission to nondeployed populations increased by 25%. The overall number of new infections among nondeployed populations was negligible for both scenarios due to high childhood immunization rates, partial protection against transmission conferred by IPV, and low global disease incidence levels. Risk-based immunization driven by deployment to polio-endemic regions is sufficient to prevent transmission among both deployed and nondeployed US military populations.

Top