Sample records for radiation security system

  1. TH-A-12A-01: Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McDonald, K; Curran, B

    I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less

  2. 105KE Basin Area Radiation Monitor System (ARMS) Acceptance Test Procedure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    KINKEL, C.C.

    1999-12-14

    This procedure is intended for the Area Radiation Monitoring System, ARMS, that is replacing the existing Programmable Input-Output Processing System, PIOPS, radiation monitoring system in the 105KE basin. The new system will be referred to as the 105KE ARMS, 105KE Area Radiation Monitoring System. This ATP will ensure calibration integrity of the 105KE radiation detector loops. Also, this ATP will test and document the display, printing, alarm output, alarm acknowledgement, upscale check, and security functions. This ATP test is to be performed after completion of the 105KE ARMS installation. The alarm outputs of the 105KE ARMS will be connected tomore » the basin detector alarms, basin annunciator system, and security Alarm Monitoring System, AMS, located in the 200 area Central Alarm Station (CAS).« less

  3. System and Network Security Acronyms and Abbreviations

    DTIC Science & Technology

    2009-09-01

    hazards of electromagnetic radiation to fuel HERO hazards of electromagnetic radiation to ordnance HERP hazards of electromagnetic ...ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 System and Network Security Acronyms...authentication and key management ALG application layer gateway ANSI American National Standards Institute AP access point API application

  4. Collimator with attachment mechanism and system

    DOEpatents

    Kross, Brian J [Yorktown, VA; McKisson, John [Hampton, VA; Stolin, Aleksandr [Morgantown, WV; Weisenberger, Andrew G [Yorktown, VA; Zorn, Carl [Yorktown, VA

    2012-07-10

    A self-aligning collimator for a radiation imaging device that is secured and aligned through the use of a plurality of small magnets. The collimator allows for the rapid exchange, removal, or addition of collimators for the radiation imaging device without the need for tools. The accompanying method discloses the use of magnets and accompanying magnetic fields to align and secure collimators in a radiation imaging assembly.

  5. Secure environment for real-time tele-collaboration on virtual simulation of radiation treatment planning.

    PubMed

    Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S

    2003-01-01

    A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.

  6. Nuclear Security in the 21^st Century

    NASA Astrophysics Data System (ADS)

    Archer, Daniel E.

    2006-10-01

    Nuclear security has been a priority for the United States, starting in the 1940s with the secret cities of the Manhattan Project. In the 1970s, the United States placed radiation monitoring equipment at nuclear facilities to detect nuclear material diversion. Following the breakup of the Soviet Union, cooperative Russian/U.S. programs were launched in Russia to secure the estimated 600+ metric tons of fissionable materials against diversion (Materials Protection, Control, and Accountability -- MPC&A). Furthermore, separate programs were initiated to detect nuclear materials at the country's borders in the event that these materials had been stolen (Second Line of Defense - SLD). In the 2000s, new programs have been put in place in the United States for radiation detection, and research is being funded for more advanced systems. This talk will briefly touch on the history of nuclear security and then focus on some recent research efforts in radiation detection. Specifically, a new breed of radiation monitors will be examined along with the concept of sensor networks.

  7. Radiation Detection for Homeland Security Applications

    NASA Astrophysics Data System (ADS)

    Ely, James

    2008-05-01

    In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist organizations resort to. With that shift comes the responsibility to monitor international borders for weapons of mass destruction, including radiological weapons. As a result, countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments at land, rail, air, and sea ports of entry in the US and in European and Asian countries. Radioactive signatures of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. This talk will present an overview of radiation detection equipment with emphasis on radiation portal monitors. In the US, the deployment of radiation detection equipment is being coordinated by the Domestic Nuclear Detection Office within the Department of Homeland Security, and a brief summary of the program will be covered. Challenges with current generation systems will be discussed as well as areas of investigation and opportunities for improvements. The next generation of radiation portal monitors is being produced under the Advanced Spectroscopic Portal program and will be available for deployment in the near future. Additional technologies, from commercially available to experimental, that provide additional information for radiation screening, such as density imaging equipment, will be reviewed. Opportunities for further research and development to improve the current equipment and methodologies for radiation detection for the important task of homeland security will be the final topic to be discussed.

  8. Nuclear Security Education Program at the Pennsylvania State University

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Uenlue, Kenan; The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304; Jovanovic, Igor

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basismore » of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale Reactor (PSBR), gamma irradiation facilities (in-pool irradiator, dry irradiator, and hot cells), neutron beam laboratory, radiochemistry laboratories, and various radiation detection and measurement laboratories. A new nuclear security education laboratory was created with DOE NNSA- GTRI funds at RSEC. The nuclear security graduate level curriculum enables the PSU to educate and train future nuclear security experts, both within the United States as well as worldwide. The nuclear security education program at Penn State will grant a Master's degree in nuclear security starting fall 2015. The PSU developed two courses: Nuclear Security- Detector And Source Technologies and Nuclear Security- Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements (Laboratory). Course descriptions and course topics of these courses are described briefly: - Nuclear Security - Detector and Source Technologies; - Nuclear Security - Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Laboratory.« less

  9. Radiation-Induced Immune Modulation in Prostate Cancer

    DTIC Science & Technology

    2008-01-01

    cancers. 15. SUBJECT TERMS Radiation, Dendritic Cells , Cytokines, PSA 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...radiation is more than a cytotoxic agent. Our recent study has shown that radiation modulates the immune system by affecting dendritic cell (DC...translate radiation-induced tumor cell death into generation of tumor immunity in the hope of optimizing therapy for localized and disseminated prostate

  10. Conservation science in a terrorist age: the impact of airport security screening on the viability and DNA integrity of frozen felid spermatozoa.

    PubMed

    Gloor, Kayleen T; Winget, Doug; Swanson, William F

    2006-09-01

    In response to growing terrorism concerns, the Transportation Security Administration now requires that all checked baggage at U.S. airports be scanned through a cabinet x-ray system, which may increase risk of radiation damage to transported biologic samples and other sensitive genetic material. The objective of this study was to investigate the effect of these new airport security regulations on the viability and DNA integrity of frozen felid spermatozoa. Semen was collected from two domestic cats (Felis silvestris catus) and one fishing cat (Prionailurus viverrinus), cryopreserved in plastic freezing straws, and transferred into liquid nitrogen dry shippers for security screening. Treatment groups included frozen samples from each male scanned once or three times using a Transportation Security Administration-operated cabinet x-ray system, in addition to non-scanned samples (i.e., negative control) and samples previously scanned three times and exposed to five additional high-intensity x-ray bursts (i.e., positive control). Dosimeters placed in empty dry shippers were used to quantify radiation exposure. Following treatment, straws were thawed and spermatozoa analyzed for post-thaw motility (percentage motile and rate of progressive movement), acrosome status, and DNA integrity using single-cell gel electrophoresis (i.e., the comet assay). Dosimeter measurements determined that each airport screening procedure produced approximately 16 mrem of radiation exposure. Our results indicated that all levels of radiation exposure adversely affected (P < 0.05) post-thaw sperm motility, but the percentage of acrosome-intact spermatozoa did not differ (P > 0.05) among treatment groups. Results also showed that the amount of double-stranded DNA damage was greater (P < 0.05) in sperm samples from both cat species scanned three times compared to samples scanned once or negative controls. Findings suggest that new airport security measures may cause radiation-induced damage to frozen spermatozoa and other valuable biologic samples transported on passenger aircraft and that alternative modes of sample transportation should be used whenever possible.

  11. Radiation Detection and Dual-Energy X-Ray Imaging for Port Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pashby, J.; Glenn, S.; Divin, C.

    Millions of cargo containers are transported across the United States border annually and are inspected for illicit radioactive material and contraband using a combination of passive radiation portal monitors (RPM) and high energy X-ray non-intrusive inspection (NII) systems. As detection performance is expected to vary with the material composition of cargo, characterizing the types of material present in cargo is important to national security. This work analyzes the passive radiation and dual energy radiography signatures from on RPM and two NII system, respectively. First, the cargos were analyzed to determine their ability to attenuate emissions from an embedded radioactive source.more » Secondly, dual-energy X-ray discrimination was used to determine the material composition and density of the cargos.« less

  12. Rapid response radiation sensors for homeland security applications

    NASA Astrophysics Data System (ADS)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Guss, Paul

    2014-09-01

    The National Security Technologies, LLC, Remote Sensing Laboratory is developing a rapid response radiation detection system for homeland security field applications. The intelligence-driven system is deployed only when non-radiological information about the target is verifiable. The survey area is often limited, so the detection range is small; in most cases covering a distance of 10 meters or less suffices. Definitive response is required in no more than 3 seconds and should minimize false negative alarms, but can err on the side of positive false alarms. The detection system is rapidly reconfigurable in terms of size, shape, and outer appearance; it is a plug-and-play system. Multiple radiation detection components (viz., two or more sodium iodide scintillators) are used to independently "over-determine" the existence of the threat object. Rapid response electronic dose rate meters are also included in the equipment suite. Carefully studied threat signatures are the basis of the decision making. The use of Rad-Detect predictive modeling provides information on the nature of the threat object. Rad-Detect provides accurate dose rate from heavily shielded large sources; for example those lost in Mexico were Category 1 radiation sources (~3,000 Ci of 60Co), the most dangerous of five categories defined by the International Atomic Energy Agency. Taken out of their shielding containers, Category 1 sources can kill anyone who is exposed to them at close range for a few minutes to an hour. Whenever possible sub-second data acquisition will be attempted, and, when deployed, the system will be characterized for false alarm rates. Although the radiation detection materials selected are fast (viz., faster scintillators), their speed is secondary to sensitivity, which is of primary importance. Results from these efforts will be discussed and demonstrated.

  13. Radioactive source security: the cultural challenges.

    PubMed

    Englefield, Chris

    2015-04-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  14. Improving Radiation Awareness and Feeling of Personal Security of Non-Radiological Medical Staff by Implementing a Traffic Light System in Computed Tomography.

    PubMed

    Heilmaier, C; Mayor, A; Zuber, N; Fodor, P; Weishaupt, D

    2016-03-01

    Non-radiological medical professionals often need to remain in the scanning room during computed tomography (CT) examinations to supervise patients in critical condition. Independent of protective devices, their position significantly influences the radiation dose they receive. The purpose of this study was to assess if a traffic light system indicating areas of different radiation exposure improves non-radiological medical staff's radiation awareness and feeling of personal security. Phantom measurements were performed to define areas of different dose rates and colored stickers were applied on the floor according to a traffic light system: green = lowest, orange = intermediate, and red = highest possible radiation exposure. Non-radiological medical professionals with different years of working experience evaluated the system using a structured questionnaire. Kruskal-Wallis and Spearman's correlation test were applied for statistical analysis. Fifty-six subjects (30 physicians, 26 nursing staff) took part in this prospective study. Overall rating of the system was very good, and almost all professionals tried to stand in the green stickers during the scan. The system significantly increased radiation awareness and feeling of personal protection particularly in staff with ≤ 5 years of working experience (p < 0.05). The majority of non-radiological medical professionals stated that staying in the green stickers and patient care would be compatible. Knowledge of radiation protection was poor in all groups, especially among entry-level employees (p < 0.05). A traffic light system in the CT scanning room indicating areas with lowest, intermediate, and highest possible radiation exposure is much appreciated. It increases radiation awareness, improves the sense of personal radiation protection, and may support endeavors to lower occupational radiation exposure, although the best radiation protection always is to re-main outside the CT room during the scan. • A traffic light system indicating areas with different radiation exposure within the computed tomography scanner room is much appreciated by non-radiological medical staff. • The traffic light system increases non-radiological medical staff's radiation awareness and feeling of personal protection. • Knowledge on radiation protection was poor in non-radiological medical staff, especially in those with few working experience. © Georg Thieme Verlag KG Stuttgart · New York.

  15. New Developments in Scintillators for Security Applications

    NASA Astrophysics Data System (ADS)

    Glodo, Jarek; Wang, Yimin; Shawgo, Ryan; Brecher, Charles; Hawrami, Rastgo H.; Tower, Joshua; Shah, Kanai S.

    Radiation is an important part of security space: It is detected either passively in search of special nuclear materials or actively to monitor or interrogate objects of interest. Systems relying on radiation require adequate detectors. The most common radiation detectors are based on scintillating materials that convert hard (gamma, x-ray or neutron) radiation into visible light registered by a photodetector. The last decade has seen development of new materials driven by various security applications. This included the search for He-3 replacement technologies, which resulted in development of neutron sensing scintillators such as Ce-doped Cs2LiYCl6 (CLYC) or more recently Cs2LiLa(Br,Cl)6 (CLLBC). Since they are also good gamma-ray scintillators, they have also penetrated the detection market for passive dual-mode (gamma and neutron) detection systems, replacing scintillators such as NaI(Tl) or CsI(Tl) and competing with LaBr3(Ce). High-energy Non-Intrusive Inspection is another area where active research is being pursued in order to replace existing scintillator choices such as CdWO4, which is commonly used in simple radiography, and PbWO4, which is being studied for spectroscopic alternatives to radiography. For radiography, in particular, new ceramic scintillators such as Ce-doped GLuGAG (garnet) are considered, and for spectroscopy, Yb doped Lu2O3. In this paper we provide a short overview of these technologies.

  16. An exploratory risk perception study of attitudes toward homeland security systems.

    PubMed

    Sanquist, Thomas F; Mahy, Heidi; Morris, Frederic

    2008-08-01

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used in an exploratory study of attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis (PCA) yielded a two-factor solution with the rating scale loading pattern suggesting factors of perceived effectiveness and perceived intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors. Of the 12 systems studied, airport screening, canine detectors, and radiation monitoring at borders were found to be the most acceptable, while email monitoring, data mining, and global positioning satellite (GPS) tracking were found to be least acceptable. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies and can be used to anticipate potentially significant public acceptance issues.

  17. Radiation exposure control from the application of nuclear gauges in the mining industry in Ghana.

    PubMed

    Faanu, A; Darko, E O; Awudu, A R; Schandorf, C; Emi-Reynolds, G; Yeboah, J; Glover, E T; Kattah, V K

    2010-05-01

    The use of nuclear gauges for process control and elemental analysis in the mining industry in Ghana, West Africa, is wide spread and on the increase in recent times. The Ghana Radiation Protection Board regulates nuclear gauges through a system of notification and authorization by registration or licensing, inspection, and enforcement. Safety assessments for authorization and enforcement have been established to ensure the safety and security of radiation sources as well as protection of workers and the general public. Appropriate training of mine staff is part of the efforts to develop the necessary awareness about the safety and security of radiation sources. The knowledge and skills acquired will ensure the required protection and safety at the workplaces. Doses received by workers monitored over a period between 1998 and 2007 are well below the annual dose limit of 20 mSv recommended by the International Commission on Radiological Protection.

  18. A study of smart card for radiation exposure history of patient.

    PubMed

    Rehani, Madan M; Kushi, Joseph F

    2013-04-01

    The purpose of this article is to undertake a study on developing a prototype of a smart card that, when swiped in a system with access to the radiation exposure monitoring server, will locate the patient's radiation exposure history from that institution or set of associated institutions to which it has database access. Like the ATM or credit card, the card acts as a secure unique "token" rather than having cash, credit, or dose data on the card. The system provides the requested radiation history report, which then can be printed or sent by e-mail to the patient. The prototype system is capable of extending outreach to wherever the radiation exposure monitoring server extends, at county, state, or national levels. It is anticipated that the prototype shall pave the way for quick availability of patient exposure history for use in clinical practice for strengthening radiation protection of patients.

  19. United States-Russian Federation Workshop on Responses to Radiation Accidents, November 12-14, 1996 Falls Church, VA

    DTIC Science & Technology

    1996-01-01

    Russia, by was someone higher up in the security that didn’t want to Austria, or by anyone else. But, I do believe that we must provide it. The Civil...Center to develop informed protective action the national security of many states, including Russia. recommendations to protect public health and...part played by the RSDM in the systems mentioned above). of the national security . The next, also very important role of the RSDM, is First, the

  20. Radiation detector based on a matrix of crossed wavelength-shifting fibers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kross, Brian J.; Weisenberger, Andrew; Zorn, Carl

    A radiation detection system comprising a detection grid of wavelength shifting fibers with a volume of scintillating material at the intersecting points of the fibers. Light detectors, preferably Silicon Photomultipliers, are positioned at the ends of the fibers. The position of radiation is determined from data obtained from the detection grid. The system is easily scalable, customizable, and also suitable for use in soil and underground applications. An alternate embodiment employs a fiber grid sheet or layer which is comprised of multiple fibers secured to one another within the same plane. This embodiment further includes shielding in order to preventmore » radiation cross-talk within the grid layer.« less

  1. Resonant Inductive Power Transfer for Noncontact Launcher-Missile Interface

    DTIC Science & Technology

    2016-08-01

    implementation of a wireless power transfer system based on the concept of non-radiating inductive coupling. 14. SUBJECT TERMS Resonant Inductive Coupling... Wireless Power Transfer 15. NUMBER OF PAGES 18 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY...2 In contrast to the ideal transformer, wireless inductive power transfer assumes that the coils are no longer physically connected by an iron core

  2. JPRS Report, Arms Control

    DTIC Science & Technology

    1989-11-13

    manufacturing or using beam facilities. Radiation signs and necessary protection security interlocking mechanisms, alarm systems, or signals must be...JPRS-TAC-89-037 13 NOVEMBER 1989 JPRS tit Arms Control 715 159 REPRODUCED BY US DEPARTMENT OF COMMERCE NATIONAL TECHNICAL INFORMATION SERVICE...Xue Ren; J1EFANGJUN BAO 20 Oct] 4 Li Peng Signs Radiation Protection Decree [XINHUA 1 Nov] 5 Nuclear Technology Applied to Nonmilitary Use

  3. [Radiative and hygienic certification in Armed Forces, problems of its implementation and ways of perfection].

    PubMed

    Rusakov, V N; Cherkashin, A V; Shishkanov, A P; Ian'shin, L A; Gracheva, T N

    2010-12-01

    Radiative and hygienic passportization is one of the most actual pattern of socio and hygienic monitoring in Armed Forces. Radiative and hygienic passport is the main document which characterizes the safety control in military unit and uses the sources of ionizing radiation. Sanitary and epidemiologic institutions were imputed to control the formation of radiative and hygienic passports, analysis and generalization of its data, formation of conclusions about the condition of radiation security in the military units. According to radiative and hygienic passportization, which took place in 2009, the radiation security in the Armed Forces and organizations is satisfactory, but there are some problems of providing of radiation security of personnel under the professional and medical radiation. The salvation of its problems requires the effective work of official functionary of radiac object and institutions of state sanitary and epidemiological supervision in Armed Forces of Russian Federation.

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sanquist, Thomas F.; Mahy, Heidi A.; Morris, Fred A.

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used to measure attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis yielded a two factor solution, with the rating scale loading pattern suggesting factors of Perceived Effectiveness and Perceived Intrusiveness. These factors also showed an inverse relationship.more » The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors, which were used to rank the systems in terms of overall acceptability. Difference scores for the rating scales and PCA factors were used to compute a single acceptability value reflecting the relative weight of risks and benefits. Of the 12 systems studied, airport screening, canine detectors and radiation monitoring at borders were found to be relatively acceptable, i.e., the perceived benefits for homeland security outweighed the perceived risks to civil liberties. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies, and can be used to anticipate potentially significant public acceptance issues.« less

  5. Report: EPA’s Radiation and Indoor Environments National Laboratory Should Improve Its Computer Room Security Controls

    EPA Pesticide Factsheets

    Report #12-P-0847, September 21, 2012.Our review of the security posture and in-place environmental controls of EPA’s Radiation and Indoor Environments National Laboratory computer room disclosed an array of security and environmental control deficiencies.

  6. Improving proton therapy accessibility through seamless electronic integration of remote treatment planning sites.

    PubMed

    Belard, Arnaud; Dolney, Derek; Zelig, Tochner; McDonough, James; O'Connell, John

    2011-06-01

    Proton radiotherapy is a relatively scarce treatment modality in radiation oncology, with only nine centers currently operating in the United States. Funded by Public Law 107-248, the University of Pennsylvania and the Walter Reed Army Medical Center have developed a remote proton radiation therapy solution with the goals of improving access to proton radiation therapy for Department of Defense (DoD) beneficiaries while minimizing treatment delays and time spent away from home/work (time savings of up to 3 weeks per patient). To meet both Health Insurance Portability and Accountability Act guidelines and the more stringent security restrictions imposed by the DoD, our program developed a hybrid remote proton radiation therapy solution merging a CITRIX server with a JITIC-certified (Joint Interoperability Test Command) desktop videoconferencing unit. This conduit, thoroughly tested over a period of 6 months, integrates both institutions' radiation oncology treatment planning infrastructures into a single entity for DoD patients' treatment planning and delivery. This telemedicine solution enables DoD radiation oncologists and medical physicists the ability to (1) remotely access a proton therapy treatment planning platform, (2) transfer patient plans securely to the University of Pennsylvania patient database, and (3) initiate ad-hoc point-to-point and multipoint videoconferences to dynamically optimize and validate treatment plans. Our robust and secure remote treatment planning solution grants DoD patients not only access to a state-of-the-art treatment modality, but also participation in the treatment planning process by Walter Reed Army Medical Center radiation oncologists and medical physicists. This telemedicine system has the potential to lead to a greater integration of military treatment facilities and/or satellite clinics into regional proton therapy centers.

  7. Job security and fear: Do these drive our radiation guidelines

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thomas, R.G.

    1994-01-01

    This commentary asks why scientists want radiation standard setting at a level well below that at which any health related problem has been observed in a human being. The idea that job security and fear actually may drive radiation standards is presented as a possibility. 3 refs.

  8. A web-based remote radiation treatment planning system using the remote desktop function of a computer operating system: a preliminary report.

    PubMed

    Suzuki, Keishiro; Hirasawa, Yukinori; Yaegashi, Yuji; Miyamoto, Hideki; Shirato, Hiroki

    2009-01-01

    We developed a web-based, remote radiation treatment planning system which allowed staff at an affiliated hospital to obtain support from a fully staffed central institution. Network security was based on a firewall and a virtual private network (VPN). Client computers were installed at a cancer centre, at a university hospital and at a staff home. We remotely operated the treatment planning computer using the Remote Desktop function built in to the Windows operating system. Except for the initial setup of the VPN router, no special knowledge was needed to operate the remote radiation treatment planning system. There was a time lag that seemed to depend on the volume of data traffic on the Internet, but it did not affect smooth operation. The initial cost and running cost of the system were reasonable.

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cabrera-Palmer, Belkis

    Predicting the performance of radiation detection systems at field sites based on measured performance acquired under controlled conditions at test locations, e.g., the Nevada National Security Site (NNSS), remains an unsolved and standing issue within DNDO’s testing methodology. Detector performance can be defined in terms of the system’s ability to detect and/or identify a given source or set of sources, and depends on the signal generated by the detector for the given measurement configuration (i.e., source strength, distance, time, surrounding materials, etc.) and on the quality of the detection algorithm. Detector performance is usually evaluated in the performance and operationalmore » testing phases, where the measurement configurations are selected to represent radiation source and background configurations of interest to security applications.« less

  10. Total centralisation and optimisation of an oncology management suite via Citrix®

    NASA Astrophysics Data System (ADS)

    James, C.; Frantzis, J.; Ripps, L.; Fenton, P.

    2014-03-01

    The management of patient information and treatment planning is traditionally an intra-departmental requirement of a radiation oncology service. Epworth Radiation Oncology systems must support the transient nature of Visiting Medical Officers (VMOs). This unique work practice created challenges when implementing the vision of a completely paperless solution that allows for a responsive and efficient service delivery. ARIA® and EclipseTM (Varian Medical Systems, Palo Alto, CA, USA) have been deployed across four dedicated Citrix® (Citrix Systems, Santa Clara, CA, USA) servers allowing VMOs to access these applications remotely. A range of paperless solutions were developed within ARIA® to facilitate clinical and organisational management whilst optimising efficient work practices. The IT infrastructure and paperless workflow has enabled VMOs to securely access the VarianTM (Varian Medical Systems, Palo Alto, CA, USA) oncology software and experience full functionality from any location on multiple devices. This has enhanced access to patient information and improved the responsiveness of the service. Epworth HealthCare has developed a unique solution to enable remote access to a centralised oncology management suite, while maintaining a secure and paperless working environment.

  11. Radiation Control on Uzbekistan Borders - Results and Perspectives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Petrenko, Vitaliy; Yuldashev, Bekhzod; Ismailov, Ulughbek

    2009-12-02

    The measures and actions on prevention, detection and response to criminal or unauthorized acts involving radioactive materials in Uzbekistan are presented. In frames of program of radiation monitoring to prevent illicit trafficking of nuclear and radioactive materials main customs border checkpoints were equipped with commercial radiation portal monitors. Special radiation monitors elaborated and manufactured in INP AS RU are installed in INP(main gates, research reactor and laboratory building) to provide nuclear security of Institute facilities. The experience of Uzbekistan in establishing radiation monitoring systems on its borders, their operation and maintenance would be useful for realization of proposed plan ofmore » strengthening measures to prevent illicit trafficking in Republics of Central Asia region.« less

  12. Photonic sensor applications in transportation security

    NASA Astrophysics Data System (ADS)

    Krohn, David A.

    2007-09-01

    There is a broad range of security sensing applications in transportation that can be facilitated by using fiber optic sensors and photonic sensor integrated wireless systems. Many of these vital assets are under constant threat of being attacked. It is important to realize that the threats are not just from terrorism but an aging and often neglected infrastructure. To specifically address transportation security, photonic sensors fall into two categories: fixed point monitoring and mobile tracking. In fixed point monitoring, the sensors monitor bridge and tunnel structural health and environment problems such as toxic gases in a tunnel. Mobile tracking sensors are being designed to track cargo such as shipboard cargo containers and trucks. Mobile tracking sensor systems have multifunctional sensor requirements including intrusion (tampering), biochemical, radiation and explosives detection. This paper will review the state of the art of photonic sensor technologies and their ability to meet the challenges of transportation security.

  13. ReactorHealth Physics operations at the NIST center for neutron research.

    PubMed

    Johnston, Thomas P

    2015-02-01

    Performing health physics and radiation safety functions under a special nuclear material license and a research and test reactor license at a major government research and development laboratory encompasses many elements not encountered by industrial, general, or broad scope licenses. This article reviews elements of the health physics and radiation safety program at the NIST Center for Neutron Research, including the early history and discovery of the neutron, applications of neutron research, reactor overview, safety and security of radiation sources and radioactive material, and general health physics procedures. These comprise precautions and control of tritium, training program, neutron beam sample processing, laboratory audits, inventory and leak tests, meter calibration, repair and evaluation, radioactive waste management, and emergency response. In addition, the radiation monitoring systems will be reviewed including confinement building monitoring, ventilation filter radiation monitors, secondary coolant monitors, gaseous fission product monitors, gas monitors, ventilation tritium monitor, and the plant effluent monitor systems.

  14. Domestic Aerial Surveillance and Homeland Security: Should Americans Fear the Eye in the Sky?

    DTIC Science & Technology

    2014-03-01

    In this case, an individual in North Dakota barricaded himself inside his property after officials ordered him to return six cows that wondered onto...www.hsdl.org/?view&did=737816. 24 Donald F. Kettl, System under Stress : Homeland Security and American Politics (Washington, DC: CQ, 2007), 113-115...police used a thermal imaging device to detect abnormal levels of heat radiating from the home of Danny Kyllo. Officials entered his home without a

  15. Development of a hemispherical rotational modulation collimator system for imaging spatial distribution of radiation sources

    NASA Astrophysics Data System (ADS)

    Na, M.; Lee, S.; Kim, G.; Kim, H. S.; Rho, J.; Ok, J. G.

    2017-12-01

    Detecting and mapping the spatial distribution of radioactive materials is of great importance for environmental and security issues. We design and present a novel hemispherical rotational modulation collimator (H-RMC) system which can visualize the location of the radiation source by collecting signals from incident rays that go through collimator masks. The H-RMC system comprises a servo motor-controlled rotating module and a hollow heavy-metallic hemisphere with slits/slats equally spaced with the same angle subtended from the main axis. In addition, we also designed an auxiliary instrument to test the imaging performance of the H-RMC system, comprising a high-precision x- and y-axis staging station on which one can mount radiation sources of various shapes. We fabricated the H-RMC system which can be operated in a fully-automated fashion through the computer-based controller, and verify the accuracy and reproducibility of the system by measuring the rotational and linear positions with respect to the programmed values. Our H-RMC system may provide a pivotal tool for spatial radiation imaging with high reliability and accuracy.

  16. Improvements to the Ionizing Radiation Risk Assessment Program for NASA Astronauts

    NASA Technical Reports Server (NTRS)

    Semones, E. J.; Bahadori, A. A.; Picco, C. E.; Shavers, M. R.; Flores-McLaughlin, J.

    2011-01-01

    To perform dosimetry and risk assessment, NASA collects astronaut ionizing radiation exposure data from space flight, medical imaging and therapy, aviation training activities and prior occupational exposure histories. Career risk of exposure induced death (REID) from radiation is limited to 3 percent at a 95 percent confidence level. The Radiation Health Office at Johnson Space Center (JSC) is implementing a program to integrate the gathering, storage, analysis and reporting of astronaut ionizing radiation dose and risk data and records. This work has several motivations, including more efficient analyses and greater flexibility in testing and adopting new methods for evaluating risks. The foundation for these improvements is a set of software tools called the Astronaut Radiation Exposure Analysis System (AREAS). AREAS is a series of MATLAB(Registered TradeMark)-based dose and risk analysis modules that interface with an enterprise level SQL Server database by means of a secure web service. It communicates with other JSC medical and space weather databases to maintain data integrity and consistency across systems. AREAS is part of a larger NASA Space Medicine effort, the Mission Medical Integration Strategy, with the goal of collecting accurate, high-quality and detailed astronaut health data, and then securely, timely and reliably presenting it to medical support personnel. The modular approach to the AREAS design accommodates past, current, and future sources of data from active and passive detectors, space radiation transport algorithms, computational phantoms and cancer risk models. Revisions of the cancer risk model, new radiation detection equipment and improved anthropomorphic computational phantoms can be incorporated. Notable hardware updates include the Radiation Environment Monitor (which uses Medipix technology to report real-time, on-board dosimetry measurements), an updated Tissue-Equivalent Proportional Counter, and the Southwest Research Institute Radiation Assessment Detector. Also, the University of Florida hybrid phantoms, which are flexible in morphometry and positioning, are being explored as alternatives to the current NASA computational phantoms.

  17. Medical Consequences of Chernobyl with Focus on the Endocrine System - Part 2.

    PubMed

    Foley, Thomas P; Límanová, Zdeňka; Potluková, Eliška

    2015-01-01

    In the last 70 years, atomic disasters have occurred several times. The nuclear power plant accident at Chernobyl in 1986 in North-Central Ukraine was a unique experience in population exposures to radiation by all ages, and ongoing studies have brought a large amount of information effects of radiation on human organism. Concerning the deteriorating global security situation and the strong rhetoric of some of the world leaders, the knowledge on the biological effects of ionizing radiation and the preventive measures designed to decrease the detrimental effects of radiation gains a new dimension, and involves all of us. This review focuses on the long-term effects of Chernobyl catastrophe especially on the endocrine system in children and in adults, and includes a summary of preventive measures in case of an atomic disaster.

  18. Medical consequences of Chernobyl with focus on the endocrine system: Part 1.

    PubMed

    Foley, Thomas P; Límanová, Zdeňka; Potluková, Eliška

    2015-01-01

    In the last 70 years, atomic disasters have occurred several times. The nuclear power plant accident at Chernobyl in 1986 in North-Central Ukraine was a unique experience in population exposures to radiation by all ages, and ongoing studies have brought a large amount of information on effects of radiation on human organism. Concerning the deteriorating global security situation and the strong rhetoric of some of the world leaders, the knowledge on the biological effects of ionizing radiation and the preventive measures designed to decrease the detrimental effects of radiation gains a new dimension, and involves all of us. This review focuses on the long-term effects of Chernobyl catastrophe especially on the endocrine system in children and in adults, and includes a summary of preventive measures in case of an atomic disaster.

  19. Radiography Capabilities for Matter-Radiation Interactions in Extremes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Walstrom, Peter Lowell; Garnett, Robert William; Chapman, Catherine A. B

    The Matter-Radiation Interactions in Extremes (MaRIE) experimental facility will be used to discover and design the advanced materials needed to meet 21st century national security and energy security challenges. This new facility will provide the new tools scientists need to develop next-generation materials that will perform predictably and on-demand for currently unattainable lifetimes in extreme environments. The MaRIE facility is based on upgrades to the existing LANSCE 800-MeV proton linac and a new 12-GeV electron linac and associated X-ray FEL to provide simultaneous multiple probe beams, and new experimental areas. In addition to the high-energy photon probe beam, both electronmore » and proton radiography capabilities will be available at the MaRIE facility. Recently, detailed radiography system studies have been performed to develop conceptual layouts of high-magnification electron and proton radiography systems that can meet the experimental requirements for the expected first experiments to be performed at the facility. A description of the radiography systems, their performance requirements, and a proposed facility layout are presented.« less

  20. Development of a novel gamma probe for detecting radiation direction

    NASA Astrophysics Data System (ADS)

    Pani, R.; Pellegrini, R.; Cinti, M. N.; Longo, M.; Donnarumma, R.; D'Alessio, A.; Borrazzo, C.; Pergola, A.; Ridolfi, S.; De Vincentis, G.

    2016-01-01

    Spatial localization of radioactive sources is currently a main issue interesting different fields, including nuclear industry, homeland security as well as medical imaging. It is currently achieved using different systems, but the development of technologies for detecting and characterizing radiation is becoming important especially in medical imaging. In this latter field, radiation detection probes have long been used to guide surgery, thanks to their ability to localize and quantify radiopharmaceutical uptake even deep in tissue. Radiolabelled colloid is injected into, or near to, the tumor and the surgeon uses a hand-held radiation detector, the gamma probe, to identify lymph nodes with radiopharmaceutical uptkake. The present work refers to a novel scintigraphic goniometric probe to identify gamma radiation and its direction. The probe incorporates several scintillation crystals joined together in a particular configuration to provide data related to the position of a gamma source. The main technical characteristics of the gamma locator prototype, i.e. sensitivity, spatial resolution and detection efficiency, are investigated. Moreover, the development of a specific procedure applied to the images permits to retrieve the source position with high precision with respect to the currently used gamma probes. The presented device shows a high sensitivity and efficiency to identify gamma radiation taking a short time (from 30 to 60 s). Even though it was designed for applications in radio-guided surgery, it could be used for other purposes, as for example homeland security.

  1. 3He and BF 3 neutron detector pressure effect and model comparison

    NASA Astrophysics Data System (ADS)

    Lintereur, Azaree; Conlin, Kenneth; Ely, James; Erikson, Luke; Kouzes, Richard; Siciliano, Edward; Stromswold, David; Woodring, Mitchell

    2011-10-01

    Radiation detection systems for homeland security applications must possess the capability of detecting both gamma rays and neutrons. The radiation portal monitor systems that are currently deployed use a plastic scintillator for detecting gamma rays and 3He gas-filled proportional counters for detecting neutrons. Proportional counters filled with 3He are the preferred neutron detectors for use in radiation portal monitor systems because 3He has a large neutron cross-section, is relatively insensitive to gamma-rays, is neither toxic nor corrosive, can withstand extreme environments, and can be operated at a lower voltage than some of the alternative proportional counters. The amount of 3He required for homeland security and science applications has depleted the world supply and there is no longer enough available to fill the demand. Thus, alternative neutron detectors are being explored. Two possible temporary solutions that could be utilized while a more permanent solution is being identified are reducing the 3He pressure in the proportional counters and using boron trifluoride gas-filled proportional counters. Reducing the amount of 3He required in each of the proportional counters would decrease the rate at which 3He is being used; not enough to solve the shortage, but perhaps enough to increase the amount of time available to find a working replacement. Boron trifluoride is not appropriate for all situations as these detectors are less sensitive than 3He, boron trifluoride gas is corrosive, and a much higher voltage is required than what is used with 3He detectors. Measurements of the neutron detection efficiency of 3He and boron trifluoride as a function of tube pressure were made. The experimental results were also used to validate models of the radiation portal monitor systems.

  2. A security vulnerabilities assessment tool for interim storage facilities of low-level radioactive wastes.

    PubMed

    Bible, J; Emery, R J; Williams, T; Wang, S

    2006-11-01

    Limited permanent low-level radioactive waste (LLRW) disposal capacity and correspondingly high disposal costs have resulted in the creation of numerous interim storage facilities for either decay-in-storage operations or longer term accumulation efforts. These facilities, which may be near the site of waste generation or in distal locations, often were not originally designed for the purpose of LLRW storage, particularly with regard to security. Facility security has become particularly important in light of the domestic terrorist acts of 2001, wherein LLRW, along with many other sources of radioactivity, became recognized commodities to those wishing to create disruption through the purposeful dissemination of radioactive materials. Since some LLRW materials may be in facilities that may exhibit varying degrees of security control sophistication, a security vulnerabilities assessment tool grounded in accepted criminal justice theory and security practice has been developed. The tool, which includes dedicated sections on general security, target hardening, criminalization benefits, and the presence of guardians, can be used by those not formally schooled in the security profession to assess the level of protection afforded to their respective facilities. The tool equips radiation safety practitioners with the ability to methodically and systematically assess the presence or relative status of various facility security aspects, many of which may not be considered by individuals from outside the security profession. For example, radiation safety professionals might not ordinarily consider facility lighting aspects, which is a staple for the security profession since it is widely known that crime disproportionately occurs more frequently at night or in poorly lit circumstances. Likewise, the means and associated time dimensions for detecting inventory discrepancies may not be commonly considered. The tool provides a simple means for radiation safety professionals to assess, and perhaps enhance in a reasonable fashion, the security of their interim storage operations. Aspects of the assessment tool can also be applied to other activities involving the protection of sources of radiation as well.

  3. Regulation of X-Ray Security Scanners in Michigan.

    PubMed

    Parry, Donald E

    2016-02-01

    In January of 2013 the Transportation Security Administration (TSA) ordered the removal of x-ray security scanners from airports by June of 2013. Since that time several of these scanners have been purchased at a reduced cost by various state and county governments for use in screening individuals entering or leaving their facilities. To address this issue the Radiation Safety Section of the State of Michigan drafted a set of registration conditions for facilities to follow when using these security scanners. Inspection procedures and measurement protocols were developed to estimate the dose to screened individuals. Inspections were performed on nine of the 16 registered backscatter scanners in the state and the one transmission scanner. The average estimated effective dose to screened individuals was ∼11 nSv for a two view scan from a backscatter system. The effective dose was 0.446 μSv, 0.330 μSv, and 0.150 μSv for a transmission system operated in the high, medium, and low dose modes, respectively. The limit suggested in the new registration condition is 0.25 μSv for a general use system and 10 μSv for a limited use system.

  4. Radiological protection, safety and security issues in the industrial and medical applications of radiation sources

    NASA Astrophysics Data System (ADS)

    Vaz, Pedro

    2015-11-01

    The use of radiation sources, namely radioactive sealed or unsealed sources and particle accelerators and beams is ubiquitous in the industrial and medical applications of ionizing radiation. Besides radiological protection of the workers, members of the public and patients in routine situations, the use of radiation sources involves several aspects associated to the mitigation of radiological or nuclear accidents and associated emergency situations. On the other hand, during the last decade security issues became burning issues due to the potential malevolent uses of radioactive sources for the perpetration of terrorist acts using RDD (Radiological Dispersal Devices), RED (Radiation Exposure Devices) or IND (Improvised Nuclear Devices). A stringent set of international legally and non-legally binding instruments, regulations, conventions and treaties regulate nowadays the use of radioactive sources. In this paper, a review of the radiological protection issues associated to the use of radiation sources in the industrial and medical applications of ionizing radiation is performed. The associated radiation safety issues and the prevention and mitigation of incidents and accidents are discussed. A comprehensive discussion of the security issues associated to the global use of radiation sources for the aforementioned applications and the inherent radiation detection requirements will be presented. Scientific, technical, legal, ethical, socio-economic issues are put forward and discussed.

  5. Summary Report for the Radiation Detection for Nuclear Security Summer School 2014

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Runkle, Robert C.; Baciak, James E.; Woodring, Mitchell L.

    Executive Summary The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the 3rd Radiation Detection for Nuclear Security Summer School from 16 – 27 June 2014. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectivesmore » of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security. In fact, we are beginning to see previous students both enroll in graduate programs (former undergraduates) and complete internships at agencies like the National Nuclear Security Administration.« less

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ezzell, G; Sanscrainte, E; Tomlinson, C

    Have a question about RO-ILS: Radiation Oncology Incident Learning System™, or interested in learning more? Sponsored by the American Society for Radiation Oncology (ASTRO) and AAPM, RO-ILS is the only medical specialty society-sponsored incident learning system for radiation oncology. It facilitates safer and higher quality care in radiation oncology by providing a mechanism for shared learning in a secure and non-punitive environment. Please join our RO-ILS experts for a question and answer session on Wednesday, July 15th at 8:30 in the Partners in Solutions Room in Exhibit Hall C. Our experts include: Gary Ezzell, PhD, Mayo Clinic Arizona, [Brett Miller,more » Phillip Beron, and Derek Brown], Emily Sanscrainte from Clarity PSO and Cindy Tomlinson, MPP, ASTRO.« less

  7. Next Generation Trusted Radiation Identification System (NG-TRIS).

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Flynn, Adam J.; Amai, Wendy A.; Merkle, Peter Benedict

    2010-05-01

    The original Trusted Radiation Identification System (TRIS) was developed from 1999-2001, featuring information barrier technology to collect gamma radiation template measurements useful for arms control regime operations. The first TRIS design relied upon a multichannel analyzer (MCA) that was external to the protected volume of the system enclosure, undesirable from a system security perspective. An internal complex programmable logic device (CPLD) contained data which was not subject to software authentication. Physical authentication of the TRIS instrument case was performed by a sensitive but slow eddy-current inspection method. This paper describes progress to date for the Next Generation TRIS (NG-TRIS), whichmore » improves the TRIS design. We have incorporated the MCA internal to the trusted system volume, achieved full authentication of CPLD data, and have devised rapid methods to authenticate the system enclosure and weld seals of the NG-TRIS enclosure. For a complete discussion of the TRIS system and components upon which NG-TRIS is based, the reader is directed to the comprehensive user's manual and system reference of Seager, et al.« less

  8. Recent Developments and Applications of Radiation/Detection Technology in Tsinghua University

    NASA Astrophysics Data System (ADS)

    Kang, Ke-Jun

    2010-03-01

    Nuclear technology applications have been very important research fields in Tsinghua University (THU) for more than 50 years. This paper describes two major directions and related projects running in THU concerning nuclear technology applications for radiation imaging and nuclear technology applications for astrophysics. Radiation imaging is a significant application of nuclear technology for all kinds of real world needs including security inspections, anti-smuggling operations, and medicine. The current improved imaging systems give much higher quality radiation images. THU has produced accelerating tubes for both industrial and medical accelerators with energy levels ranging from 2.5˜20Mev. Detectors have been produced for medical and industrial imaging as well as for high energy physics experiments such as the MRPC with fast time and position resolutions. DR and CT systems for radiation imaging systems have been continuously improved with new system designs and improved algorithms for image reconstruction and processing. Two important new key initiatives are the dual-energy radiography and dual-energy CT systems. Dual-energy CT imaging improves material discrimination by providing both the electron density and the atomic number distribution of scanned objects. Finally, this paper also introduces recent developments related to the hard X-ray modulation telescope (HXMT) provided by THU.

  9. Summary Report for the Radiation Detection for Nuclear Security Summer School 2012

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Runkle, Robert C.; Baciak, James E.; Stave, Jean A.

    The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the inaugural Radiation Detection for Nuclear Security Summer School from June 11 – 22, 2012. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. The first week of the summer school focused on the foundational knowledge required by technology practitioners; themore » second week focused on contemporary applications. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security.« less

  10. Hazards protection for space suits and spacecraft

    NASA Technical Reports Server (NTRS)

    Kosmo, Joseph J. (Inventor); Dawn, Frederic S. (Inventor)

    1990-01-01

    A flexible multi-layered covering article for protection against the hazards of exposure to the environment of outer space is disclosed. The covering includes an outer layer section comprising an outermost lamina of woven expanded tetrafluoroethylene yarns (Gore Tex) for protecting against abrasion and tearing, an underlying weave of meta-aramid yarns (Nomex) and para-aramid yarns (Kevlar) for particle impart protection, and electrostatic charge dissipation and control system incorporated therein, and a chemical contaminants control barrier applied as a coating. A middle section includes a succession of thermal insulating layers of polymeric thermoplastic or thermoforming material, each of which is coated with a metal deposit of high infra-red emissivity and low solar radiation absorption characteristics and separated from adjacent insulating layers by a low thermal conductance material. The covering further includes a radiation attenuating layer of a tungsten-loaded polymeric elastomer binder for protecting against bremsstrahlung radiation and an inner layer of rip-stop polyester material for abrasion protection. A chloroprene coating may be supplied the polyester-material for added micrometeroid protection. Securing means of low heat conductance material secures the multi-layers together as a laminar composite.

  11. Passivated diamond film temperature sensing probe and measuring system employing same

    DOEpatents

    Young, Jack P.; Mamantov, Gleb

    1998-01-01

    A high temperature sensing probe includes an optical fiber or rod having a distal end and a proximal end. The optical fiber or rod has a coating secured to the distal end thereof, wherein the coating is capable of producing a Raman spectrum when exposed to an exciting radiation source.

  12. Gamma-Ray Detectors: From Homeland Security to the Cosmos (443rd Brookhaven Lecture)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bolotnikov, Aleksey

    2008-12-03

    Many radiation detectors are first developed for homeland security or industrial applications. Scientists, however, are continuously realizing new roles that these detectors can play in high-energy physics and astrophysics experiments. On Wednesday, December 3, join presenter Aleksey Bolotnikov, a physicist in the Nonproliferation and National Security Department (NNSD) and a co-inventor of the cadmium-zinc-telluride Frisch-ring (CdZnTe) detector, for the 443rd Brookhaven Lecture, entitled Gamma-Ray Detectors: From Homeland Security to the Cosmos. In his lecture, Bolotnikov will highlight two primary radiation-detector technologies: CdZnTe detectors and fluid-Xeon (Xe) detectors.

  13. The use of accelerated radiation testing for avionics

    NASA Astrophysics Data System (ADS)

    Quinn, Heather

    2013-04-01

    In recent years, the use of unmanned aerial vehicles (UAVs) for military and national security applications has been increasing. One possible use of these vehicles is as remote sensing platforms, where the UAV carries several sensors to provide real-time information about biological, chemical or radiological agents that might have been released into the environment. One such UAV, the Global Hawk, has a payload space that can carry nearly one ton of sensing equipment, which makes these platforms significantly larger than many satellites. Given the size of the potential payload and the heightened radiation environment at high altitudes, these systems could be affected by the radiation-induced failure mechanisms from the naturally occurring terrestrial environment. In this paper, we will explore the use of accelerated radiation testing to prepare UAV payloads for deployment.

  14. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  15. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  16. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  17. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  18. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  19. Thallium-201 for cardiac stress tests: residual radioactivity worries patients and security.

    PubMed

    Geraci, Matthew J; Brown, Norman; Murray, David

    2012-12-01

    A 47-year-old man presented to the Emergency Department (ED) in duress and stated he was "highly radioactive." There were no reports of nuclear disasters, spills, or mishaps in the local area. This report discusses the potential for thallium-201 (Tl-201) patients to activate passive radiation alarms days to weeks after nuclear stress tests, even while shielded inside industrial vehicles away from sensors. Characteristics of Tl-201, as used for medical imaging, are described. This patient was twice detained by Homeland Security Agents and searched after he activated radiation detectors at a seaport security checkpoint. Security agents deemed him not to be a threat, but they expressed concern regarding his health and level of personal radioactivity. The patient was subsequently barred from his job and sent to the hospital. Tl-201 is a widely used radioisotope for medical imaging. The radioactive half-life of Tl-201 is 73.1h, however, reported periods of extended personal radiation have been seen as far out as 61 days post-administration. This case describes an anxious, but otherwise asymptomatic patient presenting to the ED with detection of low-level personal radiation. Documentation should be provided to and carried by individuals receiving radionuclides for a minimum of five to six half-lives of the longest-lasting isotope provided. Patients receiving Tl-201 should understand the potential for security issues; reducing probable tense moments, confusion, and anxiety to themselves, their employers, security officials, and ED staff. Copyright © 2012 Elsevier Inc. All rights reserved.

  20. Neutron and Gamma Imaging for National Security Applications

    NASA Astrophysics Data System (ADS)

    Hornback, Donald

    2017-09-01

    The Department of Energy, National Nuclear Security Administration (NNSA), Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D/NA-22) possesses, in part, the mission to develop technologies in support of nuclear security efforts in coordination with other U.S. government entities, such as the Department of Defense and the Department of Homeland Security. DNN R&D has long supported research in nuclear detection at national labs, universities, and through the small business innovation research (SBIR) program. Research topics supported include advanced detector materials and electronics, detection algorithm development, and advanced gamma/neutron detection systems. Neutron and gamma imaging, defined as the directional detection of radiation as opposed to radiography, provides advanced detection capabilities for the NNSA mission in areas of emergency response, international safeguards, and nuclear arms control treaty monitoring and verification. A technical and programmatic overview of efforts in this field of research will be summarized.

  1. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  2. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  3. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  4. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  5. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  6. Terahertz Tools Advance Imaging for Security, Industry

    NASA Technical Reports Server (NTRS)

    2010-01-01

    Picometrix, a wholly owned subsidiary of Advanced Photonix Inc. (API), of Ann Arbor, Michigan, invented the world s first commercial terahertz system. The company improved the portability and capabilities of their systems through Small Business Innovation Research (SBIR) agreements with Langley Research Center to provide terahertz imaging capabilities for inspecting the space shuttle external tanks and orbiters. Now API s systems make use of the unique imaging capacity of terahertz radiation on manufacturing floors, for thickness measurements of coatings, pharmaceutical tablet production, and even art conservation.

  7. Effects of Ionizing Radiation and Restraint Stress on Activity, Avoidance Conditioning, and Stomach Ulcers in Albino Rats.

    DTIC Science & Technology

    1984-03-01

    surrounded the rat. The ends of the screen wire tube were twisted and secured with galvanized wire. Care was taken to wrap the screen wire tight so that...function. In N. R. DiLuzio and R. Paoletti (eds.). The reticuloendothelial system and atherosclerosis : Advances in experimental medicine and biology, pp

  8. Utilization of Local Law Enforcement Aerial Resources in Consequence Management (CM) Response

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wasiolek, Piotr T.; Malchow, Russell L.

    2013-03-12

    During the past decade the U.S. Department of Homeland Security (DHS) was instrumental in enhancing the nation’s ability to detect and prevent a radiological or nuclear attack in the highest risk cities. Under the DHS Securing the Cities initiative, nearly 13,000 personnel in the New York City region have been trained in preventive radiological and nuclear detection operations, and nearly 8,500 pieces of radiological detection equipment have been funded. As part of the preventive radiological/nuclear detection (PRND) mission, several cities have received funding to purchase commercial aerial radiation detection systems. In 2008, the U.S. Department of Energy, National Nuclear Securitymore » Administration Aerial Measuring System (AMS) program started providing Mobile Aerial Radiological Surveillance (MARS) training to such assets, resulting in over 150 HAZMAT teams’ officers and pilots from 10 law enforcement organizations and fire departments being trained in the aerial radiation detection. From the beginning, the MARS training course covered both the PRND and consequence management (CM) missions. Even if the law enforcement main focus is PRND, their aerial assets can be utilized in the collection of initial radiation data for post-event radiological CM response. Based on over 50 years of AMS operational experience and information collected during MARS training, this presentation will focus on the concepts of CM response using aerial assets as well as utilizing law enforcement/fire department aerial assets in CM. Also discussed will be the need for establishing closer relationships between local jurisdictions’ aerial radiation detection capabilities and state and local radiation control program directors, radiological health department managers, etc. During radiological events these individuals may become primary experts/advisers to Incident Commanders for radiological emergency response, especially in the early stages of a response. The knowledge of the existence, specific capabilities, and use of local aerial radiation detection systems would be critical in planning the response, even before federal assets arrive on the scene. The relationship between local and federal aerial assets and the potential role for the further use of the MARS training and expanded AMS Reachback capabilities in facilitating such interactions will be discussed.« less

  9. Particle Laden Turbulence in a Radiation Environment Using a Portable High Preformace Solver Based on the Legion Runtime System

    NASA Astrophysics Data System (ADS)

    Torres, Hilario; Iaccarino, Gianluca

    2017-11-01

    Soleil-X is a multi-physics solver being developed at Stanford University as a part of the Predictive Science Academic Alliance Program II. Our goal is to conduct high fidelity simulations of particle laden turbulent flows in a radiation environment for solar energy receiver applications as well as to demonstrate our readiness to effectively utilize next generation Exascale machines. The novel aspect of Soleil-X is that it is built upon the Legion runtime system to enable easy portability to different parallel distributed heterogeneous architectures while also being written entirely in high-level/high-productivity languages (Ebb and Regent). An overview of the Soleil-X software architecture will be given. Results from coupled fluid flow, Lagrangian point particle tracking, and thermal radiation simulations will be presented. Performance diagnostic tools and metrics corresponding the the same cases will also be discussed. US Department of Energy, National Nuclear Security Administration.

  10. Collapsing Radiative Shocks in Xenon Gas on the Omega Laser

    NASA Astrophysics Data System (ADS)

    Reighard, A. B.; Glendinning, S. G.; Knauer, J.; Bouquet, S.; Koenig, M.

    2005-10-01

    A number of astrophysical systems involve radiative shocks that collapse spatially in response to energy lost through radiation, producing thin shells believed to be Vishniac unstable. We report experiments intended to study such collapsing shocks. The Omega laser drives a thin slab of material at >100 km/s through Xe gas. Simulations predict a collapsed layer in which the density reaches 45 times initial density. X-ray backlighting techniques have yielded images of a collapsed shock compressed to <1/25 its initial thickness (45 μm) at a speed of ˜100 km/s when the shock has traveled 1.3 mm. Optical depth before and behind the shock is important for comparison to astrophysical systems. This research was sponsored by the National Nuclear Security Administration under the Stewardship Science Academic Alliances program through DOE Research Grants DE-FG52-03NA00064, DE-FG53-2005-NA26014, and other grants and contracts.

  11. Breaking the rules? X-ray examination of hematopoietic stem cell grafts at international airports.

    PubMed

    Petzer, Andreas L; Speth, Hans-Georg; Hoflehner, Elisabeth; Clausen, Johannes; Nachbaur, David; Gastl, Günther; Gunsilius, Eberhard

    2002-06-15

    Hematopoietic stem cell grafts from unrelated donors are commonly transported by aircraft. They must not be subjected to x-rays during security checks, which may cause inconvenient discussions between the courier and the airport security staff. We exposed hematopoietic stem cells from mobilized peripheral blood to a widely used x-ray hand-luggage control system. Cell viability as well as growth in vitro of mature progenitor cells (colony-forming cells), primitive progenitor cells (long-term culture-initiating cells), and lymphocytes were not altered even after 10 passages through the hand-luggage control system. Thus, repeated exposure to the low radiation dose of hand-luggage control systems (1.5 +/- 0.6 microSv per exposure) seems to be harmless for hematopoietic stem cells, which should simplify the international transport of stem cell grafts.

  12. Radiation scientists and homeland security.

    PubMed

    Rose, Christopher M

    2002-05-01

    Radiation scientists represent an important resource in homeland defense. Security analysts worry that a crude but deadly radiological bomb might be fashioned from stolen nuclear material and a few sticks of dynamite. Such a device could kill dozens, hundreds, and possibly thousands and could contaminate a square mile or more. Emergency workers may call upon radiation scientists to aid the injured. Educational materials are available on the ACR, ASTRO, and RRS websites, linked to the Armed Forces Radiobiology Research Institute and the Oak Ridge National Laboratory, to provide radiation workers material that they can use to help emergency room and civil defense personnel after a terrorist attack. Radiation scientists are urged to obtain these materials and contact their local hospital and public health authorities to volunteer their services and expertise.

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    none,

    The Office of Analysis within the U.S. Department of Energy (DOE) Office of Environment, Health, Safety and Security (EHSS) publishes the annual DOE Occupational Radiation Exposure Report to provide an overview of the status of radiation protection practices at DOE (including the National Nuclear Security Administration [NNSA]). The DOE 2013 Occupational Radiation Exposure Report provides an evaluation of DOE-wide performance regarding compliance with Title 10, Code of Federal Regulations (C.F.R.), Part 835, Occupational Radiation Protection dose limits and as low as reasonably achievable (ALARA) process requirements. In addition, the report provides data to DOE organizations responsible for developing policies formore » protection of individuals from the adverse health effects of radiation. The report provides a summary and an analysis of occupational radiation exposure information from the monitoring of individuals involved in DOE activities. Over the past five-year period, the occupational radiation exposure information has been analyzed in terms of aggregate data, dose to individuals, and dose by site.« less

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    none,

    The U.S. Department of Energy (DOE) Office of Analysis within the Office of Health, Safety and Security (HSS) publishes the annual DOE Occupational Radiation Exposure Report to provide an overview of the status of radiation protection practices at DOE (including the National Nuclear Security Administration [NNSA]). The DOE 2012 Occupational Radiation Exposure Report provides an evaluation of DOE-wide performance regarding compliance with Title 10, Code of Federal Regulations (C.F.R.), Part 835, Occupational Radiation Protection dose limits and as low as reasonably achievable (ALARA) process requirements. In addition, the report provides data to DOE organizations responsible for developing policies for protectionmore » of individuals from the adverse health effects of radiation. The report provides a summary and an analysis of occupational radiation exposure information from the monitoring of individuals involved in DOE activities. Over the past 5-year period, the occupational radiation exposure information is analyzed in terms of aggregate data, dose to individuals, and dose by site.« less

  15. Overview of innovative next generation materials for security and defense applications

    NASA Astrophysics Data System (ADS)

    Taylor, Edward W.; Taylor, Linda R.

    2008-10-01

    A short technology Overview of recently reported research and development focusing on recent advances in polymer/organic and hybrid-nanotechnology based materials that offer resistance to ionizing and displacement radiations and perhaps which are suitable for transition to next-generation systems is presented. The Overview will focus on new and emerging material technology for the military, first responders, and space systems. Recent material research results and data as well as the potential for diverse applications of these materials to new component developments such as high speed EO polymer modulators and radiation shielding for protection of military and space assets will be discussed. In particular, the ability of several organic/polymer hybrids to self-heal when irradiated by gamma-rays is discussed.

  16. 10 CFR 39.77 - Notification of incidents and lost sources; abandonment procedures for irretrievable sources.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., radiation overexposures, excessive levels and concentrations of radiation, and certain other accidents as... RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.77 Notification of...

  17. 10 CFR 39.77 - Notification of incidents and lost sources; abandonment procedures for irretrievable sources.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., radiation overexposures, excessive levels and concentrations of radiation, and certain other accidents as... RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.77 Notification of...

  18. 10 CFR 39.77 - Notification of incidents and lost sources; abandonment procedures for irretrievable sources.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., radiation overexposures, excessive levels and concentrations of radiation, and certain other accidents as... RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.77 Notification of...

  19. 10 CFR 39.77 - Notification of incidents and lost sources; abandonment procedures for irretrievable sources.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., radiation overexposures, excessive levels and concentrations of radiation, and certain other accidents as... RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.77 Notification of...

  20. 10 CFR 39.77 - Notification of incidents and lost sources; abandonment procedures for irretrievable sources.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ..., radiation overexposures, excessive levels and concentrations of radiation, and certain other accidents as... RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.77 Notification of...

  1. DOE 2011 occupational radiation exposure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    none,

    2012-12-01

    The U.S. Department of Energy (DOE) Office of Analysis within the Office of Health, Safety and Security (HSS) publishes the annual DOE Occupational Radiation Exposure Report to provide an overview of the status of radiation protection practices at DOE (including the National Nuclear Security Administration [NNSA]). The DOE 2011 Occupational Radiation Exposure Report provides an evaluation of DOE-wide performance regarding compliance with Title 10, Code of Federal Regulations (C.F.R.), Part 835, Occupational Radiation Protection dose limits and as low as reasonably achievable (ALARA) process requirements. In addition, the report provides data to DOE organizations responsible for developing policies for protectionmore » of individuals from the adverse health effects of radiation. The report provides a summary and an analysis of occupational radiation exposure information from the monitoring of individuals involved in DOE activities. The occupational radiation exposure information is analyzed in terms of aggregate data, dose to individuals, and dose by site over the past five years.« less

  2. Experimental Results of Site Calibration and Sensitivity Measurements in OTR for UWB Systems

    NASA Astrophysics Data System (ADS)

    Viswanadham, Chandana; Rao, P. Mallikrajuna

    2017-06-01

    System calibration and parameter accuracy measurement of electronic support measures (ESM) systems is a major activity, carried out by electronic warfare (EW) engineers. These activities are very critical and needs good understanding in the field of microwaves, antennas, wave propagation, digital and communication domains. EW systems are broad band, built with state-of-the art electronic hardware, installed on different varieties of military platforms to guard country's security from time to time. EW systems operate in wide frequency ranges, typically in the order of thousands of MHz, hence these are ultra wide band (UWB) systems. Few calibration activities are carried within the system and in the test sites, to meet the accuracies of final specifications. After calibration, parameters are measured for their accuracies either in feed mode by injecting the RF signals into the front end or in radiation mode by transmitting the RF signals on to system antenna. To carry out these activities in radiation mode, a calibrated open test range (OTR) is necessary in the frequency band of interest. Thus site calibration of OTR is necessary to be carried out before taking up system calibration and parameter measurements. This paper presents the experimental results of OTR site calibration and sensitivity measurements of UWB systems in radiation mode.

  3. Multiple bio-monitoring system using visible light for electromagnetic-wave free indoor healthcare

    NASA Astrophysics Data System (ADS)

    An, Jinyoung; Pham, Ngoc Quan; Chung, Wan-Young

    2017-12-01

    In this paper, a multiple biomedical data transmission system with visible light communication (VLC) is proposed for an electromagnetic-wave-free indoor healthcare. VLC technology has emerged as an alternative solution to radio-frequency (RF) wireless systems, due to its various merits, e.g., ubiquity, power efficiency, no RF radiation, and security. With VLC, critical bio-medical signals, including electrocardiography (ECG), can be transmitted in places where RF radiation is restricted. This potential advantage of VLC could save more lives in emergency situations. A time hopping (TH) scheme is employed to transfer multiple medical-data streams in real time with a simple system design. Multiple data streams are transmitted using identical color LEDs and go into an optical detector. The received multiple data streams are demodulated and rearranged using a TH-based demodulator. The medical data is then monitored and managed to provide the necessary medical care for each patient.

  4. Study of gamma detection capabilities of the REWARD mobile spectroscopic system

    NASA Astrophysics Data System (ADS)

    Balbuena, J. P.; Baptista, M.; Barros, S.; Dambacher, M.; Disch, C.; Fiederle, M.; Kuehn, S.; Parzefall, U.

    2017-07-01

    REWARD is a novel mobile spectroscopic radiation detector system for Homeland Security applications. The system integrates gamma and neutron detection equipped with wireless communication. A comprehensive simulation study on its gamma detection capabilities in different radioactive scenarios is presented in this work. The gamma detection unit consists of a precise energy resolution system based on two stacked (Cd,Zn)Te sensors working in coincidence sum mode. The volume of each of these CZT sensors is 1 cm3. The investigated energy windows used to determine the detection capabilities of the detector correspond to the gamma emissions from 137Cs and 60Co radioactive sources (662 keV and 1173/1333 keV respectively). Monte Carlo and Technology Computer-Aided Design (TCAD) simulations are combined to determine its sensing capabilities for different radiation sources and estimate the limits of detection of the sensing unit as a function of source activity for several shielding materials.

  5. Evolving societal risks and necessary precautions in the age of nuclear power and therapeutic radiation: an American perspective.

    PubMed

    Pham, Martin H; Yu, Cheng; Rusch, Mairead; Holloway, Charles; Chang, Eric; Apuzzo, Michael L J

    2014-12-01

    Terrorism involving nuclear or radiologic weapons can devastate populations, city infrastructures, and entire sociopolitical systems. In our age of nuclear medicine and therapeutic radiation delivery, the unauthorized and illegal acquisition of radioactive materials needed for such an attack is always a possibility and risk. Physicians handling high-energy isotopes for medical radiotherapy must be aware of the basic security requirements as outlined by the Nuclear Regulation Commission, which include background checks and authorized access, physical protection during radionuclide use, and physical protection during its transit. The Leksell Gamma Knife and its Category 1 cobalt-60 radioactive source are discussed because of their significant potential for deployment in a weaponized device. Although this article presents a perspective relating to American rules and regulations, these precautions are applicable anywhere that similar situations exist. Understanding these materials and the security they require is essential to preventing the disastrous outcomes should these isotopes fall into terrorists' hands. Published by Elsevier Inc.

  6. Airport full-body screening: what is the risk?

    PubMed

    Mehta, Pratik; Smith-Bindman, Rebecca

    2011-06-27

    In the past year, the Transportation Security Administration has deployed full-body scanners in airports across the United States in response to heightened security needs. Several groups have opposed the scans, citing privacy concerns and fear of the radiation emitted by the backscatter x-ray scanners, 1 of the 2 types of machines in use. The radiation doses emitted by the scans are extremely small; the scans deliver an amount of radiation equivalent to 3 to 9 minutes of the radiation received through normal daily living. Furthermore, since flying itself increases exposure to ionizing radiation, the scan will contribute less than 1% of the dose a flyer will receive from exposure to cosmic rays at elevated altitudes. The estimation of cancer risks associated with these scans is difficult, but using the only available models, the risk would be extremely small, even among frequent flyers. We conclude that there is no significant threat of radiation from the scans.

  7. 3D THz hyperspectrum applied in security check-in

    NASA Astrophysics Data System (ADS)

    Damian, V.; Logofǎtu, P. C.; Vasile, T.

    2016-12-01

    We developed a measuring technology using a TDS-THz system to construct hyperspectral images of some objects, including hazardous materials. "T-rays" (the THz spectral domain of the light) have a growing importance in security and imagistic domain. Due to their property of penetrating through dielectric objects, and using non-ionizing radiations, the THz systems have become a standard for "hot-places" (airports, train stations etc.). The hyperspectral images are 3D images having 2D spatial dimension and one spectral dimension. In this way, we obtain simultaneously information about the form of the object and its molecular composition. For discriminating between substances, we must first build a database of spectra for hazardous and dangerous substances. We experiment our system on some items (among them a firecracker, a cigarette and a metal collar) and we tried to discriminate between them using the database of spectra.

  8. Development of a digital method for neutron/gamma-ray discrimination based on matched filtering

    NASA Astrophysics Data System (ADS)

    Korolczuk, S.; Linczuk, M.; Romaniuk, R.; Zychor, I.

    2016-09-01

    Neutron/gamma-ray discrimination is crucial for measurements with detectors sensitive to both neutron and gamma-ray radiation. Different techniques to discriminate between neutrons and gamma-rays based on pulse shape analysis are widely used in many applications, e.g., homeland security, radiation dosimetry, environmental monitoring, fusion experiments, nuclear spectroscopy. A common requirement is to improve a radiation detection level with a high detection reliability. Modern electronic components, such as high speed analog to digital converters and powerful programmable digital circuits for signal processing, allow us to develop a fully digital measurement system. With this solution it is possible to optimize digital signal processing algorithms without changing any electronic components in an acquisition signal path. We report on results obtained with a digital acquisition system DNG@NCBJ designed at the National Centre for Nuclear Research. A 2'' × 2'' EJ309 liquid scintillator was used to register mixed neutron and gamma-ray radiation from PuBe sources. A dedicated algorithm for pulse shape discrimination, based on real-time filtering, was developed and implemented in hardware.

  9. Current trends in gamma radiation detection for radiological emergency response

    NASA Astrophysics Data System (ADS)

    Mukhopadhyay, Sanjoy; Guss, Paul; Maurer, Richard

    2011-09-01

    Passive and active detection of gamma rays from shielded radioactive materials, including special nuclear materials, is an important task for any radiological emergency response organization. This article reports on the current trends and status of gamma radiation detection objectives and measurement techniques as applied to nonproliferation and radiological emergencies. In recent years, since the establishment of the Domestic Nuclear Detection Office by the Department of Homeland Security, a tremendous amount of progress has been made in detection materials (scintillators, semiconductors), imaging techniques (Compton imaging, use of active masking and hybrid imaging), data acquisition systems with digital signal processing, field programmable gate arrays and embedded isotopic analysis software (viz. gamma detector response and analysis software [GADRAS]1), fast template matching, and data fusion (merging radiological data with geo-referenced maps, digital imagery to provide better situational awareness). In this stride to progress, a significant amount of inter-disciplinary research and development has taken place-techniques and spin-offs from medical science (such as x-ray radiography and tomography), materials engineering (systematic planned studies on scintillators to optimize several qualities of a good scintillator, nanoparticle applications, quantum dots, and photonic crystals, just to name a few). No trend analysis of radiation detection systems would be complete without mentioning the unprecedented strategic position taken by the National Nuclear Security Administration (NNSA) to deter, detect, and interdict illicit trafficking in nuclear and other radioactive materials across international borders and through the global maritime transportation-the so-called second line of defense.

  10. Security culture for nuclear facilities

    NASA Astrophysics Data System (ADS)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  11. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  12. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  13. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  14. Acute Radiation Sickness Amelioration Analysis

    DTIC Science & Technology

    1994-05-01

    Emetic Drugs 16. PRICE CODE Antagonists 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19, SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF...102 UNCLASSIFIED mcuIw IA IIIcaIIin or Isis PAW CLASSFIED BY: N/A since Unclassified. DECLASSIFY ON: N/A since Unclassified. SECURITY CLASSIFICATION OF...Approximately 2000 documents relevant to the development of the candidate anti-emetic drugs ondansetron (Zofran, Glaxo Pharmaceuticals) and granisetron

  15. Radiation Induced Vaccination to Breast Cancer

    DTIC Science & Technology

    2016-12-01

    in supporting a memory CD8 T cell response and decreased MDSCs but in reality the small patient numbers and the relatively short survival times...ABSTRACT Inhibiting TGFβ in the context of focal irradiation seems to create a favorable systemic immune landscape that drives T cell memory ...differentiation while limiting myeloid suppression. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES

  16. Correlation of single mode fiber fabrication factors and radiation response

    NASA Astrophysics Data System (ADS)

    Friebele, E. J.

    1992-02-01

    Fiber optic transmission systems, because of their extraordinary channel capacity and decreasing cost, are the preferred terrestrial transmission media of the nation's long distance, inter-city telecommunications infrastructure. Since the commercial telephone network forms the foundation for emergency communication in the event of a national crisis or emergency, additional requirements are placed on the fibers and components of this system. The network must remain operational in the face of such threats as loss of commercial power, disruption by natural causes, violation of physical security, and exposure to the effects of nuclear weapons, including electromagnetic pulse (EMP) and ionizing radiation from the delayed gamma component and fallout. The most stressing environment for the fiber consists of fallout subsequent to a nuclear attack since the long lengths of fiber can be potentially exposed to high total doses. The susceptibility of some types of commercially available fiber optic cable to optical darkening (and hence increased signal loss and bit error rate) from exposure to ionizing radiation raises serious questions about the survivability of such systems in the reconstitution phase of a nuclear conflict.

  17. Treatment of bifurcation in-stent restenotic lesions with beta radiation using strontium 90 and sequential positioning pullback technique: procedural details and clinical outcomes.

    PubMed

    Costa, Ricardo; Joyal, Michel; Harel, Francois; Fox, Tim; Crocker, Ian; Arsenault, Andre; Gregoire, Jean; Bonan, Raoul

    2003-08-01

    In-stent restenotic lesions have been problematic for many patients with the need for multiple repeat percutaneous coronary interventions (PCI). The need for repeat PCI has been significantly reduced in patients since the advent of vascular brachytherapy. In-stent restenosis resulting in bifurcation presents even more of a challenge. The use of radiation therapy for the treatment of this kind of lesion has not yet been reported. The purpose of this paper is to present five cases of radiation therapy in bifurcation in-stent restenotic lesions using the intraluminal beta radiation catheter delivery system (Beta-Cath System, Novoste Corporation, Norcross, Georgia). We reviewed the database of patients enrolled in our Compassionate Use Registry between August 1999 and April 2002. The data is reported for 5 patients who received radiation in both branches of bifurcation lesions with the Beta-Cath catheter system. The mean diameter of the vessels was 3.1 mm 0.5 mm. The dose administered was from 18.3 to 23 Gy, with an overlap of 3.3 to 10.3 mm; the hinge angle between the branches went from 43.3 to 65.4 . Angiographic follow-up was obtained at 6 months in 4 patients, with a single patient showing a focal (< 5 mm) edge lesion treated by balloon angioplasty (TVR no TLR). No aneurysms or zones of ectasia were noted. Beta radiation with the Beta-Cath catheter system appears to be safe, secure and clinically useful in in-stent restenotic bifurcation lesions.

  18. Networked gamma radiation detection system for tactical deployment

    NASA Astrophysics Data System (ADS)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Wolff, Ronald; Smith, Ethan; Guss, Paul; Mitchell, Stephen

    2015-08-01

    A networked gamma radiation detection system with directional sensitivity and energy spectral data acquisition capability is being developed by the National Security Technologies, LLC, Remote Sensing Laboratory to support the close and intense tactical engagement of law enforcement who carry out counterterrorism missions. In the proposed design, three clusters of 2″ × 4″ × 16″ sodium iodide crystals (4 each) with digiBASE-E (for list mode data collection) would be placed on the passenger side of a minivan. To enhance localization and facilitate rapid identification of isotopes, advanced smart real-time localization and radioisotope identification algorithms like WAVRAD (wavelet-assisted variance reduction for anomaly detection) and NSCRAD (nuisance-rejection spectral comparison ratio anomaly detection) will be incorporated. We will test a collection of algorithms and analysis that centers on the problem of radiation detection with a distributed sensor network. We will study the basic characteristics of a radiation sensor network and focus on the trade-offs between false positive alarm rates, true positive alarm rates, and time to detect multiple radiation sources in a large area. Empirical and simulation analyses of critical system parameters, such as number of sensors, sensor placement, and sensor response functions, will be examined. This networked system will provide an integrated radiation detection architecture and framework with (i) a large nationally recognized search database equivalent that would help generate a common operational picture in a major radiological crisis; (ii) a robust reach back connectivity for search data to be evaluated by home teams; and, finally, (iii) a possibility of integrating search data from multi-agency responders.

  19. Regulatory Guide on Conducting a Security Vulnerability Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ek, David R.

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  20. 10 CFR 37.29 - Relief from fingerprinting, identification, and criminal history records checks and other...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... under 27 CFR part 555; (4) Health and Human Services security risk assessments for possession and use of...; (6) State Radiation Control Program Directors and State Homeland Security Advisors or their designated State employee representatives; (7) Agreement State employees conducting security inspections on...

  1. WHO-REMPAN for global health security and strengthening preparedness and response to radiation emergencies.

    PubMed

    Carr, Zhanat

    2010-06-01

    In response to the changing global environment and emerging new issues related to health security, the World Health Organization (WHO) is putting in place new tools for collective defense, such as the revised International Health Regulations (IHR) (2005). The new framework puts additional responsibilities on both Member States and WHO itself in order to effectively implement the IHR (2005) and react effectively in case of public health emergency events of any nature. Since its establishment in 1987, the Radiation Emergency Medical Preparedness and Assistance Network of WHO (WHO-REMPAN) has become an important asset for the organization's capacity to respond to radiation emergencies and to assist its Member States to strengthen their own response capacities. The paper describes in detail the framework for the WHO's role in preparedness and response to radiation emergencies, including Emergency Conventions and IHR (2005), and how the WHO-REMPAN, through its activities (i.e., technical guidelines development, training, education, research, and information sharing), provides a significant contribution to the organization's program of work towards achievement of the global health security goal.

  2. Evaluation of scattered radiation emitted from X-ray security scanners on occupational dose to airport personnel

    NASA Astrophysics Data System (ADS)

    Dalah, Entesar; Fakhry, Angham; Mukhtar, Asma; Al Salti, Farah; Bader, May; Khouri, Sara; Al-Zahmi, Reem

    2017-06-01

    Based on security issues and regulations airports are provided with luggage cargo scanners. These scanners utilize ionizing radiation that in principle present health risks toward humans. The study aims to investigate the amount of backscatter produced by passenger luggage and cargo toward airport personnel who are located at different distances from the scanners. To approach our investigation a Thermo Electron Radeye-G probe was used to quantify the backscattered radiation measured in terms of dose-rate emitted from airport scanners, Measurements were taken at the entrance and exit positions of the X-ray tunnel at three different distances (0, 50, and 100 cm) for two different scanners; both scanners include shielding curtains that reduce scattered radiation. Correlation was demonstrated using the Pearson coefficient test. Measurements confirmed an inverse relationship between dose rate and distance. An estimated occupational accumulative dose of 0.88 mSv/y, and 2.04 mSv/y were obtained for personnel working in inspection of carry-on, and cargo, respectively. Findings confirm that the projected dose of security and engineering staff are being well within dose limits.

  3. Reprint of 'Evaluation of Scattered Radiation Emitted From X-ray Security Scanners on Occupational Dose to Airport Personnel'

    NASA Astrophysics Data System (ADS)

    Dalah, Entesar; Fakhry, Angham; Mukhtar, Asma; Al Salti, Farah; Bader, May; Khouri, Sara; Al-Zahmi, Reem

    2017-11-01

    Based on security issues and regulations airports are provided with luggage cargo scanners. These scanners utilize ionizing radiation that in principle present health risks toward humans. The study aims to investigate the amount of backscatter produced by passenger luggage and cargo toward airport personnel who are located at different distances from the scanners. To approach our investigation a Thermo Electron Radeye-G probe was used to quantify the backscattered radiation measured in terms of dose-rate emitted from airport scanners, Measurements were taken at the entrance and exit positions of the X-ray tunnel at three different distances (0, 50, and 100 cm) for two different scanners; both scanners include shielding curtains that reduce scattered radiation. Correlation was demonstrated using the Pearson coefficient test. Measurements confirmed an inverse relationship between dose rate and distance. An estimated occupational accumulative dose of 0.88 mSv/y, and 2.04 mSv/y were obtained for personnel working in inspection of carry-on, and cargo, respectively. Findings confirm that the projected dose of security and engineering staff are being well within dose limits.

  4. 75 FR 21979 - NRC Region II Address and Main Telephone Number Changes

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-27

    ..., Packaging and containers, Radiation protection, Reporting and recordkeeping requirements, Source material..., Radiation protection, Reporting and recordkeeping requirements, Scientific equipment, Security measures... PROTECTION AGAINST RADIATION 0 3. The authority citation for Part 20 continues to read as follows: Authority...

  5. Materials @ LANL: Solutions for National Security Challenges

    NASA Astrophysics Data System (ADS)

    Teter, David

    2012-10-01

    Materials science activities impact many programmatic missions at LANL including nuclear weapons, nuclear energy, renewable energy, global security and nonproliferation. An overview of the LANL materials science strategy and examples of materials science programs will be presented. Major materials leadership areas are in materials dynamics, actinides and correlated electron materials, materials in radiation extremes, energetic materials, integrated nanomaterials and complex functional materials. Los Alamos is also planning a large-scale, signature science facility called MaRIE (Matter Radiation Interactions in Extremes) to address in-situ characterization of materials in dynamic and radiation environments using multiple high energy probes. An overview of this facility will also be presented.

  6. [Level of microwave radiation from mobile phone base stations built in residential districts].

    PubMed

    Hu, Ji; Lu, Yiyang; Zhang, Huacheng; Xie, Hebing; Yang, Xinwen

    2009-11-01

    To investigate the condition of microwave radiation pollution from mobile phone base station built in populated area. Random selected 18 residential districts where had base station and 10 residential districts where had no base stations. A TES-92 electromagnetic radiation monitor were used to measure the intensity of microwave radiation in external and internal living environment. The intensities of microwave radiation in the exposure residential districts were more higher than those of the control residential districts (p < 0.05). There was a intensity peak at about 10 m from the station, it would gradually weaken with the increase of the distance. The level of microwave radiation in antenna main lobe region is not certainly more higher than the side lobe direction, and the side lobe direction also is not more lower. At the same district, where there were two base stations, the electromagnetic field nestification would take place in someplace. The intensities of microwave radiation outside the exposure windows in the resident room not only changed with distance but also with the height of the floor. The intensities of microwave radiation inside the aluminum alloys security net were more lower than those of outside the aluminum alloys security net (p < 0.05), but the inside or outside of glass-window appears almost no change (p > 0.05). Although all the measure dates on the ground around the base station could be below the primary standard in "environment electromagnetic wave hygienic standard" (GB9175-88), there were still a minorities of windows which exposed to the base station were higher, and the outside or inside of a few window was even higher beyond the primary safe level defined standard. The aluminum alloys security net can partly shield the microwave radiation from the mobile phone base station.

  7. Improving radiopharmaceutical supply chain safety by implementing bar code technology.

    PubMed

    Matanza, David; Hallouard, François; Rioufol, Catherine; Fessi, Hatem; Fraysse, Marc

    2014-11-01

    The aim of this study was to describe and evaluate an approach for improving radiopharmaceutical supply chain safety by implementing bar code technology. We first evaluated the current situation of our radiopharmaceutical supply chain and, by means of the ALARM protocol, analysed two dispensing errors that occurred in our department. Thereafter, we implemented a bar code system to secure selected key stages of the radiopharmaceutical supply chain. Finally, we evaluated the cost of this implementation, from overtime, to overheads, to additional radiation exposure to workers. An analysis of the events that occurred revealed a lack of identification of prepared or dispensed drugs. Moreover, the evaluation of the current radiopharmaceutical supply chain showed that the dispensation and injection steps needed to be further secured. The bar code system was used to reinforce product identification at three selected key stages: at usable stock entry; at preparation-dispensation; and during administration, allowing to check conformity between the labelling of the delivered product (identity and activity) and the prescription. The extra time needed for all these steps had no impact on the number and successful conduct of examinations. The investment cost was reduced (2600 euros for new material and 30 euros a year for additional supplies) because of pre-existing computing equipment. With regard to the radiation exposure to workers there was an insignificant overexposure for hands with this new organization because of the labelling and scanning processes of radiolabelled preparation vials. Implementation of bar code technology is now an essential part of a global securing approach towards optimum patient management.

  8. Experience of wireless local area network in a radiation oncology department.

    PubMed

    Mandal, Abhijit; Asthana, Anupam Kumar; Aggarwal, Lalit Mohan

    2010-01-01

    The aim of this work is to develop a wireless local area network (LAN) between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc) for efficient patient data management and to made easy the availability of information (chair side) to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops) and stationary workstations, all equipped with wireless-fidelity (Wi-Fi) access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ) has been used. The wireless networking was configured with the Service Set Identifier (SSID), Media Access Control (MAC) address filtering, and Wired Equivalent Privacy (WEP) network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.

  9. The use of stimulated electron emission (SEE) in homeland security applications

    NASA Astrophysics Data System (ADS)

    Ing, H.; Andrews, H. R.; Facina, M.; Lee, W. T.; Niu, H. W.

    2012-06-01

    Certain insulating solids can store a fraction of the absorbed energy when irradiated by ionizing radiation. The stored energy can be released subsequently by heating or optical stimulation. As a result, light may be emitted through Thermoluminescence (TL) or Optically-Stimulated Luminescence (OSL) and electrons may be emitted through Thermally-Stimulated Electron Emission (TSEE) or Optically-Stimulated Electron Emission (OSEE). TL and OSL are widely used in current radiation dosimetry systems. However, despite considerable research effort during the early 1970s, SEE was not commonly adopted for dosimetry applications. One of the main reasons is that SEE is a surface phenomenon, while luminescence is a bulk phenomenon, making SEE more susceptible to humidity, absorption of gases, minor physical defects and handling, both before and after irradiation. Nevertheless, it has been recognized that SEE may be useful for homeland security applications in nuclear forensics, where dose accuracy is not the primary performance metric. In this research, we are investigating the use of SEE for nuclear forensic applications. Many common materials, both natural and man-made, exhibit the phenomenon, providing an opportunity to use the environment itself as an in-situ radiation detector. We have designed and constructed a unique prototype reader for conducting SEE measurements. We have demonstrated that the SEE measurements from a variety of materials are quantitatively reproducible and correlated to radiation exposure. Due to the broad applicability of SEE, significant additional studies are warranted to optimize this novel technique for nuclear forensic and other applications.

  10. Infrared floodlight

    DOEpatents

    Levin, Robert E.; English, George J.

    1986-08-05

    An infrared floodlight assembly designed particularly for security purposes and including a heat-conducting housing, a lens secured to the housing to provide a closure therefor, and a floodlight located within (and surrounded by) the housing. The floodlight combines the use of a tungsten halogen light source and dichroic hot and cold mirrors for directing substantially only infrared radiation toward the assembly's forward lens. Visible radiation is absorbed by the housing's interior wall(s) and, optionally, by a filter located between the floodlight and lens. An optional means may be used within the floodlight to reflect all forward radiation back toward the paraboloidal hot mirror or, alternatively, to reflect only visible radiation in this direction. The dichroic hot and cold mirrors preferably each comprise a glass substrate having multiple layers of titanium dioxide and silicon dioxide thereon.

  11. System of radiographic control or an imaging system for personal radiographic inspection

    NASA Astrophysics Data System (ADS)

    Babichev, E. A.; Baru, S. E.; Neustroev, V. A.; Leonov, V. V.; Porosev, V. V.; Savinov, G. A.; Ukraintsev, Yu. G.

    2004-06-01

    The security system of personal radiographic inspection for detection of explosive materials and plastic weapons was developed in BINP recently. Basic system parameters are: maximum scanning height— 2000 mm, image width— 800 mm, number of detector channels—768, channel size— 1.05×1 mm, charge collecting time for one line—2, 5 ms, scanning speed— 40 cm/s, maximum scanning time— 5 s, radiation dose per one inspection <5 μSv. The detector is a multichannel ionization Xe chamber. The image of inspected person will appear on the display just after scanning. The pilot sample of this system was put into operation in March, 2003.b

  12. Operation Tomodachi Registry: Radiation Data Compendium

    DTIC Science & Technology

    2013-08-01

    affiliated individuals were potentially exposed to radiation as a result of the Fukushima Daiichi Nuclear Power Station radiological releases that followed...Radiation Dose, Department of Defense, Japan, Fukushima , Earthquake, Tsunami, Environmental Data, Radiation Data 16. SECURITY CLASSIFICATION OF: 17...materials from the Fukushima Daiichi Nuclear Power Station (FDNPS), the Department of Defense (DOD) responded by providing humanitarian assistance

  13. Dosimeter Design Program

    DTIC Science & Technology

    2015-01-05

    monitor the radiation environment in a geosynchronous satellite. 15. SUBJECT TERMS Radiation testing, Cobalt, Microcontroller 16. SECURITY...electronics including: an Aeroflex 8051 microcontroller , a Maxwell Electrically Erasable Programmable Read-Only Memory (EEPROM), Texas Instrument analog

  14. Understanding the Adoption Process of National Security Technology: An Integration of Diffusion of Innovations and Volitional Behavior Theories.

    PubMed

    Iles, Irina A; Egnoto, Michael J; Fisher Liu, Brooke; Ackerman, Gary; Roberts, Holly; Smith, Daniel

    2017-11-01

    After the 9/11 terrorist attacks, the U.S. government initiated several national security technology adoption programs. The American public, however, has been skeptical about these initiatives and adoption of national security technologies has been mandated, rather than voluntary. We propose and test a voluntary behavioral intention formation model for the adoption of one type of new security technology: portable radiation detectors. Portable radiation detectors are an efficient way of detecting radiological and nuclear threats and could potentially prevent loss of life and damage to individuals' health. However, their functioning requires that a critical mass of individuals use them on a daily basis. We combine the explanatory advantages of diffusion of innovation with the predictive power of two volitional behavior frameworks: the theory of reasoned action and the health belief model. A large sample survey (N = 1,482) investigated the influence of factors identified in previous diffusion of innovation research on portable radiation detector adoption intention. Results indicated that nonfinancial incentives, as opposed to financial incentives, should be emphasized in persuasive communications aimed at fostering adoption. The research provides a new integration of diffusion of innovation elements with determinants of volitional behavior from persuasion literature, and offers recommendations on effective communication about new security technologies to motivate public adoption and enhance national safety. © 2017 Society for Risk Analysis.

  15. KSC-2012-2653

    NASA Image and Video Library

    2012-05-02

    CAPE CANAVERAL, Fla. – In the clean room high bay at the Astrotech payload processing facility near NASA’s Kennedy Space Center in Florida, Applied Physics Laboratory technicians secure NASA's Radiation Belt Storm Probe A, wrapped in a protective shroud, on a test stand. Prelaunch preparations and spacecraft testing will follow. The Radiation Belt Storm Probes, or RBSP, mission will help us understand the sun’s influence on Earth and near-Earth space by studying the Earth’s radiation belts on various scales of space and time. RBSP instruments will provide the measurements needed to characterize and quantify the plasma processes that produce very energetic ions and relativistic electrons. The mission is part of NASA’s broader Living With a Star Program that was conceived to explore fundamental processes that operate throughout the solar system, particularly those that generate hazardous space weather effects in the vicinity of Earth and phenomena that could impact solar system exploration. RBSP will begin its mission of exploration of Earth's Van Allen radiation belts and the extremes of space weather after launch. Launch aboard a United Launch Alliance Atlas V rocket is scheduled for August 23. For more information, visit http://www.nasa.gov/rbsp. Photo credit: NASA/Jim Grossmann

  16. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... radiation symbol specified in § 20.1901(a), without the conventional color requirements, and the wording.... The label must contain the radiation symbol specified in § 20.1901(a) of this chapter and the wording...

  17. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... radiation symbol specified in § 20.1901(a), without the conventional color requirements, and the wording.... The label must contain the radiation symbol specified in § 20.1901(a) of this chapter and the wording...

  18. DOE 2011 Occupational Radiation Exposure report, _Prepared for the U.S. Department of Energy, Office of Health, Safety and Security. December 2012

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Derek Hagemeyer, Yolanda McCormick

    2012-12-12

    This report discusses radiation protection and dose reporting requirements, presents the 2011 occupational radiation dose data along with trends over the past 5 years, and provides instructions to submit successful as low as reasonably achievable (ALARA) projects.

  19. Creating a Driven, Collapsed Radiative Shock in the Laboratory

    NASA Astrophysics Data System (ADS)

    Reighard, Amy

    2006-10-01

    We report details of the first experimental campaign to create a driven, planar, radiatively collapsed in laboratory experiment. Radiation hydrodynamics experiments are challenging to realize in a laboratory setting, requiring high temperatures in a system of sufficient extent. The Omega laser at ˜10^15 W/cm^2 drives a thin slab of low-Z material at >100 km/s gas via laser ablation pressure. This slab initially shocks, then continues driving a shock through a cylindrical volume of Xe gas at 6 mg/cc. Simulations predict a collapsed layer in which the density reaches ˜45 times initial density. Side-on x-ray backlighting was the principal diagnostic. We have successfully imaged shocks with average velocities between 95-205 km/sec, with measured thicknesses of 45-150 μm in experiments lasting up to 20 ns and spanning up 2.5 mm in extent. Comparison of the shock position as a function of time from these experiments to 1D radiation hydrodynamic simulation results show some discrepancy, which will be explored. Optical depth before and behind the shock is important for meaningful comparison to these astrophysical systems. This shock is optically thin to emitted radiation in the unshocked region and optically thick to radiation in the shocked, dense region. We compare this system to collapsed shocks in astrophysical systems with similar optical depth profiles. An experiment using a Thomson scattering diagnostic across the shock front is also discussed. This research was sponsored by the National Nuclear Security Administration under the Stewardship Science Academic Alliances program through DOE Research Grants DE-FG52-03NA00064, DE-FG53-2005-NA26014, and other grants and contracts.

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Voytchev, M; Radev, R; Chiaro, P

    The International Electrotechnical Commission (IEC) is the leading and oldest global organization with over 100 years history of developing and publishing international standards for all electrical, electronic and related technologies, including radiation detection instrumentation. Subcommittee 45B 'Radiation Protection Instrumentation' of the IEC has recently started the development of two standards on radiation-generating devices. IEC 62463 'Radiation protection instrumentation--X-ray Systems for the Screening of Persons for Security and the Carrying of Illicit Items' is applicable to X-ray systems designed for screening people to detect if they are carrying objects such as weapons, explosives, chemical and biological agents and other concealed itemsmore » that could be used for criminal purposes, e.g. terrorist use, drug smuggling, etc. IEC 62523 'Radiation protection instrumentation--Cargo/Vehicle radiographic inspection systems' applies to cargo/vehicle imaging inspection systems using accelerator produced X-ray or gamma radiation to obtain images of the screened objects (e.g. cargo containers, transport and passenger vehicles and railroad cars). The objective of both standards is to specify standard requirements and general characteristics and test procedures, as well as, radiation, electrical, environmental, mechanical, and safety requirements and to provide examples of acceptable methods to test these requirements. In particular the standards address the design requirements as they relate to the radiation protection of the people being screened, people who are in the vicinity of the equipment and the operators. The standard IEC 62463 does not deal with the performance requirements for the quality of the object detection. Compliance with the standards requirements will provide the manufacturers with internationally acceptable specifications and the device users with assurance of the rigorous quality and accuracy of the measurements in relation to the radiological safety of the equipment. The main characteristics of IEC 62463 and IEC 62523 standards are presented and as well as the IEC methodology of standard development and approval.« less

  1. MISTY PICTURE EVENT, Test Execution Report

    DTIC Science & Technology

    1987-11-30

    testbed at overpressures ranging from 10 psi (83 kPa) to 3.4 psi (23 kPa). A series of experiments were positioned near the Thermal Radiation Sources...to include scheduling, construction, photography, and recording systems. (2) Formulate and direct the safety and security plans for the test series and...ANFO stacked charges multiburst test at Planet Ranch, AZ in 1978, e. MILL RACE (MISTY CASTLE Series I) - 600 ton ANFO surface stacked charge at WSMR in

  2. The peer review system (PRS) for quality assurance and treatment improvement in radiation therapy

    NASA Astrophysics Data System (ADS)

    Le, Anh H. T.; Kapoor, Rishabh; Palta, Jatinder R.

    2012-02-01

    Peer reviews are needed across all disciplines of medicine to address complex medical challenges in disease care, medical safety, insurance coverage handling, and public safety. Radiation therapy utilizes technologically advanced imaging for treatment planning, often with excellent efficacy. Since planning data requirements are substantial, patients are at risk for repeat diagnostic procedures or suboptimal therapeutic intervention due to a lack of knowledge regarding previous treatments. The Peer Review System (PRS) will make this critical radiation therapy information readily available on demand via Web technology. The PRS system has been developed with current Web technology, .NET framework, and in-house DICOM library. With the advantages of Web server-client architecture, including IIS web server, SOAP Web Services and Silverlight for the client side, the patient data can be visualized through web browser and distributed across multiple locations by the local area network and Internet. This PRS will significantly improve the quality, safety, and accessibility, of treatment plans in cancer therapy. Furthermore, the secure Web-based PRS with DICOM-RT compliance will provide flexible utilities for organization, sorting, and retrieval of imaging studies and treatment plans to optimize the patient treatment and ultimately improve patient safety and treatment quality.

  3. Global Military Operating Environments (GMOE) Phase I: Linking Natural Environments, International Security, and Military Operations

    DTIC Science & Technology

    2013-01-30

    example from the Negev Desert, Israel, Journal of Geophysical Research, (05 2009): 1. doi: 01/14/2013 5.00 Michael Young, Eric McDonald, Jianting Zhu... radiation (incoming – reflected) x Solar Radiation Eppley Incoming solar radiation x Surface temperature IR Apogee Continuous surface...and electrical properties (dielectric permittivity and electrical conductivity). Additional measurements of solar radiation (four components), air

  4. A source-attractor approach to network detection of radiation sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu, Qishi; Barry, M. L..; Grieme, M.

    Radiation source detection using a network of detectors is an active field of research for homeland security and defense applications. We propose Source-attractor Radiation Detection (SRD) method to aggregate measurements from a network of detectors for radiation source detection. SRD method models a potential radiation source as a magnet -like attractor that pulls in pre-computed virtual points from the detector locations. A detection decision is made if a sufficient level of attraction, quantified by the increase in the clustering of the shifted virtual points, is observed. Compared with traditional methods, SRD has the following advantages: i) it does not requiremore » an accurate estimate of the source location from limited and noise-corrupted sensor readings, unlike the localizationbased methods, and ii) its virtual point shifting and clustering calculation involve simple arithmetic operations based on the number of detectors, avoiding the high computational complexity of grid-based likelihood estimation methods. We evaluate its detection performance using canonical datasets from Domestic Nuclear Detection Office s (DNDO) Intelligence Radiation Sensors Systems (IRSS) tests. SRD achieves both lower false alarm rate and false negative rate compared to three existing algorithms for network source detection.« less

  5. Advances in Nuclear Monitoring Technologies

    NASA Astrophysics Data System (ADS)

    Park, Brent

    2006-03-01

    Homeland security requires low-cost, large-area detectors for locating and identifying weapons-usable nuclear materials and monitors for radiological isotopes that are more robust than current systems. Recent advances in electronics materials and nanotechnology, specifically organic semiconductors and inorganic quantum dots, offer potential improvements. We provide an overview of the physical processes involved in radiation detection using these new materials in the design of new device structures. Examples include recent efforts on quantum dots, as well as more traditional radiation-detecting materials such as CdZnTe and high-pressure xenon. Detector improvements demand not only new materials but also enhanced data-analysis tools that reduce false alarms and thus increase the quality of decisions. Additional computing power on hand-held platforms should enable the application of advanced algorithms to radiation-detection problems in the field, reducing the need to transmit data and thus delay analysis.

  6. Radiation and Shipping Port Security | RadTown USA | US ...

    EPA Pesticide Factsheets

    2017-08-07

    Cargo comes into the U.S. from all over the world. Ports can ensure safety by: Screening cargo for radiation before it gets here. Safely handling any radioactive material that needs to pass through a port.

  7. Multi-Detector Analysis System for Spent Nuclear Fuel Characterization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Reber, Edward Lawrence; Aryaeinejad, Rahmat; Cole, Jerald Donald

    1999-09-01

    The Spent Nuclear Fuel (SNF) Non-Destructive Analysis (NDA) program at INEEL is developing a system to characterize SNF for fissile mass, radiation source term, and fissile isotopic content. The system is based on the integration of the Fission Assay Tomography System (FATS) and the Gamma-Neutron Analysis Technique (GNAT) developed under programs supported by the DOE Office of Non-proliferation and National Security. Both FATS and GNAT were developed as separate systems to provide information on the location of special nuclear material in weapons configuration (FATS role), and to measure isotopic ratios of fissile material to determine if the material was frommore » a weapon (GNAT role). FATS is capable of not only determining the presence and location of fissile material but also the quantity of fissile material present to within 50%. GNAT determines the ratios of the fissile and fissionable material by coincidence methods that allow the two prompt (immediately) produced fission fragments to be identified. Therefore, from the combination of FATS and GNAT, MDAS is able to measure the fissile material, radiation source term, and fissile isotopics content.« less

  8. Containers and systems for the measurement of radioactive gases and related methods

    DOEpatents

    Mann, Nicholas R; Watrous, Matthew G; Oertel, Christopher P; McGrath, Christopher A

    2017-06-20

    Containers for a fluid sample containing a radionuclide for measurement of radiation from the radionuclide include an outer shell having one or more ports between an interior and an exterior of the outer shell, and an inner shell secured to the outer shell. The inner shell includes a detector receptacle sized for at least partial insertion into the outer shell. The inner shell and outer shell together at least partially define a fluid sample space. The outer shell and inner shell are configured for maintaining an operating pressure within the fluid sample space of at least about 1000 psi. Systems for measuring radioactivity in a fluid include such a container and a radiation detector received at least partially within the detector receptacle. Methods of measuring radioactivity in a fluid sample include maintaining a pressure of a fluid sample within a Marinelli-type container at least at about 1000 psi.

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cordaro, J.; Shull, D.; Farrar, M.

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows highmore » temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be used for classified data transmission in place of NSA Type 1 devices.« less

  10. The Total Field in Collective Bremsstrahlung in a Nonequilibrium Relativistic Beam-Plasma System.

    DTIC Science & Technology

    1983-09-01

    Of S"ANDARDS-1963-A L i o UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (1111bo Does Banero REPOR DOCUMENTATION PAGE READ INSTRUCTIONS r. REPORT...release; distribution unlimited. 17. DISTRIBUTION STATEMENT (of Me. absract mimed I Block it, different from Aepoft) 1S. SUPPLEMEMY1INANY NOTES kiDL...the nonradlative part of the field of the par- I ticls and a stochastic part corresponding to the bremsstrahlung radiation field. The relations

  11. Imaging and Forecasting of Ionospheric Structures and Their System Impacts

    DTIC Science & Technology

    2005-01-27

    Radiation Belt Remediation (RBR) studies were done and many of them remain active. The results of two HAARP heating experiments with the digisonde at...LORERS, Plasmasphere, HAARP , Cal/Val, Drift Software, ARTIST 4.5 16. SECURITY CLASSIFICATION OF: 17. UMITATION OF 1. NUMBER 19a. NAME OF RESPONSIBLE...STATION OBSERVATIONS 1 1.3 VLF INDUCED ELECTRON PITCH ANGLE SCATTERING (IEPAS) 2 1.4 HAARP CAMPAIGN 2 1.5 DRIFT SOFTWARE DEVELOPMENT 2 1.6 DISS SUPPORT

  12. Toward realizing high power semiconductor terahertz laser sources at room temperature

    NASA Astrophysics Data System (ADS)

    Razeghi, Manijeh

    2011-05-01

    The terahertz (THz) spectral range offers promising applications in science, industry, and military. THz penetration through nonconductors (fabrics, wood, plastic) enables a more efficient way of performing security checks (for example at airports), as illegal drugs and explosives could be detected. Being a non-ionizing radiation, THz radiation is environment-friendly enabling a safer analysis environment than conventional X-ray based techniques. However, the lack of a compact room temperature THz laser source greatly hinders mass deployment of THz systems in security check points and medical centers. In the past decade, tremendous development has been made in GaAs/AlGaAs based THz Quantum Cascade Laser (QCLs), with maximum operating temperatures close to 200 K (without magnetic field). However, higher temperature operation is severely limited by a small LO-phonon energy (~ 36 meV) in this material system. With a much larger LO-phonon energy of ~ 90 meV, III-Nitrides are promising candidates for room temperature THz lasers. However, realizing high quality material for GaN-based intersubband devices presents a significant challenge. Advances with this approach will be presented. Alternatively, recent demonstration of InP based mid-infrared QCLs with extremely high peak power of 120 W at room temperature opens up the possibility of producing high power THz emission with difference frequency generation through two mid-infrared wavelengths.

  13. Large-Area Plasma-Panel Radiation Detectors for Nuclear Medicine Imaging to Homeland Security and the Super Large Hadron Collider

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Friedman, Dr. Peter S.; Ball, Robert; Chapman, J. Wehrley

    2010-01-01

    A new radiation sensor derived from plasma panel display technology is introduced. It has the capability to detect ionizing and non-ionizing radiation over a wide energy range and the potential for use in many applications. The principle of operation is described and some early results presented.

  14. Multiscaling statistics of high frequency global solar radiation data in the Guadeloupean Archipelago

    NASA Astrophysics Data System (ADS)

    Calif, R.; Schmitt, F. G.; Huang, Y.; Soubdhan, T.

    2013-12-01

    The part of the solar power production from photovoltaiccs systems is constantly increasing in the electric grids. Solar energy converter devices such as photovoltaic cells are very sensitive to instantaneous solar radiation fluctuations. Thus rapid variation of solar radiation due to changes in the local meteorological condition can induce large amplitude fluctuations of the produced electrical power and reduce the overall efficiency of the system. When large amount of photovoltaic electricity is send into a weak or small electricity network such as island network, the electric grid security can be in jeopardy due to these power fluctuations. The integration of this energy into the electrical network remains a major challenge, due to the high variability of solar radiation in time and space. To palliate these difficulties, it is essential to identify the characteristic of these fluctuations in order to anticipate the eventuality of power shortage or power surge. A good knowledge of the intermittency of global solar radiation is crucial for selecting the location of a solar power plant and predicting the generation of electricity. This work presents a multifractal analysis study of 367 daily global solar radiation sequences measured with a sampling rate of 1 Hz over one year at Guadeloupean Archipelago (French West Indies) located at 16o15'N latitude and 60o30'W longitude. The mean power spectrum computed follows a power law behaviour close to the Kolmogorov spectrum. The intermittent and multifractal properties of global solar radiation data are investigated using several methods. Under this basis, a characterization for each day using three multifractal parameters is proposed.

  15. Giving radioiodine? Think about airport security alarms.

    PubMed

    Kaniuka-Jakubowska, S; Lewczuk, A; Mizan-Gross, K; Obołończyk, L; Lass, P; Sworczak, K

    2012-01-01

    An increased sensitivity of airport detectors, a growing number of isotopic tests, and globalization of the society have raised a number of false positive radioactive alarms at airports and public places. This paper presents two new cases of patients who triggered airport security alarms after receiving 740MBq of (131)I for non-toxic goitre and attempts to compare surprisingly limited literature concerning this problem. A 57-year-old man triggered a security alarm at three different airports on the 17th, 28th, and 31st day after radioiodine exposure. Interestingly enough, in the meantime, on the 18th and 22nd day, no radiation was detected in him at the airport where he was twice detained as a source of radiation later on. The second case presents a 45-year-old woman who activated security alarm detectors while crossing a border on her coach trip 28 days after radioiodine administration. Copyright © 2011 Elsevier España, S.L. and SEMNIM. All rights reserved.

  16. Serendipity, Punctuated

    NASA Astrophysics Data System (ADS)

    Asmus, John F.

    Laser divestment entered the field of art conservation through a nonlinear sequence of positive accidental events (serendipity) that involved the cinema industry, the invention of spread-spectrum and frequency-hopping communications, nuclear space propulsion, and oceanography. The unlikely chain of events began with the invention of a secure military communications system by a Viennese motion picture actress (1942). A first evaluation of the novel communications concept took place during a high-altitude nuclear test (TEAK) over the Pacific Ocean in 1958. The secure radio link proved to be a failure; however, analyses of the backscattered electromagnetic radiation contributed to the realization that nuclear-explosion plasmas need not be spherically symmetrical. Nobel Laureate Freeman Dyson exploited this nuclear option to guide in the design and prototype development of the ORION spaceship that was to rendezvous with the planet Saturn in 1970.

  17. Distributed Sensing for Quickest Change Detection of Point Radiation Sources

    DTIC Science & Technology

    2017-02-01

    point occurs simultaneously at all sensor nodes, thus neglecting signal propagation delays. For nuclear radiation , the observation period, which is on... nuclear radiation using a sensor network,” in Homeland Security (HST), 2012 IEEE Conference on Technologies for. IEEE, 2012, pp. 648–653. [8] G. Lorden...Distributed Sensing for Quickest Change Detection of Point Radiation Sources Gene T. Whipps⋆† Emre Ertin† Randolph L. Moses† †The Ohio State

  18. Resources planning for radiological incidents management

    NASA Astrophysics Data System (ADS)

    Hamid, Amy Hamijah binti Ab.; Rozan, Mohd Zaidi Abd; Ibrahim, Roliana; Deris, Safaai; Yunus, Muhd. Noor Muhd.

    2017-01-01

    Disastrous radiation and nuclear meltdown require an intricate scale of emergency health and social care capacity planning framework. In Malaysia, multiple agencies are responsible for implementing radiological and nuclear safety and security. This research project focused on the Radiological Trauma Triage (RTT) System. This system applies patient's classification based on their injury and level of radiation sickness. This classification prioritizes on the diagnostic and treatment of the casualties which include resources estimation of the medical delivery system supply and demand. Also, this system consists of the leading rescue agency organization and disaster coordinator, as well as the technical support and radiological medical response teams. This research implemented and developed the resources planning simulator for radiological incidents management. The objective of the simulator is to assist the authorities in planning their resources while managing the radiological incidents within the Internal Treatment Area (ITA), Reception Area Treatment (RAT) and Hospital Care Treatment (HCT) phases. The majority (75%) of the stakeholders and experts, who had been interviewed, witnessed and accepted that the simulator would be effective to resolve various types of disaster and resources management issues.

  19. Engineering Near-Field Transport of Energy using Nanostructured Materials

    DTIC Science & Technology

    2015-12-12

    increasingly important for a wide range of nanotechnology applications. Recent computational studies on near- field radiative heat transfer (NFRHT) suggest...SECURITY CLASSIFICATION OF: The transport of heat at the nanometer scale is becoming increasingly important for a wide range of nanotechnology...applications. Recent computational studies on near- field radiative heat transfer (NFRHT) suggest that radiative energy transport between suitably chosen

  20. The Perils of Space Weather

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Reeves, Geoff

    The Sun’s continuous bombardment of the Earth with high-energy electrons, protons, and other nuclei results in space weather that can wreak havoc on the nation’s satellites, aircraft, communications networks, navigation systems, and the electric power grid. Because of the potential for space weather to so critically impact national security, Los Alamos National Laboratory has been studying it for decades, designing and building space-based sensors to detect emissions from potential nuclear events here on Earth and to study natural and man-made radiation in space.

  1. Nonlinear Interactions between Laser Radiation and Spin-Aligned Carriers in Semiconductors.

    DTIC Science & Technology

    1980-11-25

    Massachusetts 02154 AIR FORCE OFFICEK OF SCIWMTIFIC RESWACHi (AISC) NOTICE OF TRJAZSMITTAL TO DDC This techniical raouti has been reviewed an I approved...f’or PuAli release JAN A.FR 190-12 (7b). Distribution is wilimited. &. D. BLOSA Technical Inorwatiom Oftlee UNCLASSIFIED SECURITY CLASSIFICATION OF...well. The material of choice D I 1473 UNCLASSIFIED.6- SECURITY CLASSIFICATION OF THIS PAGE (mien Deta Entered) UNCLASSIFIED SECURITY CLASSIFICATION OF

  2. A modern depleted uranium manufacturing facility

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zagula, T.A.

    1995-07-01

    The Specific Manufacturing Capabilities (SMC) Project located at the Idaho National Engineering Laboratory (INEL) and operated by Lockheed Martin Idaho Technologies Co. (LMIT) for the Department of Energy (DOE) manufactures depleted uranium for use in the U.S. Army MIA2 Abrams Heavy Tank Armor Program. Since 1986, SMC has fabricated more than 12 million pounds of depleted uranium (DU) products in a multitude of shapes and sizes with varying metallurgical properties while maintaining security, environmental, health and safety requirements. During initial facility design in the early 1980`s, emphasis on employee safety, radiation control and environmental consciousness was gaining momentum throughout themore » DOE complex. This fact coupled with security and production requirements forced design efforts to focus on incorporating automation, local containment and computerized material accountability at all work stations. The result was a fully automated production facility engineered to manufacture DU armor packages with virtually no human contact while maintaining security, traceability and quality requirements. This hands off approach to handling depleted uranium resulted in minimal radiation exposures and employee injuries. Construction of the manufacturing facility was complete in early 1986 with the first armor package certified in October 1986. Rolling facility construction was completed in 1987 with the first certified plate produced in the fall of 1988. Since 1988 the rolling and manufacturing facilities have delivered more than 2600 armor packages on schedule with 100% final product quality acceptance. During this period there was an annual average of only 2.2 lost time incidents and a single individual maximum radiation exposure of 150 mrem. SMC is an example of designing and operating a facility that meets regulatory requirements with respect to national security, radiation control and personnel safety while achieving production schedules and product quality.« less

  3. Radiation Protection Research Needs Workshop: Summary Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dewji, Shaheen A.; Davis, Jason; Hertel, Nolan E.

    In order to protect humans and the environment when using ionizing radiation for the advancement and benefit of society, accurately quantifying radiation and its potential effects remains the driver for ensuring the safety and secure use of nuclear and radiological applications of technology. In the realm of radiation protection and its various applications with the nuclear fuel cycle, (nuclear) medicine, emergency response, national defense, and space exploration, the scientific and research needs to support state and federal radiation protection needs in the United States in each of these areas are still deficient.

  4. The Role of Membrane-Derived Second Messengers and Bmx/Etk in Response to Radiation Treatment of Prostate Cancer

    DTIC Science & Technology

    2008-01-01

    enhanced HUVEC radiosensitization. Furthermore, pretreatment of HUVEC with a pharmacological inhibitor of Bmx, LFM-A13, produced significant...Prostate cancer, Bmx, tyrosine kinase, kinase inhibitors , angiogenesis, tumor vasculature, radiation 16. SECURITY CLASSIFICATION OF: 17...activation and that a small molecule inhibitor of Bmx modulates the cellular viability of endothelial and prostate cancer cells, particularly with radiation

  5. Genetic Modeling of Radiation Injury in Prostate Cancer Patients Treated with Radiotherapy

    DTIC Science & Technology

    2016-10-01

    nucleotide polymorphisms, prostate cancer, radiation therapy, adverse effects, urinary morbidity, rectal injury, sexual dysfunction 16. SECURITY...prostate cancer, radiation therapy, adverse effects, urinary morbidity, rectal injury, sexual dysfunction 3. ACCOMPLISHMENTS: What were the...Significant results: As shown in Table 1A, the mean age of patients across the eight studies ranged from 65 to 72 years with some moderate variation

  6. Applying Science and Technology to Combat WMD Terrorism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wuest, C R; Werne, R W; Colston, B W

    2006-05-04

    Lawrence Livermore National Laboratory (LLNL) is developing and fielding advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical, biological, radiological, nuclear, and explosive (CBRNE) weapons. The science, technology, and integrated systems we provide are informed by and developed with key partners and end users. LLNL's long-standing role as one of the two principle U.S. nuclear weapons design laboratories has led to significant resident expertise for health effects of exposure to radiation, radiation detection technologies, characterization of radioisotopes, and assessment and response capabilities for terrorist nuclear weapons use. This papermore » provides brief overviews of a number of technologies developed at LLNL that are being used to address national security needs to confront the growing threats of CBRNE terrorism.« less

  7. Applying science and technology to combat WMD terrorism

    NASA Astrophysics Data System (ADS)

    Wuest, Craig R.; Werne, Roger W.; Colston, Billy W.; Hartmann-Siantar, Christine L.

    2006-05-01

    Lawrence Livermore National Laboratory (LLNL) is developing and fielding advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical, biological, radiological, nuclear, and explosive (CBRNE) weapons. The science, technology, and integrated systems we provide are informed by and developed with key partners and end users. LLNL's long-standing role as one of the two principle U.S. nuclear weapons design laboratories has led to significant resident expertise for health effects of exposure to radiation, radiation detection technologies, characterization of radioisotopes, and assessment and response capabilities for terrorist nuclear weapons use. This paper provides brief overviews of a number of technologies developed at LLNL that are being used to address national security needs to confront the growing threats of CBRNE terrorism.

  8. Nevada National Security Site Radiation Protection Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statementsmore » that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.« less

  9. A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

    PubMed

    Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L

    2018-03-01

    While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.

  10. Security screening via computational imaging using frequency-diverse metasurface apertures

    NASA Astrophysics Data System (ADS)

    Smith, David R.; Reynolds, Matthew S.; Gollub, Jonah N.; Marks, Daniel L.; Imani, Mohammadreza F.; Yurduseven, Okan; Arnitz, Daniel; Pedross-Engel, Andreas; Sleasman, Timothy; Trofatter, Parker; Boyarsky, Michael; Rose, Alec; Odabasi, Hayrettin; Lipworth, Guy

    2017-05-01

    Computational imaging is a proven strategy for obtaining high-quality images with fast acquisition rates and simpler hardware. Metasurfaces provide exquisite control over electromagnetic fields, enabling the radiated field to be molded into unique patterns. The fusion of these two concepts can bring about revolutionary advances in the design of imaging systems for security screening. In the context of computational imaging, each field pattern serves as a single measurement of a scene; imaging a scene can then be interpreted as estimating the reflectivity distribution of a target from a set of measurements. As with any computational imaging system, the key challenge is to arrive at a minimal set of measurements from which a diffraction-limited image can be resolved. Here, we show that the information content of a frequency-diverse metasurface aperture can be maximized by design, and used to construct a complete millimeter-wave imaging system spanning a 2 m by 2 m area, consisting of 96 metasurfaces, capable of producing diffraction-limited images of human-scale targets. The metasurfacebased frequency-diverse system presented in this work represents an inexpensive, but tremendously flexible alternative to traditional hardware paradigms, offering the possibility of low-cost, real-time, and ubiquitous screening platforms.

  11. Second Line of Defense Spares Program Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.

    2012-11-20

    The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financialmore » and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.« less

  12. Stress, satisfaction and burnout amongst Australian and New Zealand radiation oncologists.

    PubMed

    Leung, John; Rioseco, Pilar; Munro, Philip

    2015-02-01

    The aim of this study was to determine the self-reported prevalence of stress, job satisfaction and burnout among radiation oncologists in Australia and New Zealand. A secondary aim was to determine the association between stress and satisfaction parameters with burnout. An anonymous online survey was distributed to all radiation oncologists listed on Royal Australian and New Zealand College of Radiologists membership database. There were 37 Likert scale questions on stress, 17 Likert scale questions on job satisfaction and burnout assessed by the Maslach Burnout Inventory - Human Services Survey (MBI-HSS). A principal component analysis was done for stress and satisfaction to identify specific areas. Independent samples t-tests and analysis of variances were done. There were 220 responses out of 348 eligible respondents (63.2% response rate).For stress, a principal component analysis identified five areas: delivery demands, demands on time, continuing professional development (CPD), value and security, and interpersonal/teaching demands. Specialist radiation oncologists were more stressed by value and security than generalists (P < 0.01). Lung cancer specialists had higher levels of stress associated with delivery demands, demands on time and CPD compared with others (P = 0.01). Those over 60 years were less stressed by delivery demands (P = 0.02), demands on time (P = 0.01) and CPD (P = 0.01) than their younger colleagues. Four satisfaction factors were identified in the principal component analysis: resources/remuneration, status/security, delivery of services and professional activities. [Correction added on 15 August 2014, after first online publication: stress/security was replaced with status/security.] Males and Australian radiation oncologists were more satisfied with professional activities (P = 0.02). Brachytherapy specialists were more satisfied with status/security (P = 0.01) while those interested in urology were more satisfied with resources/renumeration (P = 0.01) and professional activities (P = 0.01). The burnout results revealed at least 48.5% of respondents scoring highly in at least one of the three measures of burnout (emotional exhaustion, depersonalisation and personal accomplishment) while 37.5% scoring highly in the emotional exhaustion and depersonalisation subscales. Public sector radiation oncologists had higher levels of emotional exhaustion and lower levels of personal accomplishment than their private sector counterparts, while those interested in lung cancer had higher levels of emotional exhaustion. Multiple regression analysis revealed that the stress subscale demands on time had a significant effect on emotional exhaustion. Higher CPD stress and interpersonal/teaching demands increased the feeling of depersonalisation, while satisfaction with delivery of services was associated with lower levels of depersonalisation and higher levels of personal accomplishment. This first study of stress, satisfaction and burnout among radiation oncologists in Australia and New Zealand had a reasonable response rate and identified specific areas of stress and satisfaction. Nearly half of the respondents scored highly in one burnout subscale. Some of the stress and satisfaction subscales correlated with certain aspects of burnout. Further research will be undertaken to refine the stress and satisfaction parameters and address burnout interventions. © 2014 The Royal Australian and New Zealand College of Radiologists.

  13. Illicit drug detection with laser 1: investigation of optimal parameters in stomach tissue

    NASA Astrophysics Data System (ADS)

    Özer, Ayşen Gürkan; Tabakoğlu, Haşim Özgür; Cengiz, Salih

    2014-05-01

    The main purpose of this study is to establish radiation-safe scanning of passersby at high security areas, such as airports and customs. The stomach was selected as the organ to be analyzed. In order to determine whether a substance found inside a human body as wrapped in a plastic bag is filled narcotics or not, many substances in white powder form including morphine-HCL were inspected. Inspection was carried out with on-ionizing radiation by irradiating stomach tissue with laser light. Optical transmittance of lamb stomach tissue was analyzed at different wavelengths. We showed that detection by 650-nm diode laser irradiation would be suitable for such a radiation-safe scan. Different materials were also investigated for absorptive properties, and closed system Raman studies were performed. The spectrum of a molecule found inside white powder placed behind the lamb stomach tissue was detected as a fingerprint. This allowed the detection of target substances without any physical contact or damage to the biological tissue.

  14. Assessment of medical occupational radiation doses in Costa Rica.

    PubMed

    Mora, P; Acuña, M

    2011-09-01

    Participation of the University of Costa Rica (UCR) in activities in an IAEA Regional Project RLA/9/066 through training, equipment and expert missions, has enabled to setting up of a national personal monitoring laboratory. Since 2007, the UCR has been in charge of monitoring around 1800 medical radiation workers of the Social Security System. Individual external doses are measured with thermoluminescent dosemeter using a Harshaw 6600 Plus reader. The service has accreditation with ISO/IEC 17025:2005. Distribution of monitored medical personnel is as follows: 83 % in diagnostic radiology, 6 % in nuclear medicine and 6 % in radiotherapy. Preliminary values for the 75 percentile of annual H(p)(10) in mSv are: radiology 0.37; interventional radiology 0.41; radiotherapy 0.53 and nuclear medicine 1.55. The service provided by the UCR in a steady and reliable way can help to implement actions to limit the doses received by the medical workers and optimise their radiation protection programs.

  15. Effects of the Effect of Ultra High Frequency Mobile Phone Radiation on Human Health.

    PubMed

    Moradi, Mosa; Naghdi, Nasrollah; Hemmati, Hamidreza; Asadi-Samani, Majid; Bahmani, Mahmoud

    2016-05-01

    Public and occupational exposure to electromagnetic fields due to the growing trend of electronic devices may cause adverse effects on human health. This paper describes the risk of mutation and sexual trauma and infertility in masculine sexual cell by mobile phone radiations. In this study, we measured the emitted dose from a radiofrequency device, such as switching high voltage at different frequencies using a scintillation detector. The switching high voltage power supply (HVPS) was built for the Single Photon Emission Computed Tomography (SPECT) system. For radiation dosimetry, we used an ALNOR scintillator that can measure gamma radiation. The simulation was performed by MATLAB software, and data from the International Commission on Non-Ionizing Radiation Protection (ICNIRP) were used to verify the simulation. We investigated the risks that result from the waves, according to a report by International Commission on Non Ionizing Radiation Protection (ICNIRP), to every organ of the body is defined by the beam and electromagnetic radiation from this electronic device on people. The results showed that the maximum personal dose over a 15-min period working at the mentioned HVPS did not exceed 0.31 μSV/h (with an aluminum shield). So, according to other sources of radiation, continuous working time of the system should not be more than 10 hours. Finally, a characteristic curve for secure working with modules at different frequencies was reported. The RF input signal to the body for maximum penetration depth (δ) and electromagnetic energy absorption rate (SAR) of biological tissue were obtained for each tissue. The results of this study and International Commission of Non Ionization Radiation Protection (ICNIRP) reports showed the people who spend more than 50 minutes a day using a cell phone could have early dementia or other thermal damage due to the burning of glucose in the brain.

  16. Effect of Ultra High Frequency Mobile Phone Radiation on Human Health

    PubMed Central

    Moradi, Mosa; Naghdi, Nasrollah; Hemmati, Hamidreza; Asadi-Samani, Majid; Bahmani, Mahmoud

    2016-01-01

    Introduction Public and occupational exposure to electromagnetic fields due to the growing trend of electronic devices may cause adverse effects on human health. This paper describes the risk of mutation and sexual trauma and infertility in masculine sexual cell by mobile phone radiations. Methods In this study, we measured the emitted dose from a radiofrequency device, such as switching high voltage at different frequencies using a scintillation detector. The switching high voltage power supply (HVPS) was built for the Single Photon Emission Computed Tomography (SPECT) system. For radiation dosimetry, we used an ALNOR scintillator that can measure gamma radiation. The simulation was performed by MATLAB software, and data from the International Commission on Non-Ionizing Radiation Protection (ICNIRP) were used to verify the simulation. Results We investigated the risks that result from the waves, according to a report by International Commission on Non Ionizing Radiation Protection (ICNIRP), to every organ of the body is defined by the beam and electromagnetic radiation from this electronic device on people. The results showed that the maximum personal dose over a 15-min period working at the mentioned HVPS did not exceed 0.31 μSV/h (with an aluminum shield). So, according to other sources of radiation, continuous working time of the system should not be more than 10 hours. Finally, a characteristic curve for secure working with modules at different frequencies was reported. The RF input signal to the body for maximum penetration depth (δ) and electromagnetic energy absorption rate (SAR) of biological tissue were obtained for each tissue. Conclusion The results of this study and International Commission of Non Ionization Radiation Protection (ICNIRP) reports showed the people who spend more than 50 minutes a day using a cell phone could have early dementia or other thermal damage due to the burning of glucose in the brain. PMID:27382458

  17. Exploring Operational Safeguards, Safety, and Security by Design to Address Real Time Threats in Nuclear Facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schanfein, Mark J.; Mladineo, Stephen V.

    2015-07-07

    Over the last few years, significant attention has been paid to both encourage application and provide domestic and international guidance for designing in safeguards and security in new facilities.1,2,3 However, once a facility is operational, safeguards, security, and safety often operate as separate entities that support facility operations. This separation is potentially a serious weakness should insider or outsider threats become a reality.Situations may arise where safeguards detects a possible loss of material in a facility. Will they notify security so they can, for example, check perimeter doors for tampering? Not doing so might give the advantage to an insidermore » who has already, or is about to, move nuclear material outside the facility building. If outsiders break into a facility, the availability of any information to coordinate the facility’s response through segregated alarm stations or a failure to include all available radiation sensors, such as safety’s criticality monitors can give the advantage to the adversary who might know to disable camera systems, but would most likely be unaware of other highly relevant sensors in a nuclear facility.This paper will briefly explore operational safeguards, safety, and security by design (3S) at a high level for domestic and State facilities, identify possible weaknesses, and propose future administrative and technical methods, to strengthen the facility system’s response to threats.« less

  18. Target discrimination strategies in optics detection

    NASA Astrophysics Data System (ADS)

    Sjöqvist, Lars; Allard, Lars; Henriksson, Markus; Jonsson, Per; Pettersson, Magnus

    2013-10-01

    Detection and localisation of optical assemblies used for weapon guidance or sniper rifle scopes has attracted interest for security and military applications. Typically a laser system is used to interrogate a scene of interest and the retro-reflected radiation is detected. Different system approaches for area coverage can be realised ranging from flood illumination to step-and-stare or continuous scanning schemes. Independently of the chosen approach target discrimination is a crucial issue, particularly if a complex scene such as in an urban environment and autonomous operation is considered. In this work target discrimination strategies in optics detection are discussed. Typical parameters affecting the reflected laser radiation from the target are the wavelength, polarisation properties, temporal effects and the range resolution. Knowledge about the target characteristics is important to predict the target discrimination capability. Two different systems were used to investigate polarisation properties and range resolution information from targets including e.g. road signs, optical reflexes, rifle sights and optical references. The experimental results and implications on target discrimination will be discussed. If autonomous operation is required target discrimination becomes critical in order to reduce the number of false alarms.

  19. Right Care for the Right Patient Each and Every Time.

    PubMed

    Basavatia, Amar; Fret, Jose; Lukaj, Alex; Kuo, Hsiang; Yaparpalvi, Ravindra; Tome, Wolfgang A; Kalnicki, Shalom

    2016-02-12

    To implement a biometric patient identification system in the field of radiation oncology. A biometric system using palm vein scanning technology has been implemented to ensure the delivery of treatment to the correct patient each and every time. By interfacing a palm vein biometrics system (PVBS) (PatientSecure®, Imprivata, Lexington, Massachusetts) with the radiation oncology patient management system (ROPMS) (ARIA®, Varian Medical Systems, Palo Alto, California) one can integrate patient check-in at the front desk and identify and open the correct treatment record of the patient at the point of care prior to the initiation of the radiation therapy treatment. The learning time for the use of the software and palm scanner was extremely short. The staff at the front desk and treatment machines learned the procedures to use, clean, and care for the device in one hour's time. The first key to the success of the system is to have a policy and procedure in place; such a procedure was created and put in place in the department from the first day. The second key to the success is the actual hand placement on the scanner. Learning the proper placement and gently reminding patients from time to time was found to be efficient and to work well. The use of a biometric patient identification system employing palm vein technology allows one to ensure that the right care is delivered to the right patient each and every time. Documentation through the PVBS database now exists to show that this has taken place.

  20. ORNL Trusted Corridors Project: Watts Bar Dam Inland Waterway Project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Walker, Randy M; Gross, Ian G; Smith, Cyrus M

    2011-11-01

    Radiation has existed everywhere in the environment since the Earth's formation - in rocks, soil, water, and plants. The mining and processing of naturally occurring radioactive materials for use in medicine, power generation, consumer products, and industry inevitably generate emissions and waste. Radiological measuring devices have been used by industry for years to measure for radiation in undesired locations or simply identify radioactive materials. Since the terrorist attacks on the United States on 9-11-01 these radiation measuring devices have proliferated in many places in our nation's commerce system. DOE, TVA, the Army Corps and ORNL collaborated to test the usefulnessmore » of these devices in our nation's waterway system on this project. The purpose of the Watts Bar Dam ORNL Trusted Corridors project was to investigate the security, safety and enforcement needs of local, state and federal government entities for state-of-the-art sensor monitoring in regards to illegal cargo including utilization of the existing infrastructure. TVA's inland waterways lock system is a recognized and accepted infrastructure by the commercial carrier industry. Safety Monitoring activities included tow boat operators, commercial barges and vessels, recreational watercraft and their cargo, identification of unsafe vessels and carriers, and, monitoring of domestic and foreign commercial vessels and cargo identification. Safety Enforcement activities included cargo safety, tracking, identification of hazardous materials, waterway safety regulations, and hazardous materials regulations. Homeland Security and Law Enforcement Applications included Radiological Dispersive Devices (RDD) identification, identification of unsafe or illicit transport of hazardous materials including chemicals and radiological materials, and screening for shipments of illicit drugs. In the Fall of 2005 the SensorNet funding for the project expired. After several unsuccessful attempts to find a Federal sponsor to continue with the project, the Watts Bar Dam Project was canceled and the Exploranium radiation monitors were removed from the doors of Watts Bar Dam in early 2006. The DHS Domestic Nuclear Detection Office decided to proceed with a Pilot building on the ORNL work performed at the TN and SC weigh stations in the highway sector of the Trusted Corridors project and eventually expanded it to other southern states under the name of Southeastern Corridor Pilot Project (SETCP). Many of the Phase I goals were achieved however real-world test data of private watercraft and barges was never obtained.« less

  1. Response of the REWARD detection system to the presence of a Radiological Dispersal Device

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Luis, R.; Baptista, M.; Barros, S.

    2015-07-01

    In recent years an increased international concern has emerged about the radiological and nuclear (RN) threats associated with the illicit trafficking of nuclear and radioactive materials that could be potentially used for terrorist attacks. The objective of the REWARD (Real Time Wide Area Radiation Surveillance System) project, co-funded by the European Union 7. Framework Programme Security, consisted in building a mobile system for real time, wide area radiation surveillance, using a CdZnTe detector for gamma radiation and a neutron detector based on novel silicon technologies. The sensing unit includes a GPS system and a wireless communication interface to send themore » data remotely to a monitoring base station, where it will be analyzed in real time and correlated with historical data from the tag location, in order to generate an alarm when an abnormal situation is detected. Due to its portability and accuracy, the system will be extremely useful in many different scenarios such as nuclear terrorism, lost radioactive sources, radioactive contamination or nuclear accidents. This paper shortly introduces the REWARD detection system, depicts some terrorist threat scenarios involving radioactive sources and special nuclear materials and summarizes the simulation work undertaken during the past three years in the framework of the REWARD project. The main objective consisted in making predictions regarding the behavior of the REWARD system in the presence of a Radiological Dispersion Device (RDD), one of the reference scenarios foreseen for REWARD, using the Monte Carlo simulation program MCNP6. The reference scenario is characterized in detail, from the i) radiological protection, ii) radiation detection requirements and iii) communications points of view. Experimental tests were performed at the Fire Brigades Facilities in Rome and at the Naples Fire Brigades, and the results, which validate the simulation work, are presented and analyzed. The response of the REWARD detection system to the presence of an RDD is predicted and discussed. (authors)« less

  2. Radiation Detection Material Discovery Initiative at PNNL

    NASA Astrophysics Data System (ADS)

    Milbrath, Brian

    2006-05-01

    Today's security threats are being met with 30-year old radiation technology. Discovery of new radiation detection materials is currently a slow and Edisonian process. With heightened concerns over nuclear proliferation, terrorism and unconventional warfare, an alternative strategy for identification and development of potential radiation detection materials must be adopted. Through the Radiation Detection Materials Discovery Initiative, PNNL focuses on the science-based discovery of next generation materials for radiation detection by addressing three ``grand challenges'': fundamental understanding of radiation detection, identification of new materials, and accelerating the discovery process. The new initiative has eight projects addressing these challenges, which will be described, including early work, paths forward and the opportunities for collaboration.

  3. ICRP Publication 125: Radiological Protection in Security Screening.

    PubMed

    Cool, D A; Lazo, E; Tattersall, P; Simeonov, G; Niu, S

    2014-07-01

    The use of technologies to provide security screening for individuals and objects has been increasing rapidly, in keeping with the significant increase in security concerns worldwide. Within the spectrum of technologies, the use of ionizing radiation to provide backscatter and transmission screening capabilities has also increased. The Commission has previously made a number of statements related to the general topic of deliberate exposures of individuals in non-medical settings. This report provides advice on how the radiological protection principles recommended by the Commission should be applied within the context of security screening. More specifically, the principles of justification, optimisation of protection, and dose limitation for planned exposure situations are directly applicable to the use of ionising radiation in security screening. In addition, several specific topics are considered in this report, including the situation in which individuals may be exposed because they are concealed (‘stowaways’) in a cargo container or conveyance that may be subject to screening. The Commission continues to recommend that careful justification of screening should be considered before decisions are made to employ the technology. If a decision is made that its use is justified, the framework for protection as a planned exposure situation should be employed, including optimization of protection with the use of dose constraints and the appropriate provisions for authorisation and inspection.

  4. Verification of Minimum Detectable Activity for Radiological Threat Source Search

    NASA Astrophysics Data System (ADS)

    Gardiner, Hannah; Myjak, Mitchell; Baciak, James; Detwiler, Rebecca; Seifert, Carolyn

    2015-10-01

    The Department of Homeland Security's Domestic Nuclear Detection Office is working to develop advanced technologies that will improve the ability to detect, localize, and identify radiological and nuclear sources from airborne platforms. The Airborne Radiological Enhanced-sensor System (ARES) program is developing advanced data fusion algorithms for analyzing data from a helicopter-mounted radiation detector. This detector platform provides a rapid, wide-area assessment of radiological conditions at ground level. The NSCRAD (Nuisance-rejection Spectral Comparison Ratios for Anomaly Detection) algorithm was developed to distinguish low-count sources of interest from benign naturally occurring radiation and irrelevant nuisance sources. It uses a number of broad, overlapping regions of interest to statistically compare each newly measured spectrum with the current estimate for the background to identify anomalies. We recently developed a method to estimate the minimum detectable activity (MDA) of NSCRAD in real time. We present this method here and report on the MDA verification using both laboratory measurements and simulated injects on measured backgrounds at or near the detection limits. This work is supported by the US Department of Homeland Security, Domestic Nuclear Detection Office, under competitively awarded contract/IAA HSHQDC-12-X-00376. This support does not constitute an express or implied endorsement on the part of the Gov't.

  5. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability maymore » also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system« less

  6. Survival of Chinese Hamster Ovary Cells Following Ultrahigh Dose Rate Electron and Bremsstrahlung Radiation

    DTIC Science & Technology

    1990-04-01

    and a stepped lead flattening filter. The electron energy used for these studies was 13 MeV. Dosimetry was performed by the Health Physics Division...VolI LJSAFSAPA-TR-90-4 AD-A222 722 SURVIVAL OF CHINESE HAMSTER OVARY CELLS FOLLOWING ULTRAHIGH DOSE RATE ELECTRON AND BREMISSTRAHLUNG RADIATION...Include Security ;a!. iatcn) Survival of Chinese Hamster Ovary Cells Following Ultrahigh Dose Rate Electron and Bremsstrahlung Radiation 12 PERSONAL

  7. Historical Building Stability Monitoring by Means of a Cosmic Ray Tracking System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zenoni, Aldo; INFN Sezione di Pavia, Via Bassi 6, 27100 Pavia

    Cosmic ray radiation is mostly composed, at sea level, by high energy muons, which are highly penetrating particles capable of crossing kilometers of rock. The ubiquitous and steady presence at the Earth's surface and the high penetration capability have motivated the use of cosmic ray radiation also in fields beyond particle physics, from geology, archaeology, speleology to industrial applications and homeland security. In particular, in recent years, the novel technique of muon tomography has been proposed, with the aim of performing non invasive inspection of large non accessible volumes, material atomic number Z and density discrimination, and three dimension imagemore » reconstruction of the inspected volume. In the present paper, after a short recall of the physical principles and mathematical formalism on which muon tomography is based, a number of examples of application of the novel technique in industry and homeland security issues is given. Moreover, a new application of cosmic rays detection techniques in the field of civil engineering is proposed. The aim is the monitoring of the stability of large structures, in particular the static monitoring of historical buildings, where conservation constraints are more severe and the time evolution of the deformation phenomena under study may be of the order of months or years. The new technique may be seen, in some way, as the reverse problem of muon tomography. As a significant case study, the monitoring of the wooden vaulted roof of the Palazzo della Loggia in the town of Brescia, in Italy, has been considered. The feasibility as well as the performances and limitations of a monitoring system based on cosmic ray tracking have been studied by Monte Carlo simulation and discussed in comparison with more traditional monitoring systems. (authors)« less

  8. A novel mobile system for radiation detection and monitoring

    NASA Astrophysics Data System (ADS)

    Biafore, Mauro

    2014-05-01

    A novel mobile system for real time, wide area radiation surveillance has been developed within the REWARD project, financed within the FP7 programme, theme SEC-2011.1.5-1 (Development of detection capabilities of difficult to detect radioactive sources and nuclear materials - Capability Project). The REWARD sensing units are small, mobile portable units with low energy consumption, which consist of new miniaturized solid-state radiation sensors: a CdZnTe detector for gamma radiation and a high efficiency neutron detector based on novel silicon technologies. The sensing unit is integrated by a wireless communication interface to send the data remotely to a monitoring base station as well as a GPS system to calculate the position of the tag. The system also incorporates middleware and high-level software to provide web-service interfaces for the exchange of information. A central monitoring and decision support system has been designed to process the data from the sensing units and to compare them with historical record in order to generate an alarm when an abnormal situation is detected. A security framework ensures protection against unauthorized access to the network and data, ensuring the privacy of the communications and contributing to the overall robustness and reliability of the REWARD system. The REWARD system has been designed for many different scenarios such as nuclear terrorism threats, lost radioactive sources, radioactive contamination or nuclear accidents. It can be deployed in emergency units and in general in any type of mobile or static equipment, but also inside public/private buildings or infrastructures. The complete system is scalable in terms of complexity and cost and offers very high precision on both the measurement and the location of the radiation. The modularity and flexibility of the system allows for a realistic introduction to the market. Authorities may start with a basic, low cost system and increase the complexity based on their evolving needs and budget constraints. On 24th September 2013, REWARD project received a prize as the best Innovative project related to the Not Conventional Threat (NCT) Chemical Biological Radiological Nuclear explosives (CBRNe) products. A highly distinguished jury stated that "the developed detection and surveillance system offers a perfect solution for end-users to enhance crucial capabilities in RN analysis, risk communication and surveillance in case of a radiation incident". A demonstration of the REWARD system is planned in Naples on September 2014. More information about the REWARD project can be found at www.reward-project.eu.

  9. Chromosome neighborhood composition determines translocation outcomes after exposure to high-dose radiation in primary cells.

    PubMed

    Brianna Caddle, Lura; Grant, Jeremy L; Szatkiewicz, Jin; van Hase, Johann; Shirley, Bobbi-Jo; Bewersdorf, Joerg; Cremer, Christoph; Arneodo, Alain; Khalil, Andre; Mills, Kevin D

    2007-01-01

    Radiation exposure is an occupational hazard for military personnel, some health care professionals, airport security screeners, and medical patients, with some individuals at risk for acute, high-dose exposures. Therefore, the biological effects of radiation, especially the potential for chromosome damage, are major occupational and health concerns. However, the biophysical mechanisms of chromosome instability subsequent to radiation-induced DNA damage are poorly understood. It is clear that interphase chromosomes occupy discrete structural and functional subnuclear domains, termed chromosome territories (CT), which may be organized into 'neighborhoods' comprising groups of specific CTs. We directly evaluated the relationship between chromosome positioning, neighborhood composition, and translocation partner choice in primary lymphocytes, using a cell-based system in which we could induce multiple, concentrated DNA breaks via high-dose irradiation. We critically evaluated mis-rejoining profiles and tested whether breaks occurring nearby were more likely to fuse than breaks occurring at a distance. We show that CT neighborhoods comprise heterologous chromosomes, within which inter-CT distances directly relate to translocation partner choice. These findings demonstrate that interphase chromosome arrangement is a principal factor in genomic instability outcomes in primary lymphocytes, providing a structural context for understanding the biological effects of radiation exposure, and the molecular etiology of tumor-specific translocation patterns.

  10. The role of the health physicist in nuclear security.

    PubMed

    Waller, Edward J; van Maanen, Jim

    2015-04-01

    Health physics is a recognized safety function in the holistic context of the protection of workers, members of the public, and the environment against the hazardous effects of ionizing radiation, often generically designated as radiation protection. The role of the health physicist as protector dates back to the Manhattan Project. Nuclear security is the prevention and detection of, and response to, criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Its importance has become more visible and pronounced in the post 9/11 environment, and it has a shared purpose with health physics in the context of protection of workers, members of the public, and the environment. However, the duties and responsibilities of the health physicist in the nuclear security domain are neither clearly defined nor recognized, while a fundamental understanding of nuclear phenomena in general, nuclear or other radioactive material specifically, and the potential hazards related to them is required for threat assessment, protection, and risk management. Furthermore, given the unique skills and attributes of professional health physicists, it is argued that the role of the health physicist should encompass all aspects of nuclear security, ranging from input in the development to implementation and execution of an efficient and effective nuclear security regime. As such, health physicists should transcend their current typical role as consultants in nuclear security issues and become fully integrated and recognized experts in the nuclear security domain and decision making process. Issues regarding the security clearances of health physics personnel and the possibility of insider threats must be addressed in the same manner as for other trusted individuals; however, the net gain from recognizing and integrating health physics expertise in all levels of a nuclear security regime far outweighs any negative aspects. In fact, it can be argued that health physics is essential in achieving an integrated approach toward nuclear safety, security, and safeguards.

  11. The Role of the Health Physicist in Nuclear Security

    PubMed Central

    Waller, Edward J.; van Maanen, Jim

    2015-01-01

    Abstract Health physics is a recognized safety function in the holistic context of the protection of workers, members of the public, and the environment against the hazardous effects of ionizing radiation, often generically designated as radiation protection. The role of the health physicist as protector dates back to the Manhattan Project. Nuclear security is the prevention and detection of, and response to, criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Its importance has become more visible and pronounced in the post 9/11 environment, and it has a shared purpose with health physics in the context of protection of workers, members of the public, and the environment. However, the duties and responsibilities of the health physicist in the nuclear security domain are neither clearly defined nor recognized, while a fundamental understanding of nuclear phenomena in general, nuclear or other radioactive material specifically, and the potential hazards related to them is required for threat assessment, protection, and risk management. Furthermore, given the unique skills and attributes of professional health physicists, it is argued that the role of the health physicist should encompass all aspects of nuclear security, ranging from input in the development to implementation and execution of an efficient and effective nuclear security regime. As such, health physicists should transcend their current typical role as consultants in nuclear security issues and become fully integrated and recognized experts in the nuclear security domain and decision making process. Issues regarding the security clearances of health physics personnel and the possibility of insider threats must be addressed in the same manner as for other trusted individuals; however, the net gain from recognizing and integrating health physics expertise in all levels of a nuclear security regime far outweighs any negative aspects. In fact, it can be argued that health physics is essential in achieving an integrated approach toward nuclear safety, security, and safeguards. PMID:25706142

  12. 75 FR 37483 - Request for Comments on the Draft Policy Statement on the Protection of Cesium-137 Chloride...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-29

    ... instruments for end users. This network of facilities ensures that every radiation detection instrument that... associated test-and-evaluation protocols for radiation detection, instrumentation, and personal dosimetry... intrusion. The NRC supports efforts to develop alternate forms of Cs-137 that would reduce the security...

  13. A Radiation Homeland Security Workshop Presented to the City of Berkeley Fire Department

    NASA Astrophysics Data System (ADS)

    Matis, Howard

    2005-04-01

    A radiation incident in a community, ranging from a transportation accident to a dirty bomb, is expected to be rare, but still can occur. First responders to such an incident must be prepared. City of Berkeley officials met with members of the Lawrence Berkeley National Laboratory staff and agreed that the laboratory participants would create material and teach it to all of their fire fighting staff. To design such a course, nuclear physicists, biologists and health physicists merged some of their existing teaching material together with previous homeland security efforts to produce a course that lasted one full day. The material was designed to help alleviate the myths and fear of radiation experienced by many first responders. It included basic nuclear physics information, biological effects, and methods that health physicists use to detect and handle radiation. The curriculum included several hands on activities which involved working directly with the meters the Berkeley Fire Department possessed. In addition, I will discuss some observations from teaching this course material plus some unusual problems that we encountered, such as suddenly the whole class responding to a fire.

  14. Radiation protection measures: Implications on the design of neurosurgery operating rooms.

    PubMed

    Delgado-López, Pedro David; Sánchez-Jiménez, Javier; Herrero-Gutiérrez, Ana Isabel; Inclán-Cuesta, María Teresa; Corrales-García, Eva María; Martín-Alonso, Javier; Galacho-Harriero, Ana María; Rodríguez-Salazar, Antonio

    To describe pros and cons of some radiation protection measures and the implications on the design of a neurosurgery operating room. Concurring with the acquisition and use of an O-arm device, a structural remodeling of our neurosurgery operating room was carried out. The theater was enlarged, the shielding was reinforced and a foldable leaded screen was installed inside the operating room. Radiation doses were measured in front of and behind the screen. The screen provides whole-body radiation protection for all the personnel inside the theater (effective dose <5μSv at 2,5 m from the gantry per O-arm exploration; 0,0μSv received behind the screen per O-arm exploration; and undetectable cumulative annual radiation dose behind the screen), obviates the need for leaded aprons and personal dosimeters, and minimizes the circulation of personnel. Enlarging the size of the operating room allows storing the equipment inside and minimizes the risk of collision and contamination. Rectangular rooms provide greater distance from the source of radiation. Floor, ceiling and walls shielding, a rectangular-shaped and large enough theater, the presence of a foldable leaded screen, and the security systems precluding an unexpected irruption into the operating room during irradiation are relevant issues to consider when designing a neurosurgery operating theater. Copyright © 2018 Sociedad Española de Neurocirugía. Publicado por Elsevier España, S.L.U. All rights reserved.

  15. Design of robust microlinacs for wide replacement of radioisotope sources

    NASA Astrophysics Data System (ADS)

    Smirnov, A. V.; Agustsson, R. A.; Boucher, S.; Harrison, M.; Junge, K.; Savin, E.; Smirnov, A. Yu

    2017-12-01

    To improve public security and prevent the diversion of radioactive material for Radiation Dispersion Devices, development of an inexpensive, portable, easy-to-manufacture linac system is very important. The bremsstrahlung X-rays produced by relativistic electron beam on a high-Z converter can mimic X-rays radiated from various radioactive sources. Here we consider development of two designs: one matching a Ir-192 source used in radiography with ∼1-1.3 MeV electrons, and another one Cs137 source using 3.5-4 MeV electrons that can be considered for borehole logging. Both designs use standing wave, high group velocity, cm- wave, accelerating structure. The logging tool conceptual design is based on KlyLac concept combining a klystron and linac operating in self-oscillating mode and sharing the same vacuum envelop, and electron beam.

  16. Intensity-Modulated Advanced X-ray Source (IMAXS) for Homeland Security Applications

    NASA Astrophysics Data System (ADS)

    Langeveld, Willem G. J.; Johnson, William A.; Owen, Roger D.; Schonberg, Russell G.

    2009-03-01

    X-ray cargo inspection systems for the detection and verification of threats and contraband require high x-ray energy and high x-ray intensity to penetrate dense cargo. On the other hand, low intensity is desirable to minimize the radiation footprint. A collaboration between HESCO/PTSE Inc., Schonberg Research Corporation and Rapiscan Laboratories, Inc. has been formed in order to design and build an Intensity-Modulated Advanced X-ray Source (IMAXS). Such a source would allow cargo inspection systems to achieve up to two inches greater imaging penetration capability, while retaining the same average radiation footprint as present fixed-intensity sources. Alternatively, the same penetration capability can be obtained as with conventional sources with a reduction of the average radiation footprint by about a factor of three. The key idea is to change the intensity of the source for each x-ray pulse based on the signal strengths in the inspection system detector array during the previous pulse. In this paper we describe methods to accomplish pulse-to-pulse intensity modulation in both S-band (2998 MHz) and X-band (9303 MHz) linac sources, with diode or triode (gridded) electron guns. The feasibility of these methods has been demonstrated. Additionally, we describe a study of a shielding design that would allow a 6 MV X-band source to be used in mobile applications.

  17. System for critical infrastructure security based on multispectral observation-detection module

    NASA Astrophysics Data System (ADS)

    Trzaskawka, Piotr; Kastek, Mariusz; Życzkowski, Marek; Dulski, Rafał; Szustakowski, Mieczysław; Ciurapiński, Wiesław; Bareła, Jarosław

    2013-10-01

    Recent terrorist attacks and possibilities of such actions in future have forced to develop security systems for critical infrastructures that embrace sensors technologies and technical organization of systems. The used till now perimeter protection of stationary objects, based on construction of a ring with two-zone fencing, visual cameras with illumination are efficiently displaced by the systems of the multisensor technology that consists of: visible technology - day/night cameras registering optical contrast of a scene, thermal technology - cheap bolometric cameras recording thermal contrast of a scene and active ground radars - microwave and millimetre wavelengths that record and detect reflected radiation. Merging of these three different technologies into one system requires methodology for selection of technical conditions of installation and parameters of sensors. This procedure enables us to construct a system with correlated range, resolution, field of view and object identification. Important technical problem connected with the multispectral system is its software, which helps couple the radar with the cameras. This software can be used for automatic focusing of cameras, automatic guiding cameras to an object detected by the radar, tracking of the object and localization of the object on the digital map as well as target identification and alerting. Based on "plug and play" architecture, this system provides unmatched flexibility and simplistic integration of sensors and devices in TCP/IP networks. Using a graphical user interface it is possible to control sensors and monitor streaming video and other data over the network, visualize the results of data fusion process and obtain detailed information about detected intruders over a digital map. System provide high-level applications and operator workload reduction with features such as sensor to sensor cueing from detection devices, automatic e-mail notification and alarm triggering. The paper presents a structure and some elements of critical infrastructure protection solution which is based on a modular multisensor security system. System description is focused mainly on methodology of selection of sensors parameters. The results of the tests in real conditions are also presented.

  18. The Evolution of the Federal Monitoring and Assessment Center

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NSTec Aerial Measurement System

    2012-07-31

    The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal emergency response asset whose assistance may be requested by the Department of Homeland Security (DHS), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Nuclear Regulatory Commission (NRC), and state and local agencies to respond to a nuclear or radiological incident. It is an interagency organization with representation from the Department of Energy’s National Nuclear Security Administration (DOE/NNSA), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Department of Health and Human Services (HHS), the Federal Bureau of Investigation (FBI), and other federal agencies. FRMAC,more » in its present form, was created in 1987 when the radiological support mission was assigned to the DOE’s Nevada Operations Office by DOE Headquarters. The FRMAC asset, including its predecessor entities, was created, grew, and evolved to function as a response to radiological incidents. Radiological emergency response exercises showed the need for a coordinated approach to managing federal emergency monitoring and assessment activities. The mission of FRMAC is to coordinate and manage all federal radiological environmental monitoring and assessment activities during a nuclear or radiological incident within the United States in support of state,local, tribal governments, DHS, and the federal coordinating agency. Radiological emergency response professionals with the DOE’s national laboratories support the Radiological Assistance Program (RAP), National Atmospheric Release Advisory Center (NARAC), the Aerial MeasuringSystem (AMS), and the Radiation Emergency Assistance Center/Training Site (REAC/TS). These teams support the FRMAC to provide: Atmospheric transport modeling; Radiation monitoring; Radiological analysis and data assessments; and Medical advice for radiation injuries In support of field operations, the FRMAC provides geographic information systems, communications, mechanical, electrical, logistics, and administrative support. The size of the FRMAC is tailored to the incident and is comprised of emergency response professionals drawn from across the federal government. State and local emergency response teams may also integrate their operations with FRMAC, but are not required to.« less

  19. Recent developments in optical fibers and how defense, security, and sensing can benefit

    NASA Astrophysics Data System (ADS)

    Régnier, E.; Burov, E.; Pastouret, A.; Boivin, D.; Kuyt, G.; Gooijer, F.; Bergonzo, A.; Berkers, A.; Signoret, P.; Troussellier, L.; Storaasli, O.; Nouchi, P.

    2009-05-01

    For many years, fiber manufacturers have devoted research efforts to develop fibers with improved radiation resistance, keeping the same advantages and basic properties as standard fibers. Today, both single-mode (SMF) and multimode (MMF) RadHard (for Radiation-Hardened) fibers are available; some of them are MIL-49291 certified and are already used, for example in military applications and at the Large Hadron Collider (LHC) in CERN or in certain nuclear power plants. These RadHard fibers can be easily connected to standard optical networks for classical data transfer or they can also be used for command control. Using some specific properties (Raman or Brillouin scattering, Bragg gratings...), such fibers can also be used as distributed sensing (temperature or strain sensors, etc) in radiation environments. At least, optical fibers can also be used for signal amplification, either in telecom networks, or in fiber lasers. This last category of fibers is called active fibers, in opposition to passive fibers used for simple signal transmission. Draka has also recently worked to improve the radiation-resistance of these active fibers, so that Draka can now offer RadHard fibers for full optical systems.

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, J.; Lee, H.; De Lurgio, P.

    Automated monitoring and tracking of materials with radio frequency identification (RFID) technology can significantly improve both the operating efficiency of radiological facilities and the application of the ALARA (as low as reasonably achievable) principle in them. One such system, called ARG-US, has been developed by Argonne National Laboratory for the U.S. Department of Energy (DOE) Packaging and Certification Program to use in managing sensitive nuclear and radioactive materials. Several ARG-US systems are in various stages of deployment and advanced testing across DOE sites. ARG-US utilizes sensors in the tags to continuously monitor the state of health of the packaging andmore » promptly disseminates alarms to authorized users. In conjunction with global positioning system (GPS) tracking provided by TRANSCOM, the system can also monitor and track packages during transport. A compact dosimeter has been incorporated in the ARG-US tags via an onboard universal asynchronous receiver/transmitter interface. The detector has a wide measurement range for gamma radiation - from 0.1 mSv/h to 8 Sv/h. The detector is able to generate alarms for both high and low radiation and for a high cumulative dose. In a large installation, strategically located dosimeter-enabled tags can yield an accurate, real-time, 2D or 3D dose field map that can be used to enhance facility safety, security, and safeguards. This implementation can also lead to a reduced need for manned surveillance and reduced exposure of personnel to radiation, consistent with the ALARA principle at workplaces. (authors)« less

  1. X-Ray Irradiation Effects in Top Contact, Pentacene Based Field Effect Transistors for Space Related Applications

    DTIC Science & Technology

    2006-01-01

    Journal Article POSTPRINT 3. DATES COVERED (From - To) 2006 4. TITLE AND SUBTITLE X-ray irradiation effects in top contact, pentacene based field 5a...Preliminary studies of the effect of x-ray irradiation, typically used to simulate radiation effects in space, on top contract, pentacene based field effect...irradiation, radiation, radiation effects, pentacene 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF

  2. Accelerator mass spectrometry of strontium-90 for homeland security, environmental monitoring and human health

    NASA Astrophysics Data System (ADS)

    Tumey, Scott J.; Brown, Thomas A.; Hamilton, Terry E.; Hillegonds, Darren J.

    2008-05-01

    Strontium-90 is one of the most hazardous materials managed by agencies charged with protecting the public from radiation. Traditional radiometric methods have been limited by low sample throughput and slow turnaround times. Mass spectrometry offers the advantage of shorter analysis times and the ability to measure samples immediately after processing, however conventional mass spectrometric techniques are susceptible to molecular isobaric interferences that limit their overall sensitivity. In contrast, accelerator mass spectrometry is insensitive to molecular interferences and we have therefore begun developing a method for determination of 90Sr by accelerator mass spectrometry. Despite a pervasive interference from 90Zr, our initial development has yielded an instrumental background of ∼108 atoms (75 mBq) per sample. Further refinement of our system (e.g. redesign of our detector, use of alternative target materials) is expected to push the background below 106 atoms, close to the theoretical limit for AMS. Once we have refined our system and developed suitable sample preparation protocols, we will utilize our capability in applications to homeland security, environmental monitoring and human health.

  3. Radiological Dispersal Devices: Select Issues in Consequence Management

    DTIC Science & Technology

    2004-12-07

    STATEMENT Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...Surveying the Security Risks, Center for Nonproliferation Studies, Monterey Institute of International Studies, January 2003; Anthony H. Cordesman...the radiation-exposure-related damage itself. For example, the DOD uses granisetron , an anti-vomiting drug, to allow soldiers to complete mission

  4. Determination of the ionization potentials of security-relevant substances with single photon ionization mass spectrometry using synchrotron radiation.

    PubMed

    Schramm, E; Mühlberger, F; Mitschke, S; Reichardt, G; Schulte-Ladbeck, R; Pütz, M; Zimmermann, R

    2008-02-01

    Several ionization potentials (IPs) of security relevant substances were determined with single photon ionization time of flight mass spectrometry (SPI-TOFMS) using monochromatized synchrotron radiation from the "Berliner Elektronenspeicherring-Gesellschaft für Synchrotronstrahlung" (BESSY). In detail, the IPs of nine explosives and related compounds, seven narcotics and narcotics precursors, and one chemical warfare agent (CWA) precursor were determined, whereas six IPs already known from the literature were verified correctly. From seven other substances, including one CWA precursor, the IP could not be determined as the molecule ion peak could not be detected. For these substances the appearance energy (AE) of a main fragment was determined. The analyzed security-relevant substances showed IPs significantly below the IPs of common matrix compounds such as nitrogen and oxygen. Therefore, it is possible to find photon energies in between, whereby the molecules of interest can be detected with SPI in very low concentrations due to the shielding of the matrix. All determined IPs except the one of the explosive EGDN were below 10.5 eV. Hence, laser-generated 118 nm photons can be applied for detecting almost all security-relevant substances by, e.g., SPI-TOFMS.

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, K.; Tsai, H.; Liu, Y. Y.

    Radio frequency identification (RFID) is one of today's most rapidly growing technologies in the automatic data collection industry. Although commercial applications are already widespread, the use of this technology for managing nuclear materials is only in its infancy. Employing an RFID system has the potential to offer an immense payback: enhanced safety and security, reduced need for manned surveillance, real-time access to status and event history data, and overall cost-effectiveness. The Packaging Certification Program (PCP) in the U.S. Department of Energy's (DOE's) Office of Environmental Management (EM), Office of Packaging and Transportation (EM-63), is developing an RFID system for nuclearmore » materials management. The system consists of battery-powered RFID tags with onboard sensors and memories, a reader network, application software, a database server and web pages. The tags monitor and record critical parameters, including the status of seals, movement of objects, and environmental conditions of the nuclear material packages in real time. They also provide instant warnings or alarms when preset thresholds for the sensors are exceeded. The information collected by the readers is transmitted to a dedicated central database server that can be accessed by authorized users across the DOE complex via a secured network. The onboard memory of the tags allows the materials manifest and event history data to reside with the packages throughout their life cycles in storage, transportation, and disposal. Data security is currently based on Advanced Encryption Standard-256. The software provides easy-to-use graphical interfaces that allow access to all vital information once the security and privilege requirements are met. An innovative scheme has been developed for managing batteries in service for more than 10 years without needing to be changed. A miniature onboard dosimeter is being developed for applications that require radiation surveillance. A field demonstration of the RFID system was recently conducted to assess its performance. The preliminary results of the demonstration are reported in this paper.« less

  6. 10 CFR 72.54 - Expiration and termination of licenses and decommissioning of sites and separate buildings or...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... conduct of decommissioning operations and presents no undue risk from radiation to the public health and... final radiation survey; and (5) An updated detailed cost estimate for the chosen alternative for... accordance with the regulations in this chapter, and will not be inimical to the common defense and security...

  7. Medical countermeasures for unwanted CBRN exposures: part II radiological and nuclear threats with review of recent countermeasure patents

    PubMed Central

    Singh, Vijay K.; Romaine, Patricia L.P.; Newman, Victoria L.; Seed, Thomas M.

    2016-01-01

    ABSTRACT Introduction: The global threat of a chemical, biological, radiological, or nuclear (CBRN) disaster is an important priority for all government agencies involved in domestic security and public health preparedness. Radiological/nuclear (RN) attacks or accidents have become a larger focus of the United States Food and Drug administration (US FDA) over time because of their increased likeliness. Clinical signs and symptoms of a developing acute radiation syndrome (ARS) are grouped into three sub-syndromes named for the dominant organ system affected, namely the hematopoietic (H-ARS), gastrointestinal (GI-ARS), and neurovascular systems. The availability of safe and effective countermeasures against radiological/nuclear threats currently represents a significant unmet medical need. Areas covered: This article reviews the development of RN threat medical countermeasures and highlights those specific countermeasures that have been recently patented and approved following the FDA Animal Rule. Patents for such agents from 2015 have been presented. Expert opinion: Two granulocyte colony-stimulating factor (G-CSF)-based radiation countermeasures (Neupogen® (Amgen, Thousand Oaks, CA) and Neulasta® (Amgen, Thousand Oaks, CA)) have recently been approved by the FDA for treatment of H-ARS and both these agents are radiomitigators, used after radiation exposure. To date, there are no FDA-approved radioprotectors for ARS. PMID:27610458

  8. Simulations of the MATROSHKA experiment at the international space station using PHITS.

    PubMed

    Sihver, L; Sato, T; Puchalska, M; Reitz, G

    2010-08-01

    Concerns about the biological effects of space radiation are increasing rapidly due to the perspective of long-duration manned missions, both in relation to the International Space Station (ISS) and to manned interplanetary missions to Moon and Mars in the future. As a preparation for these long-duration space missions, it is important to ensure an excellent capability to evaluate the impact of space radiation on human health, in order to secure the safety of the astronauts/cosmonauts and minimize their risks. It is therefore necessary to measure the radiation load on the personnel both inside and outside the space vehicles and certify that organ- and tissue-equivalent doses can be simulated as accurate as possible. In this paper, simulations are presented using the three-dimensional Monte Carlo Particle and Heavy-Ion Transport code System (PHITS) (Iwase et al. in J Nucl Sci Tech 39(11):1142-1151, 2002) of long-term dose measurements performed with the European Space Agency-supported MATROSHKA (MTR) experiment (Reitz and Berger in Radiat Prot Dosim 120:442-445, 2006). MATROSHKA is an anthropomorphic phantom containing over 6,000 radiation detectors, mimicking a human head and torso. The MTR experiment, led by the German Aerospace Center (DLR), was launched in January 2004 and has measured the absorbed doses from space radiation both inside and outside the ISS. Comparisons of simulations with measurements outside the ISS are presented. The results indicate that PHITS is a suitable tool for estimation of doses received from cosmic radiation and for study of the shielding of spacecraft against cosmic radiation.

  9. Multitier specification for NSEP (National Security/Emergency Preparedness) enhancement of fiber-optic long-distance telecommunication networks. Volume 1. The multitier specification - an executive summary. Technical Information Bulletin

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peach, D.F.

    1987-12-01

    Fiber optic telecommunication systems are susceptible to both natural and man-made stress. National Security/Emergency Preparedness (NSEP) is a function of how durable these systems are in light of projected levels of stress. Emergency Preparedness in 1987 is not just a matter of--can they deliver food, water, energy and other essentials--but can they deliver the vital information necessary to maintain corporate function of our country. 'Communication stamina' is a function of 'probability of survival' when faced with stress. This report provides an overview of the enhancements to a fiber-optic communication system/installation that will increase durability. These enhancements are grouped, based onmore » their value in protecting the system, such that a Multitier Specification is created that presents multiple levels of hardness. Mitigation of effects due to high-altitude electromagnetic pulse (HEMP) and gamma radiation, and protection from vandalism and weather events are discussed in the report. The report is presented in two volumes. Volume I presents the Multitier Specification in a format that is usable for management review. The attributes of specified physical parameters, and the levels of protection stated in Volume I, are discussed in more detail in Volume II.« less

  10. Radiation Protection, Safety and Security Issues in Ghana.

    PubMed

    Boadu, Mary; Emi-Reynolds, Geoffrey; Amoako, Joseph Kwabena; Akrobortu, Emmanuel; Hasford, Francis

    2016-11-01

    Although the use of radioisotopes in Ghana began in 1952, the Radiation Protection Board of Ghana was established in 1993 and served as the national competent authority for authorization and inspection of practices and activities involving radiation sources until 2015. The law has been superseded by an Act of Parliament, Act 895 of 2015, mandating the Nuclear Regulatory Authority of Ghana to take charge of the regulation of radiation sources and their applications. The Radiation Protection Institute in Ghana provided technical support to the regulatory authority. Regulatory and service activities that were undertaken by the Institute include issuance of permits for handling of a radiation sources, authorization and inspection of radiation sources, radiation safety assessment, safety assessment of cellular signal towers, and calibration of radiation-emitting equipment. Practices and activities involving application of radiation are brought under regulatory control in the country through supervision by the national competent authority.

  11. Monitoring radiation use in cardiac fluoroscopy imaging procedures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stevens, Nathaniel T.; Steiner, Stefan H.; Smith, Ian R.

    2011-01-15

    Purpose: Timely identification of systematic changes in radiation delivery of an imaging system can lead to a reduction in risk for the patients involved. However, existing quality assurance programs involving the routine testing of equipment performance using phantoms are limited in their ability to effectively carry out this task. To address this issue, the authors propose the implementation of an ongoing monitoring process that utilizes procedural data to identify unexpected large or small radiation exposures for individual patients, as well as to detect persistent changes in the radiation output of imaging platforms. Methods: Data used in this study were obtainedmore » from records routinely collected during procedures performed in the cardiac catheterization imaging facility at St. Andrew's War Memorial Hospital, Brisbane, Australia, over the period January 2008-March 2010. A two stage monitoring process employing individual and exponentially weighted moving average (EWMA) control charts was developed and used to identify unexpectedly high or low radiation exposure levels for individual patients, as well as detect persistent changes in the radiation output delivered by the imaging systems. To increase sensitivity of the charts, we account for variation in dose area product (DAP) values due to other measured factors (patient weight, fluoroscopy time, and digital acquisition frame count) using multiple linear regression. Control charts are then constructed using the residual values from this linear regression. The proposed monitoring process was evaluated using simulation to model the performance of the process under known conditions. Results: Retrospective application of this technique to actual clinical data identified a number of cases in which the DAP result could be considered unexpected. Most of these, upon review, were attributed to data entry errors. The charts monitoring the overall system radiation output trends demonstrated changes in equipment performance associated with relocation of the equipment to a new department. When tested under simulated conditions, the EWMA chart was capable of detecting a sustained 15% increase in average radiation output within 60 cases (<1 month of operation), while a 33% increase would be signaled within 20 cases. Conclusions: This technique offers a valuable enhancement to existing quality assurance programs in radiology that rely upon the testing of equipment radiation output at discrete time frames to ensure performance security.« less

  12. SU-E-J-49: Design and Fabrication of Custom 3D Printed Phantoms for Radiation Therapy Research and Quality Assurance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jenkins, C; Xing, L

    2015-06-15

    Purpose The rapid proliferation of affordable 3D printing techniques has enabled the custom fabrication of items ranging from paper weights to medical implants. This study investigates the feasibility of utilizing the technology for developing novel phantoms for use in radiation therapy quality assurance (QA) procedures. Methods A phantom for measuring the geometric parameters of linear accelerator (LINAC) on-board imaging (OBI) systems was designed using SolidWorks. The design was transferred to a 3D printer and fabricated using a fused deposition modeling (FDM) technique. Fiducials were embedded in the phantom by placing 1.6 mm diameter steel balls in predefined holes and securingmore » them with silicone. Several MV and kV images of the phantom were collected and the visibility and geometric accuracy were evaluated. A second phantom, for use in the experimental evaluation of a high dose rate (HDR) brachytherapy dosimeter, was designed to secure several applicator needles in water. The applicator was fabricated in the same 3D printer and used for experiments. Results The general accuracy of printed parts was determined to be 0.1 mm. The cost of materials for the imaging and QA phantoms were $22 and $5 respectively. Both the plastic structure and fiducial markers of the imaging phantom were visible in MV and kV images. Fiducial marker locations were determined to be within 1mm of desired locations, with the discrepancy being attributed to the fiducial attachment process. The HDR phantom secured the applicators within 0.5 mm of the desired locations. Conclusion 3D printing offers an inexpensive method for fabricating custom phantoms for use in radiation therapy quality assurance. While the geometric accuracy of such parts is limited compared to more expensive methods, the phantoms are still highly functional and provide a unique opportunity for rapid fabrication of custom phantoms for use in radiation therapy QA and research.« less

  13. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...

  14. Protecting the Ozone Shield: A New Public Policy

    DTIC Science & Technology

    1991-04-01

    Public Policy Issue; Alterna- 11 tives; Risk Management; Clean Air Act; Global Warming 16. PRICE CODE 17. SECURITY CLASSIFICATION 𔄂. SECURITY...pattern of global warming , commonly known as "the greenhouse effect. 1 OVERVIEW OF THE OZONE DEPLETION PUBLIC POLICY ISSUE In 1974, two atmospheric...inhabitants from the harmful effects of increased UVb radiation and global warming . Another dilemma surrounds this public policy issue since the first

  15. Moving forward with safety culture.

    PubMed

    Weber, Michael

    2012-04-01

    Radiation safety and protection of people are shared goals of the Health Physics Society (HPS) and the U.S. Nuclear Regulatory Commission (NRC). A positive safety culture contributes to achieving radiation safety and protection of people, which are important to both the HPS and the NRC. Through unprecedented collaboration and engagement with diverse stakeholders, the NRC and the stakeholders developed a Safety Culture Policy Statement. The policy statement defines safety culture and describes the traits of a positive safety culture. Consideration of both safety and security issues and the interface of safety and security are underlying principles that support the policy. Examination of significant events, both within the nuclear industry and in society at large, illustrates how weaknesses in these traits can contribute to the occurrence and consequences of safety incidents, including serious injury and loss of life. With the policy statement in place, the NRC is moving forward with outreach and education about safety culture. Health physicists and other radiation safety specialists play an essential role in enhancing safety culture.

  16. Applications of nuclear techniques relevant for civil security

    NASA Astrophysics Data System (ADS)

    Valkovi, Vlado

    2006-05-01

    The list of materials which are subject to inspection with the aim of reducing the acts of terrorism includes explosives, narcotics, chemical weapons, hazardous chemicals and radioactive materials. To this we should add also illicit trafficking with human beings. The risk of nuclear terrorism carried out by sub-national groups is considered not only in construction and/or use of nuclear device, but also in possible radioactive contamination of large urban areas. Modern personnel, parcel, vehicle and cargo inspection systems are non-invasive imaging techniques based on the use of nuclear analytical techniques. The inspection systems use penetrating radiations: hard x-rays (300 keV or more) or gamma-rays from radioactive sources (137Cs and 60Co with energies from 600 to 1300 keV) that produce a high resolution radiograph of the load. Unfortunately, this information is ''non-specific'' in that it gives no information on the nature of objects that do not match the travel documents and are not recognized by a visual analysis of the radiographic picture. Moreover, there are regions of the container where x and gamma-ray systems are ''blind'' due to the high average atomic number of the objects irradiated that appear as black spots in the radiographic image. Contrary to that is the use of neutrons; as results of the bombardment, nuclear reactions occur and a variety of nuclear particles, gamma and x-ray radiation is emitted, specific for each element in the bombarded material. The problem of material (explosive, drugs, chemicals, etc.) identification can be reduced to the problem of measuring elemental concentrations. Neutron scanning technology offers capabilities far beyond those of conventional inspection systems. The unique automatic, material specific detection of terrorist threats can significantly increase the security at ports, border-crossing stations, airports, and even within the domestic transportation infrastructure of potential urban targets as well as protecting armed forces and infrastructure.

  17. An Aerial Radiological Survey of the City of North Las Vegas (Downtown) and the Motor Speedway

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Piotr Wasiolek

    2007-12-01

    As part of the proficiency training for the Radiological Mapping mission of the Aerial Measuring System (AMS), a survey team from the Remote Sensing Laboratory-Nellis (RSL-Nellis) conducted an aerial radiological survey on December 11-12, 2007, with the purpose of mapping natural radiation background and locating any man-made radioactive sources. The survey covered 19.4 square miles (9.2 square miles over the downtown area of the City of North Las Vegas and 10.2 square miles over the Las Vegas Motor Speedway [LVMS]). The flight lines over the surveyed areas are presented in Figures 1 and 2. A total of four 2.5-hour-long flightsmore » were performed at an altitude of 150 ft above ground level (AGL) with 300 ft of flight line spacing. Water line and test line flights were conducted over the Lake Mead and Government Wash areas to ensure quality control of the data. The data were collected by the AMS data acquisition system-REDAR V using an array of twelve 2-inch x 4-inch x 16-inch sodium iodide (NaI) detectors flown on-board a twin-engine Bell 412 helicopter. Data in the form of gamma energy spectra were collected continually (every second) over the course of the survey and were geo-referenced using a differential Global Positioning System. Collection of spectral data allows the system to distinguish between ordinary fluctuations in natural background radiation levels and the signature produced by man-made radioisotopes sources. Spectral data can also be used to identify specific radioactive isotopes. As a courtesy service with the approval of the U.S. Department of Energy, National Nuclear Security Administration, Nevada Site Office, RSL-Nellis is providing this summary to the office of the Mayor of City of North Las Vegas and LVMS security along with the gross counts-based exposure rate and man-made counts maps.« less

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Corre, G.; Boudergui, K.; Sannie, G.

    Homeland security requests the use Radiation Portal Monitor (RPM). They must be able to detect and differentiate gamma and neutron radiation. Gamma detection is required for illicit transportation of radioactive matter detection. Neutron detection is important to control nonproliferation of enriched material. Manufacturers worldwide propose sensors based on {sup 3}He which give the actual state of art in term of neutron detection. The imminent shortage of {sup 3}He forces manufacturers to find viable alternative. From 10 years sensors providers have the challenge to replace previous {sup 3}He detectors that are known to be the most commonly deployed neutron sensor. Asmore » {sup 3}He detectors can only detect neutron, they must be completed with gamma detector. The proposed approach is based on pulse time correlation between adjacent sensors from signal collected by EJ200 plastic scintillators. Results obtained during FP7 Scintilla project test campaigns show the system relevance for replacement of today's {sup 3}He detectors. (authors)« less

  19. Life sciences.

    PubMed

    Martin-Brennan, Cindy; Joshi, Jitendra

    2003-12-01

    Space life sciences research activities are reviewed for 2003. Many life sciences experiments were lost with the tragic loss of STS-107. Life sciences experiments continue to fly as small payloads to the International Space Station (ISS) via the Russian Progress vehicle. Health-related studies continue with the Martian Radiation Environment Experiment (MARIE) aboard the Odyssey spacecraft, collecting data on the radiation environment in Mars orbit. NASA Ames increased nanotechnology research in all areas, including fundamental biology, bioastronautics, life support systems, and homeland security. Plant research efforts continued at NASA Kennedy, testing candidate crops for ISS. Research included plant growth studies at different light intensities, varying carbon dioxide concentrations, and different growth media. Education and outreach efforts included development of a NASA/USDA program called Space Agriculture in the Classroom. Canada sponsored a project called Tomatosphere, with classrooms across North America exposing seeds to simulated Mars environment for growth studies. NASA's Office of Biological and Physical Research released an updated strategic research plan.

  20. SNM-DAT: Simulation of a heterogeneous network for nuclear border security

    NASA Astrophysics Data System (ADS)

    Nemzek, R.; Kenyon, G.; Koehler, A.; Lee, D. M.; Priedhorsky, W.; Raby, E. Y.

    2007-08-01

    We approach the problem of detecting Special Nuclear Material (SNM) smuggling across open borders by modeling a heterogeneous sensor network using an agent-based simulation. Our simulation SNM Data Analysis Tool (SNM-DAT) combines fixed seismic, metal, and radiation detectors with a mobile gamma spectrometer. Decision making within the simulation determines threat levels by combined signatures. The spectrometer is a limited-availability asset, and is only deployed for substantial threats. "Crossers" can be benign or carrying shielded SNM. Signatures and sensors are physics based, allowing us to model realistic sensor networks. The heterogeneous network provides great gains in detection efficiency compared to a radiation-only system. We can improve the simulation through better sensor and terrain models, additional signatures, and crossers that mimic actual trans-border traffic. We expect further gains in our ability to design sensor networks as we learn the emergent properties of heterogeneous detection, and potential adversary responses.

  1. International-Aerial Measuring System (I-AMS) Training Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wasiolek, Piotre T.; Malchor, Russell L.; Maurer, Richard J.

    2015-10-01

    Since the Fukushima reactor accident in 2011, there has been an increased interest worldwide in developing national capabilities to rapidly map and assess ground contamination resulting from nuclear reactor accidents. The capability to rapidly measure the size of the contaminated area, determine the activity level, and identify the radionuclides can aid emergency managers and decision makers in providing timely protective action recommendations to the public and first responders. The development of an aerial detection capability requires interagency coordination to assemble the radiation experts, detection system operators, and aviation aircrews to conduct the aerial measurements, analyze and interpret the data, andmore » provide technical assessments. The Office of International Emergency Management and Cooperation (IEMC) at the U.S. Department of Energy, National Nuclear Security Administration (DOE/NNSA) sponsors an International - Aerial Measuring System (I-AMS) training program for partner nations to develop and enhance their response to radiological emergencies. An initial series of courses can be conducted in the host country to assist in developing an aerial detection capability. As the capability develops and expands, additional experience can be gained through advanced courses with the opportunity to conduct aerial missions over a broad range of radiation environments.« less

  2. Photofission product yields of 238U and 239Pu with 22-MeV bremsstrahlung

    NASA Astrophysics Data System (ADS)

    Wen, Xianfei; Yang, Haori

    2016-06-01

    In homeland security and nuclear safeguards applications, non-destructive techniques to identify and quantify special nuclear materials are in great demand. Although nuclear materials naturally emit characteristic radiation (e.g. neutrons, γ-rays), their intensity and energy are normally low. Furthermore, such radiation could be intentionally shielded with ease or buried in high-level background. Active interrogation techniques based on photofission have been identified as effective assay approaches to address this issue. In designing such assay systems, nuclear data, like photofission product yields, plays a crucial role. Although fission yields for neutron-induced reactions have been well studied and readily available in various nuclear databases, data on photofission product yields is rather scarce. This poses a great challenge to the application of photofission techniques. In this work, short-lived high-energy delayed γ-rays from photofission of 238U were measured in between linac pulses. In addition, a list-mode system was developed to measure relatively long-lived delayed γ-rays from photofission of 238U and 239Pu after the irradiation. Time and energy information of each γ-ray event were simultaneously recorded by this system. Cumulative photofission product yields were then determined using the measured delayed γ-ray spectra.

  3. Meeting Regulatory Needs.

    PubMed

    Weber, Michael Fred

    2017-02-01

    The world is experiencing change at an unprecedented pace, as reflected in social, cultural, economic, political, and technological advances around the globe. Regulatory agencies, like the U.S. Nuclear Regulatory Commission (NRC), must also transform in response to and in preparation for these changes. In 2014, the NRC staff commenced Project Aim 2020 to transform the agency by enhancing efficiency, agility, and responsiveness, while accomplishing NRC's safety and security mission. Following Commission review and approval in 2015, the NRC began implementing the approved strategies, including strategic workforce planning to provide confidence that NRC will have employees with the right skills and talents at the right time to accomplish the agency's mission. Based on the work conducted so far, ensuring an adequate pipeline of radiation protection professionals is a significant need that NRC shares with states and other government agencies, private industry, academia, as well as international counterparts. NRC is working to ensure that sufficient radiation protection professionals will be available to fulfill its safety and security mission and leverage the work of the National Council on Radiation Protection and Measurements, the Conference of Radiation Control Program Directors, the Health Physics Society, the Organization of Agreement States, the International Atomic Energy Agency, the Nuclear Energy Agency, and others.

  4. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  5. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    Commission (IEC). “Information technology — Security techniques — Code of practice for information security management ( ISO /IEC 27002 ...Information technology — Security techniques — Information security management systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security...was a draft ISO standard on Systems and software engineering, Systems and software assurance [18]. Created by systems engineers for systems

  6. Knowledge management: Role of the the Radiation Safety Information Computational Center (RSICC)

    NASA Astrophysics Data System (ADS)

    Valentine, Timothy

    2017-09-01

    The Radiation Safety Information Computational Center (RSICC) at Oak Ridge National Laboratory (ORNL) is an information analysis center that collects, archives, evaluates, synthesizes and distributes information, data and codes that are used in various nuclear technology applications. RSICC retains more than 2,000 software packages that have been provided by code developers from various federal and international agencies. RSICC's customers (scientists, engineers, and students from around the world) obtain access to such computing codes (source and/or executable versions) and processed nuclear data files to promote on-going research, to ensure nuclear and radiological safety, and to advance nuclear technology. The role of such information analysis centers is critical for supporting and sustaining nuclear education and training programs both domestically and internationally, as the majority of RSICC's customers are students attending U.S. universities. Additionally, RSICC operates a secure CLOUD computing system to provide access to sensitive export-controlled modeling and simulation (M&S) tools that support both domestic and international activities. This presentation will provide a general review of RSICC's activities, services, and systems that support knowledge management and education and training in the nuclear field.

  7. Passive 350 GHz Video Imaging Systems for Security Applications

    NASA Astrophysics Data System (ADS)

    Heinz, E.; May, T.; Born, D.; Zieger, G.; Anders, S.; Zakosarenko, V.; Meyer, H.-G.; Schäffel, C.

    2015-10-01

    Passive submillimeter-wave imaging is a concept that has been in the focus of interest as a promising technology for personal security screening for a number of years. In contradiction to established portal-based millimeter-wave scanning techniques, it allows for scanning people from a distance in real time with high throughput and without a distinct inspection procedure. This opens up new possibilities for scanning, which directly address an urgent security need of modern societies: protecting crowds and critical infrastructure from the growing threat of individual terror attacks. Considering the low radiometric contrast of indoor scenes in the submillimeter range, this objective calls for an extremely high detector sensitivity that can only be achieved using cooled detectors. Our approach to this task is a series of passive standoff video cameras for the 350 GHz band that represent an evolving concept and a continuous development since 2007. Arrays of superconducting transition-edge sensors (TES), operated at temperatures below 1 K, are used as radiation detectors. By this means, background limited performance (BLIP) mode is achieved, providing the maximum possible signal to noise ratio. At video rates, this leads to a temperature resolution well below 1 K. The imaging system is completed by reflector optics based on free-form mirrors. For object distances of 5-25 m, a field of view up to 2 m height and a diffraction-limited spatial resolution in the order of 1-2 cm is provided. Opto-mechanical scanning systems are part of the optical setup and capable of frame rates of up to 25 frames per second.

  8. Final Report for the Testing of the Y-12 Criticality Accident Alarm System Detectors at the Godiva IV Burst Reactor (IER-443)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scorby, John C.; Hickman, David; Hudson, Becka

    This report documents the experimental conditions and final results for the performance testing of the Y-12 Criticality Accident Alarm System (CAAS) detectors at the Godiva IV Burst Reactor at the National Criticality Experimental Research Center (NCERC) at the Nevada National Security Site (NNSS). The testing followed a previously issued test plan and was conducted during the week of July 17, 2017, with completion on Thursday July 20. The test subjected CAAS detectors supplied by Y-12 to very intense and short duration mixed neutron and gamma radiation fields to establish compliance to maximum radiation and minimum pulse width requirements. ANSI/ANS- 8.3.1997more » states that the “system shall be sufficiently robust as to actuate an alarm signal when exposed to the maximum radiation expected”, which has been defined at Y-12, in Documented Safety Analyses (DSAs), to be a dose rate of 10 Rad/s. ANSI/ANS-8.3.1997 further states that “alarm actuation shall occur as a result of a minimum duration transient” which may be assumed to be 1 msec. The pulse widths and dose rates provided by each burst during the test exceeded those requirements. The CAAS detectors all provided an immediate alarm signal and remained operable after the bursts establishing compliance to the requirements and fitness for re-deployment at Y-12.« less

  9. REVIEW OF THE RADNET AIR MONITORING NETWORK ...

    EPA Pesticide Factsheets

    RadNet, formerly known as ERAMS, has been operating since the 1970's, monitoring environmental radiation across the country, supporting responses to radiological emergencies, and providing important information on background levels of radiation in the environment. The original purpose of the system was to monitor fallout from weapons testing. Even though upgrades to and reconfiguration of the system have been planned for some time, the events of 9/11/01 gave impetus to a thorough upgrade of RadNet, primarily directed at providing more timely data and covering a larger portion of the nation's population. Moreover, the demands upon RadNet are now based upon homeland security support in addition to existing EPA monitoring responsibilities. Beginning in FY05 and continuing into FY13 up to135 near real-time air monitors will be put into operation across the country to provide decision making-data to EPA officials. Data will be transmitted from the monitors in all 50 states to a central database at the National Air and Radiation Environmental Laboratory (NAREL) in Montgomery, Alabama. The data will then be assessed and verified and made available to federal and state officials and, eventually, the public. A data flow model is being constructed to provide the most effective and efficient use of verified data obtained from the new radNet system The objective of the near-real time air monitoring component of RadNet is to provide verified decision-making data to fed

  10. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... in which auctioned Treasury securities may be issued? There are three book-entry securities systems... marketable Treasury securities. We maintain and transfer securities in these three book-entry systems at... inflation. Securities may be transferred from one system to the other, unless the securities are not...

  11. Analysis of Leading Edge and Trailing Edge Cover Glass Samples Before and After Treatment with Advanced Satellite Contamination Removal Techniques

    DTIC Science & Technology

    1993-04-01

    surface analysis, 40 contamination control, ANCC ( Aerogel Mesh Contamination Collector) iPRICECODE 17. SECURITY CLASSIFICATION 1 & SECURITY CLASSIFICATION...operational parameter space (temperature, vibration, radiation, vacuum and micrometorite environments). One embodiment of this device, the Aerogel Mesh...Lippey and Dan Demeo of Hughes Aircraft Corporation for their kind hospitality and research collaboration on the contamination removal phase of this work

  12. Correlation Research of Medical Security Management System Network Platform in Medical Practice

    NASA Astrophysics Data System (ADS)

    Jie, Wang; Fan, Zhang; Jian, Hao; Li-nong, Yu; Jun, Fei; Ping, Hao; Ya-wei, Shen; Yue-jin, Chang

    Objective-The related research of medical security management system network in medical practice. Methods-Establishing network platform of medical safety management system, medical security network host station, medical security management system(C/S), medical security management system of departments and sections, comprehensive query, medical security disposal and examination system. Results-In medical safety management, medical security management system can reflect the hospital medical security problem, and can achieve real-time detection and improve the medical security incident detection rate. Conclusion-The application of the research in the hospital management implementation, can find hospital medical security hidden danger and the problems of medical disputes, and can help in resolving medical disputes in time and achieve good work efficiency, which is worth applying in the hospital practice.

  13. Facility Will Help Transition Models Into Operations

    NASA Astrophysics Data System (ADS)

    Kumar, Mohi

    2009-02-01

    The U.S. National Oceanic and Atmospheric Administration's Space Weather Prediction Center (NOAA SWPC), in partnership with the U.S. Air Force Weather Agency (AFWA), is establishing a center to promote and facilitate the transition of space weather models to operations. The new facility, called the Developmental Testbed Center (DTC), will take models used by researchers and rigorously test them to see if they can withstand continued use as viable warning systems. If a model used in a space weather warning system crashes or fails to perform well, severe consequences can result. These include increased radiation risks to astronauts and people traveling on high-altitude flights, national security vulnerabilities from the loss of military satellite communications, and the cost of replacing damaged military and commercial spacecraft.

  14. A novel approach to characterize information radiation in complex networks

    NASA Astrophysics Data System (ADS)

    Wang, Xiaoyang; Wang, Ying; Zhu, Lin; Li, Chao

    2016-06-01

    The traditional research of information dissemination is mostly based on the virus spreading model that the information is being spread by probability, which does not match very well to the reality, because the information that we receive is always more or less than what was sent. In order to quantitatively describe variations in the amount of information during the spreading process, this article proposes a safety information radiation model on the basis of communication theory, combining with relevant theories of complex networks. This model comprehensively considers the various influence factors when safety information radiates in the network, and introduces some concepts from the communication theory perspective, such as the radiation gain function, receiving gain function, information retaining capacity and information second reception capacity, to describe the safety information radiation process between nodes and dynamically investigate the states of network nodes. On a micro level, this article analyzes the influence of various initial conditions and parameters on safety information radiation through the new model simulation. The simulation reveals that this novel approach can reflect the variation of safety information quantity of each node in the complex network, and the scale-free network has better ;radiation explosive power;, while the small-world network has better ;radiation staying power;. The results also show that it is efficient to improve the overall performance of network security by selecting nodes with high degrees as the information source, refining and simplifying the information, increasing the information second reception capacity and decreasing the noises. In a word, this article lays the foundation for further research on the interactions of information and energy between internal components within complex systems.

  15. 76 FR 58786 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-22

    ... National Security Agency/Central Security System systems of records notices subject to the Privacy Act of... inquiries to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; Systems of Records AGENCY: National Security Agency/Central Security Service, Department of Defense (DoD...

  16. 31 CFR 306.23 - Securities eligible to be held in the Legacy Treasury Direct® Book-entry Securities System.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Legacy Treasury Direct® Book-entry Securities System. 306.23 Section 306.23 Money and Finance: Treasury... Securities eligible to be held in the Legacy Treasury Direct® Book-entry Securities System. (a) Eligible... book-entry securities system. (b) Conversion of Registered Security to book-entry form to be held in...

  17. Magnetic Imaging: a New Tool for UK National Nuclear Security

    NASA Astrophysics Data System (ADS)

    Darrer, Brendan J.; Watson, Joe C.; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications.

  18. Magnetic Imaging: a New Tool for UK National Nuclear Security

    PubMed Central

    Darrer, Brendan J.; Watson, Joe C.; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications. PMID:25608957

  19. Magnetic imaging: a new tool for UK national nuclear security.

    PubMed

    Darrer, Brendan J; Watson, Joe C; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-22

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications.

  20. Room Temperature Hard Radiation Detectors Based on Solid State Compound Semiconductors: An Overview

    NASA Astrophysics Data System (ADS)

    Mirzaei, Ali; Huh, Jeung-Soo; Kim, Sang Sub; Kim, Hyoun Woo

    2018-05-01

    Si and Ge single crystals are the most common semiconductor radiation detectors. However, they need to work at cryogenic temperatures to decrease their noise levels. In contrast, compound semiconductors can be operated at room temperature due to their ability to grow compound materials with tunable densities, band gaps and atomic numbers. Highly efficient room temperature hard radiation detectors can be utilized in biomedical diagnostics, nuclear safety and homeland security applications. In this review, we discuss room temperature compound semiconductors. Since the field of radiation detection is broad and a discussion of all compound materials for radiation sensing is impossible, we discuss the most important materials for the detection of hard radiation with a focus on binary heavy metal semiconductors and ternary and quaternary chalcogenide compounds.

  1. History and Organizations for Radiological Protection.

    PubMed

    Kang, Keon Wook

    2016-02-01

    International Commission on Radiological Protection (ICRP), an independent international organization established in 1925, develops, maintains, and elaborates radiological protection standards, legislation, and guidelines. United Nations Scientific Committee on the Effects of Atomic Radiation (UNSCEAR) provides scientific evidence. World Health Organization (WHO) and International Atomic Energy Agency (IAEA) utilise the ICRP recommendations to implement radiation protection in practice. Finally, radiation protection agencies in each country adopt the policies, and adapt them to each situation. In Korea, Nuclear Safety and Security Commission is the governmental body for nuclear safety regulation and Korea Institute of Nuclear Safety is a public organization for technical support and R&D in nuclear safety and radiation protection.

  2. Realization of Configurable One-Dimensional Reflectarray

    DTIC Science & Technology

    2017-08-31

    Maximum 200 words) A fundamental challenge remains in dynamically controlling the steering of long wavelength radiation (λ > 8 μm) using metal... dynamic , nanoribbons 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT: SAR 18. NUMBER OF PAGES 20 19a. NAME OF RESPONSIBLE PERSON...challenge remains in dynamically controlling the steering of long wavelength radiation (λ > 8 μm) using metal nanostructures or metamaterials (with critical

  3. Maritime NORAD: Setting a Course for Success in Joint, Interagency, and Bi-National Maritime Homeland Security and Defense

    DTIC Science & Technology

    2007-04-05

    gauges to blueberries can have a radiation profile that is higher than normal background and, thus, alert the radiation pagers carried by boarding...illustrate how the defense away game can come directly to the homeland with little or no warning. R ou ti ne P at ro ls , I ns pe ct io ns & E

  4. Source Physics Experiment: Research in Support of Verification and Nonproliferation

    DTIC Science & Technology

    2011-09-01

    designed to provide a carefully controlled seismic and strong motion data set from buried explosions at the Nevada National Security Site (NNSS). The...deposition partitioned into internal (heat and plastic strain) and kinetic (e.g., radiated seismic ) energy, giving more confidence in predicted free...ample information to study dry and water-saturated fractures, local lithology and topography on the radiated seismic wavefield. Spallation on

  5. 31 CFR 357.0 - Book-entry systems.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... General Information § 357.0 Book-entry systems. (a) Treasury securities. Treasury securities are...-entry system is the book-entry system in which Treasury securities are held in a tiered system through securities intermediaries such as financial institutions or brokerage firms. A Treasury security is...

  6. 31 CFR 357.0 - Book-entry systems.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... General Information § 357.0 Book-entry systems. (a) Treasury securities. Treasury securities are...-entry system is the book-entry system in which Treasury securities are held in a tiered system through securities intermediaries such as financial institutions or brokerage firms. A Treasury security is...

  7. 31 CFR 357.0 - Book-entry systems.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... General Information § 357.0 Book-entry systems. (a) Treasury securities. Treasury securities are...-entry system is the book-entry system in which Treasury securities are held in a tiered system through securities intermediaries such as financial institutions or brokerage firms. A Treasury security is...

  8. 31 CFR 357.0 - Book-entry systems.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... General Information § 357.0 Book-entry systems. (a) Treasury securities. Treasury securities are...-entry system is the book-entry system in which Treasury securities are held in a tiered system through securities intermediaries such as financial institutions or brokerage firms. A Treasury security is...

  9. An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012

    NASA Astrophysics Data System (ADS)

    Li, X. S.; Peng, Z. Y.; Li, T. T.

    2016-08-01

    This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.

  10. Invited Review Article: Current State of Research on Biological Effects of Terahertz Radiation

    NASA Astrophysics Data System (ADS)

    Wilmink, Gerald J.; Grundt, Jessica E.

    2011-10-01

    Terahertz (THz) imaging and sensing technologies are increasingly being used in a host of medical, military, and security applications. For example, THz systems are now being tested at international airports for security screening purposes, at major medical centers for cancer and burn diagnosis, and at border patrol checkpoints for identification of concealed explosives, drugs, and weapons. Recent advances in THz applications have stimulated renewed interest regarding the biological effects associated with this frequency range. Biological effects studies are a valuable type of basic science research because they serve to enhance our fundamental understanding of the mechanisms that govern THz interactions with biological systems. Such studies are also important because they often times lay the foundation for the development of future applications. In addition, from a practical standpoint, THz biological effects research is also necessary for accurate health hazard evaluation, the development of empirically-based safety standards, and for the safe use of THz systems. Given the importance and timeliness of THz bioeffects data, the purpose of this review is twofold. First, to provide readers with a common reference, which contains the necessary background concepts in biophysics and THz technology, that are required to both conduct and evaluate THz biological research. Second, to provide a critical review of the scientific literature.

  11. A Distributed Data Acquisition System for the Sensor Network of the TAWARA_RTM Project

    NASA Astrophysics Data System (ADS)

    Fontana, Cristiano Lino; Donati, Massimiliano; Cester, Davide; Fanucci, Luca; Iovene, Alessandro; Swiderski, Lukasz; Moretto, Sandra; Moszynski, Marek; Olejnik, Anna; Ruiu, Alessio; Stevanato, Luca; Batsch, Tadeusz; Tintori, Carlo; Lunardon, Marcello

    This paper describes a distributed Data Acquisition System (DAQ) developed for the TAWARA_RTM project (TAp WAter RAdioactivity Real Time Monitor). The aim is detecting the presence of radioactive contaminants in drinking water; in order to prevent deliberate or accidental threats. Employing a set of detectors, it is possible to detect alpha, beta and gamma radiations, from emitters dissolved in water. The Sensor Network (SN) consists of several heterogeneous nodes controlled by a centralized server. The SN cyber-security is guaranteed in order to protect it from external intrusions and malicious acts. The nodes were installed in different locations, along the water treatment processes, in the waterworks plant supplying the aqueduct of Warsaw, Poland. Embedded computers control the simpler nodes, and are directly connected to the SN. Local-PCs (LPCs) control the more complex nodes that consist signal digitizers acquiring data from several detectors. The DAQ in the LPC is split in several processes communicating with sockets in a local sub-network. Each process is dedicated to a very simple task (e.g. data acquisition, data analysis, hydraulics management) in order to have a flexible and fault-tolerant system. The main SN and the local DAQ networks are separated by data routers to ensure the cyber-security.

  12. [Comparative rheoencephalographic and convective radiation encephalic thermometric studies].

    PubMed

    Vaĭsfel'd, D N; Korobov, S A; Petrov, A P

    1996-01-01

    It is for the first time that thermoassimetry of heart flows of brain right and left hemispheres presenting as predominance of radiative-convective heat radiation from the left has been revealed, the thermoassimetry gradient being rostral-caudal. Disclosed in cerebral hemispheres was complimentarity of energetic processes: the right hemisphere secures the background energy state, the left one functions in ensuring the discrete adaptive thermoenergy reactions. The thermoassimetry revealed may be the basis of other functional asymmetries of the brain. There was no parallelism between the studied parameters of circulation and heat flow.

  13. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Ship Security Alert System (SSAS). 80.277... Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety..., “RTCM Standard 11020.0—Ship Security Alert Systems (SSAS) using the Cospas-Sarsat System,” Version 1.0...

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zenoni, Aldo; INFN Sezione di Pavia, Via Bassi 6, 27100 Pavia,

    Cosmic ray radiation is mostly composed, at sea level, by high energy muons, which are highly penetrating particles capable of crossing kilometers of rock. The ubiquitous and steady presence at the Earth's surface and the high penetration capability have motivated the use of cosmic ray radiation also in fields beyond particle physics, from geology, archaeology, speleology to industrial applications and homeland security. In particular, in recent years, the novel technique of muon tomography has been proposed, with the aim of performing non invasive inspection of large non accessible volumes, material atomic number Z and density discrimination, and three dimension imagemore » reconstruction of the inspected volume. In the present paper, after a short recall of the physical principles and mathematical formalism on which muon tomography is based, a number of examples of application of the novel technique in industry and homeland security issues is given. Moreover, a new application of cosmic rays detection techniques in the field of civil engineering is proposed. The aim is the monitoring of the stability of large structures, in particular the static monitoring of historical buildings, where conservation constraints are more severe and the time evolution of the deformation phenomena under study may be of the order of months or years. The new technique may be seen, in some way, as the reverse problem of muon tomography. As a significant case study, the monitoring of the wooden vaulted roof of the Palazzo della Loggia in the town of Brescia, in Italy, has been considered. The feasibility as well as the performances and limitations of a monitoring system based on cosmic ray tracking have been studied by Monte Carlo simulation and discussed in comparison with more traditional monitoring systems. (authors)« less

  15. Status of VESAS: a fully-electronic microwave imaging radiometer system

    NASA Astrophysics Data System (ADS)

    Schreiber, Eric; Peichl, Markus; Suess, Helmut

    2010-04-01

    Present applications of microwave remote sensing systems cover a large variety. One utilisation of the frequency range from 1 - 300 GHz is the domain of security and reconnaissance. Examples are the observation of critical infrastructures or the performance of security checks on people in order to detect concealed weapons or explosives, both being frequent threats in our world of growing international terrorism. The imaging capability of concealed objects is one of the main advantages of microwave remote sensing, because of the penetration performance of electromagnetic waves through dielectric materials in this frequency domain. The main physical effects used in passive microwave sensing rely on the naturally generated thermal radiation and the physical properties of matter, the latter being surface characteristics, chemical and physical composition, and the temperature of the material. As a consequence it is possible to discriminate objects having different material characteristics like ceramic weapons or plastic explosives with respect to the human body. Considering the use of microwave imaging with respect to people scanning systems in airports, railway stations, or stadiums, it is advantageous that passively operating devices generate no exposure on the scanned objects like actively operating devices do. For frequently used security gateways it is additionally important to have a high through-put rate in order to minimize the queue time. Consequently fast imaging systems are necessary. In this regard the conceptual idea of a fully-electronic microwave imaging radiometer system is introduced. The two-dimensional scanning mechanism is divided into a frequency scan in one direction and the method of aperture synthesis in the other. The overall goal here is to design a low-cost, fully-electronic imaging system with a frame rate of around one second at Ka band. This frequency domain around a center frequency of 37 GHz offers a well-balanced compromise between the achievable spatial resolution for a given size, and the penetration depth of the electromagnetic wave, which are conflictive requirements.

  16. 76 FR 43993 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-22

    ...; System of Records AGENCY: National Security Agency/Central Security Service, Department of Defense. ACTION: Notice to Delete a System of Records. SUMMARY: The National Security Agency/Central Security.... FOR FURTHER INFORMATION CONTACT: Ms. Anne Hill, National Security Agency/Central Security Service...

  17. Standoff passive video imaging at 350 GHz with 251 superconducting detectors

    NASA Astrophysics Data System (ADS)

    Becker, Daniel; Gentry, Cale; Smirnov, Ilya; Ade, Peter; Beall, James; Cho, Hsiao-Mei; Dicker, Simon; Duncan, William; Halpern, Mark; Hilton, Gene; Irwin, Kent; Li, Dale; Paulter, Nicholas; Reintsema, Carl; Schwall, Robert; Tucker, Carole

    2014-06-01

    Millimeter wavelength radiation holds promise for detection of security threats at a distance, including suicide bomb belts and maritime threats in poor weather. The high sensitivity of superconducting Transition Edge Sensor (TES) detectors makes them ideal for passive imaging of thermal signals at these wavelengths. We have built a 350 GHz video-rate imaging system using a large-format array of feedhorn-coupled TES bolometers. The system operates at a standoff distance of 16m to 28m with a spatial resolution of 1:4 cm (at 17m). It currently contains one 251-detector subarray, and will be expanded to contain four subarrays for a total of 1004 detectors. The system has been used to take video images which reveal the presence of weapons concealed beneath a shirt in an indoor setting. We present a summary of this work.

  18. 31 CFR 306.23 - Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... TREASURY DIRECT Book-entry Securities System. 306.23 Section 306.23 Money and Finance: Treasury Regulations... Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System. (a) Eligible issues. The... conversion to the TREASURY DIRECT Book-entry Securities System. The notice shall specify the period during...

  19. Target recognition in passive terahertz image of human body

    NASA Astrophysics Data System (ADS)

    Zhao, Ran; Zhao, Yuan-meng; Deng, Chao; Zhang, Cun-lin; Li, Yue

    2014-11-01

    THz radiation can penetrate through many nonpolar dielectric materials and can be used for nondestructive/noninvasive sensing and imaging of targets under nonpolar, nonmetallic covers or containers. Thus using THz systems to "see through" concealing barriers (i.e. packaging, corrugated cardboard, clothing) has been proposed as a new security screening method. Objects that can be detected by THz include concealed weapons, explosives, and chemical agents under clothing. Passive THz imaging system can detect THz wave from human body without transmit any electromagnetic wave, and the suspicious objects will become visible because the THz wave is blocked by this items. We can find out whether or not someone is carrying dangerous objects through this image. In this paper, the THz image enhancement, segmentation and contour extraction algorithms were studied to achieve effective target image detection. First, the terahertz images are enhanced and their grayscales are stretched. Then we apply global threshold segmentation to extract the target, and finally the targets are marked on the image. Experimental results showed that the algorithm proposed in this paper can extract and mark targets effectively, so that people can identify suspicious objects under clothing quickly. The algorithm can significantly improve the usefulness of the terahertz security apparatus.

  20. A fuzzy automated object classification by infrared laser camera

    NASA Astrophysics Data System (ADS)

    Kanazawa, Seigo; Taniguchi, Kazuhiko; Asari, Kazunari; Kuramoto, Kei; Kobashi, Syoji; Hata, Yutaka

    2011-06-01

    Home security in night is very important, and the system that watches a person's movements is useful in the security. This paper describes a classification system of adult, child and the other object from distance distribution measured by an infrared laser camera. This camera radiates near infrared waves and receives reflected ones. Then, it converts the time of flight into distance distribution. Our method consists of 4 steps. First, we do background subtraction and noise rejection in the distance distribution. Second, we do fuzzy clustering in the distance distribution, and form several clusters. Third, we extract features such as the height, thickness, aspect ratio, area ratio of the cluster. Then, we make fuzzy if-then rules from knowledge of adult, child and the other object so as to classify the cluster to one of adult, child and the other object. Here, we made the fuzzy membership function with respect to each features. Finally, we classify the clusters to one with the highest fuzzy degree among adult, child and the other object. In our experiment, we set up the camera in room and tested three cases. The method successfully classified them in real time processing.

  1. Passive stand-off terahertz imaging with 1 hertz frame rate

    NASA Astrophysics Data System (ADS)

    May, T.; Zieger, G.; Anders, S.; Zakosarenko, V.; Starkloff, M.; Meyer, H.-G.; Thorwirth, G.; Kreysa, E.

    2008-04-01

    Terahertz (THz) cameras are expected to be a powerful tool for future security applications. If such a technology shall be useful for typical security scenarios (e.g. airport check-in) it has to meet some minimum standards. A THz camera should record images with video rate from a safe distance (stand-off). Although active cameras are conceivable, a passive system has the benefit of concealed operation. Additionally, from an ethic perspective, the lack of exposure to a radiation source is a considerable advantage in public acceptance. Taking all these requirements into account, only cooled detectors are able to achieve the needed sensitivity. A big leap forward in the detector performance and scalability was driven by the astrophysics community. Superconducting bolometers and midsized arrays of them have been developed and are in routine use. Although devices with many pixels are foreseeable nowadays a device with an additional scanning optic is the straightest way to an imaging system with a useful resolution. We demonstrate the capabilities of a concept for a passive Terahertz video camera based on superconducting technology. The actual prototype utilizes a small Cassegrain telescope with a gyrating secondary mirror to record 2 kilopixel THz images with 1 second frame rate.

  2. Accelerator mass spectrometry of Strontium-90 for homeland security, environmental monitoring, and human health

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tumey, S J; Brown, T A; Hamilton, T F

    2008-03-03

    Strontium-90 is one of the most hazardous materials managed by agencies charged with protecting the public from radiation. Traditional radiometric methods have been limited by low sample throughput and slow turnaround times. Mass spectrometry offers the advantage of shorter analysis times and the ability to measure samples immediately after processing, however conventional mass spectrometric techniques are susceptible to molecular isobaric interferences that limit their overall sensitivity. In contrast, accelerator mass spectrometry is insensitive to molecular interferences and we have therefore begun developing a method for determination of {sup 90}Sr by accelerator mass spectrometry. Despite a pervasive interference from {sup 90}Zr,more » our initial development has yielded an instrumental background of {approx} 10{sup 8} atoms (75 mBq) per sample. Further refinement of our system (e.g., redesign of our detector, use of alternative target materials) is expected to push the background below 10{sup 6} atoms, close to the theoretical limit for AMS. Once we have refined our system and developed suitable sample preparation protocols, we will utilize our capability in applications to homeland security, environmental monitoring, and human health.« less

  3. Colony-stimulating factors for the treatment of the hematopoietic component of the acute radiation syndrome (H-ARS): a review.

    PubMed

    Singh, Vijay K; Newman, Victoria L; Seed, Thomas M

    2015-01-01

    One of the greatest national security threats to the United States is the detonation of an improvised nuclear device or a radiological dispersal device in a heavily populated area. As such, this type of security threat is considered to be of relatively low risk, but one that would have an extraordinary high impact on health and well-being of the US citizenry. Psychological counseling and medical assessments would be necessary for all those significantly impacted by the nuclear/radiological event. Direct medical interventions would be necessary for all those individuals who had received substantial radiation exposures (e.g., >1 Gy). Although no drugs or products have yet been specifically approved by the United States Food and Drug Administration (US FDA) to treat the effects of acute radiation syndrome (ARS), granulocyte colony-stimulating factor (G-CSF), granulocyte macrophage colony-stimulating factor (GM-CSF), and pegylated G-CSF have been used off label for treating radiation accident victims. Recent threats of terrorist attacks using nuclear or radiologic devices makes it imperative that the medical community have up-to-date information and a clear understanding of treatment protocols using therapeutically effective recombinant growth factors and cytokines such as G-CSF and GM-CSF for patients exposed to injurious doses of ionizing radiation. Based on limited human studies with underlying biology, we see that the recombinants, G-CSF and GM-CSF appear to have modest, but significant medicinal value in treating radiation accident victims. In the near future, the US FDA may approve G-CSF and GM-CSF as ‘Emergency Use Authorization’ (EUA) for managing radiation-induced aplasia, an ARS-related pathology. In this article, we review the status of growth factors for the treatment of radiological/nuclear accident victims.

  4. [Application of classified protection of information security in the information system of air pollution and health impact monitoring].

    PubMed

    Hao, Shuxin; Lü, Yiran; Liu, Jie; Liu, Yue; Xu, Dongqun

    2018-01-01

    To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system. According to the relevant national standards and requirements for the information system security classified protection, and the professional characteristics of the information system, to design and implement the security architecture of information system, also to determine the protection level of information system. Basic security measures for the information system were developed in the technical safety and management safety aspects according to the protection levels, which effectively prevented the security risk of the information system. The information system established relatively complete information security protection measures, to enhanced the security of professional information and system service, and to ensure the safety of air pollution and health impact monitoring project carried out smoothly.

  5. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  6. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... maintained according to manufacturers' recommendations. (b) Security systems must be regularly tested in... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance. (a...

  7. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    practice for information security management ( ISO /IEC 27002 ),” “Information technology — Security techniques — Information security management...systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security techniques — Information security risk management ( ISO /IEC 27005).” from...associated practice aids. Perhaps the most germane discovery from this effort was a draft ISO standard on Systems and software engineering, Systems and

  8. Radiation Brain Drain? The Impact of Demographic Change on U.S. Radiation Protection.

    PubMed

    Hricak, Hedvig; Dauer, Lawrence T

    2017-02-01

    The use of radiation has a substantial beneficial impact, particularly in the areas of medicine, energy production, basic science research, and industrial applications. Radiation protection knowledge and experience are required for acquiring and implementing scientific knowledge to protect workers, members of the public, and the environment from potential harmful effects of ionizing radiation while facilitating the beneficial use and development of radiation-based technologies. However, demographic changes are negatively impacting U.S. radiation protection and response capabilities. The number of radiation professionals continues to decrease even as the demand for such professionals is growing. These concerns are most pronounced in the medical, energy, research, and security arenas. Though the United States has been the world leader in radiation protection and radiation sciences for many years, the country has no strategic plan to ensure the maintenance of expertise in radiobiology, radiation physics, and radiation protection. Solving this problem will require a significant increase in federal and state funding as well as formal partnerships and initiatives among academia, professional societies, government, and the private sector.

  9. Influence of Extraterrestrial Radiation on Radiation Portal Monitors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keller, Paul E.; Kouzes, Richard T.

    2009-06-01

    Cosmic radiation and solar flares can be a major source of background radiation at the Earth’s surface. This paper examines the relationship between extraterrestrial radiation and the detectable background in radiation portal monitors used for homeland security applications. Background radiation data from 13 radiation portal monitor facilities are examined and compared against external sources of data related to extraterrestrial radiation, including measurements at neutron monitors located at 53 cosmic-ray observatories around the Earth, four polar orbiting satellites, three geostationary satellites, ground-based geomagnetic field data from observatories around the Earth, a solar magnetic index, solar radio flux data, and sunspot activitymore » data. Four-years (January 2003 through December 2006) of data are used in this study, which include the latter part of Solar Cycle 23 as solar activity was on the decline. The analysis shows a significant relationship between some extraterrestrial radiation and the background detected in the radiation portal monitors. A demonstrable decline is shown in the average gamma ray and neutron background at the radiation portal monitors as solar activity declined over the period of the study.« less

  10. 75 FR 56079 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-15

    ... to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to amend a system of records. SUMMARY: The National Security Agency/Central Security Service is proposing to...

  11. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  12. ADVANCED SURVEILLANCE OF ENVIROMENTAL RADIATION IN AUTOMATIC NETWORKS.

    PubMed

    Benito, G; Sáez, J C; Blázquez, J B; Quiñones, J

    2018-06-01

    The objective of this study is the verification of the operation of a radiation monitoring network conformed by several sensors. The malfunction of a surveillance network has security and economic consequences, which derive from its maintenance and could be avoided with an early detection. The proposed method is based on a kind of multivariate distance, and the verification for the methodology has been tested at CIEMAT's local radiological early warning network.

  13. Energy System Integration Facility Secure Data Center | Energy Systems

    Science.gov Websites

    Integration Facility | NREL Energy System Integration Facility Secure Data Center Energy System Integration Facility Secure Data Center The Energy Systems Integration Facility's Secure Data Center provides

  14. Radiation safety standards and their application: international policies and current issues.

    PubMed

    González, Abel J

    2004-09-01

    This paper briefly describes the current policies of the United Nations Scientific Committee on the Effects of Atomic Radiation and the International Commission on Radiological Protection and how these policies are converted into international radiation safety standards by the International Atomic Energy Agency, which is the only global organization-within the United Nations family of international agencies-with a statutory mandate not only to establish such standards but also to provide for their application. It also summarizes the current status of the established corpus of such international standards, and of it foreseeable evolution, as well as of legally binding undertakings by countries around the world that are linked to these standards. Moreover, this paper also reviews some major current global issues related to the application of international standards, including the following: strengthening of national infrastructures for radiation safety, including technical cooperation programs for assisting developing countries; occupational radiation safety challenges, including the protection of pregnant workers and their unborn children, dealing with working environments with high natural radiation levels, and occupational attributability of health effects (probability of occupational causation); restricting discharges of radioactive substances into the environment: reviewing current international policies vis-a-vis the growing concern on the radiation protection of the "environment;" radiological protection of patients undergoing radiodiagnostic and radiotherapeutic procedures: the current International Action Plan; safety and security of radiation sources: post-11 September developments; preparedness and response to radiation emergencies: enhancing the international network; safe transport of radioactive materials: new apprehensions; safety of radioactive waste management: concerns and connections with radiation protection; and radioactive residues remaining after the termination of activities: radiation protection response to the forthcoming wave of decommissioning of installations with radioactive materials. The ultimate aim of this paper is to encourage information exchange, cooperation, and collaboration within the radiation protection professional community. In particular, the paper tries to facilitate consolidation of the growing international regime on radiation safety, including the expansion of legally binding undertakings by countries, the strengthening of the current corpus of international radiation safety standards, and the development of international provisions for ensuring the proper worldwide application of these standards, such as a system of international appraisals by peer review.

  15. Collaboration and Commitment to Sealed Source Safety, Security, and Disposition - 13627

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jennison, Meaghan; Martin, David W.

    2013-07-01

    EnergySolutions, the Division of Radiation Control at the Utah Department of Environmental Quality (UDEQ), the Conference of Radiation Control Program Directors (CRCPD), and the Department of Energy's Global Threat Reduction Initiative (GTRI) are collaborating on a truly innovative effort to expand opportunities for cost-effective sealed source disposal. These entities have developed a first-of-its-kind initiative to dispose of certain sealed sources at the EnergySolutions disposal facility near Clive, Utah, which normally cannot accept sealed sources of any type. This creative and collaborative effort to improve radiation health, safety, and security exemplifies the spirit and commitment represented by the Richard S. Hodes,more » M.D. Honor Lecture Award, which is presented annually at the Waste Management Symposia by the Southeast Compact Commission to encourage environmental professionals and political leaders to develop innovative approaches to waste management in the United States. The participants in the collaborative initiative are honored to receive special recognition for their efforts thus far. They also recognize that the hard work remains to be done. (authors)« less

  16. 77 FR 56628 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    ... to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a system of records. SUMMARY: The National Security Agency/Central Security Service proposes to add a new...

  17. 78 FR 45913 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-30

    ... National Security Agency/Central Security Service systems of records subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act Office, 9800...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to alter...

  18. 77 FR 26259 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-03

    .... SUPPLEMENTARY INFORMATION: The National Security Agency systems of records notice subject to the Privacy Act of... of Records AGENCY: National Security Agency/Central Security Service. ACTION: Notice to Delete a System of Records. SUMMARY: The National Security Agency/Central Security Service is deleting a system of...

  19. 75 FR 67697 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-03

    ... National Security Agency's record system notices for records systems subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act (FOIA)/Privacy Act Office...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a...

  20. 75 FR 43494 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... National Security Agency's record system notices for records systems subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act and Privacy Act Office, 9800...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to...

  1. 8 CFR 103.34 - Security of records systems.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Security of records systems. 103.34 Section 103.34 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS POWERS AND DUTIES; AVAILABILITY OF RECORDS § 103.34 Security of records systems. The security of records systems...

  2. Characterization of radiation-induced damage in high performance polymers by electron paramagnetic resonance imaging spectroscopy

    NASA Technical Reports Server (NTRS)

    Suleman, Naushadalli K.

    1992-01-01

    The potential for long-term human activity beyond the Earth's protective magnetosphere is limited in part by the lack of detailed information on the effectiveness and performance of existing structural materials to shield the crew and spacecraft from highly penetrating space radiations. The two radiations of greatest concern are high energy protons emitted during solar flares and galactic cosmic rays which are energetic ions ranging from protons to highly oxidized iron. Although the interactions of such high-energy radiations with matter are not completely understood at this time, the effects of the incident radiation are clearly expected to include the formation of paramagnetic spin centers via ionization and bond-scission reactions in the molecular matrices of structural materials. Since this type of radiation damage is readily characterized by Electron Paramagnetic Resonance (EPR) spectroscopy, the NASA Langley Research Center EPR system was repaired and brought on-line during the 1991 ASEE term. A major goal of the 1992 ASEE term was to adapt the existing core of the LaRC EPR system to meet the requirements for EPR Imaging--a powerful new technique which provides detailed information on the internal structure of materials by mapping the spatial distribution of unpaired spin density in bulk media. Major impetus for this adaptation arises from the fact that information derived from EPRI complements other methods such as scanning electron microscopy which primarily characterize surface phenomena. The modification of the EPR system has been initiated by the construction of specially designed, counterwound Helmholtz coils which will be mounted on the main EPR electromagnet. The specifications of the coils have been set to achieve a static linear magnetic field gradient of 10 gauss/mm/amp along the principal (Z) axis of the Zeeman field. Construction is also in progress of a paramagnetic standard in which the spin distribution is known in all three dimensions. This sample will be used to assess the linearity of the magnetic field gradient and to ensure authentic image reconstruction. A second major task was to secure the computer capability to enable image reconstruction from projection data generated by the magnetic field gradients. To this end, commercially available and public domain software packages which perform inverse Fourier Transform and convoluted (filtered) back projection functions are being integrated into the existing EPR data processing system.

  3. Radiation Exposure Compensation Act Amendments of 2010

    THOMAS, 111th Congress

    Rep. Lujan, Ben Ray [D-NM-3

    2010-04-22

    House - 06/15/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Testing and Evaluation of Passive Radiation Detection Equipment for Homeland Security

    DOE PAGES

    West, David L.; Wood, Nathan L.; Forrester, Christina D.

    2017-12-01

    This article is concerned with test and evaluation methods for passive radiation detection equipment used in homeland security applications. The different types of equipment used in these applications are briefly reviewed and then test and evaluation methods discussed. The primary emphasis is on the test and evaluation standards developed by the American National Standards Institute’s N42 committees. Commonalities among the standards are then reviewed as well as examples of unique aspects for specific equipment types. Throughout, sample test configurations and results from testing and evaluation at Oak Ridge National Laboratory are given. The article concludes with a brief discussion ofmore » typical tests and evaluations not covered by the N42 standards and some examples of test and evaluation that involve the end users of the equipment.« less

  5. Testing and Evaluation of Passive Radiation Detection Equipment for Homeland Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    West, David L.; Wood, Nathan L.; Forrester, Christina D.

    This article is concerned with test and evaluation methods for passive radiation detection equipment used in homeland security applications. The different types of equipment used in these applications are briefly reviewed and then test and evaluation methods discussed. The primary emphasis is on the test and evaluation standards developed by the American National Standards Institute’s N42 committees. Commonalities among the standards are then reviewed as well as examples of unique aspects for specific equipment types. Throughout, sample test configurations and results from testing and evaluation at Oak Ridge National Laboratory are given. The article concludes with a brief discussion ofmore » typical tests and evaluations not covered by the N42 standards and some examples of test and evaluation that involve the end users of the equipment.« less

  6. An alternative to sneakernet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orrell, S.; Ralstin, S.

    1992-04-01

    Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less

  7. An alternative to sneakernet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orrell, S.; Ralstin, S.

    1992-01-01

    Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less

  8. Mounting structure

    NASA Technical Reports Server (NTRS)

    Ganssle, Eugene Robert (Inventor); Scott, Ralph Richard (Inventor); Williams, Richard Jean (Inventor)

    1978-01-01

    A mounting platform for heat producing instruments operated in a narrow equilibrium temperature range comprises a grid-like structure with relatively large openings therein. The instruments are secured to and thermally coupled with the grid surface facing the instruments. Excess heat from the instruments is selectively radiated to the ambient through openings in the grid, the grid surfaces at these openings exhibiting low thermal emissivity and adsorptivity. The remainder of the grid is maintained at the equilibrium temperature and is covered with a thermal insulating blanket. Thus, the entire system including the platform and instruments is maintained substantially isothermal, whereby the instruments remain in fixed physical relationship to one another.

  9. Information technology security system engineering methodology

    NASA Technical Reports Server (NTRS)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  10. Technology for low-cost PIR security sensors

    NASA Astrophysics Data System (ADS)

    Liddiard, Kevin C.

    2008-03-01

    Current passive infrared (PIR) security sensors employing pyroelectric detectors are simple, cheap and reliable, but have several deficiencies. These sensors, developed two decades ago, are essentially short-range moving-target hotspot detectors. They cannot detect slow temperature changes, and thus are unable to respond to radiation stimuli indicating potential danger such as overheating electrical appliances and developing fires. They have a poor optical resolution and limited ability to recognize detected targets. Modern uncooled thermal infrared technology has vastly superior performance but as yet is too costly to challenge the PIR security sensor market. In this paper microbolometer technology will be discussed which can provide enhanced performance at acceptable cost. In addition to security sensing the technology has numerous applications in the military, industrial and domestic markets where target range is short and low cost is paramount.

  11. 6 CFR 5.31 - Security of systems of records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security of systems of records. 5.31 Section 5.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.31 Security of systems of records. (a) In general. Each component...

  12. Personal health record systems and their security protection.

    PubMed

    Win, Khin Than; Susilo, Willy; Mu, Yi

    2006-08-01

    The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.

  13. 28 CFR 700.24 - Security of systems of records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of systems...

  14. A cross-case comparative analysis of international security forces' impacts on health systems in conflict-affected and fragile states.

    PubMed

    Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz

    2015-01-01

    Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts between security strategies and health system preservation, and lack of interoperability between security and indigenous health organizations with respect to logistics and sharing information. The cases demonstrate both the opportunities and risks of international security organizations involvement in health sector protection, recovery and reconstruction. We discuss two potential approaches to engaging these organizations in health system support that may increase the chances of realizing these opportunities while mitigating risks.

  15. Performance modeling of terahertz (THz) and millimeter waves (mmW) pupil plane imaging

    NASA Astrophysics Data System (ADS)

    Mohammadian, Nafiseh; Furxhi, Orges; Zhang, Lei; Offermans, Peter; Ghazi, Galia; Driggers, Ronald

    2018-05-01

    Terahertz- (THz) and millimeter-wave sensors are becoming more important in industrial, security, medical, and defense applications. A major problem in these sensing areas is the resolution, sensitivity, and visual acuity of the imaging systems. There are different fundamental parameters in designing a system that have significant effects on the imaging performance. The performance of THz systems can be discussed in terms of two characteristics: sensitivity and spatial resolution. New approaches for design and manufacturing of THz imagers are a vital basis for developing future applications. Photonics solutions have been at the technological forefront in THz band applications. A single scan antenna does not provide reasonable resolution, sensitivity, and speed. An effective approach to imaging is placing a high-performance antenna in a two-dimensional antenna array to achieve higher radiation efficiency and higher resolution in the imaging systems. Here, we present the performance modeling of a pupil plane imaging system to find the resolution and sensitivity efficiency of the imaging system.

  16. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...

  17. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...

  18. The design of infrared information collection circuit based on embedded technology

    NASA Astrophysics Data System (ADS)

    Liu, Haoting; Zhang, Yicong

    2013-07-01

    S3C2410 processor is a 16/32 bit RISC embedded processor which based on ARM920T core and AMNA bus, and mainly for handheld devices, and high cost, low-power applications. This design introduces a design plan of the PIR sensor system, circuit and its assembling, debugging. The Application Circuit of the passive PIR alarm uses the invisibility of the infrared radiation well into the alarm system, and in order to achieve the anti-theft alarm and security purposes. When the body goes into the range of PIR sensor detection, sensors will detect heat sources and then the sensor will output a weak signal. The Signal should be amplified, compared and delayed; finally light emitting diodes emit light, playing the role of a police alarm.

  19. Environmental radiology assessment in Lahad Datu, Sabah

    NASA Astrophysics Data System (ADS)

    Siti Fharhana, Yusof; Wan Muhamad Saridan, Wan Hassan; Ahmad Termizi, Ramli; Mohd Hilmi, Sahini; Mohammad Syazwan, Mohd Sanusi; Nor Afifah, Basri; Nor Zati Hani, Abu Hanifah

    2017-10-01

    Monitoring terrestial gamma radiation is crucial to prepare a baseline data for environmental radiological protection. Radiological research was carried out in Lahad Datu, Sabah to obtain the radioactivity status and terrestrial gamma radiation level in the area. We measure the terrestrial gamma radiation dose rates and analyse the radioactivity concentration of primordial radionuclides for radiological risk assessment. We identified that the annual estimation of dose effective for public is below the public dose limit, 1 mSv per year. Public and environment safety and health are remain secure. The obtained data and results can be used as reference for environmental radiology protection.

  20. Building a Secure Library System.

    ERIC Educational Resources Information Center

    Benson, Allen C.

    1998-01-01

    Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…

  1. Synthesis and Characteristics of Radiation Curable Polyurethanes Containing Pendant Acrylate Groups.

    DTIC Science & Technology

    1986-10-09

    diethoxylacetophenone (DEAP) and N - methyldiethanolamine ( MDEA ). The films were left in a vacuum oven for one week at room temperature to remove residual solvent...LF.Ol4.er6OlSECURITY CLASSIFICATION OF THIS PAGE (ohen De Knieved) -. " N SYNTHESIS AND CHARACTERIZATION OF RADIATION CURABLE POLYURETHANES CONTAINING...butanone-2, N , N dimethylacetamide (DMA), and toluene were --..- purchased from Aldrich Chemical Company, and stored over molecular sieve (type 3A

  2. 33 CFR 127.705 - Security systems.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...

  3. 33 CFR 127.705 - Security systems.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...

  4. 33 CFR 127.705 - Security systems.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...

  5. 33 CFR 127.705 - Security systems.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...

  6. 33 CFR 127.705 - Security systems.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...

  7. Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

    PubMed Central

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods. PMID:25405226

  8. Security threat assessment of an Internet security system using attack tree and vague sets.

    PubMed

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Willoner, T.; Turlington, R.; Koenig, R.

    The U.S. Department of Energy (DOE) (Environmental Management [EM], Office of Packaging and Transportation [EM-45]) Packaging and Certification Program (DOE PCP) has developed a Radio Frequency Identification (RFID) tracking and monitoring system, called ARG-US, for the management of nuclear materials packages during transportation and storage. The performance of the ARG-US RFID equipment and system has been fully tested in two demonstration projects in April 2008 and August 2009. With the strong support of DOE-SR and DOE PCP, a field testing program was completed in Savannah River Site's K-Area Material Storage (KAMS) Facility, an active Category I Plutonium Storage Facility, inmore » 2010. As the next step (Phase II) of continued vault testing for the ARG-US system, the Savannah River Site K Area Material Storage facility has placed the ARG-US RFIDs into the 910B storage vault for operational testing. This latest version (Mark III) of the Argonne RFID system now has the capability to measure radiation dose and dose rate. This paper will report field testing progress of the ARG-US RFID equipment in KAMS, the operability and reliability trend results associated with the applications of the system, and discuss the potential benefits in enhancing safety, security and materials accountability. The purpose of this Phase II K Area test is to verify the accuracy of the radiation monitoring and proper functionality of the ARG-US RFID equipment and system under a realistic environment in the KAMS facility. Deploying the ARG-US RFID system leads to a reduced need for manned surveillance and increased inventory periods by providing real-time access to status and event history traceability, including environmental condition monitoring and radiation monitoring. The successful completion of the testing program will provide field data to support a future development and testing. This will increase Operation efficiency and cost effectiveness for vault operation. As the next step (Phase II) of continued vault testing for the ARG-US system, the Savannah River Site K Area Material Storage facility has placed the ARG-US RFIDs into the 910B storage vault. Deploying the ARG-US RFID system lends to a reduced need for manned surveillance and increased inventory periods by providing real-time access to status and event history traceability, including radiation and environmental monitoring. The successful completion of the testing program will provide field data to support future development and testing.« less

  10. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Telecommunications; (iii) Power distribution system; (iv) Access points for ventilation and air-conditioning systems... security areas within the OCS facility; (6) Protect security and surveillance equipment and systems; and (7... security and surveillance equipment and systems and their controls, and lighting system controls; and (3...

  11. 77 FR 32111 - Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-31

    ... or fraud, or harm to the security or integrity of this system or other systems or programs (whether... to comment. FCC/MB-2 System Name: Broadcast Station Public Inspection Files. Security Classification: The FCC's Security Operations Center (SOC) has not assigned a security classification to this system...

  12. Thermal Mechanisms of Millimeter Wave Stimulation of Excitable Cells

    PubMed Central

    Shapiro, Mikhail G.; Priest, Michael F.; Siegel, Peter H.; Bezanilla, Francisco

    2013-01-01

    Interactions between millimeter waves (MMWs) and biological systems have received increasing attention due to the growing use of MMW radiation in technologies ranging from experimental medical devices to telecommunications and airport security. Studies have shown that MMW exposure alters cellular function, especially in neurons and muscles. However, the biophysical mechanisms underlying such effects are still poorly understood. Due to the high aqueous absorbance of MMW, thermal mechanisms are likely. However, nonthermal mechanisms based on resonance effects have also been postulated. We studied MMW stimulation in a simplified preparation comprising Xenopus laevis oocytes expressing proteins that underlie membrane excitability. Using electrophysiological recordings simultaneously with 60 GHz stimulation, we observed changes in the kinetics and activity levels of voltage-gated potassium and sodium channels and a sodium-potassium pump that are consistent with a thermal mechanism. Furthermore, we showed that MMW stimulation significantly increased the action potential firing rate in oocytes coexpressing voltage-gated sodium and potassium channels, as predicted by thermal terms in the Hodgkin-Huxley model of neurons. Our results suggest that MMW stimulation produces significant thermally mediated effects on excitable cells via basic thermodynamic mechanisms that must be taken into account in the study and use of MMW radiation in biological systems. PMID:23790370

  13. Investigating the effects of terahertz radiation on Bacillus subtilis

    NASA Astrophysics Data System (ADS)

    Giles, Jillian P.; Raitt, Brittany J.; Joseph, Cecil S.; Hines, Mark E.; Giles, Robert H.

    2012-03-01

    Medical and security sensing applications of Terahertz (THz) imaging are currently being developed. As a result, there is a need to further investigate the effects of THz radiation on biological systems. In this study, a 94 GHz mechanically tuned Gunn Oscillator was used to irradiate Bacillus subtilis at 94 GHz. The bacteria were cultured in trypticase soy broth (TSB) and placed in polystyrene 96 well plates. The samples where irradiated during the exponential growth phase for 1, 2, and 24 hours. Both the experimental and control plates were kept at room temperature (~25°C) and were monitored for the duration of the experiment using thermocouples interfaced with a computer via Labview software. By evaluating the absorption of each well at 600nm immediately before and after irradiation, the population density within each well was assessed. Following this, the metabolic activity of each well was measured after irradiation by adding tetrazolium dye, XTT, to the wells and evaluating the absorption of each well at 490nm after 2 hours of incubation.

  14. Bolometric kinetic inductance detector technology for sub-millimeter radiometric imaging

    NASA Astrophysics Data System (ADS)

    Hassel, Juha; Timofeev, Andrey V.; Vesterinen, Visa; Sipola, Hannu; Helistö, Panu; Aikio, Mika; Mäyrä, Aki; Grönberg, Leif; Luukanen, Arttu

    2015-10-01

    Radiometric sub-millimeter imaging is a candidate technology especially in security screening applications utilizing the property of radiation in the band of 0.2 - 1.0 THz to penetrate through dielectric substances such as clothing. The challenge of the passive technology is the fact that the irradiance corresponding to the blackbody radiation is very weak in this spectral band: about two orders of magnitude below that of the infrared band. Therefore the role of the detector technology is of ultimate importance to achieve sufficient sensitivity. In this paper we present results related to our technology relying on superconducting kinetic inductance detectors operating in a thermal (bolometric) mode. The detector technology is motivated by the fact that it is naturally suitable for scalable multiplexed readout systems, and operates with relatively simple cryogenics. We will review the basic concepts of the detectors, and provide experimental figures of merit. Furthermore, we will discuss the issues related to the scale-up of our detector technology into large 2D focal plane arrays.

  15. Short-wavelength ablation of polymers in the high-fluence regime

    NASA Astrophysics Data System (ADS)

    Liberatore, Chiara; Mann, Klaus; Müller, Matthias; Pina, Ladislav; Juha, Libor; Vyšín, Ludek; Rocca, Jorge J.; Endo, Akira; Mocek, Tomas

    2014-05-01

    Short-wavelength ablation of poly(1,4-phenylene ether-ether-sulfone) (PPEES) and poly(methyl methacrylate) (PMMA) was investigated using extreme ultraviolet (XUV) and soft x-ray (SXR) radiation from plasma-based sources. The initial experiment was performed with a 10 Hz desktop capillary-discharge XUV laser lasing at 46.9 nm. The XUV laser beam was focused onto the sample by a spherical mirror coated with a Si/Sc multilayer. The same materials were irradiated with 13.5 nm radiation emitted by plasmas produced by focusing an optical laser beam onto a xenon gas-puff target. A Schwarzschild focusing optics coated with a Mo/Si multilayer was installed at the source to achieve energy densities exceeding 0.1 J cm-2 in the tight focus. The existing experimental system at the Laser Laboratorium Göttingen was upgraded by implementing a 1.2 J driving laser. An increase of the SXR fluence was secured by improving the alignment technique.

  16. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Prevention Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of... to establish a new system of records titled, ``Department of Homeland Security/Transportation Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  17. PHITS simulations of the Matroshka experiment

    NASA Astrophysics Data System (ADS)

    Gustafsson, Katarina; Sihver, Lembit; Mancusi, Davide; Sato, Tatsuhiko

    In order to design a more secure space exploration, radiation exposure estimations are necessary; the radiation environment in space is very different from the one on Earth and it is harmful for humans and for electronic equipments. The threat origins from two sources: Galactic Cosmic Rays and Solar Particle Events. It is important to understand what happens when these particles strike matter such as space vehicle walls, human organs and electronics. We are therefore developing a tool able to estimate the radiation exposure to both humans and electronics. The tool will be based on PHITS, the Particle and Heavy-Ion Transport code System, a three dimensional Monte Carlo code which can calculate interactions and transport of particles and heavy ions in matter. PHITS is developed by a collaboration between RIST (Research Organization for Information Science & Technology), JAEA (Japan Atomic Energy Agency), KEK (High Energy Accelerator Research Organization), Japan and Chalmers University of Technology, Sweden. A method for benchmarking and developing the code is to simulate experiments performed in space or on Earth. We have carried out simulations of the Matroshka experiment which focus on determining the radiation load on astronauts inside and outside the International Space Station by using a torso of a tissue equivalent human phantom, filled with active and passive detectors located in the positions of critical tissues and organs. We will present status and results of our simulations.

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clayton, James; Shedlock, Daniel; Langeveld, Willem G.J.

    In the security and inspection market, there is a push towards highly mobile, reduced-dose active interrogation scanning and imaging systems to allow operation in urban environments. To achieve these goals, the accelerator system design needs to be smaller than existing systems. A smaller radiation exclusion zone may be accomplished through better beam collimation and an integrated, x-ray-source/detector-array assembly to allow feedback and control of an intensity-modulated x-ray source. A shaped low-Z target in the x-ray source can be used to generate a more forward peaked x-ray beam. Electron-beam steering can then be applied to direct the forward-peaked x rays towardmore » areas in the cargo with high attenuation. This paper presents an exploratory study to identify components and upgrades that would be required to meet the desired specifications, as well as the best technical approach to design and build a prototype.« less

  19. Systems integration for the Kennedy Space Center (KSC) Robotics Applications Development Laboratory (RADL)

    NASA Technical Reports Server (NTRS)

    Davis, V. Leon; Nordeen, Ross

    1988-01-01

    A laboratory for developing robotics technology for hazardous and repetitive Shuttle and payload processing activities is discussed. An overview of the computer hardware and software responsible for integrating the laboratory systems is given. The center's anthropomorphic robot is placed on a track allowing it to be moved to different stations. Various aspects of the laboratory equipment are described, including industrial robot arm control, smart systems integration, the supervisory computer, programmable process controller, real-time tracking controller, image processing hardware, and control display graphics. Topics of research include: automated loading and unloading of hypergolics for space vehicles and payloads; the use of mobile robotics for security, fire fighting, and hazardous spill operations; nondestructive testing for SRB joint and seal verification; Shuttle Orbiter radiator damage inspection; and Orbiter contour measurements. The possibility of expanding the laboratory in the future is examined.

  20. An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1.

    PubMed

    Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A

    2013-10-01

    This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.

  1. Nevada National Security Site Radiological Control Manual

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted bymore » programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of low-level radioactive waste and the handling of radioactive sources. Remediation of contaminated land areas may also result in radiological exposures.« less

  2. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...

  3. Development of a medical information system that minimizes staff workload and secures system safety at a small medical institution

    NASA Astrophysics Data System (ADS)

    Haneda, Kiyofumi; Koyama, Tadashi

    2005-04-01

    We developed a secure system that minimizes staff workload and secures safety of a medical information system. In this study, we assess the legal security requirements and risks occurring from the use of digitized data. We then analyze the security measures for ways of reducing these risks. In the analysis, not only safety, but also costs of security measures and ease of operability are taken into consideration. Finally, we assess the effectiveness of security measures by employing our system in small-sized medical institution. As a result of the current study, we developed and implemented several security measures, such as authentications, cryptography, data back-up, and secure sockets layer protocol (SSL) in our system. In conclusion, the cost for the introduction and maintenance of a system is one of the primary difficulties with its employment by a small-sized institution. However, with recent reductions in the price of computers, and certain advantages of small-sized medical institutions, the development of an efficient system configuration has become possible.

  4. Attenuation Effects of Thermal Radiation on Internal Blast Overpressure.

    DTIC Science & Technology

    1979-12-01

    SECURITY CLASSIFICATION OF THIS ZaGt ("OR. 08e. Enered) REPORT DOCUMENTATION PAGE READ MTRU,-TIORS REPORT MU01 Ia.VT ACCEMIOl Mo. MY r CATALOG UMrERt...014-6o 0 SECURITY CLASSIFICATION OFr..Is , . o. l I UNCLASSIFIED Secum". CLUIUCYIOW O s margWn o fee e. pressure was computed. Reports of the results...were calculated and thermodynamic equilibrium was demonstrated through statistical considerations. \\AccessiMf nor NTIS .I DDC TA UG ann o unc e

  5. 49 CFR 659.25 - Annual review of system safety program plan and system security plan.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...

  6. 45 CFR 95.621 - ADP reviews.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... use; (C) Software and data security; (D) Telecommunications security; (E) Personnel security; (F... Federal review. (f) ADP System Security Requirements and Review Process—(1) ADP System Security Requirement. State agencies are responsible for the security of all ADP projects under development, and...

  7. 49 CFR 234.211 - Security of warning system apparatus.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Security of warning system apparatus. 234.211... Maintenance, Inspection, and Testing Maintenance Standards § 234.211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall be secured against unauthorized entry. ...

  8. 49 CFR 234.211 - Security of warning system apparatus.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Security of warning system apparatus. 234.211... Maintenance, Inspection, and Testing Maintenance Standards § 234.211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall be secured against unauthorized entry. ...

  9. In-vacuum exposure shutter

    DOEpatents

    Johnson, Terry A.; Replogle, William C.; Bernardez, Luis J.

    2004-06-01

    An in-vacuum radiation exposure shutter device can be employed to regulate a large footprint light beam. The shutter device includes (a) a source of radiation that generates an energy beam; (2) a shutter that includes (i) a frame defining an aperture toward which the energy beam is directed and (ii) a plurality of blades that are secured to the frame; and (3) device that rotates the shutter to cause the plurality of blades to intercept or allow the energy beam to travel through the aperture. Each blade can have a substantially planar surface and the plurality of blades are secured to the frame such that the planar surfaces of the plurality of blades are substantially parallel to each other. The shutter device is particularly suited for operation in a vacuum environment and can achieve shuttering speeds from about 0.1 second to 0.001 second or faster.

  10. Hybrid Monte Carlo/Deterministic Methods for Accelerating Active Interrogation Modeling

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peplow, Douglas E.; Miller, Thomas Martin; Patton, Bruce W

    2013-01-01

    The potential for smuggling special nuclear material (SNM) into the United States is a major concern to homeland security, so federal agencies are investigating a variety of preventive measures, including detection and interdiction of SNM during transport. One approach for SNM detection, called active interrogation, uses a radiation source, such as a beam of neutrons or photons, to scan cargo containers and detect the products of induced fissions. In realistic cargo transport scenarios, the process of inducing and detecting fissions in SNM is difficult due to the presence of various and potentially thick materials between the radiation source and themore » SNM, and the practical limitations on radiation source strength and detection capabilities. Therefore, computer simulations are being used, along with experimental measurements, in efforts to design effective active interrogation detection systems. The computer simulations mostly consist of simulating radiation transport from the source to the detector region(s). Although the Monte Carlo method is predominantly used for these simulations, difficulties persist related to calculating statistically meaningful detector responses in practical computing times, thereby limiting their usefulness for design and evaluation of practical active interrogation systems. In previous work, the benefits of hybrid methods that use the results of approximate deterministic transport calculations to accelerate high-fidelity Monte Carlo simulations have been demonstrated for source-detector type problems. In this work, the hybrid methods are applied and evaluated for three example active interrogation problems. Additionally, a new approach is presented that uses multiple goal-based importance functions depending on a particle s relevance to the ultimate goal of the simulation. Results from the examples demonstrate that the application of hybrid methods to active interrogation problems dramatically increases their calculational efficiency.« less

  11. Recollections on Sixty Years of NBS Ionizing Radiation Programs for Energetic X Rays and Electrons1

    PubMed Central

    Koch, H. William

    2006-01-01

    These recollections are on ionizing radiation programs at the National Bureau of Standards (NBS) that started in 1928 and ended in 1988 when NBS became the National Institute of Standards and Technology (NIST). The independent Council on Ionizing Radiation Measurements and Standards (CIRMS) was formed in 1992. This article focuses on how measurements and standards for x rays, gamma rays, and electrons with energies above 1 MeV began at NBS and how they progressed. It also suggests how the radiation processors of materials and foods, the medical radiographic and radiological industries, and the radiological protection interests of the government (including homeland security) represented in CIRMS can benefit from NIST programs. PMID:27274947

  12. Historic American engineering record. Nevada national security site, Bren Tower Complex. Written historical and descriptive data and field records

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Edwards, Susan R.; Goldenberg, Nancy

    The BREN (Bare Reactor Experiment, Nevada) Tower Complex is significant for its role in the history of nuclear testing, radiation dosimetry studies, and early field testing of the Strategic Missile Defense System designs. At the time it was built in 1962, the 1,527 ft (465 m) BREN Tower was the tallest structure west of the Mississippi River and exceeded the height of the Empire State Building by 55 ft (17 m). It remains the tallest ever erected specifically for scientific purposes and was designed and built to facilitate the experimental dosimetry studies necessary for the development of accurate radiation dosemore » rates for the survivors of Hiroshima and Nagasaki. The tower was a key component of the Atomic Bomb Casualty Commission’s (ABCC) mission to predict the health effects of radiation exposure. Moved to its current location in 1966, the crucial dosimetry studies continued with Operation HENRE (High Energy Neutron Reactions Experiment). These experiments and the data they generated became the basis for a dosimetry system called the Tentative 1965 Dose or more commonly the T65D model. Used to estimate radiation doses received by individuals, the T65D model was applied until the mid-1980s when it was replaced by a new dosimetry system known as DS86 based on the Monte Carlo method of dose rate calculation. However, the BREN Tower data are still used for verification of the validity of the DS86 model. In addition to its importance in radiation heath effects research, the BREN Tower Complex is also significant for its role in the Brilliant Pebbles research project, a major component of the Strategic Defense Initiative popularly known as the “Star Wars” Initiative. Instigated under the Reagan Administration, the program’s purpose was to develop a system to shield the United States and allies from a ballistic missile attack. The centerpiece of the Strategic Defense System was space-based, kinetic-kill vehicles. In 1991, BREN Tower was used for the tether tests of the Brilliant Pebbles prototype vehicle at the earth’s surface prior to the more costly space testing program. The success of these tests established the Brilliant Pebbles program as an essential component of America’s space-based missile defense system even after the dismantling of the Soviet Union. Data from the Brilliant Pebbles research program continues to inspire current missile defense system research (Independent Working Group 2009).« less

  13. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  14. An E-Hospital Security Architecture

    NASA Astrophysics Data System (ADS)

    Tian, Fang; Adams, Carlisle

    In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.

  15. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    ERIC Educational Resources Information Center

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  16. WASTE TREATMENT BUILDING SYSTEM DESCRIPTION DOCUMENT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    F. Habashi

    2000-06-22

    The Waste Treatment Building System provides the space, layout, structures, and embedded subsystems that support the processing of low-level liquid and solid radioactive waste generated within the Monitored Geologic Repository (MGR). The activities conducted in the Waste Treatment Building include sorting, volume reduction, and packaging of dry waste, and collecting, processing, solidification, and packaging of liquid waste. The Waste Treatment Building System is located on the surface within the protected area of the MGR. The Waste Treatment Building System helps maintain a suitable environment for the waste processing and protects the systems within the Waste Treatment Building (WTB) from mostmore » of the natural and induced environments. The WTB also confines contaminants and provides radiological protection to personnel. In addition to the waste processing operations, the Waste Treatment Building System provides space and layout for staging of packaged waste for shipment, industrial and radiological safety systems, control and monitoring of operations, safeguards and security systems, and fire protection, ventilation and utilities systems. The Waste Treatment Building System also provides the required space and layout for maintenance activities, tool storage, and administrative facilities. The Waste Treatment Building System integrates waste processing systems within its protective structure to support the throughput rates established for the MGR. The Waste Treatment Building System also provides shielding, layout, and other design features to help limit personnel radiation exposures to levels which are as low as is reasonably achievable (ALARA). The Waste Treatment Building System interfaces with the Site Generated Radiological Waste Handling System, and with other MGR systems that support the waste processing operations. The Waste Treatment Building System interfaces with the General Site Transportation System, Site Communications System, Site Water System, MGR Site Layout, Safeguards and Security System, Site Radiological Monitoring System, Site Electrical Power System, Site Compressed Air System, and Waste Treatment Building Ventilation System.« less

  17. 48 CFR 2301.101 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 2301.101 Federal Acquisition Regulations System SOCIAL SECURITY ADMINISTRATION GENERAL SOCIAL SECURITY ACQUISITION REGULATION SYSTEM Purpose, Authority, Issuance 2301.101 Purpose. (a) The Social Security... Social Security Administration (SSA) which conform to the Federal Acquisition Regulation (FAR) System. (b...

  18. Quality of protection evaluation of security mechanisms.

    PubMed

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.

  19. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...

  20. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...

  1. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...

  2. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...

  3. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Ship Security Alert System (SSAS). 80.277... SERVICES STATIONS IN THE MARITIME SERVICES Equipment Authorization for Compulsory Ships § 80.277 Ship Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety...

  4. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Ship Security Alert System (SSAS). 80.277... SERVICES STATIONS IN THE MARITIME SERVICES Equipment Authorization for Compulsory Ships § 80.277 Ship Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety...

  5. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Ship Security Alert System (SSAS). 80.277... SERVICES STATIONS IN THE MARITIME SERVICES Equipment Authorization for Compulsory Ships § 80.277 Ship Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety...

  6. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Ship Security Alert System (SSAS). 80.277... SERVICES STATIONS IN THE MARITIME SERVICES Equipment Authorization for Compulsory Ships § 80.277 Ship Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety...

  7. 78 FR 7334 - Port Authority Access to Facility Vulnerability Assessments and the Integration of Security Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-01

    ... to Facility Vulnerability Assessments and the Integration of Security Systems AGENCY: Coast Guard...-sharing measures. Security System Integration Alternatives Require each MTSA-regulated facility owner or... other forms of security system integration. Information Requested 1. We request comments on the...

  8. 20 CFR 404.1901 - Introduction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... social security system of the United States and the social security system of a foreign country. An... be based on a combination of a person's periods of coverage under the social security system of the United States and the social security system of the foreign country. An agreement also provides for the...

  9. 45 CFR 307.13 - Security and confidentiality for computerized support enforcement systems in operation after...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ENFORCEMENT SYSTEMS § 307.13 Security and confidentiality for computerized support enforcement systems in... systems in operation after October 1, 1997. (a) Information integrity and security. Have safeguards... 45 Public Welfare 2 2010-10-01 2010-10-01 false Security and confidentiality for computerized...

  10. 49 CFR 659.21 - System security plan: general requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: general requirements. 659.21... State Oversight Agency § 659.21 System security plan: general requirements. (a) The oversight agency shall require the rail transit agency to implement a system security plan that, at a minimum, complies...

  11. Multimedia Security System for Security and Medical Applications

    ERIC Educational Resources Information Center

    Zhou, Yicong

    2010-01-01

    This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

  12. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...

  13. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...

  14. The systems approach to airport security: The FAA (Federal Aviation Administration)/BWI (Baltimore-Washington International) Airport demonstration project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Caskey, D.L.; Olascoaga, M.T.

    1990-01-01

    Sandia National Laboratories has been involved in designing, installing and evaluating security systems for various applications during the past 15 years. A systems approach to security that evolved from this experience was applied to aviation security for the Federal Aviation Administration. A general systems study of aviation security in the United States was concluded in 1987. One result of the study was a recommendation that an enhanced security system concept designed to meet specified objectives be demonstrated at an operational airport. Baltimore-Washington International Airport was selected as the site for the demonstration project which began in 1988 and will bemore » completed in 1992. This article introduced the systems approach to airport security and discussed its application at Baltimore-Washington International Airport. Examples of design features that could be included in an enhanced security concept also were presented, including details of the proposed Ramps Area Intrusion Detection System (RAIDS).« less

  15. Simulations of MATROSHKA experiments at ISS using PHITS

    NASA Astrophysics Data System (ADS)

    Puchalska, Monika; Sihver, L.; Sato, T.; Berger, T.; Reitz, G.

    Concerns about the biological effects of space radiation are increasing rapidly due to the per-spective of long-duration manned missions, both in relation to the International Space Station (ISS) and to manned interplanetary missions to Moon and Mars in the future. As a prepara-tion for these long duration space missions it is important to ensure an excellent capability to evaluate the impact of space radiation on human health in order to secure the safety of the astronauts/cosmonauts and minimize their risks. It is therefore necessary to measure the radi-ation load on the personnel both inside and outside the space vehicles and certify that organ and tissue equivalent doses can be simulated as accurate as possible. In this paper we will present simulations using the three-dimensional Monte Carlo Particle and Heavy Ion Transport code System (PHITS) of long term dose measurements performed with the ESA supported ex-periment MATROSHKA (MTR), which is an anthropomorphic phantom containing over 6000 radiation detectors, mimicking a human head and torso. The MTR experiment, led by the German Aerospace Center (DLR), was launched in January 2004 and has measured the ab-sorbed dose from space radiation both inside and outside the ISS. In this paper preliminary comparisons of measured and calculated dose and organ doses in the MTR located outside the ISS will be presented. The results confirm previous calculations and measurements which indicate that PHITS is a suitable tool for estimations of dose received from cosmic radiation and when performing shielding design studies of spacecraft. Acknowledgement: The research leading to these results has received funding from the Euro-pean Commission in the frame of the FP7 HAMLET project (Project 218817).

  16. Research and realization of info-net security controlling system

    NASA Astrophysics Data System (ADS)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  17. Nuclear Thermal Propulsion Development Risks

    NASA Technical Reports Server (NTRS)

    Kim, Tony

    2015-01-01

    There are clear advantages of development of a Nuclear Thermal Propulsion (NTP) for a crewed mission to Mars. NTP for in-space propulsion enables more ambitious space missions by providing high thrust at high specific impulse ((is) approximately 900 sec) that is 2 times the best theoretical performance possible for chemical rockets. Missions can be optimized for maximum payload capability to take more payload with reduced total mass to orbit; saving cost on reduction of the number of launch vehicles needed. Or missions can be optimized to minimize trip time significantly to reduce the deep space radiation exposure to the crew. NTR propulsion technology is a game changer for space exploration to Mars and beyond. However, 'NUCLEAR' is a word that is feared and vilified by some groups and the hostility towards development of any nuclear systems can meet great opposition by the public as well as from national leaders and people in authority. The public often associates the 'nuclear' word with weapons of mass destruction. The development NTP is at risk due to unwarranted public fears and clear honest communication of nuclear safety will be critical to the success of the development of the NTP technology. Reducing cost to NTP development is critical to its acceptance and funding. In the past, highly inflated cost estimates of a full-scale development nuclear engine due to Category I nuclear security requirements and costly regulatory requirements have put the NTP technology as a low priority. Innovative approaches utilizing low enriched uranium (LEU). Even though NTP can be a small source of radiation to the crew, NTP can facilitate significant reduction of crew exposure to solar and cosmic radiation by reducing trip times by 3-4 months. Current Human Mars Mission (HMM) trajectories with conventional propulsion systems and fuel-efficient transfer orbits exceed astronaut radiation exposure limits. Utilizing extra propellant from one additional SLS launch and available energy in the NTP fuel, HMM radiation exposure can be reduced significantly.

  18. Products for Security Screening of People

    MedlinePlus

    ... for Non-Medical Radiation Applications, administered by the Health Physics Society (HPS), published the current version of the ... took place during the October 1, 2003 meeting. Health Risks from Exposure ... Applied Physics Laboratory, Assessment for TSA, October 2009 and revised ...

  19. Privacy vs usability: a qualitative exploration of patients' experiences with secure Internet communication with their general practitioner.

    PubMed

    Tjora, Aksel; Tran, Trung; Faxvaag, Arild

    2005-05-31

    Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using secure systems must be studied and used to improve user interfaces.

  20. Privacy vs Usability: A Qualitative Exploration of Patients' Experiences With Secure Internet Communication With Their General Practitioner

    PubMed Central

    Tran, Trung; Faxvaag, Arild

    2005-01-01

    Background Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. Objectives The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Methods Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Results Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Conclusions Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using secure systems must be studied and used to improve user interfaces. PMID:15998606

  1. The Infrastructure Necessary to Support a Sustainable Material Protection, Control and Accounting (MPC&A) Program in Russia

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bachner, Katherine M.; Mladineo, Stephen V.

    The NNSA Material Protection, Control, and Accounting (MPC&A) program has been engaged for fifteen years in upgrading the security of nuclear materials in Russia. Part of the effort has been to establish the conditions necessary to ensure the long-term sustainability of nuclear security. A sustainable program of nuclear security requires the creation of an indigenous infrastructure, starting with sustained high level government commitment. This includes organizational development, training, maintenance, regulations, inspections, and a strong nuclear security culture. The provision of modern physical protection, control, and accounting equipment to the Russian Federation alone is not sufficient. Comprehensive infrastructure projects support themore » Russian Federation's ability to maintain the risk reduction achieved through upgrades to the equipment. To illustrate the contributions to security, and challenges of implementation, this paper discusses the history and next steps for an indigenous Tamper Indication Device (TID) program, and a Radiation Portal Monitoring (RPM) program.« less

  2. Building the strategic national stockpile through the NIAID Radiation Nuclear Countermeasures Program.

    PubMed

    Rios, Carmen I; Cassatt, David R; Dicarlo, Andrea L; Macchiarini, Francesca; Ramakrishnan, Narayani; Norman, Mai-Kim; Maidment, Bert W

    2014-02-01

    The possibility of a public health radiological or nuclear emergency in the United States remains a concern. Media attention focused on lost radioactive sources and international nuclear threats, as well as the potential for accidents in nuclear power facilities (e.g., Windscale, Three Mile Island, Chernobyl, and Fukushima) highlight the need to address this critical national security issue. To date, no drugs have been licensed to mitigate/treat the acute and long-term radiation injuries that would result in the event of large-scale, radiation, or nuclear public health emergency. However, recent evaluation of several candidate radiation medical countermeasures (MCMs) has provided initial proof-of-concept of efficacy. The goal of the Radiation Nuclear Countermeasures Program (RNCP) of the National Institute of Allergy and Infectious Diseases (National Institutes of Health) is to help ensure the government stockpiling of safe and efficacious MCMs to treat radiation injuries, including, but not limited to, hematopoietic, gastrointestinal, pulmonary, cutaneous, renal, cardiovascular, and central nervous systems. In addition to supporting research in these areas, the RNCP continues to fund research and development of decorporation agents targeting internal radionuclide contamination, and biodosimetry platforms (e.g., biomarkers and devices) to assess the levels of an individual's radiation exposure, capabilities that would be critical in a mass casualty scenario. New areas of research within the program include a focus on special populations, especially pediatric and geriatric civilians, as well as combination studies, in which drugs are tested within the context of expected medical care management (e.g., antibiotics and growth factors). Moving forward, challenges facing the RNCP, as well as the entire radiation research field, include further advancement and qualification of animal models, dose conversion from animal models to humans, biomarker identification, and formulation development. This paper provides a review of recent work and collaborations supported by the RNCP. Published 2013 Wiley-Periodicals, Inc. This article is a US government work and, as such, is in the public domain in the United States of America.

  3. FAA computer security : concerns remain due to personnel and other continuing weaknesses

    DOT National Transportation Integrated Search

    2000-08-01

    FAA has a history of computer security weaknesses in a number of areas, including its physical security management at facilities that house air traffic control (ATC) systems, systems security for both operational and future systems, management struct...

  4. Reconfigurable metasurface aperture for security screening and microwave imaging

    NASA Astrophysics Data System (ADS)

    Sleasman, Timothy; Imani, Mohammadreza F.; Boyarsky, Michael; Pulido-Mancera, Laura; Reynolds, Matthew S.; Smith, David R.

    2017-05-01

    Microwave imaging systems have seen growing interest in recent decades for applications ranging from security screening to space/earth observation. However, hardware architectures commonly used for this purpose have not seen drastic changes. With the advent of metamaterials a wealth of opportunities have emerged for honing metasurface apertures for microwave imaging systems. Recent thrusts have introduced dynamic reconfigurability directly into the aperture layer, providing powerful capabilities from a physical layer with considerable simplicity. The waveforms generated from such dynamic metasurfaces make them suitable for application in synthetic aperture radar (SAR) and, more generally, computational imaging. In this paper, we investigate a dynamic metasurface aperture capable of performing microwave imaging in the K-band (17.5-26.5 GHz). The proposed aperture is planar and promises an inexpensive fabrication process via printed circuit board techniques. These traits are further augmented by the tunability of dynamic metasurfaces, which provides the dexterity necessary to generate field patterns ranging from a sequence of steered beams to a series of uncorrelated radiation patterns. Imaging is experimentally demonstrated with a voltage-tunable metasurface aperture. We also demonstrate the aperture's utility in real-time measurements and perform volumetric SAR imaging. The capabilities of a prototype are detailed and the future prospects of general dynamic metasurface apertures are discussed.

  5. 22 CFR 308.10 - Security of records systems-manual and automated.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security of records systems-manual and automated... Security of records systems—manual and automated. The head of the agency has the responsibility of... destruction of manual and automatic record systems. These security safeguards shall apply to all systems in...

  6. 12 CFR 792.67 - Security of systems of records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Security of systems of records. 792.67 Section... AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION The Privacy Act § 792.67 Security of systems of records. (a) Each system manager, with the approval of the head of that...

  7. Securing the Global Airspace System Via Identity-Based Security

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  8. Quantum key distribution over a 72 dB channel loss using ultralow dark count superconducting single-photon detectors.

    PubMed

    Shibata, Hiroyuki; Honjo, Toshimori; Shimizu, Kaoru

    2014-09-01

    We report the first quantum key distribution (QKD) experiment over a 72 dB channel loss using superconducting nanowire single-photon detectors (SSPD, SNSPD) with the dark count rate (DCR) of 0.01 cps. The DCR of the SSPD, which is dominated by the blackbody radiation at room temperature, is blocked by introducing cold optical bandpass filter. We employ the differential phase shift QKD (DPS-QKD) scheme with a 1 GHz system clock rate. The quantum bit error rate (QBER) below 3% is achieved when the length of the dispersion shifted fiber (DSF) is 336 km (72 dB loss), which is low enough to generate secure keys.

  9. Operational Space Weather Needs - Perspectives from SEASONS 2014

    NASA Astrophysics Data System (ADS)

    Comberiate, J.; Kelly, M. A.; Paxton, L. J.; Schaefer, R. K.; Bust, G. S.; Sotirelis, T.; Fox, N. J.

    2014-12-01

    A key challenge for the operational space weather community is the gap between the latest scientific data, models, methods, and indices and those that are currently used in operational systems. The November 2014 SEASONS (Space Environment Applications, Systems, and Operations for National Security) Workshop at JHU/APL in Laurel, Maryland, brings together representatives from the operational and scientific communities. The theme of SEASONS 2014 is "Beyond Climatology," with a focus on how space weather events threaten operational assets and disrupt missions. Here we present perspectives from SEASONS 2014 on new observations, models in development, and forecasting methods that are of interest to the operational space weather community. Highlighted topics include ionospheric data assimilation and forecasting models, HF propagation models, radiation belt observations, and energetic particle modeling. The SEASONS 2014 web site can be found at https://secwww.jhuapl.edu/SEASONS/

  10. Motto: We work for people and environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barcik, M.

    1995-12-31

    This target has been under Danfoss realization for over 60 years, both in Denmark and all over the world. The operational range of the enterprise: is very wide. Danfoss manufactures a large assortment of products, starting from heat automatic control systems, through heat metering devices, industrial and refrigeration automatic control, compressors, flow meters, frequency converters, control systems, and monitoring. The four mainstays of the business activity are based on: high quality products; advanced manufacturing technology; care of the environment, and engagement of the staff. Since 1992 Danfoss has been manufacturing heat radiator thermostats in Poland. A unique solution - namelymore » the use of a gas thermostatic head secures the highest energy savings and operational reliability. In 1993, Danfoss as the sixth company in Poland and the first in its business field, gained a ISO 9002 certificate.« less

  11. A wireless electronic monitoring system for securing milk from farm to processor

    NASA Astrophysics Data System (ADS)

    Womble, Phillip; Hopper, Lindsay; Thompson, Chris; Alexander, Suraj M.; Crist, William; Payne, Fred; Stombaugh, Tim; Paschal, Jon; Moore, Ryan; Luck, Brian; Tabayehnejab, Nasrin

    2008-04-01

    The Department of Homeland Security and the Department of Health and Human Services have targeted bulk food contamination as a focus for attention. The contamination of bulk food poses a high consequence threat to our society. Milk transport falls into three of the 17 targeted NIPP (National Infrastructure Protection Plan) sectors including agriculture-food, public health, and commercial facilities. Minimal security safeguards have been developed for bulk milk transport. The current manual methods of securing milk are paper intensive and prone to errors. The bulk milk transportation sector requires a security enhancement that will both reduce recording errors and enable normal transport activities to occur while providing security against unauthorized access. Milk transportation companies currently use voluntary seal programs that utilize plastic, numbered seals on milk transport tank openings. Our group has developed a Milk Transport Security System which is an electromechanical access control and communication system that assures the secure transport of milk, milk samples, milk data, and security data between locations and specifically between dairy farms, transfer stations, receiving stations, and milk plants. It includes a security monitoring system installed on the milk transport tank, a hand held device, optional printers, data server, and security evaluation software. The system operates automatically and requires minimal or no attention by the bulk milk hauler/sampler. The system is compatible with existing milk transport infrastructure, and has the support of the milk producers, milk transportation companies, milk marketing agencies, and dairy processors. The security protocol developed is applicable for transport of other bulk foods both nationally and internationally. This system adds significantly to the national security infrastructure for bulk food transport. We are currently demonstrating the system in central Kentucky and will report on the results of the demonstration.

  12. Information Systems Security Management: A Review and a Classification of the ISO Standards

    NASA Astrophysics Data System (ADS)

    Tsohou, Aggeliki; Kokolakis, Spyros; Lambrinoudakis, Costas; Gritzalis, Stefanos

    The need for common understanding and agreement of functional and non-functional requirements is well known and understood by information system designers. This is necessary for both: designing the "correct" system and achieving interoperability with other systems. Security is maybe the best example of this need. If the understanding of the security requirements is not the same for all involved parties and the security mechanisms that will be implemented do not comply with some globally accepted rules and practices, then the system that will be designed will not necessarily achieve the desired security level and it will be very difficult to securely interoperate with other systems. It is therefore clear that the role and contribution of international standards to the design and implementation of security mechanisms is dominant. In this paper we provide a state of the art review on information security management standards published by the International Organization for Standardization and the International Electrotechnical Commission. Such an analysis is meaningful to security practitioners for an efficient management of information security. Moreover, the classification of the standards in the clauses of ISO/IEC 27001:2005 that results from our analysis is expected to provide assistance in dealing with the plethora of security standards.

  13. Quality of Protection Evaluation of Security Mechanisms

    PubMed Central

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol. PMID:25136683

  14. 75 FR 49943 - New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-16

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security...

  15. System and method for secure group transactions

    DOEpatents

    Goldsmith, Steven Y [Rochester, MN

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  16. Contextualizing Secure Information System Design: A Socio-Technical Approach

    ERIC Educational Resources Information Center

    Charif, Abdul Rahim

    2017-01-01

    Secure Information Systems (SIS) design paradigms have evolved in generations to adapt to IS security needs. However, modern IS are still vulnerable and are far from secure. The development of an underlying IS cannot be reduced to "technological fixes" neither is the design of SIS. Technical security cannot ensure IS security.…

  17. Real-time millimeter-wave imaging radiometer for avionic synthetic vision

    NASA Astrophysics Data System (ADS)

    Lovberg, John A.; Chou, Ri-Chee; Martin, Christopher A.

    1994-07-01

    ThermoTrex Corporation (TTC) has developed an imaging radiometer, the passive microwave camera (PMC), that uses an array of frequency-scanned antennas coupled to a multi-channel acousto-optic (Bragg cell) spectrum analyzer to form visible images of a scene through acquisition of thermal blackbody radiation in the millimeter-wave spectrum. The output of the Bragg cell is imaged by a standard video camera and passed to a computer for normalization and display at real-time frame rates. One application of this system could be its incorporation into an enhanced vision system to provide pilots with a clear view of the runway during fog and other adverse weather conditions. The unique PMC system architecture will allow compact large-aperture implementations because of its flat antenna sensor. Other potential applications include air traffic control, all-weather area surveillance, fire detection, and security. This paper describes the architecture of the TTC PMC and shows examples of images acquired with the system.

  18. New Non-Intrusive Inspection Technologies for Nuclear Security and Nonproliferation

    NASA Astrophysics Data System (ADS)

    Ledoux, Robert J.

    2015-10-01

    Comprehensive monitoring of the supply chain for nuclear materials has historically been hampered by non-intrusive inspection systems that have such large false alarm rates that they are impractical in the flow of commerce. Passport Systems, Inc. (Passport) has developed an active interrogation system which detects fissionable material, high Z material, and other contraband in land, sea and air cargo. Passport's design utilizes several detection modalities including high resolution imaging, passive radiation detection, effective-Z (EZ-3D™) anomaly detection, Prompt Neutrons from Photofission (PNPF), and Nuclear Resonance Fluorescence (NRF) isotopic identification. These technologies combine to: detect fissionable, high-Z, radioactive and contraband materials, differentiate fissionable materials from high-Z shielding materials, and isotopically identify actinides, Special Nuclear Materials (SNM), and other contraband (e.g. explosives, drugs, nerve agents). Passport's system generates a 3-D image of the scanned object which contains information such as effective-Z and density, as well as a 2-D image and isotopic and fissionable information for regions of interest.

  19. Kinetics of Materials at Extreme Conditions: Understanding the Time Dependent Approach to Equilibrium at MaRIE

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kraus, R. G.; Mcnabb, D.; Kumar, M.

    The National Nuclear Security Agency has recently recognized that a long-term need exists to establish a stronger scientific basis for the assessment and qualification of materials and manufacturing processes for the nuclear stockpile and other national security applications. These materials may have undergone substantial changes with age, or may represent new materials that are being introduced because of difficulties associated with reusing or recreating materials used in original stockpile components. Also, with advancements in manufacturing methods, the NNSA anticipates opportunities for an enhanced range of control over fabricated components, an enhanced pace of materials development, and enhanced functionality. The developmentmore » of qualification standards for these new materials will require the ability to understand and control material characteristics that affect both mechanical and dynamic performance. A unique aspect for NNSA is that the performance requirements for materials are often set by system hydrodynamics, and these materials must perform in extreme environments and loading conditions. Thus, the scientific motivation is to understand “Matter-Radiation Interactions in Extremes (MaRIE).”« less

  20. Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities.

    PubMed

    Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min; Yoo, Sooyoung

    2012-06-01

    The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another.

  1. Secure electronic commerce communication system based on CA

    NASA Astrophysics Data System (ADS)

    Chen, Deyun; Zhang, Junfeng; Pei, Shujun

    2001-07-01

    In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

  2. Radiation Database for Earth and Mars Entry

    DTIC Science & Technology

    2008-11-17

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18 . NUMBER OF PAGES 40 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b...ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39- 18 wall, and zero otherwise. The radiative...coupling scheme, we have the additional selection rules for the electric dipolar transition ∆S = 0, (16) ∆L = 0,±1, (17) L = 0 6↔ L = 0 ( 18 ) where we have

  3. Centers for Disease Control and Prevention (CDC) Radiation Hazard Scale Data Product Review Feedback Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Askin, A.; Buddemeier, B.; Alai, M.

    In support of the Department of Energy (DOE) National nuclear Security Administration (NNSA) and the Centers for Disease Control and Prevention (CDC), Lawrence Livermore National Laboratory (LLNL) assisted in the development of new data templates for disseminating and communicating FRMAC1 data products using the CDC Radiation Hazard Scale communication tool. To ensure these data products will be useful to stakeholders during a radiological emergency, LLNL facilitated opportunities for product socialization and review.

  4. Analysis of Proton Radiation Effects on Gallium Nitride High Electron Mobility Transistors

    DTIC Science & Technology

    2017-03-01

    energy levels on a GaN-on-silicon high electron mobility transistor was created. Based on physical results of 2.0-MeV protons irradiation to fluence...and the physical device at 2.0-MeV proton irradiation , predictions were made for 5.0, 10.0, 20.0 and 40.0-MeV proton irradiation . The model generally...nitride, high electron mobility transistor, electronics, 2 MeV proton irradiation , radiation effects 15. NUMBER OF PAGES 87 16. PRICE CODE 17. SECURITY

  5. Evaluation on Electronic Securities Settlements Systems by AHP Methods

    NASA Astrophysics Data System (ADS)

    Fukaya, Kiyoyuki; Komoda, Norihisa

    Accompanying the spread of Internet and the change of business models, electronic commerce expands buisness areas. Electronic finance commerce becomes popular and especially online security tradings becoome very popular in this area. This online securitiy tradings have some good points such as less mistakes than telephone calls. In order to expand this online security tradings, the transfer of the security paper is one the largest problems to be solved. Because it takes a few days to transfer the security paper from a seller to a buyer. So the dematerialization of security papers is one of the solutions. The demterilization needs the information systems for setteling security. Some countries such as France, German, United Kingdom and U.S.A. have been strating the dematerialization projects. The legacy assesments on these projects focus from the viewpoint of the legal schemes only and there is no assessment from system architectures. This paper focuses on the information system scheme and valuates these dematerlization projects by AHP methods from the viewpoints of “dematerializaion of security papers", “speed of transfer", “usefulness on the system" and “accumulation of risks". This is the first case of valuations on security settlements systems by AHP methods, especially four counties’ systems.

  6. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  7. Design and implementation of a secure workflow system based on PKI/PMI

    NASA Astrophysics Data System (ADS)

    Yan, Kai; Jiang, Chao-hui

    2013-03-01

    As the traditional workflow system in privilege management has the following weaknesses: low privilege management efficiency, overburdened for administrator, lack of trust authority etc. A secure workflow model based on PKI/PMI is proposed after studying security requirements of the workflow systems in-depth. This model can achieve static and dynamic authorization after verifying user's ID through PKC and validating user's privilege information by using AC in workflow system. Practice shows that this system can meet the security requirements of WfMS. Moreover, it can not only improve system security, but also ensures integrity, confidentiality, availability and non-repudiation of the data in the system.

  8. Development of quantitative security optimization approach for the picture archives and carrying system between a clinic and a rehabilitation center

    NASA Astrophysics Data System (ADS)

    Haneda, Kiyofumi; Kajima, Toshio; Koyama, Tadashi; Muranaka, Hiroyuki; Dojo, Hirofumi; Aratani, Yasuhiko

    2002-05-01

    The target of our study is to analyze the level of necessary security requirements, to search for suitable security measures and to optimize security distribution to every portion of the medical practice. Quantitative expression must be introduced to our study, if possible, to enable simplified follow-up security procedures and easy evaluation of security outcomes or results. Using fault tree analysis (FTA), system analysis showed that system elements subdivided into groups by details result in a much more accurate analysis. Such subdivided composition factors greatly depend on behavior of staff, interactive terminal devices, kinds of services provided, and network routes. Security measures were then implemented based on the analysis results. In conclusion, we identified the methods needed to determine the required level of security and proposed security measures for each medical information system, and the basic events and combinations of events that comprise the threat composition factors. Methods for identifying suitable security measures were found and implemented. Risk factors for each basic event, a number of elements for each composition factor, and potential security measures were found. Methods to optimize the security measures for each medical information system were proposed, developing the most efficient distribution of risk factors for basic events.

  9. Astrophysical Connections to Collapsing Radiative Shock Experiments

    NASA Astrophysics Data System (ADS)

    Reighard, A. B.; Hansen, J. F.; Bouquet, S.; Koenig, M.

    2005-10-01

    Radiative shocks occur in many high-energy density explosions, but prove difficult to create in laboratory experiments or to fully model with astrophysical codes. Low astrophysical densities combined with powerful explosions provide ideal conditions for producing radiative shocks. Here we describe an experiment significant to astrophysical shocks, which produces a driven, planar radiative shock in low density Xe gas. Including radiation effects precludes scaling experiments directly to astrophysical conditions via Euler equations, as can be done in purely hydrodynamic experiments. We use optical depth considerations to make comparisons between the driven shock in xenon and specific astrophysical phenomena. This planar shock may be subject to thin shell instabilities similar to those affecting the evolution of astrophysical shocks. This research was sponsored by the National Nuclear Security Administration under the Stewardship Science Academic Alliances program through DOE Research Grants DE-FG52-03NA00064, DE-FG53-2005-NA26014, and other grants and contracts.

  10. ICS security in maritime transportation : a white paper examining the security and resiliency of critical transportation infrastructure

    DOT National Transportation Integrated Search

    2013-07-29

    The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...

  11. Securing a Lock on Safety.

    ERIC Educational Resources Information Center

    Daneman, Kathy

    1998-01-01

    Describes the integration of security systems to provide enhanced security that is both effective and long lasting. Examines combining card-access systems with camera surveillance, and highly visible emergency phones and security officers. as one of many possible combinations. Some systems most capable of being integrated are listed. (GR)

  12. The electronic security partnership of safety/security and information systems departments.

    PubMed

    Yow, J Art

    2012-01-01

    The ever-changing world of security electronics is reviewed in this article. The author focuses on its usage in a hospital setting and the need for safety/security and information systems departments to work together to protect and get full value from IP systems.

  13. Process Improvement Should Link to Security: SEPG 2007 Security Track Recap

    DTIC Science & Technology

    2007-09-01

    the Systems Security Engineering Capability Maturity Model (SSE- CMM / ISO 21827) and its use in system software developments ...software development life cycle ( SDLC )? 6. In what ways should process improvement support security in the SDLC ? 1.2 10BPANEL RESOURCES For each... project management, and support practices through the use of the capability maturity models including the CMMI and the Systems Security

  14. Strengthening the Security of ESA Ground Data Systems

    NASA Astrophysics Data System (ADS)

    Flentge, Felix; Eggleston, James; Garcia Mateos, Marc

    2013-08-01

    A common approach to address information security has been implemented in ESA's Mission Operations (MOI) Infrastructure during the last years. This paper reports on the specific challenges to the Data Systems domain within the MOI and how security can be properly managed with an Information Security Management System (ISMS) according to ISO 27001. Results of an initial security risk assessment are reported and the different types of security controls that are being implemented in order to reduce the risks are briefly described.

  15. Field-deployable gamma-radiation detectors for DHS use

    NASA Astrophysics Data System (ADS)

    Mukhopadhyay, Sanjoy

    2007-09-01

    Recently, the Department of Homeland Security (DHS) has integrated all nuclear detection research, development, testing, evaluation, acquisition, and operational support into a single office: the Domestic Nuclear Detection Office (DNDO). The DNDO has specific requirements set for all commercial off-the-shelf and government off-the-shelf radiation detection equipment and data acquisition systems. This article would investigate several recent developments in field deployable gamma radiation detectors that are attempting to meet the DNDO specifications. Commercially available, transportable, handheld radio isotope identification devices (RIID) are inadequate for DHS' requirements in terms of sensitivity, resolution, response time, and reach-back capability. The leading commercial vendor manufacturing handheld gamma spectrometer in the United States is Thermo Electron Corporation. Thermo Electron's identiFINDER TM, which primarily uses sodium iodide crystals (3.18 x 2.54cm cylinders) as gamma detectors, has a Full-Width-at-Half-Maximum energy resolution of 7 percent at 662 keV. Thermo Electron has just recently come up with a reach-back capability patented as RadReachBack TM that enables emergency personnel to obtain real-time technical analysis of radiation samples they find in the field1. The current project has the goal to build a prototype handheld gamma spectrometer, equipped with a digital camera and an embedded cell phone to be used as an RIID with higher sensitivity, better resolution, and faster response time (able to detect the presence of gamma-emitting radio isotopes within 5 seconds of approach), which will make it useful as a field deployable tool. The handheld equipment continuously monitors the ambient gamma radiation, and, if it comes across any radiation anomalies with higher than normal gamma gross counts, it sets an alarm condition. When a substantial alarm level is reached, the system automatically triggers the saving of relevant spectral data and software-triggers the digital camera to take a snapshot. The spectral data including in situ analysis and the imagery data will be packaged in a suitable format and sent to a command post using an imbedded cell phone.

  16. Petri net modeling of encrypted information flow in federated cloud

    NASA Astrophysics Data System (ADS)

    Khushk, Abdul Rauf; Li, Xiaozhong

    2017-08-01

    Solutions proposed and developed for the cost-effective cloud systems suffer from a combination of secure private clouds and less secure public clouds. Need to locate applications within different clouds poses a security risk to the information flow of the entire system. This study addresses this by assigning security levels of a given lattice to the entities of a federated cloud system. A dynamic flow sensitive security model featuring Bell-LaPadula procedures is explored that tracks and authenticates the secure information flow in federated clouds. Additionally, a Petri net model is considered as a case study to represent the proposed system and further validate the performance of the said system.

  17. Addressing software security and mitigations in the life cycle

    NASA Technical Reports Server (NTRS)

    Gilliam, David; Powell, John; Haugh, Eric; Bishop, Matt

    2003-01-01

    Traditionally, security is viewed as an organizational and Information Technology (IIJ systems function comprising of Firewalls, intrusion detection systems (IDS), system security settings and patches to the operating system (OS) and applications running on it. Until recently, little thought has been given to the importance of security as a formal approach in the software life cycle. The Jet Propulsion Laboratory has approached the problem through the development of an integrated formal Software Security Assessment Instrument (SSAI) with six foci for the software life cycle.

  18. Addressing software security and mitigations in the life cycle

    NASA Technical Reports Server (NTRS)

    Gilliam, David; Powell, John; Haugh, Eric; Bishop, Matt

    2004-01-01

    Traditionally, security is viewed as an organizational and Information Technology (IT) systems function comprising of firewalls, intrusion detection systems (IDS), system security settings and patches to the operating system (OS) and applications running on it. Until recently, little thought has been given to the importance of security as a formal approach in the software life cycle. The Jet Propulsion Laboratory has approached the problem through the development of an integrated formal Software Security Assessment Instrument (SSAI) with six foci for the software life cycle.

  19. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  20. Wide Area Security Region Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin

    2010-03-31

    This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of systemmore » parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.« less

  1. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  2. Building Security. Honeywell Planning Guide.

    ERIC Educational Resources Information Center

    Honeywell, Inc., Minneapolis, Minn.

    A general discussion of building detection and alarm systems to provide security against burglary and vandalism is provided by a manufacturer of automated monitoring and control systems. Security systems are identified as--(1) local alarm system, (2) central station alarm system, (3) proprietary alarm system, and (4) direct connect alarm system..…

  3. Using SysML to model complex systems for security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cano, Lester Arturo

    2010-08-01

    As security systems integrate more Information Technology the design of these systems has tended to become more complex. Some of the most difficult issues in designing Complex Security Systems (CSS) are: Capturing Requirements: Defining Hardware Interfaces: Defining Software Interfaces: Integrating Technologies: Radio Systems: Voice Over IP Systems: Situational Awareness Systems.

  4. Perimeter security alarm system based on fiber Bragg grating

    NASA Astrophysics Data System (ADS)

    Zhang, Cui; Wang, Lixin

    2010-11-01

    With the development of the society and economy and the improvement of living standards, people need more and more pressing security. Perimeter security alarm system is widely regarded as the first line of defense. A highly sensitive Fiber Bragg grating (FBG) vibration sensor based on the theory of the string vibration, combined with neural network adaptive dynamic programming algorithm for the perimeter security alarm system make the detection intelligently. Intelligent information processing unit identify the true cause of the vibration of the invasion or the natural environment by analyzing the frequency of vibration signals, energy, amplitude and duration. Compared with traditional perimeter security alarm systems, such as infrared perimeter security system and electric fence system, FBG perimeter security alarm system takes outdoor passive structures, free of electromagnetic interference, transmission distance through optical fiber can be as long as 20 km It is able to detect the location of event within short period of time (high-speed response, less than 3 second).This system can locate the fiber cable's breaking sites and alarm automatically if the cable were be cut. And the system can prevent effectively the false alarm from small animals, birds, strong wind, scattering things, snowfalls and vibration of sensor line itself. It can also be integrated into other security systems. This system can be widely used in variety fields such as military bases, nuclear sites, airports, warehouses, prisons, residence community etc. It will be a new force of perimeter security technology.

  5. Advances in radiation detection technologies for responders.

    PubMed

    Unterweger, Michael P; Pibida, Leticia S

    2005-11-01

    The Department of Homeland Security is supporting the development of a large number of standards for first responders. In the area of detection of radioactive and nuclear materials, four new standards (ANSI N42.32, N42.33, N42.34, and N42.35) and their corresponding test and evaluation protocols were developed to meet Department of Homeland Security needs. Testing of the standards and protocols was carried out at the National Institute of Standards and Technology, Oak Ridge National Laboratory, Pacific Northwest National Laboratory, Los Alamos National Laboratory, and Lawrence Livermore National Laboratory.

  6. Review of neutron-based technologies for the inspection of cargo containers

    NASA Astrophysics Data System (ADS)

    Khan, Siraj M.

    1994-10-01

    Three techniques (API, PFNA and PFTNA) are described and compared in this brief review of neutron based technologies for the detection of contraband in cargo containers. It appears that the role that these techniques can play in the detection of contraband in Customs, airline security and physical security applications remains to be demonstrated. However, their utilization in the fields of non-proliferation, arms control and disarmament, radwaste remediation and pollution control seems more straight forward since the issues of thruput and radiation safety are not so critical.

  7. Cyber Security Assessment Report: Adventium Labs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2007-12-31

    Major control system components often have life spans of 15-20 years. Many systems in our Nation's critical infrastructure were installed before the Internet became a reality and security was a concern. Consequently, control systems are generally insecure. Security is now being included in the development of new control system devices; however, legacy control systems remain vulnerable. Most efforts to secure control systems are aimed at protecting network borers, but if an intruder gets inside the network these systems are vulnerable to a cyber attack.

  8. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  9. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  10. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...

  11. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  12. Developing an Undergraduate Information Systems Security Track

    ERIC Educational Resources Information Center

    Sharma, Aditya; Murphy, Marianne C.; Rosso, Mark A.; Grant, Donna

    2013-01-01

    Information Systems Security as a specialized area of study has mostly been taught at the graduate level. This paper highlights the efforts of establishing an Information Systems (IS) Security track at the undergraduate level. As there were many unanswered questions and concerns regarding the Security curriculum, focus areas, the benefit of…

  13. Designing a Retirement System for Federal Workers Covered by Social Security.

    ERIC Educational Resources Information Center

    Library of Congress, Washington, DC. Congressional Research Service.

    A study examined principal cost and benefit issues to be resolved in designing a new retirement system for Federal workers covered by Social Security. The new Federal system would be built on the base of Social Security and would take into account the Social Security program's taxes and benefits. The current Civil Service Retirement System (CSRS)…

  14. A Complex Systems Approach to More Resilient Multi-Layered Security Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brown, Nathanael J. K.; Jones, Katherine A.; Bandlow, Alisa

    In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for amore » performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (P I) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.« less

  15. Methodology development for quantitative optimization of security enhancement in medical information systems -Case study in a PACS and a multi-institutional radiotherapy database-.

    PubMed

    Haneda, Kiyofumi; Umeda, Tokuo; Koyama, Tadashi; Harauchi, Hajime; Inamura, Kiyonari

    2002-01-01

    The target of our study is to establish the methodology for analyzing level of security requirements, for searching suitable security measures and for optimizing security distribution to every portion of medical practice. Quantitative expression must be introduced to our study as possible for the purpose of easy follow up of security procedures and easy evaluation of security outcomes or results. Results of system analysis by fault tree analysis (FTA) clarified that subdivided system elements in detail contribute to much more accurate analysis. Such subdivided composition factors very much depended on behavior of staff, interactive terminal devices, kinds of service, and routes of network. As conclusion, we found the methods to analyze levels of security requirements for each medical information systems employing FTA, basic events for each composition factor and combination of basic events. Methods for searching suitable security measures were found. Namely risk factors for each basic event, number of elements for each composition factor and candidates of security measure elements were found. Method to optimize the security measures for each medical information system was proposed. Namely optimum distribution of risk factors in terms of basic events were figured out, and comparison of them between each medical information systems became possible.

  16. Advances in Front-end Enabling Technologies for Thermal Infrared ` THz Torch' Wireless Communications

    NASA Astrophysics Data System (ADS)

    Hu, Fangjing; Lucyszyn, Stepan

    2016-09-01

    The thermal (emitted) infrared frequency bands (typically 20-40 and 60-100 THz) are best known for remote sensing applications that include temperature measurement (e.g. non-contacting thermometers and thermography), night vision and surveillance (e.g. ubiquitous motion sensing and target acquisition). This unregulated part of the electromagnetic spectrum also offers commercial opportunities for the development of short-range secure communications. The ` THz Torch' concept, which fundamentally exploits engineered blackbody radiation by partitioning thermally generated spectral radiance into pre-defined frequency channels, was recently demonstrated by the authors. The thermal radiation within each channel can be independently pulse-modulated, transmitted and detected, to create a robust form of short-range secure communications within the thermal infrared. In this paper, recent progress in the front-end enabling technologies associated with the THz Torch concept is reported. Fundamental limitations of this technology are discussed; possible engineering solutions for further improving the performance of such thermal-based wireless links are proposed and verified either experimentally or through numerical simulations. By exploring a raft of enabling technologies, significant enhancements to both data rate and transmission range can be expected. With good engineering solutions, the THz Torch concept can exploit nineteenth century physics with twentieth century multiplexing schemes for low-cost twenty-first century ubiquitous applications in security and defence.

  17. Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities

    PubMed Central

    Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min

    2012-01-01

    Objectives The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. Methods The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. Results From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. Conclusions This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another. PMID:22844648

  18. An Atomic Clock with 10 (exp -18) Instability

    DTIC Science & Technology

    2013-09-13

    experimental tools to address exciting topics in cosmology and gravitational physics such as Hawking radiation (13) or Unruh effect (27). References...long baseline interferometry), secure communication, and interferometry and can possibly lead to a re definition of the SI second (9). References and

  19. Analyzing the security of an existing computer system

    NASA Technical Reports Server (NTRS)

    Bishop, M.

    1986-01-01

    Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on thought experiments as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the thought experiment by writing a special manual for parts of the operating system, system programs, and library subroutines.

  20. Federal Government Information Systems Security Management and Governance Are Pacing Factors for Innovation

    ERIC Educational Resources Information Center

    Edwards, Gregory

    2011-01-01

    Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…

  1. 10 CFR 95.49 - Security of automatic data processing (ADP) systems.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security of...

  2. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Security requirements for... System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 3052.204-70 Security requirements...

  3. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Security requirements for... System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 3052.204-70 Security requirements...

  4. Application of the Quality Functional Deployment Method in Mobility Aid Securement System Design

    DOT National Transportation Integrated Search

    1992-12-01

    The Independent Locking Securement System Project (ILS System Project) is a : successful attempt to respond to the transportation community's need for a : "universal" securement/restraint system that will accommodate most wheeled : mobility aids, inc...

  5. 5 CFR 9701.231 - Conversion of positions and employees to the DHS classification system.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Transitional...

  6. Technical solutions for mitigating security threats caused by health professionals in clinical settings.

    PubMed

    Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio

    2015-08-01

    The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.

  7. 10 CFR 1008.22 - Use and collection of social security numbers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Use and collection of social security numbers. 1008.22... (PRIVACY ACT) Maintenance and Establishment of Systems of Records § 1008.22 Use and collection of social security numbers. (a) The System Manager of each system of records which utilizes social security numbers...

  8. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... from its inventory of record systems. TSA will rely upon DHS/ALL-017 General Legal Records (November 23, 2011, 76 FR 72428) to cover its legal activities. Eliminating the system of records notice DHS/TSA-009... Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  9. 78 FR 25282 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-008...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-30

    ... Assistance Files System of Records AGENCY: Privacy Office, Department of Homeland Security. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to update and reissue a current Department of Homeland Security system of...

  10. 45 CFR 1182.15 - Institute responsibility for maintaining adequate technical, physical, and security safeguards to...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... record systems. These security safeguards shall apply to all systems in which identifiable personal data... data and automated systems shall be adequately trained in the security and privacy of personal data. (4... technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of manual and...

  11. 45 CFR 2508.10 - Who has the responsibility for maintaining adequate technical, physical, and security safeguards...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... record systems. These security safeguards shall apply to all systems in which identifiable personal data... the security and privacy of such records. (7) The disposal and destruction of records within a system... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of...

  12. 10 CFR 1008.22 - Use and collection of social security numbers.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Use and collection of social security numbers. 1008.22... (PRIVACY ACT) Maintenance and Establishment of Systems of Records § 1008.22 Use and collection of social security numbers. (a) The System Manager of each system of records which utilizes social security numbers...

  13. 10 CFR 1008.22 - Use and collection of social security numbers.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Use and collection of social security numbers. 1008.22... (PRIVACY ACT) Maintenance and Establishment of Systems of Records § 1008.22 Use and collection of social security numbers. (a) The System Manager of each system of records which utilizes social security numbers...

  14. 10 CFR 1008.22 - Use and collection of social security numbers.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Use and collection of social security numbers. 1008.22... (PRIVACY ACT) Maintenance and Establishment of Systems of Records § 1008.22 Use and collection of social security numbers. (a) The System Manager of each system of records which utilizes social security numbers...

  15. 10 CFR 1008.22 - Use and collection of social security numbers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Use and collection of social security numbers. 1008.22... (PRIVACY ACT) Maintenance and Establishment of Systems of Records § 1008.22 Use and collection of social security numbers. (a) The System Manager of each system of records which utilizes social security numbers...

  16. Security Techniques for Sensor Systems and the Internet of Things

    ERIC Educational Resources Information Center

    Midi, Daniele

    2016-01-01

    Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues. We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We…

  17. Computer applications for the hospital security department--buying or developing a shift log reporting system.

    PubMed

    Gruber, T

    1996-01-01

    The author presents guidelines to help a security department select a computer system to track security activities--whether it's a commercial software product, an in-house developed program, or a do-it-yourself designed system. Computerized security activity reporting, he believes, is effective and beneficial.

  18. Network security system for health and medical information using smart IC card

    NASA Astrophysics Data System (ADS)

    Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1998-07-01

    A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.

  19. Solar ultraviolet radiation and ozone depletion-driven climate change: effects on terrestrial ecosystems.

    PubMed

    Bornman, J F; Barnes, P W; Robinson, S A; Ballaré, C L; Flint, S D; Caldwell, M M

    2015-01-01

    In this assessment we summarise advances in our knowledge of how UV-B radiation (280-315 nm), together with other climate change factors, influence terrestrial organisms and ecosystems. We identify key uncertainties and knowledge gaps that limit our ability to fully evaluate the interactive effects of ozone depletion and climate change on these systems. We also evaluate the biological consequences of the way in which stratospheric ozone depletion has contributed to climate change in the Southern Hemisphere. Since the last assessment, several new findings or insights have emerged or been strengthened. These include: (1) the increasing recognition that UV-B radiation has specific regulatory roles in plant growth and development that in turn can have beneficial consequences for plant productivity via effects on plant hardiness, enhanced plant resistance to herbivores and pathogens, and improved quality of agricultural products with subsequent implications for food security; (2) UV-B radiation together with UV-A (315-400 nm) and visible (400-700 nm) radiation are significant drivers of decomposition of plant litter in globally important arid and semi-arid ecosystems, such as grasslands and deserts. This occurs through the process of photodegradation, which has implications for nutrient cycling and carbon storage, although considerable uncertainty exists in quantifying its regional and global biogeochemical significance; (3) UV radiation can contribute to climate change via its stimulation of volatile organic compounds from plants, plant litter and soils, although the magnitude, rates and spatial patterns of these emissions remain highly uncertain at present. UV-induced release of carbon from plant litter and soils may also contribute to global warming; and (4) depletion of ozone in the Southern Hemisphere modifies climate directly via effects on seasonal weather patterns (precipitation and wind) and these in turn have been linked to changes in the growth of plants across the Southern Hemisphere. Such research has broadened our understanding of the linkages that exist between the effects of ozone depletion, UV-B radiation and climate change on terrestrial ecosystems.

  20. Transport Physics in Thin-Film Oxides: From Capacitors to Memristors1

    NASA Astrophysics Data System (ADS)

    Tierney, Brian; Hjalmarson, Harold; McLain, Michael; Hughart, David; Marinella, Matthew; Mamaluy, Denis; Gao, Xujiao

    A physics-based model of transport mechanisms in metal-insulator-metal (M-I-M) systems is developed to explain transport through the metal-oxide interfaces and in the bulk of the insulating oxide. Interface tunneling, such as that between the metal to the conduction band or bound defect states, is accounted for by a WKB model. Our model also incorporates the evolution of the associated oxide defect chemistry. Continuum calculations are performed for both Ta2O5 M-I-M capacitors and TaOx-Based M-I-M memristors, as both devices are structurally similar and can be characterized by a common set of transport mechanisms. However, due to the electroforming process for which memristors are subjected, different transport mechanisms dominate for each type of device. Also, the effects of pulsed ionizing radiation from an external source are included in the model. It is shown that such radiation can be used to probe whether the M-I-M system is in a capacitive or memristive state. 1Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  1. Information security system quality assessment through the intelligent tools

    NASA Astrophysics Data System (ADS)

    Trapeznikov, E. V.

    2018-04-01

    The technology development has shown the automated system information security comprehensive analysis necessity. The subject area analysis indicates the study relevance. The research objective is to develop the information security system quality assessment methodology based on the intelligent tools. The basis of the methodology is the information security assessment model in the information system through the neural network. The paper presents the security assessment model, its algorithm. The methodology practical implementation results in the form of the software flow diagram are represented. The practical significance of the model being developed is noted in conclusions.

  2. 33 CFR 105.250 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... systems must be regularly tested in accordance with the manufacturers' recommendations; noted deficiencies... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and...

  3. Providing security for automated process control systems at hydropower engineering facilities

    NASA Astrophysics Data System (ADS)

    Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.

    2016-12-01

    This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.

  4. Evaluation of power system security and development of transmission pricing method

    NASA Astrophysics Data System (ADS)

    Kim, Hyungchul

    The electric power utility industry is presently undergoing a change towards the deregulated environment. This has resulted in unbundling of generation, transmission and distribution services. The introduction of competition into unbundled electricity services may lead system operation closer to its security boundaries resulting in smaller operating safety margins. The competitive environment is expected to lead to lower price rates for customers and higher efficiency for power suppliers in the long run. Under this deregulated environment, security assessment and pricing of transmission services have become important issues in power systems. This dissertation provides new methods for power system security assessment and transmission pricing. In power system security assessment, the following issues are discussed (1) The description of probabilistic methods for power system security assessment; (2) The computation time of simulation methods; (3) on-line security assessment for operation. A probabilistic method using Monte-Carlo simulation is proposed for power system security assessment. This method takes into account dynamic and static effects corresponding to contingencies. Two different Kohonen networks, Self-Organizing Maps and Learning Vector Quantization, are employed to speed up the probabilistic method. The combination of Kohonen networks and Monte-Carlo simulation can reduce computation time in comparison with straight Monte-Carlo simulation. A technique for security assessment employing Bayes classifier is also proposed. This method can be useful for system operators to make security decisions during on-line power system operation. This dissertation also suggests an approach for allocating transmission transaction costs based on reliability benefits in transmission services. The proposed method shows the transmission transaction cost of reliability benefits when transmission line capacities are considered. The ratio between allocation by transmission line capacity-use and allocation by reliability benefits is computed using the probability of system failure.

  5. Using RFID to enhance security in off-site data storage.

    PubMed

    Lopez-Carmona, Miguel A; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2010-01-01

    Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.

  6. Model-Driven Configuration of SELinux Policies

    NASA Astrophysics Data System (ADS)

    Agreiter, Berthold; Breu, Ruth

    The need for access control in computer systems is inherent. However, the complexity to configure such systems is constantly increasing which affects the overall security of a system negatively. We think that it is important to define security requirements on a non-technical level while taking the application domain into respect in order to have a clear and separated view on security configuration (i.e. unblurred by technical details). On the other hand, security functionality has to be tightly integrated with the system and its development process in order to provide comprehensive means of enforcement. In this paper, we propose a systematic approach based on model-driven security configuration to leverage existing operating system security mechanisms (SELinux) for realising access control. We use UML models and develop a UML profile to satisfy these needs. Our goal is to exploit a comprehensive protection mechanism while rendering its security policy manageable by a domain specialist.

  7. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...

  8. Development of an Independent Locking Securement System for Mobility Aids on Public Transportation Vehicles

    DOT National Transportation Integrated Search

    1992-12-01

    The Independent Locking Securement System Project (ILS System Project) is a : successful attempt to respond to the transportation community's need for a : "universal" securement/restraint system that will accommodate most wheeled : mobility aids, inc...

  9. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...

  10. Implementation and evaluation of an efficient secure computation system using ‘R’ for healthcare statistics

    PubMed Central

    Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi

    2014-01-01

    Background and objective While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Materials and methods Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software ‘R’ by effectively combining secret-sharing-based secure computation with original computation. Results Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50 000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. Discussion If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using ‘R’ that works interactively while secure computation protocols generally require a significant amount of processing time. Conclusions We propose a secure statistical analysis system using ‘R’ for medical data that effectively integrates secret-sharing-based secure computation and original computation. PMID:24763677

  11. Implementation and evaluation of an efficient secure computation system using 'R' for healthcare statistics.

    PubMed

    Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi

    2014-10-01

    While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  12. 5 CFR 9701.101 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... establishment of a new human resources management system within the Department of Homeland Security (DHS), as...

  13. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  14. Situated Usability Testing for Security Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.

    2011-03-02

    While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused onmore » matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.« less

  15. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-06

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  16. Implementing a High-Assurance Smart-Card OS

    NASA Astrophysics Data System (ADS)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  17. Finite-Time Performance of Local Search Algorithms: Theory and Application

    DTIC Science & Technology

    2010-06-10

    security devices deployed at airport security checkpoints are used to detect prohibited items (e.g., guns, knives, explosives). Each security device...security devices are deployed, the practical issue of determining how to optimally use them can be difficult. For an airport security system design...checked baggage), explosive detection systems (designed to detect explosives in checked baggage), and detailed hand search by an airport security official

  18. Information security requirements in patient-centred healthcare support systems.

    PubMed

    Alsalamah, Shada; Gray, W Alex; Hilton, Jeremy; Alsalamah, Hessah

    2013-01-01

    Enabling Patient-Centred (PC) care in modern healthcare requires the flow of medical information with the patient between different healthcare providers as they follow the patient's treatment plan. However, PC care threatens the stability of the balance of information security in the support systems since legacy systems fall short of attaining a security balance when sharing their information due to compromises made between its availability, integrity, and confidentiality. Results show that the main reason for this is that information security implementation in discrete legacy systems focused mainly on information confidentiality and integrity leaving availability a challenge in collaboration. Through an empirical study using domain analysis, observations, and interviews, this paper identifies a need for six information security requirements in legacy systems to cope with this situation in order to attain the security balance in systems supporting PC care implementation in modern healthcare.

  19. Cyber security with radio frequency interferences mitigation study for satellite systems

    NASA Astrophysics Data System (ADS)

    Wang, Gang; Wei, Sixiao; Chen, Genshe; Tian, Xin; Shen, Dan; Pham, Khanh; Nguyen, Tien M.; Blasch, Erik

    2016-05-01

    Satellite systems including the Global Navigation Satellite System (GNSS) and the satellite communications (SATCOM) system provide great convenience and utility to human life including emergency response, wide area efficient communications, and effective transportation. Elements of satellite systems incorporate technologies such as navigation with the global positioning system (GPS), satellite digital video broadcasting, and information transmission with a very small aperture terminal (VSAT), etc. The satellite systems importance is growing in prominence with end users' requirement for globally high data rate transmissions; the cost reduction of launching satellites; development of smaller sized satellites including cubesat, nanosat, picosat, and femtosat; and integrating internet services with satellite networks. However, with the promising benefits, challenges remain to fully develop secure and robust satellite systems with pervasive computing and communications. In this paper, we investigate both cyber security and radio frequency (RF) interferences mitigation for satellite systems, and demonstrate that they are not isolated. The action space for both cyber security and RF interferences are firstly summarized for satellite systems, based on which the mitigation schemes for both cyber security and RF interferences are given. A multi-layered satellite systems structure is provided with cross-layer design considering multi-path routing and channel coding, to provide great security and diversity gains for secure and robust satellite systems.

  20. Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System.

    PubMed

    Ghanti, Shaila; Naik, G M

    2016-01-01

    Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack.

  1. Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System

    PubMed Central

    Ghanti, Shaila

    2016-01-01

    Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack. PMID:28116350

  2. NASA Electronic Library System (NELS): The system impact of security

    NASA Technical Reports Server (NTRS)

    Mcgregor, Terry L.

    1993-01-01

    This paper discusses security issues as they relate to the NASA Electronic Library System which is currently in use as the repository system for AdaNET System Version 3 (ASV3) being operated by MountainNET, Inc. NELS was originally designed to provide for public, development, and secure collections and objects. The secure feature for collections and objects was deferred in the initial system for implementation at a later date. The NELS system is now 9 months old and many lessons have been learned about the use and maintenance of library systems. MountainNET has 9 months of experience in operating the system and gathering feedback from the ASV3 user community. The user community has expressed an interest in seeing security features implemented in the current system. The time has come to take another look at the whole issue of security for the NELS system. Two requirements involving security have been put forth by MountainNET for the ASV3 system. The first is to incorporate at the collection level a security scheme to allow restricted access to collections. This should be invisible to end users and be controlled by librarians. The second is to allow inclusion of applications which can be executed only by a controlled group of users; for example, an application which can be executed by librarians only. The requirements provide a broad framework in which to work. These requirements raise more questions than answers. To explore the impact of these requirements a top down approach will be used.

  3. Merging leadership and innovation to secure a large health system.

    PubMed

    Bellino, Joseph V; Shaw, Sharon

    2014-01-01

    In this article the security system executive for a 13-hospital system spells out how partnering with capable and motivated vendors and gaining the cooperation of other departments enabled him to convert disparate security systems with equipment from multiple manufacturers into a cost-effective centralized system.

  4. 77 FR 60401 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-03

    ... computer password protection.'' * * * * * System manager(s) and address: Delete entry and replace with...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to amend a system of records. SUMMARY: The National Security Agency (NSA) is proposing to amend a system of...

  5. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    NASA Astrophysics Data System (ADS)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lee, Hsien-Hsin S

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniquesmore » and system software for achieving a robust, secure, and reliable computing system toward our goal.« less

  7. Security credentials management system (SCMS) design and analysis for the connected vehicle system : draft.

    DOT National Transportation Integrated Search

    2013-12-27

    This report presents an analysis by Booz Allen Hamilton (Booz Allen) of the technical design for the Security Credentials Management System (SCMS) intended to support communications security for the connected vehicle system. The SCMS technical design...

  8. Security warning system monitors up to fifteen remote areas simultaneously

    NASA Technical Reports Server (NTRS)

    Fusco, R. C.

    1966-01-01

    Security warning system consisting of 15 television cameras is capable of monitoring several remote or unoccupied areas simultaneously. The system uses a commutator and decommutator, allowing time-multiplexed video transmission. This security system could be used in industrial and retail establishments.

  9. 5 CFR 9701.373 - Conversion of employees to the DHS pay system.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... system. 9701.373 Section 9701.373 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Transitional Provisions...

  10. Cyber secure systems approach for NPP digital control systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCreary, T. J.; Hsu, A.

    2006-07-01

    Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant andmore » distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to disrupt network communications by entering the system from an attached utility network or utilizing a modem connected to a control system PC that is in turn connected to a publicly accessible phone; 2)Threat from a user connecting an unauthorized computer to the control network; 3)Threat from a security attack when an unauthorized user gains access to a PC connected to the plant network;. 4)Threat from internal disruption (by plant staff, whether, malicious or otherwise) by unauthorized usage of files or file handling media that opens the system to security threat (as typified in current situation in most control rooms). The plant I and C system cyber security design and the plant specific procedures should adequately demonstrate protection from the four pertinent classes of cyber security attacks. The combination of these features should demonstrate that the system is not vulnerable to any analyzed cyber security attacks either from internal sources or through network connections. The authors will provide configurations that will demonstrate the Cyber Security Zone. (authors)« less

  11. Restricted access processor - An application of computer security technology

    NASA Technical Reports Server (NTRS)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  12. Assessment on security system of radioactive sources used in hospitals of Thailand

    NASA Astrophysics Data System (ADS)

    Jitbanjong, Petchara; Wongsawaeng, Doonyapong

    2016-01-01

    Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources used in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.

  13. TH-AB-202-07: Radar Tracking of Respiratory Motion in Real Time

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fung, A; Li, C; Torres, C

    Purpose: To propose a method of real time tracking of respiratory motion in patients undergoing radiation therapy. Radar technology can be employed to detection the movement of diaphragm and thoracic anatomy. Methods: A radar transceiver was specially designed. During experiment, the radar device was securely attached to a fixed frame. Respiratory motion was simulated with: 1) Varian RPM phantom, 2) Standard Imaging Respiratory Gating Platform. Signals recorded with radar equipment were compared with those measured with Varian RPM system as a reference. Results: Motion generated by Varian RPM phantom was recorded by the radar device, and compared to the signalsmore » recorded by RPM camera. The results showed exact agreement between the two monitoring equipments. Motion was also generated by Standard Imaging Respiratory Motion Platform. The results showed the radar device was capable of measuring motion of various amplitudes and periods. Conclusion: The proposed radar device is able to measure movements such as respiratory motion. Compared to state-of-the-art respiratory detection instrument, the radar device is shown to be equally precise and effective for monitoring respiration in radiation oncology patients.« less

  14. Multi-sensor radiation detection, imaging, and fusion

    NASA Astrophysics Data System (ADS)

    Vetter, Kai

    2016-01-01

    Glenn Knoll was one of the leaders in the field of radiation detection and measurements and shaped this field through his outstanding scientific and technical contributions, as a teacher, his personality, and his textbook. His Radiation Detection and Measurement book guided me in my studies and is now the textbook in my classes in the Department of Nuclear Engineering at UC Berkeley. In the spirit of Glenn, I will provide an overview of our activities at the Berkeley Applied Nuclear Physics program reflecting some of the breadth of radiation detection technologies and their applications ranging from fundamental studies in physics to biomedical imaging and to nuclear security. I will conclude with a discussion of our Berkeley Radwatch and Resilient Communities activities as a result of the events at the Dai-ichi nuclear power plant in Fukushima, Japan more than 4 years ago.

  15. Eye safety related to near infrared radiation exposure to biometric devices.

    PubMed

    Kourkoumelis, Nikolaos; Tzaphlidou, Margaret

    2011-03-01

    Biometrics has become an emerging field of technology due to its intrinsic security features concerning the identification of individuals by means of measurable biological characteristics. Two of the most promising biometric modalities are iris and retina recognition, which primarily use nonionizing radiation in the infrared region. Illumination of the eye is achieved by infrared light emitting diodes (LEDs). Even if few LED sources are capable of causing direct eye damage as they emit incoherent light, there is a growing concern about the possible use of LED arrays that might pose a potential threat. Exposure to intense coherent infrared radiation has been proven to have significant effects on living tissues. The purpose of this study is to explore the biological effects arising from exposing the eye to near infrared radiation with reference to international legislation.

  16. Revealing of photon-number splitting attack on quantum key distribution system by photon-number resolving devices

    NASA Astrophysics Data System (ADS)

    Gaidash, A. A.; Egorov, V. I.; Gleim, A. V.

    2016-08-01

    Quantum cryptography allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source of quantum states. In order to prevent actions of an eavesdropper, it is generally suggested to implement special cryptographic protocols, like decoy states or SARG04. In this paper, we describe an alternative method based on monitoring photon number statistics after detection. We provide a useful rule of thumb to estimate approximate order of difference of expected distribution and distribution in case of attack. Formula for calculating a minimum value of total pulses or time-gaps to resolve attack is shown. Also formulas for actual fraction of raw key known to Eve were derived. This method can therefore be used with any system and even combining with mentioned special protocols.

  17. Space-brain: The negative effects of space exposure on the central nervous system.

    PubMed

    Jandial, Rahul; Hoshide, Reid; Waters, J Dawn; Limoli, Charles L

    2018-01-01

    Journey to Mars will be a large milestone for all humankind. Throughout history, we have learned lessons about the health dangers associated with exploratory voyages to expand our frontiers. Travelling through deep space, the final frontier, is planned for the 2030s by NASA. The lessons learned from the adverse health effects of space exposure have been encountered from previous, less-lengthy missions. Prolonged multiyear deep space travel to Mars could be encumbered by significant adverse health effects, which could critically affect the safety of the mission and its voyagers. In this review, we discuss the health effects of the central nervous system by space exposure. The negative effects from space radiation and microgravity have been detailed. Future aims and recommendations for the safety of the voyagers have been discussed. With proper planning and anticipation, the mission to Mars can be done safely and securely.

  18. Water security evaluation in Yellow River basin

    NASA Astrophysics Data System (ADS)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  19. Electrically Heated Testing of the Kilowatt Reactor Using Stirling Technology (KRUSTY) Experiment Using a Depleted Uranium Core

    NASA Technical Reports Server (NTRS)

    Briggs, Maxwell H.; Gibson, Marc A.; Sanzi, James

    2017-01-01

    The Kilopower project aims to develop and demonstrate scalable fission-based power technology for systems capable of delivering 110 kW of electric power with a specific power ranging from 2.5 - 6.5 Wkg. This technology could enable high power science missions or could be used to provide surface power for manned missions to the Moon or Mars. NASA has partnered with the Department of Energys National Nuclear Security Administration, Los Alamos National Labs, and Y-12 National Security Complex to develop and test a prototypic reactor and power system using existing facilities and infrastructure. This technology demonstration, referred to as the Kilowatt Reactor Using Stirling TechnologY (KRUSTY), will undergo nuclear ground testing in the summer of 2017 at the Nevada Test Site. The 1 kWe variation of the Kilopower system was chosen for the KRUSTY demonstration. The concept for the 1 kWe flight system consist of a 4 kWt highly enriched Uranium-Molybdenum reactor operating at 800 degrees Celsius coupled to sodium heat pipes. The heat pipes deliver heat to the hot ends of eight 125 W Stirling convertors producing a net electrical output of 1 kW. Waste heat is rejected using titanium-water heat pipes coupled to carbon composite radiator panels. The KRUSTY test, based on this design, uses a prototypic highly enriched uranium-molybdenum core coupled to prototypic sodium heat pipes. The heat pipes transfer heat to two Advanced Stirling Convertors (ASC-E2s) and six thermal simulators, which simulate the thermal draw of full scale power conversion units. Thermal simulators and Stirling engines are gas cooled. The most recent project milestone was the completion of non-nuclear system level testing using an electrically heated depleted uranium (non-fissioning) reactor core simulator. System level testing at the Glenn Research Center (GRC) has validated performance predictions and has demonstrated system level operation and control in a test configuration that replicates the one to be used at the Device Assembly Facility (DAF) at the Nevada National Security Site. Fabrication, assembly, and testing of the depleted uranium core has allowed for higher fidelity system level testing at GRC, and has validated the fabrication methods to be used on the highly enriched uranium core that will supply heat for the DAF KRUSTY demonstration.

  20. 31 CFR 357.22 - Transfers.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... AND BILLS HELD IN LEGACY TREASURY DIRECT Legacy Treasury Direct Book-Entry Securities System (Legacy...-entry system, and TreasuryDirect ®. A security may also be transferred between accounts in Legacy... system. A transfer of a security from Legacy Treasury Direct to the commercial book-entry system is...

  1. 32 CFR 637.20 - Security surveillance systems.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Security surveillance systems. 637.20 Section 637... ENFORCEMENT AND CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.20 Security surveillance systems. Closed circuit video recording systems, to include those with an audio capability, may be...

  2. 49 CFR 234.211 - Security of warning system apparatus.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Security of warning system apparatus. 234.211 Section 234.211 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD....211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall...

  3. 49 CFR 234.211 - Security of warning system apparatus.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Security of warning system apparatus. 234.211 Section 234.211 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD....211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall...

  4. 49 CFR 234.211 - Security of warning system apparatus.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Security of warning system apparatus. 234.211 Section 234.211 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD....211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall...

  5. Development of building security integration system using sensors, microcontroller and GPS (Global Positioning System) based android smartphone

    NASA Astrophysics Data System (ADS)

    Sihombing, P.; Siregar, Y. M.; Tarigan, J. T.; Jaya, I.; Turnip, A.

    2018-03-01

    Security system is one of the common problems to protect an environment such as personal house or a warehouse. There are numerous methods and technologies that can be used as part of a security system. In this paper, we present a security system that offers a better efficiency. The purpose of this study is to build a system that can monitor home security at any time in particular fire and theft. Through sensors, the system will be able to provide warning information of hazard conditions via LCD monitor, sound, and alarm. This information will be sent automatically to the home owner’s smartphone as well as to the corresponding to the security agency. Thus the prevention of theft and fire hazards can be immediately anticipated by the police and firefighters. The system will also notify the position of the coordinates of the location of the building (the house) by a link to the Google map in order to make it easier to get the location quickly.

  6. System and method for key generation in security tokens

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  7. 20 CFR 404.1903 - Negotiating totalization agreements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... security system of general application in effect. The system shall be considered to be in effect if it is collecting social security taxes or paying social security benefits. ... Section 404.1903 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND...

  8. A Hierarchical Security Architecture for Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  9. Monitoring system including an electronic sensor platform and an interrogation transceiver

    DOEpatents

    Kinzel, Robert L.; Sheets, Larry R.

    2003-09-23

    A wireless monitoring system suitable for a wide range of remote data collection applications. The system includes at least one Electronic Sensor Platform (ESP), an Interrogator Transceiver (IT) and a general purpose host computer. The ESP functions as a remote data collector from a number of digital and analog sensors located therein. The host computer provides for data logging, testing, demonstration, installation checkout, and troubleshooting of the system. The IT transmits signals from one or more ESP's to the host computer to the ESP's. The IT host computer may be powered by a common power supply, and each ESP is individually powered by a battery. This monitoring system has an extremely low power consumption which allows remote operation of the ESP for long periods; provides authenticated message traffic over a wireless network; utilizes state-of-health and tamper sensors to ensure that the ESP is secure and undamaged; has robust housing of the ESP suitable for use in radiation environments; and is low in cost. With one base station (host computer and interrogator transceiver), multiple ESP's may be controlled at a single monitoring site.

  10. Information Security and Integrity Systems

    NASA Technical Reports Server (NTRS)

    1990-01-01

    Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.

  11. Security and Privacy in Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Edgar, Thomas W.; Rice, Theora R.

    As you have seen from the previous chapters, cyber-physical systems (CPS) are broadly used across technology and industrial domains. While these systems enable process optimization and efficiency and allow previously impossible functionality, security and privacy are key concerns for their design, development, and operation. CPS have been key components utilized in some of the highest publicized security breaches over the last decade. In this chapter, we will look over the CPS described in the previous chapters from a security perspective. In this chapter, we explain classical information and physical security fundamentals in the context of CPS and contextualize them acrossmore » application domains. We give examples where the interplay of functionality and diverse communication can introduce unexpected vulnerabilities and produce larger impacts. We will discuss how CPS security and privacy is inherently different from that of pure cyber or physical systems and what may be done to secure these systems, considering their emergent cyber-physical properties. Finally, we will discuss security and privacy implications of merging infrastructural and personal CPS. Our hope is to impart the knowledge of what CPS security and privacy are, why they are important, and explain existing processes and challenges.« less

  12. Do You Take Credit Cards? Security and Compliance for the Credit Card Payment Industry

    ERIC Educational Resources Information Center

    Willey, Lorrie; White, Barbara Jo

    2013-01-01

    Security is a significant concern in business and in information systems (IS) education from both a technological and a strategic standpoint. Students can benefit from the study of information systems security when security concepts are introduced in the context of real-world industry standards. The development of a data security standard for…

  13. Radiation Detection at Borders for Homeland Security

    NASA Astrophysics Data System (ADS)

    Kouzes, Richard

    2004-05-01

    Countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders at land, rail, air, and sea ports of entry. These efforts include deployments in the US and a number of European and Asian countries by governments and international agencies. Items of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. Some cargo contains naturally occurring radioactive material (NORM) that triggers "nuisance" alarms in RPMs at these border crossings. Individuals treated with medical radiopharmaceuticals also produce nuisance alarms and can produce cross-talk between adjacent lanes of a multi-lane deployment. The operational impact of nuisance alarms can be significant at border crossings. Methods have been developed for reducing this impact without negatively affecting the requirements for interdiction of radioactive materials of interest. Plastic scintillator material is commonly used in RPMs for the detection of gamma rays from radioactive material, primarily due to the efficiency per unit cost compared to other detection materials. The resolution and lack of full-energy peaks in the plastic scintillator material prohibits detailed spectroscopy. However, the limited spectroscopic information from plastic scintillator can be exploited to provide some discrimination. Energy-based algorithms used in RPMs can effectively exploit the crude energy information available from a plastic scintillator to distinguish some NORM. Whenever NORM cargo limits the level of the alarm threshold, energy-based algorithms produce significantly better detection probabilities for small SNM sources than gross-count algorithms. This presentation discusses experience with RPMs for interdiction of radioactive materials at borders.

  14. Structure in Radiative Shocks

    NASA Astrophysics Data System (ADS)

    Drake, R. Paul; Visco, A.; Doss, F.; Reighard, A.; Froula, D.; Glenzer, S.; Knauer, J.

    2008-05-01

    Radiative shocks are shock waves fast enough that radiation from the shock-heated matter alters the structure of the shock. They are of fundamental interest to high-energy-density physics and also have applications throughout astrophysics. This poster will review the dimensionless parameters that determine structure in these shocks and will discuss recent experiments to measure such structure for strongly radiative shocks that are optically thin upstream and optically thick downstream. The shock transition itself heats mainly the ions. Immediately downstream of the shock, the ions heat the electrons and the electrons radiate, producing an optically thin cooling layer, followed by the downstream layer of warm, shocked material. The axial structure of these systems is of interest, because the transition from precursor through the cooling layer to the final state is complex and difficult to calculate. Their lateral structure is also of interest, as they seem likely to be subject to some variation on the Vishniac instability of thin layers. In our experiments to produce such shocks, laser ablation launches a Be plasma into a tube of Xe or Ar gas, at a velocity above 100 km/s. This drives a shock down the tube. Radiography provides fundamental information about the structure and evolution of the shocked material in Xe. Thomson scattering and pyrometry have provided data in Ar. We will summarize the available evidence regarding the properties of these shocks, and will discuss their connections to astrophysical cases. This research was sponsored by the National Nuclear Security Administration under the Stewardship Science Academic Alliances program through DOE Research Grants DE-FG52-07NA28058, DE-FG52-04NA00064, and other grants and contracts.

  15. Aviation security : vulnerabilities still exist in the aviation security system

    DOT National Transportation Integrated Search

    2000-04-06

    The testimony today discusses the Federal Aviation Administration's (FAA) efforts to implement and improve security in two key areas: air traffic control computer systems and airport passenger screening checkpoints. Computer systems-and the informati...

  16. 76 FR 18445 - Financial Market Utilities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... IOSCO jointly issued a set of minimum standards for securities settlement systems (the ``Recommendations for Securities Settlement Systems''). In 2004, the CPSS and IOSCO jointly published recommendations...,'' and collectively with the Recommendations for Securities Settlement Systems, the ``CPSS-IOSCO...

  17. A novel wireless local positioning system for airport (indoor) security

    NASA Astrophysics Data System (ADS)

    Zekavat, Seyed A.; Tong, Hui; Tan, Jindong

    2004-09-01

    A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).

  18. Cell biology and biotechnology research for exploration of the Moon and Mars

    NASA Astrophysics Data System (ADS)

    Pellis, N.; North, R.

    Health risks generated by human long exposure to radiation, microgravity, and unknown factors in the planetary environment are the major unresolved issues for human space exploration. A complete characterization of human and other biological systems adaptation processes to long-duration space missions is necessary for the development of countermeasures. The utilization of cell and engineered tissue cultures in space research and exploration complements research in human, animal, and plant subjects. We can bring a small number of humans, animals, or plants to the ISS, Moon, and Mars. However, we can investigate millions of their cells during these missions. Furthermore, many experiments can not be performed on humans, e.g. radiation exposure, cardiac muscle. Cells from critical tissues and tissue constructs per se are excellent subjects for experiments that address underlying mechanisms important to countermeasures. The development of cell tissue engineered for replacement, implantation of biomaterial to induce tissue regeneration (e.g. absorbable collagen matrix for guiding tissue regeneration in periodontal surgery), and immunoisolation (e.g. biopolymer coating on transplanted tissues to ward off immunological rejection) are good examples of cell research and biotechnology applications. NASA Cell Biology and Biotechnology research include Bone/Muscle and Cardiovascular cell culture and tissue engineering; Environmental Health and Life Support Systems; Immune System; Radiation; Gravity Thresholds ; and Advanced Biotechnology Development to increase the understanding of animal and plant cell adaptive behavior when exposed to space, and to advance technologies that facilitates exploration. Cell systems can be used to investigate processes related to food, microbial proliferation, waste management, biofilms and biomaterials. The NASA Cell Science Program has the advantage of conducting research in microgravity based on significantly small resources, and the ability to conduct experiments in the early phase of the development of requirements for exploration. Supporting the NASA concept of stepping stones, we believe that ground based, International Space Station, robotic and satellite missions offer the ideal environment to perform experiments and secure answers necessary for human exploration.

  19. Directionality of Skyshine Radiation

    NASA Astrophysics Data System (ADS)

    Kernan, Warnick; Conlin, Kenneth; Kouzes, Richard; Mace, Emily; Siciliano, Edward; Woodring, Mitchell

    2010-02-01

    Skyshine reflection, or the scattering off of the air above a source, is frequently observed in situations where large sources are incompletely shielded, such as radiography sources in shielding pits that are open to the sky. Originally, concern about skyshine regarded limiting the dose from the source. However, even in situations where dose is minimal, the contribution of skyshine may interfere with sensitive measurement instruments operating near background limits, such as with border security applications. To help determine effective methods for shielding sensitive detection systems from skyshine interference, a series of measurements and model simulations have been conducted using a specially configured, portable collimated detector and an iridium-192 source. This paper will report these results, and also show their similarity when compared to other measurements using different sources. )

  20. [Hygiene and security management in medical biology laboratory].

    PubMed

    Vinner, E; Odou, M F; Fovet, B; Ghnassia, J C

    2013-06-01

    Risk management in Medical Biology Laboratory (MBL) which includes hygiene and waste management, is an integrated process to the whole MBL organisation. It is composed of three stages: risks factors identification, grading and prioritization, and their evaluation in the system. From the legislation and NF EN ISO 15189 standard's requirements viewpoint, prevention and protection actions to implement are described, at premises level, but also at work station environment's one (human resources and equipments) towards biological, chemical, linked to gas, to ionizing or non ionizing radiations and fire riks, in order not to compromise patients safety, employees safety, and quality results. Then, although NF EN 15189 standard only enacts requirements in terms of prevention, curative actions after established blood or chemical exposure accident are defined.

  1. KSC-07pd1592

    NASA Image and Video Library

    2007-06-19

    KENNEDY SPACE CENTER, FLA. -- At Astrotech, technicians begin securing the sun shade over the high gain antenna on the Dawn spacecraft. Made of germanium kapton, the shade, which is RF transparent, is placed over the sensitive antenna to reflect and emit harmful solar radiation to prevent the antenna from being excessively heated. Dawn is scheduled to launch July 7 from Pad 17-B on Cape Canaveral Air Force Station. Dawn's goal is to characterize the conditions and processes of the solar system's earliest epoch by investigating in detail the largest protoplanets that have remained intact since their formations: asteroid Vesta and the dwarf planet Ceres. They reside in the extensive zone between Mars and Jupiter together with many other smaller bodies, called the asteroid belt. Photo credit: NASA/George Shelton

  2. KSC-07pd1593

    NASA Image and Video Library

    2007-06-19

    KENNEDY SPACE CENTER, FLA. -- At Astrotech, technicians are securing the sun shade over the high gain antenna on the Dawn spacecraft. Made of germanium kapton, the shade, which is RF transparent, is placed over the sensitive antenna to reflect and emit harmful solar radiation to prevent the antenna from being excessively heated. Dawn is scheduled to launch July 7 from Pad 17-B on Cape Canaveral Air Force Station. Dawn's goal is to characterize the conditions and processes of the solar system's earliest epoch by investigating in detail the largest protoplanets that have remained intact since their formations: asteroid Vesta and the dwarf planet Ceres. They reside in the extensive zone between Mars and Jupiter together with many other smaller bodies, called the asteroid belt. Photo credit: NASA/George Shelton

  3. [Big data, generalities and integration in radiotherapy].

    PubMed

    Le Fèvre, C; Poty, L; Noël, G

    2018-02-01

    The many advances in data collection computing systems (data collection, database, storage), diagnostic and therapeutic possibilities are responsible for an increase and a diversification of available data. Big data offers the capacities, in the field of health, to accelerate the discoveries and to optimize the management of patients by combining a large volume of data and the creation of therapeutic models. In radiotherapy, the development of big data is attractive because data are very numerous et heterogeneous (demographics, radiomics, genomics, radiogenomics, etc.). The expectation would be to predict the effectiveness and tolerance of radiation therapy. With these new concepts, still at the preliminary stage, it is possible to create a personalized medicine which is always more secure and reliable. Copyright © 2017. Published by Elsevier SAS.

  4. Multilayer limb quasi-static electromagnetic modeling with experiments for Galvanic coupling type IBC.

    PubMed

    Pun, S H; Gao, Y M; Mou, P A; Mak, P U; Vai, M I; Du, M

    2010-01-01

    Intra-body communication (IBC) is a new, emerging, short-range and human body based communication methodology. It is a technique to network various devices on human body, by utilizing the conducting properties of human tissues. For currently fast developed Body area network(BAN)/Body sensor network(BSN), IBC is believed to have advantages in power consumption, electromagnetic radiation, interference from external electromagnetic noise, security, and restriction in spectrum resource. In this article, the authors propose an improved mathematical model, which includes both electrical properties and proportion of human tissues, for IBC on a human limb. By solving the mathematical model analytically on four-layer system (skin, fat, muscle, and bone) and conducting in-vivo experiment, a comparison has been conducted.

  5. Scenario of a dirty bomb in an urban environment and acute management of radiation poisoning and injuries.

    PubMed

    Chin, F K C

    2007-10-01

    In the new security environment, there is a clear and present danger of terrorists using non-conventional weapons to inflict maximum psychological and economic damage on their targets. This article examines two scenarios of radiation contamination and injury, one accidental in nature leading to environmental contamination, and another of deliberate intent resulting in injury and death. This article also discusses the management of injury from radiological dispersion devices or dirty bombs, with emphasis on the immediate aftermath as well as strategy recommendations.

  6. 76 FR 28795 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-18

    ... 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary Database System of... Security/United States Coast Guard-024 Auxiliary Database (AUXDATA) System of Records.'' This system of... titled, ``DHS/USCG-024 Auxiliary Database (AUXDATA) System of Records.'' The AUXDATA system is the USCG's...

  7. 12 CFR 615.5560 - Book-entry Procedure for Farm Credit System Financial Assistance Corporation Securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... OPERATIONS Farm Credit System Financial Assistance Corporation Securities § 615.5560 Book-entry Procedure for Farm Credit System Financial Assistance Corporation Securities. (a) The Farm Credit System Financial... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Book-entry Procedure for Farm Credit System...

  8. 75 FR 28253 - Privacy Act of 1974; Notice of new System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-20

    ... certified by the National Computer Security Association. RETENTION AND DISPOSAL: System records are retained... Agency suspects or has confirmed that the security or confidentiality of information in the system of... security or integrity of this system or other systems or programs (whether maintained by GSA or another...

  9. Model based verification of the Secure Socket Layer (SSL) Protocol for NASA systems

    NASA Technical Reports Server (NTRS)

    Powell, John D.; Gilliam, David

    2004-01-01

    The National Aeronautics and Space Administration (NASA) has tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information theft, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach' offers formal verification of information technology (IT), through the creation of a Software Security Assessment Instrument (SSAI), to address software security risks.

  10. 2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference

    DTIC Science & Technology

    2017-11-15

    beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and

  11. 24 CFR 350.11 - Notice of Attachment for Ginnie Mae Securities in Book-entry System.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Securities in Book-entry System. 350.11 Section 350.11 Housing and Urban Development Regulations Relating to... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.11 Notice of Attachment for Ginnie Mae Securities in Book-entry System. The interest of a debtor in a Security Entitlement may be reached by a creditor only...

  12. 24 CFR 350.11 - Notice of Attachment for Ginnie Mae Securities in Book-entry System.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Securities in Book-entry System. 350.11 Section 350.11 Housing and Urban Development Regulations Relating to... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.11 Notice of Attachment for Ginnie Mae Securities in Book-entry System. The interest of a debtor in a Security Entitlement may be reached by a creditor only...

  13. 24 CFR 350.11 - Notice of Attachment for Ginnie Mae Securities in Book-entry System.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Securities in Book-entry System. 350.11 Section 350.11 Housing and Urban Development Regulations Relating to... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.11 Notice of Attachment for Ginnie Mae Securities in Book-entry System. The interest of a debtor in a Security Entitlement may be reached by a creditor only...

  14. A systematic literature review on security and privacy of electronic health record systems: technical perspectives.

    PubMed

    Rezaeibagha, Fatemeh; Win, Khin Than; Susilo, Willy

    Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.

  15. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  16. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  17. 24 CFR 350.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Security) maintained in the Book-entry System, as set forth in Federal Reserve Bank Operating Circulars. (b...: Book-entry Ginnie Mae Security. A Ginnie Mae Security issued or maintained in the Book-entry System... Reserve Banks. Book-entry System. The automated book-entry system operated by the Federal Reserve Banks...

  18. 33 CFR 104.260 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and inspected, tested, calibrated and maintained according to the manufacturer's recommendation. (b) The results...

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Halbgewachs, Ronald D.; Chavez, Adrian R.

    Process Control System (PCS) and Industrial Control System (ICS) security is critical to our national security. But there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. Sandia National Laboratories has performed the research and development of the OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy Office of Electricity Delivery and Energy Reliability (DOE/OE), to address this issue. OPSAID is an open-source architecture for PCS/ICS security that provides a design basis for vendors to build add-on security devices for legacy systems, whilemore » providing a path forward for the development of inherently-secure PCS elements in the future. Using standardized hardware, a proof-of-concept prototype system was also developed. This report describes the improvements and capabilities that have been added to OPSAID since an initial report was released. Testing and validation of this architecture has been conducted in another project, Lemnos Interoperable Security Project, sponsored by DOE/OE and managed by the National Energy Technology Laboratory (NETL).« less

  20. Method for secure electronic voting system: face recognition based approach

    NASA Astrophysics Data System (ADS)

    Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran

    2017-06-01

    In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.

Top