Sample records for sabotage nonradiological sabotage

  1. The Dyadic Construction of Romantic Conflict Recovery Sabotage

    PubMed Central

    Haydon, Katherine C.; Jonestrask, Cassandra; Guhn-Knight, Haley; Salvatore, Jessica E.

    2017-01-01

    This longitudinal study of 100 couples assessed individual and dyadic processes associated with romantic conflict recovery, or how couples behave in the moments following conflict. Couples completed measures of attachment anxiety and avoidance; a conflict discussion during which affect, behavior, and conflict resolution were coded; a cool-down discussion during which post-conflict behavior was coded; and measures of relationship satisfaction and stability one year later. Recovery sabotage (negative behavior and perseveration on conflict in the moments following conflict) was associated with high attachment anxiety and low avoidance. Recovery sabotage was unrelated to affect expressed during conflict and was instead tied to whether partners aired or suppressed grievances. Consistent with the demand-withdraw conflict pattern, recovery sabotage was associated with lower actor conflict avoidance but higher partner conflict avoidance. These effects were independent of conflict resolution, which was not significantly associated with recovery sabotage when other features of conflict were controlled. Recovery sabotage and conflict resolution also differentially predicted satisfaction and stability one year later. Findings suggest recovery sabotage is a distinct, developmentally organized relationship process tied to attachment history and behavioral, rather than affective, transactions between partners during conflict. PMID:29398761

  2. Sabotage at Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Purvis, James W.

    1999-07-21

    Recently there has been a noted worldwide increase in violent actions including attempted sabotage at nuclear power plants. Several organizations, such as the International Atomic Energy Agency and the US Nuclear Regulatory Commission, have guidelines, recommendations, and formal threat- and risk-assessment processes for the protection of nuclear assets. Other examples are the former Defense Special Weapons Agency, which used a risk-assessment model to evaluate force-protection security requirements for terrorist incidents at DOD military bases. The US DOE uses a graded approach to protect its assets based on risk and vulnerability assessments. The Federal Aviation Administration and Federal Bureau of Investigationmore » conduct joint threat and vulnerability assessments on high-risk US airports. Several private companies under contract to government agencies use formal risk-assessment models and methods to identify security requirements. The purpose of this paper is to survey these methods and present an overview of all potential types of sabotage at nuclear power plants. The paper discusses emerging threats and current methods of choice for sabotage--especially vehicle bombs and chemical attacks. Potential consequences of sabotage acts, including economic and political; not just those that may result in unacceptable radiological exposure to the public, are also discussed. Applicability of risk-assessment methods and mitigation techniques are also presented.« less

  3. Ranking of sabotage/tampering avoidance technology alternatives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Andrews, W.B.; Tabatabai, A.S.; Powers, T.B.

    1986-01-01

    Pacific Northwest Laboratory conducted a study to evaluate alternatives to the design and operation of nuclear power plants, emphasizing a reduction of their vulnerability to sabotage. Estimates of core melt accident frequency during normal operations and from sabotage/tampering events were used to rank the alternatives. Core melt frequency for normal operations was estimated using sensitivity analysis of results of probabilistic risk assessments. Core melt frequency for sabotage/tampering was estimated by developing a model based on probabilistic risk analyses, historic data, engineering judgment, and safeguards analyses of plant locations where core melt events could be initiated. Results indicate the most effectivemore » alternatives focus on large areas of the plant, increase safety system redundancy, and reduce reliance on single locations for mitigation of transients. Less effective options focus on specific areas of the plant, reduce reliance on some plant areas for safe shutdown, and focus on less vulnerable targets.« less

  4. When Sisterly Support Changes to Sabotage

    ERIC Educational Resources Information Center

    Brock, Barbara L.

    2008-01-01

    Although research on women's leadership extols the benefits of women's professional collaborations and mentorship, one cannot assume that all women are trustworthy and supportive of other women. This qualitative study explored the phenomenon of professional sabotage among women in educational leadership. Results revealed that, although women who…

  5. "Set Up to Fail": Institutional Racism and the Sabotage of School Improvement

    ERIC Educational Resources Information Center

    Taylor, Dianne L.; Clark, Menthia P.

    2009-01-01

    Data from two previous studies are reanalyzed using the lens of institutional racism to examine district decisions that undermined, or sabotaged, improvement efforts at schools attended by students of color. Opportunities to rectify the sabotage were available but not pursued. A model portrays the interaction between decision-maker intent,…

  6. Self-Sabotage in the Academic Career

    ERIC Educational Resources Information Center

    Sternberg, Robert J.

    2013-01-01

    Pogo recognized long ago that we often are our own worst enemies. Sure, he was a cartoon character, but he had a point--especially in higher education, where self-sabotage seems to be a standard characteristic of academic careers. In the author's 30 years as a professor, five years as a dean, and three years as a provost, he has observed many…

  7. Birth control sabotage and forced sex: experiences reported by women in domestic violence shelters.

    PubMed

    Thiel de Bocanegra, Heike; Rostovtseva, Daria P; Khera, Satin; Godhwani, Nita

    2010-05-01

    Women who experience intimate partner violence often experience birth control sabotage, forced sex, and partner's unwillingness to use condoms. We interviewed 53 women at four domestic violence shelters. Participants reported that their abusive partners frequently refused to use condoms, impeded them from accessing health care, and subjected them to birth control sabotage, infidelity, and forced sex. However, women also reported strategies to counteract these actions, particularly against birth control sabotage and attempts to force them to abort or continue a pregnancy. Domestic violence counselors can focus on these successful strategies to validate coping skills and build self-esteem.

  8. Getting even for customer mistreatment: the role of moral identity in the relationship between customer interpersonal injustice and employee sabotage.

    PubMed

    Skarlicki, Daniel P; van Jaarsveld, Danielle D; Walker, David D

    2008-11-01

    Research on the "dark side" of organizational behavior has determined that employee sabotage is most often a reaction by disgruntled employees to perceived mistreatment. To date, however, most studies on employee retaliation have focused on intra-organizational sources of (in)justice. Results from this field study of customer service representatives (N = 358) showed that interpersonal injustice from customers relates positively to customer-directed sabotage over and above intra-organizational sources of fairness. Moreover, the association between unjust treatment and sabotage was moderated by 2 dimensions of moral identity (symbolization and internalization) in the form of a 3-way interaction. The relationship between injustice and sabotage was more pronounced for employees high (vs. low) in symbolization, but this moderation effect was weaker among employees who were high (vs. low) in internalization. Last, employee sabotage was negatively related to job performance ratings.

  9. Plague and Paideia: Sabotage in Devising Theatre with Young People

    ERIC Educational Resources Information Center

    Wessels, Anne

    2012-01-01

    This ethnography, completed by the classroom teacher in a publicly funded secondary school in Mississauga, Canada, explores issues of conflict and sabotage that affected a devising project with suburban young people. The processes of devising generated ethnographic data that included a play script and videotaped rehearsals and performances. As…

  10. Are you being sabotaged by your coworkers?

    PubMed

    Ferrara-Love, R

    1998-10-01

    Men and women are both guilty of sabotaging coworkers, but men and women do it differently and for different reasons. Men tend to do it more overtly and for more work-related reasons. However, women are more covert; their reasons are motivated more by jealousy of another's success or their own insecurity. Once women are betrayed by another, they take it more personally than their male counterparts. Men confront the betrayer and move on; that is business. Women do not confront the betrayer and see betrayal in the workplace as being let down by their friends. Women need to treat business relationships and situations as business, not as friendships.

  11. Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis

    DTIC Science & Technology

    2006-12-01

    had drawn attention by displaying concerning behaviors prior to the act of sabotage [Keeney 2005]. These behaviors included • tardiness , truancy... Philippines , Joseph Estrada, visiting the presidential palace with his wife and traveling to the Philippines to visit Estrada in the hospital. This...Aragoncillo was not authorized to view, access, download, or print information related to the Philippines —he had no need to know. However, this lack

  12. Semiochemical sabotage: behavioral chemicals for protection of western conifers from bark beetles

    Treesearch

    Nancy. E. Gillette; A. Steve Munson

    2009-01-01

    The discovery and elucidation of volatile behavioral chemicals used by bark beetles to locate hosts and mates has revealed a rich potential for humans to sabotage beetle host-finding and reproduction. Here, we present a description of currently available semiochemical methods for use in monitoring and controlling bark beetle pests in western conifer forests. Delivery...

  13. Initiation of depleted uranium oxide and spent fuel testing for the spent fuel sabotage aerosol ratio program.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gregson, Michael Warren; Mo, Tin; Sorenson, Ken Bryce

    The authors provide a detailed overview of an on-going, multinational test program that is developing aerosol data for some spent fuel sabotage scenarios on spent fuel transport and storage casks. Experiments are being performed to quantify the aerosolized materials plus volatilized fission products generated from actual spent fuel and surrogate material test rods, due to impact by a high-energy-density device. The program participants in the United States plus Germany, France and the United Kingdom, part of the international Working Group for Sabotage Concerns of Transport and Storage Casks (WGSTSC) have strongly supported and coordinated this research program. Sandia National Laboratoriesmore » has the lead role for conducting this research program; test program support is provided by both the US Department of Energy and the US Nuclear Regulatory Commission. The authors provide a summary of the overall, multiphase test design and a description of all explosive containment and aerosol collection test components used. They focus on the recently initiated tests on 'surrogate' spent fuel, unirradiated depleted uranium oxide and forthcoming actual spent fuel tests, and briefly summarize similar results from completed surrogate tests that used non-radioactive, sintered cerium oxide ceramic pellets in test rods.« less

  14. Conflict of interest between a nematode and a trematode in an amphipod host: Test of the "sabotage" hypothesis

    USGS Publications Warehouse

    Thomas, Frédéric; Fauchier, Jerome; Lafferty, Kevin D.

    2002-01-01

    Microphallus papillorobustus is a manipulative trematode that induces strong behavioural alterations in the gamaridean amphipod Gammarus insensibilis, making the amphipod more vulnerable to predation by aquatic birds (definitive hosts). Conversely, the sympatric nematodeGammarinema gammari uses Gammarus insensibilis as a habitat and a source of nutrition. We investigated the conflict of interest between these two parasite species by studying the consequences of mixed infection on amphipod behaviour associated with the trematode. In the field, some amphipods infected by the trematode did not display the altered behaviour. These normal amphipods also had more nematodes, suggesting that the nematode overpowered the manipulation of the trematode, a strategy that would prolong the nematode's life. We hypothesize that sabotage of the trematode by the nematode would be an adaptive strategy for the nematode consistent with recent speculation about co-operation and conflict in manipulative parasites. A behavioural test conducted in the laboratory from naturally infected amphipods yielded the same result. However, exposing amphipods to nematodes did not negate or decrease the manipulation exerted by the trematode. Similarly, experimental elimination of nematodes from amphipods did not permit trematodes to manipulate behaviour. These experimental data do not support the hypothesis that the negative association between nematodes and manipulation by the trematode is a result of the "sabotage" hypothesis.

  15. Pseudomonas aeruginosa sabotages the generation of host proresolving lipid mediators

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Flitter, Becca A.; Hvorecny, Kelli L.; Ono, Emiko

    Recurrent Pseudomonas aeruginosa infections coupled with robust, damaging neutrophilic inflammation characterize the chronic lung disease cystic fibrosis (CF). The proresolving lipid mediator, 15-epi lipoxin A4 (15-epi LXA4), plays a critical role in limiting neutrophil activation and tissue inflammation, thus promoting the return to tissue homeostasis. Here, we show that a secreted P. aeruginosa epoxide hydrolase, cystic fibrosis transmembrane conductance regulator inhibitory factor (Cif), can disrupt 15-epi LXA4 transcellular biosynthesis and function. In the airway, 15-epi LXA4 production is stimulated by the epithelial-derived eicosanoid 14,15-epoxyeicosatrienoic acid (14,15-EET). Cif sabotages the production of 15-epi LXA4 by rapidly hydrolyzing 14,15-EET into its cognatemore » diol, eliminating a proresolving signal that potently suppresses IL-8–driven neutrophil transepithelial migration in vitro. Retrospective analyses of samples from patients with CF supported the translational relevance of these preclinical findings. Elevated levels of Cif in bronchoalveolar lavage fluid were correlated with lower levels of 15-epi LXA4, increased IL-8 concentrations, and impaired lung function. Together, these findings provide structural, biochemical, and immunological evidence that the bacterial epoxide hydrolase Cif disrupts resolution pathways during bacterial lung infections. The data also suggest that Cif contributes to sustained pulmonary inflammation and associated loss of lung function in patients with CF.« less

  16. FRAUD/SABOTAGE Killing Nuclear-Reactors!!! ``Super"alloys GENERIC ENDEMIC Wigner's-Disease IN-stability!!!

    NASA Astrophysics Data System (ADS)

    Asphahani, Aziz; Siegel, Sidney; Siegel, Edward

    2010-03-01

    Siegel [[J.Mag.Mag.Mtls.7,312(78); PSS(a)11,45(72); Semis.& Insuls.5(79)] (at: ORNL, ANS, Westin``KL"ouse, PSEG, IAEA, ABB) warning of old/new nuclear-reactors/spent-fuel-casks/refineries/ jet/missile/rocket-engines austenitic/FCC Ni/Fe-based (so MIS- called)``super"alloys(182/82;Hastelloy-X; 600;304/304L-SSs; 690 !!!) GENERIC ENDEMIC EXTANT detrimental(synonyms): Wigner's- diseas(WD)[J.Appl.Phys.17,857(46)]; Ostwald-ripening; spinodal- decomposition; overageing-embrittlement; thermomechanical- INstability: Mayo[Google: ``If Leaks Could Kill"; at flickr.com search on ``Giant-Magnotoresistance"; find: [Siegel<<<``Fert"(88) 2007-Nobel/Wolf/Japan-prizes]necessitating NRC inspections on 40+25=65 Westin``KL"ouse PWRs(12/06)]; Lai[Met.Trans.AIME,9A,827 (78)]-Sabol-Stickler[PSS(70)]; Ashpahani[Intl.Conf. H in Metals (77)]; Russell[Prog. Mtls.Sci.(83)]; Pollard[last UCS rept. (9/95)]; Lofaro[BNL/DOE/NRC Repts.]; Pringle[Nuclear-Power:From Physics to Politics(79)]; Hoffman[animatedsoftware.com],...what DOE/NRC MISlabels as ``butt-welds" ``stress-corrosion cracking" endpoint's ROOT-CAUSE ULTIMATE-ORIGIN is WD overageing-embrit- tlement caused brittle-fracture cracking from early/ongoing AEC/DOE-n``u''tional-la``v''atories sabotage!!!

  17. FRAUD/SABOTAGE Killing Nuclear-Reactors Need Modeling!!!: "Super"alloys GENERIC ENDEMIC Wigner's-Disease/.../IN-stability: Ethics? SHMETHICS!!!

    NASA Astrophysics Data System (ADS)

    Asphahani, Aziz; Siegel, Sidney; Siegel, Edward

    2010-03-01

    Carbides solid-state chemistry domination of old/new nuclear- reactors/spent-fuel-casks/refineries/jet/missile/rocket-engines in austenitic/FCC Ni/Fe-based(so miscalled)``super"alloys(182/82; Hastelloy-X,600,304/304L-SSs,...,690!!!) GENERIC ENDEMIC EXTANT detrimental(synonyms): Wigner's-diseas(WD)[J.Appl.Phys.17,857 (1946)]/Ostwald-ripening/spinodal-decomposition/overageing- embrittlement/thermal-leading-to-mechanical(TLTM)-INstability: Mayo[Google:``If Leaks Could Kill"; at flickr.com search on ``Giant-Magnotoresistance"; find: Siegel[J.Mag.Mag.Mtls.7,312 (1978)]<<<``Fert"-"Gruenberg"(1988/89)2007-physics Nobel/Wolf/ Japan-prizes]necessitating NRC-inspections of 40+25 = 65 Westin- ``KLouse PWRs(12/2006)]-Lai[Met.Trans.AIME,9A,827(1978)]-Sabol- Stickler[Phys.Stat.Sol.(1970)]-Ashpahani[Intl.Conf. H in Metals, Paris(1977]-Russell[Prog.Mtls.Sci.(1983)]-Pollard[last UCS rept. (9/1995)]-Lofaro[BNL/DOE/NRC Repts.]-Pringle[Nuclear-Power:From Physics to Politics(1979)]-Hoffman[animatedsoftware.com], what DOE/NRC MISlabels as ``butt-welds" ``stress-corrosion cracking" endpoint's ROOT-CAUSE ULTIMATE-ORIGIN is WD overageing-embritt- lement caused brittle-fracture cracking from early/ongoing AEC/ DOE-n"u"tional-la"v"atories sabotage!!!

  18. FRAUD/SABOTAGE Killing Nuclear-Reactors Need Modeling!!!: ``Super'' alloys GENERIC ENDEMIC Wigner's-Disease/.../IN-stability: Ethics? SHMETHICS!!!

    NASA Astrophysics Data System (ADS)

    O'Grady, Joseph; Bument, Arlden; Siegel, Edward

    2011-03-01

    Carbides solid-state chemistry domination of old/new nuclear-reactors/spent-fuel-casks/refineries/jet/missile/rocket-engines is austenitic/FCC Ni/Fe-based (so miscalled)"super"alloys(182/82;Hastelloy-X,600,304/304L-SSs,...690!!!) GENERIC ENDEMIC EXTANT detrimental(synonyms): Wigner's-disease(WD) [J.Appl.Phys.17,857 (46)]/Ostwald-ripening/spinodal-decomposition/overageing-embrittlement/thermal-leading-to-mechanical(TLTM)-INstability: Mayo[Google: fLeaksCouldKill > ; - Siegel [ J . Mag . Mag . Mtls . 7 , 312 (78) = atflickr . comsearchonGiant - Magnotoresistance [Fert" [PRL(1988)]-"Gruenberg"[PRL(1989)] 2007-Nobel]necessitating NRC inspections on 40+25=65 Westin"KL"ouse PWRs(12/2006)]-Lai [Met.Trans.AIME, 9A,827(78)]-Sabol-Stickler[Phys.Stat.Sol.(70)]-Ashpahani[ Intl.Conf. Hydrogen in Metals, Paris(1977]-Russell [Prog.Mtls.Sci.(1983)]-Pollard [last UCS rept.(9/1995)]-Lofaro [BNL/DOE/NRC Repts.]-Pringle [ Nuclear-Power:From Physics to Politics(1979)]-Hoffman [animatedsoftware.com], what DOE/NRC MISlabels as "butt-welds" "stress-corrosion cracking" endpoint's ROOT-CAUSE ULTIMATE-ORIGIN is WD overageing-embrittlement caused brittle-fracture cracking from early/ongoing AEC/DOE-n"u"tional-la"v"atories sabotage!!!

  19. Extending the multifoci perspective: The role of supervisor justice and moral identity in the relationship between customer justice and customer-directed sabotage.

    PubMed

    Skarlicki, Daniel P; van Jaarsveld, Danielle D; Shao, Ruodan; Song, Young Ho; Wang, Mo

    2016-01-01

    The multifoci perspective of justice proposes that individuals tend to target their (in)justice reactions toward the perceived source of the mistreatment. Empirical support for target-specific reactions, however, has been mixed. To explore theoretically relevant reasons for these discrepant results and address unanswered questions in the multifoci justice literature, the present research examines how different justice sources might interactively predict target-specific reactions, and whether these effects occur as a function of moral identity. Results from a sample of North American frontline service employees (N = 314, Study 1) showed that among employees with lower levels of moral identity, low supervisor justice exacerbated the association between low customer justice and customer-directed sabotage, whereas this exacerbation effect was not observed among employees with higher levels of moral identity. This 3-way interaction effect was replicated in a sample of South Korean employees (N = 265, Study 2). (c) 2016 APA, all rights reserved).

  20. Open literature review of threats including sabotage and theft of fissile material transport in Japan.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically andmore » religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.« less

  1. 10 CFR 73.55 - Requirements for physical protection of licensed activities in nuclear power reactors against...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... sabotage vehicle bomb assault. (i) Land vehicles. Licensees shall: (A) Design, construct, install, and... fuel sabotage against the effects of the design basis threat of radiological sabotage land vehicle bomb...

  2. 75 FR 81856 - Security Zone, Michoud Slip Position 30°0′34.2″ N, 89°55′40.7″ W to Position 30°0′29.5″ N, 89°55...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ... preventer and adjacent piers and infrastructure from destruction, loss or injury from sabotage or other... and adjacent piers and infrastructure from destruction, loss or injury from sabotage or other... preventer and adjacent piers and infrastructure from destruction, loss or injury from sabotage or other...

  3. Vital area identification for U.S. Nuclear Regulatory Commission nuclear power reactor licensees and new reactor applicants.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitehead, Donnie Wayne; Varnado, G. Bruce

    2008-09-01

    U.S. Nuclear Regulatory Commission nuclear power plant licensees and new reactor applicants are required to provide protection of their plants against radiological sabotage, including the placement of vital equipment in vital areas. This document describes a systematic process for the identification of the minimum set of areas that must be designated as vital areas in order to ensure that all radiological sabotage scenarios are prevented. Vital area identification involves the use of logic models to systematically identify all of the malicious acts or combinations of malicious acts that could lead to radiological sabotage. The models available in the plant probabilisticmore » risk assessment and other safety analyses provide a great deal of the information and basic model structure needed for the sabotage logic model. Once the sabotage logic model is developed, the events (or malicious acts) in the model are replaced with the areas in which the events can be accomplished. This sabotage area logic model is then analyzed to identify the target sets (combinations of areas the adversary must visit to cause radiological sabotage) and the candidate vital area sets (combinations of areas that must be protected against adversary access to prevent radiological sabotage). Any one of the candidate vital area sets can be selected for protection. Appropriate selection criteria will allow the licensee or new reactor applicant to minimize the impacts of vital area protection measures on plant safety, cost, operations, or other factors of concern.« less

  4. Stop Sabotaging Feedback

    ERIC Educational Resources Information Center

    Stone, Douglas; David-Lang, Jenn

    2017-01-01

    School leaders need to be able to give and receive feedback--to give it skillfully to teachers, and to receive it skillfully from, well, everyone. Most educators agree that feedback can be necessary and helpful--yet the unending cascade of new directives governing feedback often feel like a waste of time. In this article, the authors offer…

  5. 48 CFR 1852.223-75 - Major breach of safety or security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major...

  6. 48 CFR 1852.223-75 - Major breach of safety or security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major...

  7. 48 CFR 1852.223-75 - Major breach of safety or security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major...

  8. 48 CFR 1852.223-75 - Major breach of safety or security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major... of safeguarding against espionage, sabotage, crime (including computer crime), or attack. A major...

  9. 33 CFR 125.19 - Standards.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... espionage, sabotage, sedition or treason, or conspiring with, or aiding or abetting another to commit such..., including vessels and harbor craft therein; arson, unlawful trafficking in drugs, espionage, sabotage, or...

  10. 33 CFR 125.19 - Standards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... espionage, sabotage, sedition or treason, or conspiring with, or aiding or abetting another to commit such..., including vessels and harbor craft therein; arson, unlawful trafficking in drugs, espionage, sabotage, or...

  11. 33 CFR 125.19 - Standards.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... espionage, sabotage, sedition or treason, or conspiring with, or aiding or abetting another to commit such..., including vessels and harbor craft therein; arson, unlawful trafficking in drugs, espionage, sabotage, or...

  12. 33 CFR 125.19 - Standards.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... espionage, sabotage, sedition or treason, or conspiring with, or aiding or abetting another to commit such..., including vessels and harbor craft therein; arson, unlawful trafficking in drugs, espionage, sabotage, or...

  13. Sabotaging the California Dream

    ERIC Educational Resources Information Center

    Piland, William E.

    2004-01-01

    Higher education, the California dream for well over 2 million undergraduate students, is turning into a nightmare. The Golden State's promise of unparalleled access to community colleges and universities is fast becoming a tarnished relic of the past. And this state of affairs is occurring at a time when the demand for higher education has never…

  14. 28 CFR 12.22 - Material contents of registration statement.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1... detailed statement setting forth the nature of the registrant's knowledge of the espionage... instruction or training received by the registrant in the espionage, counterespionage, or sabotage service or...

  15. 28 CFR 12.22 - Material contents of registration statement.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1... detailed statement setting forth the nature of the registrant's knowledge of the espionage... instruction or training received by the registrant in the espionage, counterespionage, or sabotage service or...

  16. 28 CFR 12.22 - Material contents of registration statement.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1... detailed statement setting forth the nature of the registrant's knowledge of the espionage... instruction or training received by the registrant in the espionage, counterespionage, or sabotage service or...

  17. 28 CFR 12.22 - Material contents of registration statement.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1... detailed statement setting forth the nature of the registrant's knowledge of the espionage... instruction or training received by the registrant in the espionage, counterespionage, or sabotage service or...

  18. 28 CFR 12.22 - Material contents of registration statement.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1... detailed statement setting forth the nature of the registrant's knowledge of the espionage... instruction or training received by the registrant in the espionage, counterespionage, or sabotage service or...

  19. Software Security Assurance: A State-of-Art Report (SAR)

    DTIC Science & Technology

    2007-07-31

    foes. Subversion or sabotage of a software-based temperature control in a nuclear power plant could result in a meltdown, while sabotage of avionic... resulting from research and development activities, and provide a comprehensive assessment of IA technologies. Topic areas for SOARs are solicited...243 6.1.11.1 Recent Research Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 6.2

  20. Fluff-thieving birds sabotage seed dispersal

    PubMed Central

    2017-01-01

    Characterizing many species interactions as mutualisms can be misleading because some members of the interaction derive greater fitness benefits at the expense of other members. We provide detailed natural history data on a suspected bird–plant mutualism in South Africa where many species of birds use fluffy Eriocephalus seed material to construct their nests, potentially dispersing seeds for the plant. We focus on a common bird, Prinia maculosa, which invests heavily in gathering Eriocephalus material. Prinias spent 5 of their median 6-day nest construction period adding seed material to their nests and frequently travelled outside their territory boundary to gather Eriocephalus material. Yet, prinias gathered primarily Eriocephalus fluff and actively avoided gathering seeds. The average prinia nest contained only 6.6 seeds, but contained fluff from 579 seeds. These data suggest that prinias provide limited dispersal benefits to Eriocephalus plants. By contrast, the large amounts of Eriocephalus fluff in prinia nests, and the effort that prinias invest in gathering it, suggest that prinias benefit from constructing their nests with Eriocephalus material. We end by outlining hypotheses for possible fitness benefits that Eriocephalus material could provide prinias and other birds. PMID:28280552

  1. Fluff-thieving birds sabotage seed dispersal.

    PubMed

    Rohwer, Vanya G; Pauw, Anton; Martin, Paul R

    2017-01-01

    Characterizing many species interactions as mutualisms can be misleading because some members of the interaction derive greater fitness benefits at the expense of other members. We provide detailed natural history data on a suspected bird-plant mutualism in South Africa where many species of birds use fluffy Eriocephalus seed material to construct their nests, potentially dispersing seeds for the plant. We focus on a common bird, Prinia maculosa , which invests heavily in gathering Eriocephalus material. Prinias spent 5 of their median 6-day nest construction period adding seed material to their nests and frequently travelled outside their territory boundary to gather Eriocephalus material. Yet, prinias gathered primarily Eriocephalus fluff and actively avoided gathering seeds. The average prinia nest contained only 6.6 seeds, but contained fluff from 579 seeds. These data suggest that prinias provide limited dispersal benefits to Eriocephalus plants. By contrast, the large amounts of Eriocephalus fluff in prinia nests, and the effort that prinias invest in gathering it, suggest that prinias benefit from constructing their nests with Eriocephalus material. We end by outlining hypotheses for possible fitness benefits that Eriocephalus material could provide prinias and other birds.

  2. 44 CFR 321.4 - Achieving production readiness.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... sabotage through adequate physical security measures. (iv) Protection of personnel from widespread...

  3. 44 CFR 321.4 - Achieving production readiness.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... sabotage through adequate physical security measures. (iv) Protection of personnel from widespread...

  4. 44 CFR 321.4 - Achieving production readiness.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... sabotage through adequate physical security measures. (iv) Protection of personnel from widespread...

  5. 44 CFR 321.4 - Achieving production readiness.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... sabotage through adequate physical security measures. (iv) Protection of personnel from widespread...

  6. 75 FR 29695 - Security Zones; Sabine Bank Channel, Sabine Pass Channel and Sabine-Neches Waterway, TX

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-27

    ... regime designed to safeguard human life, vessels, and waterfront facilities against sabotage or terrorist... effect on the human environment. A preliminary environmental analysis checklist supporting this...

  7. Nuclear and radiological Security: Introduction.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miller, James Christopher

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of themore » various entities involved in nuclear security.« less

  8. 78 FR 50313 - Physical Protection of Irradiated Reactor Fuel in Transit

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-19

    ... 100 Grams,'' dated October 10, 2002, and subsequent similar security orders issued to licensees... than 100 grams from theft, diversion, or radiological sabotage. The requirements in the final rule...

  9. Behavioral Sabotage of Plant Defenses by Insect Folivores.

    PubMed

    Dussourd, David E

    2017-01-31

    Plant susceptibility to herbivore attack is determined not just by the suite of defenses present in different tissues of the plant, but also by the capabilities of the herbivore for tolerating, circumventing, or disarming the defenses. This article reviews the elaborate behaviors exhibited by leaf-chewing insects that appear to function specifically to deactivate hostplant defenses. Shortcomings in our understanding and promising areas for future research are highlighted. Behaviors covered include vein cutting, trenching, girdling, leaf clipping, and application of fluids from exocrine glands. Many of these behaviors have a widespread distribution, having evolved independently in multiple insect lineages. Insects utilizing the behaviors include significant agricultural, horticultural, and forestry pests, as well as numerous species important in natural ecosystems. Behavioral, ecological, and phylogenetic studies have documented the importance of the behaviors and their ancient history, but the molecular analysis of how the behaviors affect plant physiology has scarcely begun.

  10. Added Sugar: Don't Get Sabotaged by Sweeteners

    MedlinePlus

    ... preserve foods, such as jams and jellies Fuels fermentation, which enables bread to rise Serves as a ... whole-grain crackers and low-fat, low-calorie yogurt instead of candy, pastries and cookies. By limiting ...

  11. 33 CFR 125.19 - Standards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., including vessels and harbor craft therein; arson, unlawful trafficking in drugs, espionage, sabotage, or treason. (h) Drunkenness on the job or addiction to the use of narcotic drugs, without adequate evidence...

  12. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... property or persons in the United States in any manner by sabotage or by use of bombs, shellfire, or atomic... special weapons; unexploded bomb reconnaissance; essential debris clearance; emergency welfare measures...

  13. 44 CFR 312.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... property or persons in the United States in any manner by sabotage or by use of bombs, shellfire, or atomic... special weapons; unexploded bomb reconnaissance; essential debris clearance; emergency welfare measures...

  14. 20 CFR 404.465 - Conviction for subversive activities; effect on monthly benefits and entitlement to hospital...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... a pardon of the offense by the President of the United States, such penalty is not applied in... espionage and censorship), chapter 105 (relating to sabotage), or chapter 115 (relating to treason, sedition...

  15. Transportation of radionuclides in urban environs: draft environmental assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Finley, N.C.; Aldrich, D.C.; Daniel, S.L.

    1980-07-01

    This report assesses the environmental consequences of the transportation of radioactive materials in densely populated urban areas, including estimates of the radiological, nonradiological, and social impacts arising from this process. The chapters of the report and the appendices which follow detail the methodology and results for each of four causative event categories: incident free transport, vehicular accidents, human errors or deviations from accepted quality assurance practices, and sabotage or malevolent acts. The numerical results are expressed in terms of the expected radiological and economic impacts from each. Following these discussions, alternatives to the current transport practice are considered. Then, themore » detailed analysis is extended from a limited area of New York city to other urban areas. The appendices contain the data bases and specific models used to evaluate these impacts, as well as discussions of chemical toxicity and the social impacts of radioactive material transport in urban areas. The latter are evaluated for each causative event category in terms of psychological, sociological, political, legal, and organizational impacts. The report is followed by an extensive bibliography covering the many fields of study which were required in performing the analysis.« less

  16. Lessons Learned, Headquarters, 2d Infantry Division

    DTIC Science & Technology

    responsibilities under the Armistice Agreement of 1953 in sector; (2) conduct anti-infiltration, anti-raiding, counter-espionage, and counter-sabotage activities; and (3) implement 2d Infantry Division portion of EUSA Cold War program.

  17. Computer Security for the Computer Systems Manager.

    DTIC Science & Technology

    1982-12-01

    power sources essential to system availabilit y. Environsental degradation can cause system collapse or simply make the arer uncomforable work in...attack (civil disobedience, military as- sault, arson, locting, sabotage, vanlilism) * fire • smoke, dust, and dirt intrusion * bursting water pipes

  18. 10 CFR 1045.15 - Classification and declassification presumptions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... experimental physics, engineering, materials science, biology and medicine; (2) Magnetic confinement fusion... the application of the criteria in § 1045.16 indicates otherwise: (1) Detailed designs, specifications... design and analysis of nuclear weapons; (3) Vulnerabilities of U.S. nuclear weapons to sabotage...

  19. 10 CFR 1045.15 - Classification and declassification presumptions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... experimental physics, engineering, materials science, biology and medicine; (2) Magnetic confinement fusion... the application of the criteria in § 1045.16 indicates otherwise: (1) Detailed designs, specifications... design and analysis of nuclear weapons; (3) Vulnerabilities of U.S. nuclear weapons to sabotage...

  20. 15. DETAIL EXTERIOR VIEW LOOKING NORTH SHOWING REINFORCED CONCRETE PILLBOX ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    15. DETAIL EXTERIOR VIEW LOOKING NORTH SHOWING REINFORCED CONCRETE PILLBOX ON BRADFORD ISLAND END OF DAM/SPILLWAY; THE PILLBOX WAS BUILT DURING WORLD WAR II TO HELP PROTECT THE DAM/SPILLWAY FROM SABOTAGE. - Bonneville Project, Bonneville Dam, Columbia River, Bonneville, Multnomah County, OR

  1. 28 CFR 12.21 - Time within which registration statement must be filed.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Time within which registration statement must be filed. 12.21 Section 12.21 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...

  2. 28 CFR 12.70 - Partial compliance not deemed compliance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Partial compliance not deemed compliance. 12.70 Section 12.70 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...

  3. 28 CFR 12.3 - Prior registration with the Foreign Agents Registration Unit.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Prior registration with the Foreign Agents Registration Unit. 12.3 Section 12.3 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...

  4. 28 CFR 12.3 - Prior registration with the Foreign Agents Registration Unit.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Prior registration with the Foreign Agents Registration Unit. 12.3 Section 12.3 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...

  5. 28 CFR 12.21 - Time within which registration statement must be filed.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Time within which registration statement must be filed. 12.21 Section 12.21 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...

  6. 28 CFR 12.4 - Inquiries concerning application of act.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Inquiries concerning application of act. 12.4 Section 12.4 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...

  7. 28 CFR 12.21 - Time within which registration statement must be filed.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Time within which registration statement must be filed. 12.21 Section 12.21 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...

  8. 28 CFR 12.21 - Time within which registration statement must be filed.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Time within which registration statement must be filed. 12.21 Section 12.21 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...

  9. 28 CFR 12.3 - Prior registration with the Foreign Agents Registration Unit.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Prior registration with the Foreign Agents Registration Unit. 12.3 Section 12.3 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...

  10. 28 CFR 12.70 - Partial compliance not deemed compliance.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Partial compliance not deemed compliance. 12.70 Section 12.70 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...

  11. 28 CFR 12.4 - Inquiries concerning application of act.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Inquiries concerning application of act. 12.4 Section 12.4 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...

  12. 28 CFR 12.70 - Partial compliance not deemed compliance.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Partial compliance not deemed compliance. 12.70 Section 12.70 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...

  13. 28 CFR 12.4 - Inquiries concerning application of act.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Inquiries concerning application of act. 12.4 Section 12.4 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...

  14. 28 CFR 12.3 - Prior registration with the Foreign Agents Registration Unit.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Prior registration with the Foreign Agents Registration Unit. 12.3 Section 12.3 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...

  15. 28 CFR 12.21 - Time within which registration statement must be filed.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Time within which registration statement must be filed. 12.21 Section 12.21 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...

  16. 28 CFR 12.70 - Partial compliance not deemed compliance.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Partial compliance not deemed compliance. 12.70 Section 12.70 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...

  17. 28 CFR 12.70 - Partial compliance not deemed compliance.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Partial compliance not deemed compliance. 12.70 Section 12.70 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...

  18. 28 CFR 12.3 - Prior registration with the Foreign Agents Registration Unit.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Prior registration with the Foreign Agents Registration Unit. 12.3 Section 12.3 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT...

  19. 28 CFR 12.4 - Inquiries concerning application of act.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Inquiries concerning application of act. 12.4 Section 12.4 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...

  20. Utility Considerations in Emotional Stability Monitoring for Nuclear Plant Personnel,

    DTIC Science & Technology

    Training, and (4) Employee assistance program. Some data exists which show more acts of sabotage, theft, or vandalism occur in environments in which...definition of criteria and the judgment of a professional psychologist or psychiatrist who knows the job environment . Finally, it must provide

  1. 10 CFR 50.55 - Conditions of construction permits, early site permits, combined licenses, and manufacturing...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ..., combined licenses, and manufacturing licenses. 50.55 Section 50.55 Energy NUCLEAR REGULATORY COMMISSION... experimental nature of the facility or fire, flood, explosion, strike, sabotage, domestic violence, enemy... submitted to the Document Control Desk, U.S. Nuclear Regulatory Commission, by an appropriate method listed...

  2. 10 CFR 50.55 - Conditions of construction permits, early site permits, combined licenses, and manufacturing...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., combined licenses, and manufacturing licenses. 50.55 Section 50.55 Energy NUCLEAR REGULATORY COMMISSION... experimental nature of the facility or fire, flood, explosion, strike, sabotage, domestic violence, enemy... submitted to the Document Control Desk, U.S. Nuclear Regulatory Commission, by an appropriate method listed...

  3. 10 CFR 50.55 - Conditions of construction permits, early site permits, combined licenses, and manufacturing...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., combined licenses, and manufacturing licenses. 50.55 Section 50.55 Energy NUCLEAR REGULATORY COMMISSION... experimental nature of the facility or fire, flood, explosion, strike, sabotage, domestic violence, enemy... submitted to the Document Control Desk, U.S. Nuclear Regulatory Commission, by an appropriate method listed...

  4. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  5. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  6. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  7. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  8. 10 CFR 52.10 - Attacks and destructive acts.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Attacks and destructive acts. 52.10 Section 52.10 Energy... protection against the effects of— (a) Attacks and destructive acts, including sabotage, directed against the... deployment of weapons incident to U.S. defense activities. ...

  9. The Emotional Experience of School Change: Resistance, Loss, and Grief.

    ERIC Educational Resources Information Center

    Marshak, David

    1996-01-01

    Ignoring the emotional experience of school change may unintentionally sabotage rational planning. Reinventing schools means attending to educators' emotional experience, particularly their expectations, sense of loss, and resulting grief. School norms must be transformed so that teachers and administrators can have meaningful conversations about…

  10. Development of Security Measures: Implementation Instructions for MIL-STD on Physical Security for DCS Facilities.

    DTIC Science & Technology

    1981-07-01

    security measures to in- crease the survivability of these assets. However, sabotage, terrorism and vandalism continue to be serious threats to DCS and its...Closed circuit television. e. Comunication cables. f. Fuel storage. g. Fuel lines. h. Air conditioning. The primary benefits of security measures

  11. 10 CFR Appendix C to Part 73 - Nuclear Power Plant Safeguards Contingency Plans

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... command and delegation of authority as these apply to safeguards contingencies. b. Physical Layout—(i..., up to and including the design basis threat of radiological sabotage. The goals of licensee... general description of how the response is organized. a. Perceived Danger—Consistent with the design basis...

  12. Nurturing RP-US Bilateral Security Relation

    DTIC Science & Technology

    2011-03-24

    and sabotaging U.S. commercial airliners flying trans-Pacific routes from U.S West Coast cities. The plan hatched by Ramzi Yousef, the convicted...and Disaster Relief (HADR) operations. The agreement therefore, must provide for provisions that would cater not only for the status of the American

  13. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  14. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  15. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  16. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  17. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  18. 28 CFR 12.25 - Amended registration statement.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Amended registration statement. 12.25 Section 12.25 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...

  19. 28 CFR 12.30 - Burden of establishing availability of exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Burden of establishing availability of exemptions. 12.30 Section 12.30 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...

  20. 28 CFR 12.20 - Filing of registration statement.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Filing of registration statement. 12.20 Section 12.20 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...

  1. 28 CFR 12.30 - Burden of establishing availability of exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Burden of establishing availability of exemptions. 12.30 Section 12.30 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...

  2. 28 CFR 12.30 - Burden of establishing availability of exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Burden of establishing availability of exemptions. 12.30 Section 12.30 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...

  3. 28 CFR 12.1 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Definitions. 12.1 Section 12.1 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE... received instruction or assignment in the espionage, counterespionage, or sabotage service or tactics of a...

  4. 28 CFR 12.25 - Amended registration statement.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Amended registration statement. 12.25 Section 12.25 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...

  5. 28 CFR 12.20 - Filing of registration statement.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Filing of registration statement. 12.20 Section 12.20 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...

  6. 28 CFR 12.1 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Definitions. 12.1 Section 12.1 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE... received instruction or assignment in the espionage, counterespionage, or sabotage service or tactics of a...

  7. 28 CFR 12.30 - Burden of establishing availability of exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Burden of establishing availability of exemptions. 12.30 Section 12.30 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...

  8. 28 CFR 12.23 - Deficient registration statement.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Deficient registration statement. 12.23 Section 12.23 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...

  9. 28 CFR 12.25 - Amended registration statement.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Amended registration statement. 12.25 Section 12.25 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...

  10. 28 CFR 12.25 - Amended registration statement.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Amended registration statement. 12.25 Section 12.25 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...

  11. 28 CFR 12.1 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Definitions. 12.1 Section 12.1 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE... received instruction or assignment in the espionage, counterespionage, or sabotage service or tactics of a...

  12. 28 CFR 12.25 - Amended registration statement.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Amended registration statement. 12.25 Section 12.25 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...

  13. 28 CFR 12.23 - Deficient registration statement.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Deficient registration statement. 12.23 Section 12.23 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...

  14. 28 CFR 12.23 - Deficient registration statement.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Deficient registration statement. 12.23 Section 12.23 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...

  15. 28 CFR 12.20 - Filing of registration statement.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Filing of registration statement. 12.20 Section 12.20 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...

  16. 28 CFR 12.20 - Filing of registration statement.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Filing of registration statement. 12.20 Section 12.20 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...

  17. 28 CFR 12.20 - Filing of registration statement.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Filing of registration statement. 12.20 Section 12.20 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...

  18. 28 CFR 12.23 - Deficient registration statement.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Deficient registration statement. 12.23 Section 12.23 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...

  19. 28 CFR 12.1 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Definitions. 12.1 Section 12.1 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE... received instruction or assignment in the espionage, counterespionage, or sabotage service or tactics of a...

  20. 28 CFR 12.23 - Deficient registration statement.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Deficient registration statement. 12.23 Section 12.23 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12...

  1. 28 CFR 12.30 - Burden of establishing availability of exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Burden of establishing availability of exemptions. 12.30 Section 12.30 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1...

  2. A Preliminary Model of Insider Theft of Intellectual Property

    DTIC Science & Technology

    2011-06-01

    insider IT sabotage [Moore 2008] [Cappelli 2006]. The primary personality model used in CWB research is the Five Factor Model ( FFM ). The FFM includes... FFM dimensions and CWBs, Salgado found 44 studies conducted between 1990 and 1999 that examine the relationship between the FFM dimensions and deviant

  3. Of Bushwahckers, Termites and Moles.

    ERIC Educational Resources Information Center

    Smelter, Richard W.

    2003-01-01

    Retired school administrator describes five types of school personnel that make an administrator's job difficult: Bushwackers, termites, CIA moles, rumor-mill addicts, and sartorial slobs. For example, termites are staff members who purposely volunteer for committees so they can sabotage the group's efforts from within. (PKP)

  4. An Assessment of the Department of Defense Strategy for Operating in Cyberspace

    DTIC Science & Technology

    2013-09-01

    were responsible for developing the Stuxnet malware aimed at sabotaging the Natanz uranium enrichment plant in Iran.66 Stuxnet spread through the...and De- tection for the Twenty-First Century, Upper Saddle River, NJ: Ad- dison Wesley, 2009. 36. Ronald Krutz and Russell Vines, Cloud Security: a

  5. 76 FR 30204 - Exelon Nuclear, Dresden Nuclear Power Station, Unit 1; Exemption From Certain Security Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-24

    ... Power Station, Unit 1; Exemption From Certain Security Requirements 1.0 Background Exelon Nuclear is the licensee and holder of Facility Operating License No. DPR-2 issued for Dresden Nuclear Power Station (DNPS... protection of licensed activities in nuclear power reactors against radiological sabotage,'' paragraph (b)(1...

  6. 76 FR 72007 - ZionSolutions, LLC; Zion Nuclear Power Station, Units 1 and 2; Exemption From Certain Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-21

    ...; Zion Nuclear Power Station, Units 1 and 2; Exemption From Certain Security Requirements 1.0 Background Zion Nuclear Power Station (ZNPS or Zion), Unit 1, is a Westinghouse 3250 MWt Pressurized Water Reactor... activities in nuclear power reactors against radiological sabotage,'' paragraph (b)(1) states, ``The licensee...

  7. Improving Radiation Awareness and Feeling of Personal Security of Non-Radiological Medical Staff by Implementing a Traffic Light System in Computed Tomography.

    PubMed

    Heilmaier, C; Mayor, A; Zuber, N; Fodor, P; Weishaupt, D

    2016-03-01

    Non-radiological medical professionals often need to remain in the scanning room during computed tomography (CT) examinations to supervise patients in critical condition. Independent of protective devices, their position significantly influences the radiation dose they receive. The purpose of this study was to assess if a traffic light system indicating areas of different radiation exposure improves non-radiological medical staff's radiation awareness and feeling of personal security. Phantom measurements were performed to define areas of different dose rates and colored stickers were applied on the floor according to a traffic light system: green = lowest, orange = intermediate, and red = highest possible radiation exposure. Non-radiological medical professionals with different years of working experience evaluated the system using a structured questionnaire. Kruskal-Wallis and Spearman's correlation test were applied for statistical analysis. Fifty-six subjects (30 physicians, 26 nursing staff) took part in this prospective study. Overall rating of the system was very good, and almost all professionals tried to stand in the green stickers during the scan. The system significantly increased radiation awareness and feeling of personal protection particularly in staff with ≤ 5 years of working experience (p < 0.05). The majority of non-radiological medical professionals stated that staying in the green stickers and patient care would be compatible. Knowledge of radiation protection was poor in all groups, especially among entry-level employees (p < 0.05). A traffic light system in the CT scanning room indicating areas with lowest, intermediate, and highest possible radiation exposure is much appreciated. It increases radiation awareness, improves the sense of personal radiation protection, and may support endeavors to lower occupational radiation exposure, although the best radiation protection always is to re-main outside the CT room during the scan. • A

  8. 10 CFR Appendix C to Part 73 - Nuclear Power Plant Safeguards Contingency Plans

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... command and delegation of authority as these apply to safeguards contingencies. b. Physical Layout—(i..., up to and including the design basis threat of radiological sabotage. The goals of licensee.... Perceived Danger—Consistent with the design basis threat specified in § 73.1(a)(1), licensees shall identify...

  9. 10 CFR Appendix C to Part 73 - Nuclear Power Plant Safeguards Contingency Plans

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Nuclear Power Plant Safeguards Contingency Plans C Appendix C to Part 73 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND... sabotage relating to special nuclear material or nuclear facilities licensed under the Atomic Energy Act of...

  10. 28 CFR 12.41 - Photocopies.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Photocopies. 12.41 Section 12.41 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.41 Photocopies. (a) Photocopies of...

  11. 28 CFR 12.2 - Administration of act.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Administration of act. 12.2 Section 12.2 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.2 Administration of...

  12. 28 CFR 12.40 - Public examination.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Public examination. 12.40 Section 12.40 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.40 Public examination...

  13. 28 CFR 12.40 - Public examination.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Public examination. 12.40 Section 12.40 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.40 Public examination...

  14. 28 CFR 12.40 - Public examination.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Public examination. 12.40 Section 12.40 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.40 Public examination...

  15. 28 CFR 12.41 - Photocopies.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Photocopies. 12.41 Section 12.41 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.41 Photocopies. (a) Photocopies of...

  16. 28 CFR 12.2 - Administration of act.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Administration of act. 12.2 Section 12.2 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.2 Administration of...

  17. 28 CFR 12.2 - Administration of act.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Administration of act. 12.2 Section 12.2 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.2 Administration of...

  18. 28 CFR 12.2 - Administration of act.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Administration of act. 12.2 Section 12.2 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.2 Administration of...

  19. 28 CFR 12.41 - Photocopies.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Photocopies. 12.41 Section 12.41 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.41 Photocopies. (a) Photocopies of...

  20. 28 CFR 12.41 - Photocopies.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Photocopies. 12.41 Section 12.41 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.41 Photocopies. (a) Photocopies of...

  1. 28 CFR 12.40 - Public examination.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Public examination. 12.40 Section 12.40 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.40 Public examination...

  2. 28 CFR 12.2 - Administration of act.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Administration of act. 12.2 Section 12.2 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.2 Administration of...

  3. 28 CFR 12.41 - Photocopies.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Photocopies. 12.41 Section 12.41 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.41 Photocopies. (a) Photocopies of...

  4. 10 CFR Appendix C to Part 73 - Nuclear Power Plant Safeguards Contingency Plans

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Nuclear Power Plant Safeguards Contingency Plans C Appendix C to Part 73 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND... sabotage relating to special nuclear material or nuclear facilities licensed under the Atomic Energy Act of...

  5. Examining the Relationship of Business Operations and the Information Security Culture in the United States

    ERIC Educational Resources Information Center

    Wynn, Cynthia L.

    2017-01-01

    An increase in information technology has caused and increased in threats towards information security. Threats are malware, viruses, sabotage from employees, and hacking into computer systems. Organizations have to find new ways to combat vulnerabilities and threats of internal and external threats to protect their information security and…

  6. 10 CFR 72.184 - Safeguards contingency plan.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... contingency plan for responding to threats and radiological sabotage must be as defined in appendix C to part..., and Responsibility Matrix, the first four categories of information relating to nuclear facilities licensed under part 50 of this chapter. (The fifth and last category of information, Procedures, does not...

  7. 10 CFR 50.13 - Attacks and destructive acts by enemies of the United States; and defense activities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Attacks and destructive acts by enemies of the United States; and defense activities. 50.13 Section 50.13 Energy NUCLEAR REGULATORY COMMISSION DOMESTIC... the effects of (a) attacks and destructive acts, including sabotage, directed against the facility by...

  8. 10 CFR 50.13 - Attacks and destructive acts by enemies of the United States; and defense activities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Attacks and destructive acts by enemies of the United States; and defense activities. 50.13 Section 50.13 Energy NUCLEAR REGULATORY COMMISSION DOMESTIC... the effects of (a) attacks and destructive acts, including sabotage, directed against the facility by...

  9. 10 CFR 50.13 - Attacks and destructive acts by enemies of the United States; and defense activities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Attacks and destructive acts by enemies of the United States; and defense activities. 50.13 Section 50.13 Energy NUCLEAR REGULATORY COMMISSION DOMESTIC... the effects of (a) attacks and destructive acts, including sabotage, directed against the facility by...

  10. 10 CFR 50.13 - Attacks and destructive acts by enemies of the United States; and defense activities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Attacks and destructive acts by enemies of the United States; and defense activities. 50.13 Section 50.13 Energy NUCLEAR REGULATORY COMMISSION DOMESTIC... the effects of (a) attacks and destructive acts, including sabotage, directed against the facility by...

  11. Report in Argument's Clothing: An Ecological Perspective on Writing Instruction in a Seventh-Grade Classroom.

    ERIC Educational Resources Information Center

    Nystrand, Martin; Graff, Nelson

    2001-01-01

    Draws on classroom observations, interviews, and writing portfolios to contend that competing demands in modern classrooms can lead to environments that sabotage the teaching of argumentative and persuasive writing. Concludes that the epistemology fostered by classroom talk and other activities was inimical to the complex rhetoric the teacher was…

  12. Social support for healthy behaviors: Scale psychometrics and prediction of weight loss among women in a behavioral program

    PubMed Central

    Kiernan, Michaela; Moore, Susan D.; Schoffman, Danielle E.; Lee, Katherine; King, Abby C.; Taylor, C. Barr; Kiernan, Nancy Ellen; Perri, Michael G.

    2015-01-01

    Social support could be a powerful weight-loss treatment moderator or mediator but is rarely assessed. We assessed the psychometric properties, initial levels, and predictive validity of a measure of perceived social support and sabotage from friends and family for healthy eating and physical activity (eight subscales). Overweight/obese women randomized to one of two 6-month, group-based behavioral weight-loss programs (N=267; mean BMI 32.1±3.5; 66.3% White) completed subscales at baseline, and weight loss was assessed at 6 months. Internal consistency, discriminant validity, and content validity were excellent for support subscales and adequate for sabotage subscales; qualitative responses revealed novel deliberate instances not reflected in current sabotage items. Most women (>75%) “never” or “rarely” experienced support from friends or family. Using non-parametric classification methods, we identified two subscales—support from friends for healthy eating and support from family for physical activity—that predicted three clinically meaningful subgroups who ranged in likelihood of losing ≥5% of initial weight at 6 months. Women who “never” experienced family support were least likely to lose weight (45.7% lost weight) whereas women who experienced both frequent friend and family support were more likely to lose weight (71.6% lost weight). Paradoxically, women who “never” experienced friend support were most likely to lose weight (80.0% lost weight), perhaps because the group-based programs provided support lacking from friendships. Psychometrics for support subscales were excellent; initial support was rare; and the differential roles of friend versus family support could inform future targeted weight-loss interventions to subgroups at risk. PMID:21996661

  13. 28 CFR 12.1 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Definitions. 12.1 Section 12.1 Judicial Administration DEPARTMENT OF JUSTICE REGISTRATION OF CERTAIN PERSONS HAVING KNOWLEDGE OF FOREIGN ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.1 Definitions. As used in this part...

  14. 32 CFR Appendix A to Part 223 - Procedures for Identifying and Controlling DoD UCNI

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security measures, including security plans, procedures, and equipment, for the physical protection of DoD... sabotage of DoD SNM, equipment, or facilities (e.g., relative importance of a facility or the location... equipment, for the physical protection of DoD SNM, equipment, or facilities. c. Meet the adverse effects...

  15. Why Are Faculty Development Workshops a Waste of Time?

    ERIC Educational Resources Information Center

    Berk, Ronald A.

    2010-01-01

    This article discusses how to design and execute a faculty development workshop. The author first describes the characteristics of the faculty development event that can sabotage or facilitate attendance. They relate to: (a) format and frequency; (b) venues; (c) technical support; and (d) competing activities. Then, the author presents ten…

  16. 28 CFR 12.40 - Public examination.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Public examination. 12.40 Section 12.40... ESPIONAGE, COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.40 Public examination. Registration statements shall be available for public examination at the offices of the Registration Unit...

  17. The Two and a Half Learning Model: A Consequence of Academic Dishonesty

    ERIC Educational Resources Information Center

    Sahin, Mehmet

    2016-01-01

    Academic dishonesty has been regarded as a problem but not a visible and declared one in every type of educational setting from elementary school to graduate level all over the world. Dishonesty or misconduct in the academic realm covers plagiarism, fabrication, deception, cheating, bribery, sabotage, professorial misconduct and impersonation.…

  18. 46 CFR 5.61 - Acts or offenses for which revocation of credentials is sought.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... is found proved: (1) Assault with a dangerous weapon. (2) Misconduct resulting in loss of life or.... (7) Sabotage. (8) Smuggling of aliens. (9) Incompetence. (10) Interference with master, ship's... clearly a threat to the safety of life or property, or detrimental to good discipline. [CGD 82-002, 50 FR...

  19. 46 CFR 5.61 - Acts or offenses for which revocation of credentials is sought.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... is found proved: (1) Assault with a dangerous weapon. (2) Misconduct resulting in loss of life or.... (7) Sabotage. (8) Smuggling of aliens. (9) Incompetence. (10) Interference with master, ship's... clearly a threat to the safety of life or property, or detrimental to good discipline. [CGD 82-002, 50 FR...

  20. 78 FR 29519 - Physical Protection of Irradiated Reactor Fuel in Transit

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-20

    ... to the appropriate response forces of any sabotage events, and (3) impede attempts at radiological... personnel so that they could properly respond to a safety or safeguards event. The State of Nevada concluded... destination, and must immediately notify the appropriate agencies in the event of a safeguards event under the...

  1. Women as Entrepreneurs.

    ERIC Educational Resources Information Center

    Bianchi, Antoinette

    1989-01-01

    An Afro-American woman discusses her experiences as an entrepreneur, describing the inspiration provided by her parents; the vision which enabled her to create a multi-million dollar business; the loss of her company through industrial sabotage; and her comeback as head of a seminar, speaking, and consulting firm. (JDD)

  2. The Practice of Mentoring: Reflecting on the Critical Aspects for Leadership Development

    ERIC Educational Resources Information Center

    Hicks, Deborah

    2011-01-01

    Mentorship is often considered one of the best ways to develop leadership potential in new library and information professionals. Mentors act as teacher, role model, and cheerleader, but there are potentially serious aspects to mentorships that will negatively impact the protege. Such negatives include mentors sabotaging or taking credit for a…

  3. 14 CFR 1274.936 - Breach of safety or security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    .... (a) Security is the condition of safeguarding against espionage, sabotage, crime (including computer... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Breach of safety or security. 1274.936... security. Breach of Safety or Security July 2002 Safety is the freedom from those conditions that can cause...

  4. 14 CFR 1274.936 - Breach of safety or security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    .... (a) Security is the condition of safeguarding against espionage, sabotage, crime (including computer... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Breach of safety or security. 1274.936... security. Breach of Safety or Security July 2002 Safety is the freedom from those conditions that can cause...

  5. 14 CFR 1274.936 - Breach of safety or security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    .... (a) Security is the condition of safeguarding against espionage, sabotage, crime (including computer... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Breach of safety or security. 1274.936... security. Breach of Safety or Security July 2002 Safety is the freedom from those conditions that can cause...

  6. Nuclear Power Plant Security and Vulnerabilities

    DTIC Science & Technology

    2009-03-18

    Commercial Spent Nuclear Fuel Storage , Public Report...systems that prevent hot nuclear fuel from melting even after the chain reaction has stopped, and storage facilities for highly radioactive spent nuclear ... nuclear fuel cycle facilities must defend against to prevent radiological sabotage and theft of strategic special nuclear material. NRC licensees use

  7. The Power of Poor Communications

    ERIC Educational Resources Information Center

    Schaub, Alfred R.

    1975-01-01

    Most breakdowns in communications are the result of the quest for power on behalf of organization members, not the result of poor communications training. Organizational power may be accrued by withholding information, sabotaging communications, refusing to communicate bad news to superiors, and avoiding confrontations by not communicating at all.…

  8. The Ideology of Free Culture and the Grammar of Sabotage

    ERIC Educational Resources Information Center

    Pasquinelli, Matteo

    2010-01-01

    Bringing post-Operaismo into network culture, this text tries to introduce the notion of surplus in a contemporary media debate dominated by a simple symmetry between immaterial and material domain, between digital economy and bioeconomy. Therefore a new asymmetry is first shaped through Serres' conceptual figure of the parasite and Bataille's…

  9. A Risk Mitigation Model: Lessons Learned From Actual Insider Sabotage

    DTIC Science & Technology

    2006-11-07

    performance Responsibilities removed from projects Suspension of Internet access Death in family ; Divorce Financial Disagreement re: salary/compensation...Infrastructure by Information Technology Insiders, ” Monterrey , CA.: Defense Personnel Security Research and Education Center. Shaw, E.D. (2004). “The

  10. 10 CFR 72.182 - Design for physical protection.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Physical Protection § 72.182 Design for physical protection. The design for physical protection must show the site layout and the design features provided to protect the ISFSI or MRS from sabotage. It must... 10 Energy 2 2013-01-01 2013-01-01 false Design for physical protection. 72.182 Section 72.182...

  11. 10 CFR 72.182 - Design for physical protection.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Physical Protection § 72.182 Design for physical protection. The design for physical protection must show the site layout and the design features provided to protect the ISFSI or MRS from sabotage. It must... 10 Energy 2 2010-01-01 2010-01-01 false Design for physical protection. 72.182 Section 72.182...

  12. 10 CFR 72.182 - Design for physical protection.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Physical Protection § 72.182 Design for physical protection. The design for physical protection must show the site layout and the design features provided to protect the ISFSI or MRS from sabotage. It must... 10 Energy 2 2012-01-01 2012-01-01 false Design for physical protection. 72.182 Section 72.182...

  13. 10 CFR 72.182 - Design for physical protection.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Physical Protection § 72.182 Design for physical protection. The design for physical protection must show the site layout and the design features provided to protect the ISFSI or MRS from sabotage. It must... 10 Energy 2 2014-01-01 2014-01-01 false Design for physical protection. 72.182 Section 72.182...

  14. 10 CFR 72.182 - Design for physical protection.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Physical Protection § 72.182 Design for physical protection. The design for physical protection must show the site layout and the design features provided to protect the ISFSI or MRS from sabotage. It must... 10 Energy 2 2011-01-01 2011-01-01 false Design for physical protection. 72.182 Section 72.182...

  15. Creating Optimal Learning Environments through Invitational Education: An Alternative to Control Oriented School Reform

    ERIC Educational Resources Information Center

    Fretz, Joan R.

    2015-01-01

    Understanding what motivates people to put forth effort, persevere in the face of obstacles, and choose their behaviors is key to creating an optimal learning environment--the type of school that policy makers desire, but are unknowingly sabotaging (Dweck, 2000). Many motivation and self-concept theories provide important insight with regard to…

  16. Beyond "Scribbling Women": Women Writing (on) the Web.

    ERIC Educational Resources Information Center

    Gerrard, Lisa

    2002-01-01

    Proposes that women assert their power by using the World Wide Web to influence the political arena; supporting one another's careers; celebrating women's accomplishments; and sabotaging misogynist language and stereotypes. Focuses on a pervasive rhetoric of resistance in which many sites co-opt a longstanding anti-female trope and redefine it as…

  17. Satire, Surveillance, and the State: A Classified Primer

    ERIC Educational Resources Information Center

    Bogad, L. M.

    2007-01-01

    This article explores the use of ironic performance in education, particularly around issues of human rights. I examine my own efforts to engage audiences with the history of domestic espionage and sabotage by the intelligence agencies of the United States. This is a history well known to some marginalized counterpublics (see Fraser, 1997), but…

  18. Maximizing Peak Running on Race Day

    ERIC Educational Resources Information Center

    Consolo, Kitty

    2008-01-01

    Distance runners spend many hours training assiduously for competition, yet on race day they can often make mistakes that sabotage their performance. This article addresses five common race-day mistakes: (1) failure to bring proper equipment to the race; (2) failure to eat an appropriate race-day meal; (3) failure to hydrate properly; (4) failure…

  19. Intimate Partner Violence and PrEP Acceptability Among Low-Income, Young Black Women: Exploring the Mediating Role of Reproductive Coercion

    PubMed Central

    Willie, Tiara; Kershaw, Trace; Campbell, Jacquelyn C.; Alexander, Kamila A.

    2018-01-01

    A few studies suggest that women who experience intimate partner violence (IPV) are willing to use pre-exposure prophylaxis (PrEP), but no research has examined mediators of this relationship. The current study used path analysis to examine a phenomenon closely associated with IPV: reproductive coercion or explicit male behaviors to promote pregnancy of a female partner without her knowledge or against her will. Birth control sabotage and pregnancy coercion—two subtypes of reproductive coercion behaviors—were examined as mediators of the relationship between IPV and PrEP acceptability among a cohort of 147 Black women 18 to 25 years of age recruited from community-based organizations in an urban city. IPV experiences were indirectly related to PrEP acceptability through birth control sabotage (indirect effect=0.08; p<0.05), but not to pregnancy coercion. Findings illustrate the importance of identifying and addressing reproductive coercion when assessing whether PrEP is clinically appropriate and a viable option to prevent HIV among women who experience IPV. PMID:28409266

  20. Work-related abuse: a replication, new items, and persistent questions.

    PubMed

    Brush, Lisa D

    2002-12-01

    This study compared independently developed tools to measure work-related control, abuse, and sabotage. Interviewers administered the Work/School Abuse Scale (W/SAS; Riger, Ahrens, & Blickenstaff, 2000) to 40 welfare recipients, and a Work-Related Control, Abuse, and Sabotage Checklist (WORCASC) to a total of 162 welfare recipients, including the same 40 who answered the W/SAS. I report and compare results on W/SAS and WORCASC with 40 non-sheltered (i.e., not residing in a shelter) respondents and discuss instrument strengths and weaknesses. Measurement analyses provided preliminary empirical answers to questions about the relationship between battering and work. Findings confirmed the reliability of the two instruments, the extent to which they measure something distinct from physical abuse, and their association with relevant outcomes such as being written up, reprimanded, or losing pay at work. Measurement questions are salient in the context of debates over welfare reforms and efforts to reconcile the ways researchers, advocates, service providers, and policy makers understand and address the costs of taking a beating.

  1. 28 CFR 12.24 - Forms.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.24 Forms. (a) Every person required to... time to time be prescribed by the Attorney General. (b) Matter contained in any part of the... legibly in black ink. (f) Riders shall not be used. If the space on the registration statement or other...

  2. 28 CFR 12.24 - Forms.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.24 Forms. (a) Every person required to... time to time be prescribed by the Attorney General. (b) Matter contained in any part of the... legibly in black ink. (f) Riders shall not be used. If the space on the registration statement or other...

  3. 28 CFR 12.24 - Forms.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.24 Forms. (a) Every person required to... time to time be prescribed by the Attorney General. (b) Matter contained in any part of the... legibly in black ink. (f) Riders shall not be used. If the space on the registration statement or other...

  4. 28 CFR 12.24 - Forms.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.24 Forms. (a) Every person required to... time to time be prescribed by the Attorney General. (b) Matter contained in any part of the... legibly in black ink. (f) Riders shall not be used. If the space on the registration statement or other...

  5. 28 CFR 12.24 - Forms.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., COUNTERESPIONAGE, OR SABOTAGE MATTERS UNDER THE ACT OF AUGUST 1, 1956 § 12.24 Forms. (a) Every person required to... time to time be prescribed by the Attorney General. (b) Matter contained in any part of the... legibly in black ink. (f) Riders shall not be used. If the space on the registration statement or other...

  6. Readers Not Wanted: Student Writers Fight to Keep Their Work off the Web

    ERIC Educational Resources Information Center

    Foster, Andrea L.

    2008-01-01

    Mark Brazaitis worries that his university may sabotage the literary careers of his students. As director of the creative-writing program at West Virginia University, Mr. Brazaitis oversees the training of about 30 graduate students, who hope to become published authors. At the end of their three years in the program, they hand in their magnum…

  7. Combat or Cooperation?

    ERIC Educational Resources Information Center

    Tate, Thomas F.; Copas, Randall L.

    2010-01-01

    The best intentioned efforts of adults are often sabotaged by coercive climates of bullying among peers and conflict with adults. The solution is to create cultures where youth cooperate with authority and treat one another with respect. In this article, the authors stress the task of the staff to create a condition in which students see more…

  8. Innovation in PhD Completion: The Hardy Shall Succeed (And Be Happy!)

    ERIC Educational Resources Information Center

    Kearns, Hugh; Gardiner, Maria; Marshall, Kelly

    2008-01-01

    What is it that makes a PhD such a difficult process, and prevents candidates from completing on time? In this paper, we propose that self-sabotaging behaviours, including overcommitting, procrastination and perfectionism, have a role to play. At Flinders University, we have developed a program in which we work with PhD students to help to reduce…

  9. Leveraging Conflict for Social Justice: How "Leadable" Moments Can Transform School Culture

    ERIC Educational Resources Information Center

    Aleman, Enrique, Jr.

    2009-01-01

    It is not a question of whether conflict within a school will occur, but rather when it will manifest and by whom. Often times, conflict occurring between key stakeholders such as teachers, parents, and students is looked upon as tainting school culture or sabotaging change strategies. However, conflict may also serve as a catalyst for larger…

  10. Satellite Power System (SPS) military implications

    NASA Technical Reports Server (NTRS)

    Bain, C. N.

    1978-01-01

    The military implications of the reference satellite power system (SPS) were examined is well as important military related study tasks. Primary areas of investigation were the potential of the SPS as a weapon, for supporting U.S. military preparedness, and for affecting international relations. In addition, the SPS's relative vulnerability to overt military action, terrorist attacks, and sabotage was considered.

  11. Legal constraints imposed on security force personnel

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search. (DLC)

  12. Readiness in the face of war. [The status of the US Strategic Petroleum Reserve

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rodgers, L.M.

    This article reports the status of the US Strategic Petroleum Reserve as described by Secretary James Watkins in the face of the war against Iraq. Secretary James Watkins describes the plan by which over 20 nation's reserves will be tapped to insure no lack of petroleum on the world market. The possibility of sabotage to various oil facilities is addressed.

  13. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    DTIC Science & Technology

    2012-06-26

    145 Abdul Mannan, “Preventing Nuclear Terrorism in Pakistan: Sabotage of a Spent Fuel Cask or a Commercial ...Pakistan’s Civil Nuclear Program.” Some analysts argue that spent nuclear fuel is more vulnerable when being transported . 146 Martellini, 2008. 147...produced fissile material for its nuclear weapons using gas-centrifuge-based uranium enrichment technology, which it mastered by the mid-1980s

  14. Sabotage or Performed Compliance: Rhetorics of Resistance in Temp Worker Discourse

    ERIC Educational Resources Information Center

    Jordan, John W.

    2003-01-01

    This essay analyzes contemporary temporary employment texts and the competing rhetorical definitions that shape the meanings of employment and identity in the contingent economy. Arguing against resistant labor rhetoric that is ill-suited to present conditions of temp work, the author locates and advocates a rhetoric of "performativity" that…

  15. Developing Critical Thinking Skills: The "Sabotaged" Synthesis of Methyl p-Bromobenzoate

    ERIC Educational Resources Information Center

    Mahan, Eric J.; Nading, Mary Alice

    2006-01-01

    This experiment was designed to help students improve the critical thinking skills that are required to analyze and discuss the results of an organic chemistry experiment in an effective manner. The initial objective indicated in the prelab handout for this puzzle experiment was the synthesis of methyl 4-bromobenzoate using the Fischer…

  16. Inter- and intraspecific conflicts between parasites over host manipulation

    PubMed Central

    Hafer, Nina; Milinski, Manfred

    2016-01-01

    Host manipulation is a common strategy by which parasites alter the behaviour of their host to enhance their own fitness. In nature, hosts are usually infected by multiple parasites. This can result in a conflict over host manipulation. Studies of such a conflict in experimentally infected hosts are rare. The cestode Schistocephalus solidus (S) and the nematode Camallanus lacustris (C) use copepods as their first intermediate host. They need to grow for some time inside this host before they are infective and ready to be trophically transmitted to their subsequent fish host. Accordingly, not yet infective parasites manipulate to suppress predation. Infective ones manipulate to enhance predation. We experimentally infected laboratory-bred copepods in a manner that resulted in copepods harbouring (i) an infective C plus a not yet infective C or S, or (ii) an infective S plus a not yet infective C. An infective C completely sabotaged host manipulation by any not yet infective parasite. An infective S partially reduced host manipulation by a not yet infective C. We hence show experimentally that a parasite can reduce or even sabotage host manipulation exerted by a parasite from a different species. PMID:26842574

  17. Emergency Plan for the Locks and Dams at St. Anthony Falls Minneapolis, Minnesota

    DTIC Science & Technology

    1987-03-01

    Identification Subplan APPENDIX B Emergency Operations and Repair Subplan APPENDIX C Emergency Notification Subplan APPENDIX D Inundation Map Package...Emergency Operations and Repair Subplan 3) Appendix C , Emergency Notification Subplan 4) Appendix D , Inundation Maps and Hydraulic Data b. AP...which were selected for planning include: a. Structural Damage b. Sabotage c . Extreme Storm d . Excess Seepage e. Failure Due to Scouring A brief dis

  18. National Information Systems Security Conference (19th) held in Baltimore, Maryland on October 22-25, 1996. Volume 2

    DTIC Science & Technology

    1996-10-25

    coercing bankers to assist them in their money -laundering activities; or to tap into the multibillion dollar pension funds of labor unions. (3) The...payment systems, have dramatically facilitated the transborder movement of syndicate money . Structure of the Syndicate The very term syndicate or...for the syndicates; i.e., computer/E-mail crimes, data thefts, computer sabotage, high-tech pornography, money laundering, and so forth. The third

  19. Disparity in Democracies: A Comparative Case Study of Mali and Niger

    DTIC Science & Technology

    2010-12-01

    thought he was. In the spirit of cooperation, Ousmane issued an emotional appeal to the "every patriot,.. .all the Niger political class...even voted on.127 In 1993-1994, eleven Islamic organizations thwarted a government condom distribution campaign aimed at both contraception and AIDS...GR-EN.pdf (accessed October 18, 2010). 123 Radio France Internationale, "Islamic groups attempt to sabotage contraceptive campaign," November 18

  20. An Ontology for Insider Threat Indicators Development and Applications

    DTIC Science & Technology

    2014-11-01

    An Ontology for Insider Threat Indicators Development and Applications Daniel L. Costa , Matthew L. Collins, Samuel J. Perl, Michael J. Albrethsen...services, commit fraud against an organization, steal intellectual property, or conduct national security espionage, sabotaging systems and data, as...engineering plans from the victim organization’s computer systems to his new employer.  The insider accessed a web server with an administrator account

  1. Terrorism Risk Modeling for Intelligence Analysis and Infrastructure Protection

    DTIC Science & Technology

    2007-01-01

    comparatively high risk of CBRN attacks. Estimates of sabotage risk are highly dependent on proximity of nuclear power plants , chemical plants , or oil...and casinos, airports, nuclear power plants 3 Military, train and subway stations, stadiums, bridges and tunnels 4 Industrial facilities, oil and...airspace zones 8 Power plants , dams, railway networks levels. Collecting and incorporating such data for specific localities or industry sectors would

  2. JPRS Report, Soviet Union, Foreign Military Review, No. 3, March 1988

    DTIC Science & Technology

    1988-09-02

    command and control. Special-purpose troops are intended to conduct recon- naissance and sabotage operations and to carry out psychological ...operations and other disruptive activities. They include a separate airborne brigade, separate com- mando brigades and psychological warfare subunits...partic- ipated in the production and testing of French Atar -9C and Larzac engines. Belgian armor industry was born around 20 years ago. In the mid

  3. Work and Risk: Perceptions of Nuclear-Power Personnel. a Study in Grounded Theory.

    NASA Astrophysics Data System (ADS)

    Fields, Claire Dewitt

    1992-01-01

    The utility industry has devoted time and money to assure personnel within nuclear power plants are informed about occupational risks. Radiation-protection training programs are designed to present information to employees about occupational radiation and protective procedures. Work -related concerns are known to create stress, affect the morale of the workforce, influence collective bargaining, and increase compensation claims. This study was designed to determine perceptions of risk among employees of nuclear power plants and identify variables that influence these perceptions. Four power plants were included in the study, one in Canada and three in the United States. Data were generated through participant observations and interviews of 350 participants during a period of 3 weeks at each plant. Data were gathered and analyzed following procedures advanced by Grounded Theory, a naturalistic methodology used in this study. Training content, information, and communication materials were additional sources of data. Findings indicated employees believed health and safety risks existed within the work environment. Perceptions of risk were influenced by training quality, the work environment, nuclear myths and images of the general public, and fears of family members. Among the three groups of workers, administration personnel, security personnel, and radiation workers, the latter identified a larger number of risks. Workers perceived radiation risks, shift work, and steam pipe ruptures as high-level concerns. Experiencing stress, making mistakes, and fear of sabotage were concerns shared among all employee groups at various levels of concern. Strategies developed by employees were used to control risk. Strategies included teamwork, humor, monitoring, avoidance, reframing, and activism. When risks were perceived as uncontrollable, the employee left the plant. A coping strategy of transferring concerns about radiological risks to nonradiological risks were uncovered in

  4. Recent Federal Policies Affecting the Cybersecurity and Resiliency Landscape

    DTIC Science & Technology

    2014-01-23

    Mellon University Homeland Security Act of 2002 Was introduced in the aftermath of • September 11 attacks • mailings of anthrax spores Established...natural disasters, cyber incidents, industrial accidents, pandemics , acts of terrorism, sabotage, and destructive criminal activity targeting critical...August 21, 1963 (NCS) • After September 11 − HSPD 1, 5, 7, 8, 12, 20, 21 − Homeland Security Act of 2002 − PS-PREP • After Mailings of Anthrax

  5. How is NATO Meeting the Challenge of Cyberspace

    DTIC Science & Technology

    2017-12-21

    surveillance cameras. We also saw the first attacks driven by artificial intelligence , and increasing evidence of collusion between state... intelligence services and organized crime networks. Yet it is not the much discussed theme of the economic damage inflicted by cyber crime in the past year that...structural sabotage. Although companies in other countries were also affected by NotPetya, 80 percent of the impact was in Ukraine.1 Intelligence

  6. JPRS Report, Soviet Union: Military Affairs.

    DTIC Science & Technology

    1988-07-18

    with the offense. It developed primarily as a result of improvement in weapons and military equipment. Their influence on the nature and methods...fight to improve the position occupied, as well as to combat sabotage and reconnaissance groups in our rear. Outside of contact with the enemy, the...deployment for counterattacks. When time is available they can be prepared in an engineer respect. The stability of the defense is significantly improved

  7. Correcting deformities of the aged earlobe.

    PubMed

    Connell, Bruce F

    2005-01-01

    An earlobe that appears aged or malpositioned can sabotage the results of a well performed face lift. The most frequently noted sign of a naturally aged earlobe is increased length. Improper planning of face lift incisions may also result in disfigurement of the ear. The author suggests simple excisional techniques to correct the aged earlobe, as well as methods to avoid subsequent earlobe distortion when performing a face lift.

  8. Special Inspector General for Iraq Reconstruction. Quarterly Report and Semiannual Report to the United States Congress

    DTIC Science & Technology

    2008-01-30

    Energy Fusion Cell, and allocations include $110 million for oil pipeline exclusion zones—which aim to prevent illegal tapping and sabotage of...sectors in Iraq. This quarter SIGIR highlights two of these programs: the electronic funds transfer ( EFT ) system and U.S. advisory support provided to...the Iraq Stock Exchange. eleCTroniC funds Transfer SIGIR noted last quarter that Iraq finally acti- vated an electronic funds transfer ( EFT ) system

  9. Special Inspector General for Iraq Reconstruction: Quarterly Report and Semiannual Report to the United States Congress

    DTIC Science & Technology

    2008-01-30

    Cell, and allocations include $110 million for oil pipeline exclusion zones—which aim to prevent illegal tapping and sabotage of pipelines—$51...This quarter SIGIR highlights two of these programs: the electronic funds transfer ( EFT ) system and U.S. advisory support provided to the Iraq Stock...Exchange. eleCTroniC funds Transfer SIGIR noted last quarter that Iraq finally acti- vated an electronic funds transfer ( EFT ) system. The United

  10. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    DTIC Science & Technology

    2010-02-04

    Terrorism in Pakistan: Sabotage of a Spent Fuel Cask or a Commercial Irradiation Source in Transport ,” in Pakistan’s Nuclear Future, 2008; Martellini, 2008...measures to prevent unauthorized or accidental use of nuclear weapons, as well as contribute to physical security of storage facilities and personnel...strategic nuclear assets could be obtained by terrorists, or used by elements in the Pakistani government. Chair of the Joint Chiefs of Staff Admiral

  11. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    DTIC Science & Technology

    2009-12-09

    Nuclear Terrorism in Pakistan: Sabotage of a Spent Fuel Cask or a Commercial Irradiation Source in Transport ,” in Pakistan’s Nuclear Future, 2008...gave additional urgency to the program. Pakistan produced fissile material for its nuclear weapons using gas-centrifuge-based uranium enrichment...technology, which it mastered by the mid-1980s. Highly-enriched uranium (HEU) is one of two types of fissile material used in nuclear weapons; the other

  12. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    DTIC Science & Technology

    2009-07-30

    Pakistan: Sabotage of a Spent Fuel Cask or a Commercial Irradiation Source in Transport ,” in Pakistan’s Nuclear Future, 2008; Martellini, 2008. 79...that Pakistan’s strategic nuclear assets could be obtained by terrorists, or used by elements in the Pakistani government. Chair of the Joint Chiefs...that gave additional urgency to the program. Pakistan produced fissile material for its nuclear weapons using gas-centrifuge-based uranium

  13. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    DTIC Science & Technology

    2010-10-07

    Pakistan: Sabotage of a Spent Fuel Cask or a Commercial Irradiation Source in Transport ,” in Pakistan’s Nuclear Future, 2008; Martellini, 2008. 99...prevent unauthorized or accidental use of nuclear weapons, as well as contribute to physical security of storage facilities and personnel reliability... nuclear assets could be obtained by terrorists, or used by elements in the Pakistani government. Chair of the Joint Chiefs of Staff Admiral Michael

  14. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    DTIC Science & Technology

    2009-10-15

    and technical measures to prevent unauthorized or accidental use of nuclear weapons, as well as contribute to physical security of storage ...Talks On Nuclear Security,” The Boston Globe, May 5, 2009. 79 Abdul Mannan, “Preventing Nuclear Terrorism in Pakistan: Sabotage of a Spent Fuel Cask or...a Commercial Irradiation Source in Transport ,” in Pakistan’s Nuclear Future, 2008; Martellini, 2008. 80 Martellini, 2008. 81 For more information

  15. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    DTIC Science & Technology

    2012-05-10

    2009. 143 Abdul Mannan, “Preventing Nuclear Terrorism in Pakistan: Sabotage of a Spent Fuel Cask or a Commercial Irradiation Source in Transport ,” in...Program.” Some analysts argue that spent nuclear fuel is more vulnerable when being transported . 144 Martellini, 2008. Pakistan’s Nuclear Weapons...urgency to the program. Pakistan produced fissile material for its nuclear weapons using gas-centrifuge-based uranium enrichment technology, which it

  16. Detachment 101 in the CBI: An Unconventional Warfare Paradigm for Contemporary Special Operations

    DTIC Science & Technology

    2010-05-13

    Theater. According to historian Clayton Newell , “Roosevelt, a long-time China booster, convinced Churchill to appease the Generalissimo by inviting him to...Clayton R. Newell , Burma, 1942: The U.S. Army Campaigns of World War II (Pamphlet) (Washington, D.C.: U.S. Government Printing Office. 1995), 10...Chalou explains, “They had absolutely no appreciation of the potential of resistance forces, espionage, sabotage and other clandestine operations. Their

  17. JPRS Report, China, Qiushi Seeking Truth, No. 2, 16 January 1991.

    DTIC Science & Technology

    1991-03-21

    ele- Looking back on the past is more for the purpose of ments who sabotage socialism under effective dicta- drawing inspiration from it for the...collective prosperity. It must be made neglect of the important effect of production means absolutely clear that the ability to lead the whole and...guidance and management to democratic dictatorship, we can never do without restrain their negative effect . strengthening and improving the CPC’s

  18. "Deceptive" Cultural Practices that Sabotage HIV/AIDS Education in Tanzania and Kenya

    ERIC Educational Resources Information Center

    Oluga, Mary; Kiragu, Susan; Mohamed, Mussa K.; Walli, Shelina

    2010-01-01

    In spite of numerous HIV/AIDS-prevention education efforts, the HIV infection rates in sub-Saharan Africa remain high. Exploring and understanding the reasons behind these infection rates is imperative in a bid to offer life skills and moral education that address the root causes of the pandemic. In a recent study concerning effective…

  19. 76 FR 43937 - Criminal Penalties for Unauthorized Introduction of Weapons and Sabotage

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-22

    ..., Rockville, Maryland 20852. NRC's Agencywide Documents Access and Management System (ADAMS): Publicly... from which a radiological emergency preparedness alert and warning system is activated. II. Discussion... nationally tracked sources that are included in the NRC's National Source Tracking System (i.e., licensees...

  20. Six ways problem-based learning cases can sabotage patient-centered medical education.

    PubMed

    MacLeod, Anna

    2011-07-01

    Problem-based learning (PBL) cases tell a story of a medical encounter; however, the version of the story is typically very biomedical in focus. The patient and her or his experience of the situation are rarely the focus of the case despite a prevalent discourse of patient-centeredness in contemporary medical education. This report describes a qualitative study that explored the question, "How does PBL teach medical students about what matters in medicine?" The qualitative study, culminating in 2008, involved three data collection strategies: (1) a discourse analysis of a set of PBL cases from 2005 to 2006, (2) observation of a PBL tutorial group, and (3) semistructured, in-depth, open-ended interviews with medical educators and medical students. In this report, using data gathered from 67 PBL cases, 26 hours of observation, and 14 interviews, the author describes six specific ways in which PBL cases-if not thoughtfully conceptualized and authored-can serve to overlook social considerations, thereby undermining a patient-centered approach. These comprise the detective case, the shape-shifting patient, the voiceless PBL person, the joke name, the disembodied PBL person, and the stereotypical PBL person. PBL cases constitute an important component of undergraduate medical education. Thoughtful authoring of PBL cases has the potential to reinforce, rather than undermine, principles of patient-centeredness.

  1. Water Vulnerability Assessments

    DTIC Science & Technology

    1991-04-01

    Air Force Base , Texas 78235-5000 B AApril 1991 MAY f2-D T Final ReportBo R ’V Approved for public release...dilstribution Is unlimited. 91-00493 91 524 020 IIlI 111III II AIR FORCE SYSTEMS COMMAND SBROOKS AIR FORCE BASE , TEXAS 78235-5000 NOTICES When Government...tornadoes. If the base is on a fault line, they should do an assessment for earthquakes. Air Force plans should include sabotage, biological,

  2. JPRS Report, Near East & South Asia

    DTIC Science & Technology

    1992-05-14

    in Lebanon. When we contacted Hawatimah and his Political Bureau in Dam- ascus , they initially pretended that they were unaware of what their...editorial staff, says the council members— whose average age is only 37—are not representative of young people. The MJD goes further, accusing them...other sectors responsible for the collapse and sabotage of the national economy." He also said "magistrates were not responsible for man- aging

  3. ORNL necessary and sufficient standards for environment, safety, and health. Final report of the Identification Team for other industrial, radiological, and non-radiological hazard facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1998-07-01

    This Necessary and Sufficient (N and S) set of standards is for Other Industrial, Radiological, and Non-Radiological Hazard Facilities at Oak Ridge National Laboratory (ORNL). These facility classifications are based on a laboratory-wide approach to classify facilities by hazard category. An analysis of the hazards associated with the facilities at ORNL was conducted in 1993. To identify standards appropriate for these Other Industrial, Radiological, and Non-Radiological Hazard Facilities, the activities conducted in these facilities were assessed, and the hazards associated with the activities were identified. A preliminary hazards list was distributed to all ORNL organizations. The hazards identified in priormore » hazard analyses are contained in the list, and a category of other was provided in each general hazard area. A workshop to assist organizations in properly completing the list was held. Completed hazard screening lists were compiled for each ORNL division, and a master list was compiled for all Other Industrial, Radiological Hazard, and Non-Radiological facilities and activities. The master list was compared against the results of prior hazard analyses by research and development and environment, safety, and health personnel to ensure completeness. This list, which served as a basis for identifying applicable environment, safety, and health standards, appears in Appendix A.« less

  4. Systems Analysis Directorate Activities Summary, May 1976

    DTIC Science & Technology

    1976-06-01

    approach is to assume an attack by force is made on a fixed facility with the intent to remove certain materials or perform sabotage of some portion of...IBPS/»-«/, and DATA ACTL/*--/ in main program at statement numbers TAT00500-550, and move them into a BLOCK DATA subroutine as shown below: 0001...NPQ-••). The variables JJ and IIA are common variables and should not be transferred in a subroutine call statement. (7) Statement numbers 0N2211

  5. From Sticks and Stones to Zeros and Ones: The Development of Computer Network Operations as an Element of Warfare. A Study of the Palestinian-Israeli Cyberconflict and What the United States Can Learn from the Interfada

    DTIC Science & Technology

    2005-09-01

    Israeli teens who sabotaged a website of Hezbollah, the militantly anti-Israel guerrilla movement in Lebanon, with a defacement which placed an Israeli...ftp with out a password. FUCK HIZZBALLA!!! Sincerely digibrain & haboshanik (we are the domain masters).” • Hackers of Israel Unite: Hackers of...other defacement. 2. b1n4ry c0d3 defaced only one site on December 3, 2000. This defacement was the only one to refer to the WFD as the “World’s Fuck

  6. Believing Your Eyes: Strengthening the Reliability of Tags and Seals

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brim, Cornelia P.; Denlinger, Laura S.

    2013-07-01

    NNSA’s Office of Nonproliferation and International Security (NIS) is working together with scientific experts at the DOE national laboratories to develop the tools needed to safeguard and secure nuclear material from diversion, theft, and sabotage--tasks critical to support future arms control treaties that may involve the new challenge of monitoring nuclear weapons dismantlement. Use of optically stimulated luminescent material is one method to enhance the security and robustness of existing tamper indicating devices such as tags and seals.

  7. Potential Sabotage of Host Cell Physiology by Apicomplexan Parasites for Their Survival Benefits

    PubMed Central

    Chakraborty, Shalini; Roy, Sonti; Mistry, Hiral Uday; Murthy, Shweta; George, Neena; Bhandari, Vasundhra; Sharma, Paresh

    2017-01-01

    Plasmodium, Toxoplasma, Cryptosporidium, Babesia, and Theileria are the major apicomplexan parasites affecting humans or animals worldwide. These pathogens represent an excellent example of host manipulators who can overturn host signaling pathways for their survival. They infect different types of host cells and take charge of the host machinery to gain nutrients and prevent itself from host attack. The mechanisms by which these pathogens modulate the host signaling pathways are well studied for Plasmodium, Toxoplasma, Cryptosporidium, and Theileria, except for limited studies on Babesia. Theileria is a unique pathogen taking into account the way it modulates host cell transformation, resulting in its clonal expansion. These parasites majorly modulate similar host signaling pathways, however, the disease outcome and effect is different among them. In this review, we discuss the approaches of these apicomplexan to manipulate the host–parasite clearance pathways during infection, invasion, survival, and egress. PMID:29081773

  8. Games of Subversion and Sabotage: Issues of Power, Masculinity, Class, Rurality and Schooling

    ERIC Educational Resources Information Center

    Keddie, Amanda

    2007-01-01

    This paper presents a longitudinal insight into the experiences of "Adam," a young boy who lives with his single-parent father (a farmer and builder) in a rural working-class community on the outskirts of a provincial town in Tasmania, Australia. Adam's story juxtaposes my representations of him as an eight year old in 1999 and as a 12…

  9. Reliability and Validity of Nonradiologic Measures of Forward Flexed Posture in Parkinson Disease.

    PubMed

    Nair, Prajakta; Bohannon, Richard W; Devaney, Laurie; Maloney, Catherine; Romano, Alexis

    2017-03-01

    To examine the intertester reliability and validity of 5 nonradiologic measures of forward flexed posture in individuals with Parkinson disease (PD). Cross-sectional observational study. University outpatient facility and community centers. Individuals (N=28) with PD with Hoehn and Yahr scores of 1 through 4. Not applicable. Occiput to wall status, tragus to wall distance, C7 to wall distance, photographically derived trunk flexion angle, and inclinometric kyphosis measure. Participants were older adults (mean, 69.7±10.6y) with a 14-month to 15-year (mean, 5.9±3.5y) history of PD. Intertester reliability was excellent for all measures (κ=.89 [cued condition] and 1.0 [relaxed condition] for occiput to wall status; intraclass correlation coefficients, .779-.897 for tragus to wall distance, C7 to wall distance, flexion angle, and inclinometric kyphosis measure). Convergent validity was supported for all measures by significant correlations between the same measures obtained during relaxed and cued conditions (eg, occiput to wall relaxed and cued) and for most measures by significant correlations between measures obtained under the same condition (eg, occiput to wall cued and tragus to wall cued). Significant correlations between tragus to wall distance, C7 to wall distance, flexion angle, and inclinometric kyphosis measure and the Unified Parkinson Disease Rating Scale item 28 (posture) also supported convergent validity. Significant differences between tragus to wall distance, C7 to wall distance, and inclinometric kyphosis measure values under relaxed and cued conditions supported known condition validity. Known group validity was demonstrated by significant differences in tragus to wall distance, C7 to wall distance, and inclinometric kyphosis measure obtained from individuals able and individuals unable to touch their occiput to wall when cued to stand tall. Tragus to wall distance, C7 to wall distance, and inclinometric kyphosis measure are reliable and valid

  10. Satellite power system (SPS) military implications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bain, C.N.

    1978-10-01

    This study was conducted to examine military implications of the NASA Reference SPS and to identify important military related study tasks that could be completed during fiscal year 1979. Primary areas of investigation were the potential of the SPS as a weapon, for supporting U.S. military preparedness and for affecting international relations. In addition, the SPS's relative vulnerability to overt military action, terrorist attacks, and sabotage was considered. The SPS could act as an electronic warfare weapon and, with modification, as a marginally effective energy-beaming weapon. The system could support military preparedness by providing energy for a strong and stablemore » U.S. economy and by providing a powered platform for military systems, system segments, and operations. The SPS would be vulnerable to military action, terrorism and sabotage unless hardened against these attacks by design, security, and a self-defense system. Tasks identified for completion in fiscal year 1979 include (a) a detailed vulnerability study, (b) evaluation of an SPS self-defense system concept, (c) determination of the effect of SPS flexibility to deliver different sized electrical loads on the ability to gain SPS support from individual nations, and (d) investigation of the effect of SPS deployment schedule on obtaining needed agreements, providing security, and controlling risks of armed conflict. A fifth and long-term task would consist of a worldwide survey identifiying military implications of the SPS that result from the specific requirements of potential SPS power customers.« less

  11. World commercial aircraft accidents. Second edition, 1946--1992

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kimura, C.Y.

    1993-01-01

    This report is a compilation of all accidents world-wide involving aircraft in commercial service which resulted in the loss of the airframe or one or more fatality, or both. This information has been gathered in order to present a complete inventory of commercial aircraft accidents. Events involving military action, sabotage, terrorist bombings, hijackings, suicides, and industrial ground accidents are included within this list. Included are: accidents involving world commercial jet aircraft, world commercial turboprop aircraft, world commercial pistonprop aircraft with four or more engines and world commercial pistonprop aircraft with two or three engines from 1946 to 1992. Each accidentmore » is presented with information in the following categories: date of the accident, airline and its flight numbers, type of flight, type of aircraft, aircraft registration number, construction number/manufacturers serial number, aircraft damage, accident flight phase, accident location, number of fatalities, number of occupants, cause, remarks, or description (brief) of the accident, and finally references used. The sixth chapter presents a summary of the world commercial aircraft accidents by major aircraft class (e.g. jet, turboprop, and pistonprop) and by flight phase. The seventh chapter presents several special studies including a list of world commercial aircraft accidents for all aircraft types with 100 or more fatalities in order of decreasing number of fatalities, a list of collision accidents involving commercial aircrafts, and a list of world commercial aircraft accidents for all aircraft types involving military action, sabotage, terrorist bombings, and hijackings.« less

  12. World commercial aircraft accidents

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kimura, C.Y.

    1993-01-01

    This report is a compilation of all accidents world-wide involving aircraft in commercial service which resulted in the loss of the airframe or one or more fatality, or both. This information has been gathered in order to present a complete inventory of commercial aircraft accidents. Events involving military action, sabotage, terrorist bombings, hijackings, suicides, and industrial ground accidents are included within this list. Included are: accidents involving world commercial jet aircraft, world commercial turboprop aircraft, world commercial pistonprop aircraft with four or more engines and world commercial pistonprop aircraft with two or three engines from 1946 to 1992. Each accidentmore » is presented with information in the following categories: date of the accident, airline and its flight numbers, type of flight, type of aircraft, aircraft registration number, construction number/manufacturers serial number, aircraft damage, accident flight phase, accident location, number of fatalities, number of occupants, cause, remarks, or description (brief) of the accident, and finally references used. The sixth chapter presents a summary of the world commercial aircraft accidents by major aircraft class (e.g. jet, turboprop, and pistonprop) and by flight phase. The seventh chapter presents several special studies including a list of world commercial aircraft accidents for all aircraft types with 100 or more fatalities in order of decreasing number of fatalities, a list of collision accidents involving commercial aircrafts, and a list of world commercial aircraft accidents for all aircraft types involving military action, sabotage, terrorist bombings, and hijackings.« less

  13. Directed polymers versus directed percolation

    NASA Astrophysics Data System (ADS)

    Halpin-Healy, Timothy

    1998-10-01

    Universality plays a central role within the rubric of modern statistical mechanics, wherein an insightful continuum formulation rises above irrelevant microscopic details, capturing essential scaling behaviors. Nevertheless, occasions do arise where the lattice or another discrete aspect can constitute a formidable legacy. Directed polymers in random media, along with its close sibling, directed percolation, provide an intriguing case in point. Indeed, the deep blood relation between these two models may have sabotaged past efforts to fully characterize the Kardar-Parisi-Zhang universality class, to which the directed polymer belongs.

  14. Polygraph Screening of Physicists and Spies

    NASA Astrophysics Data System (ADS)

    Lykken, David

    2000-03-01

    You will be invited to imagine yourself a scientist at the weapons laboratory at Los Alamos. You have just been ordered, pursuant to DOE Secretary Richardson's directive, to submit to a polygraph or ``lie detector" test, the Test for Espionage and Sabotage or TES. This talk will help you to picture yourself being tested and to predict whether you will pass or fail the TES. It will also explain why your passing or failing will have little to do with whether you are in fact a spy or not.

  15. The Trouble with Niceness: How a Preference for Pleasantry Sabotages Culturally Responsive Teacher Preparation

    ERIC Educational Resources Information Center

    Bissonnette, Jeanne Dyches

    2016-01-01

    Because few teacher education programs are truly rooted in the philosophical aims of multicultural and social justice education (Asher, 2007; Banks, 2008; Hayes & Juarez, 2012; Miller, 2014), many pre-service teachers (PSTs) remain unpracticed--and unable--to teach in culturally responsive ways (Sleeter, 2012). But what structures and forces…

  16. Scavengers: A behind-the-scenes recycling battle

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goff, J.A.

    Though it may not garner a spotlight as the number-one issue facing the recycling industry, the theft of recyclables is a subtle and elusive vexation that is costing haulers and recyclers thousands of dollars each year. Scavenging is not a new dilemma for the industry. But aside from an occasional seminar on the topic, not much attention has been devoted to the problem, despite the fact that poaching deprives curbside programs of revenues that help offset operating costs. In some locations, losses due to scavenging have sabotaged the efficacy of curbside recycling as a whole.

  17. Site environmental report for Calendar Year 1994 on radiological and nonradiological parameters

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1995-06-30

    Battelle Memorial Institute`s nuclear research facilities are currently being maintained in a surveillance and maintenance (S&M) mode with continual decontamination and decommissioning (D&D) activities being conducted under Department of Energy (DOE) Contract W-7405-ENG-92. These activities are referred to under the Contract as the Battelle Columbus Laboratories Decommissioning Project (BCLDP). Operations referenced in this report are performed in support of S&M and D&D activities. Battelle`s King Avenue facility is not considered in this report to the extent that the West Jefferson facility is. The source term at the King Avenue site is a small fraction of the source term at themore » West Jefferson site. Off site levels of radionuclides that could be attributed to the west Jefferson and King Avenue nuclear operations wereindistinguishable from background levels at specific locations where air, water, and direct radiation measurements were performed. Environmental monitoring continued to demonstrate compliance by Battelle with federal, state and local regulations. Routine, nonradiological activities performed include monitoring liquid effluents and monitoring the ground water system for the West Jefferson North site. Samples of various environmental media including air, water, grass, fish, field and garden crops, sediment and soil were collected from the region surrounding the two sites and analyzed.« less

  18. Potential criminal adversaries of nuclear programs: a portrait

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jenkins, B.M.

    1980-07-01

    This paper examines the possibility that terrorists or other kinds of criminals might attempt to seize or sabotage a nuclear facility, steal nuclear material, or carry out other criminal activities in the nuclear domain which has created special problems for the security of nuclear programs. This paper analyzes the potential threat. Our tasks was to describe the potential criminal adversary, or rather the spectrum of potential adversaries who conceivably might carry out malevolent criminal actions against nuclear programs and facilities. We were concerned with both the motivations as well as the material and operational capabilities likely to be displayed bymore » various categories of potential nuclear adversaries.« less

  19. Dataset of anomalies and malicious acts in a cyber-physical subsystem.

    PubMed

    Laso, Pedro Merino; Brosset, David; Puentes, John

    2017-10-01

    This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its automated control and data acquisition infrastructure. Described data consist of temporal series representing five operational scenarios - Normal, aNomalies, breakdown, sabotages, and cyber-attacks - corresponding to 15 different real situations. The dataset is publicly available in the .zip file published with the article, to investigate and compare faulty operation detection and characterization methods for cyber-physical systems.

  20. A Formidable Foe is Sabotaging Your Results: What You Should Know about Biofilms and Wound Healing

    PubMed Central

    Barker, Jenny C; Khansa, Ibrahim; Gordillo, Gayle M

    2017-01-01

    Learning Objectives After reading this article, the participant should be able to: 1. Describe biofilm pathogenesis as it relates to problem wounds, 2. Understand the pre-clinical and clinical evidence implicating biofilm in problem wounds, 3. Explain the diagnostic and treatment challenges that biofilms create for problem wounds, 4. Demonstrate a basic understanding of emerging strategies aimed at counteracting these processes. Summary Biofilm represents a protected mode of growth for bacteria, allowing them to evade standard diagnostic techniques and avoid eradication by standard therapies. Though only recently discovered, biofilm has existed for millennia and complicates nearly every aspect of medicine. Biofilm impacts wound healing by allowing bacteria to evade immune responses, prolonging inflammation and disabling skin barrier function. It is important to understand why problem wounds persist despite state-of-the-art treatment, why they are difficult to accurately diagnose, and why they recur. The aim of this article is to focus on current gaps in knowledge related to problem wounds, specifically, biofilm infection. PMID:28445380

  1. Balanced program plan. Analysis for biomedical and environmental research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1976-06-01

    Major issues associated with the use of nuclear power are health hazards of exposure to radioactive materials; sources of radiation exposure; reactor accidents; sabotage of nuclear facilities; diversion of fissile material and its use for extortion; and the presence of plutonium in the environment. Fission fuel cycle technology is discussed with regard to milling, UF/sub 6/ production, uranium enrichment, plutonium fuel fabrication, power production, fuel processing, waste management, and fuel and waste transportation. The following problem areas of fuel cycle technology are briefly discussed: characterization, measurement, and monitoring; transport processes; health effects; ecological processes and effects; and integrated assessment. Estimatedmore » program unit costs are summarized by King-Muir Category. (HLW)« less

  2. Summary report on transportation of nuclear fuel materials in Japan : transportation infrastructure, threats identified in open literature, and physical protection regulations.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cochran, John Russell; Ouchi, Yuichiro; Furaus, James Phillip

    2008-03-01

    This report summarizes the results of three detailed studies of the physical protection systems for the protection of nuclear materials transport in Japan, with an emphasis on the transportation of mixed oxide fuel materials1. The Japanese infrastructure for transporting nuclear fuel materials is addressed in the first section. The second section of this report presents a summary of baseline data from the open literature on the threats of sabotage and theft during the transport of nuclear fuel materials in Japan. The third section summarizes a review of current International Atomic Energy Agency, Japanese and United States guidelines and regulations concerningmore » the physical protection for the transportation of nuclear fuel materials.« less

  3. Leadership: social identity and guiding from within.

    PubMed

    Kerfoot, Karlene M

    2009-01-01

    An important field in leadership research is that of the social identity of the group and what that means for leadership. In health care, there are many different types of social identities that vary by hospital, geography, and profession. Leaders often sabotage their effectiveness when they do not consider the social values of the group. The work of leaders is to help move units and organizations to a higher level of performance. Identifying the social identity of the group is the first step. The most successful have expertise in assessing the social identity of groups and developing a commonality of a shared vision that represents the best work of the group and of the leader.

  4. Leadership: social identity and guiding from within.

    PubMed

    Kerfoot, Karlene M

    2007-01-01

    An important field in leadership research is that of the social identity of the group and what that means for leadership. In health care, there are many different types of social identities that vary by hospital, geography, and profession. Leaders often sabotage their effectiveness when they do not consider the social values of the group. The work of leaders is to help move units and organizations to a higher level of performance. Identifying the social identity of the group is the first step. The most successful have expertise in assessing the social identity of groups and developing a commonality of a shared vision that represents the best work of the group and of the leader.

  5. A comprehensive inventory of radiological and nonradiological contaminants in waste buried or projected to be buried in the subsurface disposal area of the INEL RWMC during the years 1984-2003, Volume 3

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1995-05-01

    This is the third volume of this comprehensive report of the inventory of radiological and nonradiological contaminants in waste buried or projected to be buried in the subsurface disposal area of the Idaho National Engineering Laboratory. Appendix B contains a complete printout of contaminant inventory and other information from the CIDRA Database and is presented in volumes 2 and 3 of the report.

  6. Implementing an Information Security Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to covermore » information security best practices, planning for an information security management system, and implementing security controls for information security.« less

  7. Game theoretic analysis of physical protection system design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Canion, B.; Schneider, E.; Bickel, E.

    The physical protection system (PPS) of a fictional small modular reactor (SMR) facility have been modeled as a platform for a game theoretic approach to security decision analysis. To demonstrate the game theoretic approach, a rational adversary with complete knowledge of the facility has been modeled attempting a sabotage attack. The adversary adjusts his decisions in response to investments made by the defender to enhance the security measures. This can lead to a conservative physical protection system design. Since defender upgrades were limited by a budget, cost benefit analysis may be conducted upon security upgrades. One approach to cost benefitmore » analysis is the efficient frontier, which depicts the reduction in expected consequence per incremental increase in the security budget.« less

  8. A review of X-ray explosives detection techniques for checked baggage.

    PubMed

    Wells, K; Bradley, D A

    2012-08-01

    In recent times, the security focus for civil aviation has shifted from hijacking in the 1980s, towards deliberate sabotage. X-ray imaging provides a major tool in checked baggage inspection, with various sensitive techniques being brought to bear in determining the form, and density of items within luggage as well as other material dependent parameters. This review first examines the various challenges to X-ray technology in securing a safe system of passenger transportation. An overview is then presented of the various conventional and less conventional approaches that are available to the airline industry, leading to developments in state-of-the-art imaging technology supported by enhanced machine and observer-based decision making principles. Copyright © 2012 Elsevier Ltd. All rights reserved.

  9. Good is not good enough: the culture of low expectations and the leader's challenge.

    PubMed

    Kerfoot, Karlene M

    2010-01-01

    There are many examples of health care organizations that have morphed from the culture of low expectation to the culture of excellence. Ethically, to not drive to excellence means that we are settling from knowingly allowing harm to happen on our watch. The leader's obligation is to create that sonic boom that Black and Gregersen (2008) describe to break up the old mind maps, to create the movement, and to finish the cultural change in spite of change fatigue and other factors that could sabotage the process. Only then can the effective leader sleep well at night knowing that the infrastructure is being created that will provide a culture of excellence and safety for patients and their families. And it is being created on his/her watch.

  10. Mitigating Insider Sabotage and Espionage: A Review of the United States Air Force’s Current Posture

    DTIC Science & Technology

    2009-03-01

    published on ins ider threat, to include the variables that come into play and historical case studies. Existing insider threat models are discussed ...problem, including the initial development of a logical da ta mod el and a system dynamics model. This chapter also discusses the selection of the...Finally, Chapter V provides a summary of the research along with a discussion of its conclusions and impact. Recommendations for future research

  11. Nuclear power: Siting and safety

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Openshaw, S.

    1986-01-01

    By 2030, half, or even two-thirds, of all electricity may be generated by nuclear power. Major reactor accidents are still expected to be rare occurrences, but nuclear safety is largely a matter of faith. Terrorist attacks, sabotage, and human error could cause a significant accident. Reactor siting can offer an additional, design-independent margin of safety. Remote geographical sites for new plants would minimize health risks, protect the industry from negative changes in public opinion concerning nuclear energy, and improve long-term public acceptance of nuclear power. U.K. siting practices usually do not consider the contribution to safety that could be obtainedmore » from remote sites. This book discusses the present trends of siting policies of nuclear power and their design-independent margin of safety.« less

  12. Digital discrimination: Political bias in Internet service provision across ethnic groups.

    PubMed

    Weidmann, Nils B; Benitez-Baleato, Suso; Hunziker, Philipp; Glatz, Eduard; Dimitropoulos, Xenofontas

    2016-09-09

    The global expansion of the Internet is frequently associated with increased government transparency, political rights, and democracy. However, this assumption depends on marginalized groups getting access in the first place. Here we document a strong and persistent political bias in the allocation of Internet coverage across ethnic groups worldwide. Using estimates of Internet penetration obtained through network measurements, we show that politically excluded groups suffer from significantly lower Internet penetration rates compared with those in power, an effect that cannot be explained by economic or geographic factors. Our findings underline one of the central impediments to "liberation technology," which is that governments still play a key role in the allocation of the Internet and can, intentionally or not, sabotage its liberating effects. Copyright © 2016, American Association for the Advancement of Science.

  13. Resource Geopolitics: Cold War Technologies, Global Fertilizers, and the Fate of Western Sahara.

    PubMed

    Camprubí, Lino

    2015-07-01

    When, after years of geological and geophysical exploration, a phosphate mine was discovered at Bu-Craa in 1964, Western Sahara received renewed geopolitical attention. Several countries competing for the control of the world fertilizer market, including Morocco, Spain, France, and the United States, developed diverging strategies to gain control of the mineral. After intense negotiations revolving around the materiality of mining technologies and involving reserve estimations, sabotage, and flexing of diplomatic muscles, Morocco took over the Spanish colony in 1975. While this secured Morocco's place in the world market, it condemned the local population to exile and domination. This article explores three technological stages of the exploitation of phosphate in Western Sahara that underpin the geopolitical history. This perspective yields new visions of cold war technology and postcolonial markets.

  14. Reactor safeguards system assessment and design. Volume I

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Varnado, G.B.; Ericson, D.M. Jr.; Daniel, S.L.

    1978-06-01

    This report describes the development and application of a methodology for evaluating the effectiveness of nuclear power reactor safeguards systems. Analytic techniques are used to identify the sabotage acts which could lead to release of radioactive material from a nuclear power plant, to determine the areas of a plant which must be protected to assure that significant release does not occur, to model the physical plant layout, and to evaluate the effectiveness of various safeguards systems. The methodology was used to identify those aspects of reactor safeguards systems which have the greatest effect on overall system performance and which, therefore,more » should be emphasized in the licensing process. With further refinements, the methodology can be used by the licensing reviewer to aid in assessing proposed or existing safeguards systems.« less

  15. The case of Vipul Bhrigu and the federal definition of research misconduct.

    PubMed

    Rasmussen, Lisa M

    2014-06-01

    The Office of Research Integrity found in 2011 that Vipul Bhrigu, a postdoctoral researcher who sabotaged a colleague's research materials, was guilty of misconduct. However, I argue that this judgment is ill-considered and sets a problematic precedent for future cases. I first discuss the current federal definition of research misconduct and representative cases of research misconduct. Then, because this case recalls a debate from the 1990s over what the definition of "research misconduct" ought to be, I briefly recapitulate that history and reconsider the Bhrigu case in light of that history and in comparison to other cases involving tampering. Finally, I consider what the aim of a definition of research misconduct ought to be, and argue that the precedent set by the reasoning in this case is problematic.

  16. The Department of Defense energy vulnerabilities: Potential problems and observations

    NASA Astrophysics Data System (ADS)

    Freiwald, D. A.; Berger, M. E.; Roach, J. F.

    1982-08-01

    The Department of Defense is almost entirely dependent on civilian energy supplies to meet its needs in both peacetime and periods of heightened conflict. There are a number of potential vulnerabilities to the continual and timely supply of energy to both the civilian and military sectors. These include denial of the energy resources themselves, disruption of critical transportation networks, destruction of storage facilities, and interruption of electrical power. This report briefly reviews the present situation for provision of energy from the civilian sector to the military. General vulnerabilities of the existing energy supply system are identified, along with the potential for armed aggression (including terrorist and sabotage activities) against the energy network. Conclusions and some tentative observations are made as to a proper response to the existing vulnerabilities.

  17. [Cigarette smuggling: a wide scope phenomenon only there to serve the interests of big tobacco manufacturers].

    PubMed

    Gauvin, Louis

    2005-01-01

    "Cigarette smuggling: a wide scope phenomenon only there to serve the interests of big tobacco manuafacturers" uses industry officials' quotes and documents to describe how tobacco manufacturers are involved in the organisation of smuggling and how manufacturers use smuggling in two ways: on one hand, to flood markets with cheap cigarettes and defeat governements' efforts to reduce tobacco consumption by adopting one of the most efficient public health measures (ie: high taxation of tobacco products) and on the other hand, by using the false threat of increased contraband to scare politicians and prevent them from adopting strong fiscal policies. The Framework Convention on Tobacco Control (FCTC) with a protocol on smuggling and the collaboration between international agencies is a means to counter and defeat the tobacco industry attemps at sabotaging efficient public health measures.

  18. Physician recruitment success: how to acquire top physician talent.

    PubMed

    Rosman, Judy

    2011-01-01

    This article provides step-by-step instructions on how to complete the strategic planning needed to ensure success in physician recruitment efforts, outlines how to build a successful recruitment team, and provides helpful advice to avoid common recruiting mistakes that can sabotage the recruitment efforts of even the best practices. This article discusses the role of the in-house hospital recruiter in the recruitment process, how to evaluate independent search firms, how to make use of the physicians in your group to ensure success during a site visit, and how to ensure that your new hire will be able to successfully develop a practice. The article also discusses how to find and use benchmarking data to ensure that your compensation package is competitive, and provides advice on how to help your new physician hit the ground running.

  19. BORDERLINE PERSONALITY DISORDER IN THE MEDICAL SETTING: Suggestive Behaviors, Syndromes, and Diagnoses.

    PubMed

    Sansone, Randy A; Sansone, Lori A

    2015-01-01

    Borderline personality disorder is a personality dysfunction that is characterized by disinhibition and impulsivity, which oftentimes manifest as self-regulation difficulties. Patients with this disorder have always been present in medical settings, but have been described as "difficult patients" rather than patients with borderline personality disorder. According to empirical findings, a number of behaviors and medical syndromes/diagnoses are suggestive of borderline personality disorder. Suggestive behaviors in the medical setting may include aggressive or disruptive behaviors, the intentional sabotage of medical care, and excessive healthcare utilization. Suggestive medical syndromes and diagnoses in the medical setting may include alcohol and substance misuse (including the abuse of prescription medications), multiple somatic complaints, chronic pain, obesity, sexual impulsivity, and hair pulling. While not all-inclusive or diagnostic, these behaviors and syndromes/diagnoses may invite further clinical evaluation of the patient for borderline personality disorder.

  20. Satellite orbit determination from an airborne platform

    NASA Astrophysics Data System (ADS)

    Shepard, M. M.; Foshee, J. J.

    This paper describes the requirements, approach, and problems associated with autonomous satellite orbit determination from an airborne platform. The ability to perform orbit determination from an airborne platform removes the reliance on ground control facilities. Aircraft orbit determination offers a more robust system in that it is less susceptible to direct attack, sabotage, or nuclear disaster. Ranging on a satellite and the processing of range/range-rate data along with INS inputs to produce a set of orbital parameters to be transmitted to user terminals are discussed. Several algorithms that could be utilized by the user terminal to recover the satellite position/velocity data from the transmitted message are presented. The ability to compress the ephemeris message to a small size while remaining autonomous for a long period of time, as would be needed in future military communication satellites, is discussed.

  1. Subversion of cytokine networks by virally encoded decoy receptors

    PubMed Central

    Epperson, Megan L.; Lee, Chung A.; Fremont, Daved H.

    2012-01-01

    Summary During the course of evolution, viruses have captured or created a diverse array of open reading frames that encode for proteins that serve to evade and sabotage the host innate and adaptive immune responses, which would otherwise lead to their elimination. These viral genomes are some of the best textbooks of immunology ever written. The established arsenal of immunomodulatory proteins encoded by viruses is large and growing and includes specificities for virtually all known inflammatory pathways and targets. The focus of this review is on herpes and poxvirus-encoded cytokine and chemokine binding proteins that serve to undermine the coordination of host immune surveillance. Structural and mechanistic studies of these decoy receptors have provided a wealth of information, not only about viral pathogenesis but also about the inner workings of cytokine signaling networks. PMID:23046131

  2. Security Management and Safeguards Office

    NASA Technical Reports Server (NTRS)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  3. Tobacco: coopting our public health.

    PubMed

    Basil, M D

    1996-01-01

    Communication is a tool that can be used to promote public health. The case of tobacco illustrates, however, that behavior change can only be advocated, not ensured. The tobacco industry has focused on individual- and societal-level actions that effectively sabotage antismoking campaigns. Health communication researchers should pay special attention to how politics is subverted, the principle of freedom of speech is abused, message framing encourages the continued marketing of cigarettes, and tobacco advertising swamps public health messages in both quantity and style. The field of health communication should do two things to help counter this campaign. First, we should make a concerted effort to refute the arguments offered by the tobacco companies. Second, we should continue to take action on four levels--as individuals, as responsible citizens, in support of organizations, and to create societal changes that will reduce the use of tobacco.

  4. A Cognitive Profile of Obesity and Its Translation into New Interventions

    PubMed Central

    Jansen, Anita; Houben, Katrijn; Roefs, Anne

    2015-01-01

    Change your lifestyle: decrease your energy intake and increase your energy expenditure, is what obesity experts tell people who need to lose weight. Though the advice might be correct, it appears to be extremely difficult to change one’s lifestyle. Unhealthy habits usually are ingrained and hard to change, especially for people with an “obese cognitive profile.” Knowledge of the cognitive mechanisms that maintain unhealthy eating habits is necessary for the development of interventions that can change behavior effectively. This paper discusses some cognitive processes that might maintain unhealthy eating habits and make healthier eating difficult, like increased food cue reactivity, weak executive skills and attention bias. An effort is also done to translate these basic scientific findings into new interventions which aim to tackle the sabotaging cognitive processes. Preliminary studies into the effectiveness of these interventions, if available, are presented. PMID:26640451

  5. Employment Maintenance and Intimate Partner Violence.

    PubMed

    Borchers, Andrea; Lee, Rebecca C; Martsolf, Donna S; Maler, Jeff

    2016-05-18

    Intimate partner violence (IPV) is a major public health problem in the United States. Negative outcomes of IPV affect women's attainment and maintenance of employment. The purpose of this study was to develop a theoretical framework that described and explained the process by which women who have experienced IPV attain and maintain employment. Grounded theory methodology was used to analyze interviews of 34 women who had experienced IPV. Analysis suggested that women who had experienced IPV could attain employment; however, they had difficulty maintaining employment. Entanglement of work and IPV was experienced by all 34 participants because of the perpetrator controlling their appearance, sabotaging their work, interfering with their work, or controlling their finances. Some women described ways in which they disentangled work from IPV through a dynamic unraveling process, with periods of re-entanglement, resulting in job security and satisfaction. © 2016 The Author(s).

  6. [Organization and delivery of therapeutic care in modern local wars and armed conflicts].

    PubMed

    Khalimov, Iu Sh; Tkachuk, N A; Zhekalov, A N

    2014-08-01

    The system of providing therapeutic care within a united system of staged treatment of wounded and sick and evacuation was established during the Great Patriotic War of 1941-1945 and helped to return 90,6% of casualties to duty. In terms of local wars and armed conflicts the most important task of military field therapy is to improve the provision of therapeutic support through regional and territorial principles, echeloning of forces and facilities, optimization of allocation of medical institutions in accordance with their capabilities, evacuation routes, etc. The organization of therapeutic assistance should be guided primarily by the size and structure of sanitary losses. In modern local wars cannot exclude the occurrence of massive sanitary losses with limited use of weapons of mass destruction, as a result of failure (with a conventional weapon or as a result of sabotage) of nuclear power plants, chemical plants, and transport containers containing toxic chemicals.

  7. Spy the Lie: Detecting Malicious Insiders

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Noonan, Christine F.

    Insider threat is a hard problem. There is no ground truth, there are innumerable variables, and the data is sparse. The types of crimes and abuses associated with insider threats are significant; the most serious include espionage, sabotage, terrorism, embezzlement, extortion, bribery, and corruption. Malicious activities include an even broader range of exploits, such as negligent use of classified data, fraud, cybercrime, unauthorized access to sensitive information, and illicit communications with unauthorized recipients. Inadvertent action or inaction without malicious intent (e.g., disposing of sensitive documents incorrectly) can also cause harm to an organization. This review article will explore insider threat,more » specifically behaviors, beliefs, and current debates within the field. Additionally particular focus is given to deception, a significant behavioral component of the malicious insider. Finally, research and policy implications for law enforcement and the intelligence community are addressed.« less

  8. The emergence of Electronic Democracy as an auxiliary to representational democracy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Noel, R.E.

    1994-06-01

    Electronic democracy as a system is defined, and the ways in which it may affect current systems of government is addressed. Electronic democracy`s achievements thus far in the United States at the community level are surveyed, and prospects for its expansion to state, national, and international systems are summarized. Central problems of electronic democracy are described, and its feasibility assessed (including safeguards against, and vulnerabilities to sabotage and abuse); the ways in which new and ongoing methods for information dissemination pose risks to current systems of government are discussed. One of electronic democracy`s underlying assumptions is challenged, namely that itsmore » direct, instant polling capability necessarily improves or refines governance. Further support is offered for the assertion that computer systems/networks should be used primarily to educate citizens and enhance awareness of issues, rather than as frameworks for direct decision making.« less

  9. Multiple Losses: The Psychological and Economic Well-Being of Survivors of Intimate Partner Violence.

    PubMed

    Sauber, Elizabeth W; O'Brien, Karen M

    2017-05-01

    This study advanced knowledge regarding the mechanisms through which intimate partner violence relates to psychological and financial distress with a sample of diverse low-income women. Data were collected from 147 female domestic violence survivors who were abused by a male partner within the past 6 months. Three hierarchical regression analyses revealed that psychological, physical, and economic abuse were predictive of posttraumatic stress, depression, and economic self-sufficiency among survivors. Guided by the Conservation of Resources Theory, the loss of financial, work, and interpersonal resources also predicted these three outcomes, above and beyond abuse experiences (i.e., economically controlling behaviors, economic sabotage, and interpersonal resource loss were unique predictors). In addition, bootstrap mediation analyses showed that interpersonal resource loss partially mediated the relationship between psychological abuse and mental health outcomes. Together, these findings can be used to inform future interventions to promote the financial and psychological well-being of survivors.

  10. Reconnaissance report on geology of Eklutna Lake dam site and conduit route near Anchorage, Alaska

    USGS Publications Warehouse

    Bateman, A.F.

    1947-01-01

    C. A foundation exploration program is recommended that includes deepening test pit No. 1 and drill hole No. 2, and drilling 11 new holes. It is suggested that one drill hold near the center of the valley be taken to bedrock to give a complete picture of the fill materials underlying the foundation. 3. Delivery of water from the forebay of the reservoir to the powerhouse eight miles downvalley by means of a conduit is regarded as infeasible because: difficult terrain of the route will require earthwork more extensive than the volume of the dam; the route is subject to land slides, and will require expensive maintenance; it is more or less completely exposed to adverse winter conditions that may engender icing conditions; and it is easily subject to sabotage. It is recommended that the water be taken to the powerhouse through a rock tunnel.

  11. Modeling Human Behavior to Anticipate Insider Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Hohimer, Ryan E.

    2011-06-09

    The insider threat ranks among the most pressing cybersecurity challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach providesmore » automated support for the detection of high-risk behavioral “triggers” to help focus the analyst’s attention and inform the analysis. Designed to be domain independent, the system may be applied to many different threat and warning analysis/sensemaking problems.« less

  12. Simulation for Teaching and Assessment of Nodule Perception on Chest Radiography in Nonradiology Health Care Trainees.

    PubMed

    Auffermann, William F; Henry, Travis S; Little, Brent P; Tigges, Stefan; Tridandapani, Srini

    2015-11-01

    Simulation has been used as an educational and assessment tool in several fields, generally involving training of physical skills. To date, simulation has found limited application in teaching and assessment of skills related to image perception and interpretation. The goal of this pilot study was to evaluate the feasibility of simulation as a tool for teaching and assessment of skills related to perception of nodules on chest radiography. This study received an exemption from the institutional review board. Subjects consisted of nonradiology health care trainees. Subjects underwent training and assessment of pulmonary nodule identification skills on chest radiographs at simulated radiology workstations. Subject performance was quantified by changes in area under the localization receiver operating characteristic curve. At the conclusion of the study, all subjects were given a questionnaire with five questions comparing learning at a simulated workstation with training using conventional materials. Statistical significance for questionnaire responses was tested using the Wilcoxon signed rank test. Subjects demonstrated statistically significant improvement in nodule identification after training at a simulated radiology workstation (change in area under the curve, 0.1079; P = .015). Subjects indicated that training on simulated radiology workstations was preferable to conventional training methods for all questions; P values for all questions were less than .01. Simulation may be a useful tool for teaching and assessment of skills related to medical image perception and interpretation. Further study is needed to determine which skills and trainee populations may be most amenable to training and assessment using simulation. Copyright © 2015 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  13. The 1995 attempted derailing of the French TGV (high-speed train) and a quantitative analysis of 181 rail sabotage attempts.

    DOT National Transportation Integrated Search

    2010-03-01

    On August 26, 1995, the Saturday of the final and busiest weekend of Frances summer holiday season, terrorists attempted to derail the TGV (Train Grande Vitesse) between Lyon and Paris by planting a bomb. Fortunately, their crude triggering mec...

  14. Citizens, farmers fight huge transmission lines

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brummer, J.

    1982-02-01

    Opposition to high tension power lines with a 20-story towers is growing as coalitions of farmers and advocates of safe energy respond with legal intervention and sabotage, and sometimes with success. Examples of citizen action are the efforts opposing a 450 kilovolt direct current line connecting the US with Quebec Hydro and another opposing a 500 kilovolt alternating current line from Georgia Power Co.'s nuclear plants to Florida. The opposition derives partly from evidence of health hazards to humans and adverse effects on livestock. High voltage lines are felt to symbolize a utility and regulatory failure to assess the recentmore » decline in power demand. It is stated that administration efforts to outlaw organized resistence will not deter the opposition, which cites instances of ground shock, aborted and stillborn cattle, physical irritants, and other phenomena. The General Assembly to Stop the Powerline (GASP) objects to the guinea pig position forced upon residents by the utilities. 6 references. (DCK)« less

  15. Efficacy, Safety, and Subject Satisfaction of a Specified Skin Care Regimen to Cleanse, Medicate, Moisturize, and Protect the Skin of Patients Under Treatment for Acne Vulgaris

    PubMed Central

    Del Rosso, James Q.; Gold, Michael; Rueda, Maria José; Brandt, Staci; Winkelman, Warren J.

    2015-01-01

    Optimal management of acne vulgaris requires incorporation of several components including patient education, selection of a rational therapeutic regimen, dedicated adherence with the program by the patient, and integration of proper skin care. Unfortunately, the latter component is often overlooked or not emphasized strongly enough to the patient. Proper skin care may reduce potential irritation that can be associated with topical acne medications and prevents the patient from unknowingly using skin care products that can actually sabotage their treatment. This article reviews the effectiveness, skin tolerability, safety, and patient satisfaction of an open label study in which a specified skin care regimen is used in combination with topical therapy. The study was designed to mirror “real world” management of facial acne vulgaris clinical practice. The skin care regimen used in this study included a brand foam wash and a brand moisturizer with SPF 30 photoprotection, both of which contain ingredients that are included to provide benefits for acne-prone and acne-affected skin. PMID:25610521

  16. Antiservice Within the Medical Service Encounter: Lessons for Radiologists Beyond Service Recovery.

    PubMed

    Hill, Paul Armstrong; Hill, Ronald Paul

    2015-12-01

    Recent modifications in the metrics for reimbursement have reinforced the importance of radiology service-delivery experiences of patients. Evaluating current radiology practices calls for reflection on the various touch points with patients, as well as their overall satisfaction. If problems occur during encounters, service failure, or lack of satisfactory medical experiences can be transformed through service recovery, whereby patients-as-customers are given chances to voice their concerns, and health care providers across the spectrum can work together to resolve problematic issues. This paper takes a systemic view of the patient experience as embedded in the care continuum, recognizing that different beliefs, attitudes, and behaviors of members of the health care team can negatively affect or sabotage patient satisfaction. Although radiologists are only one of many roles in the care continuum, recommendations are discussed for how they can integrate service satisfaction as a pervasive communal goal among all health care team members. Copyright © 2015 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  17. Lesser known aspects of Ludwik Fleck's (1896-1961) heroic life during World War II.

    PubMed

    Grzybowski, Andrzej; Ciesielska, Maria

    2016-08-01

    Professor Ludwik Fleck was a famous scientist and a prominent philosopher. Although his life and work were studied extensively, the Second World War period was a subject of some discussion and controversy. On account of his Jewish origin, he was first arrested and moved from the Lwów ghetto to the 'Laokoon' factory and then imprisoned in KL Auschwitz-Birkenau and in KL Buchenwald. Fleck produced the anti-typhus vaccine in the chemo-bacteriological laboratory in the Jewish Hospital at Kuszewicza Street and in the 'Laokoon' factory in Lwów. During his incarceration in KL Auschwitz-Birkenau, Fleck worked in the camp laboratory in Block 10 carrying out bacteriological studies for the inmates and then was assigned to work in the Wasserman station in Rajsko. From January 1944 Fleck performed routine laboratory tests in Block 50 in KL Buchenwald. Though Fleck had a privileged life in the camp, he participated in the sabotage activities organized by the camp resistance. © The Author(s) 2016.

  18. Cytokine effects on the basal ganglia and dopamine function: the subcortical source of inflammatory malaise.

    PubMed

    Felger, Jennifer C; Miller, Andrew H

    2012-08-01

    Data suggest that cytokines released during the inflammatory response target subcortical structures including the basal ganglia as well as dopamine function to acutely induce behavioral changes that support fighting infection and wound healing. However, chronic inflammation and exposure to inflammatory cytokines appears to lead to persisting alterations in the basal ganglia and dopamine function reflected by anhedonia, fatigue, and psychomotor slowing. Moreover, reduced neural responses to hedonic reward, decreased dopamine metabolites in the cerebrospinal fluid and increased presynaptic dopamine uptake and decreased turnover have been described. This multiplicity of changes in the basal ganglia and dopamine function suggest fundamental effects of inflammatory cytokines on dopamine synthesis, packaging, release and/or reuptake, which may sabotage and circumvent the efficacy of current treatment approaches. Thus, examination of the mechanisms by which cytokines alter the basal ganglia and dopamine function will yield novel insights into the treatment of cytokine-induced behavioral changes and inflammatory malaise. Copyright © 2012 Elsevier Inc. All rights reserved.

  19. Understanding women's anger: a description of relational patterns.

    PubMed

    Jack, D C

    2001-06-01

    Sixty women's narratives about their anger were coded for elements of anger expression. Their decisions regarding how and where to express anger are most strongly influenced by the anticipated reactions of others. Six patterns of bringing anger into relationships or keeping it out were identified. Women bring anger into relationship: (1) positively and directly, with the goal of removing barriers to relationship; (2) aggressively, with the goal of hurting another; and (3) indirectly, through disguising anger with the goal of remaining safe from interpersonal consequences, using strategies of (a) quiet sabotage, (b) hostile distance, (c) deflection, and (d) loss of control. Women keep anger out of relationship (1) consciously and constructively, choosing to express it in positive ways; (2) explosively expressing anger, but not in the presence of another; and (3) through self-silencing, which ranges from conscious to less-conscious awareness of anger and its suppression. Implications of differing patterns for women's health are discussed.

  20. Facility Targeting, Protection and Mission Decision Making Using the VISAC Code

    NASA Technical Reports Server (NTRS)

    Morris, Robert H.; Sulfredge, C. David

    2011-01-01

    The Visual Interactive Site Analysis Code (VISAC) has been used by DTRA and several other agencies to aid in targeting facilities and to predict the associated collateral effects for the go, no go mission decision making process. VISAC integrates the three concepts of target geometric modeling, damage assessment capabilities, and an event/fault tree methodology for evaluating accident/incident consequences. It can analyze a variety of accidents/incidents at nuclear or industrial facilities, ranging from simple component sabotage to an attack with military or terrorist weapons. For nuclear facilities, VISAC predicts the facility damage, estimated downtime, amount and timing of any radionuclides released. Used in conjunction with DTRA's HPAC code, VISAC also can analyze transport and dispersion of the radionuclides, levels of contamination of the surrounding area, and the population at risk. VISAC has also been used by the NRC to aid in the development of protective measures for nuclear facilities that may be subjected to attacks by car/truck bombs.

  1. Agroterrorism, Biological Crimes, and Biological Warfare Targeting Animal Agriculture

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilson, Terry M.; Logan-Henfrey, Linda; Weller, Richard E.

    2000-04-12

    There is a rising level of concern that agriculture might be targeted for economic sabotage by terrorists. Knowledge gathered about the Soviet Union biological weapons program and Iraq following the Gulf War, confirmed that animals and agricultural crops were targets of bioweapon development. These revelations are particularly disturbing in light of the fact that both countries are States Parties to the Biological and Toxin Weapons Convention that entered into force in 1975. The potential for misusing biotechnology to create more virulent pathogens and the lack of international means to detect unethical uses of new technologies to create destructive bioweapons ismore » of increasing concern. Disease outbreaks, whether naturally occurring or intentionally, involving agricultural pathogens that destroy livestock and crops would have a profound impact on a country's infrastructure, economy and export markets. This chapter deals with the history of agroterrorism, biological crimes and biological warfare directed toward animal agriculture, specifically, horses, cattle, swine, sheep, goats, and poultry.« less

  2. A methodology to quantify the release of spent nuclear fuel from dry casks during security-related scenarios

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Durbin, Samuel G.; Luna, Robert Earl

    Assessing the risk to the public and the environment from a release of radioactive material produced by accidental or purposeful forces/environments is an important aspect of the regulatory process in many facets of the nuclear industry. In particular, the transport and storage of radioactive materials is of particular concern to the public, especially with regard to potential sabotage acts that might be undertaken by terror groups to cause injuries, panic, and/or economic consequences to a nation. For many such postulated attacks, no breach in the robust cask or storage module containment is expected to occur. However, there exists evidence thatmore » some hypothetical attack modes can penetrate and cause a release of radioactive material. This report is intended as an unclassified overview of the methodology for release estimation as well as a guide to useful resource data from unclassified sources and relevant analysis methods for the estimation process.« less

  3. Radiological Exposure Devices (RED) Technical Basis for Threat Profile.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bland, Jesse John; Potter, Charles A.; Homann, Steven

    Facilities that manufacture, store or transport significant quantities of radiological material must protect against the risk posed by sabotage events. Much of the analysis of this type of event has been focused on the threat from a radiological dispersion device (RDD) or "dirty bomb" scenario, in which a malicious assailant would, by explosives or other means, loft a significant quantity of radioactive material into a plume that would expose and contaminate people and property. Although the consequences in cost and psychological terror would be severe, no intentional RDD terrorism events are on record. Conversely, incidents in which a victim ormore » victims were maliciously exposed to a Radiological Exposure Device (RED), without dispersal of radioactive material, are well documented. This paper represents a technical basis for the threat profile related to the risk of nefarious use of an RED, including assailant and material characterization. Radioactive materials of concern are detailed in Appendix A.« less

  4. Perceived risk, stigma, and potential economic impacts of a high-level nuclear waste repository in Nevada

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Slovic, P.; Layman, M.; Kraus, N.N.

    1989-07-01

    This paper describes a program of research designed to assess the potential impacts of a high-level nuclear waste repository at Yucca Mountain, Nevada, upon tourism, retirement and job-related migration, and business development in Las Vegas and the state. Adverse economic impacts may be expected to result from two related social processes. One has to do with perceptions of risk and socially amplified reactions to ``unfortunate events`` associated with the repository (major and minor accidents, discoveries of radiation releases, evidence of mismanagement, attempts to sabotage or disrupt the facility, etc.). The second process that may trigger significant adverse impacts is thatmore » of stigmatization. The conceptual underpinnings of risk perception, social amplification, and stigmatization are discussed in this paper and empirical data are presented to demonstrate how nuclear images associated with Las Vegas and the State of Nevada might trigger adverse effects on tourism, migration, and business development.« less

  5. Development of computer-based analytical tool for assessing physical protection system

    NASA Astrophysics Data System (ADS)

    Mardhi, Alim; Pengvanich, Phongphaeth

    2016-01-01

    Assessment of physical protection system effectiveness is the priority for ensuring the optimum protection caused by unlawful acts against a nuclear facility, such as unauthorized removal of nuclear materials and sabotage of the facility itself. Since an assessment based on real exercise scenarios is costly and time-consuming, the computer-based analytical tool can offer the solution for approaching the likelihood threat scenario. There are several currently available tools that can be used instantly such as EASI and SAPE, however for our research purpose it is more suitable to have the tool that can be customized and enhanced further. In this work, we have developed a computer-based analytical tool by utilizing the network methodological approach for modelling the adversary paths. The inputs are multi-elements in security used for evaluate the effectiveness of the system's detection, delay, and response. The tool has capability to analyze the most critical path and quantify the probability of effectiveness of the system as performance measure.

  6. Nonradiological chemical pathway analysis and identification of chemicals of concern for environmental monitoring at the Hanford Site

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Blanton, M.L.; Cooper, A.T.; Castleton, K.J.

    1995-11-01

    Pacific Northwest`s Surface Environmental Surveillance Project (SESP) is an ongoing effort tot design, review, and conducted monitoring on and off the Hanford site. Chemicals of concern that were selected are listed. Using modeled exposure pathways, the offsite cancer incidence and hazard quotient were calculated and a retrospective pathway analysis performed to estimate what onsite concentrations would be required in the soil for each chemical of concern and other detected chemicals that would be required to obtain an estimated offsite human-health risk of 1.0E-06 cancer incidence or 1.0 hazard quotient. This analysis indicates that current nonradiological chemical contamination occurring on themore » site does not pose a significant offsite human-health risk; the highest cancer incidence to the offsite maximally exposed individual was from arsenic (1.76E-10); the highest hazard quotient was chromium(VI) (1.48E-04). The most sensitive pathways of exposure were surfacewater and aquatic food consumption. Combined total offsite excess cancer incidence was 2.09E-10 and estimated hazard quotient was 2.40E-04. Of the 17 identified chemicals of concern, the SESP does not currently (routinely) monitor arsenic, benzo(a)pyrene, bis(2- ethylhexyl)phthalate (BEHP), and chrysene. Only 3 of the chemicals of concern (arsenic, BEHP, chloroform) could actually occur in onsite soil at concern high enough to cause a 1.0E-06 excess cancer incidence or a 1.0 hazard index for a given offsite exposure pathway. During the retrospective analysis, 20 other chemicals were also evaluated; only vinyl chloride and thallium could reach targeted offsite risk values.« less

  7. Genetic profiling to determine potential origins of boll weevils (Coleoptera: Curculionidae) captured in a Texas eradication zone: endemicity, immigration, or sabotage?

    PubMed

    Kim, Kyung Seok; Sappington, Thomas W; Allen, Charles T

    2008-12-01

    Thirty-seven boll weevils, Anthonomus grandis grandis Boheman (Coleoptera: Curculionidae), were captured in pheromone traps near Lubbock, TX, in the Southern High Plains/Caprock eradication zone during August-October 2006. No boll weevils had been captured in this zone or neighboring zones to the north earlier in the year, and only very low numbers had been captured in neighboring zones to the south and east. Therefore, the captures near Lubbock were unexpected. Five of the weevils captured the last week of August were preserved and genotyped at 10 microsatellite loci for comparison with a database of genotypes for 22 boll weevil populations sampled from eight U.S. states and four locations in Mexico. The Lubbock population itself is an unlikely source, suggesting that the captured weevils probably did not originate from a low-level endemic population. Populations from eastern states, Mexico, and Big Spring, TX, can be confidently excluded as potential source regions. Although the Weslaco and Kingsville, TX, areas cannot be statistically excluded, they are unlikely sources. The most likely sources are nearby areas in New Mexico, TX, or southwest Oklahoma, or from areas of eastern Texas represented by Waxahachie and El Campo populations. Together, genetic and circumstantial evidence suggest either that the trapped boll weevils are the offspring of alone mated female that immigrated from eastern Texas earlier in the summer or that weevils originally captured near Waxahachie but now long-dead were planted in the traps by a disgruntled employee of the eradication program.

  8. Development of computer-based analytical tool for assessing physical protection system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mardhi, Alim, E-mail: alim-m@batan.go.id; Chulalongkorn University, Faculty of Engineering, Nuclear Engineering Department, 254 Phayathai Road, Pathumwan, Bangkok Thailand. 10330; Pengvanich, Phongphaeth, E-mail: ppengvan@gmail.com

    Assessment of physical protection system effectiveness is the priority for ensuring the optimum protection caused by unlawful acts against a nuclear facility, such as unauthorized removal of nuclear materials and sabotage of the facility itself. Since an assessment based on real exercise scenarios is costly and time-consuming, the computer-based analytical tool can offer the solution for approaching the likelihood threat scenario. There are several currently available tools that can be used instantly such as EASI and SAPE, however for our research purpose it is more suitable to have the tool that can be customized and enhanced further. In this work,more » we have developed a computer–based analytical tool by utilizing the network methodological approach for modelling the adversary paths. The inputs are multi-elements in security used for evaluate the effectiveness of the system’s detection, delay, and response. The tool has capability to analyze the most critical path and quantify the probability of effectiveness of the system as performance measure.« less

  9. Impaired spontaneous anthropomorphizing despite intact perception and social knowledge

    PubMed Central

    Heberlein, Andrea S.; Adolphs, Ralph

    2004-01-01

    Humans spontaneously imbue the world with social meaning: we see not only emotions and intentional behaviors in humans and other animals, but also anger in the movements of thunderstorms and willful sabotage in crashing computers. Converging evidence supports a role for the amygdala, a collection of nuclei in the temporal lobe, in processing emotionally and socially relevant information. Here, we report that a patient with bilateral amygdala damage described a film of animated shapes (normally seen as full of social content) in entirely asocial, geometric terms, despite otherwise normal visual perception. Control tasks showed that the impairment did not result from a global inability to describe social stimuli or a bias in language use, nor was a similar impairment observed in eight comparison subjects with damage to orbitofrontal cortex. This finding extends the role of the amygdala to the social attributions we make even to stimuli that are not explicitly social and, in so doing, suggests that the human capacity for anthropomorphizing draws on some of the same neural systems as do basic emotional responses. PMID:15123799

  10. From lab to clinic: Extinction of cued cravings to reduce overeating.

    PubMed

    Jansen, Anita; Schyns, Ghislaine; Bongers, Peggy; van den Akker, Karolien

    2016-08-01

    Food cue reactivity is a strong motivation to eat, even in the absence of hunger. Therefore, food cue reactivity might sabotage healthy eating, induce weight gain and impede weight loss or weight maintenance. Food cue reactivity can be learned via Pavlovian appetitive conditioning: It is easily acquired but the extinction of appetitive responding seems to be more challenging. Several properties of extinction make it fragile: extinction does not erase the original learning and extinction is context-dependent. These properties threaten full extinction and increase the risk of full relapse. Extinction procedures are discussed to reduce or prevent the occurrence of rapid reacquisition, spontaneous recovery, renewal and reinstatement after extinction. A translation to food cue exposure treatment is made and suggestions are provided, such as conducting the exposure in relevant contexts, using occasional reinforcement and targeting expectancy violation instead of habituation. A new hypothesis proposed here is that the adding of inhibition training to strengthen inhibition skills that reduce instrumental responding, might be beneficial to improve food cue exposure effects. Copyright © 2016 Elsevier Inc. All rights reserved.

  11. Memory attacks on device-independent quantum cryptography.

    PubMed

    Barrett, Jonathan; Colbeck, Roger; Kent, Adrian

    2013-01-04

    Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage, or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defenses include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defenses as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party).

  12. The interpersonal effects of Facebook reassurance seeking.

    PubMed

    Clerkin, Elise M; Smith, April R; Hames, Jennifer L

    2013-11-01

    Social networking sites like Facebook represent a potentially valuable means for individuals with low self-esteem or interpersonal difficulties to connect with others; however, recent research indicates that individuals who are most in need of social benefits from Facebook may be ineffective in their communication strategies, and thereby sabotage their potential to benefit interpersonally. The current study tested whether reassurance seeking via Facebook negatively influenced self-esteem, and whether this change in self-esteem mediated the relationship between Facebook reassurance seeking and greater thwarted belongingness and perceived burdensomeness. Participants completed measures online at two time-points approximately 24 days apart. Results provided evidence that Facebook reassurance seeking predicted lower levels of self-esteem, which in turn predicted increased feelings that one does not belong and that one is a burden. Key limitations to this study include our use of a predominantly young, female, Caucasian sample, a novel reassurance seeking measure, and only evaluating two time points. These results suggest that Facebook usage has the potential for negative and far-reaching influences on one's interpersonal functioning. Published by Elsevier B.V.

  13. LANL Safeguards and Security Assurance Program. Revision 6

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1995-04-03

    The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impactsmore » on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms.« less

  14. Tamper-indicating seals : practices, problems, and standards

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Johnston, R. G.

    2003-01-01

    Tamper-indicating seals have been used by customs officials for over 7,000 years. Today, seals are widely used to help counter theft, smuggling, sabotage, vandalism, terrorism, and espionage. Despite their antiquity and modern widespread use, however, there remains considerable confusion about seals, as well as a lot of misconceptions, wishful thinking, sloppy terminology, and poor practice. The absence of meaningful norms and standards, together with the surprisingly limited amount of research and development (R&D) in the field of tamper detection, has also hindered the effective use of seals. The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory has intensively studiedmore » tamper-indicating seals for the last 12 years. We have engaged in vulnerability assessments, R&D, consulting, and training for over two dozen United States government agencies and private companies, as well as for the International Atomic Energy Agency (IAEA) and Euratom. The VAT has also analyzed over 200 different types of seals in detail. This paper summarizes some of our conclusions, recommendations, and warnings regarding seals and tamper detection.« less

  15. Anatomy of regret: a developmental view of the depressive position and a critical turn toward love and creativity in the transforming schizoid personality.

    PubMed

    Kavaler-Adler, Susan

    2004-03-01

    This article deals with critical psychic transformation in a schizoid personality disorder that evolves in an object relations psychoanalysis in which "developmental mourning" plays a central role. Within a mourning process that allows for the grieving of loss related to arrested separation-individuation development, the analysand confronts the existential grief of regret that had always unconsciously haunted her. The unconscious guilt related to the existential grief of regret had caused much dissociation of self-experience and affect states. The analysand acknowledges her own part in the destruction of primal and current relationships after the traumatic impact of her early life is understood. This allows her to repair current relationships, both within her internal and external worlds so that she can open to capacities for love and creativity. The analysand's courage to consciously grapple with her regret (loss and guilt combined) allows her to relinquish self-sabotaging character defenses such as contempt and emotional withdrawl. Consequently, a second marriage is salvaged and enriched, and the analysand's relationship with her two children is dramatically improved.

  16. Forced swimming sabotages the morphological and synaptic maturation of newborn granule neurons and triggers a unique pro-inflammatory milieu in the hippocampus.

    PubMed

    Llorens-Martín, María; Jurado-Arjona, Jerónimo; Bolós, Marta; Pallas-Bazarra, Noemí; Ávila, Jesús

    2016-03-01

    Recent experimental data suggest that mood disorders are related to inflammatory phenomena and have led to the "inflammatory hypothesis of depression". Given that the hippocampus is one of the most affected areas in these disorders, we used a model of acute stress (the Porsolt test) to evaluate the consequences of forced swimming on two crucial events related to the pathophysiology of major depression: the functional maturation of newborn granule neurons; and the hippocampal inflammatory milieu. Using PSD95:GFP-expressing retroviruses, we found that forced swimming selectively alters the dendritic morphology of newborn neurons and impairs their connectivity by reducing the number and volume of their postsynaptic densities. In addition, acute stress triggered a series of morphological changes in microglial cells, together with an increase in microglial CD68 expression, thus suggesting the functional and morphological activation of this cell population. Furthermore, we observed an intriguing change in the hippocampal inflammatory milieu in response to forced swimming. Importantly, the levels of several molecules affected by acute stress (such as Interleukin-6 and eotaxin) have been described to also be altered in patients with depression and other mood disorders. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. "Eh! I Felt I Was Sabotaged!": Facilitators' Understandings of Success in a Participatory HIV and IPV Prevention Intervention in Urban South Africa

    ERIC Educational Resources Information Center

    Gibbs, Andrew; Willan, Samantha; Jama-Shai, Nwabisa; Washington, Laura; Jewkes, Rachel

    2015-01-01

    Participatory approaches to behaviour change dominate HIV- and intimate partner violence prevention interventions. Research has identified multiple challenges in the delivery of these. In this article, we focus on how facilitators conceptualize successful facilitation and how these understandings may undermine dialogue and critical consciousness,…

  18. Sabotaging Our Sisters: Perceptions of Female Relational Aggression in Higher Education among Female Faculty and Administrators at Three Western U.S. Universities

    ERIC Educational Resources Information Center

    Nyborg, Deborah G.

    2012-01-01

    The purpose of this study was to explore and understand relational workplace aggression among female faculty and administrators at three western U.S. universities. This study was designed to address the gap in empirical knowledge of the phenomenon by elucidating how workplace relational aggression affects the lives of female university faculty and…

  19. 1996 NRC annual report. Volume 13

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1997-10-01

    This 22nd annual report of the US Nuclear Regulatory Commission (NRC) describes accomplishments, activities, and plans made during Fiscal Year 1996 (FH 1996)--October 1, 1995, through September 30, 1996. Significant activities that occurred early in FY 1997 are also described, particularly changes in the Commission and organization of the NRC. The mission of the NRC is to ensure that civilian uses of nuclear materials in the US are carried out with adequate protection of public health and safety, the environment, and national security. These uses include the operation of nuclear power plants and fuel cycle plants and medical, industrial, andmore » research applications. Additionally, the NRC contributes to combating the proliferation of nuclear weapons material worldwide. The NRC licenses and regulates commercial nuclear reactor operations and research reactors and other activities involving the possession and use of nuclear materials and wastes. It also protects nuclear materials used in operation and facilities from theft or sabotage. To accomplish its statutorily mandated regulatory mission, the NRC issues rules and standards, inspects facilities and operations, and issues any required enforcement actions.« less

  20. The Role of Dopamine in Inflammation-Associated Depression: Mechanisms and Therapeutic Implications.

    PubMed

    Felger, Jennifer C

    Studies investigating the impact of a variety of inflammatory stimuli on the brain and behavior have consistently reported evidence that inflammatory cytokines affect the basal ganglia and dopamine to mediate depressive symptoms related to motivation and motor activity. Findings have included inflammation-associated reductions in ventral striatal responses to hedonic reward, decreased dopamine and dopamine metabolites in cerebrospinal fluid, and decreased availability of striatal dopamine, all of which correlate with symptoms of anhedonia, fatigue, and psychomotor retardation. Similar relationships between alterations in dopamine-relevant corticostriatal reward circuitry and symptoms of anhedonia and psychomotor slowing have also been observed in patients with major depression who exhibit increased peripheral cytokines and other inflammatory markers, such as C-reactive protein. Of note, these inflammation-associated depressive symptoms are often difficult to treat in patients with medical illnesses or major depression. Furthermore, a wealth of literature suggests that inflammation can decrease dopamine synthesis, packaging, and release, thus sabotaging or circumventing the efficacy of standard antidepressant treatments. Herein, the mechanisms by which inflammation and cytokines affect dopamine neurotransmission are discussed, which may provide novel insights into treatment of inflammation-related behavioral symptoms that contribute to an inflammatory malaise.

  1. Medical Countermeasures for Radiation Exposure and Related Injuries: Characterization of Medicines, FDA-Approval Status and Inclusion into the Strategic National Stockpile

    PubMed Central

    Singh, Vijay K.; Romaine, Patricia L.P.; Seed, Thomas M.

    2015-01-01

    Abstract World events over the past decade have highlighted the threat of nuclear terrorism as well as an urgent need to develop radiation countermeasures for acute radiation exposures and subsequent bodily injuries. An increased probability of radiological or nuclear incidents due to detonation of nuclear weapons by terrorists, sabotage of nuclear facilities, dispersal and exposure to radioactive materials, and accidents provides the basis for such enhanced radiation exposure risks for civilian populations. Although the search for suitable radiation countermeasures for radiation-associated injuries was initiated more than half a century ago, no safe and effective radiation countermeasure for the most severe of these injuries, namely acute radiation syndrome (ARS), has been approved by the United States Food and Drug Administration (FDA). The dearth of FDA-approved radiation countermeasures has prompted intensified research for a new generation of radiation countermeasures. In this communication, the authors have listed and reviewed the status of radiation countermeasures that are currently available for use, or those that might be used for exceptional nuclear/radiological contingencies, plus a limited few medicines that show early promise but still remain experimental in nature and unauthorized for human use by the FDA. PMID:25905522

  2. What is the future of peer review? Why is there fraud in science? Is plagiarism out of control? Why do scientists do bad things? Is it all a case of: "all that is necessary for the triumph of evil is that good men do nothing"?

    PubMed

    Triggle, Chris R; Triggle, David J

    2007-01-01

    Peer review is an essential component of the process that is universally applied prior to the acceptance of a manuscript, grant or other scholarly work. Most of us willingly accept the responsibilities that come with being a reviewer but how comfortable are we with the process? Peer review is open to abuse but how should it be policed and can it be improved? A bad peer review process can inadvertently ruin an individual's career, but are there penalties for policing a reviewer who deliberately sabotages a manuscript or grant? Science has received an increasingly tainted name because of recent high profile cases of alleged scientific misconduct. Once considered the results of work stress or a temporary mental health problem, scientific misconduct is increasingly being reported and proved to be a repeat offence. How should scientific misconduct be handled--is it a criminal offence and subject to national or international law? Similarly plagiarism is an ever-increasing concern whether at the level of the student or a university president. Are the existing laws tough enough? These issues, with appropriate examples, are dealt with in this review.

  3. Guilt about being born and debt concerning the gift of life.

    PubMed

    Lotterman, Andrew C

    2003-01-01

    A very powerful form of preoedipal guilt stems from a sense of having damaged the life-giving parent with one's most basic needs. A related phenomenon is the child's sense that another subjectivity has deliberately chosen to give and sustain the child's life. This experience gives rise to a compelling mixture of awe, reverence, and obligation, a sense of guilt about being born, of debt concerning the gift of life. This sense of guilt and debt are part of every child's development. Depending on how conflicts surrounding them are negotiated, the child can come to feel either an appetite for living or a crushing sense of selfishness and unworthiness. Such forms of guilt and debt may lead not only to masochism generally, but to a particularly pernicious form of negative therapeutic reaction that can sabotage psychoanalytic work. A patient may feel, for instance, that a successful psychoanalysis is a selfish indulgence and an immoral betrayal of a sacred duty to rescue his or her parents from their misery. Guilt about being born and the sense of debt concerning the gift of life are linked to various developmental, psychodynamic, interpersonal, and cultural phenomena.

  4. Can editors save peer review from peer reviewers?

    PubMed

    D'Andrea, Rafael; O'Dwyer, James P

    2017-01-01

    Peer review is the gold standard for scientific communication, but its ability to guarantee the quality of published research remains difficult to verify. Recent modeling studies suggest that peer review is sensitive to reviewer misbehavior, and it has been claimed that referees who sabotage work they perceive as competition may severely undermine the quality of publications. Here we examine which aspects of suboptimal reviewing practices most strongly impact quality, and test different mitigating strategies that editors may employ to counter them. We find that the biggest hazard to the quality of published literature is not selfish rejection of high-quality manuscripts but indifferent acceptance of low-quality ones. Bypassing or blacklisting bad reviewers and consulting additional reviewers to settle disagreements can reduce but not eliminate the impact. The other editorial strategies we tested do not significantly improve quality, but pairing manuscripts to reviewers unlikely to selfishly reject them and allowing revision of rejected manuscripts minimize rejection of above-average manuscripts. In its current form, peer review offers few incentives for impartial reviewing efforts. Editors can help, but structural changes are more likely to have a stronger impact.

  5. What is the future of peer review? Why is there fraud in science? Is plagiarism out of control? Why do scientists do bad things? Is it all a case of:“All that is necessary for the triumph of evil is that good men do nothing?”

    PubMed Central

    Triggle, Chris R; Triggle, David J

    2007-01-01

    Peer review is an essential component of the process that is universally applied prior to the acceptance of a manuscript, grant or other scholarly work. Most of us willingly accept the responsibilities that come with being a reviewer but how comfortable are we with the process? Peer review is open to abuse but how should it be policed and can it be improved? A bad peer review process can inadvertently ruin an individual’s career, but are there penalties for policing a reviewer who deliberately sabotages a manuscript or grant? Science has received an increasingly tainted name because of recent high profile cases of alleged scientific misconduct. Once considered the results of work stress or a temporary mental health problem, scientific misconduct is increasingly being reported and proved to be a repeat offence. How should scientific misconduct be handled—is it a criminal offence and subject to national or international law? Similarly plagiarism is an ever-increasing concern whether at the level of the student or a university president. Are the existing laws tough enough? These issues, with appropriate examples, are dealt with in this review. PMID:17583174

  6. Shame, gay men, and HIV disease.

    PubMed

    Sabar, S

    1995-04-01

    Mental health professionals working with people with HIV disease are often confronted by the patients' feelings of shame and should be prepared to recognize and treat what can sabotage the openness crucial to the therapeutic process. Shame is unlike guilt in that instead of being a transgression against some moral code or value, it is the failure to live up to an internal ideal image of oneself; its sanction is rejection or abandonment as opposed to punishment. Shame can have many triggers, and when faced with these triggers, a strong sense of self can protect a person. However, most people with HIV find that shame does arise in some situations. In its wake, shame can cause withdrawal, substance abuse, depression, denial, rage, grandiosity, lack of entitlement, and perfectionism. Therapists can help gay men deal with shame and cope better with the indignities of HIV infection. Guidelines include building a strong patient/therapist relationship to build trust and improve self-esteem; and identifying the shame, and bringing it out for validation by the patient. Therapists must guide patients to an awareness of their true feelings, and help them trust their perceptions of these needs and feelings.

  7. Interim Reliability Evaluation Program: analysis of the Browns Ferry, Unit 1, nuclear plant. Main report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mays, S.E.; Poloski, J.P.; Sullivan, W.H.

    1982-07-01

    A probabilistic risk assessment (PRA) was made of the Browns Ferry, Unit 1, nuclear plant as part of the Nuclear Regulatory Commission's Interim Reliability Evaluation Program (IREP). Specific goals of the study were to identify the dominant contributors to core melt, develop a foundation for more extensive use of PRA methods, expand the cadre of experienced PRA practitioners, and apply procedures for extension of IREP analyses to other domestic light water reactors. Event tree and fault tree analyses were used to estimate the frequency of accident sequences initiated by transients and loss of coolant accidents. External events such as floods,more » fires, earthquakes, and sabotage were beyond the scope of this study and were, therefore, excluded. From these sequences, the dominant contributors to probable core melt frequency were chosen. Uncertainty and sensitivity analyses were performed on these sequences to better understand the limitations associated with the estimated sequence frequencies. Dominant sequences were grouped according to common containment failure modes and corresponding release categories on the basis of comparison with analyses of similar designs rather than on the basis of detailed plant-specific calculations.« less

  8. Confidentiality, electronic health records, and the clinician.

    PubMed

    Graves, Stuart

    2013-01-01

    The advent of electronic health records (EHRs) to improve access and enable research in the everyday clinical world has simultaneously made medical information much more vulnerable to illicit, non-beneficent uses. This wealth of identified, aggregated data has and will attract attacks by domestic governments for surveillance and protection, foreign governments for espionage and sabotage, organized crime for illegal profits, and large corporations for "legal" profits. Against these powers with almost unlimited resources no security scheme is likely to prevail, so the design of such systems should include appropriate security measures. Unlike paper records, where the person maintaining and controlling the existence of the records also controls access to them, these two functions can be separated for EHRs. By giving physical control over access to individual records to their individual owners, the aggregate is dismantled, thereby protecting the nation's identified health information from large-scale data mining or tampering. Control over the existence and integrity of all the records--yet without the ability to examine their contents--would be left with larger institutions. This article discusses the implications of all of the above for the role of the clinician in assuring confidentiality (a cornerstone of clinical practice), for research and everyday practice, and for current security designs.

  9. Burning With Envy? Dispositional and Situational Influences on Envy in Grandiose and Vulnerable Narcissism.

    PubMed

    Neufeld, Darren C; Johnson, Edward A

    2016-10-01

    Research on narcissism and envy suggests a variable relationship that may reflect differences between how vulnerable and grandiose narcissism relate to precursors of envy. Accordingly, we proposed a model in which dispositional envy and relative deprivation differentially mediate envy's association with narcissistic vulnerability, grandiosity, and entitlement. To test the model, 330 young adults completed dispositional measures of narcissism, entitlement, and envy; one week later, participants reported on deprivation and envy feelings toward a peer who outperformed others on an intelligence test for a cash prize (Study 1) or earned higher monetary payouts in a betting game (Study 2). In both studies, structural equation modeling broadly supported the proposed model. Vulnerable narcissism robustly predicted episodic envy via dispositional envy. Entitlement-a narcissistic facet common to grandiosity and vulnerability-was a significant indirect predictor via relative deprivation. Study 2 also found that (a) the grandiose leadership/authority facet indirectly curbed envy feelings via dispositional envy, and (b) episodic envy contributed to schadenfreude feelings, which promoted efforts to sabotage a successful rival. Whereas vulnerable narcissists appear dispositionally envy-prone, grandiose narcissists may be dispositionally protected. Both, however, are susceptible to envy through entitlement when relative deprivation is encountered. © 2015 Wiley Periodicals, Inc.

  10. Spreadsheet Assessment Tool v. 2.4

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Allen, David J.; Martinez, Ruben

    2016-03-03

    The Spreadsheet Assessment Tool (SAT) is an easy to use, blast assessment tool that is intended to estimate the potential risk due to an explosive attack on a blood irradiator. The estimation of risk is based on the methodology, assumptions, and results of a detailed blast effects assessment study that is summarized in Sandia National Laboratories Technical Report SAND2015-6166. Risk as defined in the report and as used in the SAT is: "The potential risk of creating an air blast-induced vent opening at a buildings envelope surface". Vent openings can be created at a buildings envelope through the failure ofmore » an exterior building component—like a wall, window, or door—due to an explosive sabotage of an irradiator within the building. To estimate risk, the tool requires that users obtain and input information pertaining to the building's characteristics and the irradiator location. The tool also suggests several prescriptive mitigation strategies that can be considered to reduce risk. Given the variability in civilian building construction practices, the input parameters used by this tool may not apply to all buildings being assessed. The tool should not be used as a substitute for engineering judgment. The tool is intended for assessment purposes only.« less

  11. Post-oil-spill fires at Ugbomro (Niger Delta): a new vista in soil-pollution studies.

    PubMed

    Osuji, Leo C; Ukale, Eseoghene E

    2005-10-01

    Reconnaissance of the post-oil-spill, fire-scourged site at Ugbomro, in the Niger Delta, was contingent upon the loud public outcry and galvanizing hue that ensued the widespread conflagration. Sampling was carried out by the grid technique, and fire-scourged soils and their unaffected controls were analyzed. Contrary to the 'celebrated' opinion of some that the fires improvised bush fallowing for cropping, the site had witnessed severe impoverishment as evidenced by the hitherto neglected insidious impact of such infernos on soil macronutrients. Alterations in physico-chemical properties (pH, conductivity, etc.) provided adequate bases for this conclusion, and offered broad explanations for the paucity of macronutrients in affected soils. For instance, a pH range of 3.1-3.8 hindered N2 fixation and other metabolic activities that enhance mineralization. Elaeis guineensis in a density of 3 stands/m2 at the control site was the only tree-form not charred beyond recognition.Against future fires, it is important to strengthen contingencies for more-expedient clean-up responses to oil spills to severe possibilities of in situ conflagrations. Nutrient supplementations, revegetation, and site surveillance should disengage the 'unsighted fingers' of sabotage. A careful husbandry of these measures might re-establish nutrient stability, and forestall future re-occurrence of such effacing incidents.

  12. Spent Fuel Ratio Estimates from Numerical Models in ALE3D

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Margraf, J. D.; Dunn, T. A.

    Potential threat of intentional sabotage of spent nuclear fuel storage facilities is of significant importance to national security. Paramount is the study of focused energy attacks on these materials and the potential release of aerosolized hazardous particulates into the environment. Depleted uranium oxide (DUO 2) is often chosen as a surrogate material for testing due to the unreasonable cost and safety demands for conducting full-scale tests with real spent nuclear fuel. To account for differences in mechanical response resulting in changes to particle distribution it is necessary to scale the DUO 2 results to get a proper measure for spentmore » fuel. This is accomplished with the spent fuel ratio (SFR), the ratio of respirable aerosol mass released due to identical damage conditions between a spent fuel and a surrogate material like depleted uranium oxide (DUO 2). A very limited number of full-scale experiments have been carried out to capture this data, and the oft-questioned validity of the results typically leads to overly-conservative risk estimates. In the present work, the ALE3D hydrocode is used to simulate DUO 2 and spent nuclear fuel pellets impacted by metal jets. The results demonstrate an alternative approach to estimate the respirable release fraction of fragmented nuclear fuel.« less

  13. A qualitative examination of men's condom use attitudes and resistance: "it's just part of the game".

    PubMed

    Davis, Kelly Cue; Schraufnagel, Trevor J; Kajumulo, Kelly F; Gilmore, Amanda K; Norris, Jeanette; George, William H

    2014-04-01

    The purpose of this study was to investigate the variability in young heterosexual men's perceptions of the advantages and disadvantages of condom use in their casual sexual relationships. Because men who perceive greater disadvantages of condom use may be more likely to resist using them, we also explored the tactics that men employ to avoid using condoms. Semi-structured focus groups were conducted with single men who have sex with women (n = 60), aged 21-35 years, all of whom reported using condoms inconsistently. Transcripts were analyzed using a framework analysis approach. As expected, participants reported advantages and disadvantages to condom use that pertained to the likelihood and quality of sex, physical sensations during intercourse, and the risk of sexually transmitted infections and unwanted pregnancies. Within each of these topics, however, participants' appraisals of the relative pros and cons of condom use varied considerably. Additionally, participants reported that men use a wide range of condom use resistance tactics, including seduction, deception, and condom sabotage, and that the use of these tactics was viewed as normative behavior for men their age. These findings suggest that the effectiveness of sexual health prevention efforts could be enhanced by increasing young men's motivations to use condoms and by targeting social norms regarding condom use resistance. Additionally, the issue of men's condom use resistance clearly merits increased empirical investigation and intervention attention.

  14. The professional responsibility of lawyers: emotional competence, multiculturalism and ethics.

    PubMed

    Silver, Marjorie A

    2006-05-01

    Traditional legal education and the Socratic method it utilises are by and large successful at training lawyers to think, reason and analyse. The cultivation of lawyers' intrapersonal and interpersonal skills, however, has been, at best, neglected by the profession. All lawyers, like all human beings, are emotional. Emotions affect who they are and how they practise law, whether or not they are conscious of them. As emotions cannot be removed from the practice of law, it is essential that lawyers learn to understand and manage their emotions, as well as learn to be attuned to their clients' emotional lives. Ignorance of concepts such as countertransference, denial and unconscious bias adversely impact the lawyer-client relationship. Lawyers who understand basic psychological principles and behaviours, who are aware of their own psychological makeup, understand their cultural perspective and recognise and credit their clients' differences, will enhance their effectiveness as counsellors. The client whose lawyer has these competencies will enjoy a therapeutically superior counselling or representational experience. The neglect of either the lawyer's or the client's emotional life threatens to sabotage the lawyer's ability, and thus professional responsibility, to render competent and impartial legal advice. Through drawing parallels to the training and practice in other counselling disciplines and relationships, this article argues that psychological-mindedness and multicultural competence are essential elements of ethically responsible legal representation.

  15. Leishmania Hijacks Myeloid Cells for Immune Escape

    PubMed Central

    Martínez-López, María; Soto, Manuel; Iborra, Salvador; Sancho, David

    2018-01-01

    Protozoan parasites of the Leishmania genus are the causative agents of leishmaniasis, a group of neglected tropical diseases whose clinical manifestations vary depending on the infectious Leishmania species but also on host factors. Recognition of the parasite by host myeloid immune cells is a key to trigger an effective Leishmania-specific immunity. However, the parasite is able to persist in host myeloid cells by evading, delaying and manipulating host immunity in order to escape host resistance and ensure its transmission. Neutrophils are first in infiltrating infection sites and could act either favoring or protecting against infection, depending on factors such as the genetic background of the host or the parasite species. Macrophages are the main host cells where the parasites grow and divide. However, macrophages are also the main effector population involved in parasite clearance. Parasite elimination by macrophages requires the priming and development of an effector Th1 adaptive immunity driven by specific subtypes of dendritic cells. Herein, we will provide a comprehensive outline of how myeloid cells regulate innate and adaptive immunity against Leishmania, and the mechanisms used by the parasites to promote their evasion and sabotage. Understanding the interactions between Leishmania and the host myeloid cells may lead to the development of new therapeutic approaches and improved vaccination to leishmaniases, an important worldwide health problem in which current therapeutic or preventive approaches are limited. PMID:29867798

  16. Enslaved ants: not as helpless as they were thought to be.

    PubMed

    Czechowski, W; Godzińska, E J

    Slavery in ants involves robbing of brood of host ant species and rearing captured individuals in the enslaver's nest. Whereas slaves of facultative slave-makers increase the workforce of the colony, in obligate slave-makers presence of slaves is vital for colony survival. Until recently, it was generally believed that enslaved workers act solely for the benefit of their social parasite and are wholly lost for their own colony and population. However, evidence that slaves may act also in favour of their own maternal population by engaging in various forms of the so-called slave rebellions is already quite extensive and may be found in both old and recent myrmecological literature, although, unfortunately, these data are often neglected or overlooked. They may be classified into four categories: (1) acts of physical aggression directed by slaves to slave-makers, (2) attempts of slaves to reproduce within a slave-maker colony, (3) 'sabotage', i.e. activities of slaves leading to weakening of the slave-maker colony and population, and (4) slave emancipation, i.e. partial or complete self-liberation of slaves from slave-maker colonies. In this review, we present and discuss all these diverse (often interrelated) expressions of slave opposition to their enslavers, focussing our discussion on both proximate and evolutionary causation of the discussed phenomena. We also indicate some open questions which remain to be answered by future research.

  17. Family behaviors and type 2 diabetes: What to target and how to address in interventions for adults with low socioeconomic status.

    PubMed

    Mayberry, Lindsay Satterwhite; Harper, Kryseana J; Osborn, Chandra Y

    2016-09-01

    Diabetes-specific family behaviors are associated with self-care and glycemic control among adults with type 2 diabetes. Formative research is needed to inform assessment of these behaviors and interventions to address obstructive family behaviors (sabotaging and nagging/arguing), particularly among racial/ethnic minorities and low-income adults who struggle most with self-care adherence. We conducted a mixed-methods study with adults with type 2 diabetes at a Federally Qualified Health Center to better understand experiences with diabetes-specific family behaviors and willingness to engage family members in diabetes interventions. Participants completed a phone survey (N = 53) and/or attended a focus group (n = 15). Participants were 70% African American and had low socioeconomic status (96% annual income

  18. PRELIMINARY NUCLEAR CRITICALITY NUCLEAR SAFETY EVLAUATION FOR THE CONTAINER SURVEILLANCE AND STORAGE CAPABILITY PROJECT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Low, M; Matthew02 Miller, M; Thomas Reilly, T

    2007-04-30

    Washington Safety Management Solutions (WSMS) provides criticality safety services to Washington Savannah River Company (WSRC) at the Savannah River Site. One activity at SRS is the Container Surveillance and Storage Capability (CSSC) Project, which will perform surveillances on 3013 containers (hereafter referred to as 3013s) to verify that they meet the Department of Energy (DOE) Standard (STD) 3013 for plutonium storage. The project will handle quantities of material that are greater than ANS/ANSI-8.1 single parameter mass limits, and thus required a Nuclear Criticality Safety Evaluation (NCSE). The WSMS methodology for conducting an NCSE is outlined in the WSMS methods manual.more » The WSMS methods manual currently follows the requirements of DOE-O-420.1B, DOE-STD-3007-2007, and the Washington Savannah River Company (WSRC) SCD-3 manual. DOE-STD-3007-2007 describes how a NCSE should be performed, while DOE-O-420.1B outlines the requirements for a Criticality Safety Program (CSP). The WSRC SCD-3 manual implements DOE requirements and ANS standards. NCSEs do not address the Nuclear Criticality Safety (NCS) of non-reactor nuclear facilities that may be affected by overt or covert activities of sabotage, espionage, terrorism or other security malevolence. Events which are beyond the Design Basis Accidents (DBAs) are outside the scope of a double contingency analysis.« less

  19. Safety and security of radioactive sources in industrial radiography in Bangladesh

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mollah, A. S.; Nazrul, M. Abdullah

    2013-07-01

    Malicious use of radioactive sources can involve dispersal of that material through an explosive device. There has been recognition of the threat posed by the potential malicious misuse of NDT radioactive source by terrorists. The dispersal of radioactive material using conventional explosives, referred to as a 'dirty bomb', could create considerable panic, disruption and area access denial in an urban environment. However, as it is still a relatively new topic among regulators, users, and transport and storage operators worldwide, international assistance and cooperation in developing the necessary regulatory and security infrastructure is required. The most important action in reducing themore » risk of radiological terrorism is to increase the security of radioactive sources. This paper presents safety and security considerations for the transport and site storage of the industrial radiography sources as per national regulations entitled 'Nuclear Safety and Radiation Control Rules-1997'.The main emphasis was put on the stages of some safety and security actions in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport and site storage of radioactive sources used in the practice of industrial radiography. (authors)« less

  20. Nuclear Forensics: A Methodology Applicable to Nuclear Security and to Non-Proliferation

    NASA Astrophysics Data System (ADS)

    Mayer, K.; Wallenius, M.; Lützenkirchen, K.; Galy, J.; Varga, Z.; Erdmann, N.; Buda, R.; Kratz, J.-V.; Trautmann, N.; Fifield, K.

    2011-09-01

    Nuclear Security aims at the prevention and detection of and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear Forensics is a key element of nuclear security. Nuclear Forensics is defined as a methodology that aims at re-establishing the history of nuclear material of unknown origin. It is based on indicators that arise from known relationships between material characteristics and process history. Thus, nuclear forensics analysis includes the characterization of the material and correlation with production history. To this end, we can make use of parameters such as the isotopic composition of the nuclear material and accompanying elements, chemical impurities, macroscopic appearance and microstructure of the material. In the present paper, we discuss the opportunities for attribution of nuclear material offered by nuclear forensics as well as its limitations. Particular attention will be given to the role of nuclear reactions. Such reactions include the radioactive decay of the nuclear material, but also reactions with neutrons. When uranium (of natural composition) is exposed to neutrons, plutonium is formed, as well as 236U. We will illustrate the methodology using the example of a piece of uranium metal that dates back to the German nuclear program in the 1940's. A combination of different analytical techniques and model calculations enables a nuclear forensics interpretation, thus correlating the material characteristics with the production history.

  1. Distribution of illegal incident characteristics: cases of bank fraud and embezzlement, computer-related crime, and insider theft from drug manufacturers and distributors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heineke, J M

    1979-10-01

    Three data sets were used to estimate joint and conditional probability distributions between various variables of interest in bank fraud and embezzlement (BF and E) cases of $10,000 dollars or more, computer-related crime cases of various types, and cases of insider theft from drug manufacturers and distributors. This report describes in tabular form the information contained in the three rather extensive data sets from industries facing insider threats which, in one or more dimensions, are analogous to insider threats potentially confronting managers in the nuclear industry. The data in Tables 1 through 29 were computed from the 313 cases ofmore » bank fraud and embezzlement (BF and E) representing losses of $10,000 or more reported to the Federal Deposit Insurance Corporation (FDIC) for the period 1977 to 1978. The data in Tables 30 through 64 were computed from the 461 cases of computer-related crime obtained from SRI International for the period 1958 to 1978. These incidents include inventory manipulations designed to hide errors, phony entries used to cover embezzlements, schemes used to penetrate a system and surreptitiously bring about a system crash, and sabotage. The data in Tables 65 through 67 were computed from data reported by the Drug Enforcement Agency (DEA) for the period 1973 to 1978. These data, though limited, provided several interesting insights into the insider-threat problem.« less

  2. Microfluidic chip with optical sensor for rapid detection of nerve agent Sarin in water samples

    NASA Astrophysics Data System (ADS)

    Tan, Hsih Yin; Nguyen, Nam-Trung; Loke, Weng Keong; Tan, Yong Teng

    2007-12-01

    The chemical warfare agent Sarin is an organophosphate that is highly toxic to humans as they can act as cholinesterase inhibitors, that disrupts neuromuscular transmission. As these nerve agents are colorless, odorless and highly toxic, they can be introduced into drinking water as a means of terrorist sabotage. Hence, numerous innovative devices and methods have been developed for rapid detection of these organophosphates. Microfluidic technology allows the implementation of fast and sensitive detection of Sarin. In this paper, a micro-total analysis systems (TAS), also known as Lab-on-a-chip, fitted with an optical detection system has been developed to analyze the presence of the nerve agent sarin in water samples. In the present set-up, inhibition of co-introduced cholinesterase and water samples containing trace amounts of nerve agent sarin into the microfluidic device was used as the basis for selective detection of sarin. The device was fabricated using polymeric micromachining with PMMA (poly (methymethacrylate)) as the substrate material. A chromophore was utilized to measure the activity of remnant cholinesterase activity, which is inversely related to the amount of sarin present in the water samples. Comparisons were made between two different optical detection techniques and the findings will be presented in this paper. The presented measurement method is simple, fast and as sensitive as Gas Chromatography.

  3. Family Behaviors and Type 2 Diabetes: What to Target and How to Address in Interventions for Adults with Low Socioeconomic Status

    PubMed Central

    Mayberry, Lindsay Satterwhite; Harper, Kryseana J.; Osborn, Chandra Y.

    2016-01-01

    Objectives Diabetes-specific family behaviors are associated with self-care and glycemic control among adults with type 2 diabetes (T2D). Formative research is needed to inform the assessments of these behaviors and interventions to address obstructive family behaviors (sabotaging and nagging/arguing), particularly among racial/ethnic minorities and low-income adults struggling most with self-care adherence. Methods We conducted a mixed-methods study with adults with T2D at a Federally Qualified Health Center to better understand experiences with diabetes-specific family behaviors and willingness to engage family members in diabetes interventions. Participants completed a phone survey (N=53) and/or attended a focus group (n=15). Results Participants were 70% African American and had low socioeconomic status (96% annual income <$20K, 51% uninsured). Although 62% lived with family members, only 48% lived with the person providing the most diabetes-specific support. Participants’ family living situations were diverse and multigenerational. Most (64%) experienced both supportive and obstructive family behaviors from the same person(s).Some participants (40%) said engaging family in interventions would positively affect all members; others (27%) did not want to involve family. Discussion Findings can inform the design and content of interventions targeting family involvement in adults’ T2D, with implications for assessing family behaviors, intervention modalities, and who to engage. PMID:27099387

  4. Eye center localization and gaze gesture recognition for human-computer interaction.

    PubMed

    Zhang, Wenhao; Smith, Melvyn L; Smith, Lyndon N; Farooq, Abdul

    2016-03-01

    This paper introduces an unsupervised modular approach for accurate and real-time eye center localization in images and videos, thus allowing a coarse-to-fine, global-to-regional scheme. The trajectories of eye centers in consecutive frames, i.e., gaze gestures, are further analyzed, recognized, and employed to boost the human-computer interaction (HCI) experience. This modular approach makes use of isophote and gradient features to estimate the eye center locations. A selective oriented gradient filter has been specifically designed to remove strong gradients from eyebrows, eye corners, and shadows, which sabotage most eye center localization methods. A real-world implementation utilizing these algorithms has been designed in the form of an interactive advertising billboard to demonstrate the effectiveness of our method for HCI. The eye center localization algorithm has been compared with 10 other algorithms on the BioID database and six other algorithms on the GI4E database. It outperforms all the other algorithms in comparison in terms of localization accuracy. Further tests on the extended Yale Face Database b and self-collected data have proved this algorithm to be robust against moderate head poses and poor illumination conditions. The interactive advertising billboard has manifested outstanding usability and effectiveness in our tests and shows great potential for benefiting a wide range of real-world HCI applications.

  5. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  6. What is a missing link among wireless persistent surveillance?

    NASA Astrophysics Data System (ADS)

    Hsu, Charles; Szu, Harold

    2011-06-01

    The next generation surveillance system will equip with versatile sensor devices and information focus capable of conducting regular and irregular surveillance and security environments worldwide. The community of the persistent surveillance must invest the limited energy and money effectively into researching enabling technologies such as nanotechnology, wireless networks, and micro-electromechanical systems (MEMS) to develop persistent surveillance applications for the future. Wireless sensor networks can be used by the military for a number of purposes such as monitoring militant activity in remote areas and force protection. Being equipped with appropriate sensors these networks can enable detection of enemy movement, identification of enemy force and analysis of their movement and progress. Among these sensor network technologies, covert communication is one of the challenging tasks in the persistent surveillance because it is highly demanded to provide secured sensor nodes and linkage for fear of deliberate sabotage. Due to the matured VLSI/DSP technologies, affordable COTS of UWB technology with noise-like direct sequence (DS) time-domain pulses is a potential solution to support low probability of intercept and low probability of detection (LPI/LPD) data communication and transmission. This paper will describe a number of technical challenges in wireless persistent surveillance development include covert communication, network control and routing, collaborating signal and information processing, and etc. The paper concludes by presenting Hermitian Wavelets to enhance SNR in support of secured communication.

  7. The threats from oil spills: now, then, and in the future.

    PubMed

    Jernelöv, Arne

    2010-01-01

    The ongoing oil spill from the blown-out well by the name of Macondo, drilled by the ill-fated rig Deepwater Horizon, has many features in common with another blowout in the Mexican Gulf that happened three decades ago. Then the oil gushed out from the Ixtoc I well drilled by the Sedco 135-F semi-submersible rig. In the years between these catastrophes, the source and nature of oil spills have undergone large changes. Huge spills from tankers that ran aground or collided used to be what caught the headlines and caused large ecological damage. The number and size of such accidental spills have decreased significantly. Instead, spills from ageing, ill-maintained or sabotaged pipelines have increased, and places like Arctic Russia, the Niger Delta, and the northwestern Amazon have become sites of reoccurring oil pollution. As for blowouts, there is no clear trend with regard to the number of incidences or amounts of spilled oil, but deepwater blowouts are much harder to cap and thus tend to go on longer and result in the release of larger quantities of oil. Also, oil exploration and extraction is moving into ever-deeper water and into stormier and icier seas, increasing potential risks. The risk for reoccurring spills like the two huge Mexican Gulf ones is eminent and must be reduced.

  8. Assessment on security system of radioactive sources used in hospitals of Thailand

    NASA Astrophysics Data System (ADS)

    Jitbanjong, Petchara; Wongsawaeng, Doonyapong

    2016-01-01

    Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources used in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.

  9. Changing educational inequalities in India in the context of affirmative action.

    PubMed

    Desai, Sonalde; Kulkarni, Veena

    2008-05-01

    Indian society suffers from substantial inequalities in education, employment, and income based on caste and ethnicity. Compensatory or positive discrimination policies reserve 15% of the seats in institutions of higher education and state and central government jobs for people of the lowest caste, the Scheduled Caste; 7.5% of the seats are reserved for the Scheduled Tribe. These programs have been strengthened by improved enforcement and increased funding in the 1990s. This positive discrimination has also generated popular backlash and on-the-ground sabotage of the programs. This paper examines the changes in educational attainment between various social groups for a period of nearly 20 years to see whether educational inequalities have declined over time. We use data from a large national sample survey of over 100,000 households for each of the four survey years--1983, 1987-1988, 1993-1994, and 1999-2000--and focus on the educational attainment of children and young adults aged 6-29. Our results show a declining gap between dalits, adivasis, and others in the odds of completing primary school. Such improvement is not seen for Muslims, a minority group that does not benefit from affirmative action. We find little improvement in inequality at the college level. Further, we do not find evidence that upper-income groups, the so-called creamy layer of dalits and adivasis, disproportionately benefit from the affirmative action programs at the expense of their lower-income counterparts.

  10. Changing Educational Inequalities in India in the Context of Affirmative Action

    PubMed Central

    DESAI, SONALDE; KULKARNI, VEENA

    2008-01-01

    Indian society suffers from substantial inequalities in education, employment, and income based on caste and ethnicity. Compensatory or positive discrimination policies reserve 15% of the seats in institutions of higher education and state and central government jobs for people of the lowest caste, the Scheduled Caste; 7.5% of the seats are reserved for the Scheduled Tribe. These programs have been strengthened by improved enforcement and increased funding in the 1990s. This positive discrimination has also generated popular backlash and on-the-ground sabotage of the programs. This paper examines the changes in educational attainment between various social groups for a period of nearly 20 years to see whether educational inequalities have declined over time. We use data from a large national sample survey of over 100,000 households for each of the four survey years—1983, 1987–1988, 1993–1994, and 1999–2000—and focus on the educational attainment of children and young adults aged 6–29. Our results show a declining gap between dalits, adivasis, and others in the odds of completing primary school. Such improvement is not seen for Muslims, a minority group that does not benefit from affirmative action. We find little improvement in inequality at the college level. Further, we do not find evidence that upper-income groups, the so-called creamy layer of dalits and adivasis, disproportionately benefit from the affirmative action programs at the expense of their lower-income counterparts. PMID:18613480

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Luna, R. E.

    This paper provides a simple model for estimating the release of respirable aerosols resulting from an attack on a spent fuel cask using a high energy density device (HEDD). Two primary experiments have provided data on potential releases from spent fuel casks under HEDD attack. Sandia National Laboratories (SNL) conducted the first in the early 1980's and the second was sponsored by Gessellshaft fur Anlagen- and Reaktorsicherheit (GRS) in Germany and conducted in France in 1994. Both used surrogate spent fuel assemblies in real casks. The SNL experiments used un-pressurized fuel pin assemblies in a single element cask while themore » GRS tests used pressurized fuel pin assemblies in a 9-element cask. Data from the two test programs is reasonably consistent, given the differences in the experiments, but the use of the test data for prediction of releases resulting from HEDD attack requires a method for accounting for the effects of pin pressurization release and the ratio of pin plenum gas release to cask free volume (VR). To account for the effects of VR and to link the two data sources, a simple model has been developed that uses both the SNL data and the GRS data as well as recent test data on aerosols produced in experiments with single pellets subjected to HEDD effects conducted under the aegis of the International Consortium's Working Group on Sabotage of Transport and Storage Casks (WGSTSC). (authors)« less

  12. Spatially Informed Plant PRA Models for Security Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wheeler, Timothy A.; Thomas, Willard; Thornsbury, Eric

    2006-07-01

    Traditional risk models can be adapted to evaluate plant response for situations where plant systems and structures are intentionally damaged, such as from sabotage or terrorism. This paper describes a process by which traditional risk models can be spatially informed to analyze the effects of compound and widespread harsh environments through the use of 'damage footprints'. A 'damage footprint' is a spatial map of regions of the plant (zones) where equipment could be physically destroyed or disabled as a direct consequence of an intentional act. The use of 'damage footprints' requires that the basic events from the traditional probabilistic riskmore » assessment (PRA) be spatially transformed so that the failure of individual components can be linked to the destruction of or damage to specific spatial zones within the plant. Given the nature of intentional acts, extensive modifications must be made to the risk models to account for the special nature of the 'initiating events' associated with deliberate adversary actions. Intentional acts might produce harsh environments that in turn could subject components and structures to one or more insults, such as structural, fire, flood, and/or vibration and shock damage. Furthermore, the potential for widespread damage from some of these insults requires an approach that addresses the impacts of these potentially severe insults even when they occur in locations distant from the actual physical location of a component or structure modeled in the traditional PRA. (authors)« less

  13. Fitness effects of a selfish gene (the Mus t complex) are revealed in an ecological context.

    PubMed

    Carroll, Lara S; Meagher, Shawn; Morrison, Linda; Penn, Dustin J; Potts, Wayne K

    2004-06-01

    In wild house mice, genes linked to the t transmission distortion complex cause meiotic drive by sabotaging wild-type gametes. The t complex is consequently inherited at frequencies higher than 90%. Yet, for unclear reasons, in wild mouse populations this selfish DNA is found at frequencies much lower than expected. Here, we examine selection on the t complex in 10 seminatural populations of wild mice based on data from 234 founders and nearly 2000 progeny. Eight of the 10 populations decreased in t frequency over one generation, and the overall frequency of t haplotypes across all 10 populations was 48.5% below expectations based on transmission distortion and 34.3% below Mendelian (or Hardy-Weinberg) expectations. Behavioral and reproductive data were collected for 10 months for each population, and microsatellite genotyping was performed on seven of the populations to determine parentage. These combined data show t-associated fitness declines in both males and females. This is the first study to show evidence for a reduction in the ability of +/t males to maintain territories. Because females tend to mate with dominant males, impairment of territorial success can explain much of the selection against t observed in our populations. In nature, selection against heterozygote carriers of the t complex helps solve the puzzlingly low t frequencies found in wild populations. This ecological approach for determining fitness consequences of genetic variants has broad application for the discovery of gene function in general.

  14. RNA Futile Cycling in Model Persisters Derived from MazF Accumulation

    PubMed Central

    Mok, Wendy W. K.; Park, Junyoung O.; Rabinowitz, Joshua D.

    2015-01-01

    ABSTRACT Metabolism plays an important role in the persister phenotype, as evidenced by the number of strategies that perturb metabolism to sabotage this troublesome subpopulation. However, the absence of techniques to isolate high-purity populations of native persisters has precluded direct measurement of persister metabolism. To address this technical challenge, we studied Escherichia coli populations whose growth had been inhibited by the accumulation of the MazF toxin, which catalyzes RNA cleavage, as a model system for persistence. Using chromosomally integrated, orthogonally inducible promoters to express MazF and its antitoxin MazE, bacterial populations that were almost entirely tolerant to fluoroquinolone and β-lactam antibiotics were obtained upon MazF accumulation, and these were subjected to direct metabolic measurements. While MazF model persisters were nonreplicative, they maintained substantial oxygen and glucose consumption. Metabolomic analysis revealed accumulation of all four ribonucleotide monophosphates (NMPs). These results are consistent with a MazF-catalyzed RNA futile cycle, where the energy derived from catabolism is dissipated through continuous transcription and MazF-mediated RNA degradation. When transcription was inhibited, oxygen consumption and glucose uptake decreased, and nucleotide triphosphates (NTPs) and NTP/NMP ratios increased. Interestingly, the MazF-inhibited cells were sensitive to aminoglycosides, and this sensitivity was blocked by inhibition of transcription. Thus, in MazF model persisters, futile cycles of RNA synthesis and degradation result in both significant metabolic demands and aminoglycoside sensitivity. PMID:26578677

  15. The Bacterial Second Messenger Cyclic di-GMP Regulates Brucella Pathogenesis and Leads to Altered Host Immune Response.

    PubMed

    Khan, Mike; Harms, Jerome S; Marim, Fernanda M; Armon, Leah; Hall, Cherisse L; Liu, Yi-Ping; Banai, Menachem; Oliveira, Sergio C; Splitter, Gary A; Smith, Judith A

    2016-12-01

    Brucella species are facultative intracellular bacteria that cause brucellosis, a chronic debilitating disease significantly impacting global health and prosperity. Much remains to be learned about how Brucella spp. succeed in sabotaging immune host cells and how Brucella spp. respond to environmental challenges. Multiple types of bacteria employ the prokaryotic second messenger cyclic di-GMP (c-di-GMP) to coordinate responses to shifting environments. To determine the role of c-di-GMP in Brucella physiology and in shaping host-Brucella interactions, we utilized c-di-GMP regulatory enzyme deletion mutants. Our results show that a ΔbpdA phosphodiesterase mutant producing excess c-di-GMP displays marked attenuation in vitro and in vivo during later infections. Although c-di-GMP is known to stimulate the innate sensor STING, surprisingly, the ΔbpdA mutant induced a weaker host immune response than did wild-type Brucella or the low-c-di-GMP guanylate cyclase ΔcgsB mutant. Proteomics analysis revealed that c-di-GMP regulates several processes critical for virulence, including cell wall and biofilm formation, nutrient acquisition, and the type IV secretion system. Finally, ΔbpdA mutants exhibited altered morphology and were hypersensitive to nutrient-limiting conditions. In summary, our results indicate a vital role for c-di-GMP in allowing Brucella to successfully navigate stressful and shifting environments to establish intracellular infection. Copyright © 2016, American Society for Microbiology. All Rights Reserved.

  16. Assessment on security system of radioactive sources used in hospitals of Thailand

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jitbanjong, Petchara, E-mail: petcharajit@gmail.com; Wongsawaeng, Doonyapong

    Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources usedmore » in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.« less

  17. Security Economics and Critical National Infrastructure

    NASA Astrophysics Data System (ADS)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  18. Security culture for nuclear facilities

    NASA Astrophysics Data System (ADS)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  19. Minimizing deviant behavior in healthcare organizations: the effects of supportive leadership and job design.

    PubMed

    Chullen, C Logan; Dunford, Benjamin B; Angermeier, Ingo; Boss, R Wayne; Boss, Alan D

    2010-01-01

    In an era when healthcare organizations are beset by intense competition, lawsuits, and increased administrative costs, it is essential that employees perform their jobs efficiently and without distraction. Deviant workplace behavior among healthcare employees is especially threatening to organizational effectiveness, and healthcare managers must understand the antecedents of such behavior to minimize its prevalence. Deviant employee behavior has been categorized into two major types, individual and organizational, according to the intended target of the behavior. Behavior directed at the individual includes such acts as harassment and aggression, whereas behavior directed at the organization includes such acts as theft, sabotage, and voluntary absenteeism, to name a few (Robinson and Bennett 1995). Drawing on theory from organizational behavior, we examined two important features of supportive leadership, leader-member exchange (LMX) and perceived organizational support (POS), and two important features of job design, intrinsic motivation and depersonalization, as predictors of subsequent deviant behavior in a sample of over 1,900 employees within a large US healthcare organization. Employees who reported weaker perceptions of LMX and greater perceptions of depersonalization were more likely to engage in deviant behavior directed at the individual, whereas employees who reported weaker perceptions of POS and intrinsic motivation were more likely to engage in deviant behavior directed at the organization. These findings give rise to specific prescriptions for healthcare managers to prevent or minimize the frequency of deviant behavior in the workplace.

  20. Perceptions of horizontal violence in staff nurses and intent to leave.

    PubMed

    Armmer, Francesca; Ball, Charlotte

    2015-01-01

    The impact of horizontal violence is multifaceted. From the impact upon the individual, the unit, and the institution, horizontal violence affects professional nursing activities in a variety of aspects of health care. To examine registered nurses' experiences with horizontal violence and explore the relationship between horizontal violence and intent to leave. A random sample of 300 registered nurses from a Midwestern hospital received the Briles' Sabotage Savvy Questionnaire (BSSQ), the Michigan Organizational Assessment Questionnaire (MOAQ) Intent to Turnover measure, and a Demographic questionnaire. Descriptive correlational study was implemented. Questionnaires were distributed to the selected registered nurses. Descriptive and correlational statistics were calculated. Horizontal violence had been experienced by nurses of all ages and experience. Based upon measurement tools, examples of horizontal violence were: Being held responsible for coworkers' duties; Reprimanded or confronted in front of others; Failure to be acknowledged or confronted in front of others; and Untrue information about you being passed or exchanged. Correlations indicated a significant, positive relationship between perceptions of horizontal violence and intent to leave. Results also indicated the longer nurses were employed the more likely to perceive themselves as victims of horizontal violence. Additionally, results associated with the MOAQ, age and years employed indicated that older nurses and those with increasing years of employment were less likely to leave. Younger nurses indicated more willingness to leave a position due to perceived horizontal violence than older nurses. Activities to address the impact of perceived horizontal violence are needed. Workplace strategies may include mentoring, ongoing assessment of organizational climate, and zero tolerance for horizontal violence.

  1. Understanding economic abuse in the lives of survivors.

    PubMed

    Postmus, Judy L; Plummer, Sara-Beth; McMahon, Sarah; Murshid, N Shaanta; Kim, Mi Sung

    2012-02-01

    Intimate partner violence (IPV) often includes economic abuse as one tactic commonly used by an abuser; unfortunately, there is a lack of empirical understanding of economic abuse. Additionally, research is limited on the predictors of economic self-sufficiency in the lives of women experiencing IPV. This paper furthers our knowledge about economic abuse and its relationship with economic self-sufficiency by presenting the results from an exploratory study with IPV survivors participating in a financial literacy program. Of the 120 individuals who participated in the first wave, 94% experienced some form of economic abuse, which also correlated highly with other forms of IPV. Seventy-nine percent experienced some form of economic control, 79% experienced economic exploitative behaviors, and 78% experienced employment sabotage. MANOVA results also indicated that economic control differed significantly based on education with those with a high school education experiencing higher rates than those with less than high school education or those with some college. Finally, results from the OLS regressions indicated that experiencing any form of economic abuse as well as economic control significantly predicted a decrease in economic self sufficiency. Implications suggest that advocates should assess for economic abuse when working with survivors and should be prepared to offer financial tools to increase survivors' economic self-sufficiency. Policymakers should understand the ramifications of economic abuse and create policies that support survivors and prohibit economic abuse. Finally, more research is needed to fully understand economic abuse and its impact on survivors and their economic self-sufficiency.

  2. Audit of the management and cost of the Department of Energy`s protective forces

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1994-07-01

    The Department of Energy`s safeguards and security program is designed to provide appropriate, efficient, and effective protection of the Department`s nuclear weapons, nuclear materials, facilities, and classified information. These items must be protected against theft, sabotage, espionage, and terrorist activity, with continuing emphasis on protection against the insider threat. The purpose of the audit was to determine if protective forces were efficiently managed and appropriately sized in light of the changing missions and current budget constraints. The authors found that the cost of physical security at some sites had grown beyond those costs incurred when the site was in fullmore » production. This increase was due to a combination of factors, including concerns about the adequacy of physical security, reactions to the increase in terrorism in the early 1980s with the possibility of hostile attacks, and the selection of security system upgrades without adequate consideration of cost effectiveness. Ongoing projects to upgrade security systems were not promptly reassessed when missions changed and levels of protection were not determined in a way which considered the attractiveness of the material being protected. The authors also noted several opportunities for the Department to improve the operational efficiency of its protective force operations, including, eluminating overtime paid to officers prior to completion of the basic 40-hour workweek, paying hourly wages of unarmed guards which are commensurate with their duties, consolidating protective force units, transferring law enforcement duties to local law agencies, eliminating or reducing paid time to exercise, and standardizing supplies and equipment used by protective force members.« less

  3. Quantifying the exposure of humans and the environment to oil pollution in the Niger Delta using advanced geostatistical techniques.

    PubMed

    Obida, Christopher B; Alan Blackburn, G; Duncan Whyatt, J; Semple, Kirk T

    2018-02-01

    The Niger Delta is one of the largest oil producing regions of the world. Large numbers and volumes of oil spills have been reported in this region. What has not been quantified is the putative exposure of humans and/or the environment to this hydrocarbon pollution. In this novel study, advanced geostatistical techniques were applied to an extensive database of oil spill incidents from 2007 to 2015. The aims were to (i) identify and analyse spill hotspots along the oil pipeline network and (ii) estimate the exposure of the hydrocarbon pollution to the human population and the environment within the Niger Delta. Over the study period almost 90millionlitres of oil were released. Approximately 29% of the human population living in proximity to the pipeline network has been potentially exposed to oil contamination, of which 565,000 people live within high or very high spill intensity sectors. Over 1000km 2 of land has been contaminated by oil pollution, with broadleaved forest, mangroves and agricultural land the most heavily impacted land cover types. Proximity to the coast, roads and cities are the strongest spatial factors contributing to spill occurrence, which largely determine the accessibility of sites for pipeline sabotage and oil theft. Overall, the findings demonstrate the high levels of environmental and human exposure to hydrocarbon pollutants in the Niger Delta. These results provide evidence with which to spatially target interventions to reduce future spill incidents and mitigate the impacts of previous spills on human communities and ecosystem health. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Cyber Norms for Civilian Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Spirito, Christopher

    The international community agrees that the safe operation of civilian nuclear infrastructure is in every population’s best interest. One challenge each government must address is defining and agreeing to a set of acceptable norms of behavior in cyberspace as they relate to these facilities. The introduction of digital systems and networking technologies into these environments has led to the possibility that control and supporting computer systems are now accessible and exploitable, especially where interconnections to global information and communications technology (ICT) networks exist. The need for norms of behavior in cyberspace includes what is expected of system architects and cybermore » defenders as well as adversaries who should abide by rules of engagement even while conducting acts that violate national and international laws. The goal of this paper is to offer three behavioral cyber norms to improve the overall security of the ICT and Operational Technology (OT) networks and systems that underlie the operations of nuclear facilities. These norms of behavior will be specifically defined with the goals of reducing the threats associated to the theft of nuclear materials, accidental release of radiation and sabotage of nuclear processes. These norms would also include instances where an unwitting attacker or intelligence collection entity inadvertently makes their way into a nuclear facility network or system and can recognize they are in a protected zone and an approach to ensuring that these zones are not exploitable by bad actors to place their sensitive cyber effect delivery systems.« less

  5. The hidden traps in decision making.

    PubMed

    Hammond, J S; Keeney, R L; Raiffa, H

    1998-01-01

    Bad decisions can often be traced back to the way the decisions were made--the alternatives were not clearly defined, the right information was not collected, the costs and benefits were not accurately weighted. But sometimes the fault lies not in the decision-making process but rather in the mind of the decision maker. The way the human brain works can sabotage the choices we make. John Hammond, Ralph Keeney, and Howard Raiffa examine eight psychological traps that are particularly likely to affect the way we make business decisions: The anchoring trap leads us to give disproportionate weight to the first information we receive. The statusquo trap biases us toward maintaining the current situation--even when better alternatives exist. The sunk-cost trap inclines us to perpetuate the mistakes of the past. The confirming-evidence trap leads us to seek out information supporting an existing predilection and to discount opposing information. The framing trap occurs when we misstate a problem, undermining the entire decision-making process. The overconfidence trap makes us overestimate the accuracy of our forecasts. The prudence trap leads us to be overcautious when we make estimates about uncertain events. And the recallability trap leads us to give undue weight to recent, dramatic events. The best way to avoid all the traps is awareness--forewarned is forearmed. But executives can also take other simple steps to protect themselves and their organizations from the various kinds of mental lapses. The authors show how to take action to ensure that important business decisions are sound and reliable.

  6. Worldwide advanced nuclear power reactors with passive and inherent safety: What, why, how, and who

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Forsberg, C.W.; Reich, W.J.

    1991-09-01

    The political controversy over nuclear power, the accidents at Three Mile Island (TMI) and Chernobyl, international competition, concerns about the carbon dioxide greenhouse effect and technical breakthroughs have resulted in a segment of the nuclear industry examining power reactor concepts with PRIME safety characteristics. PRIME is an acronym for Passive safety, Resilience, Inherent safety, Malevolence resistance, and Extended time after initiation of an accident for external help. The basic ideal of PRIME is to develop power reactors in which operator error, internal sabotage, or external assault do not cause a significant release of radioactivity to the environment. Several PRIME reactormore » concepts are being considered. In each case, an existing, proven power reactor technology is combined with radical innovations in selected plant components and in the safety philosophy. The Process Inherent Ultimate Safety (PIUS) reactor is a modified pressurized-water reactor, the Modular High Temperature Gas-Cooled Reactor (MHTGR) is a modified gas-cooled reactor, and the Advanced CANDU Project is a modified heavy-water reactor. In addition to the reactor concepts, there is parallel work on super containments. The objective is the development of a passive box'' that can contain radioactivity in the event of any type of accident. This report briefly examines: why a segment of the nuclear power community is taking this new direction, how it differs from earlier directions, and what technical options are being considered. A more detailed description of which countries and reactor vendors have undertaken activities follows. 41 refs.« less

  7. Natural aversive learning in Tetramorium ants reveals ability to form a generalizable memory of predators' pit traps.

    PubMed

    Hollis, Karen L; McNew, Kelsey; Sosa, Talisa; Harrsch, Felicia A; Nowbahari, Elise

    2017-06-01

    Many species of ants fall prey to pit-digging larval antlions (Myrmeleon spp.), extremely sedentary predators that wait, nearly motionless at the bottom of their pit traps, for prey to stumble inside. Previous research, both in the field and laboratory, has demonstrated a remarkable ability of these ants to rescue trapped nestmates, thus sabotaging antlions' attempts to capture them. Here we show that pavement ants, Tetramorium sp. E, an invasive species and a major threat to biodiversity, possess yet another, more effective, antipredator strategy, namely the ability to learn to avoid antlion traps following a single successful escape from a pit. More importantly, we show that this learned antipredator behavior, an example of natural aversive learning in insects, is more complicated than a single cue-to-consequence form of associative learning. That is, pavement ants were able to generalize, after one experience, from the learned characteristics of the pit and its specific location, to other pits and other contexts that differed in many features. Such generalization, often described as a lack of precise stimulus control, nonetheless would be especially adaptive in nature, enabling ants to negotiate antlions' pit fields, which contain a hundred or more pits within a few centimetres of one another. Indeed, the ability to generalize in exactly this way almost certainly is responsible for the sudden, and heretofore inexplicable, behavioural modifications of ants in response to an invasion of antlions in the vicinity of an ant colony. Copyright © 2017 Elsevier B.V. All rights reserved.

  8. Radiation terrorism: what society needs from the radiobiology-radiation protection and radiation oncology communities.

    PubMed

    Coleman, C Norman; Parker, Gerald W

    2009-06-01

    Society's and individuals' concerns about the adverse effects from radiation are logically amplified many times when radiological terrorism is considered. The spectrum of events include industrial sabotage, the use of an explosive or non-explosive radiological dispersal device, the placement of a radiological exposure device in a public facility and the use of an improvised nuclear device. The consequences of an event relate to the physical and medical damage of the event itself, the financial impact, and the acute and long-term medical consequences, including fear of radiation-induced cancer. The magnitude of a state-sponsored nuclear event is so great that limited detailed response planning had been done in the past, as compared to the work now ongoing. Planning is done on the basis of scenario modelling. Medical response planning includes medical triage, distribution of victims to care by experienced physicians, developing medical countermeasures to mitigate or treat radiation injury, counselling and appropriately following exposed or potentially exposed people, and helping the local community develop confidence in their own response plan. Optimal response must be based on the best available science. This requires scientists who can define, prioritise and address the gaps in knowledge with the range of expertise from basic physics to biology to translational research to systems expertise to response planning to healthcare policy to communications. Not only are there unique needs and career opportunities, but there is also the opportunity for individuals to serve their communities and country with education regarding radiation effects and by formulating scientifically based government policy.

  9. Nonradioactive Ambient Air Monitoring at Los Alamos National Laboratory 2001--2002

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    E. Gladney; J.Dewart, C.Eberhart; J.Lochamy

    2004-09-01

    During the spring of 2000, the Cerro Grande forest fire reached Los Alamos National Laboratory (LANL) and ignited both above-ground vegetation and disposed materials in several landfills. During and after the fire, there was concern about the potential human health impacts from chemicals emitted by the combustion of these Laboratory materials. Consequently, short-term, intensive air-monitoring studies were performed during and shortly after the fire. Unlike the radiological data from many years of AIRNET sampling, LANL did not have an adequate database of nonradiological species under baseline conditions with which to compare data collected during the fire. Therefore, during 2001 themore » Meteorology and Air Quality Group designed and implemented a new air-monitoring program, entitled NonRadNET, to provide nonradiological background data under normal conditions. The objectives of NonRadNET were to: (1) develop the capability for collecting nonradiological air-monitoring data, (2) conduct monitoring to develop a database of typical background levels of selected nonradiological species in the communities nearest the Laboratory, and (3) determine LANL's potential contribution to nonradiological air pollution in the surrounding communities. NonRadNET ended in late December 2002 with five quarters of data. The purpose of this paper is to organize and describe the NonRadNET data collected over 2001-2002 to use as baseline data, either for monitoring during a fire, some other abnormal event, or routine use. To achieve that purpose, in this paper we will: (1) document the NonRadNET program procedures, methods, and quality management, (2) describe the usual origins and uses of the species measured, (3) compare the species measured to LANL and other area emissions, (4) present the five quarters of data, (5) compare the data to known typical environmental values, and (6) evaluate the data against exposure standards.« less

  10. The Need for Cyber-Informed Engineering Expertise for Nuclear Research Reactors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, Robert Stephen

    Engineering disciplines may not currently understand or fully embrace cyber security aspects as they apply towards analysis, design, operation, and maintenance of nuclear research reactors. Research reactors include a wide range of diverse co-located facilities and designs necessary to meet specific operational research objectives. Because of the nature of research reactors (reduced thermal energy and fission product inventory), hazards and risks may not have received the same scrutiny as normally associated with power reactors. Similarly, security may not have been emphasized either. However, the lack of sound cybersecurity defenses may lead to both safety and security impacts. Risk management methodologiesmore » may not contain the foundational assumptions required to address the intelligent adversary’s capabilities in malevolent cyber attacks. Although most research reactors are old and may not have the same digital footprint as newer facilities, any digital instrument and control function must be considered as a potential attack platform that can lead to sabotage or theft of nuclear material, especially for some research reactors that store highly enriched uranium. This paper will provide a discussion about the need for cyber-informed engineering practices that include the entire engineering lifecycle. Cyber-informed engineering as referenced in this paper is the inclusion of cybersecurity aspects into the engineering process. A discussion will consider several attributes of this process evaluating the long-term goal of developing additional cyber safety basis analysis and trust principles. With a culture of free information sharing exchanges, and potentially a lack of security expertise, new risk analysis and design methodologies need to be developed to address this rapidly evolving (cyber) threatscape.« less

  11. Detection of warfare agents in liquid foods using the brine shrimp lethality assay.

    PubMed

    Lumor, Stephen E; Diez-Gonzalez, Francisco; Labuza, Theodore P

    2011-01-01

    The brine shrimp lethality assay (BSLA) was used for rapid and non-specific detection of biological and chemical warfare agents at concentrations considerably below that which will cause harm to humans. Warfare agents detected include T-2 toxin, trimethylsilyl cyanide, and commercially available pesticides such as dichlorvos, diazinon, dursban, malathion, and parathion. The assay was performed by introducing 50 μL of milk or orange juice contaminated with each analyte into vials containing 10 freshly hatched brine shrimp nauplii in seawater. This was incubated at 28 °C for 24 h, after which mortality was determined. Mortality was converted to probits and the LC(50) was determined for each analyte by plotting probits of mortality against analyte concentration (log(10)). Our findings were the following: (1) the lethal effects of toxins dissolved in milk were observed, with T-2 toxin being the most lethal and malathion being the least, (2) except for parathion, the dosage (based on LC(50)) of analyte in a cup of milk (200 mL) consumed by a 6-y-old (20 kg) was less than the respective published rat LD(50) values, and (3) the BSLA was only suitable for detecting toxins dissolved in orange juice if incubation time was reduced to 6 h. Our results support the application of the BSLA for routine, rapid, and non-specific prescreening of liquid foods for possible sabotage by an employee or an intentional bioterrorist act. Practical Application: The findings of this study strongly indicate that the brine shrimp lethality assay can be adapted for nonspecific detection of warfare agents or toxins in food at any point during food production and distribution.

  12. Fear of feedback.

    PubMed

    Jackman, Jay M; Strober, Myra H

    2003-04-01

    Nobody likes performance reviews. Subordinates are terrified they'll hear nothing but criticism. Bosses think their direct reports will respond to even the mildest criticism with anger or tears. The result? Everyone keeps quiet. That's unfortunate, because most people need help figuring out how to improve their performance and advance their careers. This fear of feedback doesn't come into play just during annual reviews. At least half the executives with whom the authors have worked never ask for feedback. Many expect the worst: heated arguments, even threats of dismissal. So rather than seek feedback, people try to guess what their bosses are thinking. Fears and assumptions about feedback often manifest themselves in psychologically maladaptive behaviors such as procrastination, denial, brooding, jealousy, and self-sabotage. But there's hope, say the authors. Those who learn adaptive techniques can free themselves from destructive responses. They'll be able to deal with feedback better if they acknowledge negative emotions, reframe fear and criticism constructively, develop realistic goals, create support systems, and reward themselves for achievements along the way. Once you've begun to alter your maladaptive behaviors, you can begin seeking regular feedback from your boss. The authors take you through four steps for doing just that: self-assessment, external assessment, absorbing the feedback, and taking action toward change. Organizations profit when employees ask for feedback and deal well with criticism. Once people begin to know how they are doing relative to management's priorities, their work becomes better aligned with organizational goals. What's more, they begin to transform a feedback-averse environment into a more honest and open one, in turn improving performance throughout the organization.

  13. Numerical Estimation of the Spent Fuel Ratio

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lindgren, Eric R.; Durbin, Samuel; Wilke, Jason

    Sabotage of spent nuclear fuel casks remains a concern nearly forty years after attacks against shipment casks were first analyzed and has a renewed relevance in the post-9/11 environment. A limited number of full-scale tests and supporting efforts using surrogate materials, typically depleted uranium dioxide (DUO 2 ), have been conducted in the interim to more definitively determine the source term from these postulated events. However, the validity of these large- scale results remain in question due to the lack of a defensible spent fuel ratio (SFR), defined as the amount of respirable aerosol generated by an attack on amore » mass of spent fuel compared to that of an otherwise identical surrogate. Previous attempts to define the SFR in the 1980's have resulted in estimates ranging from 0.42 to 12 and include suboptimal experimental techniques and data comparisons. Because of the large uncertainty surrounding the SFR, estimates of releases from security-related events may be unnecessarily conservative. Credible arguments exist that the SFR does not exceed a value of unity. A defensible determination of the SFR in this lower range would greatly reduce the calculated risk associated with the transport and storage of spent nuclear fuel in dry cask systems. In the present work, the shock physics codes CTH and ALE3D were used to simulate spent nuclear fuel (SNF) and DUO 2 targets impacted by a high-velocity jet at an ambient temperature condition. These preliminary results are used to illustrate an approach to estimate the respirable release fraction for each type of material and ultimately, an estimate of the SFR. This page intentionally blank« less

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Virginia Finley; Sheneman, Robert S.; Levine, Jerry D.

    Contained in the following report are data for radioactivity in the environment collected and analyzed by Princeton Plasma Physics Laboratory’s Princeton Environmental, Analytical, and Radiological Laboratory (PEARL). The PEARL is located on-site and is certified for analyzing radiological and non-radiological parameters through the New Jersey Department of Environmental Protection’s Laboratory Certification Program, Certification Number 12471. Non-radiological surface and ground water samples are analyzed by NJDEP certified subcontractor laboratories – QC, Inc. and Accutest Laboratory. To the best of our knowledge, these data, as contained in the “Annual Site Environmental Report for 2011,” are documented and certified to be correct.

  15. Health effects of SRS non-radiological air emissions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stewart, J.

    1997-06-16

    This report examines the potential health effects of non radiological emissions to the air resulting from operations at the Savannah River Site (SRS). The scope of this study was limited to the 55 air contaminants for which the US Environmental Protection Agency (EPA) has quantified risk by determining unit risk factors (excess cancer risks) and/or reference concentrations (deleterious non cancer risks). Potential health impacts have been assessed in relation to the maximally exposed individual. This is a hypothetical person who resides for a lifetime at the SRS boundary. The most recent (1994) quality assured SRS emissions data available were used.more » Estimated maximum site boundary concentrations of the air contaminants were calculated using air dispersion modeling and 24-hour and annual averaging times. For the emissions studied, the excess cancer risk was found to be less than the generally accepted risk level of 1 in 100,000 and, in most cases, was less than 1 in 1,000,000. Deleterious non cancer effects were also found to be very unlikely.« less

  16. Intelligent Facial Recognition Systems: Technology advancements for security applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g.,more » fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.« less

  17. Application of the API/NPRA SVA methodology to transportation security issues.

    PubMed

    Moore, David A

    2006-03-17

    Security vulnerability analysis (SVA) is becoming more prevalent as the issue of chemical process security is of greater concern. The American Petroleum Institute (API) and the National Petrochemical and Refiner's Association (NPRA) have developed a guideline for conducting SVAs of petroleum and petrochemical facilities in May 2003. In 2004, the same organizations enhanced the guidelines by adding the ability to evaluate transportation security risks (pipeline, truck, and rail). The importance of including transportation and value chain security in addition to fixed facility security in a SVA is that these issues may be critically important to understanding the total risk of the operation. Most of the SVAs done using the API/NPRA SVA and other SVA methods were centered on the fixed facility and the operations within the plant fence. Transportation interfaces alone are normally studied as a part of the facility SVA, and the entire transportation route impacts and value chain disruption are not commonly considered. Particularly from a national, regional, or local infrastructure analysis standpoint, understanding the interdependencies is critical to the risk assessment. Transportation risks may include weaponization of the asset by direct attack en route, sabotage, or a Trojan Horse style attack into a facility. The risks differ in the level of access control and the degree of public exposures, as well as the dynamic nature of the assets. The public exposures along the transportation route need to be carefully considered. Risks may be mitigated by one of many strategies including internment, staging, prioritization, conscription, or prohibition, as well as by administrative security measures and technology for monitoring and isolating the assets. This paper illustrates how these risks can be analyzed by the API/NPRA SVA methodology. Examples are given of a pipeline operation, and other examples are found in the guidelines.

  18. A better way to deliver bad news.

    PubMed

    Manzoni, Jean-François

    2002-09-01

    In an ideal world, a subordinate would accept critical feedback from a manager with an open mind. He or she would ask a few clarifying questions, promise to work on certain performance areas, and show signs of improvement over time. But things don't always turn out that way. Such conversations can be unpleasant. Emotions can run high; tempers can flare. Fearing that the employee will become angry and defensive, the boss all too often inadvertently sabotages the meeting by preparing for it in a way that stifles honest discussion. This unintentional--indeed, unconscious--stress-induced habit makes it difficult to deliver corrective feedback effectively. Insead professor Jean-François Manzoni says that by changing the mind-set with which they develop and deliver negative feedback, managers can increase their odds of having productive conversations without damaging relationships. Manzoni describes two behavioral phenomena that color the feedback process--the fundamental attribution error and the false consensus effect--and uses real-world examples to demonstrate how bosses' critiques can go astray. Managers tend to frame difficult situations and decisions in a way that is narrow (alternatives aren't considered) and binary (there are only two possible outcomes--win or lose). And during the feedback discussion, managers' framing of the issues often remains frozen, regardless of the direction the conversation takes. Manzoni advises managers not to just settle on the first acceptable explanation for a behavior or situation they've witnessed. Bosses also need to consider an employee's circumstances rather than just attributing weak performance to a person's disposition. In short, delivering more effective feedback requires an open-minded approach, one that will convince employees that the process is fair and that the boss is ready for an honest conversation.

  19. World commercial aircraft accidents: 1st edition, 1946--1991

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kimura, C.Y.

    1992-02-01

    This report is a compilation of all accidents world-wide involving aircraft in commercial service which resulted in the loss of the airframe or one or more fatality, or both. This information has been gathered in order to present a complete inventory of commercial aircraft accidents. Events involving military action, sabotage, terrorist bombings, hijackings, suicides, and industrial ground accidents are included within this list. This report is organized into six chapters. The first chapter is the introduction. The second chapter contains the compilation of accidents involving world commercial jet aircraft from 1952 to 1991. The third chapter presents a compilation ofmore » accidents involving world commercial turboprop aircraft from 1952 to 1991. The fourth chapter presents a compilation of accidents involving world commercial pistonprop aircraft with four or more engines from 1946 to 1991. Each accident compilation or database in chapters two, three and four is presented in chronological order. Each accident is presented with information the following categories: date of accident, airline or operator and its flight number (if known), type of flight, type of aircraft and model, aircraft registration number, construction number/manufacturers serial number, aircraft damage resulting from accident, accident flight phase, accident location, number of fatalities, number of occupants, references used to compile the information, and finally cause, remarks, or description (brief) of the accident. The fifth chapter presents a list of all commercial aircraft accidents for all aircraft types with 100 or more fatalities in order of decreasing number of fatalities. Chapter six presents the commercial aircraft accidents for all aircraft types by flight phase. Future editions of this report will have additional follow-on chapters which will present other studies still in preparation at the time this edition was being prepared.« less

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Butler, Nicholas; Watson, Erica E.; Wright, Kyle A.

    The Global Threat Reduction Initiative (GTRI) reduces and protects vulnerable nuclear and radiological material located at civilian sites worldwide from sabotage, theft or diversion. The GTRI program has worked successfully with foreign countries to remove and protect nuclear and radioactive materials including high-activity sources used in medical, commercial, and research applications. There are many barriers to successful bilateral cooperation that must be overcome including language, preconceived perceptions, long distances, and different views on the threat and protection requirements. Successful cooperation is often based on relationships and building trusting relationships takes time. In the case of Mexico, GTRI first made contactmore » in 2005. The project then lost momentum and stalled. At the same time, GTRI’s cooperation with the Republic of Colombia was a resounding success resulting in the securing of forty sites; the consolidation of numerous disused/orphan sources at a secure national storage facility; and, the development of a comprehensive approach to security including, inter alia, training and sustainability. The government of Colombia also showcased this comprehensive approach to thirteen Central American and Caribbean countries at a GTRI regional security conference held in Panama in October 2004. Representatives from the Colombian government were aware of GTRI’s interest in initiating cooperation with the Government of Mexico and to facilitate this cooperation, they offered to invite their Mexican counterparts to Colombia to observe its successful cooperation with GTRI. Shortly after that visit, the Government of Mexico agreed to move forward and requested that the cooperative efforts in Mexico be performed in a tripartite manner, leveraging the skills, experience, and resources of the Colombians. As a result, 22 of Mexico’s largest radioactive sites have had security upgrades in place within 18 months of cooperation.« less

  1. Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hernandez Jimenez, Jarilyn M; Chen, Qian; Nichols, Jeff A.

    Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report bymore » Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.« less

  2. Upstream petroleum degradation of mangroves and intertidal shores: the Niger Delta experience.

    PubMed

    Osuji, Leo C; Erondu, Ebere S; Ogali, Regina E

    2010-01-01

    This article was inspired by a field reconnaissance survey of outcrops along the Nembe-Brass axis of the petroliferous Niger Delta. It reviews various tradeoffs of the impact of upstream petroleum (seismic and production) operations on the mangrove ecosystems in that region, the largest in Sub-Saharan Africa. Mangroves and intertidal shores are considered critical to the economic well-being of this region owing to the people's dual occupation in fishing and farming. The mangrove ecosystem provides a nutrient medium, which serves as a nursery and spawning ground for many fish species and other biota. Oil and gas activities might destroy these spawn areas, causing reduction in resource output and community pressure. Devegetation of the mangrove forest as a result of seismic delineation leaves the fragile soil exposed, unprotected, and susceptible to erosion. Again, loss of vegetation might discourage the natural role of plants in air purification (CO(2) utilization and O(2) production). The release of nutrients (organic N(2), NH(3), and NO$\\rm{{_{3};{-}}}$) and polyaromatic hydrocarbons (PAHs) to the environment, with the attendant increase in microbial load, increases biochemical O(2) demand (BOD) and depletes dissolved O(2) (DO) in H(2)O to a level that is beyond the tolerance limit of organisms. This anoxic situation leads to asphyxiation and subsequent fish kill in affected areas. In order of increasing vulnerability, the mangroves and intertidal shores of the Niger Delta fall under categories 8 to 10 on the environmental sensitivity index (ESI) scale, which predisposes the areas to serious long-term effects and clean-up complexity. Thus, there is need to monitor mangrove systems and shoreline changes in the areas of considerable seismic and production activities, especially in the coastal Niger Delta, where pipeline corrosion due to salt intrusion into the swampy environment and 'unsighted fingers' of sabotage have increased the prevalence of oil spills.

  3. 75 FR 4591 - Virginia Electric and Power Company; North Anna Power Station, Unit Nos. 1 and 2; Environmental...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-28

    ... that effect radiation exposures to plant workers and members of the public. Therefore, no changes or... socioeconomic resources. Therefore, no changes to or different types of non-radiological environmental impacts...

  4. 75 FR 6224 - Northern States Power Company of Minnesota; Monticello Nuclear Generating Plant Environmental...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-08

    ... affect radiation exposures to plant workers and members of the public. Therefore, no changes or different... socioeconomic resources. Therefore, no changes to or different types of non-radiological environmental impacts...

  5. Health and Environmental Protection Standards for Uranium and Thorium Mill Tailings (40 CFR Part 192)

    EPA Pesticide Factsheets

    This regulation sets standards for the protection of public health, safety, and the environment from radiological and non-radiological hazards from uranium and thorium ore processing and disposal of associated wastes.

  6. Emergency Response Manual

    NASA Technical Reports Server (NTRS)

    Barnett, Traci M.

    2004-01-01

    Safety and security is very important at NASA. The Security Management and Safeguards Office goal is ensure safety and security for all NASA Lewis and Plum Brook Station visitors and workers. The office protects against theft, sabotage, malicious damage, espionage, and other threats or acts of violence. There are three types of security at NASA: physical, IT, and personnel. IT is concerned with sensitive and classified information and computers. Physical security includes the officers who check visitors and workers in and patrol the facility. Personnel security is concerned with background checks during hiring. During my internship, I met people from and gained knowledge about all three types of security. I primarily worked with Dr. Richard Soppet in physical security. During my experience with physical security, I observed and worked with many aspects of it. I attended various security meetings at both NASA Lewis and Plum Brook. The meetings were about homeland security and other improvements that will be made to both facilities. I also spent time with a locksmith. The locksmith makes copies of keys and unlocks doors for people who need them. I rode around in a security vehicle with an officer as he patrolled. I also observed the officer make a search of a visitor s vehicle. All visitors vehicles are searched upon entering NASA. I spent time and observed in the dispatch office. The officer answers calls and sends out officers when needed. The officer also monitors the security cameras. My primary task was completing an emergency response manual. This manual would assist local law enforcement and fire agencies in case of an emergency. The manual has pictures and descriptions of the buildings. It also contains the information about hazards inside of the buildings. This information will be very helpul to law enforcement so that when called upon during an emergency, they will not create an even bigger problem with collateral damage.

  7. Wnt5a suppresses inflammation-driven intervertebral disc degeneration via a TNF-α/NF-κB-Wnt5a negative-feedback loop.

    PubMed

    Li, Z; Zhang, K; Li, X; Pan, H; Li, S; Chen, F; Zhang, J; Zheng, Z; Wang, J; Liu, H

    2018-04-12

    This study was to investigate the molecular role of Wnt5a on inflammation-driven intervertebral disc degeneration (IVDD). The expression of Wnt5a was analyzed in human nucleus pulposus (NP) tissues with immunohistochemical staining. The effects of Wnt5a on matrix production were assessed by RT-qPCR and western blotting. Small interfering RNAs (siRNAs), promoter deletion assay, and promoter binding site mutant were used to reveal the molecular role of Wnt5a in TNF-α-induced matrix metalloproteinase (MMP) expression. The regulatory effects of TNF-α on Wnt5a were investigated with pharmachemical inhibitors and siRNA experiment. The expression of Wnt5a was elevated in moderately degenerated human NP tissue with similar expression pattern of TNF-α. In NP cells, Wnt5a significantly increased aggrecan and collagen II expression. Inhibition of JNK or interfering Sox9 gene expression significantly suppressed Wnt5a-induced matrix production. AP-1(JunB) binding sites were located in Sox9 promoter and mutation of these sites sabotaged Wnt5a-induced Sox9 up-regulation and subsequent matrix genes expression. Notably, Wnt5a, which was induced by TNF-α, on the other way round suppressed TNF-α-NF-κB (p65) signaling and subsequent MMPs expression. In vivo studies with MR imaging confirmed the protective role of Wnt5a in IVDD. Wnt5a, which can be induced by TNF-α, increased matrix production in a Sox9-dependent manner through the activation of JNK-AP1 (JunB) signaling, and antagonized TNF-α-induced up-regulation of MMPs through the inhibition of NF-κB signaling. It indicates that Wnt5a suppresses IVDD through a TNF-α/NF-κB-Wnt5a negative-feedback loop. Copyright © 2018 Osteoarthritis Research Society International. Published by Elsevier Ltd. All rights reserved.

  8. Insider Threat - Material Control and Accountability Mitigation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Powell, Danny H; Elwood Jr, Robert H; Roche, Charles T

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur bymore » an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system

  9. Artificial recharge of groundwater and its role in water management

    USGS Publications Warehouse

    Kimrey, J.O.

    1989-01-01

    This paper summarizes and discusses the various aspects and methods of artificial recharge with particular emphasis on its uses and potential role in water management in the Arabian Gulf region. Artificial recharge occurs when man's activities cause more water to enter an aquifer, either under pumping or non-pumping conditions, than otherwise would enter the aquifer. Use of artificial recharge can be a practical means of dealing with problems of overdraft of groundwater. Methods of artificial recharge may be grouped under two broad types: (a) water spreading techniques, and (b) well-injection techniques. Successful use of artificial recharge requires a thorough knowledge of the physical and chemical characteristics of the aquifier system, and extensive onsite experimentation and tailoring of the artificial-recharge technique to fit the local or areal conditions. In general, water spreading techniques are less expensive than well injection and large quantities of water can be handled. Water spreading can also result in significant improvement in quality of recharge waters during infiltration and movement through the unsaturated zone and the receiving aquifer. In comparison, well-injection techniques are often used for emplacement of fresh recharge water into saline aquifer zones to form a manageable lens of fresher water, which may later be partially withdrawn for use or continue to be maintained as a barrier against salt-water encroachment. A major advantage in use of groundwater is its availability, on demand to wells, from a natural storage reservoir that is relatively safe from pollution and from damage by sabotage or other hostile action. However, fresh groundwater occurs only in limited quantities in most of the Arabian Gulf region; also, it is heavily overdrafted in many areas, and receives very little natural recharge. Good use could be made of artificial recharge by well injection in replenishing and managing aquifers in strategic locations if sources of

  10. The Pavlovian power of palatable food: lessons for weight-loss adherence from a new rodent model of cue-induced overeating

    PubMed Central

    Boggiano, M M; Dorsey, J R; Thomas, J M; Murdaugh, D L

    2009-01-01

    Objective Relapsing to overeating is a stubborn problem in obesity treatment. We tested the hypothesis that context cues surrounding palatable food (PF) intake have the power to disrupt caloric regulation even of less PF. Context cues are non-food cues that are in the environment where PF is habitually eaten. Design Rats were conditioned to associate intake of Oreo cookies as the PF to cages with distinct context cues that differed from cues in cages were they were only given chow. PF naturally stimulated greater caloric intake. The rats were then tested in the PF cage with only chow available to determine if the PF-paired cues, alone, could elicit overeating of plain chow. Subjects Non food-deprived female Sprague-Dawley rats. Measurements Intake of plain chow under PF-paired cues vs. chow-paired cues was compared. This was also measured in tests that included a morsel of PF as a priming stimulus. We also controlled for any effect of binge-prone vs. binge–resistant status to predict cued-overeating. Results Rats consumed significantly more chow when exposed to context cues previously paired with PF than with chow (p<0.01). This effect occurred using various cues (e.g., different types of bedding or wallpaper). The effect was strengthened by priming with a morsel of PF (p<0.001) and was unaffected by baseline differences in propensity to binge on PF. Conclusion Context-cues associated with PF intake can drive overeating even of a less PF and abolish the ability of rats to compensate for the calories of a PF primer. Just as drug-associated context cues can reinstate drug-addiction relapse, PF-paired cues may trigger overeating relapses linked to weight regain and obesity. This model should help identify the reflex-like biology that sabotages attempts to adhere to healthy reduced calorie regimens and call greater attention to the cue-factor in the treatment of binge-eating and obesity. PMID:19350040

  11. Pipeline oil fire detection with MODIS active fire products

    NASA Astrophysics Data System (ADS)

    Ogungbuyi, M. G.; Martinez, P.; Eckardt, F. D.

    2017-12-01

    We investigate 85 129 MODIS satellite active fire events from 2007 to 2015 in the Niger Delta of Nigeria. The region is the oil base for Nigerian economy and the hub of oil exploration where oil facilities (i.e. flowlines, flow stations, trunklines, oil wells and oil fields) are domiciled, and from where crude oil and refined products are transported to different Nigerian locations through a network of pipeline systems. Pipeline and other oil facilities are consistently susceptible to oil leaks due to operational or maintenance error, and by acts of deliberate sabotage of the pipeline equipment which often result in explosions and fire outbreaks. We used ground oil spill reports obtained from the National Oil Spill Detection and Response Agency (NOSDRA) database (see www.oilspillmonitor.ng) to validate MODIS satellite data. NOSDRA database shows an estimate of 10 000 spill events from 2007 - 2015. The spill events were filtered to include largest spills by volume and events occurring only in the Niger Delta (i.e. 386 spills). By projecting both MODIS fire and spill as `input vector' layers with `Points' geometry, and the Nigerian pipeline networks as `from vector' layers with `LineString' geometry in a geographical information system, we extracted the nearest MODIS events (i.e. 2192) closed to the pipelines by 1000m distance in spatial vector analysis. The extraction process that defined the nearest distance to the pipelines is based on the global practices of the Right of Way (ROW) in pipeline management that earmarked 30m strip of land to the pipeline. The KML files of the extracted fires in a Google map validated their source origin to be from oil facilities. Land cover mapping confirmed fire anomalies. The aim of the study is to propose a near-real-time monitoring of spill events along pipeline routes using 250 m spatial resolution of MODIS active fire detection sensor when such spills are accompanied by fire events in the study location.

  12. Analyzing Risks and Vulnerabilities of Various Computer Systems and Undergoing Exploitation using Embedded Devices

    NASA Technical Reports Server (NTRS)

    Branch, Drew Alexander

    2014-01-01

    Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to communication among the military branches legionnaires. With advanced persistent threats (APTs) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated, patched and secured state in a launch control system environment. Attacks on critical systems are becoming more and more relevant and frequent. Nation states are hacking into critical networks that might control electrical power grids or water dams as well as carrying out advanced persistent threat (APTs) attacks on government entities. NASA, as an organization, must protect its self from attacks from all different types of attackers with different motives. Although the International Space Station was created, there is still competition between the different space programs. With that in mind, NASA might get attacked and breached for various reasons such as espionage or sabotage. My project will provide a way for NASA to complete an in house penetration test which includes: asset discovery, vulnerability scans, exploit vulnerabilities and also provide forensic information to harden systems. Completing penetration testing is a part of the compliance requirements of the Federal Information Security Act (FISMA) and NASA NPR 2810.1 and related NASA Handbooks. This project is to demonstrate how in house penetration testing can be conducted that will satisfy all of the compliance requirements of the National Institute of Standards and Technology (NIST), as outlined in FISMA. By the end of this project, I hope to have carried out the tasks stated

  13. Very High-Temperature Reactor (VHTR) Proliferation Resistance and Physical Protection (PR&PP)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moses, David Lewis

    2011-10-01

    This report documents the detailed background information that has been compiled to support the preparation of a much shorter white paper on the design features and fuel cycles of Very High-Temperature Reactors (VHTRs), including the proposed Next-Generation Nuclear Plant (NGNP), to identify the important proliferation resistance and physical protection (PR&PP) aspects of the proposed concepts. The shorter white paper derived from the information in this report was prepared for the Department of Energy Office of Nuclear Science and Technology for the Generation IV International Forum (GIF) VHTR Systems Steering Committee (SSC) as input to the GIF Proliferation Resistance and Physicalmore » Protection Working Group (PR&PPWG) (http://www.gen-4.org/Technology/horizontal/proliferation.htm). The short white paper was edited by the GIF VHTR SCC to address their concerns and thus may differ from the information presented in this supporting report. The GIF PR&PPWG will use the derived white paper based on this report along with other white papers on the six alternative Generation IV design concepts (http://www.gen-4.org/Technology/systems/index.htm) to employ an evaluation methodology that can be applied and will evolve from the earliest stages of design. This methodology will guide system designers, program policy makers, and external stakeholders in evaluating the response of each system, to determine each system's resistance to proliferation threats and robustness against sabotage and terrorism threats, and thereby guide future international cooperation on ensuring safeguards in the deployment of the Generation IV systems. The format and content of this report is that specified in a template prepared by the GIF PR&PPWG. Other than the level of detail, the key exception to the specified template format is the addition of Appendix C to document the history and status of coated-particle fuel reprocessing technologies, which fuel reprocessing technologies have yet to be

  14. The counterfeit anti-malarial is a crime against humanity: a systematic review of the scientific evidence.

    PubMed

    Karunamoorthi, Kaliyaperumal

    2014-06-02

    The counterfeiting of anti-malarials represents a form of attack on global public health in which fake and substandard anti-malarials serve as de facto weapons of mass destruction, particularly in resource-constrained endemic settings, where malaria causes nearly 660,000 preventable deaths and threatens millions of lives annually. It has been estimated that fake anti-malarials contribute to nearly 450,000 preventable deaths every year. This crime against humanity is often underestimated or ignored. This study attempts to describe and characterize the direct and indirect effects of counterfeit anti-malarials on public health, clinical care and socio-economic conditions. A search was performed using key databases, WHO documents, and English language search engines. Of 262 potential articles that were identified using a fixed set of criteria, a convenience sample of 105 appropriate articles was selected for this review. Artemisinin-based combination therapy (ACT) is an important tool in the fight against malaria, but a sizable number of patients are unable to afford to this first-line treatment. Consequently, patients tend to procure cheaper anti-malarials, which may be fake or substandard. Forensic palynology reveals that counterfeits originate in Asia. Fragile drug regulations, ineffective law-enforcement agencies and corruption further burden ailing healthcare facilities. Substandard/fake anti-malarials can cause (a) economic sabotage; (b) therapeutic failure; (c) increased risk of the emergence and spread of resistant strains of Plasmodium falciparum and Plasmodium vivax; (d) an undermining of trust/confidence in healthcare stakeholders/systems; and, (e) serious side effects or death. Combating counterfeit anti-malarials is a complex task due to limited resources and poor techniques for the detection and identification of fake anti-malarials. This situation calls for sustainable, global, scientific research and policy change. Further, responsible stakeholders in

  15. The counterfeit anti-malarial is a crime against humanity: a systematic review of the scientific evidence

    PubMed Central

    2014-01-01

    Background The counterfeiting of anti-malarials represents a form of attack on global public health in which fake and substandard anti-malarials serve as de facto weapons of mass destruction, particularly in resource-constrained endemic settings, where malaria causes nearly 660,000 preventable deaths and threatens millions of lives annually. It has been estimated that fake anti-malarials contribute to nearly 450,000 preventable deaths every year. This crime against humanity is often underestimated or ignored. This study attempts to describe and characterize the direct and indirect effects of counterfeit anti-malarials on public health, clinical care and socio-economic conditions. Methods A search was performed using key databases, WHO documents, and English language search engines. Of 262 potential articles that were identified using a fixed set of criteria, a convenience sample of 105 appropriate articles was selected for this review. Results Artemisinin-based combination therapy (ACT) is an important tool in the fight against malaria, but a sizable number of patients are unable to afford to this first-line treatment. Consequently, patients tend to procure cheaper anti-malarials, which may be fake or substandard. Forensic palynology reveals that counterfeits originate in Asia. Fragile drug regulations, ineffective law-enforcement agencies and corruption further burden ailing healthcare facilities. Substandard/fake anti-malarials can cause (a) economic sabotage; (b) therapeutic failure; (c) increased risk of the emergence and spread of resistant strains of Plasmodium falciparum and Plasmodium vivax; (d) an undermining of trust/confidence in healthcare stakeholders/systems; and, (e) serious side effects or death. Conclusion Combating counterfeit anti-malarials is a complex task due to limited resources and poor techniques for the detection and identification of fake anti-malarials. This situation calls for sustainable, global, scientific research and policy change

  16. 10 CFR Appendix A to Part 40 - Criteria Relating to the Operation of Uranium Mills and the Disposition of Tailings or Wastes...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... to be relied upon for seepage control, tests must be conducted with representative tailings solutions... itself. (6) The design requirements in this criterion for longevity and control of radon releases apply... licensee shall control, minimize, or eliminate post-closure escape of nonradiological hazardous...

  17. 10 CFR Appendix A to Part 40 - Criteria Relating to the Operation of Uranium Mills and the Disposition of Tailings or Wastes...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... to be relied upon for seepage control, tests must be conducted with representative tailings solutions... licensee shall control, minimize, or eliminate post-closure escape of nonradiological hazardous... beyond the control of the licensee. The phrase permits consideration of the cost of compliance only to...

  18. 10 CFR Appendix A to Part 40 - Criteria Relating to the Operation of Uranium Mills and the Disposition of Tailings or Wastes...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... itself. (6) The design requirements in this criterion for longevity and control of radon releases apply... radiological and nonradiological hazards associated with the sites, which is equivalent to, to the extent... “reasonably achievable” as equivalent terms. Decisions involved these terms will take into account the state...

  19. 10 CFR Appendix A to Part 40 - Criteria Relating to the Operation of Uranium Mills and the Disposition of Tailings or Wastes...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... relatively thin, in-situ clay soils are to be relied upon for seepage control, tests must be conducted with... itself. (6) The design requirements in this criterion for longevity and control of radon releases apply... licensee shall control, minimize, or eliminate post-closure escape of nonradiological hazardous...

  20. 78 FR 63506 - Exelon Generation Company, LLC; Peach Bottom Atomic Power Station, Units 2 and 3; Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-24

    ... Environs PBAPS consists of Units 1, 2, and 3 located on approximately 620 acres of land in Peach Bottom... proposed EPU are summarized below. Non-Radiological Impacts Land Use and Aesthetic Impacts Potential land... plant modifications. Therefore, land use conditions and visual aesthetics would not change significantly...

  1. 78 FR 46378 - La Crosse Boiling Water Reactor, Environmental Assessment and Finding of No Significant Impact...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-31

    ... impacts. The proposed action will involve no construction or major renovation of any buildings or... to potential non-radiological impacts, there will be no construction or renovation of buildings or... adequate protection of public health and safety and common defense and security.'' The licensee claims that...

  2. Critical Protection Item classification for a waste processing facility at Savannah River Site

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ades, M.J.; Garrett, R.J.

    1993-10-01

    This paper describes the methodology for Critical Protection Item (CPI) classification and its application to the Structures, Systems and Components (SSC) of a waste processing facility at the Savannah River Site (SRS). The WSRC methodology for CPI classification includes the evaluation of the radiological and non-radiological consequences resulting from postulated accidents at the waste processing facility and comparison of these consequences with allowable limits. The types of accidents considered include explosions and fire in the facility and postulated accidents due to natural phenomena, including earthquakes, tornadoes, and high velocity straight winds. The radiological analysis results indicate that CPIs are notmore » required at the waste processing facility to mitigate the consequences of radiological release. The non-radiological analysis, however, shows that the Waste Storage Tank (WST) and the dike spill containment structures around the formic acid tanks in the cold chemical feed area and waste treatment area of the facility should be identified as CPIs. Accident mitigation options are provided and discussed.« less

  3. Fourth report on the Oak Ridge National Laboratory Biological Monitoring and Abatement Program for White Oak Creek Watershed and the Clinch River

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Loar, J.M.

    1994-04-01

    In response to a condition of the National Pollutant Discharge Elimination System (NPDES) permit issued to Oak Ridge National Laboratory (ORNL) on April 1, 1986, a Biological Monitoring and Abatement Program (BMAP) was developed for White Oak Creek (WOC) and selected tributaries. BMAP currently consists of six major tasks that address both radiological and nonradiological contaminants in the aquatic and terrestrial environs on-site and the aquatic environs off-site. These tasks are (1) toxicity monitoring, (2) bioaccumulation monitoring of nonradiological contaminants in aquatic biota, (3) biological indicator studies, (4) instream ecological monitoring, (5) assessment of contaminants in the terrestrial environment, andmore » (6) radioecology of WOC and White Oak Lake. The ecological characterization of the WOC watershed will provide baseline data that can be used to document the ecological effects of the water pollution control program and the remedial action program. The long-term nature of BMAP ensures that the effectiveness of remedial measures will be properly evaluated.« less

  4. 76 FR 22928 - Nextera Energy Point Beach, LLC; Point Beach Nuclear Plant, Units 1 and 2; Environmental...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-25

    ... implementation. There would be no land use changes along transmission lines (no new lines would be required for...-term grid reliability and stability. Land use conditions would not change significantly PBNP, and there... result from the proposed EPU. Non-Radiological Impacts Land Use and Aesthetic Impacts Potential land use...

  5. Initial observations of electronic medical record usage during CT and MRI interpretation: Frequency of use and impact on workflow.

    PubMed

    Lin, Abraham; Harris, Mitchell; Zalis, Michael

    2010-07-01

    Electronic medical record (EMR) systems permit integration of contextual nonimaging EMR data into examination interpretation; however, the extra effort required to search and review these nonradiologic data are not well characterized. We assessed the gross frequency and pattern of EMR usage in the interpretation of diagnostic CT and MRI examinations. We defined nonradiologic EMR data as laboratory data, nonimaging specialty report, clinical note, and administrative data not available on PACS. For abdominal, neuroradiologic, and musculoskeletal CT and MRI, we prospectively recorded the time required for image analysis (including prior imaging studies and their reports), nonradiologic EMR use, and initial report drafting by fellows and staff in randomized sessions. We assessed EMR use as a fraction of work activity and according to technique, subspecialty, inpatient status, and radiologist experience. We observed 372 CT and MRI interpretations by 33 radiologists. For CT, radiologists used the EMR in 34% of abdominal, 57% of neuroradiologic, and 38% of musculoskeletal interpretations. For MRI, EMR was used in 73% of abdominal, 56% of neuroradiologic, and 33% of musculoskeletal interpretations. For CT, EMR usage comprised 18%, 14%, and 18% of diagnostic effort (image analysis plus EMR use) for abdominal, neuroradiologic, and musculoskeletal interpretations, respectively; for MRI, EMR usage comprised 21%, 16%, and 15% of diagnostic effort for abdominal, neuroradiologic, and musculoskeletal interpretations, respectively. Frequency of EMR use was significantly greater for neuroradiology CT and abdominal MRI (p < 0.05, Fisher's test). EMR usage was not consistently related to inpatient status for CT or radiologist experience. For CT and MRI interpretation, EMR usage is frequent and comprises a significant fraction of diagnostic effort.

  6. 10 CFR 150.31 - Requirements for Agreement State regulation of byproduct material.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... include: (A) An assessment of the radiological and nonradiological impacts to the public health of the activities to be conducted pursuant to such licenses; (B) An assessment of any impact on any waterway and... Agreement State for the protection of the public health, safety, and the environment from hazards associated...

  7. 10 CFR 150.31 - Requirements for Agreement State regulation of byproduct material.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... include: (A) An assessment of the radiological and nonradiological impacts to the public health of the activities to be conducted pursuant to such licenses; (B) An assessment of any impact on any waterway and... Agreement State for the protection of the public health, safety, and the environment from hazards associated...

  8. 10 CFR 150.31 - Requirements for Agreement State regulation of byproduct material.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... include: (A) An assessment of the radiological and nonradiological impacts to the public health of the activities to be conducted pursuant to such licenses; (B) An assessment of any impact on any waterway and... Agreement State for the protection of the public health, safety, and the environment from hazards associated...

  9. 10 CFR 150.31 - Requirements for Agreement State regulation of byproduct material.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... include: (A) An assessment of the radiological and nonradiological impacts to the public health of the activities to be conducted pursuant to such licenses; (B) An assessment of any impact on any waterway and... Agreement State for the protection of the public health, safety, and the environment from hazards associated...

  10. 75 FR 77010 - Nextera Energy Point Beach, LLC; Point Beach Nuclear Plant, Units 1 and 2, Draft Environmental...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-10

    .... Approximately 1,050 acres (425 hectares) are used for agriculture, and the remaining land is a mixture of woods... radiological impacts in the environment that may result from the proposed EPU. Non-Radiological Impacts Land Use and Aesthetic Impacts Potential land use and aesthetic impacts from the proposed EPU include...

  11. Environmental Monitoring at the Savannah River Plant, Annual Report - 1981

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ashley, C.

    2001-07-26

    An environmental monitoring program has been in existence at SRP since 1951. The original preoperational surveys have evolved into an extensive environmental monitoring program in which sample types from approximately 500 locations are analyzed for radiological and/or nonradiological parameters. The results of these analyses for 1981 are presented in this report.

  12. Non-invasive, non-radiological quantification of anteroposterior knee joint ligamentous laxity

    PubMed Central

    Russell, D. F.; Deakin, A. H.; Fogg, Q. A.; Picard, F.

    2013-01-01

    Objectives We performed in vitro validation of a non-invasive skin-mounted system that could allow quantification of anteroposterior (AP) laxity in the outpatient setting. Methods A total of 12 cadaveric lower limbs were tested with a commercial image-free navigation system using trackers secured by bone screws. We then tested a non-invasive fabric-strap system. The lower limb was secured at 10° intervals from 0° to 60° of knee flexion and 100 N of force was applied perpendicular to the tibia. Acceptable coefficient of repeatability (CR) and limits of agreement (LOA) of 3 mm were set based on diagnostic criteria for anterior cruciate ligament (ACL) insufficiency. Results Reliability and precision within the individual invasive and non-invasive systems was acceptable throughout the range of flexion tested (intra-class correlation coefficient 0.88, CR 1.6 mm). Agreement between the two systems was acceptable measuring AP laxity between full extension and 40° knee flexion (LOA 2.9 mm). Beyond 40° of flexion, agreement between the systems was unacceptable (LOA > 3 mm). Conclusions These results indicate that from full knee extension to 40° flexion, non-invasive navigation-based quantification of AP tibial translation is as accurate as the standard validated commercial system, particularly in the clinically and functionally important range of 20° to 30° knee flexion. This could be useful in diagnosis and post-operative evaluation of ACL pathology. Cite this article: Bone Joint Res 2013;2:233–7. PMID:24184443

  13. First annual report on the Biological Monitoring and Abatement Program at Oak Ridge National Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Loar, J. M.; Adams, S. M.; Blaylock, B. G.

    1992-08-01

    As a condition of the National Pollutant Discharge Elimination System (NPDES) permit issued to Oak Ridge National Laboratory (ORNL) on April 1, 1986, a Biological Monitoring and Abatement Program (BMAP) was developed for White Oak Creek (WOC); selected tributaries of WOC, including Fifth Creek, First Creek, Melton Branch, and Northwest Tributary; and the Clinch River. BMAP consists of seven major tasks that address both radiological and nonradiological contaminants in the aquatic and terrestrial environs on-site and the aquatic environs off-site. These tasks are (1) toxicity monitoring; (2) bioaccumulation monitoring of nonradiological contaminants in aquatic biota; (3) biological indicator studies; (4)more » instream ecological monitoring; (5) assessment of contaminants in the terrestrial environment; (6) radioecology of WOC and White Oak Lake (WOL); and (7) contaminant transport, distribution, and fate in the WOC embayment-Clinch River-Watts Bar Reservoir system. This document, the first of a series of annual reports presenting the results of BMAP, describes studies that were conducted from March through December 1986.« less

  14. Effects of Oil Spillage on Vegetation, Land and Water Odu-Gboro Sagamu, Ogun State, South-Western Nigeria) Using Remote Sensing and GIS Techniques.

    NASA Astrophysics Data System (ADS)

    Oseni, O.

    2016-12-01

    This paper explores the impacts of oil spill on the physical environment with particular attention paid to the NNPC/PPMC pipeline system. It focuses on the environmental impacts of oil pollution in Nigeria, and discusses the increasing environmental contradictions of the area, and its influence on global warming. Nigeria's economy is highly dependent on earnings from the oil sector, which provides 20% of GDP, 95% of foreign exchange earnings, and about 65% of budgetary revenues. Since the discovery of oil in Nigeria in 1956, the country has been suffering the negative environmental consequences of oil exploration and exploitation. Between 1976 and 1996 a total of 4647 incidents resulted in the spill of approximately 2,369,470 barrels of oil into the environment. The study traces the effects of the oil spillage on the environment to determine whether oil spill is a major factor responsible for environmental pollution. By the use of remotely sensed data and other ancillary data, the major causes of oil spill in the region were identified; the presence of total petroleum hydrocarbon (TPH) in the environment, and it also determined the environmental impacts on land and water. Field observation and laboratory analysis of soil and water were used. Gas chromatography was used to determine the TPH concentration in soil extract and water extracts. Liquid-liquid extraction method was used for water and spectro-radiometer which is a very efficient process commonly used to determine spectral signature of various soil, water and plant samples obtained from the study area. Based largely on the GIS analysis, the findings showed that the main cause of oil spill is vandalism along the pipeline right of way; Vandalism which is an act of sabotage had the highest percentage compared to equipment failure, accident from oil tankers and accidental discharge during pipeline repairs. TPH were present at the site with soil samples having the high values, and the environmental impact on soil

  15. Associations between Intimate Partner Violence and Termination of Pregnancy: A Systematic Review and Meta-Analysis

    PubMed Central

    Hall, Megan; Chappell, Lucy C.; Parnell, Bethany L.; Seed, Paul T.; Bewley, Susan

    2014-01-01

    Background Intimate partner violence (IPV) and termination of pregnancy (TOP) are global health concerns, but their interaction is undetermined. The aim of this study was to determine whether there is an association between IPV and TOP. Methods and Findings A systematic review based on a search of Medline, Embase, PsycINFO, and Ovid Maternity and Infant Care from each database's inception to 21 September 2013 for peer-reviewed articles of any design and language found 74 studies regarding women who had undergone TOP and had experienced at least one domain (physical, sexual, or emotional) of IPV. Prevalence of IPV and association between IPV and TOP were meta-analysed. Sample sizes ranged from eight to 33,385 participants. Worldwide, rates of IPV in the preceding year in women undergoing TOP ranged from 2.5% to 30%. Lifetime prevalence by meta-analysis was shown to be 24.9% (95% CI 19.9% to 30.6%); heterogeneity was high (I 2>90%), and variation was not explained by study design, quality, or size, or country gross national income per capita. IPV, including history of rape, sexual assault, contraceptive sabotage, and coerced decision-making, was associated with TOP, and with repeat TOPs. By meta-analysis, partner not knowing about the TOP was shown to be significantly associated with IPV (pooled odds ratio 2.97, 95% CI 2.39 to 3.69). Women in violent relationships were more likely to have concealed the TOP from their partner than those who were not. Demographic factors including age, ethnicity, education, marital status, income, employment, and drug and alcohol use showed no strong or consistent mediating effect. Few long-term outcomes were studied. Women welcomed the opportunity to disclose IPV and be offered help. Limitations include study heterogeneity, potential underreporting of both IPV and TOP in primary data sources, and inherent difficulties in validation. Conclusions IPV is associated with TOP. Novel public health approaches are required to prevent IPV. TOP

  16. Effects Of Oil Spillage On Vegetation, Land And Water(Odu-Gboro, Sagamu,Ogun State, South-Western, Nigeria) Using Remote Sensing And Gis Techniques

    NASA Astrophysics Data System (ADS)

    Oseni, O.

    2017-12-01

    This paper explores the impacts of oil spill on the physical environment (soil, water and plants) with particular attention paid to the NNPC/PPMC pipeline system. It focuses on the environmental impacts of oil pollution in Nigeria, and discusses the increasing environmental contradictions of the area, and its influence on global warming. The discovery of oil in Nigeria in 1956, the country has been suffering the negative environmental consequences of oil exploration and exploitation. Between 1976 and 1996 a total of 4647 incidents resulted in the spill of approximately 2,369,470 barrels of oil into the environment. In addition, between 1997 and 2001, Nigeria also recorded a total number of 2,097 oil spill incidents. The study traces the effects of the oil spillage on the environment in order to determine whether oil spill is a major factor responsible for environmental pollution. By the use of remotely sensed data and other ancillary data, it identified the major causes of oil spill in the region; the presence of total petroleum hydrocarbon (TPH) in the environment, and it also determined the environmental impacts on land and water. Personal interview, field observation and laboratory analysis of soil and water were used. Gas chromatography was used to determine the TPH concentration in soil extract and water extracts. Liquid-liquid extraction method was used for water and spectro-radiometer which is a very efficient process commonly used to determine spectral signature of various soil, water and plant samples obtained from the study area.Values of analyzed soil and water samples in the oil impacted area were compared to the control area (region with no spill). Based largely onthe GISanalysis, the findings showed that the main cause of oil spill is vandalism along the pipeline right of way; Vandalism which is an act of sabotage had the highest percentage compared to equipment failure, accident from oil tankers and accidental discharge during pipeline repairs

  17. Air Emission Inventory for the Idaho National Engineering and Environmental Laboratory - Calendar Year 1998 Emissions Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    S. K. Zohner

    1999-10-01

    This report presents the 1998 calendar year update of the Air Emission Inventory for the Idaho National Engineering and Environmental Laboratory (INEEL). The INEEL Air Emission Inventory documents sources and emissions of nonradionuclide pollutants from operations at the INEEL. The report describes the emission inventory process and all of the sources at the INEEL, and provides nonradiological emissions estimates for stationary sources.

  18. An assessment of drinking-water supplies on the Hanford site: an evaluation conducted at a federal nuclear facility in southeastern Washington state.

    PubMed

    Hanf, R William; Kelly, Lynn M

    2005-03-01

    Drinking water is supplied to most U.S. Department of Energy (DOE) facilities on the Hanford Site by DOE-owned, contractor-operated pumping and distribution systems. Water is primarily obtained from the Columbia River, but some facilities use water from on-site groundwater wells. Because of the large amount of radioactive and chemical waste produced, stored, and disposed of at Hanford, some people are concerned that waste materials are contaminating on-site drinking-water supplies. This paper describes the drinking-water facilities and treatment requirements on the Hanford Site and summarizes radiological and non-radiological water quality data obtained from water samples collected from each drinking-water system in use during 2001 and 2002. Monitoring data show that Hanford-produced radionuclides are measurable in some drinking-water samples. The only non-radiological contaminants detected either were by-products of the chlorination process or came from off-site agricultural activities. Contaminant level values were, in all cases, below state and federal drinking-water limits. This information will provide assurance to current employees and future site developers that drinking water on the Hanford Site is safe for public consumption.

  19. Guidelines for Posting Soil Contamination Areas

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mcnaughton, Michael; Eisele, William

    All soil guidelines were determined using RESRAD, version 6.1. All offsite guidelines are based on 15 mrem/year. This dose rate is sufficiently low to protect human health and is in accordance with DOE guidance and the proposed EPA 40-CFR-196 regulations for members of the public (never promulgated). For those onsite areas where general employees (non-radiological workers) could have routine access, soil concentrations should be based on a dose rate of 30 mrem/year (approximately one-third of the onsite LANL non-radiological worker dose of 100 mrem/year). In this case, soil concentration guidelines may be obtained by doubling the 15 mrem/year guidelines. Severalmore » scenarios were developed to provide maximum flexibility for application of the guidelines. The offsite guidelines were developed using: residential scenarios for both adults and children; a construction worker scenario; a resource user (e.g., a hunter) scenario; a child playing within canyon reaches scenario, a trail using jogger within canyon reaches scenario, and a trail using hiker within canyon reaches scenario. The residential guidelines represent the lowest values from both the adult residential scenario and the child residential scenario.« less

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Loar, J.M.; Adams, S.M.; Bailey, R.D.

    As a condition of the National Pollutant Discharge Elimination System (NPDES) permit issued to Oak Ridge National Laboratory (ORNL) on April 1, 1985, a Biological Monitoring and Abatement Program (BMAP) was developed for White Oak Creek (WOC); selected tributaries of WOC, including Fifth Creek, First Creek, Melton Branch, and Northwest Tributary; and the Clinch River. The BMAP currently consists of six major tasks that address both radiological and nonradiological contaminants in the aquatic and terrestrial environs at ORNL. These are (1) toxicity monitoring, (2) bioaccumulation monitoring of nonradiological contaminants in aquatic biota, (3) biological indicator studies, (4) instream ecological monitoring,more » (5) assessment of contaminants in the terrestrial environment, and (6) radioecology of WOC and White Oak Lake (WOL). The investigation of contaminant transport, distribution, and fate in the WOC embayment-Clinch River-Watts Bar Reservoir system was originally a task of the BMAP but, in 1988, was incorporated into the Resource Conservation and Recovery Act Facility Investigation for the Clinch River, a separate study to assess offsite contamination from all three Department of Energy facilities in Oak Ridge.« less

  1. Final EIS for the Proposed Homeporting of Additional Surface Ships at Naval Station, Mayport, FL. Volume 1. Final Environmental Impact Statement

    DTIC Science & Technology

    2008-11-21

    to air squadrons. 4. USS John F. Kennedy was decommissioned in 2007. Source: Adapted from DoN 2006a Final EIS for the Proposed Homeporting of...Tugs Slot Small Craft 650 35 YD/YC/LCM Source: Adapted from Naval Facilities Engineering Service Center 2002 MCM = Mine Countermeasures DDG...It would include nonradiologically controlled spaces for administrative and other support functions. The design would be a site- adapted replication of

  2. Waste Isolation Pilot Plant site environmental report, for calendar year 1995

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    The U.S. Department of Energy (DOE) Order 5400.1 General Environmental Protection Program, requires DOE facilities, that conduct environmental protection programs, to annually prepare a Site Environmental Report (SER). The purpose of the SER is to provide an abstract of environmental assessments conducted in order to characterize site environmental management performance, to confirm compliance with environmental standards and requirements, and to highlight significant programs and efforts of environmental merit. The content of this SER is not restricted to a synopsis of the required data, in addition, information pertaining to new and continued monitoring and compliance activities during the 1995 calendar yearmore » are also included. Data contained in this report are derived from those monitoring programs directed by the Waste Isolation Pilot Plant (WIPP) Environmental Monitoring Plan (EMP). The EMP provides inclusive guidelines implemented to detect potential impacts to the environment and to establish baseline measurements for future environmental evaluations. Surface water, groundwater. air, soil, and biotic matrices are monitored for an array of radiological and nonradiological factors. The baseline radiological surveillance program encompasses a broader geographic area that includes nearby ranches, villages, and cities. Most elements of nonradiological assessments are conducted within the geographic vicinity of the WIPP site.« less

  3. Clinical challenges associated with incorporation of nonradiology images into the electronic medical record

    NASA Astrophysics Data System (ADS)

    Siegel, Eliot L.; Reiner, Bruce I.

    2001-08-01

    To date, the majority of Picture Archival and Communication Systems (PACS) have been utilized only for capture, storage, and display of radiology and in some cases, nuclear medicine images. Medical images for other subspecialty areas are currently stored in local, independent systems, which typically are not accessible throughout the healthcare enterprise and do not communicate with other hospital information or image management systems. It is likely that during the next few years, healthcare centers will expand PAC system capability to incorporate these multimedia data or alternatively, hospital-wide electronic patient record systems will be able to provide this function.

  4. BCLDP site environmental report for calendar year 1997 on radiological and nonradiological parameters

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fry, J.

    1998-09-30

    Battelle Memorial Institute currently maintains its retired nuclear research facilities in a surveillance and maintenance (S and M) mode and continues decontamination and decommissioning (D and D) activities. The activities are referred to as the Battelle Columbus Laboratories Decommissioning Project (BCLDP). Operations reference in this report are performed in support of S and M and D and D activities. The majority of this report is devoted to discussion of the West Jefferson facility, because the source term at this facility is larger than the source term at Battelle`s King Avenue site. The contamination found at the King Avenue site consistsmore » of small amounts of residual radioactive material in solid form, which has become embedded or captured in nearby surfaces such as walls, floors, ceilings, drains, laboratory equipment, and soils. By the end of calendar year (CY) 1997, most remediation activities were completed at the King Avenue site. The contamination found at the West Jefferson site is the result of research and development activities with irradiated materials. During CY 1997, multiple tests at the West Jefferson Nuclear Sciences Area found no isotopes present above the minimum detectable activity (MDA) for air releases or for liquid discharges to Big Darby Creek. Data obtained from downstream sampling locations were statistically indistinguishable from background levels.« less

  5. Mineralogical conversion of asbestos containing materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pulsford, S.K.; Foltz, A.D.; Ek, R.B.

    The principal objective of the Technical Task Plan (TTP) is to demonstrate a thermal-chemical mineralogical asbestos conversion unit at the Hanford Site, which converts non-radiological asbestos containing materials (ACMs) into an asbestos-free material. The permanent thermal-chemical mineralogical conversion of ACMs to a non-toxic, non-hazardous, potentially marketable end product should not only significantly reduce the waste stream volumes but terminate the {open_quotes}cradle to grave{close_quotes} ownership liabilities.

  6. Material Control and Accounting Design Considerations for High-Temperature Gas Reactors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Trond Bjornard; John Hockert

    summarized in this report, namely the development of guidance to support the consideration of MC&A in the design of both pebble-bed and prismatic-fueled HTGRs. The objective is to identify and incorporate design features into the facility design that will cost effectively aid in making MC&A more effective and efficient, with minimum impact on operations. The theft of nuclear material is addressed through both MC&A and physical protection, while the threat of sabotage is addressed principally through physical protection.« less

  7. Evaluation of experimental UAV video change detection

    NASA Astrophysics Data System (ADS)

    Bartelsen, J.; Saur, G.; Teutsch, C.

    2016-10-01

    During the last ten years, the availability of images acquired from unmanned aerial vehicles (UAVs) has been continuously increasing due to the improvements and economic success of flight and sensor systems. From our point of view, reliable and automatic image-based change detection may contribute to overcoming several challenging problems in military reconnaissance, civil security, and disaster management. Changes within a scene can be caused by functional activities, i.e., footprints or skid marks, excavations, or humidity penetration; these might be recognizable in aerial images, but are almost overlooked when change detection is executed manually. With respect to the circumstances, these kinds of changes may be an indication of sabotage, terroristic activity, or threatening natural disasters. Although image-based change detection is possible from both ground and aerial perspectives, in this paper we primarily address the latter. We have applied an extended approach to change detection as described by Saur and Kruger,1 and Saur et al.2 and have built upon the ideas of Saur and Bartelsen.3 The commercial simulation environment Virtual Battle Space 3 (VBS3) is used to simulate aerial "before" and "after" image acquisition concerning flight path, weather conditions and objects within the scene and to obtain synthetic videos. Video frames, which depict the same part of the scene, including "before" and "after" changes and not necessarily from the same perspective, are registered pixel-wise against each other by a photogrammetric concept, which is based on a homography. The pixel-wise registration is used to apply an automatic difference analysis, which, to a limited extent, is able to suppress typical errors caused by imprecise frame registration, sensor noise, vegetation and especially parallax effects. The primary concern of this paper is to seriously evaluate the possibilities and limitations of our current approach for image-based change detection with respect

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Butler, Nicholas; McCaw, Erica E.; Wright, Kyle A.

    The Global Threat Reduction Initiative (GTRI) reduces and protects vulnerable nuclear and radiological material located at civilian sites worldwide from sabotage, theft or diversion. The GTRI has worked successfully with foreign countries to remove and protect nuclear and radioactive materials including high-activity sources used in medical, commercial, and research applications. There are many barriers to successful bilateral cooperation that must be overcome including language, preconceived perceptions, long distances, and different views on the threat and protection requirements. Successful cooperation is often based on relationships and building trusting relationships takes time. In the case of Dominican Republic, the GTRI first receivedmore » contact in 2008 from the Government of Dominican Republic. They requested cooperation that was similar to the tri-partite cooperation between Colombia, Mexico and the United States. Throughout the region it was widely known that the GTRI’s cooperation with the Government of Colombia was a resounding success resulting in the securing of forty sites; the consolidation of numerous disused/orphan sources at a secure national storage facility; and, the development of a comprehensive approach to security including, inter alia, training and sustainability. The Government of Colombia also showcased this comprehensive approach to thirteen Central American and Caribbean countries at a GTRI regional security conference held in Panama in October 2004. In 2007, Colombia was an integral component of GTRI multi-lateral cooperation initiation in Mexico. As a result, twenty two of Mexico’s largest radioactive sites have been upgraded in the past eighteen months. These two endeavors served as catalysts for cooperation opportunities in the Dominican Republic. Representatives from the Colombian government were aware of GTRI’s interest in initiating cooperation with the Government of Dominican Republic and to facilitate this

  9. [The career of the psychiatrist Dietfried Müller-Hegemann (1910-1989) : Example of a politically motivated rise and fall in the German Democratic Republic].

    PubMed

    Steinberg, H

    2018-01-01

    Dietfried Müller-Hegemann was one of the prominent figures in East German psychiatry and psychotherapy of the 1950s and 1960s. Having been a communist prior to 1933, a resistance fighter during the National Socialist regime and having gone through political training during his exile in Soviet Russia, he proved to be a committed member of the new ruling SED socialist party in Eastern Germany. As such both governmental and party organs regarded him as a promising and reliable party member to be supported and implemented as executive staff within the new, socialist scientific system. Also, due to the fact that he supported the Pavlovian school of thought for modern psychiatry, Müller-Hegemann was installed as the new head of the Department of Neurology and Psychiatry at Leipzig University by the state secretary for higher education, notably against the clear opposition of the university medical faculty. Soon thereafter however Müller-Hegemann fell from favor due to the fact that he supported views that did not follow the strict ideological guidelines, e. g. with regard to the emergence of fascism. Moreover, he strongly opposed the separation of neurology from psychiatry as ruled by the ministry. An attempt in 1963 by junior party members and ministerial staff to remove him from office failed, but still managed to make Müller-Hegemann resign from his Leipzig post and take over that of director of the Griesinger hospital for the mentally ill in East Berlin. In May 1971, after new conflicts with party officials, he did not return from a business trip to Essen in West Germany. This study does not review the scientific and medical merits of Müller-Hegemann, but concentrates on how his career as a leading psychiatrist was manipulated, both supported and sabotaged, and ideologically controlled by the German Democratic Republic (GDR) system. His development is documented proof that party officials did not tolerate opposition, neither in ideological nor in

  10. Best Practices for the Security of Radioactive Materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studiesmore » suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices

  11. Short-term emergency response planning and risk assessment via an integrated modeling system for nuclear power plants in complex terrain

    NASA Astrophysics Data System (ADS)

    Chang, Ni-Bin; Weng, Yu-Chi

    2013-03-01

    Short-term predictions of potential impacts from accidental release of various radionuclides at nuclear power plants are acutely needed, especially after the Fukushima accident in Japan. An integrated modeling system that provides expert services to assess the consequences of accidental or intentional releases of radioactive materials to the atmosphere has received wide attention. These scenarios can be initiated either by accident due to human, software, or mechanical failures, or from intentional acts such as sabotage and radiological dispersal devices. Stringent action might be required just minutes after the occurrence of accidental or intentional release. To fulfill the basic functions of emergency preparedness and response systems, previous studies seldom consider the suitability of air pollutant dispersion models or the connectivity between source term, dispersion, and exposure assessment models in a holistic context for decision support. Therefore, the Gaussian plume and puff models, which are only suitable for illustrating neutral air pollutants in flat terrain conditional to limited meteorological situations, are frequently used to predict the impact from accidental release of industrial sources. In situations with complex terrain or special meteorological conditions, the proposing emergency response actions might be questionable and even intractable to decisionmakers responsible for maintaining public health and environmental quality. This study is a preliminary effort to integrate the source term, dispersion, and exposure assessment models into a Spatial Decision Support System (SDSS) to tackle the complex issues for short-term emergency response planning and risk assessment at nuclear power plants. Through a series model screening procedures, we found that the diagnostic (objective) wind field model with the aid of sufficient on-site meteorological monitoring data was the most applicable model to promptly address the trend of local wind field patterns

  12. Liquid and Gaseous Waste Operations Department annual operating report CY 1996

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Maddox, J.J.; Scott, C.B.

    1997-03-01

    This annual report summarizes operating activities dealing with the process waste system, the liquid low-level waste system, and the gaseous waste system. It also describes upgrade activities dealing with the process and liquid low-level waste systems, the cathodic protection system, a stack ventilation system, and configuration control. Maintenance activities are described dealing with nonradiological wastewater treatment plant, process waste treatment plant and collection system, liquid low-level waste system, and gaseous waste system. Miscellaneous activities include training, audits/reviews/tours, and environmental restoration support.

  13. Nevada Test Site Environmental Report 2007

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cathy Wills

    2008-09-01

    The Nevada Test Site Environmental Report 2007 (NTSER) was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec). This Executive Summary presents the purpose of the document, the major programs conducted at the Nevada Test Site (NTS), NTS key environmental initiatives, radiological releases and potential doses to the public resulting from site operations, a summary of nonradiological releases, implementation status of the NTS Environmental Management System, a summary of compliance with environmental regulations, pollutionmore » prevention and waste minimization accomplishments, and significant environmental accomplishments. Much of the content of this Executive Summary is also presented in a separate stand-alone pamphlet titled Nevada Test Site Environmental Report Summary 2007. This NTSER was prepared to satisfy DOE Order 231.1A, Environment, Safety and Health Reporting. Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NTS Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This report meets these objectives for the NTS and three offsite Nevada facilities mentioned in this report.« less

  14. Student Summary of the U.S. Department of Energy Portsmouth Annual Site Environmental Report (ASER) for 2014

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alexander, Cameryn; Harris, Quincy; Pyle, Caitlin

    The purpose of the full ASER document is to provide details of environmental activities, primarily environmental monitoring, for calendar year 2014. This summary report of the full 2014 ASER provides details in which DOE demonstrates compliance with local, state and federal regulations within environmental programs - both radiological and non-radiological monitoring and groundwater monitoring (DOE, 2016). This report is not intended to present all of the monitoring activities at PORTS and more information can be found at the PORTS Environmental Information Center and website, which is http://energy.gov/pppo/portsmouth-environmental-center.

  15. Low-level radioactive waste disposal. Study of a conceptual nuclear energy center at Green River, Utah

    NASA Astrophysics Data System (ADS)

    Card, D. H.; Hunter, P. H.; Barg, D.; Desouza, F.; Felthauser, K.; Winkler, V.; White, R.

    1982-02-01

    The ramifications of constructing a nuclear energy center in an arid western region were studied. The alternatives for disposing of the low level waste on the site are compared with the alternative of transporting the waste to the nearest commercial waste disposal site for permanent disposal. Both radiological and nonradiological impacts on the local socioeconomic infrastructure and the environment are considered. Disposal on the site was found to cost considerably less than off site disposal with only negligible impacts associated with the disposal option on either mankind or the environment.

  16. The Storage, Transportation, and Disposal of Nuclear Waste

    NASA Astrophysics Data System (ADS)

    Younker, J. L.

    2002-12-01

    The U.S. Congress established a comprehensive federal policy to dispose of wastes from nuclear reactors and defense facilities, centered on deep geologic disposal of high-level radioactive waste. Site screening led to selection of three potential sites and in 1987, Congress directed the Secretary of Energy to characterize only one site: Yucca Mountain in Nevada. For more than 20 years, teams of scientists and engineers have been evaluating the potential suitability of the site. On the basis of their work, the U.S. Secretary of Energy, Spencer Abraham, concluded in February 2002 that a safe repository can be sited at Yucca Mountain. On July 23, 2002, President Bush signed Joint Resolution 87 approving the site at Yucca Mountain for development of a repository, which allows the U.S. Department of Energy (DOE) to prepare and submit a license application to the U.S. Nuclear Regulatory Commission (NRC). Concerns have been raised relative to the safe transportation of nuclear materials. The U.S. history of transportation of nuclear materials demonstrates that high-level nuclear materials can be safely transported. Since the 1960s, over 1.6 million miles have been traveled by more than 2,700 spent nuclear fuel shipments, and there has never been an accident severe enough to cause a release of radioactive materials. The DOE will use NRC-certified casks that must be able to withstand very stringent tests. The same design features that allow the casks to survive severe accidents also limit their vulnerability to sabotage. In addition, the NRC will approve all shipping routes and security plans. With regard to long-term safety, the Yucca Mountain disposal system has five key attributes. First, the arid climate and geology of Yucca Mountain combine to ensure that limited water will enter the emplacement tunnels. Second, the DOE has designed a waste package and drip shield that are expected to have very long lifetimes in the repository environment. Third, waste form

  17. Procrastination and Self-Efficacy Among Intravenous Drug Users on a Methadone Maintenance Program in Sari City, Iran, 2013.

    PubMed

    Taghizadeh, Fatemeh; Yazdani Cherati, Jamshid

    2015-12-01

    Self-efficacy is the belief that one has the ability to implement the behaviors needed to produce a desired effect. There has been growing interest in the role of self-efficacy as a predictor and/or mediator of treatment outcome in a number of domains. Procrastination is a self-regulatory failure, defined as the voluntary delay of an intended course of action despite expecting to be worse off for the delay. Behavioral procrastination is a self-sabotage strategy that allows people to shift blame and avoid action; the decisional procrastination strategy is to put off making a decision when dealing with conflicts or choices. Procrastination has a great role in quitting drug addiction. The aim of this study was to determine the relationship between procrastination and self-efficacy and other factors among intravenous drug users. This cross-sectional study was conducted on 178 intravenous drug users in the behavioral disease counseling, health center in Sari city, Mazandaran province, Iran, in 2013. The samples were selected through census sampling, descriptive and inferential statistics were used to measure the properties of distribution that depicts a set of data shown as frequency distribution tables, while for the mean and standard deviation, chi-square, Fisher and Spearman-Brown coefficients were used to analyze the data. The mean age of the participants was 43 years. Seventy-two percent of them were married and opium was the first drug used. The first substance used in them was 54% of opium, 33% cannabis and 5% alcohol and 79% smoking. The reason of the first drug use in 32% of the subjects was temptation and in 10% a friend's influence. The mean age of the first drug use was 23 years, and the frequency was 2 times per day. All of them had relapse at least once. Seven percent of them currently use other materials (2% crystal, 5% alcohol and opium and crack) both in methadone treatment. Behavioral procrastination in 60.5% of them and decisional procrastination in

  18. Computer loss experience and predictions

    NASA Astrophysics Data System (ADS)

    Parker, Donn B.

    1996-03-01

    The types of losses organizations must anticipate have become more difficult to predict because of the eclectic nature of computers and the data communications and the decrease in news media reporting of computer-related losses as they become commonplace. Total business crime is conjectured to be decreasing in frequency and increasing in loss per case as a result of increasing computer use. Computer crimes are probably increasing, however, as their share of the decreasing business crime rate grows. Ultimately all business crime will involve computers in some way, and we could see a decline of both together. The important information security measures in high-loss business crime generally concern controls over authorized people engaged in unauthorized activities. Such controls include authentication of users, analysis of detailed audit records, unannounced audits, segregation of development and production systems and duties, shielding the viewing of screens, and security awareness and motivation controls in high-value transaction areas. Computer crimes that involve highly publicized intriguing computer misuse methods, such as privacy violations, radio frequency emanations eavesdropping, and computer viruses, have been reported in waves that periodically have saturated the news media during the past 20 years. We must be able to anticipate such highly publicized crimes and reduce the impact and embarrassment they cause. On the basis of our most recent experience, I propose nine new types of computer crime to be aware of: computer larceny (theft and burglary of small computers), automated hacking (use of computer programs to intrude), electronic data interchange fraud (business transaction fraud), Trojan bomb extortion and sabotage (code security inserted into others' systems that can be triggered to cause damage), LANarchy (unknown equipment in use), desktop forgery (computerized forgery and counterfeiting of documents), information anarchy (indiscriminate use of

  19. A smart ROV solution for ship hull and harbor inspection

    NASA Astrophysics Data System (ADS)

    Reed, Scott; Wood, Jon; Vazquez, Jose; Mignotte, Pierre-Yves; Privat, Benjamin

    2010-04-01

    Hull and harbor infrastructure inspections are frequently performed manually and involve quite a bit of risk and human and monetary resources. In any kind of threat and resource constrained environment, this involves unacceptable levels of risk and cost. Modern Remotely Operated Vehicles are highly refined machines that provide features and capabilities previously unavailable. Operations once carried out by divers can now be carried out more quickly, efficiently and safely by smart enabled ROVs. ROVs are rapidly deployable and capable of continuous, reliable operations in adverse conditions. They also provide a stable platform on which multiple sensors may be mounted and utilized to meet the harbor inspection problem. Automated Control software provides ROV's and their pilots with the capability to inspect complex, constrained environments such as those found in a harbor region. This application and the user interface allow the ROV to automatically conduct complex maneuvers relative to the area being inspected and relieves the training requirements and work load for the pilot, allowing he or she to focus on the primary task of survey, inspection and looking for possible threats (such as IEDs, Limpet Mines, signs of sabotage, etc). Real-time sensor processing tools can be integrated into the smart ROV solution to assist the operator. Automatic Target Recognition (ATR) algorithms are used to search through the sensor data collected by the ROV in real time. These algorithms provide immediate feedback on possible threats and notify the operator of regions that may require manual verification. Sensor data (sonar or video) is also mosaiced, providing the operator with real-time situational awareness and a coverage map of the hull or seafloor. Detected objects may also be placed in the context of the large scale characteristics of the hull (or bottom or pilings) and localized. Within the complex areas such as the harbor pier pilings and the running gear of the ship, real

  20. Renewable Energy Resources in Lebanon

    NASA Astrophysics Data System (ADS)

    Hamdy, R.

    2010-12-01

    The energy sector in Lebanon plays an important role in the overall development of the country, especially that it suffers from many serious problems. The fact that Lebanon is among the few countries that are not endowed with fossil fuels in the Middle East made this sector cause one third of the national debt in Lebanon. Despite the large government investments in the power sector, demand still exceeds supply and Lebanon frequently goes through black out in peak demand times or has to resort to importing electricity from Syria. The Energy production sector has dramatic environmental and economical impacts in the form of emitted gasses and environment sabotage, accordingly, it is imperative that renewable energy (RE) be looked at as an alternative energy source. Officials at the Ministry of Energy and Water (MEW) and Lebanese Electricity (EDL) have repeatedly expressed their support to renewable energy utilization. So far, only very few renewable energy applications can be observed over the country. Major efforts are still needed to overcome this situation and promote the use of renewable energy. These efforts are the shared responsibility of the government, EDL, NGO's and educational and research centers. Additionally, some efforts are being made by some international organizations such as UNDP, ESCWA, EC and other donor agencies operating in Lebanon. This work reviews the status of Energy in Lebanon, the installed RE projects, and the potential projects. It also reviews the stakeholders in the field of RE in Lebanon Conclusion In considering the best R.E. alternative, it is important to consider all potential R.E. sources, their costs, market availability, suitability for the selected location, significance of the energy produced and return on investment. Several RE resources in Lebanon have been investigated; Tides and waves energy is limited and not suitable two tentative sites for geothermal energy are available but not used. Biomass resources badly affect the

  1. Submerged AUV Charging Station

    NASA Technical Reports Server (NTRS)

    Jones, Jack A.; Chao, Yi; Curtin, Thomas

    2014-01-01

    causes the AUV to rise, and emptying of the bladder allows the AUV to descend. This type of direct buoyancy control is much more energy efficient than using electrical pumps in that the inefficiencies of converting thermal energy to electrical energy to mechanical energy is avoided. AUV charging stations have been developed that use electricity produced by waves on floating buoys and that use electricity from solar photovoltaics on floating buoys. This is the first device that has absolutely no floating or visible parts, and is thus impervious to storms, inadvertent ocean vessel collisions, or enemy sabotage.

  2. 1988 Hanford riverbank springs characterization report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dirkes, R.L.

    1990-12-01

    This reports presents the results of a special study undertaken to characterize the riverbank springs (i.e., ground-water seepage) entering the Columbia River along the Hanford Site. Radiological and nonradiological analyses were performed. River water samples were also analyzed from upstream and downstream of the Site as well as from the immediate vicinity of the springs. In addition, irrigation return water and spring water entering the river along the shoreline opposite Hanford were analyzed. Hanford-origin contaminants were detected in spring water entering the Columbia River along the Hanford Site. The type and concentrations of contaminants in the spring water were similarmore » to those known to exist in the ground water near the river. The location and extent of the contaminated discharges compared favorably with recent ground-water reports and predictions. Spring discharge volumes remain very small relative to the flow of the Columbia. Downstream river sampling demonstrates the impact of ground-water discharges to be minimal, and negligible in most cases. Radionuclide concentrations were below US Department of Energy Derived Concentration Guides (DCGs) with the exception {sup 90}Sr near the 100-N Area. Tritium, while below the DCG, was detected at concentrations above the US Environmental Protection Agency drinking water standards in several springs. All other radionuclide concentrations were below drinking water standards. Nonradiological contaminants were generally undetectable in the spring water. River water contaminant concentrations, outside of the immediate discharge zones, were below drinking water standards in all cases. 19 refs., 5 figs., 12 tabs.« less

  3. High-Throughput Classification of Radiographs Using Deep Convolutional Neural Networks.

    PubMed

    Rajkomar, Alvin; Lingam, Sneha; Taylor, Andrew G; Blum, Michael; Mongan, John

    2017-02-01

    The study aimed to determine if computer vision techniques rooted in deep learning can use a small set of radiographs to perform clinically relevant image classification with high fidelity. One thousand eight hundred eighty-five chest radiographs on 909 patients obtained between January 2013 and July 2015 at our institution were retrieved and anonymized. The source images were manually annotated as frontal or lateral and randomly divided into training, validation, and test sets. Training and validation sets were augmented to over 150,000 images using standard image manipulations. We then pre-trained a series of deep convolutional networks based on the open-source GoogLeNet with various transformations of the open-source ImageNet (non-radiology) images. These trained networks were then fine-tuned using the original and augmented radiology images. The model with highest validation accuracy was applied to our institutional test set and a publicly available set. Accuracy was assessed by using the Youden Index to set a binary cutoff for frontal or lateral classification. This retrospective study was IRB approved prior to initiation. A network pre-trained on 1.2 million greyscale ImageNet images and fine-tuned on augmented radiographs was chosen. The binary classification method correctly classified 100 % (95 % CI 99.73-100 %) of both our test set and the publicly available images. Classification was rapid, at 38 images per second. A deep convolutional neural network created using non-radiological images, and an augmented set of radiographs is effective in highly accurate classification of chest radiograph view type and is a feasible, rapid method for high-throughput annotation.

  4. Nevada Test Site Environmental Report 2005

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cathy A. Wills

    2006-10-01

    The Nevada Test Site Environmental Report 2005 (NTSER) was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NTS Environmental Management System and characterize its performance, and (6) highlight significantmore » environmental programs and efforts.« less

  5. Procrastination and Self-Efficacy Among Intravenous Drug Users on a Methadone Maintenance Program in Sari City, Iran, 2013

    PubMed Central

    Taghizadeh, Fatemeh; Yazdani Cherati, Jamshid

    2015-01-01

    Background: Self-efficacy is the belief that one has the ability to implement the behaviors needed to produce a desired effect. There has been growing interest in the role of self-efficacy as a predictor and/or mediator of treatment outcome in a number of domains. Procrastination is a self-regulatory failure, defined as the voluntary delay of an intended course of action despite expecting to be worse off for the delay. Behavioral procrastination is a self-sabotage strategy that allows people to shift blame and avoid action; the decisional procrastination strategy is to put off making a decision when dealing with conflicts or choices. Procrastination has a great role in quitting drug addiction. Objectives: The aim of this study was to determine the relationship between procrastination and self-efficacy and other factors among intravenous drug users. Patients and Methods: This cross-sectional study was conducted on 178 intravenous drug users in the behavioral disease counseling, health center in Sari city, Mazandaran province, Iran, in 2013. The samples were selected through census sampling, descriptive and inferential statistics were used to measure the properties of distribution that depicts a set of data shown as frequency distribution tables, while for the mean and standard deviation, chi-square, Fisher and Spearman-Brown coefficients were used to analyze the data. Results: The mean age of the participants was 43 years. Seventy-two percent of them were married and opium was the first drug used. The first substance used in them was 54% of opium, 33% cannabis and 5% alcohol and 79% smoking. The reason of the first drug use in 32% of the subjects was temptation and in 10% a friend’s influence. The mean age of the first drug use was 23 years, and the frequency was 2 times per day. All of them had relapse at least once. Seven percent of them currently use other materials (2% crystal, 5% alcohol and opium and crack) both in methadone treatment. Behavioral

  6. Is Earth F**ked? Dynamical Futility of Global Environmental Management and Possibilities for Sustainability via Direct Action Activism

    NASA Astrophysics Data System (ADS)

    wErnEr, B.

    2012-12-01

    protests, blockades and sabotage by indigenous peoples, workers, anarchists and other activist groups, increases dissipation within the coupled system over fast to intermediate scales and pushes for changes in the dominant culture that favor transition to a stable, sustainable attractor. These dynamical relationships are illustrated and explored using a numerical model that simulates the short-, intermediate- and long-time-scale dynamics of the coupled human-environmental system. At fast scales, economic and political interests exploit environmental resources through a maze of environmental management and resistance, guided by virtual Earth predictions. At intermediate scales, managers become slaved to economic and political interests, which adapt to and repress resistance, and resistance is guided by patterns of environmental destruction. At slow scales, resistance interacts with the cultural context, which co-evolves with the environment. The transition from unstable dynamics to sustainability is sensitively dependent on the level of participation in and repression of resistance. Because of their differing impact inside and outside the dominant culture, virtual Earth predictions can either promote or oppose sustainability. Supported by the National Science Foundation, Geomorphology and Land Use Dynamics Program.

  7. Interim Closure Activities at Corrective Action Unit 114: Area 25 EMAD Facility, Nevada National Security Site, Nevada

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boehlecke, R. F.

    This letter report documents interim activities that have been completed at CAU 114 to support ongoing access and generate information necessary to plan future closure activities. General housekeeping and cleanup of debris was conducted in the EMAD yard, cold bays, support areas of Building 3900, and postmortem cell tunnel area of the hot bay. All non-asbestos ceiling tiles and loose and broken non-friable asbestos floor tiles were removed from support galleries and office areas. Non-radiologically contaminated piping and equipment in the cold areas of the building and in the two 120-ton locomotives in the yard were tapped, characterized, drained, andmore » verified free of contents.« less

  8. RCT: Module 2.07, Respiratory Protection, Course 8773

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hillmer, Kurt T.

    Internal dosimetry controls require the use of engineering controls to prevent the internal deposition of radioactive and nonradiological contaminants. However, when engineering and administrative controls are not available or feasible, respiratory protection may be necessary. The radiation control technician (RCT) should know and apply the considerations used in determining the respiratory protection equipment that is most appropriate for the job. The inappropriate use of or the use of the wrong respiratory protection equipment may result in undesirable health effects. This course will prepare the student with the skills necessary for RCT qualification by passing quizzes, tests, and the RCT Comprehensivemore » Phase 1, Unit 2 Examination (TEST 27566) and will provide in-the-field skills.« less

  9. 1989 Environmental monitoring report, Sandia National Laboratories, Albuquerque, New Mexico

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hwang, S.; Chavez, G.; Phelan, J.

    1990-05-01

    This 1989 report contains monitoring data from routine radiological and nonradiological environmental surveillance activities. Summaries of significant environmental compliance programs in progress such as National Environmental Policy Act documentation, environmental permits, environmental restoration, and various waste management programs for Sandia National Laboratories in Albuquerque (SNL, Albuquerque) are included. The maximum offsite dose impact was calculated to be 8.8 {times} 10{sup {minus}4} mrem. The total Albuquerque population received a collective dose of 0.097 person-rem during 1989 from SNL, Albuquerque, operations. As in the previous year, SNL, Albuquerque, operations in 1989 had no adverse impact on the general public or on themore » environment. 46 refs., 20 figs., 31 tabs.« less

  10. Portsmouth annual environmental report for 2003, Piketon, Ohio

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    none, none

    2004-11-30

    The Portsmouth & Gaseous Diffusion Plant (PORTS) is located on a 5.8-square-mile site in a rural area of Pike County, Ohio. U.S. Department of Energy (DOE) activities at PORTS include environmental restoration, waste 'management, and long-term'stewardship of nonleased facilities: Production facilities for the separation of uranium isotopes are leased to the United States Enrichment Corporation (USEC), but most activities associated with the uranium enrichment process ceased in 2001. USEC activities are not covered by this document, with the exception of some environmental compliance information provided in Chap. 2 and radiological and non-radiological environmental monitoring program information discussed in Chaps. 4more » and 5.« less

  11. Radiological impact of airborne effluents of coal and nuclear plants.

    PubMed

    McBride, J P; Moore, R E; Witherspoon, J P; Blanco, R E

    1978-12-08

    Radiation doses from airborne effluents of model coal-fired and nuclear power plants (1000 megawatts electric) are compared. Assuming a 1 percent ash release to the atmosphere (Environmental Protection Agency regulation) and 1 part per million of uranium and 2 parts per million of thorium in the coal (approximately the U.S. average), population doses from the coal plant are typically higher than those from pressurized-water or boiling-water reactors that meet government regulations. Higher radionuclide contents and ash releases are common and would result in increased doses from the coal plant. The study does not assess the impact of non-radiological pollutants or the total radiological impacts of a coal versus a nuclear economy.

  12. 1992 Environmental monitoring report, Sandia National Laboratories, Albuquerque, New Mexico

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Culp, T.; Cox, W.; Hwang, H.

    1993-09-01

    This 1992 report contains monitoring data from routine radiological and nonradiological environmental surveillance activities. summaries of significant environmental compliance programs in progress, such as National Environmental Policy Act documentation, environmental permits, envirorunental restoration, and various waste management programs for Sandia National Laboratories in Albuquerque, New Mexico, are included. The maximum offsite dose impact was calculated to be 0.0034 millirem. The total population within a 50-mile radius of Sandia National Laboratories/New Mexico received an estimated collective dose of 0.019 person-rem during 1992 from the laboratories` operations. As in the previous year, the 1992 operations at Sandia National Laboratories/New Mexico had nomore » discernible impact on the general public or on the environment.« less

  13. 1991 Environmental monitoring report Sandia National Laboratories, Albuquerque, New Mexico

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Culp, T.; Cox, W.; Hwang, S.

    1992-11-01

    This 1991 report contains monitoring data from routine radiological and nonradiological environmental surveillance activities. Summaries of significant environmental compliance programs in progress such as National Environmental Policy Act (NEPA) documentation, environmental permits, environmental restoration (ER), and various waste management programs for Sandia National Laboratories in Albuquerque (SNL, Albuquerque) are included. The maximum offsite dose impact was calculated to be 1.3 {times} 10{sup {minus}3} mrem. The total population within a 50-mile radius of SNL, Albuquerque, received a collective dose of 0.53 person-rem during 1991 from SNL, Albuquerque, operations. As in the previous year, the 1991 operations at SNL, Albuquerque, had nomore » discernible impact on the general public or on the environment.« less

  14. Chickamauga Reservoir 1992 fisheries monitoring cove rotenone results

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kerley, B.L.

    1993-06-01

    The Tennessee Valley Authority (TVA) is required by the National Pollutant Discharge Elimination System (NPDES) Permit for Sequoyah Nuclear Plant (SQN) to conduct and report annually a nonradiological operational monitoring program to evaluate potential effects of SQN on Chickamauga Reservoir. This monitoring program was initially designed to identify potential changes in water quality and biological communities in Chickamauga Reservoir resulting from operation of SQU. Chickamauga Reservoir cove rotenone sampling has also been conducted as part of the preoperational monitoring program for Watts Bar Nuclear Plant (WBN) to evaluate the combined effects of operating two nuclear facilities on one reservoir oncemore » WBU becomes operational. The purpose of this report is to present results of cove rotenone sampling conducted on Chickamauga Reservoir in 1992.« less

  15. Male partner reproductive coercion among women veterans.

    PubMed

    Rosenfeld, Elian A; Miller, Elizabeth; Zhao, Xinhua; Sileanu, Florentina E; Mor, Maria K; Borrero, Sonya

    2018-02-01

    Male partner reproductive coercion is defined as male partners' attempts to promote pregnancy through interference with women's contraceptive behaviors and reproductive decision-making. Male partners may try to promote pregnancy through birth control sabotage such as taking away or destroying their partners' contraceptives, refusing to wear condoms, and/or verbally pressuring their partners to abstain from contraceptive use. Reproductive coercion is associated with an elevated risk for unintended pregnancy. Women who experience intimate partner violence, who are in racial/ethnic minorities, and who are of lower socioeconomic status are more likely to experience reproductive coercion. Women veterans who use Veterans Affairs for health care may be particularly vulnerable to reproductive coercion because they are disproportionally from racial/ethnic minority groups and experience high rates of intimate partner violence. We sought to examine the prevalence, correlates, and impact of reproductive coercion among women veterans who are served by the Veterans Affairs healthcare system. We analyzed data from a national telephone survey of women veterans aged 18-44 years, with no history of sterilization or hysterectomy, who had received care within the Veterans Affairs system in the previous 12 months. Participants who had sex with men in the last year were asked if they experienced male partner reproductive coercion. Adjusted logistic regression was used to examine the relationship between participant characteristics and male partner reproductive coercion and the relationship between reproductive coercion and the outcomes of contraceptive method used at last sex and pregnancy and unintended pregnancy in the last year. Among the 1241 women veterans in our study cohort, 11% reported experiencing male partner reproductive coercion in the past year. Black women, younger women, and single women were more likely to report reproductive coercion than their white, older, and

  16. [Manpower migrations and Arab unity: the challenges of the Iraqi model].

    PubMed

    Roussillon, A

    1985-01-01

    the presence of large numbers of foreign workers not only to the countries employing them but to the Arab nation as a whole allows Iraq to criticize the migration policies of the Gulf oil exporters, which are increasingly favoring more productive labor from Asian countries and which cede much of the authority to select and admit workers to private concerns. The evolution of Iraq's policy demonstrates the concern of its governing party with reconciling its Arab identity and its analysis of international power relations with consolidation of its own position internally and in the Arab world as a whole. The labor policy of the oil exporters exposes their countries and thus the Arab world to the possibility of sabotage and to demographic overpowering of ethnic and cultural identity. Interpretations differ as to whether the Iraqi model has led to a better deployment of labor and as to its theoretical contribution to pan-Arab unity, given the diverging interests of the individual states concerned.

  17. HLW Return from France to Germany - 15 Years of Experience in Public Acceptance and Technical Aspects - 12149

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Graf, Wilhelm

    Since in 1984 the national reprocessing concept was abandoned the reprocessing abroad was the only existing disposal route until 1994. With the amendment of the Atomic Energy Act in 2001 spent fuel management changed completely since from 1 June 2005 any delivery of spent fuel to reprocessing plants was prohibited and the direct disposal of spent fuel became mandatory. Until 2005 the total amount of spent fuel to be reprocessed abroad added up to 6080 t HM, 5309 t HM thereof in France. The waste generated from reprocessing - alternatively an equivalent amount of radioactive material - has to bemore » returned to the country of origin according to the commercial contracts signed between the German utilities and COGEMA, now AREVA NC, in France and BNFL, now INS in UK. In addition the German and the French government exchanged notes with the obligation of both sides to enable and support the return of reprocessing residues or equivalents to Germany. The return of high active vitrified waste from La Hague to the interim storage facility at Gorleben was demanding from the technical view i. e. the cask design and the transport. Unfortunately the Gorleben area served as a target for nuclear opponents from the first transport in 1996 to the latest one in 2011. The protection against sabotage of the railway lines and mass protests needed highly improved security measures. In France and Germany special working forces and projects have been set up to cope with this extraordinary situation. A complex transport organization was established to involve all parties in line with the German and French requirements during transport. The last transport of vitrified residues from France has been completed successfully so far thus confirming the efficiency of the applied measures. Over 15 years there was and still is worldwide no comparable situation it is still unique. Summing up, the exceptional project handling challenge that resulted from the continuous anti-nuclear civil

  18. Saving Lives and Preventing Injuries From Unjustified Protective Actions-Method for Developing a Comprehensive Public Protective Action Strategy for a Severe NPP Emergency.

    PubMed

    Callen, J; McKenna, T

    2018-05-01

    During the response to the Fukushima Daiichi nuclear power plant (FDNPP) emergency, about 50 patients died during or shortly after an evacuation when they were not provided with the needed medical support. In addition, it has been shown that during the FDNPP emergency there were increases in mortality rates among the elderly due to long-term dislocation as a result of evacuation and relocation orders and an inability to stay in areas where residents were advised to shelter for extended periods. These deaths occurred even though the possible radiation exposure to the public was too low to result in radiation-induced deaths, injuries, or a meaningful increase in the cancer rate, even if no protective actions had been taken. These problems are not unique to the FDNPP emergency and would be expected if the recommendations of many organizations were followed. Neither the International Commission on Radiological Protection (ICRP), the U.S. Nuclear Regulatory Commission (NRC) nor the U.S Environmental Protection Agency (EPA) adequately take into consideration in their recommendations and analysis the non-radiological health impacts, such as deaths and injuries, that could result from protective actions. Furthermore, ICRP, NRC, EPA, and the U.S. Department of Homeland Security (DHS) call for taking protective actions at doses lower than those resulting in meaningful adverse radiation-induced health effects and do not state the doses at which such effects would be seen. Consequently, it would be impossible for decision makers and the public to balance all the hazards both from radiation exposure and protective actions when deciding whether a protective action is justified. What is needed, as is presented in this paper, is a method for developing a comprehensive protective action strategy that allows the public, decision makers, and others who must work together to balance the radiological with the non-radiological health hazards posed by protective actions, and to counter

  19. 1990 Environmental Monitoring Report, Sandia National Laboratories, Albuquerque, New Mexico

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hwang, S.; Yeager, G.; Wolff, T.

    1991-05-01

    This 1990 report contains monitoring data from routine radiological and nonradiological environmental surveillance activities. Summaries of significant environmental compliance programs in progress such as National Environmental Policy Act (NEPA) documentation, environmental permits, environmental restoration, and various waste management programs for Sandia National Laboratories in Albuquerque (SNL, Albuquerque) are included. The maximum offsite dose impact was calculated to be 2.0 {times} 10{sup {minus}3} mrem. The total 50-mile population received a collective dose of 0.82 person-rem during 1990 from SNL, Albuquerque, operations. As in the previous year, the 1990 SNL operations had no adverse impact on the general public or on themore » environment. This report is prepared for the US Department of Energy in compliance with DOE Order 5400.1. 97 refs., 30 figs., 137 tabs.« less

  20. An Eclectic Look At Viewing Station Design

    NASA Astrophysics Data System (ADS)

    Horii, Steven C.; Horii, Howard N.; Kowalski, Philip

    1988-06-01

    Imaging workstations for radiology would be used by radiologists for a number of hours each day. Such long use demands a good ergonomic design of the workstation in order to avoid user fatigue and frustration. The film-and-viewbox methods presently in use have evolved over the years since radiography became a diagnostic tool. The result of this evolution is that, despite the problems of film, the ergonomics of film reading and reporting is quite mature. This paper will use a somewhat lighthearted look at workstation design using the ideas of well-known architects and designers to illustrate points which should be considered when implementing electronic viewing systems. Examples will also be drawn from non-radiologic environments in which the user is presented with visual information for his or her integration.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bechtel Nevada

    The Nevada Test Site Environmental Report 2003 was prepared by Bechtel Nevada to meet the requirements and guidelines of the U.S. Department of Energy and the information needs of the public. This report is meant to be useful to members of the public, public officials, regulators, and Nevada Test Site contractors. The Executive Summary strives to present in a concise format the purpose of the document, the NTS mission and major programs, a summary of radiological releases and doses to the public resulting from site operations, a summary of non-radiological releases, and an overview of the Nevada Test Site Environmentalmore » Management System. The Executive Summary, combined with the following Compliance Summary, are written to meet all the objectives of the report and to be stand-alone sections for those who choose not to read the entire document.« less

  2. ICPP environmental monitoring report CY-1995

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1996-04-01

    Summarized in this report are the data collected through Environmental Monitoring programs conducted at the Idaho Chemical Processing Plant (ICPP) by the Environmental Protection Department. The ICPP is responsible for complying with all applicable Federal, State, Local and DOE Rules, Regulations and Orders. Radiological effluent and emissions are regulated by the DOE in accordance with the Derived Concentration Guides (DCGs). The State of Idaho regulates nonradiological waste resulting from the ICPP operations including airborne, liquid, and solid waste. The Environmental Department updated the Quality Assurance (QA) Project Plan for Environmental Monitoring activities during the third quarter of 1992. QA activitiesmore » have resulted in the ICPP`s implementation of the Environmental Protection Agency (EPA) rules and guidelines pertaining to the collection, analyses, and reporting of environmentally related samples. Where no EPA methods for analyses existed for radionuclides, Lockheed Idaho Technologies Company (LITCO) methods were used.« less

  3. ICPP environmental monitoring report for CY-1996

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neff, J.K.

    1997-06-01

    Summarized in this report are the data collected through Environmental Monitoring programs conducted at the Idaho Chemical Processing Plant (ICPP) by the Environmental Affairs Department. This report is published in response to DOE Order 5400.1. The ICPP is responsible for complying with all applicable Federal, State, Local and DOE Rules, Regulations and Orders. Radiological effluent and emissions are regulated by the DOE in accordance with the Derived Concentration Guides (DCGs) as presented in DOE Order 5400.5. The State of Idaho regulates nonradiological waste resulting from the ICPP operations including airborne, liquid, and solid waste. Quality Assurance activities have resulted inmore » the ICPP`s implementation of the Environmental Protection Agency (EPA) rules and guidelines pertaining to the collection, analyses, and reporting of environmentally related samples. Where no EPA methods for analyses existed for radionuclides, Lockheed Martin Idaho Technologies Company (LMITCO) methods were used.« less

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cathy Wills

    The Nevada Test Site Environmental Report 2006 (NTSER) was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec). This Executive Summary presents the purpose of the document, the major programs conducted at the Nevada Test Site (NTS), NTS key environmental initiatives, radiological releases and potential doses to the public resulting from site operations, a summary of nonradiological releases, implementation status of the NTS Environmental Management System, a summary of compliance with environmental regulations, pollutionmore » prevention and waste minimization accomplishments, and significant environmental accomplishments. Much of the content of this Executive Summary is also presented in a separate stand-alone pamphlet titled Nevada Test Site Environmental Report Summary 2006 produced to be a more cost-effective means of distributing information contained in the NTSER to interested DOE stakeholders.« less

  5. Use of clinical prediction rules and D-dimer tests in the diagnostic management of pregnant patients with suspected acute pulmonary embolism.

    PubMed

    Van der Pol, L M; Mairuhu, A T A; Tromeur, C; Couturaud, F; Huisman, M V; Klok, F A

    2017-03-01

    Because pregnant women have an increased risk of venous thromboembolism (VTE) and at the same time normal pregnancy is associated with symptoms, mimicking those present in the setting of acute pulmonary embolism (PE), the latter diagnosis is frequently suspected in this patient category. Since imaging tests expose both mother and foetus to ionizing radiation, the ability to rule out PE based on non-radiological diagnostic tests is of paramount importance. However, clinical decision rules have only been scarcely evaluated in the pregnant population with suspected PE, while D-dimer levels lose diagnostic accuracy due to a physiological increase during normal pregnancy. Consequently, clinical guidelines provide contradicting and weak recommendations on this subject and the optimal diagnostic strategy remains highly debated. With this systematic review, we aimed to summarize current evidence on the safety and efficacy of clinical decision rules and biomarkers used in the diagnostic management of suspected acute PE in pregnant patients. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. A resident's primer of Medicare reimbursement in radiology.

    PubMed

    Lee, Ryan K

    2006-01-01

    After having completed medical school, residency, and in many cases specialized fellowships, radiologists are well equipped to practice clinical radiology. However, they receive little if any exposure to the business of radiology, such as coding, billing, and other administrative duties that maintain the financial well-being of any medical practice. Medicare insolvency, managed care, self-referral, and increasing imaging by nonradiology specialists are all issues creating a competitive and ever changing medical environment, and understanding the economic and business aspects of health care is becoming increasingly important for both academic and private practice radiologists. The intent of this paper is to provide new radiologists as well as radiologists in training an introduction to the reimbursement system, as well as to provide a generalized review of the process for practicing radiologists. In particular, this article addresses the fundamentals of the Medicare fee-for-service reimbursement process as well as the factors considered in arriving at the valuation of radiologic services by Medicare.

  7. Expanding the Scope of an Automated Radiology Recommendation-Tracking Engine: Initial Experiences and Lessons Learned.

    PubMed

    Licurse, Mindy Y; Lalevic, Darco; Zafar, Hanna M; Schnall, Mitchell D; Cook, Tessa S

    2017-04-01

    An automated radiology recommendation-tracking engine for incidental focal masses in the liver, pancreas, kidneys, and adrenal glands was launched within our institution in July 2013. For 2 years, the majority of CT, MR, and US examination reports generated within our health system were mined by the engine. However, the need to expand the system beyond the initial four organs was soon identified. In July 2015, the second phase of the system was implemented and expanded to include additional anatomic structures in the abdomen and pelvis, as well as to provide non-radiology and non-imaging options for follow-up. The most frequent organs with incidental findings, outside of the original four, included the ovaries and the endometrium, which also correlated to the most frequently ordered imaging follow-up study of pelvic ultrasound and non-imaging follow-up study of endometrial biopsies, respectively. The second phase expansion has demonstrated new venues for augmenting and improving radiologist roles in optimal communication and management of incidental findings.

  8. ICPP environmental monitoring report CY-1994

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1995-05-01

    Summarized in this report are the data collected through Environmental Monitoring programs conducted at the Idaho Chemical Processing Plant (ICPP) by the Environmental Protection Department. The ICPP is responsible for complying with all applicable Federal, State, Local and DOE Rules, Regulations and Orders. Radiological effluent and emissions are regulated by the DOE in accordance with the Derived Concentration Guides (DCGs) as presented in DOE Order 5400.5. The State of Idaho regulates nonradiological waste resulting from the ICPP operations including airborne, liquid, and solid waste. The Environmental Department updated the Quality Assurance (QA) Project Plan for Environmental Monitoring activities during themore » third quarter of 1992. QA activities have resulted in the ICPP`s implementation of the Environmental Protection Agency (EPA) rules and guidelines pertaining to the collection, analyses, and reporting of environmentally related samples. Where no EPA methods for analyses existed for radionuclides, LITCO methods were used.« less

  9. Radiology Architecture Project Primer.

    PubMed

    Sze, Raymond W; Hogan, Laurie; Teshima, Satoshi; Davidson, Scott

    2017-12-19

    The rapid pace of technologic advancement and increasing expectations for patient- and family-friendly environments make it common for radiology leaders to be involved in imaging remodel and construction projects. Most radiologists and business directors lack formal training in architectural and construction processes but are expected to play significant and often leading roles in all phases of an imaging construction project. Avoidable mistakes can result in significant increased costs and scheduling delays; knowledgeable participation and communication can result in a final product that enhances staff workflow and morale and improves patient care and experience. This article presents practical guidelines for preparing for and leading a new imaging architectural and construction project. We share principles derived from the radiology and nonradiology literature and our own experience over the past decade completely remodeling a large pediatric radiology department and building a full-service outpatient imaging center. Copyright © 2017 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  10. Environmental surveillance master sampling schedule

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bisping, L.E.

    This document contains the planned 1994 schedules for routine collection of samples for the Surface Environmental Surveillance Project (SESP), Drinking Water Project, and Ground-Water Surveillance Project. Samples are routinely collected for the SESP and analyzed to determine the quality of air, surface water, soil, sediment, wildlife, vegetation, foodstuffs, and farm products at Hanford Site and surrounding communities. The responsibility for monitoring the onsite drinking water falls outside the scope of the SESP. The Hanford Environmental Health Foundation is responsible for monitoring the nonradiological parameters as defined in the National Drinking Water Standards while PNL conducts the radiological monitoring of themore » onsite drinking water. PNL conducts the drinking water monitoring project concurrent with the SESP to promote efficiency and consistency, utilize the expertise developed over the years, and reduce costs associated with management, procedure development, data management, quality control and reporting. The ground-water sampling schedule identifies ground-water sampling events used by PNL for environmental surveillance of the Hanford Site.« less

  11. The Impact of Nonphysician Providers on Diagnostic and Interventional Radiology Practices: Operational and Educational Implications.

    PubMed

    Hawkins, C Matthew; Bowen, Michael A; Gilliland, Charles A; Walls, D Gail; Duszak, Richard

    2015-09-01

    The numbers of nurse practitioners (NPs) and physician assistants (PAs) are increasing throughout the entire health care enterprise, and a similar expansion continues within radiology. The use of radiologist assistants is growing in some radiology practices as well. The increased volume of services rendered by this growing nonphysician provider subset of the health care workforce within and outside radiology departments warrants closer review, particularly with regard to their potential influence on radiology education and medical imaging resource utilization. In this article (the second in a two-part series), the authors review recent literature and offer recommendations for radiology practices regarding the impact NPs, PAs, and radiologist assistants may have on interventional and diagnostic radiology practices. Their potential impact on medical education is also discussed. Finally, staffing for radiology departments, as a result of an enlarging nonradiology NP and PA workforce ordering diagnostic imaging, is considered. Copyright © 2015 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  12. Lunar Gene Bank for Endangered Species

    NASA Astrophysics Data System (ADS)

    Swain, Ramakrushna

    2016-07-01

    Introduction: Before the dawn of the 22nd century, we face the huge risk of losing our genetic heritage accumulated during aeons of evolution. The losses include hundreds of vertebrates, human gene pools, hundreds of thousands of plants and over a million insect species. As we have observed, adequate conservation of habitat is unfeasible and active breeding programs cover only a handful of the many thousand species threatened. We propose cryopreservation of germplasms by constructing a cDNA library based gene bank for endangered species in the permanently shadowed polar lunar craters that would provide immunity from both natural disadvantages and humanitarian intrusions. Rationale: Under such alarming circumstances, we turned to cryopreservation as an option but over thousands of years economic depression, sabotage, conflicts, warfare or even a brief disruption to the precise cryopreservation can hamper the storage of genetic samples.When we are considering conservation it is always preferable to go for a more secure and permanent solution. It was found out that the climatic and strategic location of the lunar polar craters are adequately hospitable, remote and free of maintenance and human observation as they provide naturally cryogenic temperature, reduced gravity and vacuum environment, non-reactive surface, safety from celestial intrusion and permanent shadow which doesn't allow the temperature to fluctuate thus providing most suitable storage facilities for the germplasms. PSRs provide steady temperature of 40- 60K and immunity to earthquakes due to low seismic activity. At these sites, burial in one meter or more of the regolith will provide protection against the solar wind, solar and galactic cosmic rays and micrometeorite impact. It provides the minimum necessary barrier from human intervention and at the same time enables easy retrieval for future usage. Genetic samples of endangered species can enable restoration even after its extinction. Preserved

  13. Full-Scale Cask Testing and Public Acceptance of Spent Nuclear Fuel Shipments - 12254

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dilger, Fred; Halstead, Robert J.; Ballard, James D.

    Full-scale physical testing of spent fuel shipping casks has been proposed by the National Academy of Sciences (NAS) 2006 report on spent nuclear fuel transportation, and by the Presidential Blue Ribbon Commission (BRC) on America's Nuclear Future 2011 draft report. The U.S. Nuclear Regulatory Commission (NRC) in 2005 proposed full-scale testing of a rail cask, and considered 'regulatory limits' testing of both rail and truck casks (SRM SECY-05-0051). The recent U.S. Department of Energy (DOE) cancellation of the Yucca Mountain project, NRC evaluation of extended spent fuel storage (possibly beyond 60-120 years) before transportation, nuclear industry adoption of very largemore » dual-purpose canisters for spent fuel storage and transport, and the deliberations of the BRC, will fundamentally change assumptions about the future spent fuel transportation system, and reopen the debate over shipping cask performance in severe accidents and acts of sabotage. This paper examines possible approaches to full-scale testing for enhancing public confidence in risk analyses, perception of risk, and acceptance of spent fuel shipments. The paper reviews the literature on public perception of spent nuclear fuel and nuclear waste transportation risks. We review and summarize opinion surveys sponsored by the State of Nevada over the past two decades, which show consistent patterns of concern among Nevada residents about health and safety impacts, and socioeconomic impacts such as reduced property values along likely transportation routes. We also review and summarize the large body of public opinion survey research on transportation concerns at regional and national levels. The paper reviews three past cask testing programs, the way in which these cask testing program results were portrayed in films and videos, and examines public and official responses to these three programs: the 1970's impact and fire testing of spent fuel truck casks at Sandia National Laboratories, the 1980

  14. Cyber Incidents Involving Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert J. Turk

    2005-10-01

    available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).« less

  15. SUDOQU: a new dose model to derive criteria for surface contamination of non-food (consumer) goods, containers and conveyances.

    PubMed

    van Dillen, Teun

    2015-04-01

    The Fukushima nuclear accident (Japan, 11 March 2011) revealed the need for well-founded criteria for surface contamination and associated screening levels related to the import of non-food (consumer) goods, containers and conveyances. The only available European-harmonised criteria are those laid down in the IAEA transport regulations, but these criteria date back from the early 1960s and only apply to the safe transport of radioactive materials. The main problem is that a generic dose-assessment model for consumer products is missing. Therefore, RIVM (National Institute for Public Health and the Environment) developed a new methodology entitled SUDOQU (SUrface DOse QUantification) to calculate the annual effective dose for both consumers and non-radiological workers, addressing issues of removability of surface contamination. The methodology can be used to derive criteria and screening levels for surface contamination and could serve as a useful tool for policy-makers and radiation-protection specialists. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  16. Fatal and nonfatal risk associated with recycle of D&D-generated concrete

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boren, J.K.; Ayers, K.W.; Parker, F.L.

    1997-02-01

    As decontamination and decommissioning activities proceed within the U.S. Department of Energy Complex, vast volumes of uncontaminated and contaminated concrete will be generated. The current practice of decontaminating and landfilling the concrete is an expensive and potentially wasteful practice. Research is being conducted at Vanderbilt University to assess the economic, social, legal, and political ramifications of alternate methods of dealing with waste concrete. An important aspect of this research work is the assessment of risk associated with the various alternatives. A deterministic risk assessment model has been developed which quantifies radiological as well as non-radiological risks associated with concrete disposalmore » and recycle activities. The risk model accounts for fatal as well as non-fatal risks to both workers and the public. Preliminary results indicate that recycling of concrete presents potentially lower risks than the current practice. Radiological considerations are shown to be of minor importance in comparison to other sources of risk, with conventional transportation fatalities and injuries dominating. Onsite activities can also be a major contributor to non-fatal risk.« less

  17. Lawrence Livermore National Laboratory environmental report for 1990

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sims, J.M.; Surano, K.A.; Lamson, K.C.

    1990-01-01

    This report documents the results of the Environmental Monitoring Program at the Lawrence Livermore National Laboratory (LLNL) and presents summary information about environmental compliance for 1990. To evaluate the effect of LLNL operations on the local environment, measurements of direct radiation and a variety of radionuclides and chemical compounds in ambient air, soil, sewage effluent surface water, groundwater, vegetation, and foodstuff were made at both the Livermore site and at Site 300 nearly. LLNL's compliance with all applicable guides, standards, and limits for radiological and nonradiological emissions to the environment was evaluated. Aside from an August 13 observation of silvermore » concentrations slightly above guidelines for discharges to the sanitary sewer, all the monitoring data demonstrated LLNL compliance with environmental laws and regulations governing emission and discharge of materials to the environment. In addition, the monitoring data demonstrated that the environmental impacts of LLNL are minimal and pose no threat to the public to or to the environment. 114 refs., 46 figs., 79 tabs.« less

  18. Niagara Falls Storage Site annual environmental report for calendar year 1991, Lewiston, New York. [Niagara Falls Storage Site

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1992-09-01

    This document describes the environmental monitoring program at the Niagara Falls Storage Site (NFSS) and surrounding area, implementation of the program, and monitoring results for 1991. Environmental monitoring at NFSS began in 1981. The site is owned by the US Department of Energy (DOE) and is assigned to the DOE Formerly Utilized Sites Remedial Action Program (FUSRAP). FUSRAP is a program to decontaminate or otherwise control sites where residual radioactive materials remain from the early years of the nation's atomic energy program or from commercial operations causing conditions that Congress has authorized DOE to remedy. The environmental monitoring program atmore » NFSS includes sampling networks for radon concentrations in air; external gamma radiation exposure; and total uranium and radium-226 concentrations in surface water, sediments, and groundwater. Additionally, several nonradiological parameters including seven metals are routinely measured in groundwater. Monitoring results are compared with applicable Environmental Protection Agency (EPA) standards, DOE derived concentration guides (DCGs), dose limits, and other requirements in DOE orders. Environmental standards are established to protect public health and the environment.« less

  19. ICPP environmental monitoring report CY-1993: Environmental characterization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1994-05-01

    Summarized in this report are the data collected through Environmental Monitoring programs conducted at the Idaho Chemical Processing Plant (ICPP) by the Environmental Safety & Health (ES&H) Department. This report is published in response to DOE Order 5400.1. This report covers the period from December 21, 1992 through December 20, 1993. The ICPP is responsible for complying with all applicable Federal, State, Local and DOE Rules, Regulations and Orders. Radiological effluent and emissions are regulated by the DOE in accordance with the Derived Concentration Guides (DCGs) as presented in DOE Order 5400.5. The State of Idaho regulates all nonradiological wastemore » resulting from the ICPP operations including all airborne, liquid, and solid waste. The ES&H Department updated the Quality Assurance (QA) Project Plan for Environmental Monitoring activities during the third quarter of 1992. QA activities have resulted in the ICPP`s implementation of the Environmental Protection Agency (EPA) rules and guidelines pertaining to the collection, analyses, and reporting of environmentally related samples. Where no EPA methods for analyses existed for radionuclides, WINCO methods were used.« less

  20. Niagara Falls Storage Site annual environmental report for calendar year 1991, Lewiston, New York

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1992-09-01

    This document describes the environmental monitoring program at the Niagara Falls Storage Site (NFSS) and surrounding area, implementation of the program, and monitoring results for 1991. Environmental monitoring at NFSS began in 1981. The site is owned by the US Department of Energy (DOE) and is assigned to the DOE Formerly Utilized Sites Remedial Action Program (FUSRAP). FUSRAP is a program to decontaminate or otherwise control sites where residual radioactive materials remain from the early years of the nation`s atomic energy program or from commercial operations causing conditions that Congress has authorized DOE to remedy. The environmental monitoring program atmore » NFSS includes sampling networks for radon concentrations in air; external gamma radiation exposure; and total uranium and radium-226 concentrations in surface water, sediments, and groundwater. Additionally, several nonradiological parameters including seven metals are routinely measured in groundwater. Monitoring results are compared with applicable Environmental Protection Agency (EPA) standards, DOE derived concentration guides (DCGs), dose limits, and other requirements in DOE orders. Environmental standards are established to protect public health and the environment.« less

  1. Maywood Interim Storage Site annual environmental report for calendar year 1991, Maywood, New Jersey. [Maywood Interim Storage Site

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    1992-09-01

    This document describes the environmental monitoring program at the Maywood Interim Storage Site (MISS) and surrounding area, implementation of the program, and monitoring results for 1991. Environmental monitoring of MISS began in 1984 when congress added the site to the US Department of Energy's (DOE) Formerly Utilized Sites Remedial Action Program (FUSRAP). FUSRAP is a DOE program to identify and decontaminate or otherwise control sites where residual radioactive materials remain from the early years of the nation's atomic energy program or from commercial operations causing conditions that Congress has authorized DOE to remedy. The environmental monitoring program at MISS includesmore » sampling networks for radon and thoron concentrations in air; external gamma radiation-exposure; and total uranium, radium-226, radium-228, thorium-232, and thorium-230 concentrations in surface water, sediment, and groundwater. Additionally, several nonradiological parameters are measured in surface water, sediment, and groundwater. Monitoring results are compared with applicable Environmental Protection Agency standards, DOE derived concentration guides (DCGs), dose limits, and other requirements in DOE orders. Environmental standards are established to protect public health and the environment.« less

  2. Experience with DICOM for the clinical specialties in the healthcare enterprise

    NASA Astrophysics Data System (ADS)

    Kuzmak, Peter M.; Dayhoff, Ruth E.

    2003-05-01

    DICOM is a success for radiology and cardiology and it is now beginning to be used for other clinical specialties. The US Department of Veterans Affairs has been instrumental in promoting this technological advancement. We have worked with a number of non-radiology imaging vendors over the past several years, encouraging them to support DICOM, providing requirement specifications, validating their implementations, installing their products, and integrating their systems with the VA healthcare enterprise. We require each new non-radiology vendor to support the DICOM Modality Worklist and Storage services, as specified in the IHE Technical Framework, and insist that they perform validation testing with us over the Internet before installing at a VA site. Three years ago we began working with commercial DICOM image acquisition applications in ophthalmology and endoscopy. Today we are interfacing with six vendors in ophthalmology, six in dental, and two in endoscopy. Getting imaging modality vendors to support DICOM is only part of the story, however. We have also developed the capabilities of the VistA hospital information system to properly handle DICOM interfaces to the different clinical specialties. The workflow in the clinical specialties is different than that of radiology, and is much more diverse. We designed the VistA DICOM image acquisition and display interface to use the generic order entry, result entry, result reporting, and appointment scheduling applications of our hospital information system, which are common to other hospital information systems, in order to maintain existing clinical workflow, minimize operational disruptions, simplify training, and win user acceptance. This software is now being field tested with dental and ophthalmology systems at a large number of VA medical centers. We have learned several things from this field test. The DICOM Modality Worklist and Storage services can be successfully used for image acquisition in the clinical

  3. High Efficiency Particulate Air (HEPA) Filter Generation, Characterization, and Disposal Experiences at the Oak Ridge National Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Coffey, D. E.

    2002-02-28

    High Efficiency Particulate Air filtration is an essential component of the containment and ventilation systems supporting the research and development activities at the Oak Ridge National Laboratory. High Efficiency Particulate Air filters range in size from 7.6cm (3 inch) by 10.2 cm (4 inch) cylindrical shape filters to filter array assemblies up to 2.1 m (7 feet) high by 1.5 m (5 feet) wide. Spent filters are grouped by contaminates trapped in the filter media and become one of the components in the respective waste stream. Waste minimization and pollution prevention efforts are applied for both radiological and non-radiological applications.more » Radiological applications include laboratory hoods, glove boxes, and hot cells. High Efficiency Particulate Air filters also are generated from intake or pre-filtering applications, decontamination activities, and asbestos abatement applications. The disposal avenues include sanitary/industrial waste, Resource Conservation and Recovery Act and Toxic Substance Control Act, regulated waste, solid low-level waste, contact handled transuranic, and remote handled transuranic waste. This paper discusses characterization and operational experiences associated with the disposal of the spent filters across multiple applications.« less

  4. Sensor of total hip arthoplasty wear designed on principle of scanning profilometry

    NASA Astrophysics Data System (ADS)

    Rössler, Tomas; Mandat, Dusan; Gallo, Jiri; Hrabovsky, Miroslav; Pochmon, Michal; Havranek, Vitezslav

    2008-12-01

    Total hip arthroplasty significantly improves the quality of life in majority of patients with osteoarthritis. However, prosthetic wear is a problem because of inducing the development of aseptic loosening and periprosthetic osteolysis which needs the revision surgery. Thus, the polyethylene wear measurement is the central to contemporary orthopaedics and this interesting has encouraged the development and improvement of both radiologic (in vivo) and non-radiologic (in vitro) methods for polyethylene wear quantification. The principles of polyethylene liner wear measurements are predominantly geometric; nevertheless, the realization of individual types of in vivo measurements brings with it the necessity of many simplifications and compromising steps to acquire approximately accurate values. In fact, the volumetric wear can be obtained by mathematical conversion based on the most linear shift of femoral head in the cup. However, such approach is understood to be somewhat insufficient. Our ongoing research pointed to the development of optical non-contact method for wear measurement and its results are introduced in this paper including the methodology designed for the usability validation of the method for the given purpose and the description of sensor, its principle, technical realization, design and parameters.

  5. Maywood Interim Storage Site annual environmental report for calendar year 1991, Maywood, New Jersey. Formerly Utilized Sites Remedial Action Program (FUSRAP)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1992-09-01

    This document describes the environmental monitoring program at the Maywood Interim Storage Site (MISS) and surrounding area, implementation of the program, and monitoring results for 1991. Environmental monitoring of MISS began in 1984 when congress added the site to the US Department of Energy`s (DOE) Formerly Utilized Sites Remedial Action Program (FUSRAP). FUSRAP is a DOE program to identify and decontaminate or otherwise control sites where residual radioactive materials remain from the early years of the nation`s atomic energy program or from commercial operations causing conditions that Congress has authorized DOE to remedy. The environmental monitoring program at MISS includesmore » sampling networks for radon and thoron concentrations in air; external gamma radiation-exposure; and total uranium, radium-226, radium-228, thorium-232, and thorium-230 concentrations in surface water, sediment, and groundwater. Additionally, several nonradiological parameters are measured in surface water, sediment, and groundwater. Monitoring results are compared with applicable Environmental Protection Agency standards, DOE derived concentration guides (DCGs), dose limits, and other requirements in DOE orders. Environmental standards are established to protect public health and the environment.« less

  6. Hazelwood Interim Storage Site annual environmental report for calendar year 1991, Hazelwood, Missouri. [Hazelwood Interim Storage Site

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1992-09-01

    This document describes the environmental monitoring program at the Hazelwood Interim Storage Site (HISS) and surrounding area, implementation of the program, and monitoring results for 1991. Environmental monitoring of HISS began in 1984 when the site was assigned to the US Department of Energy (DOE) as part of the decontamination research and development project authorized by Congress under the 1984 Energy and Water Development Appropriations Act. DOE placed responsibility for HISS under the Formerly Utilized Sites Remedial Action Program (FUSRAP), a DOE program to decontaminate or otherwise control sites where residual radioactive materials remain from the early years of themore » nation's atomic energy program or from commercial operations causing conditions that Congress has authorized DOE to remedy. The environmental monitoring program at HISS includes sampling networks for radon concentrations in air; external gamma radiation exposure; and radium-226, thorium-230, and total uranium concentrations in surface water, sediment, and groundwater. Additionally, several nonradiological parameters are measured in groundwater. Monitoring results are compared with applicable Environmental Protection Agency standards, DOE derived concentration guides (DCGs), dose limits, and other requirements in DOE orders. Environmental standards and DCGs are established to protect public health and the environment.« less

  7. Eye-tracking AFROC study of the influence of experience and training on chest x-ray interpretation

    NASA Astrophysics Data System (ADS)

    Manning, David; Ethell, Susan C.; Crawford, Trevor

    2003-05-01

    Four observer groups with different levels of expertise were tested in an investigation into the comparative nature of expert performance. The radiological task was the detection and localization of significant pulmonary nodules in postero-anterior vies of the chest in adults. Three test banks of 40 images were used. The observer groups were 6 experienced radiographers prior to a six month training program in chest image interpretation, the same radiographers after their tr4aining program, and 6 fresher undergraduate radiography students. Eye tracking was carried out on all observers to demonstrate differences in visual activity and nodule detection performance was measured with an AFROC technique. Detection performances of the four groups showed the radiologists and radiographers after training were measurably superior at the task. The eye-tracking parameters saccadic length, number of fixations visual coverage and scrutiny timer per film were measured for all subjects and compared. The missed nodules fixated and not fixated were also determined for the radiologist group. Results have shown distinct stylistic differences in the visual scanning strategies between the experienced and inexperienced observers that we believe can be generalized into a description of characteristics of expert versus non-expert performance. The findings will be used in the educational program of image interpretation for non-radiology practitioners.

  8. Nevada National Security Site Environmental Report 2010

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada Nationalmore » Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less

  9. ICPP environmental monitoring report, CY 1989

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1991-01-01

    Summarized in this report are the data collected through Environmental Monitoring programs conducted at the Idaho Chemical Processing Plant (ICPP) by the Environmental Assurance (EA) Section of the Environmental Compliance and SIS Operations (EC/SIS) Department. Published in response to DOE Order 5484.1, Chap. 3, this report covers the period from December 20, 1988 through December 19, 1989. The ICPP is responsible for complying with all applicable Federal, State, Local and DOE Rules, Regulations and Orders. Radiological effluent and emissions are regulated by the DOE in accordance with the Derived Concentration Guides (DCGs) as presented in DOE Order 5,400.05, and themore » State of Idaho Maximum Permissible Concentrations (MPCs). The Environmental Protection Agency (EPA) regulates all nonradiological waste resulting from the ICPP operations including all airborne, liquid, and solid waste. The EA Section completed a Quality Assurance (QA) Plan for Environmental Monitoring activities during the third quarter of 1986. QA activities have resulted in the ICPP's implementation of the Environmental Protection Agency rules and guidelines pertaining to the Collection, analyses, and reporting of environmentally related samples. Where no approved methods for analyses existed for radionuclides, currently used methods were submitted for the EPA approval. 17 figs., 11 tabs.« less

  10. Hazelwood Interim Storage Site annual environmental report for calendar year 1991, Hazelwood, Missouri

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1992-09-01

    This document describes the environmental monitoring program at the Hazelwood Interim Storage Site (HISS) and surrounding area, implementation of the program, and monitoring results for 1991. Environmental monitoring of HISS began in 1984 when the site was assigned to the US Department of Energy (DOE) as part of the decontamination research and development project authorized by Congress under the 1984 Energy and Water Development Appropriations Act. DOE placed responsibility for HISS under the Formerly Utilized Sites Remedial Action Program (FUSRAP), a DOE program to decontaminate or otherwise control sites where residual radioactive materials remain from the early years of themore » nation`s atomic energy program or from commercial operations causing conditions that Congress has authorized DOE to remedy. The environmental monitoring program at HISS includes sampling networks for radon concentrations in air; external gamma radiation exposure; and radium-226, thorium-230, and total uranium concentrations in surface water, sediment, and groundwater. Additionally, several nonradiological parameters are measured in groundwater. Monitoring results are compared with applicable Environmental Protection Agency standards, DOE derived concentration guides (DCGs), dose limits, and other requirements in DOE orders. Environmental standards and DCGs are established to protect public health and the environment.« less

  11. Radiology Undergraduate and Resident Curricula: A Narrative Review of the Literature

    PubMed Central

    Linaker, Kathleen L.

    2015-01-01

    Objective The purpose of this study was to examine the literature regarding radiology curricula for both undergraduates and residents. Methods A review of the literature was performed using relevant key words. Articles were retrieved through December 2012 using PubMed, ScienceDirect, ERIC, Proquest, and ICL databases along with a manual review of references. Results Of the 4716 unique abstracts reviewed by the author, 142 were found to be relevant to the purpose of this study. Undergraduate radiology education, radiology curriculum, and radiology pedagogy vary widely between disciplines and between colleges within disciplines. Formal radiology education is not taught at all medical programs and little radiology training is incorporated into non-radiology residencies. This results in some medical graduates not being taught how to interpret basic radiology images and not learning contraindications and indications for ordering diagnostic imaging tests. There are no definitive studies examining how to incorporate radiology into the curriculum, how to teach radiology to either undergraduates or residents, or how to assess this clinical competency. Conclusions This review shows that radiology education is perceived to be important in undergraduate and residency programs. However, some programs do not include radiology training, thus graduates from those programs do not learn radiology essentials. PMID:26770172

  12. Effects of radiation type and delivery mode on a radioresistant eukaryote Cryptococcus neoformans

    PubMed Central

    Shuryak, Igor; Bryan, Ruth A.; Broitman, Jack; Marino, Stephen A.; Morgenstern, Alfred; Apostolidis, Christos; Dadachova, Ekaterina

    2015-01-01

    Introduction Most research on radioresistant fungi, particularly on human pathogens such as Cryptococcus neoformans, involves sparsely-ionizing radiation. Consequently, fungal responses to densely-ionizing radiation, which can be harnessed to treat life-threatening fungal infections, remain incompletely understood. Methods We addressed this issue by quantifying and comparing the effects of densely-ionizing α-particles (delivered either by external beam or by 213Bi-labeled monoclonal antibodies), and sparsely-ionizing 137Cs γ-rays, on Cryptococus neoformans. Results The best-fit linear-quadratic parameters for clonogenic survival were the following: α=0.24×10−2 Gy−1 for γ-rays and 1.07×10−2 Gy−1 for external-beam α-particles, and β=1.44×10−5 Gy−2 for both radiation types. Fungal cell killing by radiolabeled antibodies was consistent with predictions based on the α-particle dose to the cell nucleus and the linear-quadratic parameters for external-beam α-particles. The estimated RBE (for α-particles vs γ-rays) at low doses was 4.47 for the initial portion of the α-particle track, and 7.66 for the Bragg peak. Non-radiological antibody effects accounted for up to 23% of cell death. Conclusions These results quantify the degree of C. neoformans resistance to densely-ionizing radiations, and show how this resistance can be overcome with fungus-specific radiolabeled antibodies. PMID:25800676

  13. Commercial Decommissioning at DOE's Rocky Flats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Freiboth, C.; Sandlin, N.; Schubert, A.

    2002-02-25

    Due in large part to the number of nuclear facilities that make up the DOE complex, DOE-EM work has historically been paperwork intensive and driven by extensive regulations. Requirements for non-nuclear facilities are often grouped with those of nuclear facilities, driving up costs. Kaiser-Hill was interested in applying a commercial model to demolition of these facilities and wanted to apply necessary and sufficient standards to the work activities, but avoid applying unnecessary requirements. Faced with demolishing hundreds of uncontaminated or non-radiologically contaminated facilities, Kaiser-Hill has developed a subcontracting strategy to drastically reduce the cost of demolishing these facilities at Rockymore » Flats. Aiming to tailor the demolition approach of such facilities to more closely follow commercial practices, Kaiser-Hill recently released a Request for Proposals (RFP) for the demolition of the site's former central administration facility. The RFP significantly reduced requirements for compliance with specific DOE directives. Instead, the RFP required subcontractors to comply with health and safety requirements commonly found in the demolition of similar facilities in a commercial setting. This resulted in a number of bids from companies who have normally not bid on DOE work previously and at a reduced cost over previous approaches. This paper will discuss the details of this subcontracting strategy.« less

  14. Inhibition of poly(ADP-ribose)polymerase-1 and DNA repair by uranium

    PubMed Central

    Cooper, Karen L.; Dashner, Erica J.; Tsosie, Ranalda; Cho, Young Mi; Lewis, Johnnye

    2015-01-01

    Uranium has radiological and non-radiological effects within biological systems and there is increasing evidence for genotoxic and carcinogenic properties attributable to uranium through its heavy metal properties. In this study, we report that low concentrations of uranium (as uranyl acetate; <10 μM) is not cytotoxic to human embryonic kidney cells or normal human keratinocytes; however, uranium exacerbates DNA damage and cytotoxicity induced by hydrogen peroxide, suggesting that uranium may inhibit DNA repair processes. Concentrations of uranyl acetate in the low micromolar range inhibited the zinc finger DNA repair protein poly(ADP-ribose) polymerase (PARP)-1 and caused zinc loss from PARP-1 protein. Uranyl acetate exposure also led to zinc loss from the zinc finger DNA repair proteins Xeroderma Pigmentosum, Complementation Group A (XPA) and aprataxin (APTX). In keeping with the observed inhibition of zinc finger function of DNA repair proteins, exposure to uranyl acetate enhanced retention of induced DNA damage. Co-incubation of uranyl acetate with zinc largely overcame the impact of uranium on PARP-1 activity and DNA damage. These findings present evidence that low concentrations of uranium can inhibit DNA repair through disruption of zinc finger domains of specific target DNA repair proteins. This may provide a mechanistic basis to account for the published observations that uranium exposure is associated with DNA repair deficiency in exposed human populations. PMID:26627003

  15. Inhibition of poly(ADP-ribose)polymerase-1 and DNA repair by uranium.

    PubMed

    Cooper, Karen L; Dashner, Erica J; Tsosie, Ranalda; Cho, Young Mi; Lewis, Johnnye; Hudson, Laurie G

    2016-01-15

    Uranium has radiological and non-radiological effects within biological systems and there is increasing evidence for genotoxic and carcinogenic properties attributable to uranium through its heavy metal properties. In this study, we report that low concentrations of uranium (as uranyl acetate; <10 μM) is not cytotoxic to human embryonic kidney cells or normal human keratinocytes; however, uranium exacerbates DNA damage and cytotoxicity induced by hydrogen peroxide, suggesting that uranium may inhibit DNA repair processes. Concentrations of uranyl acetate in the low micromolar range inhibited the zinc finger DNA repair protein poly(ADP-ribose) polymerase (PARP)-1 and caused zinc loss from PARP-1 protein. Uranyl acetate exposure also led to zinc loss from the zinc finger DNA repair proteins Xeroderma Pigmentosum, Complementation Group A (XPA) and aprataxin (APTX). In keeping with the observed inhibition of zinc finger function of DNA repair proteins, exposure to uranyl acetate enhanced retention of induced DNA damage. Co-incubation of uranyl acetate with zinc largely overcame the impact of uranium on PARP-1 activity and DNA damage. These findings present evidence that low concentrations of uranium can inhibit DNA repair through disruption of zinc finger domains of specific target DNA repair proteins. This may provide a mechanistic basis to account for the published observations that uranium exposure is associated with DNA repair deficiency in exposed human populations. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Demmer, Rick; Fox, Don; Reese, Stephen

    The Idaho National Laboratory (INL) and the United Kingdom (UK) National Nuclear Laboratory (NNL) have been collaborating for several years on materials and methods for the fogged/misted introduction of fixatives into radiologically contaminated facilities. The objective of the project is to deliver a process for reducing airborne radiological and/or mercury contamination and affixing loose contamination in place, thereby reducing contamination risk to employees and decreasing D&D cost and schedule. The developed process provides a reliable, unmanned method of introducing a coating that captures and fixes contamination in place within facilities. The INL coating, termed FX2, has undergone extensive non-radiological testing,more » including determination that it is non-flammable, affixes contamination and flows well through unusual geometries (testing at Florida International University). A series of non-active fogging trials for activity knock/tie-down application have been completed at NNL Workington on behalf of Idaho National Laboratory (INL). These trials performed by the NNL employed commercially available agricultural fogging equipment and the INL’s knock/tie-down latex formulation (FX-2). This testing successfully demonstrated the ability of the fogging devices to successfully spray the FX-2 formulation within various scenarios, and prepared the project for a radioactive trial. The INL has also developed a mercury vapor reducing form of the coating termed FX-Hg, which has shown great promise in laboratory studies.« less

  17. Respiratory tract deposition efficiencies: evaluation of effects from smoke released in the Cerro Grande forest fire.

    PubMed

    Schöllnberger, H; Aden, J; Scott, B R

    2002-01-01

    Forest-fire smoke inhaled by humans can cause various health effects. This smoke contains toxic chemicals and naturally occurring radionuclides. In northern New Mexico, a large wildfire occurred in May 2000. Known as the Cerro Grande Fire, it devastated the town of Los Alamos and damaged Los Alamos National Laboratory (LANL). Residents were concerned about the possible dissemination of radionuclides from LANL via smoke from the fire. To evaluate potential health effects of inhaling radionuclides contained in the smoke from the Cerro Grande Fire, it was first necessary to evaluate how much smoke would deposit in the human respiratory tract. The purpose of this study was to evaluate respiratory-tract deposition efficiencies of airborne forest-fire smoke for persons of different ages exposed while inside their homes. Potential non-radiological health effects of a forest fire are reviewed. The deposition efficiencies presented can be used to evaluate in-home smoke deposition in the respiratory tract and expected radionuclide intake related to forest fires. The impact of smoke exposure on firemen fighting a forest fire is quantitatively discussed and compared. They primarily inhaled forest-fire smoke while outdoors where the smoke concentration was much higher than inside. Radionuclides released at the LANL site via the Cerro Grande Fire were restricted to naturally occurring radionuclides from burning trees and vegetation. Radiation doses from inhaled airborne radionuclides to individuals inside and outside the Los Alamos area were likely very small.

  18. Implementation of the integrated approach in different types of exposure scenarios.

    PubMed

    Copplestone, D; Hirth, G; Johansen, M; Lazo, E; Takala, J; Sakai, K; Yankovich, T

    2018-01-01

    The International Commission on Radiological Protection (ICRP) recognises three types of exposure situations: planned, existing, and emergency. In all three situations, the release of radionuclides into the natural environment leads to exposures of non-human biota, as well as the potential for exposures of the public. This paper describes how the key principles of the ICRP system of radiological protection apply to non-human biota and members of the public in each of these exposure situations. Current work in this area within ICRP Task Group 105 is highlighted. For example, how simplified numeric criteria may be used in planned exposure situations that are protective of both the public and non-human biota. In emergency exposure situations, the initial response will always be focused on human protection; however, understanding the potential impacts of radionuclide releases on non-human biota will likely become important in terms of communication as governments and the public seek to understand the exposures that are occurring. For existing exposure situations, there is a need to better understand the potential impacts of radionuclides on animals and plants, especially when deciding on protective actions. Understanding the comparative impacts from radiological, non-radiological, and physical aspects is often important in managing the remediation of legacy sites. Task Group 105 is making use of case studies of how exposure situations have been managed in the past to provide additional guidance and advice for the protection of non-human biota.

  19. A Picture is Worth 1,000 Words. The Use of Clinical Images in Electronic Medical Records.

    PubMed

    Ai, Angela C; Maloney, Francine L; Hickman, Thu-Trang; Wilcox, Allison R; Ramelson, Harley; Wright, Adam

    2017-07-12

    To understand how clinicians utilize image uploading tools in a home grown electronic health records (EHR) system. A content analysis of patient notes containing non-radiological images from the EHR was conducted. Images from 4,000 random notes from July 1, 2009 - June 30, 2010 were reviewed and manually coded. Codes were assigned to four properties of the image: (1) image type, (2) role of image uploader (e.g. MD, NP, PA, RN), (3) practice type (e.g. internal medicine, dermatology, ophthalmology), and (4) image subject. 3,815 images from image-containing notes stored in the EHR were reviewed and manually coded. Of those images, 32.8% were clinical and 66.2% were non-clinical. The most common types of the clinical images were photographs (38.0%), diagrams (19.1%), and scanned documents (14.4%). MDs uploaded 67.9% of clinical images, followed by RNs with 10.2%, and genetic counselors with 6.8%. Dermatology (34.9%), ophthalmology (16.1%), and general surgery (10.8%) uploaded the most clinical images. The content of clinical images referencing body parts varied, with 49.8% of those images focusing on the head and neck region, 15.3% focusing on the thorax, and 13.8% focusing on the lower extremities. The diversity of image types, content, and uploaders within a home grown EHR system reflected the versatility and importance of the image uploading tool. Understanding how users utilize image uploading tools in a clinical setting highlights important considerations for designing better EHR tools and the importance of interoperability between EHR systems and other health technology.

  20. Surface Environmental Surveillance Project: Locations Manual Volume 1 – Air and Water Volume 2 – Farm Products, Soil & Vegetation, and Wildlife

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fritz, Brad G.; Patton, Gregory W.; Stegen, Amanda

    2009-01-01

    This report describes all environmental monitoring locations associated with the Surface Environmental Surveillance Project. Environmental surveillance of the Hanford site and surrounding areas is conducted by the Pacific Northwest National Laboratory (PNNL) for the U.S. Department of Energy (DOE). Sampling is conducted to evaluate levels of radioactive and nonradioactive pollutants in the Hanford environs, as required in DOE Order 450.1, Environmental Protection Program, and DOE Order 5400.5, Radiation Protection of the Public and the Environment. The environmental surveillance sampling design is described in the Hanford Site Environmental Monitoring Plan, United States Department of Energy, Richland Operation Office (DOE/RL-91-50). This documentmore » contains the locations of sites used to collect samples for the Surface Environmental Surveillance Project (SESP). Each section includes directions, maps, and pictures of the locations. A general knowledge of roads and highways on and around the Hanford Site is necessary to successfully use this manual. Supplemental information (Maps, Gazetteer, etc.) may be necessary if user is unfamiliar with local routes. The SESP is a multimedia environmental surveillance effort to measure the concentrations of radionuclides and chemicals in environmental media to demonstrate compliance with applicable environmental quality standards and public exposure limits, and assessing environmental impacts. Project personnel annually collect selected samples of ambient air, surface water, agricultural products, fish, wildlife, and sediments. Soil and vegetation samples are collected approximately every 5 years. Analytical capabilities include the measurement of radionuclides at very low environmental concentrations and, in selected media, nonradiological chemicals including metals, anions, volatile organic compounds, and total organic carbon.« less

  1. Intracranial imaging of uncommon diseases is more frequently reported in clinical publications than in radiology publications.

    PubMed

    Lehman, V T; Doolittle, D A; Hunt, C H; Eckel, L J; Black, D F; Schwartz, K M; Diehn, F E

    2014-01-01

    Descriptions of uncommon diseases with intracranial imaging abnormalities are often difficult to find in the radiology literature. We hypothesized that reported imaging findings of such conditions in the recent literature were more frequent in clinical compared with radiology journals. PubMed searches from December 1, 2007 to December 1, 2012 were performed for 5 uncommon CNS diseases with intracranial imaging manifestations: 1) Susac syndrome; 2) amyloid β-related angiitis; 3) Parry-Romberg syndrome/en coup de sabre; 4) transient lesion of the splenium of the corpus callosum; and 5) reversible cerebral vasoconstriction syndrome. Articles were classified as a case report, case series, or original research. Journals were categorized as radiology or clinical. The 1- and 5-year Impact Factors of the journals were recorded. Two hundred two articles were identified for the 5 diseases, including 151 (74%) case reports, 26 case series (13%), and 25 original research articles (13%); 179 (89%) were published in nonradiology journals, compared with 23 (11%) in radiology journals. There was no significant difference between the mean 1- and 5-year Impact Factors of the radiology and clinical journals. Recent reports of the selected uncommon diseases with intracranial manifestations are more frequent in clinical journals when compared with dedicated radiology publications. Most publications are case reports. Radiologists should review both radiology and clinical journals when reviewing imaging features of uncommon diseases affecting the brain. Lack of reporting on such disease in the radiology literature may have significant practice, educational, and research implications for the radiology community.

  2. US Department of Energy Nevada Operations Office annual site environmental report: 1993. Volume 1

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Black, S.C.; Glines, W.M.; Townsend, Y.E.

    1994-09-01

    Monitoring and surveillance on and around the Nevada Test Site (NTS) by DOE contractors and NTS user organizations during 1993 indicated that operations on the NTS were conducted in compliance with applicable federal and DOE guidelines, i.e., the dose the maximally exposed offsite individual could have received was less than 0.04 percent of the 10 mrem per year guide for air exposure. No nuclear tests were conducted due to the moratorium. All discharges of radioactive liquids remained onsite in containment ponds, and there was no indication of potential migration of radioactivity to the offsite area through groundwater. Surveillance around themore » NTS indicated that airborne radioactivity from diffusion, evaporation of effluents, or resuspension was not detectable offsite, and no measurable net exposure to members of the offsite population was detected through the offsite dosimetry program. Using the CAP88-PC model and NTS radionuclide emissions data, the calculated effective dose equivalent to the maximally exposed individual offsite would have been 0.004 mrem. Any person receiving this dose would also have received 97 mrem from natural background radiation. There were no nonradiological releases to the offsite area. Hazardous wastes were shipped offsite to approved disposal facilities. Compliance with the various regulations stemming from the National Environmental Policy Act is being achieved and, where mandated, permits for air and water discharges and waste management have been obtained from the appropriate agencies. Support facilities at off-NTS locations compiled with the requirements of air quality permits and state or local wastewater discharge and hazardous waste permits.« less

  3. Environmental monitoring, restoration and assessment: What have we learned

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gray, R.H.

    1990-01-01

    The Twenty-Eighth Hanford Symposium on Health and the Environment was held in Richland, Washington, October 16--19, 1989. The symposium was sponsored by the US Department of Energy and the Pacific Northwest Laboratory, operated by Battelle Memorial Institute. The symposium was organized to review and evaluate some of the monitoring and assessment programs that have been conducted or are currently in place. Potential health and environmental effects of energy-related and other industrial activities have been monitored and assessed at various government and private facilities for over three decades. Most monitoring is required under government regulations; some monitoring is implemented because facilitymore » operators consider it prudent practice. As a result of these activities, there is now a substantial radiological, physical, and chemical data base for various environmental components, both in the United States and abroad. Symposium participants, both platform and poster presenters, were asked to consider, among other topics, the following: Has the expenditure of millions of dollars for radiological monitoring and assessment activities been worth the effort How do we decide when enough monitoring is enough Can we adequately assess the impacts of nonradiological components -- both inorganic and organic -- of wastes Are current regulatory requirements too restrictive or too lenient Can monitoring and assessment be made more cost effective Papers were solicited in the areas of environmental monitoring; environmental regulations; remediation, restoration, and decommissioning; modeling and dose assessment; uncertainty, design, and data analysis; and data management and quality assurance. Individual reports are processed separately for the databases.« less

  4. Executive summary: Weldon Spring Site Environmental Report for calendar year 1992. Weldon Spring Site Remedial Action Project, Weldon Spring, Missouri

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1993-06-01

    This report has been prepared to provide information about the public safety and environmental protection programs conducted by the Weldon Spring Site Remedial Action Project. The Weldon Spring site is located in southern St. Charles County, Missouri, approximately 48 km (30 mi) west of St. Louis. The site consists of two main areas, the Weldon Spring Chemical Plant and raffinate pits and the Weldon Spring Quarry. The objectives of the Site Environmental Report are to present a summary of data from the environmental monitoring program, to characterize trends and environmental conditions at the site, and to confirm compliance with environmentalmore » and health protection standards and requirements. The report also presents the status of remedial activities and the results of monitoring these activities to assess their impacts on the public and environment. The scope of the environmental monitoring program at the Weldon Spring site has changed since it was initiated. Previously, the program focused on investigations of the extent and level of contaminants in the groundwater, surface waters, buildings, and air at the site. In 1992, the level of remedial activities required monitoring for potential impacts of those activities, particularly on surface water runoff and airborne effluents. This report includes monitoring data from routine radiological and nonradiological sampling activities. These data include estimates of dose to the public from the Weldon Spring site; estimates of effluent releases; and trends in groundwater contaminant levels. Also, applicable compliance requirements, quality assurance programs, and special studies conducted in 1992 to support environmental protection programs are reviewed.« less

  5. INEEL AIR MODELING PROTOCOL ext

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidancemore » for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.« less

  6. Maywood Interim Storage Site: Annual environmental report for calendar year 1990, Maywood, New Jersey

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1991-09-01

    Environmental monitoring of the US Department of Energy's (DOE) Maywood Interim Storage Site (MISS) and surrounding area began in 1984. MISS is part of the Formerly Utilized Sites Remedial Action Program (FUSRAP), a DOE program to decontaminate or otherwise control sites where residual radioactive materials remain from the early years of the nation's atomic energy program or from commercial operations causing conditions that Congress has authorized DOE to remedy. The MISS Environmental monitoring programs was established to accommodate facility characteristics, applicable regulations, hazard potential, quantities and concentrations of materials released, extent and use of affected land and water, and localmore » public interest or concern. The environmental monitoring program at MISS includes sampling networks for radon concentrations in air; external gamma radiation exposure; and total uranium, radium-226, and thorium-232 concentrations in surface water, sediment, and groundwater. Additionally, several nonradiological parameters are measured in surface water, sediment, and groundwater. Monitoring results are compared with applicable Environmental Protection Agency (EPA) standards; federal, state, and local applicable or relevant and appropriate requirements (ARARs); and/or DOE derived concentration guidelines (DCGs). Environmental standards, ARARs, and DCGs are established to protect public health and the environment. Results from the 1990 environmental monitoring program show that concentrations of the contaminants of concern were all below applicable standards. Because the site is used only for interim storage and produces no processing effluents, all monitoring, except for radon and direct gamma radiation, was done on a quarterly basis. 18 refs., 17 figs., 28 tabs.« less

  7. Quality assurance in ultrasound screening for hepatocellular carcinoma using a standardized phantom and standard clinical images: a 3-year national investigation in Korea.

    PubMed

    Choi, Joon-Il; Jung, Seung Eun; Kim, Pyo Nyun; Cha, Sang Hoon; Jun, Jae Kwan; Lee, Hoo-Yeon; Park, Eun-Cheol

    2014-06-01

    The purpose of this study was to investigate the quality of ultrasound (US) imaging for hepatocellular carcinoma screening. The investigation was performed at all medical institutes participating in the National Cancer Screening Program in Korea. For assessment of personnel, we inquired who was performing the US screenings. For phantom image evaluation, the dead zone, vertical and horizontal measurements, axial and lateral resolution, sensitivity, and gray scale/dynamic range were evaluated. For clinical image evaluation, US images of patients were evaluated in terms of the standard images, technical information, overall image quality, appropriateness of depth, foci, annotations, and the presence of any artifacts. Failure rates for phantom and clinical image evaluations at general hospitals, smaller hospitals, and private clinics were 20.9%, 24.5%, 24.1% and 5.5%, and 14.8% and 9.5%, respectively. No statistically significant difference was observed in the failure rates for the phantom images among groups of different years of manufacture. For the clinical image evaluation, the results of radiologists were significantly better than those of other professional groups (P = .0001 and .0004 versus nonradiology physicians and nonphysicians, respectively). The failure rate was also higher when the storage format was analog versus digital (P < .001). Approximately 20% of US scanners failed the phantom image evaluation. The year of scanner manufacture was not significantly associated with the results of the phantom image evaluation. The quality of the clinical images obtained by radiologists was the best. © 2014 by the American Institute of Ultrasound in Medicine.

  8. A reference standard-based quality assurance program for radiology.

    PubMed

    Liu, Patrick T; Johnson, C Daniel; Miranda, Rafael; Patel, Maitray D; Phillips, Carrie J

    2010-01-01

    The authors have developed a comprehensive radiology quality assurance (QA) program that evaluates radiology interpretations and procedures by comparing them with reference standards. Performance metrics are calculated and then compared with benchmarks or goals on the basis of published multicenter data and meta-analyses. Additional workload for physicians is kept to a minimum by having trained allied health staff members perform the comparisons of radiology reports with the reference standards. The performance metrics tracked by the QA program include the accuracy of CT colonography for detecting polyps, the false-negative rate for mammographic detection of breast cancer, the accuracy of CT angiography detection of coronary artery stenosis, the accuracy of meniscal tear detection on MRI, the accuracy of carotid artery stenosis detection on MR angiography, the accuracy of parathyroid adenoma detection by parathyroid scintigraphy, the success rate for obtaining cortical tissue on ultrasound-guided core biopsies of pelvic renal transplants, and the technical success rate for peripheral arterial angioplasty procedures. In contrast with peer-review programs, this reference standard-based QA program minimizes the possibilities of reviewer bias and erroneous second reviewer interpretations. The more objective assessment of performance afforded by the QA program will provide data that can easily be used for education and management conferences, research projects, and multicenter evaluations. Additionally, such performance data could be used by radiology departments to demonstrate their value over nonradiology competitors to referring clinicians, hospitals, patients, and third-party payers. Copyright 2010 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  9. Prioritization methodology for the decommissioning of nuclear facilities: a study case on the Iraq former nuclear complex.

    PubMed

    Jarjies, Adnan; Abbas, Mohammed; Monken Fernandes, Horst; Wong, Melanie; Coates, Roger

    2013-05-01

    There are a number of sites in Iraq which have been used for nuclear activities and which contain potentially significant amounts of radioactive waste. The principal nuclear site being Al-Tuwaitha. Many of these sites suffered substantial physical damage during the Gulf Wars and have been subjected to subsequent looting. All require decommissioning in order to ensure both radiological and non-radiological safety. However, it is not possible to undertake the decommissioning of all sites and facilities at the same time. Therefore, a prioritization methodology has been developed in order to aid the decision-making process. The methodology comprises three principal stages of assessment: i) a quantitative surrogate risk assessment ii) a range of sensitivity analyses and iii) the inclusion of qualitative modifying factors. A group of Tuwaitha facilities presented the highest risk among the evaluated ones, followed by a middle ranking grouping of Tuwaitha facilities and some other sites, and a relatively large group of lower risk facilities and sites. The initial order of priority is changed when modifying factors are taken into account. It has to be considered the Iraq's isolation from the international nuclear community over the last two decades and the lack of experienced personnel. Therefore it is appropriate to initiate decommissioning operations on selected low risk facilities at Tuwaitha in order to build capacity and prepare for work to be carried out in more complex and potentially high hazard facilities. In addition it is appropriate to initiate some prudent precautionary actions relating to some of the higher risk facilities. Copyright © 2012 Elsevier Ltd. All rights reserved.

  10. Breakdowns in communication of radiological findings: an ethical and medico-legal conundrum

    PubMed Central

    Murphy, Daniel R.; Singh, Hardeep

    2016-01-01

    Communication problems in diagnostic testing have increased in both number and importance in recent years. The medical and legal impact of failure of communication is dramatic. Over the past decades, the courts have expanded and strengthened the duty imposed on radiologists to timely communicate radiologic abnormalities to referring physicians and perhaps the patients themselves in certain situations. The need to communicate these findings goes beyond strict legal requirements: there is a moral imperative as well. The Code of Medical Ethics of the American Medical Association points out that “Ethical values and legal principles are usually closely related, but ethical obligations typically exceed legal duties.” Thus, from the perspective of the law, radiologists are required to communicate important unexpected findings to referring physicians in a timely fashion, or alternatively to the patients themselves. From a moral perspective, radiologists should want to effect such communications. Practice standards, moral values, and ethical statements from professional medical societies call for full disclosure of medical errors to patients affected by them. Surveys of radiologists and non-radiologic physicians reveal that only few would divulge all aspects of the error to the patient. In order to encourage physicians to disclose errors to patients and assist in protecting them in some manner if malpractice litigation follows, more than 35 states have passed laws that do not allow a physician’s admission of an error and apologetic statements to be revealed in the courtroom. Whether such disclosure increases or decreases the likelihood of a medical malpractice lawsuit is unclear, but ethical and moral considerations enjoin physicians to disclose errors and offer apologies. PMID:27006891

  11. Radiologic discrepancies in children with special healthcare needs in a pediatric emergency department.

    PubMed

    Festekjian, Ara; Kwan, Karen Y; Chang, Todd P; Lai, Hollie; Fahit, Margil; Liberman, Danica B

    2017-12-21

    After-hours radiologic interpretation by nonradiology attendings or resident radiologists introduces the risk of discrepancies. Clinical outcomes following radiologic discrepancies among pediatric emergency department (ED) patients are poorly described. In particular, children with special healthcare needs (CSHCN), have more opportunities for discrepancies and potential consequences than non- CSHCN. Our objective was to determine the rates and types of radiologic discrepancies, and to compare CSHCN to non-CSHCN. From July 2014 to February 2015, all children who underwent a diagnostic imaging study at a free-standing children's ED were included. Data collected included radiologic studies - type and location - and clinical details - chief complaint and CSHCN type. Differences between preliminary reads and final pediatric radiology attending reads were defined as discrepancies, and categorized by clinical significance. Descriptive statistics, z-tests, and chi-square were used. Over 8months, 8310 visits (7462 unique patients) had radiologic studies (2620 CSHCN, 5690 non-CSHCN). A total of 198 (2.4%) radiologic discrepancies [56 (28.3%) CSHCN, 142 (71.7%) non-CSHCN] were found. Chief complaints for CSCHN were more often within the cardiac, pulmonary and neurologic systems (p<0.001 for each), whereas non-CSHCN presented with more trauma (p<0.001). The rates of discrepancies (CSHCN 2.1%, non- CSHCN 2.5%, p=0.3) and severity of clinical consequences (p=0.6) were not significantly different between CSHCN and non-CSHCN. Though the frequency and type of radiologic studies performed between CSHCN and non-CSHCN were different, we found no significant difference in the rate of radiologic discrepancies or the rate of clinically significant radiologic discrepancies. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Inhibition of poly(ADP-ribose)polymerase-1 and DNA repair by uranium

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cooper, Karen L.; Dashner, Erica J.; Tsosie, Ranalda

    Uranium has radiological and non-radiological effects within biological systems and there is increasing evidence for genotoxic and carcinogenic properties attributable to uranium through its heavy metal properties. In this study, we report that low concentrations of uranium (as uranyl acetate; < 10 μM) is not cytotoxic to human embryonic kidney cells or normal human keratinocytes; however, uranium exacerbates DNA damage and cytotoxicity induced by hydrogen peroxide, suggesting that uranium may inhibit DNA repair processes. Concentrations of uranyl acetate in the low micromolar range inhibited the zinc finger DNA repair protein poly(ADP-ribose) polymerase (PARP)-1 and caused zinc loss from PARP-1 protein.more » Uranyl acetate exposure also led to zinc loss from the zinc finger DNA repair proteins Xeroderma Pigmentosum, Complementation Group A (XPA) and aprataxin (APTX). In keeping with the observed inhibition of zinc finger function of DNA repair proteins, exposure to uranyl acetate enhanced retention of induced DNA damage. Co-incubation of uranyl acetate with zinc largely overcame the impact of uranium on PARP-1 activity and DNA damage. These findings present evidence that low concentrations of uranium can inhibit DNA repair through disruption of zinc finger domains of specific target DNA repair proteins. This may provide a mechanistic basis to account for the published observations that uranium exposure is associated with DNA repair deficiency in exposed human populations. - Highlights: • Low micromolar concentration of uranium inhibits polymerase-1 (PARP-1) activity. • Uranium causes zinc loss from multiple DNA repair proteins. • Uranium enhances retention of DNA damage caused by ultraviolet radiation. • Zinc reverses the effects of uranium on PARP activity and DNA damage repair.« less

  13. Geographic Patterns of Radiology Referrals in the United States: A Descriptive Network Analysis.

    PubMed

    Liao, Geraldine J; Liao, Joshua M; Cook, Tessa S

    2018-06-01

    To provide a nationwide description of radiology referral patterns for Medicare beneficiaries and network-based measures that can describe and monitor shifts in referral patterns. We linked publicly available Medicare data with the National Plan and Provider Enumeration System data set to analyze 3,925,366 encounters representing referrals from nonradiology referrers to diagnostic radiology providers in 2015. We assessed per-state referral volume as well as in-state and in-region referrals and the correlation between state referral volume and in-state referrals. Additionally, we applied the conceptual framework of networks to create two measures to evaluate referrer-radiologist connections within each state: number of referrer relationships and referral density index (RDI). In 2015, there was considerable variation in in-state referrals across states, and the correlation between state referral volume and in-state referrals was low (0.18). Across census regions, in-region referrals were high (84.3% in the South to 89.2% in the Midwest). Across states, the mean number of referrer relationships ranged from 7.0 in Utah to 25.0 in California, and the number of referrer relationships varied significantly within states. Radiology provider RDI also varied both within and across states, with mean radiology provider RDI spanning from 0.05 in Kansas to 0.25 in Hawaii. In a nationwide description of geographic patterns in radiology referrals among Medicare beneficiaries, we demonstrate wide variation in radiology referral patterns and utilized network methods to develop two measures that can be used in the future to monitor shifts in referral patterns. Copyright © 2018 American College of Radiology. All rights reserved.

  14. What does the shape of our back tell us? Correlation between sacrum orientation and lumbar lordosis.

    PubMed

    Schmidt, Hendrik; Bashkuev, Maxim; Weerts, Jeronimo; Altenscheidt, Joern; Maier, Christoph; Reitmaier, Sandra

    2018-04-01

    Sacral slope and lumbar lordosis (LL) have been studied extensively in recent years via X-ray examinations and strongly correlate with each other. This raises, first, the question of the reproducibility of this correlation in multiple standing phases and, second, if this correlation can be achieved using non-radiological measurement tools. This study aimed (1) to determine the extent to which the back-shape measurements correspond to the correlations between the sacral slope and LL found in previous radiological investigations, (2) to identify a possible effect of age and gender on this correlation, and (3) to evaluate the extent to which this correlation is affected by repeated standing phases. This is an observational cohort study. A total of 410 asymptomatic subjects (non-athletes), 21 asymptomatic soccer players (athletes), and 176 patients with low back pain (LBP) were included. The correlation between sacrum orientation (SO) and LL was determined in six repetitive upright standing postures. A non-invasive strain-gauge based measuring system was used. Back-shape measurements yielded a similar correlation to that measured in previous X-ray examinations. The coefficient of determination (R 2 ) between SO and LL ranged between 0.76 and 0.79 for the asymptomatic cohort. Athletes showed the strongest correlation (0.76≤R 2 ≤0.84). For patients with LBP, the correlation substantially decreased (0.18≤R 2 ≤0.39). R 2 was not strongly affected by repeated standing phases. The correlation between SO and LL can be assessed by surface measurements of the back shape and is not influenced by natural variations in the standing posture. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Colonie Interim Storage Site annual environmental report for calendar year 1991, Colonie, New York

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1992-09-01

    This document describes the environmental monitoring program at the Colonie Interim Storage Site (CISS) and surrounding area, implementation of the program, and monitoring results for 1991. Environmental monitoring at CISS began in 1984 when Congress added the site to the US Department of Energy's Formerly Utilized Sites Remedial Action Program. CISS property and surrounding areas were radioactively contaminated by operations conducted by National Lead Industries, which manufactured various components from uranium and thorium from 1958 to 1984. The environmental monitoring program at CISS includes sampling networks for external gamma radiation exposure and for radium-226, thorium-232, and total uranium concentrations inmore » surface water, sediment, and groundwater. Additionally, several nonradiological parameters are measured in groundwater. In 1992 the program will also include sampling networks for radioactive and chemical contaminants in stormwater to meet permit application requirements under the Clean Water Act. Monitoring results are compared with applicable Environmental Protection Agency (EPA) standards, DOE derived concentration guides (DCGs), dose limits, and other requirements in DOE.orders. Environmental standards are established to protect public health and the environment. Results of environmental monitoring during 1991 indicate that average concentrations of radioactive contaminants of concern were well below applicable standards and DCGS. Concentrations of some chemical contaminants in groundwater were above-the New York State Department of Environmental Conservation (Class GA) and EPA guidelines for drinking water. The potential annual radiation exposure (excluding background) calculated for a hypothetical maximally exposed individual is 0.23 mrem (milliroentgen equivalent man), which is less than an individual would receive while traveling in an airplane at 12,000 meters (39,000 feet) for one hour.« less

  16. Colonie Interim Storage Site annual environmental report for calendar year 1991, Colonie, New York. Formerly Utilized Sites Remedial Action Program (FUSRAP)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1992-09-01

    This document describes the environmental monitoring program at the Colonie Interim Storage Site (CISS) and surrounding area, implementation of the program, and monitoring results for 1991. Environmental monitoring at CISS began in 1984 when Congress added the site to the US Department of Energy`s Formerly Utilized Sites Remedial Action Program. CISS property and surrounding areas were radioactively contaminated by operations conducted by National Lead Industries, which manufactured various components from uranium and thorium from 1958 to 1984. The environmental monitoring program at CISS includes sampling networks for external gamma radiation exposure and for radium-226, thorium-232, and total uranium concentrations inmore » surface water, sediment, and groundwater. Additionally, several nonradiological parameters are measured in groundwater. In 1992 the program will also include sampling networks for radioactive and chemical contaminants in stormwater to meet permit application requirements under the Clean Water Act. Monitoring results are compared with applicable Environmental Protection Agency (EPA) standards, DOE derived concentration guides (DCGs), dose limits, and other requirements in DOE.orders. Environmental standards are established to protect public health and the environment. Results of environmental monitoring during 1991 indicate that average concentrations of radioactive contaminants of concern were well below applicable standards and DCGS. Concentrations of some chemical contaminants in groundwater were above-the New York State Department of Environmental Conservation (Class GA) and EPA guidelines for drinking water. The potential annual radiation exposure (excluding background) calculated for a hypothetical maximally exposed individual is 0.23 mrem (milliroentgen equivalent man), which is less than an individual would receive while traveling in an airplane at 12,000 meters (39,000 feet) for one hour.« less

  17. Utilization Trends in Diagnostic Imaging for a Commercially Insured Population: A Study of Massachusetts Residents 2009 to 2013.

    PubMed

    Flaherty, Stephen; Mortele, Koenraad J; Young, Gary J

    2018-06-01

    To report utilization trends in diagnostic imaging among commercially insured Massachusetts residents from 2009 to 2013. Current Procedural Terminology codes were used to identify diagnostic imaging claims in the Massachusetts All-Payer Claims Database for the years 2009 to 2013. We reported utilization and spending annually by imaging modality using total claims, claims per 1,000 individuals, total expenditures, and average per claim payments. The number of diagnostic imaging claims per insured MA resident increased only 0.6% from 2009 to 2013, whereas nonradiology claims increased by 6% annually. Overall diagnostic imaging expenditures, adjusted for inflation, were 27% lower in 2009 than 2013, compared with an 18% increase in nonimaging expenditures. Average payments per claim were lower in 2013 than 2009 for all modalities except nuclear medicine. Imaging procedure claims per 1,000 MA residents increased from 2009 to 2013 by 13% in MRI, from 147 to 166; by 17% in ultrasound, from 453 to 530; and by 12% in radiography (x-ray), from 985 to 1,100. However, CT claims per 1,000 fell by 37%, from 341 to 213, and nuclear medicine declined 57%, from 89 claims per 1,000 to 38. Diagnostic imaging utilization exhibited negligible growth over the study period. Diagnostic imaging expenditures declined, largely the result of falling payments per claim in most imaging modalities, in contrast with increased utilization and spending on nonimaging services. Utilization of MRI, ultrasound, and x-ray increased from 2009 to 2013, whereas CT and nuclear medicine use decreased sharply, although CT was heavily impacted by billing code changes. Copyright © 2018 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  18. Preliminary risk assessment of the Mexican Spotted Owl under a spatially-weighted foraging regime at the Los Alamos National Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gallegos, A.F.; Gonzales, G.J.; Bennett, K.D.

    The Record of Decision on the Dual Axis Radiographic Hydrodynamic Test Facility at the Los Alamos National Laboratory requires that the Department of Energy takes special precautions to protect the Mexican Spotted Owl (Strix occidentalis lucida). In order to do so, risk to the owl presented by radiological and nonradiological contaminants must be estimated. A preliminary risk assessment on the Mexican Spotted Owl in two Ecological Exposure Units (EEUs) was performed using a modified Environmental Protection Agency Quotient method, the FORTRAN model ECORSK4, and a geographic information system. Estimated doses to the owl under a spatially-weighted foraging regime were comparedmore » against toxicological reference doses generating hazard indices (HIs) and hazard quotients (HQs) for three risk source types. The average HI was 0.20 for EEU-21 and 0.0015 for EEU-40. Under the risk parameter assumptions made, hazard quotient results indicated no unacceptable risk to the owl, including a measure of cumulative effects from multiple contaminants that assumes a linear additive toxicity type. An HI of 1.0 was used as the evaluative criteria for determining the acceptability of risk. This value was exceeded (1.06) in only one of 200 simulated potential nest sites. Cesium-137, Ni, {sup 239}Pu, Al and {sup 234}U we`re among the constituents with the highest partial HQs. Improving model realism by weighting simulated owl foraging based on distance from potential nest sites decreased the estimated risk by 72% (0.5 HI units) for EEU-21 and by 97.6% (6.3E-02 HI units) for EEU-40. Information on risk by specific geographical location was generated, which can be used to manage contaminated areas, owl habitat, facility siting, and/or facility operations in order to maintain risk from contaminants at acceptably low levels.« less

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bostick, W.D.; Hoffmann, D.P.; Stevenson, R.J.

    The category of sludges, filter cakes, and other waste processing residuals represent the largest volume of low-level mixed (hazardous and radioactive) wastes within the US Department of Energy (DOE) complex. Treatment of these wastes to minimize the mobility of contaminants, and to eliminate the presence of free water, is required under the Federal Facility Compliance Act agreements between DOE and the Environmental Protection Agency. In the text, we summarize the currently available data for several of the high priority mixed-waste sludge inventories within DOE. Los Alamos National Laboratory TA-50 Sludge and Rocky Flats Plant By-Pass Sludge are transuranic (TRU)-contaminated sludgesmore » that were isolated with the use of silica-based filter aids. The Oak Ridge Y-12 Plant West End Treatment Facility Sludge is predominantly calcium carbonate and biomass. The Oak Ridge K-25 Site Pond Waste is a large-volume waste stream, containing clay, silt, and other debris in addition to precipitated metal hydroxides. We formulate ``simulants`` for the waste streams described above, using cerium oxide as a surrogate for the uranium or plutonium present in the authentic material. Use of nonradiological surrogates greatly simplifies material handling requirements for initial treatability studies. The use of synthetic mixtures for initial treatability testing will facilitate compositional variation for use in conjunction with statistical design experiments; this approach may help to identify any ``operating window`` limitations. The initial treatability testing demonstrations utilizing these ``simulants`` will be based upon vitrification, although the materials are also amenable to testing grout-based and other stabilization procedures. After the feasibility of treatment and the initial evaluation of treatment performance has been demonstrated, performance must be verified using authentic samples of the candidate waste stream.« less

  20. Shoreham Nuclear Power Plant

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1992-12-31

    The United States Supreme Court, with PG&E and Silkwood, and in the eight years since, has expanded the acceptable extent of state regulation of commercial nuclear power plants. In PG&E, the Court established the acceptability of state regulation that purports to be concerned with the non-radiological aspects of nuclear plant operations but that, as a practical matter, is concerned with their radiological hazards. In Silkwood, the Court established the acceptability of state regulation of radiological hazards when its impact on federal regulation of radiological hazards is indirect and incidental. Finally, in Goodyear and English, the Court confirmed and elaborated onmore » such state regulation. Subject to political demands either for additional involvement in commercial nuclear power plant regulation or from political interests opposed altogether to nuclear power, some states, in the 1980s, sought to expand even further the involvement of state and local governments in nuclear plant regulation. Indeed, some states sought and in some instances acquired, through innovative and extraordinary means, a degree of involvement in the regulation of radiological hazards that seriously erodes and undermines the role of the federal government in such regulation. In particular, the State of New York concluded with the Long Island Lighting Company (LILCO), in February 1989, an agreement for the purchase of New York of the Shoreham nuclear power plant on Long Island. A response to failed efforts by New York to prevent the issuance by the NRC of a license to LILCO to operate the plant, the agreement was concluded to allow New York to close the plant either altogether or to convert it to a fossil fuel facility. The opposition to the sale of Shoreham is discussed.« less