Internet Attack Traceback: Cross-Validation and Pebble-Trace
2013-02-28
stolen-cyber-attack. [3] Hacked: Data breach costly for Ohio State, victims of compromised info http://www.thelantern.com/campus/hacked- data ... breach -costly-for-ohio-state-victims-of-compromised-info-1.1831311. [4] S. C. Lee and C. Shields, “Tracing the Source of Network Attack: A Technical
Trauma and traumatic neurosis: Freud's concepts revisited.
Zepf, Siegfried; Zepf, Florian D
2008-04-01
The authors examine Freud 's concepts of 'trauma', 'protective shield against stimuli ' and 'traumatic neurosis' in the light of recent findings. 'Protective shield against stimuli' is regarded as a biological concept which appears in mental life as the striving to avoid unpleasant affects. 'Trauma' is a twofold concept in that it relates to mental experience and links an external event with the specific after-effects on an individual 's psychic reality. A distinction needs to be made between mentally destructive trauma and affective trauma. A destructive trauma does not break through the protective shield but does breach the pleasure-unpleasure principle, so that in the course of its subsequent mastery it leads to a traumatic neurosis. An affective trauma can be warded off under the rule of the pleasure-unpleasure principle and leads to a psychoneurosis.
System and method for liquid silicon containment
Cliber, James A; Clark, Roger F; Stoddard, Nathan G; Von Dollen, Paul
2013-05-28
This invention relates to a system and a method for liquid silicon containment, such as during the casting of high purity silicon used in solar cells or solar modules. The containment apparatus includes a shielding member adapted to prevent breaching molten silicon from contacting structural elements or cooling elements of a casting device, and a volume adapted to hold a quantity of breaching molten silicon with the volume formed by a bottom and one or more sides.
System and method for liquid silicon containment
Cliber, James A; Clark, Roger F; Stoddard, Nathan G; Von Dollen, Paul
2014-06-03
This invention relates to a system and a method for liquid silicon containment, such as during the casting of high purity silicon used in solar cells or solar modules. The containment apparatus includes a shielding ember adapted to prevent breaching molten silicon from contacting structural elements or cooling elements of a casting device, and a volume adapted to hold a quantity of breaching molten silicon with the volume formed by a bottom and one or more sides.
The Catalog in the Courtroom: From Shield to Sword?
ERIC Educational Resources Information Center
Davenport, David
1985-01-01
Legal issues concerning the content and use of the college catalog are reviewed, including the catalog's changing role as a consumer document, misrepresentation, violation of statute, breach of contract, court interpretations, and remedies. Colleges are cautioned to take great care in using catalogs, for legal and administrative reasons. (MSE)
Once More unto the Breaching Experiment: Reconsidering a Popular Pedagogical Tool
ERIC Educational Resources Information Center
Braswell, Matthew
2014-01-01
Instructors frequently utilize breaching experiments in an attempt to "bring sociology to life." However, an uncritical embrace of breaching experiments obscures the complexity of their possible effects on participants and subjects. These experiments have real potential to inflict deleterious consequences on individuals and groups.…
Atkinson, Theresa P; Matthews, Russell A; Henderson, Alexandra A; Spitzmueller, Christiane
2018-01-30
Grounded in affective events theory, we investigated the effects of experimentally manipulated psychological contract breaches on participants' feelings of violation, subsequent perceptions of psychological contract strength, and organizational citizenship behaviours in a sample of working adults. Results support previous findings that pre-existing relational psychological contract strength interacts with severity of unmet promises or expectations. Specifically, individuals with high relational contracts who experience low severity of unmet promises/expectations have the lowest breach perceptions, whereas individuals with high relational contracts who experience more severe levels unmet promises/expectations experience the highest level of breach perceptions. Results also support the concept of a breach spiral in that prior perceptions of breach led to an increased likelihood of subsequent perceptions of breach following the experimental manipulation. Furthermore, consistent with affective events theory, results support the argument that a psychological contract breach's effect on specific organizational citizenship behaviours is mediated by feelings of violation and the reassessment of relational contracts. These effects were present even after controlling for the direct effects of the manipulated severity of unmet promises/expectations. Copyright © 2018 John Wiley & Sons, Ltd.
Shielding Flowers Developing under Stress: Translating Theory to Field Application
Chayut, Noam; Sobol, Shiri; Nave, Nahum; Samach, Alon
2014-01-01
Developing reproductive organs within a flower are sensitive to environmental stress. A higher incidence of environmental stress during this stage of a crop plants’ developmental cycle will lead to major breaches in food security. Clearly, we need to understand this sensitivity and try and overcome it, by agricultural practices and/or the breeding of more tolerant cultivars. Although passion fruit vines initiate flowers all year round, flower primordia abort during warm summers. This restricts the season of fruit production in regions with warm summers. Previously, using controlled chambers, stages in flower development that are sensitive to heat were identified. Based on genetic analysis and physiological experiments in controlled environments, gibberellin activity appeared to be a possible point of horticultural intervention. Here, we aimed to shield flowers of a commercial cultivar from end of summer conditions, thus allowing fruit production in new seasons. We conducted experiments over three years in different settings, and our findings consistently show that a single application of an inhibitor of gibberellin biosynthesis to vines in mid-August can cause precocious flowering of ~2–4 weeks, leading to earlier fruit production of ~1 month. In this case, knowledge obtained on phenology, environmental constraints and genetic variation, allowed us to reach a practical solution. PMID:27135506
Effects of an electric field on white sharks: in situ testing of an electric deterrent.
Huveneers, Charlie; Rogers, Paul J; Semmens, Jayson M; Beckmann, Crystal; Kock, Alison A; Page, Brad; Goldsworthy, Simon D
2013-01-01
Elasmobranchs can detect minute electromagnetic fields, <1 nV cm(-1), using their ampullae of Lorenzini. Behavioural responses to electric fields have been investigated in various species, sometimes with the aim to develop shark deterrents to improve human safety. The present study tested the effects of the Shark Shield Freedom7™ electric deterrent on (1) the behaviour of 18 white sharks (Carcharodon carcharias) near a static bait, and (2) the rates of attacks on a towed seal decoy. In the first experiment, 116 trials using a static bait were performed at the Neptune Islands, South Australia. The proportion of baits taken during static bait trials was not affected by the electric field. The electric field, however, increased the time it took them to consume the bait, the number of interactions per approach, and decreased the proportion of interactions within two metres of the field source. The effect of the electric field was not uniform across all sharks. In the second experiment, 189 tows using a seal decoy were conducted near Seal Island, South Africa. No breaches and only two surface interactions were observed during the tows when the electric field was activated, compared with 16 breaches and 27 surface interactions without the electric field. The present study suggests that the behavioural response of white sharks and the level of risk reduction resulting from the electric field is contextually specific, and depends on the motivational state of sharks.
Effects of an Electric Field on White Sharks: In Situ Testing of an Electric Deterrent
Huveneers, Charlie; Rogers, Paul J.; Semmens, Jayson M.; Beckmann, Crystal; Kock, Alison A.; Page, Brad; Goldsworthy, Simon D.
2013-01-01
Elasmobranchs can detect minute electromagnetic fields, <1 nVcm–1, using their ampullae of Lorenzini. Behavioural responses to electric fields have been investigated in various species, sometimes with the aim to develop shark deterrents to improve human safety. The present study tested the effects of the Shark Shield Freedom7™ electric deterrent on (1) the behaviour of 18 white sharks (Carcharodon carcharias) near a static bait, and (2) the rates of attacks on a towed seal decoy. In the first experiment, 116 trials using a static bait were performed at the Neptune Islands, South Australia. The proportion of baits taken during static bait trials was not affected by the electric field. The electric field, however, increased the time it took them to consume the bait, the number of interactions per approach, and decreased the proportion of interactions within two metres of the field source. The effect of the electric field was not uniform across all sharks. In the second experiment, 189 tows using a seal decoy were conducted near Seal Island, South Africa. No breaches and only two surface interactions were observed during the tows when the electric field was activated, compared with 16 breaches and 27 surface interactions without the electric field. The present study suggests that the behavioural response of white sharks and the level of risk reduction resulting from the electric field is contextually specific, and depends on the motivational state of sharks. PMID:23658766
Model Experiment on the Temporary Closure of a Breached Bank
NASA Astrophysics Data System (ADS)
Shimada, T.; Maeda, S.; Nakashima, Y.
2016-12-01
In recent years, the possibility of river bank failures has been rising due to increased occurrences of floods from localized torrential downpours and typhoons. To mitigate bank failure damage, we made an experiment to simulate the flood discharge reduction effect of a temporary closure at an opening in a breached bank. A scale river model was used. A bank was made and then breached. Then, model blocks were placed to close the breach, to observe the flood discharge reduction afforded by the closure. We assumed that the blocks would be placed by a crane or from a helicopter, so we placed the model blocks accordingly. Regardless of the placement method, the flood discharge reduction was about 20% when about 50% of the breach was closed by the placement of blocks starting from the upstream-most portion of the breach. That result was because the water flow hit the tip of the placed closure, scoured the bed near the tip, and lowered the bed at the remaining part of the breach opening, after which the area where water flows out did not decrease at the same rate as the rate of longitudinal closure for the breach. In addition, with each successive length of breach closure, the required number of blocks increased and the closure progress decreased, because of the bed degradation. The results show that it is possible to reduce the flood flow from a bank breach effectively while closing the opening by taking measures to reduce bed scouring near the breach.
Fulfill Promises and Avoid Breaches to Retain Satisfied, Committed Nurses.
Rodwell, John; Ellershaw, Julia
2016-07-01
This study examines two commonly proposed mechanisms, violation and trust, to see if they mediate the relationships between the components of the psychological contract (i.e., promises, fulfillment, and breach) and their impact on the work-related outcomes of job satisfaction, intent to quit, and organizational commitment. Online surveys were completed by 459 Australian nurses. Structural equation modeling revealed that breach and fulfillment have direct and mediated effects on the outcomes, whereas promises had no impact. Violation partially mediated the relationship between breach and job satisfaction and intent to quit, while trust partially mediated the relationships between fulfillment and organizational commitment, and breach and organizational commitment. Negative experiences (i.e., breaches) were related to both increased feelings of violation and decreased feelings of trust. In contrast, positive experiences (i.e., fulfillment) increased trust but did not significantly reduce feelings of violation. Nurse and organizational managers can use these findings to improve communication with nurses so as to minimize the negative effects of breach and maximize the positive effects of fulfillment and thus improve attitudes. Nurse managers need to be careful to make promises regarding their nurses' employment that they can fulfill and to particularly avoid breaking the psychological contract. The potentially disproportionate negative effect of breach means that a breach can undo a lot of efforts to fulfill employment-related promises. © 2016 Sigma Theta Tau International.
Strategic Sealift for Desert Shield not a Blue Print for the Future
1991-06-21
the requirements of the Department of Operations. The contents of this paper reflect our own personal views and are not necessarily endorsed by the...answers without breaching operational security most telephone and personal interviews were held on a non- attributable basis. However, we feel that there...MV is LT Jack Lu:uus. MV !st LT Baldomero Lopez and MV PFC Dwayne T. Williams) commanded by Capt. Charles E. Aaker , USN. also got underway on August
I Am So Tired… How Fatigue May Exacerbate Stress Reactions to Psychological Contract Breach.
Achnak, Safâa; Griep, Yannick; Vantilborgh, Tim
2018-01-01
Previous research showed that perceptions of psychological contract (PC) breach have undesirable individual and organizational consequences. Surprisingly, the PC literature has paid little to no attention to the relationship between PC breach perceptions and stress. A better understanding of how PC breach may elicit stress seems crucial, given that stress plays a key role in employees' physical and mental well-being. Based on Conservation of Resources Theory, we suggest that PC breach perceptions represent a perceived loss of valued resources, subsequently leading employees to experience higher stress levels resulting from emerging negative emotions. Moreover, we suggest that this mediated relationship is moderated by initial levels of fatigue, due to fatigue lowering the personal resources necessary to cope with breach events. To tests our hypotheses, we analyzed the multilevel data we obtained from two experience sampling designs (Study 1: 51 Belgian employees; Study 2: 53 US employees). Note that the unit of analysis is "observations" rather than "respondents," resulting in an effective sample size of 730 (Study 1) and 374 (Study 2) observations. In both studies, we found evidence for the mediating role of negative emotions in the PC breach-stress relationship. In the second study, we also found evidence for the moderating role of fatigue in the mediated PC breach-stress relationship. Implications for research and practice are discussed.
Controls on the breach geometry and flood hydrograph during overtopping of non-cohesive earthen dams
Walder, Joseph S.; Iverson, Richard M.; Godt, Jonathan W.; Logan, Matthew; Solovitz, Stephen A.
2015-01-01
Overtopping failure of non-cohesive earthen dams was investigated in 13 large-scale experiments with dams built of compacted, damp, fine-grained sand. Breaching was initiated by cutting a notch across the dam crest and allowing water escaping from a finite upstream reservoir to form its own channel. The channel developed a stepped profile, and upstream migration of the steps, which coalesced into a headcut, led to the establishment of hydraulic control (critical flow) at the channel head, or breach crest, an arcuate erosional feature that functions hydraulically as a weir. Novel photogrammetric methods, along with underwater videography, revealed that the retreating headcut maintained a slope near the angle of friction of the sand, while the cross section at the breach crest maintained a geometrically similar shape through time. That cross-sectional shape was nearly unaffected by slope failures, contrary to the assumption in many models of dam breaching. Flood hydrographs were quite reproducible--for sets of dams ranging in height from 0.55 m to 0.98 m--when the time datum was chosen as the time that the migrating headcut intersected the breach crest. Peak discharge increased almost linearly as a function of initial dam height. Early-time variability between flood hydrographs for nominally identical dams is probably a reflection of subtle experiment-to-experiment differences in groundwater hydrology and the interaction between surface water and groundwater.
Making Sociology Relevant: The Assignment and Application of Breaching Experiments
ERIC Educational Resources Information Center
Rafalovich, Adam
2006-01-01
Breaching experiments involve the conscious exhibition of "unexpected" behavior, an observation of the types of social reactions such behavioral violations engender, and an analysis of the social structure that makes these social reactions possible. The conscious violation of norms can be highly fruitful for sociology students, providing insights…
Intermittent ephemeral river-breaching
NASA Astrophysics Data System (ADS)
Reniers, A. J.; MacMahan, J. H.; Gallagher, E. L.; Shanks, A.; Morgan, S.; Jarvis, M.; Thornton, E. B.; Brown, J.; Fujimura, A.
2012-12-01
In the summer of 2011 we performed a field experiment in Carmel River State Beach, CA, at a time when the intermittent natural breaching of the ephemeral Carmel River occurred due to an unusually rainy period prior to the experiment associated with El Nino. At this time the river would fill the lagoon over the period of a number of days after which a breach would occur. This allowed us to document a number of breaches with unique pre- and post-breach topographic surveys, accompanying ocean and lagoon water elevations as well as extremely high flow (4m/s) velocities in the river mouth during the breaching event. The topographic surveys were obtained with a GPS-equipped backpack mounted on a walking human and show the evolution of the river breaching with a gradually widening and deepening river channel that cuts through the pre-existing beach and berm. The beach face is qualified as a steep with an average beach slope of 1:10 with significant reflection of the incident waves (MacMahan et al., 2012). The wave directions are generally shore normal as the waves refract over the deep canyon that is located offshore of the beach. The tide is mixed semi-diurnal with a range on the order of one meter. Breaching typically occurred during the low-low tide. Grain size is highly variable along the beach with layers of alternating fine and coarse material that could clearly be observed as the river exit channel was cutting through the beach. Large rocky outcroppings buried under the beach sand are also present along certain stretches of the beach controlling the depth of the breaching channel. The changes in the water level measured within the lagoon and the ocean side allows for an estimate of the volume flux associated with the breach as function of morphology, tidal elevation and wave conditions as well as an assessment of the conditions and mechanisms of breach closure, which occurred on the time scale of O(0.5 days). Exploratory model simulations will be presented at the conference examining the processes responsible for the development of the river breaching from the initial stages to a wide-open river flow and subsequent closure.
2007-03-01
50 million over the 2007-2011 period. However, if the VA were to experience another data breach similar to the recent incident involving 17...compromised in some manner. Excluding the recent incident, the average number of people affected by a data breach has been about 50,000. The...suggests that all of the financial losses to a company that experiences a data breach of privacy information will quickly be reflected in the stock
Growth and collapse of Waianae volcano, Hawaii, as revealed by exploration of its submarine flanks
Coombs, Michelle L.; Clague, David A.; Moore, Gregory F.; Cousens, Brian L.
2004-01-01
Wai‘anae Volcano comprises the western half of O‘ahu Island, but until recently little was known about the submarine portion of this volcano. Seven new submersible dives, conducted in 2001 and 2002, and multibeam bathymetry offshore of Wai‘anae provide evidence pertaining to the overall growth of the volcano's edifice as well as the timing of collapses that formed the Wai‘anae slump complex. A prominent slope break at ∼1400 mbsl marks the paleoshoreline of Wai‘anae at the end of its shield-building stage and wraps around Ka‘ena Ridge, suggesting that this may have been an extension of Wai‘anae's northwest rift zone. Subaerially erupted tholeiitic lavas were collected from a small shield along the crest of Ka‘ena Ridge. The length of Wai‘anae's south rift zone is poorly constrained but reaches at least 65 km on the basis of recovered tholeiite pillows at this distance from the volcano's center. Wai‘anae's growth was marked by multiple collapse and deformation events during and after its shield stage, resulting in the compound mass wasting features on the volcano's southwest flank (Wai‘anae slump complex). The slump complex, one of the largest in Hawai‘i, covering an area of ∼5500 km2, is composed of several distinct sections on the basis of morphology and the lithologies of recovered samples. Two dives ascended the outer bench of the slump complex and collected predominantly low-S tholeiites that correlate with subaerial lavas erupted early during the volcano's shield stage, from 3.9 to 3.5 Ma. Pillow lavas from the outer bench have Pb, Sr, and Nd isotopic values that overlap with previously published subaerial Wai‘anae lavas. On the basis of the compositions of the recovered samples, the main body of the slump complex, as represented by the outer bench, probably formed during and shortly after the early shield stage. To the southwest of the outer bench lies a broad debris field on the seafloor, interpreted to have formed by a catastrophic collapse event that breached the outer bench. A dive within the debris field recovered subaerially derived volcaniclastic rocks; analyzed glasses are tholeiitic and resemble early shield stage compositions. The breach may have then been filled by slumping material from the main volcanic edifice. Finally, atop the northern main body of the slump is a rotated landslide block that detached from the proximal part of Ka‘ena Ridge after the volcano's late shield stage (3.2 to 3.0 Ma). From the inner scarp of this block we recovered subaerially erupted tholeiitic pillow breccias and hyaloclastites that are systematically higher in alkalis and more fractionated than those collected from the outer bench. These rocks correlate compositionally with late shield-stage subaerial Kamaile‘unu lavas. None of the collected slump complex samples correlate with alkalic subaerial postshield lavas. Volcaniclastic rocks and glass disseminated in pelagic sediment, collected from north of Ka‘ena Ridge, originated from Wai‘anae's postshield stage and Ko‘olau's shield stage, respectively.
Antecedents of Psychological Contract Breach: The Role of Job Demands, Job Resources, and Affect
Vantilborgh, Tim; Bidee, Jemima; Pepermans, Roland; Griep, Yannick; Hofmans, Joeri
2016-01-01
While it has been shown that psychological contract breach leads to detrimental outcomes, relatively little is known about factors leading to perceptions of breach. We examine if job demands and resources predict breach perceptions. We argue that perceiving high demands elicits negative affect, while perceiving high resources stimulates positive affect. Positive and negative affect, in turn, influence the likelihood that psychological contract breaches are perceived. We conducted two experience sampling studies to test our hypotheses: the first using daily surveys in a sample of volunteers, the second using weekly surveys in samples of volunteers and paid employees. Our results confirm that job demands and resources are associated with negative and positive affect respectively. Mediation analyses revealed that people who experienced high job resources were less likely to report psychological contract breach, because they experienced high levels of positive affect. The mediating role of negative affect was more complex, as it increased the likelihood to perceive psychological contract breach, but only in the short-term. PMID:27171275
Antecedents of Psychological Contract Breach: The Role of Job Demands, Job Resources, and Affect.
Vantilborgh, Tim; Bidee, Jemima; Pepermans, Roland; Griep, Yannick; Hofmans, Joeri
2016-01-01
While it has been shown that psychological contract breach leads to detrimental outcomes, relatively little is known about factors leading to perceptions of breach. We examine if job demands and resources predict breach perceptions. We argue that perceiving high demands elicits negative affect, while perceiving high resources stimulates positive affect. Positive and negative affect, in turn, influence the likelihood that psychological contract breaches are perceived. We conducted two experience sampling studies to test our hypotheses: the first using daily surveys in a sample of volunteers, the second using weekly surveys in samples of volunteers and paid employees. Our results confirm that job demands and resources are associated with negative and positive affect respectively. Mediation analyses revealed that people who experienced high job resources were less likely to report psychological contract breach, because they experienced high levels of positive affect. The mediating role of negative affect was more complex, as it increased the likelihood to perceive psychological contract breach, but only in the short-term.
A laser profilometry technique for monitoring fluvial dike breaching in laboratory experiments
NASA Astrophysics Data System (ADS)
Dewals, Benjamin; Rifai, Ismail; Erpicum, Sébastien; Archambeau, Pierre; Violeau, Damien; Pirotton, Michel; El kadi Abderrezzak, Kamal
2017-04-01
A challenging aspect for experimental modelling of fluvial dike breaching is the continuous monitoring of the transient breach geometry. In dam breaching cases induced by flow overtopping over the whole breach crest (plane erosion), a side view through a glass wall is sufficient to monitor the breach formation. This approach can be extended for 3D dam breach tests (spatial erosion) if the glass wall is located along the breach centreline. In contrast, using a side view does not apply for monitoring fluvial dike breaching, because the breach is not symmetric in this case. We present a non-intrusive, high resolution technique to record the breach development in experimental models of fluvial dikes by means of a laser profilometry (Rifai et al. 2016). Most methods used for monitoring dam and dike breaching involve the projection of a pattern (fringes, grid) on the dam or dike body and the analysis of its deformation on images recorded during the breaching (e.g., Pickert et al. 2011, Frank and Hager 2014). A major limitation of these methods stems from reflection on the water surface, particularly in the vicinity of the breach where the free surface is irregular and rippled. This issue was addressed by Spinewine et al. (2004), who used a single laser sheet so that reflections on the water surface were strongly limited and did not hamper the accurate processing of each image. We have developed a similar laser profilometry technique tailored for laboratory experiments on fluvial dike breaching. The setup is simple and relatively low cost. It consists of a digital video camera (resolution of 1920 × 1080 pixels at 60 frames per second) and a swiping red diode 30 mW laser that enables the projection of a laser sheet over the dike body. The 2D image coordinates of each deformed laser profile incident on the dike are transformed into 3D object coordinates using the Direct Linear Transformation (DLT) algorithm. All 3D object coordinates computed over a swiping cycle of the laser are merged to generate a cloud of points. The DLT-based image processing method uses control points and reference axes, so that no prior knowledge is needed on the position, orientation and intrinsic characteristics of the camera, nor on the laser position. Refraction of the light and laser rays across the water surface needs to be taken into account, because the dike is partially submerged during the experiments. An ad hoc correction is therefore applied using the Snell-Descartes law. For this purpose, planar approximations are used to describe the shape of the water surface. In the presentation, we will discuss the resulting uncertainty and will detail the validation of the developed method based on configurations of known geometry with various complexity. The presented laser profilometry technique allows for a rapid non-intrusive measurement of the dike geometry evolution. It is readily available for laboratory experiments and has proven its performance (Rifai et al. 2017). Further adjustments are needed for its application to cohesive dike material due to the reduced visibility resulting from the higher turbidity of water. References Frank, P.-J., Hager, W.H. (2014). Spatial dike breach: Accuracy of photogrammetric measurement system. Proc. of the International Conference on Fluvial Hydraulics, River Flow 2014, 1647-1654. Pickert, G., Weitbrecht, V., Bieberstein A. (2011). Beaching of overtopped river embankments controlled by apparent cohesion. Journal of Hydraulic Research 49:143-156. Rifai, I., Erpicum, S., Archambeau, P., Violeau, D., Pirotton, M., El kadi Abderrezzak, K., Dewals, B. (2016). Monitoring topography of laboratory fluvial dike models subjected to breaching based on a laser profilometry technique. Proc. of the International Symposium on River Sedimentation (ISRS): Stuttgart, 19-22 September 2016. Rifai, I., Erpicum, S., Archambeau, P., Violeau, D., Pirotton, M., El kadi Abderrezzak, K., Dewals, B. (2017). Overtopping induced failure of non-cohesive, homogenous fluvial dikes. Water Resources Research, under revision. Spinewine, B., Delobbe, A., Elslander, L., Zech, Y. (2004). Experimental investigation of the breach growth process in sand dikes. Proc. of the International Conference on Fluvial Hydraulics, River Flow 2004, 2:983-991.
Deery, Stephen J; Iverson, Roderick D; Walsh, Janet T
2006-01-01
Experiences of psychological contract breach have been associated with a range of negative behavior. However, much of the research has focused on master of business administration alumni and managers and made use of self-reported outcomes. Studying a sample of customer service employees, the research found that psychological contract breach was related to lower organizational trust, which, in turn was associated with perceptions of less cooperative employment relations and higher levels of absenteeism. Furthermore, perceptions of external market pressures moderated the effect of psychological contract breach on absenteeism. The study indicated that psychological contract breach can arise when employees perceive discrepancies between an organization's espoused behavioral standards and its actual behavioral standards, and this can affect discretionary absence. (c) 2006 APA, all rights reserved.
Fluvial dike breaching due to overtopping: how different is it from dam breaching?
NASA Astrophysics Data System (ADS)
Rifai, Ismail; Erpicum, Sébastien; Archambeau, Pierre; Violeau, Damien; Pirotton, Michel; El kadi Abderrezzak, Kamal; Dewals, Benjamin
2017-04-01
During floods in large rivers, casualties and extent of damage are often aggravated by breach formation across fluvial dikes. The most frequent cause of breaching is flow overtopping. Predicting the breach geometry and associated outflow hydrograph is of critical importance for estimating the inundation characteristics in the floodplain and the resulting flood risk. Because fluvial dikes are built along a main channel that conveys flowing water, fluvial dike breaching differs from dam breaching, in which the embankment is built across the channel downstream of a reservoir. While a vast body of studies exists on dam breaching configuration (e.g., Schmocker et al. 2012, 2014, Müller et al. 2016), little is known on specific aspects of fluvial dike breaching. We performed laboratory experiments that highlight the specific erosion processes governing fluvial dike breaching (Rifai et al. 2017a). The experimental setup includes a 10 m long and 1 m wide main channel, separated from a floodplain by a 0.3 m high dike of trapezoidal cross-section. The dike material was homogeneous and made of uniform sand. A rectangular initial notch was cut in the crest to initiate 3D breaching. The breach development was monitored continuously using a self-developed laser profilometry technique (Rifai et al. 2016). The observations reveal that the breach develops in two stages. First, a combined breach deepening and widening occur, together with a gradual shift of the breach centreline toward the downstream side of the main channel. Later, the breach widening continues only toward the downstream side of the main channel, highlighting a significant influence of flow momentum in the main channel. Moreover, the breach cross-section is tilted toward the downstream end of the main channel, which is a signature of an asymmetric velocity distribution through the breach (Rifai et al. 2017b). When the inflow discharge in the main channel is increased, the breach development becomes much faster (e.g., seven times faster for a 150 % increase in the inflow discharge). When an equilibrium state is reached at the end of the test, the breach centreline orientation is found consistent with the theory of flow over a lateral weir. In the experiments, the boundary condition at the downstream end of the main channel is a lumped representation of river characteristics downstream of the breach section. In real-world conditions, these river characteristics influence the flow partition between the breach and the main channel. Therefore, we tested several downstream boundary conditions (perforated plane, rectilinear weir and sluice gate). For the same inflow discharge and water levels, they lead to significantly different breach geometries. The findings of this research shed light on key mechanisms occurring in fluvial dike breaching, which differ substantially from those in dam breaching. These specific features need to be incorporated in flood risk analyses involving fluvial dike breaching. This research also delivers a unique experimental database of high resolution continuous monitoring of the breach geometry under various flow conditions. The datasets are freely available for engineers and researchers willing to assess the performance of numerical models to simulate dike breaching and resulting flood. References Müller, C., Frank, P.-J., Hager, W.H. (2016). Dyke overtopping: effects of shape and headwater elevation. Journal of Hydraulic Research, 54(4), 410-422. Rifai, I., Erpicum, S., Archambeau, P., Violeau, D., Pirotton, M., El kadi Abderrezzak, K., Dewals, B. (2016). Monitoring topography of laboratory fluvial dike models subjected to breaching based on a laser profilometry technique. Proc. International Symposium on River Sedimentation (ISRS), 19-22 September 2016, Stuttgart. Rifai, I., Erpicum, S., Archambeau, P., Violeau, D., Pirotton, M., El kadi Abderrezzak, K., Dewals, B. (2017a). Overtopping induced failure of non-cohesive, homogenous fluvial dikes. Water Resources Research, under revision. Rifai, I., Erpicum, S., Archambeau, P., Violeau, D., Pirotton, M., El kadi Abderrezzak, K., Dewals, B. (2017b). Discussion of: Laboratory Study on 3D Flow Structures Induced by Zero-Height Side Weir and Implications for 1D Modeling. Journal of Hydraulic Engineering, 07016010. doi: 10.1061/(ASCE)HY.1943-7900.0001256 Schmocker, L., Frank, P.-J., Hager, W.H. (2014). Overtopping dike-breach: Effect of grain size distribution. Journal of Hydraulic Research, 52(4), 559-564. Schmocker, L., Hager, W.H. (2012). Plane dike-breach due to overtopping: Effects of sediment, dike height and discharge. Journal of Hydraulic Research, 50(6), 576-586.
I Am So Tired… How Fatigue May Exacerbate Stress Reactions to Psychological Contract Breach
Achnak, Safâa; Griep, Yannick; Vantilborgh, Tim
2018-01-01
Previous research showed that perceptions of psychological contract (PC) breach have undesirable individual and organizational consequences. Surprisingly, the PC literature has paid little to no attention to the relationship between PC breach perceptions and stress. A better understanding of how PC breach may elicit stress seems crucial, given that stress plays a key role in employees' physical and mental well-being. Based on Conservation of Resources Theory, we suggest that PC breach perceptions represent a perceived loss of valued resources, subsequently leading employees to experience higher stress levels resulting from emerging negative emotions. Moreover, we suggest that this mediated relationship is moderated by initial levels of fatigue, due to fatigue lowering the personal resources necessary to cope with breach events. To tests our hypotheses, we analyzed the multilevel data we obtained from two experience sampling designs (Study 1: 51 Belgian employees; Study 2: 53 US employees). Note that the unit of analysis is “observations” rather than “respondents,” resulting in an effective sample size of 730 (Study 1) and 374 (Study 2) observations. In both studies, we found evidence for the mediating role of negative emotions in the PC breach—stress relationship. In the second study, we also found evidence for the moderating role of fatigue in the mediated PC breach—stress relationship. Implications for research and practice are discussed. PMID:29559935
In-Package Chemistry Abstraction
DOE Office of Scientific and Technical Information (OSTI.GOV)
E. Thomas
2004-11-09
This report was developed in accordance with the requirements in ''Technical Work Plan for: Regulatory Integration Modeling and Analysis of the Waste Form and Waste Package'' (BSC 2004 [DIRS 171583]). The purpose of the in-package chemistry model is to predict the bulk chemistry inside of a breached waste package and to provide simplified expressions of that chemistry as function of time after breach to Total Systems Performance Assessment for the License Application (TSPA-LA). The scope of this report is to describe the development and validation of the in-package chemistry model. The in-package model is a combination of two models, amore » batch reactor model that uses the EQ3/6 geochemistry-modeling tool, and a surface complexation model that is applied to the results of the batch reactor model. The batch reactor model considers chemical interactions of water with the waste package materials and the waste form for commercial spent nuclear fuel (CSNF) waste packages and codisposed waste packages that contain both high-level waste glass (HLWG) and DOE spent fuel. The surface complexation model includes the impact of fluid-surface interactions (i.e., surface complexation) on the resulting fluid composition. The model examines two types of water influx: (1) the condensation of water vapor that diffuses into the waste package, and (2) seepage water that enters the waste package from the drift as a liquid. (1) Vapor Influx Case: The condensation of vapor onto the waste package internals is simulated as pure H2O and enters at a rate determined by the water vapor pressure for representative temperature and relative humidity conditions. (2) Water Influx Case: The water entering a waste package from the drift is simulated as typical groundwater and enters at a rate determined by the amount of seepage available to flow through openings in a breached waste package. TSPA-LA uses the vapor influx case for the nominal scenario for simulations where the waste package has been breached but the drip shield remains intact, so all of the seepage flow is diverted from the waste package. The chemistry from the vapor influx case is used to determine the stability of colloids and the solubility of radionuclides available for transport by diffusion, and to determine the degradation rates for the waste forms. TSPA-LA uses the water influx case for the seismic scenario, where the waste package has been breached and the drip shield has been damaged such that seepage flow is actually directed into the waste package. The chemistry from the water influx case that is a function of the flow rate is used to determine the stability of colloids and the solubility of radionuclides available for transport by diffusion and advection, and to determine the degradation rates for the CSNF and HLW glass. TSPA-LA does not use this model for the igneous scenario. Outputs from the in-package chemistry model implemented inside TSPA-LA include pH, ionic strength, and total carbonate concentration. These inputs to TSPA-LA will be linked to the following principle factors: dissolution rates of the CSNF and HLWG, dissolved concentrations of radionuclides, and colloid generation.« less
NASA Astrophysics Data System (ADS)
Velasquez Montoya, Liliana; Sciaudone, Elizabeth J.; Mitasova, Helena; Overton, Margery F.
2018-03-01
The Outer Banks of North Carolina is a wave-dominated barrier island system that has experienced the opening and closure of numerous inlets in the last four centuries. The most recent of those inlets formed after the breaching of Pea Island during Hurricane Irene in 2011. The Pea Island Breach experienced a rapid evolution including episodic curvature of the main channel, rotation of the ebb channel, shoaling, widening by Hurricane Sandy in 2012, and finally closing before the summer of 2013. Studying the life cycle of Pea Island Breach contributes to understanding the behavior of ephemeral inlets in breaching-prone regions. This topic has gained relevance due to rising sea levels, a phenomenon that increases the chances of ephemeral inlet formation during extreme events. This study explores the spatiotemporal effects of tides, waves, and storms on flow velocities and morphology of the breach by means of remotely sensed data, geospatial metrics, and a numerical model. The combined use of observations and results from modeling experiments allowed building a conceptual model to explain the life cycle of Pea Island Breach. Wave seasonality dominated the morphological evolution of the inlet by controlling the magnitude and direction of the longshore current that continuously built transient spits at both sides of the breach. Sensitivity analysis to external forcings indicates that ocean waves can modify water levels and velocities in the back barrier. Sound-side storm surge regulates overall growth rate, duration, and decay of peak water levels entering the inlet during extreme events.
NASA Astrophysics Data System (ADS)
Iulian Zăinescu, Florin; Vespremeanu-Stroe, Alfred; Tătui, Florin
2017-04-01
In this study, we document a case of exceptionally large natural breaching of a sandy spit (Sacalin barrier, Danube delta) using Lidar data and satellite imagery, annual (and seasonal) surveys of topography and bathymetry on successive cross-barrier profiles, and hourly datasets of wind and waves. The breach morphology and dynamics was monitored and described from its inception to closure, together with its impact on the adjoining features (upper shoreface, back-barrier lagoon, downdrift coast) and on the local sediment budgets. Breaching is first observed to occur on a beach-length of 0.5 km in April 2012 and two years later reached 3.5 km (May 2014). The barrier translates to a recovery stage dominated by continuous back-barrier deposition through subaqueous cross-breach sediment transport. Soon, the barrier widening triggers a negative feedback which limits the back-barrier sediment transfer. As a result, back-barrier deposition decreases whilst the barrier aggradation through overwash becomes more frequent. The event was found to be a natural experiment which switched the barrier's decadal evolution from low cross-shore transport to high cross-shore transport over the barrier. Although previously considered as constant, the cross-shore transport recorded during the large breach lifespan is an order of magnitude larger than in the non-breach period. 3 x 106 m3 of sediment were deposited in three years which is equivalent to the modelled longshore transport in the region. Nevertheless, the sediment circuits are more complex involving exchanges with the upper shoreface, as indicated by the extensive erosion down to -4m. In the absence of tides, the Sacalin breach closed naturally in 3 years and brings a valuable contribution on how breaches may evolve, as only limited data has been internationally reported until now. The very high deposition rate of sediment in the breach is a testimony of the high sediment volumes supplied by the longshore transport and the high sediment release through shoreface retreat, and resulted in widening the barrier to a maximum of 1 km. Since the newly-formed barrier shoreline got displaced backward up to 500 m, this reveals that barrier breaching is an important mechanism which significantly accelerates the landward migration of the barrier system and is a proof of the highly nonlinear morphodynamics involved in the barrier island translation. We demonstrate that the 2012-2015 event was an example of complex barrier breaching which has a substantial influence on the longer-term evolution of the spit. Studies of breaching help us understand the barrier evolution and will help coastal erosion risk management policy makers undertake better decisions on barrier management practice.
Experiences of using UAVs for monitoring levee breaches
NASA Astrophysics Data System (ADS)
Brauneck, J.; Pohl, R.; Juepner, R.
2016-11-01
During floods technical protection facilities are subjected to high loads and might fail as several examples have shown in the past. During the major 2002 and 2013 floods in the catchment area of the Elbe River (Germany), some breaching levees caused large inundations in the hinterland. In such situations the emergency forces need comprehensive and reliable realtime information about the situation, especially the breach enlargement and discharge, the spatial and temporal development of the inundation and the damages. After an impressive progress meanwhile unmanned aerial vehicles (UAV) also called remotely piloted aircraft systems (RPAS) are highly capable to collect and transmit precise information from not accessible areas to the task force very quickly. Using the example of the Breitenhagen levee failure near the Saale-Elbe junction in Germany in June 2013 the processing steps will be explained that are needed to come from the visual UAV-flight information to a hydronumeric model. Modelling of the breach was implemented using photogrammetric ranging methods, such as structure from motion and dense image matching. These methods utilize conventional digital multiple view images or videos recorded by either a moving aerial platform or terrestrial photography and allow the construction of 3D point clouds, digital surface models and orthophotos. At Breitenhagen, a UAV recorded the beginning of the levee failure. Due to the dynamic character of the breach and the moving areal platform, 4 different surface models show valid data with extrapolated breach widths of 9 to 40 meters. By means of these calculations the flow rate through the breach has been determined. In addition the procedure has been tested in a physical model, whose results will be presented too.
Psychic skin: psychotic defences, borderline process and delusions.
Schmidt, Martin
2012-02-01
In this paper, I apply the concept of psychic skin to analytic work with people suffering from personality disorders and psychoses. When psychoses emerge, the defensive skin which protects the ego is breached and violent unconscious forces rip through the personality. Some of the patients diagnosed as schizophrenic with whom I work have identified with archetypal characters such as Christ, Satan, John Lennon and the Queen. I attempt to show how the adoption of these inflated personas can serve as secondary psychic skins. Such delusional identifications can provide a protective shield to hide the denuded self and prevent intrusion from the external world. Through clinical example, I try to demonstrate how these archetypal 'second skins' can preserve life until internal and external conditions make it possible for the self to emerge. I contrast such psychotic identifications with 'thin-skinned' and 'thick-skinned' narcissism as well as 'defences of the self' in borderline states where the psychic skin may be damaged but does not disintegrate. I also look at the ways in which Jung's own personal experience was different from this and how he managed to avert psychotic breakdown. © 2012, The Society of Analytical Psychology.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kohli, R.; Gilbert, E.R.; Johnson, A.B.
1985-05-01
Two irradiated boiling water reactor fuel rods with breached cladding were exposed to argon and to air at 598 K for 7.56 Ms (2100 h). These tests were conducted to determine fuel swelling and cladding crack propagation under conditions that promote UO/sub 2/ fuel oxidation and to observe the behavior of water-logged breached fuel in an inert gas environment. The two rods were selected for testing after extensive hot cell examination had shown the cladding of both rods to be breached with several centimetres of open cracks; the cracks were characterized in detail before the test. As part of themore » experiment, the amount of the readily removable water contained in the fuel rods was determined. To oxidize the fuel to a significant level ( about10%), the air in the annealine capsule was replenished approximately daily. The depletion of oxygen available in the air capsule due to fuel oxidation occurred in about0.036 Ms (10 h). At the end of the test period, about6% of the fuel is estimated to have oxidized. Posttest examination of the rods showed that cladding degradation resulted from swelling due to oxidation of the fuel in the air environment. The cladding degradation was localized and fuel oxidation did not measurably extend beyond the cladding breach. No cladding degradation was measurable in the breached fuel rod tested in argon.« less
NASA Technical Reports Server (NTRS)
Norton, H. N.
1979-01-01
An earth-orbiting molecular shield that offers a unique opportunity for conducting physics, chemistry, and material processing experiments under a combination of environmental conditions that are not available in terrestrial laboratories is equipped with apparatus for forming a molecular beam from the freestream. Experiments are carried out using a moderate energy, high flux density, high purity atomic oxygen beam in the very low density environment within the molecular shield. As a minimum, the following instruments are required for the molecular shield: (1) a mass spectrometer; (2) a multifunction material analysis instrumentation system; and (3) optical spectrometry equipment. The design is given of a furlable molecular shield that allows deployment and retrieval of the system (including instrumentation and experiments) to be performed without contamination. Interfaces between the molecular shield system and the associated spacecraft are given. An in-flight deployment sequence is discussed that minimizes the spacecraft-induced contamination in the vicinity of the shield. Design approaches toward a precursor molecular shield system are shown.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Guiseppe, Vince
2013-10-01
The USD Majorana group focused all of its effort in support of the MAJORANA DEMONSTRATOR (MJD) experiment. Final designs of the shielding subsystems are complete. Construction of the MJD shielding systems at SURF has begun and the proposed activities directly support the completion of the shield systems. The PI and the group contribute heavily to the onsite construction activities of the MJD experiment. The group led investigations into neutron and neutron-induced backgrounds, shielding effectiveness and design, and radon backgrounds.
Perceived unfairness and employee health: a meta-analytic integration.
Robbins, Jordan M; Ford, Michael T; Tetrick, Lois E
2012-03-01
A growing body of research has suggested that the experience of injustice, psychological contract breach, or unfairness can adversely impact an employee's health. We conducted a meta-analysis to examine the effects of unfairness perceptions on health, examining types of fairness and methodological characteristics as moderators. Results suggested that perceptions of unfairness were associated with indicators of physical and mental health. Furthermore, psychological contract breach contributed to the prediction of strain-related indicators of health above and beyond that accounted for by injustice alone.
Mechanics of dual-mode dilative failure in subaqueous sediment deposits
NASA Astrophysics Data System (ADS)
You, Yao; Flemings, Peter; Mohrig, David
2014-07-01
We introduce dual-mode dilative failure with flume experiments. Dual-mode dilative failure combines slow and steady release of sediments by breaching with periodic sliding, which rapidly releases an internally coherent wedge of sediments. It occurs in dilative sandy deposits. This periodic slope failure results from cyclic evolution of the excess pore pressure in the deposit. Sliding generates large, transient, negative excess pore pressure that strengthens the deposit and allows breaching to occur. During breaching, negative excess pore pressure dissipates, the deposit weakens, and ultimately sliding occurs once again. We show that the sliding frequency is proportional to the coefficient of consolidation. We find that thicker deposits are more susceptible to dual-mode dilative failure. Discovery of dual-mode dilative failure provides a new mechanism to consider when interpreting the sedimentary deposits linked to submarine slope failures.
Data breach locations, types, and associated characteristics among US hospitals.
Gabriel, Meghan Hufstader; Noblin, Alice; Rutherford, Ashley; Walden, Amanda; Cortelyou-Ward, Kendall
2018-02-01
The objectives of this study were to describe the locations in hospitals where data are breached, the types of breaches that occur most often at hospitals, and hospital characteristics, including health information technology (IT) sophistication and biometric security capabilities, that may be predicting factors of large data breaches that affect 500 or more patients. The Office of Civil Rights breach data from healthcare providers regarding breaches that affected 500 or more individuals from 2009 to 2016 were linked with hospital characteristics from the Health Information Management Systems Society and the American Hospital Association Health IT Supplement databases. Descriptive statistics were used to characterize hospitals with and without breaches, data breach type, and location/mode of data breaches in hospitals. Multivariate logistic regression analysis explored hospital characteristics that were predicting factors of a data breach affecting at least 500 patients, including area characteristics, region, health system membership, size, type, biometric security use, health IT sophistication, and ownership. Of all types of healthcare providers, hospitals accounted for approximately one-third of all data breaches and hospital breaches affected the largest number of individuals. Paper and films were the most frequent location of breached data, occurring in 65 hospitals during the study period, whereas network servers were the least common location but their breaches affected the most patients overall. Adjusted multivariate results showed significant associations among data breach occurrences and some hospital characteristics, including type and size, but not others, including health IT sophistication or biometric use for security. Hospitals should conduct routine audits to allow them to see their vulnerabilities before a breach occurs. Additionally, information security systems should be implemented concurrently with health information technologies. Improving access control and prioritizing patient privacy will be important steps in minimizing future breaches.
Experimental and Computational Study of Underexpanded Jet Impingement Heat Transfer
NASA Technical Reports Server (NTRS)
Rufer, Shann J.; Nowak, Robert J.; Daryabeigi, Kamran; Picetti, Donald
2009-01-01
An experiment was performed to assess CFD modeling of a hypersonic-vehicle breach, boundary-layer flow ingestion and internal surface impingement. Tests were conducted in the NASA Langley Research Center 31-Inch Mach 10 Tunnel. Four simulated breaches were tested and impingement heat flux data was obtained for each case using both phosphor thermography and thin film gages on targets placed inside the model. A separate target was used to measure the surface pressure distribution. The measured jet impingement width and peak location are in good agreement with CFD analysis.
Jones, Samantha K.; Griep, Yannick
2018-01-01
Employees often draw meaning from personal experiences and contributions in their work, particularly when engaging in organizational activities that align with their personal identity or values. However, recent empirical findings have demonstrated how meaningful work can also have a negative effect on employee’s well-being as employees feel so invested in their work, they push themselves beyond their limits resulting in strain and susceptibility to burnout. We develop a framework to understand this “double edged” role of meaningful work by drawing from ideological psychological contracts (iPCs), which are characterized by employees and their employer who are working to contribute to a shared ideology or set of values. Limited iPC research has demonstrated employees may actually work harder in response to an iPC breach. In light of these counterintuitive findings, we propose the following conceptual model to theoretically connect our understanding of iPCs, perceptions of breach, increases in work effort, and the potential “dark side” of repeated occurrences of iPC breach. We argue that time plays a central role in the unfolding process of employees’ reactions to iPC breach over time. Further, we propose how perceptions of iPC breach relate to strain and, eventually, burnout. This model contributes to our understanding of the role of time in iPC development and maintenance, expands our exploration of ideology in the PC literature, and provides a framework to understanding why certain occupations are more susceptible to instances of strain and burnout. This framework has the potential to guide future employment interventions in ideology-infused organizations to help mitigate negative employee outcomes. PMID:29479334
Jones, Samantha K; Griep, Yannick
2018-01-01
Employees often draw meaning from personal experiences and contributions in their work, particularly when engaging in organizational activities that align with their personal identity or values. However, recent empirical findings have demonstrated how meaningful work can also have a negative effect on employee's well-being as employees feel so invested in their work, they push themselves beyond their limits resulting in strain and susceptibility to burnout. We develop a framework to understand this "double edged" role of meaningful work by drawing from ideological psychological contracts (iPCs), which are characterized by employees and their employer who are working to contribute to a shared ideology or set of values. Limited iPC research has demonstrated employees may actually work harder in response to an iPC breach. In light of these counterintuitive findings, we propose the following conceptual model to theoretically connect our understanding of iPCs, perceptions of breach, increases in work effort, and the potential "dark side" of repeated occurrences of iPC breach. We argue that time plays a central role in the unfolding process of employees' reactions to iPC breach over time. Further, we propose how perceptions of iPC breach relate to strain and, eventually, burnout. This model contributes to our understanding of the role of time in iPC development and maintenance, expands our exploration of ideology in the PC literature, and provides a framework to understanding why certain occupations are more susceptible to instances of strain and burnout. This framework has the potential to guide future employment interventions in ideology-infused organizations to help mitigate negative employee outcomes.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 2 2012-07-01 2012-07-01 false Data breach. 75.113...) INFORMATION SECURITY MATTERS Data Breaches § 75.113 Data breach. Consistent with the definition of data breach in § 75.112 of this subpart, a data breach occurs under this subpart if there is a loss or theft of...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 2 2014-07-01 2014-07-01 false Data breach. 75.113...) INFORMATION SECURITY MATTERS Data Breaches § 75.113 Data breach. Consistent with the definition of data breach in § 75.112 of this subpart, a data breach occurs under this subpart if there is a loss or theft of...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 2 2013-07-01 2013-07-01 false Data breach. 75.113...) INFORMATION SECURITY MATTERS Data Breaches § 75.113 Data breach. Consistent with the definition of data breach in § 75.112 of this subpart, a data breach occurs under this subpart if there is a loss or theft of...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 2 2011-07-01 2011-07-01 false Data breach. 75.113...) INFORMATION SECURITY MATTERS Data Breaches § 75.113 Data breach. Consistent with the definition of data breach in § 75.112 of this subpart, a data breach occurs under this subpart if there is a loss or theft of...
What caused the breach? An examination of use of information technology and health data breaches.
Wikina, Suanu Bliss
2014-01-01
Data breaches arising from theft, loss, unauthorized access/disclosure, improper disclosure, or hacking incidents involving personal health information continue to increase every year. As of September 2013, reported breaches affecting individuals reached close to 27 million since 2009, when compilation of records on breaches began. These breaches, which involved 674 covered entities and 153 business associates, involved computer systems and networks, desktop computers, laptops, paper, e-mail, electronic health records, and removable/portable devices (CDs, USBs, x-ray films, backup tapes, etc.). Even with the increased use of health information technology by health institutions and allied businesses, theft and loss (not hacking) constitute the major types of data breaches encountered. Removable/portable devices, desktop computers, and laptops were the top sources or locations of the breached information, while the top six states-Virginia, Illinois, California, Florida, New York, and Tennessee-in terms of the number of reported breaches accounted for nearly 75 percent of the total individual breaches, 33 percent of breaches in covered entities, and about 30 percent of the total breaches involving business associates.
What Caused the Breach? An Examination of Use of Information Technology and Health Data Breaches
Wikina, Suanu Bliss
2014-01-01
Data breaches arising from theft, loss, unauthorized access/disclosure, improper disclosure, or hacking incidents involving personal health information continue to increase every year. As of September 2013, reported breaches affecting individuals reached close to 27 million since 2009, when compilation of records on breaches began. These breaches, which involved 674 covered entities and 153 business associates, involved computer systems and networks, desktop computers, laptops, paper, e-mail, electronic health records, and removable/portable devices (CDs, USBs, x-ray films, backup tapes, etc.). Even with the increased use of health information technology by health institutions and allied businesses, theft and loss (not hacking) constitute the major types of data breaches encountered. Removable/portable devices, desktop computers, and laptops were the top sources or locations of the breached information, while the top six states—Virginia, Illinois, California, Florida, New York, and Tennessee—in terms of the number of reported breaches accounted for nearly 75 percent of the total individual breaches, 33 percent of breaches in covered entities, and about 30 percent of the total breaches involving business associates. PMID:25593574
Code of Federal Regulations, 2010 CFR
2010-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Data breach. 75.113 Section 75.113 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS (CONTINUED) INFORMATION SECURITY MATTERS Data Breaches § 75.113 Data breach. Consistent with the definition of data breach in § 75.112 of this subpart, a data breach...
Wynia, Matthew K
2007-08-01
Confidentiality is a core value in medicine and public health yet, like other core values, it is not absolute. Medical ethics has typically allowed for breaches of confidentiality when there is a credible threat of significant harm to an identifiable third party. Medical ethics has been less explicit in spelling out criteria for allowing breaches of confidentiality to protect populations, instead tending to defer these decisions to the law. But recently, issues in military detention settings have raised the profile of decisions to breach medical confidentiality in efforts to protect the broader population. National and international ethics documents say little about the confidentiality of detainee medical records. But initial decisions to use detainee medical records to help craft coercive interrogations led to widespread condemnation, and might have contributed to detainee health problems, such as a large number of suicide attempts several of which have been successful. More recent military guidance seems to reflect lessons learned from these problems and does more to protect detainee records. For the public health system, this experience is a reminder of the importance of confidentiality in creating trustworthy, and effective, means to protect the public's health.
NASA Astrophysics Data System (ADS)
Andalib, T.; Martin, J. W.; Bidinosti, C. P.; Mammei, R. R.; Jamieson, B.; Lang, M.; Kikawa, T.
2017-09-01
Future experiments seeking to measure the neutron electric dipole moment (nEDM) require stable and homogeneous magnetic fields. Normally these experiments use a coil internal to a passively magnetically shielded volume to generate the magnetic field. The stability of the magnetic field generated by the coil within the magnetically shielded volume may be influenced by a number of factors. The factor studied here is the dependence of the internally generated field on the magnetic permeability μ of the shield material. We provide measurements of the temperature-dependence of the permeability of the material used in a set of prototype magnetic shields, using experimental parameters nearer to those of nEDM experiments than previously reported in the literature. Our measurements imply a range of 1/μ dμ/dT from 0-2.7%/K. Assuming typical nEDM experiment coil and shield parameters gives μ/B0 dB0/dμ = 0.01, resulting in a temperature dependence of the magnetic field in a typical nEDM experiment of dB0/dT = 0 - 270 pT/K for B0 = 1 μT. The results are useful for estimating the necessary level of temperature control in nEDM experiments.
Experimental investigation of fluvial dike breaching due to flow overtopping
NASA Astrophysics Data System (ADS)
El Kadi Abderrezzak, K.; Rifai, I.; Erpicum, S.; Archambeau, P.; Violeau, D.; Pirotton, M.; Dewals, B.
2017-12-01
The failure of fluvial dikes (levees) often leads to devastating floods that cause loss of life and damages to public infrastructure. Overtopping flows have been recognized as one of the most frequent cause of dike erosion and breaching. Fluvial dike breaching is different from frontal dike (embankments) breaching, because of specific geometry and boundary conditions. The current knowledge on the physical processes underpinning fluvial dike failure due to overtopping remains limited. In addition, there is a lack of a continuous monitoring of the 3D breach formation, limiting the analysis of the key mechanisms governing the breach development and the validation of conceptual or physically-based models. Laboratory tests on breach growth in homogeneous, non-cohesive sandy fluvial dikes due to flow overtopping have been performed. Two experimental setups have been constructed, permitting the investigation of various hydraulic and geometric parameters. Each experimental setup includes a main channel, separated from a floodplain by a dike. A rectangular initial notch is cut in the crest to initiate dike breaching. The breach development is monitored continuously using a specific developed laser profilometry technique. The observations have shown that the breach develops in two stages: first the breach deepens and widens with the breach centerline being gradually shifted toward the downstream side of the main channel. This behavior underlines the influence of the flow momentum component parallel to the dike crest. Second, the dike geometry upstream of the breach stops evolving and the breach widening continues only toward the downstream side of the main channel. The breach evolution has been found strongly affected by the flow conditions (i.e. inflow discharge in the main channel, downstream boundary condition) and floodplain confinement. The findings of this work shed light on key mechanisms of fluvial dike breaching, which differ substantially from those of dam breaching. These specific features need to be incorporated in flood risk analyses involving fluvial dike breach and failure. In addition, a well-documented, reliable data set, with a continuous high resolution monitoring of the 3D breach evolution under various flow conditions, has been gathered, which can be used for validating numerical models.
Information Security and Data Breach Notification Safeguards
2007-07-31
for unauthorized purposes. Data breach notification requirements obligate covered entities to provide notice to affected persons (e.g., cardholders...customers) about the occurrence of a data security breach involving personally identifiable information. The first data breach notification law was...computerized personal information to disclose any breach of a resident’s personal information. S.B. 1386 was the model for subsequent data breach notification
Preventing a data breach from becoming a disaster.
Goldberg, Ed
2013-01-01
Organisations have traditionally dealt with data breaches by investing in protective measures without a great deal of attention to mitigation of breach consequences and response. Conversely, business continuity (BC) planning has traditionally focused on mitigating disasters, not on preventing them. From a BC planning perspective, organisations need to assume that a data breach is inevitable and plan accordingly. The spate of data breaches in these past few years hit many organisations that were well protected. Those that suffered disastrous consequences as a result of a data breach lacked effective mitigation and response, not protection. The complexity and speed of an effective data breach response require that detailed planning takes place in advance of a breach.
Once More unto the Breach: Aesthetic Experience Revisited
ERIC Educational Resources Information Center
Hansen, Forest
2015-01-01
Aesthetic experience as a determining factor in music appreciation has lost salience in recent years, especially in philosophy of music education. Markand Thakar, music director of the Baltimore Chamber Orchestra and Duluth Superior Symphony Orchestra and co-director of graduate conducting at Peabody Conservatory, has written a book subtitled…
NASA Astrophysics Data System (ADS)
Kartashov, Dmitry; Shurshakov, Vyacheslav
2018-03-01
A ray-tracing method to calculate radiation exposure levels of astronauts at different spacecraft shielding configurations has been developed. The method uses simplified shielding geometry models of the spacecraft compartments together with depth-dose curves. The depth-dose curves can be obtained with different space radiation environment models and radiation transport codes. The spacecraft shielding configurations are described by a set of geometry objects. To calculate the shielding probability functions for each object its surface is composed from a set of the disjoint adjacent triangles that fully cover the surface. Such description can be applied for any complex shape objects. The method is applied to the space experiment MATROSHKA-R modeling conditions. The experiment has been carried out onboard the ISS from 2004 to 2016. Dose measurements were realized in the ISS compartments with anthropomorphic and spherical phantoms, and the protective curtain facility that provides an additional shielding on the crew cabin wall. The space ionizing radiation dose distributions in tissue-equivalent spherical and anthropomorphic phantoms and for an additional shielding installed in the compartment are calculated. There is agreement within accuracy of about 15% between the data obtained in the experiment and calculated ones. Thus the calculation method used has been successfully verified with the MATROSHKA-R experiment data. The ray-tracing radiation dose calculation method can be recommended for estimation of dose distribution in astronaut body in different space station compartments and for estimation of the additional shielding efficiency, especially when exact compartment shielding geometry and the radiation environment for the planned mission are not known.
Barrier island vulnerability to breaching: a case study on Dauphin Island, Alabama
Hansen, Mark; Sallenger, Asbury H.
2007-01-01
Breaching of barrier islands can adversely impact society by severing infrastructure, destroying private properties, and altering water quality in back bays and estuaries. This study provides a scheme that assesses the relative vulnerability of a barrier island to breach during storms. Dauphin Island, Alabama was selected for this study because it has a well documented history of island breaches and extensive geological and geomorphic data. To assess the vulnerability of the island, we defined several variables contributing to the risk of breaching: island geology, breaching history, and island topography and geomorphology. These variables were combined to form a breaching index (BI) value for cross island computational bins, each bin every 50 m in the alongshore direction. Results suggest the eastern section of Dauphin Island has the lowest risk of breaching with the remaining portion of the island having a moderate to high risk of breaching. Two reaches in the western section of the island were found to be particularly vulnerable due primarily to their minimal cross-sectional dimensions.
Ng, Thomas W H; Feldman, Daniel C; Lam, Simon S K
2010-07-01
This study examined the relationships among psychological contract breaches, organizational commitment, and innovation-related behaviors (generating, spreading, implementing innovative ideas at work) over a 6-month period. Results indicate that the effects of psychological contract breaches on employees are not static. Specifically, perceptions of psychological contract breaches strengthened over time and were associated with decreased levels of affective commitment over time. Further, increased perceptions of psychological contract breaches were associated with decreases in innovation-related behaviors. We also found evidence that organizational commitment mediates the relationship between psychological contract breaches and innovation-related behaviors. These results highlight the importance of examining the nomological network of psychological contract breaches from a change perspective.
Reconstruction of the 1945 Wieringermeer Flood
NASA Astrophysics Data System (ADS)
Hoes, O. A. C.; Hut, R. W.; van de Giesen, N. C.; Boomgaard, M.
2013-03-01
The present state-of-the-art in flood risk assessment focuses on breach models, flood propagation models, and economic modelling of flood damage. However, models need to be validated with real data to avoid erroneous conclusions. Such reference data can either be historic data, or can be obtained from controlled experiments. The inundation of the Wieringermeer polder in the Netherlands in April 1945 is one of the few examples for which sufficient historical information is available. The objective of this article is to compare the flood simulation with flood data from 1945. The context, the breach growth process and the flood propagation are explained. Key findings for current flood risk management addresses the importance of the drainage canal network during the inundation of a polder, and the uncertainty that follows from not knowing the breach growth parameters. This case study shows that historical floods provide valuable data for the validation of models and reveal lessons that are applicable in current day flood risk management.
Encryption and the loss of patient data.
Miller, Amalia R; Tucker, Catherine E
2011-01-01
Fast-paced IT advances have made it increasingly possible and useful for firms to collect data on their customers on an unprecedented scale. One downside of this is that firms can experience negative publicity and financial damage if their data are breached. This is particularly the case in the medical sector, where we find empirical evidence that increased digitization of patient data is associated with more data breaches. The encryption of customer data is often presented as a potential solution, because encryption acts as a disincentive for potential malicious hackers, and can minimize the risk of breached data being put to malicious use. However, encryption both requires careful data management policies to be successful and does not ward off the insider threat. Indeed, we find no empirical evidence of a decrease in publicized instances of data loss associated with the use of encryption. Instead, there are actually increases in the cases of publicized data loss due to internal fraud or loss of computer equipment.
Experimental and Analytical Studies of Shielding Concepts for Point Sources and Jet Noises.
NASA Astrophysics Data System (ADS)
Wong, Raymond Lee Man
This analytical and experimental study explores concepts for jet noise shielding. Model experiments centre on solid planar shields, simulating engine-over-wing installations, and 'sugar scoop' shields. Tradeoff on effective shielding length is set by interference 'edge noise' as the shield trailing edge approaches the spreading jet. Edge noise is minimized by (i) hyperbolic cutouts which trim off the portions of most intense interference between the jet flow and the barrier and (ii) hybrid shields--a thermal refractive extension (a flame); for (ii) the tradeoff is combustion noise. In general, shielding attenuation increases steadily with frequency, following low frequency enhancement by edge noise. Although broadband attenuation is typically only several dB, the reduction of the subjectively weighted perceived noise levels is higher. In addition, calculated ground contours of peak PN dB show a substantial contraction due to shielding: this reaches 66% for one of the 'sugar scoop' shields for the 90 PN dB contour. The experiments are complemented by analytical predictions. They are divided into an engineering scheme for jet noise shielding and more rigorous analysis for point source shielding. The former approach combines point source shielding with a suitable jet source distribution. The results are synthesized into a predictive algorithm for jet noise shielding: the jet is modelled as a line distribution of incoherent sources with narrow band frequency (TURN)(axial distance)('-1). The predictive version agrees well with experiment (1 to 1.5 dB) up to moderate frequencies. The insertion loss deduced from the point source measurements for semi-infinite as well as finite rectangular shields agrees rather well with theoretical calculation based on the exact half plane solution and the superposition of asymptotic closed-form solutions. An approximate theory, the Maggi-Rubinowicz line integral, is found to yield reasonable predictions for thin barriers including cutouts if a certain correction is applied. The more exact integral equation approach (solved numerically) is applied to a more demanding geometry: a half round sugar scoop shield. It is found that the solutions of integral equation derived from Helmholtz formula in normal derivative form show satisfactory agreement with measurements.
Fourier Magnitude-Based Privacy-Preserving Clustering on Time-Series Data
NASA Astrophysics Data System (ADS)
Kim, Hea-Suk; Moon, Yang-Sae
Privacy-preserving clustering (PPC in short) is important in publishing sensitive time-series data. Previous PPC solutions, however, have a problem of not preserving distance orders or incurring privacy breach. To solve this problem, we propose a new PPC approach that exploits Fourier magnitudes of time-series. Our magnitude-based method does not cause privacy breach even though its techniques or related parameters are publicly revealed. Using magnitudes only, however, incurs the distance order problem, and we thus present magnitude selection strategies to preserve as many Euclidean distance orders as possible. Through extensive experiments, we showcase the superiority of our magnitude-based approach.
A three-layer magnetic shielding for the MAIUS-1 mission on a sounding rocket
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kubelka-Lange, André, E-mail: andre.kubelka@zarm.uni-bremen.de; Herrmann, Sven; Grosse, Jens
Bose-Einstein-Condensates (BECs) can be used as a very sensitive tool for experiments on fundamental questions in physics like testing the equivalence principle using matter wave interferometry. Since the sensitivity of these experiments in ground-based environments is limited by the available free fall time, the QUANTUS project started to perform BEC interferometry experiments in micro-gravity. After successful campaigns in the drop tower, the next step is a space-borne experiment. The MAIUS-mission will be an atom-optical experiment that will show the feasibility of experiments with ultra-cold quantum gases in microgravity in a sounding rocket. The experiment will create a BEC of 10{supmore » 5} {sup 87}Rb-atoms in less than 5 s and will demonstrate application of basic atom interferometer techniques over a flight time of 6 min. The hardware is specifically designed to match the requirements of a sounding rocket mission. Special attention is thereby spent on the appropriate magnetic shielding from varying magnetic fields during the rocket flight, since the experiment procedures are very sensitive to external magnetic fields. A three-layer magnetic shielding provides a high shielding effectiveness factor of at least 1000 for an undisturbed operation of the experiment. The design of this magnetic shielding, the magnetic properties, simulations, and tests of its suitability for a sounding rocket flight are presented in this article.« less
A three-layer magnetic shielding for the MAIUS-1 mission on a sounding rocket.
Kubelka-Lange, André; Herrmann, Sven; Grosse, Jens; Lämmerzahl, Claus; Rasel, Ernst M; Braxmaier, Claus
2016-06-01
Bose-Einstein-Condensates (BECs) can be used as a very sensitive tool for experiments on fundamental questions in physics like testing the equivalence principle using matter wave interferometry. Since the sensitivity of these experiments in ground-based environments is limited by the available free fall time, the QUANTUS project started to perform BEC interferometry experiments in micro-gravity. After successful campaigns in the drop tower, the next step is a space-borne experiment. The MAIUS-mission will be an atom-optical experiment that will show the feasibility of experiments with ultra-cold quantum gases in microgravity in a sounding rocket. The experiment will create a BEC of 10(5) (87)Rb-atoms in less than 5 s and will demonstrate application of basic atom interferometer techniques over a flight time of 6 min. The hardware is specifically designed to match the requirements of a sounding rocket mission. Special attention is thereby spent on the appropriate magnetic shielding from varying magnetic fields during the rocket flight, since the experiment procedures are very sensitive to external magnetic fields. A three-layer magnetic shielding provides a high shielding effectiveness factor of at least 1000 for an undisturbed operation of the experiment. The design of this magnetic shielding, the magnetic properties, simulations, and tests of its suitability for a sounding rocket flight are presented in this article.
Vehicle assisted harpoon breaching tool
Pacheco, James E [Albuquerque, NM; Highland, Steven E [Albuquerque, NM
2011-02-15
A harpoon breaching tool that allows security officers, SWAT teams, police, firemen, soldiers, or others to forcibly breach metal doors or walls very quickly (in a few seconds), without explosives. The harpoon breaching tool can be mounted to a vehicle's standard receiver hitch.
The State of Integrated Air and Missile Defense Held in Laurel, Maryland on July 14, 2011
2011-07-14
compromised from servers (-22%) 86% were discovered by a third party (+25%) 96% of breaches were avoidable (+-0) Source 2011 Data Breach Investigations...Foreign Espionage - Terrorists - State Sponsored Attacks UNCLASSIFIED UNCLASSIFIED 11 What commonalities exist? How do breaches occur? Verizon Data ... Breach Study “Breaching organizations still doesn’t typically require highly sophisticated attacks, most victims are a target of opportunity rather
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miller, Thomas Martin; Celik, Cihangir; Dunn, Michael E
In October 2010, a series of benchmark experiments were conducted at the French Commissariat a l'Energie Atomique et aux Energies Alternatives (CEA) Valduc SILENE facility. These experiments were a joint effort between the United States Department of Energy Nuclear Criticality Safety Program and the CEA. The purpose of these experiments was to create three benchmarks for the verification and validation of radiation transport codes and evaluated nuclear data used in the analysis of criticality accident alarm systems. This series of experiments consisted of three single-pulsed experiments with the SILENE reactor. For the first experiment, the reactor was bare (unshielded), whereasmore » in the second and third experiments, it was shielded by lead and polyethylene, respectively. The polyethylene shield of the third experiment had a cadmium liner on its internal and external surfaces, which vertically was located near the fuel region of SILENE. During each experiment, several neutron activation foils and thermoluminescent dosimeters (TLDs) were placed around the reactor. Nearly half of the foils and TLDs had additional high-density magnetite concrete, high-density barite concrete, standard concrete, and/or BoroBond shields. CEA Saclay provided all the concrete, and the US Y-12 National Security Complex provided the BoroBond. Measurement data from the experiments were published at the 2011 International Conference on Nuclear Criticality (ICNC 2011) and the 2013 Nuclear Criticality Safety Division (NCSD 2013) topical meeting. Preliminary computational results for the first experiment were presented in the ICNC 2011 paper, which showed poor agreement between the computational results and the measured values of the foils shielded by concrete. Recently the hydrogen content, boron content, and density of these concrete shields were further investigated within the constraints of the previously available data. New computational results for the first experiment are now available that show much better agreement with the measured values.« less
Shields-1, A SmallSat Radiation Shielding Technology Demonstration
NASA Technical Reports Server (NTRS)
Thomsen, D. Laurence, III; Kim, Wousik; Cutler, James W.
2015-01-01
The NASA Langley Research Center Shields CubeSat initiative is to develop a configurable platform that would allow lower cost access to Space for materials durability experiments, and to foster a pathway for both emerging and commercial-off-the-shelf (COTS) radiation shielding technologies to gain spaceflight heritage in a relevant environment. The Shields-1 will be Langleys' first CubeSat platform to carry out this mission. Radiation shielding tests on Shields-1 are planned for the expected severe radiation environment in a geotransfer orbit (GTO), where advertised commercial rideshare opportunities and CubeSat missions exist, such as Exploration Mission 1 (EM-1). To meet this objective, atomic number (Z) graded radiation shields (Zshields) have been developed. The Z-shield properties have been estimated, using the Space Environment Information System (SPENVIS) radiation shielding computational modeling, to have 30% increased shielding effectiveness of electrons, at half the thickness of a corresponding single layer of aluminum. The Shields-1 research payload will be made with the Z-graded radiation shields of varying thicknesses to create dose-depth curves to be compared with baseline materials. Additionally, Shields-1 demonstrates an engineered Z-grade radiation shielding vault protecting the systems' electronic boards. The radiation shielding materials' performances will be characterized using total ionizing dose sensors. Completion of these experiments is expected to raise the technology readiness levels (TRLs) of the tested atomic number (Z) graded materials. The most significant contribution of the Z-shields for the SmallSat community will be that it enables cost effective shielding for small satellite systems, with significant volume constraints, while increasing the operational lifetime of ionizing radiation sensitive components. These results are anticipated to increase the development of CubeSat hardware design for increased mission lifetimes, and enable out of low earth orbit (LEO) missions by using these tested material concepts as shielding for sensitive components and new spaceflight hardware
Gupta, Vishal; Agarwal, Upasna A; Khatri, Naresh
2016-11-01
This study examines the factors that mediate and moderate the relationships of perceived organizational support with work engagement and organization citizenship behaviour. Specifically, affective commitment is posited to mediate and psychological contract breach to moderate the above relationships. Nurses play a critical role in delivering exemplary health care. For nurses to perform at their best, they need to experience high engagement, which can be achieved by providing them necessary organizational support and proper working environment. Data were collected via a self-reported survey instrument. A questionnaire was administered to a random sample of 750 nurses in nine large hospitals in India during 2013-2014. Four hundred and seventy-five nurses (63%) responded to the survey. Hierarchical multiple regression was used for statistical analysis of the moderated-mediation model. Affective commitment was found to mediate the positive relationships between perceived organizational support and work outcomes (work engagement, organizational citizenship behaviour). The perception of unfulfilled expectations (psychological contract breach) was found to moderate the perceived organizational support-work outcome relationships adversely. The results of this study indicate that perceived organizational support exerts its influence on work-related outcomes and highlight the importance of taking organizational context, such as perceptions of psychological contract breach, into consideration when making sense of the influence of perceived organizational support on affective commitment, work engagement and citizenship behaviours of nurses. © 2016 John Wiley & Sons Ltd.
Barrier island breach evolution: Alongshore transport and bay-ocean pressure gradient interactions
Safak, Ilgar; Warner, John C.; List, Jeffrey
2016-01-01
Physical processes controlling repeated openings and closures of a barrier island breach between a bay and the open ocean are studied using aerial photographs and atmospheric and hydrodynamic observations. The breach site is located on Pea Island along the Outer Banks, separating Pamlico Sound from the Atlantic Ocean. Wind direction was a major control on the pressure gradients between the bay and the ocean to drive flows that initiate or maintain the breach opening. Alongshore sediment flux was found to be a major contributor to breach closure. During the analysis period from 2011 to 2016, three hurricanes had major impacts on the breach. First, Hurricane Irene opened the breach with wind-driven flow from bay to ocean in August 2011. Hurricane Sandy in October 2012 quadrupled the channel width from pressure gradient flows due to water levels that were first higher on the ocean side and then higher on the bay side. The breach closed sometime in Spring 2013, most likely due to an event associated with strong alongshore sediment flux but minimal ocean-bay pressure gradients. Then, in July 2014, Hurricane Arthur briefly opened the breach again from the bay side, in a similar fashion to Irene. In summary, opening and closure of breaches are shown to follow a dynamic and episodic balance between along-channel pressure gradient driven flows and alongshore sediment fluxes.
Psychological contract breach among allied health professionals.
Rodwell, John; Gulyas, Andre
2015-01-01
Allied health professionals are vital for effective healthcare yet there are continuing shortages of these employees. Building on work with other healthcare professionals, the purpose of this paper is to investigate the influence of psychological contract (PC) breach and types of organisational justice on variables important to retention among allied health professionals: mental health and organisational commitment. The potential effects of justice on the negative outcomes of breach were examined. Multiple regressions analysed data from 113 allied health professionals working in a medium-large Australian healthcare organisation. The main negative impacts on respondents' mental health and commitment were from high PC breach, low procedural and distributive justice and less respectful treatment from organisational representatives. The interaction between procedural justice and breach illustrates that breach may be forgivable if processes are fair. Surprisingly, a betrayal or "aggravated breach effect" may occur after a breach when interpersonal justice is high. Further, negative affectivity was negatively related to respondents' mental health (affective outcomes) but not commitment (work-related attitude). Healthcare organisations should ensure the fairness of decisions and avoid breaking promises within their control. If promises cannot reasonably be kept, transparency of processes behind the breach may allow allied health professionals to understand that the organisation did not purposefully fail to fulfil expectations. This study offers insights into how breach and four types of justice interact to influence employee mental health and work attitudes among allied health professionals.
NASA Technical Reports Server (NTRS)
Phillips, P. R.
1979-01-01
A new type of ether drift experiment searches for anomalous torques on a permanent magnet. A torsion pendulum is used at liquid helium temperature, so that superconducting cylinders can be used to shield magnetic fields. Lead shields attenuate the earth's field, while Nb-Sn shields fastened to the pendulum contain the fields of the magnet. The paper describes the technique by which the earth's field can be reduced below 0.0001 G while simultaneously the moment of the magnet can be reduced by a factor 7 x 10 to the 4th.
38 CFR 75.115 - Risk analysis.
Code of Federal Regulations, 2014 CFR
2014-07-01
... preparation of the risk analysis may include data mining if necessary for the development of relevant...) INFORMATION SECURITY MATTERS Data Breaches § 75.115 Risk analysis. If a data breach involving sensitive... possible after the data breach, a non-VA entity with relevant expertise in data breach assessment and risk...
38 CFR 75.115 - Risk analysis.
Code of Federal Regulations, 2012 CFR
2012-07-01
... preparation of the risk analysis may include data mining if necessary for the development of relevant...) INFORMATION SECURITY MATTERS Data Breaches § 75.115 Risk analysis. If a data breach involving sensitive... possible after the data breach, a non-VA entity with relevant expertise in data breach assessment and risk...
38 CFR 75.115 - Risk analysis.
Code of Federal Regulations, 2013 CFR
2013-07-01
... preparation of the risk analysis may include data mining if necessary for the development of relevant...) INFORMATION SECURITY MATTERS Data Breaches § 75.115 Risk analysis. If a data breach involving sensitive... possible after the data breach, a non-VA entity with relevant expertise in data breach assessment and risk...
25 CFR 163.42 - Obligated service and breach of contract.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false Obligated service and breach of contract. 163.42 Section... breach of contract. (a) Obligated service. (1) Individuals completing forestry education programs with an... request for waiver. (b) Breach of contract. Any individual who has participated in and accepted financial...
41 CFR 50-201.201 - Breach of stipulations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Breach of stipulations... Public Contracts PUBLIC CONTRACTS, DEPARTMENT OF LABOR 201-GENERAL REGULATIONS § 50-201.201 Breach of... determination of a breach of stipulations is made, the Secretary of Labor will furnish to the contracting agency...
13 CFR 115.69 - Imminent Breach.
Code of Federal Regulations, 2010 CFR
2010-01-01
... an Imminent Breach of the terms of a Contract covered by an SBA guaranteed bond. The PSB Surety does... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Imminent Breach. 115.69 Section... Surety Bond (PSB) Guarantees § 115.69 Imminent Breach. (a) No prior approval requirement. SBA will...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-09
... Breach Restoration Draft Environmental Impact Statement, Rocky Mountain National Park, CO AGENCY... Environmental Impact Statement for the Grand Ditch Breach Restoration, Rocky Mountain National Park. SUMMARY... announces the availability of a Draft Environmental Impact Statement for the Grand Ditch Breach Restoration...
38 CFR 75.115 - Risk analysis.
Code of Federal Regulations, 2011 CFR
2011-07-01
... preparation of the risk analysis may include data mining if necessary for the development of relevant...) INFORMATION SECURITY MATTERS Data Breaches § 75.115 Risk analysis. If a data breach involving sensitive... possible after the data breach, a non-VA entity with relevant expertise in data breach assessment and risk...
Effects of increased shielding on gamma-radiation levels within spacecraft
NASA Astrophysics Data System (ADS)
Haskins, P. S.; McKisson, J. E.; Weisenberger, A. G.; Ely, D. W.; Ballard, T. A.; Dyer, C. S.; Truscott, P. R.; Piercey, R. B.; Ramayya, A. V.; Camp, D. C.
The Shuttle Activation Monitor (SAM) experiment was flown on the Space Shuttle Columbia (STS-28) from 8 - 13 August, 1989 in a 57°, 300 km orbit. One objective of the SAM experiment was to determine the relative effect of different amounts of shielding on the gamma-ray backgrounds measured with similarly configured sodium iodide (NaI) and bismuth germante (BGO) detectors. To achieve this objective twenty-four hours of data were taken with each detector in the middeck of the Shuttle on the ceiling of the airlock (a high-shielding location) as well as on the sleep station wall (a low-shielding location). For the cosmic-ray induced background the results indicate an increased overall count rate in the 0.2 to 10 MeV energy range at the more highly shielded location, while in regions of trapped radiation the low shielding configuration gives higher rates at the low energy end of the spectrum.
Analysis of Effects of Sensor Multithreading to Generate Local System Event Timelines
2014-03-27
works on logs highlights the importance of logs [17, 18]. The two aforementioned works both reference the same 2009 Data Breach Investigations Report...the data breaches report on, the logs contained evidence of events leading up to 82% of those data breaches . This means that preventing 82% of the data ...report states that of the data breaches reported on, the logs contained evidence of events leading up to 66% of those data breaches . • The 2010 DBIR
NASA Astrophysics Data System (ADS)
Peck, Victoria L.; Tarling, Geraint A.; Manno, Clara; Harper, Elizabeth M.; Tynan, Eithne
2016-05-01
Scarred shells of polar pteropod Limacina helicina collected from the Greenland Sea in June 2012 reveal a history of damage, most likely failed predation, in earlier life stages. Evidence of shell fracture and subsequent re-growth is commonly observed in specimens recovered from the sub-Arctic and further afield. However, at one site within sea-ice on the Greenland shelf, shells that had been subject to mechanical damage were also found to exhibit considerable dissolution. It was evident that shell dissolution was localised to areas where the organic, periostracal sheet that covers the outer shell had been damaged at some earlier stage during the animal's life. Where the periostracum remained intact, the shell appeared pristine with no sign of dissolution. Specimens which appeared to be pristine following collection were incubated for four days. Scarring of shells that received periostracal damage during collection only became evident in specimens that were incubated in waters undersaturated with respect to aragonite, ΩAr≤1. While the waters from which the damaged specimens were collected at the Greenland Sea sea-ice margin were not ΩAr≤1, the water column did exhibit the lowest ΩAr values observed in the Greenland and Barents Seas, and was likely to have approached ΩAr≤1 during the winter months. We demonstrate that L. helicina shells are only susceptible to dissolution where both the periostracum has been breached and the aragonite beneath the breach is exposed to waters of ΩAr≤1. Exposure of multiple layers of aragonite in areas of deep dissolution indicate that, as with many molluscs, L. helicina is able to patch up dissolution damage to the shell by secreting additional aragonite internally and maintain their shell. We conclude that, unless breached, the periostracum provides an effective shield for pteropod shells against dissolution in waters ΩAr≤1, and when dissolution does occur the animal has an effective means of self-repair. We suggest that future studies of pteropod shell condition are undertaken on specimens from which the periostracum has not been removed in preparation.
Conscientiousness and reactions to psychological contract breach: a longitudinal field study.
Orvis, Karin A; Dudley, Nicole M; Cortina, Jose M
2008-09-01
The authors examined the role of employee conscientiousness as a moderator of the relationships between psychological contract breach and employee behavioral and attitudinal reactions to the breach. They collected data from 106 newly hired employees within the 1st month of employment (Time 1), 3 months later (Time 2), and 8 months after Time 1 (Time 3) to observe the progression through contract development, breach, and reaction. Results suggest that conscientiousness is a significant moderator for 4 of the 5 contract breach-employee reaction relationships examined (turnover intentions, organizational loyalty, job satisfaction, and 1 of 2 facets of job performance). Specifically, employees who were lower in conscientiousness had more negative reactions to perceived breach with respect to turnover intentions, organizational loyalty, and job satisfaction. In contrast, employees who were higher in conscientiousness reduced their job performance to a greater degree in response to contract breach. Future research directions are discussed.
Outcomes associated with breach and fulfillment of the psychological contract of safety.
Walker, Arlene
2013-12-01
The study investigated the outcomes associated with breach and fulfillment of the psychological contract of safety. The psychological contract of safety is defined as the beliefs of individuals about reciprocal employer and employee safety obligations inferred from implicit or explicit promises. When employees perceive that safety obligations promised by the employer have not been met, a breach of the psychological contract occurs, termed employer breach of obligations. The extent to which employees fulfill their safety obligations to the employer is termed employee fulfillment of obligations. Structural equation modeling was used to test a model of safety that investigated the positive and negative outcomes associated with breach and fulfillment of the psychological contract of safety. Participants were 424 health care workers recruited from two hospitals in the State of Victoria, Australia. Following slight modification of the hypothesized model, a good fitting model resulted. Being injured in the workplace was found to lower perceptions of trust in the employer and increase perceptions of employer breach of safety obligations. Trust in the employer significantly influenced perceived employer breach of safety obligations such that lowered trust resulted in higher perceptions of breach. Perceptions of employer breach significantly impacted employee fulfillment of safety obligations with high perceptions of breach resulting in low employee fulfillment of obligations. Trust and perceptions of breach significantly influenced safety attitudes, but not safety behavior. Fulfillment of employee safety obligations significantly impacted safety behavior, but not safety attitudes. Implications of these findings for safety and psychological contract research are explored. A positive emphasis on social exchange relationships in organizations will have positive outcomes for safety climate and safety behavior. © 2013.
Electromagnetic fields and torque for a rotating gyroscope with a superconducting shield
NASA Technical Reports Server (NTRS)
Ebner, C.; Sung, C. C.
1975-01-01
In a proposed experiment, a measurement is to be made of the angular precession of a rotating superconducting gyroscope for the purpose of testing different general-relativity theories. For various reasons having to do with the design of the experiment, the superconducting shield surrounding the gyroscope is not spherically symmetric and produces a torque. There are two distinct features of the shield which lead to a torque on the gyroscope. First, its shape is a sphere intersected by a plane. If the angular momentum of the gyroscope is not parallel to the rotational symmetry axis of the shield, there is a torque which is calculated. Second, there are small holes in the spherical portion of the shield. The earth's field can penetrate through these holes and give an additional torque which is also calculated. In the actual experiment, these torques must be accurately known or made very small in order to obtain meaningful results. The present calculation is sufficiently general for application over a wide range of experimental design parameters.
Atwater, Brian F.; Cisternas, Marco; Yulianto, E.; Prendergast, A.; Jankaew, K.; Eipert, A.; Fernando, Warnakulasuriya; Tejakusuma, Iwan; Schiappacasse, Ignacio; Sawai, Yuki
2013-01-01
The Chilean tsunami of 22 May 1960 reamed out a breach and built up a fan as it flowed across a sparsely inhabited beach-ridge plain near Maullín, midway along the length of the tsunami source. Eyewitnesses to the flooding, interviewed mainly in 1988 and 1989, identified levels that the tsunami had reached on high ground, trees, and build- ings. The maximum levels fell, from about 10 m to 2 m, between the mouth of the tidal Río Maullín and an inundation limit nearly 5 km inland across the plain. Along this profile at Caulle, where the maximum flow depth was a few meters deep, airphotos taken in 1961 show breaches across a road on a sandy beach ridge. Inland from one of these breaches is a fan with branched distributaries. Today its breach holds a pond that has been changing into a marsh. The 1960 fan deposits, as much as 60 cm thick, are traceable inland for 120 m from the breach. They rest on a pasture soil above two additional sand bodies, each atop its own buried soil. The earlier of the pre-1960 sand bodies probably dates to AD 1270-1400, in which case its age is not statistically different from that of a sand sheet previously dated elsewhere near Maullín. The breach likely originated then and has been freshened twice. Evidence that the breach was freshened in 1960 includes a near-basal interval of cobble-size clasts of sediment and soil, most of them probably derived from the organic fill of pre-1960 breach. The cobbly interval is overlain by sand with ripple-drift laminae that record landward flow. The fan of another breach near Maullín, at Chanhué, also provides stratigraphic evidence for recurrent tsunamis, though not necessarily for the repeated use of the breach. These findings were anticipated a half century ago by descrip- tion of paired breaches and fans that the 1960 Chilean tsunami produced in Japan. Breaches and their fans may provide lasting evidence for tsunami inundation of beach-ridge plains. The breaches might be detectable by remote sensing, and the thickness of the fan deposits might help them outlast an ordinary tsunami sand sheet. Keywords: Tsunami, Erosion, Deposition, Hazard, Chile.
Walder, J.S.; O'Connor, J. E.; Costa, J.E.; ,
1997-01-01
We analyse a simple, physically-based model of breach formation in natural and constructed earthen dams to elucidate the principal factors controlling the flood hydrograph at the breach. Formation of the breach, which is assumed trapezoidal in cross-section, is parameterized by the mean rate of downcutting, k, the value of which is constrained by observations. A dimensionless formulation of the model leads to the prediction that the breach hydrograph depends upon lake shape, the ratio r of breach width to depth, the side slope ?? of the breach, and the parameter ?? = (V.D3)(k/???gD), where V = lake volume, D = lake depth, and g is the acceleration due to gravity. Calculations show that peak discharge Qp depends weakly on lake shape r and ??, but strongly on ??, which is the product of a dimensionless lake volume and a dimensionless erosion rate. Qp(??) takes asymptotically distinct forms depending on whether < ??? 1 or < ??? 1. Theoretical predictions agree well with data from dam failures for which k could be reasonably estimated. The analysis provides a rapid and in many cases graphical way to estimate plausible values of Qp at the breach.We analyze a simple, physically-based model of breach formation in natural and constructed earthen dams to elucidate the principal factors controlling the flood hydrograph at the breach. Formation of the breach, which is assumed trapezoidal in cross-section, is parameterized by the mean rate of downcutting, k, the value of which is constrained by observations. A dimensionless formulation of the model leads to the prediction that the breach hydrograph depends upon lake shape, the ratio r of breach width to depth, the side slope ?? of the breach, and the parameter ?? = (V/D3)(k/???gD), where V = lake volume, D = lake depth, and g is the acceleration due to gravity. Calculations show that peak discharge Qp depends weakly on lake shape r and ??, but strongly on ??, which is the product of a dimensionless lake volume and a dimensionless erosion rate. Qp(??) takes asymptotically distinct forms depending on whether ?????1 or ?????1. Theoretical predictions agree well with data from dam failures for which k could be reasonably estimated. The analysis provides a rapid and in many cases graphical way to estimate plausible values of Qp at the breach.
41 CFR 50-203.1 - Reports of breach or violation.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Reports of breach or... of the Walsh-Healey Public Contracts Act § 50-203.1 Reports of breach or violation. (a) Any employer... violation, or apparent breach or violation of the Walsh-Healey Public Contracts Act of June 30, 1936 (49...
48 CFR 52.233-4 - Applicable Law for Breach of Contract Claim.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Provisions and Clauses 52.233-4 Applicable Law for Breach of Contract Claim. As prescribed in 33.215(b), insert the following clause: Applicable Law for Breach of Contract Claim (OCT 2004) United States law... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Applicable Law for Breach...
Early Results from the Advanced Radiation Protection Thick GCR Shielding Project
NASA Technical Reports Server (NTRS)
Norman, Ryan B.; Clowdsley, Martha; Slaba, Tony; Heilbronn, Lawrence; Zeitlin, Cary; Kenny, Sean; Crespo, Luis; Giesy, Daniel; Warner, James; McGirl, Natalie;
2017-01-01
The Advanced Radiation Protection Thick Galactic Cosmic Ray (GCR) Shielding Project leverages experimental and modeling approaches to validate a predicted minimum in the radiation exposure versus shielding depth curve. Preliminary results of space radiation models indicate that a minimum in the dose equivalent versus aluminum shielding thickness may exist in the 20-30 g/cm2 region. For greater shield thickness, dose equivalent increases due to secondary neutron and light particle production. This result goes against the long held belief in the space radiation shielding community that increasing shielding thickness will decrease risk to crew health. A comprehensive modeling effort was undertaken to verify the preliminary modeling results using multiple Monte Carlo and deterministic space radiation transport codes. These results verified the preliminary findings of a minimum and helped drive the design of the experimental component of the project. In first-of-their-kind experiments performed at the NASA Space Radiation Laboratory, neutrons and light ions were measured between large thicknesses of aluminum shielding. Both an upstream and a downstream shield were incorporated into the experiment to represent the radiation environment inside a spacecraft. These measurements are used to validate the Monte Carlo codes and derive uncertainty distributions for exposure estimates behind thick shielding similar to that provided by spacecraft on a Mars mission. Preliminary results for all aspects of the project will be presented.
IET. Typical detail during Snaptran reactor experiments. Shielding bricks protect ...
IET. Typical detail during Snaptran reactor experiments. Shielding bricks protect ion chamber beneath reactor on dolly. Photographer: Page Comiskey. Date: August 11, 1965. INEEL negative no. 65-4039 - Idaho National Engineering Laboratory, Test Area North, Scoville, Butte County, ID
The extreme risk of personal data breaches and the erosion of privacy
NASA Astrophysics Data System (ADS)
Wheatley, Spencer; Maillart, Thomas; Sornette, Didier
2016-01-01
Personal data breaches from organisations, enabling mass identity fraud, constitute an extreme risk. This risk worsens daily as an ever-growing amount of personal data are stored by organisations and on-line, and the attack surface surrounding this data becomes larger and harder to secure. Further, breached information is distributed and accumulates in the hands of cyber criminals, thus driving a cumulative erosion of privacy. Statistical modeling of breach data from 2000 through 2015 provides insights into this risk: A current maximum breach size of about 200 million is detected, and is expected to grow by fifty percent over the next five years. The breach sizes are found to be well modeled by an extremely heavy tailed truncated Pareto distribution, with tail exponent parameter decreasing linearly from 0.57 in 2007 to 0.37 in 2015. With this current model, given a breach contains above fifty thousand items, there is a ten percent probability of exceeding ten million. A size effect is unearthed where both the frequency and severity of breaches scale with organisation size like s0.6. Projections indicate that the total amount of breached information is expected to double from two to four billion items within the next five years, eclipsing the population of users of the Internet. This massive and uncontrolled dissemination of personal identities raises fundamental concerns about privacy.
Analysis of the ORNL/TSF GCFR Grid-Plate Shield Design Confirmation Experiment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Slater, C.O.; Cramer, S.N.; Ingersoll, D.T.
1979-08-01
The results of the analysis of the GCFR Grid-Plate Shield Design Confirmation Experiment are presented. The experiment, performed at the ORNL Tower Shielding Facility, was designed to test the adequacy of methods and data used in the analysis of the GCFR design. In particular, the experiment tested the adequacy of methods to calculate: (1) axial neutron streaming in the GCFR core and axial blanket, (2) the amount and location of the maximum fast-neutron exposure to the grid plate, and (3) the neutron source leaving the top of the grid plate and entering the upper plenum. Other objectives of the experimentmore » were to verify the grid-plate shielding effectiveness and to assess the effects of fuel-pin and subassembly spacing on radiation levels in the GCFR. The experimental mockups contained regions representing the GCFR core/blanket region, the grid-plate shield section, and the grid plate. Most core design options were covered by allowing: (1) three different spacings between fuel subassemblies, (2) two different void fractions within a subassembly by variation of the number of fuel pins, and (3) a mockup of a control-rod channel.« less
Federal Information Security and Data Breach Notification Laws
2009-01-29
The following report describes information security and data breach notification requirements included in the Privacy Act, the Federal Information...information for unauthorized purposes. Data breach notification laws typically require covered entities to implement a breach notification policy, and...Feinstein), S. 495 (Leahy), and S. 1178 (Inouye)--were reported favorably out of Senate committees. Those bills include information security and data
Cyber Insurance - Managing Cyber Risk
2015-04-01
license under the clause at DFARS 252.227-7013 (a)(16) [Jun 2013]. Cyber Insurance – Managing Cyber Risk Data breaches involving...significant personal information losses and financial impact are becoming increasingly common. Whether the data breach has financial implications for...hundreds of millions of dollars depending on the type and size of the breach. Most states have some type of data breach law requiring notification
Uncertainties and constraints on breaching and their implications for flood loss estimation.
Muir Wood, Robert; Bateman, William
2005-06-15
Around the coasts of the southern North Sea, flood risk is mediated everywhere by the performance of natural and man-made flood defences. Under the conditions of extreme surge with tide water levels, the performance of the defences determines the extent of inland flooding. Sensitivity tests reveal the enormous increase in the volume of water that can pass through a defence once breaching is initiated, with a 1m reduction in sill elevation doubling the loss. Empirical observations of defence performance in major storm surges around the North Sea reveal some of the principal controls on breaching. For the same defence type, the maximum size and depth of a breach is a function of the integral of the hydraulic gradient across the defence, which is in turn determined by the elevation of the floodplain and the degree to which water can continue to flow inland away from the breach. The most extensive and lowest floodplains thereby "generate" the largest breaches. For surges that approach the crest height, the weaker the protection of the defence, the greater the number of breaches. Defence reinforcement reduces both the number and size of the breaches.
Privacy Breach Analysis in Social Networks
NASA Astrophysics Data System (ADS)
Nagle, Frank
This chapter addresses various aspects of analyzing privacy breaches in social networks. We first review literature that defines three types of privacy breaches in social networks: interactive, active, and passive. We then survey the various network anonymization schemes that have been constructed to address these privacy breaches. After exploring these breaches and anonymization schemes, we evaluate a measure for determining the level of anonymity inherent in a network graph based on its topological structure. Finally, we close by emphasizing the difficulty of anonymizing social network data while maintaining usability for research purposes and offering areas for future work.
Holmes, Sean T; Alkan, Fahri; Iuliucci, Robbie J; Mueller, Karl T; Dybowski, Cecil
2016-07-05
(29) Si and (31) P magnetic-shielding tensors in covalent network solids have been evaluated using periodic and cluster-based calculations. The cluster-based computational methodology employs pseudoatoms to reduce the net charge (resulting from missing co-ordination on the terminal atoms) through valence modification of terminal atoms using bond-valence theory (VMTA/BV). The magnetic-shielding tensors computed with the VMTA/BV method are compared to magnetic-shielding tensors determined with the periodic GIPAW approach. The cluster-based all-electron calculations agree with experiment better than the GIPAW calculations, particularly for predicting absolute magnetic shielding and for predicting chemical shifts. The performance of the DFT functionals CA-PZ, PW91, PBE, rPBE, PBEsol, WC, and PBE0 are assessed for the prediction of (29) Si and (31) P magnetic-shielding constants. Calculations using the hybrid functional PBE0, in combination with the VMTA/BV approach, result in excellent agreement with experiment. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.
Combat Simulation Using Breach Computer Language
1979-09-01
simulation and weapon system analysis computer language Two types of models were constructed: a stochastic duel and a dynamic engagement model The... duel model validates the BREACH approach by comparing results with mathematical solutions. The dynamic model shows the capability of the BREACH...BREACH 2 Background 2 The Language 3 Static Duel 4 Background and Methodology 4 Validation 5 Results 8 Tank Duel Simulation 8 Dynamic Assault Model
2013-08-08
theft in the CERT Insider Threat Database were associated with foreign social network connections. 1 Verizon. “The 2013 Data Breach Investigations...passwords, opening infected attachments or web sites, etc. 1 Verizon. “The 2013 Data Breach Investigations Report.” http...were experienced by 38% of respondents1 • The 2013 Verizon Data Breach Report2 reveals • 29% of breaches studied leveraged social tactics • A
NASA Astrophysics Data System (ADS)
Ono, T.; Takahashi, T.
2017-12-01
Non-structural mitigation measures such as flood hazard map based on estimated inundation area have been more important because heavy rains exceeding the design rainfall frequently occur in recent years. However, conventional method may lead to an underestimation of the area because assumed locations of dike breach in river flood analysis are limited to the cases exceeding the high-water level. The objective of this study is to consider the uncertainty of estimated inundation area with difference of the location of dike breach in river flood analysis. This study proposed multiple flood scenarios which can set automatically multiple locations of dike breach in river flood analysis. The major premise of adopting this method is not to be able to predict the location of dike breach correctly. The proposed method utilized interval of dike breach which is distance of dike breaches placed next to each other. That is, multiple locations of dike breach were set every interval of dike breach. The 2D shallow water equations was adopted as the governing equation of river flood analysis, and the leap-frog scheme with staggered grid was used. The river flood analysis was verified by applying for the 2015 Kinugawa river flooding, and the proposed multiple flood scenarios was applied for the Akutagawa river in Takatsuki city. As the result of computation in the Akutagawa river, a comparison with each computed maximum inundation depth of dike breaches placed next to each other proved that the proposed method enabled to prevent underestimation of estimated inundation area. Further, the analyses on spatial distribution of inundation class and maximum inundation depth in each of the measurement points also proved that the optimum interval of dike breach which can evaluate the maximum inundation area using the minimum assumed locations of dike breach. In brief, this study found the optimum interval of dike breach in the Akutagawa river, which enabled estimated maximum inundation area to predict efficiently and accurately. The river flood analysis by using this proposed method will contribute to mitigate flood disaster by improving the accuracy of estimated inundation area.
Galactic cosmic ray abundances and spectra behind defined shielding.
Heinrich, W; Benton, E V; Wiegel, B; Zens, R; Rusch, G
1994-10-01
LET spectra have been measured for lunar missions and for several near Earth orbits ranging from 28 degrees to 83 degrees inclination. In some of the experiments the flux of GCR was determined separately from contributions caused by interactions in the detector material. Results of these experiments are compared to model calculations. The general agreement justifies the use of the model to calculate GCR fluxes. The magnitude of variations caused by solar modulation, geomagnetic shielding, and shielding by matter determined from calculated LET spectra is generally in agreement with experimental data. However, more detailed investigations show that there are some weak points in modeling solar modulation and shielding by material. These points are discussed in more detail.
Lasier, Peter J.
2018-06-06
The White Dam in Clarke County, Georgia, has been proposed for breaching. Efforts to determine potential risks to downstream biota included assessments of sediment collected in the vicinity of the dam. Sediments collected from sites upstream and downstream from the dam were evaluated for toxicity in 42-day exposures using the freshwater amphipod Hyalella azteca. Endpoints of the study were survival, growth, and reproduction of H. azteca. Results indicated no significant differences between the collected sediments and the water-only treatment used for comparison of the test endpoints. Therefore, based on the laboratory experiments in this study, sediment migration downstream from a breach of the Dam may not pose a toxicity risk to downstream biota.
19 CFR 10.39 - Cancellation of bond charges.
Code of Federal Regulations, 2011 CFR
2011-04-01
... amount of the bond. (f) Anticipatory breach. If an importer anticipates that the merchandise entered... anticipatory breach. At the time of written notification of the breach, the importer shall pay to Customs the...
19 CFR 10.39 - Cancellation of bond charges.
Code of Federal Regulations, 2014 CFR
2014-04-01
... amount of the bond. (f) Anticipatory breach. If an importer anticipates that the merchandise entered... anticipatory breach. At the time of written notification of the breach, the importer shall pay to Customs the...
19 CFR 10.39 - Cancellation of bond charges.
Code of Federal Regulations, 2012 CFR
2012-04-01
... amount of the bond. (f) Anticipatory breach. If an importer anticipates that the merchandise entered... anticipatory breach. At the time of written notification of the breach, the importer shall pay to Customs the...
19 CFR 10.39 - Cancellation of bond charges.
Code of Federal Regulations, 2013 CFR
2013-04-01
... amount of the bond. (f) Anticipatory breach. If an importer anticipates that the merchandise entered... anticipatory breach. At the time of written notification of the breach, the importer shall pay to Customs the...
Inversion Method for Early Detection of ARES-1 Case Breach Failure
NASA Technical Reports Server (NTRS)
Mackey, Ryan M.; Kulikov, Igor K.; Bajwa, Anupa; Berg, Peter; Smelyanskiy, Vadim
2010-01-01
A document describes research into the problem of detecting a case breach formation at an early stage of a rocket flight. An inversion algorithm for case breach allocation is proposed and analyzed. It is shown how the case breach can be allocated at an early stage of its development by using the rocket sensor data and the output data from the control block of the rocket navigation system. The results are simulated with MATLAB/Simulink software. The efficiency of an inversion algorithm for a case breach location is discussed. The research was devoted to the analysis of the ARES-l flight during the first 120 seconds after the launch and early prediction of case breach failure. During this time, the rocket is propelled by its first-stage Solid Rocket Booster (SRB). If a breach appears in SRB case, the gases escaping through it will produce the (side) thrust directed perpendicular to the rocket axis. The side thrust creates torque influencing the rocket attitude. The ARES-l control system will compensate for the side thrust until it reaches some critical value, after which the flight will be uncontrollable. The objective of this work was to obtain the start time of case breach development and its location using the rocket inertial navigation sensors and GNC data. The algorithm was effective for the detection and location of a breach in an SRB field joint at an early stage of its development.
Electrodeposition in microgravity: Ground-based experiments
NASA Technical Reports Server (NTRS)
Riley, C.; Coble, H. D.
1982-01-01
Electrodeposition was studied at one-hundreth g and compared with bench studies at 1 g. The low gravity was achieved during KC-135 aircraft parobolic flights. Flow in a simple cobalt cell (1 M CoSO4) operating under typical commercial conditions (10 to 20 mA/sq cm and 1 V) was monitored with a Schlieren optical system. Natural convection was absent at one-hundreth g. Quantitative comparisons on a cobalt cell with shielded electrodes using interferometry were carried out. Fringe shift differences indicate greater semi-infinite linear diffusion at 1 g than at one-hundreth g for cobalt. Since a shielded electrode operates under diffusion controlled conditions, no differences between 1 g and one-hundreth g would be expected. Similar comparisons on a shielded electrode copper cell were inconclusive. Bench codeposition experiments using polystyrene neutral buoyancy particles coupled with a shielded electrode cobalt cell were begun. Tracking of 12 micron particles showed no measurable difference between thermal/Brownian motion when the cell was operational or nonoperational. Initial experiments on codeposition quality showed a strong dependence upon cathode surface preparation in a shielded electrode configuration.
16 CFR 318.3 - Breach notification requirement.
Code of Federal Regulations, 2010 CFR
2010-01-01
... identification of each customer of the vendor of personal health records or PHR related entity whose unsecured... deemed to have knowledge of a breach if such breach is known, or reasonably should have been known, to...
Gasca, Fernando; Richter, Lars; Schweikard, Achim
2010-01-01
Transcranial Magnetic Stimulation (TMS) in the rat is a powerful tool for investigating brain function. However, the state-of-the-art experiments are considerably limited because the stimulation usually affects undesired anatomical structures. A simulation of a conductive shield plate placed between the coil stimulator and the rat brain during TMS is presented. The Finite Element (FE) method is used to obtain the 3D electric field distribution on a four-layer rat head model. The simulations show that the shield plate with a circular window can improve the focalization of stimulation, as quantitatively seen by computing the three-dimensional half power region (HPR). Focalization with the shield plate showed a clear compromise with the attenuation of the induced field. The results suggest that the shield plate can work as a helpful tool for conducting TMS rat experiments on specific targets.
Shavers, M R; Cucinotta, F A; Miller, J; Zeitlin, C; Heilbronn, L; Wilson, J W; Singleterry, R C
2001-01-01
Radiological assessment of the many cosmic ion species of widely distributed energies requires the use of theoretical transport models to accurately describe diverse physical processes related to nuclear reactions in spacecraft structures, planetary atmospheres and surfaces, and tissues. Heavy-ion transport models that were designed to characterize shielded radiation fields have been validated through comparison with data from thick-target irradiation experiments at particle accelerators. With the RTD Mission comes a unique opportunity to validate existing radiation transport models and guide the development of tools for shield design. For the first time, transport properties will be measured in free-space to characterize the shielding effectiveness of materials that are likely to be aboard interplanetary space missions. Target materials composed of aluminum, advanced composite spacecraft structure and other shielding materials, helium (a propellant) and tissue equivalent matrices will be evaluated. Large solid state detectors will provide kinetic energy and charge identification for incident heavy-ions and for secondary ions created in the target material. Transport calculations using the HZETRN model suggest that 8 g cm -2 thick targets would be adequate to evaluate the shielding effectiveness during solar minimum activity conditions for a period of 30 days or more.
Cyber Intrusion into U.S. Office of Personnel Management: In Brief
2015-07-17
has been taken offline for “security enhancements.”6 Notably, as is common with data breaches , available information on the recent OPM breach...developments remains incomplete. Assumptions about the nature, origins, extent, and implications of the data breach may change, and some media reporting...Congress, House Committee on Oversight and Government Reform, OPM: Data Breach , 114th Cong., 1st sess., June 16, 2015; U.S. Congress, House Committee
Desselle, Shane P.; Draugalis, JoLaine R.; Spies, Alan R.; Davis, Tamra S.; Bolino, Mark
2012-01-01
Objective. To identify pharmacy faculty members’ perceptions of psychological contract breaches that can be used to guide improvements in faculty recruitment, retention, and development. Methods. A list of psychological contract breaches was developed using a Delphi procedure involving a panel of experts assembled through purposive sampling. The Delphi consisted of 4 rounds, the first of which elicited examples of psychological contract breaches in an open-ended format. The ensuing 3 rounds consisting of a survey and anonymous feedback on aggregated group responses. Results. Usable responses were obtained from 11 of 12 faculty members who completed the Delphi procedure. The final list of psychological contract breaches included 27 items, after modifications based on participant feedback in subsequent rounds. Conclusion. The psychological contract breach items generated in this study provide guidance for colleges and schools of pharmacy regarding important aspects of faculty recruitment, retention, and development. PMID:22919084
Peirce, Gretchen L; Desselle, Shane P; Draugalis, JoLaine R; Spies, Alan R; Davis, Tamra S; Bolino, Mark
2012-08-10
To identify pharmacy faculty members' perceptions of psychological contract breaches that can be used to guide improvements in faculty recruitment, retention, and development. A list of psychological contract breaches was developed using a Delphi procedure involving a panel of experts assembled through purposive sampling. The Delphi consisted of 4 rounds, the first of which elicited examples of psychological contract breaches in an open-ended format. The ensuing 3 rounds consisting of a survey and anonymous feedback on aggregated group responses. Usable responses were obtained from 11 of 12 faculty members who completed the Delphi procedure. The final list of psychological contract breaches included 27 items, after modifications based on participant feedback in subsequent rounds. The psychological contract breach items generated in this study provide guidance for colleges and schools of pharmacy regarding important aspects of faculty recruitment, retention, and development.
Bathymetry of the Wilderness breach at Fire Island, New York, June 2013
Brownell, Andrew T.; Hapke, Cheryl J.; Spore, Nicholas J.; McNinch, Jesse E.
2015-01-01
The U.S. Geological Survey (USGS) St. Petersburg Coastal and Marine Science Center in St. Petersburg, Florida, collaborated with the U.S. Army Corps of Engineers Field Research Facility in Duck, North Carolina, to collect shallow water bathymetric data of the Wilderness breach on Fire Island, New York, in June 2013. The breach formed in October 2012 during Hurricane Sandy, and the USGS is involved in a post-Sandy effort to map, monitor, and model the morphologic evolution of the breach as part of Hurricane Sandy Supplemental Project GS2-2B: Linking Coastal Vulnerability and Process, Fire Island. This publication includes a bathymetric dataset of the breach and the adjacent nearshore on the ocean side of the island. The objective of the data collection and analysis is to map the bathymetry of the primary breach channel, ebb shoal, and nearshore bar system.
Space radiation shielding studies for astronaut and electronic component risk assessment
NASA Astrophysics Data System (ADS)
Fuchs, Jordan; Gersey, Brad; Wilkins, Richard
The space radiation environment is comprised of a complex and variable mix of high energy charged particles, gamma rays and other exotic species. Elements of this radiation field may also interact with intervening matter (such as a spaceship wall) and create secondary radiation particles such as neutrons. Some of the components of the space radiation environment are highly penetrating and can cause adverse effects in humans and electronic components aboard spacecraft. Developing and testing materials capable of providing effective shielding against the space radiation environment presents special challenges to researchers. Researchers at the Cen-ter for Radiation Engineering and Science for Space Exploration (CRESSE) at Prairie View AM University (PVAMU) perform accelerator based experiments testing the effectiveness of various materials for use as space radiation shields. These experiments take place at the NASA Space Radiation Laboratory at Brookhaven National Laboratory, the proton synchrotron at Loma Linda University Medical Center, and the Los Alamos Neutron Science Center at Los Alamos National Laboratory where charged particles and neutrons are produced at energies similar to those found in the space radiation environment. The work presented in this paper constitutes the beginning phase of an undergraduate research project created to contribute to this ongoing space radiation shielding project. Specifically, this student project entails devel-oping and maintaining a database of information concerning the historical data from shielding experiments along with a systematic categorization and storage system for the actual shielding materials. The shielding materials referred to here range in composition from standard materi-als such as high density polyethylene and aluminum to exotic multifunctional materials such as spectra-fiber infused composites. The categorization process for each material includes deter-mination of the density thickness of individual samples and a clear labeling and filing method that allows immediate cross referencing with other material samples during the experimental design process. Density thickness measurements will be performed using a precision scale that will allow for the fabrication of sets of standard density thicknesses of selected materials for ready use in shielding experiments. The historical data from previous shielding experiments consists primarily of measurements of absorbed dose, dose equivalent and dose distributions from a Tissue Equivalent Proportional Counter (TEPC) as measured downstream of various thicknesses of the materials while being irradiated in one of the aforementioned particle beams. This data has been digitally stored and linked to the composition of each material and may be easily accessed for shielding effectiveness inter-comparisons. This work was designed to facili-tate and increase the efficiency of ongoing space radiation shielding research performed at the CRESSE as well as serve as a way to educate new generations of space radiation researchers.
Identity Theft and Protecting Service Member’s Social Security Numbers
2009-04-01
AND ENDNOTES……………………………………………………………….39 iv List of Tables Table 1: Reports of Data Breaches 2006-2008…………………………………………………25 v AU/ACSC... data breach such as that in the VA as well as the GAO report, it is that individuals must be vigilant in protecting their information. Knowing the...breach totals from 2006 to 2008. From 2006 to 2008 government database breaches decreased by 50%. Table 1: Reports of Data Breaches 2006-2008
Snaptran2 experiment mounted on dolly being hauled by shielded locomotive ...
Snaptran-2 experiment mounted on dolly being hauled by shielded locomotive from IET towards A&M turntable. Note leads from experiment gathered at coupling bar in lower right of view. Another dolly in view at left. Camera facing southeast. Photographer: Page Comiskey. Date: August 25, 1965. INEEL negative no. 65-4503 - Idaho National Engineering Laboratory, Test Area North, Scoville, Butte County, ID
CrossTalk. The Journal of Defense Software Engineering. Volume 24, Number 5, Sep/Oct 2011
2011-09-01
Reduced security risks to data and information systems • Improved compliance • Reduction in the consequences of data breaches . In turn, these...applications do not generate the most useful data in the first place [1]. So many major data breaches reportedly occur without the knowledge of their...the need for such information. According to the Verizon Business 2010 Data Breach Investiga- tions Report [6], a large percentage of total breaches
Yaraghi, Niam; Gopal, Ram D
2018-03-01
Policy Points: Frequent data breaches in the US health care system undermine the privacy of millions of patients every year-a large number of which happen among business associates of the health care providers that continue to gain unprecedented access to patients' data as the US health care system becomes digitally integrated. Implementation of the HIPAA Omnibus Rules in 2013 has led to a significant decrease in the number of privacy breach incidents among business associates. Frequent data breaches in the US health care system undermine the privacy of millions of patients every year. A large number of such breaches happens among business associates of the health care providers that continue to gain unprecedented access to patients' data as the US health care system becomes digitally integrated. The Omnibus Rules of the Health Insurance Portability and Accountability Act (HIPAA), which were enacted in 2013, significantly increased the regulatory oversight and privacy protection requirements of business associates. The objective of this study is to empirically examine the effects of this shift in policy on the frequency of medical privacy breaches among business associates in the US health care system. The findings of this research shed light on how regulatory efforts can protect patients' privacy. Using publicly available data on breach incidents between October 2009 and August 2017 as reported by the Office for Civil Rights (OCR), we conducted an interrupted time-series analysis and a difference-in-differences analysis to examine the immediate and long-term effects of implementation of HIPAA omnibus rules on the frequency of medical privacy breaches. We show that implementation of the omnibus rules led to a significant reduction in the number of breaches among business associates and prevented 180 privacy breaches from happening, which could have affected nearly 18 million Americans. Implementation of HIPAA omnibus rules may have been a successful federal policy in enhancing privacy protection efforts and reducing the number of breach incidents in the US health care system. © 2018 Milbank Memorial Fund.
Walder, J.S.
1997-01-01
We analyse a simple, physically-based model of breach formation in natural and constructed earthen dams to elucidate the principal factors controlling the flood hydrograph at the breach. Formation of the breach, which is assumed trapezoidal in cross-section, is parameterized by the mean rate of downcutting, k, the value of which is constrained by observations. A dimensionless formulation of the model leads to the prediction that the breach hydrograph depends upon lake shape, the ratio r of breach width to depth, the side slope ?? of the breach, and the parameter ?? = (V/ D3)(k/???gD), where V = lake volume, D = lake depth, and g is the acceleration due to gravity. Calculations show that peak discharge Qp depends weakly on lake shape r and ??, but strongly on ??, which is the product of a dimensionless lake volume and a dimensionless erosion rate. Qp(??) takes asymptotically distinct forms depending on whether ?? > 1. Theoretical predictions agree well with data from dam failures for which k could be reasonably estimated. The analysis provides a rapid and in many cases graphical way to estimate plausible values of Qp at the breach.
Applicability of a Bonner Shere technique for pulsed neutron in 120 GeV proton facility
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sanami, T.; Hagiwara, M.; Iwase, H.
2008-02-01
The data on neutron spectra and intensity behind shielding are important for radiation safety design of high-energy accelerators since neutrons are capable of penetrating thick shielding and activating materials. Corresponding particle transport codes--that involve physics models of neutron and other particle production, transportation, and interaction--have been developed and used world-wide [1-8]. The results of these codes have been ensured through plenty of comparisons with experimental results taken in simple geometries. For neutron generation and transport, several related experiments have been performed to measure neutron spectra, attenuation length and reaction rates behind shielding walls of various thicknesses and materials in energymore » range up to several hundred of MeV [9-11]. The data have been used to benchmark--and modify if needed--the simulation modes and parameters in the codes, as well as the reference data for radiation safety design. To obtain such kind of data above several hundred of MeV, Japan-Fermi National Accelerator Laboratory (FNAL) collaboration for shielding experiments has been started in 2007, based on suggestion from the specialist meeting of shielding, Shielding Aspects of Target, Irradiation Facilities (SATIF), because of very limited data available in high-energy region (see, for example, [12]). As a part of this shielding experiment, a set of Bonner sphere (BS) was tested at the antiproton production target facility (pbar target station) at FNAL to obtain neutron spectra induced by a 120-GeV proton beam in concrete and iron shielding. Generally, utilization of an active detector around high-energy accelerators requires an improvement on its readout to overcome burst of secondary radiation since the accelerator delivers an intense beam to a target in a short period after relatively long acceleration period. In this paper, we employ BS for a spectrum measurement of neutrons that penetrate the shielding wall of the pbar target station in FNAL.« less
2013-01-22
eK ay a nd M cC le lla nd G ra ha m Katrina HEC -FIA LifeSim Figure 1: Comparison of loss of life models (based on Johnstone et al., 2005...Katrina HEC FIA Lifesim Application: flood types Levee breaching, river , coastal Levee breaching, river , coastal levee breaching, dam failure...Mortality – Overtopping with breach Center Side of American River (OTSC) Figure 31: Mortality for the HEC -FIA method for the two
2012-06-01
keys: Data Breach at the Pentagon’s Largest Supplier,” ITNEWS (30 May 2011). 116 Christopher Drew and John Markoff, “ Data Breach at Security Firm...117 Drew and Markoff, “ Data Breach at Security Firm Linked to Attack on Lockheed Martin.” 118 Hjortdal, “China’s Use of Cyber...John Markoff. “ Data Breach at Security Firm Linked to Attack on Lockheed Martin.” The New York Times, 27 May 2011. http://www.nytimes.com/2011/05/28
Biswas, Subir; Chattopadhyay, Monobir; Pal, Rabindranath
2011-01-01
The turbo molecular pump of the Magnetized Plasma Linear Experimental device is protected from damage by a magnetic shield. As the pump runs continuously in a magnetic field environment during a plasma physics experiment, it may get damaged owing to eddy current effect. For design and testing of the shield, first we simulate in details various aspects of magnetic shield layouts using a readily available field design code. The performance of the shield made from two half cylinders of soft iron material, is experimentally observed to agree very well with the simulation results.
Competition, Speculative Risks, and IT Security Outsourcing
NASA Astrophysics Data System (ADS)
Cezar, Asunur; Cavusoglu, Huseyin; Raghunathan, Srinivasan
Information security management is becoming a more critical and, simultaneously, a challenging function for many firms. Even though many security managers are skeptical about outsourcing of IT security, others have cited reasons that are used for outsourcing of traditional IT functions for why security outsourcing is likely to increase. Our research offers a novel explanation, based on competitive externalities associated with IT security, for firms' decisions to outsource IT security. We show that if competitive externalities are ignored, then a firm will outsource security if and only if the MSSP offers a quality (or a cost) advantage over in-house operations, which is consistent with the traditional explanation for security outsourcing. However, a higher quality is neither a prerequisite nor a guarantee for a firm to outsource security. The competitive risk environment and the nature of the security function outsourced, in addition to quality, determine firms' outsourcing decisions. If the reward from the competitor's breach is higher than the loss from own breach, then even if the likelihood of a breach is higher under the MSSP the expected benefit from the competitive demand externality may offset the loss from the higher likelihood of breaches, resulting in one or both firms outsourcing security. The incentive to outsource security monitoring is higher than that of infrastructure management because the MSSP can reduce the likelihood of breach on both firms and thus enhance the demand externality effect. The incentive to outsource security monitoring (infrastructure management) is higher (lower) if either the likelihood of breach on both firms is lower (higher) when security is outsourced or the benefit (relative to loss) from the externality is higher (lower). The benefit from the demand externality arising out of a security breach is higher when more of the customers that leave the breached firm switch to the non-breached firm.
Morphologic evolution of the wilderness area breach at Fire Island, New York—2012–15
Hapke, Cheryl J.; Nelson, Timothy R.; Henderson, Rachel E.; Brenner, Owen T.; Miselis, Jennifer L.
2017-09-18
IntroductionHurricane Sandy, which made landfall on October 29, 2012, near Atlantic City, New Jersey, had a significant impact on the coastal system along the south shore of Long Island, New York. A record significant wave height of 9.6 meters (m) was measured at wave buoy 44025, approximately 48 kilometers offshore of Fire Island, New York. Surge and runup during the storm resulted in extensive beach and dune erosion and breaching of the Fire Island barrier island system at two locations, including a breach that formed within the Otis Pike Fire Island High Dune Wilderness area on the eastern side of Fire Island.The U.S. Geological Survey (USGS) has a long history of conducting morphologic change and processes research at Fire Island. One of the primary objectives of the current research effort is to understand the morphologic evolution of the barrier system on a variety of time scales (from storm scale to decade(s) to century). A number of studies that support the project objectives have been published. Prior to Hurricane Sandy, however, little information was available on specific storm-driven change in this region. The USGS received Hurricane Sandy supplemental funding (project GS2–2B: Linking Coastal Processes and Vulnerability, Fire Island, New York, Regional Study) to enhance existing research efforts at Fire Island. The existing research was greatly expanded to include inner continental shelf mapping and investigations of processes of inner shelf sediment transport; beach and dune response and recovery; and observation, analysis, and modeling of the newly formed breach in the Otis Pike High Dune Wilderness area, herein referred to as the wilderness breach. The breach formed at the site of Old Inlet, which was open from 1763 to 1825. The location of the initial island breaching does not directly correspond with topographic lows of the dunes, but instead the breach formed in the location of a cross-island boardwalk that was destroyed during Hurricane Sandy.From 2013 to November 2015, bathymetric data were collected by the USGS St. Petersburg Coastal and Marine Science Center during three surveys of the breach channel and tidal shoals, and shoreline positions on each side of the breach (also collected by the National Park Service). Additionally, pre-storm topography/bathymetry EAARL–B light detection and ranging (lidar) data were collected by the USGS the day prior to Hurricane Sandy’s landfall. These data serve as a baseline for change analyses during four subsequent periods: June 2013, June 2014, October 2014, and May 2015. The June 2013 single-beam bathymetry data were collected in collaboration with the U.S. Army Corps of Engineers (USACE), using the Lighter Amphibious Resupply Cargo (LARC) vessel, and included the ebb shoal and breach channel. The USGS collected and processed the three additional bathymetric datasets using personal watercraft equipped with single-beam echo sounders and backpack Global Positioning System (GPS) over shallow flood shoals.Eastern and western breach shorelines were surveyed weekly to monthly beginning on November 6, 2012 (by the National Park Service [NPS], and USGS St. Petersburg Coastal and Marine Science Center), with measurements made every few weeks for the first year and every few months after October 2013. The NPS and researchers from Stony Brook University monitored the breach by collecting field data of the breach channel bathymetry, conducting aerial photographic overflights, and performing water-quality analyses (see http://po.msrc.sunysb.edu/GSB/). The aerial photography collected and rectified by Stony Brook University is used extensively in our morphologic change description to examine changes to breach shorelines (supplementing shoreline data collected in the field), channel width, and orientation. Due to the uncertainties and the variation in survey methods, a rigorous quantitative analysis was not performed. However, average calculations of various breach metrics allow a qualitative analysis of breach development and evolution.This report presents an overview of the data collected and a summary discussion of the observed changes to the breach system and the seasonal wave climatology associated with the breach morphodynamic response.
16 CFR 318.6 - Content of notice.
Code of Federal Regulations, 2013 CFR
2013-01-01
... of unsecured PHR identifiable health information that were involved in the breach (such as full name... Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS HEALTH BREACH... individuals should take to protect themselves from potential harm resulting from the breach; (d) A brief...
16 CFR 318.6 - Content of notice.
Code of Federal Regulations, 2014 CFR
2014-01-01
... of unsecured PHR identifiable health information that were involved in the breach (such as full name... Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS HEALTH BREACH... individuals should take to protect themselves from potential harm resulting from the breach; (d) A brief...
16 CFR 318.6 - Content of notice.
Code of Federal Regulations, 2012 CFR
2012-01-01
... of unsecured PHR identifiable health information that were involved in the breach (such as full name... Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS HEALTH BREACH... individuals should take to protect themselves from potential harm resulting from the breach; (d) A brief...
An outlet breaching algorithm for the treatment of closed depressions in a raster DEM
NASA Astrophysics Data System (ADS)
Martz, Lawrence W.; Garbrecht, Jurgen
1999-08-01
Automated drainage analysis of raster DEMs typically begins with the simulated filling of all closed depressions and the imposition of a drainage pattern on the resulting flat areas. The elimination of closed depressions by filling implicitly assumes that all depressions are caused by elevation underestimation. This assumption is difficult to support, as depressions can be produced by overestimation as well as by underestimation of DEM values.This paper presents a new algorithm that is applied in conjunction with conventional depression filling to provide a more realistic treatment of those depressions that are likely due to overestimation errors. The algorithm lowers the elevation of selected cells on the edge of closed depressions to simulate breaching of the depression outlets. Application of this breaching algorithm prior to depression filling can substantially reduce the number and size of depressions that need to be filled, especially in low relief terrain.Removing or reducing the size of a depression by breaching implicitly assumes that the depression is due to a spurious flow blockage caused by elevation overestimation. Removing a depression by filling, on the other hand, implicitly assumes that the depression is a direct artifact of elevation underestimation. Although the breaching algorithm cannot distinguish between overestimation and underestimation errors in a DEM, a constraining parameter for breaching length can be used to restrict breaching to closed depressions caused by narrow blockages along well-defined drainage courses. These are considered the depressions most likely to have arisen from overestimation errors. Applying the constrained breaching algorithm prior to a conventional depression-filling algorithm allows both positive and negative elevation adjustments to be used to remove depressions.The breaching algorithm was incorporated into the DEM pre-processing operations of the TOPAZ software system. The effect of the algorithm is illustrated by the application of TOPAZ to a DEM of a low-relief landscape. The use of the breaching algorithm during DEM pre-processing substantially reduced the number of cells that needed to be subsequently raised in elevation to remove depressions. The number and kind of depression cells that were eliminated by the breaching algorithm suggested that the algorithm effectively targeted those topographic situations for which it was intended. A detailed inspection of a portion of the DEM that was processed using breaching algorithm in conjunction with depression-filling also suggested the effects of the algorithm were as intended.The breaching algorithm provides an empirically satisfactory and robust approach to treating closed depressions in a raster DEM. It recognises that depressions in certain topographic settings are as likely to be due to elevation overestimation as to elevation underestimation errors. The algorithm allows a more realistic treatment of depressions in these situations than conventional methods that rely solely on depression-filling.
Blanke, Sandra J; McGrady, Elizabeth
2016-07-01
Health care stakeholders are concerned about the growing risk of protecting sensitive patient health information from breaches. The Federal Emergency Management Agency (FEMA) has identified cyber attacks as an emerging concern, and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH) have increased security requirements and are enforcing compliance through stiff financial penalties. The purpose of this study is to describe health care breaches of protected information, analyze the hazards and vulnerabilities of reported breach cases, and prescribe best practices of managing risk through security controls and countermeasures. Prescriptive findings were used to construct a checklist tool to assess and monitor common risks. This research uses a case methodology to describe specific examples of the 3 major types of cyber breach hazards: portable device, insider, and physical breaches. We utilize a risk management framework to prescribe preventative actions that organizations can take to assess, analyze, and mitigate these risks. The health care sector has the largest number of reported breaches, with 3 major types: portable device, insider, and physical breaches. Analysis of actual cases indicates security gaps requiring prescriptive fixes based on "best practices." Our research culminates in a 25-item checklist that organizations can use to assess existing practices and identify security gaps requiring improvement. © 2016 American Society for Healthcare Risk Management of the American Hospital Association.
Validation of Shielding Analysis Capability of SuperMC with SINBAD
NASA Astrophysics Data System (ADS)
Chen, Chaobin; Yang, Qi; Wu, Bin; Han, Yuncheng; Song, Jing
2017-09-01
Abstract: The shielding analysis capability of SuperMC was validated with the Shielding Integral Benchmark Archive Database (SINBAD). The SINBAD was compiled by RSICC and NEA, it includes numerous benchmark experiments performed with the D-T fusion neutron source facilities of OKTAVIAN, FNS, IPPE, etc. The results from SuperMC simulation were compared with experimental data and MCNP results. Very good agreement with deviation lower than 1% was achieved and it suggests that SuperMC is reliable in shielding calculation.
38 CFR 75.118 - Other credit protection services.
Code of Federal Regulations, 2014 CFR
2014-07-01
... harm. (c) The Secretary will take action to obtain data mining and data breach analyses services, as... (CONTINUED) INFORMATION SECURITY MATTERS Data Breaches § 75.118 Other credit protection services. (a) With... relevant credit bureau reports; (2) Data breach analysis; (3) Fraud resolution services, including writing...
38 CFR 75.118 - Other credit protection services.
Code of Federal Regulations, 2013 CFR
2013-07-01
... harm. (c) The Secretary will take action to obtain data mining and data breach analyses services, as... (CONTINUED) INFORMATION SECURITY MATTERS Data Breaches § 75.118 Other credit protection services. (a) With... relevant credit bureau reports; (2) Data breach analysis; (3) Fraud resolution services, including writing...
38 CFR 75.118 - Other credit protection services.
Code of Federal Regulations, 2012 CFR
2012-07-01
... harm. (c) The Secretary will take action to obtain data mining and data breach analyses services, as... (CONTINUED) INFORMATION SECURITY MATTERS Data Breaches § 75.118 Other credit protection services. (a) With... relevant credit bureau reports; (2) Data breach analysis; (3) Fraud resolution services, including writing...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-18
... DEPARTMENT OF THE INTERIOR National Park Service Grand Ditch Breach Restoration Environmental... Restoration, Rocky Mountain National Park, Colorado. SUMMARY: Pursuant to the National Environmental Policy... Statement for the Grand Ditch Breach Restoration, Rocky Mountain National Park, Colorado. This effort will...
38 CFR 75.118 - Other credit protection services.
Code of Federal Regulations, 2010 CFR
2010-07-01
... harm. (c) The Secretary will take action to obtain data mining and data breach analyses services, as... (CONTINUED) INFORMATION SECURITY MATTERS Data Breaches § 75.118 Other credit protection services. (a) With... relevant credit bureau reports; (2) Data breach analysis; (3) Fraud resolution services, including writing...
38 CFR 75.118 - Other credit protection services.
Code of Federal Regulations, 2011 CFR
2011-07-01
... harm. (c) The Secretary will take action to obtain data mining and data breach analyses services, as... (CONTINUED) INFORMATION SECURITY MATTERS Data Breaches § 75.118 Other credit protection services. (a) With... relevant credit bureau reports; (2) Data breach analysis; (3) Fraud resolution services, including writing...
A high-performance magnetic shield with large length-to-diameter ratio.
Dickerson, Susannah; Hogan, Jason M; Johnson, David M S; Kovachy, Tim; Sugarbaker, Alex; Chiow, Sheng-wey; Kasevich, Mark A
2012-06-01
We have demonstrated a 100-fold improvement in the magnetic field uniformity on the axis of a large aspect ratio, cylindrical, mumetal magnetic shield by reducing discontinuities in the material of the shield through the welding and re-annealing of a segmented shield. The three-layer shield reduces Earth's magnetic field along an 8 m region to 420 μG (rms) in the axial direction, and 460 and 730 μG (rms) in the two transverse directions. Each cylindrical shield is a continuous welded tube which has been annealed after manufacture and degaussed in the apparatus. We present both experiments and finite element analysis that show the importance of uniform shield material for large aspect ratio shields, favoring a welded design over a segmented design. In addition, we present finite element results demonstrating the smoothing of spatial variations in the applied magnetic field by cylindrical magnetic shields. Such homogenization is a potentially useful feature for precision atom interferometric measurements.
Performance study of galactic cosmic ray shield materials
NASA Technical Reports Server (NTRS)
Kim, Myung-Hee Y.; Wilson, John W.; Thibeault, Sheila A.; Nealy, John E.; Badavi, Francis F.; Kiefer, Richard L.
1994-01-01
The space program is faced with two difficult radiation protection issues for future long-term operations. First, retrofit of shield material or conservatism in shield design is prohibitively expensive and often impossible. Second, shielding from the cosmic heavy ions is faced with limited knowledge on the physical properties and biological responses of these radiations. The current status of space shielding technology and its impact on radiation health is discussed herein in terms of conventional protection practice and a test biological response model. The impact of biological response on the selection of optimum materials for cosmic ray shielding is presented in terms of the transmission characteristics of the shield material. Although the systematics of nuclear cross sections are able to demonstrate the relation of exposure risk to shield-material composition, the current uncertainty in-nuclear cross sections will not allow an accurate evaluation of risk reduction. This paper presents a theoretical study of risk-related factors and a pilot experiment to study the effectiveness of choice of shield materials to reduce the risk in space operations.
Testing the Rotation Stage in the ARIADNE Axion Experiment
NASA Astrophysics Data System (ADS)
Dargert, Jordan; Lohmeyer, Chloe; Harkness, Mindy; Cunningham, Mark; Fosbinder-Elkins, Harry; Geraci, Andrew; Ariadne Collaboration
2017-04-01
The Axion Resonant InterAction Detection Experiment (ARIADNE) will search for the Peccei-Quinn (PQ) axion, a hypothetical particle that is a dark matter candidate. Using a new technique based on Nuclear Magnetic Resonance, this new method can probe well into the allowed PQ axion mass range. Additionally, it does not rely on cosmological assumptions, meaning that the PQ Axion would be sourced locally. Our project relies on the stability of a rotating segmented source mass and superconducting magnetic shielding. Superconducting shielding is essential for limiting magnetic noise, thus allowing a feasible level of sensitivity required for PQ Axion detection. Progress on testing the stability of the rotary mechanism will be reported, and the design for the superconducting shielding in the experiment will be discussed, along with plans for moving the experiment forward. NSF Grant PHY-1509176.
An Analysis of Data Breach Notifications as Negative News
ERIC Educational Resources Information Center
Veltsos, Jennifer R.
2012-01-01
Forty-six states require organizations to notify users when personally identifiable information has been exposed or when the organization's data security measures have been breached. This article describes a qualitative document analysis of 13 data breach notification templates from state and federal agencies. The results confirm much of the…
Comparing process-based breach models for earthen embankments subjected to internal erosion
USDA-ARS?s Scientific Manuscript database
Predicting the potential flooding from a dam site requires prediction of outflow resulting from breach. Conservative estimates from the assumption of instantaneous breach or from an upper envelope of historical cases are readily computed, but these estimates do not reflect the properties of a speci...
An Examination of the Explicit Costs of Sensitive Information Security Breaches
ERIC Educational Resources Information Center
Toe, Cleophas Adeodat
2013-01-01
Data security breaches are categorized as loss of information that is entrusted in an organization by its customers, partners, shareholders, and stakeholders. Data breaches are significant risk factors for companies that store, process, and transmit sensitive personal information. Sensitive information is defined as confidential or proprietary…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-03
... list (see current List 7 titled Misrepresentation/Omissions, List 9 titled Negligence/Breach of... claims alleging misrepresentation/ omissions (see current List 8, Item 1), negligence/breach of fiduciary... claims alleging misrepresentation/ omission (see current List 8, Item 2), negligence/breach of fiduciary...
"Financial Emergency" and the Faculty Furlough: A Breach of Contract.
ERIC Educational Resources Information Center
Richards, Mary Sanders
1984-01-01
The power of the university to breach faculty contracts in order to meet its temporary cash-flow problems and the rights of faculty when this breach occurs are discussed. To avoid litigation, a university must have established internal guidelines which can be incorporated into an employment contract. (MLW)
Just in Time Research: Data Breaches in Higher Education
ERIC Educational Resources Information Center
Grama, Joanna
2014-01-01
This "Just in Time" research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education. Using data from the Privacy Rights Clearinghouse, this research analyzes data breaches attributed to higher education. The results from this…
14 CFR 1274.936 - Breach of safety or security.
Code of Federal Regulations, 2013 CFR
2013-01-01
.... (a) Security is the condition of safeguarding against espionage, sabotage, crime (including computer... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Breach of safety or security. 1274.936... security. Breach of Safety or Security July 2002 Safety is the freedom from those conditions that can cause...
14 CFR 1274.936 - Breach of safety or security.
Code of Federal Regulations, 2010 CFR
2010-01-01
.... (a) Security is the condition of safeguarding against espionage, sabotage, crime (including computer... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Breach of safety or security. 1274.936... security. Breach of Safety or Security July 2002 Safety is the freedom from those conditions that can cause...
14 CFR 1274.936 - Breach of safety or security.
Code of Federal Regulations, 2011 CFR
2011-01-01
.... (a) Security is the condition of safeguarding against espionage, sabotage, crime (including computer... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Breach of safety or security. 1274.936... security. Breach of Safety or Security July 2002 Safety is the freedom from those conditions that can cause...
Comparison of Dam Breach Parameter Estimators
2008-01-01
of the methods, when used in the HEC - RAS simulation model , produced comparable results. The methods tested suggest use of ...characteristics of a dam breach, use of those parameters within the unsteady flow routing model HEC - RAS , and the computation and display of the resulting...implementation of these breach parameters in
Identity Theft: Trends and Issues
2010-01-05
mitigate the effects of identity theft, one option Congress may consider is whether to strengthen data breach notification requirements. Such requirements...identity theft complaints to the FTC as well as in the number of reported data breaches placing personally identifiable information at risk. This report...23 Effects of Data Breaches ..................................................................................................... 24
Ost, Suzanne
2016-01-01
In this article, I argue that sexual exploitation in the doctor–patient relationship would be dealt with more appropriately by the law in England and Wales on the basis of a breach of fiduciary duty. Three different types of sexual boundary breaches are discussed, and the particular focus is on breaches where the patient's consent is obtained through inducement. I contend that current avenues of redress do not clearly catch this behaviour and, moreover, they fail to capture the essence of the wrong committed by the doctor—the knowing breach of trust for self-gain—and the calculated way in which consent is induced. Finally, I demonstrate that the fiduciary approach is compatible with the contemporary pro-patient autonomy model of the doctor–patient relationship. PMID:26846652
NASA Astrophysics Data System (ADS)
Ribeiro, Jose Pedro N.; Saggio, Ângelo; Lima, Maria Inês Salgueiro
2013-04-01
Artificial sandbar opening of intermittently open estuaries is a practice utilised worldwide to improve water quality, fishing, and recreational amenities and to prevent the flooding of adjacent properties. Breaching causes the water level to drop drastically, exposing plants to two water level extremes. With some exceptions, estuarine communities are adversely affected by this practice. Although breaching can happen naturally, artificial breaching is on the rise, and the impact of manipulating water levels on estuarine communities needs to be investigated. In this work, we described the breaching cycles of the Massaguaçu River Estuary and proposed flooding scenarios for the estuary's macrophyte banks based on our data. We calculated the relationship between plant distribution and flooding conditions and used our calculations to predict the estuary community's composition depending on the water level at breaching time. We discovered a strong relationship between plant distribution and flooding conditions, and we predicted that the estuarine community would be markedly different between flooding scenarios. Low frequency flooding scenarios would be related to submerged macrophytes and, as the flooding frequency increases, macrophytes would be replaced by amphibious plants, and eventually by the arboreal stratus. Therefore, we concluded that an increase in artificial breaching cycles would have a detrimental impact on the estuary community.
Simulation of Flow Through Breach in Leading Edge at Mach 24
NASA Technical Reports Server (NTRS)
Gnoffo, Peter A.; Alter, Stephen J.
2004-01-01
A baseline solution for CFD Point 1 (Mach 24) in the STS-107 accident investigation was modified to include effects of holes through the leading edge into a vented cavity. The simulations were generated relatively quickly and early in the investigation by making simplifications to the leading edge cavity geometry. These simplifications in the breach simulations enabled: 1) A very quick grid generation procedure; 2) High fidelity corroboration of jet physics with internal surface impingements ensuing from a breach through the leading edge, fully coupled to the external shock layer flow at flight conditions. These simulations provided early evidence that the flow through a 2 inch diameter (or larger) breach enters the cavity with significant retention of external flow directionality. A normal jet directed into the cavity was not an appropriate model for these conditions at CFD Point 1 (Mach 24). The breach diameters were of the same order or larger than the local, external boundary-layer thickness. High impingement heating and pressures on the downstream lip of the breach were computed. It is likely that hole shape would evolve as a slot cut in the direction of the external streamlines. In the case of the 6 inch diameter breach the boundary layer is fully ingested.
Bobrovitz, Niklas; Lasserson, Daniel S; Briggs, Adam D M
2017-11-02
The four-hour target is a key hospital emergency department performance indicator in England and one that drives the physical and organisational design of the ED. Some studies have identified time of presentation as a key factor affecting waiting times. Few studies have investigated other determinants of breaching the four-hour target. Therefore, our objective was to describe patterns of emergency department breaches of the four-hour wait time target and identify patients at highest risk of breaching. This was a retrospective cohort study of a large type 1 Emergency department at an NHS teaching hospital in Oxford, England. We analysed anonymised individual level patient data for 378,873 emergency department attendances, representing all attendances between April 2008 and April 2013. We examined patient characteristics and emergency department presentation circumstances associated with the highest likelihood of breaching the four-hour wait time target. We used 374,459 complete cases for analysis. In total, 8.3% of all patients breached the four-hour wait time target. The main determinants of patients breaching the four-hour wait time target were hour of arrival to the ED, day of the week, patient age, ED referral source, and the types of investigations patients receive (p < 0.01 for all associations). Patients most likely to breach the four-hour target were older, presented at night, presented on Monday, received multiple types of investigation in the emergency department, and were not self-referred (p < 0.01 for all associations). Patients attending from October to February had a higher odds of breaching compared to those attending from March to September (OR 1.63, 95% CI 1.59 to 1.66). There are a number of independent patient and circumstantial factors associated with the probability of breaching the four-hour ED wait time target including patient age, ED referral source, the types of investigations patients receive, as well as the hour, day, and month of arrival to the ED. Efforts to reduce the number of breaches could explore late-evening/overnight staffing, access to diagnostic tests, rapid discharge facilities, and early assessment and input on diagnostic and management strategies from a senior practitioner.
The effect of tip shields on a horizontal tail surface
NASA Technical Reports Server (NTRS)
Dronin, Paul V; Ramsden, Earl I; Higgins, George J
1928-01-01
A series of experiments made in the wind tunnel of the Daniel Guggenheim School of Aeronautics, New York University, on the effect of tip shields on a horizontal tail surface are described and discussed. It was found that some aerodynamic gain can be obtained by the use of tip shields though it is considered doubtful whether their use would be practical.
Neutron skyshine calculations for the PDX tokamak
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wheeler, F.J.; Nigg, D.W.
1979-01-01
The Poloidal Divertor Experiment (PDX) at Princeton will be the first operating tokamak to require a substantial radiation shield. The PDX shielding includes a water-filled roof shield over the machine to reduce air scattering skyshine dose in the PDX control room and at the site boundary. During the design of this roof shield a unique method was developed to compute the neutron source emerging from the top of the roof shield for use in Monte Carlo skyshine calculations. The method is based on simple, one-dimensional calculations rather than multidimensional calculations, resulting in considerable savings in computer time and input preparationmore » effort. This method is described.« less
Transport calculations and accelerator experiments needed for radiation risk assessment in space.
Sihver, Lembit
2008-01-01
The major uncertainties on space radiation risk estimates in humans are associated to the poor knowledge of the biological effects of low and high LET radiation, with a smaller contribution coming from the characterization of space radiation field and its primary interactions with the shielding and the human body. However, to decrease the uncertainties on the biological effects and increase the accuracy of the risk coefficients for charged particles radiation, the initial charged-particle spectra from the Galactic Cosmic Rays (GCRs) and the Solar Particle Events (SPEs), and the radiation transport through the shielding material of the space vehicle and the human body, must be better estimated Since it is practically impossible to measure all primary and secondary particles from all possible position-projectile-target-energy combinations needed for a correct risk assessment in space, accurate particle and heavy ion transport codes must be used. These codes are also needed when estimating the risk for radiation induced failures in advanced microelectronics, such as single-event effects, etc., and the efficiency of different shielding materials. It is therefore important that the models and transport codes will be carefully benchmarked and validated to make sure they fulfill preset accuracy criteria, e.g. to be able to predict particle fluence, dose and energy distributions within a certain accuracy. When validating the accuracy of the transport codes, both space and ground based accelerator experiments are needed The efficiency of passive shielding and protection of electronic devices should also be tested in accelerator experiments and compared to simulations using different transport codes. In this paper different multipurpose particle and heavy ion transport codes will be presented, different concepts of shielding and protection discussed, as well as future accelerator experiments needed for testing and validating codes and shielding materials.
NASA Astrophysics Data System (ADS)
Bhuyian, M. N. M.; Kalyanapu, A. J.; Dullo, T. T.; VandenBerge, D.
2017-12-01
The Obion River, located in North-West Tennessee was channelized in last century to increase flow capacity and reduce flooding. Upstream of the river mainly consists of multiple tributaries that merge near Rives. The lowest water level (LWL) downstream of Rives has increased about four feet since 1980. It is estimated that this phenomenon could reduce 20% of channel conveyance if water surface slope is assumed same as channel slope. Reduction in conveyance would result in a frequent exposure to flood stage and higher stage for a given flood. Bed level change and exposure to flood stage are critical to levee safety. In the Obion River, levee breach was responsible for flooding in instances even when flood stage was lower than the levee crest. In such a circumstance, accurate simulation of inundation extent via conventional flood model is challenging because, the flood models consider ground data as static and cannot accommodate breaching unless the location of breaching is specified. Therefore, the objective of this study is to propose an approach for determining hotspots of levee breach via fine resolution hydrodynamic modeling to reduce uncertainty in flood inundation modeling. A two-dimensional LiDAR based hydrodynamic model for the Obion River would be used to determine levee breach hotspots using simulated flow parameters (i.e. current velocity, change in stage, time of exposure to high stage etc.) for a design flood event. Identifying breaching hotspots would allow determining probabilistic flood extent under probable breaching conditions. This should reduce uncertainty in inundation mapping in a channelized riverine system.
50 CFR 38.9 - Breach of the peace.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 50 Wildlife and Fisheries 9 2012-10-01 2012-10-01 false Breach of the peace. 38.9 Section 38.9 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM MIDWAY ATOLL NATIONAL WILDLIFE REFUGE Prohibitions § 38.9 Breach of the...
50 CFR 38.9 - Breach of the peace.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 50 Wildlife and Fisheries 9 2013-10-01 2013-10-01 false Breach of the peace. 38.9 Section 38.9 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM MIDWAY ATOLL NATIONAL WILDLIFE REFUGE Prohibitions § 38.9 Breach of the...
50 CFR 38.9 - Breach of the peace.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 50 Wildlife and Fisheries 8 2011-10-01 2011-10-01 false Breach of the peace. 38.9 Section 38.9 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM MIDWAY ATOLL NATIONAL WILDLIFE REFUGE Prohibitions § 38.9 Breach of the...
50 CFR 38.9 - Breach of the peace.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 50 Wildlife and Fisheries 9 2014-10-01 2014-10-01 false Breach of the peace. 38.9 Section 38.9 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM MIDWAY ATOLL NATIONAL WILDLIFE REFUGE Prohibitions § 38.9 Breach of the...
Testing the Differential Effects of Changes in Psychological Contract Breach and Fulfillment
ERIC Educational Resources Information Center
Conway, Neil; Guest, David; Trenberth, Linda
2011-01-01
Rousseau (1989 and elsewhere) argued that a defining feature of psychological contract breach was that once a promise had been broken it could not easily be repaired and therefore that the effects of psychological contract breach outweighed those of psychological contract fulfillment. Using two independent longitudinal surveys, this paper…
Breaches of health information: are electronic records different from paper records?
Sade, Robert M
2010-01-01
Breaches of electronic medical records constitute a type of healthcare error, but should be considered separately from other types of errors because the national focus on the security of electronic data justifies special treatment of medical information breaches. Guidelines for protecting electronic medical records should be applied equally to paper medical records.
Fission gas release restrictor for breached fuel rod
Kadambi, N. Prasad; Tilbrook, Roger W.; Spencer, Daniel R.; Schwallie, Ambrose L.
1986-01-01
In the event of a breach in the cladding of a rod in an operating liquid metal fast breeder reactor, the rapid release of high-pressure gas from the fission gas plenum may result in a gas blanketing of the breached rod and rods adjacent thereto which impairs the heat transfer to the liquid metal coolant. In order to control the release rate of fission gas in the event of a breached rod, the substantial portion of the conventional fission gas plenum is formed as a gas bottle means which includes a gas pervious means in a small portion thereof. During normal reactor operation, as the fission gas pressure gradually increases, the gas pressure interiorly of and exteriorly of the gas bottle means equalizes. In the event of a breach in the cladding, the gas pervious means in the gas bottle means constitutes a sufficient restriction to the rapid flow of gas therethrough that under maximum design pressure differential conditions, the fission gas flow through the breach will not significantly reduce the heat transfer from the affected rod and adjacent rods to the liquid metal heat transfer fluid flowing therebetween.
Numerical modelling of glacial lake outburst floods using physically based dam-breach models
NASA Astrophysics Data System (ADS)
Westoby, M. J.; Brasington, J.; Glasser, N. F.; Hambrey, M. J.; Reynolds, J. M.; Hassan, M. A. A. M.; Lowe, A.
2015-03-01
The instability of moraine-dammed proglacial lakes creates the potential for catastrophic glacial lake outburst floods (GLOFs) in high-mountain regions. In this research, we use a unique combination of numerical dam-breach and two-dimensional hydrodynamic modelling, employed within a generalised likelihood uncertainty estimation (GLUE) framework, to quantify predictive uncertainty in model outputs associated with a reconstruction of the Dig Tsho failure in Nepal. Monte Carlo analysis was used to sample the model parameter space, and morphological descriptors of the moraine breach were used to evaluate model performance. Multiple breach scenarios were produced by differing parameter ensembles associated with a range of breach initiation mechanisms, including overtopping waves and mechanical failure of the dam face. The material roughness coefficient was found to exert a dominant influence over model performance. The downstream routing of scenario-specific breach hydrographs revealed significant differences in the timing and extent of inundation. A GLUE-based methodology for constructing probabilistic maps of inundation extent, flow depth, and hazard is presented and provides a useful tool for communicating uncertainty in GLOF hazard assessment.
Modeling of molecular and particulate transport in dry spent nuclear fuel canisters
NASA Astrophysics Data System (ADS)
Casella, Andrew M.
2007-09-01
The transportation and storage of spent nuclear fuel is one of the prominent issues facing the commercial nuclear industry today, as there is still no general consensus regarding the near- and long-term strategy for managing the back-end of the nuclear fuel cycle. The debate continues over whether the fuel cycle should remain open, in which case spent fuel will be stored at on-site reactor facilities, interim facilities, or a geologic repository; or if the fuel cycle should be closed, in which case spent fuel will be recycled. Currently, commercial spent nuclear fuel is stored at on-site reactor facilities either in pools or in dry storage containers. Increasingly, spent fuel is being moved to dry storage containers due to decreased costs relative to pools. As the number of dry spent fuel containers increases and the roles they play in the nuclear fuel cycle increase, more regulations will be enacted to ensure that they function properly. Accordingly, they will have to be carefully analyzed for normal conditions, as well as any off-normal conditions of concern. This thesis addresses the phenomena associated with one such concern; the formation of a microscopic through-wall breach in a dry storage container. Particular emphasis is placed on the depressurization of the canister, release of radioactivity, and plugging of the breach due to deposition of suspended particulates. The depressurization of a dry storage container upon the formation of a breach depends on the temperature and quantity of the fill gas, the pressure differential across the breach, and the size of the breach. The first model constructed in this thesis is capable of determining the depressurization time for a breached container as long as the associated parameters just identified allow for laminar flow through the breach. The parameters can be manipulated to quantitatively determine their effect on depressurization. This model is expanded to account for the presence of suspended particles. If these particles are transported with the fill gas into the breach, they may be deposited, leading to a restriction of flow and eventually to the plugging of the breach. This model uses an analytical solution to the problem of particle deposition in convective-diffusive fully-developed laminar flow through a straight cylindrical tube. Since the cylindrical flow geometry is a requirement for the use of this equation, it is assumed that all deposited particles are distributed uniformly both axially and circumferentially along the breach. The model is capable of monitoring the pressure, temperature, quantity of fill gas, breach radius, particle transmission fraction, and flow velocity through the breach as functions of time. The depressurization time can be significantly affected by the release of fission gases or helium generated from alpha decay if the cladding of a fuel rod within the canister is breached. To better quantify this phenomenon, a Monte Carlo model of molecular transport through nano-scale flow pathways in the spent fuel is developed in this thesis. This model is applied to cylindrical, conical, elliptical, and helical pathways. Finally, in order to remove some of the restrictions of the model of canister depressurization accounting for suspended particles, a Monte Carlo program was written to model the movement of particles through the breach. This program is capable of accounting for any transport mechanism specified but is focused in this work on laminar convective-diffusive flow. Each test particle is tracked as it is carried through the breach and if it impacts the breach wall, the three-dimensional location of the impact is recorded. In this way, the axial and circumferential deposition patterns can be recorded. This program can model any flow geometry as long as a velocity profile can be provided. In this thesis, the program is expanded to account for flow through straight and torroidal cylindrical tubes.
Nelson, Timothy R.; Miselis, Jennifer L.; Hapke, Cheryl J.; Wilson, Kathleen E.; Henderson, Rachel E.; Brenner, Owen T.; Reynolds, Billy J.; Hansen, Mark E.
2016-08-02
Scientists from the U.S. Geological Survey St. Petersburg Coastal and Marine Science Center in St. Petersburg, Florida, collected bathymetric data along the upper shoreface and within the wilderness breach at Fire Island, New York, in June 2014. The U.S. Geological Survey is involved in a post-Hurricane Sandy effort to map and monitor the morphologic evolution of the shoreface along Fire Island and model the evolution of the wilderness breach as a part of the Hurricane Sandy Supplemental Project GS2-2B. During this study, bathymetry was collected with single-beam echo sounders and global positioning systems, mounted to personal watercraft, along the Fire Island shoreface and within the wilderness breach. Additional bathymetry was collected using backpack global positioning systems along the flood shoals and shallow channels within the wilderness breach.
Promotion by the British pharmaceutical industry, 1983-8: a critical analysis of self regulation.
Herxheimer, A; Collier, J
1990-01-01
Since 1958 the Association of the British Pharmaceutical Industry (ABPI) has attempted to regulate the promotion of prescription medicines through its code of practice. This regulation is described and analysed for the six years 1983-8 using the reports on 302 complaints considered by its code of practice committee and annual reports. The complaints came mainly from doctors (143, 48%) and competing companies (103, 33%). The committee found a total of 379 breaches of the code in 192 (63%) of the complaints. Additional breaches were detected by informational scrutiny of advertisements by the ABPI secretariat. Analysis showed that 270 (71%) of these breaches involved possible breaches of the Medicines Act. The rules that forbid misleading or unsubstantiated information and misleading claims or comparisons were broken most often. The committee found the most frequent offenders to be Organon (32 breaches), Smith Kline and French (23), Glaxo (21), A H Robins (18), Bayer (17), Merck Sharp and Dohme (17), and Lederle (16). Often the promotion of one product led to several breaches. The promotional wars over histamine H2 receptor antagonists accounted for 33 breaches. It is estimated that in 1983-8 about 100 breaches of the code were detected a year. In the 18 years 1972-88 the Medicines Act was breached probably over 1200 times. Health ministers, by not enforcing the regulations controlling promotion, have abrogated their responsibility to the ABPI, but the evidence suggests that the code has failed to deter promotional excesses. The ABPI's wish to secure compliance with the code seems weaker than its wish to pre-empt outside criticism and action: its self regulation seems to be a service to itself rather than to the public. It is suggested that the code of practice committee should become publicly accountable, that the majority of its members should represent the health professions and the public, and that effective sanctions are needed. PMID:2106963
NASA Astrophysics Data System (ADS)
Singh, Krishan P.; Snorrason, Arni
1984-02-01
Important breach parameters were identified and their ranges were estimated from a detailed study of historical earthdam failures due to overtopping. The U.S. Army Corps of Engineers Hydrologic Engineering Center (HEC) and the National Weather Service (NWS) dam breach models were chosen for evaluation and simulation. Both models use similar input data and breach descriptions, but the HEC uses the hydrologic routing method (modified Puls method), whereas the NWS uses the St. Vénant equations for routing. Information on eight dams in Illinois was taken from the Corps of Engineers inspection reports, and surveyed cross-sections of the downstream channels were supplied by the Division of Water Resources of the Illinois Department of Transportation. Various combinations of breach parameters (failure time, TF; depth of overtopping, hf; and breach size, B) were used for breach simulations by both methods with the 1.00PMF, 0.50PMF and 0.25PMF (probable maximum flood) inflow hydrographs. In general, the flood stage profiles predicted by the NWS were smoother and more reasonable than those predicted by the HEC. For channels with relatively steep slopes, the methods compared fairly well, whereas for the channels with mild slope, the HEC model often predicted oscillating, erratic flood stages, mainly due to its inability to route flood waves satisfactorily in non-prismatic channels. The breach outflow peaks are affected significantly by B but less so by hf. The ratio of outflow peak to inflow peak and the effect of TF on outflow decrease as the drainage area above the dam and impounded storage increase. Flood stage profiles predicted with cross-sections taken from 7.5' maps compared favorably with those predicted using surveyed cross-sections. For the range of breach parameters studied, the range of outflow peaks and flood stages downstream from the dam can be determined for regulatory and disaster prevention measures.
Chakrabortty, Shushovan; Gupta, Deepak; Rustom, David; Berry, Hussein; Rai, Ajit
2014-01-01
The current retrospective study was completed with the aim to identify demographic characteristics and clinical predictors (if any) of the patients discharged from our pain clinic due to breach in narcotic use contract (BNUC). Retrospective patient charts' review and data audit. University hospital-affiliated pain clinic in the United States. All patient charts in our pain clinic for a 2-year period (2011-2012). The patients with BNUC were delineated from the patients who had not been discharged from our pain clinic. Pain characteristics, pain management, and substance abuse status were compared in each patient with BNUC between the time of admission and the time of discharge. The patients with BNUC discharges showed significant variability for the discharging factors among the pain physicians within a single pain clinic model with this variability being dependent on their years of experience and their proactive interventional pain management. The patients with BNUC in our pain clinic setting were primarily middle-aged, obese, unmarried males with nondocumented stable occupational history who were receiving only noninterventional pain management. Substance abuse, doctor shopping, and potential diversion were the top three documented reasons for BNUC discharges. In 2011-2012, our pain clinic discharged 1-in-16 patients due to breach in narcotic use contract.
The President’s Identity Theft Task Force Report
2008-09-01
effeCtIve, RISk-BASed ReSPOnSeS tO dAtA BReACheS SUffeRed By fedeRAl AGenCIeS Issue Data Breach Guidance to Agencies Publish a “Routine Use...and developing a data breach response plan. The FTC will continue to seek opportunities to work with state and local officials and policymakers...of fiscal year 2008. ReCOMMendAtIOn 4: enSURe effeCtIve, RISk-BASed ReSPOnSeS tO dAtA BReACheS SUffeRed By fedeRAl AGenCIeS The Task Force
NASA Astrophysics Data System (ADS)
Aygun, Bünyamin; Korkut, Turgay; Karabulut, Abdulhalik
2016-05-01
Despite the possibility of depletion of fossil fuels increasing energy needs the use of radiation tends to increase. Recently the security-focused debate about planned nuclear power plants still continues. The objective of this thesis is to prevent the radiation spread from nuclear reactors into the environment. In order to do this, we produced higher performanced of new shielding materials which are high radiation holders in reactors operation. Some additives used in new shielding materials; some of iron (Fe), rhenium (Re), nickel (Ni), chromium (Cr), boron (B), copper (Cu), tungsten (W), tantalum (Ta), boron carbide (B4C). The results of this experiments indicated that these materials are good shields against gamma and neutrons. The powder metallurgy technique was used to produce new shielding materials. CERN - FLUKA Geant4 Monte Carlo simulation code and WinXCom were used for determination of the percentages of high temperature resistant and high-level fast neutron and gamma shielding materials participated components. Super alloys was produced and then the experimental fast neutron dose equivalent measurements and gamma radiation absorpsion of the new shielding materials were carried out. The produced products to be used safely reactors not only in nuclear medicine, in the treatment room, for the storage of nuclear waste, nuclear research laboratories, against cosmic radiation in space vehicles and has the qualities.
Magnetic shielding structure optimization design for wireless power transmission coil
NASA Astrophysics Data System (ADS)
Dai, Zhongyu; Wang, Junhua; Long, Mengjiao; Huang, Hong; Sun, Mingui
2017-09-01
In order to improve the performance of the wireless power transmission (WPT) system, a novel design scheme with magnetic shielding structure on the WPT coil is presented in this paper. This new type of shielding structure has great advantages on magnetic flux leakage reduction and magnetic field concentration. On the basis of theoretical calculation of coil magnetic flux linkage and characteristic analysis as well as practical application feasibility consideration, a complete magnetic shielding structure was designed and the whole design procedure was represented in detail. The simulation results show that the coil with the designed shielding structure has the maximum energy transmission efficiency. Compared with the traditional shielding structure, the weight of the new design is significantly decreased by about 41%. Finally, according to the designed shielding structure, the corresponding experiment platform is built to verify the correctness and superiority of the proposed scheme.
A thermal shield concept for the Solar Probe mission
NASA Technical Reports Server (NTRS)
Miyake, Robert N.; Millard, Jerry M.; Randolph, James E.
1991-01-01
The Solar Probe spacecraft will travel to within 4 solar radii of the sun's center while performing a variety of fundamental experiments in space physics. Exposure to 2900 earth suns (400 W/sq cm) at perihelion imposes severe thermal and material demands on a solar shield system designed to protect the payload that will reside within the shield's shadow envelope or umbra. The design of the shield subsystem is a thermal/materials challenge requiring new technology development. While currently in the preproject study phase, anticipating a 1995 project start, shield preliminary design efforts are currently underway. This paper documents the current status of the mission concept, the materials issues, the configuration concept for the shield subsystem, the current configuration studies performed to date, and the required material testing to provide a database to support a design effort required to develop the shield subsystem.
The active muon shield in the SHiP experiment
NASA Astrophysics Data System (ADS)
Akmete, A.; Alexandrov, A.; Anokhina, A.; Aoki, S.; Atkin, E.; Azorskiy, N.; Back, J. J.; Bagulya, A.; Baranov, A.; Barker, G. J.; Bay, A.; Bayliss, V.; Bencivenni, G.; Berdnikov, A. Y.; Berdnikov, Y. A.; Bertani, M.; Betancourt, C.; Bezshyiko, I.; Bezshyyko, O.; Bick, D.; Bieschke, S.; Blanco, A.; Boehm, J.; Bogomilov, M.; Bondarenko, K.; Bonivento, W. M.; Boyarsky, A.; Brenner, R.; Breton, D.; Brundler, R.; Bruschi, M.; Büscher, V.; Buonaura, A.; Buontempo, S.; Cadeddu, S.; Calcaterra, A.; Campanelli, M.; Chauveau, J.; Chepurnov, A.; Chernyavsky, M.; Choi, K.-Y.; Chumakov, A.; Ciambrone, P.; Dallavalle, G. M.; D'Ambrosio, N.; D'Appollonio, G.; De Lellis, G.; De Roeck, A.; De Serio, M.; Dedenko, L.; Di Crescenzo, A.; Di Marco, N.; Dib, C.; Dijkstra, H.; Dmitrenko, V.; Domenici, D.; Donskov, S.; Dubreuil, A.; Ebert, J.; Enik, T.; Etenko, A.; Fabbri, F.; Fabbri, L.; Fedin, O.; Fedorova, G.; Felici, G.; Ferro-Luzzi, M.; Fini, R. A.; Fonte, P.; Franco, C.; Fukuda, T.; Galati, G.; Gavrilov, G.; Gerlach, S.; Golinka-Bezshyyko, L.; Golubkov, D.; Golutvin, A.; Gorbunov, D.; Gorbunov, S.; Gorkavenko, V.; Gornushkin, Y.; Gorshenkov, M.; Grachev, V.; Graverini, E.; Grichine, V.; Guler, A. M.; Guz, Yu.; Hagner, C.; Hakobyan, H.; van Herwijnen, E.; Hollnagel, A.; Hosseini, B.; Hushchyn, M.; Iaselli, G.; Iuliano, A.; Jacobsson, R.; Jonker, M.; Kadenko, I.; Kamiscioglu, C.; Kamiscioglu, M.; Khabibullin, M.; Khaustov, G.; Khotyantsev, A.; Kim, S. H.; Kim, V.; Kim, Y. G.; Kitagawa, N.; Ko, J.-W.; Kodama, K.; Kolesnikov, A.; Kolev, D. I.; Kolosov, V.; Komatsu, M.; Konovalova, N.; Korkmaz, M. A.; Korol, I.; Korol'ko, I.; Korzenev, A.; Kovalenko, S.; Krasilnikova, I.; Krivova, K.; Kudenko, Y.; Kurochka, V.; Kuznetsova, E.; Lacker, H. M.; Lai, A.; Lanfranchi, G.; Lantwin, O.; Lauria, A.; Lebbolo, H.; Lee, K. Y.; Lévy, J.-M.; Lopes, L.; Lyubovitskij, V.; Maalmi, J.; Magnan, A.; Maleev, V.; Malinin, A.; Mefodev, A.; Mermod, P.; Mikado, S.; Mikhaylov, Yu.; Milstead, D. A.; Mineev, O.; Montanari, A.; Montesi, M. C.; Morishima, K.; Movchan, S.; Naganawa, N.; Nakamura, M.; Nakano, T.; Novikov, A.; Obinyakov, B.; Ogawa, S.; Okateva, N.; Owen, P. H.; Paoloni, A.; Park, B. D.; Paparella, L.; Pastore, A.; Patel, M.; Pereyma, D.; Petrenko, D.; Petridis, K.; Podgrudkov, D.; Poliakov, V.; Polukhina, N.; Prokudin, M.; Prota, A.; Rademakers, A.; Ratnikov, F.; Rawlings, T.; Razeti, M.; Redi, F.; Ricciardi, S.; Roganova, T.; Rogozhnikov, A.; Rokujo, H.; Rosa, G.; Rovelli, T.; Ruchayskiy, O.; Ruf, T.; Samoylenko, V.; Saputi, A.; Sato, O.; Savchenko, E. S.; Schmidt-Parzefall, W.; Serra, N.; Shakin, A.; Shaposhnikov, M.; Shatalov, P.; Shchedrina, T.; Shchutska, L.; Shevchenko, V.; Shibuya, H.; Shustov, A.; Silverstein, S. B.; Simone, S.; Skorokhvatov, M.; Smirnov, S.; Sohn, J. Y.; Sokolenko, A.; Starkov, N.; Storaci, B.; Strolin, P.; Takahashi, S.; Timiryasov, I.; Tioukov, V.; Tosi, N.; Treille, D.; Tsenov, R.; Ulin, S.; Ustyuzhanin, A.; Uteshev, Z.; Vankova-Kirilova, G.; Vannucci, F.; Venkova, P.; Vilchinski, S.; Villa, M.; Vlasik, K.; Volkov, A.; Voronkov, R.; Wanke, R.; Woo, J.-K.; Wurm, M.; Xella, S.; Yilmaz, D.; Yilmazer, A. U.; Yoon, C. S.; Zaytsev, Yu.
2017-05-01
The SHiP experiment is designed to search for very weakly interacting particles beyond the Standard Model which are produced in a 400 GeV/c proton beam dump at the CERN SPS. An essential task for the experiment is to keep the Standard Model background level to less than 0.1 event after 2× 1020 protons on target. In the beam dump, around 1011 muons will be produced per second. The muon rate in the spectrometer has to be reduced by at least four orders of magnitude to avoid muon-induced combinatorial background. A novel active muon shield is used to magnetically deflect the muons out of the acceptance of the spectrometer. This paper describes the basic principle of such a shield, its optimization and its performance.
NASA Astrophysics Data System (ADS)
Hinterberger, A.; Gerber, S.; Doser, M.
2017-09-01
In this paper we report on measurements and simulations of superconducting tubes in the presence of inhomogeneous externally applied magnetic fields in a cryogenic environment. The shielding effect is studied for two different tube materials, Pb and Nb, employing Hall sensors in a tabletop experiment. The measured internal and external fields of the tubes agree with the theory of the Meissner-Ochsenfeld effect [1], field trapping of type 2 superconductors, phase transitions and tube geometries. The obtained measurements are compared to a finite element simulation. Next, the simulation model is applied to estimate the shielding effect in the vicinity of a cryogenic Penning trap experiment. The controlled suppression of external magnetic fields is important for future precision experiments in atomic and antimatter physics in cryogenic environments.
NASA Astrophysics Data System (ADS)
Wilcox, A. C.
2012-12-01
Two recent dam removals on tributaries to the Columbia River in the northwestern United States present contrasting examples of how dam removal methods, reservoir contents, and geomorphic settings influence system responses. The 2008 removal of Milltown Dam, from the Clark Fork River (CFR), Montana, and the 2011 removal of Condit Dam from the White Salmon River (WSR), Washington (Table 1), represent two of the largest dam removals to date. The Milltown Dam removal was notable because the dam stored millions of cubic meters of contaminated mine tailings, a portion of which were excavated as part of Superfund remediation but a portion of which flowed downstream after the removal. On the CFR, post-breach high flows in 2008 produced reservoir erosion and downstream deposition in bed interstices, along bars, and on the floodplain, but above-average (3-15 year recurrence interval) floods since then have remobilized this material and have, to a large extent, erased signs of downstream sedimentation. The Condit Dam removal entailed dynamiting of a 4m by 5.5m hole at the base of the dam, which produced rapid and dramatic draining of fine reservoir sediments within hours of the blast. Downstream of Condit Dam, the initial hyperconcentrated flows and sediment pulse draped the WSR with fine sediment, filled pools, and, in an unconfined reach influenced by the Columbia River's backwater, caused meters of aggradation and new bar formation. In the confined, bedrock-dominated reach downstream of the Condit site, pool-riffle structure has started to reemerge as of summer 2012 and the finest bed materials have been evacuated from the main channel, although sediment storage in pools and eddies persists. Whereas post-breach geomorphic responses on the CFR have been largely driven by hydrology, the post-breach evolution of the WSR has been predominantly influenced by antecedent geomorphic conditions (slope, confinement, and Columbia River backwater). On both the CFR and WSR, the pace of post-breach reservoir erosion and of geomorphic recovery from the disturbances produced by dam removal has been rapid, far exceeding pre-breach predictions.Table 1: Comparison of Milltown and Condit Dam removals
Solar Probe thermal shield design and testing
NASA Technical Reports Server (NTRS)
Millard, Jerry M.; Miyake, Robert N.; Rainen, Richard A.
1992-01-01
This paper discusses the major thermal shield subsystem development activities in support of the Solar Probe study being conducted at JPL. The Solar Probe spacecraft will travel to within 4 solar radii of the sun's center to perform fundamental experiments in space physics. Exposure to 2900 earth suns at perihelion requires the spacecraft to be protected within the shadow envelope of a protective shield. In addition, the mass loss rate off of the shield at elevated temperature must comply with plasma instrument requirements and has become the driver of the shield design. This paper will focus on the analytical design work to size the shield and control the shield mass loss rate for the various spacecraft options under study, the application of carbon-carbon materials for shield components, development and preparation of carbon-carbon samples for materials testing, and a materials testing program for carbon-carbon and tungsten alloys to investigate thermal/optical properties, mass loss (carbon-carbon only), material integrity, and high velocity impact behavior.
Teaching Case: Security Breach at Target
ERIC Educational Resources Information Center
Plachkinova, Miloslava; Maurer, Chris
2018-01-01
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
2012-06-01
Visa Investigate Data Breach March 30, 2012 Visa and MasterCard are investigating whether a data security breach at one of the main companies that...30). MasterCard and Visa Investigate Data Breach . New York Times . Stamatis, D. (2003). Failure Mode Effect Analysis: FMEA from Theory to Execution
2010-09-23
Chris, ―An Analysis of Breaches Affecting 500 or More Individuals in Healthcare‖, HITRUST, August 2010. 2. ―2009 Annual Study: Cost of a Data Breach ,‖ Ponemon...penalties for willful neglect • Loss of human life? — While many concerns focus on a data breach , some vulnerabilities can be more severe
Do Data Breach Disclosure Laws Reduce Identity Theft?
ERIC Educational Resources Information Center
Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro
2011-01-01
In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…
NASA Astrophysics Data System (ADS)
Bernard, Ethan; LZ Collaboration
2013-10-01
Astrophysical and cosmological observations show that dark matter is concentrated in halos around galaxies and is approximately five times more abundant than baryonic matter. Dark matter has evaded direct detection despite a series of increasingly sensitive experiments. The LZ (LUX-ZEPLIN) experiment will use a two-phase liquid-xenon time projection chamber to search for elastic scattering of xenon nuclei by WIMP (weakly interactive massive particle) dark matter. The detector will contain seven tons of liquid xenon shielded by an active organic scintillator veto and a water tank within the Sanford Underground Research Facility (SURF) in Lead, South Dakota. The LZ detector scales up the demonstrated light-sensing, cryogenic, radiopurity and shielding technologies of the LUX experiment. Active shielding, position fiducialization, radiopurity control and signal discrimination will reduce backgrounds to levels subdominant to solar neutrino scattering. This experiment will reach a sensitivity to the WIMP-nucleon spin-independent cross section approaching ~ 2 .10-48 cm2 for a 50 GeV WIMP mass, which is about three orders of magnitude smaller than current limits.
A magnetic field cloak for charged particle beams
DOE Office of Scientific and Technical Information (OSTI.GOV)
Capobianco-Hogan, K. G.; Cervantes, R.; Deshpande, A.
Shielding charged particle beams from transverse magnetic fields is a common challenge for particle accelerators and experiments. In this study, we demonstrate that a magnetic field cloak is a viable solution. It allows for the use of dipole magnets in the forward regions of experiments at an Electron Ion Collider (EIC) and other facilities without interfering with the incoming beams. The dipoles can improve the momentum measurements of charged final state particles at angles close to the beam line and therefore increase the physics reach of these experiments. In contrast to other magnetic shielding options (such as active coils), amore » cloak requires no external powering. We discuss the design parameters, fabrication, and limitations of a magnetic field cloak and demonstrate that cylinders made from 45 layers of YBCO high-temperature superconductor, combined with a ferromagnetic shell made from epoxy and stainless steel powder, shield more than 99% of a transverse magnetic field of up to 0.45 T (95% shielding at 0.5 T) at liquid nitrogen temperature. Lastly, the ferromagnetic shell reduces field distortions caused by the superconductor alone by 90% at 0.45 T.« less
A magnetic field cloak for charged particle beams
NASA Astrophysics Data System (ADS)
Capobianco-Hogan, K. G.; Cervantes, R.; Deshpande, A.; Feege, N.; Krahulik, T.; LaBounty, J.; Sekelsky, R.; Adhyatman, A.; Arrowsmith-Kron, G.; Coe, B.; Dehmelt, K.; Hemmick, T. K.; Jeffas, S.; LaByer, T.; Mahmud, S.; Oliveira, A.; Quadri, A.; Sharma, K.; Tishelman-Charny, A.
2018-01-01
Shielding charged particle beams from transverse magnetic fields is a common challenge for particle accelerators and experiments. We demonstrate that a magnetic field cloak is a viable solution. It allows for the use of dipole magnets in the forward regions of experiments at an Electron Ion Collider (EIC) and other facilities without interfering with the incoming beams. The dipoles can improve the momentum measurements of charged final state particles at angles close to the beam line and therefore increase the physics reach of these experiments. In contrast to other magnetic shielding options (such as active coils), a cloak requires no external powering. We discuss the design parameters, fabrication, and limitations of a magnetic field cloak and demonstrate that cylinders made from 45 layers of YBCO high-temperature superconductor, combined with a ferromagnetic shell made from epoxy and stainless steel powder, shield more than 99% of a transverse magnetic field of up to 0.45 T (95% shielding at 0.5 T) at liquid nitrogen temperature. The ferromagnetic shell reduces field distortions caused by the superconductor alone by 90% at 0.45 T.
A magnetic field cloak for charged particle beams
Capobianco-Hogan, K. G.; Cervantes, R.; Deshpande, A.; ...
2017-10-02
Shielding charged particle beams from transverse magnetic fields is a common challenge for particle accelerators and experiments. In this study, we demonstrate that a magnetic field cloak is a viable solution. It allows for the use of dipole magnets in the forward regions of experiments at an Electron Ion Collider (EIC) and other facilities without interfering with the incoming beams. The dipoles can improve the momentum measurements of charged final state particles at angles close to the beam line and therefore increase the physics reach of these experiments. In contrast to other magnetic shielding options (such as active coils), amore » cloak requires no external powering. We discuss the design parameters, fabrication, and limitations of a magnetic field cloak and demonstrate that cylinders made from 45 layers of YBCO high-temperature superconductor, combined with a ferromagnetic shell made from epoxy and stainless steel powder, shield more than 99% of a transverse magnetic field of up to 0.45 T (95% shielding at 0.5 T) at liquid nitrogen temperature. Lastly, the ferromagnetic shell reduces field distortions caused by the superconductor alone by 90% at 0.45 T.« less
Low-background Gamma Spectroscopy at Sanford Underground Laboratory
NASA Astrophysics Data System (ADS)
Chiller, Christopher; Alanson, Angela; Mei, Dongming
2014-03-01
Rare-event physics experiments require the use of material with unprecedented radio-purity. Low background counting assay capabilities and detectors are critical for determining the sensitivity of the planned ultra-low background experiments. A low-background counting, LBC, facility has been built at the 4850-Level Davis Campus of the Sanford Underground Research Facility to perform screening of material and detector parts. Like many rare event physics experiments, our LBC uses lead shielding to mitigate background radiation. Corrosion of lead brick shielding in subterranean installations creates radon plate-out potential as well as human risks of ingestible or respirable lead compounds. Our LBC facilities employ an exposed lead shield requiring clean smooth surfaces. A cleaning process of low-activity silica sand blasting and borated paraffin hot coating preservation was employed to guard against corrosion due to chemical and biological exposures. The resulting lead shield maintains low background contribution integrity while fully encapsulating the lead surface. We report the performance of the current LBC and a plan to develop a large germanium well detector for PMT screening. Support provided by Sd governors research center-CUBED, NSF PHY-0758120 and Sanford Lab.
Breach Risk Magnitude: A Quantitative Measure of Database Security.
Yasnoff, William A
2016-01-01
A quantitative methodology is described that provides objective evaluation of the potential for health record system breaches. It assumes that breach risk increases with the number of potential records that could be exposed, while it decreases when more authentication steps are required for access. The breach risk magnitude (BRM) is the maximum value for any system user of the common logarithm of the number of accessible database records divided by the number of authentication steps needed to achieve such access. For a one million record relational database, the BRM varies from 5.52 to 6 depending on authentication protocols. For an alternative data architecture designed specifically to increase security by separately storing and encrypting each patient record, the BRM ranges from 1.3 to 2.6. While the BRM only provides a limited quantitative assessment of breach risk, it may be useful to objectively evaluate the security implications of alternative database organization approaches.
Ost, Suzanne
2016-01-01
In this article, I argue that sexual exploitation in the doctor-patient relationship would be dealt with more appropriately by the law in England and Wales on the basis of a breach of fiduciary duty. Three different types of sexual boundary breaches are discussed, and the particular focus is on breaches where the patient's consent is obtained through inducement. I contend that current avenues of redress do not clearly catch this behaviour and, moreover, they fail to capture the essence of the wrong committed by the doctor-the knowing breach of trust for self-gain-and the calculated way in which consent is induced. Finally, I demonstrate that the fiduciary approach is compatible with the contemporary pro-patient autonomy model of the doctor-patient relationship. © The Author 2016. Published by Oxford University Press; all rights reserved. For Permissions, please email: journals.permissions@oup.com.
Are Emotions Transmitted From Work to Family? A Crossover Model of Psychological Contract Breach.
Liang, Huai-Liang
2018-01-01
Based on affective events theory and the crossover model, this study examines the effect of psychological contract breach on employee dysfunctional behavior and partner family undermining and explores the crossover effect of employee dysfunctional behavior on partner family undermining in work-family issues. This study collected 370 employee-partner dyads (277 male employees, 93 female employees, M age = 43.59 years) from a large manufacturing organization. The results of this study support the conception that employees' psychological contract breach results in frustration in the workplace. In addition, mediation analysis results reveal that psychological contract breach relates to employee dysfunctional behavior in the workplace. The findings show that partners' psychological strain mediates the relationship between employee dysfunctional behavior and partner family undermining. Furthermore, these findings provide investigations for the crossover model to display the value of psychological contract breach in family issues.
EXPERIMENTAL EVALUATION OF THE THERMAL PERFORMANCE OF A WATER SHIELD FOR A SURFACE POWER REACTOR
DOE Office of Scientific and Technical Information (OSTI.GOV)
REID, ROBERT S.; PEARSON, J. BOSIE; STEWART, ERIC T.
2007-01-16
Water based reactor shielding is being investigated for use on initial lunar surface power systems. A water shield may lower overall cost (as compared to development cost for other materials) and simplify operations in the setup and handling. The thermal hydraulic performance of the shield is of significant interest. The mechanism for transferring heat through the shield is natural convection. Natural convection in a 100 kWt lunar surface reactor shield design is evaluated with 2 kW power input to the water in the Water Shield Testbed (WST) at the NASA Marshall Space Flight Center. The experimental data from the WSTmore » is used to validate a CFD model. Performance of the water shield on the lunar surface is then predicted with a CFD model anchored to test data. The experiment had a maximum water temperature of 75 C. The CFD model with 1/6-g predicts a maximum water temperature of 88 C with the same heat load and external boundary conditions. This difference in maximum temperature does not greatly affect the structural design of the shield, and demonstrates that it may be possible to use water for a lunar reactor shield.« less
Small-Scale Experiments.10-gallon drum experiment summary
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rosenberg, David M.
2015-02-05
A series of sub-scale (10-gallon) drum experiments were conducted to characterize the reactivity, heat generation, and gas generation of mixtures of chemicals believed to be present in the drum (68660) known to have breached in association with the radiation release event at the Waste Isolation Pilot Plant (WIPP) on February 14, 2014, at a scale expected to be large enough to replicate the environment in that drum but small enough to be practical, safe, and cost effective. These tests were not intended to replicate all the properties of drum 68660 or the event that led to its breach, or tomore » validate a particular hypothesis of the release event. They were intended to observe, in a controlled environment and with suitable diagnostics, the behavior of simple mixtures of chemicals in order to determine if they could support reactivity that could result in ignition or if some other ingredient or event would be necessary. There is a significant amount of uncertainty into the exact composition of the barrel; a limited sub-set of known components was identified, reviewed with Technical Assessment Team (TAT) members, and used in these tests. This set of experiments was intended to provide a framework to postulate realistic, data-supported hypotheses for processes that occur in a “68660-like” configuration, not definitively prove what actually occurred in 68660.« less
Electrostatic shielding of transformers
De Leon, Francisco
2017-11-28
Toroidal transformers are currently used only in low-voltage applications. There is no published experience for toroidal transformer design at distribution-level voltages. Toroidal transformers are provided with electrostatic shielding to make possible high voltage applications and withstand the impulse test.
The Wake Shield Facility: A space experiment platform
NASA Technical Reports Server (NTRS)
Allen, Joseph P.
1991-01-01
Information is given in viewgraph form on Wakeshield, a space experiment platform. The Wake Shield Facility (WSF) flight program objectives, product applications, commercial development approach, and cooperative experiments are listed. The program objectives are to produce new industry-driven electronic, magnetic, and superconducting thin-film materials and devices both in terrestrial laboratories and in space; utilize the ultra-vacuum of space for thin film epitaxial growth and materials processing; and develop commercial space hardware for research and development and enhanced access to space.
NASA Astrophysics Data System (ADS)
Swadling, G. F.; Ross, J. S.; Datte, P.; Moody, J.; Divol, L.; Jones, O.; Landen, O.
2016-11-01
An Optical Thomson Scattering (OTS) diagnostic is currently being developed for the National Ignition Facility (NIF) at Lawrence Livermore National Laboratory. This diagnostic is designed to make measurements of the hohlraum plasma parameters, such as the electron temperature and the density, during inertial confinement fusion (ICF) experiments. NIF ICF experiments present a very challenging environment for optical measurements; by their very nature, hohlraums produce intense soft x-ray emission, which can cause "blanking" (radiation induced opacity) of the radiation facing optical components. The soft x-ray fluence at the surface of the OTS blast shield, 60 cm from the hohlraum, is estimated to be ˜8 J cm-2. This is significantly above the expected threshold for the onset of "blanking" effects. A novel xenon plasma x-ray shield is proposed to protect the blast shield from x-rays and mitigate "blanking." Estimates suggest that an areal density of 1019 cm-2 Xe atoms will be sufficient to absorb 99.5% of the soft x-ray flux. Two potential designs for this shield are presented.
Swadling, G F; Ross, J S; Datte, P; Moody, J; Divol, L; Jones, O; Landen, O
2016-11-01
An Optical Thomson Scattering (OTS) diagnostic is currently being developed for the National Ignition Facility (NIF) at Lawrence Livermore National Laboratory. This diagnostic is designed to make measurements of the hohlraum plasma parameters, such as the electron temperature and the density, during inertial confinement fusion (ICF) experiments. NIF ICF experiments present a very challenging environment for optical measurements; by their very nature, hohlraums produce intense soft x-ray emission, which can cause "blanking" (radiation induced opacity) of the radiation facing optical components. The soft x-ray fluence at the surface of the OTS blast shield, 60 cm from the hohlraum, is estimated to be ∼8 J cm -2 . This is significantly above the expected threshold for the onset of "blanking" effects. A novel xenon plasma x-ray shield is proposed to protect the blast shield from x-rays and mitigate "blanking." Estimates suggest that an areal density of 10 19 cm -2 Xe atoms will be sufficient to absorb 99.5% of the soft x-ray flux. Two potential designs for this shield are presented.
Remanent Activation in the Mini-SHINE Experiments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Micklich, Bradley J.
2015-04-16
Argonne National Laboratory is assisting SHINE Medical Technologies in developing a domestic source of the medical isotope 99Mo through the fission of low-enrichment uranium in a uranyl sulfate solution. In Phase 2 of these experiments, electrons from a linear accelerator create neutrons by interacting in a depleted uranium target, and these neutrons are used to irradiate the solution. The resulting neutron and photon radiation activates the target, the solution vessels, and a shielded cell that surrounds the experimental apparatus. When the experimental campaign is complete, the target must be removed into a shielding cask, and the experimental components must bemore » disassembled. The radiation transport code MCNPX and the transmutation code CINDER were used to calculate the radionuclide inventories of the solution, the target assembly, and the shielded cell, and to determine the dose rates and shielding requirements for selected removal scenarios for the target assembly and the solution vessels.« less
A space radiation shielding model of the Martian radiation environment experiment (MARIE)
NASA Technical Reports Server (NTRS)
Atwell, W.; Saganti, P.; Cucinotta, F. A.; Zeitlin, C. J.
2004-01-01
The 2001 Mars Odyssey spacecraft was launched towards Mars on April 7, 2001. Onboard the spacecraft is the Martian radiation environment experiment (MARIE), which is designed to measure the background radiation environment due to galactic cosmic rays (GCR) and solar protons in the 20-500 MeV/n energy range. We present an approach for developing a space radiation-shielding model of the spacecraft that includes the MARIE instrument in the current mapping phase orientation. A discussion is presented describing the development and methodology used to construct the shielding model. For a given GCR model environment, using the current MARIE shielding model and the high-energy particle transport codes, dose rate values are compared with MARIE measurements during the early mapping phase in Mars orbit. The results show good agreement between the model calculations and the MARIE measurements as presented for the March 2002 dataset. c2003 COSPAR. Published by Elsevier Ltd. All rights reserved.
A space radiation shielding model of the Martian radiationenvironment experiment (MARIE)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Atwell, William; Saganti, Premkumar; Cucinotta, Francis A.
2004-12-01
The 2001 Mars Odyssey spacecraft was launched towards Mars on April 7, 2001. On board the spacecraft is the Martian radiation environment experiment (MARIE), which is designed to measure the background radiation environment due to galactic cosmic rays (GCR) and solar protons in the 20 500 MeV/n energy range. We present an approach for developing a space radiation-shielding model of the spacecraft that includes the MARIE instrument in the current mapping phase orientation. A discussion is presented describing the development and methodology used to construct the shielding model. For a given GCR model environment, using the current MARIE shielding modelmore » and the high-energy particle transport codes, dose rate values are compared with MARIE measurements during the early mapping phase in Mars orbit. The results show good agreement between the model calculations and the MARIE measurements as presented for the March 2002 dataset.« less
Psychological Contract Breach and Job Attitudes: A Meta-Analysis of Age as a Moderator
ERIC Educational Resources Information Center
Bal, P. Matthijs; De Lange, Annet H.; Jansen, Paul G. W.; Van Der Velde, Mandy E. G.
2008-01-01
The aim of this study was to examine the influence of age in the relation between psychological contract breach and the development of job attitudes. Based on affective events, social exchange, and lifespan theory, we hypothesized that (1) psychological contract breach would be related negatively to job attitudes, and (2) that age would moderate…
ERIC Educational Resources Information Center
Patton, Madeline
2015-01-01
Data breach prevention is a battle, rarely plain and never simple. For higher education institutions, the Sisyphean aspects of the task are more complex than for industry and business. Two-year colleges have payrolls and vendor contracts like those enterprises. They also have public record and student confidentiality requirements. Colleges must…
The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan
2007-04-11
27 a. Safeguarding of Information in the Public Sector ............... 27 b. Responding to Data Breaches in the Public...72 APPENDICES Appendix A: Identity Theft Task Force’s Guidance Memorandum on Data Breach Protocol...government, and the private sector. Consumers, overwhelmed with weekly media reports of data breaches , feel vulnerable and uncertain of how to protect
State Methods for a Cyber Incident
2012-03-01
Glossary S905 - Incident Submission and Response Standard S910 - Data Breach Notification Standard E-5 Our state characterizes information system...Office of Management and Budget. (2011a). Legislative Language Data Breach Notification. Retrieved September 20, 2010, from http://www.whitehouse.gov...sites/default/files/omb/legislative/letters/ data - breach -notification.pdf Executive Office of the President. Office of Management and Budget
Gadolinium Oxide / Silicon Thin Film Heterojunction Solid-State Neutron Detector
2010-03-01
PRODUCED AS A MEDICAL APPLICATOR SHOWN IN „A‟. THE SOURCE, PICTURED IN „B‟ HAS A PLASTIC SHIELD THAT SLIDES UP AND DOWN THE SHAFT WHICH IS DESIGNED TO...down the shaft which is designed to shield the operator from radiation. The source is sitting head-down and is covered by a thick aluminum shield for...EXPERIMENT, RESULTS, AND ANALYSIS ........................................................ 37 4.1 Experimental Design & Apparatus
Williams, S. Jeffress; Foley, Mary K.
2007-01-01
4. Economic costs and benefits of artificial closure. This report for breach management presents protocols which specify when breach closures within the FIIS might be desirable and necessary, as well as provides recommendations for structural breach closure engineering operations which are indented to minimize negative impacts to the natural wilderness values and cultural resources within the FIIS, particularly the Otis Pike Wilderness Area. The goal of the plan is to strike a balance between protecting natural resources and allowing natural processes to operate and avoiding loss of life and excessive property damage.
Do promises matter? An exploration of the role of promises in psychological contract breach.
Montes, Samantha D; Zweig, David
2009-09-01
Promises are positioned centrally in the study of psychological contract breach and are argued to distinguish psychological contracts from related constructs, such as employee expectations. However, because the effects of promises and delivered inducements are confounded in most research, the role of promises in perceptions of, and reactions to, breach remains unclear. If promises are not an important determinant of employee perceptions, emotions, and behavioral intentions, this would suggest that the psychological contract breach construct might lack utility. To assess the unique role of promises, the authors manipulated promises and delivered inducements separately in hypothetical scenarios in Studies 1 (558 undergraduates) and 2 (441 employees), and they measured them separately (longitudinally) in Study 3 (383 employees). The authors' results indicate that breach perceptions do not represent a discrepancy between what employees believe they were promised and were given. In fact, breach perceptions can exist in the absence of promises. Further, promises play a negligible role in predicting feelings of violation and behavioral intentions. Contrary to the extant literature, the authors' findings suggest that promises may matter little; employees are concerned primarily with what the organization delivers.
Novel shielding materials for space and air travel.
Vana, N; Hajek, M; Berger, T; Fugger, M; Hofmann, P
2006-01-01
The reduction of dose onboard spacecraft and aircraft by appropriate shielding measures plays an essential role in the future development of space exploration and air travel. The design of novel shielding strategies and materials may involve hydrogenous composites, as it is well known that liquid hydrogen is most effective in attenuating charged particle radiation. As precursor for a later flight experiment, the shielding properties of newly developed hydrogen-rich polymers and rare earth-doped high-density rubber were tested in various ground-based neutron and heavy ion fields and compared with aluminium and polyethylene as reference materials. Absorbed dose, average linear energy transfer and gamma-equivalent neutron absorbed dose were determined by means of LiF:Mg,Ti thermoluminescence dosemeters and CR-39 plastic nuclear track detectors. First results for samples of equal aerial density indicate that selected hydrogen-rich plastics and rare-earth-doped rubber may be more effective in attenuating cosmic rays by up to 10% compared with conventional aluminium shielding. The appropriate adaptation of shielding thicknesses may thus allow reducing the biologically relevant dose. Owing to the lower density of the plastic composites, mass savings shall result in a significant reduction of launch costs. The experiment was flown as part of the European Space Agency's Biopan-5 mission in May 2005.
ERIC Educational Resources Information Center
Chazan, Daniel; Sela, Hagit; Herbst, Patricio
2012-01-01
We illustrate a method, which is modeled on "breaching experiments," for studying tacit norms that govern classroom interaction around particular mathematical content. Specifically, this study explores norms that govern teachers' expectations for the doing of word problems in school algebra. Teacher study groups discussed representations of…
Encryption and the Loss of Patient Data
ERIC Educational Resources Information Center
Miller, Amalia R.; Tucker, Catherine E.
2011-01-01
Fast-paced IT advances have made it increasingly possible and useful for firms to collect data on their customers on an unprecedented scale. One downside of this is that firms can experience negative publicity and financial damage if their data are breached. This is particularly the case in the medical sector, where we find empirical evidence that…
Weil, R; Mellors, P; Fiske, T; Sorensen, J A
2014-01-01
Machinery entanglements are one of the top three causes of death in farming. Education on the risks of unshielded power take-off (PTO) equipment does not appear to significantly alter farmers' willingness to replace missing or broken shielding. Different assessments conducted in various regions of the U.S. indicate that as many as one-third to one-half of PTOs are inadequately shielded. Qualitative research was conducted with New York farmers to identify the factors that influence the decision to replace damaged or missing PTO driveline shields. Interview topics included: knowledge of entanglement risks, decisions regarding safety in general, decisions relating to PTO driveline shielding specifically, and the barriers and motivators to replacing missing or broken PTO driveline shields. Interviews with 38 farmers revealed the following themes: (1) farmers are fully aware of PTO entanglement risk, (2) insufficient time and money are primary barriers to purchasing or replacing damaged or missing PTO driveline shields, (3) PTO driveline shield designs are problematic and have led to negative experiences with shielding, and (4) risk acceptance and alternate work strategies are preferred alternatives to replacing shields. Our findings indicate that more innovative approaches will be required to make PTO driveline shield use a viable and attractive choice for farmers. New shield designs that address the practical barriers farmers face, as well as the provision of logistical and financial assistance for shield replacement, may alter the decision environment sufficiently to make replacing PTO driveline shielding a more attractive option for farmers.
Gordon, V; Williams, D J; Donnelly, P D
2012-04-01
To explore the relationship between attention deficit hyperactivity disorder (ADHD) symptoms (inattention, hyperactivity and impulsivity) and violent and non-violent prison breaches of discipline in incarcerated male youths aged 18-21 years. A case-control study of 169 male youth offenders incarcerated in Scottish prisons and classified as 'symptomatic' or 'non-symptomatic' of inattentive and hyperactive/impulsive ADHD symptoms. ADHD symptoms were measured using the Conners' Adult ADHD Rating Scales-Self Report: Long Version, and prison breaches of discipline were gathered from the Scottish Prison Service's Prisoner Records System. Youths who were symptomatic of Diagnostic and Statistical Manual of Mental Disorders, 4th Edition (DSM-IV) ADHD total symptoms had a significantly higher number of prison breaches of discipline than those who were non-symptomatic. Youths who were symptomatic of DSM-IV hyperactive/impulsive symptoms had a significantly higher number of violent and non-violent prison breaches of discipline than those who were non-symptomatic. However, no such significant difference was found between youths who were symptomatic and non-symptomatic of DSM-IV inattentive symptoms. Young male offenders who are symptomatic of ADHD have a higher number of prison breaches of discipline. In particular, symptoms of hyperactivity/impulsivity are associated with breaches of both a violent and non-violent nature. Implications of such symptoms on rehabilitation and recidivism are discussed. Copyright © 2012 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.
NASA Technical Reports Server (NTRS)
Severns, J. G.; Hobbs, R. M.; Elliott, N. P.; Towsley, R. H.; Virshup, G. F.
1989-01-01
LIPS 3 is a member of the Living Plume Shield series of spacecraft. In each LIPS project, the plume shield, a simple sheet metal cone, was structurally stiffened, and an active satellite was then built around it. The original purpose of the plume shield was to prevent the plume from solid propellent engines, which are fired outside the atmosphere after the aerodynamic shroud is jettisoned, from reaching the primary payload. The surface of LIPS 3 facing the plume also functioned in this manner, but the anterior surfaces were unaffected, and it was there that all solar arrays, sensors, and experiments were mounted. The purpose of LIPS 3 was to provide a test bed for new space power sources. With the long delays projected for schedules of the STS and other major launch systems, it appeared that a decade might pass before long term flight data could be obtained on many new and innovative power sources. The fact that a launch scheduled for early in 1987 required a plume shield was seen as a unique opportunity to obtain some of this data in a timely manner. The LIPS 3 system, the experiments placed aboard, and the experiment data acquisition subsystem are described. Various problems were encountered during integration and after launch; those which appear to effect the accuracy of experimental results are discussed. A preliminary description is given of the accuracy of the flight experiment data.
NASA Astrophysics Data System (ADS)
Kalyanapu, A. J.; Thames, B. A.
2013-12-01
Dam breach modeling often includes application of models that are sophisticated, yet computationally intensive to compute flood propagation at high temporal and spatial resolutions. This results in a significant need for computational capacity that requires development of newer flood models using multi-processor and graphics processing techniques. Recently, a comprehensive benchmark exercise titled the 12th Benchmark Workshop on Numerical Analysis of Dams, is organized by the International Commission on Large Dams (ICOLD) to evaluate the performance of these various tools used for dam break risk assessment. The ICOLD workshop is focused on estimating the consequences of failure of a hypothetical dam near a hypothetical populated area with complex demographics, and economic activity. The current study uses this hypothetical case study and focuses on evaluating the effects of dam breach methodologies on consequence estimation and analysis. The current study uses ICOLD hypothetical data including the topography, dam geometric and construction information, land use/land cover data along with socio-economic and demographic data. The objective of this study is to evaluate impacts of using four different dam breach methods on the consequence estimates used in the risk assessments. The four methodologies used are: i) Froehlich (1995), ii) MacDonald and Langridge-Monopolis 1984 (MLM), iii) Von Thun and Gillete 1990 (VTG), and iv) Froehlich (2008). To achieve this objective, three different modeling components were used. First, using the HEC-RAS v.4.1, dam breach discharge hydrographs are developed. These hydrographs are then provided as flow inputs into a two dimensional flood model named Flood2D-GPU, which leverages the computer's graphics card for much improved computational capabilities of the model input. Lastly, outputs from Flood2D-GPU, including inundated areas, depth grids, velocity grids, and flood wave arrival time grids, are input into HEC-FIA, which provides the consequence assessment for the solution to the problem statement. For the four breach methodologies, a sensitivity analysis of four breach parameters, breach side slope (SS), breach width (Wb), breach invert elevation (Elb), and time of failure (tf), is conducted. Up to, 68 simulations are computed to produce breach hydrographs in HEC-RAS for input into Flood2D-GPU. The Flood2D-GPU simulation results were then post-processed in HEC-FIA to evaluate: Total Population at Risk (PAR), 14-yr and Under PAR (PAR14-), 65-yr and Over PAR (PAR65+), Loss of Life (LOL) and Direct Economic Impact (DEI). The MLM approach resulted in wide variability in simulated minimum and maximum values of PAR, PAR 65+ and LOL estimates. For PAR14- and DEI, Froehlich (1995) resulted in lower values while MLM resulted in higher estimates. This preliminary study demonstrated the relative performance of four commonly used dam breach methodologies and their impacts on consequence estimation.
An intrinsically shielded hydrogel for the adsorptive recovery of lysozyme.
Wang, Lu; Zhang, Rongsheng; Eisenthal, Robert; Hubble, John
2006-07-01
The present paper addresses the selective recovery of lysozyme from egg white using CM-dextran (carboxymethyldextran)-based hydrogels containing Cibacron Blue as an affinity ligand and co-immobilized BSA intended to act as a shielding agent to reduce non-specific adsorption. Initial studies using pure lysozyme were conducted that indicated that the adsorption capacity increased with ligand density and that adsorption was well described by a Langmuir-type isotherm. The inclusion of BSA as a putative shielding agent did not decrease the adsorption capacity for lysozyme in single-adsorbate experiments. To assess the effectiveness of the shielding strategy, subsequent experiments were conducted with both defined lysozyme/ovalbumin mixtures and hen's-egg white. From these studies, the optimal operating conditions for lysozyme recovery have been determined. These include: optimal initial egg-white concentration [a 10% (v/v) solution of native egg white in the chosen buffer], affinity-ligand density (1.86 mM) and ligand-to-shielding-agent ratio (4:1). The purity of lysozyme obtained from egg white was improved from 69% with a non-shielded hydrogel to 94% with an intrinsically shielded hydrogel. Finally, the possibility of using a protein, rather than dextran-backbone-based, hydrogel was investigated. It was found that BSA could take the place of CM-dextran as the gel backbone in a simplified synthesis, producing a gel which also proved effective for lysozyme recovery with a 30% lysozyme in egg-white solution purified to approx. 92% in a single adsorption-desorption cycle.
Characterization of Hydrogen Embrittled Zircaloy-4 by Using a Van de Graaff Particle Accelerator
NASA Astrophysics Data System (ADS)
Budd, John
2013-04-01
On-site, dry cask storage was originally by the intended to be a short-term solution for holding spent nuclear fuel. Due to the lack of a permanent storage facility, the nuclear power industry seeks to assess the effective lifetime of the casks. One issue which could compromise cask integrity is Hydrogen embrittlement. This phenomenon occurs in the Zircaloy-4 fuel-rod cladding and is caused by the formation of Zirconium hydrides. Over time, thermal stresses caused by the heat from reactions of the stored nuclear fuel could result in significant breaches of the cladding. Our group at Texas A&M University- Kingsville is conducting experiments to aid in determining when such breaches will occur. We will irradiate samples of the alloy with protons of energies up to 400 keV using a Van de Graaff particle accelerator. Once irradiated, their properties will be characterized using scanning electron microscopy and Vickers hardness tests.
ERIC Educational Resources Information Center
Data Quality Campaign, 2011
2011-01-01
Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…
Code of Federal Regulations, 2010 CFR
2010-04-01
... receiving notice of a violation or breach from the tribe, the Director will: (a) Review the notice and... review of relevant records, including transactions and reports. (b) If the Director determines, after the investigation, that a violation or breach is not causing or will not cause imminent jeopardy to a physical trust...
ERIC Educational Resources Information Center
Cassar, Vincent; Briner, Rob B.
2011-01-01
This study tested the mediating role of violation in the relationship between breach and both affective and continuance commitment and the extent to which this mediating role is moderated by exchange imbalance amongst a sample of 103 sales personnel. Results suggest that violation mediated the relationship between breach and commitment. Also,…
Lab Note: Training the Cyber Defensive Line
2016-05-02
available at http://www.nextgov.com/cybersecurity/2013/03/how-many-cyberattacks-hit-united-states-last- year/61775/. 2 “Verizon 2015 Data Breach Investigation...at http://www.prnewswire.com/news-releases/verizon-2015- data - breach -investigations-report-finds- cyberthreats-are-increasing-in-sophistication-yet...Verizon’s Data Breach Investigations Report (available on request from http://www.verizonenterprise.com/DBIR/). The blue team must ensure that their
Preventing Point-of-Sale System Intrusions
2014-06-01
executives from Target and Nieman Marcus prepared written testimonials in advance of several congressional hearings on retail data breaches the week...of February 05, 2014 (Associated Press, 2014; United States Senate, 2014). While the Target data breach attracted significant national attention due...other parts of the world, and whether Congress should pass a federal data breach notification law that would require businesses to notify customers if
Sports Law: Tort Liability of the College and University Athletic Department Administrator.
ERIC Educational Resources Information Center
Nolte, M. Chester
A tort is an actionable wrong, other than breach of contract, that the courts will recognize and intervene to equalize. There are three questions the court will ask: Did someone owe someone else a duty? Was there a breach of duty owed? Was the breach the proximate cause of the plaintiff's injury? The grounds for injury actions may be classified as…
Managing breaches of containment and eradication of invasive plant populations.
Fletcher, Cameron S; Westcott, David A; Murphy, Helen T; Grice, Anthony C; Clarkson, John R
2015-02-01
Containment can be a viable strategy for managing invasive plants, but it is not always cheaper than eradication. In many cases, converting a failed eradication programme to a containment programme is not economically justified. Despite this, many contemporary invasive plant management strategies invoke containment as a fallback for failed eradication, often without detailing how containment would be implemented.We demonstrate a generalized analysis of the costs of eradication and containment, applicable to any plant invasion for which infestation size, dispersal distance, seed bank lifetime and the economic discount rate are specified. We estimate the costs of adapting eradication and containment in response to six types of breach and calculate under what conditions containment may provide a valid fallback to a breached eradication programme.We provide simple, general formulae and plots that can be applied to any invasion and show that containment will be cheaper than eradication only when the size of the occupied zone exceeds a multiple of the dispersal distance determined by seed bank longevity and the discount rate. Containment becomes proportionally cheaper than eradication for invaders with smaller dispersal distances, longer lived seed banks, or for larger discount rates.Both containment and eradication programmes are at risk of breach. Containment is less exposed to risk from reproduction in the 'occupied zone' and three types of breach that lead to a larger 'occupied zone', but more exposed to one type of breach that leads to a larger 'buffer zone'.For a well-specified eradication programme, only the three types of breach leading to reproduction in or just outside the buffer zone can justify falling back to containment, and only if the expected costs of eradication and containment were comparable before the breach. Synthesis and applications . Weed management plans must apply a consistent definition of containment and provide sufficient implementation detail to assess its feasibility. If the infestation extent, dispersal capacity, seed bank longevity and economic discount rate are specified, the general results presented here can be used to assess whether containment can outperform eradication, and under what conditions it would provide a valid fallback to a breached eradication programme.
Cheating in OSCEs: The Impact of Simulated Security Breaches on OSCE Performance.
Gotzmann, Andrea; De Champlain, André; Homayra, Fahmida; Fotheringham, Alexa; de Vries, Ingrid; Forgie, Melissa; Pugh, Debra
2017-01-01
Construct: Valid score interpretation is important for constructs in performance assessments such as objective structured clinical examinations (OSCEs). An OSCE is a type of performance assessment in which a series of standardized patients interact with the student or candidate who is scored by either the standardized patient or a physician examiner. In high-stakes examinations, test security is an important issue. Students accessing unauthorized test materials can create an unfair advantage and lead to examination scores that do not reflect students' true ability level. The purpose of this study was to assess the impact of various simulated security breaches on OSCE scores. Seventy-six 3rd-year medical students participated in an 8-station OSCE and were randomized to either a control group or to 1 of 2 experimental conditions simulating test security breaches: station topic (i.e., providing a list of station topics prior to the examination) or egregious security breach (i.e., providing detailed content information prior to the examination). Overall total scores were compared for the 3 groups using both a one-way between-subjects analysis of variance and a repeated measure analysis of variance to compare the checklist, rating scales, and oral question subscores across the three conditions. Overall total scores were highest for the egregious security breach condition (81.8%), followed by the station topic condition (73.6%), and they were lowest for the control group (67.4%). This trend was also found with checklist subscores only (79.1%, 64.9%, and 60.3%, respectively for the security breach, station topic, and control conditions). Rating scale subscores were higher for both the station topic and egregious security breach conditions compared to the control group (82.6%, 83.1%, and 77.6%, respectively). Oral question subscores were significantly higher for the egregious security breach condition (88.8%) followed by the station topic condition (64.3%), and they were the lowest for the control group (48.6%). This simulation of different OSCE security breaches demonstrated that student performance is greatly advantaged by having prior access to test materials. This has important implications for medical educators as they develop policies and procedures regarding the safeguarding and reuse of test content.
Managing breaches of containment and eradication of invasive plant populations
Fletcher, Cameron S; Westcott, David A; Murphy, Helen T; Grice, Anthony C; Clarkson, John R
2015-01-01
Containment can be a viable strategy for managing invasive plants, but it is not always cheaper than eradication. In many cases, converting a failed eradication programme to a containment programme is not economically justified. Despite this, many contemporary invasive plant management strategies invoke containment as a fallback for failed eradication, often without detailing how containment would be implemented. We demonstrate a generalized analysis of the costs of eradication and containment, applicable to any plant invasion for which infestation size, dispersal distance, seed bank lifetime and the economic discount rate are specified. We estimate the costs of adapting eradication and containment in response to six types of breach and calculate under what conditions containment may provide a valid fallback to a breached eradication programme. We provide simple, general formulae and plots that can be applied to any invasion and show that containment will be cheaper than eradication only when the size of the occupied zone exceeds a multiple of the dispersal distance determined by seed bank longevity and the discount rate. Containment becomes proportionally cheaper than eradication for invaders with smaller dispersal distances, longer lived seed banks, or for larger discount rates. Both containment and eradication programmes are at risk of breach. Containment is less exposed to risk from reproduction in the ‘occupied zone’ and three types of breach that lead to a larger ‘occupied zone’, but more exposed to one type of breach that leads to a larger ‘buffer zone’. For a well-specified eradication programme, only the three types of breach leading to reproduction in or just outside the buffer zone can justify falling back to containment, and only if the expected costs of eradication and containment were comparable before the breach. Synthesis and applications. Weed management plans must apply a consistent definition of containment and provide sufficient implementation detail to assess its feasibility. If the infestation extent, dispersal capacity, seed bank longevity and economic discount rate are specified, the general results presented here can be used to assess whether containment can outperform eradication, and under what conditions it would provide a valid fallback to a breached eradication programme. PMID:25678718
Multilayer film shields for the protection of PMT from constant magnetic field.
Dmitrenko, V V; Besson, David; Nyunt, PhyoWai; Grabchikov, S S; Grachev, V M; Muraviev-Smirnov, C C; Ulin, S E; Uteshev, Z M; Vlasik, K F
2015-01-01
Photomultiplier tubes (PMTs) are widely used in physical experiments as well as in applied devices. PMTs are sensitive to magnetic field, so creation of effective magnetic shields for their protection is very important. In this paper, the results of measurements of shielding effectiveness of multilayer film magnetic shields on PMT-85 are presented. Shields were formed by alternating layers of a material with high magnetic permeability (Ni-Fe) and high electric conductivity-Cu. The maximum number of bilayers reached 45. It is shown that in weak magnetic fields up to 0.5 mT, the output signal amplitude from PMT-85 does not change for all used multilayer shields. In strong magnetic field of 2-4 mT, the output signal amplitude decrease with 10%-40% depending from the number of layers in the shield. The Pulse distribution of PMT-85 in magnetic field 0.2-4 mT slightly changed in the range 1.1%-1.3% for the case when the number of layers do not exceed 10 and practically did not change for a shield with 45 double layers.
Radiation Shielding of Lunar Regolith/Polyethylene Composites and Lunar Regolith/Water Mixtures
NASA Technical Reports Server (NTRS)
Johnson, Quincy F.; Gersey, Brad; Wilkins, Richard; Zhou, Jianren
2011-01-01
Space radiation is a complex mixed field of ionizing radiation that can pose hazardous risks to sophisticated electronics and humans. Mission planning for lunar exploration and long duration habitat construction will face tremendous challenges of shielding against various types of space radiation in an attempt to minimize the detrimental effects it may have on materials, electronics, and humans. In late 2009, the Lunar Crater Observation and Sensing Satellite (LCROSS) discovered that water content in lunar regolith found in certain areas on the moon can be up to 5.6 +/-2.8 weight percent (wt%) [A. Colaprete, et. al., Science, Vol. 330, 463 (2010). ]. In this work, shielding studies were performed utilizing ultra high molecular weight polyethylene (UHMWPE) and aluminum, both being standard space shielding materials, simulated lunar regolith/ polyethylene composites, and simulated lunar regolith mixed with UHMWPE particles and water. Based on the LCROSS findings, radiation shielding experiments were conducted to test for shielding efficiency of regolith/UHMWPE/water mixtures with various percentages of water to compare relative shielding characteristics of these materials. One set of radiation studies were performed using the proton synchrotron at the Loma Linda Medical University where high energy protons similar to those found on the surface of the moon can be generated. A similar experimental protocol was also used at a high energy spalation neutron source at Los Alamos Neutron Science Center (LANSCE). These experiments studied the shielding efficiency against secondary neutrons, another major component of space radiation field. In both the proton and neutron studies, shielding efficiency was determined by utilizing a tissue equivalent proportional counter (TEPC) behind various thicknesses of shielding composite panels or mixture materials. Preliminary results from these studies indicated that adding 2 wt% water to regolith particles could increase shielding of the regolith materials by about 6%. The findings may be utilized to extend the possibilities of potential candidate materials for lunar habitat structures, will potentially impact the design criteria of future human bases on the moon, and provide some guidelines for future space mission planning with respect to radiation exposure and risks posed on astronauts.
Modelling and Optimization of Four-Segment Shielding Coils of Current Transformers
Gao, Yucheng; Zhao, Wei; Wang, Qing; Qu, Kaifeng; Li, He; Shao, Haiming; Huang, Songling
2017-01-01
Applying shielding coils is a practical way to protect current transformers (CTs) for large-capacity generators from the intensive magnetic interference produced by adjacent bus-bars. The aim of this study is to build a simple analytical model for the shielding coils, from which the optimization of the shielding coils can be calculated effectively. Based on an existing stray flux model, a new analytical model for the leakage flux of partial coils is presented, and finite element method-based simulations are carried out to develop empirical equations for the core-pickup factors of the models. Using the flux models, a model of the common four-segment shielding coils is derived. Furthermore, a theoretical analysis is carried out on the optimal performance of the four-segment shielding coils in a typical six-bus-bars scenario. It turns out that the “all parallel” shielding coils with a 45° starting position have the best shielding performance, whereas the “separated loop” shielding coils with a 0° starting position feature the lowest heating value. Physical experiments were performed, which verified all the models and the conclusions proposed in the paper. In addition, for shielding coils with other than the four-segment configuration, the analysis process will generally be the same. PMID:28587137
Modelling and Optimization of Four-Segment Shielding Coils of Current Transformers.
Gao, Yucheng; Zhao, Wei; Wang, Qing; Qu, Kaifeng; Li, He; Shao, Haiming; Huang, Songling
2017-05-26
Applying shielding coils is a practical way to protect current transformers (CTs) for large-capacity generators from the intensive magnetic interference produced by adjacent bus-bars. The aim of this study is to build a simple analytical model for the shielding coils, from which the optimization of the shielding coils can be calculated effectively. Based on an existing stray flux model, a new analytical model for the leakage flux of partial coils is presented, and finite element method-based simulations are carried out to develop empirical equations for the core-pickup factors of the models. Using the flux models, a model of the common four-segment shielding coils is derived. Furthermore, a theoretical analysis is carried out on the optimal performance of the four-segment shielding coils in a typical six-bus-bars scenario. It turns out that the "all parallel" shielding coils with a 45° starting position have the best shielding performance, whereas the "separated loop" shielding coils with a 0° starting position feature the lowest heating value. Physical experiments were performed, which verified all the models and the conclusions proposed in the paper. In addition, for shielding coils with other than the four-segment configuration, the analysis process will generally be the same.
Experiment K-6-24, K-6-25, K-6-26. Radiation dosimetry and spectrometry
NASA Technical Reports Server (NTRS)
Benton, E. V.; Frank, A.; Benton, E. R.; Dudkin, V.; Marennyi, A.
1990-01-01
Radiation experiments flown by the University of San Francisco on the Cosmos 1887 spacecraft were designed to measure the depth dependence of both total dose and heavy particle flux, dose and dose equivalent, down to very thin shielding. Three experiments were flown and were located both inside and outside the Cosmos 1887 spacecraft. Tissue absorbed dose rates of 264 to 0.028 rad d(-1) under shielding of 0.013 to 3.4 g/sq cm of (7)LiF were found outside the spacecraft and 0.025 rad d(-1) inside. Heavy particle fluxes of 3.43 to 1.03 x 10 to the minus 3rd power cm -2 sub s -1 sub sr -1 under shielding of 0.195 to 1.33 g/sq cm plastic were found outside the spacecraft and 4.25 times 10 to the minus 4th power cm -2 sub s -1 sub sr -1 inside (LET infinity H2O greater than or equal to 4 keV/micron m). The corresponding heavy particle dose equivalent rates outside the spacecraft were 30.8 to 19.8 mrem d(-1) and 11.4 mrem d(-1) inside. The large dose and particle fluxes found at small shielding thicknesses emphasize the importance of these and future measurements at low shielding, for predicting radiation effects on space materials and experiments where shielding is minimal and on astronauts during EVA. The Cosmos 1887 mission contained a variety of international radiobiological investigations to which the measurements apply. The high inclination orbit (62 degrees) of this mission provided a radiation environment which is seldom available to U.S. investigators. The radiation measurements will be compared with those of other research groups and also with those performed on the Shuttle, and will be used to refine computer models employed to calculate radiation exposures on other spacecraft, including the Space Station.
NASA Astrophysics Data System (ADS)
Temuryants, N. A.; Tumanyants, K. N.; Khusainov, D. R.; Cheretaev, I. V.; Tumanyants, E. N.
2017-12-01
It was found that moderate electromagnetic shielding, which attenuates constant and variable components of the geomagnetic field (19 h per day for 10 days), induces in male rats the development of depression-like behavior. This behavior is diagnosed on the basis of increased passive swimming time and a decreased duration of active swimming in the Porsolt test. These behaviors reach their peak on days 3-4 of the experiment. The daily administration of 1 mg/kg exogenous melatonin reduces these depression-like behaviors as soon as day 1 of the experiment, and this effect persists throughout all stages of the experiment. Electromagnetic shielding and the administration of 1 mg/kg exogenous melatonin do not change the levels of intraspecies aggressiveness. An increase in melatonin dosage to 5 mg/kg even further reduces depression-like symptoms and stops the increase in intraspecies aggressiveness during the experiment. The conclusion is made that melatonin plays an important role in the mechanisms of physiological effects of a weakened electromagnetic geomagnetic field.
An inverse method to estimate the flow through a levee breach
NASA Astrophysics Data System (ADS)
D'Oria, Marco; Mignosa, Paolo; Tanda, Maria Giovanna
2015-08-01
We propose a procedure to estimate the flow through a levee breach based on water levels recorded in river stations downstream and/or upstream of the failure site. The inverse problem is solved using a Bayesian approach and requires the execution of several forward unsteady flow simulations. For this purpose, we have used the well-known 1-D HEC-RAS model, but any unsteady flow model could be adopted in the same way. The procedure has been tested using four synthetic examples. Levee breaches with different characteristics (free flow, flow with tailwater effects, etc.) have been simulated to collect the synthetic level data used at a later stage in the inverse procedure. The method was able to accurately reproduce the flow through the breach in all cases. The practicability of the procedure was then confirmed applying it to the inundation of the Polesine Region (Northern Italy) which occurred in 1951 and was caused by three contiguous and almost simultaneous breaches on the left embankment of the Po River.
New shielding material development for compact accelerator-driven neutron source
NASA Astrophysics Data System (ADS)
Hu, Guang; Hu, Huasi; Wang, Sheng; Han, Hetong; Otake, Y.; Pan, Ziheng; Taketani, A.; Ota, H.; Hashiguchi, Takao; Yan, Mingfei
2017-04-01
The Compact Accelerator-driven Neutron Source (CANS), especially the transportable neutron source is longing for high effectiveness shielding material. For this reason, new shielding material is researched in this investigation. The component of shielding material is designed and many samples are manufactured. Then the attenuation detection experiments were carried out. In the detections, the dead time of the detector appeases when the proton beam is too strong. To grasp the linear range and nonlinear range of the detector, two currents of proton are employed in Pb attenuation detections. The transmission ratio of new shielding material, polyethylene (PE), PE + Pb, BPE + Pb is detected under suitable current of proton. Since the results of experimental neutrons and γ-rays appear as together, the MCNP and PHITS simulations are applied to assisting the analysis. The new shielding material could reduce of the weight and volume compared with BPE + Pb and PE + Pb.
NASA Technical Reports Server (NTRS)
Gaier, James R.; Berkebile, Stephen; Sechkar, Edward A.; Panko, Scott R.
2012-01-01
The preliminary design of a testbed to evaluate the effectiveness of galactic cosmic ray (GCR) shielding materials, the MISSE Radiation Shielding Testbed (MRSMAT) is presented. The intent is to mount the testbed on the Materials International Space Station Experiment-X (MISSE-X) which is to be mounted on the International Space Station (ISS) in 2016. A key feature is the ability to simultaneously test nine samples, including standards, which are 5.25 cm thick. This thickness will enable most samples to have an areal density greater than 5 g/sq cm. It features a novel and compact GCR telescope which will be able to distinguish which cosmic rays have penetrated which shielding material, and will be able to evaluate the dose transmitted through the shield. The testbed could play a pivotal role in the development and qualification of new cosmic ray shielding technologies.
Gerber, Iann C; Jolibois, Franck
2015-05-14
Chemical shift requires the knowledge of both the sample and a reference magnetic shielding. In few cases as nitrogen (15N), the standard experimental reference corresponds to its liquid phase. Theoretical estimate of NMR magnetic shielding parameters of compounds in their liquid phase is then mandatory but usually replaced by an easily-get gas phase value, forbidding direct comparisons with experiments. We propose here to combine ab initio molecular dynamic simulations with the calculations of magnetic shielding using GIAO approach on extracted cluster's structures from MD. Using several computational strategies, we manage to accurately calculate 15N magnetic shielding of nitromethane in its liquid phase. Theoretical comparison between liquid and gas phase allows us to extrapolate an experimental value for the 15N magnetic shielding of nitromethane in gas phase between -121.8 and -120.8 ppm.
Electrodynamic Dust Shield for Lunar/ISS Experiment Project
NASA Technical Reports Server (NTRS)
Zeitlin, Nancy; Calle, Carlos; Hogue, Michael; Johansen, Michael; Mackey, Paul
2015-01-01
The Electrostatics and Surface Physics Laboratory at Kennedy Space Center is developing a dust mitigation experiment and testing it on the lunar surface and on the International Space Station (ISS). The Electrodynamic Dust Shield (EDS) clears dust off surfaces and prevents accumulation by using a pattern of electrodes to generate a non-uniform electric field over the surface being protected. The EDS experiment will repel dust off materials such as painted Kapton and glass to demonstrate applications for thermal radiators, camera lenses, solar panels, and other hardware and equipment.
ERIC Educational Resources Information Center
Coronado, Adolfo S.
2012-01-01
Using a sample of security and privacy breaches the present research examines the comparative announcement impact between the two types of events. The first part of the dissertation analyzes the impact of publicly announced security and privacy breaches on abnormal stock returns, the change in firm risk, and abnormal trading volume are measured.…
ERIC Educational Resources Information Center
Ahmad, Altaf
2010-01-01
This dissertation involved the development of a new construct, perceived privacy breach (PPB), to evaluate how a person perceives breaches of privacy in terms of whether they perceive any exchange of information was fair or not and how they believe it will impact people whose information has been shared. . This instrument assists researchers to…
The Vulnerability of Social Networking Media and the Insider Threat: New Eyes for Bad Guys
2011-09-01
purchased the best security technologies that money can buy...(and still be) totally vulnerable” (Mitnick, 2002). According to the 2011 Data Breach Investigations...Report, for data breach avenues that used social engineering methods, criminals are increasingly relying on direct contact with a...Spitler, M. (2011). 2011 Data breach investigations report. New York: Verizon Business. Bishop, M., Engle, S., Peisert, S., Whalen, S., & Gates, C
2008-04-11
This document adopts, without change, the interim final rule that was published in the Federal Register on June 22, 2007, addressing data breaches of sensitive personal information that is processed or maintained by the Department of Veterans Affairs (VA). This final rule implements certain provisions of the Veterans Benefits, Health Care, and Information Technology Act of 2006. The regulations prescribe the mechanisms for taking action in response to a data breach of sensitive personal information.
Information Security Is a Business Continuity Issue: Are You Ready
2015-05-09
and data files • Legal - Employees have filed four lawsuits against the company for not protecting their data • Breach Expenses - In its first quarter...incidents into their planning, testing, and execution processes. 28© 2015 Carnegie Mellon University Factors Affecting Cost of Data Breach SOURCE: Ponemon...2014 Cost of Data Breach Study Per Capita Cost 29© 2015 Carnegie Mellon University Thank you for your attention.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Belangia, David Warren
The Home Depot Data Breach is the second largest data breach on record. It has or will affect up to 56 million debit or credit cards. A trusted vendor account, coupled with the use of a previously unknown variant of malware that allowed the establishment of a foothold, was the entry point into the Home Depot network. Once inside the perimeter, privilege escalation provided an avenue to obtain the desired information. Home Depot did, however, learn some lessons from Target. Home Depot certainly communicated better than Target, procured insurance, and instituted as secure an environment as possible. There are specificmore » measures an institution should undertake to prepare for a data breach, and everyone can learn from this breach. Publicly available information about the Home Depot Data Breach provides insight into the attack, an old malware variant with a new twist.While the malware was modified as to be unrecognizable with tools, it probably should have been detected. There are also concerns with Home Depot’s insurance and the insurance provider’s apparent lack of fully reimbursing Home Depot for their losses. The effect on shareholders and Home Depot’s stock price was short lived. This story is still evolving but provides interesting lessons learned concerning how an organization should prepare for it inevitable breach.« less
Walder, Joseph S.; O'Connor, Jim E.
1997-01-01
Floods from failures of natural and constructed dams constitute a widespread hazard to people and property. Expeditious means of assessing flood hazards are necessary, particularly in the case of natural dams, which may form suddenly and unexpectedly. We revise statistical relations (derived from data for past constructed and natural dam failures) between peak discharge (Qp) and water volume released (V0) or drop in lake level (d) but assert that such relations, even when cast into a dimensionless form, are of limited utility because they fail to portray the effect of breach-formation rate. We then analyze a simple, physically based model of dam-breach formation to show that the hydrograph at the breach depends primarily on a dimensionless parameter η=kV0/gl/2d7/2, where k is the mean erosion rate of the breach and g is acceleration due to gravity. The functional relationship between Qp and η takes asymptotically distinct forms depending on whether η ≪ 1 (relatively slow breach formation or small lake volume) or η ≫ 1 (relatively fast breach formation or large lake volume). Theoretical predictions agree well with data from dam failures for which k, and thus η, can be estimated. The theory thus provides a rapid means of predicting the plausible range of values of peak discharge at the breach in an earthen dam as long as the impounded water volume and the water depth at the dam face can be estimated.
Temperature Compensated Piezoelectric Materials
1976-06-01
and indicated no major phase changes between room temperature and the melting point of LijSiO-,. Various shielding — 1 .2- arrangements and...experiments. The DTA experiments showed a small endothermic peak at about 1030° and then the melting point at 1200oC. High temperature x-ray diffraction... melting point was lowered about 150° es* so that a boule could be grown without extraneous heat shields, but the boulep were still cracked. A thin
Lattice Boltzmann Study on Seawall-Break Flows under the Influence of Breach and Buildings
NASA Astrophysics Data System (ADS)
Mei, Qiu-Ying; Zhang, Wen-Huan; Wang, Yi-Hang; Chen, Wen-Wen
2017-10-01
In the process of storm surge, the seawater often overflows and even destroys the seawall. The buildings near the shore are usually inundated by the seawater through the breach. However, at present, there is little study focusing on the effects of buildings and breach on the seawall-break flows. In this paper, the lattice Boltzmann (LB) model with nine velocities in two dimensions (D2Q9) for the shallow water equations is adopted to simulate the seawall-break flows. The flow patterns and water depth distributions for the seawall-break flows under various densities, layouts and shapes of buildings and different breach discharges, sizes and locations are investigated. It is found that when buildings with a high enough density are perpendicular to the main flow direction, an obvious backwater phenomenon appears near buildings while this phenomenon does not occur when buildings with the same density are parallel to the main flow direction. Moreover, it is observed that the occurrence of backwater phenomenon is independent of the building shape. As to the effects of breach on the seawall-break flows, it is found that only when the breach discharge is large enough or the breach size is small enough, the effects of asymmetric distribution of buildings on the seawall-break flows become important. The breach location only changes the flow pattern in the upstream area of the first building that seawater meets, but has little impact on the global water depth distribution. Supported by the National Natural Science Foundation of China under Grant No. 11502124, the Natural Science Foundation of Zhejiang Province under Grant No. LQ16A020001, the Scientific Research Fund of Zhejiang Provincial Education Department under Grant No. Y201533808, the Natural Science Foundation of Ningbo under Grant No. 2016A610075, and is sponsored by K.C. Wong Magna Fund in Ningbo University.
Confidentiality breaches in clinical practice: what happens in hospitals?
Beltran-Aroca, Cristina M; Girela-Lopez, Eloy; Collazo-Chao, Eliseo; Montero-Pérez-Barquero, Manuel; Muñoz-Villanueva, Maria C
2016-09-02
Respect for confidentiality is important to safeguard the well-being of patients and ensure the confidence of society in the doctor-patient relationship. The aim of our study is to examine real situations in which there has been a breach of confidentiality, by means of direct observation in clinical practice. By means of direct observation, our study examines real situations in which there has been a breach of confidentiality in a tertiary hospital. To observe and collect data on these situations, we recruited students enrolled in the Medical Degree Program at the University of Cordoba. The observers recorded their entries on standardized templates during clinical internships in different departments: Internal Medicine; Gynecology and Obstetrics; Pediatrics; Emergency Medicine; General and Digestive Surgery; Maxillofacial Surgery; Plastic Surgery; Orthopedics and Traumatology; Digestive; Dermatology; Rheumatology; Mental Health; Nephrology; Pneumology; Neurology; and Ophthalmology. Following 7138 days and 33157 h of observation, we found an estimated Frequency Index of one breach per 62.5 h. As regards the typology of the observed breaches, the most frequent (54,6 %) were related to the consultation and/or disclosure of clinical and/or personal data to medical personnel not involved in the patient's clinical care, as well as people external to the hospital. As regards their severity, severe breaches were the most frequent, accounting for 46.7 % of all incidents. Most of the reported incidents were observed in public areas (37.9 %), such as corridors, elevators, the cafeteria, stairs, and locker rooms. In addition to aspects related to hospital organization or infrastructure, we have shown that all healthcare personnel are involved in confidentiality breaches, especially physicians. While most are committed unintentionally, a non-negligible number are severe, repeated breaches (9.5 %), thus suggesting a certain carelessness, perhaps through ignorance about certain behaviors that can jeopardize patient confidentiality.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nozirov, Farhod, E-mail: teobaldk@gmail.com, E-mail: farhod.nozirov@gmail.com; Stachów, Michał, E-mail: michal.stachow@gmail.com; Kupka, Teobald, E-mail: teobaldk@gmail.com, E-mail: farhod.nozirov@gmail.com
2014-04-14
A theoretical prediction of nuclear magnetic shieldings and indirect spin-spin coupling constants in 1,1-, cis- and trans-1,2-difluoroethylenes is reported. The results obtained using density functional theory (DFT) combined with large basis sets and gauge-independent atomic orbital calculations were critically compared with experiment and conventional, higher level correlated electronic structure methods. Accurate structural, vibrational, and NMR parameters of difluoroethylenes were obtained using several density functionals combined with dedicated basis sets. B3LYP/6-311++G(3df,2pd) optimized structures of difluoroethylenes closely reproduced experimental geometries and earlier reported benchmark coupled cluster results, while BLYP/6-311++G(3df,2pd) produced accurate harmonic vibrational frequencies. The most accurate vibrations were obtained using B3LYP/6-311++G(3df,2pd)more » with correction for anharmonicity. Becke half and half (BHandH) density functional predicted more accurate {sup 19}F isotropic shieldings and van Voorhis and Scuseria's τ-dependent gradient-corrected correlation functional yielded better carbon shieldings than B3LYP. A surprisingly good performance of Hartree-Fock (HF) method in predicting nuclear shieldings in these molecules was observed. Inclusion of zero-point vibrational correction markedly improved agreement with experiment for nuclear shieldings calculated by HF, MP2, CCSD, and CCSD(T) methods but worsened the DFT results. The threefold improvement in accuracy when predicting {sup 2}J(FF) in 1,1-difluoroethylene for BHandH density functional compared to B3LYP was observed (the deviations from experiment were −46 vs. −115 Hz)« less
Radiation shielding materials characterization in the MoMa-Count program and further evolutions
NASA Astrophysics Data System (ADS)
Lobascio, Cesare
In the frame of the space research programme MoMa (From Molecules to Man) -Count (Coun-termeasures), funded by the Italian Space Agency, multi-functional protections for human space exploration have been investigated, paying particular attention to flexible materials, selected also for their excellent structural, thermal and ballistic performances. Flexible materials such as Kevlar R are qualified for space application, but have poorly known space radiation prop-erties, with consequent uncertainties about their shielding efficiency against the radiation en-vironment. The necessary evaluation of their shielding efficiency has been chiefly based on dedicated ground experiments in accelerators, supplemented by Monte Carlo simulations of the particle transport in the materials or multi-layers. In addition, flight experiments have been performed in Low Earth Orbit (LEO), onboard the International Space Station (ISS) and the re-entry capsule Foton, to measure the shielding behaviour in the actual operating environment of space, via dedicated detectors and dosimeters. This paper aims at presenting the results and lessons learned accrued within the MoMa-Count program, as well as the future actions planned for improving radiation shielding in long duration human exploration missions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swadling, G. F.; Ross, J. S.; Datte, P.
An Optical Thomson Scattering (OTS) diagnostic is currently being developed for the National Ignition Facility (NIF) at Lawrence Livermore National Laboratory. This diagnostic is designed to make measurements of the hohlraum plasma parameters, such as the electron temperature and the density, during inertial confinement fusion (ICF) experiments. NIF ICF experiments present a very challenging environment for optical measurements; by their very nature, hohlraums produce intense soft x-ray emission, which can cause “blanking” (radiation induced opacity) of the radiation facing optical components. The soft x-ray fluence at the surface of the OTS blast shield, 60 cm from the hohlraum, is estimatedmore » to be ∼8 J cm{sup −2}. This is significantly above the expected threshold for the onset of “blanking” effects. A novel xenon plasma x-ray shield is proposed to protect the blast shield from x-rays and mitigate “blanking.” Estimates suggest that an areal density of 10{sup 19} cm{sup −2} Xe atoms will be sufficient to absorb 99.5% of the soft x-ray flux. Two potential designs for this shield are presented.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swadling, G. F.; Ross, J. S.; Datte, P.
An Optical Thomson Scattering (OTS) diagnostic is currently being developed for the National Ignition Facility (NIF) at Lawrence Livermore National Labs (LLNL). This diagnostic is designed to make measurements of hohlraum plasma parameters, such as the electron temperature and density, during inertial confinement fusion (ICF) experiments. NIF ICF experiments present a very challenging environment for optical measurements; by their very nature hohlraums produce intense soft x-ray emission, which can cause “blanking” (radiation induced opacity) of the radiation facing optical components. The soft x-ray fluence at the surface of the OTS blast shield, 60 cm from the hohlraum, is estimated tomore » be ~ 8 J cm -2. This is then significantly above the expected threshold for the onset of “blanking” effects. A novel Xenon Plasma X-ray Shield (XPXS) has been proposed to protect the blast shield from x-rays and mitigate “blanking”. Finally, these estimates suggest that an areal density of 10 19 cm -2 Xe atoms will be sufficient to absorb 99.5% the soft x-ray flux. Two potential designs for this shield are presented.« less
Swadling, G. F.; Ross, J. S.; Datte, P.; ...
2016-07-21
An Optical Thomson Scattering (OTS) diagnostic is currently being developed for the National Ignition Facility (NIF) at Lawrence Livermore National Labs (LLNL). This diagnostic is designed to make measurements of hohlraum plasma parameters, such as the electron temperature and density, during inertial confinement fusion (ICF) experiments. NIF ICF experiments present a very challenging environment for optical measurements; by their very nature hohlraums produce intense soft x-ray emission, which can cause “blanking” (radiation induced opacity) of the radiation facing optical components. The soft x-ray fluence at the surface of the OTS blast shield, 60 cm from the hohlraum, is estimated tomore » be ~ 8 J cm -2. This is then significantly above the expected threshold for the onset of “blanking” effects. A novel Xenon Plasma X-ray Shield (XPXS) has been proposed to protect the blast shield from x-rays and mitigate “blanking”. Finally, these estimates suggest that an areal density of 10 19 cm -2 Xe atoms will be sufficient to absorb 99.5% the soft x-ray flux. Two potential designs for this shield are presented.« less
ERIC Educational Resources Information Center
Osofsky, Joy D.; Osofsky, Howard J.; Harris, William W.
2007-01-01
Hurricane Katrina resulted in a disaster of proportions not previously known in the United States. The traumatic experiences of children and families during Hurricane Katrina, the flooding that resulted from the breach of the levees, the evacuation, and the aftermath are unprecedented. In responding to the enormous mental health needs of children…
Hanel, Ricardo A; Aguilar-Salinas, Pedro; Brasiliense, Leonardo Bc; Sauvageau, Eric
2017-05-04
Flow diversion has revolutionised the treatment of intracranial aneurysms, and the Pipeline Embolization Device (PED) remains the only flow diverter (FD) approved in the USA. However, thromboembolic events remain an issue for FDs. Attempting to minimise these incidents, a newer PED has been developed with the use of covalent bonding of phosphorylcholine onto the Pipeline device that has been known as Shield Technology (PED Shield), which in vitro has demonstrated a significant reduction in material thrombogenicity. We report the first US experience of the PED Shield in the treatment of a ruptured fusiform aneurysm located in the right vertebral artery in an attempt to mitigate complications related to the use of dual-antiplatelet therapy and discuss our rationale for using the new FD, using aspirin only as the antiplatelet regimen. © BMJ Publishing Group Ltd (unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Hatteras Breach, North Carolina
2010-07-01
1400 EST. Cross channel ADCP transects were also made from an instrumented Zodiac inflatable boat on 16, 17, and 24 October. The ADCP employed for...of the breach, near the middle, and on the sound side (Figure 11). The Zodiac crabbed (at an angle to the cur- rent) across the breach at a best...Coastal and Hydraulics Engineering Technical Note (CHETN) is intended to document the rapid response of the U.S. Army Corps of Engineers to engineer and
NASA Technical Reports Server (NTRS)
Jacobson, Nathan S.; Opila, Elizabeth J.; Tallant, David
2005-01-01
Initial estimates on the temperature and conditions of the breach in the Space Shuttle Columbia's wing focused on analyses of the slag deposits. These deposits are complex mixtures of the reinforced carbon/carbon (RCC) constituents, insulation material, and wing structural materials. Identification of melted/solidified Cerachrome insulation (Thermal Ceramics, Inc., Augusta, GA) indicated that the temperatures at the breach had exceeded 1760 C.
Federal Laws Relating to Cybersecurity: Overview and Discussion of Proposed Revisions
2013-06-20
originally introduced in March.19 Several other Senate bills would have addressed specific aspects of cybersecurity, such as data breaches of personal...H.R. 3674)c X X X Public awareness H.R. 756 X X X X Cybercrime law X X X Data breach notification X X Internet security...Revisions Congressional Research Service 20 Data Breach Notification. The White House Proposal and the Task Force Report would also both have set
Phantom torso experiment on the international space station; flight measurements and calculations
NASA Astrophysics Data System (ADS)
Atwell, W.; Semones, E.; Cucinotta, F.
The Phantom Torso Experiment (PTE) first flew on the 10-day Space Shuttle mission STS-91 in June 1998 during a period near solar minimum. The PTE was re- f l o w n on the I ternational Space Station (ISS) Increment 2 mission from April-n A u g u s t 2001 during a period near solar maximum. The experiment was located with a suite of other radiation experiments in the US Lab module Human Research Facility (HRF) rack. The objective of the experiment was to measure space radiation exposures at several radiosensitive critical body organs (brain, thyroid, heart/lung, stomach and colon) and two locations on the surface (skin) of a modified RandoTM phantom. Prior to flight, active solid -state silicon dosimeters were located at the RandoTM critical body organ locations and passive dosimeters were placed at the two surface locations. Using a mathematically modified Computerized Anatomical Male (CAM) model, shielding distributions were generated for the five critical body organ and two skin locations. These shielding distributions were then combined with the ISS HRF rack shielding distribution to account for the total shielding "seen" by the PTE. Using the trapped proton and galactic cosmic radiation environment models and high -energy particle transport codes, absorbed dose, dose equivalent, and LET (linear energy transfer) values were computed for the seven dose point locations of interest. The results of these computations are compared with the actual flight measurements.
Investigation of Acoustical Shielding by a Wedge-Shaped Airframe
NASA Technical Reports Server (NTRS)
Gerhold, Carl H.; Clark, Lorenzo R.; Dunn, Mark H.; Tweed, John
2006-01-01
Experiments on a scale model of an advanced unconventional subsonic transport concept, the Blended Wing Body (BWB), have demonstrated significant shielding of inlet-radiated noise. A computational model of the shielding mechanism has been developed using a combination of boundary integral equation method (BIEM) and equivalent source method (ESM). The computation models the incident sound from a point source in a nacelle and determines the scattered sound field. In this way the sound fields with and without the airfoil can be estimated for comparison to experiment. An experimental test bed using a simplified wedge-shape airfoil and a broadband point noise source in a simulated nacelle has been developed for the purposes of verifying the analytical model and also to study the effect of engine nacelle placement on shielding. The experimental study is conducted in the Anechoic Noise Research Facility at NASA Langley Research Center. The analytic and experimental results are compared at 6300 and 8000 Hz. These frequencies correspond to approximately 150 Hz on the full scale aircraft. Comparison between the experimental and analytic results is quite good, not only for the noise scattering by the airframe, but also for the total sound pressure in the far field. Many of the details of the sound field that the analytic model predicts are seen or indicated in the experiment, within the spatial resolution limitations of the experiment. Changing nacelle location produces comparable changes in noise shielding contours evaluated analytically and experimentally. Future work in the project will be enhancement of the analytic model to extend the analysis to higher frequencies corresponding to the blade passage frequency of the high bypass ratio ducted fan engines that are expected to power the BWB.
Investigation of Acoustical Shielding by a Wedge-Shaped Airframe
NASA Technical Reports Server (NTRS)
Gerhold, Carl H.; Clark, Lorenzo R.; Dunn, Mark H.; Tweed, John
2004-01-01
Experiments on a scale model of an advanced unconventional subsonic transport concept, the Blended Wing Body (BWB), have demonstrated significant shielding of inlet-radiated noise. A computational model of the shielding mechanism has been developed using a combination of boundary integral equation method (BIEM) and equivalent source method (ESM). The computation models the incident sound from a point source in a nacelle and determines the scattered sound field. In this way the sound fields with and without the airfoil can be estimated for comparison to experiment. An experimental test bed using a simplified wedge-shape airfoil and a broadband point noise source in a simulated nacelle has been developed for the purposes of verifying the analytical model and also to study the effect of engine nacelle placement on shielding. The experimental study is conducted in the Anechoic Noise Research Facility at NASA Langley Research Center. The analytic and experimental results are compared at 6300 and 8000 Hz. These frequencies correspond to approximately 150 Hz on the full scale aircraft. Comparison between the experimental and analytic results is quite good, not only for the noise scattering by the airframe, but also for the total sound pressure in the far field. Many of the details of the sound field that the analytic model predicts are seen or indicated in the experiment, within the spatial resolution limitations of the experiment. Changing nacelle location produces comparable changes in noise shielding contours evaluated analytically and experimentally. Future work in the project will be enhancement of the analytic model to extend the analysis to higher frequencies corresponding to the blade passage frequency of the high bypass ratio ducted fan engines that are expected to power the BWB.
Out-of-Equilibrium Dynamics of Colloidal Particles at Interfaces
NASA Astrophysics Data System (ADS)
Wang, Anna
It is widely assumed that when colloidal particles adsorb to a fluid-fluid interface, they reach equilibrium rapidly. Recently, however, Kaz et al. [Nature Materials, 11, 138-142 (2012)] found that a variety of functionalised latex microspheres breaching an aqueous phase-oil interface relax logarithmically with time toward equilibrium. The relaxation is so slow that the time projected for the particles to reach the equilibrium contact angle of 110° is months--far longer than typical experimental timescales. In this thesis, we seek to understand the out-of-equilibrium behaviour of particles near interfaces. Because contact line pinning is likely an extra source of dissipation at interfaces, we start with experiments to elucidate the origins of contact-line pinning and find that polymer hairs on aqueous dispersed polymer particles strongly pin the contact-line. For particles without polymer hairs, nanoscale surface roughness can also pin the contact-line, though with a lower energy. We then extend our digital holography capabilities to track non-spherical particles. We demonstrate that we can track the centre-of-mass of a colloidal spherocylinder to a precision of 35 nm in all three dimensions and its orientation to a precision of 1.5°. Furthermore, the measured translational and rotational diffusion coefficients for the spherocylinders agree with hydrodynamic predictions to within 0.3%. This new functionality enables us to track colloidal ellipsoids and spherocylinders as they breach interfaces. By comparing the adsorption trajectories of the non-spherical particles to what is predicted from energy minimisation, we learn that contact-line pinning affects not just the timescales of breaching, but also the pathway to equilibrium. In fact, a particle's path to equilibrium can have complications even before the particle breaches the interface. Some particles are attracted to the interface, but stay within a few nanometers without ever breaching. We refer to this binding-mode as 'non-capillary binding', and we investigate when this binding mode is present, what causes it, and how interparticle interactions depend on the binding mode. The last few chapters in this thesis are extensions of ideas developed in the first part. We track the run and tumble of E.coli to demonstrate the potential of digital holographic microscopy as an imaging tool for active particles. Taking all of the particle-interface literature into account, we also outline some simple design principles for making particle-stabilised Pickering emulsions.
Shielding Strategies for Human Space Exploration
NASA Technical Reports Server (NTRS)
Wilson J. W. (Editor); Miller, J. (Editor); Konradi, A. (Editor); Cucinotta, F. A. (Editor)
1997-01-01
A group of twenty-nine scientists and engineers convened a 'Workshop on Shielding Strategies for Human Space Exploration' at the Lyndon B. Johnson Space Center in Houston, Texas. The provision of shielding for a Mars mission or a Lunar base from the hazards of space radiations is a critical technology since astronaut radiation safety depends on it and shielding safety factors to control risk uncertainty appear to be great. The purpose of the workshop was to define requirements for the development and evaluation of high performance shield materials and designs and to develop ideas regarding approaches to radiation shielding. The workshop was organized to review the recent experience on shielding strategies gained in studies of the 'Space Exploration Initiative (SEI),' to review the current knowledge base for making shield assessment, to examine a basis for new shielding strategies, and to recommend a strategy for developing the required technologies for a return to the moon or for Mars exploration. The uniqueness of the current workshop arises from the expected long duration of the missions without the protective cover of the geomagnetic field in which the usually small and even neglected effects of the galactic cosmic rays (GCR) can no longer be ignored. It is the peculiarity of these radiations for which the inter-action physics and biological action are yet to be fully understood.
Experiences with a New Shielding Material
NASA Astrophysics Data System (ADS)
Bücherl, T.; Calzada, E.; Liu, S. Q.; Stöwer, W.; Kortmann, F.; Größlhuber, H.; von Gostomski, Ch. Lierse
Recent modifications of the NECTAR facility included the set-up of a new beam dump. One of its main components is based on a reusable shielding material developed at TUM. The provided base material was characterized and its advantages and limitations were investigated by simulation studies and by measurements.
Structural Design and Thermal Analysis for Thermal Shields of the MICE Coupling Magnets
DOE Office of Scientific and Technical Information (OSTI.GOV)
Green, Michael A.; Pan, Heng; Liu, X. K.
2009-07-01
A superconducting coupling magnet made from copper matrix NbTi conductors operating at 4 K will be used in the Muon Ionization Cooling Experiment (MICE) to produce up to 2.6 T on the magnet centerline to keep the muon beam within the thin RF cavity indows. The coupling magnet is to be cooled by two cryocoolers with a total cooling capacity of 3 W at 4.2 K. In order to keep a certain operating temperature margin, the most important is to reduce the heat leakage imposed on cold surfaces of coil cold mass assembly. An ntermediate temperature shield system placed betweenmore » the coupling coil and warm vacuum chamber is adopted. The shield system consists of upper neck shield, main shields, flexible connections and eight supports, which is to be cooled by the first stage cold heads of two ryocoolers with cooling capacity of 55 W at 60 K each. The maximum temperature difference on the shields should be less than 20 K, so the thermal analyses for the shields with different thicknesses, materials, flexible connections for shields' cooling and structure design for heir supports were carried out. 1100 Al is finally adopted and the maximum temperature difference is around 15 K with 4 mm shield thickness. The paper is to present detailed analyses on the shield system design.« less
Code of Federal Regulations, 2010 CFR
2010-01-01
... SERVICE, DEPARTMENT OF AGRICULTURE VETERINARY MEDICINE LOAN REPAYMENT PROGRAM Administration of the Veterinary Medicine Loan Repayment Program § 3431.21 Breach. (a) General. If a program participant fails to...
Calculation of self–shielding factor for neutron activation experiments using GEANT4 and MCNP
DOE Office of Scientific and Technical Information (OSTI.GOV)
Romero–Barrientos, Jaime, E-mail: jaromero@ing.uchile.cl; Universidad de Chile, DFI, Facultad de Ciencias Físicas Y Matemáticas, Avenida Blanco Encalada 2008, Santiago; Molina, F.
2016-07-07
The neutron self–shielding factor G as a function of the neutron energy was obtained for 14 pure metallic samples in 1000 isolethargic energy bins from 1·10{sup −5}eV to 2·10{sup 7}eV using Monte Carlo simulations in GEANT4 and MCNP6. The comparison of these two Monte Carlo codes shows small differences in the final self–shielding factor mostly due to the different cross section databases that each program uses.
NASA Technical Reports Server (NTRS)
Chapman, G. T.; Cumby, R. P.; Gibbons, J. H.; Macklin, R. L.; Parker, H. W.
1972-01-01
A series of balloon-flight experiments at altitudes greater than 115,000 feet were conducted to gain information relative to the use of composite shields (passive and/or active) for shielding large-volume, lithium-drifted, germanium (Ge(Li)) detectors used in gamma-ray spectrometers. Data showing the pulse-height spectra of the environmental gamma radiation as measured at 5.3 and 3.8 gms sq cm residual atmosphere with an unshielded diode detector are also presented.
Lavelle, William F; Ranade, Ashish; Samdani, Amer F; Gaughan, John P; D'Andrea, Linda P; Betz, Randal R
2014-01-01
Pedicle screws are used increasingly in spine surgery. Concerns of complications associated with screw breach necessitates accurate pedicle screw placement. Postoperative CT imaging helps to detect screw malposition and assess its severity. However, accuracy is dependent on the reading of the CT scans. Inter- and intra-observer variability could affect the reliability of CT scans to assess multiple screw types and sites. The purpose of this study was to assess the reliability of multi-observer analysis of CT scans for determining pedicle screw breach for various screw types and sites in patients with spinal deformity or degenerative pathologies. Axial CT scan images of 23 patients (286 screws) were read by four experienced spine surgeons. Pedicle screw placement was considered 'In' when the screw was fully contained and/or the pedicle wall breach was ≤2 mm. 'Out' was defined as a breach in the medial or lateral pedicle wall >2 mm. Intra-class coefficients (ICC) were calculated to assess the inter- and intra-observer reliability. Marked inter- and intra-observer variability was noticed. The overall inter-observer ICC was 0.45 (95% confidence limits 0.25 to 0.65). The intra-observer ICC was 0.49 (95% confidence limits 0.29 to 0.69). Underlying spinal pathology, screw type, and patient age did not seem to impact the reliability of our CT assessments. Our results indicate the evaluation of pedicle screw breach on CT by a single surgeon is highly variable, and care should be taken when using individual CT evaluations of millimeters of breach as a basis for screw removal. This was a Level III study.
Large Earthquakes Disrupt Groundwater System by Breaching Aquitards
NASA Astrophysics Data System (ADS)
Wang, C. Y.; Manga, M.; Liao, X.; Wang, L. P.
2016-12-01
Changes of groundwater system by large earthquakes are widely recognized. Some changes have been attributed to increases in the vertical permeability but basic questions remain: How do increases in the vertical permeability occur? How frequent do they occur? How fast does the vertical permeability recover after the earthquake? Is there a quantitative measure for detecting the occurrence of aquitard breaching? Here we attempt to answer these questions by examining data accumulated in the past 15 years. Analyses of increased stream discharges and their geochemistry after large earthquakes show evidence that the excess water originates from groundwater released from high elevations by large increase of the vertical permeability. Water-level data from a dense network of clustered wells in a sedimentary basin near the epicenter of the 1999 M7.6 Chi-Chi earthquake in western Taiwan show that, while most confined aquifers remained confined after the earthquake, about 10% of the clustered wells show evidence of coseismic breaching of aquitards and a great increase of the vertical permeability. Water level in wells without evidence of coseismic breaching of aquitards show similar tidal response before and after the earthquake; wells with evidence of coseismic breaching of aquitards, on the other hand, show distinctly different tidal response before and after the earthquake and that the aquifers became hydraulically connected for many months thereafter. Breaching of aquitards by large earthquakes has significant implications for a number of societal issues such as the safety of water resources, the security of underground waste repositories, and the production of oil and gas. The method demonstrated here may be used for detecting the occurrence of aquitard breaching by large earthquakes in other seismically active areas.
Nuzback, Kara
2014-07-01
Since it began offering cyber liability coverage in December 2011, the Texas Medical Liability Trust has received more than 150 cyber liability claims, most of which involved breaches of electronic protected health information. TMLT's cyber liability insurance will protect practices financially should a breach occur. The insurance covers a breach notification to customers and business partners, expenses for legal counsel, information security and forensic data services, public relations support, call center and website support, credit monitoring, and identity theft restoration services.
[Comment on the ruling about the appeal against the Directive on biotechnological inventions].
Fernando Magarzo, M R
2001-01-01
The author examines the content of the European Court of Justice ruling which dismisses the appeal lodged by the Netherlands against Directive 98/44 concerning the legal protection of biotechnological inventions. The main grounds for the appeal were as follows: inappropriate choice of points of law; breach of the principle of subsidiarity; violation of the principle of legal certainty; breach of International Law obligations; undermining of human dignity; breach of the principle of collegiality.
Joint Sensor: Security Test and Evaluation Embedded in a Production Network Sensor Cloud
2010-12-01
read of this year’s Verizon 2010 Data Breach Investigations Report (Baker et al. 2010) may in a sense reiterate the assumptions and propagate the...in 2002. He currently serves as the program manager for the DREN. E-mail: rcampbell@hpcmo.hpc.mil References Baker, W., et al. 2010. 2010 data breach investiga...tions report. http://www.verizonbusiness.com/resources/ reports/rp_2010- data - breach -report_en_xg.pdf (ac- cessed October 13, 2010
Securing the Next Ripple in Information Security: The Defense Industrial Base (DIB)
2012-06-14
Cybersecurity model for the DIB needs to be more preventative rather than responsive and a model should stress continuous improvement. In a 2012 data breach investigation...of what they do, but most become a target because of what they do (or don’t do)”, in the 2011 Data Breach Investigations Report. Therefore the...txt Verizon Risk Team (2012). Data Breach Investigations Report. Verizon Business, March 2012. http://www.verizonbusiness.com/resources
Unintentional Insider Threats: A Review of Phishing and Malware Incidents by Economic Sector
2014-07-01
the conclusions in the Verizon Data Breach Report 2013 that 47% of malware was downloaded through e-mail at- tachments, 48% of hacking took place...the attackers pivoted onto other systems and databases and exfiltrated approximately 8.2 GB of data . BREACH : Accessing an employee account via a...Symantec. “Internet Security Threat Report 2014.” 2013 Trends 19 (April 2014). Symantec Cor- poration. [Verizon 2013] Verizon. 2013 Data Breach Investigations
Whip Rule Breaches in a Major Australian Racing Jurisdiction: Welfare and Regulatory Implications
Hood, Jennifer; McDonald, Carolyn; Wilson, Bethany; McManus, Phil; McGreevy, Paul
2017-01-01
Simple Summary An evidence-based analysis of whip rule breaches in horse racing is needed to address community expectations that racehorses are treated humanely. The study provides the first peer-reviewed characterisation of whip rule breaches and their regulatory outcomes in horseracing, and considers the relationship between rules affecting racing integrity and the welfare of racehorses in a major Australian racing jurisdiction. Abstract Whip use in horseracing is increasingly being questioned on ethical, animal welfare, social sustainability, and legal grounds. Despite this, there is weak evidence for whip use and its regulation by Stewards in Australia. To help address this, we characterised whip rule breaches recorded by Stewards using Stewards Reports and Race Diaries from 2013 and 2016 in New South Wales (NSW) and the Australian Capital Territory (ACT). There were more recorded breaches at Metropolitan (M) than Country (C) or Provincial (P) locations, and by riders of horses that finished first, second, or third than by riders of horses that finished in other positions. The most commonly recorded breaches were forehand whip use on more than five occasions before the 100-metre (m) mark (44%), and whip use that raises the jockey’s arm above shoulder height (24%). It is recommended that racing compliance data be analysed annually to inform the evidence-base for policy, education, and regulatory change, and ensure the welfare of racehorses and racing integrity. PMID:28275207
Vander Elst, Tinne; De Cuyper, Nele; Baillien, Elfi; Niesen, Wendy; De Witte, Hans
2016-04-01
This study aims to further knowledge on the mechanisms through which job insecurity is related to negative outcomes. Based on appraisal theory, two explanations-perceived control and psychological contract breach-were theoretically integrated in a comprehensive model and simultaneously examined as mediators of the job insecurity-outcome relationship. Different categories of outcomes were considered, namely work-related (i.e. vigour and need for recovery) and general strain (i.e. mental and physical health complaints), as well as psychological (i.e. job satisfaction and organizational commitment) and behavioural coping reactions (i.e. self-rated performance and innovative work behaviour). The hypotheses were tested using data of a heterogeneous sample of 2413 Flemish employees by means of both single and multiple mediator structural equation modelling analyses (bootstrapping method). Particularly, psychological contract breach accounted for the relationship between job insecurity and strain. Both perceived control and psychological contract breach mediated the relationships between job insecurity and psychological coping reactions, although the indirect effects were larger for psychological contract breach. Finally, perceived control was more important than psychological contract breach in mediating the relationships between job insecurity and behavioural coping reactions. This study meets previous calls for a theoretical integration regarding mediators of the job insecurity-outcome relationship. Copyright © 2014 John Wiley & Sons, Ltd.
Flood hydrology and dam-breach hydraulic analyses of five reservoirs in Colorado
Stevens, Michael R.; Hoogestraat, Galen K.
2013-01-01
The U.S. Department of Agriculture Forest Service has identified hazard concerns for areas downstream from five Colorado dams on Forest Service land. In 2009, the U.S. Geological Survey, in cooperation with the Forest Service, initiated a flood hydrology analysis to estimate the areal extent of potential downstream flood inundation and hazard to downstream life, property, and infrastructure if dam breach occurs. Readily available information was used for dam-breach assessments of five small Colorado reservoirs (Balman Reservoir, Crystal Lake, Manitou Park Lake, McGinnis Lake, and Million Reservoir) that are impounded by an earthen dam, and no new data were collected for hydraulic modeling. For each reservoir, two dam-breach scenarios were modeled: (1) the dam is overtopped but does not fail (break), and (2) the dam is overtopped and dam-break occurs. The dam-breach scenarios were modeled in response to the 100-year recurrence, 500-year recurrence, and the probable maximum precipitation, 24-hour duration rainstorms to predict downstream flooding. For each dam-breach and storm scenario, a flood inundation map was constructed to estimate the extent of flooding in areas of concern downstream from each dam. Simulation results of the dam-break scenarios were used to determine the hazard classification of the dam structure (high, significant, or low), which is primarily based on the potential for loss of life and property damage resulting from the predicted downstream flooding.
Hypervelocity impact testing above 10 km/s of advanced orbital debris shields
NASA Astrophysics Data System (ADS)
Christiansen, Eric L.; Crews, Jeanne Lee; Kerr, Justin H.; Chhabildas, Lalit C.
1996-05-01
NASA has developed enhanced performance shields to improve the protection of spacecraft from orbital debris and meteoroid impacts. One of these enhanced shields includes a blanket of Nextel™ ceramic fabric and Kevlar™ high strength fabric that is positioned midway between an aluminum bumper and the spacecraft pressure wall. As part of the evaluation of this new shielding technology, impact data above 10 km/sec has been obtained by NASA Johnson Space Center (JSC) from the Sandia National Laboratories HVL ("hypervelocity launcher") and the Southwest Research Institute inhibited shaped charge launcher (ISCL). The HVL launches flyer-plates in the velocity range of 10 to 15 km/s while the ISCL launches hollow cylinders at ˜11.5 km/s. The >10 km/s experiments are complemented by hydrocode analysis and light-gas gun testing at the JSC Hypervelocity Impact Test Facility (HIT-F) to assess the effects of projectile shape on shield performance. Results from the testing and analysis indicate that the Nextel™/Kevlar™ shield provides superior protection performance compared to an all-aluminum shield alternative.
Alakpa, George Edafese; Collins, John W
2015-01-01
The department of defense's FM 3-11 is among the military's field manuals for preparing for, reacting to and recovering from chemical, biological, radiological and nuclear attacks. Since post 9-11, U.S. military service members have been deployed in the global war on terrorism. This study attempted to determine the effectiveness of the FM 3-11 in detecting, deterring or preventing a human-borne with bioagent (HBBA) terrorist breach at an entry control point (ECP). This time-specific, cross-sectional study disseminated a validated survey tool with Cronbach's α > 0.82 to respondents who have had antiterrorism training and combat ECP experience. The return rate was greater than 75.0 %; however, many of the respondents failed to meet the inclusion criteria. Consequently, only 26 questionnaires were included in the sample. The results revealed that while over 60.0 % of the respondents either strongly agreed or agreed that biointelligence, the deployment of biodetectors and the use of biowarning systems could be effective in preventing an ECP breach by a terrorist with a bioagent, the use of protective equipment and immunization to decontaminate service members or other TTPs would never prevent a breach. A large percentage of respondents claimed that soldiers at the ECP lacked the devices or the knowledge to detect an HBBA at an ECP, and 72.0 % suggested modifying current ECP TTPs to include education, training and equipment for security personnel at military base ECPs. If obtained from appropriate sources and communicated to the personnel at the ECP in an effective or timely manner, the possible effectiveness of certain TTPs in the FM 3-11, specifically FM 3-11.86 (intelligence), might increase.
Sando, Steven K.; Lambing, John H.
2011-01-01
Milltown Reservoir is a National Priorities List Superfund site in the upper Clark Fork basin of western Montana where sediments enriched in trace elements from historical mining and ore processing have been deposited since the completion of Milltown Dam in 1908. Milltown Dam was breached on March 28, 2008, as part of Superfund remediation activities to remove the dam and excavate contaminated sediment that had accumulated in Milltown Reservoir. In preparation for the breach of Milltown Dam, permanent drawdown of Milltown Reservoir began on June 1, 2006, and lowered the water-surface elevation by about 10 to 12 feet. After the breach of Milltown Dam, the water-surface elevation was lowered an additional 17 feet. Hydrologic data-collection activities were conducted by the U.S. Geological Survey in cooperation with U.S. Environmental Protection Agency to estimate loads of suspended sediment and trace elements transported through the Clark Fork basin before and after the breach of Milltown Dam. This report presents selected results of the data-collection activities.
Electrodynamic Dust Shields on the International Space Station: Exposure to the Space Environment
NASA Technical Reports Server (NTRS)
Calle, C. I.; Hogue, M. D.; Johansen, M. R.; Yim, H.; Delaune, P. B.; Clements, J. S.
2012-01-01
Electrodynamic Dust Shields (EDS) have been in development at NASA as a dust mitigation method for lunar and Martian missions. An active dust mitigation strategy. such as that provided by the EDS, that can remove dust from surfaces, is of crucial importance to the planetary exploration program. We report on the development of a night experiment to fully ex pose four EDS panels to the space environment. This flight experiment is part of the Materials International Space Station experiment X(MISSE-X). an external platform on the International Space Station that will expose materials to the space environment.
Nelson, Timothy R.; Miselis, Jennifer L.; Hapke, Cheryl J.; Brenner, Owen T.; Henderson, Rachel E.; Reynolds, Billy J.; Wilson, Kathleen E.
2017-05-12
Scientists from the U.S. Geological Survey (USGS) St. Petersburg Coastal and Marine Science Center in St. Petersburg, Florida, conducted a bathymetric survey of Fire Island from May 6-20, 2015. The USGS is involved in a post-Hurricane Sandy effort to map and monitor the morphologic evolution of the wilderness breach as a part of the Hurricane Sandy Supplemental Project GS2-2B. During this study, bathymetry data were collected with single-beam echo sounders and Global Positioning Systems, which were mounted to personal watercraft, along the Fire Island shoreface and within the wilderness breach. Additional bathymetry and elevation data were collected using backpack Global Positioning Systems on flood shoals and in shallow channels within the wilderness breach.
Ceramic port shields cast in an iron engine head
NASA Technical Reports Server (NTRS)
Hakim, Nabil S.; Groeneweg, Mark A.
1989-01-01
Silicon nitride exhaust and intake port shields have been successfully cast into a gray iron cylinder head of a heavy duty diesel single cylinder research engine. Careful design considerations, finite element, and probability of survival analyses indicated viability of the design. Foundry experience, NDE, and failure investigations are reported.
A large-scale magnetic shield with 10{sup 6} damping at millihertz frequencies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Altarev, I.; Bales, M.; Fierlinger, K.
We present a magnetically shielded environment with a damping factor larger than 1 × 10{sup 6} at the mHz frequency regime and an extremely low field and gradient over an extended volume. This extraordinary shielding performance represents an improvement of the state-of-the-art in the difficult regime of damping very low-frequency distortions by more than an order of magnitude. This technology enables a new generation of high-precision measurements in fundamental physics and metrology, including searches for new physics far beyond the reach of accelerator-based experiments. We discuss the technical realization of the shield with its improvements in design.
NASA Technical Reports Server (NTRS)
Henderson, Brenda; Bozak, Rick
2010-01-01
Many subsonic and supersonic vehicles in the current fleet have multiple engines mounted near one another. Some future vehicle concepts may use innovative propulsion systems such as distributed propulsion which will result in multiple jets mounted in close proximity. Engine configurations with multiple jets have the ability to exploit jet-by-jet shielding which may significantly reduce noise. Jet-by-jet shielding is the ability of one jet to shield noise that is emitted by another jet. The sensitivity of jet-by-jet shielding to jet spacing and simulated flight stream Mach number are not well understood. The current experiment investigates the impact of jet spacing, jet operating condition, and flight stream Mach number on the noise radiated from subsonic and supersonic twin jets.
Neutron streaming studies along JET shielding penetrations
NASA Astrophysics Data System (ADS)
Stamatelatos, Ion E.; Vasilopoulou, Theodora; Batistoni, Paola; Obryk, Barbara; Popovichev, Sergey; Naish, Jonathan
2017-09-01
Neutronic benchmark experiments are carried out at JET aiming to assess the neutronic codes and data used in ITER analysis. Among other activities, experiments are performed in order to validate neutron streaming simulations along long penetrations in the JET shielding configuration. In this work, neutron streaming calculations along the JET personnel entrance maze are presented. Simulations were performed using the MCNP code for Deuterium-Deuterium and Deuterium- Tritium plasma sources. The results of the simulations were compared against experimental data obtained using thermoluminescence detectors and activation foils.
Military Hydrology. Report 20. Reservoir Outflow (RESOUT) Model
1991-04-01
and/or be withdrawn from the river at some distance below the dam . In other cases, the outlet works discharges directly into a canal or pipe conveyance... dams are cited in Table 3 (USAGE 1965). 150. Darcy-Weisbach eguation, The head loss resulting from pipe fric- tion may also be determined using the Darcy... dam breach and computes the resulting outflow hydrograph. Example 8 Dam Breach Simulation ID Example 8 ID Dam Breach Simulation ID 10 1 0 KK Teton CG
An Exploratory Analysis of Waterfront Force Protection Measures Using Simulation
2002-03-01
LEFT BLANK 75 APPENDIX B. DESIGN POINT DATA Table 16. Design Point One Data breach - count leakers- count numberAv ailablePBs- mean numberInI...0.002469 0.006237 27.63104 7144.875 0.155223 76 Table 17. Design Point Two Data breach - count leakers- count numberAv ailablePBs- mean numberInI...0.001163 4.67E-12 29.80891 6393.874 0.188209 77 Table 18. Design Point Three Data breach - count leakers- count numberAv ailablePBs- mean
NASA Astrophysics Data System (ADS)
Pescarini, M.; Sinitsa, V.; Orsi, R.; Frisoni, M.
2013-03-01
This paper presents a synthesis of the ENEA-Bologna Nuclear Data Group programme dedicated to generate and validate group-wise cross section libraries for shielding and radiation damage deterministic calculations in nuclear fission reactors, following the data processing methodology recommended in the ANSI/ANS-6.1.2-1999 (R2009) American Standard. The VITJEFF311.BOLIB and VITENDF70.BOLIB finegroup coupled n-γ (199 n + 42 γ - VITAMIN-B6 structure) multi-purpose cross section libraries, based on the Bondarenko method for neutron resonance self-shielding and respectively on JEFF-3.1.1 and ENDF/B-VII.0 evaluated nuclear data, were produced in AMPX format using the NJOY-99.259 and the ENEA-Bologna 2007 Revision of the SCAMPI nuclear data processing systems. Two derived broad-group coupled n-γ (47 n + 20 γ - BUGLE-96 structure) working cross section libraries in FIDO-ANISN format for LWR shielding and pressure vessel dosimetry calculations, named BUGJEFF311.BOLIB and BUGENDF70.BOLIB, were generated by the revised version of SCAMPI, through problem-dependent cross section collapsing and self-shielding from the cited fine-group libraries. The validation results on the criticality safety benchmark experiments for the fine-group libraries and the preliminary validation results for the broad-group working libraries on the PCA-Replica and VENUS-3 engineering neutron shielding benchmark experiments are reported in synthesis.
NASA Astrophysics Data System (ADS)
Amarasinghe, Chamindu; LANL nEDM Collaboration
2017-09-01
The LANL neutron Electric Dipole Moment (nEDM) experiment is an effort to set a sensitivity limit of 3.2 × 10-27 e cm on the electric dipole moment of the neutron, an order of magnitude smaller than the current upper limit. This measurement uses Ramsey's method of oscillating magnetic fields. The magnetic field and field gradient have to be low enough to avoid the smearing of the Ramsey fringes and to increase the neutron dephasing time respectively. The experiment is enclosed in a two layer Mu-metal magnetically shielded room (MSR) to null any external magnetic fields from the environment. The MSR is degaussed to sufficiently reduce its residual magnetic field and field gradient. The MSR is designed for residual fields as low as 30 nT. The experiment further requires a field gradient of 1 nT/m or smaller. Here we report on the degaussing procedure and the resulting improvement in the shielding prowess of the MSR. Funded by an NSF Grant.
Hydraulics of embankment-dam breaching
NASA Astrophysics Data System (ADS)
Walder, J. S.; Iverson, R. M.; Logan, M.; Godt, J. W.; Solovitz, S.
2012-12-01
Constructed or natural earthen dams can pose hazards to downstream communities. Experiments to date on earthen-dam breaching have focused on dam geometries relevant to engineering practice. We have begun experiments with dam geometries more like those of natural dams. Water was impounded behind dams constructed at the downstream end of the USGS debris-flow flume. Dams were made of compacted, well-sorted, moist beach sand (D50=0.21 mm), 3.5 m from toe to toe, but varying in height from 0.5 to 1 m; the lower the dam, the smaller the reservoir volume and the broader the initially flat crest. Breaching was started by cutting a slot 30-40 mm wide and deep in the dam crest after filling the reservoir. Water level and pore pressure within the dam were monitored. Experiments were also recorded by an array of still- and video cameras above the flume and a submerged video camera pointed at the upstream dam face. Photogrammetric software was used to create DEMs from stereo pairs, and particle-image velocimetry was used to compute the surface-velocity field from the motion of tracers scattered on the water surface. As noted by others, breaching involves formation and migration of a knickpoint (or several). Once the knickpoint reaches the upstream dam face, it takes on an arcuate form whose continued migration we determined by measuring the onset of motion of colored markers on the dam face. The arcuate feature, which can be considered the head of the "breach channel", is nearly coincident with the transition from subcritical to supercritical flow; that is, it acts as a weir that hydraulically controls reservoir emptying. Photogenic slope failures farther downstream, although the morphologically dominant process at work, play no role at all in hydraulic control aside from rare instances in which they extend upstream so far as to perturb the weir, where the flow cross section is nearly self-similar through time. The domain downstream of the critical-flow section does influence the hydrograph in another way: the broader the initial dam crest, the longer the time before critical flow control is established. Flood duration is thus increased but peak discharge is decreased. Visual inspection and overhead videography reveal little turbidity in water pouring over the weir, implying that sediment there moves dominantly as bedload. Furthermore, underwater videography gives the overall impression that along the upstream dam face, erosion occurs without redeposition. Thus it would be a mistake to use empiricisms for equilibrium bedload transport to model erosion of the embankment. In mathematical terms, erosion rate cannot be backed out by calculating the divergence of transport rate; rather, transport rate should be regarded as the spatial integral of erosion rate. We use photogrammetry and motion of the colored markers to determine the erosion rate of the weir, and then infer shear stress at the weir by applying the van Rijn sediment-pickup function. Shear stress determined in this fashion is much less than what one calculates from the gradient of the energy head (an approach appropriate to steady flow). Shear stress inferred from the pickup-function calculation can serve as a constraint on computational fluid-dynamics models. Another constraint on such models, revealed by the underwater videography, is the upstream limit of sand movement, where bed shear stress equals the critical value for sand entrainment.
NASA Astrophysics Data System (ADS)
Malyshkov, S. Y.; Gordeev, V. F.; Polyvach, V. I.; Shtalin, S. G.; Pustovalov, K. N.
2017-04-01
Article describes the results of the atmosphere and Earth’s crust climatic and ecological parameters integrated monitoring. The estimation is made for lithospheric component share in the Earth natural pulsed electromagnetic field structure. To estimate lithospheric component we performed a round-the-clock monitoring of the Earth natural pulsed electromagnetic field background variations at the experiment location and measured the Earth natural pulsed electromagnetic field under electric shields. Natural materials in a natural environment were used for shielding, specifically lakes with varying parameters of water conductivity. Skin effect was used in the experiment - it is the tendency of electromagnetic waves amplitude to decrease with greater depths in the conductor. Atmospheric and lithospheric component the Earth natural pulsed electromagnetic field data recorded on terrain was compared against the recorded data with atmosphere component decayed by an electric shield. In summary we have demonstrated in the experiment that thunderstorm discharge originating electromagnetic field decay corresponds to the decay calculated using Maxwell equations. In the absence of close lightning strikes the ratio of field intensity recorded on terrain to shielded field intensity is inconsistent with the ratio calculated for atmospheric sources, that confirms there is a lithospheric component present to the Earth natural pulsed electromagnetic field.
A physician's role following a breach of electronic health information.
Kim, Daniel; Schleiter, Kristin; Crigger, Bette-Jane; McMahon, John W; Benjamin, Regina M; Douglas, Sharon P
2010-01-01
The Council on Ethical and Judicial Affairs of the American Medical Association examines physicians' professional ethical responsibility in the event that the security of patients' electronic records is breached.
SHIELD-HIT12A - a Monte Carlo particle transport program for ion therapy research
NASA Astrophysics Data System (ADS)
Bassler, N.; Hansen, D. C.; Lühr, A.; Thomsen, B.; Petersen, J. B.; Sobolevsky, N.
2014-03-01
Purpose: The Monte Carlo (MC) code SHIELD-HIT simulates the transport of ions through matter. Since SHIELD-HIT08 we added numerous features that improves speed, usability and underlying physics and thereby the user experience. The "-A" fork of SHIELD-HIT also aims to attach SHIELD-HIT to a heavy ion dose optimization algorithm to provide MC-optimized treatment plans that include radiobiology. Methods: SHIELD-HIT12A is written in FORTRAN and carefully retains platform independence. A powerful scoring engine is implemented scoring relevant quantities such as dose and track-average LET. It supports native formats compatible with the heavy ion treatment planning system TRiP. Stopping power files follow ICRU standard and are generated using the libdEdx library, which allows the user to choose from a multitude of stopping power tables. Results: SHIELD-HIT12A runs on Linux and Windows platforms. We experienced that new users quickly learn to use SHIELD-HIT12A and setup new geometries. Contrary to previous versions of SHIELD-HIT, the 12A distribution comes along with easy-to-use example files and an English manual. A new implementation of Vavilov straggling resulted in a massive reduction of computation time. Scheduled for later release are CT import and photon-electron transport. Conclusions: SHIELD-HIT12A is an interesting alternative ion transport engine. Apart from being a flexible particle therapy research tool, it can also serve as a back end for a MC ion treatment planning system. More information about SHIELD-HIT12A and a demo version can be found on http://www.shieldhit.org.
NASA Astrophysics Data System (ADS)
Sathiya, P.; Kumar Mishra, Mahendra; Soundararajan, R.; Shanmugarajan, B.
2013-02-01
A series of hybrid welding (gas metal arc welding-CO2 laser beam welding) experiments were conducted on AISI 904L super austenitic stainless steel sheet of 5 mm thickness. A detailed study of CO2 Laser-GMAW hybrid welding experiments with different shielding gas mixtures (100% He, 50% He+50% Ar, 50%He+45% Ar+5% O2, and 45% He+45% Ar+10% N2) were carried out and the results are presented. The resultant welds were subjected to detailed mechanical and microstructural characterization. Hardness testing revealed that the hardness values in the fusion zone were higher than the base material irrespective of the parameters. Transverse tensile testing showed that the joint efficiency is 100% with all the shielding gas experimented. Impact energy values of the welds were also found to be higher than the base material and the fractrograph taken in scanning electron microscope (SEM) has shown that the welds exhibited dimple fracture similar to the base material.
CdZnTe Background Measurements at Balloon Altitudes with PoRTIA
NASA Technical Reports Server (NTRS)
Parsons, A.; Barthelmy, S.; Bartlett, L.; Gehrels, N.; Naya, J.; Stahle, C. M.; Tueller, J.; Teegarden, B.
2003-01-01
Measurements of the CdZnTe internal background at balloon altitudes are essential to determine which physical processes make the most important background contributions. We present results from CdZnTe background measurements made by PoRTIA, a small CdZnTe balloon instrument that was flown three times in three different shielding configurations. PoRTIA was passively shielded during its first flight from Palestine, Texas and actively shielded as a piggyback instrument on the GRIS balloon experiment during its second and third flights from Alice Springs, Australia, using the thick GRIS Nal anticoincidence shield. A significant CdZnTe background reduction was achieved during the third flight with PoRTIA placed completely inside the GRIS shield and blocking crystal, and thus completely surrounded by 15 cm of Nal. A unique balloon altitude background data set is provided by CdZnTe and Ge detectors simultaneously surrounded by the same thick anticoincidence shield; the presence of a single coxial Ge detector inside the shield next to PoRTIA allowed a measurement of the ambient neutron flux inside the shield throughout the flight. These neutrons interact with the detector material to produce isomeric states of the Cd, Zn and Te nuclei that radiatively decay; calculations are presented that indicate that these decays may explain most of the fully shielded CdZnTe background.
Cohen, Victor; Jellinek, Samantha P; Blecker, Michael; Cocchio, Craig; Likourezos, Antonios; Shah, Bupendra
2010-11-01
The frequency of and reasons for pharmacy residents breaching the National Matching Services (NMS) applicant agreement were evaluated. An electronic survey was sent via e-mail to residency program directors of ASHP-accredited postgraduate year 1 pharmacy residencies in the United States. The survey instrument was developed based on an initial pilot survey used to test the clarity and reliability of the questions. The primary objective of the survey was to determine the frequency with which pharmacy residents breach the NMS applicant agreement and fail to report to their assigned site. Characteristics of ASHP- accredited residency programs with residents who breached the NMS agreement and any punitive action taken on these individuals were also analyzed. Of the 636 surveys sent to residency program directors, 302 complete surveys were returned, yielding a response rate of 47.5%. Twenty-six respondents (8.6%) indicated that within the past five years, they had matched candidates who failed to report to their assigned site. Of these respondents, 13 (50%) reported the candidate to ASHP; 11 (44%) took no action. Respondents indicated that they would be comfortable reporting all candidates who breach the NMS agreement to ASHP and placing the candidates' information on a list accessible electronically only to residency program directors. Less than 10% of residency program directors reported having residency candidates who breached the NMS applicant agreement. The majority of these respondents indicated that these residents were not their first choices. The most common reason for candidate withdrawal was family obligation.
LPT. Shield test facility test building interior (TAN646). Camera points ...
LPT. Shield test facility test building interior (TAN-646). Camera points down into interior of north pool. Equipment on wall is electronical bus used for post-1970 experiment. Personnel ladder at right. INEEL negative no. HD-40-9-1 - Idaho National Engineering Laboratory, Test Area North, Scoville, Butte County, ID
MTR, SOUTH FACE OF REACTOR. SPECIAL SUPPLEMENTAL SHIELDING WAS REQUIRED ...
MTR, SOUTH FACE OF REACTOR. SPECIAL SUPPLEMENTAL SHIELDING WAS REQUIRED OUTSIDE OF MTR FOR EXPERIMENTS. THE AIRCRAFT NUCLEAR PROPULSION PROJECT DOMINATED THE USE OF THIS PART OF THE MTR. INL NEGATIVE NO. 7225. Unknown Photographer, 11/28/1952 - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
Preliminary Evaluation of Convective Heat Transfer in a Water Shield for a Surface Power Reactor
NASA Technical Reports Server (NTRS)
Pearson J. Boise; Reid, Robert S.
2007-01-01
As part of the Vision for Space Exploration, the end of the next decade will bring man back to the surface of the moon. A crucial issue for the establishment of human presence on the moon will be the availability of compact power sources. This presence could require greater than 10's of kWt's in follow on years. Nuclear reactors are well suited to meet the needs for power generation on the lunar or Martian surface. Radiation shielding is a key component of any surface power reactor system. Several competing concepts exist for lightweight, safe, robust shielding systems such as a water shield, lithium hydride (LiH), and boron carbide. Water offers several potential advantages, including reduced cost, reduced technical risk, and reduced mass. Water has not typically been considered for space reactor applications because of the need for gravity to fix the location of any vapor that could form radiation streaming paths. The water shield concept relies on the predictions of passive circulation of the shield water by natural convection to adequately cool the shield. This prediction needs to be experimentally evaluated, especially for shields with complex geometries. NASA Marshall Space Flight Center has developed the experience and facilities necessary to do this evaluation in its Early Flight Fission - Test Facility (EFF-TF).
NASA Technical Reports Server (NTRS)
Badhwar, G. D.; Huff, H.; Wilkins, R.; Thibeault, Sheila
2002-01-01
Space radiation transport models clearly show that low atomic weight materials provide a better shielding protection for interplanetary human missions than high atomic weight materials. These model studies have concentrated on shielding properties against charged particles. A light-weight, inflatable habitat module called TransHab was built and shown to provide adequate protection against micrometeoroid impacts and good shielding properties against charged particle radiation in the International Space Station orbits. An experiment using a tissue equivalent proportional counter, to study the changes in dose and lineal energy spectra with graphite, aluminum, and a TransHab build-up as shielding, was carried out at the Los Alamos Nuclear Science Center neutron facility. It is a continuation of a previous study using regolith and doped polyethylene materials. This paper describes the results and their comparison with the previous study. Published by Elsevier Science Ltd.
Spin-orbit effects on the (119)Sn magnetic-shielding tensor in solids: a ZORA/DFT investigation.
Alkan, Fahri; Holmes, Sean T; Iuliucci, Robbie J; Mueller, Karl T; Dybowski, Cecil
2016-07-28
Periodic-boundary and cluster calculations of the magnetic-shielding tensors of (119)Sn sites in various co-ordination and stereochemical environments are reported. The results indicate a significant difference between the predicted NMR chemical shifts for tin(ii) sites that exhibit stereochemically-active lone pairs and tin(iv) sites that do not have stereochemically-active lone pairs. The predicted magnetic shieldings determined either with the cluster model treated with the ZORA/Scalar Hamiltonian or with the GIPAW formalism are dependent on the oxidation state and the co-ordination geometry of the tin atom. The inclusion of relativistic effects at the spin-orbit level removes systematic differences in computed magnetic-shielding parameters between tin sites of differing stereochemistries, and brings computed NMR shielding parameters into significant agreement with experimentally-determined chemical-shift principal values. Slight improvement in agreement with experiment is noted in calculations using hybrid exchange-correlation functionals.
Orion Heat Shield Manufacturing Producibility Improvements for the EM-1 Flight Test Program
NASA Technical Reports Server (NTRS)
Koenig, William J.; Stewart, Michael; Harris, Richard F.
2018-01-01
This paper describes how the ORION program is incorporating improvements in the heat shield design and manufacturing processes reducing programmatic risk and ensuring crew safety in support of NASA's Exploration missions. The approach for the EFT-1 heat shield utilized a low risk Apollo heritage design and manufacturing process using an Avcoat TPS ablator with a honeycomb substrate to provide a one piece heat shield to meet the mission re-entry heating environments. The EM-1 mission will have additional flight systems installed to fly to the moon and return to Earth. Heat shield design and producibility improvements have been incorporated in the EM-1 vehicle to meet deep space mission requirements. The design continues to use the Avcoat material, but in a block configuration to enable improvements in consistant and repeatable application processes using tile bonding experience developed on the Space Shuttle Transportation System Program.
Nuclear shielding constants by density functional theory with gauge including atomic orbitals
NASA Astrophysics Data System (ADS)
Helgaker, Trygve; Wilson, Philip J.; Amos, Roger D.; Handy, Nicholas C.
2000-08-01
Recently, we introduced a new density-functional theory (DFT) approach for the calculation of NMR shielding constants. First, a hybrid DFT calculation (using 5% exact exchange) is performed on the molecule to determine Kohn-Sham orbitals and their energies; second, the constants are determined as in nonhybrid DFT theory, that is, the paramagnetic contribution to the constants is calculated from a noniterative, uncoupled sum-over-states expression. The initial results suggested that this semiempirical DFT approach gives shielding constants in good agreement with the best ab initio and experimental data; in this paper, we further validate this procedure, using London orbitals in the theory, having implemented DFT into the ab initio code DALTON. Calculations on a number of small and medium-sized molecules confirm that our approach produces shieldings in excellent agreement with experiment and the best ab initio results available, demonstrating its potential for the study of shielding constants of large systems.
Brazing of refractory, superalloy, and composite materials for Space Shuttle applications.
NASA Technical Reports Server (NTRS)
Beuyukian, C. S.
1972-01-01
Research work concerning the metallic portion of the shuttle-orbiter heat shield (expected to experience temperatures up to 2500 F) is described. The five metals being evaluated are TD-Ni-Cr, Cb-C129Y, Cb752, Hayes 188, and Inconel 625. Brazing techniques whereby pairs of these materials are joined into thin-membered assemblies for heat shield applications are described. Results obtained with the vacuum-furnace brazing process are examined. In addition, the use of brazed aluminum-boron metal-matrix-contoured composite structures for heat shield applications is evaluated.
Decrease the Number of Glovebox Glove Breaches and Failures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hurtle, Jackie C.
2013-12-24
Los Alamos National Laboratory (LANL) is committed to the protection of the workers, public, and environment while performing work and uses gloveboxes as engineered controls to protect workers from exposure to hazardous materials while performing plutonium operations. Glovebox gloves are a weak link in the engineered controls and are a major cause of radiation contamination events which can result in potential worker exposure and localized contamination making operational areas off-limits and putting programmatic work on hold. Each day of lost opportunity at Technical Area (TA) 55, Plutonium Facility (PF) 4 is estimated at $1.36 million. Between July 2011 and Junemore » 2013, TA-55-PF-4 had 65 glovebox glove breaches and failures with an average of 2.7 per month. The glovebox work follows the five step safety process promoted at LANL with a decision diamond interjected for whether or not a glove breach or failure event occurred in the course of performing glovebox work. In the event that no glove breach or failure is detected, there is an additional decision for whether or not contamination is detected. In the event that contamination is detected, the possibility for a glove breach or failure event is revisited.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-19
..., misappropriation of trade secrets, breach of contract, and tortious interference with contract. The complaint... by reason of misappropriation of trade secrets, breach of contract, or tortious interference with...
Optimising the Active Muon Shield for the SHiP Experiment at CERN
NASA Astrophysics Data System (ADS)
Baranov, A.; Burnaev, E.; Derkach, D.; Filatov, A.; Klyuchnikov, N.; Lantwin, O.; Ratnikov, F.; Ustyuzhanin, A.; Zaitsev, A.
2017-12-01
The SHiP experiment is designed to search for very weakly interacting particles beyond the Standard Model which are produced in a 400 GeV/c proton beam dump at the CERN SPS. The critical challenge for this experiment is to keep the Standard Model background level negligible. In the beam dump, around 1011 muons will be produced per second. The muon rate in the spectrometer has to be reduced by at least four orders of magnitude to avoid muoninduced backgrounds. It is demonstrated that new improved active muon shield may be used to magnetically deflect the muons out of the acceptance of the spectrometer.
2013-11-07
CAPE CANAVERAL, Fla. -- Dr. Carlos Calle, senior research scientist on the Electrodynamic Dust Shield for Dust Mitigation project, demonstrates equipment used in his experiments in the Electrostatics and Surface Physics Laboratory in the SwampWorks at NASA's Kennedy Space Center in Florida. Electrodynamic dust shield, or EDS, technology is based on concepts originally developed by NASA as early as 1967 and later by the University of Tokyo. In 2003, NASA, in collaboration with the University of Arkansas at Little Rock, started development of the EDS for dust particle removal from solar panels to be used on future missions to the moon, an asteroid or Mars. A flight experiment to expose the dust shields to the space environment currently is under development. For more information, visit: http://www.nasa.gov/content/scientists-developing-ways-to-mitigate-dust-problem-for-explorers/ Photo credit: NASA/Dan Casper
Electrodynamic Dust Shield for Space Applications
NASA Technical Reports Server (NTRS)
Mackey, Paul J.; Johansen, Michael R.; Olsen, Robert C.; Raines, Matthew G.; Phillips, James R., III; Cox, Rachel E.; Hogue, Michael D.; Pollard, Jacob R. S.; Calle, Carlos I.
2016-01-01
Dust mitigation technology has been highlighted by NASA and the International Space Exploration Coordination Group (ISECG) as a Global Exploration Roadmap (GER) critical technology need in order to reduce life cycle cost and risk, and increase the probability of mission success. The Electrostatics and Surface Physics Lab in Swamp Works at the Kennedy Space Center has developed an Electrodynamic Dust Shield (EDS) to remove dust from multiple surfaces, including glass shields and thermal radiators. Further development is underway to improve the operation and reliability of the EDS as well as to perform material and component testing outside of the International Space Station (ISS) on the Materials on International Space Station Experiment (MISSE). This experiment is designed to verify that the EDS can withstand the harsh environment of space and will look to closely replicate the solar environment experienced on the Moon.
Method and apparatus for diagnosing breached fuel elements
Gross, K.C.; Lambert, J.D.B.; Nomura, S.
1987-03-02
The invention provides an apparatus and method for diagnosing breached fuel elements in a nuclear reactor. A detection system measures the activity of isotopes from the cover gas in the reactor. A data acquisition and processing system monitors the detection system and corrects for the effects of the cover-gas clean up system on the measured activity and further calculates the derivative curve of the corrected activity as a function of time. A plotting system graphs the derivative curve, which represents the instantaneous release rate of fission gas from a breached fuel element. 8 figs.
FRESH THINKING. Another appropriate and proportionate approach to complaint resolution.
2017-01-01
A registered nurse accesses the Netcare clinical record of a friend who isn't in their care. The member has no authority to do so and this is a breach of the patient's privacy Under the Health Professions Act, the RN's manager is required to submit a complaint to CARNA when a member has been suspended or terminated for what the employer believes is unprofessional conduct. Breach of privacy falls within that definition. What is the appropriate course of action for CARNA to address this breach of professional conduct?
Cantisano, Gabriela Topa; Domínguez, J Francisco Morales; García, J Luis Caeiro
2007-05-01
This study focuses on the mediator role of social comparison in the relationship between perceived breach of psychological contract and burnout. A previous model showing the hypothesized effects of perceived breach on burnout, both direct and mediated, is proposed. The final model reached an optimal fit to the data and was confirmed through multigroup analysis using a sample of Spanish teachers (N = 401) belonging to preprimary, primary, and secondary schools. Multigroup analyses showed that the model fit all groups adequately.
Jamil, Amber; Raja, Usman; Darr, Wendy
2013-01-01
This research examined the relationships between perceived psychological contract breach, felt violation, and burnout in a sample (n = 361) of employees from various organizations in Pakistan. The moderating role of contract types in these relationships was also tested. Findings supported a positive association between perceived psychological contract breach and felt violation and both were positively related to burnout. Transactional and relational contracts moderated the felt violation-burnout relationship. Scores on relational contract type tended to be higher than for transactional contract type showing some contextual influence.
2008-03-01
for over 18 months (Vijayan, 2007). Other retailers have felt the sting of indirect data breaches as well. In October of 2007, a backup computer tape...Information Services suffered a data breach in the form of a “rouge and dishonest employee” stealing records (The Associated Press, 2007). Most of the...infects the target computer (Keizer, 2008). 2 With the frequency of attacks and data breaches , the actual financial cost is incredibly high
The A to Z of healthcare data breaches.
Kobus, Theodore J
2012-01-01
There currently exists a myriad of privacy laws that impact a healthcare entity, including more than 47 notification laws that require notification when a data breach occurs, as well as the breach notification requirements of the Health Information Technology for Economic and Clinical Health Act. Given the plethora of issues a healthcare entity faces, there are certain principles that can be built into an organization's philosophy that will comply with the law and help protect it from reputational harm. © 2012 American Society for Healthcare Risk Management of the American Hospital Association.
NASA Astrophysics Data System (ADS)
Young, C. S.; Dawers, N. H.
2017-12-01
Fault growth is often accomplished by linking a series of en echelon faults through relay ramps. A relay ramp is the area between two overlapping fault segments that tilts and deforms as the faults accrue displacement. The structural evolution of breached normal fault relay ramps remains poorly understood because of the difficulty in defining how slip is partitioned between the most basinward fault (known as the outboard fault), the overlapping fault (inboard fault), and any ramp-breaching linking faults. Along the Warner Valley fault in south-central Oregon, two relay ramps displaying different fault linkage geometries are lined with a series of paleo-lacustrine shorelines that record a Pleistocene paleolake regression. The inner edges of these shorelines act as paleo-horizontal datums that have been deformed by fault activity, and are used to measure relative slip variations across the relay ramp bounding faults. By measuring the elevation changes using a 10m digital elevation model (DEM) of shoreline inner edges, we estimate the amount of slip partitioned between the inboard, outboard and ramp-breaching linking faults. In order to attribute shoreline deformation to fault activity we identify shoreline elevation anomalies, where deformation exceeds a ± 3.34 m window, which encompass our conservative estimates of natural variability in the shoreline geomorphology and the error associated with the data collection. Fault activity along the main length of the fault for each ramp-breaching style is concentrated near the intersection of the linking fault and the outboard portion of the main fault segment. However, fault activity along the outboard fault tip varies according to breaching style. At a footwall breach the entire outboard fault tip appears relatively inactive. At a mid-ramp breach the outboard fault tip remains relatively active because of the proximity of the linking fault to this fault tip.
CSIRT Requirements for Situational Awareness
2014-01-25
deepsight-products http://www.symantec.com/security_response/publications/threatreport.jsp Verizon Verizon produces an annual data breach report...impact studies to the differences between malicious versus non-malicious data breaches . Ponemon also offers con- sulting services. Ponemon also
Major, Jon J.; Spicer, Kurt R.; Collins, Rebecca A.
2010-01-01
In 2007, Marmot Dam on the Sandy River, Oregon, was removed and a temporary cofferdam standing in its place was breached, allowing the river to flow freely along its entire length. Time-lapse imagery obtained from a network of digital single-lens reflex cameras placed around the lower reach of the sediment-filled reservoir behind the dam details rapid erosion of sediment by the Sandy River after breaching of the cofferdam. Within hours of the breaching, the Sandy River eroded much of the nearly 15-m-thick frontal part of the sediment wedge impounded behind the former concrete dam; within 24-60 hours it eroded approximately 125,000 m3 of sediment impounded in the lower 300-meter-reach of the reservoir. The imagery shows that the sediment eroded initially through vertical incision, but that lateral erosion rapidly became an important process.
NASA Astrophysics Data System (ADS)
Ploc, Ondřej; Sihver, Lembit; Kartashov, Dmitry; Shurshakov, Vyacheslav; Tolochek, Raisa
2013-12-01
"Protective curtain" was the physical experiment onboard the International Space Station (ISS) aimed on radiation measurement of the dose - reducing effect of the additional shielding made of hygienic water-soaked wipes and towels placed on the wall in the crew cabin of the Service module Zvezda. The measurements were performed with 12 detector packages composed of thermoluminescent detectors (TLDs) and plastic nuclear track detectors (PNTDs) placed at the Protective curtain, so that they created pairs of shielded and unshielded detectors.
NASA Astrophysics Data System (ADS)
Cramer, S. N.; Roussin, R. W.
1981-11-01
A Monte Carlo analysis of a time-dependent neutron and secondary gamma-ray integral experiment on a thick concrete and steel shield is presented. The energy range covered in the analysis is 15-2 MeV for neutron source energies. The multigroup MORSE code was used with the VITAMIN C 171-36 neutron-gamma-ray cross-section data set. Both neutron and gamma-ray count rates and unfolded energy spectra are presented and compared, with good general agreement, with experimental results.
The final results of the Mi-Beta Cryogenic Experiment towards the CUORICINO Experiment
NASA Astrophysics Data System (ADS)
Pirro, S.; Arnaboldi, C.; Brofferio, C.; Bucci, C.; Capelli, S.; Cremonesi, O.; Fiorini, E.; Giuliani, A.; McDonald, R. J.; Nucciotti, A.; Pavan, M.; Pedretti, M.; Pessina, G.; Pobes, C.; Previtali, E.; Sisti, M.; Vanzini, M.; Zanotti, L.
2002-02-01
We present the final results on neutrinoless Double Beta Decay (DBD) of 130Te obtained with an array of 20 cryogenic detectors. The Mi-Beta Experiment is operating since 3 years and was upgraded in March 2001. The background in the DBD energy region was reduced thanks to a new Roman lead shield framed inside the dilution unit and a neutron shield mounted outside the cryostat. We also improved the energy threshold using a cold electronic stage inside the cryostat. The new set-up represents also a good test for the CUORICINO Experiment. CUORICINO will start by the beginning of 2002 and will consist of 56 Tellurium Oxide Crystal with an overall bolometric mass of 42 kg. .
Dickson, E D; Hamby, D M
2014-03-01
The human health and environmental effects following a postulated accidental release of radioactive material to the environment have been a public and regulatory concern since the early development of nuclear technology. These postulated releases have been researched extensively to better understand the potential risks for accident mitigation and emergency planning purposes. The objective of this investigation is to provide an updated technical basis for contemporary building shielding factors for the US housing stock. Building shielding factors quantify the protection from ionising radiation provided by a certain building type. Much of the current data used to determine the quality of shielding around nuclear facilities and urban environments is based on simplistic point-kernel calculations for 1950s era suburbia and is no longer applicable to the densely populated urban environments realised today. To analyse a building's radiation shielding properties, the ideal approach would be to subject a variety of building types to various radioactive sources and measure the radiation levels in and around the building. While this is not entirely practicable, this research analyses the shielding effectiveness of ten structurally significant US housing-stock models (walls and roofs) important for shielding against ionising radiation. The experimental data are used to benchmark computational models to calculate the shielding effectiveness of various building configurations under investigation from two types of realistic environmental source terms. Various combinations of these ten shielding models can be used to develop full-scale computational housing-unit models for building shielding factor calculations representing 69.6 million housing units (61.3%) in the United States. Results produced in this investigation provide a comparison between theory and experiment behind building shielding factor methodology.
Plasma Shield for In-Air and Under-Water Beam Processes
NASA Astrophysics Data System (ADS)
Hershcovitch, Ady
2007-11-01
As the name suggests, the Plasma Shield is designed to chemically and thermally shield a target object by engulfing an area subjected to beam treatment with inert plasma. The shield consists of a vortex-stabilized arc that is employed to shield beams and workpiece area of interaction from atmospheric or liquid environment. A vortex-stabilized arc is established between a beam generating device (laser, ion or electron gun) and the target object. The arc, which is composed of a pure noble gas (chemically inert), engulfs the interaction region and shields it from any surrounding liquids like water or reactive gases. The vortex is composed of a sacrificial gas or liquid that swirls around and stabilizes the arc. In current art, many industrial processes like ion material modification by ion implantation, dry etching, and micro-fabrication, as well as, electron beam processing, like electron beam machining and electron beam melting is performed exclusively in vacuum, since electron guns, ion guns, their extractors and accelerators must be kept at a reasonably high vacuum, and since chemical interactions with atmospheric gases adversely affect numerous processes. Various processes involving electron ion and laser beams can, with the Plasma Shield be performed in practically any environment. For example, electron beam and laser welding can be performed under water, as well as, in situ repair of ship and nuclear reactor components. The plasma shield results in both thermal (since the plasma is hotter than the environment) and chemical shielding. The latter feature brings about in-vacuum process purity out of vacuum, and the thermal shielding aspect results in higher production rates. Recently plasma shielded electron beam welding experiments were performed resulting in the expected high quality in-air electron beam welding. Principle of operation and experimental results are to be discussed.
Lee, Han-Seung; Choe, Hong-Bok; Baek, In-Young
2017-01-01
An electromagnetic pulse (EMP) explodes in real-time and causes critical damage within a short period to not only electric devices, but also to national infrastructures. In terms of EMP shielding rooms, metal plate has been used due to its excellent shielding effectiveness (SE). However, it has difficulties in manufacturing, as the fabrication of welded parts of metal plates and the cost of construction are non-economical. The objective of this study is to examine the applicability of the arc thermal metal spraying (ATMS) method as a new EMP shielding method to replace metal plate. The experimental parameters, metal types (Cu, Zn-Al), and coating thickness (100–700 μm) used for the ATMS method were considered. As an experiment, a SE test against an EMP in the range of 103 to 1010 Hz was conducted. Results showed that the ATMS coating with Zn-Al had similar shielding performance in comparison with metal plate. In conclusion, the ATMS method is judged to have a high possibility of actual application as a new EMP shielding material. PMID:28976931
Lee, Han-Seung; Choe, Hong-Bok; Baek, In-Young; Singh, Jitendra Kumar; Ismail, Mohamed A
2017-10-04
An electromagnetic pulse (EMP) explodes in real-time and causes critical damage within a short period to not only electric devices, but also to national infrastructures. In terms of EMP shielding rooms, metal plate has been used due to its excellent shielding effectiveness (SE). However, it has difficulties in manufacturing, as the fabrication of welded parts of metal plates and the cost of construction are non-economical. The objective of this study is to examine the applicability of the arc thermal metal spraying (ATMS) method as a new EMP shielding method to replace metal plate. The experimental parameters, metal types (Cu, Zn-Al), and coating thickness (100-700 μm) used for the ATMS method were considered. As an experiment, a SE test against an EMP in the range of 103 to 1010 Hz was conducted. Results showed that the ATMS coating with Zn-Al had similar shielding performance in comparison with metal plate. In conclusion, the ATMS method is judged to have a high possibility of actual application as a new EMP shielding material.
Lin, Jiarui; Gao, Kai; Gao, Yang; Wang, Zheng
2017-10-01
In order to detect the position of the cutting shield at the head of a double shield tunnel boring machine (TBM) during the excavation, this paper develops a combined measurement system which is mainly composed of several optical feature points, a monocular vision sensor, a laser target sensor, and a total station. The different elements of the combined system are mounted on the TBM in suitable sequence, and the position of the cutting shield in the reference total station frame is determined by coordinate transformations. Subsequently, the structure of the feature points and matching technique for them are expounded, the position measurement method based on monocular vision is presented, and the calibration methods for the unknown relationships among different parts of the system are proposed. Finally, a set of experimental platforms to simulate the double shield TBM is established, and accuracy verification experiments are conducted. Experimental results show that the mean deviation of the system is 6.8 mm, which satisfies the requirements of double shield TBM guidance.
Dixon, Daniel; Darden, Bruce; Casamitjana, Jose; Weissmann, Karen A; Cristobal, San; Powell, David; Baluch, Daniel
2017-04-01
A fresh frozen cadaver study was conducted. To report the cortical breach rate using the dynamic surgical guidance (DSG) probe versus traditional freehand technique for cervical lateral mass, cervical pedicle and cervical laminar screws. Nine male fresh frozen cadaveric torsos were utilized for this study. Each investigator was assigned three specimens that were randomized by fixation point, side and order of technique for establishing a screw pilot hole. The technique for screw hole preparation utilized was either a DSG probe in the "on" mode or in the "off" mode using a freehand technique popularized by Lenke et al. Levels instrumented included C1 lateral mass, C2 pedicle screws and lamina screws, and C6-T1 pedicle screws. Fluoroscopy and other navigational assistance were not used for screw hole preparation or screw insertion. All specimens were CT imaged following insertion of all screws. A senior radiologist evaluated all scans and determined that a misplaced screw was a breach of ≥2 mm. A total of 104 drillings were performed, 52 with DSG and 52 without DSG There were 68 total pedicle drillings, 34 in each group. There were 18 drillings in the lamina and lateral mass. There was no significant difference between surgeons or between the left and right side. All breaches were in the pedicle, and none in the lamina or lateral mass. The breach rate for PG "on" was 6/68 = 8.96% (95% CI 3.69, 19.12%). The breach rate for PG "off" was 20/68 = 29.41% (95% CI 19.30, 41.87%). Of the 20 pedicle breaches in the non-DSG group, 7 were lateral and superior, 8 were lateral, 4 medial and 1 inferior. Of the six pedicle breaches in the DSG group, two were lateral/superior, two were lateral and two were medial in the pedicle. The dynamic surgical guidance probe is a safe tool to assist the surgeon with screw placement in the cervical spine. Additionally, the DSG potentially avoids the cumulative risks associated with fluoroscopy and provides real-time feedback to the surgeon allowing correction at the time of breach. Level of evidence Level IV.
Rendon, Samuel H.; Ashworth, Chad E.; Smith, S. Jerrod
2012-01-01
Dams provide beneficial functions such as flood control, recreation, and reliable water supplies, but they also entail risk: dam breaches and resultant floods can cause substantial property damage and loss of life. The State of Oklahoma requires each owner of a high-hazard dam, which the Federal Emergency Management Agency defines as dams for which failure or misoperation probably will cause loss of human life, to develop an emergency action plan specific to that dam. Components of an emergency action plan are to simulate a flood resulting from a possible dam breach and map the resulting downstream flood-inundation areas. The resulting flood-inundation maps can provide valuable information to city officials, emergency managers, and local residents for planning the emergency response if a dam breach occurs. Accurate topographic data are vital for developing flood-inundation maps. This report presents results of a cooperative study by the city of Lawton, Oklahoma, and the U.S. Geological Survey (USGS) to model dam-breach scenarios at Lakes Ellsworth and Lawtonka near Lawton and to map the potential flood-inundation areas of such dam breaches. To assist the city of Lawton with completion of the emergency action plans for Lakes Ellsworth and Lawtonka Dams, the USGS collected light detection and ranging (lidar) data that were used to develop a high-resolution digital elevation model and a 1-foot contour elevation map for the flood plains downstream from Lakes Ellsworth and Lawtonka. This digital elevation model and field measurements, streamflow-gaging station data (USGS streamflow-gaging station 07311000, East Cache Creek near Walters, Okla.), and hydraulic values were used as inputs for the dynamic (unsteady-flow) model, Hydrologic Engineering Center's River Analysis System (HEC-RAS). The modeled flood elevations were exported to a geographic information system to produce flood-inundation maps. Water-surface profiles were developed for a 75-percent probable maximum flood scenario and a sunny-day dam-breach scenario, as well as for maximum flood-inundation elevations and flood-wave arrival times for selected bridge crossings. Some areas of concern near the city of Lawton, if a dam breach occurs at Lakes Ellsworth or Lawtonka, include water treatment plants, wastewater treatment plants, recreational areas, and community-services offices.
Radiation measurements aboard the fourth Gemini flight.
Janni, J F; Schneider, M F
1967-01-01
Two special tissue-equivalent ionization chambers and 5 highly sensitive passive dosimetry packages were flown aboard the recent Gemini 4 flight for the purpose of obtaining precise values of instantaneous dose rate, accumulated dose. and shielding effectiveness. This experiment marked the first time that well-defined tissue dose and radiation survey measurements have been carried out in manned spaceflight operations. Since all measurements were accomplished under normal spacecraft environmental conditions, the biological dose resulted primarily from trapped inner Van Allen Belt radiation encountered by the spacecraft in the South Atlantic Anomaly. The experiment determined the particle type, ionizing and penetrating power, and variation with time and position within the Gemini spacecraft. Measured dose rates ranged from 100 mrad/hr for passes penetrating deeply into the South Atlantic Anomaly to less than 0.1 mrad/hr from lower latitude cosmic radiation. The accumulated tissue dose measured by the active ionization chambers, shielded by 0.4 gm/cm2 for the 4-day mission, was 82 mrad. Since the 5 passive dosimetry packages were each located in different positions within the spacecraft, the total mission surface dose measured by these detectors varied from 73 to 27 mrad, depending upon location and shielding. The particles within the spacecraft were recorded in nuclear emulsion, which established that over 90% of the tissue dose was attributable to penetrating protons. This experiment indicates that the radiation environment under shielded conditions at Gemini altitudes was not hazardous.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swadling, G. F.; Ross, J. S.; Manha, D.
The design principles of a xenon gas shield device that is intended to protect optical components from x-ray induced opacity (“x-ray blanking”) have been experimentally demonstrated at the OMEGA-60 Laser Facility at the Laboratory for Laser Energetics, University of Rochester. A volume of xenon gas placed in front of an optical component absorbs the incoming soft x-ray radiation but transmits optical and ultra-violet radiation. The time-resolved optical (532 nm) transmission of samples was recorded as they were exposed to soft x-rays produced by a gold sphere source (1.5 kJ sr $-$1, 250–300 eV). Blanking of fused silica (SiO 2) wasmore » measured to occur over a range of time-integrated soft x-ray (<3 keV) fluence from ~0.2–2.5 J cm $-$2. A shield test device consisting of a 30 nm silicon nitride (Si 3N 4) and a 10 cm long volume of 0.04 bar xenon gas succeeded in delaying loss of transmission through a magnesium fluoride sample; optical transmission was observed over a longer period than for the unprotected sample. It is hoped that the design of this x-ray shield can be scaled in order to produce a shield device for the National Ignition Facility optical Thomson scattering collection telescope, in order to allow measurements of hohlraum plasma conditions produced in inertial confinement fusion experiments. Finally, if successful, it will also have applications in many other high energy density experiments where optical and ultra-violet measurements are desirable.« less
Swadling, G. F.; Ross, J. S.; Manha, D.; ...
2017-03-16
The design principles of a xenon gas shield device that is intended to protect optical components from x-ray induced opacity (“x-ray blanking”) have been experimentally demonstrated at the OMEGA-60 Laser Facility at the Laboratory for Laser Energetics, University of Rochester. A volume of xenon gas placed in front of an optical component absorbs the incoming soft x-ray radiation but transmits optical and ultra-violet radiation. The time-resolved optical (532 nm) transmission of samples was recorded as they were exposed to soft x-rays produced by a gold sphere source (1.5 kJ sr $-$1, 250–300 eV). Blanking of fused silica (SiO 2) wasmore » measured to occur over a range of time-integrated soft x-ray (<3 keV) fluence from ~0.2–2.5 J cm $-$2. A shield test device consisting of a 30 nm silicon nitride (Si 3N 4) and a 10 cm long volume of 0.04 bar xenon gas succeeded in delaying loss of transmission through a magnesium fluoride sample; optical transmission was observed over a longer period than for the unprotected sample. It is hoped that the design of this x-ray shield can be scaled in order to produce a shield device for the National Ignition Facility optical Thomson scattering collection telescope, in order to allow measurements of hohlraum plasma conditions produced in inertial confinement fusion experiments. Finally, if successful, it will also have applications in many other high energy density experiments where optical and ultra-violet measurements are desirable.« less
NASA Technical Reports Server (NTRS)
Hoerz, Friedrich; Cintala, Mark; See, Thomas; Bernhard, Ronald; Cardenas, Frank; Davidson, William; Haynes, Jerry
1992-01-01
An experimental inquiry into the utility of discontinuous bumpers was conducted to investigate the collisional outcomes of impacts into single grid-like targets and to compare the results with more traditional bumper designs that employ continuous sheet stock. We performed some 35 experiments using 6.3 and 3.2 mm diameter spherical soda-lime glass projectiles at low velocities (less than 2.5 km/s) and 13 at velocities between 5 and 6 km/s, using 3.2 mm spheres only. The thrust of the experiments related to the characterization of collisional fragments as a function of target thickness or areal shield mass of both bumper designs. The primary product of these experiments was witness plates that record the resulting population of collisional fragments. Substantial interpretive and predictive insights into bumper performance were obtained. All qualitative observations (on the witness plates) and detailed measurements of displaced masses seem simply and consistently related only to bumper mass available for interaction with the impactor. This renders the grid bumper into the superior shield design. These findings present evidence that discontinuous bumpers are a viable concept for collisional shields, possibly superior to continuous geometries.
TID Effects of High-Z Material Spot Shields on FPGA Using MPTB Data
NASA Technical Reports Server (NTRS)
Hardage, Donna (Technical Monitor); Crain, S. H.; Mazur, J. E.; Looper, M. D.
2003-01-01
An experiment on the Microelectronics and Photonics Test Bed (MPTB) was testing lield programmable gate arrays using spot shields to extend the life of some of the devices being tested. It was expected that the unshielded parts would fail from a total ionizing dose (TID) and yet the opposite occurred. The data show that the devices failing from the TID effects are those with the spot shields attached. This effort is to determine the mechanism by which the environment is interacting with the high-Z material to enhance the TID in these field programmable gate arrays.
Molecular beam mass spectrometer development
NASA Technical Reports Server (NTRS)
Brock, F. J.; Hueser, J. E.
1976-01-01
An analytical model, based on the kinetics theory of a drifting Maxwellian gas is used to determine the nonequilibrium molecular density distribution within a hemispherical shell open aft with its axis parallel to its velocity. The concept of a molecular shield in terrestrial orbit above 200 km is also analyzed using the kinetic theory of a drifting Maxwellian gas. Data are presented for the components of the gas density within the shield due to the free stream atmosphere, outgassing from the shield and enclosed experiments, and atmospheric gas scattered off a shield orbiter system. A description is given of a FORTRAN program for computating the three dimensional transition flow regime past the space shuttle orbiter that employs the Monte Carlo simulation method to model real flow by some thousands of simulated molecules.
Wu, Chin H; Grant, Christopher V; Cook, Gabriel A; Park, Sang Ho; Opella, Stanley J
2009-09-01
A strip-shield inserted between a high inductance double-tuned solenoid coil and the glass tube containing the sample improves the efficiency of probes used for high-field solid-state NMR experiments on lossy aqueous samples of proteins and other biopolymers. A strip-shield is a coil liner consisting of thin copper strips layered on a PTFE (polytetrafluoroethylene) insulator. With lossy samples, the shift in tuning frequency is smaller, the reduction in Q, and RF-induced heating are all significantly reduced when the strip-shield is present. The performance of 800MHz (1)H/(15)N and (1)H/(13)C double-resonance probes is demonstrated on aqueous samples of membrane proteins in phospholipid bilayers.
Evaluation Of Shielding Efficacy Of A Ferrite Containing Ceramic Material
DOE Office of Scientific and Technical Information (OSTI.GOV)
Verst, C.
2015-10-12
The shielding evaluation of the ferrite based Mitsuishi ceramic material has produced for several radiation sources and possible shielding sizes comparative dose attenuation measurements and simulated projections. High resolution gamma spectroscopy provided uncollided and scattered photon spectra at three energies, confirming theoretical estimates of the ceramic’s mass attenuation coefficient, μ/ρ. High level irradiation experiments were performed using Co-60, Cs-137, and Cf-252 sources to measure penetrating dose rates through steel, lead, concrete, and the provided ceramic slabs. The results were used to validate the radiation transport code MCNP6 which was then used to generate dose rate attenuation curves as a functionmore » of shielding material, thickness, and mass for photons and neutrons ranging in energy from 200 keV to 2 MeV.« less
Dimick, Chris
2010-04-01
Effective January 1, 2009, California healthcare providers were required to report every breach of patient information to the state. They have sent a flood of mishaps and a steady stream of malicious acts.
Code of Federal Regulations, 2011 CFR
2011-04-01
... THE INTERIOR ENERGY AND MINERALS TRIBAL ENERGY RESOURCE AGREEMENTS UNDER THE INDIAN TRIBAL ENERGY DEVELOPMENT AND SELF DETERMINATION ACT Implementation of Tribal Energy Resource Agreements Violation Or Breach...
Can EHRs and HIEs get along with HIPAA security requirements?
Sarrico, Christine; Hauenstein, Jim
2011-02-01
For Enloe Medical Center in California, a good-faith effort to self-report a breach in the privacy of a patient's medical record resulted in a six-figure fine imposed by a state regulatory agency. Hospitals face a "catch-22" situation in responding to the conflicting mandates of developing electronic health records that allow information sharing across institutions versus ensuring absolute protection and security of patients' individual health information. Some industry analysts suggest that the sanctions for security breaches such as the one experienced by Enloe will have the unintended effect of discouraging self-reporting of breaches.
NASA Technical Reports Server (NTRS)
Anderson, K. A.
1972-01-01
Design studies for an X-ray experiment using solid state detectors and for an experiment using a proportional counter for investigating Jovian and Saturnian magnetospheres are reported. Background counting rates through the forward aperture and leakage fluxes are discussed for each design. It is concluded that the best choice of instrument appears to have following the characteristics: (1) two separate multiwire proportional counters for redundancy; (2) passive collimation to restrict the field to about 5 deg, wiregrid modulation collimation to about 0.1 deg angular resolution; (3) no active shielding system around the counter body; and (4) light passive shielding around any portion of the counter body exposed to space to absorb most of the cosmic X-ray background.
2012-10-03
depending on whether it is intrusive or not, may be regarded as either perfectly legitimate and lawful Open Source Intelligence ( OSINT ), or as...response, including the time for reviewing instructions, searching existing data sources , gathering and maintaining the data needed, and completing and...Context 2. Actor 3. Assessment of Activities 4. Source 5. Target/Objectives 6. Consequences 7. Extent 8. Breach of an International
Ad hoc instrumentation methods in ecological studies produce highly biased temperature measurements
Terando, Adam J.; Youngsteadt, Elsa; Meineke, Emily K.; Prado, Sara G.
2017-01-01
In light of global climate change, ecological studies increasingly address effects of temperature on organisms and ecosystems. To measure air temperature at biologically relevant scales in the field, ecologists often use small, portable temperature sensors. Sensors must be shielded from solar radiation to provide accurate temperature measurements, but our review of 18 years of ecological literature indicates that shielding practices vary across studies (when reported at all), and that ecologists often invent and construct ad hoc radiation shields without testing their efficacy. We performed two field experiments to examine the accuracy of temperature observations from three commonly used portable data loggers (HOBO Pro, HOBO Pendant, and iButton hygrochron) housed in manufactured Gill shields or ad hoc, custom‐fabricated shields constructed from everyday materials such as plastic cups. We installed this sensor array (five replicates of 11 sensor‐shield combinations) at weather stations located in open and forested sites. HOBO Pro sensors with Gill shields were the most accurate devices, with a mean absolute error of 0.2°C relative to weather stations at each site. Error in ad hoc shield treatments ranged from 0.8 to 3.0°C, with the largest errors at the open site. We then deployed one replicate of each sensor‐shield combination at five sites that varied in the amount of urban impervious surface cover, which presents a further shielding challenge. Bias in sensors paired with ad hoc shields increased by up to 0.7°C for every 10% increase in impervious surface. Our results indicate that, due to variable shielding practices, the ecological literature likely includes highly biased temperature data that cannot be compared directly across studies. If left unaddressed, these errors will hinder efforts to predict biological responses to climate change. We call for greater standardization in how temperature data are recorded in the field, handled in analyses, and reported in publications.
Noise Modeling From Conductive Shields Using Kirchhoff Equations.
Sandin, Henrik J; Volegov, Petr L; Espy, Michelle A; Matlashov, Andrei N; Savukov, Igor M; Schultz, Larry J
2010-10-09
Progress in the development of high-sensitivity magnetic-field measurements has stimulated interest in understanding the magnetic noise of conductive materials, especially of magnetic shields based on high-permeability materials and/or high-conductivity materials. For example, SQUIDs and atomic magnetometers have been used in many experiments with mu-metal shields, and additionally SQUID systems frequently have radio frequency shielding based on thin conductive materials. Typical existing approaches to modeling noise only work with simple shield and sensor geometries while common experimental setups today consist of multiple sensor systems with complex shield geometries. With complex sensor arrays used in, for example, MEG and Ultra Low Field MRI studies, knowledge of the noise correlation between sensors is as important as knowledge of the noise itself. This is crucial for incorporating efficient noise cancelation schemes for the system. We developed an approach that allows us to calculate the Johnson noise for arbitrary shaped shields and multiple sensor systems. The approach is efficient enough to be able to run on a single PC system and return results on a minute scale. With a multiple sensor system our approach calculates not only the noise for each sensor but also the noise correlation matrix between sensors. Here we will show how the algorithm can be implemented.
Experimental Evaluation of a Water Shield for a Surface Power Reactor
NASA Technical Reports Server (NTRS)
Pearson, J. Boise; Reid, Robert S.
2006-01-01
As part of the Vision for Space Exploration the end of the next decade will bring man back to the surface of the moon. One of the most critical issues for the establishment of human presence on the moon will be the availability of compact power sources. The establishment of man on the moon will require power from greater than 10's of kWt's in follow on years. Nuclear reactors are extremely we11 suited to meet the needs for power generation on the lunar or Martian surface. reactor system. Several competing concepts exist for lightweight, safe, robust shielding systems such as a water shield, lithium hydride (LiH), Boron Carbide, and others. Water offers several potential advantages, including reduced cost, reduced technical risk, and reduced mass. Water has not typically been considered for space reactor applications because of the need for gravity to remove the potential for radiation streaming paths. The water shield concept relies on predictions of passive circulation of the shield water by natural convection to adequately cool the shield. This prediction needs to be experimentally evaluated, especially for shields with complex geometries. MSFC has developed the experience and fac necessary to do this evaluation in the Early Flight Fission - Test Facility (EFF-TF).
Shield ulcers and plaques of the cornea in vernal keratoconjunctivitis.
Cameron, J A
1995-06-01
Shield-shaped corneal ulcers and plaques are serious sight-threatening corneal manifestations of vernal keratoconjunctivitis. There are few reports describing the management of these patients and their outcomes. The clinical presentation, treatment, and outcome of 66 shield ulcers and/or plaques in 55 eyes of 41 patients with vernal keratoconjunctivitis were studied in this retrospective study of patients treated at King Khaled Eye Specialist Hospital during an 11-year period. Patients with shield ulcers where the base of the ulcer was transparent usually had rapid re-epithelialization and an excellent visual outcome with medical treatment alone. Patients with shield ulcers and visible plaque formation had delayed re-epithelialization when receiving only medical treatment. Complications of delayed re-epithelialization consisted of bacterial keratitis in five eyes, amblyopia in one eye, and strabismus in one patient. Patients with shield ulcers and/or plaques that do not re-epithelialize once active vernal keratoconjunctivitis has been controlled should have surgical intervention. In this series, a simple scraping of the base and margins of the ulcer with removal of the inflammatory material (i.e., the plaque) resulted in rapid re-epithelialization in 20 of 23 ulcers and plaques. An algorithm for treating shield ulcers and/or plaques is presented based on the experience at this institution.
SQUID readout and ultra-low magnetic fields for Gravity Probe-B (GP-B)
NASA Technical Reports Server (NTRS)
Lockhart, James M.
1986-01-01
The superconducting readout system to be used for resolving 0.001 arcsec changes in the gyroscope spin direction in the Relativity Gyroscope (GP-B) experiment is described. This system couples the London magnetic moment flux of the spinning gyro to a low noise superconducting quantum interference device (SQUID) detector. Resolution limits and noise performance of the detection system are discussed, and improvements obtained and expected with advanced SQUIDs are presented. Also described is the novel use of superconducting magnetic shielding techniques to obtain a 250 dB attenuation of the earth's magnetic field at the location of the gyroscopes. In this approach, expanded superconducting foil shields are coupled with fixed cylindrical superconducting shields and special geometric considerations to obtain the extremely high attenuation factor required. With these shielding techniques, it appears that the 0.5-Gauss earth field (which appears to the gyroscopes as an ac field at the satellite roll rate) can be reduced to the 10 to the -13th G level required by the experiment. Recent results concerning improvements in the performance of the superconducting foil techniques obtained with the use of a new computer-controlled cooling system are presented.
ASTER Images Flooding from Mississippi River Levee Breach
2011-05-10
NASA Terra spacecraft shows the resultant flooding of farmland west of the Mississippi 20 miles south of the Mississippi River levee breach. U.S. Army Corps of Engineers detonated explosives at the Birds Point levee near Wyatt, Missouri, on May 2, 2011.
45 CFR 164.400 - Applicability.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Notification in the Case of Breach of Unsecured Protected Health Information § 164.400 Applicability. The requirements of this subpart shall apply with respect to breaches of protected health...
45 CFR 164.400 - Applicability.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Notification in the Case of Breach of Unsecured Protected Health Information § 164.400 Applicability. The requirements of this subpart shall apply with respect to breaches of protected health...
25 CFR 224.87 - What are the obligations of a tribe if it discovers a violation or breach?
Code of Federal Regulations, 2011 CFR
2011-04-01
... ENERGY AND MINERALS TRIBAL ENERGY RESOURCE AGREEMENTS UNDER THE INDIAN TRIBAL ENERGY DEVELOPMENT AND SELF DETERMINATION ACT Implementation of Tribal Energy Resource Agreements Violation Or Breach § 224.87 What are the...
14 CFR 1274.936 - Breach of safety or security.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Breach of safety or security. 1274.936 Section 1274.936 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION COOPERATIVE... following: compromise of classified information; illegal technology transfer; workplace violence resulting...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 15 2014-01-01 2014-01-01 false Breach. 3431.21 Section 3431.21 Agriculture Regulations of the Department of Agriculture (Continued) NATIONAL INSTITUTE OF FOOD AND AGRICULTURE VETERINARY MEDICINE LOAN REPAYMENT PROGRAM Administration of the Veterinary Medicine Loan Repayment Program § 3431.21...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 15 2013-01-01 2013-01-01 false Breach. 3431.21 Section 3431.21 Agriculture Regulations of the Department of Agriculture (Continued) NATIONAL INSTITUTE OF FOOD AND AGRICULTURE VETERINARY MEDICINE LOAN REPAYMENT PROGRAM Administration of the Veterinary Medicine Loan Repayment Program § 3431.21...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 15 2012-01-01 2012-01-01 false Breach. 3431.21 Section 3431.21 Agriculture Regulations of the Department of Agriculture (Continued) NATIONAL INSTITUTE OF FOOD AND AGRICULTURE VETERINARY MEDICINE LOAN REPAYMENT PROGRAM Administration of the Veterinary Medicine Loan Repayment Program § 3431.21...
Code of Federal Regulations, 2010 CFR
2010-01-01
..., breach of trust, or money laundering. Convictions do not cover arrests, pending cases not brought to... for a criminal offense involving dishonesty, breach of trust or money laundering. A pretrial diversion...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 15 2011-01-01 2011-01-01 false Breach. 3431.21 Section 3431.21 Agriculture Regulations of the Department of Agriculture (Continued) NATIONAL INSTITUTE OF FOOD AND AGRICULTURE VETERINARY MEDICINE LOAN REPAYMENT PROGRAM Administration of the Veterinary Medicine Loan Repayment Program § 3431.21...
Mueller, Mario J; Stevenson, Graham R
2005-01-01
Increasing projected values of the circulating beam intensity in the Super Proton Synchrotron (SPS) and decreasing limits to radiation exposure, taken with the increasing non-acceptance of unjustified and unoptimised radiation exposures, have led to the need to re-assess the shielding between the ECX and ECA5 underground experimental areas of the SPS. Twenty years ago, these experimental areas at SPS-Point 5 housed the UA1 experiment, where Carlo Rubbia and his team verified the existence of W and Z bosons. The study reported here describes such a re-assessment based on simulations using the multi-purpose FLUKA radiation transport code. This study concludes that while the main shield which is made of concrete blocks and is 4.8 m thick satisfactorily meets the current design limits even at the highest intensities presently planned for the SPS, dose rates calculated for liaison areas on both sides of the main shield significantly exceed the design limits. Possible ways of improving the shielding situation are discussed.
Drop Tower Facility at Queensland University of Technology
NASA Astrophysics Data System (ADS)
Plagens, Owen; Castillo, Martin; Steinberg, Theodore; Ong, Teng-Cheong
The Queensland University of Technology (QUT) Drop Tower Facility is a {raise.17exscriptstyle˜}2.1 second, 21.3 m fall, dual capsule drop tower system. The dual capsule comprises of an uncoupled exterior hollow drag shield that experiences drag by the ambient atmosphere with the experimental capsule falling within the drag shield. The dual capsule system is lifted to the top of the drop tower via a mechanical crane and the dropping process is initiated by the cutting of a wire coupling the experimental package and suspending the drag shield. The internal experimental capsule reaches the bottom of the drag shield floor just prior to the deceleration stage at the air bag and during this time experience gravity levels of {raise.17exscriptstyle˜}10textsuperscript{-6} g. The deceleration system utilizes an inflatable airbag where experimental packages can be designed to experience a maximum deceleration of {raise.17exscriptstyle˜}10textsuperscript{18} g for {raise.17exscriptstyle˜}0.1 seconds. The drag shield can house experimental packages with a maximum diameter of 0.8 m and height of 0.9 m. The drag shield can also be used in foam mode, where the walls are lined with foam and small experiments can be dropped completely untethered. This mode is generally used for the study of microsatellite manipulation. Payloads can be powered by on-board power systems with power delivered to the experiment until free fall occurs. Experimental data that can be collected includes but is not limited to video, temperature, pressure, voltage/current from the power supply, and triggering mechanisms outputs which are simultaneously collected via data logging systems and high speed video recording systems. Academic and commercial projects are currently under investigation at the QUT Drop Tower Facility and collaboration is openly welcome at this facility. Current research includes the study of heterogeneously burning metals in oxygen which is aimed at fire safety applications and identifying size distributions and morphologies of particles produced during the combustion of bulk metals. Materials produced via self-propagating high-temperature synthesis in microgravity are investigated to produce high electroluminescent materials and high efficient dye sensitized electrolyte materials. The rapid cooling and quenching of ZBLAN glass in a microgravity environment is studied to reduce crystallization in the glass. Convective pool boiling and nucleate bubble formation in nano-fluids is aimed at investigating heat transfer properties in these new materials which are masked by gravity. Novel carbon nanotubes are produced in low gravity via an arch discharge to investigate the formation mechanisms of these materials.
NASA Technical Reports Server (NTRS)
Tripathi, Ram K.
2016-01-01
This report describes the research completed during 2011 for the NASA Innovative Advanced Concepts (NIAC) project. The research is motivated by the desire to safely send humans in deep space missions and to keep radiation exposures within permitted limits. To this end current material shielding, developed for low earth orbit missions, is not a viable option due to payload and cost penalties. The active radiation shielding is the path forward for such missions. To achieve active space radiation shielding innovative large lightweight gossamer space structures are used. The goal is to deflect enough positive ions without attracting negatively charged plasma and to investigate if a charged Gossamer structure can perform charge deflections without significant structural instabilities occurring. In this study different innovative configurations are explored to design an optimum active shielding. In addition, to establish technological feasibility experiments are performed with up to 10kV of membrane charging, and an electron flux source with up to 5keV of energy and 5mA of current. While these charge flux energy levels are much less than those encountered in space, the fundamental coupled interaction of charged Gossamer structures with the ambient charge flux can be experimentally investigated. Of interest are, will the EIMS remain inflated during the charge deflections, and are there visible charge flux interactions. Aluminum coated Mylar membrane prototype structures are created to test their inflation capability using electrostatic charging. To simulate the charge flux, a 5keV electron emitter is utilized. The remaining charge flux at the end of the test chamber is measured with a Faraday cup mounted on a movable boom. A range of experiments with this electron emitter and detector were performed within a 30x60cm vacuum chamber with vacuum environment capability of 10-7 Torr. Experiments are performed with the charge flux aimed at the electrostatically inflated membrane structure (EIMS) in both charged and uncharged configurations. The amount of charge shielding behind and around the EIMS was studied for different combinations of membrane structure voltages and electron energies. Both passive and active shielding were observed, with active shielding capable of deflecting nearly all incoming electrons. The pattern of charge distribution around the structure was studied as well as the stability of the structures in the charge flow. The charge deflection experiments illustrate that the EIMS remain inflated during charge deflection, but will experience small amplitude oscillations. Investigations were performed to determine a potential cause of the vibrations. It is postulated these vibrations are due to the charge flux causing local membrane charge distribution changes. As the membrane structure inflation pressure is changed, the shape responds, and causes the observed sustained vibration. Having identified this phenomenon is important when considering electrostatically inflated membrane structures (EIMS) in a space environment. Additionally, this project included a study of membrane material impacts, specifically the impact of membrane thickness. Extremely thin materials presented new challenges with vacuum preparation techniques and rapid charging. The thinner and lighter membrane materials were successfully inflated using electrostatic forces in a vacuum chamber. However, care must be taken when varying the potentials of such lighter structures as the currents can cause local heating and melting of the very thin membranes. Lastly, a preliminary analysis is performed to study rough order of magnitude power requirements for using EIMS for radiation shielding. The EIMS power requirement becomes increasingly more challenging as the spacecraft voltage is increased. As a result, the emphasis is on the deflection of charges away from the spacecraft rather than totally stopping them. This significantly alleviates the initial power requirements. With modest technological development(s) active shielding is emerging to be a viable option.
Rajasekaran, S; Bhushan, Manindra; Aiyer, Siddharth; Kanna, Rishi; Shetty, Ajoy Prasad
2018-01-09
To develop a classification based on the technical complexity encountered during pedicle screw insertion and to evaluate the performance of AIRO ® CT navigation system based on this classification, in the clinical scenario of complex spinal deformity. 31 complex spinal deformity correction surgeries were prospectively analyzed for performance of AIRO ® mobile CT-based navigation system. Pedicles were classified according to complexity of insertion into five types. Analysis was performed to estimate the accuracy of screw placement and time for screw insertion. Breach greater than 2 mm was considered for analysis. 452 pedicle screws were inserted (T1-T6: 116; T7-T12: 171; L1-S1: 165). The average Cobb angle was 68.3° (range 60°-104°). We had 242 grade 2 pedicles, 133 grade 3, and 77 grade 4, and 44 pedicles were unfit for pedicle screw insertion. We noted 27 pedicle screw breach (medial: 10; lateral: 16; anterior: 1). Among lateral breach (n = 16), ten screws were planned for in-out-in pedicle screw insertion. Among lateral breach (n = 16), ten screws were planned for in-out-in pedicle screw insertion. Average screw insertion time was 1.76 ± 0.89 min. After accounting for planned breach, the effective breach rate was 3.8% resulting in 96.2% accuracy for pedicle screw placement. This classification helps compare the accuracy of screw insertion in range of conditions by considering the complexity of screw insertion. Considering the clinical scenario of complex pedicle anatomy in spinal deformity AIRO ® navigation showed an excellent accuracy rate of 96.2%.
Cosmic radiation exposure of biological test systems during the EXPOSE-E mission.
Berger, Thomas; Hajek, Michael; Bilski, Pawel; Körner, Christine; Vanhavere, Filip; Reitz, Günther
2012-05-01
In the frame of the EXPOSE-E mission on the Columbus external payload facility EuTEF on board the International Space Station, passive thermoluminescence dosimeters were applied to measure the radiation exposure of biological samples. The detectors were located either as stacks next to biological specimens to determine the depth dose distribution or beneath the sample carriers to determine the dose levels for maximum shielding. The maximum mission dose measured in the upper layer of the depth dose part of the experiment amounted to 238±10 mGy, which relates to an average dose rate of 408±16 μGy/d. In these stacks of about 8 mm height, the dose decreased by 5-12% with depth. The maximum dose measured beneath the sample carriers was 215±16 mGy, which amounts to an average dose rate of 368±27 μGy/d. These values are close to those assessed for the interior of the Columbus module and demonstrate the high shielding of the biological experiments within the EXPOSE-E facility. Besides the shielding by the EXPOSE-E hardware itself, additional shielding was experienced by the external structures adjacent to EXPOSE-E, such as EuTEF and Columbus. This led to a dose gradient over the entire exposure area, from 215±16 mGy for the lowest to 121±6 mGy for maximum shielding. Hence, the doses perceived by the biological samples inside EXPOSE-E varied by 70% (from lowest to highest dose). As a consequence of the high shielding, the biological samples were predominantly exposed to galactic cosmic heavy ions, while electrons and a significant fraction of protons of the radiation belts and solar wind did not reach the samples.
UCSD High Energy X-ray Timing Experiment magnetic shield design and test results
NASA Technical Reports Server (NTRS)
Rothschild, Richard E.; Pelling, Michael R.; Hink, Paul L.
1991-01-01
Results are reported from an effort to define a passive magnetic field concept for the High Energy X-ray Timing Experiment (HEXTE), in the interest of reducing the detector-gain variations due to 0.5-1.0-sec timescale magnetic field variations. This will allow a sensitivity of the order of 1 percent of the HEXTE background. While aperture modulation and automatic gain control will minimize effects on timescales of tens of seconds and longer, passive magnetic shielding of the photomultiplier tubes will address 1-sec timescale variations due to aperture motions.
Prediction and measurement of radiation damage to CMOS devices on board spacecraft
NASA Technical Reports Server (NTRS)
Cliff, R. A.; Danchenko, V.; Stassinopoulos, E. G.; Sing, M.; Brucker, G. J.; Ohanian, R. S.
1976-01-01
The initial results obtained from the Complementary Metal Oxide Semiconductors Radiation Effects Measurement experiment are presented. Predictions of radiation damage to C-MOS devices are based on standard environment models and computational techniques. A comparison of the shifts in CMOS threshold potentials, that is, those measured in space to those obtained from the on the ground simulation experiment with Co 60, indicated that the measured space damage is greater than predicted by a factor of two for shields thicker than 100 mils (2.54 mm), but agrees well with predictions for the thinner shields.
NASA Technical Reports Server (NTRS)
Fitzgerald, Howard J.; Yano, Hajime
1995-01-01
Four of the eight available double layer microparticle capture cells, flown as the experiment A0023 on the trailing (West) face of LDEF, have been extensively studied. An investigation of the chemistry of impactors has been made using SEM/EDX techniques and the effectiveness of the capture cells as bumper shields has also been examined. Studies of these capture cells gave positive EDX results, with 53 percent of impact sites indicating the presence of some chemical residues, the predominant residue identified as being silicon in varying quantities.
45 CFR 164.410 - Notification by a business associate.
Code of Federal Regulations, 2013 CFR
2013-10-01
... associate shall, following the discovery of a breach of unsecured protected health information, notify the... possible, the identification of each individual whose unsecured protected health information has been, or... RELATED REQUIREMENTS SECURITY AND PRIVACY Notification in the Case of Breach of Unsecured Protected Health...
Identifying Capabilities Gaps in Shipboard Visit, Board, Search, Seizure (VBSS) Teams
2010-12-01
always remains some risk, however small, of a data breach . Anticipated Benefits. Anticipated benefits from this study are potentially increasing the...there always remains some risk, however small, of a data breach . Anticipated Benefits. Anticipated benefits from this study are potentially
Coaches in the Courtroom: Recovery in Actions for Breach of Employment Contracts.
ERIC Educational Resources Information Center
Graves, Judson
1986-01-01
The rapid hiring and firing of college athletic coaches, the litigation brought in breach of employment contracts, and the special problems presented by coaching contracts have raised hard legal questions about proper methods of contract enforcement and recovery of damages. (MSE)
47 CFR 64.2011 - Notification of customer proprietary network information security breaches.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 47 Telecommunication 3 2011-10-01 2011-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security...
47 CFR 64.2011 - Notification of customer proprietary network information security breaches.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 3 2010-10-01 2010-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security...
47 CFR 64.2011 - Notification of customer proprietary network information security breaches.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... 47 Telecommunication 3 2013-10-01 2013-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...
47 CFR 64.5111 - Notification of customer proprietary network information security breaches.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Proprietary Network Information. § 64.5111 Notification of customer proprietary network information security... 47 Telecommunication 3 2013-10-01 2013-10-01 false Notification of customer proprietary network information security breaches. 64.5111 Section 64.5111 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...
47 CFR 64.5111 - Notification of customer proprietary network information security breaches.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Proprietary Network Information. § 64.5111 Notification of customer proprietary network information security... 47 Telecommunication 3 2014-10-01 2014-10-01 false Notification of customer proprietary network information security breaches. 64.5111 Section 64.5111 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...
47 CFR 64.2011 - Notification of customer proprietary network information security breaches.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... 47 Telecommunication 3 2014-10-01 2014-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...
47 CFR 64.2011 - Notification of customer proprietary network information security breaches.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... 47 Telecommunication 3 2012-10-01 2012-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...
Unintentional Insider Threats: A Review of Phishing and Malware Incidents
2014-07-01
their agency as deliberate, malicious hackers [1]. This research supports the conclusions in the 2013 Verizon Data Breach Report that 47% of...References [1] SolarWinds. SolarWinds Federal Cybersecurity Survey Summary Report. SolarWinds, 2014. [2] Verizon. 2013 Data Breach Investigations
Apparatus for and method of monitoring for breached fuel elements
Gross, K.C.; Strain, R.V.
1981-04-28
This invention teaches improved apparatus for the method of detecting a breach in cladded fuel used in a nuclear reactor. The detector apparatus uses a separate bypass loop for conveying part of the reactor coolant away from the core, and at least three separate delayed-neutron detectors mounted proximate this detector loop. The detectors are spaced apart so that the coolant flow time from the core to each detector is different, and these differences are known. The delayed-neutron activity at the detectors is a function of the delay time after the reaction in the fuel until the coolant carrying the delayed-neutron emitter passes the respective detector. This time delay is broken down into separate components including an isotopic holdup time required for the emitter to move through the fuel from the reaction to the coolant at the breach, and two transit times required for the emitter now in the coolant to flow from the breach to the detector loop and then via the loop to the detector.
Nelson, Timothy R.; Miselis, Jennifer L.; Hapke, Cheryl J.; Brenner, Owen T.; Henderson, Rachel E.; Reynolds, Billy J.; Wilson, Kathleen E.
2017-03-24
Scientists from the U.S. Geological Survey St. Petersburg Coastal and Marine Science Center in St. Petersburg, Florida, conducted a bathymetric survey of Fire Island, New York, from October 5 to 10, 2014. The U.S. Geological Survey is involved in a post-Hurricane Sandy effort to map and monitor the morphologic evolution of the wilderness breach, which formed in October 2012 during Hurricane Sandy, as part of the Hurricane Sandy Supplemental Project GS2-2B. During this study, bathymetry data were collected, using single-beam echo sounders and global positioning systems mounted to personal watercraft, along the Fire Island shoreface and within the wilderness breach, Fire Island Inlet, Narrow Bay, and Great South Bay east of Nicoll Bay. Additional bathymetry and elevation data were collected using backpack and wheel-mounted global positioning systems along the subaerial beach (foreshore and backshore), flood shoals, and shallow channels within the wilderness breach and adjacent shoreface.
Hamasaki, Tomoko; Hagihara, Akihito
2015-10-24
The aim of this study was to review the typical factors related to physician's liability in obstetrics and gynecology departments, as compared to those in internal medicine and surgery, regarding a breach of the duty to explain. This study involved analyzing 366 medical litigation case reports from 1990 through 2008 where the duty to explain was disputed. We examined relationships between patients, physicians, variables related to physician's explanations, and physician's breach of the duty to explain by comparing mean values and percentages in obstetrics and gynecology, internal medicine, and surgical departments with the t-test and χ(2) test. When we compared the reasons for decisions in cases where the patient won, we found that the percentage of cases in which the patient's claim was recognized was the highest for both physician negligence, including errors of judgment and procedural mistakes, and breach of the duty to explain, in obstetrics and gynecology departments; breach of the duty to explain alone in internal medicine departments; and mistakes in medical procedures alone in surgical departments (p = 0.008). When comparing patients, the rate of death was significantly higher than that of other outcomes in precedents where a breach of the duty to explain was acknowledged (p = 0.046). The proportion of cases involving obstetrics and gynecology departments, in which care was claimed to be substandard at the time of treatment, and that were not argued as breach of a duty to explain, was significantly higher than those of other evaluated departments (p <0.001). However, internal medicine and surgical departments were very similar in this context. In obstetrics and gynecology departments, the proportion of cases in which it had been conceded that the duty to explain had been breached when seeking patient approval (or not) was significantly higher than in other departments (p = 0.002). It is important for physicians working in obstetrics and gynecology departments to carefully explain the risk of death associated with any planned procedure, and to obtain genuinely informed patient consent.
NASA-Lewis experiences with multigroup cross sections and shielding calculations
NASA Technical Reports Server (NTRS)
Lahti, G. P.
1972-01-01
The nuclear reactor shield analysis procedures employed at NASA-Lewis are described. Emphasis is placed on the generation, use, and testing of multigroup cross section data. Although coupled neutron and gamma ray cross section sets are useful in two dimensional Sn transport calculations, much insight has been gained from examination of uncoupled calculations. These have led to experimental and analytic studies of areas deemed to be of first order importance to reactor shield calculations. A discussion is given of problems encountered in using multigroup cross sections in the resolved resonance energy range. The addition to ENDF files of calculated and/or measured neutron-energy-dependent capture gamma ray spectra for shielding calculations is questioned for the resonance region. Anomalies inherent in two dimensional Sn transport calculations which may overwhelm any cross section discrepancies are illustrated.
Preliminary results of radiation measurements on EURECA
NASA Technical Reports Server (NTRS)
Benton, E. V.; Frank, A. L.
1995-01-01
The eleven-month duration of the EURECA mission allows long-term radiation effects to be studied similarly to those of the Long Duration Exposure Facility (LDEF). Basic data can be generated for projections to crew doses and electronic and computer reliability on spacecraft missions. A radiation experiment has been designed for EURECA which uses passive integrating detectors to measure average radiation levels. The components include a Trackoscope, which employs fourteen plastic nuclear track detector (PNTD) stacks to measure the angular dependence of high LET (greater than or equal to 6 keV/micro m) radiation. Also included are TLD's for total absorbed doses, thermal/resonance neutron detectors (TRND's) for low energy neutron fluences and a thick PNTD stack for depth dependence measurements. LET spectra are derived from the PNTD measurements. Preliminary TLD results from seven levels within the detector array show that integrated does inside the flight canister varied from 18.8 +/- 0.6 cGy to 38.9 +/- 1.2 cGy. The TLD's oriented toward the least shielded direction averaged 53% higher in dose than those oriented away from the least shielded direction (minimum shielding toward the least shielded direction varied from 1.13 to 7.9 g/cm(exp 2), Al equivalent). The maximum dose rate on EURECA (1.16 mGy/day) was 37% of the maximum measured on LDEF and dose rates at all depths were less than measured on LDEF. The shielding external to the flight canister covered a greater solid angle about the canister than the LDEF experiments.
The inadvertent breach of confidentiality.
Erlen, J A
1998-01-01
Patients believe that personal information that they share with their health care providers will be kept strictly confidential. Safeguarding a confidence has been and continues to be an expected professional behavior. Yet, a common ethical problem that nurses face in their everyday practice is the inadvertent disclosure of private information about particular patients to individuals who have no need for this information. This article discusses the inadvertent breach of confidentiality and its related ethical concepts: privacy, respect for persons, trust and fidelity, and the potential for harm or injury. Recommendations are provided to enable nurses to avoid and manage situations that involve an inadvertent breach of confidentiality.
Schoonover, Heather; Haydon, Kristin
2018-06-14
When breaches in infection control occur, it is imperative that organizations respond in a manner that is effective, efficient, and rebuilds trust with patients. Readers will learn how the incident command structure, daily management system, and the Centers for Disease Control and Prevention's Patient Notification Toolkit were used to drive an effective response to an infection control breach-resulting in 92% of affected patients completing the recommended testing for hepatitis B, hepatitis C, and human immunodeficiency virus. © 2018 American Society for Healthcare Risk Management of the American Hospital Association.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rane, Tejas
Proton Improvement Plant – II (PIP-II) has been planned at Fermilab for providing high-intensity proton beams to the laboratory’s experiments. Fermilab has undertaken the PIP-II Injector Test (PIP2IT) for integrated systems testing of critical components comprising the PIP-II front end. PIP2IT includes two cryomodules, to be tested using a pre-existing Supercritical helium refrigerator and distribution box. The PIP2IT transferline connects the Distribution box to the cryomodules of PI2IT. It contains 5 process lines as follows - supercritical 5K He supply and return lines, thermal shield supply(40K) and return(80K) lines and a sub-atmospheric 2K return line. Such cryogenic transferlines are generallymore » provided with cylindrical thermal shields at 80K, enclosing multiple process lines. The thermal shields are cooled by dedicated cooling lines welded/brazed to the shield at a single point along the circumference. Higher thermal diffusivity provides faster cooling and uniformity o f temperature along the shield surface. Hence, Copper/Aluminium is widely used to fabricate thermal shields. However, raw material price, the cost of fabrication depending on standard sizes of pipes/tubes, often drives up the final price of thermal shields. To reduce the cost by making use of easily available stock of standard pipe/tube, it is decided to use stainless steel as a material in thermal shields for the PIP2IT transferline. To this effect, a parametric study has been undertaken to evaluate the suitability of replacing Copper/Aluminium with stainless steel in thermal shields. The low thermal conductivity of steel results in bowing of the shield due to differential temperature distribution along the circumferential direction. The resulting suitable design has limiting parameters in terms of maximum allowable length of a shield section and the maximum allowable heat transfer coefficient for cooling flow. Starting with the design specific to PIP2IT transferline, an at tempt is made to have non-dimensionalised parameters for sim! ilar thermal shields.« less
Experimental Shielding Evaluation of the Radiation Protection Provided by Residential Structures
NASA Astrophysics Data System (ADS)
Dickson, Elijah D.
The human health and environmental effects following a postulated accidental release of radioactive material to the environment has been a public and regulatory concern since the early development of nuclear technology and researched extensively to better understand the potential risks for accident mitigation and emergency planning purposes. The objective of this investigation is to research and develop the technical basis for contemporary building shielding factors for the U.S. housing stock. Building shielding factors quantify the protection a certain building-type provides from ionizing radiation. Much of the current data used to determine the quality of shielding around nuclear facilities and urban environments is based on simplistic point-kernel calculations for 1950's era suburbia and is no longer applicable to the densely populated urban environments seen today. To analyze a building's radiation shielding properties, the ideal approach would be to subject a variety of building-types to various radioactive materials and measure the radiation levels in and around the building. While this is not entirely practicable, this research uniquely analyzes the shielding effectiveness of a variety of likely U.S. residential buildings from a realistic source term in a laboratory setting. Results produced in the investigation provide a comparison between theory and experiment behind building shielding factor methodology by applying laboratory measurements to detailed computational models. These models are used to develop a series of validated building shielding factors for generic residential housing units using the computational code MCNP5. For these building shielding factors to be useful in radiologic consequence assessments and emergency response planning, two types of shielding factors have been developed for; (1) the shielding effectiveness of each structure within a semi-infinite cloud of radioactive material, and (2) the shielding effectiveness of each structure from contaminant deposition on the roof and surrounding surfaces. For example, results from this investigation estimate the building shielding factors from a semi-infinite plume between comparable two-story models with a basement constructed with either brick-and-mortar or vinyl siding composing the exterior wall weather and a typical single-wide manufactured home with vinyl siding to be 0.36, 0.65, and 0.82 respectively.
45 CFR 164.410 - Notification by a business associate.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., following the discovery of a breach of unsecured protected health information, notify the covered entity of... individual whose unsecured protected health information has been, or is reasonably believed by the business... RELATED REQUIREMENTS SECURITY AND PRIVACY Notification in the Case of Breach of Unsecured Protected Health...
38 CFR 75.111 - Purpose and scope.
Code of Federal Regulations, 2011 CFR
2011-07-01
...) INFORMATION SECURITY MATTERS Data Breaches § 75.111 Purpose and scope. This subpart implements provisions of... Information Technology Act of 2006. It only concerns actions to address a data breach regarding sensitive personal information that is processed or maintained by VA. This subpart does not supersede the...
25 CFR 163.42 - Obligated service and breach of contract.
Code of Federal Regulations, 2012 CFR
2012-04-01
... REGULATIONS Forestry Education, Education Assistance, Recruitment and Training § 163.42 Obligated service and breach of contract. (a) Obligated service. (1) Individuals completing forestry education programs with an... 90 days of the date all program education requirements have been completed. If such employment is not...
25 CFR 163.42 - Obligated service and breach of contract.
Code of Federal Regulations, 2014 CFR
2014-04-01
... REGULATIONS Forestry Education, Education Assistance, Recruitment and Training § 163.42 Obligated service and breach of contract. (a) Obligated service. (1) Individuals completing forestry education programs with an... 90 days of the date all program education requirements have been completed. If such employment is not...
25 CFR 163.42 - Obligated service and breach of contract.
Code of Federal Regulations, 2011 CFR
2011-04-01
... REGULATIONS Forestry Education, Education Assistance, Recruitment and Training § 163.42 Obligated service and breach of contract. (a) Obligated service. (1) Individuals completing forestry education programs with an... 90 days of the date all program education requirements have been completed. If such employment is not...
25 CFR 163.42 - Obligated service and breach of contract.
Code of Federal Regulations, 2013 CFR
2013-04-01
... REGULATIONS Forestry Education, Education Assistance, Recruitment and Training § 163.42 Obligated service and breach of contract. (a) Obligated service. (1) Individuals completing forestry education programs with an... 90 days of the date all program education requirements have been completed. If such employment is not...
Learning the Lessons and Moving Ahead
ERIC Educational Resources Information Center
Grush, Mary
2007-01-01
Despite intensive security measures, institutions are still suffering breaches--sometimes quite painful and costly ones. After a major breach was reported at UCLA this past November, the author spoke with "Educause" security expert Rodney Petersen, to get his perspective and advice for higher education leadership. This article presents…
Container Management During Desert Shield/Storm: An Analysis and Critique of Lessons Learned
1993-04-15
across the distribution spectrum.14 These issues were grouped into five major categories: Containerization and Packaging, Distribution Management , Automation...of containers is needed, according to TDAP. Distribution - Management issues. The Desert Shield experience identified three general distribution ...recommended the formation of a 19 Theater Distribution Management Center from the assets of the Movement Control Agency (MCA) and Material Management
Nuclear radiation problems, unmanned thermionic reactor ion propulsion spacecraft
NASA Technical Reports Server (NTRS)
Mondt, J. F.; Sawyer, C. D.; Nakashima, A.
1972-01-01
A nuclear thermionic reactor as the electric power source for an electric propulsion spacecraft introduces a nuclear radiation environment that affects the spacecraft configuration, the use and location of electrical insulators and the science experiments. The spacecraft is conceptually configured to minimize the nuclear shield weight by: (1) a large length to diameter spacecraft; (2) eliminating piping penetrations through the shield; and (3) using the mercury propellant as gamma shield. Since the alumina material is damaged by the high nuclear radiation environment in the reactor it is desirable to locate the alumina insulator outside the reflector or develop a more radiation resistant insulator.
Thermal Properties of Double-Aluminized Kapton at Low Temperatures
NASA Technical Reports Server (NTRS)
Tuttle, J.; DiPirro, M.; Canavan, E.; Hait, T.
2007-01-01
Double-aluminized kapton (DAK) is commonly used in multi-layer insulation blankets in cryogenic systems. NASA plans to use individual DAK sheets in lightweight deployable shields for satellites carrying instruments. A set of these shields will reflect away thermal radiation from the sun, the earth, and the instrument's warm side and allow the instrument's cold side to radiate its own heat to deep space. In order to optimally design such a shield system, it is important to understand the thermal characteristics of DAK down to low temperatures. We describe experiments which measured the thermal conductivity and electrical resistivity down to 4 Kelvin and the emissivity down to 10 Kelvin.
Compliance with children's television food advertising regulations in Australia.
Roberts, Michele; Pettigrew, Simone; Chapman, Kathy; Miller, Caroline; Quester, Pascale
2012-10-05
The objective of this study was to assess the effectiveness of the Australian co-regulatory system in limiting children's exposure to unhealthy television food advertising by measuring compliance with mandatory and voluntary regulations. An audit was conducted on food and beverage television advertisements broadcast in five major Australian cities during children's programming time from 1st September 2010 to 31st October 2010. The data were assessed against mandatory and voluntary advertising regulations, the information contained in an industry report of breaches, and the Australian Guide to Healthy Eating. During the two months of data collection there were a total of 951 breaches of the combined regulations. This included 619 breaches of the mandatory regulations (CTS) and 332 breaches of the voluntary regulations (RCMI and QSRI). Almost 83% of all food and beverages advertised during children's programming times were for foods classified as 'Extras' in the Australian Guide to Healthy Eating. There were also breaches in relation to the amount of advertising repetition and the use of promotional appeals such as premium offers, competitions, and endorsements by popular children's characters. The self-regulatory systems were found to have flaws in their reporting and there were errors in the Australian Food and Grocery Council's compliance report. This audit suggests that current advertising regulations are inadequate. Regulations need to be closely monitored and more tightly enforced to protect children from advertisements for unhealthy foods.
JENDL-4.0/HE Benchmark Test with Concrete and Iron Shielding Experiments at JAEA/TIARA
NASA Astrophysics Data System (ADS)
Konno, Chikara; Matsuda, Norihiro; Kwon, Saerom; Ohta, Masayuki; Sato, Satoshi
2017-09-01
As a benchmark test of JENDL-4.0/HE released in 2015, we have analyzed the concrete and iron shielding experiments with the quasi mono-energetic 40 and 65 MeV neutron sources at TIARA in JAEA by using MCNP5 and ACE files processed from JENDL-4.0/HE with NJOY2012. As a result, it was found out that the calculation results with JENDL-4.0/HE agreed with the measured ones in the concrete experiment well, while they underestimated the measured ones in the iron experiment with 65 MeV neutrons more for the thicker assemblies. We examined the 56Fe data of JENDL-4.0/HE in detail and it was considered that the larger non-elastic scattering cross sections of 56Fe caused the underestimation in the calculation with JENDL-4.0/HE for the iron experiment with 65 MeV neutrons.
State-dependent decisions cause apparent violations of rationality in animal choice.
Schuck-Paim, Cynthia; Pompilio, Lorena; Kacelnik, Alex
2004-12-01
Normative models of choice in economics and biology usually expect preferences to be consistent across contexts, or "rational" in economic language. Following a large body of literature reporting economically irrational behaviour in humans, breaches of rationality by animals have also been recently described. If proven systematic, these findings would challenge long-standing biological approaches to behavioural theorising, and suggest that cognitive processes similar to those claimed to cause irrationality in humans can also hinder optimality approaches to modelling animal preferences. Critical differences between human and animal experiments have not, however, been sufficiently acknowledged. While humans can be instructed conceptually about the choice problem, animals need to be trained by repeated exposure to all contingencies. This exposure often leads to differences in state between treatments, hence changing choices while preserving rationality. We report experiments with European starlings demonstrating that apparent breaches of rationality can result from state-dependence. We show that adding an inferior alternative to a choice set (a "decoy") affects choices, an effect previously interpreted as indicating irrationality. However, these effects appear and disappear depending on whether state differences between choice contexts are present or not. These results open the possibility that some expressions of maladaptive behaviour are due to oversights in the migration of ideas between economics and biology, and suggest that key differences between human and nonhuman research must be recognised if ideas are to safely travel between these fields.
Development of CCHE2D embankment break model
USDA-ARS?s Scientific Manuscript database
Flooding due to breaching of earth embankments often results in detrimental impact on the people and their properties in the flooding zone. The embankment breaching process is often caused by overtopping of excessive water in a reservoir or a river. This study is to develop a practical numerical m...
45 CFR 164.408 - Notification to the Secretary.
Code of Federal Regulations, 2013 CFR
2013-10-01
... REQUIREMENTS SECURITY AND PRIVACY Notification in the Case of Breach of Unsecured Protected Health Information... of a breach of unsecured protected health information as provided in § 164.404(a)(2), notify the... unsecured protected health information involving 500 or more individuals, a covered entity shall, except as...
45 CFR 164.408 - Notification to the Secretary.
Code of Federal Regulations, 2012 CFR
2012-10-01
... REQUIREMENTS SECURITY AND PRIVACY Notification in the Case of Breach of Unsecured Protected Health Information... of a breach of unsecured protected health information as provided in § 164.404(a)(2), notify the... unsecured protected health information involving 500 or more individuals, a covered entity shall, except as...
7 CFR 1469.25 - Contract violations and termination.
Code of Federal Regulations, 2010 CFR
2010-01-01
... termination without delay. (c) If NRCS terminates a contract due to breach of contract, the participant will... terminates a contract due to breach of contract, or the participant voluntarily terminates the contract... 7 Agriculture 10 2010-01-01 2010-01-01 false Contract violations and termination. 1469.25 Section...
48 CFR 552.270-26 - No Waiver.
Code of Federal Regulations, 2010 CFR
2010-10-01
... FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 552.270-26 No Waiver... remedy consequent upon a breach thereof, and no acceptance of full or partial rent or other performance by either party during the continuance of any such breach shall constitute a waiver of any such...
ERIC Educational Resources Information Center
Schaffhauser, Dian
2009-01-01
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
Data security101: avoiding the list.
Perna, Gabriel
2012-01-01
Thanks to the rampant digitization of healthcare data, breaches have become commonplace in an industry that lacks advanced security practices. In this industry-wide report, those who have dealt with breaches implore others to shore up internal security practices and be transparent. As one CIO keenly notes, "we're all in this together."
45 CFR 164.408 - Notification to the Secretary.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Notification to the Secretary. 164.408 Section 164... § 164.408 Notification to the Secretary. (a) Standard. A covered entity shall, following the discovery... Secretary. (b) Implementation specifications: Breaches involving 500 or more individuals. For breaches of...
45 CFR 164.408 - Notification to the Secretary.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 1 2014-10-01 2014-10-01 false Notification to the Secretary. 164.408 Section 164... § 164.408 Notification to the Secretary. (a) Standard. A covered entity shall, following the discovery... Secretary. (b) Implementation specifications: Breaches involving 500 or more individuals. For breaches of...
Role for Federal Government in Safeguarding Student Data Privacy
ERIC Educational Resources Information Center
Barnes, Khaliah; Kowalski, Paige
2016-01-01
Unsurprisingly, schools, companies, and others that have amassed student information have been unable to adequately safeguard it. They simply cannot keep up with all the data they have collected and have routinely experienced data breaches. These breaches have compromised grades, student financial information, Social Security numbers, and even…
ERIC Educational Resources Information Center
Oblinger, Diana G.; Hawkins, Brian L.
2006-01-01
Seeing an institution's name in the headlines for a security breach may be among a CIO's-- and a president's--worst nightmares. Whether the breached data involves social security numbers, credit card accounts, clinical records, or research, this is bad news. Federal agencies that provide research funding may lose confidence in data integrity,…
SiLK: A Tool Suite for Unsampled Network Flow Analysis at Scale
2014-06-01
file format,” [Accessed: Feb 9, 2014]. [Online]. Available: https: //tools.netsa.cert.org/silk/faq.html#file-formats [12] “2012 data breach investigations...report (DBIR),” Verizon, Tech. Rep., 2012. [Online]. Available: http://www.verizonenterprise.com/DBIR/2012/ [13] “2013 data breach investigations
CT Fluoroscopy Shielding: Decreases in Scattered Radiation for the Patient and Operator
Neeman, Ziv; Dromi, Sergio A.; Sarin, Shawn; Wood, Bradford J.
2008-01-01
PURPOSE High-radiation exposure occurs during computed tomographic (CT) fluoroscopy. Patient and operator doses during thoracic and abdominal interventional procedures were studied in the present experiment, and a novel shielding device to reduce exposure to the patient and operator was evaluated. MATERIALS AND METHODS With a 16-slice CT scanner in CT fluoroscopy mode (120 kVp, 30 mA), surface dosimetry was performed on adult and pediatric phantoms. The shielding was composed of tungsten antimony in the form of a lightweight polymer sheet. Doses to the patient were measured with and without shielding for thoracic and abdominal procedures. Doses to the operator were recorded with and without phantom, gantry, and table shielding in place. Double-layer lead-free gloves were used by the operator during the procedures. RESULTS Tungsten antimony shielding adjacent to the scan plane resulted in a maximum dose reduction of 92.3% to the patient. Maximum 85.6%, 93.3%, and 85.1% dose reductions were observed for the operator’s torso, gonads, and hands, respectively. The use of double-layer lead-free gloves resulted in a maximum radiation dose reduction of 97%. CONCLUSIONS Methods to reduce exposure during CT fluoroscopy are effective and should be searched for. Significant reduction in radiation doses to the patient and operator can be accomplished with tungsten antimony shielding. PMID:17185699
Tang, Runze; Zhang, Tonglai; Chen, Yongpeng; Liang, Hao; Li, Bingyang; Zhou, Zunning
2018-05-06
Effective shielding area is a crucial indicator for the evaluation of the infrared smoke-obscuring effectiveness on the battlefield. The conventional methods for assessing the shielding area of the smoke screen are time-consuming and labor intensive, in addition to lacking precision. Therefore, an efficient and convincing technique for testing the effective shielding area of the smoke screen has great potential benefits in the smoke screen applications in the field trial. In this study, a thermal infrared sensor with a mid-wavelength infrared (MWIR) range of 3 to 5 μm was first used to capture the target scene images through clear as well as obscuring smoke, at regular intervals. The background subtraction in motion detection was then applied to obtain the contour of the smoke cloud at each frame. The smoke transmittance at each pixel within the smoke contour was interpolated based on the data that was collected from the image. Finally, the smoke effective shielding area was calculated, based on the accumulation of the effective shielding pixel points. One advantage of this approach is that it utilizes only one thermal infrared sensor without any other additional equipment in the field trial, which significantly contributes to the efficiency and its convenience. Experiments have been carried out to demonstrate that this approach can determine the effective shielding area of the field infrared smoke both practically and efficiently.
Analysis of flood hazard under consideration of dike breaches
NASA Astrophysics Data System (ADS)
Vorogushyn, S.; Apel, H.; Lindenschmidt, K.-E.; Merz, B.
2009-04-01
The study focuses on the development and application of a new modelling system which allows a comprehensive flood hazard assessment along diked river reaches under consideration of dike failures. The proposed Inundation Hazard Assessment Model (IHAM) represents a hybrid probabilistic-deterministic model. It comprises three models interactively coupled at runtime. These are: (1) 1D unsteady hydrodynamic model of river channel and floodplain flow between dikes, (2) probabilistic dike breach model which determines possible dike breach locations, breach widths and breach outflow discharges, and (3) 2D raster-based diffusion wave storage cell model of the hinterland areas behind the dikes. Due to the unsteady nature of the 1D and 2D coupled models, the dependence between hydraulic load at various locations along the reach is explicitly considered. The probabilistic dike breach model describes dike failures due to three failure mechanisms: overtopping, piping and slope instability caused by the seepage flow through the dike core (micro-instability). Dike failures for each mechanism are simulated based on fragility functions. The probability of breach is conditioned by the uncertainty in geometrical and geotechnical dike parameters. The 2D storage cell model driven by the breach outflow boundary conditions computes an extended spectrum of flood intensity indicators such as water depth, flow velocity, impulse, inundation duration and rate of water rise. IHAM is embedded in a Monte Carlo simulation in order to account for the natural variability of the flood generation processes reflected in the form of input hydrographs and for the randomness of dike failures given by breach locations, times and widths. The scenario calculations for the developed synthetic input hydrographs for the main river and tributary were carried out for floods with return periods of T = 100; 200; 500; 1000 a. Based on the modelling results, probabilistic dike hazard maps could be generated that indicate the failure probability of each discretised dike section for every scenario magnitude. Besides the binary inundation patterns that indicate the probability of raster cells being inundated, IHAM generates probabilistic flood hazard maps. These maps display spatial patterns of the considered flood intensity indicators and their associated return periods. The probabilistic nature of IHAM allows for the generation of percentile flood hazard maps that indicate the median and uncertainty bounds of the flood intensity indicators. The uncertainty results from the natural variability of the flow hydrographs and randomness of dike breach processes. The same uncertainty sources determine the uncertainty in the flow hydrographs along the study reach. The simulations showed that the dike breach stochasticity has an increasing impact on hydrograph uncertainty in downstream direction. Whereas in the upstream part of the reach the hydrograph uncertainty is mainly stipulated by the variability of the flood wave form, the dike failures strongly shape the uncertainty boundaries in the downstream part of the reach. Finally, scenarios of polder deployment for the extreme floods with T = 200; 500; 1000 a were simulated with IHAM. The results indicate a rather weak reduction of the mean and median flow hydrographs in the river channel. However, the capping of the flow peaks resulted in a considerable reduction of the overtopping failures downstream of the polder with a simultaneous slight increase of the piping and slope micro-instability frequencies explained by a more durable average impoundment. The developed IHAM simulation system represents a new scientific tool for studying fluvial inundation dynamics under extreme conditions incorporating effects of technical flood protection measures. With its major outputs in form of novel probabilistic inundation and dike hazard maps, the IHAM system has a high practical value for decision support in flood management.
Aircraft Radiation Shield Experiments--Preflight Laboratory Testing
NASA Technical Reports Server (NTRS)
Singleterry, Robert C., Jr.; Shinn, Judy L.; Wilson, John W.; Maiden, Donald L.; Thibeault, Sheila A.; Badavi, Francis F.; Conroy, Thomas; Braby, Leslie
1999-01-01
In the past, measurements onboard a research Boeing 57F (RB57-F) aircraft have demonstrated that the neutron environment within the aircraft structure is greater than that in the local external environment. Recent studies onboard Boeing 737 commercial flights have demonstrated cabin variations in radiation exposure up to 30 percent. These prior results were the basis of the present study to quantify the potential effects of aircraft construction materials on the internal exposures of the crew and passengers. The present study constitutes preflight measurements using an unmoderated Cf-252 fission neutron source to quantify the effects of three current and potential aircraft materials (aluminum, titanium, and graphite-epoxy composite) on the fast neutron flux. Conclusions about the effectiveness of the three selected materials for radiation shielding must wait until testing in the atmosphere is complete; however, it is clear that for shielding low-energy neutrons, the composite material is an improved shielding material over aluminum or titanium.
Neutron radiation shielding properties of polymer incorporated self compacting concrete mixes.
Malkapur, Santhosh M; Divakar, L; Narasimhan, Mattur C; Karkera, Narayana B; Goverdhan, P; Sathian, V; Prasad, N K
2017-07-01
In this work, the neutron radiation shielding characteristics of a class of novel polymer-incorporated self-compacting concrete (PISCC) mixes are evaluated. Pulverized high density polyethylene (HDPE) material was used, at three different reference volumes, as a partial replacement to river sand in conventional concrete mixes. By such partial replacement of sand with polymer, additional hydrogen contents are incorporated in these concrete mixes and their effect on the neutron radiation shielding properties are studied. It has been observed from the initial set of experiments that there is a definite trend of reductions in the neutron flux and dose transmission factor values in these PISCC mixes vis-à-vis ordinary concrete mix. Also, the fact that quite similar enhanced shielding results are recorded even when reprocessed HDPE material is used in lieu of the virgin HDPE attracts further attention. Copyright © 2017 Elsevier Ltd. All rights reserved.
HZE reactions and data-base development
NASA Technical Reports Server (NTRS)
Townsend, Lawrence W.; Cucinotta, Francis A.; Wilson, John W.
1993-01-01
The primary cosmic rays are dispersed over a large range of linear energy transfer (LET) values and their distribution over LET is a determinant of biological response. This LET distribution is modified by radiation shielding thickness and shield material composition. The current uncertainties in nuclear cross sections will not allow the composition of the shield material to be distinguished in order to minimize biological risk. An overview of the development of quantum mechanical models of heavy ion reactions will be given and computational results compared with experiments. A second approach is the development of phenomenological models from semi-classical considerations. These models provide the current data base in high charge and energy (HZE) shielding studies. They will be compared with available experimental data. The background material for this lecture will be available as a review document of over 30 years of research at Langley but will include new results obtained over the last year.
NASA Astrophysics Data System (ADS)
Wang, Yun; Zhao, Min; Wang, Qingguo
2018-01-01
In order to measure the pulse shielding performance of materials with the characteristic of field-induced insulator-conductor phase transition when materials are used for electromagnetic shielding, a dynamic test method was proposed based on a coaxial fixture. Experiment system was built by square pulse source, coaxial cable, coaxial fixture, attenuator, and oscilloscope and insulating components. S11 parameter of the test system was obtained, which suggested that the working frequency ranges from 300 KHz to 7.36 GHz. Insulating performance is good enough to avoid discharge between conductors when material samples is exposed in the strong electromagnetic pulse field up to 831 kV/m. This method is suitable for materials with annular shape, certain thickness and the characteristic of field-induced insulator-conductor phase transition to get their shielding performances of strong electromagnetic pulse.
Expert system for surveillance and diagnosis of breach fuel elements
Gross, K.C.
1988-01-21
An apparatus and method are disclosed for surveillance and diagnosis of breached fuel elements in a nuclear reactor. A delayed neutron monitoring system provides output signals indicating the delayed neutron activity and age and the equivalent recoil area of a breached fuel element. Sensors are used to provide outputs indicating the status of each component of the delayed neutron monitoring system. Detectors also generate output signals indicating the reactor power level and the primary coolant flow rate of the reactor. The outputs from the detectors and sensors are interfaced with an artificial intelligence-based knowledge system which implements predetermined logic and generates output signals indicating the operability of the reactor. 2 figs.
Expert system for surveillance and diagnosis of breach fuel elements
Gross, Kenny C.
1989-01-01
An apparatus and method are disclosed for surveillance and diagnosis of breached fuel elements in a nuclear reactor. A delayed neutron monitoring system provides output signals indicating the delayed neutron activity and age and the equivalent recoil areas of a breached fuel element. Sensors are used to provide outputs indicating the status of each component of the delayed neutron monitoring system. Detectors also generate output signals indicating the reactor power level and the primary coolant flow rate of the reactor. The outputs from the detectors and sensors are interfaced with an artificial intelligence-based knowledge system which implements predetermined logic and generates output signals indicating the operability of the reactor.
Bordia, Prashant; Restubog, Simon Lloyd D; Tang, Robert L
2008-09-01
In this article, psychological contract breach, revenge, and workplace deviance are brought together to identify the cognitive, affective, and motivational underpinnings of workplace deviance. On the basis of S. L. Robinson and R. J. Bennett's (1997) model of workplace deviance, the authors proposed that breach (a cognitive appraisal) and violation (an affective response) initiate revenge seeking. Motivated by revenge, employees then engage in workplace deviance. Three studies tested these ideas. All of the studies supported the hypothesized relationships. In addition, self-control was found to be a moderator of the relationship between revenge cognitions and deviant acts; the relationship was weaker for people high in self-control.
Carmack, W. Jon; Chichester, Heather M.; Porter, Douglas L.; ...
2016-02-27
The Mechanistic Fuel Failure (MFF) series of metal fuel irradiations conducted in the Fast Flux Test Facility (FFTF) provides an important potential comparison between data generated in the Experimental Breeder Reactor (EBR-II) and that expected in a larger-scale fast reactor. The irradiations were the beginning tests to qualify U-10wt%Zr as a driver fuel for FFTF. The FFTF core, with a 91.4 cm tall fuel column and a chopped cosine neutron flux profile, operated with a peak cladding temperature at the top of the fuel column, but developed peak burnup at the centerline of the core. This then places the peakmore » fuel temperature midway between the core center and the top of fuel, lower in the fuel column than in previous EBR-II experiments that had a 32-cm height core. The MFF-3 and MFF-5 qualification assemblies operated in FFTF to >10 at% burnup, and performed very well with no cladding breaches. The MFF-3 assembly operated to 13.8 at% burnup with a peak inner cladding temperature of 643°C, and the MFF-5 assembly operated to 10.1 at% burnup with a peak inner cladding temperature of 651°C. Because of the very high operating temperatures for both the fuel and the cladding, data from the MFF assemblies are most comparable to the data obtained from the EBR-II X447 experiment, which experienced two pin breaches. The X447 breaches were strongly influenced by a large amount of fuel/cladding chemical interaction (FCCI). The MFF pins benefitted from different axial locations of high burnup and peak cladding temperature, which helped to reduce interdiffusion between rare earth fission products and stainless steel cladding. Post-irradiation examination evidence illustrates this advantage. After comparing other performance data of the long MFF pins to prior EBR-II test data, the MFF fuel inside the cladding grew less axially, and the gas release data did not reveal a definitive difference.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carmack, W. J.; Chichester, H. M.; Porter, D. L.
2016-05-01
Abstract The Mechanistic Fuel Failure (MFF) series of metal fuel irradiations conducted in the Fast Flux Test Facility (FFTF) provides an important potential comparison between data generated in the Experimental Breeder Reactor (EBR-II) and that expected in a larger-scale fast reactor. The irradiations were the beginning tests to qualify U-10wt%Zr as a driver fuel for FFTF. The FFTF core, with a 91.4 cm tall fuel column and a chopped cosine neutron flux profile, operated with a peak cladding temperature at the top of the fuel column, but developed peak burnup at the centerline of the core. This places the peakmore » fuel temperature midway between the core center and the top of fuel, lower in the fuel column than in previous EBR-II experiments that had a 32-cm height core. The MFF-3 and MFF-5 qualification assemblies operated in FFTF to >10 at% burnup, and performed very well with no cladding breaches. The MFF-3 assembly operated to 13.8 at% burnup with a peak inner cladding temperature of 643°C, and the MFF-5 assembly operated to 10.1 at% burnup with a peak inner cladding temperature of 651°C. Because of the very high operating temperatures for both the fuel and the cladding, data from the MFF assemblies are most comparable to the data obtained from the EBR-II X447 experiment, which experienced two pin breaches. The X447 breaches were strongly influenced by a large amount of fuel/cladding chemical interaction (FCCI). The MFF pins benefitted from different axial locations of high burnup and peak cladding temperature, which helped to reduce interdiffusion between rare earth fission products and stainless steel cladding. Post-irradiation examination evidence illustrates this advantage. Comparing other performance data of the long MFF pins to prior EBR-II test data, the MFF fuel inside the cladding grew less axially, and the gas release data did not reveal a definitive difference.« less
Geometry and mass model of ionizing radiation experiments on the LDEF satellite
NASA Technical Reports Server (NTRS)
Colborn, B. L.; Armstrong, T. W.
1992-01-01
Extensive measurements related to ionizing radiation environments and effects were made on the LDEF satellite during its mission lifetime of almost 6 years. These data, together with the opportunity they provide for evaluating predictive models and analysis methods, should allow more accurate assessments of the space radiation environment and related effects for future missions in low Earth orbit. The LDEF radiation dosimetry data is influenced to varying degrees by material shielding effects due to the dosimeter itself, nearby components and experiments, and the spacecraft structure. A geometry and mass model is generated of LDEF, incorporating sufficient detail that it can be applied in determining the influence of material shielding on ionizing radiation measurements and predictions. This model can be used as an aid in data interpretation by unfolding shielding effects from the LDEF radiation dosimeter responses. Use of the LDEF geometry/mass model, in conjunction with predictions and comparisons with LDEF dosimetry data currently underway, will also allow more definitive evaluations of current radiation models for future mission applications.
Large-area sheet task: Advanced dendritic-web-growth development
NASA Technical Reports Server (NTRS)
Duncan, C. S.; Seidensticker, R. G.; Mchugh, J. P.; Schruben, J.
1983-01-01
Thermally generated stresses in the growing web crystal were reduced. These stresses, which if too high cause the ribbon to degenerate, were reduced by a factor of three, resulting in the demonstrated growth of high-quality web crystals to widths of 5.4 cm. This progress was brought about chiefly by the application of thermal models to the development of low-stress growth configurations. A new temperature model was developed which can analyze the thermal effects of much more complex lid and top shield configurations than was possible with the old lumped shield model. Growth experiments which supplied input data such as actual shield temperature and melt levels were used to verify the modeling results. Desirable modifications in the melt level-sensing circuitry were made in the new experimental web growth furnace, and this furnace has been used to carry out growth experiments under steady-state conditions. New growth configurations were tested in long growth runs at Westinghouse AESD which produced wider, lower stress and higher quality web crystals than designs previously used.
Aeroacoustic Experiments with Twin Jets
NASA Technical Reports Server (NTRS)
Bozak, Richard F.; Henderson, Brenda S.
2012-01-01
While the noise produced by a single jet is azimuthally symmetric, multiple jets produce azimuthally varying far-field noise. The ability of one jet to shield another reduces the noise radiated in the plane of the jets, while often increasing the noise radiated out of the plane containing the jets. The present study investigates the shielding potential of twin jet configurations over subsonic and over-expanded supersonic jet conditions with simulated forward flight. The experiments were conducted with 2 in. throat diameter nozzles at four jet spacings from 2.6d to 5.5d in center-to-center distance, where d is the nozzle throat diameter. The current study found a maximum of 3 dB reduction in overall sound pressure level relative to two incoherent jets in the peak jet noise direction in the plane containing the jets. However, an increase of 3 dB was found perpendicular to the plane containing the jets. In the sideline direction, shielding is observed for all jet spacings in this study.
2013-11-07
CAPE CANAVERAL, Fla. -- Dust particle experiments are conducted for Electrodynamic Dust Shield for Dust Mitigation project in the Electrostatics and Surface Physics Laboratory in the SwampWorks at NASA's Kennedy Space Center in Florida. The technology works by creating an electric field that propagates out like the ripples on a pond. This could prevent dust accumulation on spacesuits, thermal radiators, solar panels, optical instruments and view ports for future lunar and Mars exploration activities. Electrodynamic dust shield, or EDS, technology is based on concepts originally developed by NASA as early as 1967 and later by the University of Tokyo. In 2003, NASA, in collaboration with the University of Arkansas at Little Rock, started development of the EDS for dust particle removal from solar panels to be used on future missions to the moon, an asteroid or Mars. A flight experiment to expose the dust shields to the space environment currently is under development. For more information, visit: http://www.nasa.gov/content/scientists-developing-ways-to-mitigate-dust-problem-for-explorers/ Photo credit: NASA/Dan Casper
Design and Status of RERTR Irradiation Tests in the Advanced Test Reactor
DOE Office of Scientific and Technical Information (OSTI.GOV)
Daniel M. Wachs; Richard G. Ambrosek; Gray Chang
2006-10-01
Irradiation testing of U-Mo based fuels is the central component of the Reduced Enrichment for Research and Test Reactors (RERTR) program fuel qualification plan. Several RERTR tests have recently been completed or are planned for irradiation in the Advanced Test Reactor (ATR) located at the Idaho National Laboratory in Idaho Falls, ID. Four mini-plate experiments in various stages of completion are described in detail, including the irradiation test design, objectives, and irradiation conditions. Observations made during and after the in-reactor RERTR-7A experiment breach are summarized. The irradiation experiment design and planned irradiation conditions for full-size plate test are described. Progressmore » toward element testing will be reviewed.« less
Kartashov, D A; Petrov, V M; Kolomenskiĭ, A V; Akatov, Iu A; Shurshakov, V A
2010-01-01
Russian space experiment "Matryeshka-R" was conducted in 2004-2005 to study dose distribution in the body of anthropomorphous phantom inserted in a spacesuit imitating container mounted on outer surface of the ISS Service module (experiment "Matryeshka"). The objective was to compare doses inside the phantom in the container to human body donned in spacesuit "Orlan-M" during extravehicular activity (EVA). The shielding function was calculated using the geometric model, specification of the phantom shielded by the container, "Orlan-M" description, and results of ground-based estimation of shielding effectiveness by gamma-raying. Doses were calculated from the dose attenuation curves obtained for galactic cosmic rays, and the AE-8/AP-8 models of electron and proton flows in Earth's radiation belt. Calculated ratios of equivalent doses in representative points of the body critical organs to analogous doses in phantom "Matryeshka" H(ORLAN-M)/H(Matryeshka) for identical radiation conditions vary with organs and solar activity in the range from 0.1 to 1.8 with organs and solar activity. These observations should be taken into account when applying Matryeshka data to the EVA conditions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Roesler, Stefan
2002-09-19
Energy spectra of high-energy neutrons and neutron time-of-flight spectra were calculated for the setup of experiment T-454 performed with a NE213 liquid scintillator at the Final Focus Test Beam (FFTB) facility at the Stanford Linear Accelerator Center. The neutrons were created by the interaction a 28.7 GeV electron beam in the aluminum beam dump of the FFTB which is housed inside a thick steel and concrete shielding. In order to determine the attenuation length of high-energy neutrons additional concrete shielding of various thicknesses was placed outside the existing shielding. The calculations were performed using the FLUKA interaction and transport code.more » The energy and time-of-flight were recorded for the location of the detector allowing a detailed comparison with the experimental data. A generally good description of the data is achieved adding confidence to the use of FLUKA for the design of shielding for high-energy electron accelerators.« less
Verification of Small Hole Theory for Application to Wire Chaffing Resulting in Shield Faults
NASA Technical Reports Server (NTRS)
Schuet, Stefan R.; Timucin, Dogan A.; Wheeler, Kevin R.
2011-01-01
Our work is focused upon developing methods for wire chafe fault detection through the use of reflectometry to assess shield integrity. When shielded electrical aircraft wiring first begins to chafe typically the resulting evidence is small hole(s) in the shielding. We are focused upon developing algorithms and the signal processing necessary to first detect these small holes prior to incurring damage to the inner conductors. Our approach has been to develop a first principles physics model combined with probabilistic inference, and to verify this model with laboratory experiments as well as through simulation. Previously we have presented the electromagnetic small-hole theory and how it might be applied to coaxial cable. In this presentation, we present our efforts to verify this theoretical approach with high-fidelity electromagnetic simulations (COMSOL). Laboratory observations are used to parameterize the computationally efficient theoretical model with probabilistic inference resulting in quantification of hole size and location. Our efforts in characterizing faults in coaxial cable are subsequently leading to fault detection in shielded twisted pair as well as analysis of intermittent faulty connectors using similar techniques.
Development and validation of a 2D dam break process model
USDA-ARS?s Scientific Manuscript database
Flooding due to dam or levee breach often results in detrimental impact on the people and their properties in the flooding zone. The embankment breach process is often caused by overtopping or internal erosion due to excessive water in a reservoir or a river. This study is to develop a practical nu...
29 CFR 4.191 - Complaints and compliance assistance.
Code of Federal Regulations, 2010 CFR
2010-07-01
... part 70) and the “Privacy Act of 1974” (5 U.S.C. 552a). (b) A report of breach or violation relating... identity of its confidential sources and to prevent an unwarranted invasion of personal privacy...) Any other report of breach or violation may be in writing and addressed to the Assistant Regional...
Recognizing and reducing risks: HIPAA privacy and security enforcement.
Wachler, Andrew B; Fehn, Amy K
2003-01-01
With the passing of the Health Insurance Portability and Accountability Act (HIPAA) privacy rule deadline and the security rule deadline looming, many covered entities are left wondering if they are doing enough to prevent privacy and security breaches and what type of exposure their organization could face in the event of a breach.
50 CFR 38.9 - Breach of the peace.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Breach of the peace. 38.9 Section 38.9 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR (CONTINUED) THE... arouse or gratify sexual desire of any other person, expose one's genitals under circumstances in which...
45 CFR 164.406 - Notification to the media.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 1 2013-10-01 2013-10-01 false Notification to the media. 164.406 Section 164.406... § 164.406 Notification to the media. (a) Standard. For a breach of unsecured protected health... the discovery of the breach as provided in § 164.404(a)(2), notify prominent media outlets serving the...
45 CFR 164.406 - Notification to the media.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Notification to the media. 164.406 Section 164.406... § 164.406 Notification to the media. (a) Standard. For a breach of unsecured protected health... the discovery of the breach as provided in § 164.404(a)(2), notify prominent media outlets serving the...
45 CFR 164.406 - Notification to the media.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 1 2014-10-01 2014-10-01 false Notification to the media. 164.406 Section 164.406... § 164.406 Notification to the media. (a) Standard. For a breach of unsecured protected health... the discovery of the breach as provided in § 164.404(a)(2), notify prominent media outlets serving the...
45 CFR 164.406 - Notification to the media.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 45 Public Welfare 1 2012-10-01 2012-10-01 false Notification to the media. 164.406 Section 164.406... § 164.406 Notification to the media. (a) Standard. For a breach of unsecured protected health... the discovery of the breach as provided in § 164.404(a)(2), notify prominent media outlets serving the...
45 CFR 164.406 - Notification to the media.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 1 2011-10-01 2011-10-01 false Notification to the media. 164.406 Section 164.406... § 164.406 Notification to the media. (a) Standard. For a breach of unsecured protected health... the discovery of the breach as provided in § 164.404(a)(2), notify prominent media outlets serving the...
2014-01-01
a similar problem. See Robert Jackall , Moral Mazes: The World of Corporate Managers, London: Oxford University Press, 2009. Contractor Incentives...Night Vision Goggles,” ITT Corporation press release, April 4, 2011. Jackall , Robert, Moral Mazes: The World of Corporate Managers, London: Oxford
ERIC Educational Resources Information Center
Chiu, Su-Fen; Peng, Jei-Chen
2008-01-01
This study investigated the main effects and the interaction effects of psychological contract breach and hostile attributional style on employee deviance (i.e., interpersonal deviance and organizational deviance). Data were collected from 233 employees and their supervisors in eight electronic companies in Taiwan. Results demonstrate that…
ERIC Educational Resources Information Center
Isaacs, Madelyn L.; Stone, Carolyn
2001-01-01
Describes the results of research that explored how mental health counselors consider the confidentiality of minors and conditions under which they would breach it. Results indicate that mental health counselors are protective of their minor clients' confidentiality rights with variation based on degree of seriousness and age of the client.…
Preparing the Pipeline: The U.S. Cyber Workforce for the Future
2012-08-01
duty and Reserve military personnel. As a result, VA spent $7 million to notify affected per- sonnel of the data breach , $100 million to offer 1 year...of free credit reporting to affected individuals, and also faced a class-action lawsuit from five veterans’ groups.16 The data breach occurred
Building Information Security Awareness at Wilmington University
ERIC Educational Resources Information Center
Hufe, Mark J.
2014-01-01
This executive position paper proposes recommendations for reducing the risk of a data breach at Wilmington University. A data breach could result in identity theft of students, faculty and staff, which is costly to the individual affected and costly to the University. The University has a legal and ethical obligation to provide safeguards against…
2013-01-25
The Department of Health and Human Services (HHS or ``the Department'') is issuing this final rule to: Modify the Health Insurance Portability and Accountability Act (HIPAA) Privacy, Security, and Enforcement Rules to implement statutory amendments under the Health Information Technology for Economic and Clinical Health Act (``the HITECH Act'' or ``the Act'') to strengthen the privacy and security protection for individuals' health information; modify the rule for Breach Notification for Unsecured Protected Health Information (Breach Notification Rule) under the HITECH Act to address public comment received on the interim final rule; modify the HIPAA Privacy Rule to strengthen the privacy protections for genetic information by implementing section 105 of Title I of the Genetic Information Nondiscrimination Act of 2008 (GINA); and make certain other modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (the HIPAA Rules) to improve their workability and effectiveness and to increase flexibility for and decrease burden on the regulated entities.
After the data breach: Managing the crisis and mitigating the impact.
Brown, Hart S
2016-01-01
Historically, the unauthorised access and theft of information was a tactic used between countries as part of espionage campaigns, during times of conflict as well as for personal and criminal purposes. The consumers of the information were relatively isolated and specific. As information became stored and digitised in larger quantities in the 1980s the ability to access mass amounts of records at one time became possible. The expertise needed to remotely access and exfiltrate the data was not readily available and the number of markets to monetise the data was limited. Over the past ten years, shadow networks have been used by criminals to collaborate on hacking techniques, exchange hacking advice anonymously and commercialise data on the black market. The intersection of these networks along with the unintentional losses of information have resulted in 5,810 data breaches made public since 2005 (comprising some 847,807,830 records) and the velocity of these events is increasing. Organisations must be prepared for a potential breach event to maintain cyber resiliency. Proper management of a breach response can reduce response costs and can serve to mitigate potential reputational losses.
Abdul-Wahab, Mohd Firdaus; Homma, Takayuki; Wright, Michael; Olerenshaw, Dee; Dafforn, Timothy R.; Nagata, Kazuhiro; Miller, Andrew D.
2013-01-01
Heat shock protein 47 (HSP47) is a single-substrate molecular chaperone crucial for collagen biosynthesis. Although its function is well established, the molecular mechanisms that govern binding to procollagen peptides and triple helices in the endoplasmic reticulum (followed by controlled release in the Golgi) are unclear. HSP47 binds procollagen at a neutral pH but releases at a pH similar to the pKa of the imidazole side chain of histidine residues. It thus seems likely that these residues are involved in this pH-dependent mechanism. Murine HSP47 has 14 histidine residues grouped into three clusters, known as the breach, gate, and shutter. Here, we report the use of histidine mutagenesis to demonstrate the relative contribution of these three clusters to HSP47 structure and the “pH switch.” Many of the tested mutants are silent; however, breach mutants H197A and H198A show binding but no apparent pH switch and are unable to control release. Another breach mutant, H191A, shows perturbed collagen release characteristics, consistent with observed perturbations in pH-driven trans-conformational changes. Thus, His-198, His-197 and His-191 are important (if not central) to HSP47 mechanism of binding/release to collagen. This is consistent with the breach cluster residues being well conserved across the HSP47 family. PMID:23212911
Compliance with children’s television food advertising regulations in Australia
2012-01-01
Background The objective of this study was to assess the effectiveness of the Australian co-regulatory system in limiting children’s exposure to unhealthy television food advertising by measuring compliance with mandatory and voluntary regulations. An audit was conducted on food and beverage television advertisements broadcast in five major Australian cities during children’s programming time from 1st September 2010 to 31st October 2010. The data were assessed against mandatory and voluntary advertising regulations, the information contained in an industry report of breaches, and the Australian Guide to Healthy Eating. Results During the two months of data collection there were a total of 951 breaches of the combined regulations. This included 619 breaches of the mandatory regulations (CTS) and 332 breaches of the voluntary regulations (RCMI and QSRI). Almost 83% of all food and beverages advertised during children’s programming times were for foods classified as ‘Extras’ in the Australian Guide to Healthy Eating. There were also breaches in relation to the amount of advertising repetition and the use of promotional appeals such as premium offers, competitions, and endorsements by popular children’s characters. The self-regulatory systems were found to have flaws in their reporting and there were errors in the Australian Food and Grocery Council’s compliance report. Conclusions This audit suggests that current advertising regulations are inadequate. Regulations need to be closely monitored and more tightly enforced to protect children from advertisements for unhealthy foods. PMID:23039855
ERIC Educational Resources Information Center
Leach, Tony
2017-01-01
This paper explores contested notions of the purpose of education and careers work. The research for the paper examines public sector employee reactions to notion of a psychological contract breach, when cuts in funding put their jobs and careers at risk. It argues that, in this environment, the search for career fulfilment can be marked by…
Loop-mediated isothermal amplification (LAMP) shield for Arduino DNA detection.
Velders, Aldrik H; Schoen, Cor; Saggiomo, Vittorio
2018-02-01
Loop-mediated isothermal amplification (LAMP) of DNA is gaining relevance as a method to detect nucleic acids, as it is easier, faster, and more powerful than conventional Polymerase Chain Reaction. However, LAMP is still mostly used in laboratory settings, because of the lack of a cheap and easy, one-button device that can perform LAMP experiments. Here we show how to build and program an Arduino shield for a LAMP and detection of DNA. The here described Arduino Shield is cheap, easy to assemble, to program and use, it is battery operated and the detection of DNA is done by naked-eye so that it can be used in field.
Testing and development of transfer functions for weighing precipitation gauges in WMO-SPICE
NASA Astrophysics Data System (ADS)
Kochendorfer, John; Nitu, Rodica; Wolff, Mareile; Mekis, Eva; Rasmussen, Roy; Baker, Bruce; Earle, Michael E.; Reverdin, Audrey; Wong, Kai; Smith, Craig D.; Yang, Daqing; Roulet, Yves-Alain; Meyers, Tilden; Buisan, Samuel; Isaksen, Ketil; Brækkan, Ragnar; Landolt, Scott; Jachcik, Al
2018-02-01
Weighing precipitation gauges are used widely for the measurement of all forms of precipitation, and are typically more accurate than tipping-bucket precipitation gauges. This is especially true for the measurement of solid precipitation; however, weighing precipitation gauge measurements must still be adjusted for undercatch in snowy, windy conditions. In WMO-SPICE (World Meteorological Organization Solid Precipitation InterComparison Experiment), different types of weighing precipitation gauges and shields were compared, and adjustments were determined for the undercatch of solid precipitation caused by wind. For the various combinations of gauges and shields, adjustments using both new and previously existing transfer functions were evaluated. For most of the gauge and shield combinations, previously derived transfer functions were found to perform as well as those more recently derived. This indicates that wind shield type (or lack thereof) is more important in determining the magnitude of wind-induced undercatch than the type of weighing precipitation gauge. It also demonstrates the potential for widespread use of the previously developed transfer functions. Another overarching result was that, in general, the more effective shields, which were associated with smaller unadjusted errors, also produced more accurate measurements after adjustment. This indicates that although transfer functions can effectively reduce measurement biases, effective wind shielding is still required for the most accurate measurement of solid precipitation.
Characterization of ZnBr2 solution as a liquid radiation shield for mobile hot cell window
NASA Astrophysics Data System (ADS)
Bahrin, Muhammad Hannan; Ahmad, Megat Harun Al Rashid Megat; Hasan, Hasni; Rahman, Anwar Abdul; Azman, Azraf; Hassan, Mohd Zaid; Mamat, Mohd Rizal B.; Muhamad, Shalina Sheikh; Hamzah, Mohd Arif; Jamro, Rafhayudi; Wo, Yii Mei; Hamssin, Nurliyana
2017-01-01
The Mobile Hot Cell (MHC) has a viewing window which is usually made of almost transparent radiation shield material for the safety of MHC operators. Mobility is the main criterion for MHC; therefore liquid solution that can act as a radiation shield is usually selected as the window for MHC due to ease of transportation instead of a solid glass. As reported, Zinc Bromide (ZnBr2) solution was successfully used in viewing window for MHCs in South Africa and China. It was chosen due to its transparent solution, excellent performance as radiation shielding for gamma radiation, ease in preparation, handling, storage and treatment. Nevertheless, data and baseline studies on ZnBr2 as radiation shield are quite few. Therefore, a study on this matter was carried out. The preparation of ZnBr2 solution was processed at laboratory scale and the radiation shielding experiments were carried out using Cs-137 as radiation source. ZnBr2 solution was prepared by mixing ZnBr2 powder with distilled water. The mixing percentage of ZnBr2 powder, (%wt.) was varied to study the effect of density on the attenuation coefficient. The findings from this study will be used as a guideline in the production and management of ZnBr2 solution for MHC applications.
NASA Technical Reports Server (NTRS)
Gnoffo, Peter A.
2003-01-01
A baseline solution for CFD Point 1 (Mach 24) in the STS-107 accident investigation was modified to include effects of: (1) holes through the leading edge into a vented cavity; and (2) a scarfed, conical nozzle directed toward the centerline of the vehicle from the forward, inboard corner of the landing gear door. The simulations were generated relatively quickly and early in the investigation because simplifications were made to the leading edge cavity geometry and an existing utility to merge scarfed nozzle grid domains with structured baseline external domains was implemented. These simplifications in the breach simulations enabled: (1) a very quick grid generation procedure; and (2) high fidelity corroboration of jet physics with internal surface impingements ensuing from a breach through the leading edge, fully coupled to the external shock layer flow at flight conditions. These simulations provided early evidence that the flow through a two-inch diameter (or larger) breach enters the cavity with significant retention of external flow directionality. A normal jet directed into the cavity was not an appropriate model for these conditions at CFD Point 1 (Mach 24). The breach diameters were of the same order or larger than the local, external boundary-layer thickness. High impingement heating and pressures on the downstream lip of the breach were computed. It is likely that hole shape would evolve as a slot cut in the direction of the external streamlines. In the case of the six-inch diameter breach the boundary layer is fully ingested. The intent of externally directed jet simulations in the second scenario was to approximately model aerodynamic effects of a relatively large internal wing pressure, fueled by combusting aluminum, which deforms the corner of the landing gear door and directs a jet across the windside surface. These jet interactions, in and of themselves, were not sufficiently large to explain observed aerodynamic behavior.
The DarkSide-50 outer detectors
NASA Astrophysics Data System (ADS)
Westerdale, S.; Agnes, P.; Agostino, L.; Albuquerque, I. F. M.; Alexander, T.; Alton, A. K.; Arisaka, K.; Back, H. O.; Baldin, B.; Biery, K.; Bonfini, G.; Bossa, M.; Bottino, B.; Brigatti, A.; Brodsky, J.; Budano, F.; Bussino, S.; Cadeddu, M.; Cadonati, L.; Cadoni, M.; Calaprice, F.; Canci, N.; Candela, A.; Cao, H.; Cariello, M.; Carlini, M.; Catalanotti, S.; Cavalcante, P.; Chepurnov, A.; Cocco, A. G.; Covone, G.; D'Angelo, D.; D'Incecco, M.; Davini, S.; De Cecco, S.; De Deo, M.; De Vincenzi, M.; Derbin, A.; Devoto, A.; Di Eusanio, F.; Di Pietro, G.; Edkins, E.; Empl, A.; Fan, A.; Fiorillo, G.; Fomenko, K.; Foster, G.; Franco, D.; Gabriele, F.; Galbiati, C.; Giganti, C.; Goretti, A. M.; Granato, F.; Grandi, L.; Gromov, M.; Guan, M.; Guardincerri, Y.; Hackett, B. R.; Herner, K. R.; Hungerford, E. V.; Aldo, Ianni; Andrea, Ianni; James, I.; Jollet, C.; Keeter, K.; Kendziora, C. L.; Kobychev, V.; Koh, G.; Korablev, D.; Korga, G.; Kubankin, A.; Li, X.; Lissia, M.; Lombardi, P.; Luitz, S.; Ma, Y.; Machulin, I. N.; Mandarano, A.; Mari, S. M.; Maricic, J.; Marini, L.; Martoff, C. J.; Meregaglia, A.; Meyers, P. D.; Miletic, T.; Milincic, R.; Montanari, D.; Monte, A.; Montuschi, M.; Monzani, M. E.; Mosteiro, P.; Mount, B. J.; Muratova, V. N.; Musico, P.; Napolitano, J.; Orsini, M.; Ortica, F.; Pagani, L.; Pallavicini, M.; Pantic, E.; Parmeggiano, S.; Pelczar, K.; Pelliccia, N.; Perasso, S.; Pocar, A.; Pordes, S.; Pugachev, D. A.; Qian, H.; Randle, K.; Ranucci, G.; Razeto, A.; Reinhold, B.; Renshaw, A. L.; Romani, A.; Rossi, B.; Rossi, N.; Rountree, S. D.; Sablone, D.; Saggese, P.; Saldanha, R.; Sands, W.; Sangiorgio, S.; Savarese, C.; Segreto, E.; Semenov, D. A.; Shields, E.; Singh, P. N.; DSkorokhvatov, M.; Smirnov, O.; Sotnikov, A.; Stanford, C.; Suvorov, Y.; Tartaglia, R.; Tatarowicz, J.; Testera, G.; Tonazzo, A.; Trinchese, P.; Unzhakov, E. V.; Vishneva, A.; Vogelaar, B.; Wada, M.; Walker, S.; Wang, H.; Wang, Y.; Watson, A. W.; Wilhelmi, J.; Wojcik, M. M.; Xiang, X.; Xu, J.; Yang, C.; Yoo, J.; Zavatarelli, S.; Zec, A.; Zhong, W.; Zhu, C.; Zuzel, G.; DarkSide Collaboration
2016-05-01
DarkSide-50 is a dark matter detection experiment searching for Weakly Interacting Massive Particles (WIMPs), in Gran Sasso National Laboratory. For experiments like DarkSide-50, neutrons are one of the primary backgrounds that can mimic WIMP signals. The experiment consists of three nested detectors: a liquid argon time projection chamber surrounded by two outer detectors. The outermost detector is a 10 m by 11 m cylindrical water Cherenkov detector with 80 PMTs, designed to provide shielding and muon vetoing. Inside the water Cherenkov detector is the 4 m diameter spherical boron-loaded liquid scintillator veto, with a cocktail of pseudocumene, trimethyl borate, and PPO wavelength shifter, designed to provide shielding, neutron vetoing, and in situ measurements of the TPC backgrounds. We present design and performance details of the DarkSide-50 outer detectors.
LDEF: Dosimetric measurement results (AO 138-7 experiment)
NASA Technical Reports Server (NTRS)
Bourrieau, J.
1993-01-01
One of the objectives of the AO 138-7 experiment on board the Long Duration Exposure Facility (LDEF) was a total dose measurement with Thermo Luminescent Detectors (TLD 100). Two identical packages, both of them including five TLD's inside various aluminum shields, are exposed to the space environment in order to obtain the absorbed dose profile. Radiation fluence received during the total mission length was computed, taking into account the trapped particles (AE8 and AP8 models during solar maximum and minimum periods) and the cosmic rays; due to the magnetospheric shielding the solar proton fluences are negligible on the LDEF orbit. The total dose induced by these radiations inside a semi infinite plane shield of aluminum are computed with the radiation transport codes available at DERTS. The dose profile obtained is in good agreement with the evaluation by E.V. Benton. TLD readings are performed after flight; due to the mission duration increase a post flight calibration was necessary in order to cover the range of the in flight induced dose. The results obtained, similar (plus or minus 30 percent) for both packages, are compared with the dose profile computation. For thick shields it seems that the measurements exceed the forecast (about 40 percent). That can be due to a cosmic ray and trapped proton contributions coming from the backside (assumed as perfectly shielded by the LDEF structure in the computation), or to an underestimate of the proton or cosmic ray fluences. A fine structural shielding analysis should be necessary in order to determine the origin of this slight discrepancy between forecast and in flight measurements. For the less shielded dosimeters, mainly exposed to the trapped electron flux, a slight overestimation of the dose (less than 40 percent) appears. Due to the dispersion of the TLD's response, this cannot be confirmed. In practice these results obtained on board LDEF, with less than a factor 1.4 between measurements and forecast, reinforce the validity of the computation methods and models used for the long term evaluation of the radiation levels (flux and dose) encountered in space on low inclination and altitude Earth orbits.
LDEF: Dosimetric measurement results (AO 138-7 experiment)
NASA Astrophysics Data System (ADS)
Bourrieau, J.
1993-04-01
One of the objectives of the AO 138-7 experiment on board the Long Duration Exposure Facility (LDEF) was a total dose measurement with Thermo Luminescent Detectors (TLD 100). Two identical packages, both of them including five TLD's inside various aluminum shields, are exposed to the space environment in order to obtain the absorbed dose profile. Radiation fluence received during the total mission length was computed, taking into account the trapped particles (AE8 and AP8 models during solar maximum and minimum periods) and the cosmic rays; due to the magnetospheric shielding the solar proton fluences are negligible on the LDEF orbit. The total dose induced by these radiations inside a semi infinite plane shield of aluminum are computed with the radiation transport codes available at DERTS. The dose profile obtained is in good agreement with the evaluation by E.V. Benton. TLD readings are performed after flight; due to the mission duration increase a post flight calibration was necessary in order to cover the range of the in flight induced dose. The results obtained, similar (plus or minus 30 percent) for both packages, are compared with the dose profile computation. For thick shields it seems that the measurements exceed the forecast (about 40 percent). That can be due to a cosmic ray and trapped proton contributions coming from the backside (assumed as perfectly shielded by the LDEF structure in the computation), or to an underestimate of the proton or cosmic ray fluences. A fine structural shielding analysis should be necessary in order to determine the origin of this slight discrepancy between forecast and in flight measurements. For the less shielded dosimeters, mainly exposed to the trapped electron flux, a slight overestimation of the dose (less than 40 percent) appears. Due to the dispersion of the TLD's response, this cannot be confirmed. In practice these results obtained on board LDEF, with less than a factor 1.4 between measurements and forecast, reinforce the validity of the computation methods and models used for the long term evaluation of the radiation levels (flux and dose) encountered in space on low inclination and altitude Earth orbits.
Scientific experiments on the flight of the 1979 biological satellite, draft plan
NASA Technical Reports Server (NTRS)
1979-01-01
The various physiological, biological, radiobiological, and radiation physics experiments to be conducted onboard the 1979 biological satellite are described. These experiments deal with the effects of space flight on living organisms, measurement of radiation, and possible methods of shielding spacecraft against such radiation.
NASA Astrophysics Data System (ADS)
Kumar, Anil; Prakash, Om; Ramakrishanan, S.
2014-04-01
A special sample measurement chamber has been developed to perform experiments at ultralow temperatures and ultralow magnetic field. A high permeability material known as cryoperm 10 and Pb is used to shield the measurement space consisting of the signal detecting set-up and the sample. The detecting setup consists of a very sensitive susceptibility coil wound on OFHC Cu bobbin.
1971-08-01
The Apollo Telescope Mount (ATM) was designed and developed by the Marshall Space Flight Center and served as the primary scientific instrument unit aboard Skylab (1973-1979). The ATM consisted of eight scientific instruments as well as a number of smaller experiments. One scientific instrument was the ATM solar shield that formed the base for the rack/frame instrument and the instrument canister. The solar shield contained aperture doors for each instrument to protect against solar radiation and space contamination.
24 CFR 982.453 - Owner breach of contract.
Code of Federal Regulations, 2010 CFR
2010-04-01
...) If the owner has committed fraud, bribery or any other corrupt or criminal act in connection with any..., bribery or any other corrupt or criminal act in connection with the mortgage or loan. (5) If the owner has... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Owner breach of contract. 982.453...
No harm done? Assessing risk of harm under the federal breach notification rule.
Dimick, Chris
2010-08-01
Provisions within the HITECH Act require that covered entities notify individuals if their protected health information is breached. However, the current regulation allows an exemption if the risk of harm is slight. Assessing risk can be subjective, and privacy officers have been working to create methods to conduct and document their analyses.
Case of disclosure of HIV status helps to clarify privacy law in Ontario.
Lang, Renée
2008-07-01
A judge in the Ontario Superior Court of Justice has dismissed a breach of privacy suit on the basis that the plaintiff failed to prove that the disclosure of his HIV status had caused him harm. The judgment set out guidelines for how future claims of breach of privacy should be addressed.
Code of Federal Regulations, 2010 CFR
2010-04-01
... will give the purchaser written notification of purchaser's default or breach of contract and the... purchaser loses rights and interest in the lot because of the purchaser's default or breach of contract... Report prior to signing a contract or agreement, you may cancel your contract or agreement by giving...
14 CFR § 1274.936 - Breach of safety or security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... environment. Safety is essential to NASA and is a material part of this contract. NASA's safety priority is to... Occupational Safety and Health Administration (OSHA) or by a state agency operating under an OSHA approved plan... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Breach of safety or security. § 1274.936...
ERIC Educational Resources Information Center
Restubog, Simon Lloyd D.; Bordia, Prashant; Bordia, Sarbari
2011-01-01
The current study extends past research by examining leader-member exchange as a mediator of the relationship between employee reports of psychological contract breach and career success. In addition, we tested a competing perspective in which we proposed that performance mediators (i.e., in-role performance and organizational citizenship…
Cybersecurity: Authoritative Reports and Resources
2013-07-25
Breaches: Is Federal Legislation Needed to Protect Consumers ? July 18, 2013 Energy and Commerce Commerce , Manufacturing and Trade Evaluating Privacy...and Commerce Commerce , Manufacturing and Trade Reporting Data Breaches: Is Federal Legislation Needed to Protect Consumers ? July 18, 2013 Energy... Consumer Credit Cybersecurity: An Overview of Risks to Critical Infrastructure July 26, 2011 Energy and Commerce Oversight and Investigations
Cybersecurity: Authoritative Reports and Resources
2013-10-25
Security Technologies Reporting Data Breaches: Is Federal Legislation Needed to Protect Consumers ? July 18, 2013 Energy and Commerce Commerce ...Protect Consumers ? July 18, 2013 Energy and Commerce Oversight and Investigation Cyber Espionage and the Theft of U.S. Intellectual Property and...protection for sensitive consumer data and timely notification in case of breach June 15, 2011 Energy and Commerce Commerce , Manufacturing, and
ERIC Educational Resources Information Center
Beckham, Joseph
1979-01-01
A cause of action for educational malpractice may well receive initial judicial recognition through successfully harmonizing allegations of breach of a statutory duty of care and acts of negligence of a type and magnitude that would distinguish a student-plaintiff's injuries from others for whose benefit the statutory duty was created. (Author)
ERIC Educational Resources Information Center
Smith, Gwendolynn T.
2012-01-01
The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…
9 CFR 201.217 - Reasonable period of time to remedy a breach of contract.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 9 Animals and Animal Products 2 2012-01-01 2012-01-01 false Reasonable period of time to remedy a breach of contract. 201.217 Section 201.217 Animals and Animal Products GRAIN INSPECTION, PACKERS AND... termination. These criteria do not limit a packer, swine contractor or live poultry dealer's rights under a...
9 CFR 201.217 - Reasonable period of time to remedy a breach of contract.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 9 Animals and Animal Products 2 2013-01-01 2013-01-01 false Reasonable period of time to remedy a breach of contract. 201.217 Section 201.217 Animals and Animal Products GRAIN INSPECTION, PACKERS AND... termination. These criteria do not limit a packer, swine contractor or live poultry dealer's rights under a...
9 CFR 201.217 - Reasonable period of time to remedy a breach of contract.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 9 Animals and Animal Products 2 2014-01-01 2014-01-01 false Reasonable period of time to remedy a breach of contract. 201.217 Section 201.217 Animals and Animal Products GRAIN INSPECTION, PACKERS AND... termination. These criteria do not limit a packer, swine contractor or live poultry dealer's rights under a...
A cybersecurity primer for translational research.
Perakslis, Eric D; Stanley, Martin
2016-01-20
Virtually all health care organizations have had at least one data breach since 2012. Most of the largest data breaches and Health Care Information Privacy and Accountability Act fines could have been prevented by the simplest of strategies. Each researcher must clearly understand his or her responsibilities and liability. Copyright © 2016, American Association for the Advancement of Science.
2010-05-17
System), or American company with factory in Malaysia (Smart Modular) Technology Is A Focal Point Of Attacks Who is behind data breaches ? 74% resulted...military style community of hackers learning from each other. 8 8 * Source – 2009 Verizon Data Breach Investigations Report 38% 32% There are also 100,000
Preparing the Pipeline: The U.S. Cyber Workforce for the Future (Defense Horizons, Number 72)
2012-08-01
duty and Reserve military personnel. As a result, VA spent $7 million to notify affected per- sonnel of the data breach , $100 million to offer 1 year...of free credit reporting to affected individuals, and also faced a class-action lawsuit from five veterans’ groups.16 The data breach occurred
2015-01-01
York: Oxford University Press, 2013, pp. 196–201. 11 See, for example: Verizon RISK Team, 2013 Data Breach Investigations Report, Verizon, 2013; David...doctrine/new_pubs/jp1_02.pdf Verizon RISK Team, 2013 Data Breach Investigations Report, Verizon, 2013. As of December 29, 2013: http
Establishing breach of the duty of care in the tort of negligence.
Tingle, John
This article, the third in a series on clinical negligence, looks at the law surrounding breach of the duty of care in negligence. It shows some of the principles that judges and lawyers use in order to decide whether a person has broken his/her duty of care in the tort of negligence. It will be seen that the principles are contained in decided court cases, some of which are quite old but are still relevant today. The focus of this article is on the rule that courts, in deciding the issue of a breach of duty of care, would judge the defendant's conduct by the standard of what the hypothetical, 'reasonable person' would have done in the circumstances of the case.
Cosmic Radiation Exposure of Biological Test Systems During the EXPOSE-E Mission
Hajek, Michael; Bilski, Pawel; Körner, Christine; Vanhavere, Filip; Reitz, Günther
2012-01-01
Abstract In the frame of the EXPOSE-E mission on the Columbus external payload facility EuTEF on board the International Space Station, passive thermoluminescence dosimeters were applied to measure the radiation exposure of biological samples. The detectors were located either as stacks next to biological specimens to determine the depth dose distribution or beneath the sample carriers to determine the dose levels for maximum shielding. The maximum mission dose measured in the upper layer of the depth dose part of the experiment amounted to 238±10 mGy, which relates to an average dose rate of 408±16 μGy/d. In these stacks of about 8 mm height, the dose decreased by 5–12% with depth. The maximum dose measured beneath the sample carriers was 215±16 mGy, which amounts to an average dose rate of 368±27 μGy/d. These values are close to those assessed for the interior of the Columbus module and demonstrate the high shielding of the biological experiments within the EXPOSE-E facility. Besides the shielding by the EXPOSE-E hardware itself, additional shielding was experienced by the external structures adjacent to EXPOSE-E, such as EuTEF and Columbus. This led to a dose gradient over the entire exposure area, from 215±16 mGy for the lowest to 121±6 mGy for maximum shielding. Hence, the doses perceived by the biological samples inside EXPOSE-E varied by 70% (from lowest to highest dose). As a consequence of the high shielding, the biological samples were predominantly exposed to galactic cosmic heavy ions, while electrons and a significant fraction of protons of the radiation belts and solar wind did not reach the samples. Key Words: Space radiation—Dosimetry—Passive radiation detectors—Thermoluminescence—EXPOSE-E. Astrobiology 12, 387–392. PMID:22680685
SU-E-T-495: Neutron Induced Electronics Failure Rate Analysis for a Single Room Proton Accelerator
DOE Office of Scientific and Technical Information (OSTI.GOV)
Knutson, N; DeWees, T; Klein, E
2014-06-01
Purpose: To determine the failure rate as a function of neutron dose of the range modulator's servo motor controller system (SMCS) while shielded with Borated Polyethylene (BPE) and unshielded in a single room proton accelerator. Methods: Two experimental setups were constructed using two servo motor controllers and two motors. Each SMCS was then placed 30 cm from the end of the plugged proton accelerator applicator. The motor was then turned on and observed from outside of the vault while being irradiated to known neutron doses determined from bubble detector measurements. Anytime the motor deviated from the programmed motion a failuremore » was recorded along with the delivered dose. The experiment was repeated using 9 cm of BPE shielding surrounding the SMCS. Results: Ten SMCS failures were recorded in each experiment. The dose per monitor unit for the unshielded SMCS was 0.0211 mSv/MU and 0.0144 mSv/MU for the shielded SMCS. The mean dose to produce a failure for the unshielded SMCS was 63.5 ± 58.3 mSv versus 17.0 ±12.2 mSv for the shielded. The mean number of MUs between failures were 2297 ± 1891 MU for the unshielded SMCS and 2122 ± 1523 MU for the shielded. A Wilcoxon Signed Ranked test showed the dose between failures were significantly different (P value = 0.044) while the number of MUs between failures were not (P value = 1.000). Statistical analysis determined a SMCS neutron dose of 5.3 mSv produces a 5% chance of failure. Depending on the workload and location of the SMCS, this failure rate could impede clinical workflow. Conclusion: BPE shielding was shown to not reduce the average failure of the SMCS and relocation of the system outside of the accelerator vault was required to lower the failure rate enough to avoid impeding clinical work flow.« less
Konishi, Yuki; Hayashi, Hiroaki; Takegami, Kazuki; Fukuda, Ikuma; Ueno, Junji
2014-01-01
A cloud chamber is a detector that can visualize the tracks of charged particles. Hayashi, et al. suggested a visualization experiment in which X-rays generated by diagnostic X-ray equipment were directed into a cloud chamber; however, there was a problem in that the wall of the cloud chamber scattered the incoming X-rays. In this study, we developed a new cloud chamber with entrance windows. Because these windows are made of thin film, we were able to direct the X-rays through them without contamination by scattered X-rays from the cloud chamber wall. We have newly proposed an experiment in which beta-particles emitted from radioisotopes are directed into a cloud chamber. We place shielding material in the cloud chamber and visualize the various shielding effects seen with the material positioned in different ways. During the experiment, electrons scattered in the air were measured quantitatively using GM counters. We explained the physical phenomena in the cloud chamber using Monte Carlo simulation code EGS5. Because electrons follow a tortuous path in air, the shielding material must be placed appropriately to be able to effectively block their emissions. Visualization of the tracks of charged particles in this experiment proved effective for instructing not only trainee radiological technologists but also different types of healthcare professionals.
Innovative Research Program: Supershields for Gamma-Ray Astronomy
NASA Technical Reports Server (NTRS)
Hailey, Charles J.
2000-01-01
The supershield project evaluated the importance of novel shield configurations for suppressing neutron induced background in new classes of gamma-ray detectors such as CZT. The basic concept was to use a two-part shield. The outer shield material heavily moderates the incoming neutron spectrum. This moderated neutron beam is then more easily absorbed by the inner material, which is an efficient neutron absorber. This approach is, in principle, more efficient than that in previous attempts to make neutron shields. These previous attempts involved biatomic, monlithic shields (eg. LiH) in which the shield consisted of a single material but with two types of atoms - one for moderating and one for absorbing. The problem with this type of monolithic shield is that moderating neutrons, without the efficient absorption of them, leads to the leakage into the detector of neutrons with a low energy component (approx. 10-100 KeV). These energy neutrons are particularly problematic for many types of detectors. The project was roughly divided into phases. In the first phase we attempted to carefully define the neutron source function incident on any space instrument. This is essential since the design of any shield depends on the shape of the incident neutron spectrum. We found that approximations commonly used in gamma-ray astronomy for photon background is inadequate. In addition, we found that secondary neutrons produced in any passive shield, and dominated by inelastic neutron scattering, are far more important than background due to neutron activation. The second phase of our work involved design of supershield geometries (one and three dimensional) in order to compare different shield configurations and materials for their effectiveness as neutron shields. Moreover we wanted to compare these supershields with previous neutron shields to confirm the performance differences between the supershield (two material) and monolithic (one material) designs and to understand the physics origins of these differences more clearly. The third phase of the supershield program involved the benchmarking of the supershield designs through direct experimental verification. This required fabricating various supershields and exposing them to beams of neutrons to directly characterize their performance. With explicit verification that our modeling procedures can be used with confidence, we are now in a position to design shields for realistic space geometries. Using the supershield modeling capacity developed as part of this program we are attempting to evaluate their utility for a specific proposed mission--the Energetic X-ray Imaging Survey Telescope (EXIST). It is anticipated that this experiment, which is limited by internal background at high energies, might benefit from a neutron shield.
Stress improves selective attention towards emotionally neutral left ear stimuli.
Hoskin, Robert; Hunter, M D; Woodruff, P W R
2014-09-01
Research concerning the impact of psychological stress on visual selective attention has produced mixed results. The current paper describes two experiments which utilise a novel auditory oddball paradigm to test the impact of psychological stress on auditory selective attention. Participants had to report the location of emotionally-neutral auditory stimuli, while ignoring task-irrelevant changes in their content. The results of the first experiment, in which speech stimuli were presented, suggested that stress improves the ability to selectively attend to left, but not right ear stimuli. When this experiment was repeated using tonal stimuli the same result was evident, but only for female participants. Females were also found to experience greater levels of distraction in general across the two experiments. These findings support the goal-shielding theory which suggests that stress improves selective attention by reducing the attentional resources available to process task-irrelevant information. The study also demonstrates, for the first time, that this goal-shielding effect extends to auditory perception. Copyright © 2014 Elsevier B.V. All rights reserved.
INDIRECT EFFECT OF X-RADIATION ON BONE GROWTH IN RATS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Conard, R.A.
1962-12-21
Effects of 200 to 600 r of x irradiation on tibial bone growth in groups of weanling male rats were studied by in vivo measurement of tibial bone growth in serial radiographs. By comparison of growth rates in shielded with unshielded legs, direct and indirect effects of radiation were demonstrated, both roughly dose dependent, but with the indirect effect being about twice that of the direct effect. Pair-feeding experiments showed that about 70% of the indirect effect was due to radiation-induced lowered food consumption. By partial-body shielding experiments, using pnir-fed controls, it was shown that the abdomen may be themore » site of a non-nutritional abscopal effect. (auth)« less
Laenen, Antonius; Orzol, L.L.
1987-01-01
A recent evaluation of groundwater and material in the blockage impounding Castle Lake shows that the blockage is potentially unstable against failure from piping due to heave and internal erosion when groundwater levels are seasonally high. There is also a remote possibility that a 6.8 or greater magnitude earthquake could occur in the Castle Lake area when groundwater levels are critically high. If this situation occurs, the debris blockage that confines Castle Lake could breach from successive slope failure with liquefaction of a portion of the blockage. A dam-break computer model was used to simulate discharge through a hypothetical breach in the Castle Lake blockage that could be caused by failure by heave, internal erosion, or liquefaction. Approximately 18,500 acre-ft of stored water would be released from an assumed breach that fully developed to a 1,000-ft width over a 15-minute time period. The resulting flood, incorporating 3.4 x 10 to the 6th power cu yd of the debris blockage, would reach a peak magnitude of 1,500,000 cu ft/s (cubic feet per second). The flood is also assumed to incorporate an additional 137x10 to the 6th power cu yd of saturated debris material from downstream deposits. Flow is considered to be hyperconcentrated with sediment throughout the course of the flood. The hypothetical hyperconcentrated flow is routed downstream, superimposed on normal winter flood flows by use of a one-dimensional unsteady-state numerical streamflow simulation model. From a starting magnitude of 1,500,000 cu ft/s, the peak increases to 2,100,000 cu ft/s at N-1 Dam (12 mi downstream) and attenuates to 1,200,000 cu ft/s at Kid Valley (25 mi downstream) , to 100,000 cu ft/s at Longview and the confluence of the Columbia River (65 mi downstream). From time of breach, the flood peak would take 2.2 hr to reach Toutle, 3.8 hr to reach Castle Rock, and 8.5 hr to reach Longview. Communities of Toutle , Castle Rock, Kelso, and Longview would experience extreme to moderate flooding for this scenario. (Author 's abstract)
NASA Astrophysics Data System (ADS)
Salese, Francesco; Di Achille, Gaetano; Neesemann, Adrian; Ori, Gian Gabriele; Hauber, Ernst
2016-04-01
Moa Valles is a well-preserved paleodrainage system that is nearly 300-km-long and carved into ancient highland terrains west of Idaeus Fossae. The paleofluvial system apparently originated from fluidized ejecta blankets, and it consists of a series of dam-breach paleolakes with associated fan-shaped sedimentary deposits. This paleofluvial system shows a rich morphological record of hydrologic activity in the highlands of Mars. Based on crater counting the latter activity seems to be Amazonian in age (2.43 - 1.41 Ga). This work is based on a digital elevation model (DEM) derived from Context camera (CTX) and High Resolution Imaging Science Experiment (HiRISE) stereo images. Our goals are to (a) study the complex channel flow paths draining into Idaeus Fossae after forming a series of dam-breach paleolakes and to (b) investigate the origin and evolution of this valley system with its implications for climate and tectonic control. The first part of the system is characterized by many paleolakes, which are interconnected and drain eastward into Liberta crater, forming a complex and multilobate deltaic deposit exhibiting a well-developed channelized distributary pattern with evidence of switching on the delta plain. A breach area, consisting of three spillover channels, is present in the eastern part of the crater rim. These channels connect the Liberta crater to the eastward portion of the valley system, continuing toward Moa Valles with a complex pattern of anabranching channels that is more than 180-km-long. Our crater counting results and hydrological calculations of infilling and spillover discharges of the Liberta crater-lake suggest that the system is the result of an Early Amazonian water-rich environment that was likely sustained by relatively short fluvial events (<102 years), thereby supporting the hypotheses that water-related erosion might have been active on Mars (at least locally) during the Amazonian. The most important water source for the system could have been shallow ice melting triggered by impact craters. Indeed, the stratigraphic relationships between channels and crater ejecta show very clearly that the channels cut through the ejecta thus postdating them. The occurrence of relatively recent (likely Amazonian) hydrological activity supports the hypothesis that hydrological activity could have been possible, at least locally, after the Noachian-Hesperian boundary.
State-Dependent Decisions Cause Apparent Violations of Rationality in Animal Choice
Schuck-Paim, Cynthia; Pompilio, Lorena
2004-01-01
Normative models of choice in economics and biology usually expect preferences to be consistent across contexts, or “rational” in economic language. Following a large body of literature reporting economically irrational behaviour in humans, breaches of rationality by animals have also been recently described. If proven systematic, these findings would challenge long-standing biological approaches to behavioural theorising, and suggest that cognitive processes similar to those claimed to cause irrationality in humans can also hinder optimality approaches to modelling animal preferences. Critical differences between human and animal experiments have not, however, been sufficiently acknowledged. While humans can be instructed conceptually about the choice problem, animals need to be trained by repeated exposure to all contingencies. This exposure often leads to differences in state between treatments, hence changing choices while preserving rationality. We report experiments with European starlings demonstrating that apparent breaches of rationality can result from state-dependence. We show that adding an inferior alternative to a choice set (a “decoy”) affects choices, an effect previously interpreted as indicating irrationality. However, these effects appear and disappear depending on whether state differences between choice contexts are present or not. These results open the possibility that some expressions of maladaptive behaviour are due to oversights in the migration of ideas between economics and biology, and suggest that key differences between human and nonhuman research must be recognised if ideas are to safely travel between these fields. PMID:15550984
Hamasaki, Tomoko; Hagihara, Akihito
2011-04-21
A physician's duty to provide an adequate explanation to the patient is derived from the doctrine of informed consent and the physician's duty of disclosure. However, findings are extremely limited with respect to physicians' specific explanatory behaviours and what might be regarded as a breach of the physicians' duty to explain in an actual medical setting. This study sought to identify physicians' explanatory behaviours that may be related to the physicians' legal liability. We analysed legal decisions of medical malpractice cases between 1990 and 2009 in which the pivotal issue was the physician's duty to explain (366 cases). To identify factors related to the breach of the physician's duty to explain, an analysis was undertaken based on acknowledged breaches with regard to the physician's duty to explain to the patient according to court decisions. Additionally, to identify predictors of physicians' behaviours in breach of the duty to explain, logistic regression analysis was performed. When the physician's explanation was given before treatment or surgery (p = 0.006), when it was relevant or specific (p = 0.000), and when the patient's consent was obtained (p = 0.002), the explanation was less likely to be deemed inadequate or a breach of the physician's duty to explain. Patient factors related to physicians' legally problematic explanations were patient age and gender. One physician factor was related to legally problematic physician explanations, namely the number of physicians involved in the patient's treatment. These findings may be useful in improving physician-patient communication in the medical setting.
2011-01-01
Background A physician's duty to provide an adequate explanation to the patient is derived from the doctrine of informed consent and the physician's duty of disclosure. However, findings are extremely limited with respect to physicians' specific explanatory behaviours and what might be regarded as a breach of the physicians' duty to explain in an actual medical setting. This study sought to identify physicians' explanatory behaviours that may be related to the physicians' legal liability. Methods We analysed legal decisions of medical malpractice cases between 1990 and 2009 in which the pivotal issue was the physician's duty to explain (366 cases). To identify factors related to the breach of the physician's duty to explain, an analysis was undertaken based on acknowledged breaches with regard to the physician's duty to explain to the patient according to court decisions. Additionally, to identify predictors of physicians' behaviours in breach of the duty to explain, logistic regression analysis was performed. Results When the physician's explanation was given before treatment or surgery (p = 0.006), when it was relevant or specific (p = 0.000), and when the patient's consent was obtained (p = 0.002), the explanation was less likely to be deemed inadequate or a breach of the physician's duty to explain. Patient factors related to physicians' legally problematic explanations were patient age and gender. One physician factor was related to legally problematic physician explanations, namely the number of physicians involved in the patient's treatment. Conclusion These findings may be useful in improving physician-patient communication in the medical setting. PMID:21510891
Merritts, Dorothy; Walter, Robert; Rahnis, Michael; Hartranft, Jeff; Cox, Scott; Gellis, Allen; Potter, Noel; Hilgartner, William; Langland, Michael; Manion, Lauren; Lippincott, Caitlin; Siddiqui, Sauleh; Rehman, Zain; Scheid, Chris; Kratz, Laura; Shilling, Andrea; Jenschke, Matthew; Datin, Katherine; Cranmer, Elizabeth; Reed, Austin; Matuszewski, Derek; Voli, Mark; Ohlson, Erik; Neugebauer, Ali; Ahamed, Aakash; Neal, Conor; Winter, Allison; Becker, Steven
2011-01-01
Recently, widespread valley-bottom damming for water power was identified as a primary control on valley sedimentation in the mid-Atlantic US during the late seventeenth to early twentieth century. The timing of damming coincided with that of accelerated upland erosion during post-European settlement land-use change. In this paper, we examine the impact of local drops in base level on incision into historic reservoir sediment as thousands of ageing dams breach. Analysis of lidar and field data indicates that historic milldam building led to local base-level rises of 2-5 m (typical milldam height) and reduced valley slopes by half. Subsequent base-level fall with dam breaching led to an approximate doubling in slope, a significant base-level forcing. Case studies in forested, rural as well as agricultural and urban areas demonstrate that a breached dam can lead to stream incision, bank erosion and increased loads of suspended sediment, even with no change in land use. After dam breaching, key predictors of stream bank erosion include number of years since dam breach, proximity to a dam and dam height. One implication of this work is that conceptual models linking channel condition and sediment yield exclusively with modern upland land use are incomplete for valleys impacted by milldams. With no equivalent in the Holocene or late Pleistocene sedimentary record, modern incised stream-channel forms in the mid-Atlantic region represent a transient response to both base-level forcing and major changes in land use beginning centuries ago. Similar channel forms might also exist in other locales where historic milling was prevalent.
Preliminary skyshine calculations for the Poloidal Diverter Tokamak Experiment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nigg, D.W.; Wheeler, F.J.
1981-01-01
The Poloidal Diverter Experiment (PDX) facility at Princeton University is the first operating tokamak to require substantial radiation shielding. A calculational model has been developed to estimate the radiation dose in the PDX control room and at the site boundary due to the skyshine effect. An efficient one-dimensional method is used to compute the neutron and capture gamma leakage currents at the top surface of the PDX roof shield. This method employs an S /SUB n/ calculation in slab geometry and, for the PDX, is superior to spherical models found in the literature. If certain conditions are met, the slabmore » model provides the exact probability of leakage out the top surface of the roof for fusion source neutrons and for capture gamma rays produced in the PDX floor and roof shield. The model also provides the correct neutron and capture gamma leakage current spectra and angular distributions, averaged over the top roof shield surface. For the PDX, this method is nearly as accurate as multidimensional techniques for computing the roof leakage and is much less costly. The actual neutron skyshine dose is computed using a Monte Carlo model with the neutron source at the roof surface obtained from the slab S /SUB n/ calculation. The capture gamma dose is computed using a simple point-kernel single-scatter method.« less
Does the lead apron and collar always reduce radiation dose?
Nortje, C J; Harris, A M; Lackovic, K P; Wood, R E
2001-11-01
The possibility that personal lead shielding devices can increase absorption of radiation has not been entertained. The purpose of the present investigation specifically was to determine whether pituitary dose might be increased when a leaded apron and thyroid collar are used. Thermoluminescent dosimeters (TLDs) were used to measure absorbed dose. They were calibrated at the kVp used in the clinical situation and a calibration curve relating light output to dose was generated. Lithium fluoride TLD discs were placed in the pituitary gland region of a Rando-Alderson female human phantom. The equivalent of 100 transpharyngeal exposures were delivered. The resultant light output from recovered dosimeters was converted to a uGy value using the calibration curve. The experiment was repeated using a 0.25 mm lead equivalent collar and apron fitted to the phantom in the customary manner. The entire process was repeated in order to have 30 dosimeters for the unshielded and 30 dosimeters for the shielded conditions. A further 30 dosimeters were sham irradiated and served as controls. A statistical comparison between unshielded and shielded conditions was performed. When the leaded apron and thyroid collar were used the absorbed dose to the pituitary gland was increased significantly (P < 0.05). Following this a second group, using a different dosimetry system and a male phantom repeated the experiment. In both cases, the shielded phantom received significantly higher dose to the pituitary region than the unshielded.
Geomorphic response of the Sandy River, Oregon, to removal of Marmot Dam
Major, Jon J.; O'Connor, Jim E.; Podolak, Charles J.; Keith, Mackenzie K.; Grant, Gordon E.; Spicer, Kurt R.; Pittman, Smokey; Bragg, Heather M.; Wallick, J. Rose; Tanner, Dwight Q.; Rhode, Abagail; Wilcock, Peter R.
2012-01-01
The October 2007 breaching of a temporary cofferdam constructed during removal of the 15-meter (m)-tall Marmot Dam on the Sandy River, Oregon, triggered a rapid sequence of fluvial responses as ~730,000 cubic meters (m3) of sand and gravel filling the former reservoir became available to a high-gradient river. Using direct measurements of sediment transport, photogrammetry, airborne light detection and ranging (lidar) surveys, and, between transport events, repeat ground surveys of the reservoir reach and channel downstream, we monitored the erosion, transport, and deposition of this sediment in the hours, days, and months following breaching of the cofferdam. Rapid erosion of reservoir sediment led to exceptional suspended-sediment and bedload-sediment transport rates near the dam site, as well as to elevated transport rates at downstream measurement sites in the weeks and months after breaching. Measurements of sediment transport 0.4 kilometers (km) downstream of the dam site during and following breaching show a spike in the transport of fine suspended sediment within minutes after breaching, followed by high rates of suspended-load and bedload transport of sand. Significant transport of gravel bedload past the measurement site did not begin until 18 to 20 hours after breaching. For at least 7 months after breaching, bedload transport rates just below the dam site during high flows remained as much as 10 times above rates measured upstream of the dam site and farther downstream. The elevated sediment load was derived from eroded reservoir sediment, which began eroding when a meters-tall knickpoint migrated about 200 m upstream in the first hour after breaching. Rapid knickpoint migration triggered vertical incision and bank collapse in unconsolidated sand and gravel, leading to rapid channel widening. Over the following days and months, the knickpoint migrated upstream more slowly, simultaneously decreasing in height and becoming less distinct. Within 7 months, the knickpoint had migrated 2 km upstream from the dam site and became a riffle-like feature approximately 1 m high and a few tens of meters long. Knickpoint migration, vertical incision, and lateral erosion evacuated about 15 percent of the initial reservoir volume (125,000 m3) within 60 hours following breaching, and by the end of the high flows in May 2008, about 50 percent of the volume had been evacuated. Large stormflows in November 2008 and January 2009 eroded another 6 percent of the original volume of impounded sediment. Little additional sediment eroded during the remainder of the second year following breaching. The rapid erosion of sediment by the modest flow that accompanied dam breaching was driven mainly by the steep hydraulic gradient associated with the abrupt change of base level and knickpoint formation and was aided by the unconsolidated and cohesionless character of the reservoir sediment. In the ensuing months, transport competence diminished as channel geometry evolved and the river gradient through the reservoir reach diminished. Changes in profile gradient in conjunction with channel coarsening and widening led to a rapid slowing of the rate of reservoir erosion. Sediment transport and deposition were strongly controlled by channel-gradient discontinuities and valley morphology downstream of the dam site. Those influences led to a strong divergence of sand and gravel transport and to deposition of a sediment wedge, as much as 4 m thick, that tapered to the preremoval channel bed 1.3 km downstream of the dam site. After 2 years, that deposit contained about 25 percent of the total volume of sediment eroded from the reservoir. The balance was distributed among pools within the Sandy River gorge, a narrow bedrock canyon extending 2 to 9 km downstream of the dam site, and along the channel farther downstream. A two-fraction sediment budget for the first year following breaching indicates that most of the gravel eroded from the reservoir reach was deposited within the sediment wedge and within the gorge, whereas eroded sand largely passed through the gorge and was broadly dispersed farther downstream. The sequence of transporting flows affected the specific trajectory of reservoir erosion and downstream sediment transport during the 2 years following breaching. However, because the overall erosion was largely a consequence of knickpoint retreat and channel widening, which in the 2 years after removal had affected most of the reservoir reach, it is unlikely that the specific sequence of flows significantly affected the overall outcome. Because the knickpoint had largely passed through the reservoir within 2 years, and the remaining reservoir sediment is mostly isolated high above armored or bedrock banks, it is unlikely that substantial additional sediment from the reservoir site will enter the system unless very large flows occur. Continued channel evolution downstream of the dam site is probable as deposits formed in the first 2 years are episodically mobilized. Below the Sandy River gorge, detection of effects related to release of reservoir sediment is challenging, especially in areas of sand deposition, because of the high background supply of sand in the river and substantial channel dynamism.
Mackenzie, Geraldine; Carter, Hugh
2010-01-01
This chapter gives an educational overview of: * An awareness of the legal issues involved in health informatics * The need for the privacy and security of the patient record * The legal consequences of a breach of the security of the patient record * The concept of privacy law and what precautions ought to be taken to minimize legal liability for a breach of privacy and/or confidentiality.
ERIC Educational Resources Information Center
Deliyianni, Eleni; Monoyiou, Annita; Elia, Iliada; Georgiou, Chryso; Zannettou, Eleni
2009-01-01
This study investigated the modes of representations generated by kindergarteners and first graders while solving standard and problematic problems in mathematics. Furthermore, it examined the influence of pupils' visual representations on the breach of the didactical contract rules in problem solving. The sample of the study consisted of 38…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-12
... powerhouse containing three units. Currently, there is a 50- to 60-foot-wide breach in the dam. The project... the Oakland Project because it lost its power sales contract. Since that time, the powerhouse..., the breach expanded leaving a 50- to 60-foot- wide opening in the dam. In April 2011, the Commission...
Suitable Penalty for Breach of Contract: AFROTC Cadets. A Research Report Submitted to the Faculty.
ERIC Educational Resources Information Center
Reese, Robert D.
A legislative history of financial incentives in the Reserve Officer Training Corps gives perspective to an analysis of present law and policy concerning breach of contract for Air Force ROTC cadets. The changed environment, criticisms of the present law and policy, and the example of three other Western nations with all volunteer militaries are…
25 CFR 224.87 - What are the obligations of a tribe if it discovers a violation or breach?
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false What are the obligations of a tribe if it discovers a violation or breach? 224.87 Section 224.87 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS TRIBAL ENERGY RESOURCE AGREEMENTS UNDER THE INDIAN TRIBAL ENERGY DEVELOPMENT AND SELF...
2009-01-01
Plaintiffs are not entitled to emotional distress damages under the Labor-Management Relations Act (LMRA) when an employer breaches a collective bargaining agreement by failing to provide retiree health benefits. Plaintiffs may recover damages for the cost of replacement insurance incurred as a result of such a breach.
78 FR 79481 - Summary of Commission Practice Relating to Administrative Protective Orders
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-30
... breach of the Commission's APOs. APO breach inquiries are considered on a case-by- case basis. As part of... suitable container (N.B.: storage of BPI on so-called hard disk computer media is to be avoided, because mere erasure of data from such media may not irrecoverably destroy the BPI and may result in violation...