Spelling suggestions: "subject:"deprotection."" "subject:"coprotection.""
711 |
Estudo da metodologia de analise de series temporais aplicada a monitoracao do tempo de resposta dos instrumentos ligados ao sistema de protecao de reatores nuclearesLOPES, PAULO R. de L. 09 October 2014 (has links)
Made available in DSpace on 2014-10-09T12:40:44Z (GMT). No. of bitstreams: 0 / Made available in DSpace on 2014-10-09T14:06:41Z (GMT). No. of bitstreams: 1
02752.pdf: 9313866 bytes, checksum: e570b355f24e91b0efa7ade917c2797b (MD5) / Dissertacao (Mestrado) / IPEN/D / Instituto de Pesquisas Energeticas e Nucleares - IPEN/CNEN-SP
|
712 |
Desenvolvimento de um modelo matematico para o rim e estimativa da fracao absorvida especifica utilizando o metodo de Monte CarloTODO, ALBERTO S. 09 October 2014 (has links)
Made available in DSpace on 2014-10-09T12:25:57Z (GMT). No. of bitstreams: 0 / Made available in DSpace on 2014-10-09T14:06:45Z (GMT). No. of bitstreams: 1
10921.pdf: 2839004 bytes, checksum: c375129d3c2c573c9d513c0bb7daa333 (MD5) / Dissertacao (Mestrado) / IEA/D / Instituto de Pesquisas Energeticas e Nucleares - IPEN/CNEN-SP
|
713 |
Unificação de parâmetros de proteção radiológica para programas de treinamento de profissionais de radiofarmácia hospitalarCarvalho, Juliane de Sá, Instituto de Engenharia Nuclear 06 1900 (has links)
Submitted by Almir Azevedo (barbio1313@gmail.com) on 2018-08-13T12:30:08Z
No. of bitstreams: 1
dissertação mestrado ien 2018 Juliane de Sá Carvalho.pdf: 773861 bytes, checksum: 2659032c499066d29bd53a810450aa21 (MD5) / Made available in DSpace on 2018-08-13T12:30:08Z (GMT). No. of bitstreams: 1
dissertação mestrado ien 2018 Juliane de Sá Carvalho.pdf: 773861 bytes, checksum: 2659032c499066d29bd53a810450aa21 (MD5)
Previous issue date: 2018-06 / A Farmácia nuclear ou radiofarmácia de um serviço de medicina nuclear é o setor responsável, entre outras atividades, pelo preparo e dispensação dos radiofármacos. Para que a prática dos indivíduos ocupacionalmente expostos neste ambiente aconteça em condições seguras, devem ser seguidos requisitos básicos de proteção radiológica e devem ser garantidas ações para a qualificação e treinamento destes profissionais, visando o aprimoramento e compreensão dos aspectos de radioproteção em suas respectivas funções. Requisitos de radioproteção são dispostos pelas normas da CNEN, pelas regulamentações da ANVISA e por recomendações internacionais de organizações relevantes ligadas à proteção radiológica. A experiência e situações específicas da rotina dos profissionais também agregam informações a respeito dos cuidados a serem tomados na manipulação de radionuclídeos. Logo, há uma profusão de informação em diferentes fontes sobre os aspectos que devem ser levados em consideração em treinamentos. Diante disto, este trabalho objetiva unificar os requisitos de segurança e proteção radiológica, referentes à infraestrutura e atividades da radiofarmácia de um serviço de medicina nuclear, com vistas a subsidiar treinamentos de indivíduos ocupacionalmente expostos nesses ambientes. Para isto, foi realizada a análise de recomendações, normas e regulamentações específicas para radiofarmácia, e foi realizado o acompanhamento in loco dos procedimentos. Acredita-se que os parâmetros obtidos na unificação poderão servir de plataforma para treinamento dos profissionais da radiofarmácia de serviços de medicina nuclear. / The nuclear pharmacy or radiopharmacy from a nuclear medicine service is the sector responsible, among other activities, for preparation and dispensing of radiopharmaceuticals. For the practice of occupationally exposed individuals in this environment occurs under safe conditions, basic requirements for radiation protection must be followed and actions must be guaranteed for the qualification and training of these professionals aiming at improving and understanding aspects of radioprotection in their respective functions. Radioprotection requirements are established by CNEN norms, ANVISA regulations and international recommendations of relevant organizations related to radiation protection. The routine situations of professionals also aggregate information regarding the care to be taken in dealing with radionuclides. Therefore, there is a plenty of information on aspects that should be taken into account in training. In view of this, the work aims to unify the requirements of safety and radiological protection, referring to the infrastructure and activities of the radiopharmacy of a nuclear medicine service, as a subsidy for the training of occupationally exposed individuals in these environments. For this, the analysis of recommendations, norms and regulations, specific for radiopharmacy was realized, and on-site monitoring of radiopharmaceuticals was performed. It is believed that the parameters obtained in the unification may serve as a training platform for radiopharmacy professionals of nuclear medicine services.
|
714 |
Realidade virtual aplicada à proteção física de instalações nuclearesMarins, Eugenio Rangel, Instituto de Engenharia Nuclear 06 1900 (has links)
Submitted by Almir Azevedo (barbio1313@gmail.com) on 2018-08-14T14:31:33Z
No. of bitstreams: 1
EUGENIO RANGEL MARINS D.pdf: 3587992 bytes, checksum: 347c37f89816e9401a975c1ecc78fab3 (MD5) / Made available in DSpace on 2018-08-14T14:31:33Z (GMT). No. of bitstreams: 1
EUGENIO RANGEL MARINS D.pdf: 3587992 bytes, checksum: 347c37f89816e9401a975c1ecc78fab3 (MD5)
Previous issue date: 2018-06 / Embora o Brasil não seja o típico alvo de ações terroristas, esse perigo não deve ser ignorado ou subestimado. Na nova ordem mundial, aqueles que se sentem ameaçados ou prejudicados algumas vezes abandonam as vias diplomáticas e recorrem a métodos não convencionais de resposta, que, por sua vez, podem resultar em atos de terrorismo. Com o aumento no número desse tipo de atentado em anos recentes, a importância da guarda e controle de materiais que possam ser usados em atos de terrorismo tomou uma dimensão mais relevante na atenção de governos, instituições e órgãos competentes pela salvaguarda de tais materiais. Por seu amplo potencial de causar prejuízos humanos, financeiros e morais, materiais nucleares e radioativos são o foco de programas e estratégias de salvaguardas com dimensões que vão desde as instituições individuais até o âmbito de organizações internacionais. O objetivo deste trabalho é investigar a integração das técnicas de Realidade Virtual ao planejamento das estratégias de proteção física a instalações nucleares e do treinamento da equipe que irá executá-las, de forma a evitar atos criminosos envolvendo materiais radioativos. Os resultados deste trabalho indicam que modelos virtuais de instalações nucleares podem auxiliar na elaboração e revisão das estratégias de proteção física e no treinamento das ações coordenadas das equipes de proteção física em emergências. / Although Brazil is not a typical target of terrorist action, this danger should not be ignored or underestimated. In the new world order, those who feel threatened or harmed sometimes abandon diplomatic ways and resort to unconventional methods of response, which can result in acts of terrorism. With the increasing number of such attacks in recent years, the importance of the custody and control of materials that can be used in acts of terrorism have taken a larger dimension in the attention of governments and institutions to the proper safeguard of these materials. Due to its great potential to cause human, financial and moral damages, nuclear and radioactive materials are the focus of safeguard programs and strategies, with dimensions ranging from individual institutions to the framework of international organizations. The objective of this work is to investigate the integration of Virtual Reality techniques in the planning of security strategies for nuclear installations and the training of the team that will execute them, in order to avoid criminal acts involving radioactive materials.
The results of this work indicate that virtual models of nuclear installations can assist in the elaboration and revision of the security strategies and in the training of the coordinated actions of the physical protection teams in emergencies.
|
715 |
Automated secure systems development methodologyBooysen, Hester Aletta Susanna 20 November 2014 (has links)
D.Com. (Informatics) / The complexity of modern computer-based information systems is such that, for all but the simplest of examples, they cannot be produced without a considerable amount of prior planning and preparation. The actual difficulties of trying to design, develop and implement complex computer-based systems have been recognised as early as the seventies. In a bid to deal with what was then referred to as the "software crisis", a number of so- called "methodologies" were advocated. Those methodologies were, in turn, based on a collection of guidelines or methods thanks to which their designers could eventually make the claim that computer systems, and in particular information systems, could be designed and developed with a greater degree of success. By using a clear set of rules, or at least reasonably detailed principles, they could ensure that the various design and development tasks be performed in a methodical, organ ised fashion. Irrespective of the methodologies or guidelines that were adopted or laid down, the developers principal aim was to ensure that all relevant detail about the proposed information systems would be taken into account during the long and often drawn-out design and development process. Unfortunately, many of those methodologies and guidelines date from the early 1970s and, as a result, no longer meet the security requirements and guidelines of today's information systems. It was never attempted under any of those methodolog ies, however, to unriddle the difficulties they had come up against in information security in the domain of system development . Security concerns should however, form an integral part of the planning, development and maintenance of a computer application. Each application system should for example, take the necessary security measures in any given situation.
|
716 |
Development and evaluation of environmental performance indicators (EPIs) for a company manufacturing automotive componentsSmale, Zingisa 15 April 2014 (has links)
M.Sc. (Environmental Management) / Please refer to full text to view abstract
|
717 |
A critical review of the IFIP TC11 Security Conference SeriesGaadingwe, Tshepo Gaadingwe January 2007 (has links)
Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of growth. The increase in importance and interest in information security research is reflected by the sheer number of research efforts being produced by different type of organizations around the world. One such organization is the International Federation for Information Processing (IFIP), more specifically the IFIP Technical Committee 11 (IFIP TC11). The IFIP TC11 community has had a rich history in producing high quality information security specific articles for over 20 years now. Therefore, IFIP TC11 found it necessary to reflect on this history, mainly to try and discover where it came from and where it may be going. Its 20th anniversary of its main conference presented an opportunity to begin such a study of its history. The core belief driving the study being that the future can only be realized and appreciated if the past is well understood. The main area of interest was to find out topics which may have had prevalence in the past or could be considered as "hot" topics. To achieve this, the author developed a systematic process for the study. The underpinning element being the creation of a classification scheme which was used to aid the analysis of the IFIP TC11 20 year's worth of articles. Major themes were identified and trends in the series highlighted. Further discussion and reflection on these trends were given. It was found that, not surprisingly, the series covered a wide variety of topics in the 20 years. However, it was discovered that there has been a notable move towards technically focused papers. Furthermore, topics such as business continuity had just about disappeared in the series while topics which are related to networking and cryptography continue to gain more prevalence.
|
718 |
A brain-compatible approach to the presentation of cyber security educational materialReid, Rayne January 2012 (has links)
Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this asset and, therefore, an information security solution is required to protect information against potential threats. Human beings play a major role in the implementation and governing of an entire information security process and, therefore, they have responsibilities in this regard. Thus, the effectiveness of any information security solutions in either an organisational or a private context is dependent on the human beings involved in the process. Accordingly, if these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in the information security solutions and, thus, it is essential that all these information users be educated in order to combat any threats to the information security. Many of the current information security education programmes and materials are not effective, possibly because the majority of these current approaches have been designed without using a sound pedagogical theory. In addition, many of these programmes also only target organisational users. This, in turn, is problematic as information security education is required by everybody, organisational and private information users alike. This dissertation addressed the lack of a pedagogical basis in the designing of information security educational courses suited to an extremely broad target audience. Accordingly, the dissertation set out to demonstrate how a pedagogy, which is broadly used and accepted for a diverse target audience of learners, could be applied to the design of the presentation of a web based, cyber security educational courses.
|
719 |
WSP3: a web service model for personal privacy protectionOphoff, Jacobus Albertus January 2003 (has links)
The prevalent use of the Internet not only brings with it numerous advantages, but also some drawbacks. The biggest of these problems is the threat to the individual’s personal privacy. This privacy issue is playing a growing role with respect to technological advancements. While new service-based technologies are considerably increasing the scope of information flow, the cost is a loss of control over personal information and therefore privacy. Existing privacy protection measures might fail to provide effective privacy protection in these new environments. This dissertation focuses on the use of new technologies to improve the levels of personal privacy. In this regard the WSP3 (Web Service Model for Personal Privacy Protection) model is formulated. This model proposes a privacy protection scheme using Web Services. Having received tremendous industry backing, Web Services is a very topical technology, promising much in the evolution of the Internet. In our society privacy is highly valued and a very important issue. Protecting personal privacy in environments using new technologies is crucial for their future success. These facts, combined with the detail that the WSP3 model focusses on Web Service environments, lead to the following realizations for the model: The WSP3 model provides users with control over their personal information and allows them to express their desired level of privacy. Parties requiring access to a user’s information are explicitly defined by the user, as well as the information available to them. The WSP3 model utilizes a Web Services architecture to provide privacy protection. In addition, it integrates security techniques, such as cryptography, into the architecture as required. The WSP3 model integrates with current standards to maintain their benefits. This allows the implementation of the model in any environment supporting these base technologies. In addition, the research involves the development of a prototype according to the model. This prototype serves to present a proof-of-concept by illustrating the WSP3 model and all the technologies involved. The WSP3 model gives users control over their privacy and allows everyone to decide their own level of protection. By incorporating Web Services, the model also shows how new technologies can be used to offer solutions to existing problem areas.
|
720 |
Replacement of seven 132/66 kv distance protection schemes by means of a generic relay implemented as a strategic spareHarris, Raymond Trevor January 2000 (has links)
Eskom is experiencing problems in the field of protection maintenance and in-service breakdowns which negatively influence the quality of electrical supply to the consumer, an integral component of the utility business. These facts initiated the research into the further development of a generic relay to be implemented as a strategic spare for the replacement of several schemes operating within Eskom’s southern region. These include the electromechanical, solid state and numerical distance protection relay and scheme failures on the 132 / 66 kV feeder network. Hence, the primary objective of the research is to develop, test and configure the strategic spare in terms of software and peripheral hardware for the input and output terminal connections, generic equations and settings for the purpose of the scheme replacements. The various schemes are assessed for stepped distance and permissive intertripping for three or single pole operation. This is done in conjunction with the internal and external circuit diagrams in order to understand the detailed operation of the scheme and to ensure the effective implementation of the strategic spare. The generic relay is configured for the emergency replacement of the various schemes during in-service breakdowns. This constitutes a temporary installation and therefore the downtime in essence, of all the distance protection schemes that require replacement, is limited to a minimum. This dissertation therefore explores the implementation of the strategic spare.
|
Page generated in 0.0946 seconds