• Title/Summary/Keyword: key exposure protection

Search Result 38, Processing Time 0.027 seconds

Systems Engineering Approach for the Reuse of Metallic Waste From NPP Decommissioning and Dose Evaluation (금속해체 폐기물의 재활용을 위한 시스템엔지니어링 방법론 적용 및 피폭선량 평가)

  • Seo, Hyung-Woo;Kim, Chang-Lak
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.15 no.1
    • /
    • pp.45-63
    • /
    • 2017
  • The oldest commercial reactor in South Korea, Kori-1 Nuclear Power Plant (NPP), will be shut down in 2017. Proper treatment for decommissioning wastes is one of the key factors to decommission a plant successfully. Particularly important is the recycling of clearance level or very low level radioactively contaminated metallic wastes, which contributes to waste minimization and the reduction of disposal volume. The aim of this study is to introduce a conceptual design of a recycle system and to evaluate the doses incurred through defined work flows. The various architecture diagrams were organized to define operational procedures and tasks. Potential exposure scenarios were selected in accordance with the recycle system, and the doses were evaluated with the RESRAD-RECYCLE computer code. By using this tool, the important scenarios and radionuclides as well as impacts of radionuclide characteristics and partitioning factors are analyzed. Moreover, dose analysis can be used to provide information on the necessary decontamination, radiation protection process, and allowable concentration limits for exposure scenarios.

Preventing the Transmission of Tuberculosis in Health Care Settings: Administrative Control

  • Jo, Kyung-Wook
    • Tuberculosis and Respiratory Diseases
    • /
    • v.80 no.1
    • /
    • pp.21-26
    • /
    • 2017
  • It is well established that health care workers (HCWs) have a considerably higher risk of occupationally acquired tuberculosis (TB). To reduce the transmission of TB to HCWs and patients, TB infection control programs should be implemented in health care settings. The first and most important level of all protection and control programs is administrative control. Its goals are to prevent HCWs, other staff, and patients from being exposed to TB, and to reduce the transmission of infection by ensuring rapid diagnosis and treatment of affected individuals. Administrative control measures recommended by the United States Centers for Disease Control and Prevention and the World Health Organization include prompt identification of people with TB symptoms, isolation of infectious patients, control of the spread of the pathogen, and minimization of time spent in health care facilities. Another key component of measures undertaken is the baseline and serial screening for latent TB infection in HCWs who are at risk of exposure to TB. Although the interferon-gamma release assay has some advantages over the tuberculin skin test, the former has serious limitations, mostly due to its high conversion rate.

HspA and HtpG Enhance Thermotolerance in the Cyanobacterium, Microcystis aeruginosa NIES-298

  • Rhee, Jae-Sung;Ki, Jang-Seu;Kim, Bo-Mi;Hwang, Soon-Jin;Choi, Ik-Young;Lee, Jae-Seong
    • Journal of Microbiology and Biotechnology
    • /
    • v.22 no.1
    • /
    • pp.118-125
    • /
    • 2012
  • Heat shock proteins (Hsps) play a key role in the cellular defense response to diverse environmental stresses. Here, the role of Hsp genes in the acquisition of thermotolerance in the cyanobacterium Microcystis aeruginosa NIES-298 was investigated. Twelve Hsp-related genes were examined to observe their modulated expression patterns at different temperatures (10, 15, 25, and $35^{\circ}C$) over different exposure periods. HspA and HtpG transcripts showed an up-regulation of expression at low temperatures (10 and $15^{\circ}C$) and high temperature ($35^{\circ}C$), compared with the control ($25^{\circ}C$). To examine their effects upon thermotolerance, we purified recombinant HspA and HtpG proteins. During a thermotolerance study at $54^{\circ}C$, the HspA-transformed bacteria showed increased thermotolerance compared with the control. HtpG also played a role in the defense response to acute heat stress within 30 min. These findings provide a better understanding of cellular protection mechanisms against heat stress in cyanobacteria.

Improved Therapeutic Profiles of PLA2-Free Bee Venom Prepared by Ultrafiltration Method

  • Lee, Hyunkyoung;Pyo, Min-Jung;Bae, Seong Kyeong;Heo, Yunwi;Kim, Choul Goo;Kang, Changkeun;Kim, Euikyung
    • Toxicological Research
    • /
    • v.31 no.1
    • /
    • pp.33-40
    • /
    • 2015
  • Bee venom (BV) has long been used in traditional Eastern and Western medicine for chronic inflammation, pain and skin therapy. Human exposure to BV, however, often causes unwanted adverse effects and is even fatal in some cases. Phospholipase $A_2$ ($PLA_2$) of BV is now suspected to play a key role in these adverse effects. We investigated the potential use of $PLA_2$-free bee venom (PBV) as a replacement for BV in cosmetic products. PBV prepared by molecular weight cut-off ultrafiltration exhibits a superior profile in comparison with regular BV, by inhibiting elastase activity and suppressing the induction of nitric oxide (NO) and metalloproteinase-9 (MMP-9), while retaining the effects of cell proliferation and protection against ultraviolet B (UVB)-induced damage in human dermal fibroblast cells. PBV thus appears to be more promising than BV as a cosmetic ingredient with a reduced potential for adverse reactions in the recipient.

Creep & Tensile Properties of Thermally Grown Alumina Films (열 생성 알루미나 박막의 크리프 및 인장 특성)

  • Ko, Gyoung-Dek;Sun, Shin-Kyu;Kang, Ki-Ju
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.31 no.6 s.261
    • /
    • pp.665-670
    • /
    • 2007
  • Alpha-phase alumina TGO(Thermally Grown Oxide) forms on the interface between zirconia top coat and bond coat of thermal barrier coating system for superalloys during exposure to high temperature over $1000^{\circ}C$. It is known to provide a good protection against hot corrosion and to cause surface failure such as rumpling and cracking due to difference in thermal expansion coefficient from the substrate metal and the lateral growth. Consequently, mechanical properties of the alumina TGO at the high temperature are the key parameters determining the integrity of TBC system. In this work, by using Fecralloy foils as the alumina forming substrate, creep tests and tensile tests have been performed with various TGO thicknesses$(h=0{\sim}4{\mu}m)$ and yttrium contents(0, 200ppm) at $1200^{\circ}C$. Displacement-time curves and load-displacement curves for each TGO thickness(h=1,2,..) were measured from the creep and tensile tests, respectively, and compared with the curves without TGO thickness(h=0). As the result, the intrinsic tensile and creep properties of TGO itself were determined.

Path planning in nuclear facility decommissioning: Research status, challenges, and opportunities

  • Adibeli, Justina Onyinyechukwu;Liu, Yong-kuo;Ayodeji, Abiodun;Awodi, Ngbede Junior
    • Nuclear Engineering and Technology
    • /
    • v.53 no.11
    • /
    • pp.3505-3516
    • /
    • 2021
  • During nuclear facility decommissioning, workers are continuously exposed to high-level radiation. Hence, adequate path planning is critical to protect workers from unnecessary radiation exposure. This work discusses recent development in radioactive path planning and the algorithms recommended for the task. Specifically, we review the conventional methods for nuclear decommissioning path planning, analyze the techniques utilized in developing algorithms, and enumerate the decision factors that should be considered to optimize path planning algorithms. As a major contribution, we present the quantitative performance comparison of different algorithms utilized in solving path planning problems in nuclear decommissioning and highlight their merits and drawbacks. Also, we discuss techniques and critical consideration necessary for efficient application of robots and robotic path planning algorithms in nuclear facility decommissioning. Moreover, we analyze the influence of obstacles and the environmental/radioactive source dynamics on algorithms' efficiency. Finally, we recommend future research focus and highlight critical improvements required for the existing approaches towards a safer and cost-effective nuclear-decommissioning project.

Principles of Chemical Risk Assessment: The ATSDR Perspective

  • Johnson Barry L.
    • 대한예방의학회:학술대회논문집
    • /
    • 1994.02a
    • /
    • pp.405-411
    • /
    • 1994
  • Hazardous wastes released into the general environment are of concern to the public and to public health authorities. In response to this concern, the Comprehensive Environmental Response, Compensation, and Liability Act, as amended (commonly called Superfund), was enacted in 1980 to provide a framework for environmental, public health, and legal actions concerning uncontrolled releases of hazardous substances. The Agency for Toxic Substances and Disease Registry (ATSDR) was created by Superfund to address the public health issues of hazardous wastes in the community environment. Two key Agency programs, Public Health Assessments and Toxicological Profiles, are designed to assess the risk to human health of exposures to hazardous substances that migrate from waste sites or through emergency releases (e.g., chemical spills). The Agency's public health assessment is a structured process that permits ATSDR to identify which waste sites or other point sources require traditional public health actions (e.g.. human exposure studies, health studies, registries, health surveillance, health advisories). The ATSDR qualitative public health assessment complements the U.S. Environmental Protection Agency's quantitative risk assessment. For Superfund purposes, both assessments are sitespecific. ATSDR's toxicological profiles are prepared for priority hazardous substances found most frequently at Superfund sites. Each profile presents the current toxicologic and human health effects information about the substance being profiled. Each profile also contains Minimal Risk Levels (MRLs), a type of risk assessment value. This paper covers ATSDR's experience in conducting public health assessments and developing MRLs, and it relates this experience to recommendations on how to improve chemical risk assessments.

  • PDF

Applied Method of Privacy Information Protection Mechanism in e-business environments (e-Business 환경 내 개인정보 보호 메커니즘적용 방안)

  • Hong, Seng-Phil;Jang, Hyun-Me
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.51-59
    • /
    • 2008
  • As the innovative IT are being developed and applied in the e-business environment, firms are recognizing the fact that amount of customer information is providing care competitive edge. However, sensitive privacy information are abused and misused, and it is affecting the firms to require appropriate measures to protect privacy information and implement security techniques to safeguard carparate resources. This research analyzes the threat of privacy information exposure in the e-business environment, suggest the IPM-Trusted Privacy Policy Model in order to resolve the related problem, and examines 4 key mechanisms (CAM, SPM, RBAC Controller, OCM) focused on privacy protection. The model is analyzed and designed to enable access management and control by assigning user access rights based on privacy information policy and procedures in the e-business environment. Further, this research suggests practical use areas by applying TPM to CRM in e-business environment.

  • PDF

Study for the Pseudonymization Technique of Medical Image Data (의료 이미지 데이터의 비식별화 방안에 관한 연구)

  • Baek, Jongil;Song, Kyoungtaek;Choi, Wonkyun;Yu, Khiguen;Lee, Pilwoo;In, Hanjin;Kim, Cheoljung;Yeo, Kwangsoo;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.6
    • /
    • pp.103-110
    • /
    • 2016
  • The recent frequent cases of damage due to leakage of medical data and the privacy of medical patients is increasing day by day. The government says the Privacy Rule regulations established for these victims, such as prevention. Medical data guidelines can be seen 'national medical privacy guidelines' is only released. When replacing the image data between the institutions it has been included in the image file (JPG, JPEG, TIFF) there is exchange of data in common formats such as being made when the file is leaked to an external file there is a risk that the exposure key identification information of the patient. This medial image file has no protection such as encryption, This this paper, introduces a masking technique using a mosaic technique encrypting the image file contains the application to optical character recognition techniques. We propose pseudonymization technique of personal information in the image data.

Systematic Research on Privacy-Preserving Distributed Machine Learning (프라이버시를 보호하는 분산 기계 학습 연구 동향)

  • Min Seob Lee;Young Ah Shin;Ji Young Chun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.76-90
    • /
    • 2024
  • Although artificial intelligence (AI) can be utilized in various domains such as smart city, healthcare, it is limited due to concerns about the exposure of personal and sensitive information. In response, the concept of distributed machine learning has emerged, wherein learning occurs locally before training a global model, mitigating the concentration of data on a central server. However, overall learning phase in a collaborative way among multiple participants poses threats to data privacy. In this paper, we systematically analyzes recent trends in privacy protection within the realm of distributed machine learning, considering factors such as the presence of a central server, distribution environment of the training datasets, and performance variations among participants. In particular, we focus on key distributed machine learning techniques, including horizontal federated learning, vertical federated learning, and swarm learning. We examine privacy protection mechanisms within these techniques and explores potential directions for future research.