Добірка наукової літератури з теми "Witness protection programs – Case studies"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Witness protection programs – Case studies".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Witness protection programs – Case studies":

1

Łopuszyńska, Agata. "Reducing the light pollution in settlement units areas – comparative case studies." E3S Web of Conferences 44 (2018): 00100. http://dx.doi.org/10.1051/e3sconf/20184400100.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Dark-sky areas are a form of night landscape protection and reduction of light pollution (LP), but also a new direction of inhabited and urban areas development. Yet still the lack of social awareness of artificial light at night (ALAN) exposure issues is widespread. While the technical aspects of outdoor lighting modernization used for reduction are recognized and continuously elaborated, there is no specific scheme of the dark sky communities formation processes. In contrast to isolated areas of dark-sky protection, they are a challenge due to the accumulation of various functions and interests or spatial conflicts. The article is an attempt to determine how and why particular programs work or fail to work on the examples of the Polish village of Sopotnia Wielka and the Scottish town of Moffat. It seems that the legal factors are decisive, but other important aspects like social or planning come to the fore.
2

Jordán, F., and A. Báldi. "Short Communication: Systems-based conservation and conflicts between species protection programs." Web Ecology 13, no. 1 (October 21, 2013): 85–89. http://dx.doi.org/10.5194/we-13-85-2013.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract. Although the conflict between conservation efforts and economic growth is a major topic of conservation science, the conflicts between different conservation projects are much less documented and represented in the literature. We provide an overview of some case studies where these conflicts arise and discuss how to manage and solve them. We argue that conflicts are unavoidable, and that we can find optimal and efficient solutions only by studying the holistic, macroscopic properties of whole socio-ecological systems. Novel computational solutions offer simple and efficient simulation toolkits providing indicators that can support strategic and integrative decisions from a systems perspective.
3

Convery, J. J., J. F. Kreissl, A. D. Venosa, J. H. Bender, and D. J. Lussier. "Municipal Wastewater Treatment Technology Transfer Activities of the United States Environmental Protection Agency." Water Science and Technology 21, no. 6-7 (June 1, 1989): 685–98. http://dx.doi.org/10.2166/wst.1989.0271.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Technology transfer is an important activity within the ll.S. Environmental Protection Agency. Specific technology transfer programs such as the activities of the Center for Environmental Research Information, the Innovative and Alternative Technology Program, as well as the Small Community Outreach Program are used to encourage the utilization of cost-effective municipal pollution control technology. Case studies of three technologies including a plant operations diagnostic/remediation methodology, alternative sewer technologies and ultraviolet disinfection are presented. These case studies are presented retrospectively in the context of a generalized concept of how technology flows from science to utilization which was developed in a study by Allen (1977). Additional insights from this study are presented on the information gathering characteristics of engineers and scientists which may be useful in designing technology transfer programs. The recognition of the need for a technology or a deficiency in current practice are important stimuli other than technology transfer for accelerating the utilization of new technology.
4

Haddad, Mônica A., and Joshua Hellyer. "Decent Work and Social Protection in Belo Horizonte, Brazil." Journal of Planning Education and Research 38, no. 1 (January 5, 2017): 86–97. http://dx.doi.org/10.1177/0739456x16685157.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This article examines how beneficiaries of Brazil’s Bolsa Família (BFP) conditional cash transfer program find employment in a Brazilian municipality and assesses their participation in decent work. Using Belo Horizonte as a case study, researchers conducted a survey of BFP recipients. The article compares responses of informally and formally employed workers to assess how their employment meets the criteria of the decent work agenda. Results indicate no significant difference between perceptions of formal and informal employees concerning discrimination and poor working conditions. Findings lead to recommendations about formalization of employment, coordination with existing job training programs, child care, and transportation.
5

Kusnandar, Endang, Anis Mashdurohatun, and Siti Rodhiyah Dwi Istinah. "Protection Analysis Of Children Rights That Was Born From The Rape Causing (Study in State Court (PN) in Ex-Residency Cirebon Jurisdiction)." Jurnal Daulat Hukum 3, no. 1 (April 12, 2020): 15. http://dx.doi.org/10.30659/jdh.v3i1.8395.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Criminal cases of rape very much creates difficulties in solving both at the stage of investigation, prosecution, or at the stage of the imposition of the verdict. The problems of this study are: forms of legal protection given to the rights of Children Which Born fom rape victims in Ex Residency Cirebon Jurisdiction and constraints in the implementation of the provision of legal protection against rape victims in Ex Residency Cirebon Jurisdiction and solutions.The method used by researchers is normative juridical law approach and specification in this study were included descriptive analysis. The source and type of data in this study are primary data obtained from field studies with interview members of the Police of Ciwaringin Cirebon, And secondary data obtained from the study of literature.Based on the results of research that as is the case in jurisdictions other areas, merely enacted regional regulation on Child Protection, but the regulation is not set up for a child born to mothers who were raped or pregnancy due to rape, as well as court decisions, no one has noticed the rape victims who become pregnant as a result of rape, either already known or unknown since the trial process after the imposition of the verdict (ponis), as well as the Agency duties and authorities are not up to provide protection to Children Which Born from rape, but the child of such status as well as victims. Obstacles such as the difficulty to obtain information from the victim because of the victim's mental condition of the child, still quite a lot of people who are reluctant to testify as a witness, investigators have no children, as well as the infrastructure is not yet complete. To overcome the obstacles faced by those already undertaken several measures, among others cooperate with relevant agencies to provide protection and assistance to child victims of rape, bring in psychologists to recover the child's mental disturbed for being a victim of rape cases, as well as trying to convince the witness that willing to give information and not to be afraid to provide testimony.Keywords : Rights Protection; Children; Rape.
6

O’Campo, Patricia, Alix Freiler, Carles Muntaner, Elena Gelormino, Kelly Huegaerts, Vanessa Puig-Barrachina, and Christiane Mitchell. "Resisting austerity measures to social policies: multiple explanatory case studies." Health Promotion International 34, no. 6 (October 1, 2018): 1130–40. http://dx.doi.org/10.1093/heapro/day073.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract Since Margaret Thatcher reached power in the United Kingdom, European governments have increasingly turned to neoliberal forms of policy-making, focusing, especially after the 2008 Great Recession on ‘austerity policies’ rather than investing in social protection policies. We applied a multiple explanatory case studies methodology to examine how and why challenges and resistance to these austerity measures are successful or not in four settings for three different social policy issues: using a gender lens in state budgeting in Andalusia (Spain), maintaining unemployment benefits in Italy and cuts to fuel poverty reduction programs in Northern Ireland and England. In particular, we intended to learn about whether resistance strategies are shared across disparate cases or whether there are unique activities that lead to successful resistance to austerity policies. As our approach drew from realist philosophy of science, we started with initial theories concerning collective action, political ideology and political power of affected populations. Our findings suggest that there are similarities between the cases we studied despite differences in political and policy contexts. We found that joint action between advocacy groups was effective in resisting cuts to social spending. Evidence also indicates that the social construction of target populations is important in resisting changes to social programmes. This was observed in both England and Northern Ireland where pensioners held significant political clout.
7

Hasan, Akhmad Misbakhul, Betta Anugrah, and Andi Misbahul Pratiwi. "Gender-Responsive Budget Analysis on Social Protection Programs in Indonesia: A Case Study in Two Districts and A City." Jurnal Perempuan 24, no. 1 (March 7, 2019): 27. http://dx.doi.org/10.34309/jp.v24i1.308.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
<p><span style="font-size: 12pt; font-family: Calibri, sans-serif; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;" lang="EN-AU">Presidential Instruction (Inpres) No. 9 of 2000 about Gender Mainstreaming is a mechanism to in National Development has impacts on the planning and implementation of public policy in Indonesia. Public policy becomes an important arena for the struggle to realize gender equality and justice. One of the government’s commitments to this matter can be seen through Gender-Responsive Budgeting (GRB). This study analyses gender responsive budgeting in social protection programs in Indonesia, with case studies in three regions, namely Gunungkidul Regency, North Lombok Regency, and Padang City. Data collection is carried out by in-depth interviews and literature studies, including the Indonesian Budget and Regional Government Budget documents. This study conducted GRB analysis in three regions with three categories of budget expenditure analysis, namely specifically identified gender-based expenditure, equal employment opportunity expenditure, and mainstream budget expenditure. The results of the study show that in several regions there have been gender-responsive specific budget allocations for affirmation programs for women, children, the elderly, and dissability. However, it can be seen that the budget and gender-specific expenditure are still centralized in services that are identical to women's affairs, and not yet mainstreamed in all of the budget allocation.</span></p><p> </p>
8

Birnbaum, David. "Nosocomial Infection Surveillance Programs." Infection Control 8, no. 11 (November 1987): 474–79. http://dx.doi.org/10.1017/s0195941700069800.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Over 20 years ago, Philip Brachman advised us that “… the surveillance of all institutionally associated infections is important in order to minimize the risk of infection to all patients entering the institution and to members of the community.” Seven years later, in 1970, other staff members at the Centers for Disease Control (CDC) offered us more specific surveillance objectives:A. To determine the frequency and kinds of endemic nosocomial infections, in order to identify deviations from the baseline so that infection control personnel can:1. Determine where studies are needed.2. Ascertain where control measures (long-term and emergency) need to be established and how effective new control measures are.3. Establish policy.B. To provide the patient and personnel (and in some instances the community) with all possible protection from infections of nosocomial origin.C. To meet the requirements of the Joint Commission on Accreditation and the medical-legal guidelines of “accepted standards of patient care.”D. To provide the medical and nursing staff with meaningful data on the level of nosocomial infection in their work areas.If each single nosocomial infection represented sufficient deviation from the baseline occurrence, then analysis of surveillance data would be quite straightforward. However, that is not the case. A 1976 project report for the National Center for Health Statistics identified various “sentinel health events” whose occurrence should trigger “… scientific search for remediable underlying causes.”
9

Salehi, Khayyam, Jaber Karimpour, Habib Izadkhah, and Ayaz Isazadeh. "Channel Capacity of Concurrent Probabilistic Programs." Entropy 21, no. 9 (September 12, 2019): 885. http://dx.doi.org/10.3390/e21090885.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Programs are under continuous attack for disclosing secret information, and defending against these attacks is becoming increasingly vital. An attractive approach for protection is to measure the amount of secret information that might leak to attackers. A fundamental issue in computing information leakage is that given a program and attackers with various knowledge of the secret information, what is the maximum amount of leakage of the program? This is called channel capacity. In this paper, two notions of capacity are defined for concurrent probabilistic programs using information theory. These definitions consider intermediate leakage and the scheduler effect. These capacities are computed by a constrained nonlinear optimization problem. Therefore, an evolutionary algorithm is proposed to compute the capacities. Single preference voting and dining cryptographers protocols are analyzed as case studies to show how the proposed approach can automatically compute the capacities. The results demonstrate that there are attackers who can learn the whole secret of both the single preference protocol and dining cryptographers protocol. The proposed evolutionary algorithm is a general approach for computing any type of capacity in any kind of program.
10

Risdianto, Yanto, and Lathifah Hanim. "Accountability for Motorized Vehicle Owners Used By Children in Traffic Accidents (Case Study on Supreme Court Decision Number 1029 K / Pid.Sus / 2015)." Jurnal Daulat Hukum 3, no. 1 (April 22, 2020): 253. http://dx.doi.org/10.30659/jdh.v3i1.8730.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The formulation of the problem in this study are: 1) parts of criminal liability of the owner of a motorized vehicle whose vehicle was used in a traffic accident Case Study of the Decision of the Supreme Court of the Republic of Indonesia Number 1029 K / Pid.Sus / 2015? And 2) how is the legal protection of children as perpetrators in traffic accidents Case Study of the Supreme Court's Decision No. 1029 K / Pid.Sus / 2015?The method used by researchers is juridical sociological legal approach and the specifications in this study are descriptive analytical. The sources and types of data in this study are primary data obtained from interview field studies. And secondary data obtained from literature studies relating to the theory of criminal liability and legal protection.Based on the results of that study The criminal liability of the owner of a motorized vehicle whose vehicle is used in a traffic accident by a child is not held accountable even if only as an inclusion, the child who commits a traffic violation or a traffic crime is the sole offender, even if the motorized vehicle used by permission of an adult, both his parents or other vehicle owners. The legal protection of children as perpetrators in traffic accidents has not been fulfilled as in the Supreme Court Decree No. 1029 K / Pid.Sus / 2015, the vehicle owner who surrendered his vehicle (car) was only made a witness in a traffic accident that resulted in a victim died, and the child became the sole culprit.Keywords: Liability; Criminal; Motorized Vehicles; Children.

Дисертації з теми "Witness protection programs – Case studies":

1

Mogotsi, Barulaganye Jones. "Implementation of local agenda 21's education, awareness and training component : a case study of Gaborone /." Thesis, Rhodes University, 2006. http://eprints.ru.ac.za/508/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Mphaphuli, Lucy Nthepa. "Experiences and challenges of witnesses in the witness protection programme in South Africa : guidelines for coordinated service delivery developed from a social work perspective." Thesis, 2020. http://hdl.handle.net/10500/27521.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Modern society is increasingly threatened by organised crime. Crime undermines democracy and causes harm to the general functioning of a country and the quality of life of its citizens. A lack of protection measures for witnesses of crime renders the criminal justice system weak and ineffective in its quest to fight crime. Witness protection programmes and the testimony of a witness play a pivotal role in the fight against organised crime, without which securing successful prosecutions becomes a daunting task. Despite the important role of witnesses in the criminal justice system, there seems to be a dearth of literature focusing on the experiences of witnesses within the South African context. The researcher was able to gain an in-depth understanding of the experiences, challenges, and coping strategies of witnesses by employing an instrumental case study design within the framework of exploratory, descriptive, and contextual research from the vantage point of witnesses and staff members in the witness protection programme in South Africa. A total number of 30 participants were recruited by means of purposive sampling. Data was collected through individual, face-to-face interviews undertaken in six provinces. Analysis of the data was conducted in line with the eight steps of data analysis proposed by Tesch (in Creswell 2009:186) and Guba’s principles of trustworthiness were employed in the verification of the data. The ethical principles of informed consent, confidentiality, anonymity, beneficence, data management, and debriefing were observed. This study drew from Caplan’s (1964) crisis theory and the coping theory by Lazarus (1993). The findings of this study revealed that there is a general lack of awareness among the communities and members of the criminal justice system about the existence of the witness protection programme in South Africa. Witnesses also expressed that they found it difficult to cope and adjust in the programme, because of challenges such as social uprooting and isolation. While some witnesses were able to adjust, some resorted to exiting the programme prematurely. Suggestions by participants towards the support of witnesses paved a foundation for the development of guidelines for coordinated service delivery in the South African Witness Protection Programme.
Social Work
D. Phil. (Social Work)

Книги з теми "Witness protection programs – Case studies":

1

Taylor, George E. Club fed: A true story of life, lies and crime in the federal witness protection program. New York: Avon Books, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Dillmann, John. The French Quarter killers: The story of the protected witness murders. New York: Macmillan, 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Dillmann, John. The French Quarter killers: The story of the protected witness murders. New York: Macmillan, 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Nelson, Arthur C. The TDR handbook: Designing and implementing successful transfer of development rights programs. Washington, DC: Island Press, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Nelson, Arthur C. The TDR handbook: Designing and implementing successful transfer of development rights programs. Washington, DC: Island Press, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Office, General Accounting. Managing for results: Experiences of selected credit programs : report to the Director, Office of Management and Budget. Washington, D.C: The Office, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Linedecker, Clifford L., and George E. Jr Taylor. Club Fed: A True Story of Life, Lies, and Crime in the Federal Witness Protection Program (True Crime (Avon Books).). Avon Books, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Case studies in wellhead protection: Ten examples of innovative wellhead protection programs. [Washington, DC] (401 M St., S.W., Washington 20460): Office of Ground Water & Drinking Water, U.S. Environmental Protection Agency, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Fenske, Bruce, and Mark Williams. Demonstrating Benefits of Wellhad Protections Programs. American Water Works Research Association, 2004.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

United States. General Accounting Office., ed. Worker protection: Private sector ergonomics programs yield positive results : report to Congressional requesters. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Witness protection programs – Case studies":

1

Alley, William M., and Rosemarie Alley. "Pathogens." In High and Dry. Yale University Press, 2017. http://dx.doi.org/10.12987/yale/9780300220384.003.0012.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This chapter examines microbial contamination of groundwater that can threaten drinking water supplies and the importance of proper well construction and protection. Case studies are presented of E. coli poisoning in Walkerton, Ontario and viruses in Wisconsin. The Walkerton incident in 2000 caused Canadian provinces to take a hard look at their drinking water safety through better monitoring, enforcement, training, and source-water protection programs. The Wisconsin case study illustrates the potential for viruses from leaking sewers to contaminant municipal wells.

Тези доповідей конференцій з теми "Witness protection programs – Case studies":

1

Medina, José Manuel, Tatiana Herreros, Pamela De Barca, and Carolina Crovetto. "PEDAGOGICAL INTERACTIONS IN PRIMARY SCHOOL REINTEGRATION PROCESSES: A CASE STUDY IN CHILE." In International Conference on Education and New Developments. inScience Press, 2021. http://dx.doi.org/10.36315/2021end046.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In Chile, despite the great coverage achieved, there are still children and adolescents who leave school without being able to complete 12 years of compulsory education (Casen, 2015); moreover, among the countries that make up the OECD, Chile is in the first places of deschooling (TALIS, 2013). This marginalization from the school system is affecting a significant number of children and hindering areas of integration and social development, which accentuates processes of social exclusion and violation of rights in Chile (Casen, 2015; Mide-UC, 2016; Mineduc, 2017). This is reinforced by pedagogical practices that strengthen these probabilities of failure (Román, 2013). The phenomenon of school reintegration has little evidence in relation to the human and technical component in school reintegration processes, either locally (Mide-UC, 2016; UNESCO-UNICEF-Chilean Association of Municipalities, 2012), or internationally (CEPAL, 2010; Contreras et al, 2014; Sucre, 2016), which implies observing and analyzing pedagogical intervention practices in these contexts, in terms of how these dialogical-reflective relational dynamics between teachers and children and adolescents are developed, from the perspective of pedagogical interactions, an area of growing interest in educational sciences, which looks at more than the action itself, at how and what happens in the interaction. (Colomina et al, 2001) This research from a qualitative, transactional approach, oriented from the perspective of descriptive studies (Hernández,et al, 2010) and enriched with the symbolic interactionism of Blumer (1969), whose contributions indicate that the nature of the teaching-learning processes can only be unraveled through direct examination, seeks to understand pedagogical intervention practices from the perspective of pedagogical interactions which are developed between teachers and their students, within the framework of the specialized protection programs in school reintegration implemented in Chile by the National Service for Minors of the Ministry of Justice and Human Rights, in vulnerable sectors of the communes of Talca, Region of Maule and La Pintana, Metropolitan Region. The analysis through the theoretical and empirical contributions provided by the scientific evidence on pedagogical interactions, in terms of how they are configured, deployed and how these pedagogical intervention practices are perceived by the actors involved, added to the findings obtained, provides an opportunity to innovate by allowing the observation of school reintegration as a scenario of human relations and to deepen around this professional action as a critical element, constituting the improvement of teaching and effectiveness in school reintegration processes.
2

Lawless, W. F., Mito Akiyoshi, John Whitton, Fjorentina Angjellari-Dajci, and Christian Poppeliers. "A Comparative Study of Stakeholder Participation in the Cleanup of Radioactive Wastes in the US, Japan and UK." In ASME 2010 13th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2010. http://dx.doi.org/10.1115/icem2010-40219.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
We review case studies of stakeholder participation in the environmental cleanup of radioactive wastes in the United States, Japan and United Kingdom (e.g., [21,26,27,66,78]). Citizen participation programs in these three countries are at different stages: mature in the US, starting in Japan, and becoming operational in the UK. The US issue at the US Department of Energy’s (DOE) Savannah River Site (SRS) in South Carolina (SC) had been focused on citizens encouraging Federal (DOE; US Environmental Protection Agency, or EPA; and the US Nuclear Regulatory Commission, or NRC) and State (SC’s Department of Health and Environmental Compliance, or DHEC) agencies to pursue “Plug-in-RODs” at SRS to simplify the regulations to accelerate closing seepage basins at SRS. In Japan, the Reprocessing of spent fuel and deep geological disposal of vitrified high-level waste have been among Japan’s priorities. A reprocessing plant in Rokkasho, Aomori Prefecture is expected to commence operations in October 2010. The search of a site for a deep geological disposal facility has been ongoing since 2002. But the direct engagement of stakeholders has not occurred in Japan. Indirectly, stakeholders attempt to exert influence on decision-making with social movements, local elections, and litigation. In the UK, the issue is gaining effective citizen participation with the UK’s Nuclear Decommissioning Authority (NDA). We hope that the case studies from these countries may improve citizen participation.
3

Jeanneau, F., M. Gmar, N. Huot, F. Laine´, A. Lyoussi, E. Payan, Ph Pillot, L. Roux, and N. Saurel. "Instrumental Photon Activation and Applications in a Nuclear-Waste Inspection Purpose." In ASME 2003 9th International Conference on Radioactive Waste Management and Environmental Remediation. ASMEDC, 2003. http://dx.doi.org/10.1115/icem2003-4765.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The development of non-destructive methods to inspect nuclear-waste containers is important for radioactive-waste management and non-proliferation purposes. This paper will present studies and results carried out by a method based on photon interrogation (photofission) which allows the determination of the actinide quantity contained in the waste. High-energy photons (produced by an electron accelerator associated with a Bremsstrahlung tungsten target) will induce photofission reactions on the actinides. Then the flux of delayed neutrons, which is directly proportional to the amount of actinides, is measured with 3He detectors. Since the beginning of 1990’s, our team in CEA has been working on the development of this method and the improvement of the existing simulation code. The two main tools will be introduced: OPERA (tool for the simulation of photonuclear reactions) which includes photonuclear cross sections in a Monte-Carlo code based on MCNP4C, and SAPHIR (Irradiation and Photon-Activation System), a device allowing experimentations for research and development programs. The applications of these tools will be illustrated mainly with two examples: 1) The feasibility study of an inspection device for old concrete containers will be reported. Two campaigns of measurements have been performed in order to determine the sensitivity and the detection limits in the case of four different types of concrete containers, in terms of nature and geometry. 2) Nuclear-waste producers and managers have been interested by the active photon interrogation possibilities to measure actinide quantity in wastes of high activity, vitrified or compacted, with constraints like a dose rate around 400 Gy/h at 27 cm from the container. The simulation-code improvement has allowed some calculations, based on the SAPHIR facility, which have shown a good linearity between the actinide mass and the number of detected neutrons, in spite of a very high passive noise and the presence of a lead protection. Several R&D programs will be also presented. On one hand, measurements are performed on real wastes, chosen for parameter which could define a limitation of the measurements, in order to improve the method and to evaluate the detection limits. For instance, tomography can be performed with this experimental device: quantity and position of actinides in the waste can be calculated. On the other hand, a new method is studied, using the delayed-gamma flux in order to quantify and to identify the different actinide isotopes contained in the waste. These methods and device offer a large panel of results in terms of measurements and simulations. Our team is now involved in several prospecting and R&D programs in order to improve the current method and to find some new applications for nuclear-waste management.
4

Garner, Stephen, and Zuhair Ibrahim. "Gas Turbine Common Issues, Failure Investigations, Root Cause Analyses, and Preventative Actions." In ASME 2016 Power Conference collocated with the ASME 2016 10th International Conference on Energy Sustainability and the ASME 2016 14th International Conference on Fuel Cell Science, Engineering and Technology. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/power2016-59352.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Gas turbines are a type of internal combustion engine and are used in a wide range of services powering aircraft of all types, as well as driving mechanical equipment such as pumps, compressors in the petrochemical industry, and generators in the electric utility industry. Similar to the reciprocating internal combustion engine in an automobile, energy (mechanical or electrical) is generated by the burning of a hydrocarbon fuel (i.e., jet fuel, diesel or natural gas). The core of a gas turbine engine is comprised of three main sections: the compressor section, the combustor section, and the turbine section. To ensure that a gas turbine operates safely, reliably, and with optimum performance, all gas turbines are provided with a control system designed either by the OEM or according to the OEM’s specification. The OEM-provided control systems will typically include complex and integrated subsystems such as (but not limited to): a graphic user interface, an engine management system (EMS or ECS), a safety related system (SRS), and a package control system (PCS) that may interface with a facilities’ existing computerized control systems. Any failure of the mechanical systems, electro-mechanical systems, or logic based control systems of a gas turbine can result in forced outage. A forced outage of a gas turbine, whether in a mechanical service, such as pipelines, or in either a simple cycle or combined cycle power generation installation results in a reduction of system availability and therefore a loss in revenue. The significant capital investment in a gas turbine system necessitates a high degree of reliability and system availability while reducing forced outages. A power plant can minimize occurrences of forced outages and optimize recovery of capacity by effectively combining proactive and reactive solutions. This paper will discuss both proactive and reactive programs as well as their implementation in order to answer the key questions that often surround an outage: How is outage time minimized while increasing reliability and system availability? What went wrong and who or what is responsible? How soon can the unit or the plant get back online? And what operational or maintenance considerations are needed to prevent a similar recurrence. Proactive approaches to be discussed include process hazard analyses (PHA) such as hazard and operability studies (HAZOP), hazard identification (HAZID), layer-of-protection analyses (LOPA), what-if analyses, and quantitative risk assessments (QRA) in addition to failure mode and effects analysis (FMEA); and failure mode, effects and criticality analysis (FMECA). Reactive approaches to be discussed include various root cause analysis (RCA) and failure analysis (FA) techniques and methodologies such as fault-tree analysis. Case studies and some lessons learned will also be presented to illustrate the methods.

До бібліографії