Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

University of Tennessee, Knoxville

2016

Discipline
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 1044

Full-Text Articles in Entire DC Network

Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor Dec 2016

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall Dec 2016

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights …


A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini Dec 2016

A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini

International Journal of Nuclear Security

The paper investigates the approach used by a new set of regional institutions, the Disaster Preparedness and Risk Management Organizations (DPRMOs), in strengthening regional governance and cooperation. It also inquires in what ways these new institutions might indirectly contribute to the establishment of a more cohesive global nuclear security framework. More specifically, through the examination of the case of Southeast Asia, the paper argues that these institutions, albeit without a specific and direct mandate to operate in the nuclear security domain, are fundamentally strengthening states’ capacity to assess risks and threats and to map vulnerabilities in timely fashion. They are …


Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall Dec 2016

Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall

International Journal of Nuclear Security

Deterring nuclear terrorism is a critical national asset to support the preclusion of non-state actors from initiating a nuclear attack on the United States. Successful attribution of a detonated nuclear weapon allows for timely responsive measures that prove essential in the period following a nuclear event. In conjunction with intelligence and law enforcement evidence, the technical nuclear forensics (TNF) post-detonation community supports this mission through the development and advancement of expertise to characterize weapon debris through a rapid, accurate, and detailed approach. Though the TNF field is young, numerous strides have been made in recent years toward a more robust …


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame Dec 2016

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult …


Developing And Promoting A Nuclear Security Curriculum At Amity University, India: Beginnings, Successes And Challenges, Ms. Kawalpreet Kalra, Ms. Archana Yadav, Dr. Alpana Goel Dec 2016

Developing And Promoting A Nuclear Security Curriculum At Amity University, India: Beginnings, Successes And Challenges, Ms. Kawalpreet Kalra, Ms. Archana Yadav, Dr. Alpana Goel

International Journal of Nuclear Security

Amity University is one of India’s leading research- and innovation-driven private universities. The Amity Institute of Nuclear Science and Technology (AINST), established in 2009, contribute to Amity’s mission to promote national development through philanthropy, education and research. Very recently, courses related to nuclear security and security culture have been added to the existing AINST curriculum. The purpose of introducing this course was to enhance the understanding of technical, policy, and regulatory challenges associated with nuclear security and to create a nuclear security culture among relevant local institutions. This paper describes the process involved in establishing nuclear security as an elective …


Student Competition Cover Dec 2016

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed Dec 2016

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen Dec 2016

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan Dec 2016

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein Dec 2016

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Understanding Scientific Data Sharing Outside Of The Academy, Danielle Elaine Pollock Dec 2016

Understanding Scientific Data Sharing Outside Of The Academy, Danielle Elaine Pollock

DataONE Sociocultural and Usability & Assessment Working Groups

Sharing and reuse of scientific data, which can enhance the transparency and reproducibility of research and lead to the creation of new knowledge from existing data, is both a growing scholarly communication practice and an expanding area of interest in information science. However, much of the literature to date has focused on the data practices of scientists working in academic environments, with less research done on understanding the practices of scientists working in other types of environments, such as government or industry. This poster presents the results of a study in which data from a worldwide survey of scientists were …


Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga Dec 2016

Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga

International Journal of Nuclear Security

Nuclear security is one of the most important topics for regulatory purposes in Indonesia. Nuclear security measures exist to prevent, detect, and respond to unauthorized removal of radioactive material and the sabotage of nuclear and radiation facilities. Indonesia participates in bilateral and multilateral cooperation and international events such as the Nuclear Security Summit. Indonesia has also ratified several international instruments related to nuclear security. Based on commitment to international events and ratification, Indonesia has developed nuclear security infrastructures by strengthening legislation and regulation, enhancing building capacity, and strengthening equipment and facilities. Badan Pengawas Tenaga Nuklir (BAPETEN) is Indonesia’s nuclear energy …


Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa Dec 2016

Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa

International Journal of Nuclear Security

Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).

The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to accommodate fault causes …


Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan Dec 2016

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan

International Journal of Nuclear Security

Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


From The Editor’S Desk Dec 2016

From The Editor’S Desk

International Journal of Nuclear Security

No abstract provided.


Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath Dec 2016

Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath

International Journal of Nuclear Security

This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities. The analysis considers possible outsider and insider threats. A modified adversary sequence diagram (ASD) evaluates threat pathways to test an insider-outsider collusion case. The ASD also measures the probability of adversary interruption by demonstrating the methodology for a typical nuclear facility.


Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr Dec 2016

Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr

International Journal of Nuclear Security

Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.


Graduate Associate Deans' Group Minutes - December 15, 2016, Graduate Council Dec 2016

Graduate Associate Deans' Group Minutes - December 15, 2016, Graduate Council

Graduate Associate Deans' Group Minutes

No abstract provided.


New Off-Site Location, Professional Mba Program (Sacscoc Response), Sacscoc Dec 2016

New Off-Site Location, Professional Mba Program (Sacscoc Response), Sacscoc

SACSCOC Documentation

SACSCOC response to the substantive change of a new off-campus location for the Professional MBA, Haslam College of Business.


Computational Simulation Of The Predicted Dosimetric Impact Of Adjuvant Yttrium-90 Pet/Ct-Guided Percutaneous Ablation Following Radioembolization, Alexander S. Pasciak, Abigail Lin, Christos Georgiades, Laura K. Findeiss, Shannon Kauffman, Yong C. Bradley Dec 2016

Computational Simulation Of The Predicted Dosimetric Impact Of Adjuvant Yttrium-90 Pet/Ct-Guided Percutaneous Ablation Following Radioembolization, Alexander S. Pasciak, Abigail Lin, Christos Georgiades, Laura K. Findeiss, Shannon Kauffman, Yong C. Bradley

Faculty Publications and Other Works -- UT Graduate School of Medicine

Background: 90Y PET/CT post-radioembolization imaging has demonstrated that the distribution of 90Y in a tumor can be non-uniform. Using computational modeling, we predicted the dosimetric impact of post-treatment 90Y PET/CT-guided percutaneous ablation of the portions of a tumor receiving the lowest absorbed dose. A cohort of fourteen patients with non-resectable liver cancer previously treated using 90Y radioembolization were included in this retrospective study. Each patient exhibited potentially under-treated areas of tumor following treatment based on quantitative 90Y PET/CT. 90Y PET/CT was used to guide electrode placement for simulated adjuvant radiofrequency ablation in areas of tumor receiving the lowest dose. The …


Draft Genome Sequence Of Antarctic Methanogen Enriched From Dry Valley Permafrost, Joy Buongiorno, Jordan T. Bird, Kirill Krivushin, Victoria Oshurkova, Victoria Shcherbakova, Elizaveta M. Rivkina, Karen Lloyd, Tatiana A. Vishnivetskaya Dec 2016

Draft Genome Sequence Of Antarctic Methanogen Enriched From Dry Valley Permafrost, Joy Buongiorno, Jordan T. Bird, Kirill Krivushin, Victoria Oshurkova, Victoria Shcherbakova, Elizaveta M. Rivkina, Karen Lloyd, Tatiana A. Vishnivetskaya

Faculty Publications and Other Works -- General Biology

A genomic reconstruction belonging to the genus Methanosarcina was assembled from metagenomic data from a methane-producing enrichment of Antarctic permafrost. This is the first methanogen genome reported from permafrost of the Dry Valleys and can help shed light on future climate-affected methane dynamics.


Substituting Failure Avoidance For Redundancy In Storage Fault Tolerance, Christopher David Brumgard Dec 2016

Substituting Failure Avoidance For Redundancy In Storage Fault Tolerance, Christopher David Brumgard

Doctoral Dissertations

The primary mechanism for overcoming faults in modern storage systems is to introduce redundancy in the form of replication and error correcting codes. The costs of such redundancy in hardware, system availability and overall complexity can be substantial, depending on the number and pattern of faults that are handled. This dissertation describes and analyzes, via simulation, a system that seeks to use disk failure avoidance to reduce the need for costly redundancy by using adaptive heuristics that anticipate such failures. While a number of predictive factors can be used, this research focuses on the three leading candidates of SMART errors, …


Constrained Multi-Group Project Allocation Using Mahalanobis Distance, Abdulaziz Saud Alkabaa Dec 2016

Constrained Multi-Group Project Allocation Using Mahalanobis Distance, Abdulaziz Saud Alkabaa

Doctoral Dissertations

Optimal allocation is one of the most active research areas in operation research using binary integer variables. The allocation of multi constrained projects among several options available along a given planning horizon is an especially significant problem in the general area of item classification. The main goal of this dissertation is to develop an analytical approach for selecting projects that would be most attractive from an economic point of view to be developed or allocated among several options, such as in-house engineers and private contractors (in transportation projects). A relevant limiting resource in addition to the availability of funds is …


Academic Library Resources And Services For Online Distance Learners: An Exploratory Study, Roseanne Michele Sasso Dec 2016

Academic Library Resources And Services For Online Distance Learners: An Exploratory Study, Roseanne Michele Sasso

Doctoral Dissertations

In this study distance learning library resources and services as provided by member institutions belonging to the Association of Research Libraries (ARL) were examined. The goals of this study were (a) to identify the types of distance learning library resources and services being provided, and (b) to gain insight into the experiences and perspectives of Association of Research Libraries’ library personnel in delivering library resources and services to their distance learning library patrons. This exploratory study consisted of two phases, where both quantitative and qualitative methods were used. Phase one involved a content analysis of member institution’s distance learning websites …


Assessing The Functional Similarity Of Native And Invasive Anolis Lizards In The Food Webs Of Structurally-Simple Habitats In Florida, Nathan W. Turnbough Dec 2016

Assessing The Functional Similarity Of Native And Invasive Anolis Lizards In The Food Webs Of Structurally-Simple Habitats In Florida, Nathan W. Turnbough

Doctoral Dissertations

Invasive species often displace ecologically-similar native species, but the extent to which invading and displaced species function similarly in the food web processes of invaded communities is largely unknown. I investigated whether populations and individuals of an invasive Anolis lizard (the brown anole, Anolis sagrei) and the native congener it displaces in Florida (the green anole, Anolis carolinensis) are functionally equivalent in the food webs of open and structurally-simple habitats. In a system of invaded and uninvaded dredge-spoils islands, I found that both arthropod communities and winter bird communities covaried with brown anole abundance (and therefore the identity …


Patristic Precedent And Vernacular Innovation: The Practice And Theory Of Anglo-Saxon Translation, Andrew Timothy Eichel Dec 2016

Patristic Precedent And Vernacular Innovation: The Practice And Theory Of Anglo-Saxon Translation, Andrew Timothy Eichel

Doctoral Dissertations

My dissertation investigates Anglo-Saxon translation and interpretation during the reign of King Alfred of Wessex in the ninth century, and the Benedictine Reform of the tenth and eleventh centuries. These two periods represent a time of renaissance in Anglo-Saxon England, when circumstance and ambition allowed for a number of impressive reformation enterprises, including increased dedication to education of both clerical orders and the laity, which therefore augmented the output of writing motivated by scholarly curiosity, ecclesiastical inquiry, and political strategizing. At these formative stages, translation emerged as perhaps the most critical task for the vernacular writers. The Latinate prestige culture …