Evaluation of Aqueous and Powder Processing Techniques for Production of Pu-238-Fueled General Purpose Heat Sources
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
CURRENT STATUS of DECAY HEAT MEASUREMENTS, EVALUATIONS, and NEEDS*
CURRENT STATUS OF DECAY HEAT MEASUREMENTS, EVALUATIONS, and NEEDS* J. K. Dickens, Oak Ridge National Laboratory, Oak Ridge, Tennessee 37831. CONF-860906—9 This report is dedicated to John C. Connor (1923-1986) An able colleague and a cherished friend DE86 011082 A paper to be presented to the National Topical Conference on Reactor Physics and Safety, Saratoga, New York, September 17-19, 1986 ABSTRACT Over a decade ago serious concern over possible consequences of a loss-of-coolan • accident in a commercial light-water reactor prompted support of several experiments designed specifically to measure the latent energy of beta-ray and gamma-ray emanations from fission products for thermal reactors. This latent energy was termed Decay Heat. At about the same time the American Nuclear Society convened a working group to develop a standard for use in computing decay heat in real reactor environs primarily for regulatory requirements. This working group combined the new experimental results and best evaluated data into a standard which was approved by the ANS and by the ANSI. The primary work since then has been (a) on improvements to computational efforts and (b) experimental measurements for fast reactors. In addition, the need for decay-heat data has been extended well beyond the time regime of a loss-of-coolant accident; new concerns involve, for example, away-from-reactor shipments and storage. The efficacy of the ANS standard for these longer time regimes has been a subject of study with generally positive results. However, a specific problem, namely, the consequences of fission-product neutron capture, remains contentious. -
Physical Model for Vaporization
Physical model for vaporization Jozsef Garai Department of Mechanical and Materials Engineering, Florida International University, University Park, VH 183, Miami, FL 33199 Abstract Based on two assumptions, the surface layer is flexible, and the internal energy of the latent heat of vaporization is completely utilized by the atoms for overcoming on the surface resistance of the liquid, the enthalpy of vaporization was calculated for 45 elements. The theoretical values were tested against experiments with positive result. 1. Introduction The enthalpy of vaporization is an extremely important physical process with many applications to physics, chemistry, and biology. Thermodynamic defines the enthalpy of vaporization ()∆ v H as the energy that has to be supplied to the system in order to complete the liquid-vapor phase transformation. The energy is absorbed at constant pressure and temperature. The absorbed energy not only increases the internal energy of the system (U) but also used for the external work of the expansion (w). The enthalpy of vaporization is then ∆ v H = ∆ v U + ∆ v w (1) The work of the expansion at vaporization is ∆ vw = P ()VV − VL (2) where p is the pressure, VV is the volume of the vapor, and VL is the volume of the liquid. Several empirical and semi-empirical relationships are known for calculating the enthalpy of vaporization [1-16]. Even though there is no consensus on the exact physics, there is a general agreement that the surface energy must be an important part of the enthalpy of vaporization. The vaporization diminishes the surface energy of the liquid; thus this energy must be supplied to the system. -
Windows 7 Operating Guide
Welcome to Windows 7 1 1 You told us what you wanted. We listened. This Windows® 7 Product Guide highlights the new and improved features that will help deliver the one thing you said you wanted the most: Your PC, simplified. 3 3 Contents INTRODUCTION TO WINDOWS 7 6 DESIGNING WINDOWS 7 8 Market Trends that Inspired Windows 7 9 WINDOWS 7 EDITIONS 10 Windows 7 Starter 11 Windows 7 Home Basic 11 Windows 7 Home Premium 12 Windows 7 Professional 12 Windows 7 Enterprise / Windows 7 Ultimate 13 Windows Anytime Upgrade 14 Microsoft Desktop Optimization Pack 14 Windows 7 Editions Comparison 15 GETTING STARTED WITH WINDOWS 7 16 Upgrading a PC to Windows 7 16 WHAT’S NEW IN WINDOWS 7 20 Top Features for You 20 Top Features for IT Professionals 22 Application and Device Compatibility 23 WINDOWS 7 FOR YOU 24 WINDOWS 7 FOR YOU: SIMPLIFIES EVERYDAY TASKS 28 Simple to Navigate 28 Easier to Find Things 35 Easy to Browse the Web 38 Easy to Connect PCs and Manage Devices 41 Easy to Communicate and Share 47 WINDOWS 7 FOR YOU: WORKS THE WAY YOU WANT 50 Speed, Reliability, and Responsiveness 50 More Secure 55 Compatible with You 62 Better Troubleshooting and Problem Solving 66 WINDOWS 7 FOR YOU: MAKES NEW THINGS POSSIBLE 70 Media the Way You Want It 70 Work Anywhere 81 New Ways to Engage 84 INTRODUCTION TO WINDOWS 7 6 WINDOWS 7 FOR IT PROFESSIONALS 88 DESIGNING WINDOWS 7 8 WINDOWS 7 FOR IT PROFESSIONALS: Market Trends that Inspired Windows 7 9 MAKE PEOPLE PRODUCTIVE ANYWHERE 92 WINDOWS 7 EDITIONS 10 Remove Barriers to Information 92 Windows 7 Starter 11 Access -
Windows 7 – Hands-On Training Table of Contents PINNING PROGRAMS and USING JUMP LISTS
Windows 7 – Hands-on Training Table of Contents PINNING PROGRAMS AND USING JUMP LISTS ..................................................................................... 3 THE START MENU .............................................................................................................................................. 3 Pin a program icon to the Start menu ............................................................................................................. 3 View the Jump List for a program .................................................................................................................. 4 Open an item from the Jump List ................................................................................................................... 4 Pin an item to a Jump List .............................................................................................................................. 4 Unpin an item ................................................................................................................................................. 4 THE TASKBAR .................................................................................................................................................... 5 Pin a program icon to the taskbar ................................................................................................................... 5 View the Jump List for a program ................................................................................................................. -
Chapter 4 — Fuel Cycles
MIT_ch04_29-36.qxd 7/16/2003 1:26 PM Page 29 Chapter 4 — Fuel Cycles The description of a possible global growth sce- one over the other will inevitably be a matter of nario for nuclear power with 1000 or so GWe judgment. All too often, advocates of a particu- deployed worldwide must begin with some lar reactor type or fuel cycle are selective in specification of the nuclear fuel cycles that will emphasizing criteria that have led them to pro- be in operation. The nuclear fuel cycle refers to pose a particular candidate. We believe that all activities that occur in the production of detailed and thorough analysis is needed to nuclear energy. properly evaluate the many fuel cycle alterna- tives. It is important to emphasize that producing nuclear energy requires more than a nuclear We do not believe that a new technical configu- reactor steam supply system and the associated ration exists that meets all the criteria we have turbine-generator equipment required to pro- set forth, e.g. there is not a technical ‘silver bul- duce electricity from the heat created by let’ that will satisfy each of the criteria. nuclear fission. The process includes ore min- Accordingly, the choice of the best technical ing, enrichment, fuel fabrication, waste man- path requires a judgment balancing the charac- agement and disposal, and finally decontami- teristics of a particular fuel cycle against how nation and decommissioning of facilities. All well it meets the criteria we have adopted. steps in the process must be specified, because each involves different technical, economic, Our analysis separates fuel cycles into two classes: safety, and environmental consequences. -
Doe Nuclear Physics Reactor Theory Handbook
DOE-HDBK-1019/2-93 JANUARY 1993 DOE FUNDAMENTALS HANDBOOK NUCLEAR PHYSICS AND REACTOR THEORY Volume 2 of 2 U.S. Department of Energy FSC-6910 Washington, D.C. 20585 Distribution Statement A. Approved for public release; distribution is unlimited. This document has been reproduced directly from the best available copy. Available to DOE and DOE contractors from the Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831. Available to the public from the National Technical Information Service, U.S. Department of Commerce, 5285 Port Royal., Springfield, VA 22161. Order No. DE93012223 DOE-HDBK-1019/1-93 NUCLEAR PHYSICS AND REACTOR THEORY ABSTRACT The Nuclear Physics and Reactor Theory Handbook was developed to assist nuclear facility operating contractors in providing operators, maintenance personnel, and the technical staff with the necessary fundamentals training to ensure a basic understanding of nuclear physics and reactor theory. The handbook includes information on atomic and nuclear physics; neutron characteristics; reactor theory and nuclear parameters; and the theory of reactor operation. This information will provide personnel with a foundation for understanding the scientific principles that are associated with various DOE nuclear facility operations and maintenance. Key Words: Training Material, Atomic Physics, The Chart of the Nuclides, Radioactivity, Radioactive Decay, Neutron Interaction, Fission, Reactor Theory, Neutron Characteristics, Neutron Life Cycle, Reactor Kinetics Rev. 0 NP DOE-HDBK-1019/1-93 NUCLEAR PHYSICS AND REACTOR THEORY FOREWORD The Department of Energy (DOE) Fundamentals Handbooks consist of ten academic subjects, which include Mathematics; Classical Physics; Thermodynamics, Heat Transfer, and Fluid Flow; Instrumentation and Control; Electrical Science; Material Science; Mechanical Science; Chemistry; Engineering Symbology, Prints, and Drawings; and Nuclear Physics and Reactor Theory. -
Surface Structure, Chemisorption and Reactions
Surface Structure, Chemisorption and Reactions Eckhard Pehlke, Institut für Theoretische Physik und Astrophysik, Christian-Albrechts-Universität zu Kiel, 24098 Kiel, Germany. Topics: (i) interplay between the geometric and electronic structure of solid surfaces, (ii) physical properties of surfaces: surface energy, surface stress and their relevance for surface morphology (iii) adsorption and desorption energy barriers, chemical reactivity of surfaces, heterogeneous catalysis (iv) chemisorption dynamics and energy dissipation: electronically non-adiabatic processes Technological Importance of Surfaces Solid surfaces are intriguing objects for basic research, and they are also of high technological utility: substrates for homo- or hetero-epitaxial growth of semiconductor thin films used in device technology surfaces can act as heterogeneous catalysts, used to induce and steer the desired chemical reactions Sect. I: The Geometric and the Electronic Structure of Crystal Surfaces Surface Crystallography 2D 3D number of space groups: 17 230 number of point groups: 10 32 number of Bravais lattices: 5 14 2D- symbol lattice 2D Bravais space point crystal system parameters lattice group groups m mp 1 oblique (mono- γ b 2 a, b, γ 2 clin) a o op b (ortho- a, b a m rectangular rhom- o 7 γ = 90 2mm bic) oc b a t (tetra- a = b 4 o tp a 3 square gonal) γ = 90 a 4mm a h hp 3 o a hexagonal (hexa- a = b 120 6 o gonal) γ = 120 5 3m 6mm Bulk Terminated fcc Crystal Surfaces z z fcc a (010) x y c a=c/ √ 2 x square lattice (tp) z z fcc (110) a c _ [110] y x rectangular lattice (op) z _ (111) fcc [011] _ [110] a y hexagonal lattice (hp) x Surface Atomic Geometry Examples: a reduced inter-layer H/Si(111) separation normal relaxation 2a Si(111) (7x7) (2x1) reconstruction K. -
Cloud Computing Bible Is a Wide-Ranging and Complete Reference
A thorough, down-to-earth look Barrie Sosinsky Cloud Computing Barrie Sosinsky is a veteran computer book writer at cloud computing specializing in network systems, databases, design, development, The chance to lower IT costs makes cloud computing a and testing. Among his 35 technical books have been Wiley’s Networking hot topic, and it’s getting hotter all the time. If you want Bible and many others on operating a terra firma take on everything you should know about systems, Web topics, storage, and the cloud, this book is it. Starting with a clear definition of application software. He has written nearly 500 articles for computer what cloud computing is, why it is, and its pros and cons, magazines and Web sites. Cloud Cloud Computing Bible is a wide-ranging and complete reference. You’ll get thoroughly up to speed on cloud platforms, infrastructure, services and applications, security, and much more. Computing • Learn what cloud computing is and what it is not • Assess the value of cloud computing, including licensing models, ROI, and more • Understand abstraction, partitioning, virtualization, capacity planning, and various programming solutions • See how to use Google®, Amazon®, and Microsoft® Web services effectively ® ™ • Explore cloud communication methods — IM, Twitter , Google Buzz , Explore the cloud with Facebook®, and others • Discover how cloud services are changing mobile phones — and vice versa this complete guide Understand all platforms and technologies www.wiley.com/compbooks Shelving Category: Use Google, Amazon, or -
Effects of Heat from High-Level Waste on Performance of Deep Geological Repository Components Iaea, Vienna, 1984 Iaea-Tecdoc-319
IAEA-TECDOC-319 EFFECTS OF HEAT FROM HIGH-LEVEL WASTE ON PERFORMANC DEEF EO P GEOLOGICAL REPOSITORY COMPONENTS REPORT OF A TECHNICAL COMMITTEE MEETING ON EFFECTS OF HEAT FROM RADIOACTIVE WASTE IN DEEP GEOLOGICAL REPOSITORIES ORGANIZEE TH Y DB INTERNATIONAL ATOMIC ENERGY AGENCY AND HELD IN STOCKHOLM, 28 AUGUST - 2 SEPTEMBER 1983 A TECHNICAL DOCUMENT ISSUEE TH Y DB INTERNATIONAL ATOMIC ENERGY AGENCY. VIENNA, 1984 EFFECTS OF HEAT FROM HIGH-LEVEL WASTE ON PERFORMANCE OF DEEP GEOLOGICAL REPOSITORY COMPONENTS IAEA, VIENNA, 1984 IAEA-TECDOC-319 Printed by the IAEA in Austria November 1984 PLEASE BE AWARE THAT ALL OF THE MISSING PAGES IN THIS DOCUMENT WERE ORIGINALLY BLANK The IAEA doe t maintaisno n stock f reportso thin si s series. However, microfiche copies of these reports can be obtained from IN IS Clearinghouse International Atomic Energy Agency Wagramerstrasse5 P.O.Bo0 x10 A-1400 Vienna, Austria Orders shoul accompaniee db prepaymeny db f Austriao t n Schillings 80.00 in the form of a cheque or in the form of IAEA microfiche service coupons orderee whicb y hdma separatel ClearinghouseS I y N froI e mth . FOREWORD This report discusse effecte th sdeee th f heapso n geologicato l repository systems and its different components. It reviews the experimental dat d theoreticaaan l effectmodele th f f heaso o s t botn o h the behaviou engineeref o r d naturadan l barriers. This document aimt a s supporting another IAEA publicatio relatea n i n d subject, viz. "Deep Underground Disposal of Radioactive Waste - Near Field Effects", Technical Reports Serie n preparation)s(i lattee Th . -
SILK Using the Remote Desktop Scheduler Logging Into SILK Using Mozilla Firefox Browser - SILK Quick Reference Guide
SILK Using the Remote Desktop Scheduler Logging into SILK Using Mozilla Firefox Browser - SILK Quick Reference Guide Overview As of October 21, 2015, there are two methods of logging into the SILK Scheduler: LBLESD Citrix Login Interface or the new LBL Remote Desktop User Logon Interface. Citrix Login Interface is used to provide a secured entry into SILK applications. Citrix requires a license for each person logging into using SILK. The Remote Desktop Login Interface (for SILK - RD SILK Scheduler) is another type of secure login method for accessing SILK. LBL has purchased a single license for this product that allows an unlimited number of client users. LBL Information Systems and LBL Network are promoting the use of the Remote Desktop Login Interface for SILK because of: • Security control • Quicker logon response • No idle time limits • No limit to the number of users logged into SILK • Uses the same security – Domain, User ID and Password • SILK works as it always has • And works with web browsers: IE (10 and up), Mozilla Firefox, and Google Chrome Logging into SILK using RD SILK Scheduler To log into SILK using the RD SILK Scheduler you will need to know the Domain, your User ID, and password. For most SILK users the domain is SIS. The user id and password is the same that you currently use for SILK. During your first time using this URL address, you may encounter several Firefox browser security windows before you are allowed to log into your SILK district. Using Mozillia Firefox, enter the following URL to access the RD SILK Scheduler: https://scheduler.lblesd.k12.or.us Linn Benton Lincoln ESD Help Desk: 541.812.2800 or 866.914.2800 firefox browser-remote desktop silk scheduler.docx www.lblesd.k12.or.us https://swhelpdesk.lblesd.k12.or.us version date: 2015.12.04 SILK Using the Remote Desktop Scheduler Logging into SILK Using Mozilla Firefox Browser - SILK Quick Reference Guide Once the User Login page is displayed, enter your SILK security information. -
ARCHIVE 2711.Pdf
ComputorEdge 3/13/09 ComputorEdge™ Online — 03/13/09 This issue: Flash Drives: Computing in Your Pocket The little memory chips have become more than just a way to save and move files. Now you can carry all your computing with you to work with any computer. Table of Contents: Digital Dave by Digital Dave Digital Dave answers your tech questions. A reader wants to run antivirus software from a flash drive; a reader's new external SATA drive isn't much faster than his old ATA drive; why would a reader's computer be shutting down at random intervals? Flash Drive Security by Michael J. Ross They're handy, portable and easy to lose. The diminutive size and light weight of flash drives makes them ideal for portable data storage, but it also makes them easily lost or stolen. Flash drive manufacturers and security software developers are creating a variety of solutions. Linux on a Flash Drive by Michael J. Ross Shrinking OS meets growing-capacity drives. (Click Banner) Linux is an operating system shrinking in size, while USB flash drives are growing in capacity. It was inevitable that a point would be reached at which Linux could be running on a simple flash drive. Windows Vista Tips and Tricks by Jack Dunning Save Time by Using Favorite Links in Windows Explorer Many people ignore the existence of the Favorite Links feature. However, if you take the time to play with it, you will most likely fall in love with this extra feature of Windows Vista. Wally Wang's Apple Farm by Wally Wang New Macintosh Models After a seeming eternity of waiting, Apple released updates to the Mac Pro, (Click Banner) iMac and Mac mini. -
Technical Blueprint for Vertical Use Cases and Validation Framework
Deliverable 1.1 Technical Blueprint for Vertical Use Cases and Validation Framework Version 1.0 Partners This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 957242 Abstract This document describes the five use cases that are the targets for 5G Non-Public Network (NPN) developments within the FUDGE-5G project. The use cases addressed are: (i) Concurrent Media Delivery, (ii) Public Protection and Public Relief (PPDR), (iii) 5G Virtual Office, (iv) Industry 4.0, (v) Interconnected NPNs. List of Authors and Reviewers 1.1. Authors Author Partner Carlos Barjau, Josep Ribes, Borja Iñesta, David Gomez-Barquero UPV Kashif Mahmood (Editor), Pål Grønsund, Ole Grøndalen, Andres Gonzalez TNOR Daniele Munaretto, Marco Centenaro, Nicola di Pietro ATH Jose Costa, Mika Skarp CMC Pousali Charkaborty, Marius Corici FHG Peter Sanders O2M Thanos Xirofotos UBI Luis Cordeiro, André Gomes, António Borges ONE Manuel Fuentes, Andrés Meseguer, Teresa Pardo, David Martín-Sacristán 5CMM Sebastian Robitzsch, Kay Hänsge IDE Zoran Despotovic, Artur Hecker, Dirk Trossen HWDU Filippo Rebecchi THA D1.1 Technical Blueprint for Vertical Use Cases and Validation Framework Page 2 of 85 1.2. Reviewers Reviewer Partner Erik Vold NRK Waqas Ikram ABB Kennet Nomeland Norwegian Defense Materiel Agency (NDMA) Karl Øyri Oslo University Hospital (OUS) Steve Appleby British Telecom (BT) Disclaimer This FUDGE-5G D1.1 deliverable is not yet approved nor rejected, neither financially nor content-wise by the European Commission. The approval/rejection decision of work and resources will take place at the Mid-Term Review Meeting planned in November 2021, after the monitoring process involving experts has come to an end.