Potential for accelerator applications Sample Clauses

Potential for accelerator applications. More than 30,000 particle accelerators are nowadays in operation worldwide, the large majority being used in industry or medicine. The EuCARD-2 ambition was to have an impact on this large inventory of accelerators responding to societal needs, by transferring the competences and experience from research accelerators to this field. In this respect, a fundamental step was the publication of the Applications of Particle Accelerators in Europe (APAE) document, prepared by WP4. This 113-page reference document includes the direct contributions of 20 experts in the field, with many more contributing to the preparatory meetings. The report describes the current applications of accelerators, achievable improvements in cost and performance via the exploitation of technology from RIs, possible new applications and actions necessary to achieve these applications. It is expected that this document will break the ground towards many further developments in accelerator applications. To complement the extended version, a 6-page summary brochure for the general public and policy-makers has been produced and will be circulated and translated into multiple European languages. More in detail, WP4 identified many existing and new accelerator applications which could benefit from technology developed for RIs. Examples include:  new environmental applications of low energy electron beams  industrial applications of low energy electron beams  implantation of ions with a range of energies (1 keV to 10 MeV) at different depths (detailed circuit printing or etching, or gross material modifications, curing, hardening)  low energy neutron production (for BNCT, material inspection, material tests)  use of ion beams for fusion and for satellite propulsion  radioisotope production  new accelerator technologies for cancer therapy with xxx xxxxx  cancer therapy with high electron beams  new accelerator technologies for ADS In the medical field, EuCARD-2 has contributed to a coordinated effort to develop accelerators for medical isotope production, based on linacs or on compact cyclotrons. The AMIT superconducting cyclotron of CIEMAT (Spain) has been presented within WP4, selected for further support under ARIES, and supported by an experiment in the WP9 Transnational Access. Further progress could be brought into the field of compact medical cyclotrons by the use of high-temperature superconductivity technology developed in WP10. With HTS, the magnet can be more compact and /or ...
AutoNDA by SimpleDocs

Related to Potential for accelerator applications

  • Staffing Levels to deal with Potential Violence The Employer agrees that, where there is a risk of violence, an adequate level of trained employees should be present. The Employer recognizes that workloads can lead to fatigue and a diminished ability both to identify and to subsequently deal with potentially violent situations.

  • Terminating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Local Circuit Switching Capability, including Tandem Switching Capability 4.2.1 Local circuit switching capability is defined as: (A) line-side facilities, which include, but are not limited to, the connection between a loop termination at a main distribution frame and a switch line card; (B) trunk-side facilities, which include, but are not limited to, the connection between trunk termination at a trunk-side cross-connect panel and a switch trunk card; (C) switching provided by remote switching modules; and (D) all features, functions, and capabilities of the switch, which include, but are not limited to: (1) the basic switching function of connecting lines to lines, line to trunks, trunks to lines, and trunks to trunks, as well as the same basic capabilities made available to BellSouth’s customers, such as a telephone number, white page listings, and dial tone; and (2) all other features that the switch is capable of providing, including but not limited to customer calling, customer local area signaling service features, and Centrex, as well as any technically feasible customized routing functions provided by the switch. Any features that are not currently available but are technically feasible through the switch can be requested through the BFR/NBR process.

  • Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.

  • Separation of Components The SOFTWARE PRODUCT is licensed as a single product. Its component parts may not be separated for use on more than one computer.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract.

  • Optional Xactimate Response Attachment (Part 2)

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Completion of Concrete Pours and Emergency Work 24.14.1 Except as provided in this sub-clause an employee shall not work or be required to work in the rain.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

Time is Money Join Law Insider Premium to draft better contracts faster.