Deep geological repositoryA deep geological repository is a way of storing hazardous or radioactive waste within a stable geologic environment (typically 200–1000 m deep). It entails a combination of waste form, waste package, engineered seals and geology that is suited to provide a high level of long-term isolation and containment without future maintenance. This will prevent any radioactive dangers.
ProjectA project is any undertaking, carried out individually or collaboratively and possibly involving research or design, that is carefully planned to achieve a particular goal. An alternative view sees a project managerially as a sequence of events: a "set of interrelated tasks to be executed over a fixed period and within certain cost and other limitations". A project may be a temporary (rather than a permanent) social system (work system), possibly staffed by teams (within or across organizations) to accomplish particular tasks under time constraints.
High-level radioactive waste managementHigh-level radioactive waste management concerns how radioactive materials created during production of nuclear power and nuclear weapons are dealt with. Radioactive waste contains a mixture of short-lived and long-lived nuclides, as well as non-radioactive nuclides. There was reportedly some of high-level nuclear waste stored in the United States in 2002. The most troublesome transuranic elements in spent fuel are neptunium-237 (half-life two million years) and plutonium-239 (half-life 24,000 years).
Project managementProject management is the process of leading the work of a team to achieve all project goals within the given constraints. This information is usually described in project documentation, created at the beginning of the development process. The primary constraints are scope, time, and budget. The secondary challenge is to optimize the allocation of necessary inputs and apply them to meet pre-defined objectives. The objective of project management is to produce a complete project which complies with the client's objectives.
Project managerA project manager is a professional in the field of project management. Project managers have the responsibility of the planning, procurement and execution of a project, in any undertaking that has a defined scope, defined start and a defined finish; regardless of industry. Project managers are first point of contact for any issues or discrepancies arising from within the heads of various departments in an organization before the problem escalates to higher authorities, as project representative.
Project planA project plan, according to the Project Management Body of Knowledge (PMBOK), is: "...a formal, approved document used to guide both project execution and project control. The primary uses of the project plan are to document planning assumptions and decisions, facilitate communication among project stakeholders, and document approved scope, cost, and schedule baselines. A project plan may be sumarized or detailed.
Public key infrastructureA public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email.
Radioactive wasteRadioactive waste is a type of hazardous waste that contains radioactive material. Radioactive waste is a result of many activities, including nuclear medicine, nuclear research, nuclear power generation, nuclear decommissioning, rare-earth mining, and nuclear weapons reprocessing. The storage and disposal of radioactive waste is regulated by government agencies in order to protect human health and the environment.
Key managementKey management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols. Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling, which typically refers to the internal handling of keys within the operation of a cipher.
Project stakeholderProject stakeholders are persons or entities who have an interest in a given project. According to the Project Management Institute (PMI), the term project stakeholder refers to "an individual, group, or organization, who may affect, be affected by, or perceive itself to be affected by a decision, activity, or outcome of a project, program, or portfolio. ISO 21500 uses a similar definition.
Constitutive equationIn physics and engineering, a constitutive equation or constitutive relation is a relation between two physical quantities (especially kinetic quantities as related to kinematic quantities) that is specific to a material or substance, and approximates the response of that material to external stimuli, usually as applied fields or forces. They are combined with other equations governing physical laws to solve physical problems; for example in fluid mechanics the flow of a fluid in a pipe, in solid state physics the response of a crystal to an electric field, or in structural analysis, the connection between applied stresses or loads to strains or deformations.
Spent nuclear fuelSpent nuclear fuel, occasionally called used nuclear fuel, is nuclear fuel that has been irradiated in a nuclear reactor (usually at a nuclear power plant). It is no longer useful in sustaining a nuclear reaction in an ordinary thermal reactor and, depending on its point along the nuclear fuel cycle, it will have different isotopic constituents than when it started. Nuclear fuel rods become progressively more radioactive (and less thermally useful) due to neutron activation as they are fissioned, or "burnt" in the reactor.
Key exchangeKey exchange (also key establishment) is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm. If the sender and receiver wish to exchange encrypted messages, each must be equipped to encrypt messages to be sent and decrypt messages received. The nature of the equipping they require depends on the encryption technique they might use. If they use a code, both will require a copy of the same codebook. If they use a cipher, they will need appropriate keys.
Key sizeIn cryptography, key size, key length, or key space refer to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the fastest known attack against an algorithm), because the security of all algorithms can be violated by brute-force attacks. Ideally, the lower-bound on an algorithm's security is by design equal to the key length (that is, the algorithm's design does not detract from the degree of security inherent in the key length).
Public-key cryptographyPublic-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.
Strength of materialsThe field of strength of materials (also called mechanics of materials) typically refers to various methods of calculating the stresses and strains in structural members, such as beams, columns, and shafts. The methods employed to predict the response of a structure under loading and its susceptibility to various failure modes takes into account the properties of the materials such as its yield strength, ultimate strength, Young's modulus, and Poisson's ratio.
Public key fingerprintIn public-key cryptography, a public key fingerprint is a short sequence of bytes used to identify a longer public key. Fingerprints are created by applying a cryptographic hash function to a public key. Since fingerprints are shorter than the keys they refer to, they can be used to simplify certain key management tasks. In Microsoft software, "thumbprint" is used instead of "fingerprint." A public key fingerprint is typically created through the following steps: A public key (and optionally some additional data) is encoded into a sequence of bytes.
Plasticity (physics)In physics and materials science, plasticity (also known as plastic deformation) is the ability of a solid material to undergo permanent deformation, a non-reversible change of shape in response to applied forces. For example, a solid piece of metal being bent or pounded into a new shape displays plasticity as permanent changes occur within the material itself. In engineering, the transition from elastic behavior to plastic behavior is known as yielding. Plastic deformation is observed in most materials, particularly metals, soils, rocks, concrete, and foams.
Nuclear power debateThe nuclear power debate is a long-running controversy about the risks and benefits of using nuclear reactors to generate electricity for civilian purposes. The debate about nuclear power peaked during the 1970s and 1980s, as more and more reactors were built and came online, and "reached an intensity unprecedented in the history of technology controversies" in some countries. In the 2010s, with growing public awareness about climate change and the critical role that carbon dioxide and methane emissions plays in causing the heating of the earth's atmosphere, there was a resurgence in the intensity of the nuclear power debate.
Clay mineralClay minerals are hydrous aluminium phyllosilicates (e.g. kaolin, Al2Si2O5(OH)4), sometimes with variable amounts of iron, magnesium, alkali metals, alkaline earths, and other cations found on or near some planetary surfaces. Clay minerals form in the presence of water and have been important to life, and many theories of abiogenesis involve them. They are important constituents of soils, and have been useful to humans since ancient times in agriculture and manufacturing.