WorldWideScience

Sample records for active length verification

  1. Inspector measurement verification activities

    International Nuclear Information System (INIS)

    George, R.S.; Crouch, R.

    e most difficult and complex activity facing a safeguards inspector involves the verification of measurements and the performance of the measurement system. Remeasurement is the key to measurement verification activities. Remeasurerements using the facility's measurement system provide the bulk of the data needed for determining the performance of the measurement system. Remeasurements by reference laboratories are also important for evaluation of the measurement system and determination of systematic errors. The use of these measurement verification activities in conjunction with accepted inventory verification practices provides a better basis for accepting or rejecting an inventory. (U.S.)

  2. Application of gel dosimetry - A preliminary study on verification of uniformity of activity and length of source used in Beta-Cath system

    International Nuclear Information System (INIS)

    Subramaniam, S.; Rabi Raja Singh, I.; Visalatchi, S.; Paul Ravindran, B.

    2002-01-01

    Recently the intraluminal irradiation of coronary arteries following balloon angioplasty is found to reduce proliferation of smooth muscle cells and restenosis. Among the isotopes used for the intracoronary irradiation, 90 Sr/Y appears to be ideal (H I Almos et al, 1996). In 1984 Gore et al proposed that radiation induced changes in the well-established Fricke solution could be probed with Nuclear Magnetic Resonance (NMR) relaxation measurements rather than using conventional spectrophotometry measurements. This was a major step in the development of gel dosimetry and since then gel dosimetry has been one of the major advances in the dosimetry of complex radiation fields has been in the area of gel dosimetry. In this preliminary work on gel dosimetry we present the verification of uniformity of activity along the length of the source train and verification of the length of the source used in the Beta-Cath system used for intracoronary brachytherapy with ferrous gel dosimeter. The Beta-Cath system obtained from Novoste, Norcross, GA was used in this study. It consists of a source train of 16 90 Sr/Y sources each of length 2.5mm. The total length of the source train is 40mm. For preparation of the Ferrous-Gelatin Gel, the recipe provided by the London Regional Cancer Center, London Ontario, Canada was used. Stock solutions of 50mM H 2 SO 4 , 0.3 mM ferrous ammonium sulphate, 0.05mM Xylenol orange was first prepared. The gel was prepared by mixing 4% gelatin with distilled water while stirring in a water bath at 40-42 deg. C. Acid solution, Ferrous ammonium sulphate solution and Xylenol orange were added and stirred in the water bath for about an hour to allow aeration. The mixture was poured in to three 20ml syringes to form the gel and stored in the refrigerator at 5 deg. C. For irradiation with Beta-Cath, the gel was prepared in three cylindrical 20ml syringes. A nylon tube having the same dimension as that of the delivery catheter used in intra-coronary was placed

  3. Remedial activities effectiveness verification in tailing areas.

    Science.gov (United States)

    Kluson, J; Thinova, L; Neznal, M; Svoboda, T

    2015-06-01

    The complex radiological study of the basin of sludge from the uranium ore mining and preprocessing was done. Air kerma rates (including its spectral analysis) at the reference height of 1 m above ground over the whole area were measured and radiation fields mapped during two measuring campaigns (years 2009 and 2014). K, U and Th concentrations in sludge and concentrations in depth profiles (including radon concentration and radon exhalation rates) in selected points were determined using gamma spectrometry for in situ as well as laboratory samples measurement. Results were used for the analysis, design evaluation and verification of the efficiency of the remediation measures. Efficiency of the sludge basin covering by the inert material was modelled using MicroShield code. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  4. Remedial activities effectiveness verification in tailing areas

    International Nuclear Information System (INIS)

    Kluson, J.; Thinova, L.; Svoboda, T.; Neznal, M.

    2015-01-01

    The complex radiological study of the basin of sludge from the uranium ore mining and preprocessing was done. Air kerma rates (including its spectral analysis) at the reference height of 1 m above ground over the whole area were measured and radiation fields mapped during two measuring campaigns (years 2009 and 2014). K, U and Th concentrations in sludge and concentrations in depth profiles (including radon concentration and radon exhalation rates) in selected points were determined using gamma spectrometry for in situ as well as laboratory samples measurement. Results were used for the analysis, design evaluation and verification of the efficiency of the remediation measures. Efficiency of the sludge basin covering by the inert material was modelled using MicroShield code. (authors)

  5. Online Signature Verification using Recurrent Neural Network and Length-normalized Path Signature

    OpenAIRE

    Lai, Songxuan; Jin, Lianwen; Yang, Weixin

    2017-01-01

    Inspired by the great success of recurrent neural networks (RNNs) in sequential modeling, we introduce a novel RNN system to improve the performance of online signature verification. The training objective is to directly minimize intra-class variations and to push the distances between skilled forgeries and genuine samples above a given threshold. By back-propagating the training signals, our RNN network produced discriminative features with desired metrics. Additionally, we propose a novel d...

  6. Formal Verification of Effectiveness of Control Activities in Business Processes

    Science.gov (United States)

    Arimoto, Yasuhito; Iida, Shusaku; Futatsugi, Kokichi

    It has been an important issue to deal with risks in business processes for achieving companies' goals. This paper introduces a method for applying a formal method to analysis of risks and control activities in business processes in order to evaluate control activities consistently, exhaustively, and to give us potential to have scientific discussion on the result of the evaluation. We focus on document flows in business activities and control activities and risks related to documents because documents play important roles in business. In our method, document flows including control activities are modeled and it is verified by OTS/CafeOBJ Method that risks about falsification of documents are avoided by control activities in the model. The verification is done by interaction between humans and CafeOBJ system with theorem proving, and it raises potential to discuss the result scientifically because the interaction gives us rigorous reasons why the result is derived from the verification.

  7. Verification of Monte Carlo transport codes by activation experiments

    OpenAIRE

    Chetvertkova, Vera

    2013-01-01

    With the increasing energies and intensities of heavy-ion accelerator facilities, the problem of an excessive activation of the accelerator components caused by beam losses becomes more and more important. Numerical experiments using Monte Carlo transport codes are performed in order to assess the levels of activation. The heavy-ion versions of the codes were released approximately a decade ago, therefore the verification is needed to be sure that they give reasonable results. Present work is...

  8. The verification of neutron activation analysis support system (cooperative research)

    Energy Technology Data Exchange (ETDEWEB)

    Sasajima, Fumio; Ichimura, Shigeju; Ohtomo, Akitoshi; Takayanagi, Masaji [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment; Sawahata, Hiroyuki; Ito, Yasuo [Tokyo Univ. (Japan). Research Center for Nuclear Science and Technology; Onizawa, Kouji [Radiation Application Development Association, Tokai, Ibaraki (Japan)

    2000-12-01

    Neutron activation analysis support system is the system in which even the user who has not much experience in the neutron activation analysis can conveniently and accurately carry out the multi-element analysis of the sample. In this verification test, subjects such functions, usability, precision and accuracy of the analysis and etc. of the neutron activation analysis support system were confirmed. As a method of the verification test, it was carried out using irradiation device, measuring device, automatic sample changer and analyzer equipped in the JRR-3M PN-3 facility, and analysis software KAYZERO/SOLCOI based on the k{sub 0} method. With these equipments, calibration of the germanium detector, measurement of the parameter of the irradiation field and analysis of three kinds of environmental standard sample were carried out. The k{sub 0} method adopted in this system is primarily utilized in Europe recently, and it is the analysis method, which can conveniently and accurately carried out the multi-element analysis of the sample without requiring individual comparison standard sample. By this system, total 28 elements were determined quantitatively, and 16 elements with the value guaranteed as analytical data of the NIST (National Institute of Standards and Technology) environment standard sample were analyzed in the accuracy within 15%. This report describes content and verification result of neutron activation support system. (author)

  9. Implementation Practices of Finland in Facilitating IAEA Verification Activities

    International Nuclear Information System (INIS)

    Martikka, E.; Ansaranta, T.; Honkamaa, T.; Hamalainen, M.

    2015-01-01

    The Member States provide the information to the IAEA according to the Safeguards Agreements and Additional Protocols. For example, the requirements to provide the reports and declarations are very general and there are no explanation what the IAEA is looking for from that information. It is important for the States to understand how their efforts to collect and provide information, and to facilitate IAEA verification activities, contribute to the achievement of objectives and finally to draw conclusions on the exclusively peaceful use of nuclear materials in a State. The IAEA is producing a new series of guidance called Safeguards Implementation Practices, SIP, guides, which are shedding light on the requirements and sharing the good practices of States. It is hoped that the SIP Guides will create a better understanding of the needs of the IAEA and the important role of States and facility operators in achieving safeguards objectives. The guides are also important for the States to share their lessons learned and good practices for the benefit of other States that might be developing their capabilities or enhancing their processes and procedures. The way is very wide and long, when a State decides to start up a new nuclear programme. At first there is a need for legislation, regulatory body, contact point, international agreements and then finally practical implementation of the safeguards in the nuclear facilities. There are a lot of issues to be prepared in advance to facilitate the IAEA's implementation of verification activities successfully, effectively and with the good quality. Using the structure of the IAEA's draft SIP Guide on Facilitating Verification Activities as a framework, this paper will describe the most relevant implementation practices and experiences in Finland. (author)

  10. Verification of Monte Carlo transport codes by activation experiments

    Energy Technology Data Exchange (ETDEWEB)

    Chetvertkova, Vera

    2012-12-18

    With the increasing energies and intensities of heavy-ion accelerator facilities, the problem of an excessive activation of the accelerator components caused by beam losses becomes more and more important. Numerical experiments using Monte Carlo transport codes are performed in order to assess the levels of activation. The heavy-ion versions of the codes were released approximately a decade ago, therefore the verification is needed to be sure that they give reasonable results. Present work is focused on obtaining the experimental data on activation of the targets by heavy-ion beams. Several experiments were performed at GSI Helmholtzzentrum fuer Schwerionenforschung. The interaction of nitrogen, argon and uranium beams with aluminum targets, as well as interaction of nitrogen and argon beams with copper targets was studied. After the irradiation of the targets by different ion beams from the SIS18 synchrotron at GSI, the γ-spectroscopy analysis was done: the γ-spectra of the residual activity were measured, the radioactive nuclides were identified, their amount and depth distribution were detected. The obtained experimental results were compared with the results of the Monte Carlo simulations using FLUKA, MARS and SHIELD. The discrepancies and agreements between experiment and simulations are pointed out. The origin of discrepancies is discussed. Obtained results allow for a better verification of the Monte Carlo transport codes, and also provide information for their further development. The necessity of the activation studies for accelerator applications is discussed. The limits of applicability of the heavy-ion beam-loss criteria were studied using the FLUKA code. FLUKA-simulations were done to determine the most preferable from the radiation protection point of view materials for use in accelerator components.

  11. Verification of Minimum Detectable Activity for Radiological Threat Source Search

    Science.gov (United States)

    Gardiner, Hannah; Myjak, Mitchell; Baciak, James; Detwiler, Rebecca; Seifert, Carolyn

    2015-10-01

    The Department of Homeland Security's Domestic Nuclear Detection Office is working to develop advanced technologies that will improve the ability to detect, localize, and identify radiological and nuclear sources from airborne platforms. The Airborne Radiological Enhanced-sensor System (ARES) program is developing advanced data fusion algorithms for analyzing data from a helicopter-mounted radiation detector. This detector platform provides a rapid, wide-area assessment of radiological conditions at ground level. The NSCRAD (Nuisance-rejection Spectral Comparison Ratios for Anomaly Detection) algorithm was developed to distinguish low-count sources of interest from benign naturally occurring radiation and irrelevant nuisance sources. It uses a number of broad, overlapping regions of interest to statistically compare each newly measured spectrum with the current estimate for the background to identify anomalies. We recently developed a method to estimate the minimum detectable activity (MDA) of NSCRAD in real time. We present this method here and report on the MDA verification using both laboratory measurements and simulated injects on measured backgrounds at or near the detection limits. This work is supported by the US Department of Homeland Security, Domestic Nuclear Detection Office, under competitively awarded contract/IAA HSHQDC-12-X-00376. This support does not constitute an express or implied endorsement on the part of the Gov't.

  12. An experimental verification of the compensation of length change of line scales caused by ambient air pressure

    International Nuclear Information System (INIS)

    Takahashi, Akira; Miwa, Nobuharu

    2010-01-01

    Line scales are used as a working standard of length for the calibration of optical measuring instruments such as profile projectors, measuring microscopes and video measuring systems. The authors have developed a one-dimensional calibration system for line scales to obtain a lower uncertainty of measurement. The scale calibration system, named Standard Scale Calibrator SSC-05, employs a vacuum interferometer system for length measurement, a 633 nm iodine-stabilized He–Ne laser to calibrate the oscillating frequency of the interferometer laser light source and an Abbe's error compensation structure. To reduce the uncertainty of measurement, the uncertainty factors of the line scale and ambient conditions should not be neglected. Using the length calibration system, the expansion and contraction of a line scale due to changes in ambient air pressure were observed and the measured scale length was corrected into the length under standard atmospheric pressure, 1013.25 hPa. Utilizing a natural rapid change in the air pressure caused by a tropical storm (typhoon), we carried out an experiment on the length measurement of a 1000 mm long line scale made of glass ceramic with a low coefficient of thermal expansion. Using a compensation formula for the length change caused by changes in ambient air pressure, the length change of the 1000 mm long line scale was compensated with a standard deviation of less than 1 nm

  13. Impact of streamflow data assimilation and length of the verification period on the quality of short-term ensemble hydrologic forecasts

    Science.gov (United States)

    Randrianasolo, A.; Thirel, G.; Ramos, M. H.; Martin, E.

    2014-11-01

    Data assimilation has gained wide recognition in hydrologic forecasting due mainly to its capacity to improve the quality of short-term forecasts. In this study, a comparative analysis is conducted to assess the impact of discharge data assimilation on the quality of streamflow forecasts issued by two different modeling conceptualizations of catchment response. The sensitivity of the performance metrics to the length of the verification period is also investigated. The hydrological modeling approaches are: the coupled physically-based hydro-meteorological model SAFRAN-ISBA-MODCOU, a distributed model with a data assimilation procedure that uses streamflow measurements to assess the initial state of soil water content that optimizes discharge simulations, and the lumped soil moisture-accounting type rainfall-runoff model GRP, which assimilates directly the last observed discharge to update the state of the routing store. The models are driven by the weather ensemble prediction system PEARP of Météo-France, which is based on the global spectral ARPEGE model zoomed over France. It runs 11 perturbed members for a forecast range of 60 h. Forecast and observed data are available for 86 catchments over a 17-month period (March 2005-July 2006) for both models and for 82 catchments over a 52-month period (April 2005-July 2009) for the GRP model. The first dataset is used to investigate the impact of streamflow data assimilation on forecast quality, while the second is used to evaluate the impact of the length of the verification period on the assessment of forecast quality. Forecasts are compared to daily observed discharges and scores are computed for lead times 24 h and 48 h. Results indicate an overall good performance of both hydrological models forced by the PEARP ensemble predictions when the models are run with their data assimilation procedures. In general, when data assimilation is performed, the quality of the forecasts increases: median differences between

  14. Length-scale dependent mechanical properties of Al-Cu eutectic alloy: Molecular dynamics based model and its experimental verification

    Science.gov (United States)

    Tiwary, C. S.; Chakraborty, S.; Mahapatra, D. R.; Chattopadhyay, K.

    2014-05-01

    This paper attempts to gain an understanding of the effect of lamellar length scale on the mechanical properties of two-phase metal-intermetallic eutectic structure. We first develop a molecular dynamics model for the in-situ grown eutectic interface followed by a model of deformation of Al-Al2Cu lamellar eutectic. Leveraging the insights obtained from the simulation on the behaviour of dislocations at different length scales of the eutectic, we present and explain the experimental results on Al-Al2Cu eutectic with various different lamellar spacing. The physics behind the mechanism is further quantified with help of atomic level energy model for different length scale as well as different strain. An atomic level energy partitioning of the lamellae and the interface regions reveals that the energy of the lamellae core are accumulated more due to dislocations irrespective of the length-scale. Whereas the energy of the interface is accumulated more due to dislocations when the length-scale is smaller, but the trend is reversed when the length-scale is large beyond a critical size of about 80 nm.

  15. WebPrInSeS: automated full-length clone sequence identification and verification using high-throughput sequencing data.

    Science.gov (United States)

    Massouras, Andreas; Decouttere, Frederik; Hens, Korneel; Deplancke, Bart

    2010-07-01

    High-throughput sequencing (HTS) is revolutionizing our ability to obtain cheap, fast and reliable sequence information. Many experimental approaches are expected to benefit from the incorporation of such sequencing features in their pipeline. Consequently, software tools that facilitate such an incorporation should be of great interest. In this context, we developed WebPrInSeS, a web server tool allowing automated full-length clone sequence identification and verification using HTS data. WebPrInSeS encompasses two separate software applications. The first is WebPrInSeS-C which performs automated sequence verification of user-defined open-reading frame (ORF) clone libraries. The second is WebPrInSeS-E, which identifies positive hits in cDNA or ORF-based library screening experiments such as yeast one- or two-hybrid assays. Both tools perform de novo assembly using HTS data from any of the three major sequencing platforms. Thus, WebPrInSeS provides a highly integrated, cost-effective and efficient way to sequence-verify or identify clones of interest. WebPrInSeS is available at http://webprinses.epfl.ch/ and is open to all users.

  16. First Exon Length Controls Active Chromatin Signatures and Transcription

    Directory of Open Access Journals (Sweden)

    Nicole I. Bieberstein

    2012-07-01

    Full Text Available Here, we explore the role of splicing in transcription, employing both genome-wide analysis of human ChIP-seq data and experimental manipulation of exon-intron organization in transgenic cell lines. We show that the activating histone modifications H3K4me3 and H3K9ac map specifically to first exon-intron boundaries. This is surprising, because these marks help recruit general transcription factors (GTFs to promoters. In genes with long first exons, promoter-proximal levels of H3K4me3 and H3K9ac are greatly reduced; consequently, GTFs and RNA polymerase II are low at transcription start sites (TSSs and exhibit a second, promoter-distal peak from which transcription also initiates. In contrast, short first exons lead to increased H3K4me3 and H3K9ac at promoters, higher expression levels, accuracy in TSS usage, and a lower frequency of antisense transcription. Therefore, first exon length is predictive for gene activity. Finally, splicing inhibition and intron deletion reduce H3K4me3 levels and transcriptional output. Thus, gene architecture and splicing determines transcription quantity and quality as well as chromatin signatures.

  17. Training to Support Standardization and Improvement of Safety I and C Related Verification and Validation Activities

    Energy Technology Data Exchange (ETDEWEB)

    Ammon, G.; Schoenfelder, C.

    2014-07-01

    In recent years AREVA has conducted several measures to enhance the effectiveness of safety I and C related verification and validation activities within nuclear power plant (NPP) new build as well as modernization projects, thereby further strengthening its commitment to achieving the highest level of safety in nuclear facilities. (Author)

  18. Verification in the international treaty and expected its activities for FMCT

    International Nuclear Information System (INIS)

    Kikuchi, Masahiro

    1997-01-01

    Cold war had been finished and the international society was going to move detente. The mass destruction weapons decrease its object and they are going to be reduced or reversed. By change of the international conditions in the field of non-proliferation, it is necessary to the activities for decreasing atomic weapons and a countermeasure of diffusion of nuclear materials produced by waste and dissection of excess atomic weapon to other countries and stranger. We understand that non-proliferation means a countermeasure of decreasing nuclear weapon. So that the non-proliferation system should be regulated systematically in order to foresee the international tendency in the future and the verification activities to attain reliability assurance of international treaty for disarmament and non-proliferation. NPT reconsider congress decided to begin early negotiation of Fissile Material Cut-off Treaty (FMCT) in 1995. The functions, verification and expected activities of FMCT are discussed. (S.Y.)

  19. Single-cell telomere-length quantification couples telomere length to meristem activity and stem cell development in Arabidopsis.

    Science.gov (United States)

    González-García, Mary-Paz; Pavelescu, Irina; Canela, Andrés; Sevillano, Xavier; Leehy, Katherine A; Nelson, Andrew D L; Ibañes, Marta; Shippen, Dorothy E; Blasco, Maria A; Caño-Delgado, Ana I

    2015-05-12

    Telomeres are specialized nucleoprotein caps that protect chromosome ends assuring cell division. Single-cell telomere quantification in animals established a critical role for telomerase in stem cells, yet, in plants, telomere-length quantification has been reported only at the organ level. Here, a quantitative analysis of telomere length of single cells in Arabidopsis root apex uncovered a heterogeneous telomere-length distribution of different cell lineages showing the longest telomeres at the stem cells. The defects in meristem and stem cell renewal observed in tert mutants demonstrate that telomere lengthening by TERT sets a replicative limit in the root meristem. Conversely, the long telomeres of the columella cells and the premature stem cell differentiation plt1,2 mutants suggest that differentiation can prevent telomere erosion. Overall, our results indicate that telomere dynamics are coupled to meristem activity and continuous growth, disclosing a critical association between telomere length, stem cell function, and the extended lifespan of plants. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  20. Assessment of capacity-building activities for forest measurement, reporting, and verification, 2011–15

    Science.gov (United States)

    Peneva-Reed, Elitsa I.; Romijn, J. Erika

    2018-05-31

    This report was written as a collaborative effort between the U.S. Geological Survey, SilvaCarbon, and Wageningen University with funding provided by the U.S. Agency for International Development and the European Space Agency, respectively, to address a pressing need for enhanced result-based monitoring and evaluation of delivered capacity-building activities. For this report, the capacity-building activities delivered by capacity-building providers (referred to as “providers” hereafter) during 2011–15 (the study period) to support countries in building measurement, reporting, and verification (MRV) systems for reducing emissions from deforestation and forest degradation (REDD+) were assessed and evaluated.Summarizing capacity-building activities and outcomes across multiple providers was challenging. Many of the providers did not have information readily available, which precluded them from participating in this study despite the usefulness of their information. This issue led to a key proposed future action: Capacity-building providers could establish a central repository within the Global Forestry Observation Initiative (GFOI; http://www.gfoi.org/) where data from past, current, and future activities of all capacity-building providers could be stored. The repository could be maintained in a manner to continually learn from previous lessons.Although various providers monitored and evaluated the success of their capacity-building activities, such evaluations only assessed the success of immediate outcomes and not the overarching outcomes and impacts of activities implemented by multiple providers. Good monitoring and evaluation should continuously monitor and periodically evaluate all factors affecting the outcomes of a provided capacity-building activity.The absence of a methodology to produce quantitative evidence of a causal link between multiple capacity-building activities delivered and successful outcomes left only a plausible association. A previous

  1. Modelling and Verification of Web Services Business Activity Protocol

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2011-01-01

    WS-Business Activity specification defines two coordination protocols in order to ensure a consistent agreement on the outcome of long-running distributed applications. We use the model checker Uppaal to analyse the Business Agreement with Coordination Completion protocol type. Our analyses show ...

  2. Active Learning of Markov Decision Processes for System Verification

    DEFF Research Database (Denmark)

    Chen, Yingke; Nielsen, Thomas Dyhre

    2012-01-01

    deterministic Markov decision processes from data by actively guiding the selection of input actions. The algorithm is empirically analyzed by learning system models of slot machines, and it is demonstrated that the proposed active learning procedure can significantly reduce the amount of data required...... demanding process, and this shortcoming has motivated the development of algorithms for automatically learning system models from observed system behaviors. Recently, algorithms have been proposed for learning Markov decision process representations of reactive systems based on alternating sequences...... of input/output observations. While alleviating the problem of manually constructing a system model, the collection/generation of observed system behaviors can also prove demanding. Consequently we seek to minimize the amount of data required. In this paper we propose an algorithm for learning...

  3. One-Quarter-Car Active SuspensionModel Verification

    Directory of Open Access Journals (Sweden)

    Hyniova Katerina

    2017-01-01

    Full Text Available Suspension system influences both the comfort and safety of the passengers. In the paper, energy recuperation and management in automotive suspension systems with linear electric motors that are controlled by a designed H∞ controller to generate a variable mechanical force for a car damper is presented. Vehicle shock absorbers in which forces are generated in response to feedback signals by active elements obviously offer increased design flexibility compared to the conventional suspensions with passive elements (springs and dampers. The main advantage of the proposed solution that uses a linear AC motor is the possibility to generate desired forces acting between the unsprung (wheel and sprung (one-quarter of the car body mass masses of the car, providing good insulation of the car sprung mass from the road surface roughness and load disturbances. As shown in the paper, under certain circumstances linear motors as actuators enable to transform mechanical energy of the vertical car vibrations to electrical energy, accumulate it, and use it when needed. Energy flow control enables to reduce or even eliminate the demands on the external power source. In particular, the paper is focused on experiments with active shock absorber that has been taken on the designed test bed and the way we developed an appropriate input signal for the test bed that as real road disturbance acts upon the vibration absorber and the obtained results are evaluated at the end. Another important point the active suspension design should satisfy is energy supply control that is made via standard controller modification, and which allows changing amount of energy required by the system. Functionality of the designed controller modification was verified taking various experiments on the experiment stand as mentioned in the paper.

  4. Examples of verification knowledge and testing of the secondary students through the worksheet. Suggestions for leisure time activities

    International Nuclear Information System (INIS)

    Chmielewska, E.; Kuruc, J.

    2010-01-01

    In this chapter some examples of verification knowledge and testing of the secondary students through the worksheet as well as suggestions for leisure time activities are presented. Used and recommended literature is included.

  5. At-tank Low-Activity Feed Homogeneity Analysis Verification

    International Nuclear Information System (INIS)

    DOUGLAS, J.G.

    2000-01-01

    This report evaluates the merit of selecting sodium, aluminum, and cesium-137 as analytes to indicate homogeneity of soluble species in low-activity waste (LAW) feed and recommends possible analytes and physical properties that could serve as rapid screening indicators for LAW feed homogeneity. The three analytes are adequate as screening indicators of soluble species homogeneity for tank waste when a mixing pump is used to thoroughly mix the waste in the waste feed staging tank and when all dissolved species are present at concentrations well below their solubility limits. If either of these conditions is violated, then the three indicators may not be sufficiently chemically representative of other waste constituents to reliably indicate homogeneity in the feed supernatant. Additional homogeneity indicators that should be considered are anions such as fluoride, sulfate, and phosphate, total organic carbon/total inorganic carbon, and total alpha to estimate the transuranic species. Physical property measurements such as gamma profiling, conductivity, specific gravity, and total suspended solids are recommended as possible at-tank methods for indicating homogeneity. Indicators of LAW feed homogeneity are needed to reduce the U.S. Department of Energy, Office of River Protection (ORP) Program's contractual risk by assuring that the waste feed is within the contractual composition and can be supplied to the waste treatment plant within the schedule requirements

  6. Verification and disarmament

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H. [IAEA, Vienna (Austria)

    1998-07-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed.

  7. Verification and disarmament

    International Nuclear Information System (INIS)

    Blix, H.

    1998-01-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed

  8. Length and activation dependent variations in muscle shear wave speed

    International Nuclear Information System (INIS)

    Chernak, L A; DeWall, R J; Lee, K S; Thelen, D G

    2013-01-01

    Muscle stiffness is known to vary as a result of a variety of disease states, yet current clinical methods for quantifying muscle stiffness have limitations including cost and availability. We investigated the capability of shear wave elastography (SWE) to measure variations in gastrocnemius shear wave speed induced via active contraction and passive stretch. Ten healthy young adults were tested. Shear wave speeds were measured using a SWE transducer positioned over the medial gastrocnemius at ankle angles ranging from maximum dorsiflexion to maximum plantarflexion. Shear wave speeds were also measured during voluntary plantarflexor contractions at a fixed ankle angle. Average shear wave speed increased significantly from 2.6 to 5.6 m s –1 with passive dorsiflexion and the knee in an extended posture, but did not vary with dorsiflexion when the gastrocnemius was shortened in a flexed knee posture. During active contractions, shear wave speed monotonically varied with the net ankle moment generated, reaching 8.3 m s –1 in the maximally contracted condition. There was a linear correlation between shear wave speed and net ankle moment in both the active and passive conditions; however, the slope of this linear relationship was significantly steeper for the data collected during passive loading conditions. The results show that SWE is a promising approach for quantitatively assessing changes in mechanical muscle loading. However, the differential effect of active and passive loading on shear wave speed makes it important to carefully consider the relevant loading conditions in which to use SWE to characterize in vivo muscle properties. (paper)

  9. Current Research on Containment Technologies for Verification Activities: Advanced Tools for Maintaining Continuity of Knowledge

    International Nuclear Information System (INIS)

    Smartt, H.; Kuhn, M.; Krementz, D.

    2015-01-01

    The U.S. National Nuclear Security Administration (NNSA) Office of Non-proliferation and Verification Research and Development currently funds research on advanced containment technologies to support Continuity of Knowledge (CoK) objectives for verification regimes. One effort in this area is the Advanced Tools for Maintaining Continuity of Knowledge (ATCK) project. Recognizing that CoK assurances must withstand potential threats from sophisticated adversaries, and that containment options must therefore keep pace with technology advances, the NNSA research and development on advanced containment tools is an important investment. The two ATCK efforts underway at present address the technical containment requirements for securing access points (loop seals) and protecting defined volumes. Multiple U.S. national laboratories are supporting this project: Sandia National Laboratories (SNL), Savannah River National Laboratory (SRNL), and Oak Ridge National Laboratory (ORNL). SNL and SRNL are developing the ''Ceramic Seal,'' an active loop seal that integrates multiple advanced security capabilities and improved efficiency housed within a small-volume ceramic body. The development includes an associated handheld reader and interface software. Currently at the prototype stage, the Ceramic Seal will undergo a series of tests to determine operational readiness. It will be field tested in a representative verification trial in 2016. ORNL is developing the Whole Volume Containment Seal (WCS), a flexible conductive fabric capable of enclosing various sizes and shapes of monitored items. The WCS includes a distributed impedance measurement system for imaging the fabric surface area and passive tamper-indicating features such as permanent-staining conductive ink. With the expected technology advances from the Ceramic Seal and WCS, the ATCK project takes significant steps in advancing containment technologies to help maintain CoK for various verification

  10. Application of semi-active RFID power meter in automatic verification pipeline and intelligent storage system

    Science.gov (United States)

    Chen, Xiangqun; Huang, Rui; Shen, Liman; chen, Hao; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Xu, Renheng

    2018-03-01

    In this paper, the semi-active RFID watt-hour meter is applied to automatic test lines and intelligent warehouse management, from the transmission system, test system and auxiliary system, monitoring system, realize the scheduling of watt-hour meter, binding, control and data exchange, and other functions, make its more accurate positioning, high efficiency of management, update the data quickly, all the information at a glance. Effectively improve the quality, efficiency and automation of verification, and realize more efficient data management and warehouse management.

  11. Feasibility of proton-activated implantable markers for proton range verification using PET

    Science.gov (United States)

    Cho, Jongmin; Ibbott, Geoffrey; Gillin, Michael; Gonzalez-Lepera, Carlos; Titt, Uwe; Paganetti, Harald; Kerr, Matthew; Mawlawi, Osama

    2013-11-01

    Proton beam range verification using positron emission tomography (PET) currently relies on proton activation of tissue, the products of which decay with a short half-life and necessitate an on-site PET scanner. Tissue activation is, however, negligible near the distal dose fall-off region of the proton beam range due to their high interaction energy thresholds. Therefore Monte Carlo simulation is often supplemented for comparison with measurement; however, this also may be associated with systematic and statistical uncertainties. Therefore, we sought to test the feasibility of using long-lived proton-activated external materials that are inserted or infused into the target volume for more accurate proton beam range verification that could be performed at an off-site PET scanner. We irradiated samples of ≥98% 18O-enriched water, natural Cu foils, and >97% 68Zn-enriched foils as candidate materials, along with samples of tissue-equivalent materials including 16O water, heptane (C7H16), and polycarbonate (C16H14O3)n, at four depths (ranging from 100% to 3% of center of modulation (COM) dose) along the distal fall-off of a modulated 160 MeV proton beam. Samples were irradiated either directly or after being embedded in Plastic Water® or balsa wood. We then measured the activity of the samples using PET imaging for 20 or 30 min after various delay times. Measured activities of candidate materials were up to 100 times greater than those of the tissue-equivalent materials at the four distal dose fall-off depths. The differences between candidate materials and tissue-equivalent materials became more apparent after longer delays between irradiation and PET imaging, due to the longer half-lives of the candidate materials. Furthermore, the activation of the candidate materials closely mimicked the distal dose fall-off with offsets of 1 to 2 mm. Also, signals from the foils were clearly visible compared to the background from the activated Plastic Water® and balsa wood

  12. Towards real-time VMAT verification using a prototype, high-speed CMOS active pixel sensor.

    Science.gov (United States)

    Zin, Hafiz M; Harris, Emma J; Osmond, John P F; Allinson, Nigel M; Evans, Philip M

    2013-05-21

    This work investigates the feasibility of using a prototype complementary metal oxide semiconductor active pixel sensor (CMOS APS) for real-time verification of volumetric modulated arc therapy (VMAT) treatment. The prototype CMOS APS used region of interest read out on the chip to allow fast imaging of up to 403.6 frames per second (f/s). The sensor was made larger (5.4 cm × 5.4 cm) using recent advances in photolithographic technique but retains fast imaging speed with the sensor's regional read out. There is a paradigm shift in radiotherapy treatment verification with the advent of advanced treatment techniques such as VMAT. This work has demonstrated that the APS can track multi leaf collimator (MLC) leaves moving at 18 mm s(-1) with an automatic edge tracking algorithm at accuracy better than 1.0 mm even at the fastest imaging speed. Evaluation of the measured fluence distribution for an example VMAT delivery sampled at 50.4 f/s was shown to agree well with the planned fluence distribution, with an average gamma pass rate of 96% at 3%/3 mm. The MLC leaves motion and linac pulse rate variation delivered throughout the VMAT treatment can also be measured. The results demonstrate the potential of CMOS APS technology as a real-time radiotherapy dosimeter for delivery of complex treatments such as VMAT.

  13. Effect of altering starting length and activation timing of muscle on fiber strain and muscle damage.

    Science.gov (United States)

    Butterfield, Timothy A; Herzog, Walter

    2006-05-01

    Muscle strain injuries are some of the most frequent injuries in sports and command a great deal of attention in an effort to understand their etiology. These injuries may be the culmination of a series of subcellular events accumulated through repetitive lengthening (eccentric) contractions during exercise, and they may be influenced by a variety of variables including fiber strain magnitude, peak joint torque, and starting muscle length. To assess the influence of these variables on muscle injury magnitude in vivo, we measured fiber dynamics and joint torque production during repeated stretch-shortening cycles in the rabbit tibialis anterior muscle, at short and long muscle lengths, while varying the timing of activation before muscle stretch. We found that a muscle subjected to repeated stretch-shortening cycles of constant muscle-tendon unit excursion exhibits significantly different joint torque and fiber strains when the timing of activation or starting muscle length is changed. In particular, measures of fiber strain and muscle injury were significantly increased by altering activation timing and increasing the starting length of the muscle. However, we observed differential effects on peak joint torque during the cyclic stretch-shortening exercise, as increasing the starting length of the muscle did not increase torque production. We conclude that altering activation timing and muscle length before stretch may influence muscle injury by significantly increasing fiber strain magnitude and that fiber dynamics is a more important variable than muscle-tendon unit dynamics and torque production in influencing the magnitude of muscle injury.

  14. Relationship between metabolism and ovarian activity in dairy cows with different dry period lengths

    NARCIS (Netherlands)

    Chen, J.C.; Soede, N.M.; Dorland, van H.A.; Remmelink, G.J.; Bruckmaier, R.M.; Kemp, B.; Knegsel, van A.T.M.

    2015-01-01

    The objectives of the present study were to evaluate the effects of dry period length on ovarian activity in cows fed a lipogenic or a glucogenic diet within 100 days in milk (DIM) and to determine relationships between ovarian activity and energy balance and metabolic status in early lactation.

  15. Experimental verification of active IR stealth technology by controlling the surface temperature using a thermoelectric element

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Dong Geon; Han, Kuk Il; Choi, Jun Hyuk; Kim, Tae Kuk [Dept. of Mechanical Engineering, Chung Ang University, Seoul (Korea, Republic of)

    2016-10-15

    In this paper, we propose a technique for IR low-observability that uses an active IR signal tuning through the real time control of the object surface temperature according to the varying background environment. This is achieved by applying the proper object surface temperature obtained to result in the minimum radiance difference between the object and the background. Experimental verification by using the thermoelectric temperature control element shows that the IR radiance contrast between the object and the background can be reduced up to 99% during the night and up to 95% during the day time as compared to the un-tuned original radiance contrast values. The stealth technology demonstrated in this paper may be applied for many military systems needed for the IR stealth performance when a suitable temperature control unit is developed.

  16. Experimental verification of active IR stealth technology by controlling the surface temperature using a thermoelectric element

    International Nuclear Information System (INIS)

    Kim, Dong Geon; Han, Kuk Il; Choi, Jun Hyuk; Kim, Tae Kuk

    2016-01-01

    In this paper, we propose a technique for IR low-observability that uses an active IR signal tuning through the real time control of the object surface temperature according to the varying background environment. This is achieved by applying the proper object surface temperature obtained to result in the minimum radiance difference between the object and the background. Experimental verification by using the thermoelectric temperature control element shows that the IR radiance contrast between the object and the background can be reduced up to 99% during the night and up to 95% during the day time as compared to the un-tuned original radiance contrast values. The stealth technology demonstrated in this paper may be applied for many military systems needed for the IR stealth performance when a suitable temperature control unit is developed

  17. The Effect of Physical Activity agains the Telomere Length in the Leukocytes Cells of KONI Athletes

    Directory of Open Access Journals (Sweden)

    Endang Purwaningsih

    2017-07-01

    Full Text Available Telomeres are strands of non coding DNA at the ends of chromosomes that have the primary function to protect DNA from damage and maintain chromosomal stability. Physical exercise will increase the antioxidant activity can increase telomere proteins, lengthen telomeres and or protein networks associated with telomere so that the telomere remains long, or stopping telomere shortening. Telomere length was also associated with age. The purpose of the research was to determine telomere length of leukocyte cells in the KONI (Indonesian National Sports Committee athletes in Jakarta. The research method is descriptive, by measuring telomere length using quantitative PCR on leukocyte cells. Samples are KONI athletes from several sports, including men and women athletes, with ages between 15-20 years. Used a control group (not athletes is students of the Faculty of Medicine, University of YARSI. The results showed that there was no significant difference (p> 0.05 between telomere length group of athletes with the control group in both sexes. Similarly, telomere length between athlete male with female athletes also showed no significant difference (p> 0.05. It was concluded that physical exercise in athletes KONI at the age of 15- 20 years had no effect on telomere length in leukocytes. The results of this study provide information about the telomere length in Indonesian athletes at an early age.

  18. Active Mirror Predictive and Requirements Verification Software (AMP-ReVS)

    Science.gov (United States)

    Basinger, Scott A.

    2012-01-01

    This software is designed to predict large active mirror performance at various stages in the fabrication lifecycle of the mirror. It was developed for 1-meter class powered mirrors for astronomical purposes, but is extensible to other geometries. The package accepts finite element model (FEM) inputs and laboratory measured data for large optical-quality mirrors with active figure control. It computes phenomenological contributions to the surface figure error using several built-in optimization techniques. These phenomena include stresses induced in the mirror by the manufacturing process and the support structure, the test procedure, high spatial frequency errors introduced by the polishing process, and other process-dependent deleterious effects due to light-weighting of the mirror. Then, depending on the maturity of the mirror, it either predicts the best surface figure error that the mirror will attain, or it verifies that the requirements for the error sources have been met once the best surface figure error has been measured. The unique feature of this software is that it ties together physical phenomenology with wavefront sensing and control techniques and various optimization methods including convex optimization, Kalman filtering, and quadratic programming to both generate predictive models and to do requirements verification. This software combines three distinct disciplines: wavefront control, predictive models based on FEM, and requirements verification using measured data in a robust, reusable code that is applicable to any large optics for ground and space telescopes. The software also includes state-of-the-art wavefront control algorithms that allow closed-loop performance to be computed. It allows for quantitative trade studies to be performed for optical systems engineering, including computing the best surface figure error under various testing and operating conditions. After the mirror manufacturing process and testing have been completed, the

  19. [Methods of measuring telomere length and telomerase activity--practice and problems].

    Science.gov (United States)

    Saito, Y; Suda, T; Hatakeyama, K

    1998-05-01

    The development of a highly sensitive method for detection of telomerase activity, telomeric repeat amplification protocol (TRAP), has provided knowledge on telomerase activity in normal and cancer tissues. Subsequent several modifications have been achieved, including an introduction of the internal standard and hybridization protection technique that leads to simplicity and improvement of reproducibility and linearity of this method, and application of TRAP to in situ analysis to identify the cells responsible for telomerase activity. As for measurement of telomere length, fluorescence in situ hybridization technique appeared to give an information of telomere length on an individual chromosome in contrast to analysis of terminal restriction fragment, a conventional method which can express mean telomere length of all chromosomes. Further methodological improvement in this field is ongoing and showing a new sight on cell mortality and immortality.

  20. Activity-dependent self-regulation of viscous length scales in biological systems

    Science.gov (United States)

    Nandi, Saroj Kumar

    2018-05-01

    The cellular cortex, which is a highly viscous thin cytoplasmic layer just below the cell membrane, controls the cell's mechanical properties, which can be characterized by a hydrodynamic length scale ℓ . Cells actively regulate ℓ via the activity of force-generating molecules, such as myosin II. Here we develop a general theory for such systems through a coarse-grained hydrodynamic approach including activity in the static description of the system providing an experimentally accessible parameter and elucidate the detailed mechanism of how a living system can actively self-regulate its hydrodynamic length scale, controlling the rigidity of the system. Remarkably, we find that ℓ , as a function of activity, behaves universally and roughly inversely proportional to the activity of the system. Our theory rationalizes a number of experimental findings on diverse systems, and comparison of our theory with existing experimental data shows good agreement.

  1. Amplification of Frequency-Modulated Similariton Pulses in Length-Inhomogeneous Active Fibers

    Directory of Open Access Journals (Sweden)

    I. O. Zolotovskii

    2012-01-01

    Full Text Available The possibility of an effective gain of the self-similar frequency-modulated (FM wave packets is studied in the length-inhomogeneous active fibers. The dynamics of parabolic pulses with the constant chirp has been considered. The optimal profile for the change of the group-velocity dispersion corresponding to the optimal similariton pulse amplification has been obtained. It is shown that the use of FM pulses in the active (gain and length-inhomogeneous optical fibers with the normal group-velocity dispersion can provide subpicosecond optical pulse amplification up to the energies higher than 1 nJ.

  2. Association of day length and weather conditions with physical activity levels in older community dwelling people.

    Directory of Open Access Journals (Sweden)

    Miles D Witham

    Full Text Available Weather is a potentially important determinant of physical activity. Little work has been done examining the relationship between weather and physical activity, and potential modifiers of any relationship in older people. We therefore examined the relationship between weather and physical activity in a cohort of older community-dwelling people.We analysed prospectively collected cross-sectional activity data from community-dwelling people aged 65 and over in the Physical Activity Cohort Scotland. We correlated seven day triaxial accelerometry data with daily weather data (temperature, day length, sunshine, snow, rain, and a series of potential effect modifiers were tested in mixed models: environmental variables (urban vs rural dwelling, percentage of green space, psychological variables (anxiety, depression, perceived behavioural control, social variables (number of close contacts and health status measured using the SF-36 questionnaire.547 participants, mean age 78.5 years, were included in this analysis. Higher minimum daily temperature and longer day length were associated with higher activity levels; these associations remained robust to adjustment for other significant associates of activity: age, perceived behavioural control, number of social contacts and physical function. Of the potential effect modifier variables, only urban vs rural dwelling and the SF-36 measure of social functioning enhanced the association between day length and activity; no variable modified the association between minimum temperature and activity.In older community dwelling people, minimum temperature and day length were associated with objectively measured activity. There was little evidence for moderation of these associations through potentially modifiable health, environmental, social or psychological variables.

  3. Experimental verification of the effect of cable length on voltage distribution in stator winding of an induction motor under surge condition

    Energy Technology Data Exchange (ETDEWEB)

    Oyegoke, B.S. [Helsinki Univ. of Technology, Otaniemi (Finland). Lab. of Electromechanics

    1997-12-31

    This paper presents the results of surge distribution tests performed on a stator of a 6 kV induction motor. The primary aim of these tests was to determine the wave propagation properties of the machine winding fed via cables of different lengths. Considering the measured resorts, conclusions are derived regarding the effect of cable length on the surge distribution within the stator winding of an ac motor. (orig.) 15 refs.

  4. Characterizing proton-activated materials to develop PET-mediated proton range verification markers

    Science.gov (United States)

    Cho, Jongmin; Ibbott, Geoffrey S.; Kerr, Matthew D.; Amos, Richard A.; Stingo, Francesco C.; Marom, Edith M.; Truong, Mylene T.; Palacio, Diana M.; Betancourt, Sonia L.; Erasmus, Jeremy J.; DeGroot, Patricia M.; Carter, Brett W.; Gladish, Gregory W.; Sabloff, Bradley S.; Benveniste, Marcelo F.; Godoy, Myrna C.; Patil, Shekhar; Sorensen, James; Mawlawi, Osama R.

    2016-06-01

    Conventional proton beam range verification using positron emission tomography (PET) relies on tissue activation alone and therefore requires particle therapy PET whose installation can represent a large financial burden for many centers. Previously, we showed the feasibility of developing patient implantable markers using high proton cross-section materials (18O, Cu, and 68Zn) for in vivo proton range verification using conventional PET scanners. In this technical note, we characterize those materials to test their usability in more clinically relevant conditions. Two phantoms made of low-density balsa wood (~0.1 g cm-3) and beef (~1.0 g cm-3) were embedded with Cu or 68Zn foils of several volumes (10-50 mm3). The metal foils were positioned at several depths in the dose fall-off region, which had been determined from our previous study. The phantoms were then irradiated with different proton doses (1-5 Gy). After irradiation, the phantoms with the embedded foils were moved to a diagnostic PET scanner and imaged. The acquired data were reconstructed with 20-40 min of scan time using various delay times (30-150 min) to determine the maximum contrast-to-noise ratio. The resultant PET/computed tomography (CT) fusion images of the activated foils were then examined and the foils’ PET signal strength/visibility was scored on a 5 point scale by 13 radiologists experienced in nuclear medicine. For both phantoms, the visibility of activated foils increased in proportion to the foil volume, dose, and PET scan time. A linear model was constructed with visibility scores as the response variable and all other factors (marker material, phantom material, dose, and PET scan time) as covariates. Using the linear model, volumes of foils that provided adequate visibility (score 3) were determined for each dose and PET scan time. The foil volumes that were determined will be used as a guideline in developing practical implantable markers.

  5. Effect of grass silage chop length on chewing activity and digestibility

    DEFF Research Database (Denmark)

    Garmo, T.H.; Randby, Å.T.; Eknæs, M.

    2008-01-01

    Round bale grass silage harvested early (D-value 757 g kg-1 DM) or at a normal (D-value 696 g kg-1 DM) time was used to study the effect of harvesting time, chop length and their interaction on chewing activity and digestibility by dairy cows. Six early lactating Norwegian Red cows were used in a 6...... due to reduced ET, CT = 45, 41 and 39 min kg-1 DM for rations with long, coarsely and finely chopped silage, respectively. Grass silage chop length did not influence diet digestibility, but there was a significant effect of harvesting time on digestibility. No interaction between harvesting time...

  6. All-fiber, long-active-length Fabry-Perot strain sensor.

    Science.gov (United States)

    Pevec, Simon; Donlagic, Denis

    2011-08-01

    This paper presents a high-sensitivity, all-silica, all-fiber Fabry-Perot strain-sensor. The proposed sensor provides a long active length, arbitrary length of Fabry-Perot cavity, and low intrinsic temperature sensitivity. The sensor was micro-machined from purposely-developed sensor-forming fiber that is etched and directly spliced to the lead-in fiber. This manufacturing process has good potential for cost-effective, high-volume production. Its measurement range of over 3000 µε, and strain-resolution better than 1 µε were demonstrated by the application of a commercial, multimode fiber-based signal processor.

  7. Validation and Verification of Operational Land Analysis Activities at the Air Force Weather Agency

    Science.gov (United States)

    Shaw, Michael; Kumar, Sujay V.; Peters-Lidard, Christa D.; Cetola, Jeffrey

    2012-01-01

    The NASA developed Land Information System (LIS) is the Air Force Weather Agency's (AFWA) operational Land Data Assimilation System (LDAS) combining real time precipitation observations and analyses, global forecast model data, vegetation, terrain, and soil parameters with the community Noah land surface model, along with other hydrology module options, to generate profile analyses of global soil moisture, soil temperature, and other important land surface characteristics. (1) A range of satellite data products and surface observations used to generate the land analysis products (2) Global, 1/4 deg spatial resolution (3) Model analysis generated at 3 hours. AFWA recognizes the importance of operational benchmarking and uncertainty characterization for land surface modeling and is developing standard methods, software, and metrics to verify and/or validate LIS output products. To facilitate this and other needs for land analysis activities at AFWA, the Model Evaluation Toolkit (MET) -- a joint product of the National Center for Atmospheric Research Developmental Testbed Center (NCAR DTC), AFWA, and the user community -- and the Land surface Verification Toolkit (LVT), developed at the Goddard Space Flight Center (GSFC), have been adapted to operational benchmarking needs of AFWA's land characterization activities.

  8. Association between objectively measured physical activity, chronic stress and leukocyte telomere length.

    Science.gov (United States)

    von Känel, Roland; Bruwer, Erna J; Hamer, Mark; de Ridder, J Hans; Malan, Leoné

    2017-10-01

    Physical activity (PA) attenuates chronic stress and age-related and cardiovascular disease risks, whereby potentially slowing telomere shortening. We aimed to study the association between seven-day objectively measured habitual PA, chronic stress and leukocyte telomere length. Study participants were African (N.=96) and Caucasian (N.=107) school teachers of the Sympathetic activity and Ambulatory Blood Pressure in Africans study. All lifestyle characteristics (including PA) were objectively measured. The general health questionnaire and serum cortisol were assessed as psychological and physical measures of chronic stress. Leukocyte telomere length was measured using the quantitative real-time polymerase chain reaction. Africans had significantly shorter telomeres (Pstress or telomere length. However, more time spent with light intensity PA time was significantly and independently correlated with lower waist circumference (r=-0.21, P=0.004); in turn, greater waist circumference was significantly associated shorter telomeres (β=-0.17 [-0.30, -0.03], P=0.017). Habitual PA of different intensity was not directly associated with markers of chronic stress and leukocyte telomere length in this biethnic cohort. However, our findings suggest that light intensity PA could contribute to lowered age-related disease risk and healthy ageing by facilitating maintenance of a normal waist circumference.

  9. Design of an Active Multispectral SWIR Camera System for Skin Detection and Face Verification

    Directory of Open Access Journals (Sweden)

    Holger Steiner

    2016-01-01

    Full Text Available Biometric face recognition is becoming more frequently used in different application scenarios. However, spoofing attacks with facial disguises are still a serious problem for state of the art face recognition algorithms. This work proposes an approach to face verification based on spectral signatures of material surfaces in the short wave infrared (SWIR range. They allow distinguishing authentic human skin reliably from other materials, independent of the skin type. We present the design of an active SWIR imaging system that acquires four-band multispectral image stacks in real-time. The system uses pulsed small band illumination, which allows for fast image acquisition and high spectral resolution and renders it widely independent of ambient light. After extracting the spectral signatures from the acquired images, detected faces can be verified or rejected by classifying the material as “skin” or “no-skin.” The approach is extensively evaluated with respect to both acquisition and classification performance. In addition, we present a database containing RGB and multispectral SWIR face images, as well as spectrometer measurements of a variety of subjects, which is used to evaluate our approach and will be made available to the research community by the time this work is published.

  10. Active aging as a way of keeping diseases at arm’s length

    DEFF Research Database (Denmark)

    Lassen, Aske Juul

    Active ageing has increasingly become the ideal of how to live later life. Concepts of activity, participation and independence are central to how elderly see themselves and practice aging (Katz 2000). The elderly are encouraged and expected to stay active and independent. This is believed...... to be good for their quality of life, health, functionality and the economy (Sundhedsstyrelsen 2008, EC 2006, WHO 2002). At the same time active aging is inscribed into a general health care focus, which individualizes the responsibility for health and disease. This requires subjects ready to self......-care, by paying attention to the signals of the body and leading healthy lives (Rose 2001). However, active aging seems to contain an ambiguity in this aspect, as the practice of active aging is often a way for elderly to keep diseases at arm’s length, and not a way to sense the possible abnormalities in the body...

  11. The interdependence of Ca2+ activation, sarcomere length, and power output in the heart.

    Science.gov (United States)

    McDonald, Kerry S

    2011-07-01

    Myocardium generates power to perform external work on the circulation; yet, many questions regarding intermolecular mechanisms regulating power output remain unresolved. Power output equals force × shortening velocity, and some interesting new observations regarding control of these two factors have arisen. While it is well established that sarcomere length tightly controls myocyte force, sarcomere length-tension relationships also appear to be markedly modulated by PKA-mediated phosphorylation of myofibrillar proteins. Concerning loaded shortening, historical models predict independent cross-bridge mechanics; however, it seems that the mechanical state of one population of cross-bridges affects the activity of other cross-bridges by, for example, recruitment of cross-bridges from the non-cycling pool to the cycling force-generating pool during submaximal Ca(2+) activation. This is supported by the findings that Ca(2+) activation levels, myofilament phosphorylation, and sarcomere length are all modulators of loaded shortening and power output independent of their effects on force. This fine tuning of power output probably helps optimize myocardial energetics and to match ventricular supply with peripheral demand; yet, the discernment of the chemo-mechanical signals that modulate loaded shortening needs further clarification since power output may be a key convergent point and feedback regulator of cytoskeleton and cellular signals that control myocyte growth and survival.

  12. Implementation of the Additional Protocol: Verification activities at uranium mines and mills

    International Nuclear Information System (INIS)

    Bragin, V.; Carlson, J.; Leslie, R.

    2001-01-01

    Full text: The mining and milling of uranium is the first in a long chain of processes required to produce nuclear materials in a form suitable for use in nuclear weapons. Misuse of a declared uranium mining/milling facility, in the form of understatement of production, would be hard to detect with the same high level of confidence as afforded by classical safeguards on other parts of the nuclear fuel cycle. For these reasons, it would not be cost-effective to apply verification techniques based on classical safeguards concepts to a mining/milling facility in order to derive assurance of the absence of misuse. Indeed, these observations have been recognised in the Model Protocol (INFCIRC/540): 'the Agency shall not mechanistically or systematically seek to verify' information provided to it by States (Article 4.a.). Nevertheless, complementary access to uranium mining/milling sites 'on a selective basis in order to assure the absence of undeclared nuclear material and activities' (Article 4.a.(i)) is provided for. On this basis, therefore, this paper will focus predominantly on options other than site access, which are available to the Agency for deriving assurance that declared mining/milling operations are not misused. Such options entail the interpretation and analysis of information provided to the Agency including, for example, from declarations, monitoring import/export data, open source reports, commercial satellite imagery, aerial photographs, and information provided by Member States. Uranium mining techniques are diverse, and the inventories, flows and uranium assays which arise at various points in the process will vary considerably between mines, and over the operating cycle of an individual mine. Thus it is essentially impossible to infer any information, which can be used precisely to confirm, or otherwise, declared production by measuring or estimating any of those parameters at points within the mining/milling process. The task of attempting to

  13. Likelihood-ratio-based biometric verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    2002-01-01

    This paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that for single-user verification the likelihood ratio is optimal.

  14. Likelihood Ratio-Based Biometric Verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    The paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that, for single-user verification, the likelihood ratio is optimal.

  15. Verification of the Microgravity Active Vibration Isolation System based on Parabolic Flight

    Science.gov (United States)

    Zhang, Yong-kang; Dong, Wen-bo; Liu, Wei; Li, Zong-feng; Lv, Shi-meng; Sang, Xiao-ru; Yang, Yang

    2017-12-01

    The Microgravity active vibration isolation system (MAIS) is a device to reduce on-orbit vibration and to provide a lower gravity level for certain scientific experiments. MAIS system is made up of a stator and a floater, the stator is fixed on the spacecraft, and the floater is suspended by electromagnetic force so as to reduce the vibration from the stator. The system has 3 position sensors, 3 accelerometers, 8 Lorentz actuators, signal processing circuits and a central controller embedded in the operating software and control algorithms. For the experiments on parabolic flights, a laptop is added to MAIS for monitoring and operation, and a power module is for electric power converting. The principle of MAIS is as follows: the system samples the vibration acceleration of the floater from accelerometers, measures the displacement between stator and floater from position sensitive detectors, and computes Lorentz force current for each actuator so as to eliminate the vibration of the scientific payload, and meanwhile to avoid crashing between the stator and the floater. This is a motion control technic in 6 degrees of freedom (6-DOF) and its function could only be verified in a microgravity environment. Thanks for DLR and Novespace, we get a chance to take the DLR 27th parabolic flight campaign to make experiments to verify the 6-DOF control technic. The experiment results validate that the 6-DOF motion control technique is effective, and vibration isolation performance perfectly matches what we expected based on theoretical analysis and simulation. The MAIS has been planned on Chinese manned spacecraft for many microgravity scientific experiments, and the verification on parabolic flights is very important for its following mission. Additionally, we also test some additional function by microgravity electromagnetic suspension, such as automatic catching and locking and working in fault mode. The parabolic flight produces much useful data for these experiments.

  16. Pneumatic Muscles Actuated Lower-Limb Orthosis Model Verification with Actual Human Muscle Activation Patterns

    Directory of Open Access Journals (Sweden)

    Dzahir M.A.M

    2017-01-01

    Full Text Available A review study was conducted on existing lower-limb orthosis systems for rehabilitation which implemented pneumatic muscle type of actuators with the aim to clarify the current and on-going research in this field. The implementation of pneumatic artificial muscle will play an important role for the development of the advanced robotic system. In this research a derivation model for the antagonistic mono- and bi-articular muscles using pneumatic artificial muscles of a lower limb orthosis will be verified with actual human’s muscle activities models. A healthy and young male 29 years old subject with height 174cm and weight 68kg was used as a test subject. Two mono-articular muscles Vastus Medialis (VM and Vastus Lateralis (VL were selected to verify the mono-articular muscle models and muscle synergy between anterior muscles. Two biarticular muscles Rectus Femoris (RF and Bicep Femoris (BF were selected to verify the bi-articular muscle models and muscle co-contraction between anterior-posterior muscles. The test was carried out on a treadmill with a speed of 4.0 km/h, which approximately around 1.25 m/s for completing one cycle of walking motion. The data was collected for about one minute on a treadmill and 20 complete cycles of walking motion were successfully recorded. For the evaluations, the mathematical model obtained from the derivation and the actual human muscle activation patterns obtained using the surface electromyography (sEMG system were compared and analysed. The results shown that, high correlation values ranging from 0.83 up to 0.93 were obtained in between the derivation model and the actual human muscle’s model for both mono- and biarticular muscles. As a conclusion, based on the verification with the sEMG muscle activities data and its correlation values, the proposed derivation models of the antagonistic mono- and bi-articular muscles were suitable to simulate and controls the pneumatic muscles actuated lower limb

  17. Design information verification (DIV) of closed geological repositories (SAGOR activity 3c)

    International Nuclear Information System (INIS)

    Myatt, J.

    1998-02-01

    Following IAEA Advisory and Consultants Group meetings in September 1988 and in May 1991 respectively an IAEA multi-national Support Programme Task was initiated to consider the 'Development of Safeguards for Final Disposal of Spent Fuel in Geological Repositories' (SAGOR). A 'Technical Coordination Committee' (TCC) was set up with invited representatives from those Member State Support Programmes wishing to be involved. The joint programme, through the TCC, was given the task of studying the safeguards requirements in: conditioning plant (where the spent fuel is prepared for transfer to the repository); operating repositories (i.e. those in which the fuel is being emplaced); closed repositories. At the first meeting of the TCC in Washington in July 1994 the UK undertook to provide a study of the Design Information Verification (DIV) required in all three areas. For this activity the requirements, techniques and procedures for the Design Information Verification (DIV) of closed repositories have been considered. In completing the study the findings reported for activities 1b/c and 2c (descriptions of a Model Repository and Potential Diversion Paths, respectively) have been used in formulating any conclusions reached. It is also debatable as to whether this activity is strictly speaking DIV or is one of surveillance. As undeclared access can only be made to the emplacement areas of the repository by altering the physical makeup of the surrounding area; i.e. physically changing the 'design' of the surrounding area, however, this is deemed to be DIV. Although the techniques used appear to be those of surveillance they are being applied in this case as the tools of DIV. As with any facility there are a number of stages in its lifetime. For the purposes of this report the operating life of a repository is defined as being the time from inception to when it is finally decommissioned and sealed with the ground surface returned to being a green field. The repository is

  18. 78 FR 6852 - Agency Information Collection (Student Verification of Enrollment) Activity Under OMB Review

    Science.gov (United States)

    2013-01-31

    ... Management and Budget (OMB) for review and comment. The PRA submission describes the nature of the... verification of the student's continued enrollment in courses leading to a standard college degree or in non... Policy and Management, Office of General Counsel, Department of Veterans Affairs. [FR Doc. 2013-02027...

  19. 77 FR 67737 - Proposed Information Collection (Student Verification of Enrollment) Activity: Comment Request

    Science.gov (United States)

    2012-11-13

    ...: Submit written comments on the collection of information through Federal Docket Management System (FDMS.... 3501--3521), Federal agencies must obtain approval from the Office of Management and Budget (OMB) for... and verification of the student's continued enrollment in courses leading to a standard college degree...

  20. Length of Residence and Vehicle Ownership in Relation to Physical Activity Among U.S. Immigrants.

    Science.gov (United States)

    Terasaki, Dale; Ornelas, India; Saelens, Brian

    2017-04-01

    Physical activity among U.S. immigrants over time is not well understood. Transportation may affect this trajectory. Using a survey of documented immigrants (N = 7240), we performed simple, then multivariable logistic regression to calculate ORs and 95 % CIs between length of residence (LOR) and both light-to-moderate (LPA) and vigorous (VPA) activity. We adjusted for demographic variables, then vehicle ownership to assess changes in ORs. Compared to new arrivals, all four LOR time-intervals were associated with lower odds of LPA and higher odds of VPA in simple analysis. All ORs for LPA remained significant after including demographics, but only one remained significant after adding vehicle ownership. Two ORs for VPA remained significant after including demographics and after adding vehicle ownership. Immigrants lower their light-to-moderate activity the longer they reside in the U.S., partly from substituting driving for walking. Efforts to maintain walking for transportation among immigrants are warranted.

  1. In-core Instrument Subcritical Verification (INCISV) - Core Design Verification Method - 358

    International Nuclear Information System (INIS)

    Prible, M.C.; Heibel, M.D.; Conner, S.L.; Sebastiani, P.J.; Kistler, D.P.

    2010-01-01

    According to the standard on reload startup physics testing, ANSI/ANS 19.6.1, a plant must verify that the constructed core behaves sufficiently close to the designed core to confirm that the various safety analyses bound the actual behavior of the plant. A large portion of this verification must occur before the reactor operates at power. The INCISV Core Design Verification Method uses the unique characteristics of a Westinghouse Electric Company fixed in-core self powered detector design to perform core design verification after a core reload before power operation. A Vanadium self powered detector that spans the length of the active fuel region is capable of confirming the required core characteristics prior to power ascension; reactivity balance, shutdown margin, temperature coefficient and power distribution. Using a detector element that spans the length of the active fuel region inside the core provides a signal of total integrated flux. Measuring the integrated flux distributions and changes at various rodded conditions and plant temperatures, and comparing them to predicted flux levels, validates all core necessary core design characteristics. INCISV eliminates the dependence on various corrections and assumptions between the ex-core detectors and the core for traditional physics testing programs. This program also eliminates the need for special rod maneuvers which are infrequently performed by plant operators during typical core design verification testing and allows for safer startup activities. (authors)

  2. Striving to be known by significant others: automatic activation of self-verification goals in relationship contexts.

    Science.gov (United States)

    Kraus, Michael W; Chen, Serena

    2009-07-01

    Extending research on the automatic activation of goals associated with significant others, the authors hypothesized that self-verification goals typically pursued with significant others are automatically elicited when a significant-other representation is activated. Supporting this hypothesis, the activation of a significant-other representation through priming (Experiments 1 and 3) or through a transference encounter (Experiment 2) led participants to seek feedback that verifies their preexisting self-views. Specifically, significant-other primed participants desired self-verifying feedback, in general (Experiment 1), from an upcoming interaction partner (Experiment 2), and relative to acquaintance-primed participants and favorable feedback (Experiment 3). Finally, self-verification goals were activated, especially for relational self-views deemed high in importance to participants' self-concepts (Experiment 2) and held with high certainty (Experiment 3). Implications for research on self-evaluative goals, the relational self, and the automatic goal activation literature are discussed, as are consequences for close relationships. (PsycINFO Database Record (c) 2009 APA, all rights reserved).

  3. Physical activity and telomere length in U.S. men and women: An NHANES investigation.

    Science.gov (United States)

    Tucker, Larry A

    2017-07-01

    The principal objective was to determine the extent to which physical activity (PA) accounts for differences in leukocyte telomere length (LTL) in a large random sample of U.S. adults. Another purpose was to assess the extent to which multiple demographic and lifestyle covariates affect the relationship between PA and LTL. A total of 5823 adults from the National Health and Nutrition Examination Survey (NHANES 1999-2002) were studied cross-sectionally. Employing the quantitative polymerase chain reaction method, LTL was compared to standard reference DNA. PA was indexed using MET-minutes using self-reported frequency, intensity, and duration of participation in 62 physical activities. Covariates were controlled statistically. Telomeres were 15.6 base pairs shorter for each year of chronological age (F=723.2, Pactivity and those in the Sedentary, Low, and Moderate groups were 140, 137, and 111, respectively. Adults with High activity were estimated to have a biologic aging advantage of 9years (140 base pairs÷15.6) over Sedentary adults. The difference in cell aging between those with High and Low activity was also significant, 8.8years, as was the difference between those with High and Moderate PA (7.1years). Overall, PA was significantly and meaningfully associated with telomere length in U.S. men and women. Evidently, adults who participate in high levels of PA tend to have longer telomeres, accounting for years of reduced cellular aging compared to their more sedentary counterparts. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. DEVELOPMENT OF ENRICHMENT VERIFICATION ASSAY BASED ON THE AGE AND 235U AND 238U ACTIVITIES OF THE SAMPLES

    International Nuclear Information System (INIS)

    AL-YAMAHI, H.; EL-MONGY, S.A.

    2008-01-01

    Development of the enrichment verification methods is the backbone of the nuclear materials safeguards skeleton. In this study, the 235U percentage of depleted , natural and very slightly enriched uranium samples were estimated based on the sample age and the measured activity of 235U and 238U. The HpGe and NaI spectrometry were used for samples assay. A developed equation was derived to correlate the sample age and 235U and 238U activities with the enrichment percentage (E%). The results of the calculated E% by the deduced equation and the target E% values were found to be similar and within 0.58 -1.75% bias in the case of HpGe measurements. The correlation between them was found to be very sharp. The activity was also calculated based on the measured sample count rate and the efficiency at the gamma energies of interest. The correlation between the E% and the 235U activity was estimated and found to be linearly sharp. The results obtained by NaI was found to be less accurate than these obtained by HpGe. The bias in the case of NaI assay was in the range from 6.398% to 22.8% for E% verification

  5. Groundwater flow code verification ''benchmarking'' activity (COVE-2A): Analysis of participants' work

    International Nuclear Information System (INIS)

    Dykhuizen, R.C.; Barnard, R.W.

    1992-02-01

    The Nuclear Waste Repository Technology Department at Sandia National Laboratories (SNL) is investigating the suitability of Yucca Mountain as a potential site for underground burial of nuclear wastes. One element of the investigations is to assess the potential long-term effects of groundwater flow on the integrity of a potential repository. A number of computer codes are being used to model groundwater flow through geologic media in which the potential repository would be located. These codes compute numerical solutions for problems that are usually analytically intractable. Consequently, independent confirmation of the correctness of the solution is often not possible. Code verification is a process that permits the determination of the numerical accuracy of codes by comparing the results of several numerical solutions for the same problem. The international nuclear waste research community uses benchmarking for intercomparisons that partially satisfy the Nuclear Regulatory Commission (NRC) definition of code verification. This report presents the results from the COVE-2A (Code Verification) project, which is a subset of the COVE project

  6. Leukocyte Telomere Length in Healthy Caucasian and African-American Adolescents : Relationships with Race, Sex, Adiposity, Adipokines, and Physical Activity

    NARCIS (Netherlands)

    Zhu, Haidong; Wang, Xiaoling; Gutin, Bernard; Davis, Catherine L.; Keeton, Daniel; Thomas, Jeffrey; Stallmann-Jorgensen, Inger; Mooken, Grace; Bundy, Vanessa; Snieder, Harold; van der Harst, Pim; Dong, Yanbin

    Objective To examine the relationships of race, sex, adiposity, adipokines, and physical activity to telomere length in adolescents. Study design Leukocyte telomere length (T/S ratio) was assessed cross-sectionally in 667 adolescents (aged 14-18 years; 48% African-Americans; 51% girls) using a

  7. FMCT verification: Case studies

    International Nuclear Information System (INIS)

    Hui Zhang

    2001-01-01

    for states that have traditionally had 'less transparency' in their military sectors. As case studies, first we investigate how to applied verification measures including remote sensing, off-site environmental sampling and on-site inspections to monitor the shutdown status of plutonium production facilities, and what measures could be taken to prevent the disclosure of sensitive information at the site. We find the most effective verification measure to monitor the status of the reprocessing plant would be on-site environmental sampling. Some countries may worry that sample analysis could disclose sensitive information about their past plutonium production activities. However, we find that sample analysis at the reprocessing site need not reveal such information. Sampling would not reveal such information as long as inspectors are not able to measure total quantities of Cs-137 and Sr-90 from HLW produced at former military plutonium production facilities. Secondly, we consider verification measures for shutdown gaseous diffusion uranium-enrichment plants (GDPs). The GDPs could be monitored effectively by satellite imagery, as one telltale operational signature of the GDP would be the water-vapor plume coming from the cooling tower, which should be easy to detect with satellite images. Furthermore, the hot roof of the enrichment building could be detectable using satellite thermal-infrared images. Finally, some on-site verification measures should be allowed, such as visual observation, surveillance and tamper-indicating seals. Finally, FMCT verification regime would have to be designed to detect undeclared fissile material production activities and facilities. These verification measures could include something like special or challenge inspections or complementary access. There would need to be provisions to prevent the abuse of such inspections, especially at sensitive and non-proscribed military and nuclear activities. In particular, to protect sensitive

  8. Dislocation dynamics in Al-Li alloys: mean jump distance and activation length of moving dislocations

    International Nuclear Information System (INIS)

    De Hosson, J.Th.M.; Huis Int Veld, A.

    1984-01-01

    It is pointed out that aluminum-lithium based alloys offer considerable promise for structural applications, especially in the aerospace industry. This promise is related to the potential for high strength in combination with a density which is lower than that found in conventional aluminum alloys. In addition, the modulus of elasticity is higher than corresponding values in conventional aluminum alloys. A nuclear magnetic resonance study of the mechanism of dislocation motion in Al-2.2 wt pct Li is reported. Information about the effective mean jump distance of mobile dislocations is provided by in situ nuclear spin relaxation measurements. The activation length of mobile dislocations has been obtained from strain-rate change experiments on Al-2.2 wt pct Li. The considered study shows that pulsed nuclear magnetic resonance is a complementary new technique for the study of moving dislocations in Al-Li alloys. 28 references

  9. Leukocyte telomere length and mortality among U.S. adults: Effect modification by physical activity behaviour.

    Science.gov (United States)

    Loprinzi, Paul D; Loenneke, Jeremy P

    2018-01-01

    The purpose of this study was to examine the association between leukocyte telomere length (LTL) and mortality (outcome variable), with consideration by physical activity behaviour. Data from the 1999-2002 National Health and Nutrition Examination Survey were employed (N = 6,611; 20-85 yrs), with follow-up mortality assessment through 31 December 2006. DNA was extracted from whole blood to assess LTL via quantitative polymerase chain reaction. Compared to those in the first LTL tertile, the adjusted hazard ratio for all-cause mortality for those in the 2 nd and 3 rd LTL tertiles, respectively, was 0.82 (95% CI: 0.60-1.12; P = .22) and 0.76 (95% CI: 0.50-1.14; P = .18). However, after adjustments, LTL tertile 3 (vs. 1) was associated with all-cause mortality (HR = 0.37; 95% CI: 0.14-0.93; P = .03) for those who engaged in moderate-intensity exercise. Similarly, LTL was associated with CVD-specific mortality for those who engaged in moderate-intensity exercise (HR = 0.17; 95% CI: 0.04-0.73; P = .02). Longer telomeres are associated with increased survival, particularly among men and those who are active, underscoring the importance of promotion of physical activity behaviour.

  10. Depth profiling of residual activity of ^{237}U fragments as a range verification technique for ^{238}U primary ion beam

    Directory of Open Access Journals (Sweden)

    I. Strašík

    2012-07-01

    Full Text Available Experimental and simulation data concerning fragmentation of ^{238}U ion beam in aluminum, copper, and stainless-steel targets with the initial energy 500 and 950  MeV/u are collected in the paper. A range-verification technique based on depth profiling of residual activity is presented. The irradiated targets were constructed in the stacked-foil geometry and analyzed using gamma-ray spectroscopy. One of the purposes of these experiments was depth profiling of residual activity of induced nuclides and projectile fragments. Among the projectile fragments, special attention is paid to the ^{237}U isotope that has a range very close to the range of the primary ^{238}U ions. Therefore, the depth profiling of the ^{237}U isotope can be utilized for experimental verification of the ^{238}U primary-beam range, which is demonstrated and discussed in the paper. The experimental data are compared with computer simulations by FLUKA, SRIM, and ATIMA, as well as with complementary experiments.

  11. Verification of the active deformation compensation system of the LMT/GTM by end-to-end simulations

    Science.gov (United States)

    Eisentraeger, Peter; Suess, Martin

    2000-07-01

    The 50 m LMT/GTM is exposed to the climatic conditions at 4,600 m height on Cerro La Negra, Mexico. For operating the telescope to the challenging requirements of its millimeter objective, an active approach for monitoring and compensating the structural deformations (Flexible Body Compensation FBC) is necessary. This system includes temperature sensors and strain gages for identifying large scale deformations of the reflector backup structure, a laser system for measuring the subreflector position, and an inclinometer system for measuring the deformations of the alidade. For compensating the monitored deformations, the telescope is equipped with additional actuators for active control of the main reflector surface and the subreflector position. The paper describes the verification of the active deformation system by finite element calculations and MATLAB simulations of the surface accuracy and the pointing including the servo under the operational wind and thermal conditions.

  12. Nuclear test ban verification

    International Nuclear Information System (INIS)

    Chun, Kin-Yip

    1991-07-01

    This report describes verification and its rationale, the basic tasks of seismic verification, the physical basis for earthquake/explosion source discrimination and explosion yield determination, the technical problems pertaining to seismic monitoring of underground nuclear tests, the basic problem-solving strategy deployed by the forensic seismology resarch team at the University of Toronto, and the scientific significance of the team's research. The research carried out at the Univeristy of Toronto has two components: teleseismic verification using P wave recordings from the Yellowknife Seismic Array (YKA), and regional (close-in) verification using high-frequency L g and P n recordings from the Eastern Canada Telemetered Network. Major differences have been found in P was attenuation among the propagation paths connecting the YKA listening post with seven active nuclear explosion testing areas in the world. Significant revisions have been made to previously published P wave attenuation results, leading to more interpretable nuclear explosion source functions. (11 refs., 12 figs.)

  13. Soil microbial activity, mycelial lengths and physiological groups of bacteria in a heavy metal polluted area

    Energy Technology Data Exchange (ETDEWEB)

    Nordgren, A; Kauri, T; Baeaeth, E; Soederstroem, B

    1986-01-01

    The biological effects of heavy metal contamination of coniferous forest soils were studied in the A/sub 01//A/sub 02/ layer around a primary smelter in Northern Sweden. Soil concentrations of 17 elements were determined. Smelter-emitted heavy metals were 5 to 75 times higher in the plot closest to the smelter compared with background levels. Despite emission of sulfur no decrease in pH was found. Bacteria producing acid from maltose, cellobiose, arabinose or xylose and bacteria hydrolyzing starch, pectin, xyland or cellulose decreased 8- to 11-fold due to the soil contamination. Chitin hydrolyzers were 5 times less abundant at the most polluted site compared with background levels. Soil respiration rate and urease activity decreased by about a factor of 4, but phosphatase activity and mycelial lengths were unaffected by the soil contamination. Soil bacteria showed a sigmoidal response to the log of metal concentration in the soil and were affected at a lower pollution level than the other biological variables in the study. A multivariate analysis (partial least squares) showed that soil metal contamination and soil pH were the two environmental factors influencing the soil microorganisms.

  14. Verification and accreditation schemes for climate change activities: A review of requirements for verification of greenhouse gas reductions and accreditation of verifiers—Implications for long-term carbon sequestration

    Science.gov (United States)

    Roed-Larsen, Trygve; Flach, Todd

    The purpose of this chapter is to provide a review of existing national and international requirements for verification of greenhouse gas reductions and associated accreditation of independent verifiers. The credibility of results claimed to reduce or remove anthropogenic emissions of greenhouse gases (GHG) is of utmost importance for the success of emerging schemes to reduce such emissions. Requirements include transparency, accuracy, consistency, and completeness of the GHG data. The many independent verification processes that have developed recently now make up a quite elaborate tool kit for best practices. The UN Framework Convention for Climate Change and the Kyoto Protocol specifications for project mechanisms initiated this work, but other national and international actors also work intensely with these issues. One initiative gaining wide application is that taken by the World Business Council for Sustainable Development with the World Resources Institute to develop a "GHG Protocol" to assist companies in arranging for auditable monitoring and reporting processes of their GHG activities. A set of new international standards developed by the International Organization for Standardization (ISO) provides specifications for the quantification, monitoring, and reporting of company entity and project-based activities. The ISO is also developing specifications for recognizing independent GHG verifiers. This chapter covers this background with intent of providing a common understanding of all efforts undertaken in different parts of the world to secure the reliability of GHG emission reduction and removal activities. These verification schemes may provide valuable input to current efforts of securing a comprehensive, trustworthy, and robust framework for verification activities of CO2 capture, transport, and storage.

  15. Effects of Varying Epoch Lengths, Wear Time Algorithms, and Activity Cut-Points on Estimates of Child Sedentary Behavior and Physical Activity from Accelerometer Data.

    Science.gov (United States)

    Banda, Jorge A; Haydel, K Farish; Davila, Tania; Desai, Manisha; Bryson, Susan; Haskell, William L; Matheson, Donna; Robinson, Thomas N

    2016-01-01

    To examine the effects of accelerometer epoch lengths, wear time (WT) algorithms, and activity cut-points on estimates of WT, sedentary behavior (SB), and physical activity (PA). 268 7-11 year-olds with BMI ≥ 85th percentile for age and sex wore accelerometers on their right hips for 4-7 days. Data were processed and analyzed at epoch lengths of 1-, 5-, 10-, 15-, 30-, and 60-seconds. For each epoch length, WT minutes/day was determined using three common WT algorithms, and minutes/day and percent time spent in SB, light (LPA), moderate (MPA), and vigorous (VPA) PA were determined using five common activity cut-points. ANOVA tested differences in WT, SB, LPA, MPA, VPA, and MVPA when using the different epoch lengths, WT algorithms, and activity cut-points. WT minutes/day varied significantly by epoch length when using the NHANES WT algorithm (p algorithms. Minutes/day and percent time spent in SB, LPA, MPA, VPA, and MVPA varied significantly by epoch length for all sets of activity cut-points tested with all three WT algorithms (all p algorithms (all p algorithms and activity cut-point definitions to match different epoch lengths may introduce significant errors. Estimates of SB and PA from studies that process and analyze data using different epoch lengths, WT algorithms, and/or activity cut-points are not comparable, potentially leading to very different results, interpretations, and conclusions, misleading research and public policy.

  16. Status of the Agency's verification activities in Iraq as of 8 January 2003. Statement by the Director General. New York, 09 January 2003

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2003-01-01

    The following information is provided to update the Council on the activities of the IAEA pursuant to Security Council resolution 1441 (2002) and other relevant resolutions. It describes the verification activities performed thus far, next steps, and where we are at this stage

  17. Open Source Analysis in Support to Nonproliferation Monitoring and Verification Activities: Using the New Media to Derive Unknown New Information

    International Nuclear Information System (INIS)

    Pabian, F.; Renda, G.; Jungwirth, R.; Kim, L.; Wolfart, E.; Cojazzi, G.G.M.; )

    2015-01-01

    This paper will describe evolving techniques that leverage freely available open source social media venues, sometimes referred to as the ''New Media,'' together with geospatial tools and commercial satellite imagery (with its ever improving spatial, spectral, and temporal resolutions), to expand the existing nuclear non-proliferation knowledge base by way of a review of some recent exemplar cases. The application of such techniques can enhance more general data mining, as those techniques can be more directly tailored to IAEA Safeguards monitoring and other non-proliferation verification activities to improve the possibility of the remote detection of undeclared nuclear related facilities and/or activities. As part of what might be called the new ''Societal Verification'' regime, these techniques have enlisted either the passive or active involvement of interested parties (NGOs, academics, and even hobbyists) using open sources and collaboration networks together with previously highlighted geospatial visualization tools and techniques. This paper will show how new significant, and unprecedented, information discoveries have already been made (and published in open source) in the last four years, i.e., since the last IAEA Safeguards Symposium. With respect to the possibility of soliciting active participation (e.g., ''crowd-sourcing'') via social media, one can envision scenarios (one example from open source will be provided) whereby a previously unknown nuclear related facility could be identified or located through the online posting of reports, line drawings, and/or ground photographs. Nonetheless, these techniques should not be viewed as a panacea, as examples of both deception and human error will also be provided. This paper will highlight the use of these remote-means of discovery techniques, and how they have shed entirely new light on important nuclear non-proliferation relevant issues in

  18. Sedentary behavior, physical activity and cardiorespiratory fitness on leukocyte telomere length.

    Science.gov (United States)

    Edwards, Meghan K; Loprinzi, Paul D

    2017-01-01

    Background: Emerging work is starting to investigate the cumulative effects of moderate-to-vigorous physical activity (MVPA), sedentary behavior and cardiorespiratory fitness on health. The objective of this study was to examine the cumulative and independent associations of MVPA, sedentary behavior and cardiorespiratory fitness on leukocyte telomere length (LTL). Methods: Data from the 1999-2002 National Health and Nutrition Examination Survey (NHANES) were used (N = 1868 adults 20+ years); analyzed in 2016. Sedentary behavior and MVPA were subjectively assessed with cardiorespiratory fitness determined from a submaximal treadmill-based test; participants were classified as above or below the median values for each of these three parameters. A blood sample was obtained from each participant to assess LTL via quantitative polymerase chain reaction, with participants grouped into LTL tertiles. Results: Participants who engaged in higher MVPA, sat less and had higher cardiorespiratory fitness had an increased odds (ranging from 85% to 105%) of being in LTL tertile 3 (vs. 1). In an extended adjusted multinomial logistic regression model, only MVPA was positively associated with LTL (odds ration [OR] = 1.37; 95% CI: 0.99-1.90; P = 0.05). Conclusion: All three behavior characteristics, but particularly MVPA, may be important in preserving LTLs.

  19. School Nutrition Employees' Perceptions of Farm to School (FTS) Activities Differ Based on Management Type and FTS Participation Length

    Science.gov (United States)

    Kang, Sangwook; Arendt, Susan W.; Stokes, Nathan M.

    2016-01-01

    Purpose: The purpose of this study was to explore school nutrition employees' perceptions of FTS activities and whether the numbers of activities differ based on management type of school foodservice operation and length of FTS participation. Methods: The state with the most FTS programs from each of the eight national FTS regions was selected. A…

  20. Reciprocal activation of gastrocnemius and soleus motor units is associated with fascicle length change during knee flexion.

    Science.gov (United States)

    Lauber, Benedikt; Lichtwark, Glen A; Cresswell, Andrew G

    2014-06-01

    While medial gastrocnemius (MG) and soleus (SOL) are considered synergists, they are anatomically exclusive in that SOL crosses only the ankle, while MG crosses both the knee and ankle. Due to the force-length properties of both active and passive structures, activation of SOL and MG must be constantly regulated to provide the required joint torques for any planned movement. As such, the aim of this study was to investigate the neural regulation of MG and SOL when independently changing their length by changing only the knee joint angle, thus exclusively altering the length of MG fibers. MG and SOL motor units (MU) were recorded intramuscularly along with ultrasound imaging of MG and SOL fascicle lengths, while moving the knee through 60° of rotation and maintaining a low level of voluntary plantar flexor torque. The results showed a reciprocal activation of MG and SOL as the knee was moved into flexion and extension. A clear reduction in MG MU firing rates occurred as the knee was flexed (MG fascicles shortening), with de-recruitment of most MG MU occurring at close to full knee flexion. A concomitant increase in SOL MU activity was observed while no change in the length of its fascicles was found. The opposite effects were found when the knee was moved into extension. A strong correlation (ICC = 0.78) was found between the fascicle length at which MG MUs were de-recruited and subsequently re-recruited. This was stronger than the relationship of de-recruitment and re-recruitment with knee angle (ICC = 0.52), indicating that in this instance, muscle fascicle length rather than joint angle is more influential in regulating MG recruitment. Such a reciprocal arrangement like the one presented here for SOL and MG is essential for human voluntary movements such as walking or cycling. © 2014 The Authors. Physiological Reports published by Wiley Periodicals, Inc. on behalf of the American Physiological Society and The Physiological Society.

  1. Verification of Ceramic Structures

    Science.gov (United States)

    Behar-Lafenetre, Stephanie; Cornillon, Laurence; Rancurel, Michael; De Graaf, Dennis; Hartmann, Peter; Coe, Graham; Laine, Benoit

    2012-07-01

    In the framework of the “Mechanical Design and Verification Methodologies for Ceramic Structures” contract [1] awarded by ESA, Thales Alenia Space has investigated literature and practices in affiliated industries to propose a methodological guideline for verification of ceramic spacecraft and instrument structures. It has been written in order to be applicable to most types of ceramic or glass-ceramic materials - typically Cesic®, HBCesic®, Silicon Nitride, Silicon Carbide and ZERODUR®. The proposed guideline describes the activities to be performed at material level in order to cover all the specific aspects of ceramics (Weibull distribution, brittle behaviour, sub-critical crack growth). Elementary tests and their post-processing methods are described, and recommendations for optimization of the test plan are given in order to have a consistent database. The application of this method is shown on an example in a dedicated article [7]. Then the verification activities to be performed at system level are described. This includes classical verification activities based on relevant standard (ECSS Verification [4]), plus specific analytical, testing and inspection features. The analysis methodology takes into account the specific behaviour of ceramic materials, especially the statistical distribution of failures (Weibull) and the method to transfer it from elementary data to a full-scale structure. The demonstration of the efficiency of this method is described in a dedicated article [8]. The verification is completed by classical full-scale testing activities. Indications about proof testing, case of use and implementation are given and specific inspection and protection measures are described. These additional activities are necessary to ensure the required reliability. The aim of the guideline is to describe how to reach the same reliability level as for structures made of more classical materials (metals, composites).

  2. Translating Activity Diagram from Duration Calculus for Modeling of Real-Time Systems and its Formal Verification using UPPAAL and DiVinE

    Directory of Open Access Journals (Sweden)

    Muhammad Abdul Basit Ur Rehman

    2016-01-01

    Full Text Available The RTS (Real-Time Systems are widely used in industry, home appliances, life saving systems, aircrafts, and automatic weapons. These systems need more accuracy, safety, and reliability. An accurate graphical modeling and verification of such systems is really challenging. The formal methods made it possible to model such systems with more accuracy. In this paper, we envision a strategy to overcome the inadequacy of SysML (System Modeling Language for modeling and verification of RTS, and illustrate the framework by applying it on a case study of fuel filling machine. We have defined DC (Duration Calculus implementaion based formal semantics to specify the functionality of RTS. The activity diagram in then generated from these semantics. Finally, the graphical model is verified using UPPAAL and DiVinE model checkers for validation of timed and untimed properties with accelerated verification speed. Our results suggest the use of methodology for modeling and verification of large scale real-time systems with reduced verification cost.

  3. Translating activity diagram from duration calculus for modeling of real-time systems and its formal verification using UPPAAL and DiVinE

    International Nuclear Information System (INIS)

    Rahim, M.A.B.U.; Arif, F.

    2016-01-01

    The RTS (Real-Time Systems) are widely used in industry, home appliances, life saving systems, aircrafts, and automatic weapons. These systems need more accuracy, safety, and reliability. An accurate graphical modeling and verification of such systems is really challenging. The formal methods made it possible to model such systems with more accuracy. In this paper, we envision a strategy to overcome the inadequacy of SysML (System Modeling Language) for modeling and verification of RTS, and illustrate the framework by applying it on a case study of fuel filling machine. We have defined DC (Duration Calculus) implementation based formal semantics to specify the functionality of RTS. The activity diagram in then generated from these semantics. Finally, the graphical model is verified using UPPAAL and DiVinE model checkers for validation of timed and untimed properties with accelerated verification speed. Our results suggest the use of methodology for modeling and verification of large scale real-time systems with reduced verification cost. (author)

  4. A self-centering active probing technique for kinematic parameter identification and verification of articulated arm coordinate measuring machines

    International Nuclear Information System (INIS)

    Santolaria, J; Brau, A; Velázquez, J; Aguilar, J J

    2010-01-01

    A crucial task in the procedure of identifying the parameters of a kinematic model of an articulated arm coordinate measuring machine (AACMM) or robot arm is the process of capturing data. In this paper a capturing data method is analyzed using a self-centering active probe, which drastically reduces the capture time and the required number of positions of the gauge as compared to the usual standard and manufacturer methods. The mathematical models of the self-centering active probe and AACMM are explained, as well as the mathematical model that links the AACMM global reference system to the probe reference system. We present a self-calibration method that will allow us to determine a homogeneous transformation matrix that relates the probe's reference system to the AACMM last reference system from the probing of a single sphere. In addition, a comparison between a self-centering passive probe and self-centering active probe is carried out to show the advantages of the latter in the procedures of kinematic parameter identification and verification of the AACMM

  5. Sarcomere length-dependence of activity-dependent twitch potentiation in mouse skeletal muscle

    Directory of Open Access Journals (Sweden)

    MacIntosh Brian R

    2002-12-01

    Full Text Available Abstract Background It has been reported that potentiation of a skeletal muscle twitch response is proportional to muscle length with a negative slope during staircase, and a positive slope during posttetanic potentiation. This study was done to directly compare staircase and posttetanic responses with measurement of sarcomere length to compare their length-dependence. Methods Mouse extensor digitorum longus (EDL muscles were dissected to small bundles of fibers, which permit measurement of sarcomere length (SL, by laser diffraction. In vitro fixed-end contractions of EDL fiber bundles were elicited at 22°C and 35°C at sarcomere lengths ranging from 2.35 μm to 3.85 μm. Twitch contractions were assessed before and after 1.5 s of 75 Hz stimulation at 22°C or during 10 s of 10 Hz stimulation at 22°C or 35°C. Results Staircase potentiation was greater at 35°C than 22°C, and the relative magnitude of the twitch contraction (Pt*/Pt was proportional to sarcomere length with a negative slope, over the range 2.3 μm – 3.7 μm. Linear regression yielded the following: Pt*/Pt = -0.59·SL+3.27 (r2 = 0.74; Pt*/Pt = -0.39·SL+2.34 (r2 = 0.48; and Pt*/Pt = -0.50·SL+2.45 (r2 = 0.80 for staircase at 35°C, and 22°C and posttetanic response respectively. Posttetanic depression rather than potentiation was present at long SL. This indicates that there may be two processes operating in these muscles to modulate the force: one that enhances and a second that depresses the force. Either or both of these processes may have a length-dependence of its mechanism. Conclusion There is no evidence that posttetanic potentiation is fundamentally different from staircase in these muscles.

  6. Caspase 3 inactivates biologically active full length interleukin-33 as a classical cytokine but does not prohibit nuclear translocation

    International Nuclear Information System (INIS)

    Ali, Shafaqat; Nguyen, Dang Quan; Falk, Werner; Martin, Michael Uwe

    2010-01-01

    IL-33 is a member of the IL-1 family of cytokines with dual function which either activates cells via the IL-33 receptor in a paracrine fashion or translocates to the nucleus to regulate gene transcription in an intracrine manner. We show that full length murine IL-33 is active as a cytokine and that it is not processed by caspase 1 to mature IL-33 but instead cleaved by caspase 3 at aa175 to yield two products which are both unable to bind to the IL-33 receptor. Full length IL-33 and its N-terminal caspase 3 breakdown product, however, translocate to the nucleus. Finally, bioactive IL-33 is not released by cells constitutively or after activation. This suggests that IL-33 is not a classical cytokine but exerts its function in the nucleus of intact cells and only activates others cells via its receptor as an alarm mediator after destruction of the producing cell.

  7. Nuclear disarmament verification

    International Nuclear Information System (INIS)

    DeVolpi, A.

    1993-01-01

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification

  8. Cultural active approach to the issue of emotion regulation: theoretical explanation and empirical verification of a conceptual model

    Directory of Open Access Journals (Sweden)

    Elena I. Pervichko

    2016-06-01

    Full Text Available The paper gives a theoretical explanation and empirical verification of a conceptual emotion-regulating model, developed in the theoretical methodological context of cultural-active paradigm. A universal hypothesis concerning emotion regulation as a system including psychological and physiological levels has been verified empirically. The psychological level may be subdivided on motivational thinking level and operational technical ones, ruled by such psychological mechanisms as reflection and symbolical mediation. It has been figured out that motivational peculiarities determine the manifestation of other analyzed components of the system of emotion regulation. This is true not only for healthy patients, but also for patients with mitral valve prolapse (MVP. The significance of reflection and symbolical mediation in the system of cultural-active paradigm and emotion regulation has been determined. It has been proved that emotion regulation among patients with MVP differs from that of healthy people, highlighted by a very strong conflict of goal-achieving and fail-avoiding motives, lack of personal reflection and distortion of symbolical mediation, and very limited emotion-regulative resources. It has been shown that patients with MVP differ from the control group, suffering from far more strong emotional stress. It distributes an overall negative impact, reducing the ability to use emotion-regulating resource in emotionally meaningful situations effectively.

  9. Verification and validation benchmarks.

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of

  10. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  11. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William L.; Trucano, Timothy G.

    2008-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  12. Verification of dose rate calculation and selection study on low activation concrete in fusion facilities

    International Nuclear Information System (INIS)

    Oishi, Koji; Minami, Kiyoshi; Ikeda, Yujiro; Kosako, Kazuaki; Nakamura, Tomoo

    1991-01-01

    A concrete assembly was irradiated by D-T neutrons for 10 h, and dose rate measurement one day after shutdown has been carried out in order to provide a guide line for selection studies of low activation concrete. The experimental results were analyzed by the two dimensional calculation code DOT3.5 with its related nuclear data library GICX40 based on ENDF/B-III, however disagreement between experiment and calculation was observed in the deeper detector positions. Calculations were also performed using the nuclear data library based on ENDF/B-IV, and agreement within experimental errors was obtained at all detector positions. Selection studies for low activation concrete were performed using this nuclear data library. As a result, it was found that limestone concrete exhibited excellent properties as a low activation concrete in fusion facilities. (orig.)

  13. Estimation of tissue stiffness, reflex activity, optimal muscle length and slack length in stroke patients using an electromyography driven antagonistic wrist model.

    Science.gov (United States)

    de Gooijer-van de Groep, Karin L; de Vlugt, Erwin; van der Krogt, Hanneke J; Helgadóttir, Áróra; Arendzen, J Hans; Meskers, Carel G M; de Groot, Jurriaan H

    2016-06-01

    About half of all chronic stroke patients experience loss of arm function coinciding with increased stiffness, reduced range of motion and a flexed wrist due to a change in neural and/or structural tissue properties. Quantitative assessment of these changes is of clinical importance, yet not trivial. The goal of this study was to quantify the neural and structural properties contributing to wrist joint stiffness and to compare these properties between healthy subjects and stroke patients. Stroke patients (n=32) and healthy volunteers (n=14) were measured using ramp-and-hold rotations applied to the wrist joint by a haptic manipulator. Neural (reflexive torque) and structural (connective tissue stiffness and slack lengths and (contractile) optimal muscle lengths) parameters were estimated using an electromyography driven antagonistic wrist model. Kruskal-Wallis analysis with multiple comparisons was used to compare results between healthy subjects, stroke patients with modified Ashworth score of zero and stroke patients with modified Ashworth score of one or more. Stroke patients with modified Ashworth score of one or more differed from healthy controls (Pslack length of connective tissue of the flexor muscles. Non-invasive quantitative analysis, including estimation of optimal muscle lengths, enables to identify neural and non-neural changes in chronic stroke patients. Monitoring these changes in time is important to understand the recovery process and to optimize treatment. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Design, Development and Delivery of Active Learning Tools in Software Verification & Validation Education

    Science.gov (United States)

    Acharya, Sushil; Manohar, Priyadarshan Anant; Wu, Peter; Maxim, Bruce; Hansen, Mary

    2018-01-01

    Active learning tools are critical in imparting real world experiences to the students within a classroom environment. This is important because graduates are expected to develop software that meets rigorous quality standards in functional and application domains with little to no training. However, there is a well-recognized need for the…

  15. Identification of uranium signatures in swipe samples on verification of nuclear activities for nuclear safeguards purposes

    International Nuclear Information System (INIS)

    Pestana, Rafael Cardoso Baptistini

    2013-01-01

    The use of environmental sampling for safeguards purposes, has been applied by the International Atomic Energy Agency–IAEA since 1996 and are routinely used as a complementary measure to strengthen the traditional nuclear safeguards procedures. The aim is verify if the states signatory to the safeguards agreements are not diverging their peaceful nuclear activities for undeclared nuclear activities. This work describes a new protocol of collect and analysis of the swipe samples for identification of nuclear signatures that may be related to the nuclear activities developed in the inspected facility. This work was used as a case of study a real uranium conversion plant of the nuclear fuel cycle of IPEN. The strategy proposed uses different analytical techniques, such as alpha radiation meter, SEM-EDX and ICP-MS to identify signatures of uranium adhered to the swipe samples. In the swipe samples analysis, it was possible to identify particles of UO 2 F 2 and UF4 through the morphological comparison and semi-quantitative analyses performed by SEM-EDX technique. In this work, methods were used that as a result has the average isotopic composition of the sample, in which the enrichment ranged from 1.453 ± 0.023 to 18.24 % ± 0.15 % in the 235 U isotope. Through these externally collections, a non-intrusive sampling, it was possible to identify enriched material handling activities with enrichment of 1.453 % ± 0.023 % to 6.331 ± 0.055 % in the isotope 235 U, as well as the use of reprocessed material, through the identification of the 236 U isotope. The uncertainties obtained for the n( 235 U)/n( 238 U) ratio varied from 0.40% to 0.86 % for the internal swipe samples. (author)

  16. Immobilization of lipases on alkyl silane modified magnetic nanoparticles: effect of alkyl chain length on enzyme activity.

    Directory of Open Access Journals (Sweden)

    Jiqian Wang

    Full Text Available BACKGROUND: Biocatalytic processes often require a full recycling of biocatalysts to optimize economic benefits and minimize waste disposal. Immobilization of biocatalysts onto particulate carriers has been widely explored as an option to meet these requirements. However, surface properties often affect the amount of biocatalysts immobilized, their bioactivity and stability, hampering their wide applications. The aim of this work is to explore how immobilization of lipases onto magnetite nanoparticles affects their biocatalytic performance under carefully controlled surface modification. METHODOLOGY/PRINCIPAL FINDINGS: Magnetite nanoparticles, prepared through a co-precipitation method, were coated with alkyl silanes of different alkyl chain lengths to modulate their surface hydrophobicity. Candida rugosa lipase was then directly immobilized onto the modified nanoparticles through hydrophobic interaction. Enzyme activity was assessed by catalytic hydrolysis of p-nitrophenyl acetate. The activity of immobilized lipases was found to increase with increasing chain length of the alkyl silane. Furthermore, the catalytic activities of lipases immobilized on trimethoxyl octadecyl silane (C18 modified Fe(3O(4 were a factor of 2 or more than the values reported from other surface immobilized systems. After 7 recycles, the activities of the lipases immobilized on C18 modified nanoparticles retained 65%, indicating significant enhancement of stability as well through hydrophobic interaction. Lipase immobilized magnetic nanoparticles facilitated easy separation and recycling with high activity retaining. CONCLUSIONS/SIGNIFICANCE: The activity of immobilized lipases increased with increasing alkyl chain length of the alkyl trimethoxy silanes used in the surface modification of magnetite nanoparticles. Lipase stability was also improved through hydrophobic interaction. Alkyl silane modified magnetite nanoparticles are thus highly attractive carriers for

  17. Immobilization of lipases on alkyl silane modified magnetic nanoparticles: effect of alkyl chain length on enzyme activity.

    Science.gov (United States)

    Wang, Jiqian; Meng, Gang; Tao, Kai; Feng, Min; Zhao, Xiubo; Li, Zhen; Xu, Hai; Xia, Daohong; Lu, Jian R

    2012-01-01

    Biocatalytic processes often require a full recycling of biocatalysts to optimize economic benefits and minimize waste disposal. Immobilization of biocatalysts onto particulate carriers has been widely explored as an option to meet these requirements. However, surface properties often affect the amount of biocatalysts immobilized, their bioactivity and stability, hampering their wide applications. The aim of this work is to explore how immobilization of lipases onto magnetite nanoparticles affects their biocatalytic performance under carefully controlled surface modification. Magnetite nanoparticles, prepared through a co-precipitation method, were coated with alkyl silanes of different alkyl chain lengths to modulate their surface hydrophobicity. Candida rugosa lipase was then directly immobilized onto the modified nanoparticles through hydrophobic interaction. Enzyme activity was assessed by catalytic hydrolysis of p-nitrophenyl acetate. The activity of immobilized lipases was found to increase with increasing chain length of the alkyl silane. Furthermore, the catalytic activities of lipases immobilized on trimethoxyl octadecyl silane (C18) modified Fe(3)O(4) were a factor of 2 or more than the values reported from other surface immobilized systems. After 7 recycles, the activities of the lipases immobilized on C18 modified nanoparticles retained 65%, indicating significant enhancement of stability as well through hydrophobic interaction. Lipase immobilized magnetic nanoparticles facilitated easy separation and recycling with high activity retaining. The activity of immobilized lipases increased with increasing alkyl chain length of the alkyl trimethoxy silanes used in the surface modification of magnetite nanoparticles. Lipase stability was also improved through hydrophobic interaction. Alkyl silane modified magnetite nanoparticles are thus highly attractive carriers for enzyme immobilization enabling efficient enzyme recovery and recycling.

  18. Methods of Software Verification

    Directory of Open Access Journals (Sweden)

    R. E. Gurin

    2015-01-01

    Full Text Available This article is devoted to the problem of software verification (SW. Methods of software verification designed to check the software for compliance with the stated requirements such as correctness, system security and system adaptability to small changes in the environment, portability and compatibility, etc. These are various methods both by the operation process and by the way of achieving result. The article describes the static and dynamic methods of software verification and paid attention to the method of symbolic execution. In its review of static analysis are discussed and described the deductive method, and methods for testing the model. A relevant issue of the pros and cons of a particular method is emphasized. The article considers classification of test techniques for each method. In this paper we present and analyze the characteristics and mechanisms of the static analysis of dependencies, as well as their views, which can reduce the number of false positives in situations where the current state of the program combines two or more states obtained both in different paths of execution and in working with multiple object values. Dependences connect various types of software objects: single variables, the elements of composite variables (structure fields, array elements, the size of the heap areas, the length of lines, the number of initialized array elements in the verification code using static methods. The article pays attention to the identification of dependencies within the framework of the abstract interpretation, as well as gives an overview and analysis of the inference tools.Methods of dynamic analysis such as testing, monitoring and profiling are presented and analyzed. Also some kinds of tools are considered which can be applied to the software when using the methods of dynamic analysis. Based on the work a conclusion is drawn, which describes the most relevant problems of analysis techniques, methods of their solutions and

  19. Verification of nuclear effect of acoustic cavitation using fast neutron activation method

    International Nuclear Information System (INIS)

    Li Xinnian; Feng Tao; Fang Xiaoming; Qian Menglu; Cheng Qian

    2014-01-01

    14 MeV neutrons originated in acoustic cavitation fusion were determined using copper threshold detector. According to the nuclear reaction of 14 MeV neutrons with copper, the characteristic γ peaks of some radioactive nuclides were measured and the activation parameters of Cu were optimized. With neutron irradiation time of 50 min, 511 keV characteristic γ peak counts of activated copper pieces with or without ultrasonic field after 30 min and 198 min were respectively determined by NaI detector. Measurement results show that the characteristic γ peak counts of "6"2Cu and "6"4Cu can be respectively determined after 30 min and 198 min. 511 keV characteristic γ peak net count increments are positive values and statistical significance, which indicates that 14 MeV and 2.45 MeV neutron generation rates originated in fusion with ultrasound are greater than that without ultrasound in nuclear reaction liquid. These results verify the nuclear effect of acoustic cavitation (NEAC). The mechanism of NEAC nucleated by neutrons was proposed initially. (authors)

  20. Hibiscus latent Fort Pierce virus in Brazil and synthesis of its biologically active full-length cDNA clone.

    Science.gov (United States)

    Gao, Ruimin; Niu, Shengniao; Dai, Weifang; Kitajima, Elliot; Wong, Sek-Man

    2016-10-01

    A Brazilian isolate of Hibiscus latent Fort Pierce virus (HLFPV-BR) was firstly found in a hibiscus plant in Limeira, SP, Brazil. RACE PCR was carried out to obtain the full-length sequences of HLFPV-BR which is 6453 nucleotides and has more than 99.15 % of complete genomic RNA nucleotide sequence identity with that of HLFPV Japanese isolate. The genomic structure of HLFPV-BR is similar to other tobamoviruses. It includes a 5' untranslated region (UTR), followed by open reading frames encoding for a 128-kDa protein and a 188-kDa readthrough protein, a 38-kDa movement protein, 18-kDa coat protein, and a 3' UTR. Interestingly, the unique feature of poly(A) tract is also found within its 3'-UTR. Furthermore, from the total RNA extracted from the local lesions of HLFPV-BR-infected Chenopodium quinoa leaves, a biologically active, full-length cDNA clone encompassing the genome of HLFPV-BR was amplified and placed adjacent to a T7 RNA polymerase promoter. The capped in vitro transcripts from the cloned cDNA were infectious when mechanically inoculated into C. quinoa and Nicotiana benthamiana plants. This is the first report of the presence of an isolate of HLFPV in Brazil and the successful synthesis of a biologically active HLFPV-BR full-length cDNA clone.

  1. The length of a lantibiotic hinge region has profound influence on antimicrobial activity and host specificity

    Directory of Open Access Journals (Sweden)

    Liang eZhou

    2015-01-01

    Full Text Available Lantibiotics are ribosomally synthesized (methyllanthionine containing peptides which can efficiently inhibit the growth of Gram-positive bacteria. As lantibiotics kill bacteria efficiently and resistance to them is difficult to be obtained, they have the potential to be used in many applications, e.g. in pharmaceutical industry or food industry. Nisin can inhibit the growth of Gram-positive bacteria by binding to lipid II and by making pores in their membrane. The C-terminal part of nisin is known to play an important role during translocation over the membrane and forming pore complexes. However, as the thickness of bacterial membranes varies between different species and environmental conditions, this property could have an influence on the pore forming activity of nisin. To investigate this, the so-called hinge region of nisin (residues NMK was engineered to vary from one to six amino acid residues and specific activity against different indicators was compared. Antimicrobial activity in liquid culture assays showed that wild type nisin is most active, while truncation of the hinge region dramatically reduced the activity of the peptide. However, one or two amino acids extensions showed only slightly reduced activity against most indicator strains. Notably, some variants (+2, +1, -1, -2 exhibited higher antimicrobial activity than nisin in agar well diffusion assays against Lactococcus lactis MG1363, Listeria monocytogenes, Enterococcus faecalis VE14089, Bacillus sporothermodurans IC4 and Bacillus cereus 4153 at certain temperatures.

  2. Bacterial membrane activity of a-peptide/b-peptoid chimeras: Influence of amino acid composition and chain length on the activity against different bacterial strains

    DEFF Research Database (Denmark)

    Hein-Kristensen, Line; Knapp, Kolja M; Franzyk, Henrik

    2011-01-01

    and subsequent killing is usually not tested. In this report, six α-peptide/β-peptoid chimeras were examined for the effect of amino acid/peptoid substitutions and chain length on the membrane perturbation and subsequent killing of food-borne and clinical bacterial isolates. RESULTS: All six AMP analogues...... acid only had a minor effect on MIC values, whereas chain length had a profound influence on activity. All chimeras were less active against Serratia marcescens (MICs above 46 μM). The chimeras were bactericidal and induced leakage of ATP from Staphylococcus aureus and S. marcescens with similar time...... of onset and reduction in the number of viable cells. EDTA pre-treatment of S. marcescens and E. coli followed by treatment with chimeras resulted in pronounced killing indicating that disintegration of the Gram-negative outer membrane eliminated innate differences in susceptibility. Chimera chain length...

  3. Verification of a characterization method of the laser-induced selective activation based on industrial lasers

    DEFF Research Database (Denmark)

    Zhang, Yang; Hansen, Hans Nørgaard; Tang, Peter T.

    2013-01-01

    In this article, laser-induced selective activation (LISA) for subsequent autocatalytic copper plating is performed by several types of industrial scale lasers, including a Nd:YAG laser, a UV laser, a fiber laser, a green laser, and a short pulsed laser. Based on analysis of all the laser......-machined surfaces, normalized bearing area curves and parameters are used to characterize the surface quantitatively. The range of normalized bearing area curve parameters for plate-able surface is suggested. PBT/PET with 40 % glass fiber was used as the substrate material. For all of the studied lasers......, the parameters were varied in a relatively large range, and matrixes of the laser-machined surface were obtained. The topography of those laser-machined surfaces was examined by scanning electronic microscope (SEM). For each sample examined by SEM, there was an identical workpiece plated by for 90 min...

  4. Number of nuclei, mitotic activity and cell length in Cladophora sp thallus treated with cadmium and chromium

    Directory of Open Access Journals (Sweden)

    Monika Krajewska

    2014-01-01

    Full Text Available Cladophora sp., a fresh water, filamentous, multi-nucleate alga growing 16 days in the presence of cadmium and chromium at concentrations 10-4 10-8M was the subject of the experiment. Chromium ions reduced the number of nuclei and mitotic activity, and disturbed the correlation between cell length and number of nuclei, more than cadmium ions. Moreover, both tested metals caused the disappearance of cells with numerous nuclei with time of the culture. Only during the first (1-4 days of culture for both metals the concentration of 10-4M and especially of 10-8M increased the number of nuclei, mitotic index and the length of cells. Apical cells were more sensitive to metals than other thallus cells.

  5. Availability verification of information for human system interface in automatic SG level control using activity diagram

    Energy Technology Data Exchange (ETDEWEB)

    Nuraslinda, Anuar; Kim, Dong Young; Kim, Jong Hyun [KEPCO International Nuclear Graduate School, Uljugun (Korea, Republic of)

    2012-10-15

    Steam Generator (SG) level control system in OPR 1000 is one of representative automatic systems that falls under the Supervisory Control level in Endsley's taxonomy. Supervisory control of automated systems is classified as a form of out of the loop (OOTL) performance due to passive involvement in the systems operation, which could lead to loss of situation awareness (SA). There was a reported event, which was caused by inadequate human automation communication that contributed to an unexpected reactor trip in July 2005. A high SG level trip occurred in Yeonggwang (YGN) Unit 6 Nuclear Power Plant (NPP) due to human operator failure to recognize the need to change the control mode of the economizer valve controller (EVC) to manual mode during swap over (the transition from low power mode to high power mode) after the loss of offsite power (LOOP) event was recovered. This paper models the human system interaction in NPP SG level control system using Unified Modeling Language (UML) Activity Diagram. Then, it identifies the missing information for operators in the OPR1000 Main Control Room (MCR) and suggests some means of improving the human system interaction.

  6. Availability verification of information for human system interface in automatic SG level control using activity diagram

    International Nuclear Information System (INIS)

    Nuraslinda, Anuar; Kim, Dong Young; Kim, Jong Hyun

    2012-01-01

    Steam Generator (SG) level control system in OPR 1000 is one of representative automatic systems that falls under the Supervisory Control level in Endsley's taxonomy. Supervisory control of automated systems is classified as a form of out of the loop (OOTL) performance due to passive involvement in the systems operation, which could lead to loss of situation awareness (SA). There was a reported event, which was caused by inadequate human automation communication that contributed to an unexpected reactor trip in July 2005. A high SG level trip occurred in Yeonggwang (YGN) Unit 6 Nuclear Power Plant (NPP) due to human operator failure to recognize the need to change the control mode of the economizer valve controller (EVC) to manual mode during swap over (the transition from low power mode to high power mode) after the loss of offsite power (LOOP) event was recovered. This paper models the human system interaction in NPP SG level control system using Unified Modeling Language (UML) Activity Diagram. Then, it identifies the missing information for operators in the OPR1000 Main Control Room (MCR) and suggests some means of improving the human system interaction

  7. Magnetic nanoparticle imaging by random and maximum length sequences of inhomogeneous activation fields.

    Science.gov (United States)

    Baumgarten, Daniel; Eichardt, Roland; Crevecoeur, Guillaume; Supriyanto, Eko; Haueisen, Jens

    2013-01-01

    Biomedical applications of magnetic nanoparticles require a precise knowledge of their biodistribution. From multi-channel magnetorelaxometry measurements, this distribution can be determined by means of inverse methods. It was recently shown that the combination of sequential inhomogeneous excitation fields in these measurements is favorable regarding the reconstruction accuracy when compared to homogeneous activation . In this paper, approaches for the determination of activation sequences for these measurements are investigated. Therefor, consecutive activation of single coils, random activation patterns and families of m-sequences are examined in computer simulations involving a sample measurement setup and compared with respect to the relative condition number of the system matrix. We obtain that the values of this condition number decrease with larger number of measurement samples for all approaches. Random sequences and m-sequences reveal similar results with a significant reduction of the required number of samples. We conclude that the application of pseudo-random sequences for sequential activation in the magnetorelaxometry imaging of magnetic nanoparticles considerably reduces the number of required sequences while preserving the relevant measurement information.

  8. Influence of Day Length and Physical Activity on Sleep Patterns in Older Icelandic Men and Women

    DEFF Research Database (Denmark)

    Brychta, Robert J; Arnardóttir, Nanna Ýr; Jóhannsson, Erlingur

    2016-01-01

    Study Objectives: To identify cross-sectional and seasonal patterns of sleep and physical activity (PA) in community-dwelling, older Icelandic adults using accelerometers. Methods: A seven-day free-living protocol of 244 (110 female) adults aged 79.7 +/- 4.9 years was conducted as part of a larger...

  9. Erect penile length and circumference dimensions of 1,661 sexually active men in the United States.

    Science.gov (United States)

    Herbenick, Debby; Reece, Michael; Schick, Vanessa; Sanders, Stephanie A

    2014-01-01

    Penile size continues to receive popular and empirical attention. Little is known about the process of self-measurement and whether the behaviors a man engages in to become erect for self-measurement are associated with his erect penile dimensions. The article aims to assess men's erect penile dimensions in a study in which the men would presumably be motivated to report accurate information about their penis size; and to explore associations between men's erect penile dimensions, their method of measurement, and their demographics. Data are from an Internet-based baseline phase of a large prospective daily diary study that compared men's use of a standard-sized condom to men's use of a condom sized to fit their erect penis. The main outcomes are participant characteristics, activities engaged in during self-measurement process, and self-reported erect penile length and circumference. For this sample of 1,661 men, the mean erect penile length was 14.15 cm (SD = 2.66; range = 4 to 26 cm), and the mean erect penile circumference was 12.23 cm (SD = 2.23; range = 3 to 19). Participant characteristics were not associated with measured length or circumference. Most men measured their penis while alone, using hand stimulation to become erect. In this sample of men who measured their erect penile length and circumference for the purposes of receiving a condom sized to fit their erect penis, we found a mean erect penile length of 14.15 cm and a mean erect penile circumference of 12.23 cm. The self-reported erect penile dimensions in this study are consistent with other penile dimension research. Also, findings suggest that mode of getting an erection may influence erect penile dimensions. Additionally, how a man becomes erect for self-measurement may be associated with his erect penile length and/or circumference. © 2013 International Society for Sexual Medicine.

  10. Independent verification of the delivered dose in High-Dose Rate (HDR) brachytherapy

    International Nuclear Information System (INIS)

    Portillo, P.; Feld, D.; Kessler, J.

    2009-01-01

    An important aspect of a Quality Assurance program in Clinical Dosimetry is an independent verification of the dosimetric calculation done by the Treatment Planning System for each radiation treatment. The present paper is aimed at creating a spreadsheet for the verification of the dose recorded at a point of an implant with radioactive sources and HDR in gynecological injuries. An 192 Ir source automatic differed loading equipment, GammaMedplus model, Varian Medical System with HDR installed at the Angel H. Roffo Oncology Institute has been used. The planning system implemented for getting the dose distribution is the BraquiVision. The sources coordinates as well as those of the calculation point (Rectum) are entered into the Excel-devised verification program by assuming the existence of a point source in each one of the applicators' positions. Such calculation point has been selected as the rectum is an organ at risk, therefore determining the treatment planning. The dose verification is performed at points standing at a sources distance having at least twice the active length of such sources, so they may be regarded as point sources. Most of the sources used in HDR brachytherapy with 192 Ir have a 5 mm active length for all equipment brands. Consequently, the dose verification distance must be at least of 10 mm. (author)

  11. Field Test and Performance Verification: Integrated Active Desiccant Rooftop Hybrid System Installed in a School - Final Report: Phase 4A

    Energy Technology Data Exchange (ETDEWEB)

    Fischer, J

    2005-12-21

    This report summarizes the results of a field verification pilot site investigation that involved the installation of a hybrid integrated active desiccant/vapor-compression rooftop heating, ventilation, and air-conditioning (HVAC) unit at an elementary school in the Atlanta Georgia area. For years, the school had experienced serious humidity and indoor air quality (IAQ) problems that had resulted in occupant complaints and microbial (mold) remediation. The outdoor air louvers of the original HVAC units had been closed in an attempt to improve humidity control within the space. The existing vapor compression variable air volume system was replaced by the integrated active desiccant rooftop (IADR) system that was described in detail in an Oak Ridge National Laboratory (ORNL) report published in 2004 (Fischer and Sand 2004). The IADR system and all space conditions have been monitored remotely for more than a year. The hybrid system was able to maintain both the space temperature and humidity as desired while delivering the outdoor air ventilation rate required by American Society of Heating, Refrigerating and Air-Conditioning Engineers Standard 62. The performance level of the IADR unit and the overall system energy efficiency was measured and found to be very high. A comprehensive IAQ investigation was completed by the Georgia Tech Research Institute before and after the system retrofit. Before-and-after data resulting from this investigation confirmed a significant improvement in IAQ, humidity control, and occupant comfort. These observations were reported by building occupants and are echoed in a letter to ORNL from the school district energy manager. The IADR system was easily retrofitted in place of the original rooftop system using a custom curb adapter. All work was completed in-house by the school's maintenance staff over one weekend. A subsequent cost analysis completed for the school district by the design engineer of record concluded that the IADR

  12. Swarm Verification

    Science.gov (United States)

    Holzmann, Gerard J.; Joshi, Rajeev; Groce, Alex

    2008-01-01

    Reportedly, supercomputer designer Seymour Cray once said that he would sooner use two strong oxen to plow a field than a thousand chickens. Although this is undoubtedly wise when it comes to plowing a field, it is not so clear for other types of tasks. Model checking problems are of the proverbial "search the needle in a haystack" type. Such problems can often be parallelized easily. Alas, none of the usual divide and conquer methods can be used to parallelize the working of a model checker. Given that it has become easier than ever to gain access to large numbers of computers to perform even routine tasks it is becoming more and more attractive to find alternate ways to use these resources to speed up model checking tasks. This paper describes one such method, called swarm verification.

  13. Load rather than length sensitive feedback contributes to soleus muscle activity during human treadmill walking

    DEFF Research Database (Denmark)

    af Klint, Richard; Mazzaro, Nazarena; Nielsen, Jens Bo

    2010-01-01

    Walking requires a constant adaptation of locomotor output from sensory afferent feedback mechanisms to ensure efficient and stable gait. We investigated the nature of the sensory afferent feedback contribution to the soleus motoneuronal drive and to the corrective stretch reflex by manipulating...... on the soleus stretch reflex was measured by presenting dorsiflexion perturbations ( approximately 5 degrees, 360-400 degrees/s) in mid and late stances. Short (SLRs) and medium latency reflexes (MLRs) were quantified in a 15 ms analysis window. The MLR decreased with decreased loading (P = 0.......045), but no significant difference was observed for the SLR (P = 0.13). Similarly, the effect of the BWS was measured on the unload response, i.e., the depression in soleus activity following a plantar-flexion perturbation ( approximately 5.6 degrees, 203-247 degrees/s), quantified over a 50 ms analysis window...

  14. Theoretical Calculations of the Seasonal and Solar Activity Variations for Ionospheric Collision Frequency and Debye Length over Baghdad City

    Directory of Open Access Journals (Sweden)

    Ali Hussein Ni'ma

    2017-03-01

    Full Text Available In this study, two important ionospheric factors have been calculated, the collision frequency of electron and Deby length for a height range from 80 Km to a height approaching the maximum height of the F2 region of the ionosphere above the Earth's surface. Both above factors have been calculated for two different levels of solar activity and for two seasons (winter and summer. Also, six months were adopted for every level of solar activity and season. The estimation of collision frequency of electron is depends on the contribution of neutral constituents and ions. Three neutral atmospheric gases have been adopted to calculate the collision frequency, Molecular and atomic oxygen O2 and O respectively and molecular nitrogen N2, as well as the singly charged ions were taken into account in calculation.

  15. Advanced Collimators for Verification of the Pu Isotopic Composition in Fresh Fuel by High Resolution Gamma Spectrometry

    International Nuclear Information System (INIS)

    Lebrun, Alain; Berlizov, Andriy

    2013-06-01

    IAEA verification of the nuclear material contained in fresh nuclear fuel assemblies is usually based on neutron coincidence counting (NCC). In the case of uranium fuel, active NCC provides the total content of uranium-235 per unit of length which, combined with active length verification, fully supports the verification. In the case of plutonium fuel, passive NCC provides the plutonium-240 equivalent content which needs to be associated with a measurement of the isotopic composition and active length measurement to complete the verification. Plutonium isotopic composition is verified by high resolution gamma spectrometry (HRGS) applied on fresh fuel assemblies assuming all fuel rods are fabricated from the same plutonium batch. For particular verifications when such an assumption cannot be reasonably made, there is a need to optimize the HRGS measurement so that contributions of internal rods to the recorded spectrum are maximized, thus providing equally strong verification of the internal fuel rods. This paper reports on simulation work carried out to design special collimators aimed at reducing the relative contribution of external fuel rods while enhancing the signal recorded from internal rods. Both cases of square lattices (e.g. 17x17 pressurized water reactor (PWR) fuel) and hexagonal compact lattices (e.g. BN800 fast neutron reactor (FNR) fuel) have been addressed. In the case of PWR lattices, the relatively large optical path to internal pins compensates for low plutonium concentrations and the large size of the fuel assemblies. A special collimator based on multiple, asymmetrical, vertical slots allows recording a spectrum from internal rods only when needed. In the FNR case, the triangular lattice is much more compact and the optical path to internal rods is very narrow. However, higher plutonium concentration and use of high energy ranges allow the verification of internal rods to be significantly strengthened. Encouraging results from the simulation

  16. Model-based design and experimental verification of a monitoring concept for an active-active electromechanical aileron actuation system

    Science.gov (United States)

    Arriola, David; Thielecke, Frank

    2017-09-01

    Electromechanical actuators have become a key technology for the onset of power-by-wire flight control systems in the next generation of commercial aircraft. The design of robust control and monitoring functions for these devices capable to mitigate the effects of safety-critical faults is essential in order to achieve the required level of fault tolerance. A primary flight control system comprising two electromechanical actuators nominally operating in active-active mode is considered. A set of five signal-based monitoring functions are designed using a detailed model of the system under consideration which includes non-linear parasitic effects, measurement and data acquisition effects, and actuator faults. Robust detection thresholds are determined based on the analysis of parametric and input uncertainties. The designed monitoring functions are verified experimentally and by simulation through the injection of faults in the validated model and in a test-rig suited to the actuation system under consideration, respectively. They guarantee a robust and efficient fault detection and isolation with a low risk of false alarms, additionally enabling the correct reconfiguration of the system for an enhanced operational availability. In 98% of the performed experiments and simulations, the correct faults were detected and confirmed within the time objectives set.

  17. Potency of full-length MGF to induce maximal activation of the IGF-I R Is similar to recombinant human IGF-I at high equimolar concentrations

    NARCIS (Netherlands)

    J.A.M.J.L. Janssen (Joseph); L.J. Hofland (Leo); C.J. Strasburger; E.S.R.D. Van Dungen (Elisabeth S.R. Den); M. Thevis (Mario)

    2016-01-01

    textabstractAims To compare full-length mechano growth factor (full-length MGF) with human recombinant insulin-like growth factor-I (IGF-I) and human recombinant insulin (HI) in their ability to activate the human IGF-I receptor (IGF-IR), the human insulin receptor (IR-A) and the human insulin

  18. Fundamental length and relativistic length

    International Nuclear Information System (INIS)

    Strel'tsov, V.N.

    1988-01-01

    It si noted that the introduction of fundamental length contradicts the conventional representations concerning the contraction of the longitudinal size of fast-moving objects. The use of the concept of relativistic length and the following ''elongation formula'' permits one to solve this problem

  19. Flame Length

    Data.gov (United States)

    Earth Data Analysis Center, University of New Mexico — Flame length was modeled using FlamMap, an interagency fire behavior mapping and analysis program that computes potential fire behavior characteristics. The tool...

  20. Weather, day length and physical activity in older adults: Cross-sectional results from the European Prospective Investigation into Cancer and Nutrition (EPIC Norfolk Cohort.

    Directory of Open Access Journals (Sweden)

    Yu-Tzu Wu

    Full Text Available A wide range of environmental factors have been related to active ageing, but few studies have explored the impact of weather and day length on physical activity in older adults. We investigate the cross-sectional association between weather conditions, day length and activity in older adults using a population-based cohort in England, the European Prospective Investigation into Cancer and Nutrition (EPIC Norfolk study.Physical activity was measured objectively over 7 days using an accelerometer and this was used to calculate daily total physical activity (counts per minute, daily minutes of sedentary behaviour and light, moderate and vigorous physical activity (LMVPA. Day length and two types of weather conditions, precipitation and temperature, were obtained from a local weather station. The association between these variables and physical activity was examined by multilevel first-order autoregressive modelling.After adjusting for individual factors, short day length and poor weather conditions, including high precipitation and low temperatures, were associated with up to 10% lower average physical activity (p<0.01 and 8 minutes less time spent in LMVPA but 15 minutes more sedentary time, compared to the best conditions.Day length and weather conditions appear to be an important factor related to active ageing. Future work should focus on developing potential interventions to reduce their impact on physical activity behaviours in older adults.

  1. Clinical application of in vivo treatment delivery verification based on PET/CT imaging of positron activity induced at high energy photon therapy

    Science.gov (United States)

    Janek Strååt, Sara; Andreassen, Björn; Jonsson, Cathrine; Noz, Marilyn E.; Maguire, Gerald Q., Jr.; Näfstadius, Peder; Näslund, Ingemar; Schoenahl, Frederic; Brahme, Anders

    2013-08-01

    The purpose of this study was to investigate in vivo verification of radiation treatment with high energy photon beams using PET/CT to image the induced positron activity. The measurements of the positron activation induced in a preoperative rectal cancer patient and a prostate cancer patient following 50 MV photon treatments are presented. A total dose of 5 and 8 Gy, respectively, were delivered to the tumors. Imaging was performed with a 64-slice PET/CT scanner for 30 min, starting 7 min after the end of the treatment. The CT volume from the PET/CT and the treatment planning CT were coregistered by matching anatomical reference points in the patient. The treatment delivery was imaged in vivo based on the distribution of the induced positron emitters produced by photonuclear reactions in tissue mapped on to the associated dose distribution of the treatment plan. The results showed that spatial distribution of induced activity in both patients agreed well with the delivered beam portals of the treatment plans in the entrance subcutaneous fat regions but less so in blood and oxygen rich soft tissues. For the preoperative rectal cancer patient however, a 2 ± (0.5) cm misalignment was observed in the cranial-caudal direction of the patient between the induced activity distribution and treatment plan, indicating a beam patient setup error. No misalignment of this kind was seen in the prostate cancer patient. However, due to a fast patient setup error in the PET/CT scanner a slight mis-position of the patient in the PET/CT was observed in all three planes, resulting in a deformed activity distribution compared to the treatment plan. The present study indicates that the induced positron emitters by high energy photon beams can be measured quite accurately using PET imaging of subcutaneous fat to allow portal verification of the delivered treatment beams. Measurement of the induced activity in the patient 7 min after receiving 5 Gy involved count rates which were about

  2. Role of Active Contraction and Tropomodulins in Regulating Actin Filament Length and Sarcomere Structure in Developing Zebrafish Skeletal Muscle.

    Science.gov (United States)

    Mazelet, Lise; Parker, Matthew O; Li, Mei; Arner, Anders; Ashworth, Rachel

    2016-01-01

    Whilst it is recognized that contraction plays an important part in maintaining the structure and function of mature skeletal muscle, its role during development remains undefined. In this study the role of movement in skeletal muscle maturation was investigated in intact zebrafish embryos using a combination of genetic and pharmacological approaches. An immotile mutant line (cacnb1 (ts25) ) which lacks functional voltage-gated calcium channels (dihydropyridine receptors) in the muscle and pharmacological immobilization of embryos with a reversible anesthetic (Tricaine), allowed the study of paralysis (in mutants and anesthetized fish) and recovery of movement (reversal of anesthetic treatment). The effect of paralysis in early embryos (aged between 17 and 24 hours post-fertilization, hpf) on skeletal muscle structure at both myofibrillar and myofilament level was determined using both immunostaining with confocal microscopy and small angle X-ray diffraction. The consequences of paralysis and subsequent recovery on the localization of the actin capping proteins Tropomodulin 1 & 4 (Tmod) in fish aged from 17 hpf until 42 hpf was also assessed. The functional consequences of early paralysis were investigated by examining the mechanical properties of the larval muscle. The length-force relationship, active and passive tension, was measured in immotile, recovered and control skeletal muscle at 5 and 7 day post-fertilization (dpf). Recovery of muscle function was also assessed by examining swimming patterns in recovered and control fish. Inhibition of the initial embryonic movements (up to 24 hpf) resulted in an increase in myofibril length and a decrease in width followed by almost complete recovery in both moving and paralyzed fish by 42 hpf. In conclusion, myofibril organization is regulated by a dual mechanism involving movement-dependent and movement-independent processes. The initial contractile event itself drives the localization of Tmod1 to its sarcomeric

  3. Role of active contraction and tropomodulins in regulating actin filament length and sarcomere structure in developing zebrafish skeletal muscle

    Directory of Open Access Journals (Sweden)

    Lise eMazelet

    2016-03-01

    Full Text Available Whilst it is recognised that contraction plays an important part in maintaining the structure and function of mature skeletal muscle, its role during development remains undefined. In this study the role of movement in skeletal muscle maturation was investigated in intact zebrafish embryos using a combination of genetic and pharmacological approaches. An immotile mutant line (cacnb1ts25 which lacks functional voltage-gated calcium channels (dihydropyridine receptors in the muscle and pharmacological immobilisation of embryos with a reversible anaesthetic (Tricaine, allowed the study of paralysis (in mutants and anaesthetised fish and recovery of movement (reversal of anaesthetic treatment. The effect of paralysis in early embryos (aged between 17-24 hours post fertilisation, hpf on skeletal muscle structure at both myofibrillar and myofilament level was determined using both immunostaining with confocal microscopy and small angle X-ray diffraction. The consequences of paralysis and subsequent recovery on the localisation of the actin capping proteins Tropomodulin 1 &4 (Tmod in fish aged from 17hpf until 42hpf was also assessed. The functional consequences of early paralysis were investigated by examining the mechanical properties of the larval muscle. The length-force relationship, active and passive tension, was measured in immotile, recovered and control skeletal muscle at 5 and 7 day post fertilisation (dpf. Recovery of muscle function was also assessed by examining swimming patterns in recovered and control fish. Inhibition of the initial embryonic movements (up to 24 hpf resulted in an increase in myofibril length and a decrease in width followed by almost complete recovery in both moving and paralysed fish by 42hpf. In conclusion, myofibril organisation is regulated by a dual mechanism involving movement-dependent and movement-independent processes. The initial contractile event itself drives the localisation of Tmod1 to its sarcomeric

  4. On power consumption issues in FIR filters with application to communication receivers: complexity, word length, and switching activity

    Energy Technology Data Exchange (ETDEWEB)

    Havashki, Asghar

    2009-10-15

    channel estimation must be upheld, in particular at medium-to-high Channel Signal to Noise Ratios (CSNR). Furthermore, reducing the power consumption through word-length optimization, when realizing such estimators, is an attractive approach. Due to the characteristics of the input signal to such estimators, a special treatment of channel estimation error due to quantization of estimator filter coefficients is needed. In this thesis we investigate the impact of finite coefficient word length on channel estimator performance. A theoretical analysis of the increase in channel estimation error due to quantization of estimator coefficients is performed, and the behavior of this error in different fading environments and for different filter orders is studied. The power consumed in a channel estimator is also influenced by the switching activity in the input signal of the estimator. Characterizing the switching activity in the input signal, including how this activity changes in different environments, e.g., in the presence of noise, is a subject of the work performed in this thesis. In this study we give an expression for direct calculation of the correlation coefficient for the most significant bit in a signal, using the word-level correlation coefficient. We also derive expressions for accurately calculating the variance and word-level correlation coefficient for a correlated signal, when an additional noise of a given variance is added to the signal. This can be used to estimate the bit-level switching activity in a signal in the presence of noise, based on the Dual Bit Type (DBT) method. The impact the additional noise has on the switching activity of a correlated signal has also been studied. These results make it possible for a designer to model the actual input switching activity in different real life noisy environments, enabling realistic power consumption estimation. A study on switching activity reduction in estimator filters using a coefficient reordering method

  5. Fundamental length

    International Nuclear Information System (INIS)

    Pradhan, T.

    1975-01-01

    The concept of fundamental length was first put forward by Heisenberg from purely dimensional reasons. From a study of the observed masses of the elementary particles known at that time, it is sumrised that this length should be of the order of magnitude 1 approximately 10 -13 cm. It was Heisenberg's belief that introduction of such a fundamental length would eliminate the divergence difficulties from relativistic quantum field theory by cutting off the high energy regions of the 'proper fields'. Since the divergence difficulties arise primarily due to infinite number of degrees of freedom, one simple remedy would be the introduction of a principle that limits these degrees of freedom by removing the effectiveness of the waves with a frequency exceeding a certain limit without destroying the relativistic invariance of the theory. The principle can be stated as follows: It is in principle impossible to invent an experiment of any kind that will permit a distintion between the positions of two particles at rest, the distance between which is below a certain limit. A more elegant way of introducing fundamental length into quantum theory is through commutation relations between two position operators. In quantum field theory such as quantum electrodynamics, it can be introduced through the commutation relation between two interpolating photon fields (vector potentials). (K.B.)

  6. Software verification for nuclear industry

    International Nuclear Information System (INIS)

    Wilburn, N.P.

    1985-08-01

    Why verification of software products throughout the software life cycle is necessary is considered. Concepts of verification, software verification planning, and some verification methodologies for products generated throughout the software life cycle are then discussed

  7. Challenges for effective WMD verification

    International Nuclear Information System (INIS)

    Andemicael, B.

    2006-01-01

    already awash in fissile material and is increasingly threatened by the possible consequences of illicit trafficking in such material. The chemical field poses fewer problems. The ban on chemical weapons is a virtually complete post-Cold War regime, with state-of-the-art concepts and procedures of verification resulting from decades of negotiation. The detection of prohibited materials and activities is the common goal of the nuclear and chemical regimes for which the most intrusive and intensive procedures are activated by the three organizations. Accounting for the strictly peaceful application of dual-use items constitutes the bulk of the work of the inspectorates at the IAEA and the OPCW. A common challenge in both fields is the advance of science and technology in the vast nuclear and chemical industries and the ingenuity of some determined proliferators to deceive by concealing illicit activities under legitimate ones. Inspection procedures and technologies need to keep up with the requirement for flexibility and adaptation to change. The common objective of the three organizations is to assemble and analyze all relevant information in order to conclude reliably whether a State is or is not complying with its treaty obligations. The positive lessons learned from the IAEA's verification experience today are valuable in advancing concepts and technologies that might also benefit the other areas of WMD verification. Together with the emerging, more comprehensive verification practice of the OPCW, they may provide a useful basis for developing common standards, which may in turn help in evaluating the cost-effectiveness of verification methods for the Biological and Toxin Weapons Convention and other components of a WMD control regime

  8. Influence of physical activity in length of life of the human population in the context of changes

    Directory of Open Access Journals (Sweden)

    Ahmetović Zlatko

    2014-01-01

    Full Text Available Since the middle of the last century, the human population has increased exponentially. This trend is evident today. Human population has, for more than half a century been undergoing the period of its intensive development, increasing in number and the average length of life, creating the impression of a better life standard. Looking at the man as a bio-psycho-social being and the interactions it ones through the human population growth is brought in connection with its impact on the environment. In such an environment, one does not only face infectious diseases, but also the misery and poverty in developing countries and massive noninfectious diseases, in developed countries. These facts introduce evidence about the possible effects of physical activity as to prevent the consequences of mass noninfectious diseases, as well as to strengthen the competence of people in general. Therefore, in a holistic, synergic concept of interpretation of human life, it is significant to include biological indicators that have an impact on the growth of the world population and may be associated with the kinesiology. Quantitative indicators of the trend of human development on this planet are the basic research unit observed in this paper. At the same time, the subjects of observation are also other indicators that can be causally linked to the development of the human population and are especially valuable evidence of the contribution of physical activity to the human development. The data that is associated with the theoretical considerations and the results of various statistics are presented based on the rules of ex-post-facto analysis. It is concluded that the value of physical activity has long had to have the equal status with one's chances of being better prepared for life on this planet ontogenetically and phylogenetically, and for the life conditions that will become even more extreme and that increasing older humans will face.

  9. Study on safety classifications of software used in nuclear power plants and distinct applications of verification and validation activities in each class

    International Nuclear Information System (INIS)

    Kim, B. R.; Oh, S. H.; Hwang, H. S.; Kim, D. I.

    2000-01-01

    This paper describes the safety classification regarding instrumentation and control (I and C) systems and their software used in nuclear power plants, provides regulatory positions for software important to safety, and proposes verification and validation (V and V) activities applied differently in software classes which are important elements in ensuring software quality assurance. In other word, the I and C systems important to safety are classified into IC-1, IC-2, IC-3, and Non-IC and their software are classified into safety-critical, safety-related, and non-safety software. Based upon these safety classifications, the extent of software V and V activities in each class is differentiated each other. In addition, the paper presents that the software for use in I and C systems important to safety is divided into newly-developed and previously-developed software in terms of design and implementation, and provides the regulatory positions on each type of software

  10. VP1u phospholipase activity is critical for infectivity of full-length parvovirus B19 genomic clones.

    Science.gov (United States)

    Filippone, Claudia; Zhi, Ning; Wong, Susan; Lu, Jun; Kajigaya, Sachiko; Gallinella, Giorgio; Kakkola, Laura; Söderlund-Venermo, Maria; Young, Neal S; Brown, Kevin E

    2008-05-10

    Three full-length genomic clones (pB19-M20, pB19-FL and pB19-HG1) of parvovirus B19 were produced in different laboratories. pB19-M20 was shown to produce infectious virus. To determine the differences in infectivity, all three plasmids were tested by transfection and infection assays. All three clones were similar in viral DNA replication, RNA transcription, and viral capsid protein production. However, only pB19-M20 and pB19-HG1 produced infectious virus. Comparison of viral sequences showed no significant differences in ITR or NS regions. In the capsid region, there was a nucleotide sequence difference conferring an amino acid substitution (E176K) in the phospholipase A2-like motif of the VP1-unique (VP1u) region. The recombinant VP1u with the E176K mutation had no catalytic activity as compared with the wild-type. When this mutation was introduced into pB19-M20, infectivity was significantly attenuated, confirming the critical role of this motif. Investigation of the original serum from which pB19-FL was cloned confirmed that the phospholipase mutation was present in the native B19 virus.

  11. VP1u phospholipase activity is critical for infectivity of full-length parvovirus B19 genomic clones✰

    Science.gov (United States)

    Filippone, Claudia; Zhi, Ning; Wong, Susan; Lu, Jun; Kajigaya, Sachiko; Gallinella, Giorgio; Kakkola, Laura; Venermo, Maria S Söderlund; Young, Neal S.; Brown, Kevin E.

    2008-01-01

    Three full-length genomic clones (pB19-M20, pB19-FL and pB19-HG1) of parvovirus B19 were produced in different laboratories. pB19-M20 was shown to produce infectious virus. To determine the differences in infectivity, all three plasmids were tested by transfection and infection assays. All three clones were similar in viral DNA replication, RNA transcription, and viral capsid protein production. However, only pB19-M20 and pB19-HG1 produced infectious virus. Comparison of viral sequences showed no significant differences in ITR or NS regions. In the capsid region, there was a nucleotide sequence difference conferring an amino acid substitution (E176K) in the phospholipase A2-like motif of the VP1-unique (VP1u) region. The recombinant VP1u with the E176K mutation had no catalytic activity as compared with the wild-type. When this mutation was introduced into pB19-M20, infectivity was significantly attenuated, confirming the critical role of this motif. Investigation of the original serum from which pB19-FL was cloned confirmed that the phospholipase mutation was present in the native B19 virus. PMID:18252260

  12. Comparison of telomere length in black and white teachers from South Africa: the sympathetic activity and ambulatory blood pressure in Africans study.

    Science.gov (United States)

    von Känel, Roland; Malan, Nico T; Hamer, Mark; Malan, Leoné

    2015-01-01

    Telomere length is a marker of biological aging that has been linked to cardiovascular disease risk. The black South African population is witnessing a tremendous increase in the prevalence of cardiovascular disease, part of which might be explained through urbanization. We compared telomere length between black South Africans and white South Africans and examined which biological and psychosocial variables played a role in ethnic difference in telomere length. We measured leukocyte telomere length in 161 black South African teachers and 180 white South African teachers aged 23 to 66 years without a history of atherothrombotic vascular disease. Age, sex, years having lived in the area, human immunodeficiency virus (HIV) infection, hypertension, body mass index, dyslipidemia, hemoglobin A1c, C-reactive protein, smoking, physical activity, alcohol abuse, depressive symptoms, psychological distress, and work stress were considered as covariates. Black participants had shorter (median, interquartile range) relative telomere length (0.79, 0.70-0.95) than did white participants (1.06, 0.87-1.21; p < .001), and this difference changed very little after adjusting for covariates. In fully adjusted models, age (p < .001), male sex (p = .011), and HIV positive status (p = .023) were associated with shorter telomere length. Ethnicity did not significantly interact with any covariates in determining telomere length, including psychosocial characteristics. Black South Africans showed markedly shorter telomeres than did white South African counterparts. Age, male sex, and HIV status were associated with shorter telomere length. No interactions between ethnicity and biomedical or psychosocial factors were found. Ethnic difference in telomere length might primarily be explained by genetic factors.

  13. Verification of Vitrified High-Activity Waste Stored in a CASTOR HAW 20/28 CG Cask by Simulated Baseline Comparison

    International Nuclear Information System (INIS)

    Shephard, A.; Arenas-Carrasco, J.; Dratschmidt, H.; De-Baere, P.; Af Ekenstam, G.; Lebrun, A.

    2010-01-01

    The verification process for the vitrification of high-activity waste (HAW) focuses on maintaining the continuity-of-knowledge of special nuclear material (SNM) as it traverses a vitrification facility. However, the inaccessible nature of a vitrification facility presents an obstacle to the deployment of conventional safeguards, albeit the process area of a vitrification facility is effectively a hot cell. The employment of remotely operated NDA hardware/DA sample equipment inside the process area would be problematic-at-best and the alternative of continuous monitoring would draw heavily on the critical resource of inspector time. In response to the aforementioned constraints, the IAEA and Euratom opted to develop a new method which focuses on the verification of SNM after the vitrified HAW has been sealed in storage casks. The new method verifies the presence of the vitrified HAW through the comparison of total neutron count rates collected at points around a cask with those predicted by Monte Carlo simulation. The model includes a dual N50 neutron slab detector (custom design by Euratom) and a CASTOR HAW 20/28 CG storage cask configured with the operator declared contents. By comparison of the simulated neutron emission pattern and field measurements, the displacement of Pu and U is evident from a detectable neutron signal defect. Because the spontaneous fission of 244 Cm is the dominant neutron source in vitrified HAW, the 244 Cm/Pu and 244 Cm/U mass ratios must be known in order to relate the neutron signal outside the cask to the amounts of Pu and U stored inside. These mass ratios can be determined from HAW samples collected by the inspectorates from the accountability tanks and analyzed by DA. The absence of separation of SNM from the HAW is verified by other measures. To ensure the validity of the simulation, sources of uncertainty were systematically addressed and quantified. This new verification method effectively removes the need for NDA equipment

  14. Winter ecology of the Porcupine caribou herd, Yukon: Part III, Role of day length in determining activity pattern and estimating percent lying

    Directory of Open Access Journals (Sweden)

    D. E. Russell

    1986-06-01

    Full Text Available Data on the activity pattern, proportion of time spent lying and the length of active and lying periods in winter are presented from a 3 year study on the Porcupine caribou herd. Animals were most active at sunrise and sunset resulting in from one (late fall, early and mid winter to two (early fall and late winter to three (spring intervening lying periods. Mean active/lying cycle length decreased from late fall (298 mm to early winter (238 min, increased to a peak in mid winter (340 min then declined in late winter (305 min and again in spring (240 min. Mean length of the lying period increased throughout the 3 winter months from 56 min m early winter to 114 min in mid winter and 153 min in late winter. The percent of the day animals spent lying decreased from fall to early winter, increased throughout the winter and declined in spring. This pattern was related, in part, to day length and was used to compare percent lying among herds. The relationship is suggested to be a means of comparing quality of winter ranges.

  15. PCB153 reduces telomerase activity and telomere length in immortalized human skin keratinocytes (HaCaT) but not in human foreskin keratinocytes (NFK)

    International Nuclear Information System (INIS)

    Senthilkumar, P.K.; Robertson, L.W.; Ludewig, G.

    2012-01-01

    Polychlorinated biphenyls (PCBs), ubiquitous environmental pollutants, are characterized by long term-persistence in the environment, bioaccumulation, and biomagnification in the food chain. Exposure to PCBs may cause various diseases, affecting many cellular processes. Deregulation of the telomerase and the telomere complex leads to several biological disorders. We investigated the hypothesis that PCB153 modulates telomerase activity, telomeres and reactive oxygen species resulting in the deregulation of cell growth. Exponentially growing immortal human skin keratinocytes (HaCaT) and normal human foreskin keratinocytes (NFK) were incubated with PCB153 for 48 and 24 days, respectively, and telomerase activity, telomere length, superoxide level, cell growth, and cell cycle distribution were determined. In HaCaT cells exposure to PCB153 significantly reduced telomerase activity, telomere length, cell growth and increased intracellular superoxide levels from day 6 to day 48, suggesting that superoxide may be one of the factors regulating telomerase activity, telomere length and cell growth compared to untreated control cells. Results with NFK cells showed no shortening of telomere length but reduced cell growth and increased superoxide levels in PCB153-treated cells compared to untreated controls. As expected, basal levels of telomerase activity were almost undetectable, which made a quantitative comparison of treated and control groups impossible. The significant down regulation of telomerase activity and reduction of telomere length by PCB153 in HaCaT cells suggest that any cell type with significant telomerase activity, like stem cells, may be at risk of premature telomere shortening with potential adverse health effects for the affected organism. -- Highlights: ► Human immortal (HaCaT) and primary (NFK) keratinocytes were exposed to PCB153. ► PCB153 significantly reduced telomerase activity and telomere length in HaCaT. ► No effect on telomere length and

  16. Physics Verification Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-12

    The purpose of the verification project is to establish, through rigorous convergence analysis, that each ASC computational physics code correctly implements a set of physics models and algorithms (code verification); Evaluate and analyze the uncertainties of code outputs associated with the choice of temporal and spatial discretization (solution or calculation verification); and Develop and maintain the capability to expand and update these analyses on demand. This presentation describes project milestones.

  17. Future of monitoring and verification

    International Nuclear Information System (INIS)

    Wagenmakers, H.

    1991-01-01

    The organized verification entrusted to IAEA for the implementation of the NPT, of the Treaty of Tlatelolco and of the Treaty of Rarotonga, reaches reasonable standards. The current dispute with the Democratic People's Republic of Korea about the conclusion of a safeguards agreement with IAEA, by its exceptional nature, underscores rather than undermines the positive judgement to be passed on IAEA's overall performance. The additional task given to the Director General of IAEA under Security Council resolution 687 (1991) regarding Iraq's nuclear-weapons-usable material is particularly challenging. For the purposes of this paper, verification is defined as the process for establishing whether the States parties are complying with an agreement. In the final stage verification may lead into consideration of how to respond to non-compliance. Monitoring is perceived as the first level in the verification system. It is one generic form of collecting information on objects, activities or events and it involves a variety of instruments ranging from communications satellites to television cameras or human inspectors. Monitoring may also be used as a confidence-building measure

  18. Automatic adjustment of cycle length and aeration time for improved nitrogen removal in an alternating activated sludge process

    DEFF Research Database (Denmark)

    Isaacs, Steven Howard

    1997-01-01

    The paper examines the nitrogen dynamics in the alternating BIODENITRO and BIODENIPHO processes with a focus on two control handles influencing now scheduling and aeration: the cycle length and the ammonia concentration at which a nitrifying period is terminated. A steady state analysis examining...

  19. Machine learning techniques for the verification of refueling activities in CANDU-type nuclear power plants (NPPs) with direct applications in nuclear safeguards

    International Nuclear Information System (INIS)

    Budzinski, J.

    2006-06-01

    This dissertation deals with the problem of automated classification of the signals obtained from certain radiation monitoring systems, specifically from the Core Discharge Monitor (CDM) systems, that are successfully operated by the International Atomic Energy Agency (IAEA) at various CANDU-type nuclear power plants around the world. In order to significantly reduce the costly and error-prone manual evaluation of the large amounts of the collected CDM signals, a reliable and efficient algorithm for the automated data evaluation is necessary, which might ensure real-time performance with maximum of 0.01 % misclassification ratio. This thesis describes the research behind finding a successful prototype implementation of such automated analysis software. The finally adopted methodology assumes a nonstationary data-generating process that has a finite number of states or basic fueling activities, each of which can emit observable data patterns having particular stationary characteristics. To find out the underlying state sequences, a unified probabilistic approach known as the hidden Markov model (HMM) is used. Each possible fueling sequence is modeled by a distinct HMM having a left-right profile topology with explicit insert and delete states. Given an unknown fueling sequence, a dynamic programming algorithm akin to the Viterbi search is used to find the maximum likelihood state path through each model and eventually the overall best-scoring path is picked up as the recognition hypothesis. Machine learning techniques are applied to estimate the observation densities of the states, because the densities are not simply parameterizable. Unlike most present applications of continuous monitoring systems that rely on heuristic approaches to the recognition of possibly risky events, this research focuses on finding techniques that make optimal use of prior knowledge and computer simulation in the recognition task. Thus, a suitably modified, approximate n-best variant of

  20. Verification and the safeguards legacy

    International Nuclear Information System (INIS)

    Perricos, Demetrius

    2001-01-01

    ; qualitative and quantitative measurements of nuclear material; familiarity and access to sensitive technologies related to detection, unattended verification systems, containment/surveillance and sensors; examination and verification of design information of large and complex facilities; theoretical and practical aspects of technologies relevant to verification objectives; analysis of inspection findings and evaluation of their mutual consistency; negotiations on technical issues with facility operators and State authorities. This experience is reflected in the IAEA Safeguards Manual which sets out the policies and procedures to be followed in the inspection process as well as in the Safeguards Criteria which provide guidance for verification, evaluation and analysis of the inspection findings. The IAEA infrastructure and its experience with verification permitted in 1991 the organization to respond immediately and successfully to the tasks required by the Security Council Resolution 687(1991) for Iraq as well as to the tasks related to the verification of completeness and correctness of the initial declarations in the cases of the DPRK. and of S. Africa. In the case of Iraq the discovery of its undeclared programs was made possible through the existing verification system enhanced by additional access rights, information and application of modern detection technology. Such discoveries made it evident that there was a need for an intensive development effort to strengthen the safeguards system to develop a capability to detect undeclared activities. For this purpose it was recognized that there was need for additional and extended a) access to information, b) access to locations. It was also obvious that access to the Security Council, to bring the IAEA closer to the body responsible for maintenance of international peace and security, would be a requirement for reporting periodically on non-proliferation and the results of the IAEA's verification activities. While the case

  1. Verification of Simulation Tools

    International Nuclear Information System (INIS)

    Richard, Thierry

    2015-01-01

    Before qualifying a simulation tool, the requirements shall first be clearly identified, i.e.: - What type of study needs to be carried out? - What phenomena need to be modeled? This phase involves writing a precise technical specification. Once the requirements are defined, the most adapted product shall be selected from the various software options available on the market. Before using a particular version of a simulation tool to support the demonstration of nuclear safety studies, the following requirements shall be met. - An auditable quality assurance process complying with development international standards shall be developed and maintained, - A process of verification and validation (V and V) shall be implemented. This approach requires: writing a report and/or executive summary of the V and V activities, defining a validated domain (domain in which the difference between the results of the tools and those of another qualified reference is considered satisfactory for its intended use). - Sufficient documentation shall be available, - A detailed and formal description of the product (software version number, user configuration, other settings and parameters) in the targeted computing environment shall be available. - Source codes corresponding to the software shall be archived appropriately. When these requirements are fulfilled, the version of the simulation tool shall be considered qualified for a defined domain of validity, in a given computing environment. The functional verification shall ensure that: - the computer architecture of the tool does not include errors, - the numerical solver correctly represents the physical mathematical model, - equations are solved correctly. The functional verification can be demonstrated through certification or report of Quality Assurance. The functional validation shall allow the user to ensure that the equations correctly represent the physical phenomena in the perimeter of intended use. The functional validation can

  2. As-Built Verification Plan Spent Nuclear Fuel Canister Storage Building MCO Handling Machine

    International Nuclear Information System (INIS)

    SWENSON, C.E.

    2000-01-01

    This as-built verification plan outlines the methodology and responsibilities that will be implemented during the as-built field verification activity for the Canister Storage Building (CSB) MCO HANDLING MACHINE (MHM). This as-built verification plan covers THE ELECTRICAL PORTION of the CONSTRUCTION PERFORMED BY POWER CITY UNDER CONTRACT TO MOWAT. The as-built verifications will be performed in accordance Administrative Procedure AP 6-012-00, Spent Nuclear Fuel Project As-Built Verification Plan Development Process, revision I. The results of the verification walkdown will be documented in a verification walkdown completion package, approved by the Design Authority (DA), and maintained in the CSB project files

  3. Augmented telomerase activity, reduced telomere length and the presence of alternative lengthening of telomere in renal cell carcinoma: plausible predictive and diagnostic markers.

    Science.gov (United States)

    Pal, Deeksha; Sharma, Ujjawal; Khajuria, Ragini; Singh, Shrawan Kumar; Kakkar, Nandita; Prasad, Rajendra

    2015-05-15

    In this study, we analyzed 100 cases of renal cell carcinoma (RCC) for telomerase activity, telomere length and alternative lengthening of telomeres (ALT) using the TRAP assay, TeloTTAGGG assay kit and immunohistochemical analysis of ALT associated promyelocytic leukemia (PML) bodies respectively. A significantly higher (P=0.000) telomerase activity was observed in 81 cases of RCC which was correlated with clinicopathological features of tumor for instance, stage (P=0.008) and grades (P=0.000) but not with the subtypes of RCC (P = 0.355). Notwithstanding, no correlation was found between telomerase activity and subtypes of RCC. Strikingly, the telomere length was found to be significantly shorter in RCC (P=0.000) to that of corresponding normal renal tissues and it is well correlated with grades (P=0.016) but not with stages (P=0.202) and subtypes (P=0.669) of RCC. In this study, telomere length was also negatively correlated with the age of patients (r(2)=0.528; P=0.000) which supports the notion that it could be used as a marker for biological aging. ALT associated PML bodies containing PML protein was found in telomerase negative cases of RCC. It suggests the presence of an ALT pathway mechanism to maintain the telomere length in telomerase negative RCC tissues which was associated with high stages of RCC, suggesting a prevalent mechanism for telomere maintenance in high stages. In conclusion, the telomerase activity and telomere length can be used as a diagnostic as well as a predictive marker in RCC. The prevalence of ALT mechanism in high stages of RCC is warranted for the development of anti-ALT inhibitors along with telomerase inhibitor against RCC as a therapeutic approach. Copyright © 2015 Elsevier B.V. All rights reserved.

  4. Influence of physical activity in length of life of the human population in the context of changes

    OpenAIRE

    Ahmetović Zlatko; Romanov Romana; Dimitrić Mirjana

    2014-01-01

    Since the middle of the last century, the human population has increased exponentially. This trend is evident today. Human population has, for more than half a century been undergoing the period of its intensive development, increasing in number and the average length of life, creating the impression of a better life standard. Looking at the man as a bio-psycho-social being and the interactions it ones through the human population growth is brought in connection with its impact on the environ...

  5. The Influence of Activity-Based Funding on Treatment Intensity and Length of Stay of Geriatric Rehabilitation Patients.

    Science.gov (United States)

    Bouwstra, Hylco; Wattel, Lizette M; de Groot, Aafke J; Smalbrugge, Martin; Hertogh, Cees M

    2017-06-01

    Little is known about the impact of activity-based funding (ABF) to increase treatment intensity and decrease length of stay (LOS) of inpatient geriatric patients. In January 2014, ABF was implemented in The Netherlands with the aim to increase treatment intensity and shorten LOS in geriatric rehabilitation (GR). To describe the influence of ABF on treatment intensity and LOS of inpatient GR patients before and after ABF was implemented. Population-based, retrospective cohort study. Thirty nursing homes providing inpatient GR across The Netherlands. Digital medical records of patients who had received inpatient GR in Dutch nursing homes across The Netherlands were studied between January 1, 2013 and March 14, 2016. We calculated the mean treatment intensity in hours per week and median LOS in days in 3 cohorts according to the year of admittance. In addition, a historical representative cohort of GR patients who were admitted in 2007 was studied that represented the situation before the ABF reform was announced (eg, funding with a fixed price per day). In 2013, the funding with a fixed price per day was still in use but with compulsory ABF registration. In 2014 and 2015, the ABF was fully implemented. Statistical differences in treatment intensity and LOS were calculated between patients admitted in 2007 and 2013, 2013 and 2014, and 2013 and 2015. Statistical significance was set at a P value of <.02 (Bonferroni correction P = .05/3). Discharge destinations of patients discharged from March 1, 2015 to January 1, 2016 could be obtained and compared with 2007. The treatment intensity and LOS of 16,823 GR patients could be obtained and compared with the historical cohort from 2007 (n = 2950). Patients who were admitted in the year 2013 received higher treatment intensities and had the same median LOS compared with 2007. After the implementation of ABF in January 2014, the mean treatment intensity increased significantly by 37% (3.8 hours/week in 2013, 4.7

  6. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  7. VP1u phospholipase activity is critical for infectivity of full-length parvovirus B19 genomic clones

    OpenAIRE

    Filippone, Claudia; Zhi, Ning; Wong, Susan; Lu, Jun; Kajigaya, Sachiko; Gallinella, Giorgio; Kakkola, Laura; Söderlund-Venermo, Maria; Young, Neal S.; Brown, Kevin E.

    2008-01-01

    Three full-length genomic clones (pB19-M20, pB19-FL and pB19-HG1) of parvovirus B19 were produced in different laboratories. pB19-M20 was shown to produce infectious virus. To determine the differences in infectivity, all three plasmids were tested by transfection and infection assays. All three clones were similar in viral DNA replication, RNA transcription, and viral capsid protein production. However, only pB19-M20 and pB19-HG1 produced infectious virus. Comparison of viral sequences showe...

  8. 4-N-, 4-S-, and 4-O-chloroquine analogues: influence of side chain length and quinolyl nitrogen pKa on activity vs chloroquine resistant malaria.

    Science.gov (United States)

    Natarajan, Jayakumar K; Alumasa, John N; Yearick, Kimberly; Ekoue-Kovi, Kekeli A; Casabianca, Leah B; de Dios, Angel C; Wolf, Christian; Roepe, Paul D

    2008-06-26

    Using predictions from heme-quinoline antimalarial complex structures, previous modifications of chloroquine (CQ), and hypotheses for chloroquine resistance (CQR), we synthesize and assay CQ analogues that test structure-function principles. We vary side chain length for both monoethyl and diethyl 4-N CQ derivatives. We alter the pKa of the quinolyl N by introducing alkylthio or alkoxy substituents into the 4 position and vary side chain length for these analogues. We introduce an additional titratable amino group to the side chain of 4-O analogues with promising CQR strain selectivity and increase activity while retaining selectivity. We solve atomic resolution structures for complexes formed between representative 4-N, 4-S, and 4-O derivatives vs mu-oxo dimeric heme, measure binding constants for monomeric vs dimeric heme, and quantify hemozoin (Hz) formation inhibition in vitro. The data provide additional insight for the design of CQ analogues with improved activity vs CQR malaria.

  9. 4-N, 4-S & 4-O Chloroquine Analogues: Influence of Side Chain Length and Quinolyl Nitrogen pKa on Activity vs. Chloroquine Resistant Malaria+, #

    Science.gov (United States)

    Natarajan, Jayakumar K.; Alumasa, John; Yearick, Kimberly; Ekoue-Kovi, Kekeli A.; Casabianca, Leah B.; de Dios, Angel C.; Wolf, Christian; Roepe, Paul D.

    2009-01-01

    Using predictions from heme – quinoline antimalarial complex structures, previous modifications of chloroquine (CQ), and hypotheses for chloroquine resistance (CQR), we synthesize and assay CQ analogues that test structure – function principles. We vary side chain length for both monoethyl and diethyl 4N CQ derivatives. We alter the pKa of the quinolyl N by introducing alkylthio or alkoxy substituents into the 4 position, and vary side chain length for these analogues. We introduce an additional titratable amino group to the side chain of 4O analogues with promising CQR strain selectivity and increase activity while retaining selectivity. We solve atomic resolution structures for complexes formed between representative 4N, 4S and 4O derivatives vs. μ-oxo dimeric heme, measure binding constants for monomeric vs. dimeric heme, and quantify hemozoin (Hz) formation inhibition in vitro. The data provide additional insight for the design of CQ analogues with improved activity vs. CQR malaria. PMID:18512900

  10. Advanced verification topics

    CERN Document Server

    Bhattacharya, Bishnupriya; Hall, Gary; Heaton, Nick; Kashai, Yaron; Khan Neyaz; Kirshenbaum, Zeev; Shneydor, Efrat

    2011-01-01

    The Accellera Universal Verification Methodology (UVM) standard is architected to scale, but verification is growing and in more than just the digital design dimension. It is growing in the SoC dimension to include low-power and mixed-signal and the system integration dimension to include multi-language support and acceleration. These items and others all contribute to the quality of the SOC so the Metric-Driven Verification (MDV) methodology is needed to unify it all into a coherent verification plan. This book is for verification engineers and managers familiar with the UVM and the benefits it brings to digital verification but who also need to tackle specialized tasks. It is also written for the SoC project manager that is tasked with building an efficient worldwide team. While the task continues to become more complex, Advanced Verification Topics describes methodologies outside of the Accellera UVM standard, but that build on it, to provide a way for SoC teams to stay productive and profitable.

  11. A dual-route perspective on brain activation in response to visual words: evidence for a length by lexicality interaction in the visual word form area (VWFA).

    Science.gov (United States)

    Schurz, Matthias; Sturm, Denise; Richlan, Fabio; Kronbichler, Martin; Ladurner, Gunther; Wimmer, Heinz

    2010-02-01

    Based on our previous work, we expected the Visual Word Form Area (VWFA) in the left ventral visual pathway to be engaged by both whole-word recognition and by serial sublexical coding of letter strings. To examine this double function, a phonological lexical decision task (i.e., "Does xxx sound like an existing word?") presented short and long letter strings of words, pseudohomophones, and pseudowords (e.g., Taxi, Taksi and Tazi). Main findings were that the length effect for words was limited to occipital regions and absent in the VWFA. In contrast, a marked length effect for pseudowords was found throughout the ventral visual pathway including the VWFA, as well as in regions presumably engaged by visual attention and silent-articulatory processes. The length by lexicality interaction on brain activation corresponds to well-established behavioral findings of a length by lexicality interaction on naming latencies and speaks for the engagement of the VWFA by both lexical and sublexical processes. Copyright (c) 2009 Elsevier Inc. All rights reserved.

  12. Verification of the SLC wake potentials

    International Nuclear Information System (INIS)

    Bane, K.; Weiland, T.

    1983-01-01

    The accurate knowledge of the monopole, dipole, and quadrupole wake potentials is essential for SLC. These wake potentials were previously computed by the modal method. The time domain code TBCI allows independent verification of these results. This comparison shows that the two methods agree to within 10% for bunch lengths down to 1 mm. TBCI results also indicate that rounding the irises gives at least a 10% reduction in the wake potentials

  13. Design verification and fabrication of active control systems for the DAST ARW-2 high aspect ratio wing, part 1

    Science.gov (United States)

    Mcgehee, C. R.

    1986-01-01

    A study was conducted under Drones for Aerodynamic and Structural Testing (DAST) program to accomplish the final design and hardware fabrication for four active control systems compatible with and ready for installation in the NASA Aeroelastic Research Wing No. 2 (ARW-2) and Firebee II drone flight test vehicle. The wing structure was designed so that Active Control Systems (ACS) are required in the normal flight envelope by integrating control system design with aerodynamics and structure technologies. The DAST ARW-2 configuration uses flutter suppression, relaxed static stability, and gust and maneuver load alleviation ACS systems, and an automatic flight control system. Performance goals and criteria were applied to individual systems and the systems collectively to assure that vehicle stability margins, flutter margins, flying qualities and load reductions are achieved.

  14. Design verification and fabrication of active control systems for the DAST ARW-2 high aspect ratio wing. Part 2: Appendices

    Science.gov (United States)

    Mcgehee, C. R.

    1986-01-01

    This is Part 2-Appendices of a study conducted under Drones for Aerodynamic and Structural Testing (DAST) Program to accomplish the final design and hardware fabrication for four active control systems compatible with and ready for installation in the NASA Aeroelastic Research Wing No. 2 (ARW-2) and Firebee II drone flight test vehicle. The wing structure was designed so that Active Control Systems (ACS) are required in the normal flight envelope by integrating control system design with aerodynamics and structure technologies. The DAST ARW-2 configuration uses flutter suppression, relaxed static stability, and gust and maneuver load alleviation ACS systems, and an automatic flight control system. Performance goals and criteria were applied to individual systems and the systems collectively to assure that vehicle stability margins, flutter margins, flying qualities, and load reductions were achieved.

  15. Optimization of the procedure for verification of the response on activity of activimeters in PET production units using 13N

    International Nuclear Information System (INIS)

    Verde Velasco, J. M.; Lopez Lorenzo, B.; Ruiz Guijarro, J. A.; Montes Fuentes, C.

    2013-01-01

    The Spanish Protocol for quality control in medicine nuclear1 establishes the need to control regular activity of the calibrators of dose response. This Protocol establishes the use of 99mTc for performing this test. In the case of a PET facility this methodology is feasible not to dispose of the radionuclide in the installation. We propose an alternative methodology for carrying out this test of fast, cheap and efficient form in a facility that has cyclotron. (Author)

  16. Communication dated 18 December 2013 received from the Delegation of the European Union to the International Organisations in Vienna on the European Union's Support for the IAEA Activities in the Areas of Nuclear Security and Verification

    International Nuclear Information System (INIS)

    2014-01-01

    The Secretariat has received a note verbale dated 18 December 2013 from the Delegation of the European Union to the International Organisations in Vienna with Council Decision 2013/517/CFSP of 21 October 2013, in support of the IAEA activities in the areas of nuclear security and verification and in the framework of the implementation of the EU Strategy against Proliferation of Weapons of Mass Destruction. As requested in that communication, the note verbale and the enclosure are circulated herewith for information

  17. Development and verification of signal processing system of avalanche photo diode for the active shields onboard ASTRO-H

    Energy Technology Data Exchange (ETDEWEB)

    Ohno, M., E-mail: ohno@hep01.hepl.hiroshima-u.ac.jp [Department of Physical Sciences, Hiroshima University, Hiroshima 739-8526 (Japan); Kawano, T.; Edahiro, I.; Shirakawa, H.; Ohashi, N.; Okada, C.; Habata, S.; Katsuta, J.; Tanaka, Y.; Takahashi, H.; Mizuno, T.; Fukazawa, Y. [Department of Physical Sciences, Hiroshima University, Hiroshima 739-8526 (Japan); Murakami, H.; Kobayashi, S.; Miyake, K.; Ono, K.; Kato, Y.; Furuta, Y.; Murota, Y.; Okuda, K. [Department of Physics, University of Tokyo, Tokyo 113-0033 (Japan); and others

    2016-09-21

    The hard X-ray Imager and Soft Gamma-ray Detector onboard ASTRO-H demonstrate high sensitivity to hard X-ray (5–80 keV) and soft gamma-rays (60–600 keV), respectively. To reduce the background, both instruments are actively shielded by large, thick Bismuth Germanate scintillators. We have developed the signal processing system of the avalanche photodiode in the BGO active shields and have demonstrated its effectiveness after assembly in the flight model of the HXI/SGD sensor and after integration into the satellite. The energy threshold achieved is about 150 keV and anti-coincidence efficiency for cosmic-ray events is almost 100%. Installed in the BGO active shield, the developed signal processing system successfully reduces the room background level of the main detector. - Highlights: • A detail of development of signal processing system for ASTRO-H is presented. • Digital filer with FPGA instead of discrete analog circuit is applied. • Expected performance is verified after integration of the satellite.

  18. The influence of increased cross-linker chain length in thermosensitive microspheres on potential sun-protection activity

    OpenAIRE

    Musiał, Witold; Kokol, Vanja; Vončina, Bojana

    2012-01-01

    The sun protection should involve substances with protecting activity against both UVB and UVA radiation. In this research the evaluation of thermosensitive microspheres as potential molecules for sunscreen formulations was approached, using modified Boots star rating system. The microspheres, thermosensitive N-isopropylacrylamide derivatives, have potential protecting activity against UV radiation. The MX and DX microspheres, with ethylene glycol dimethacrylate and diethylene glycol dimethac...

  19. Standard Verification System (SVS)

    Data.gov (United States)

    Social Security Administration — SVS is a mainframe program that accesses the NUMIDENT to perform SSN verifications. This program is called by SSA Internal applications to verify SSNs. There is also...

  20. Formal Verification -26 ...

    Indian Academy of Sciences (India)

    by testing of the components and successful testing leads to the software being ... Formal verification is based on formal methods which are mathematically based ..... scenario under which a similar error could occur. There are various other ...

  1. SSN Verification Service

    Data.gov (United States)

    Social Security Administration — The SSN Verification Service is used by Java applications to execute the GUVERF02 service using the WebSphere/CICS Interface. It accepts several input data fields...

  2. Environmental technology verification methods

    CSIR Research Space (South Africa)

    Szewczuk, S

    2016-03-01

    Full Text Available Environmental Technology Verification (ETV) is a tool that has been developed in the United States of America, Europe and many other countries around the world to help innovative environmental technologies reach the market. Claims about...

  3. Verification of RADTRAN

    International Nuclear Information System (INIS)

    Kanipe, F.L.; Neuhauser, K.S.

    1995-01-01

    This document presents details of the verification process of the RADTRAN computer code which was established for the calculation of risk estimates for radioactive materials transportation by highway, rail, air, and waterborne modes

  4. Duo-Active-Neutral-Point-Clamped Multilevel Converter: An Exploration of the Fundamental Topology and Experimental Verification

    DEFF Research Database (Denmark)

    Dargahi, Vahid; Corzine, Keith A.; Enslin, Johan H.

    2018-01-01

    For medium-voltage (MV) industrial applications such as the HVDC and adjustable-speed ac-motor drives, the multilevel voltage-source converters are deemed the predominant topologies. One of the promising derived-topologies from the neutral-point-clamped (NPC) configuration is the active NPC (ANPC......) structure with an improved balanced lossdistribution performance. This paper introduces duo-ANPC (D-ANPC) converter topology, which is controlled with a new modulation technique. The suggested control method regulates the flying capacitor (FC) voltages naturally at their reference values and preserves...

  5. Verification and Examination Management of Complex Systems

    Directory of Open Access Journals (Sweden)

    Stian Ruud

    2014-10-01

    Full Text Available As ship systems become more complex, with an increasing number of safety-critical functions, many interconnected subsystems, tight integration to other systems, and a large amount of potential failure modes, several industry parties have identified the need for improved methods for managing the verification and examination efforts of such complex systems. Such needs are even more prominent now that the marine and offshore industries are targeting more activities and operations in the Arctic environment. In this paper, a set of requirements and a method for verification and examination management are proposed for allocating examination efforts to selected subsystems. The method is based on a definition of a verification risk function for a given system topology and given requirements. The marginal verification risks for the subsystems may then be evaluated, so that examination efforts for the subsystem can be allocated. Two cases of requirements and systems are used to demonstrate the proposed method. The method establishes a systematic relationship between the verification loss, the logic system topology, verification method performance, examination stop criterion, the required examination effort, and a proposed sequence of examinations to reach the examination stop criterion.

  6. Fatty acid methyl ester (FAME) technology for monitoring biological foaming in activated sludge: full scale plant verification.

    Science.gov (United States)

    Lee, J W; Cha, D K; Kim, I; Son, A; Ahn, K H

    2008-02-01

    Fatty acid methyl ester (FAME) technology was evaluated as a monitoring tool for quantification of Gordonia amarae in activated sludge systems. The fatty acid, 19:1 alcohol, which was identified as a unique fatty acid in G. amarae was not only confirmed to be present in foaming plant samples, but the quantity of the signature peak correlated closely with the degree of foaming. Foaming potential experiment provided a range of critical foaming levels that corresponded to G. amarae population. This range of critical Gordonia levels was correlated to the threshold signature FAME amount. Six full-scale wastewater treatment plants were selected based on a survey to participate in our full-scale study to evaluate the potential application of the FAME technique as the Gordonia monitoring tool. Greater amounts of signature FAME were extracted from the mixed liquor samples obtained from treatment plants experiencing Gordonia foaming problems. The amounts of signature FAME correlated well with the conventional filamentous counting technique. These results demonstrated that the relative abundance of the signature FAMEs can be used to quantitatively monitor the abundance of foam-causing microorganism in activated sludge.

  7. Multilateral disarmament verification

    International Nuclear Information System (INIS)

    Persbo, A.

    2013-01-01

    Non-governmental organisations, such as VERTIC (Verification Research, Training and Information Centre), can play an important role in the promotion of multilateral verification. Parties involved in negotiating nuclear arms accords are for the most part keen that such agreements include suitable and robust provisions for monitoring and verification. Generally progress in multilateral arms control verification is often painstakingly slow, but from time to time 'windows of opportunity' - that is, moments where ideas, technical feasibility and political interests are aligned at both domestic and international levels - may occur and we have to be ready, so the preparatory work is very important. In the context of nuclear disarmament, verification (whether bilateral or multilateral) entails an array of challenges, hurdles and potential pitfalls relating to national security, health, safety and even non-proliferation, so preparatory work is complex and time-greedy. A UK-Norway Initiative was established in order to investigate the role that a non-nuclear-weapon state such as Norway could potentially play in the field of nuclear arms control verification. (A.C.)

  8. Influence of posterior dental arch length on brain activity during chewing in patients with mandibular distal extension removable partial dentures.

    Science.gov (United States)

    Shoi, K; Fueki, K; Usui, N; Taira, M; Wakabayashi, N

    2014-07-01

    It is well known that shortened dental arch decreases masticatory function. However, its potential to change brain activity during mastication is unknown. The present study investigates the effect of a shortened posterior dental arch with mandibular removable partial dentures (RPDs) on brain activity during gum chewing. Eleven subjects with missing mandibular molars (mean age, 66.1 years) on both sides received experimental RPDs with interchangeable artificial molars in a crossover trial design. Brain activity during gum chewing with RPDs containing (full dental arch) and lacking artificial molars (shortened dental arch) was measured using functional magnetic resonance imaging. Additionally, masticatory function was evaluated for each dental arch type. Food comminuting and mixing ability and the perceived chewing ability were significantly lower in subjects with a shortened dental arch than those with a full dental arch (P chewing with the full dental arch occurred in the middle frontal gyrus, primary sensorimotor cortex extending to the pre-central gyrus, supplementary motor area, putamen, insula and cerebellum. However, middle frontal gyrus activation was not observed during gum chewing with the shortened dental arch. These results suggest that shortened dental arch affects human brain activity in the middle frontal gyrus during gum chewing, and the decreased middle frontal gyrus activation may be associated with decreased masticatory function. © 2014 John Wiley & Sons Ltd.

  9. Production of full length and splicing form of chymosin using pETexpression system in E-coli and investigation its enzyme activity and preplasmic secretion

    Directory of Open Access Journals (Sweden)

    M. Ahmadi Zeydabadi

    2008-05-01

    Full Text Available Introduction: Chymosin (Rennin EC 3.4.23.4 is an aspartyl proteinas (the major proteolyticenzyme in the fourth stomach of the unweaned calf that is formed by proteolytic activation fromzymogene prochymosin. The aim of his study was to produce the full length and splicing form ofchymosin using pETexpression system in E-coli and to assay the activity of expressed enzyme andpreplasmic secretion.Materials and Methods: The sense primer F-prochy(+ (5´-ggggccatgGCTGAGATCACCAGGAincluding NCOI restriction site. The anti sense R-prochy(- (5´-gggcggccgcGATGGCTTTGGCCAGC -3´ hybridizing to the C-terminal end of calf preprocymosincDNA and contains an additional NotI restriction site at its 5´-end . The cells were disrupted bysonication and proteins were purified by using Ni-NTA beads from Qiagen under native conditional.The preprochymosin and AS6 preprochymosin were activated at pH 4.7. The enzyme solutions werediluted 20-fold with 50 mM phosphate buffer .Results: Sequencing data analysis showed that the exon six has been spliced out and, therefore thegene product is 114 bp shorter in length, both chymosin forms were expressed together in E.coli.Under the same expression conditions, at least AS6 preprochymosin was produced 7-fold highexpression in comparison to a full-length recombinant chymosin. Following acid activation andneutralization, the purified fractions were tested in a qualitative milk clotting assay. The clottingactivity of preprochymosin and exon6-less preprochymosin were comparable.Conclusion: High expression of this alternatively expressed transcript in bacteria, and properfolding of the AS6 chymosin protein molecule in the absence of exon six are the two most importantaspects distinguished in this research.

  10. Verification of threshold activation detection (TAD) technique in prompt fission neutron detection using scintillators containing 19F

    Science.gov (United States)

    Sibczynski, P.; Kownacki, J.; Moszyński, M.; Iwanowska-Hanke, J.; Syntfeld-Każuch, A.; Gójska, A.; Gierlik, M.; Kaźmierczak, Ł.; Jakubowska, E.; Kędzierski, G.; Kujawiński, Ł.; Wojnarowicz, J.; Carrel, F.; Ledieu, M.; Lainé, F.

    2015-09-01

    In the present study ⌀ 5''× 3'' and ⌀ 2''× 2'' EJ-313 liquid fluorocarbon as well as ⌀ 2'' × 3'' BaF2 scintillators were exposed to neutrons from a 252Cf neutron source and a Sodern Genie 16GT deuterium-tritium (D+T) neutron generator. The scintillators responses to β- particles with maximum endpoint energy of 10.4 MeV from the n+19F reactions were studied. Response of a ⌀ 5'' × 3'' BC-408 plastic scintillator was also studied as a reference. The β- particles are the products of interaction of fast neutrons with 19F which is a component of the EJ-313 and BaF2 scintillators. The method of fast neutron detection via fluorine activation is already known as Threshold Activation Detection (TAD) and was proposed for photofission prompt neutron detection from fissionable and Special Nuclear Materials (SNM) in the field of Homeland Security and Border Monitoring. Measurements of the number of counts between 6.0 and 10.5 MeV with a 252Cf source showed that the relative neutron detection efficiency ratio, defined as epsilonBaF2 / epsilonEJ-313-5'', is 32.0% ± 2.3% and 44.6% ± 3.4% for front-on and side-on orientation of the BaF2, respectively. Moreover, the ⌀ 5'' EJ-313 and side-on oriented BaF2 were also exposed to neutrons from the D+T neutron generator, and the relative efficiency epsilonBaF2 / epsilonEJ-313-5'' was estimated to be 39.3%. Measurements of prompt photofission neutrons with the BaF2 detector by means of data acquisition after irradiation (out-of-beam) of nuclear material and between the beam pulses (beam-off) techniques were also conducted on the 9 MeV LINAC of the SAPHIR facility.

  11. The influence of increased cross-linker chain length in thermosensitive microspheres on potential sun-protection activity.

    Science.gov (United States)

    Musiał, Witold; Kokol, Vanja; Voncina, Bojana

    2010-01-01

    The sun protection should involve substances with protecting activity against both UVB and UVA radiation. In this research the evaluation of thermosensitive microspheres as potential molecules for sunscreen formulations was approached, using modified Boots star rating system. The microspheres, thermosensitive N-isopropylacrylamide derivatives, have potential protecting activity against UV radiation. The MX and DX microspheres, with ethylene glycol dimethacrylate and diethylene glycol dimethacrylate crosslinker respectively, due to theirs thermosensitivity exhibit increase in protecting activity against UV radiation when heated to 45 degrees C. The MX microspheres have higher increase in terms of UV absorbance, comparing to DX microspheres, when heated in the 25 degrees C to 45 degrees C range. Studied microspheres have high potential for application as components of sun-screens used in elevated temperatures.

  12. Verification of biological activity of irradiated Sopoongsan, an oriental medicinal prescription, for industrial application of functional cosmetic material

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jin-Young; Park, Tae-Soon; Ho Son, Jun [Department of Cosmeceutical Science, Daegu Haany University, Kyungsan 712-715 (Korea, Republic of); Jo, Cheorun [Department of Animal Science and Biotechnology, Chungnam National University, Daejeon 305-764 (Korea, Republic of); Woo Byun, Myung [Radiation Food Science and Biotechnology Team, Korea Atomic Energy Research Institute, Jeongeup 580-185 (Korea, Republic of); Jeun An, Bong [Department of Cosmeceutical Science, Daegu Haany University, Kyungsan 712-715 (Korea, Republic of)], E-mail: anbj@dhu.ac.kr

    2007-11-15

    Sopoongsan is an oriental medicinal prescription including 12 medicinal herbs. Sopoongsan is known to have anti-inflammatory, anti-microbial, anti-allergic, and anti-cancer effects on human skin. To use Sopoongsan extract for functional cosmetic composition, its dark color should be brighter for seeking consumer demand, clear products, without any adverse change in its function. Irradiation with doses 0, 5, 10, and 20 kGy was applied to improve color of ethanol- or water-extracted Sopoongsan and also superoxide dismutase (SOD), xanthine oxidase (XO), melanoma cell growth inhibition, and anti-microbial activity was investigated. Generally, ethanol extract was better than water extract in function and irradiation up to 20 kGy did not change any functional effect. Especially, the inhibition of melanin deposition on skin measured by inhibition of B16F10 (melanoma) cell growth was as high as arbutin, commercially available product, when the ethanol-extracted Sopoongsan was irradiated for 20 kGy. Results showed that when irradiation technology is used, the limitation of addition amount of natural materials for food or cosmetic composition caused by color problem can be decreased significantly with time saving and cost benefit compared to conventional color removal process. Therefore, irradiation would be one of the good methods to pose an additional value for related industry.

  13. Verification of biological activity of irradiated Sopoongsan, an oriental medicinal prescription, for industrial application of functional cosmetic material

    International Nuclear Information System (INIS)

    Lee, Jin-Young; Park, Tae-Soon; Ho Son, Jun; Jo, Cheorun; Woo Byun, Myung; Jeun An, Bong

    2007-01-01

    Sopoongsan is an oriental medicinal prescription including 12 medicinal herbs. Sopoongsan is known to have anti-inflammatory, anti-microbial, anti-allergic, and anti-cancer effects on human skin. To use Sopoongsan extract for functional cosmetic composition, its dark color should be brighter for seeking consumer demand, clear products, without any adverse change in its function. Irradiation with doses 0, 5, 10, and 20 kGy was applied to improve color of ethanol- or water-extracted Sopoongsan and also superoxide dismutase (SOD), xanthine oxidase (XO), melanoma cell growth inhibition, and anti-microbial activity was investigated. Generally, ethanol extract was better than water extract in function and irradiation up to 20 kGy did not change any functional effect. Especially, the inhibition of melanin deposition on skin measured by inhibition of B16F10 (melanoma) cell growth was as high as arbutin, commercially available product, when the ethanol-extracted Sopoongsan was irradiated for 20 kGy. Results showed that when irradiation technology is used, the limitation of addition amount of natural materials for food or cosmetic composition caused by color problem can be decreased significantly with time saving and cost benefit compared to conventional color removal process. Therefore, irradiation would be one of the good methods to pose an additional value for related industry

  14. Effects of in vivo-like activation frequency on the length-dependent force generation of skeletal muscle fibre bundles

    NARCIS (Netherlands)

    Zuurbier, C. J.; Lee-de Groot, M. B.; van der Laarse, W. J.; Huijing, P. A.

    1998-01-01

    It is known that a range of firing frequencies can be observed during in vivo muscle activity, yet information is lacking as to how different in vivo-like frequencies may affect force generation of skeletal muscle. This study examined the effects of constant (CSF, constant within one contraction)

  15. The Influenced of Lactobacillus plantarum Starter Addition and The Length Time of Fermentation Process on The Activity of Seaweed Antioxidant Ulva lactuca from Krakal Beach, Yogyakarta

    Science.gov (United States)

    Ambarsari, N. D.; Rushanti, I. R. P. A.; Setyaji, A.; Ningsih, T. R.; Nurhana, N.; Subekhi, I.; Dewi, E. N.

    2018-02-01

    Seaweed contains phenol compound functioning as antioxidant. Lactobacillus plantarum starter addition in a fermentation process was expected will increase the activity of antioxidant. The purpose of this research was to determine the influence of L. plantarum addition and the length of fermentation on the activity of antioxidant in U. lactuca. The experiment was conducted with factorial design. The first treatment consisted 2 different factors namely without L. plantarum addition and L. plantarum addition. While the second treatment were the different length fermentation time: 0, 12, 24, and 36 hours. Each treatment were done in thriplicate. The data was analyzed using ANOVA and BNJ test was applied if there any differences betweenthe treatments. The results showed that the fresh U. lactuca with L. plantarum addition for 36 hours fermentation had TPC BAL 9,83 CFU/ml, pH 4,26, phenol 231 ppm and antioxidant activity IC501375,12 ppm. Dried U. lactuca with L. plantarum addition that was fermentized for 36 hours had TPC BAL 9,10 CFU/ml, pH 4,75, phenol 166,24 ppm and antioxidant activity IC504070,32 ppm. The fresh U. lactuca with L. plantarum addition for 36 hours fermentation was the best treatment since the antioxidant activity is IC501375,12 ppm. Although the antioxidant activity was categorized as weak but it was still showed an increase compared to the result of antioxidant activity with maceration method using n-hexana dissolver which was 11213,76 ppm, ethyl acetate 9770,285 ppm, and ethanol extact 4921,79 ppm.

  16. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  17. Nonlinear Recurrent Dynamics and Long-Term Nonstationarities in EEG Alpha Cortical Activity: Implications for Choosing Adequate Segment Length in Nonlinear EEG Analyses.

    Science.gov (United States)

    Cerquera, Alexander; Vollebregt, Madelon A; Arns, Martijn

    2018-03-01

    Nonlinear analysis of EEG recordings allows detection of characteristics that would probably be neglected by linear methods. This study aimed to determine a suitable epoch length for nonlinear analysis of EEG data based on its recurrence rate in EEG alpha activity (electrodes Fz, Oz, and Pz) from 28 healthy and 64 major depressive disorder subjects. Two nonlinear metrics, Lempel-Ziv complexity and scaling index, were applied in sliding windows of 20 seconds shifted every 1 second and in nonoverlapping windows of 1 minute. In addition, linear spectral analysis was carried out for comparison with the nonlinear results. The analysis with sliding windows showed that the cortical dynamics underlying alpha activity had a recurrence period of around 40 seconds in both groups. In the analysis with nonoverlapping windows, long-term nonstationarities entailed changes over time in the nonlinear dynamics that became significantly different between epochs across time, which was not detected with the linear spectral analysis. Findings suggest that epoch lengths shorter than 40 seconds neglect information in EEG nonlinear studies. In turn, linear analysis did not detect characteristics from long-term nonstationarities in EEG alpha waves of control subjects and patients with major depressive disorder patients. We recommend that application of nonlinear metrics in EEG time series, particularly of alpha activity, should be carried out with epochs around 60 seconds. In addition, this study aimed to demonstrate that long-term nonlinearities are inherent to the cortical brain dynamics regardless of the presence or absence of a mental disorder.

  18. Solar cycle length hypothesis appears to support the IPCC on global warming

    DEFF Research Database (Denmark)

    Laut, Peter; Gundermann, Jesper

    1999-01-01

    warming from the enhanced concentrations of greenhouse gases. The "solar hypothesis" claims that solar activity causes a significant component of the global mean temperature to vary in phase opposite to the filtered solar cycle lengths. In an earlier paper we have demonstrated that for data covering...... lengths with the "corrected" temperature anomalies is substantially better than with the historical anomalies. Therefore our findings support a total reversal of the common assumption that a verification of the solar hypothesis would challenge the IPCC assessment of man-made global warming.......Since the discovery of a striking correlation between 1-2-2-2-1 filtered solar cycle lengths and the 11-year running average of Northern Hemisphere land air temperatures there have been widespread speculations as to whether these findings would rule out any significant contributions to global...

  19. The small FOXP1 isoform predominantly expressed in activated B cell-like diffuse large B-cell lymphoma and full-length FOXP1 exert similar oncogenic and transcriptional activity in human B cells.

    Science.gov (United States)

    van Keimpema, Martine; Grüneberg, Leonie J; Schilder-Tol, Esther J M; Oud, Monique E C M; Beuling, Esther A; Hensbergen, Paul J; de Jong, Johann; Pals, Steven T; Spaargaren, Marcel

    2017-03-01

    The forkhead transcription factor FOXP1 is generally regarded as an oncogene in activated B cell-like diffuse large B-cell lymphoma. Previous studies have suggested that a small isoform of FOXP1 rather than full-length FOXP1, may possess this oncogenic activity. Corroborating those studies, we herein show that activated B cell-like diffuse large B-cell lymphoma cell lines and primary activated B cell-like diffuse large B-cell lymphoma cells predominantly express a small FOXP1 isoform, and that the 5'-end of the Foxp1 gene is a common insertion site in murine lymphomas in leukemia virus- and transposon-mediated insertional mutagenesis screens. By combined mass spectrometry, (quantative) reverse transcription polymerase chain reaction/sequencing, and small interfering ribonucleic acid-mediated gene silencing, we determined that the small FOXP1 isoform predominantly expressed in activated B cell-like diffuse large B-cell lymphoma lacks the N-terminal 100 amino acids of full-length FOXP1. Aberrant overexpression of this FOXP1 isoform (ΔN100) in primary human B cells revealed its oncogenic capacity; it repressed apoptosis and plasma cell differentiation. However, no difference in potency was found between this small FOXP1 isoform and full-length FOXP1. Furthermore, overexpression of full-length FOXP1 or this small FOXP1 isoform in primary B cells and diffuse large B-cell lymphoma cell lines resulted in similar gene regulation. Taken together, our data indicate that this small FOXP1 isoform and full-length FOXP1 have comparable oncogenic and transcriptional activity in human B cells, suggesting that aberrant expression or overexpression of FOXP1, irrespective of the specific isoform, contributes to lymphomagenesis. These novel insights further enhance the value of FOXP1 for the diagnostics, prognostics, and treatment of diffuse large B-cell lymphoma patients. Copyright© Ferrata Storti Foundation.

  20. Blue light-excited LOV1 and LOV2 domains cooperatively regulate the kinase activity of full-length phototropin2 from Arabidopsis.

    Science.gov (United States)

    Oide, Mao; Okajima, Koji; Nakagami, Hirofumi; Kato, Takayuki; Sekiguchi, Yuki; Oroguchi, Tomotaka; Hikima, Takaaki; Yamamoto, Masaki; Nakasako, Masayoshi

    2018-01-19

    Phototropin2 (phot2) is a blue-light (BL) receptor that regulates BL-dependent activities for efficient photosynthesis in plants. phot2 comprises two BL-receiving light-oxygen-voltage-sensing domains (LOV1 and LOV2) and a kinase domain. BL-excited LOV2 is thought to be primarily responsible for the BL-dependent activation of the kinase. However, the molecular mechanisms by which small BL-induced conformational changes in the LOV2 domain are transmitted to the kinase remain unclear. Here, we used full-length wild-type and mutant phot2 proteins from Arabidopsis to study their molecular properties in the dark and under BL irradiation. Phosphorylation assays and absorption measurements indicated that the LOV1 domain assists the thermal relaxation of BL-excited LOV2 and vice versa. Using small-angle X-ray scattering and electron microscopy, we observed that phot2 forms a dimer and has a rod shape with a maximum length of 188 Å and a radius of gyration of 44 Å. Under BL, phot2 displayed large conformational changes that bent the rod shape. By superimposing the crystal structures of the LOV1 dimer, LOV2, and a homology model of the kinase to the observed changes, we inferred that the BL-dependent change consisted of positional shifts of both LOV2 and the kinase relative to LOV1. Furthermore, phot2 mutants lacking the photocycle in LOV1 or LOV2 still exhibited conformational changes under BL, suggesting that LOV1 and LOV2 cooperatively contribute to the conformational changes that activate the kinase. These results suggest that BL-activated LOV1 contributes to the kinase activity of phot2. We discuss the possible intramolecular interactions and signaling mechanisms in phot2. © 2018 by The American Society for Biochemistry and Molecular Biology, Inc.

  1. Procedure generation and verification

    International Nuclear Information System (INIS)

    Sheely, W.F.

    1986-01-01

    The Department of Energy has used Artificial Intelligence of ''AI'' concepts to develop two powerful new computer-based techniques to enhance safety in nuclear applications. The Procedure Generation System, and the Procedure Verification System, can be adapted to other commercial applications, such as a manufacturing plant. The Procedure Generation System can create a procedure to deal with the off-normal condition. The operator can then take correct actions on the system in minimal time. The Verification System evaluates the logic of the Procedure Generator's conclusions. This evaluation uses logic techniques totally independent of the Procedure Generator. The rapid, accurate generation and verification of corrective procedures can greatly reduce the human error, possible in a complex (stressful/high stress) situation

  2. Influenza activity in Europe during eight seasons (1999–2007: an evaluation of the indicators used to measure activity and an assessment of the timing, length and course of peak activity (spread across Europe

    Directory of Open Access Journals (Sweden)

    Meijer Adam

    2007-11-01

    Full Text Available Abstract Background The European Influenza Surveillance Scheme (EISS has collected clinical and virological data on influenza since 1996 in an increasing number of countries. The EISS dataset was used to characterise important epidemiological features of influenza activity in Europe during eight winters (1999–2007. The following questions were addressed: 1 are the sentinel clinical reports a good measure of influenza activity? 2 how long is a typical influenza season in Europe? 3 is there a west-east and/or south-north course of peak activity ('spread' of influenza in Europe? Methods Influenza activity was measured by collecting data from sentinel general practitioners (GPs and reports by national reference laboratories. The sentinel reports were first evaluated by comparing them to the laboratory reports and were then used to assess the timing and spread of influenza activity across Europe during eight seasons. Results We found a good match between the clinical sentinel data and laboratory reports of influenza collected by sentinel physicians (overall match of 72% for +/- 1 week difference. We also found a moderate to good match between the clinical sentinel data and laboratory reports of influenza from non-sentinel sources (overall match of 60% for +/- 1 week. There were no statistically significant differences between countries using ILI (influenza-like illness or ARI (acute respiratory disease as case definition. When looking at the peak-weeks of clinical activity, the average length of an influenza season in Europe was 15.6 weeks (median 15 weeks; range 12–19 weeks. Plotting the peak weeks of clinical influenza activity reported by sentinel GPs against the longitude or latitude of each country indicated that there was a west-east spread of peak activity (spread of influenza across Europe in four winters (2001–2002, 2002–2003, 2003–2004 and 2004–2005 and a south-north spread in three winters (2001–2002, 2004–2005 and 2006

  3. Reload core safety verification

    International Nuclear Information System (INIS)

    Svetlik, M.; Minarcin, M.

    2003-01-01

    This paper presents a brief look at the process of reload core safety evaluation and verification in Slovak Republic. It gives an overview of experimental verification of selected nuclear parameters in the course of physics testing during reactor start-up. The comparison of IAEA recommendations and testing procedures at Slovak and European nuclear power plants of similar design is included. An introduction of two level criteria for evaluation of tests represents an effort to formulate the relation between safety evaluation and measured values (Authors)

  4. Keeping disease at arm's length

    DEFF Research Database (Denmark)

    Lassen, Aske Juul

    2015-01-01

    active ageing change everyday life with chronic disease, and how do older people combine an active life with a range of chronic diseases? The participants in the study use activities to keep their diseases at arm’s length, and this distancing of disease at the same time enables them to engage in social...... and physical activities at the activity centre. In this way, keeping disease at arm’s length is analysed as an ambiguous health strategy. The article shows the importance of looking into how active ageing is practised, as active ageing seems to work well in the everyday life of the older people by not giving...... emphasis to disease. The article is based on ethnographic fieldwork and uses vignettes of four participants to show how they each keep diseases at arm’s length....

  5. Telomere Length and Mortality

    DEFF Research Database (Denmark)

    Kimura, Masayuki; Hjelmborg, Jacob V B; Gardner, Jeffrey P

    2008-01-01

    Leukocyte telomere length, representing the mean length of all telomeres in leukocytes, is ostensibly a bioindicator of human aging. The authors hypothesized that shorter telomeres might forecast imminent mortality in elderly people better than leukocyte telomere length. They performed mortality...

  6. Integrated knowledge base tool for acquisition and verification of NPP alarm systems

    International Nuclear Information System (INIS)

    Park, Joo Hyun; Seong, Poong Hyun

    1998-01-01

    Knowledge acquisition and knowledge base verification are important activities in developing knowledge-based systems such as alarm processing systems. In this work, we developed the integrated tool, for knowledge acquisition and verification of NPP alarm processing systems, by using G2 tool. The tool integrates document analysis method and ECPN matrix analysis method, for knowledge acquisition and knowledge verification, respectively. This tool enables knowledge engineers to perform their tasks from knowledge acquisition to knowledge verification consistently

  7. Effects of physical activity during pregnancy and gestational weight gain on newborn weight and length at birth in Warmińsko-Mazurskie province.

    Science.gov (United States)

    Przybyłowicz, Katarzyna; Przybyłowicz, Mariusz; Grzybiak, Marek; Janiszewska, Katarzyna

    2014-01-01

    Epidemiological research has identified a relationship between maternal physical activity, early nutrition and infant birth weight with likelihood of developing future diseases. The aim of the study was to determine a relationship between gestational weight gain and physical activity during pregnancy to the nutritional status of newborns. The presented study was conducted in the period from February 2010 until November 2012 in the gynecological and obstetric clinics in Warmińsko-Mazurskie voivodeship with various levels of reference. The research subjects included 510 women in the puerperal period aged 18-36. The scope of the research included an assessment of the selected anthropometric parameters of both pregnant women (body mass, height, BMI, gestational weight gain) and newborns (infant birth weight, infant length, Ponderal Index), as well as an analysis of the connections between the gestational weight gain, physical activity during pregnancy and anthropometric parameters of newborns. In the study group there was a significant percentage of women characterised by an inactive lifestyle and excessive gestational weight gain. There were significantly higher neonatal birth anthropometric parameters in women with abnormal excessive gestational weight gain than in women with normal and inappropriate - low gestational weight gain. The highest percentage of women with appropriate weight gain was observed in the group of women who are physically active, although this requires confirmation in larger population. Our studies have not shown statistically significant differences between the gestational weight gain and nutritional status of newborns in relation to the level of physical activity of pregnant women.

  8. Relativistic length agony continued

    Directory of Open Access Journals (Sweden)

    Redžić D.V.

    2014-01-01

    Full Text Available We made an attempt to remedy recent confusing treatments of some basic relativistic concepts and results. Following the argument presented in an earlier paper (Redžić 2008b, we discussed the misconceptions that are recurrent points in the literature devoted to teaching relativity such as: there is no change in the object in Special Relativity, illusory character of relativistic length contraction, stresses and strains induced by Lorentz contraction, and related issues. We gave several examples of the traps of everyday language that lurk in Special Relativity. To remove a possible conceptual and terminological muddle, we made a distinction between the relativistic length reduction and relativistic FitzGerald-Lorentz contraction, corresponding to a passive and an active aspect of length contraction, respectively; we pointed out that both aspects have fundamental dynamical contents. As an illustration of our considerations, we discussed briefly the Dewan-Beran-Bell spaceship paradox and the ‘pole in a barn’ paradox. [Projekat Ministarstva nauke Republike Srbije, br. 171028

  9. Heavy water physical verification in power plants

    International Nuclear Information System (INIS)

    Morsy, S.; Schuricht, V.; Beetle, T.; Szabo, E.

    1986-01-01

    This paper is a report on the Agency experience in verifying heavy water inventories in power plants. The safeguards objectives and goals for such activities are defined in the paper. The heavy water is stratified according to the flow within the power plant, including upgraders. A safeguards scheme based on a combination of records auditing, comparing records and reports, and physical verification has been developed. This scheme has elevated the status of heavy water safeguards to a level comparable to nuclear material safeguards in bulk facilities. It leads to attribute and variable verification of the heavy water inventory in the different system components and in the store. The verification methods include volume and weight determination, sampling and analysis, non-destructive assay (NDA), and criticality check. The analysis of the different measurement methods and their limits of accuracy are discussed in the paper

  10. Is flow verification necessary

    International Nuclear Information System (INIS)

    Beetle, T.M.

    1986-01-01

    Safeguards test statistics are used in an attempt to detect diversion of special nuclear material. Under assumptions concerning possible manipulation (falsification) of safeguards accounting data, the effects on the statistics due to diversion and data manipulation are described algebraically. A comprehensive set of statistics that is capable of detecting any diversion of material is defined in terms of the algebraic properties of the effects. When the assumptions exclude collusion between persons in two material balance areas, then three sets of accounting statistics are shown to be comprehensive. Two of the sets contain widely known accountancy statistics. One of them does not require physical flow verification - comparisons of operator and inspector data for receipts and shipments. The third set contains a single statistic which does not require physical flow verification. In addition to not requiring technically difficult and expensive flow verification, this single statistic has several advantages over other comprehensive sets of statistics. This algebraic approach as an alternative to flow verification for safeguards accountancy is discussed in this paper

  11. Integrated Java Bytecode Verification

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian; Franz, Michael

    2005-01-01

    Existing Java verifiers perform an iterative data-flow analysis to discover the unambiguous type of values stored on the stack or in registers. Our novel verification algorithm uses abstract interpretation to obtain definition/use information for each register and stack location in the program...

  12. Lyso-myristoyl phosphatidylcholine micelles sustain the activity of Dengue non-structural (NS) protein 3 protease domain fused with the full-length NS2B.

    Science.gov (United States)

    Huang, Qiwei; Li, Qingxin; Joy, Joma; Chen, Angela Shuyi; Ruiz-Carrillo, David; Hill, Jeffrey; Lescar, Julien; Kang, Congbao

    2013-12-01

    Dengue virus (DENV), a member of the flavivirus genus, affects 50-100 million people in tropical and sub-tropical regions. The DENV protease domain is located at the N-terminus of the NS3 protease and requires for its enzymatic activity a hydrophilic segment of the NS2B that acts as a cofactor. The protease is an important antiviral drug target because it plays a crucial role in virus replication by cleaving the genome-coded polypeptide into mature functional proteins. Currently, there are no drugs to inhibit DENV protease activity. Most structural and functional studies have been conducted using protein constructs containing the NS3 protease domain connected to a soluble segment of the NS2B membrane protein via a nine-residue linker. For in vitro structural and functional studies, it would be useful to produce a natural form of the DENV protease containing the NS3 protease domain and the full-length NS2B protein. Herein, we describe the expression and purification of a natural form of DENV protease (NS2BFL-NS3pro) containing the full-length NS2B protein and the protease domain of NS3 (NS3pro). The protease was expressed and purified in detergent micelles necessary for its folding. Our results show that this purified protein was active in detergent micelles such as lyso-myristoyl phosphatidylcholine (LMPC). These findings should facilitate further structural and functional studies of the protease and will facilitate drug discovery targeting DENV. Copyright © 2013 Elsevier Inc. All rights reserved.

  13. Verification Games: Crowd-Sourced Formal Verification

    Science.gov (United States)

    2016-03-01

    additional paintbrushes. Additionally, in Paradox , human players are never given small optimization problems (for example, toggling the values of 50...were developed by the Center for Game Science: Pipe Jam, Traffic Jam, Flow Jam and Paradox . Verification tools and games were integrated to verify...4 4. Paradox …………………………………………………......5 5. MyClass ………………………………………………….....7 6. Results …………………………………………………......11 7. Time to

  14. Communication dated 18 December 2013 received from the Delegation of the European Union to the International Organisations in Vienna on the European Union's Support for the IAEA Activities in the Areas of Nuclear Security and Verification

    International Nuclear Information System (INIS)

    2014-01-01

    The Secretariat has received a note verbale dated 18 December 2013 from the Delegation of the European Union to the International Organisations in Vienna with Council Decision 2013/517/CFSP of 21 October 2013, in support of the IAEA activities in the areas of nuclear security and verification and in the framework of the implementation of the EU Strategy against Proliferation of Weapons of Mass Destruction. As requested in that communication, the note verbale and the enclosure are circulated herewith for information [fr

  15. Communication dated 18 December 2013 received from the Delegation of the European Union to the International Organisations in Vienna on the European Union's Support for the IAEA Activities in the Areas of Nuclear Security and Verification

    International Nuclear Information System (INIS)

    2014-01-01

    The Secretariat has received a note verbale dated 18 December 2013 from the Delegation of the European Union to the International Organisations in Vienna with Council Decision 2013/517/CFSP of 21 October 2013, in support of the IAEA activities in the areas of nuclear security and verification and in the framework of the implementation of the EU Strategy against Proliferation of Weapons of Mass Destruction. As requested in that communication, the note verbale and the enclosure are circulated herewith for information [es

  16. The design of verification regimes

    International Nuclear Information System (INIS)

    Gallagher, N.W.

    1991-01-01

    Verification of a nuclear agreement requires more than knowledge of relevant technologies and institutional arrangements. It also demands thorough understanding of the nature of verification and the politics of verification design. Arms control efforts have been stymied in the past because key players agreed to verification in principle, only to disagree radically over verification in practice. In this chapter, it is shown that the success and stability of arms control endeavors can be undermined by verification designs which promote unilateral rather than cooperative approaches to security, and which may reduce, rather than enhance, the security of both sides. Drawing on logical analysis and practical lessons from previous superpower verification experience, this chapter summarizes the logic and politics of verification and suggests implications for South Asia. The discussion begins by determining what properties all forms of verification have in common, regardless of the participants or the substance and form of their agreement. Viewing verification as the political process of making decisions regarding the occurrence of cooperation points to four critical components: (1) determination of principles, (2) information gathering, (3) analysis and (4) projection. It is shown that verification arrangements differ primarily in regards to how effectively and by whom these four stages are carried out

  17. Decomposition by tree dimension in Horn clause verification

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick; Ganty, Pierre

    2015-01-01

    In this paper we investigate the use of the concept of tree dimension in Horn clause analysis and verification. The dimension of a tree is a measure of its non-linearity - for example a list of any length has dimension zero while a complete binary tree has dimension equal to its height. We apply ...

  18. Telomerase activity and telomere length in the colorectal polyp-carcinoma sequence Actividad de la telomerasa y longitud del telómero en la secuencia pólipo-carcinoma colorrectal

    OpenAIRE

    C. Valls Bautista; C. Piñol Felis; J. M. Reñe Espinet; J. Buenestado García; J. Viñas Salas

    2009-01-01

    Objective: the role of telomerase activity and telomere length in the adenoma-carcinoma sequence of colon carcinogenesis has not been well established. The objective of this study was to determine telomerase activity and telomere length patterns in patients with adenomatous polyps either associated or not with colorectal cancer, as well as the role of telomeric instability in the adenoma-carcinoma sequence. Patients and methods: we included in the study 14 patients who underwent surgery for c...

  19. Mesenchymal stem cells with high telomerase expression do not actively restore their chromosome arm specific telomere length pattern after exposure to ionizing radiation

    DEFF Research Database (Denmark)

    Graakjaer, Jesper; Christensen, Rikke; Kolvraa, Steen

    2007-01-01

    were measured using Fluorescence In Situ Hybridization (Q-FISH). RESULTS: A telomere length pattern was found to exist in primary hMSC's as well as in hMSC-telo1. This pattern is similar to what was previously found in lymphocytes and fibroblasts. The cells were then exposed to a high dose of ionizing...... radiation. Irradiation caused profound changes in chromosome specific telomere lengths, effectively destroying the telomere length pattern. Following long term culturing after irradiation, a telomere length pattern was found to re-emerge. However, the new telomere length pattern did not resemble...

  20. INF and IAEA: A comparative analysis of verification strategy

    International Nuclear Information System (INIS)

    Scheinman, L.; Kratzer, M.

    1992-07-01

    This is the final report of a study on the relevance and possible lessons of Intermediate Range Nuclear Force (INF) verification to the International Atomic Energy Agency (IAEA) international safeguards activities

  1. Temperature and diet effect on the pepsin enzyme activities, digestive somatic index and relative gut length of Malabar blood snapper (Lutjanus malabaricus Bloch & Schneider, 1801

    Directory of Open Access Journals (Sweden)

    Sabuj Kanti Mazumder

    2018-02-01

    Full Text Available An integrated experiment was performed on juvenile Malabar blood snapper (Lutjanus malabaricus to investigate the effect of temperature and diet in their pepsin activities in relation with digestive somatic index (IDS and relative gut length (RGL. One hundred twenty L. malabaricus juvenile (13–15 cm were equally distributed among four exposed temperature treatments (22, 26, 30 and 34 °C representing their seasonal range and to account for end of century predicted temperatures, and two diets as commercial pellet and natural shrimp. After 7 days of acclimation period fish were reared for 30 days in twenty four 400 l glass aquaria at a stocking density of 5 fish tank−1. All treatments were three replications. The result showed that, IDS and RGL gradually decreased with increasing temperature up to 30 °C and again increase at 34 °C. And the values were also higher in pellet feeding fish than shrimp feeding fish at all the temperatures. Alternatively, in pepsin activity, an increased activity was seen between 26 °C to 30 °C and this activity was significantly higher than the 22 °C and 34 °C (P < 0.05. In general, highest pepsin activity was observed among fish which fed on a natural shrimp diet reared at temperature 30 °C (5.47 ± 1.60 U mg protein−1, followed by those at 26, 34 and 22 °C (P < 0.05 at both diet however, no mortalities were observed. These results could be used as a basis for selecting a suitable diet for maximizing the growth and sustainable aquaculture coping with global warming.

  2. Characterization of gut microbiota profiles by disease activity in patients with Crohn's disease using data mining analysis of terminal restriction fragment length polymorphisms.

    Science.gov (United States)

    Andoh, Akira; Kobayashi, Toshio; Kuzuoka, Hiroyuki; Tsujikawa, Tomoyuki; Suzuki, Yasuo; Hirai, Fumihito; Matsui, Toshiyuki; Nakamura, Shiro; Matsumoto, Takayuki; Fujiyama, Yoshihide

    2014-05-01

    The gut microbiota plays a significant role in the pathogenesis of Crohn's disease (CD). In this study, we analyzed the disease activity and associated fecal microbiota profiles in 160 CD patients and 121 healthy individuals. Fecal samples from the CD patients were collected during three different clinical phases, the active (n=66), remission-achieved (n=51) and remission-maintained (n=43) phases. Terminal restriction fragment length polymorphism (T-RFLP) and data mining analysis using the Classification and Regression Tree (C&RT) approach were performed. Data mining provided a decision tree that clearly identified the various subject groups (nodes). The majority of the healthy individuals were divided into Node-5 and Node-8. Healthy subjects comprised 99% of Node-5 (91 of 92) and 84% of Node-8 (21 of 25 subjects). Node-3 was characterized by CD (136 of 160 CD subjects) and was divided into Node-6 and Node-7. Node-6 (n=103) was characterized by subjects in the active phase (n=48; 46%) and remission-achieved phase (n=39; 38%) and Node-7 was characterized by the remission-maintained phase (21 of 37 subjects; 57%). Finally, Node-6 was divided into Node-9 and Node-10. Node-9 (n=78) was characterized by subjects in the active phase (n=43; 55%) and Node-10 (n=25) was characterized by subjects in the remission-maintained phase (n=16; 64%). Differences in the gut microbiota associated with disease activity of CD patients were identified. Thus, data mining analysis appears to be an ideal tool for the characterization of the gut microbiota in inflammatory bowel disease.

  3. Distorted Fingerprint Verification System

    Directory of Open Access Journals (Sweden)

    Divya KARTHIKAESHWARAN

    2011-01-01

    Full Text Available Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.

  4. RESRAD-BUILD verification

    International Nuclear Information System (INIS)

    Kamboj, S.; Yu, C.; Biwer, B. M.; Klett, T.

    2002-01-01

    The results generated by the RESRAD-BUILD code (version 3.0) were verified with hand or spreadsheet calculations using equations given in the RESRAD-BUILD manual for different pathways. For verification purposes, different radionuclides--H-3, C-14, Na-22, Al-26, Cl-36, Mn-54, Co-60, Au-195, Ra-226, Ra-228, Th-228, and U-238--were chosen to test all pathways and models. Tritium, Ra-226, and Th-228 were chosen because of the special tritium and radon models in the RESRAD-BUILD code. Other radionuclides were selected to represent a spectrum of radiation types and energies. Verification of the RESRAD-BUILD code was conducted with an initial check of all the input parameters for correctness against their original source documents. Verification of the calculations was performed external to the RESRAD-BUILD code with Microsoft Excel to verify all the major portions of the code. In some cases, RESRAD-BUILD results were compared with those of external codes, such as MCNP (Monte Carlo N-particle) and RESRAD. The verification was conducted on a step-by-step basis and used different test cases as templates. The following types of calculations were investigated: (1) source injection rate, (2) air concentration in the room, (3) air particulate deposition, (4) radon pathway model, (5) tritium model for volume source, (6) external exposure model, (7) different pathway doses, and (8) time dependence of dose. Some minor errors were identified in version 3.0; these errors have been corrected in later versions of the code. Some possible improvements in the code were also identified

  5. Material integrity verification radar

    International Nuclear Information System (INIS)

    Koppenjan, S.K.

    1999-01-01

    The International Atomic Energy Agency (IAEA) has the need for verification of 'as-built' spent fuel-dry storage containers and other concrete structures. The IAEA has tasked the Special Technologies Laboratory (STL) to fabricate, test, and deploy a stepped-frequency Material Integrity Verification Radar (MIVR) system to nondestructively verify the internal construction of these containers. The MIVR system is based on previously deployed high-frequency, ground penetrating radar (GPR) systems that have been developed by STL for the U.S. Department of Energy (DOE). Whereas GPR technology utilizes microwave radio frequency energy to create subsurface images, MTVR is a variation for which the medium is concrete instead of soil. The purpose is to nondestructively verify the placement of concrete-reinforcing materials, pipes, inner liners, and other attributes of the internal construction. The MIVR system underwent an initial field test on CANDU reactor spent fuel storage canisters at Atomic Energy of Canada Limited (AECL), Chalk River Laboratories, Ontario, Canada, in October 1995. A second field test at the Embalse Nuclear Power Plant in Embalse, Argentina, was completed in May 1996. The DOE GPR also was demonstrated at the site. Data collection and analysis were performed for the Argentine National Board of Nuclear Regulation (ENREN). IAEA and the Brazilian-Argentine Agency for the Control and Accounting of Nuclear Material (ABACC) personnel were present as observers during the test. Reinforcing materials were evident in the color, two-dimensional images produced by the MIVR system. A continuous pattern of reinforcing bars was evident and accurate estimates on the spacing, depth, and size were made. The potential uses for safeguard applications were jointly discussed. The MIVR system, as successfully demonstrated in the two field tests, can be used as a design verification tool for IAEA safeguards. A deployment of MIVR for Design Information Questionnaire (DIQ

  6. The functional polymorphism rs73598374:G>A (p.Asp8Asn) of the ADA gene is associated with telomerase activity and leukocyte telomere length.

    Science.gov (United States)

    Concetti, Fabio; Carpi, Francesco M; Nabissi, Massimo; Picciolini, Matteo; Santoni, Giorgio; Napolioni, Valerio

    2015-02-01

    Recent evidence demonstrated a relevant role of adenosine deaminase (ADA) in replicative senescence of T cells through its capacity to modulate telomerase activity (TA). Herein, we tested the impact of the functional polymorphism ADA rs73598374:G>A (c.22G>A, p.Asp8Asn) on telomere biology, by measuring TA and leukocyte telomere length (LTL) in healthy subjects selected according to rs73598374 genotype. rs73598374-A carriers showed lower TA (P=0.019) and shorter LTL (P=0.003), respectively, compared to G/G carriers. rs73598374-A carriers showed a stronger cross-sectional age reduction of LTL (r=-0.314, P=0.005) compared to G/G carriers (r=-0.243, P=0.022). The reduced ADA activity associated to rs73598374-A variant predisposes those carriers to display higher levels of adenosine compared to G/G carriers. Consequently, it may lead to an accelerated process of replicative senescence, causing a stronger reduction of TA and in turn shorter LTL. In conclusion, the crucial role played by replicative senescence of the immune system in several human diseases and in the aging process underscores the relevance of the present findings and also spurs interest into the possible involvement of rs73598374 in shaping the susceptibility to several age-related diseases.

  7. Quantum money with classical verification

    Energy Technology Data Exchange (ETDEWEB)

    Gavinsky, Dmitry [NEC Laboratories America, Princeton, NJ (United States)

    2014-12-04

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  8. Quantum money with classical verification

    International Nuclear Information System (INIS)

    Gavinsky, Dmitry

    2014-01-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it

  9. The NRC measurement verification program

    International Nuclear Information System (INIS)

    Pham, T.N.; Ong, L.D.Y.

    1995-01-01

    A perspective is presented on the US Nuclear Regulatory Commission (NRC) approach for effectively monitoring the measurement methods and directly testing the capability and performance of licensee measurement systems. A main objective in material control and accounting (MC and A) inspection activities is to assure the accuracy and precision of the accounting system and the absence of potential process anomalies through overall accountability. The primary means of verification remains the NRC random sampling during routine safeguards inspections. This involves the independent testing of licensee measurement performance with statistical sampling plans for physical inventories, item control, and auditing. A prospective cost-effective alternative overcheck is also discussed in terms of an externally coordinated sample exchange or ''round robin'' program among participating fuel cycle facilities in order to verify the quality of measurement systems, i.e., to assure that analytical measurement results are free of bias

  10. Crystal Structure of Full-length Mycobacterium tuberculosis H37Rv Glycogen Branching Enzyme; Insights of N-Terminal [beta]-Sandwich in Sustrate Specifity and Enzymatic Activity

    Energy Technology Data Exchange (ETDEWEB)

    Pal, Kuntal; Kumar, Shiva; Sharma, Shikha; Garg, Saurabh Kumar; Alam, Mohammad Suhail; Xu, H. Eric; Agrawal, Pushpa; Swaminathan, Kunchithapadam (NU Sinapore); (Van Andel); (IMT-India)

    2010-07-13

    The open reading frame Rv1326c of Mycobacterium tuberculosis (Mtb) H37Rv encodes for an {alpha}-1,4-glucan branching enzyme (MtbGlgB, EC 2.4.1.18, Uniprot entry Q10625). This enzyme belongs to glycoside hydrolase (GH) family 13 and catalyzes the branching of a linear glucose chain during glycogenesis by cleaving a 1 {yields} 4 bond and making a new 1 {yields} 6 bond. Here, we show the crystal structure of full-length MtbGlgB (MtbGlgBWT) at 2.33-{angstrom} resolution. MtbGlgBWT contains four domains: N1 {beta}-sandwich, N2 {beta}-sandwich, a central ({beta}/{alpha}){sub 8} domain that houses the catalytic site, and a C-terminal {beta}-sandwich. We have assayed the amylase activity with amylose and starch as substrates and the glycogen branching activity using amylose as a substrate for MtbGlgBWT and the N1 domain-deleted (the first 108 residues deleted) Mtb{Delta}108GlgB protein. The N1 {beta}-sandwich, which is formed by the first 105 amino acids and superimposes well with the N2 {beta}-sandwich, is shown to have an influence in substrate binding in the amylase assay. Also, we have checked and shown that several GH13 family inhibitors are ineffective against MtbGlgBWT and Mtb{Delta}108GlgB. We propose a two-step reaction mechanism, for the amylase activity (1 {yields} 4 bond breakage) and isomerization (1 {yields} 6 bond formation), which occurs in the same catalytic pocket. The structural and functional properties of MtbGlgB and Mtb{Delta}108GlgB are compared with those of the N-terminal 112-amino acid-deleted Escherichia coli GlgB (EC{Delta}112GlgB).

  11. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  12. A Practitioners Perspective on Verification

    Science.gov (United States)

    Steenburgh, R. A.

    2017-12-01

    NOAAs Space Weather Prediction Center offers a wide range of products and services to meet the needs of an equally wide range of customers. A robust verification program is essential to the informed use of model guidance and other tools by both forecasters and end users alike. In this talk, we present current SWPC practices and results, and examine emerging requirements and potential approaches to satisfy them. We explore the varying verification needs of forecasters and end users, as well as the role of subjective and objective verification. Finally, we describe a vehicle used in the meteorological community to unify approaches to model verification and facilitate intercomparison.

  13. Verification of wet blasting decontamination technology

    International Nuclear Information System (INIS)

    Matsubara, Sachito; Murayama, Kazunari; Yoshida, Hirohisa; Igei, Shigemitsu; Izumida, Tatsuo

    2013-01-01

    Macoho Co., Ltd. participated in the projects of 'Decontamination Verification Test FY 2011 by the Ministry of the Environment' and 'Decontamination Verification Test FY 2011 by the Cabinet Office.' And we tested verification to use a wet blasting technology for decontamination of rubble and roads contaminated by the accident of Fukushima Daiichi Nuclear Power Plant of the Tokyo Electric Power Company. As a results of the verification test, the wet blasting decontamination technology showed that a decontamination rate became 60-80% for concrete paving, interlocking, dense-grated asphalt pavement when applied to the decontamination of the road. When it was applied to rubble decontamination, a decontamination rate was 50-60% for gravel and approximately 90% for concrete and wood. It was thought that Cs-134 and Cs-137 attached to the fine sludge scraped off from a decontamination object and the sludge was found to be separated from abrasives by wet cyclene classification: the activity concentration of the abrasives is 1/30 or less than the sludge. The result shows that the abrasives can be reused without problems when the wet blasting decontamination technology is used. (author)

  14. NADH oxidase activity (NOX) and enlargement of HeLa cells oscillate with two different temperature-compensated period lengths of 22 and 24 minutes corresponding to different NOX forms

    Science.gov (United States)

    Wang, S.; Pogue, R.; Morre, D. M.; Morre, D. J.

    2001-01-01

    NOX proteins are cell surface-associated and growth-related hydroquinone (NADH) oxidases with protein disulfide-thiol interchange activity. A defining characteristic of NOX proteins is that the two enzymatic activities alternate to generate a regular period length of about 24 min. HeLa cells exhibit at least two forms of NOX. One is tumor-associated (tNOX) and is inhibited by putative quinone site inhibitors (e.g., capsaicin or the antitumor sulfonylurea, LY181984). Another is constitutive (CNOX) and refractory to inhibition. The periodic alternation of activities and drug sensitivity of the NADH oxidase activity observed with intact HeLa cells was retained in isolated plasma membranes and with the solubilized and partially purified enzyme. At least two activities were present. One had a period length of 24 min and the other had a period length of 22 min. The lengths of both the 22 and the 24 min periods were temperature compensated (approximately the same when measured at 17, 27 or 37 degrees C) whereas the rate of NADH oxidation approximately doubled with each 10 degrees C rise in temperature. The rate of increase in cell area of HeLa cells when measured by video-enhanced light microscopy also exhibited a complex period of oscillations reflective of both 22 and 24 min period lengths. The findings demonstrate the presence of a novel oscillating NOX activity at the surface of cancer cells with a period length of 22 min in addition to the constitutive NOX of non-cancer cells and tissues with a period length of 24 min.

  15. Characterization of the cloned full-length and a truncated human target of rapamycin: Activity, specificity, and enzyme inhibition as studied by a high capacity assay

    International Nuclear Information System (INIS)

    Toral-Barza, Lourdes; Zhang Weiguo; Lamison, Craig; LaRocque, James; Gibbons, James; Yu, Ker

    2005-01-01

    The mammalian target of rapamycin (mTOR/TOR) is implicated in cancer and other human disorders and thus an important target for therapeutic intervention. To study human TOR in vitro, we have produced in large scale both the full-length TOR (289 kDa) and a truncated TOR (132 kDa) from HEK293 cells. Both enzymes demonstrated a robust and specific catalytic activity towards the physiological substrate proteins, p70 S6 ribosomal protein kinase 1 (p70S6K1) and eIF4E binding protein 1 (4EBP1), as measured by phosphor-specific antibodies in Western blotting. We developed a high capacity dissociation-enhanced lanthanide fluorescence immunoassay (DELFIA) for analysis of kinetic parameters. The Michaelis constant (K m ) values of TOR for ATP and the His6-S6K substrate were shown to be 50 and 0.8 μM, respectively. Dose-response and inhibition mechanisms of several known inhibitors, the rapamycin-FKBP12 complex, wortmannin and LY294002, were also studied in DELFIA. Our data indicate that TOR exhibits kinetic features of those shared by traditional serine/threonine kinases and demonstrate the feasibility for TOR enzyme screen in searching for new inhibitors

  16. Telomere length is short in PCOS and oral contraceptive does not affect the telomerase activity in granulosa cells of patients with PCOS.

    Science.gov (United States)

    Li, Ying; Deng, Bingbing; Ouyang, Nengyong; Yuan, Ping; Zheng, Lingyan; Wang, Wenjun

    2017-07-01

    Our study aimed to investigate the association of telomerase activity (TA) and telomere length (TL) in granulosa cells (GCs) with IVF outcomes of polycystic ovary syndrome (PCOS) patients, and the effects of oral contraceptive pill (OCP) pretreatment on these two parameters. One hundred sixty-three infertile women were enrolled and divided into a PCOS group (n = 65) and a non-PCOS group (n = 98). The PCOS group was further divided into an OCP pretreatment group (n = 35) and a non-OCP pretreatment group (n = 30), a TA PCOS group and 1.118 in non-PCOS group (P = 0.005). The patients with TL ≥1 accounted for 36.9% in PCOS group and 54.1% in non-PCOS group (P = 0.032). The average duration of infertility for PCOS patients was 5 years in TA PCOS patients. Shorter TL was found in PCOS patients. The TA levels did not change significantly in PCOS patients. PCOS patients with a lower TA level and shorter telomeres had an earlier onset of infertility symptoms. No predictive value was found for TA and TL in terms of embryo quality or IVF outcomes in PCOS patients, and no effect OCP pretreatment was observed on either TA and TL.

  17. Diacyltransferase Activity and Chain Length Specificity of Mycobacterium tuberculosis PapA5 in the Synthesis of Alkyl β-Diol Lipids

    Energy Technology Data Exchange (ETDEWEB)

    Touchette, Megan H.; Bommineni, Gopal R.; Delle Bovi, Richard J.; Gadbery, John; Nicora, Carrie D.; Shukla, Anil K.; Kyle, Jennifer E.; Metz, Thomas O.; Martin, Dwight W.; Sampson, Nicole S.; Miller, W. T.; Tonge, Peter J.; Seeliger, Jessica C.

    2015-09-08

    Although classified as Gram-positive bacteria, Corynebacterineae possess an asymmetric outer membrane that imparts structural and thereby physiological similarity to more distantly related Gram-negative bacteria. Like lipopolysaccharide in Gram-negative bacteria, lipids in the outer membrane of Corynebacterineae have been associated with the virulence of pathogenic species such as Mycobacterium tuberculosis (Mtb). For example, Mtb strains that lack long, branched-chain alkyl esters known as dimycocerosates (DIMs) are significantly attenuated in model infections. The resultant interest in the biosynthetic pathway of these unusual virulence factors has led to the elucidation of many of the steps leading to the final esterification of the alkyl beta-diol, phthiocerol, with branched-chain fatty acids know as mycocerosates. PapA5 is an acyltransferase implicated in these final reactions. We here show that PapA5 is indeed the terminal enzyme in DIM biosynthesis by demonstrating its dual esterification activity and chain-length preference using synthetic alkyl beta-diol substrate analogues. Applying these analogues to a series of PapA5 mutants, we also revise a model for the substrate binding within PapA5. Finally, we demonstrate that the Mtb Ser/Thr kinase PknB modifies PapA5 on three Thr residues, including two (T196, T198) located on an unresolved loop. These results clarify the DIM biosynthetic pathway and suggest possible mechanisms by which DIM biosynthesis may be regulated by the post-translational modification of PapA5.

  18. High-level verification

    CERN Document Server

    Lerner, Sorin; Kundu, Sudipta

    2011-01-01

    Given the growing size and heterogeneity of Systems on Chip (SOC), the design process from initial specification to chip fabrication has become increasingly complex. This growing complexity provides incentive for designers to use high-level languages such as C, SystemC, and SystemVerilog for system-level design. While a major goal of these high-level languages is to enable verification at a higher level of abstraction, allowing early exploration of system-level designs, the focus so far for validation purposes has been on traditional testing techniques such as random testing and scenario-based

  19. Survey on Offline Finger Print Verification System

    NARCIS (Netherlands)

    Suman, R.; Kaur, R.

    2012-01-01

    The fingerprint verification, means where "verification" implies a user matching a fingerprint against a single fingerprint associated with the identity that the user claims. Biometrics can be classified into two types Behavioral (signature verification, keystroke dynamics, etc.) And Physiological

  20. HDL to verification logic translator

    Science.gov (United States)

    Gambles, J. W.; Windley, P. J.

    1992-01-01

    The increasingly higher number of transistors possible in VLSI circuits compounds the difficulty in insuring correct designs. As the number of possible test cases required to exhaustively simulate a circuit design explodes, a better method is required to confirm the absence of design faults. Formal verification methods provide a way to prove, using logic, that a circuit structure correctly implements its specification. Before verification is accepted by VLSI design engineers, the stand alone verification tools that are in use in the research community must be integrated with the CAD tools used by the designers. One problem facing the acceptance of formal verification into circuit design methodology is that the structural circuit descriptions used by the designers are not appropriate for verification work and those required for verification lack some of the features needed for design. We offer a solution to this dilemma: an automatic translation from the designers' HDL models into definitions for the higher-ordered logic (HOL) verification system. The translated definitions become the low level basis of circuit verification which in turn increases the designer's confidence in the correctness of higher level behavioral models.

  1. 4-N, 4-S & 4-O Chloroquine Analogues: Influence of Side Chain Length and Quinolyl Nitrogen pKa on Activity vs. Chloroquine Resistant Malaria+, #

    OpenAIRE

    Natarajan, Jayakumar K.; Alumasa, John; Yearick, Kimberly; Ekoue-Kovi, Kekeli A.; Casabianca, Leah B.; de Dios, Angel C.; Wolf, Christian; Roepe, Paul D.

    2008-01-01

    Using predictions from heme – quinoline antimalarial complex structures, previous modifications of chloroquine (CQ), and hypotheses for chloroquine resistance (CQR), we synthesize and assay CQ analogues that test structure – function principles. We vary side chain length for both monoethyl and diethyl 4N CQ derivatives. We alter the pKa of the quinolyl N by introducing alkylthio or alkoxy substituents into the 4 position, and vary side chain length for these analogues. We introduce an additio...

  2. Using SysML for verification and validation planning on the Large Synoptic Survey Telescope (LSST)

    Science.gov (United States)

    Selvy, Brian M.; Claver, Charles; Angeli, George

    2014-08-01

    This paper provides an overview of the tool, language, and methodology used for Verification and Validation Planning on the Large Synoptic Survey Telescope (LSST) Project. LSST has implemented a Model Based Systems Engineering (MBSE) approach as a means of defining all systems engineering planning and definition activities that have historically been captured in paper documents. Specifically, LSST has adopted the Systems Modeling Language (SysML) standard and is utilizing a software tool called Enterprise Architect, developed by Sparx Systems. Much of the historical use of SysML has focused on the early phases of the project life cycle. Our approach is to extend the advantages of MBSE into later stages of the construction project. This paper details the methodology employed to use the tool to document the verification planning phases, including the extension of the language to accommodate the project's needs. The process includes defining the Verification Plan for each requirement, which in turn consists of a Verification Requirement, Success Criteria, Verification Method(s), Verification Level, and Verification Owner. Each Verification Method for each Requirement is defined as a Verification Activity and mapped into Verification Events, which are collections of activities that can be executed concurrently in an efficient and complementary way. Verification Event dependency and sequences are modeled using Activity Diagrams. The methodology employed also ties in to the Project Management Control System (PMCS), which utilizes Primavera P6 software, mapping each Verification Activity as a step in a planned activity. This approach leads to full traceability from initial Requirement to scheduled, costed, and resource loaded PMCS task-based activities, ensuring all requirements will be verified.

  3. Telomerase activity, telomere length and hTERT DNA methylation in peripheral blood mononuclear cells from monozygotic twins with discordant smoking habits.

    Science.gov (United States)

    Marcon, Francesca; Siniscalchi, Ester; Andreoli, Cristina; Allione, Alessandra; Fiorito, Giovanni; Medda, Emanuela; Guarrera, Simonetta; Matullo, Giuseppe; Crebelli, Riccardo

    2017-10-01

    Increased telomerase expression has been implicated in the pathogenesis of lung cancer and, since the primary cause of lung cancer is smoking, an association between telomerase reactivation and tobacco smoke has been proposed. In this work an investigation has been performed to assess the relationship between tobacco smoke exposure and telomerase activity (TA) in peripheral blood mononuclear cells of healthy smokers. The methylation status of the catalytic subunit of telomerase hTERT was concurrently investigated to assess the possible association between epigenetic modifications of hTERT and TA. Besides, the association between smoke and telomere length (TL) has been evaluated. Healthy monozygotic twins with discordant smoking habits were selected as study population to minimize inter-individual differences because of demographic characteristics and genetic heterogeneity. Statistically significant higher values of TA and TL were observed in smokers compared to nonsmoker co-twins. The multivariate analysis of data showed, besides smoking habits (P = 0.02), an influence of gender (P = 0.006) and BMI (P = 0.001) on TA and a borderline effect of gender (P = 0.05) on TL. DNA methylation analysis, focused on 100 CpG sites mapping in hTERT, highlighted nine CpG sites differentially methylated in smokers. When co-twins were contrasted, selecting as variables the intra-twin difference in TA and hTERT DNA methylation, a statistically significant inverse correlation (P = 0.003) was observed between TA and DNA methylation at the cg05521538 site. In conclusion, these results indicate an association of tobacco smoke with TA and TL and suggest a possible association between smoke-induced epigenetic effects and TA in healthy smokers. Environ. Mol. Mutagen. 58:551-559, 2017. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  4. Verification and validation in computational fluid dynamics

    Science.gov (United States)

    Oberkampf, William L.; Trucano, Timothy G.

    2002-04-01

    Verification and validation (V&V) are the primary means to assess accuracy and reliability in computational simulations. This paper presents an extensive review of the literature in V&V in computational fluid dynamics (CFD), discusses methods and procedures for assessing V&V, and develops a number of extensions to existing ideas. The review of the development of V&V terminology and methodology points out the contributions from members of the operations research, statistics, and CFD communities. Fundamental issues in V&V are addressed, such as code verification versus solution verification, model validation versus solution validation, the distinction between error and uncertainty, conceptual sources of error and uncertainty, and the relationship between validation and prediction. The fundamental strategy of verification is the identification and quantification of errors in the computational model and its solution. In verification activities, the accuracy of a computational solution is primarily measured relative to two types of highly accurate solutions: analytical solutions and highly accurate numerical solutions. Methods for determining the accuracy of numerical solutions are presented and the importance of software testing during verification activities is emphasized. The fundamental strategy of validation is to assess how accurately the computational results compare with the experimental data, with quantified error and uncertainty estimates for both. This strategy employs a hierarchical methodology that segregates and simplifies the physical and coupling phenomena involved in the complex engineering system of interest. A hypersonic cruise missile is used as an example of how this hierarchical structure is formulated. The discussion of validation assessment also encompasses a number of other important topics. A set of guidelines is proposed for designing and conducting validation experiments, supported by an explanation of how validation experiments are different

  5. Shift Verification and Validation

    Energy Technology Data Exchange (ETDEWEB)

    Pandya, Tara M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Evans, Thomas M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Davidson, Gregory G [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Johnson, Seth R. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Godfrey, Andrew T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-09-07

    This documentation outlines the verification and validation of Shift for the Consortium for Advanced Simulation of Light Water Reactors (CASL). Five main types of problems were used for validation: small criticality benchmark problems; full-core reactor benchmarks for light water reactors; fixed-source coupled neutron-photon dosimetry benchmarks; depletion/burnup benchmarks; and full-core reactor performance benchmarks. We compared Shift results to measured data and other simulated Monte Carlo radiation transport code results, and found very good agreement in a variety of comparison measures. These include prediction of critical eigenvalue, radial and axial pin power distributions, rod worth, leakage spectra, and nuclide inventories over a burn cycle. Based on this validation of Shift, we are confident in Shift to provide reference results for CASL benchmarking.

  6. Online fingerprint verification.

    Science.gov (United States)

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.

  7. Telomere length analysis.

    Science.gov (United States)

    Canela, Andrés; Klatt, Peter; Blasco, María A

    2007-01-01

    Most somatic cells of long-lived species undergo telomere shortening throughout life. Critically short telomeres trigger loss of cell viability in tissues, which has been related to alteration of tissue function and loss of regenerative capabilities in aging and aging-related diseases. Hence, telomere length is an important biomarker for aging and can be used in the prognosis of aging diseases. These facts highlight the importance of developing methods for telomere length determination that can be employed to evaluate telomere length during the human aging process. Telomere length quantification methods have improved greatly in accuracy and sensitivity since the development of the conventional telomeric Southern blot. Here, we describe the different methodologies recently developed for telomere length quantification, as well as their potential applications for human aging studies.

  8. Advancing Disarmament Verification Tools: A Task for Europe?

    International Nuclear Information System (INIS)

    Göttsche, Malte; Kütt, Moritz; Neuneck, Götz; Niemeyer, Irmgard

    2015-01-01

    A number of scientific-technical activities have been carried out to establish more robust and irreversible disarmament verification schemes. Regardless of the actual path towards deeper reductions in nuclear arsenals or their total elimination in the future, disarmament verification will require new verification procedures and techniques. This paper discusses the information that would be required as a basis for building confidence in disarmament, how it could be principally verified and the role Europe could play. Various ongoing activities are presented that could be brought together to produce a more intensified research and development environment in Europe. The paper argues that if ‘effective multilateralism’ is the main goal of the European Union’s (EU) disarmament policy, EU efforts should be combined and strengthened to create a coordinated multilateral disarmament verification capacity in the EU and other European countries. The paper concludes with several recommendations that would have a significant impact on future developments. Among other things, the paper proposes a one-year review process that should include all relevant European actors. In the long run, an EU Centre for Disarmament Verification could be envisaged to optimize verification needs, technologies and procedures.

  9. Spent Nuclear Fuel (SNF) Project Design Verification and Validation Process

    International Nuclear Information System (INIS)

    OLGUIN, L.J.

    2000-01-01

    This document provides a description of design verification and validation activities implemented by the Spent Nuclear Fuel (SNF) Project. During the execution of early design verification, a management assessment (Bergman, 1999) and external assessments on configuration management (Augustenburg, 1999) and testing (Loscoe, 2000) were conducted and identified potential uncertainties in the verification process. This led the SNF Chief Engineer to implement corrective actions to improve process and design products. This included Design Verification Reports (DVRs) for each subproject, validation assessments for testing, and verification of the safety function of systems and components identified in the Safety Equipment List to ensure that the design outputs were compliant with the SNF Technical Requirements. Although some activities are still in progress, the results of the DVR and associated validation assessments indicate that Project requirements for design verification are being effectively implemented. These results have been documented in subproject-specific technical documents (Table 2). Identified punch-list items are being dispositioned by the Project. As these remaining items are closed, the technical reports (Table 2) will be revised and reissued to document the results of this work

  10. Focussed approach to verification under FMCT

    International Nuclear Information System (INIS)

    Bragin, V.; Carlson, J.; Bardsley, J.; Hill, J.

    1998-01-01

    FMCT will have different impacts on individual states due to the enormous variance in their nuclear fuel cycles and the associated fissile material inventories. The problem is how to negotiate a treaty that would achieve results favourable for all participants, given that interests and priorities vary so much. We believe that focussed verification, confined to safeguarding of enrichment and reprocessing facilities in NWS and TS, coupled with verification of unirradiated direct-use material produced after entry-into-force of a FMCT and supported with measures to detect possible undeclared enrichment and reprocessing activities, is technically adequate for the FMCT. Eventually this would become the appropriate model for all states party to the NPT

  11. Improved verification methods for safeguards verifications at enrichment plants

    International Nuclear Information System (INIS)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D.

    2009-01-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF 6 cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  12. Improved verification methods for safeguards verifications at enrichment plants

    Energy Technology Data Exchange (ETDEWEB)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D. [Department of Safeguards, International Atomic Energy Agency, Wagramer Strasse 5, A1400 Vienna (Austria)

    2009-07-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF{sub 6} cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  13. Time-space modal logic for verification of bit-slice circuits

    Science.gov (United States)

    Hiraishi, Hiromi

    1996-03-01

    The major goal of this paper is to propose a new modal logic aiming at formal verification of bit-slice circuits. The new logic is called as time-space modal logic and its major feature is that it can handle two transition relations: one for time transition and the other for space transition. As for a verification algorithm, a symbolic model checking algorithm of the new logic is shown. This could be applicable to verification of bit-slice microprocessor of infinite bit width and 1D systolic array of infinite length. A simple benchmark result shows the effectiveness of the proposed approach.

  14. Is identity per se irrelevant? A contrarian view of self-verification effects

    OpenAIRE

    Gregg, Aiden P.

    2008-01-01

    Self-verification theory (SVT) posits that people who hold negative self-views, such as depressive patients, ironically strive to verify that these self-views are correct, by actively seeking out critical feedback or interaction partners who evaluate them unfavorably. Such verification strivings are allegedly directed towards maximizing subjective perceptions of prediction and control. Nonetheless, verification strivings are also alleged to stabilize maladaptive self-perceptions, and thereby ...

  15. Numident Online Verification Utility (NOVU)

    Data.gov (United States)

    Social Security Administration — NOVU is a mainframe application that accesses the NUMIDENT to perform real-time SSN verifications. This program is called by other SSA online programs that serve as...

  16. Telomere length and depression

    DEFF Research Database (Denmark)

    Wium-Andersen, Marie Kim; Ørsted, David Dynnes; Rode, Line

    2017-01-01

    BACKGROUND: Depression has been cross-sectionally associated with short telomeres as a measure of biological age. However, the direction and nature of the association is currently unclear. AIMS: We examined whether short telomere length is associated with depression cross-sectionally as well...... as prospectively and genetically. METHOD: Telomere length and three polymorphisms, TERT, TERC and OBFC1, were measured in 67 306 individuals aged 20-100 years from the Danish general population and associated with register-based attendance at hospital for depression and purchase of antidepressant medication....... RESULTS: Attendance at hospital for depression was associated with short telomere length cross-sectionally, but not prospectively. Further, purchase of antidepressant medication was not associated with short telomere length cross-sectionally or prospectively. Mean follow-up was 7.6 years (range 0...

  17. Radiochemical verification and validation in the environmental data collection process

    International Nuclear Information System (INIS)

    Rosano-Reece, D.; Bottrell, D.; Bath, R.J.

    1994-01-01

    A credible and cost effective environmental data collection process should produce analytical data which meets regulatory and program specific requirements. Analytical data, which support the sampling and analysis activities at hazardous waste sites, undergo verification and independent validation before the data are submitted to regulators. Understanding the difference between verification and validation and their respective roles in the sampling and analysis process is critical to the effectiveness of a program. Verification is deciding whether the measurement data obtained are what was requested. The verification process determines whether all the requirements were met. Validation is more complicated than verification. It attempts to assess the impacts on data use, especially when requirements are not met. Validation becomes part of the decision-making process. Radiochemical data consists of a sample result with an associated error. Therefore, radiochemical validation is different and more quantitative than is currently possible for the validation of hazardous chemical data. Radiochemical data include both results and uncertainty that can be statistically compared to identify significance of differences in a more technically defensible manner. Radiochemical validation makes decisions about analyte identification, detection, and uncertainty for a batch of data. The process focuses on the variability of the data in the context of the decision to be made. The objectives of this paper are to present radiochemical verification and validation for environmental data and to distinguish the differences between the two operations

  18. Simulation environment based on the Universal Verification Methodology

    International Nuclear Information System (INIS)

    Fiergolski, A.

    2017-01-01

    Universal Verification Methodology (UVM) is a standardized approach of verifying integrated circuit designs, targeting a Coverage-Driven Verification (CDV). It combines automatic test generation, self-checking testbenches, and coverage metrics to indicate progress in the design verification. The flow of the CDV differs from the traditional directed-testing approach. With the CDV, a testbench developer, by setting the verification goals, starts with an structured plan. Those goals are targeted further by a developed testbench, which generates legal stimuli and sends them to a device under test (DUT). The progress is measured by coverage monitors added to the simulation environment. In this way, the non-exercised functionality can be identified. Moreover, the additional scoreboards indicate undesired DUT behaviour. Such verification environments were developed for three recent ASIC and FPGA projects which have successfully implemented the new work-flow: (1) the CLICpix2 65 nm CMOS hybrid pixel readout ASIC design; (2) the C3PD 180 nm HV-CMOS active sensor ASIC design; (3) the FPGA-based DAQ system of the CLICpix chip. This paper, based on the experience from the above projects, introduces briefly UVM and presents a set of tips and advices applicable at different stages of the verification process-cycle.

  19. TWRS system drawings and field verification

    International Nuclear Information System (INIS)

    Shepard, D.G.

    1995-01-01

    The Configuration Management Program combines the TWRS Labeling and O and M drawing and drawing verification programs. The combined program will produce system drawings for systems that are normally operated or have maintenance performed on the system, label individual pieces of equipment for proper identification, even if system drawings are not warranted, and perform verification of drawings that are identified as essential in Tank Farm Essential Drawing Plans. During fiscal year 1994, work was begun to label Tank Farm components and provide user friendly system based drawings for Tank Waste Remediation System (TWRS) operations and maintenance. During the first half of fiscal 1995, the field verification program continued to convert TWRS drawings into CAD format and verify the accuracy based on visual inspections. During the remainder of fiscal year 1995 these efforts will be combined into a single program providing system based drawings and field verification of TWRS equipment and facilities. This combined program for TWRS will include all active systems for tank farms. Operations will determine the extent of drawing and labeling requirements for single shell tanks, i.e. the electrical distribution, HVAC, leak detection, and the radiation monitoring system. The tasks required to meet these objectives, include the following: identify system boundaries or scope for drawing being verified; label equipment/components in the process systems with a unique Equipment Identification Number (EIN) per the TWRS Data Standard; develop system drawings that are coordinated by ''smart'' drawing numbers and/or drawing references as identified on H-14-020000; develop a Master Equipment List (MEL) multi-user data base application which will contain key information about equipment identified in the field; and field verify and release TWRS Operation and Maintenance (O and M) drawings

  20. NDA techniques for spent fuel verification and radiation monitoring. Report on activities 6a and 6b of Task JNT C799 (SAGOR). Finnish support programme to the IAEA safeguards

    Energy Technology Data Exchange (ETDEWEB)

    Tarvainen, M [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland); Levai, F [Technical Univ., Budabest (Hungary); Valentine, T E [Oak Ridge National Lab., TN (United States); Abhold, M [Los Alamos National Lab., NM (United States); Moran, B [USNRC, Washington, DC (United States)

    1997-08-01

    A variety of NDA methods exist for measurement of spent fuel at various stages of the disposition process. Each of the methods has weaknesses and strengths that make them applicable to one or more stages in disposition. Both passive and active methods are, under favorable conditions, capable of providing either a mapping of an assembly to identify missing fuel pins or a measurement of the fissile content and some are capable of providing a mapping of a canister to identify missing assemblies or a measurement of the fissile content. However, a spent fuel measurement system capable of making routine partial defect tests of spent fuel assemblies is missing. The active NDA methods, in particular, the active neutron methods, hold the most promise for providing quantitative measurements on fuel assemblies and canisters. Application of NDA methods to shielded casks may not be practical or even possible due to the extent of radiation attenuation by the shielding materials, and none of these methods are considered to have potential for quantitative measurements once the spent fuel cask has been placed in a repository. The most practical approach to spent fuel verification is to confirm the characteristics of the spent fuel prior to loading in a canister or cask at the conditioning facility. Fissile material tracking systems in addition to containment and surveillance methods have the capability to assure continuity of the verified knowledge of the sample from loading of the canisters to final disposal and closing of the repository. (orig.). 49 refs.

  1. NDA techniques for spent fuel verification and radiation monitoring. Report on activities 6a and 6b of Task JNT C799 (SAGOR). Finnish support programme to the IAEA safeguards

    International Nuclear Information System (INIS)

    Tarvainen, M.; Levai, F.; Valentine, T.E.; Abhold, M.; Moran, B.

    1997-08-01

    A variety of NDA methods exist for measurement of spent fuel at various stages of the disposition process. Each of the methods has weaknesses and strengths that make them applicable to one or more stages in disposition. Both passive and active methods are, under favorable conditions, capable of providing either a mapping of an assembly to identify missing fuel pins or a measurement of the fissile content and some are capable of providing a mapping of a canister to identify missing assemblies or a measurement of the fissile content. However, a spent fuel measurement system capable of making routine partial defect tests of spent fuel assemblies is missing. The active NDA methods, in particular, the active neutron methods, hold the most promise for providing quantitative measurements on fuel assemblies and canisters. Application of NDA methods to shielded casks may not be practical or even possible due to the extent of radiation attenuation by the shielding materials, and none of these methods are considered to have potential for quantitative measurements once the spent fuel cask has been placed in a repository. The most practical approach to spent fuel verification is to confirm the characteristics of the spent fuel prior to loading in a canister or cask at the conditioning facility. Fissile material tracking systems in addition to containment and surveillance methods have the capability to assure continuity of the verified knowledge of the sample from loading of the canisters to final disposal and closing of the repository. (orig.)

  2. Experimental inventory verification system

    International Nuclear Information System (INIS)

    Steverson, C.A.; Angerman, M.I.

    1991-01-01

    As Low As Reasonably Achievable (ALARA) goals and Department of Energy (DOE) inventory requirements are frequently in conflict at facilities across the DOE complex. The authors wish, on one hand, to verify the presence of correct amounts of nuclear materials that are in storage or in process; yet on the other hand, we wish to achieve ALARA goals by keeping individual and collective exposures as low as social, technical, economic, practical, and public policy considerations permit. The Experimental Inventory Verification System (EIVSystem) is a computer-based, camera-driven system that utilizes image processing technology to detect change in vault areas. Currently in the test and evaluation phase at Idaho National Engineering Laboratory, this system guards personnel. The EIVSystem continually monitors the vault, providing proof of changed status for objects sorted within the vault. This paper reports that these data could provide the basis for reducing inventory requirements when no change has occurred, thus helping implement ALARA policy; the data will also help describe there target area of an inventory when change has been shown to occur

  3. Woodward Effect Experimental Verifications

    Science.gov (United States)

    March, Paul

    2004-02-01

    The work of J. F. Woodward (1990 1996a; 1996b; 1998; 2002a; 2002b; 2004) on the existence of ``mass fluctuations'' and their use in exotic propulsion schemes was examined for possible application in improving space flight propulsion and power generation. Woodward examined Einstein's General Relativity Theory (GRT) and assumed that if the strong Machian interpretation of GRT as well as gravitational / inertia like Wheeler-Feynman radiation reaction forces hold, then when an elementary particle is accelerated through a potential gradient, its rest mass should fluctuate around its mean value during its acceleration. Woodward also used GRT to clarify the precise experimental conditions necessary for observing and exploiting these mass fluctuations or ``Woodward effect'' (W-E). Later, in collaboration with his ex-graduate student T. Mahood, they also pushed the experimental verification boundaries of these proposals. If these purported mass fluctuations occur as Woodward claims, and his assumption that gravity and inertia are both byproducts of the same GRT based phenomenon per Mach's Principle is correct, then many innovative applications such as propellantless propulsion and gravitational exotic matter generators may be feasible. This paper examines the reality of mass fluctuations and the feasibility of using the W-E to design propellantless propulsion devices in the near to mid-term future. The latest experimental results, utilizing MHD-like force rectification systems, will also be presented.

  4. Verification of hypergraph states

    Science.gov (United States)

    Morimae, Tomoyuki; Takeuchi, Yuki; Hayashi, Masahito

    2017-12-01

    Hypergraph states are generalizations of graph states where controlled-Z gates on edges are replaced with generalized controlled-Z gates on hyperedges. Hypergraph states have several advantages over graph states. For example, certain hypergraph states, such as the Union Jack states, are universal resource states for measurement-based quantum computing with only Pauli measurements, while graph state measurement-based quantum computing needs non-Clifford basis measurements. Furthermore, it is impossible to classically efficiently sample measurement results on hypergraph states unless the polynomial hierarchy collapses to the third level. Although several protocols have been proposed to verify graph states with only sequential single-qubit Pauli measurements, there was no verification method for hypergraph states. In this paper, we propose a method for verifying a certain class of hypergraph states with only sequential single-qubit Pauli measurements. Importantly, no i.i.d. property of samples is assumed in our protocol: any artificial entanglement among samples cannot fool the verifier. As applications of our protocol, we consider verified blind quantum computing with hypergraph states, and quantum computational supremacy demonstrations with hypergraph states.

  5. Functional PAK-2 knockout and replacement with a caspase cleavage-deficient mutant in mice reveals differential requirements of full-length PAK-2 and caspase-activated PAK-2p34.

    Science.gov (United States)

    Marlin, Jerry W; Chang, Yu-Wen E; Ober, Margaret; Handy, Amy; Xu, Wenhao; Jakobi, Rolf

    2011-06-01

    p21-Activated protein kinase 2 (PAK-2) has both anti- and pro-apoptotic functions depending on its mechanism of activation. Activation of full-length PAK-2 by the monomeric GTPases Cdc42 or Rac stimulates cell survival, whereas caspase activation of PAK-2 to the PAK-2p34 fragment is involved in the apoptotic response. In this study we use functional knockout of PAK-2 and gene replacement with the caspase cleavage-deficient PAK-2D212N mutant to differentiate the biological functions of full-length PAK-2 and caspase-activated PAK-2p34. Knockout of PAK-2 results in embryonic lethality at early stages before organ development, whereas replacement with the caspase cleavage-deficient PAK-2D212N results in viable and healthy mice, indicating that early embryonic lethality is caused by deficiency of full-length PAK-2 rather than lack of caspase activation to the PAK-2p34 fragment. However, deficiency of caspase activation of PAK-2 decreased spontaneous cell death of primary mouse embryonic fibroblasts and increased cell growth at high cell density. In contrast, stress-induced cell death by treatment with the anti-cancer drug cisplatin was not reduced by deficiency of caspase activation of PAK-2, but switched from an apoptotic to a nonapoptotic, caspase-independent mechanism. Homozygous PAK-2D212N primary mouse embryonic fibroblasts that lack the ability to generate the proapoptotic PAK-2p34 show less activation of the effector caspase 3, 6, and 7, indicating that caspase activation of PAK-2 amplifies the apoptotic response through a positive feedback loop resulting in more activation of effector caspases.

  6. Solid waste operations complex engineering verification program plan

    International Nuclear Information System (INIS)

    Bergeson, C.L.

    1994-01-01

    This plan supersedes, but does not replace, the previous Waste Receiving and Processing/Solid Waste Engineering Development Program Plan. In doing this, it does not repeat the basic definitions of the various types or classes of development activities nor provide the rigorous written description of each facility and assign the equipment to development classes. The methodology described in the previous document is still valid and was used to determine the types of verification efforts required. This Engineering Verification Program Plan will be updated on a yearly basis. This EVPP provides programmatic definition of all engineering verification activities for the following SWOC projects: (1) Project W-026 - Waste Receiving and Processing Facility Module 1; (2) Project W-100 - Waste Receiving and Processing Facility Module 2A; (3) Project W-112 - Phase V Storage Facility; and (4) Project W-113 - Solid Waste Retrieval. No engineering verification activities are defined for Project W-112 as no verification work was identified. The Acceptance Test Procedures/Operational Test Procedures will be part of each project's Title III operation test efforts. The ATPs/OTPs are not covered by this EVPP

  7. Diet, nutrition and telomere length.

    Science.gov (United States)

    Paul, Ligi

    2011-10-01

    The ends of human chromosomes are protected by DNA-protein complexes termed telomeres, which prevent the chromosomes from fusing with each other and from being recognized as a double-strand break by DNA repair proteins. Due to the incomplete replication of linear chromosomes by DNA polymerase, telomeric DNA shortens with repeated cell divisions until the telomeres reach a critical length, at which point the cells enter senescence. Telomere length is an indicator of biological aging, and dysfunction of telomeres is linked to age-related pathologies like cardiovascular disease, Parkinson disease, Alzheimer disease and cancer. Telomere length has been shown to be positively associated with nutritional status in human and animal studies. Various nutrients influence telomere length potentially through mechanisms that reflect their role in cellular functions including inflammation, oxidative stress, DNA integrity, DNA methylation and activity of telomerase, the enzyme that adds the telomeric repeats to the ends of the newly synthesized DNA. Copyright © 2011 Elsevier Inc. All rights reserved.

  8. Extended fuel cycle length

    International Nuclear Information System (INIS)

    Bruyere, M.; Vallee, A.; Collette, C.

    1986-09-01

    Extended fuel cycle length and burnup are currently offered by Framatome and Fragema in order to satisfy the needs of the utilities in terms of fuel cycle cost and of overall systems cost optimization. We intend to point out the consequences of an increased fuel cycle length and burnup on reactor safety, in order to determine whether the bounding safety analyses presented in the Safety Analysis Report are applicable and to evaluate the effect on plant licensing. This paper presents the results of this examination. The first part indicates the consequences of increased fuel cycle length and burnup on the nuclear data used in the bounding accident analyses. In the second part of this paper, the required safety reanalyses are presented and the impact on the safety margins of different fuel management strategies is examined. In addition, systems modifications which can be required are indicated

  9. Design verification for large reprocessing plants (Proposed procedures)

    International Nuclear Information System (INIS)

    Rolandi, G.

    1988-07-01

    In the 1990s, four large commercial reprocessing plants will progressively come into operation: If an effective and efficient safeguards system is to be applied to these large and complex plants, several important factors have to be considered. One of these factors, addressed in the present report, concerns plant design verification. Design verification provides an overall assurance on plant measurement data. To this end design verification, although limited to the safeguards aspects of the plant, must be a systematic activity, which starts during the design phase, continues during the construction phase and is particularly performed during the various steps of the plant's commissioning phase. The detailed procedures for design information verification on commercial reprocessing plants must be defined within the frame of the general provisions set forth in INFCIRC/153 for any type of safeguards related activities and specifically for design verification. The present report is intended as a preliminary contribution on a purely technical level, and focusses on the problems within the Agency. For the purpose of the present study the most complex case was assumed: i.e. a safeguards system based on conventional materials accountancy, accompanied both by special input and output verification and by some form of near-real-time accountancy involving in-process inventory taking, based on authenticated operator's measurement data. C/S measures are also foreseen, where necessary to supplement the accountancy data. A complete ''design verification'' strategy comprehends: informing the Agency of any changes in the plant system which are defined as ''safeguards relevant''; ''reverifying by the Agency upon receiving notice from the Operator on any changes, on ''design information''. 13 refs

  10. Organics Verification Study for Sinclair and Dyes Inlets, Washington

    Energy Technology Data Exchange (ETDEWEB)

    Kohn, Nancy P.; Brandenberger, Jill M.; Niewolny, Laurie A.; Johnston, Robert K.

    2006-09-28

    Sinclair and Dyes Inlets near Bremerton, Washington, are on the State of Washington 1998 303(d) list of impaired waters because of fecal coliform contamination in marine water, metals in sediment and fish tissue, and organics in sediment and fish tissue. Because significant cleanup and source control activities have been conducted in the inlets since the data supporting the 1998 303(d) listings were collected, two verification studies were performed to address the 303(d) segments that were listed for metal and organic contaminants in marine sediment. The Metals Verification Study (MVS) was conducted in 2003; the final report, Metals Verification Study for Sinclair and Dyes Inlets, Washington, was published in March 2004 (Kohn et al. 2004). This report describes the Organics Verification Study that was conducted in 2005. The study approach was similar to the MVS in that many surface sediment samples were screened for the major classes of organic contaminants, and then the screening results and other available data were used to select a subset of samples for quantitative chemical analysis. Because the MVS was designed to obtain representative data on concentrations of contaminants in surface sediment throughout Sinclair Inlet, Dyes Inlet, Port Orchard Passage, and Rich Passage, aliquots of the 160 MVS sediment samples were used in the analysis for the Organics Verification Study. However, unlike metals screening methods, organics screening methods are not specific to individual organic compounds, and are not available for some target organics. Therefore, only the quantitative analytical results were used in the organics verification evaluation. The results of the Organics Verification Study showed that sediment quality outside of Sinclair Inlet is unlikely to be impaired because of organic contaminants. Similar to the results for metals, in Sinclair Inlet, the distribution of residual organic contaminants is generally limited to nearshore areas already within the

  11. Relativistic distances, sizes, lengths

    International Nuclear Information System (INIS)

    Strel'tsov, V.N.

    1992-01-01

    Such notion as light or retarded distance, field size, formation way, visible size of a body, relativistic or radar length and wave length of light from a moving atom are considered. The relation between these notions is cleared up, their classification is given. It is stressed that the formation way is defined by the field size of a moving particle. In the case of the electromagnetic field, longitudinal sizes increase proportionally γ 2 with growing charge velocity (γ is the Lorentz-factor). 18 refs

  12. Disarmament Verification - the OPCW Experience

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  13. Verification of Chemical Weapons Destruction

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  14. Calibration and verification of surface contamination meters --- Procedures and techniques

    International Nuclear Information System (INIS)

    Schuler, C; Butterweck, G.; Wernli, C.; Bochud, F.; Valley, J.-F.

    2007-03-01

    A standardised measurement procedure for surface contamination meters (SCM) is presented. The procedure aims at rendering surface contamination measurements to be simply and safely interpretable. Essential for the approach is the introduction and common use of the radionuclide specific quantity 'guideline value' specified in the Swiss Radiation Protection Ordinance as unit for the measurement of surface activity. The according radionuclide specific 'guideline value count rate' can be summarized as verification reference value for a group of radionuclides ('basis guideline value count rate'). The concept can be generalized for SCM of the same type or for SCM of different types using he same principle of detection. A SCM multi source calibration technique is applied for the determination of the instrument efficiency. Four different electron radiation energy regions, four different photon radiation energy regions and an alpha radiation energy region are represented by a set of calibration sources built according to ISO standard 8769-2. A guideline value count rate representing the activity per unit area of a surface contamination of one guideline value can be calculated for any radionuclide using instrument efficiency, radionuclide decay data, contamination source efficiency, guideline value averaging area (100 cm 2 ), and radionuclide specific guideline value. n this way, instrument responses for the evaluation of surface contaminations are obtained for radionuclides without available calibration sources as well as for short-Iived radionuclides, for which the continuous replacement of certified calibration sources can lead to unreasonable costs. SCM verification is based on surface emission rates of reference sources with an active area of 100 cm 2 . The verification for a given list of radionuclides is based on the radionuclide specific quantity guideline value count rate. Guideline value count rates for groups of radionuclides can be represented within the maximum

  15. Effect of the hydrophilic block length on the surface-active and micellar thermodynamic properties of oxyethylene-oxybutylene diblock copolymers in aqueous solution

    International Nuclear Information System (INIS)

    Khan, A.; Usman, M.; Siddiq, M.; Fatima, G.; Harrison, W.

    2009-01-01

    The effect of hydrophilic block length on the surface and micellar thermodynamic properties of aqueous solution of E/sub 40/B/sub 8/, E/sub 80/B/sub 8/ and E/sub 120/B/sub 8/ diblock copolymers, were studied by surface tension measurements over a wide concentration and temperature range; where E stands for an oxyethylene unit and B for an oxybutylene unit. Like conventional surfactants, two breaks (change in the slope) were observed in the surface tension vs logarithm of concentration curve for all the three copolymers. Surface tension measurements were used to estimate surface excess concentrations (r m), area per molecule at air/water interface a and thermodynamic parameters for all adsorption of the pre-micellar region in the temperature range 20 to 50 degree C. Likewise the critical micelle concentration, CMC and thermodynamic parameters for micellization were also calculated for the post-micellar solutions at all temperatures. For comparison the thermodynamic parameters of adsorption and micellization are discussed in detail. The impact of varying E-block length and temperature on all calculated parameters are also discussed. This study shows the importance of hydrophobic-hydrophilic-balance (HHB) of copolymers on various surface and micellar properties. (author)

  16. CASL Verification and Validation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Mousseau, Vincent Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dinh, Nam [North Carolina State Univ., Raleigh, NC (United States)

    2016-06-30

    This report documents the Consortium for Advanced Simulation of LWRs (CASL) verification and validation plan. The document builds upon input from CASL subject matter experts, most notably the CASL Challenge Problem Product Integrators, CASL Focus Area leaders, and CASL code development and assessment teams. This document will be a living document that will track progress on CASL to do verification and validation for both the CASL codes (including MPACT, CTF, BISON, MAMBA) and for the CASL challenge problems (CIPS, PCI, DNB). The CASL codes and the CASL challenge problems are at differing levels of maturity with respect to validation and verification. The gap analysis will summarize additional work that needs to be done. Additional VVUQ work will be done as resources permit. This report is prepared for the Department of Energy’s (DOE’s) CASL program in support of milestone CASL.P13.02.

  17. Technical challenges for dismantlement verification

    International Nuclear Information System (INIS)

    Olinger, C.T.; Stanbro, W.D.; Johnston, R.G.; Nakhleh, C.W.; Dreicer, J.S.

    1997-01-01

    In preparation for future nuclear arms reduction treaties, including any potential successor treaties to START I and II, the authors have been examining possible methods for bilateral warhead dismantlement verification. Warhead dismantlement verification raises significant challenges in the political, legal, and technical arenas. This discussion will focus on the technical issues raised by warhead arms controls. Technical complications arise from several sources. These will be discussed under the headings of warhead authentication, chain-of-custody, dismantlement verification, non-nuclear component tracking, component monitoring, and irreversibility. The authors will discuss possible technical options to address these challenges as applied to a generic dismantlement and disposition process, in the process identifying limitations and vulnerabilities. They expect that these considerations will play a large role in any future arms reduction effort and, therefore, should be addressed in a timely fashion

  18. Structure of physical activity in inhabitants of the Moravian-Silesian region between 2005-2009 with regard to formal length of education

    Directory of Open Access Journals (Sweden)

    Igor Fojtík

    2012-03-01

    Full Text Available BACKGROUND: Regular physical activity is an important factor in human health status. The fact, that the physical activity will be regular, is influenced by many internal and external individual factors. Education is considered to be an important factor that influences physical activity. There has not been fully clarified the relationship between physical activity and education in pursuit of regional indicators yet. AIM: The aim of this study was to analyze the physical activity of adult inhabitants of the Moravian-Silesian region with regard to the number of years spent in formal education. METHODS: The research sample consisted of 759 residents of MoravianSilesian region (419 women and 340 men aged 25-58. The IPAQ questionnaire was used to obtain the data, which was distributed by trained university students in the spring and autumn periods of 2005-2009. Kruskal Wallis ANOVA test was used for the statistical evaluation of the data. The effect size was calculated to clarify the internal differences in results. RESULTS: Significant differences in the structure of physical activity were found only in men in the job related physical activity (H = 6.277; p = 0.05; η2 = 0.019 and in vigorous physical activity (H = 6.230; p = 0.05; η2 = 0.018. Physically most active are men with lowest level of education. No significant difference was found in the monitored parameters for women. Job related physical activity means the highest part of the total physical activity in respondents with lowest education. CONCLUSION: The results of the survey point to the fact, that different level of education is not an important factor associated with physical activity in Moravian-Silesian region. To promote physical activity we would recommend focusing on physical activity in leisure time, during transport and on vigorous physical activity in all groups of respondents based on educational level.

  19. Utterance Verification for Text-Dependent Speaker Recognition

    DEFF Research Database (Denmark)

    Kinnunen, Tomi; Sahidullah, Md; Kukanov, Ivan

    2016-01-01

    Text-dependent automatic speaker verification naturally calls for the simultaneous verification of speaker identity and spoken content. These two tasks can be achieved with automatic speaker verification (ASV) and utterance verification (UV) technologies. While both have been addressed previously...

  20. Atomic frequency-time-length standards

    International Nuclear Information System (INIS)

    Gheorghiu, O.C.; Mandache, C.

    1987-01-01

    The principles of operative of atomic frequency-time-length standards and their principle characteristics are described. The role of quartz crystal oscillators which are sloved to active or passive standards is presented. (authors)

  1. Formal Verification of Continuous Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer

    2012-01-01

    and the verification procedures should be algorithmically synthesizable. Autonomous control plays an important role in many safety-critical systems. This implies that a malfunction in the control system can have catastrophic consequences, e.g., in space applications where a design flaw can result in large economic...... losses. Furthermore, a malfunction in the control system of a surgical robot may cause death of patients. The previous examples involve complex systems that are required to operate according to complex specifications. The systems cannot be formally verified by modern verification techniques, due...

  2. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  3. IMRT plan verification in radiotherapy

    International Nuclear Information System (INIS)

    Vlk, P.

    2006-01-01

    This article describes the procedure for verification of IMRT (Intensity modulated radiation therapy) plan, which is used in the Oncological Institute of St. Elisabeth in Bratislava. It contains basic description of IMRT technology and developing a deployment plan for IMRT planning system CORVUS 6.0, the device Mimic (Multilammelar intensity modulated collimator) and the overall process of verifying the schedule created. The aim of verification is particularly good control of the functions of MIMIC and evaluate the overall reliability of IMRT planning. (author)

  4. K Basins Field Verification Program

    International Nuclear Information System (INIS)

    Booth, H.W.

    1994-01-01

    The Field Verification Program establishes a uniform and systematic process to ensure that technical information depicted on selected engineering drawings accurately reflects the actual existing physical configuration. This document defines the Field Verification Program necessary to perform the field walkdown and inspection process that identifies the physical configuration of the systems required to support the mission objectives of K Basins. This program is intended to provide an accurate accounting of the actual field configuration by documenting the as-found information on a controlled drawing

  5. Runtime Verification Through Forward Chaining

    Directory of Open Access Journals (Sweden)

    Alan Perotti

    2014-12-01

    Full Text Available In this paper we present a novel rule-based approach for Runtime Verification of FLTL properties over finite but expanding traces. Our system exploits Horn clauses in implication form and relies on a forward chaining-based monitoring algorithm. This approach avoids the branching structure and exponential complexity typical of tableaux-based formulations, creating monitors with a single state and a fixed number of rules. This allows for a fast and scalable tool for Runtime Verification: we present the technical details together with a working implementation.

  6. Pion nucleus scattering lengths

    International Nuclear Information System (INIS)

    Huang, W.T.; Levinson, C.A.; Banerjee, M.K.

    1971-09-01

    Soft pion theory and the Fubini-Furlan mass dispersion relations have been used to analyze the pion nucleon scattering lengths and obtain a value for the sigma commutator term. With this value and using the same principles, scattering lengths have been predicted for nuclei with mass number ranging from 6 to 23. Agreement with experiment is very good. For those who believe in the Gell-Mann-Levy sigma model, the evaluation of the commutator yields the value 0.26(m/sub σ//m/sub π/) 2 for the sigma nucleon coupling constant. The large dispersive corrections for the isosymmetric case implies that the basic idea behind many of the soft pion calculations, namely, slow variation of matrix elements from the soft pion limit to the physical pion mass, is not correct. 11 refs., 1 fig., 3 tabs

  7. Gap length distributions by PEPR

    International Nuclear Information System (INIS)

    Warszawer, T.N.

    1980-01-01

    Conditions guaranteeing exponential gap length distributions are formulated and discussed. Exponential gap length distributions of bubble chamber tracks first obtained on a CRT device are presented. Distributions of resulting average gap lengths and their velocity dependence are discussed. (orig.)

  8. A Scalable Approach for Hardware Semiformal Verification

    OpenAIRE

    Grimm, Tomas; Lettnin, Djones; Hübner, Michael

    2018-01-01

    The current verification flow of complex systems uses different engines synergistically: virtual prototyping, formal verification, simulation, emulation and FPGA prototyping. However, none is able to verify a complete architecture. Furthermore, hybrid approaches aiming at complete verification use techniques that lower the overall complexity by increasing the abstraction level. This work focuses on the verification of complex systems at the RT level to handle the hardware peculiarities. Our r...

  9. FINAL INTERIM REPORT VERIFICATION SURVEY ACTIVITIES IN FINAL STATUS SURVEY UNITS 7, 8, 9, 10, 11, 13 and 14 AT THE SEPARATIONS PROCESS RESEARCH UNIT, NISKAYUNA, NEW YORK

    International Nuclear Information System (INIS)

    Jadick, M.G.

    2010-01-01

    The Separations Process Research Unit (SPRU) facilities were constructed in the late 1940s to research the chemical separation of plutonium and uranium. SPRU operated between February 1950 and October 1953. The research activities ceased following the successful development of the reduction/oxidation and plutonium/uranium extraction processes that were subsequently used by the Hanford and the Savannah River sites.

  10. Verification and validation of computer based systems for PFBR

    International Nuclear Information System (INIS)

    Thirugnanamurthy, D.

    2017-01-01

    Verification and Validation (V and V) process is essential to build quality into system. Verification is the process of evaluating a system to determine whether the products of each development phase satisfies the requirements imposed by the previous phase. Validation is the process of evaluating a system at the end of the development process to ensure compliance with the functional, performance and interface requirements. This presentation elaborates the V and V process followed, documents submission requirements in each stage, V and V activities, check list used for reviews in each stage and reports

  11. Partner verification: restoring shattered images of our intimates.

    Science.gov (United States)

    De La Ronde, C; Swann, W B

    1998-08-01

    When spouses received feedback that disconfirmed their impressions of their partners, they attempted to undermine that feedback during subsequent interactions with these partners. Such partner verification activities occurred whether partners construed the feedback as overly favorable or overly unfavorable. Furthermore, because spouses tended to see their partners as their partners saw themselves, their efforts to restore their impressions of partners often worked hand-in-hand with partners' efforts to verify their own views. Finally, support for self-verification theory emerged in that participants were more intimate with spouses who verified their self-views, whether their self-views happened to be positive or negative.

  12. Verification of dosimetry cross sections above 10 MeV based on measurement of activation reaction rates in fission neutron field

    International Nuclear Information System (INIS)

    Odano, Naoteru; Miura, Toshimasa; Yamaji, Akio.

    1996-01-01

    To validate the dosimetry cross sections in fast neutron energy range, activation reaction rates were measured for 5 types of dosimetry cross sections which have sensitivity in the energy rage above 10 MeV utilizing JRR-4 reactor of JAERI. The measured reaction rates were compared with the calculations reaction rates by a continuous energy monte carlo code MVP. The calculated reaction rates were based on two dosimetry files, JENDL Dosimetry File and IRDF-90.2. (author)

  13. A static analysis tool set for assembler code verification

    International Nuclear Information System (INIS)

    Dhodapkar, S.D.; Bhattacharjee, A.K.; Sen, Gopa

    1991-01-01

    Software Verification and Validation (V and V) is an important step in assuring reliability and quality of the software. The verification of program source code forms an important part of the overall V and V activity. The static analysis tools described here are useful in verification of assembler code. The tool set consists of static analysers for Intel 8086 and Motorola 68000 assembly language programs. The analysers examine the program source code and generate information about control flow within the program modules, unreachable code, well-formation of modules, call dependency between modules etc. The analysis of loops detects unstructured loops and syntactically infinite loops. Software metrics relating to size and structural complexity are also computed. This report describes the salient features of the design, implementation and the user interface of the tool set. The outputs generated by the analyser are explained using examples taken from some projects analysed by this tool set. (author). 7 refs., 17 figs

  14. DESIGN INFORMATION VERIFICATION FOR NUCLEAR SAFEGUARDS

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Bean; Richard R. M. Metcalf; Phillip C. Durst

    2009-07-01

    A critical aspect of international safeguards activities performed by the International Atomic Energy Agency (IAEA) is the verification that facility design and construction (including upgrades and modifications) do not create opportunities for nuclear proliferation. These Design Information Verification activities require that IAEA inspectors compare current and past information about the facility to verify the operator’s declaration of proper use. The actual practice of DIV presents challenges to the inspectors due to the large amount of data generated, concerns about sensitive or proprietary data, the overall complexity of the facility, and the effort required to extract just the safeguards relevant information. Planned and anticipated facilities will (especially in the case of reprocessing plants) be ever larger and increasingly complex, thus exacerbating the challenges. This paper reports the results of a workshop held at the Idaho National Laboratory in March 2009, which considered technologies and methods to address these challenges. The use of 3D Laser Range Finding, Outdoor Visualization System, Gamma-LIDAR, and virtual facility modeling, as well as methods to handle the facility data issues (quantity, sensitivity, and accessibility and portability for the inspector) were presented. The workshop attendees drew conclusions about the use of these techniques with respect to successfully employing them in an operating environment, using a Fuel Conditioning Facility walk-through as a baseline for discussion.

  15. Automated Verification of Virtualized Infrastructures

    DEFF Research Database (Denmark)

    Bleikertz, Sören; Gross, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    Virtualized infrastructures and clouds present new challenges for security analysis and formal verification: they are complex environments that continuously change their shape, and that give rise to non-trivial security goals such as isolation and failure resilience requirements. We present a pla...

  16. Hot cell verification facility update

    International Nuclear Information System (INIS)

    Titzler, P.A.; Moffett, S.D.; Lerch, R.E.

    1985-01-01

    The Hot Cell Verification Facility (HCVF) provides a prototypic hot cell mockup to check equipment for functional and remote operation, and provides actual hands-on training for operators. The facility arrangement is flexible and assists in solving potential problems in a nonradioactive environment. HCVF has been in operation for six years, and the facility is a part of the Hanford Engineering Development Laboratory

  17. Static Verification for Code Contracts

    Science.gov (United States)

    Fähndrich, Manuel

    The Code Contracts project [3] at Microsoft Research enables programmers on the .NET platform to author specifications in existing languages such as C# and VisualBasic. To take advantage of these specifications, we provide tools for documentation generation, runtime contract checking, and static contract verification.

  18. Verification of safety critical software

    International Nuclear Information System (INIS)

    Son, Ki Chang; Chun, Chong Son; Lee, Byeong Joo; Lee, Soon Sung; Lee, Byung Chai

    1996-01-01

    To assure quality of safety critical software, software should be developed in accordance with software development procedures and rigorous software verification and validation should be performed. Software verification is the formal act of reviewing, testing of checking, and documenting whether software components comply with the specified requirements for a particular stage of the development phase[1]. New software verification methodology was developed and was applied to the Shutdown System No. 1 and 2 (SDS1,2) for Wolsung 2,3 and 4 nuclear power plants by Korea Atomic Energy Research Institute(KAERI) and Atomic Energy of Canada Limited(AECL) in order to satisfy new regulation requirements of Atomic Energy Control Boars(AECB). Software verification methodology applied to SDS1 for Wolsung 2,3 and 4 project will be described in this paper. Some errors were found by this methodology during the software development for SDS1 and were corrected by software designer. Outputs from Wolsung 2,3 and 4 project have demonstrated that the use of this methodology results in a high quality, cost-effective product. 15 refs., 6 figs. (author)

  19. Eggspectation : organic egg verification tool

    NARCIS (Netherlands)

    Ruth, van S.M.; Hoogenboom, L.A.P.

    2011-01-01

    In 2009 RIKILT conducted a study on about 2,000 eggs to evaluate three different analytical verification methods: carotenoid profiling, fatty acid profiling and isotope ratio mass spectrometry. The eggs were collected from about 50 Dutch farms. The selection was based on the farms’ location and

  20. 50 CFR 216.93 - Tracking and verification program.

    Science.gov (United States)

    2010-10-01

    .... purse seine fishing, processing, and marketing in the United States and abroad. Verification of tracking... the Agreement on the IDCP. (d) Tracking cannery operations. (1) Whenever a U.S. tuna canning company..., canning, sale, rejection, etc.). (4) During canning activities, non-dolphin-safe tuna may not be mixed in...

  1. Status and verification strategy for ITER neutronics

    Energy Technology Data Exchange (ETDEWEB)

    Loughlin, Michael, E-mail: michael.loughlin@iter.org [ITER Organization, Route de Vinon sur Verdon, 13115 Saint Paul Lez Durance (France); Angelone, Maurizio [Associazione EURATOM-ENEA Sulla Fusione, Via E. Fermi 45, I-00044 Frascati, Roma (Italy); Batistoni, Paola [Associazione EURATOM-ENEA Sulla Fusione, Via E. Fermi 45, I-00044 Frascati, Roma (Italy); JET-EFDA, Culham Science Centre, Abingdon OX14 3DB (United Kingdom); Bertalot, Luciano [ITER Organization, Route de Vinon sur Verdon, 13115 Saint Paul Lez Durance (France); Eskhult, Jonas [Studsvik Nuclear AB, SE-611 Nyköping (Sweden); Konno, Chikara [Japan Atomic Energy Agency Tokai-mura, Naka-gun, Ibaraki-ken 319-1195 (Japan); Pampin, Raul [F4E Fusion for Energy, Josep Pla 2, Torres Diagonal Litoral B3, Barcelona 08019 (Spain); Polevoi, Alexei; Polunovskiy, Eduard [ITER Organization, Route de Vinon sur Verdon, 13115 Saint Paul Lez Durance (France)

    2014-10-15

    The paper summarizes the current status of neutronics at ITER and a first set of proposals for experimental programmes to be conducted in the early operational life-time of ITER are described for the more crucial areas. These include a TF coils heating benchmark, a streaming benchmark and streaming measurements by activation on ITER itself. Also on ITER the measurement of activated water from triton burn-up should be planned and performed. This will require the measurement of triton burn-up in DD phase. Measurements of neutron flux in the tokamak building during DD operations should also be carried out. The use of JET for verification of shut down dose rate estimates is desirable. Other facilities to examine the production and behaviour of activated corrosion products and the shielding properties of concretes to high energy (6 MeV) gamma-rays are recommended.

  2. Specification and Verification of Hybrid System

    International Nuclear Information System (INIS)

    Widjaja, Belawati H.

    1997-01-01

    Hybrid systems are reactive systems which intermix between two components, discrete components and continuous components. The continuous components are usually called plants, subject to disturbances which cause the state variables of the systems changing continuously by physical laws and/or by the control laws. The discrete components can be digital computers, sensor and actuators controlled by programs. These programs are designed to select, control and supervise the behavior of the continuous components. Specification and verification of hybrid systems has recently become an active area of research in both computer science and control engineering, many papers concerning hybrid system have been published. This paper gives a design methodology for hybrid systems as an example to the specification and verification of hybrid systems. The design methodology is based on the cooperation between two disciplines, control engineering and computer science. The methodology brings into the design of control loops and decision loops. The external behavior of control loops are specified in a notation which is understandable by the two disciplines. The design of control loops which employed theory of differential equation is done by control engineers, and its correctness is also guaranteed analytically or experimentally by control engineers. The decision loops are designed in computing science based on the specifications of control loops. The verification of systems requirements can be done by computing scientists using a formal reasoning mechanism. For illustrating the proposed design, a problem of balancing an inverted pendulum which is a popular experiment device in control theory is considered, and the Mean Value Calculus is chosen as a formal notation for specifying the control loops and designing the decision loops

  3. VEG-01: Veggie Hardware Verification Testing

    Science.gov (United States)

    Massa, Gioia; Newsham, Gary; Hummerick, Mary; Morrow, Robert; Wheeler, Raymond

    2013-01-01

    The Veggie plant/vegetable production system is scheduled to fly on ISS at the end of2013. Since much of the technology associated with Veggie has not been previously tested in microgravity, a hardware validation flight was initiated. This test will allow data to be collected about Veggie hardware functionality on ISS, allow crew interactions to be vetted for future improvements, validate the ability of the hardware to grow and sustain plants, and collect data that will be helpful to future Veggie investigators as they develop their payloads. Additionally, food safety data on the lettuce plants grown will be collected to help support the development of a pathway for the crew to safely consume produce grown on orbit. Significant background research has been performed on the Veggie plant growth system, with early tests focusing on the development of the rooting pillow concept, and the selection of fertilizer, rooting medium and plant species. More recent testing has been conducted to integrate the pillow concept into the Veggie hardware and to ensure that adequate water is provided throughout the growth cycle. Seed sanitation protocols have been established for flight, and hardware sanitation between experiments has been studied. Methods for shipping and storage of rooting pillows and the development of crew procedures and crew training videos for plant activities on-orbit have been established. Science verification testing was conducted and lettuce plants were successfully grown in prototype Veggie hardware, microbial samples were taken, plant were harvested, frozen, stored and later analyzed for microbial growth, nutrients, and A TP levels. An additional verification test, prior to the final payload verification testing, is desired to demonstrate similar growth in the flight hardware and also to test a second set of pillows containing zinnia seeds. Issues with root mat water supply are being resolved, with final testing and flight scheduled for later in 2013.

  4. Effects of physical activity during pregnancy and gestational weight gain on newborn weight and length at birth in Warmińsko-Mazurskie province

    OpenAIRE

    Katarzyna Przybyłowicz; Mariusz Przybyłowicz; Marek Grzybiak; Katarzyna Janiszewska

    2014-01-01

    Background. Epidemiological research has identifi ed a relationship between maternal physical activity, early nutrition and infant birth weight with likelihood of developing future diseases. The aim of the study was to determine a relationship between gestational weight gain and physical activity during pregnancy to the nutritional status of newborns. Material and methods. The presented study was conducted in the period from February 2010 until November 2012 in the gynecological and obste...

  5. Odd Length Contraction

    Science.gov (United States)

    Smarandache, Florentin

    2013-09-01

    Let's denote by VE the speed of the Earth and byVR the speed of the rocket. Both travel in the same direction on parallel trajectories. We consider the Earth as a moving (at a constant speed VE -VR) spacecraft of almost spherical form, whose radius is r and thus the diameter 2r, and the rocket as standing still. The non-proper length of Earth's diameter, as measured by the astronaut is: L = 2 r√{ 1 -|/VE -VR|2 c2 } rocket! Also, let's assume that the astronaut is laying down in the direction of motion. Therefore, he would also shrink, or he would die!

  6. discouraged by queue length

    Directory of Open Access Journals (Sweden)

    P. R. Parthasarathy

    2001-01-01

    Full Text Available The transient solution is obtained analytically using continued fractions for a state-dependent birth-death queue in which potential customers are discouraged by the queue length. This queueing system is then compared with the well-known infinite server queueing system which has the same steady state solution as the model under consideration, whereas their transient solutions are different. A natural measure of speed of convergence of the mean number in the system to its stationarity is also computed.

  7. Verification of key odorants in rose oil by gas chromatography-olfactometry/aroma extract dilution analysis, odour activity value and aroma recombination.

    Science.gov (United States)

    Xiao, Zuobing; Li, Jing; Niu, Yunwei; Liu, Qiang; Liu, Junhua

    2017-10-01

    Rose oil is much too expensive but very popular. It's well known that the flower oil's aroma profile hasn't been intensively investigated. In order to verify the aroma profile of rose oil, the synthetic blend of odorants was prepared and then compared with the original rose oil using electronic nose analysis (ENA) combined with quantitative descriptive analysis (QDA). The odorants from rose oils were screened out by Gas Chromatography-Olfactometry/aroma extract dilution analysis (GC-O/AEDA) combined with odour activity value (OAV). Both ENA and QDA indicated the recombination model derived from OAV and GC-O/AEDA closely resembled the original rose oil. The experiment results show that rose oxide, linalool, α-pinene, β-pinene, nonanal, heptanal citronellal, phenyl ethyl alcohol, benzyl alcohol, eugenol, methyl eugenol, β-citronellol, hexyl acetate, β-ionone, nerol, etc. are very important constituent to rose oil aroma profile.

  8. Kinetic analysis of anionic surfactant adsorption from aqueous solution onto activated carbon and layered double hydroxide with the zero length column method

    NARCIS (Netherlands)

    Schouten, N.; van der Ham, Aloysius G.J.; Euverink, G.J.W.; de Haan, A.B.

    2009-01-01

    Low cost adsorption technology offers high potential to clean-up laundry rinsing water. From an earlier selection of adsorbents, layered double hydroxide (LDH) and granular activated carbon (GAC) proved to be interesting materials for the removal of anionic surfactant, linear alkyl benzene sulfonate

  9. Laboratory verification of the Active Particle-induced X-ray Spectrometer (APXS) on the Chang'e-3 mission

    International Nuclear Information System (INIS)

    Zhang, Guang-Liang; Li, Chun-Lai; Fu, Xiao-Hui; Zhang, Li-Yan; Ban, Cao; Li, Han; Zou, Yong-Liao; Peng, Wen-Xi; Cui, Xing-Zhu; Zhang, Cheng-Mo; Wang, Huan-Yu

    2015-01-01

    In the Chang'e-3 mission, the Active Particle-induced X-ray Spectrometer (APXS) on the Yutu rover is used to analyze the chemical composition of lunar soil and rock samples. APXS data are only valid are only if the sensor head gets close to the target and integration time lasts long enough. Therefore, working distance and integration time are the dominant factors that affect APXS results. This study confirms the ability of APXS to detect elements and investigates the effects of distance and time on the measurements. We make use of a backup APXS instrument to determine the chemical composition of both powder and bulk samples under the conditions of different working distances and integration times. The results indicate that APXS can detect seven major elements, including Mg, Al, Si, K, Ca, Ti and Fe under the condition that the working distance is less than 30 mm and having an integration time of 30 min. The statistical deviation is smaller than 15%. This demonstrates the instrument's ability to detect major elements in the sample. Our measurements also indicate the increase of integration time could reduce the measurement error of peak area, which is useful for detecting the elements Mg, Al and Si. However, an increase in working distance can result in larger errors in measurement, which significantly affects the detection of the element Mg. (paper)

  10. Application of Integrated Verification Approach to FPGA-based Safety-Critical I and C System of Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Ahmed, Ibrahim; Heo, Gyunyoung [Kyunghee Univ., Yongin (Korea, Republic of); Jung, Jaecheon [KEPCO, Ulsan (Korea, Republic of)

    2016-10-15

    Safety-critical instrumentation and control (I and C) system in nuclear power plant (NPP) implemented on programmable logic controllers (PLCs) plays a vital role in safe operation of the plant. The challenges such as fast obsolescence, the vulnerability to cyber-attack, and other related issues of software systems have currently led to the consideration of field programmable gate arrays (FPGAs) as an alternative to PLCs because of their advantages and hardware related benefits. Generally in FPGA design verification, the designers make use of verification techniques by writing the test benches which involved various stages of verification activities of register-transfer level (RTL), gate-level, and place and route. Writing the test benches is considerably time consuming and require a lot of efforts to achieve a satisfied desire results. Furthermore, performing the verification at each stage is a major bottleneck and demanded much activities and time. In addition, verification is conceivably, the most difficult and complicated aspect of any design. Therefore, in view of these, this work applied an integrated verification approach to the verification of FPGA-based I and C system in NPP that simultaneously verified the whole design modules using MATLAB/Simulink HDL Co-simulation models. Verification is conceivably, the most difficult and complicated aspect of any design, and an FPGA design is not an exception. Therefore, in this work, we introduced and discussed how an application of integrated verification technique to the verification and testing of FPGA-based I and C system design in NPP can facilitate the verification processes, and verify the entire design modules of the system simultaneously using MATLAB/Simulink HDL co-simulation models. In conclusion, the results showed that, the integrated verification approach through MATLAB/Simulink models, if applied to any design to be verified, could speed up the design verification and reduce the V and V tasks.

  11. Application of Integrated Verification Approach to FPGA-based Safety-Critical I and C System of Nuclear Power Plant

    International Nuclear Information System (INIS)

    Ahmed, Ibrahim; Heo, Gyunyoung; Jung, Jaecheon

    2016-01-01

    Safety-critical instrumentation and control (I and C) system in nuclear power plant (NPP) implemented on programmable logic controllers (PLCs) plays a vital role in safe operation of the plant. The challenges such as fast obsolescence, the vulnerability to cyber-attack, and other related issues of software systems have currently led to the consideration of field programmable gate arrays (FPGAs) as an alternative to PLCs because of their advantages and hardware related benefits. Generally in FPGA design verification, the designers make use of verification techniques by writing the test benches which involved various stages of verification activities of register-transfer level (RTL), gate-level, and place and route. Writing the test benches is considerably time consuming and require a lot of efforts to achieve a satisfied desire results. Furthermore, performing the verification at each stage is a major bottleneck and demanded much activities and time. In addition, verification is conceivably, the most difficult and complicated aspect of any design. Therefore, in view of these, this work applied an integrated verification approach to the verification of FPGA-based I and C system in NPP that simultaneously verified the whole design modules using MATLAB/Simulink HDL Co-simulation models. Verification is conceivably, the most difficult and complicated aspect of any design, and an FPGA design is not an exception. Therefore, in this work, we introduced and discussed how an application of integrated verification technique to the verification and testing of FPGA-based I and C system design in NPP can facilitate the verification processes, and verify the entire design modules of the system simultaneously using MATLAB/Simulink HDL co-simulation models. In conclusion, the results showed that, the integrated verification approach through MATLAB/Simulink models, if applied to any design to be verified, could speed up the design verification and reduce the V and V tasks

  12. Nonintrusive verification attributes for excess fissile materials

    International Nuclear Information System (INIS)

    Nicholas, N.J.; Eccleston, G.W.; Fearey, B.L.

    1997-10-01

    Under US initiatives, over two hundred metric tons of fissile materials have been declared to be excess to national defense needs. These excess materials are in both classified and unclassified forms. The US has expressed the intent to place these materials under international inspections as soon as practicable. To support these commitments, members of the US technical community are examining a variety of nonintrusive approaches (i.e., those that would not reveal classified or sensitive information) for verification of a range of potential declarations for these classified and unclassified materials. The most troublesome and potentially difficult issues involve approaches for international inspection of classified materials. The primary focus of the work to date has been on the measurement of signatures of relevant materials attributes (e.g., element, identification number, isotopic ratios, etc.), especially those related to classified materials and items. The authors are examining potential attributes and related measurement technologies in the context of possible verification approaches. The paper will discuss the current status of these activities, including their development, assessment, and benchmarking status

  13. Independent Verification Survey Report For Zone 1 Of The East Tennessee Technology Park In Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    King, David A.

    2012-01-01

    Oak Ridge Associated Universities (ORAU) conducted in-process inspections and independent verification (IV) surveys in support of DOE's remedial efforts in Zone 1 of East Tennessee Technology Park (ETTP) in Oak Ridge, Tennessee. Inspections concluded that the remediation contractor's soil removal and survey objectives were satisfied and the dynamic verification strategy (DVS) was implemented as designed. Independent verification (IV) activities included gamma walkover surveys and soil sample collection/analysis over multiple exposure units (EUs)

  14. Repair activity of oxidatively damaged DNA and telomere length in human lung epithelial cells after exposure to multi-walled carbon nanotubes

    DEFF Research Database (Denmark)

    Borghini, Andrea; Roursgaard, Martin; Andreassi, Maria Grazia

    2017-01-01

    One type of carbon nanotubes (CNTs) (MWCNT-7, from Mitsui) has been classified as probably carcinogenic to humans, however insufficient data does not warrant the same classification for other types of CNTs. Experimental data indicate that CNT exposure can result in oxidative stress and DNA damage...... the cells toward replicative senescence, assessed by attrition of telomeres. To investigate this, H2O2 and KBrO3 were used to induce DNA damage in the cells and the effect of pre-exposure to MWCNT tested for a change in repair activity inside the cells or in the extract of treated cells. The effect of MWCNT...... in cultured cells, whereas these materials appear to induce low or no mutagenicity. Therefore, the present study aimed to investigate whether in vitro exposure of cultured airway epithelial cells (A549) to multi-walled CNTs (MWCNTs) could increase the DNA repair activity of oxidatively damaged DNA and drive...

  15. Telomerase activity and telomere length in the colorectal polyp-carcinoma sequence Actividad de la telomerasa y longitud del telómero en la secuencia pólipo-carcinoma colorrectal

    Directory of Open Access Journals (Sweden)

    C. Valls Bautista

    2009-03-01

    Full Text Available Objective: the role of telomerase activity and telomere length in the adenoma-carcinoma sequence of colon carcinogenesis has not been well established. The objective of this study was to determine telomerase activity and telomere length patterns in patients with adenomatous polyps either associated or not with colorectal cancer, as well as the role of telomeric instability in the adenoma-carcinoma sequence. Patients and methods: we included in the study 14 patients who underwent surgery for colorectal cancer and/or polyps. In 6 of these patients fresh samples of tumor tissue, polyps, and normal mucosa were obtained; in the 8 remaining cases, we collected only polyps and normal mucosa. We used the fluorescent-telomeric repeat amplification protocol assay (TRAP-F to determine telomerase activity and telomere length using Southern-blot testing. Results: telomerase activity was detected in 86% of polyps and 50% of associated normal mucosa. Mean telomerase activity in polyp tissue was 5.85; in the normal mucosa it was 0.58 TPG. Mean telomere length was 6.78 Kbp and 7.78, respectively. Polyps in patients without synchronous cancer had a telomerase activity that was significantly higher (9.4 than in those with cancer (1.1. Conclusions: telomerase activity increases in the colorectal adenoma-carcinoma sequence, concurrently with a decrease in telomere length. The presence of synchronous cancer modifies telomerase activity in polyps.Objetivo: el papel de la actividad de la telomerasa y la longitud del telómero en la secuencia adenoma-carcinoma de la carcinogénesis colónica no ha sido bien establecido. El objetivo fue determinar el comportamiento de la actividad de la telomerasa y la longitud del telómero en pacientes con pólipos adenomatosos asociados o no a cáncer colorrectal y conocer el papel de la inestabilidad telomérica en la secuencia adenoma-carcinoma. Pacientes y métodos: se estudiaron 14 pacientes intervenidos de cáncer colorrectal y

  16. Production of enzymatically active recombinant full-length barley high pI alpha-glucosidase of glycoside family 31 by high cell-density fermentation of Pichia pastoris and affinity purification

    DEFF Research Database (Denmark)

    Næsted, Henrik; Kramhøft, Birte; Lok, F.

    2006-01-01

    Recombinant barley high pI alpha-glucosidase was produced by high cell-density fermentation of Pichia pastoris expressing the cloned full-length gene. The gene was amplified from a genomic clone and exons (coding regions) were assembled by overlap PCR. The resulting cDNA was expressed under contr...... nM x s(-1), and 85 s(-1) using maltose as substrate. This work presents the first production of fully active recombinant alpha-glucosidase of glycoside hydrolase family 31 from higher plants. (c) 2005 Elsevier Inc. All rights reserved....

  17. Design verification and validation plan for the cold vacuum drying facility

    International Nuclear Information System (INIS)

    NISHIKAWA, L.D.

    1999-01-01

    The Cold Vacuum Drying Facility (CVDF) provides the required process systems, supporting equipment, and facilities needed for drying spent nuclear fuel removed from the K Basins. This document presents the both completed and planned design verification and validation activities

  18. Land surface Verification Toolkit (LVT)

    Science.gov (United States)

    Kumar, Sujay V.

    2017-01-01

    LVT is a framework developed to provide an automated, consolidated environment for systematic land surface model evaluation Includes support for a range of in-situ, remote-sensing and other model and reanalysis products. Supports the analysis of outputs from various LIS subsystems, including LIS-DA, LIS-OPT, LIS-UE. Note: The Land Information System Verification Toolkit (LVT) is a NASA software tool designed to enable the evaluation, analysis and comparison of outputs generated by the Land Information System (LIS). The LVT software is released under the terms and conditions of the NASA Open Source Agreement (NOSA) Version 1.1 or later. Land Information System Verification Toolkit (LVT) NOSA.

  19. Ontology Matching with Semantic Verification.

    Science.gov (United States)

    Jean-Mary, Yves R; Shironoshita, E Patrick; Kabuka, Mansur R

    2009-09-01

    ASMOV (Automated Semantic Matching of Ontologies with Verification) is a novel algorithm that uses lexical and structural characteristics of two ontologies to iteratively calculate a similarity measure between them, derives an alignment, and then verifies it to ensure that it does not contain semantic inconsistencies. In this paper, we describe the ASMOV algorithm, and then present experimental results that measure its accuracy using the OAEI 2008 tests, and that evaluate its use with two different thesauri: WordNet, and the Unified Medical Language System (UMLS). These results show the increased accuracy obtained by combining lexical, structural and extensional matchers with semantic verification, and demonstrate the advantage of using a domain-specific thesaurus for the alignment of specialized ontologies.

  20. Societal Verification: Intellectual Game or International Game-Changer

    International Nuclear Information System (INIS)

    Hartigan, Kelsey; Hinderstein, Corey

    2013-01-01

    Within the nuclear nonproliferation and arms control field, there is an increasing appreciation for the potential of open source information technologies to supplement existing verification and compliance regimes. While clearly not a substitute for on-site inspections or national technical means, it may be possible to better leverage information gleaned from commercial satellite imagery, international trade records and the vast amount of data being exchanged online and between publics (including social media) so as to develop a more comprehensive set of tools and practices for monitoring and verifying a state’s nuclear activities and helping judge compliance with international obligations. The next generation “toolkit” for monitoring and verifying items, facility operations and activities will likely include a more diverse set of analytical tools and technologies than are currently used internationally. To explore these and other issues, the Nuclear Threat Initiative has launched an effort that examines, in part, the role that emerging technologies and “citizen scientists” might play in future verification regimes. This paper will include an assessment of past proliferation and security “events” and whether emerging tools and technologies would have provided indicators concurrently or in advance of these actions. Such case studies will be instrumental in understanding the reliability of these technologies and practices and in thinking through the requirements of a 21st century verification regime. Keywords: Verification, social media, open-source information, arms control, disarmament.

  1. Nuclear Data Verification and Standardization

    Energy Technology Data Exchange (ETDEWEB)

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  2. The Impact of the Polymer Chain Length on the Catalytic Activity of Poly(N-vinyl-2-pyrrolidone)-supported Gold Nanoclusters.

    Science.gov (United States)

    Haesuwannakij, Setsiri; Kimura, Tetsunari; Furutani, Yuji; Okumura, Kazu; Kokubo, Ken; Sakata, Takao; Yasuda, Hidehiro; Yakiyama, Yumi; Sakurai, Hidehiro

    2017-08-29

    Poly(N-vinyl-2-pyrrolidone) (PVP) of varying molecular weight (M w  = 40-360 kDa) were employed to stabilize gold nanoclusters of varying size. The resulting Au:PVP clusters were subsequently used as catalysts for a kinetic study on the sized-dependent aerobic oxidation of 1-indanol, which was monitored by time-resolved in situ infrared spectroscopy. The obtained results suggest that the catalytic behaviour is intimately correlated to the size of the clusters, which in turn depends on the molecular weight of the PVPs. The highest catalytic activity was observed for clusters with a core size of ~7 nm, and the size of the cluster should increase with the molecular weight of the polymer in order to maintain optimal catalytic activity. Studies on the electronic and colloid structure of these clusters revealed that the negative charge density on the cluster surface also strongly depends on the molecular weight of the stabilizing polymers.

  3. Design verification for reactor head replacement

    International Nuclear Information System (INIS)

    Dwivedy, K.K.; Whitt, M.S.; Lee, R.

    2005-01-01

    This paper outlines the challenges of design verification for reactor head replacement for PWR plants and the program for qualification from the prospective of the utility design engineering group. This paper is based on the experience with the design confirmation of four reactor head replacements for two plants, and their interfacing components, parts, appurtenances, and support structures. The reactor head replacement falls under the jurisdiction of the applicable edition of the ASME Section XI code, with particular reference to repair/replacement activities. Under any repair/replacement activities, demands may be encountered in the development of program and plan for replacement due to the vintage of the original design/construction Code and the design reports governing the component qualifications. Because of the obvious importance of the reactor vessel, these challenges take on an added significance. Additional complexities are introduced to the project, when the replacement components are fabricated by vendors different from the original vendor. Specific attention is needed with respect to compatibility with the original design and construction of the part and interfacing components. The program for reactor head replacement requires evaluation of welding procedures, applicable examination, test, and acceptance criteria for material, welds, and the components. Also, the design needs to take into consideration the life of the replacement components with respect to the extended period of operation of the plant after license renewal and other plant improvements. Thus, the verification of acceptability of reactor head replacement provides challenges for development and maintenance of a program and plan, design specification, design report, manufacturer's data report and material certification, and a report of reconciliation. The technical need may also be compounded by other challenges such as widely scattered global activities and organizational barriers, which

  4. NEUTRON ALGORITHM VERIFICATION TESTING

    International Nuclear Information System (INIS)

    COWGILL, M.; MOSBY, W.; ARGONNE NATIONAL LABORATORY-WEST

    2000-01-01

    Active well coincidence counter assays have been performed on uranium metal highly enriched in 235 U. The data obtained in the present program, together with highly enriched uranium (HEU) metal data obtained in other programs, have been analyzed using two approaches, the standard approach and an alternative approach developed at BNL. Analysis of the data with the standard approach revealed that the form of the relationship between the measured reals and the 235 U mass varied, being sometimes linear and sometimes a second-order polynomial. In contrast, application of the BNL algorithm, which takes into consideration the totals, consistently yielded linear relationships between the totals-corrected reals and the 235 U mass. The constants in these linear relationships varied with geometric configuration and level of enrichment. This indicates that, when the BNL algorithm is used, calibration curves can be established with fewer data points and with more certainty than if a standard algorithm is used. However, this potential advantage has only been established for assays of HEU metal. In addition, the method is sensitive to the stability of natural background in the measurement facility

  5. Linear and nonlinear verification of gyrokinetic microstability codes

    Science.gov (United States)

    Bravenec, R. V.; Candy, J.; Barnes, M.; Holland, C.

    2011-12-01

    Verification of nonlinear microstability codes is a necessary step before comparisons or predictions of turbulent transport in toroidal devices can be justified. By verification we mean demonstrating that a code correctly solves the mathematical model upon which it is based. Some degree of verification can be accomplished indirectly from analytical instability threshold conditions, nonlinear saturation estimates, etc., for relatively simple plasmas. However, verification for experimentally relevant plasma conditions and physics is beyond the realm of analytical treatment and must rely on code-to-code comparisons, i.e., benchmarking. The premise is that the codes are verified for a given problem or set of parameters if they all agree within a specified tolerance. True verification requires comparisons for a number of plasma conditions, e.g., different devices, discharges, times, and radii. Running the codes and keeping track of linear and nonlinear inputs and results for all conditions could be prohibitive unless there was some degree of automation. We have written software to do just this and have formulated a metric for assessing agreement of nonlinear simulations. We present comparisons, both linear and nonlinear, between the gyrokinetic codes GYRO [J. Candy and R. E. Waltz, J. Comput. Phys. 186, 545 (2003)] and GS2 [W. Dorland, F. Jenko, M. Kotschenreuther, and B. N. Rogers, Phys. Rev. Lett. 85, 5579 (2000)]. We do so at the mid-radius for the same discharge as in earlier work [C. Holland, A. E. White, G. R. McKee, M. W. Shafer, J. Candy, R. E. Waltz, L. Schmitz, and G. R. Tynan, Phys. Plasmas 16, 052301 (2009)]. The comparisons include electromagnetic fluctuations, passing and trapped electrons, plasma shaping, one kinetic impurity, and finite Debye-length effects. Results neglecting and including electron collisions (Lorentz model) are presented. We find that the linear frequencies with or without collisions agree well between codes, as do the time averages of

  6. MOV reliability evaluation and periodic verification scheduling

    Energy Technology Data Exchange (ETDEWEB)

    Bunte, B.D.

    1996-12-01

    The purpose of this paper is to establish a periodic verification testing schedule based on the expected long term reliability of gate or globe motor operated valves (MOVs). The methodology in this position paper determines the nominal (best estimate) design margin for any MOV based on the best available information pertaining to the MOVs design requirements, design parameters, existing hardware design, and present setup. The uncertainty in this margin is then determined using statistical means. By comparing the nominal margin to the uncertainty, the reliability of the MOV is estimated. The methodology is appropriate for evaluating the reliability of MOVs in the GL 89-10 program. It may be used following periodic testing to evaluate and trend MOV performance and reliability. It may also be used to evaluate the impact of proposed modifications and maintenance activities such as packing adjustments. In addition, it may be used to assess the impact of new information of a generic nature which impacts safety related MOVs.

  7. MOV reliability evaluation and periodic verification scheduling

    International Nuclear Information System (INIS)

    Bunte, B.D.

    1996-01-01

    The purpose of this paper is to establish a periodic verification testing schedule based on the expected long term reliability of gate or globe motor operated valves (MOVs). The methodology in this position paper determines the nominal (best estimate) design margin for any MOV based on the best available information pertaining to the MOVs design requirements, design parameters, existing hardware design, and present setup. The uncertainty in this margin is then determined using statistical means. By comparing the nominal margin to the uncertainty, the reliability of the MOV is estimated. The methodology is appropriate for evaluating the reliability of MOVs in the GL 89-10 program. It may be used following periodic testing to evaluate and trend MOV performance and reliability. It may also be used to evaluate the impact of proposed modifications and maintenance activities such as packing adjustments. In addition, it may be used to assess the impact of new information of a generic nature which impacts safety related MOVs

  8. 300 Area Process Trenches Verification Package

    International Nuclear Information System (INIS)

    Lerch, J.A.

    1998-03-01

    The purpose of this verification package is to document achievement of the remedial action objectives for the 300 Area Process Trenches (300 APT) located within the 300-FF-1 Operable Unit (OU). The 300 APT became active in 1975 as a replacement for the North and South Process Pond system that is also part of the 300-FF-1 OU. The trenches received 300 Area process effluent from the uranium fuel fabrication facilities. Waste from the 300 Area laboratories that was determined to be below discharge limits based on monitoring performed at the 307 retention basin was also released to the trenches. Effluent flowed through the headworks sluice gates, down a concrete apron, and into the trenches. From the beginning of operations in 1975 until 1993, a continuous, composite sampler was located at the headwork structure to analyze process effluent at the point of discharge to the environment

  9. Computer Generated Inputs for NMIS Processor Verification

    International Nuclear Information System (INIS)

    J. A. Mullens; J. E. Breeding; J. A. McEvers; R. W. Wysor; L. G. Chiang; J. R. Lenarduzzi; J. T. Mihalczo; J. K. Mattingly

    2001-01-01

    Proper operation of the Nuclear Identification Materials System (NMIS) processor can be verified using computer-generated inputs [BIST (Built-In-Self-Test)] at the digital inputs. Preselected sequences of input pulses to all channels with known correlation functions are compared to the output of the processor. These types of verifications have been utilized in NMIS type correlation processors at the Oak Ridge National Laboratory since 1984. The use of this test confirmed a malfunction in a NMIS processor at the All-Russian Scientific Research Institute of Experimental Physics (VNIIEF) in 1998. The NMIS processor boards were returned to the U.S. for repair and subsequently used in NMIS passive and active measurements with Pu at VNIIEF in 1999

  10. Towards Formal Verification of a Separation Microkernel

    Science.gov (United States)

    Butterfield, Andrew; Sanan, David; Hinchey, Mike

    2013-08-01

    The best approach to verifying an IMA separation kernel is to use a (fixed) time-space partitioning kernel with a multiple independent levels of separation (MILS) architecture. We describe an activity that explores the cost and feasibility of doing a formal verification of such a kernel to the Common Criteria (CC) levels mandated by the Separation Kernel Protection Profile (SKPP). We are developing a Reference Specification of such a kernel, and are using higher-order logic (HOL) to construct formal models of this specification and key separation properties. We then plan to do a dry run of part of a formal proof of those properties using the Isabelle/HOL theorem prover.

  11. Towards the Verification of Human-Robot Teams

    Science.gov (United States)

    Fisher, Michael; Pearce, Edward; Wooldridge, Mike; Sierhuis, Maarten; Visser, Willem; Bordini, Rafael H.

    2005-01-01

    Human-Agent collaboration is increasingly important. Not only do high-profile activities such as NASA missions to Mars intend to employ such teams, but our everyday activities involving interaction with computational devices falls into this category. In many of these scenarios, we are expected to trust that the agents will do what we expect and that the agents and humans will work together as expected. But how can we be sure? In this paper, we bring together previous work on the verification of multi-agent systems with work on the modelling of human-agent teamwork. Specifically, we target human-robot teamwork. This paper provides an outline of the way we are using formal verification techniques in order to analyse such collaborative activities. A particular application is the analysis of human-robot teams intended for use in future space exploration.

  12. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  13. Design and Verification of Critical Pressurised Windows for Manned Spaceflight

    Science.gov (United States)

    Lamoure, Richard; Busto, Lara; Novo, Francisco; Sinnema, Gerben; Leal, Mendes M.

    2014-06-01

    The Window Design for Manned Spaceflight (WDMS) project was tasked with establishing the state-of-art and explore possible improvements to the current structural integrity verification and fracture control methodologies for manned spacecraft windows.A critical review of the state-of-art in spacecraft window design, materials and verification practice was conducted. Shortcomings of the methodology in terms of analysis, inspection and testing were identified. Schemes for improving verification practices and reducing conservatism whilst maintaining the required safety levels were then proposed.An experimental materials characterisation programme was defined and carried out with the support of the 'Glass and Façade Technology Research Group', at the University of Cambridge. Results of the sample testing campaign were analysed, post-processed and subsequently applied to the design of a breadboard window demonstrator.Two Fused Silica glass window panes were procured and subjected to dedicated analyses, inspection and testing comprising both qualification and acceptance programmes specifically tailored to the objectives of the activity.Finally, main outcomes have been compiled into a Structural Verification Guide for Pressurised Windows in manned spacecraft, incorporating best practices and lessons learned throughout this project.

  14. Commitment to COT verification improves patient outcomes and financial performance.

    Science.gov (United States)

    Maggio, Paul M; Brundage, Susan I; Hernandez-Boussard, Tina; Spain, David A

    2009-07-01

    After an unsuccessful American College of Surgery Committee on Trauma visit, our level I trauma center initiated an improvement program that included (1) hiring new personnel (trauma director and surgeons, nurse coordinator, orthopedic trauma surgeon, and registry staff), (2) correcting deficiencies in trauma quality assurance and process improvement programs, and (3) development of an outreach program. Subsequently, our trauma center had two successful verifications. We examined the longitudinal effects of these efforts on volume, patient outcomes and finances. The Trauma Registry was used to derive data for all trauma patients evaluated in the emergency department from 2001 to 2007. Clinical data analyzed included number of admissions, interfacility transfers, injury severity scores (ISS), length of stay, and mortality for 2001 to 2007. Financial performance was assessed for fiscal years 2001 to 2007. Data were divided into patients discharged from the emergency department and those admitted to the hospital. Admissions increased 30%, representing a 7.6% annual increase (p = 0.004), mostly due to a nearly fivefold increase in interfacility transfers. Severe trauma patients (ISS >24) increased 106% and mortality rate for ISS >24 decreased by 47% to almost half the average of the National Trauma Database. There was a 78% increase in revenue and a sustained increase in hospital profitability. A major hospital commitment to Committee on Trauma verification had several salient outcomes; increased admissions, interfacility transfers, and acuity. Despite more seriously injured patients, there has been a major, sustained reduction in mortality and a trend toward decreased intensive care unit length of stay. This resulted in a substantial increase in contribution to margin (CTM), net profit, and revenues. With a high level of commitment and favorable payer mix, trauma center verification improves outcomes for both patients and the hospital.

  15. Experimental verification of layout physical verification of silicon photonics

    Science.gov (United States)

    El Shamy, Raghi S.; Swillam, Mohamed A.

    2018-02-01

    Silicon photonics have been approved as one of the best platforms for dense integration of photonic integrated circuits (PICs) due to the high refractive index contrast among its materials. Silicon on insulator (SOI) is a widespread photonics technology, which support a variety of devices for lots of applications. As the photonics market is growing, the number of components in the PICs increases which increase the need for an automated physical verification (PV) process. This PV process will assure reliable fabrication of the PICs as it will check both the manufacturability and the reliability of the circuit. However, PV process is challenging in the case of PICs as it requires running an exhaustive electromagnetic (EM) simulations. Our group have recently proposed an empirical closed form models for the directional coupler and the waveguide bends based on the SOI technology. The models have shown a very good agreement with both finite element method (FEM) and finite difference time domain (FDTD) solvers. These models save the huge time of the 3D EM simulations and can be easily included in any electronic design automation (EDA) flow as the equations parameters can be easily extracted from the layout. In this paper we present experimental verification for our previously proposed models. SOI directional couplers with different dimensions have been fabricated using electron beam lithography and measured. The results from the measurements of the fabricate devices have been compared to the derived models and show a very good agreement. Also the matching can reach 100% by calibrating certain parameter in the model.

  16. Verification and nuclear material security

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2001-01-01

    Full text: The Director General will open the symposium by presenting a series of challenges facing the international safeguards community: the need to ensure a robust system, with strong verification tools and a sound research and development programme; the importance of securing the necessary support for the system, in terms of resources; the effort to achieve universal participation in the non-proliferation regime; and the necessity of re-energizing disarmament efforts. Special focus will be given to the challenge underscored by recent events, of strengthening international efforts to combat nuclear terrorism. (author)

  17. SHIELD verification and validation report

    International Nuclear Information System (INIS)

    Boman, C.

    1992-02-01

    This document outlines the verification and validation effort for the SHIELD, SHLDED, GEDIT, GENPRT, FIPROD, FPCALC, and PROCES modules of the SHIELD system code. Along with its predecessors, SHIELD has been in use at the Savannah River Site (SRS) for more than ten years. During this time the code has been extensively tested and a variety of validation documents have been issued. The primary function of this report is to specify the features and capabilities for which SHIELD is to be considered validated, and to reference the documents that establish the validation

  18. Trojan technical specification verification project

    International Nuclear Information System (INIS)

    Bates, L.; Rickenback, M.

    1991-01-01

    The Trojan Technical Specification Verification (TTSV) project at the Trojan plant of Portland General Electric Company was motivated by the recognition that many numbers in the Trojan technical specifications (TTS) potentially lacked the consideration of instrument- and/or process-related errors. The plant setpoints were known to consider such errors, but many of the values associated with the limiting conditions for operation (LCO) did not. In addition, the existing plant instrument error analyses were based on industry values that do not reflect the Trojan plant-specific experience. The purpose of this project is to ensure that the Trojan plant setpoint and LCO values include plant-specific instrument error

  19. A verification environment for bigraphs

    DEFF Research Database (Denmark)

    Perrone, Gian David; Debois, Søren; Hildebrandt, Thomas

    2013-01-01

    We present the BigMC tool for bigraphical reactive systems that may be instantiated as a verification tool for any formalism or domain-specific modelling language encoded as a bigraphical reactive system. We introduce the syntax and use of BigMC, and exemplify its use with two small examples......: a textbook “philosophers” example, and an example motivated by a ubiquitous computing application. We give a tractable heuristic with which to approximate interference between reaction rules, and prove this analysis to be safe. We provide a mechanism for state reachability checking of bigraphical reactive...

  20. Hot-cell verification facility

    International Nuclear Information System (INIS)

    Eschenbaum, R.A.

    1981-01-01

    The Hot Cell Verification Facility (HCVF) was established as the test facility for the Fuels and Materials Examination Facility (FMEF) examination equipment. HCVF provides a prototypic hot cell environment to check the equipment for functional and remote operation. It also provides actual hands-on training for future FMEF Operators. In its two years of operation, HCVF has already provided data to make significant changes in items prior to final fabrication. It will also shorten the startup time in FMEF since the examination equipment will have been debugged and operated in HCVF

  1. Development of the clearance level verification evaluation system. 2. Construction of the clearance data management system

    International Nuclear Information System (INIS)

    Kubota, Shintaro; Usui, Hideo; Kawagoshi, Hiroshi

    2014-06-01

    Clearance is defined as the removal of radioactive materials or radioactive objects within authorized practices from any further regulatory control by the regulatory body. In Japan, clearance level and a procedure for its verification has been introduced under the Laws and Regulations, and solid clearance wastes inspected by the national authority can be handled and recycled as normal wastes. The most prevalent type of wastes have generated from the dismantling of nuclear facilities, so the Japan Atomic Energy Agency (JAEA) has been developing the Clearance Level Verification Evaluation System (CLEVES) as a convenient tool. The Clearance Data Management System (CDMS), which is a part of CLEVES, has been developed to support measurement, evaluation, making and recording documents with clearance level verification. In addition, validation of the evaluation result of the CDMS was carried out by inputting the data of actual clearance activities in the JAEA. Clearance level verification is easily applied by using the CDMS for the clearance activities. (author)

  2. Code Verification Capabilities and Assessments in Support of ASC V&V Level 2 Milestone #6035

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Budzien, Joanne Louise [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Ferguson, Jim Michael [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Harwell, Megan Louise [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Hickmann, Kyle Scott [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Israel, Daniel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Magrogan, William Richard III [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Singleton, Jr., Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Srinivasan, Gowri [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Walter, Jr, John William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Woods, Charles Nathan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-26

    This document provides a summary of the code verification activities supporting the FY17 Level 2 V&V milestone entitled “Deliver a Capability for V&V Assessments of Code Implementations of Physics Models and Numerical Algorithms in Support of Future Predictive Capability Framework Pegposts.” The physics validation activities supporting this milestone are documented separately. The objectives of this portion of the milestone are: 1) Develop software tools to support code verification analysis; 2) Document standard definitions of code verification test problems; and 3) Perform code verification assessments (focusing on error behavior of algorithms). This report and a set of additional standalone documents serve as the compilation of results demonstrating accomplishment of these objectives.

  3. Particularities of Verification Processes for Distributed Informatics Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2013-01-01

    Full Text Available This paper presents distributed informatics applications and characteristics of their development cycle. It defines the concept of verification and there are identified the differences from software testing. Particularities of the software testing and software verification processes are described. The verification steps and necessary conditions are presented and there are established influence factors of quality verification. Software optimality verification is analyzed and some metrics are defined for the verification process.

  4. KNGR core proection calculator, software, verification and validation plan

    International Nuclear Information System (INIS)

    Kim, Jang Yeol; Park, Jong Kyun; Lee, Ki Young; Lee, Jang Soo; Cheon, Se Woo

    2001-05-01

    This document describes the Software Verification and Validation Plan(SVVP) Guidance to be used in reviewing the Software Program Manual(SPM) in Korean Next Generation Reactor(KNGR) projects. This document is intended for a verifier or reviewer who is involved with performing of software verification and validation task activity in KNGR projects. This document includeds the basic philosophy, performing V and V effort, software testing techniques, criteria of review and audit on the safety software V and V activity. Major review topics on safety software addresses three kinds of characteristics based on Standard Review Plan(SRP) Chapter 7, Branch Technical Position(BTP)-14 : management characteristics, implementation characteristics and resources characteristics when reviewing on SVVP. Based on major topics of this document, we have produced the evaluation items list such as checklist in Appendix A

  5. Cognitive Bias in Systems Verification

    Science.gov (United States)

    Larson, Steve

    2012-01-01

    Working definition of cognitive bias: Patterns by which information is sought and interpreted that can lead to systematic errors in decisions. Cognitive bias is used in diverse fields: Economics, Politics, Intelligence, Marketing, to name a few. Attempts to ground cognitive science in physical characteristics of the cognitive apparatus exceed our knowledge. Studies based on correlations; strict cause and effect is difficult to pinpoint. Effects cited in the paper and discussed here have been replicated many times over, and appear sound. Many biases have been described, but it is still unclear whether they are all distinct. There may only be a handful of fundamental biases, which manifest in various ways. Bias can effect system verification in many ways . Overconfidence -> Questionable decisions to deploy. Availability -> Inability to conceive critical tests. Representativeness -> Overinterpretation of results. Positive Test Strategies -> Confirmation bias. Debiasing at individual level very difficult. The potential effect of bias on the verification process can be managed, but not eliminated. Worth considering at key points in the process.

  6. RISKIND verification and benchmark comparisons

    International Nuclear Information System (INIS)

    Biwer, B.M.; Arnish, J.J.; Chen, S.Y.; Kamboj, S.

    1997-08-01

    This report presents verification calculations and benchmark comparisons for RISKIND, a computer code designed to estimate potential radiological consequences and health risks to individuals and the population from exposures associated with the transportation of spent nuclear fuel and other radioactive materials. Spreadsheet calculations were performed to verify the proper operation of the major options and calculational steps in RISKIND. The program is unique in that it combines a variety of well-established models into a comprehensive treatment for assessing risks from the transportation of radioactive materials. Benchmark comparisons with other validated codes that incorporate similar models were also performed. For instance, the external gamma and neutron dose rate curves for a shipping package estimated by RISKIND were compared with those estimated by using the RADTRAN 4 code and NUREG-0170 methodology. Atmospheric dispersion of released material and dose estimates from the GENII and CAP88-PC codes. Verification results have shown the program to be performing its intended function correctly. The benchmark results indicate that the predictions made by RISKIND are within acceptable limits when compared with predictions from similar existing models

  7. RISKIND verification and benchmark comparisons

    Energy Technology Data Exchange (ETDEWEB)

    Biwer, B.M.; Arnish, J.J.; Chen, S.Y.; Kamboj, S.

    1997-08-01

    This report presents verification calculations and benchmark comparisons for RISKIND, a computer code designed to estimate potential radiological consequences and health risks to individuals and the population from exposures associated with the transportation of spent nuclear fuel and other radioactive materials. Spreadsheet calculations were performed to verify the proper operation of the major options and calculational steps in RISKIND. The program is unique in that it combines a variety of well-established models into a comprehensive treatment for assessing risks from the transportation of radioactive materials. Benchmark comparisons with other validated codes that incorporate similar models were also performed. For instance, the external gamma and neutron dose rate curves for a shipping package estimated by RISKIND were compared with those estimated by using the RADTRAN 4 code and NUREG-0170 methodology. Atmospheric dispersion of released material and dose estimates from the GENII and CAP88-PC codes. Verification results have shown the program to be performing its intended function correctly. The benchmark results indicate that the predictions made by RISKIND are within acceptable limits when compared with predictions from similar existing models.

  8. Quantitative reactive modeling and verification.

    Science.gov (United States)

    Henzinger, Thomas A

    Formal verification aims to improve the quality of software by detecting errors before they do harm. At the basis of formal verification is the logical notion of correctness , which purports to capture whether or not a program behaves as desired. We suggest that the boolean partition of software into correct and incorrect programs falls short of the practical need to assess the behavior of software in a more nuanced fashion against multiple criteria. We therefore propose to introduce quantitative fitness measures for programs, specifically for measuring the function, performance, and robustness of reactive programs such as concurrent processes. This article describes the goals of the ERC Advanced Investigator Project QUAREM. The project aims to build and evaluate a theory of quantitative fitness measures for reactive models. Such a theory must strive to obtain quantitative generalizations of the paradigms that have been success stories in qualitative reactive modeling, such as compositionality, property-preserving abstraction and abstraction refinement, model checking, and synthesis. The theory will be evaluated not only in the context of software and hardware engineering, but also in the context of systems biology. In particular, we will use the quantitative reactive models and fitness measures developed in this project for testing hypotheses about the mechanisms behind data from biological experiments.

  9. Verification and Performance Analysis for Embedded Systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2009-01-01

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems.......This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems....

  10. Safety Verification for Probabilistic Hybrid Systems

    DEFF Research Database (Denmark)

    Zhang, Lijun; She, Zhikun; Ratschan, Stefan

    2010-01-01

    The interplay of random phenomena and continuous real-time control deserves increased attention for instance in wireless sensing and control applications. Safety verification for such systems thus needs to consider probabilistic variations of systems with hybrid dynamics. In safety verification o...... on a number of case studies, tackled using a prototypical implementation....

  11. On the organisation of program verification competitions

    NARCIS (Netherlands)

    Huisman, Marieke; Klebanov, Vladimir; Monahan, Rosemary; Klebanov, Vladimir; Beckert, Bernhard; Biere, Armin; Sutcliffe, Geoff

    In this paper, we discuss the challenges that have to be addressed when organising program verification competitions. Our focus is on competitions for verification systems where the participants both formalise an informally stated requirement and (typically) provide some guidance for the tool to

  12. Gender Verification of Female Olympic Athletes.

    Science.gov (United States)

    Dickinson, Barry D.; Genel, Myron; Robinowitz, Carolyn B.; Turner, Patricia L.; Woods, Gary L.

    2002-01-01

    Gender verification of female athletes has long been criticized by geneticists, endocrinologists, and others in the medical community. Recently, the International Olympic Committee's Athletic Commission called for discontinuation of mandatory laboratory-based gender verification of female athletes. This article discusses normal sexual…

  13. HTGR analytical methods and design verification

    International Nuclear Information System (INIS)

    Neylan, A.J.; Northup, T.E.

    1982-05-01

    Analytical methods for the high-temperature gas-cooled reactor (HTGR) include development, update, verification, documentation, and maintenance of all computer codes for HTGR design and analysis. This paper presents selected nuclear, structural mechanics, seismic, and systems analytical methods related to the HTGR core. This paper also reviews design verification tests in the reactor core, reactor internals, steam generator, and thermal barrier

  14. Face Verification for Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.

    2009-01-01

    In this thesis, we presented a detailed study of the face verification problem on the mobile device, covering every component of the system. The study includes face detection, registration, normalization, and verification. Furthermore, the information fusion problem is studied to verify face

  15. The monitoring and verification of nuclear weapons

    International Nuclear Information System (INIS)

    Garwin, Richard L.

    2014-01-01

    This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers

  16. Fingerprint verification prediction model in hand dermatitis.

    Science.gov (United States)

    Lee, Chew K; Chang, Choong C; Johor, Asmah; Othman, Puwira; Baba, Roshidah

    2015-07-01

    Hand dermatitis associated fingerprint changes is a significant problem and affects fingerprint verification processes. This study was done to develop a clinically useful prediction model for fingerprint verification in patients with hand dermatitis. A case-control study involving 100 patients with hand dermatitis. All patients verified their thumbprints against their identity card. Registered fingerprints were randomized into a model derivation and model validation group. Predictive model was derived using multiple logistic regression. Validation was done using the goodness-of-fit test. The fingerprint verification prediction model consists of a major criterion (fingerprint dystrophy area of ≥ 25%) and two minor criteria (long horizontal lines and long vertical lines). The presence of the major criterion predicts it will almost always fail verification, while presence of both minor criteria and presence of one minor criterion predict high and low risk of fingerprint verification failure, respectively. When none of the criteria are met, the fingerprint almost always passes the verification. The area under the receiver operating characteristic curve was 0.937, and the goodness-of-fit test showed agreement between the observed and expected number (P = 0.26). The derived fingerprint verification failure prediction model is validated and highly discriminatory in predicting risk of fingerprint verification in patients with hand dermatitis. © 2014 The International Society of Dermatology.

  17. Validation of Embedded System Verification Models

    NARCIS (Netherlands)

    Marincic, J.; Mader, Angelika H.; Wieringa, Roelf J.

    The result of a model-based requirements verification shows that the model of a system satisfies (or not) formalised system requirements. The verification result is correct only if the model represents the system adequately. No matter what modelling technique we use, what precedes the model

  18. A Model for Collaborative Runtime Verification

    NARCIS (Netherlands)

    Testerink, Bas; Bulling, Nils; Dastani, Mehdi

    2015-01-01

    Runtime verification concerns checking whether a system execution satisfies a given property. In this paper we propose a model for collaborative runtime verification where a network of local monitors collaborates in order to verify properties of the system. A local monitor has only a local view on

  19. On Verification Modelling of Embedded Systems

    NARCIS (Netherlands)

    Brinksma, Hendrik; Mader, Angelika H.

    Computer-aided verification of embedded systems hinges on the availability of good verification models of the systems at hand. Such models must be much simpler than full design models or specifications to be of practical value, because of the unavoidable combinatorial complexities in the

  20. Methods of Verification, Accountability and Control of Special Nuclear Material

    International Nuclear Information System (INIS)

    Stewart, J.E.

    1999-01-01

    This session demonstrates nondestructive assay (NDA) measurement, surveillance and analysis technology required to protect, control and account (MPC and A) for special nuclear materials (SNM) in sealed containers. These measurements, observations and analyses comprise state-of-the art, strengthened, SNM safeguards systems. Staff member specialists, actively involved in research, development, training and implementation worldwide, will present six NDA verification systems and two software tools for integration and analysis of facility MPC and A data

  1. Cleanup Verification Package for the 118-F-2 Burial Ground

    International Nuclear Information System (INIS)

    Capron, J.M.; Anselm, K.A.

    2008-01-01

    This cleanup verification package documents completion of remedial action, sampling activities, and compliance with cleanup criteria for the 118-F-2 Burial Ground. This burial ground, formerly called Solid Waste Burial Ground No. 1, was the original solid waste disposal site for the 100-F Area. Eight trenches contained miscellaneous solid waste from the 105-F Reactor and one trench contained solid waste from the biology facilities

  2. Neutron dosimetry intercomparison run for verification of the neutron fluence

    International Nuclear Information System (INIS)

    Penev, I.; Kinova, L.

    2001-01-01

    For the neutron fluence verification the intercomparison runs Balakovo and KORPUS have been carried out. The participation in the international intercomparison runs shows that in order to more precisely verify the calculated values of the neutron fluence more intercomparison exercises are necessary. Due to such exercises the results improved after calibration of Nb performed and are in a very good agreement with RIIAR results in spite of the different approaches in the determination of its activity

  3. The role of the United Nations in the field of verification

    International Nuclear Information System (INIS)

    1991-01-01

    By resolution 43/81 B of 7 December 1988, the General Assembly requested the Secretary General to undertake, with the assistance of a group of qualified governmental experts, an in-depth study of the role of the United Nations in the field of verification. In August 1990, the Secretary-General transmitted to the General Assembly the unanimously approved report of the experts. The report is structured in six chapters and contains a bibliographic appendix on technical aspects of verification. The Introduction provides a brief historical background on the development of the question of verification in the United Nations context, culminating with the adoption by the General Assembly of resolution 43/81 B, which requested the study. Chapters II and III address the definition and functions of verification and the various approaches, methods, procedures and techniques used in the process of verification. Chapters IV and V examine the existing activities of the United Nations in the field of verification, possibilities for improvements in those activities as well as possible additional activities, while addressing the organizational, technical, legal, operational and financial implications of each of the possibilities discussed. Chapter VI presents the conclusions and recommendations of the Group

  4. Zinc sulfate contributes to promote telomere length extension via increasing telomerase gene expression, telomerase activity and change in the TERT gene promoter CpG island methylation status of human adipose-derived mesenchymal stem cells.

    Directory of Open Access Journals (Sweden)

    Raheleh Farahzadi

    Full Text Available The use of mesenchymal stem cells (MSCs for cell therapy and regenerative medicine has received widespread attention over the past few years, but their application can be complicated by factors such as reduction in proliferation potential, the senescent tendency of the MSCs upon expansion and their age-dependent decline in number and function. It was shown that all the mentioned features were accompanied by a reduction in telomerase activity and telomere shortening. Furthermore, the role of epigenetic changes in aging, especially changes in promoter methylation, was reported. In this study, MSCs were isolated from the adipose tissue with enzymatic digestion. In addition, immunocytochemistry staining and flow cytometric analysis were performed to investigate the cell-surface markers. In addition, alizarin red-S, sudan III, toluidine blue, and cresyl violet staining were performed to evaluate the multi-lineage differentiation of hADSCs. In order to improve the effective application of MSCs, these cells were treated with 1.5 × 10-8 and 2.99 × 10-10 M of ZnSO4 for 48 hours. The length of the absolute telomere, human telomerase reverse transcriptase (hTERT gene expression, telomerase activity, the investigation of methylation status of the hTERT gene promoter and the percentage of senescent cells were analyzed with quantitative real-time PCR, PCR-ELISA TRAP assay, methylation specific PCR (MSP, and beta-galactosidase (SA-β-gal staining, respectively. The results showed that the telomere length, the hTERT gene expression, and the telomerase activity had significantly increased. In addition, the percentage of senescent cells had significantly decreased and changes in the methylation status of the CpG islands in the hTERT promoter region under treatment with ZnSO4 were seen. In conclusion, it seems that ZnSO4 as a proper antioxidant could improve the aging-related features due to lengthening of the telomeres, increasing the telomerase gene expression

  5. Verification Validation and Uncertainty Quantification for CGS

    Energy Technology Data Exchange (ETDEWEB)

    Rider, William J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Kamm, James R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Weirs, V. Gregory [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-01-01

    The overall conduct of verification, validation and uncertainty quantification (VVUQ) is discussed through the construction of a workflow relevant to computational modeling including the turbulence problem in the coarse grained simulation (CGS) approach. The workflow contained herein is defined at a high level and constitutes an overview of the activity. Nonetheless, the workflow represents an essential activity in predictive simulation and modeling. VVUQ is complex and necessarily hierarchical in nature. The particular characteristics of VVUQ elements depend upon where the VVUQ activity takes place in the overall hierarchy of physics and models. In this chapter, we focus on the differences between and interplay among validation, calibration and UQ, as well as the difference between UQ and sensitivity analysis. The discussion in this chapter is at a relatively high level and attempts to explain the key issues associated with the overall conduct of VVUQ. The intention is that computational physicists can refer to this chapter for guidance regarding how VVUQ analyses fit into their efforts toward conducting predictive calculations.

  6. Verification and validation process for the safety software in KNICS

    International Nuclear Information System (INIS)

    Kwon, Kee-Choon; Lee, Jang-Soo; Kim, Jang-Yeol

    2004-01-01

    This paper describes the Verification and Validation (V and V ) process for safety software of Programmable Logic Controller (PLC), Digital Reactor Protection System (DRPS), and Engineered Safety Feature-Component Control System (ESF-CCS) that are being developed in Korea Nuclear Instrumentation and Control System (KNICS) projects. Specifically, it presents DRPS V and V experience according to the software development life cycle. The main activities of DRPS V and V process are preparation of software planning documentation, verification of Software Requirement Specification (SRS), Software Design Specification (SDS) and codes, and testing of the integrated software and the integrated system. In addition, they include software safety analysis and software configuration management. SRS V and V of DRPS are technical evaluation, licensing suitability evaluation, inspection and traceability analysis, formal verification, preparing integrated system test plan, software safety analysis, and software configuration management. Also, SDS V and V of RPS are technical evaluation, licensing suitability evaluation, inspection and traceability analysis, formal verification, preparing integrated software test plan, software safety analysis, and software configuration management. The code V and V of DRPS are traceability analysis, source code inspection, test case and test procedure generation, software safety analysis, and software configuration management. Testing is the major V and V activity of software integration and system integration phase. Software safety analysis at SRS phase uses Hazard Operability (HAZOP) method, at SDS phase it uses HAZOP and Fault Tree Analysis (FTA), and at implementation phase it uses FTA. Finally, software configuration management is performed using Nu-SCM (Nuclear Software Configuration Management) tool developed by KNICS project. Through these activities, we believe we can achieve the functionality, performance, reliability and safety that are V

  7. Application of virtual distances methodology to laser tracker verification with an indexed metrology platform

    International Nuclear Information System (INIS)

    Acero, R; Pueo, M; Santolaria, J; Aguilar, J J; Brau, A

    2015-01-01

    High-range measuring equipment like laser trackers need large dimension calibrated reference artifacts in their calibration and verification procedures. In this paper, a new verification procedure for portable coordinate measuring instruments based on the generation and evaluation of virtual distances with an indexed metrology platform is developed. This methodology enables the definition of an unlimited number of reference distances without materializing them in a physical gauge to be used as a reference. The generation of the virtual points and reference lengths derived is linked to the concept of the indexed metrology platform and the knowledge of the relative position and orientation of its upper and lower platforms with high accuracy. It is the measuring instrument together with the indexed metrology platform one that remains still, rotating the virtual mesh around them. As a first step, the virtual distances technique is applied to a laser tracker in this work. The experimental verification procedure of the laser tracker with virtual distances is simulated and further compared with the conventional verification procedure of the laser tracker with the indexed metrology platform. The results obtained in terms of volumetric performance of the laser tracker proved the suitability of the virtual distances methodology in calibration and verification procedures for portable coordinate measuring instruments, broadening and expanding the possibilities for the definition of reference distances in these procedures. (paper)

  8. Application of virtual distances methodology to laser tracker verification with an indexed metrology platform

    Science.gov (United States)

    Acero, R.; Santolaria, J.; Pueo, M.; Aguilar, J. J.; Brau, A.

    2015-11-01

    High-range measuring equipment like laser trackers need large dimension calibrated reference artifacts in their calibration and verification procedures. In this paper, a new verification procedure for portable coordinate measuring instruments based on the generation and evaluation of virtual distances with an indexed metrology platform is developed. This methodology enables the definition of an unlimited number of reference distances without materializing them in a physical gauge to be used as a reference. The generation of the virtual points and reference lengths derived is linked to the concept of the indexed metrology platform and the knowledge of the relative position and orientation of its upper and lower platforms with high accuracy. It is the measuring instrument together with the indexed metrology platform one that remains still, rotating the virtual mesh around them. As a first step, the virtual distances technique is applied to a laser tracker in this work. The experimental verification procedure of the laser tracker with virtual distances is simulated and further compared with the conventional verification procedure of the laser tracker with the indexed metrology platform. The results obtained in terms of volumetric performance of the laser tracker proved the suitability of the virtual distances methodology in calibration and verification procedures for portable coordinate measuring instruments, broadening and expanding the possibilities for the definition of reference distances in these procedures.

  9. A Cache System Design for CMPs with Built-In Coherence Verification

    Directory of Open Access Journals (Sweden)

    Mamata Dalui

    2016-01-01

    Full Text Available This work reports an effective design of cache system for Chip Multiprocessors (CMPs. It introduces built-in logic for verification of cache coherence in CMPs realizing directory based protocol. It is developed around the cellular automata (CA machine, invented by John von Neumann in the 1950s. A special class of CA referred to as single length cycle 2-attractor cellular automata (TACA has been planted to detect the inconsistencies in cache line states of processors’ private caches. The TACA module captures coherence status of the CMPs’ cache system and memorizes any inconsistent recording of the cache line states during the processors’ reference to a memory block. Theory has been developed to empower a TACA to analyse the cache state updates and then to settle to an attractor state indicating quick decision on a faulty recording of cache line status. The introduction of segmentation of the CMPs’ processor pool ensures a better efficiency, in determining the inconsistencies, by reducing the number of computation steps in the verification logic. The hardware requirement for the verification logic points to the fact that the overhead of proposed coherence verification module is much lesser than that of the conventional verification units and is insignificant with respect to the cost involved in CMPs’ cache system.

  10. A feasible method for clinical delivery verification and dose reconstruction in tomotherapy

    International Nuclear Information System (INIS)

    Kapatoes, J.M.; Olivera, G.H.; Ruchala, K.J.; Smilowitz, J.B.; Reckwerdt, P.J.; Mackie, T.R.

    2001-01-01

    Delivery verification is the process in which the energy fluence delivered during a treatment is verified. This verified energy fluence can be used in conjunction with an image in the treatment position to reconstruct the full three-dimensional dose deposited. A method for delivery verification that utilizes a measured database of detector signal is described in this work. This database is a function of two parameters, radiological path-length and detector-to-phantom distance, both of which are computed from a CT image taken at the time of delivery. Such a database was generated and used to perform delivery verification and dose reconstruction. Two experiments were conducted: a simulated prostate delivery on an inhomogeneous abdominal phantom, and a nasopharyngeal delivery on a dog cadaver. For both cases, it was found that the verified fluence and dose results using the database approach agreed very well with those using previously developed and proven techniques. Delivery verification with a measured database and CT image at the time of treatment is an accurate procedure for tomotherapy. The database eliminates the need for any patient-specific, pre- or post-treatment measurements. Moreover, such an approach creates an opportunity for accurate, real-time delivery verification and dose reconstruction given fast image reconstruction and dose computation tools

  11. BEval: A Plug-in to Extend Atelier B with Current Verification Technologies

    Directory of Open Access Journals (Sweden)

    Valério Medeiros Jr.

    2014-01-01

    Full Text Available This paper presents BEval, an extension of Atelier B to improve automation in the verification activities in the B method or Event-B. It combines a tool for managing and verifying software projects (Atelier B and a model checker/animator (ProB so that the verification conditions generated in the former are evaluated with the latter. In our experiments, the two main verification strategies (manual and automatic showed significant improvement as ProB's evaluator proves complementary to Atelier B built-in provers. We conducted experiments with the B model of a micro-controller instruction set; several verification conditions, that we were not able to discharge automatically or manually with AtelierB's provers, were automatically verified using BEval.

  12. MFTF sensor verification computer program

    International Nuclear Information System (INIS)

    Chow, H.K.

    1984-01-01

    The design, requirements document and implementation of the MFE Sensor Verification System were accomplished by the Measurement Engineering Section (MES), a group which provides instrumentation for the MFTF magnet diagnostics. The sensors, installed on and around the magnets and solenoids, housed in a vacuum chamber, will supply information about the temperature, strain, pressure, liquid helium level and magnet voltage to the facility operator for evaluation. As the sensors are installed, records must be maintained as to their initial resistance values. Also, as the work progresses, monthly checks will be made to insure continued sensor health. Finally, after the MFTF-B demonstration, yearly checks will be performed as well as checks of sensors as problem develops. The software to acquire and store the data was written by Harry Chow, Computations Department. The acquired data will be transferred to the MFE data base computer system

  13. Numerical Verification Of Equilibrium Chemistry

    International Nuclear Information System (INIS)

    Piro, Markus; Lewis, Brent; Thompson, William T.; Simunovic, Srdjan; Besmann, Theodore M.

    2010-01-01

    A numerical tool is in an advanced state of development to compute the equilibrium compositions of phases and their proportions in multi-component systems of importance to the nuclear industry. The resulting software is being conceived for direct integration into large multi-physics fuel performance codes, particularly for providing boundary conditions in heat and mass transport modules. However, any numerical errors produced in equilibrium chemistry computations will be propagated in subsequent heat and mass transport calculations, thus falsely predicting nuclear fuel behaviour. The necessity for a reliable method to numerically verify chemical equilibrium computations is emphasized by the requirement to handle the very large number of elements necessary to capture the entire fission product inventory. A simple, reliable and comprehensive numerical verification method is presented which can be invoked by any equilibrium chemistry solver for quality assurance purposes.

  14. Seismic verification of underground explosions

    International Nuclear Information System (INIS)

    Glenn, L.A.

    1985-06-01

    The first nuclear test agreement, the test moratorium, was made in 1958 and lasted until the Soviet Union unilaterally resumed testing in the atmosphere in 1961. It was followed by the Limited Test Ban Treaty of 1963, which prohibited nuclear tests in the atmosphere, in outer space, and underwater. In 1974 the Threshold Test Ban Treaty (TTBT) was signed, limiting underground tests after March 1976 to a maximum yield of 250 kt. The TTBT was followed by a treaty limiting peaceful nuclear explosions and both the United States and the Soviet Union claim to be abiding by the 150-kt yield limit. A comprehensive test ban treaty (CTBT), prohibiting all testing of nuclear weapons, has also been discussed. However, a verifiable CTBT is a contradiction in terms. No monitoring technology can offer absolute assurance that very-low-yield illicit explosions have not occurred. The verification process, evasion opportunities, and cavity decoupling are discussed in this paper

  15. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  16. The verification of ethnographic data.

    Science.gov (United States)

    Pool, Robert

    2017-09-01

    Anthropologists are increasingly required to account for the data on which they base their interpretations and to make it available for public scrutiny and re-analysis. While this may seem straightforward (why not place our data in online repositories?), it is not. Ethnographic 'data' may consist of everything from verbatim transcripts ('hard data') to memories and impressions ('soft data'). Hard data can be archived and re-analysed; soft data cannot. The focus on hard 'objective' data contributes to the delegitimizing of the soft data that are essential for ethnographic understanding, and without which hard data cannot be properly interpreted. However, the credibility of ethnographic interpretation requires the possibility of verification. This could be achieved by obligatory, standardised forms of personal storage with the option for audit if required, and by being more explicit in publications about the nature and status of the data and the process of interpretation.

  17. Nuclear reactor with scrammable part length rod

    International Nuclear Information System (INIS)

    Bevilacqua, F.

    1979-01-01

    A new part length rod is provided. It may be used to control xenon induced power oscillations but to contribute to shutdown reactivity when a rapid shutdown of the reactor is required. The part length rod consists of a control rod with three regions. The lower control region is a longer weaker active portion separated from an upper stronger shorter poison section by an intermediate section which is a relative non-absorber of neutrons. The combination of the longer weaker control section with the upper high worth poison section permits the part length rod of this to be scrammed into the core when a reactor shutdown is required but also permits the control rod to be used as a tool to control power distribution in both the axial and radial directions during normal operation

  18. Formal verification of algorithms for critical systems

    Science.gov (United States)

    Rushby, John M.; Von Henke, Friedrich

    1993-01-01

    We describe our experience with formal, machine-checked verification of algorithms for critical applications, concentrating on a Byzantine fault-tolerant algorithm for synchronizing the clocks in the replicated computers of a digital flight control system. First, we explain the problems encountered in unsynchronized systems and the necessity, and criticality, of fault-tolerant synchronization. We give an overview of one such algorithm, and of the arguments for its correctness. Next, we describe a verification of the algorithm that we performed using our EHDM system for formal specification and verification. We indicate the errors we found in the published analysis of the algorithm, and other benefits that we derived from the verification. Based on our experience, we derive some key requirements for a formal specification and verification system adequate to the task of verifying algorithms of the type considered. Finally, we summarize our conclusions regarding the benefits of formal verification in this domain, and the capabilities required of verification systems in order to realize those benefits.

  19. Iran and the IAEA: Verification and monitoring under the JCPOA

    International Nuclear Information System (INIS)

    2016-01-01

    On 16 January 2016, IAEA Director General Yukiya Amano announced that Iran had completed the necessary preparatory steps to start implementation of the Joint Comprehensive Plan of Action (JCPOA). This ushers in a new phase in the relations between the IAEA and Iran, and represents the start of an increased effort of the IAEA’s verification and monitoring activities in Iran. The JCPOA was agreed last July between Iran and China, France, Germany, Russia, the United Kingdom, the United States and the European Union, the so called E3/EU+3. The IAEA, which is not party to the JCPOA, is undertaking a wide range of verification and monitoring of nuclear-related commitments set out in the document.

  20. How regional non-proliferation arrangements complement international verification

    International Nuclear Information System (INIS)

    Carlson, J.

    1999-01-01

    This presentation focuses on international verification in the form of IAEA Safeguards, and discusses the relationship between IAEA safeguards and the relevant regional arrangements, both the existing and the future. For most States the political commitment against acquisition of nuclear weapons has been carefully reached and strongly held. Their observance of treaty commitments does not depend on the deterrent effect of verification activities. Safeguards serve to assist States who recognise it is in their own interest to demonstrate their compliance to others. Thus safeguards are a vital confidence building measure in their own right, as well as being a major complement to the broader range of international confidence building measures. Safeguards can both complement other confidence building measures and in turn be complemented by them. Within consideration of how it could work it is useful to consider briefly current developments of IAEA safeguards, i.e. existing regional arrangements and nuclear weapon free zones

  1. Nuclear power plant C and I design verification by simulation

    International Nuclear Information System (INIS)

    Storm, Joachim; Yu, Kim; Lee, D.Y

    2003-01-01

    An important part of the Advanced Boiling Water Reactor (ABWR) in the Taiwan NPP Lungmen Units no.1 and no.2 is the Full Scope Simulator (FSS). The simulator was to be built according to design data and therefore, apart from the training aspect, a major part of the development is to apply a simulation based test bed for the verification, validation and improvement of plant design in the control and instrumentation (C and I) areas of unit control room equipment, operator Man Machine Interface (MMI), process computer functions and plant procedures. Furthermore the Full Scope Simulator will be used after that to allow proper training of the plant operators two years before Unit no.1 fuel load. The article describes scope, methods and results of the advanced verification and validation process and highlights the advantages of test bed simulation for real power plant design and implementation. Subsequent application of advanced simulation software tools like instrumentation and control translators, graphical model builders, process models, graphical on-line test tools and screen based or projected soft panels, allowed a team to fulfil the task of C and I verification in time before the implementation of the Distributed Control and Information System (DCIS) started. An additional area of activity was the Human Factors Engineering (HFE) for the operator MMI. Due to the fact that the ABWR design incorporates a display-based operation with most of the plant components, a dedicated verification and validation process is required by NUREG-0711. In order to support this activity an engineering test system had been installed for all the necessary HFE investigations. All detected improvements had been properly documented and used to update the plant design documentation by a defined process. The Full Scope Simulator (FSS) with hard panels and stimulated digital control and information system are in the final acceptance test process with the end customer, Taiwan Power Company

  2. A Verification Logic for GOAL Agents

    Science.gov (United States)

    Hindriks, K. V.

    Although there has been a growing body of literature on verification of agents programs, it has been difficult to design a verification logic for agent programs that fully characterizes such programs and to connect agent programs to agent theory. The challenge is to define an agent programming language that defines a computational framework but also allows for a logical characterization useful for verification. The agent programming language GOAL has been originally designed to connect agent programming to agent theory and we present additional results here that GOAL agents can be fully represented by a logical theory. GOAL agents can thus be said to execute the corresponding logical theory.

  3. A framework for nuclear agreement and verification

    International Nuclear Information System (INIS)

    Ali, A.

    1991-01-01

    This chapter assesses the prospects for a nuclear agreement between India and Pakistan. The chapter opens with a review of past and present political environments of the two countries. The discussion proceeds to describe the linkage of global arms control agreements, prospects for verification of a Comprehensive Test Ban Treaty, the role of nuclear power in any agreements, the intrusiveness of verification, and possible post-proliferation agreements. Various monitoring and verification technologies are described (mainly satellite oriented). The chapter concludes with an analysis of the likelihood of persuading India and Pakistan to agree to a nonproliferation arrangement

  4. Verification of DRAGON: the NXT tracking module

    International Nuclear Information System (INIS)

    Zkiek, A.; Marleau, G.

    2007-01-01

    The version of DRAGON-IST that has been verified for the calculation of the incremental cross sections associated with CANDU reactivity devices is version 3.04Bb that was released in 2001. Since then, various improvements were implemented in the code including the NXT: module that can track assemblies of clusters in 2-D and 3-D geometries. Here we will discuss the verification plan for the NXT: module of DRAGON, illustrate the verification procedure we selected and present our verification results. (author)

  5. Data Exchanges and Verifications Online (DEVO)

    Data.gov (United States)

    Social Security Administration — DEVO is the back-end application for processing SSN verifications and data exchanges. DEVO uses modern technology for parameter driven processing of both batch and...

  6. 10 CFR 300.11 - Independent verification.

    Science.gov (United States)

    2010-01-01

    ... DEPARTMENT OF ENERGY CLIMATE CHANGE VOLUNTARY GREENHOUSE GAS REPORTING PROGRAM: GENERAL GUIDELINES § 300.11... managing an auditing or verification process, including the recruitment and allocation of other individual.... (c) Qualifications of organizations accrediting verifiers. Organizations that accredit individual...

  7. Engineering drawing field verification program. Revision 3

    International Nuclear Information System (INIS)

    Ulk, P.F.

    1994-01-01

    Safe, efficient operation of waste tank farm facilities is dependent in part upon the availability of accurate, up-to-date plant drawings. Accurate plant drawings are also required in support of facility upgrades and future engineering remediation projects. This supporting document establishes the procedure for performing a visual field verification of engineering drawings, the degree of visual observation being performed and documenting the results. A copy of the drawing attesting to the degree of visual observation will be paginated into the released Engineering Change Notice (ECN) documenting the field verification for future retrieval and reference. All waste tank farm essential and support drawings within the scope of this program will be converted from manual to computer aided drafting (CAD) drawings. A permanent reference to the field verification status will be placed along the right border of the CAD-converted drawing, referencing the revision level, at which the visual verification was performed and documented

  8. HDM/PASCAL Verification System User's Manual

    Science.gov (United States)

    Hare, D.

    1983-01-01

    The HDM/Pascal verification system is a tool for proving the correctness of programs written in PASCAL and specified in the Hierarchical Development Methodology (HDM). This document assumes an understanding of PASCAL, HDM, program verification, and the STP system. The steps toward verification which this tool provides are parsing programs and specifications, checking the static semantics, and generating verification conditions. Some support functions are provided such as maintaining a data base, status management, and editing. The system runs under the TOPS-20 and TENEX operating systems and is written in INTERLISP. However, no knowledge is assumed of these operating systems or of INTERLISP. The system requires three executable files, HDMVCG, PARSE, and STP. Optionally, the editor EMACS should be on the system in order for the editor to work. The file HDMVCG is invoked to run the system. The files PARSE and STP are used as lower forks to perform the functions of parsing and proving.

  9. Standard Verification System Lite (SVS Lite)

    Data.gov (United States)

    Social Security Administration — SVS Lite is a mainframe program used exclusively by the Office of Child Support Enforcement (OCSE) to perform batch SSN verifications. This process is exactly the...

  10. Field Verification Project for Small Wind Turbines, Quarterly Report: April - June 2001; 2nd Quarter, Issue No.5

    Energy Technology Data Exchange (ETDEWEB)

    2002-04-01

    This newsletter provides a brief overview of the Field Verification Project for Small Wind Turbines conducted out of the NWTC and a description of current activities. The newsletter also contains case studies of current projects.

  11. Field Verification Program for Small Wind Turbines: Quarterly Report for January-March 2001; 1st Quarter, Issue No.4

    Energy Technology Data Exchange (ETDEWEB)

    Forsyth, T.; Cardinal, J.

    2001-10-30

    This newsletter provides a brief overview of the Field Verification Program for Small Wind Turbines conducted out of the NWTC and a description of current activities. The newsletter also contains case studies of current projects.

  12. Field Verification Program for Small Wind Turbines: Quarterly Report for October-December 2000; 4th Quarter, Iss. No.3

    Energy Technology Data Exchange (ETDEWEB)

    Cardinal, J.

    2001-07-03

    This newsletter provides a brief overview of the Field Verification Program for Small Wind Turbines conducted out of the NWTC and a description of current activities. The newsletter also contains case studies of current projects.

  13. Field Verification Project for Small Wind Turbines Quarterly Report; July-September 2001, 3rd Quarter, Issue#6

    Energy Technology Data Exchange (ETDEWEB)

    2003-04-01

    This newsletter provides a brief overview of the Field Verification Project for Small Wind Turbines conducted at the NWTC and a description of current activities. The newsletter also contains case studies of current projects.

  14. Field Verification Program for Small Wind Turbines, Quarterly Report: 3rd Quarter, Issue No.2, July-September 2000

    Energy Technology Data Exchange (ETDEWEB)

    Cardinal. J.; Tu, P.

    2001-05-16

    This newsletter provides a brief overview of the Field Verification Program for Small Wind Turbines conducted out of the NWTC and a description of current activities. The newsletter also contains case studies of current projects.

  15. Flammable Gas Refined Safety Analysis Tool Software Verification and Validation Report for Resolve Version 2.5

    International Nuclear Information System (INIS)

    BRATZEL, D.R.

    2000-01-01

    The purpose of this report is to document all software verification and validation activities, results, and findings related to the development of Resolve Version 2.5 for the analysis of flammable gas accidents in Hanford Site waste tanks

  16. Standard practice for verification and classification of extensometer systems

    CERN Document Server

    American Society for Testing and Materials. Philadelphia

    2010-01-01

    1.1 This practice covers procedures for the verification and classification of extensometer systems, but it is not intended to be a complete purchase specification. The practice is applicable only to instruments that indicate or record values that are proportional to changes in length corresponding to either tensile or compressive strain. Extensometer systems are classified on the basis of the magnitude of their errors. 1.2 Because strain is a dimensionless quantity, this document can be used for extensometers based on either SI or US customary units of displacement. Note 1—Bonded resistance strain gauges directly bonded to a specimen cannot be calibrated or verified with the apparatus described in this practice for the verification of extensometers having definite gauge points. (See procedures as described in Test Methods E251.) 1.3 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish app...

  17. Inventory verification measurements using neutron multiplicity counting

    International Nuclear Information System (INIS)

    Ensslin, N.; Foster, L.A.; Harker, W.C.; Krick, M.S.; Langner, D.G.

    1998-01-01

    This paper describes a series of neutron multiplicity measurements of large plutonium samples at the Los Alamos Plutonium Facility. The measurements were corrected for bias caused by neutron energy spectrum shifts and nonuniform multiplication, and are compared with calorimetry/isotopics. The results show that multiplicity counting can increase measurement throughput and yield good verification results for some inventory categories. The authors provide recommendations on the future application of the technique to inventory verification

  18. Verification of Open Interactive Markov Chains

    OpenAIRE

    Brazdil, Tomas; Hermanns, Holger; Krcal, Jan; Kretinsky, Jan; Rehak, Vojtech

    2012-01-01

    Interactive Markov chains (IMC) are compositional behavioral models extending both labeled transition systems and continuous-time Markov chains. IMC pair modeling convenience - owed to compositionality properties - with effective verification algorithms and tools - owed to Markov properties. Thus far however, IMC verification did not consider compositionality properties, but considered closed systems. This paper discusses the evaluation of IMC in an open and thus compositional interpretation....

  19. Towards automatic verification of ladder logic programs

    OpenAIRE

    Zoubek , Bohumir; Roussel , Jean-Marc; Kwiatkowska , Martha

    2003-01-01

    International audience; Control system programs are usually validated by testing prior to their deployment. Unfortunately, testing is not exhaustive and therefore it is possible that a program which passed all the required tests still contains errors. In this paper we apply techniques of automatic verification to a control program written in ladder logic. A model is constructed mechanically from the ladder logic program and subjected to automatic verification against requirements that include...

  20. Transmutation Fuel Performance Code Thermal Model Verification

    Energy Technology Data Exchange (ETDEWEB)

    Gregory K. Miller; Pavel G. Medvedev

    2007-09-01

    FRAPCON fuel performance code is being modified to be able to model performance of the nuclear fuels of interest to the Global Nuclear Energy Partnership (GNEP). The present report documents the effort for verification of the FRAPCON thermal model. It was found that, with minor modifications, FRAPCON thermal model temperature calculation agrees with that of the commercial software ABAQUS (Version 6.4-4). This report outlines the methodology of the verification, code input, and calculation results.

  1. Verification and Validation in Systems Engineering

    CERN Document Server

    Debbabi, Mourad; Jarraya, Yosr; Soeanu, Andrei; Alawneh, Luay

    2010-01-01

    "Verification and validation" represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle. Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic verification and validation of systems engineering design models expressed in standardized modeling languages. Their presentation includes a bird's eye view of the most prominent modeling languages for software and systems engineering, namely the Unified Model

  2. Verification and validation for waste disposal models

    International Nuclear Information System (INIS)

    1987-07-01

    A set of evaluation criteria has been developed to assess the suitability of current verification and validation techniques for waste disposal methods. A survey of current practices and techniques was undertaken and evaluated using these criteria with the items most relevant to waste disposal models being identified. Recommendations regarding the most suitable verification and validation practices for nuclear waste disposal modelling software have been made

  3. Performing Verification and Validation in Reuse-Based Software Engineering

    Science.gov (United States)

    Addy, Edward A.

    1999-01-01

    The implementation of reuse-based software engineering not only introduces new activities to the software development process, such as domain analysis and domain modeling, it also impacts other aspects of software engineering. Other areas of software engineering that are affected include Configuration Management, Testing, Quality Control, and Verification and Validation (V&V). Activities in each of these areas must be adapted to address the entire domain or product line rather than a specific application system. This paper discusses changes and enhancements to the V&V process, in order to adapt V&V to reuse-based software engineering.

  4. Verification and validation guidelines for high integrity systems. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    Hecht, H.; Hecht, M.; Dinsmore, G.; Hecht, S.; Tang, D. [SoHaR, Inc., Beverly Hills, CA (United States)

    1995-03-01

    High integrity systems include all protective (safety and mitigation) systems for nuclear power plants, and also systems for which comparable reliability requirements exist in other fields, such as in the process industries, in air traffic control, and in patient monitoring and other medical systems. Verification aims at determining that each stage in the software development completely and correctly implements requirements that were established in a preceding phase, while validation determines that the overall performance of a computer system completely and correctly meets system requirements. Volume I of the report reviews existing classifications for high integrity systems and for the types of errors that may be encountered, and makes recommendations for verification and validation procedures, based on assumptions about the environment in which these procedures will be conducted. The final chapter of Volume I deals with a framework for standards in this field. Volume II contains appendices dealing with specific methodologies for system classification, for dependability evaluation, and for two software tools that can automate otherwise very labor intensive verification and validation activities.

  5. Verification of space weather forecasts at the UK Met Office

    Science.gov (United States)

    Bingham, S.; Sharpe, M.; Jackson, D.; Murray, S.

    2017-12-01

    The UK Met Office Space Weather Operations Centre (MOSWOC) has produced space weather guidance twice a day since its official opening in 2014. Guidance includes 4-day probabilistic forecasts of X-ray flares, geomagnetic storms, high-energy electron events and high-energy proton events. Evaluation of such forecasts is important to forecasters, stakeholders, model developers and users to understand the performance of these forecasts and also strengths and weaknesses to enable further development. Met Office terrestrial near real-time verification systems have been adapted to provide verification of X-ray flare and geomagnetic storm forecasts. Verification is updated daily to produce Relative Operating Characteristic (ROC) curves and Reliability diagrams, and rolling Ranked Probability Skill Scores (RPSSs) thus providing understanding of forecast performance and skill. Results suggest that the MOSWOC issued X-ray flare forecasts are usually not statistically significantly better than a benchmark climatological forecast (where the climatology is based on observations from the previous few months). By contrast, the issued geomagnetic storm activity forecast typically performs better against this climatological benchmark.

  6. Verification and validation guidelines for high integrity systems. Volume 1

    International Nuclear Information System (INIS)

    Hecht, H.; Hecht, M.; Dinsmore, G.; Hecht, S.; Tang, D.

    1995-03-01

    High integrity systems include all protective (safety and mitigation) systems for nuclear power plants, and also systems for which comparable reliability requirements exist in other fields, such as in the process industries, in air traffic control, and in patient monitoring and other medical systems. Verification aims at determining that each stage in the software development completely and correctly implements requirements that were established in a preceding phase, while validation determines that the overall performance of a computer system completely and correctly meets system requirements. Volume I of the report reviews existing classifications for high integrity systems and for the types of errors that may be encountered, and makes recommendations for verification and validation procedures, based on assumptions about the environment in which these procedures will be conducted. The final chapter of Volume I deals with a framework for standards in this field. Volume II contains appendices dealing with specific methodologies for system classification, for dependability evaluation, and for two software tools that can automate otherwise very labor intensive verification and validation activities

  7. An international cooperative verification agenda for arms reduction

    International Nuclear Information System (INIS)

    Hinderstein, C.

    2013-01-01

    The biggest challenge to the overall verification and monitoring agenda for future arms reductions may be that posed by uncertainties regarding the quantities of existing stocks of fissile material and nuclear weapons. We must develop strategies to reduce the residual uncertainties regarding completeness of initial declarations as all declared weapons-related inventories go to zero. Establishing this confidence in countries' initial baseline declarations will likely be a key point in all states' decisions to move to very low numbers, much less zero. The author reviews the questions and challenges that need to be addressed if there is to be significant progress in negotiating and implementing a verifiable fissile material cutoff treaty (FMCT) and a policy of nuclear weapon dismantling. In support of greater security as the world works towards the elimination of nuclear weapons, individual States could begin immediately by increasing the transparency of their nuclear activities. The International Verification Project is designed to bring experts from a wide array of related backgrounds together to build capacity for verification internationally in support of arms control goals (and in support of the larger objective of a world without nuclear weapons), build confidence between nuclear and non-nuclear-weapon states, promote freer flow of information among governments and between governments and non-governmental organizations (NGOs) and solve technical problems that could be barriers to progress. The paper is followed by the slides of the presentation. (A.C.)

  8. Hailstorms over Switzerland: Verification of Crowd-sourced Data

    Science.gov (United States)

    Noti, Pascal-Andreas; Martynov, Andrey; Hering, Alessandro; Martius, Olivia

    2016-04-01

    The reports of smartphone users, witnessing hailstorms, can be used as source of independent, ground-based observation data on ground-reaching hailstorms with high temporal and spatial resolution. The presented work focuses on the verification of crowd-sourced data collected over Switzerland with the help of a smartphone application recently developed by MeteoSwiss. The precise location, time of hail precipitation and the hailstone size are included in the crowd-sourced data, assessed on the basis of the weather radar data of MeteoSwiss. Two radar-based hail detection algorithms, POH (Probability of Hail) and MESHS (Maximum Expected Severe Hail Size), in use at MeteoSwiss are confronted with the crowd-sourced data. The available data and investigation time period last from June to August 2015. Filter criteria have been applied in order to remove false reports from the crowd-sourced data. Neighborhood methods have been introduced to reduce the uncertainties which result from spatial and temporal biases. The crowd-sourced and radar data are converted into binary sequences according to previously set thresholds, allowing for using a categorical verification. Verification scores (e.g. hit rate) are then calculated from a 2x2 contingency table. The hail reporting activity and patterns corresponding to "hail" and "no hail" reports, sent from smartphones, have been analyzed. The relationship between the reported hailstone sizes and both radar-based hail detection algorithms have been investigated.

  9. Concepts for inventory verification in critical facilities

    International Nuclear Information System (INIS)

    Cobb, D.D.; Sapir, J.L.; Kern, E.A.; Dietz, R.J.

    1978-12-01

    Materials measurement and inventory verification concepts for safeguarding large critical facilities are presented. Inspection strategies and methods for applying international safeguards to such facilities are proposed. The conceptual approach to routine inventory verification includes frequent visits to the facility by one inspector, and the use of seals and nondestructive assay (NDA) measurements to verify the portion of the inventory maintained in vault storage. Periodic verification of the reactor inventory is accomplished by sampling and NDA measurement of in-core fuel elements combined with measurements of integral reactivity and related reactor parameters that are sensitive to the total fissile inventory. A combination of statistical sampling and NDA verification with measurements of reactor parameters is more effective than either technique used by itself. Special procedures for assessment and verification for abnormal safeguards conditions are also considered. When the inspection strategies and inventory verification methods are combined with strict containment and surveillance methods, they provide a high degree of assurance that any clandestine attempt to divert a significant quantity of fissile material from a critical facility inventory will be detected. Field testing of specific hardware systems and procedures to determine their sensitivity, reliability, and operational acceptability is recommended. 50 figures, 21 tables

  10. Container Verification Using Optically Stimulated Luminescence

    International Nuclear Information System (INIS)

    Tanner, Jennifer E.; Miller, Steven D.; Conrady, Matthew M.; Simmons, Kevin L.; Tinker, Michael R.

    2008-01-01

    Containment verification is a high priority for safeguards containment and surveillance. Nuclear material containers, safeguards equipment cabinets, camera housings, and detector cable conduit are all vulnerable to tampering. Even with a high security seal on a lid or door, custom-built hinges and interfaces, and special colors and types of finishes, the surfaces of enclosures can be tampered with and any penetrations repaired and covered over. With today's technology, these repairs would not be detected during a simple visual inspection. Several suggested solutions have been to develop complicated networks of wires, fiber-optic cables, lasers or other sensors that line the inside of a container and alarm when the network is disturbed. This results in an active system with real time evidence of tampering but is probably not practical for most safeguards applications. A more practical solution would be to use a passive approach where an additional security feature was added to surfaces which would consist of a special coating or paint applied to the container or enclosure. One type of coating would incorporate optically stimulated luminescent (OSL) material. OSL materials are phosphors that luminesce in proportion to the ionizing radiation dose when stimulated with the appropriate optical wavelengths. The OSL fluoresces at a very specific wavelength when illuminated at another, very specific wavelength. The presence of the pre-irradiated OSL material in the coating is confirmed using a device that interrogates the surface of the enclosure using the appropriate optical wavelength and then reads the resulting luminescence. The presence of the OSL indicates that the integrity of the surface is intact. The coating itself could be transparent which would allow the appearance of the container to remain unchanged or the OSL material could be incorporated into certain paints or epoxies used on various types of containers. The coating could be applied during manufacturing

  11. Tomotherapy: IMRT and tomographic verification

    International Nuclear Information System (INIS)

    Mackie, T.R.

    2000-01-01

    include MLC's and many clinics use them to replace 90% or more of the field-shaping requirements of conventional radiotherapy. Now, several academic centers are treating patients with IMRT using conventional MLC's to modulate the field. IMRT using conventional MLC's have the advantage that the patient is stationary during the treatment and the MLC's can be used in conventional practice. Nevertheless, tomotherapy using the Peacock system delivers the most conformal dose distributions of any commercial system to date. The biggest limitation with the both the NOMOS Peacock tomotherapy system and conventional MLC's for IMRT delivery is the lack of treatment verification. In conventional few-field radiotherapy one relied on portal images to determine if the patient was setup correctly and the beams were correctly positioned. With IMRT the image contrast is superimposed on the beam intensity variation. Conventional practice allowed for monitor unit calculation checks and point dosimeters placed on the patient's surface to verify that the treatment was properly delivered. With IMRT it is impossible to perform hand calculations of monitor units and dosimeters placed on the patient's surface are prone to error due to high gradients in the beam intensity. NOMOS has developed a verification phantom that allows multiple sheets of film to be placed in a light-tight box that is irradiated with the same beam pattern that is used to treat the patient. The optical density of the films are adjusted, normalized, and calibrated and then quantitatively compared with the dose calculated for the phantom delivery. However, this process is too laborious to be used for patient-specific QA. If IMRT becomes ubiquitous and it can be shown that IMRT is useful on most treatment sites then there is a need to design treatment units dedicated to IMRT delivery and verification. Helical tomotherapy is such a redesign. Helical tomotherapy is the delivery of a rotational fan beam while the patient is

  12. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-01-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  13. Dosimetric verification of IMRT plans

    International Nuclear Information System (INIS)

    Bulski, W.; Cheimicski, K.; Rostkowska, J.

    2012-01-01

    Intensity modulated radiotherapy (IMRT) is a complex procedure requiring proper dosimetric verification. IMRT dose distributions are characterized by steep dose gradients which enable to spare organs at risk and allow for an escalation of the dose to the tumor. They require large number of radiation beams (sometimes over 10). The fluence measurements for individual beams are not sufficient for evaluation of the total dose distribution and to assure patient safety. The methods used at the Centre of Oncology in Warsaw are presented. In order to measure dose distributions in various cross-sections the film dosimeters were used (radiographic Kodak EDR2 films and radiochromic Gafchromic EBT films). The film characteristics were carefully examined. Several types of tissue equivalent phantoms were developed. A methodology of comparing measured dose distributions against the distributions calculated by treatment planning systems (TPS) was developed and tested. The tolerance level for this comparison was set at 3% difference in dose and 3 mm in distance to agreement. The so called gamma formalism was used. The results of these comparisons for a group of over 600 patients are presented. Agreement was found in 87 % of cases. This film dosimetry methodology was used as a benchmark to test and validate the performance of commercially available 2D and 3D matrices of detectors (ionization chambers or diodes). The results of these validations are also presented. (authors)

  14. STAR-CCM+ Verification and Validation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Pointer, William David [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-09-30

    The commercial Computational Fluid Dynamics (CFD) code STAR-CCM+ provides general purpose finite volume method solutions for fluid dynamics and energy transport. This document defines plans for verification and validation (V&V) of the base code and models implemented within the code by the Consortium for Advanced Simulation of Light water reactors (CASL). The software quality assurance activities described herein are port of the overall software life cycle defined in the CASL Software Quality Assurance (SQA) Plan [Sieger, 2015]. STAR-CCM+ serves as the principal foundation for development of an advanced predictive multi-phase boiling simulation capability within CASL. The CASL Thermal Hydraulics Methods (THM) team develops advanced closure models required to describe the subgrid-resolution behavior of secondary fluids or fluid phases in multiphase boiling flows within the Eulerian-Eulerian framework of the code. These include wall heat partitioning models that describe the formation of vapor on the surface and the forces the define bubble/droplet dynamic motion. The CASL models are implemented as user coding or field functions within the general framework of the code. This report defines procedures and requirements for V&V of the multi-phase CFD capability developed by CASL THM. Results of V&V evaluations will be documented in a separate STAR-CCM+ V&V assessment report. This report is expected to be a living document and will be updated as additional validation cases are identified and adopted as part of the CASL THM V&V suite.

  15. Seismic verification of nuclear plant equipment anchorage

    International Nuclear Information System (INIS)

    Lepiece, M.; Van Vyve, J.

    1991-01-01

    More than 60% of the electrical power of Belgium is generated by seven PWR nuclear power plants. For three of them, the electro-mechanical equipment had to be reassessed after ten years of operation, because the seismic requirements were upgraded from 0.1 g to 0.17 g free field ground acceleration. The seismic requalification of the active equipment was a critical problem as the classical methods were too conservative. The approach based on the use of the past experience on the seismic behavior of nonnuclear equipment, chosen and developed by the SQUG, had to be transposed to the Belgian N.P.P. The decision of the accept-ability of equipment relies heavily on the aseismatic capacity of anchorage. The Electrical Power Research Institute (EPRI) developed the procedure and guideline for the demonstration of the aseismatic adequacy of equipment anchorage in a cost-effective and consistent manner, to support the decision by Seismic Review Team. The field inspection procedure to identify the type of fasteners and detect their possible defects and the verification procedure developed to calculate the aseismatic capacity of equipment anchorage on the strength of fasteners, the aseismatic capacity of anchorage and the comparison of the capacity with the demand are reported. (K.I.)

  16. SU-E-T-762: Toward Volume-Based Independent Dose Verification as Secondary Check

    International Nuclear Information System (INIS)

    Tachibana, H; Tachibana, R

    2015-01-01

    Purpose: Lung SBRT plan has been shifted to volume prescription technique. However, point dose agreement is still verified using independent dose verification at the secondary check. The volume dose verification is more affected by inhomogeneous correction rather than point dose verification currently used as the check. A feasibility study for volume dose verification was conducted in lung SBRT plan. Methods: Six SBRT plans were collected in our institute. Two dose distributions with / without inhomogeneous correction were generated using Adaptive Convolve (AC) in Pinnacle3. Simple MU Analysis (SMU, Triangle Product, Ishikawa, JP) was used as the independent dose verification software program, in which a modified Clarkson-based algorithm was implemented and radiological path length was computed using CT images independently to the treatment planning system. The agreement in point dose and mean dose between the AC with / without the correction and the SMU were assessed. Results: In the point dose evaluation for the center of the GTV, the difference shows the systematic shift (4.5% ± 1.9 %) in comparison of the AC with the inhomogeneous correction, on the other hands, there was good agreement of 0.2 ± 0.9% between the SMU and the AC without the correction. In the volume evaluation, there were significant differences in mean dose for not only PTV (14.2 ± 5.1 %) but also GTV (8.0 ± 5.1 %) compared to the AC with the correction. Without the correction, the SMU showed good agreement for GTV (1.5 ± 0.9%) as well as PTV (0.9% ± 1.0%). Conclusion: The volume evaluation for secondary check may be possible in homogenous region. However, the volume including the inhomogeneous media would make larger discrepancy. Dose calculation algorithm for independent verification needs to be modified to take into account the inhomogeneous correction

  17. Does length or neighborhood size cause the word length effect?

    Science.gov (United States)

    Jalbert, Annie; Neath, Ian; Surprenant, Aimée M

    2011-10-01

    Jalbert, Neath, Bireta, and Surprenant (2011) suggested that past demonstrations of the word length effect, the finding that words with fewer syllables are recalled better than words with more syllables, included a confound: The short words had more orthographic neighbors than the long words. The experiments reported here test two predictions that would follow if neighborhood size is a more important factor than word length. In Experiment 1, we found that concurrent articulation removed the effect of neighborhood size, just as it removes the effect of word length. Experiment 2 demonstrated that this pattern is also found with nonwords. For Experiment 3, we factorially manipulated length and neighborhood size, and found only effects of the latter. These results are problematic for any theory of memory that includes decay offset by rehearsal, but they are consistent with accounts that include a redintegrative stage that is susceptible to disruption by noise. The results also confirm the importance of lexical and linguistic factors on memory tasks thought to tap short-term memory.

  18. Formal verification and validation of the safety-critical software in a digital reactor protection system

    International Nuclear Information System (INIS)

    Kwon, K. C.; Park, G. Y.

    2006-01-01

    This paper describes the Verification and Validation (V and V) activities for the safety-critical software in a Digital Reactor Protection System (DRPS) that is being developed through the Korea nuclear instrumentation and control system project. The main activities of the DRPS V and V process are a preparation of the software planning documentation, a verification of the software according to the software life cycle, a software safety analysis and a software configuration management. The verification works for the Software Requirement Specification (SRS) of the DRPS consist of a technical evaluation, a licensing suitability evaluation, a inspection and traceability analysis, a formal verification, and preparing a test plan and procedure. Especially, the SRS is specified by the formal specification method in the development phase, and the formal SRS is verified by a formal verification method. Through these activities, we believe we can achieve the functionality, performance, reliability, and safety that are the major V and V objectives of the nuclear safety-critical software in a DRPS. (authors)

  19. Continuously variable focal length lens

    Science.gov (United States)

    Adams, Bernhard W; Chollet, Matthieu C

    2013-12-17

    A material preferably in crystal form having a low atomic number such as beryllium (Z=4) provides for the focusing of x-rays in a continuously variable manner. The material is provided with plural spaced curvilinear, optically matched slots and/or recesses through which an x-ray beam is directed. The focal length of the material may be decreased or increased by increasing or decreasing, respectively, the number of slots (or recesses) through which the x-ray beam is directed, while fine tuning of the focal length is accomplished by rotation of the material so as to change the path length of the x-ray beam through the aligned cylindrical slows. X-ray analysis of a fixed point in a solid material may be performed by scanning the energy of the x-ray beam while rotating the material to maintain the beam's focal point at a fixed point in the specimen undergoing analysis.

  20. CEBAF Upgrade Bunch Length Measurements

    Energy Technology Data Exchange (ETDEWEB)

    Ahmad, Mahmoud [Old Dominion Univ., Norfolk, VA (United States)

    2016-05-01

    Many accelerators use short electron bunches and measuring the bunch length is important for efficient operations. CEBAF needs a suitable bunch length because bunches that are too long will result in beam interruption to the halls due to excessive energy spread and beam loss. In this work, bunch length is measured by invasive and non-invasive techniques at different beam energies. Two new measurement techniques have been commissioned; a harmonic cavity showed good results compared to expectations from simulation, and a real time interferometer is commissioned and first checkouts were performed. Three other techniques were used for measurements and comparison purposes without modifying the old procedures. Two of them can be used when the beam is not compressed longitudinally while the other one, the synchrotron light monitor, can be used with compressed or uncompressed beam.

  1. Kondo length in bosonic lattices

    Science.gov (United States)

    Giuliano, Domenico; Sodano, Pasquale; Trombettoni, Andrea

    2017-09-01

    Motivated by the fact that the low-energy properties of the Kondo model can be effectively simulated in spin chains, we study the realization of the effect with bond impurities in ultracold bosonic lattices at half filling. After presenting a discussion of the effective theory and of the mapping of the bosonic chain onto a lattice spin Hamiltonian, we provide estimates for the Kondo length as a function of the parameters of the bosonic model. We point out that the Kondo length can be extracted from the integrated real-space correlation functions, which are experimentally accessible quantities in experiments with cold atoms.

  2. Continuous lengths of oxide superconductors

    Science.gov (United States)

    Kroeger, Donald M.; List, III, Frederick A.

    2000-01-01

    A layered oxide superconductor prepared by depositing a superconductor precursor powder on a continuous length of a first substrate ribbon. A continuous length of a second substrate ribbon is overlaid on the first substrate ribbon. Sufficient pressure is applied to form a bound layered superconductor precursor powder between the first substrate ribbon and the second substrate ribbon. The layered superconductor precursor is then heat treated to establish the oxide superconducting phase. The layered oxide superconductor has a smooth interface between the substrate and the oxide superconductor.

  3. Summary of neutron scattering lengths

    International Nuclear Information System (INIS)

    Koester, L.

    1981-12-01

    All available neutron-nuclei scattering lengths are collected together with their error bars in a uniform way. Bound scattering lengths are given for the elements, the isotopes, and the various spin-states. They are discussed in the sense of their use as basic parameters for many investigations in the field of nuclear and solid state physics. The data bank is available on magnetic tape, too. Recommended values and a map of these data serve for an uncomplicated use of these quantities. (orig.)

  4. Overview of bunch length measurements

    International Nuclear Information System (INIS)

    Lumpkin, A. H.

    1999-01-01

    An overview of particle and photon beam bunch length measurements is presented in the context of free-electron laser (FEL) challenges. Particle-beam peak current is a critical factor in obtaining adequate FEL gain for both oscillators and self-amplified spontaneous emission (SASE) devices. Since measurement of charge is a standard measurement, the bunch length becomes the key issue for ultrashort bunches. Both time-domain and frequency-domain techniques are presented in the context of using electromagnetic radiation over eight orders of magnitude in wavelength. In addition, the measurement of microbunching in a micropulse is addressed

  5. PDGF-induced migration of synthetic vascular smooth muscle cells through c-Src-activated L-type Ca2+ channels with full-length CaV1.2 C-terminus.

    Science.gov (United States)

    Guo, Xiaoguang; Kashihara, Toshihide; Nakada, Tsutomu; Aoyama, Toshifumi; Yamada, Mitsuhiko

    2018-06-01

    In atherosclerosis, vascular smooth muscle cells (VSMC) migrate from the media toward the intima of the arteries in response to cytokines, such as platelet-derived growth factor (PDGF). However, molecular mechanism underlying the PDGF-induced migration of VSMCs remains unclear. The migration of rat aorta-derived synthetic VSMCs, A7r5, in response to PDGF was potently inhibited by a Ca V 1.2 channel inhibitor, nifedipine, and a Src family tyrosine kinase (SFK)/Abl inhibitor, bosutinib, in a less-than-additive manner. PDGF significantly increased Ca V 1.2 channel currents without altering Ca V 1.2 protein expression levels in A7r5 cells. This reaction was inhibited by C-terminal Src kinase, a selective inhibitor of SFKs. In contractile VSMCs, the C-terminus of Ca V 1.2 is proteolytically cleaved into proximal and distal C-termini (PCT and DCT, respectively). Clipped DCT is noncovalently reassociated with PCT to autoinhibit the channel activity. Conversely, in synthetic A7r5 cells, full-length Ca V 1.2 (Ca V 1.2FL) is expressed much more abundantly than truncated Ca V 1.2. In a heterologous expression system, c-Src activated Ca V 1.2 channels composed of Ca V 1.2FL but not truncated Ca V 1.2 (Ca V 1.2Δ1763) or Ca V 1.2Δ1763 plus clipped DCT. Further, c-Src enhanced the coupling efficiency between the voltage-sensing domain and activation gate of Ca V 1.2FL channels by phosphorylating Tyr1709 and Tyr1758 in PCT. Compared with Ca V 1.2Δ1763, c-Src could more efficiently bind to and phosphorylate Ca V 1.2FL irrespective of the presence or absence of clipped DCT. Therefore, in atherosclerotic lesions, phenotypic switching of VSMCs may facilitate pro-migratory effects of PDGF on VSMCs by suppressing posttranslational Ca V 1.2 modifications.

  6. Monitoring and verification R and D

    International Nuclear Information System (INIS)

    Pilat, Joseph F.; Budlong-Sylvester, Kory W.; Fearey, Bryan L.

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R and D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R and D required to address these gaps and other monitoring and verification challenges.

  7. Assessing impact of climate change on season length in Karnataka

    Indian Academy of Sciences (India)

    Changes in seasons and season length are an indicator, as well as an effect, of climate change. Seasonal change profoundly affects the balance of life in ecosystems and impacts essential human activities such as agriculture and irrigation. This study investigates the uncertainty of season length in Karnataka state, India, ...

  8. Tube Length and Water Flow

    Directory of Open Access Journals (Sweden)

    Ben Ruktantichoke

    2011-06-01

    Full Text Available In this study water flowed through a straight horizontal plastic tube placed at the bottom of a large tank of water. The effect of changing the length of tubing on the velocity of flow was investigated. It was found that the Hagen-Poiseuille Equation is valid when the effect of water entering the tube is accounted for.

  9. Finite length Taylor Couette flow

    Science.gov (United States)

    Streett, C. L.; Hussaini, M. Y.

    1987-01-01

    Axisymmetric numerical solutions of the unsteady Navier-Stokes equations for flow between concentric rotating cylinders of finite length are obtained by a spectral collocation method. These representative results pertain to two-cell/one-cell exchange process, and are compared with recent experiments.

  10. Symposium on International Safeguards: Preparing for Future Verification Challenges

    International Nuclear Information System (INIS)

    2010-01-01

    The purpose of the symposium is to foster dialogue and information exchange involving Member States, the nuclear industry and members of the broader nuclear non-proliferation community to prepare for future verification challenges. Topics addressed during the 2010 symposium include the following: - Supporting the global nuclear non-proliferation regime: Building support for strengthening international safeguards; Enhancing confidence in compliance with safeguards obligations; Legal authority as a means to enhance effectiveness and efficiency; Verification roles in support of arms control and disarmament. - Building collaboration and partnerships with other international forums: Other verification and non-proliferation regimes; Synergies between safety, security and safeguards regimes. - Improving cooperation between IAEA and States for safeguards implementation: Strengthening State systems for meeting safeguards obligations; Enhancing safeguards effectiveness and efficiency through greater cooperation; Lessons learned: recommendations for enhancing integrated safeguards implementation. - Addressing safeguards challenges in an increasingly interconnected world: Non-State actors and covert trade networks; Globalization of nuclear information and technology. - Preparing for the global nuclear expansion and increasing safeguards workload: Furthering implementation of the State-level concept and integrated safeguards; Information-driven safeguards; Remote data-driven safeguards inspections; Safeguards in States without comprehensive safeguards agreements. - Safeguarding advanced nuclear facilities and innovative fuel cycles: Proliferation resistance; Safeguards by design; Safeguards approaches for advanced facilities. - Advanced technologies and methodologies: For verifying nuclear material and activities; For detecting undeclared nuclear material and activities; For information collection, analysis and integration. - Enhancing the development and use of safeguards

  11. Java bytecode verification via static single assignment form

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian W.; Franz, Michael

    2008-01-01

    Java Virtual Machines (JVMs) traditionally perform bytecode verification by way of an iterative data-flow analysis. Bytecode verification is necessary to ensure type safety because temporary variables in the JVM are not statically typed. We present an alternative verification mechanism that trans......Java Virtual Machines (JVMs) traditionally perform bytecode verification by way of an iterative data-flow analysis. Bytecode verification is necessary to ensure type safety because temporary variables in the JVM are not statically typed. We present an alternative verification mechanism...

  12. Inspection and verification of waste packages for near surface disposal

    International Nuclear Information System (INIS)

    2000-01-01

    depending upon the individual Member State's QA/QC system for waste management. In this context, this publication is a collection of current information about various Member States' QA/QC programmes. It reviews them in terms of common approaches and technical procedures as well as applicable technologies. This TECDOC will benefit Member States, especially developing countries, that are planning, establishing or upgrading existing near surface repository systems. This publication is intended to provide technical guidance and current technical information about assuring compliance of waste packages with near surface disposal facility acceptance requirements by means of inspection and verification. It, therefore, discusses concepts of waste package inspection and verification, waste acceptance requirements, establishment of a waste package QA/QC programme, technical activities, inspection and verification procedures, and waste generator/disposal facility operator interface issues

  13. Complementary technologies for verification of excess plutonium

    International Nuclear Information System (INIS)

    Langner, D.G.; Nicholas, N.J.; Ensslin, N.; Fearey, B.L.; Mitchell, D.J.; Marlow, K.W.; Luke, S.J.; Gosnell, T.B.

    1998-01-01

    Three complementary measurement technologies have been identified as candidates for use in the verification of excess plutonium of weapons origin. These technologies: high-resolution gamma-ray spectroscopy, neutron multiplicity counting, and low-resolution gamma-ray spectroscopy, are mature, robust technologies. The high-resolution gamma-ray system, Pu-600, uses the 630--670 keV region of the emitted gamma-ray spectrum to determine the ratio of 240 Pu to 239 Pu. It is useful in verifying the presence of plutonium and the presence of weapons-grade plutonium. Neutron multiplicity counting is well suited for verifying that the plutonium is of a safeguardable quantity and is weapons-quality material, as opposed to residue or waste. In addition, multiplicity counting can independently verify the presence of plutonium by virtue of a measured neutron self-multiplication and can detect the presence of non-plutonium neutron sources. The low-resolution gamma-ray spectroscopic technique is a template method that can provide continuity of knowledge that an item that enters the a verification regime remains under the regime. In the initial verification of an item, multiple regions of the measured low-resolution spectrum form a unique, gamma-radiation-based template for the item that can be used for comparison in subsequent verifications. In this paper the authors discuss these technologies as they relate to the different attributes that could be used in a verification regime

  14. Concepts of Model Verification and Validation

    International Nuclear Information System (INIS)

    Thacker, B.H.; Doebling, S.W.; Hemez, F.M.; Anderson, M.C.; Pepin, J.E.; Rodriguez, E.A.

    2004-01-01

    Model verification and validation (VandV) is an enabling methodology for the development of computational models that can be used to make engineering predictions with quantified confidence. Model VandV procedures are needed by government and industry to reduce the time, cost, and risk associated with full-scale testing of products, materials, and weapon systems. Quantifying the confidence and predictive accuracy of model calculations provides the decision-maker with the information necessary for making high-consequence decisions. The development of guidelines and procedures for conducting a model VandV program are currently being defined by a broad spectrum of researchers. This report reviews the concepts involved in such a program. Model VandV is a current topic of great interest to both government and industry. In response to a ban on the production of new strategic weapons and nuclear testing, the Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship Program (SSP). An objective of the SSP is to maintain a high level of confidence in the safety, reliability, and performance of the existing nuclear weapons stockpile in the absence of nuclear testing. This objective has challenged the national laboratories to develop high-confidence tools and methods that can be used to provide credible models needed for stockpile certification via numerical simulation. There has been a significant increase in activity recently to define VandV methods and procedures. The U.S. Department of Defense (DoD) Modeling and Simulation Office (DMSO) is working to develop fundamental concepts and terminology for VandV applied to high-level systems such as ballistic missile defense and battle management simulations. The American Society of Mechanical Engineers (ASME) has recently formed a Standards Committee for the development of VandV procedures for computational solid mechanics models. The Defense Nuclear Facilities Safety Board (DNFSB) has been a proponent of model

  15. Cleanup Verification Package for the 116-K-2 Effluent Trench

    International Nuclear Information System (INIS)

    Capron, J.M.

    2006-01-01

    This cleanup verification package documents completion of remedial action for the 116-K-2 effluent trench, also referred to as the 116-K-2 mile-long trench and the 116-K-2 site. During its period of operation, the 116-K-2 site was used to dispose of cooling water effluent from the 105-KE and 105-KW Reactors by percolation into the soil. This site also received mixed liquid wastes from the 105-KW and 105-KE fuel storage basins, reactor floor drains, and miscellaneous decontamination activities

  16. Packaged low-level waste verification system

    International Nuclear Information System (INIS)

    Tuite, K.T.; Winberg, M.; Flores, A.Y.; Killian, E.W.; McIsaac, C.V.

    1996-01-01

    Currently, states and low-level radioactive waste (LLW) disposal site operators have no method of independently verifying the radionuclide content of packaged LLW that arrive at disposal sites for disposal. At this time, disposal sites rely on LLW generator shipping manifests and accompanying records to insure that LLW received meets the waste acceptance criteria. An independent verification system would provide a method of checking generator LLW characterization methods and help ensure that LLW disposed of at disposal facilities meets requirements. The Mobile Low-Level Waste Verification System (MLLWVS) provides the equipment, software, and methods to enable the independent verification of LLW shipping records to insure that disposal site waste acceptance criteria are being met. The MLLWVS system was developed under a cost share subcontract between WMG, Inc., and Lockheed Martin Idaho Technologies through the Department of Energy's National Low-Level Waste Management Program at the Idaho National Engineering Laboratory (INEL)

  17. Comparing formal verification approaches of interlocking systems

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Nguyen, Hoang Nga; Roggenbach, Markus

    2016-01-01

    these approaches. As a first step towards this, in this paper we suggest a way to compare different formal approaches for verifying designs of route-based interlocking systems and we demonstrate it on modelling and verification approaches developed within the research groups at DTU/Bremen and at Surrey......The verification of railway interlocking systems is a challenging task, and therefore several research groups have suggested to improve this task by using formal methods, but they use different modelling and verification approaches. To advance this research, there is a need to compare....../Swansea. The focus is on designs that are specified by so-called control tables. The paper can serve as a starting point for further comparative studies. The DTU/Bremen research has been funded by the RobustRailS project granted by Innovation Fund Denmark. The Surrey/Swansea research has been funded by the Safe...

  18. Hierarchical Representation Learning for Kinship Verification.

    Science.gov (United States)

    Kohli, Naman; Vatsa, Mayank; Singh, Richa; Noore, Afzel; Majumdar, Angshul

    2017-01-01

    Kinship verification has a number of applications such as organizing large collections of images and recognizing resemblances among humans. In this paper, first, a human study is conducted to understand the capabilities of human mind and to identify the discriminatory areas of a face that facilitate kinship-cues. The visual stimuli presented to the participants determine their ability to recognize kin relationship using the whole face as well as specific facial regions. The effect of participant gender and age and kin-relation pair of the stimulus is analyzed using quantitative measures such as accuracy, discriminability index d' , and perceptual information entropy. Utilizing the information obtained from the human study, a hierarchical kinship verification via representation learning (KVRL) framework is utilized to learn the representation of different face regions in an unsupervised manner. We propose a novel approach for feature representation termed as filtered contractive deep belief networks (fcDBN). The proposed feature representation encodes relational information present in images using filters and contractive regularization penalty. A compact representation of facial images of kin is extracted as an output from the learned model and a multi-layer neural network is utilized to verify the kin accurately. A new WVU kinship database is created, which consists of multiple images per subject to facilitate kinship verification. The results show that the proposed deep learning framework (KVRL-fcDBN) yields the state-of-the-art kinship verification accuracy on the WVU kinship database and on four existing benchmark data sets. Furthermore, kinship information is used as a soft biometric modality to boost the performance of face verification via product of likelihood ratio and support vector machine based approaches. Using the proposed KVRL-fcDBN framework, an improvement of over 20% is observed in the performance of face verification.

  19. Length of a Hanging Cable

    Directory of Open Access Journals (Sweden)

    Eric Costello

    2011-01-01

    Full Text Available The shape of a cable hanging under its own weight and uniform horizontal tension between two power poles is a catenary. The catenary is a curve which has an equation defined by a hyperbolic cosine function and a scaling factor. The scaling factor for power cables hanging under their own weight is equal to the horizontal tension on the cable divided by the weight of the cable. Both of these values are unknown for this problem. Newton's method was used to approximate the scaling factor and the arc length function to determine the length of the cable. A script was written using the Python programming language in order to quickly perform several iterations of Newton's method to get a good approximation for the scaling factor.

  20. Minimal Length, Measurability and Gravity

    Directory of Open Access Journals (Sweden)

    Alexander Shalyt-Margolin

    2016-03-01

    Full Text Available The present work is a continuation of the previous papers written by the author on the subject. In terms of the measurability (or measurable quantities notion introduced in a minimal length theory, first the consideration is given to a quantum theory in the momentum representation. The same terms are used to consider the Markov gravity model that here illustrates the general approach to studies of gravity in terms of measurable quantities.

  1. Hybrid Enrichment Verification Array: Module Characterization Studies

    Energy Technology Data Exchange (ETDEWEB)

    Zalavadia, Mital A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Smith, Leon E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McDonald, Benjamin S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kulisek, Jonathan A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Mace, Emily K. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Deshmukh, Nikhil S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-03-01

    The work presented in this report is focused on the characterization and refinement of the Hybrid Enrichment Verification Array (HEVA) approach, which combines the traditional 186-keV 235U signature with high-energy prompt gamma rays from neutron capture in the detector and surrounding collimator material, to determine the relative enrichment and 235U mass of the cylinder. The design of the HEVA modules (hardware and software) deployed in the current field trial builds on over seven years of study and evolution by PNNL, and consists of a ø3''×3'' NaI(Tl) scintillator coupled to an Osprey digital multi-channel analyzer tube base from Canberra. The core of the HEVA methodology, the high-energy prompt gamma-ray signature, serves as an indirect method for the measurement of total neutron emission from the cylinder. A method for measuring the intrinsic efficiency of this “non-traditional” neutron signature and the results from a benchmark experiment are presented. Also discussed are potential perturbing effects on the non-traditional signature, including short-lived activation of materials in the HEVA module. Modeling and empirical results are presented to demonstrate that such effects are expected to be negligible for the envisioned implementation scenario. In comparison to previous versions, the new design boosts the high-energy prompt gamma-ray signature, provides more flexible and effective collimation, and improves count-rate management via commercially available pulse-processing electronics with a special modification prompted by PNNL.

  2. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  3. Key Nuclear Verification Priorities: Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  4. 340 and 310 drawing field verification

    International Nuclear Information System (INIS)

    Langdon, J.

    1996-01-01

    The purpose of the drawing field verification work plan is to provide reliable drawings for the 310 Treated Effluent Disposal Facility (TEDF) and 340 Waste Handling Facility (340 Facility). The initial scope of this work plan is to provide field verified and updated versions of all the 340 Facility essential drawings. This plan can also be used for field verification of any other drawings that the facility management directs to be so updated. Any drawings revised by this work plan will be issued in an AutoCAD format

  5. Key Nuclear Verification Priorities - Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  6. Experimental preparation and verification of quantum money

    Science.gov (United States)

    Guan, Jian-Yu; Arrazola, Juan Miguel; Amiri, Ryan; Zhang, Weijun; Li, Hao; You, Lixing; Wang, Zhen; Zhang, Qiang; Pan, Jian-Wei

    2018-03-01

    A quantum money scheme enables a trusted bank to provide untrusted users with verifiable quantum banknotes that cannot be forged. In this work, we report a proof-of-principle experimental demonstration of the preparation and verification of unforgeable quantum banknotes. We employ a security analysis that takes experimental imperfections fully into account. We measure a total of 3.6 ×106 states in one verification round, limiting the forging probability to 10-7 based on the security analysis. Our results demonstrate the feasibility of preparing and verifying quantum banknotes using currently available experimental techniques.

  7. Core power capability verification for PWR NPP

    International Nuclear Information System (INIS)

    Xian Chunyu; Liu Changwen; Zhang Hong; Liang Wei

    2002-01-01

    The Principle and methodology of pressurized water reactor nuclear power plant core power capability verification for reload are introduced. The radial and axial power distributions of normal operation (category I or condition I) and abnormal operation (category II or condition II) are simulated by using neutronics calculation code. The linear power density margin and DNBR margin for both categories, which reflect core safety, are analyzed from the point view of reactor physics and T/H, and thus category I operating domain and category II protection set point are verified. Besides, the verification results of reference NPP are also given

  8. πK-scattering lengths

    International Nuclear Information System (INIS)

    Volkov, M.K.; Osipov, A.A.

    1983-01-01

    The msub(π)asub(0)sup(1/2)=0.1, msub(π)asub(0)sup(3/2)=-0.1, msub(π)asub(0)sup((-))=0.07, msub(π)sup(3)asub(1)sup(1/2)=0.018, msub(π)sup(3)asub(1)aup(3/2)=0.002, msub(π)sup(3)asub(1)sup((-))=0.0044, msub(π)sup(5)asub(2)sup(1/2)=2.4x10sup(-4) and msub(π)sup(5)asub(2)sup(3/2)=-1.2x10sup(-4) scattering lengths are calculated in the framework of the composite meson model which is based on four-quark interaction. The decay form factors of (rho, epsilon, S*) → 2π, (K tilde, K*) → Kπ are used. The q 2 -terms of the quark box diagrams are taken into account. It is shown that the q 2 -terms of the box diagrams give the main contribution to the s-wave scattering lengths. The diagrams with the intermediate vector mesons begin to play the essential role at calculation of the p- and d-wave scattering lengths

  9. Verification and quality control of routine hematology analyzers

    NARCIS (Netherlands)

    Vis, J Y; Huisman, A

    2016-01-01

    Verification of hematology analyzers (automated blood cell counters) is mandatory before new hematology analyzers may be used in routine clinical care. The verification process consists of several items which comprise among others: precision, accuracy, comparability, carryover, background and

  10. Specification and Automated Verification of Real-Time Behaviour

    DEFF Research Database (Denmark)

    Kristensen, C.H.; Andersen, J.H.; Skou, A.

    1995-01-01

    In this paper we sketch a method for specification and automatic verification of real-time software properties.......In this paper we sketch a method for specification and automatic verification of real-time software properties....

  11. Specification and Automated Verification of Real-Time Behaviour

    DEFF Research Database (Denmark)

    Andersen, J.H.; Kristensen, C.H.; Skou, A.

    1996-01-01

    In this paper we sketch a method for specification and automatic verification of real-time software properties.......In this paper we sketch a method for specification and automatic verification of real-time software properties....

  12. Exploring implementation practices in results-based financing: the case of the verification in Benin.

    Science.gov (United States)

    Antony, Matthieu; Bertone, Maria Paola; Barthes, Olivier

    2017-03-14

    Results-based financing (RBF) has been introduced in many countries across Africa and a growing literature is building around the assessment of their impact. These studies are usually quantitative and often silent on the paths and processes through which results are achieved and on the wider health system effects of RBF. To address this gap, our study aims at exploring the implementation of an RBF pilot in Benin, focusing on the verification of results. The study is based on action research carried out by authors involved in the pilot as part of the agency supporting the RBF implementation in Benin. While our participant observation and operational collaboration with project's stakeholders informed the study, the analysis is mostly based on quantitative and qualitative secondary data, collected throughout the project's implementation and documentation processes. Data include project documents, reports and budgets, RBF data on service outputs and on the outcome of the verification, daily activity timesheets of the technical assistants in the districts, as well as focus groups with Community-based Organizations and informal interviews with technical assistants and district medical officers. Our analysis focuses on the actual practices of quantitative, qualitative and community verification. Results show that the verification processes are complex, costly and time-consuming, and in practice they end up differing from what designed originally. We explore the consequences of this on the operation of the scheme, on its potential to generate the envisaged change. We find, for example, that the time taken up by verification procedures limits the time available for data analysis and feedback to facility staff, thus limiting the potential to improve service delivery. Verification challenges also result in delays in bonus payment, which delink effort and reward. Additionally, the limited integration of the verification activities of district teams with their routine tasks

  13. SU-E-J-82: Intra-Fraction Proton Beam-Range Verification with PET Imaging: Feasibility Studies with Monte Carlo Simulations and Statistical Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Lou, K [U.T M.D. Anderson Cancer Center, Houston, TX (United States); Rice University, Houston, TX (United States); Mirkovic, D; Sun, X; Zhu, X; Poenisch, F; Grosshans, D; Shao, Y [U.T M.D. Anderson Cancer Center, Houston, TX (United States); Clark, J [Rice University, Houston, TX (United States)

    2014-06-01

    Purpose: To study the feasibility of intra-fraction proton beam-range verification with PET imaging. Methods: Two phantoms homogeneous cylindrical PMMA phantoms (290 mm axial length, 38 mm and 200 mm diameter respectively) were studied using PET imaging: a small phantom using a mouse-sized PET (61 mm diameter field of view (FOV)) and a larger phantom using a human brain-sized PET (300 mm FOV). Monte Carlo (MC) simulations (MCNPX and GATE) were used to simulate 179.2 MeV proton pencil beams irradiating the two phantoms and be imaged by the two PET systems. A total of 50 simulations were conducted to generate 50 positron activity distributions and correspondingly 50 measured activity-ranges. The accuracy and precision of these activity-ranges were calculated under different conditions (including count statistics and other factors, such as crystal cross-section). Separate from the MC simulations, an activity distribution measured from a simulated PET image was modeled as a noiseless positron activity distribution corrupted by Poisson counting noise. The results from these two approaches were compared to assess the impact of count statistics on the accuracy and precision of activity-range calculations. Results: MC Simulations show that the accuracy and precision of an activity-range are dominated by the number (N) of coincidence events of the reconstructed image. They are improved in a manner that is inversely proportional to 1/sqrt(N), which can be understood from the statistical modeling. MC simulations also indicate that the coincidence events acquired within the first 60 seconds with 10{sup 9} protons (small phantom) and 10{sup 10} protons (large phantom) are sufficient to achieve both sub-millimeter accuracy and precision. Conclusion: Under the current MC simulation conditions, the initial study indicates that the accuracy and precision of beam-range verification are dominated by count statistics, and intra-fraction PET image-based beam-range verification is

  14. Earth Science Enterprise Scientific Data Purchase Project: Verification and Validation

    Science.gov (United States)

    Jenner, Jeff; Policelli, Fritz; Fletcher, Rosea; Holecamp, Kara; Owen, Carolyn; Nicholson, Lamar; Dartez, Deanna

    2000-01-01

    This paper presents viewgraphs on the Earth Science Enterprise Scientific Data Purchase Project's verification,and validation process. The topics include: 1) What is Verification and Validation? 2) Why Verification and Validation? 3) Background; 4) ESE Data Purchas Validation Process; 5) Data Validation System and Ingest Queue; 6) Shipment Verification; 7) Tracking and Metrics; 8) Validation of Contract Specifications; 9) Earth Watch Data Validation; 10) Validation of Vertical Accuracy; and 11) Results of Vertical Accuracy Assessment.

  15. A Syntactic-Semantic Approach to Incremental Verification

    OpenAIRE

    Bianculli, Domenico; Filieri, Antonio; Ghezzi, Carlo; Mandrioli, Dino

    2013-01-01

    Software verification of evolving systems is challenging mainstream methodologies and tools. Formal verification techniques often conflict with the time constraints imposed by change management practices for evolving systems. Since changes in these systems are often local to restricted parts, an incremental verification approach could be beneficial. This paper introduces SiDECAR, a general framework for the definition of verification procedures, which are made incremental by the framework...

  16. 24 CFR 5.512 - Verification of eligible immigration status.

    Science.gov (United States)

    2010-04-01

    ... immigration status. 5.512 Section 5.512 Housing and Urban Development Office of the Secretary, Department of... Noncitizens § 5.512 Verification of eligible immigration status. (a) General. Except as described in paragraph...) Primary verification—(1) Automated verification system. Primary verification of the immigration status of...

  17. A verification calculation of drum and pulley overhead travelling crane on gamma irradiator ISG-500

    International Nuclear Information System (INIS)

    Syamsurrijal Ramdja; Ari Satmoko; Sutomo Budihardjo

    2010-01-01

    It has been verified the calculation of drum and pulleys on cranes as facility the gamma irradiator ISG-500. Drum is a device for rolling steel ropes while the pulley is a circular pieces called disks, and both of which are made from metal or non-metal to transmit motion and force. It has been verified the calculation of forces on the drum, drum diameter and length, and pressuring force occurred on the drums. Likewise to the pulley, the pulley diameter calculations verification, size of disc and shaft power pulleys. From the verification results, it will be obtained whether the data drums and pulley device are safe or not safe to be used. (author)

  18. Integrated Disposal Facility FY 2016: ILAW Verification and Validation of the eSTOMP Simulator

    Energy Technology Data Exchange (ETDEWEB)

    Freedman, Vicky L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bacon, Diana H. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fang, Yilin [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-05-13

    This document describes two sets of simulations carried out to further verify and validate the eSTOMP simulator. In this report, a distinction is made between verification and validation, and the focus is on verifying eSTOMP through a series of published benchmarks on cementitious wastes, and validating eSTOMP based on a lysimeter experiment for the glassified waste. These activities are carried out within the context of a scientific view of validation that asserts that models can only be invalidated, and that model validation (and verification) is a subjective assessment.

  19. Static and Dynamic Verification of Critical Software for Space Applications

    Science.gov (United States)

    Moreira, F.; Maia, R.; Costa, D.; Duro, N.; Rodríguez-Dapena, P.; Hjortnaes, K.

    Space technology is no longer used only for much specialised research activities or for sophisticated manned space missions. Modern society relies more and more on space technology and applications for every day activities. Worldwide telecommunications, Earth observation, navigation and remote sensing are only a few examples of space applications on which we rely daily. The European driven global navigation system Galileo and its associated applications, e.g. air traffic management, vessel and car navigation, will significantly expand the already stringent safety requirements for space based applications Apart from their usefulness and practical applications, every single piece of onboard software deployed into the space represents an enormous investment. With a long lifetime operation and being extremely difficult to maintain and upgrade, at least when comparing with "mainstream" software development, the importance of ensuring their correctness before deployment is immense. Verification &Validation techniques and technologies have a key role in ensuring that the onboard software is correct and error free, or at least free from errors that can potentially lead to catastrophic failures. Many RAMS techniques including both static criticality analysis and dynamic verification techniques have been used as a means to verify and validate critical software and to ensure its correctness. But, traditionally, these have been isolated applied. One of the main reasons is the immaturity of this field in what concerns to its application to the increasing software product(s) within space systems. This paper presents an innovative way of combining both static and dynamic techniques exploiting their synergy and complementarity for software fault removal. The methodology proposed is based on the combination of Software FMEA and FTA with Fault-injection techniques. The case study herein described is implemented with support from two tools: The SoftCare tool for the SFMEA and SFTA

  20. IAEA inspectors complete verification of nuclear material in Iraq

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: At the request of the Government of Iraq and pursuant to the NPT Safeguards Agreement with Iraq, a team of IAEA safeguards inspectors has completed the annual Physical Inventory Verification of declared nuclear material in Iraq, and is returning to Vienna. The material - natural or low-enriched uranium - is not sensitive from a proliferation perspective and is consolidated at a storage facility near the Tuwaitha complex, south of Baghdad. This inspection was conducted with the logistical and security assistance of the Multinational Force and the Office of the UN Security Coordinator. Inspections such as this are required by safeguards agreements with every non-nuclear-weapon state party to the NPT that has declared holdings of nuclear material, to verify the correctness of the declaration, and that material has not been diverted to any undeclared activity. Such inspections have been performed in Iraq on a continuing basis. The most recent took place in June 2003, following reports of looting of nuclear material at the Tuwaitha complex; IAEA inspectors recovered, repackaged and resealed all but a minute amount of material. NPT safeguards inspections are limited in scope and coverage as compared to the verification activities carried out in 1991-98 and 2002-03 by the IAEA under Security Council resolution 687 and related resolutions. 'This week's mission was a good first step,' IAEA Director General Mohamed ElBaradei said. 'Now we hope to be in a position to complete the mandate entrusted to us by the Security Council, to enable the Council over time to remove all sanctions and restrictions imposed on Iraq - so that Iraq's rights as a full-fledged member of the international community can be restored.' The removal of remaining sanctions is dependent on completion of the verification process by the IAEA and the UN Monitoring, Verification and Inspection Commission (UNMOVIC). It should be noted that IAEA technical assistance to Iraq has been resumed over

  1. Verification of the Danish 1990, 2000 and 2010 emission inventory data

    DEFF Research Database (Denmark)

    Fauser, Patrik; Nielsen, Malene; Winther, Morten

    , agriculture, industry and waste. The data are based on the national greenhouse gas inventories for the years 1990 (base year), 2000 and 2010, as reported in 2012, and provided by the UNFCCC and EU. Inter-country comparison and time series consistency check of emissions and implied emission factors is made...... is made with data for energy consumption (Eurostat), agricultural statistics (Eurostat), industrial processes (UN) and waste disposal (OECD). Verification in this approach is a combination of qualitative and quantitative assessments and can assist to identify sectors and categories that require more...... for EU15 countries, excluding Luxemburg and including Norway and Switzerland and for some verification steps also including Australia, Canada, Japan, Russian Federation, USA and aggregated values for EU15 and EU27. National and inter-country verification and time trend consistency check of activity data...

  2. Approach to IAEA material-balance verification at the Portsmouth Gas Centrifuge Enrichment Plant

    International Nuclear Information System (INIS)

    Gordon, D.M.; Sanborn, J.B.; Younkin, J.M.; DeVito, V.J.

    1983-01-01

    This paper describes a potential approach by which the International Atomic Energy Agency (IAEA) might verify the nuclear-material balance at the Portsmouth Gas Centrifuge Enrichment Plant (GCEP). The strategy makes use of the attributes and variables measurement verification approach, whereby the IAEA would perform independent measurements on a randomly selected subset of the items comprising the U-235 flows and inventories at the plant. In addition, the MUF-D statistic is used as the test statistic for the detection of diversion. The paper includes descriptions of the potential verification activities, as well as calculations of: (1) attributes and variables sample sizes for the various strata, (2) standard deviations of the relevant test statistics, and (3) the detection sensitivity which the IAEA might achieve by this verification strategy at GCEP

  3. Environmental Testing Campaign and Verification of Satellite Deimos-2 at INTA

    Science.gov (United States)

    Hernandez, Daniel; Vazquez, Mercedes; Anon, Manuel; Olivo, Esperanza; Gallego, Pablo; Morillo, Pablo; Parra, Javier; Capraro; Luengo, Mar; Garcia, Beatriz; Villacorta, Pablo

    2014-06-01

    In this paper the environmental test campaign and verification of the DEIMOS-2 (DM2) satellite will be presented and described. DM2 will be ready for launch in 2014.Firstly, a short description of the satellite is presented, including its physical characteristics and intended optical performances. DEIMOS-2 is a LEO satellite for earth observation that will provide high resolution imaging services for agriculture, civil protection, environmental issues, disasters monitoring, climate change, urban planning, cartography, security and intelligence.Then, the verification and test campaign carried out on the SM and FM models at INTA is described; including Mechanical test for the SM and Climatic, Mechanical and Electromagnetic Compatibility tests for the FM. In addition, this paper includes Centre of Gravity and Moment of Inertia measurements for both models, and other verification activities carried out in order to ensure satellite's health during launch and its in orbit performance.

  4. Internet-based dimensional verification system for reverse engineering processes

    International Nuclear Information System (INIS)

    Song, In Ho; Kim, Kyung Don; Chung, Sung Chong

    2008-01-01

    This paper proposes a design methodology for a Web-based collaborative system applicable to reverse engineering processes in a distributed environment. By using the developed system, design reviewers of new products are able to confirm geometric shapes, inspect dimensional information of products through measured point data, and exchange views with other design reviewers on the Web. In addition, it is applicable to verifying accuracy of production processes by manufacturing engineers. Functional requirements for designing this Web-based dimensional verification system are described in this paper. ActiveX-server architecture and OpenGL plug-in methods using ActiveX controls realize the proposed system. In the developed system, visualization and dimensional inspection of the measured point data are done directly on the Web: conversion of the point data into a CAD file or a VRML form is unnecessary. Dimensional verification results and design modification ideas are uploaded to markups and/or XML files during collaboration processes. Collaborators review the markup results created by others to produce a good design result on the Web. The use of XML files allows information sharing on the Web to be independent of the platform of the developed system. It is possible to diversify the information sharing capability among design collaborators. Validity and effectiveness of the developed system has been confirmed by case studies

  5. Internet-based dimensional verification system for reverse engineering processes

    Energy Technology Data Exchange (ETDEWEB)

    Song, In Ho [Ajou University, Suwon (Korea, Republic of); Kim, Kyung Don [Small Business Corporation, Suwon (Korea, Republic of); Chung, Sung Chong [Hanyang University, Seoul (Korea, Republic of)

    2008-07-15

    This paper proposes a design methodology for a Web-based collaborative system applicable to reverse engineering processes in a distributed environment. By using the developed system, design reviewers of new products are able to confirm geometric shapes, inspect dimensional information of products through measured point data, and exchange views with other design reviewers on the Web. In addition, it is applicable to verifying accuracy of production processes by manufacturing engineers. Functional requirements for designing this Web-based dimensional verification system are described in this paper. ActiveX-server architecture and OpenGL plug-in methods using ActiveX controls realize the proposed system. In the developed system, visualization and dimensional inspection of the measured point data are done directly on the Web: conversion of the point data into a CAD file or a VRML form is unnecessary. Dimensional verification results and design modification ideas are uploaded to markups and/or XML files during collaboration processes. Collaborators review the markup results created by others to produce a good design result on the Web. The use of XML files allows information sharing on the Web to be independent of the platform of the developed system. It is possible to diversify the information sharing capability among design collaborators. Validity and effectiveness of the developed system has been confirmed by case studies

  6. Standardized Definitions for Code Verification Test Problems

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-14

    This document contains standardized definitions for several commonly used code verification test problems. These definitions are intended to contain sufficient information to set up the test problem in a computational physics code. These definitions are intended to be used in conjunction with exact solutions to these problems generated using Exact- Pack, www.github.com/lanl/exactpack.

  7. 9 CFR 417.8 - Agency verification.

    Science.gov (United States)

    2010-01-01

    ....8 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE... ANALYSIS AND CRITICAL CONTROL POINT (HACCP) SYSTEMS § 417.8 Agency verification. FSIS will verify the... plan or system; (f) Direct observation or measurement at a CCP; (g) Sample collection and analysis to...

  8. Timed verification with µCRL

    NARCIS (Netherlands)

    Blom, S.C.C.; Ioustinova, N.; Sidorova, N.; Broy, M.; Zamulin, A.V.

    2003-01-01

    µCRL is a process algebraic language for specification and verification of distributed systems. µCRL allows to describe temporal properties of distributed systems but it has no explicit reference to time. In this work we propose a manner of introducing discrete time without extending the language.

  9. Programmable electronic system design & verification utilizing DFM

    NARCIS (Netherlands)

    Houtermans, M.J.M.; Apostolakis, G.E.; Brombacher, A.C.; Karydas, D.M.

    2000-01-01

    The objective of this paper is to demonstrate the use of the Dynamic Flowgraph Methodology (DIM) during the design and verification of programmable electronic safety-related systems. The safety system consists of hardware as well as software. This paper explains and demonstrates the use of DIM to

  10. Verification of Software Components: Addressing Unbounded Paralelism

    Czech Academy of Sciences Publication Activity Database

    Adámek, Jiří

    2007-01-01

    Roč. 8, č. 2 (2007), s. 300-309 ISSN 1525-9293 R&D Projects: GA AV ČR 1ET400300504 Institutional research plan: CEZ:AV0Z10300504 Keywords : software components * formal verification * unbounded parallelism Subject RIV: JC - Computer Hardware ; Software

  11. A Comparison of Modular Verification Techniques

    DEFF Research Database (Denmark)

    Andersen, Henrik Reif; Staunstrup, Jørgen; Maretti, Niels

    1997-01-01

    This paper presents and compares three techniques for mechanized verification of state oriented design descriptions. One is a traditional forwardgeneration of a fixed point characterizing the reachable states. The two others can utilize a modular structure provided by the designer. Onerequires...

  12. Formal Verification of Circuits and Systems

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    The problem of validation and verification of correctness of present day hardware and soft- ware systems has become extemely complex due to the enormous growth in the size of the designs. Today typically 50% to 70% of the design cycle time is spent in verifying correct- ness. While simulation remains a predominant form ...

  13. Model Checking - Automated Verification of Computational Systems

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 14; Issue 7. Model Checking - Automated Verification of Computational Systems. Madhavan Mukund. General Article Volume 14 Issue 7 July 2009 pp 667-681. Fulltext. Click here to view fulltext PDF. Permanent link:

  14. Formal Verification of Quasi-Synchronous Systems

    Science.gov (United States)

    2015-07-01

    pg. 215-226, Springer-Verlag: London, UK, 2001. [4] Nicolas Halbwachs and Louis Mandel, Simulation and Verification of Asynchronous Systems by...Huang, S. A. Smolka, W. Tan , and S. Tripakis, Deep Random Search for Efficient Model Checking of Timed Automata, in Proceedings of the 13th Monterey

  15. Behaviour Protocols Verification: Fighting State Explosion

    Czech Academy of Sciences Publication Activity Database

    Mach, M.; Plášil, František; Kofroň, Jan

    2005-01-01

    Roč. 6, č. 2 (2005), s. 22-30 ISSN 1525-9293 R&D Projects: GA ČR(CZ) GA102/03/0672 Institutional research plan: CEZ:AV0Z10300504 Keywords : formal verification * software components * stateexplos ion * behavior protocols * parse trees Subject RIV: JC - Computer Hardware ; Software

  16. Verification of Timed-Arc Petri Nets

    DEFF Research Database (Denmark)

    Jacobsen, Lasse; Jacobsen, Morten; Møller, Mikael Harkjær

    2011-01-01

    of interesting theoretical properties distinguishing them from other time extensions of Petri nets. We shall give an overview of the recent theory developed in the verification of TAPN extended with features like read/transport arcs, timed inhibitor arcs and age invariants. We will examine in detail...

  17. Unification & sharing in timed automata verification

    DEFF Research Database (Denmark)

    David, Alexandre; Behrmann, Gerd; Larsen, Kim Guldstrand

    2003-01-01

    We present the design of the model-checking engine and internal data structures for the next generation of UPPAAL. The design is based on a pipeline architecture where each stage represents one independent operation in the verification algorithms. The architecture is based on essentially one shar...

  18. A Verification Framework for Agent Communication

    NARCIS (Netherlands)

    Eijk, R.M. van; Boer, F.S. de; Hoek, W. van der; Meyer, J-J.Ch.

    2003-01-01

    In this paper, we introduce a verification method for the correctness of multiagent systems as described in the framework of acpl (Agent Communication Programming Language). The computational model of acpl consists of an integration of the two different paradigms of ccp (Concurrent Constraint

  19. A Typical Verification Challenge for the GRID

    NARCIS (Netherlands)

    van de Pol, Jan Cornelis; Bal, H. E.; Brim, L.; Leucker, M.

    2008-01-01

    A typical verification challenge for the GRID community is presented. The concrete challenge is to implement a simple recursive algorithm for finding the strongly connected components in a graph. The graph is typically stored in the collective memory of a number of computers, so a distributed

  20. Zero leakage quantization scheme for biometric verification

    NARCIS (Netherlands)

    Groot, de J.A.; Linnartz, J.P.M.G.

    2011-01-01

    Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. This paper presents a new verification scheme, which protects the secrets of the enrolled users. We will show that zero leakage is achieved if

  1. Hydrostatic Paradox: Experimental Verification of Pressure Equilibrium

    Science.gov (United States)

    Kodejška, C.; Ganci, S.; Ríha, J.; Sedlácková, H.

    2017-01-01

    This work is focused on the experimental verification of the balance between the atmospheric pressure acting on the sheet of paper, which encloses the cylinder completely or partially filled with water from below, where the hydrostatic pressure of the water column acts against the atmospheric pressure. First of all this paper solves a theoretical…

  2. Using timing information in speaker verification

    CSIR Research Space (South Africa)

    Van Heerden, CJ

    2005-11-01

    Full Text Available This paper presents an analysis of temporal information as a feature for use in speaker verification systems. The relevance of temporal information in a speaker’s utterances is investigated, both with regard to improving the robustness of modern...

  3. Sampling for the verification of materials balances

    International Nuclear Information System (INIS)

    Avenhaus, R.; Goeres, H.J.; Beedgen, R.

    1983-08-01

    The results of a theory for verification of nuclear materials balance data are presented. The sampling theory is based on two diversion models where also a combination of models is taken into account. The theoretical considerations are illustrated with numerical examples using the data of a highly enriched uranium fabrication plant. (orig.) [de

  4. 78 FR 5409 - Ongoing Equivalence Verifications of Foreign Food Regulatory Systems

    Science.gov (United States)

    2013-01-25

    ... of data shared. Finally, with respect to POE re-inspections, NACMPI recommended the targeting of high-risk product and high-risk imports for sampling and other verification activities during reinspection... authority; the availability of contingency plans in the country for containing and mitigating the effects of...

  5. Cleanup Verification Package for the 118-F-5 PNL Sawdust Pit

    International Nuclear Information System (INIS)

    Habel, L.D.

    2008-01-01

    This cleanup verification package documents completion of remedial action, sampling activities, and compliance with cleanup criteria for the 118-F-5 Burial Ground, the PNL (Pacific Northwest Laboratory) Sawdust Pit. The 118-F-5 Burial Ground was an unlined trench that received radioactive sawdust from the floors of animal pens in the 100-F Experimental Animal Farm

  6. TARDEC FIXED HEEL POINT (FHP): DRIVER CAD ACCOMMODATION MODEL VERIFICATION REPORT

    Science.gov (United States)

    2017-11-09

    Public Release Disclaimer: Reference herein to any specific commercial company, product , process, or service by trade name, trademark, manufacturer , or...not actively engaged HSI until MSB or the Engineering Manufacturing and Development (EMD) Phase, resulting in significant design and cost changes...and shall not be used for advertising or product endorsement purposes. TARDEC Fixed Heel Point (FHP): Driver CAD Accommodation Model Verification

  7. Verification of FPGA-Signal using the test board which is applied to Safety-related controller

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Youn-Hu; Yoo, Kwanwoo; Lee, Myeongkyun; Yun, Donghwa [SOOSAN ENS, Seoul (Korea, Republic of)

    2016-10-15

    This article aims to provide the verification method for BGA-type FPGA of Programmable Logic Controller (PLC) developed as Safety Class. The logic of FPGA in the control device with Safety Class is the circuit to control overall logic of PLC. Saftety-related PLC must meet the international standard specifications. With this reason, we use V and V according to an international standard in order to secure high reliability and safety. By using this, we are supposed to proceed to a variety of verification courses for extra reliability and safety analysis. In order to have efficient verification of test results, we propose the test using the newly changed BGA socket which can resolve the problems of the conventional socket on this paper. The Verification of processes is divided into verification of Hardware and firmware. That processes are carried out in the unit testing and integration testing. The proposed test method is simple, the effect of cost reductions by batch process. In addition, it is advantageous to measure the signal from the Hi-speed-IC due to its short length of the pins and it was plated with the copper around it. Further, it also to prevent abrasion on the IC ball because it has no direct contact with the PCB. Therefore, it can be actually applied is to the BGA package test and we can easily verify logic as well as easily checking the operation of the designed data.

  8. Imaging for dismantlement verification: Information management and analysis algorithms

    International Nuclear Information System (INIS)

    Robinson, S.M.; Jarman, K.D.; Pitts, W.K.; Seifert, A.; Misner, A.C.; Woodring, M.L.; Myjak, M.J.

    2012-01-01

    The level of detail discernible in imaging techniques has generally excluded them from consideration as verification tools in inspection regimes. An image will almost certainly contain highly sensitive information, and storing a comparison image will almost certainly violate a cardinal principle of information barriers: that no sensitive information be stored in the system. To overcome this problem, some features of the image might be reduced to a few parameters suitable for definition as an attribute, which must be non-sensitive to be acceptable in an Information Barrier regime. However, this process must be performed with care. Features like the perimeter, area, and intensity of an object, for example, might reveal sensitive information. Any data-reduction technique must provide sufficient information to discriminate a real object from a spoofed or incorrect one, while avoiding disclosure (or storage) of any sensitive object qualities. Ultimately, algorithms are intended to provide only a yes/no response verifying the presence of features in the image. We discuss the utility of imaging for arms control applications and present three image-based verification algorithms in this context. The algorithms reduce full image information to non-sensitive feature information, in a process that is intended to enable verification while eliminating the possibility of image reconstruction. The underlying images can be highly detailed, since they are dynamically generated behind an information barrier. We consider the use of active (conventional) radiography alone and in tandem with passive (auto) radiography. We study these algorithms in terms of technical performance in image analysis and application to an information barrier scheme.

  9. Post-silicon and runtime verification for modern processors

    CERN Document Server

    Wagner, Ilya

    2010-01-01

    The purpose of this book is to survey the state of the art and evolving directions in post-silicon and runtime verification. The authors start by giving an overview of the state of the art in verification, particularly current post-silicon methodologies in use in the industry, both for the domain of processor pipeline design and for memory subsystems. They then dive into the presentation of several new post-silicon verification solutions aimed at boosting the verification coverage of modern processors, dedicating several chapters to this topic. The presentation of runtime verification solution

  10. Impact of prospective verification of intravenous antibiotics in an ED.

    Science.gov (United States)

    Hunt, Allyson; Nakajima, Steven; Hall Zimmerman, Lisa; Patel, Manav

    2016-12-01

    Delay in appropriate antibiotic therapy is associated with an increase in mortality and prolonged length of stay. Automatic dispensing machines decrease the delivery time of intravenous (IV) antibiotics to patients in the emergency department (ED). However, when IV antibiotics are not reviewed by pharmacists before being administered, patients are at risk for receiving inappropriate antibiotic therapy. The objective of this study was to determine if a difference exists in the time to administration of appropriate antibiotic therapy before and after implementation of prospective verification of antibiotics in the ED. This retrospective, institutional review board-approved preimplementation vs postimplementation study evaluated patients 18years or older who were started on IV antibiotics in the ED. Patients were excluded if pregnant, if the patient is a prisoner, if no cultures were drawn, or if the patient was transferred from an outside facility. Appropriate antibiotic therapy was based on empiric source-specific evidence-based guidelines, appropriate pharmacokinetic and pharmacodynamic properties, and microbiologic data. The primary end point was the time from ED arrival to administration of appropriate antibiotic therapy. Of the 1628 evaluated, 128 patients met the inclusion criteria (64 pre vs 64 post). Patients were aged 65.2±17.0years, with most of infections being pneumonia (44%) and urinary tract infections (18%) and most patients being noncritically ill. Time to appropriate antibiotic therapy was reduced in the postgroup vs pregroup (8.1±8.6 vs 15.2±22.8hours, respectively, P=.03). In addition, appropriate empiric antibiotics were initiated more frequently after the implementation (92% post vs 66% pre; P=.0001). There was no difference in mortality or length of stay between the 2 groups. Prompt administration of the appropriate antibiotics is imperative in patients with infections presenting to the ED. The impact of prospective verification of

  11. Role of experiments in soil-structure interaction methodology verification

    International Nuclear Information System (INIS)

    Srinivasan, M.G.; Kot, C.A.; Hsieh, B.J.

    1986-01-01

    Different kinds of experimental data may be useful for partial or full verification of SSI analysis methods. The great bulk of existing data comes from earthquake records and dynamic testing of as-built structures. However, much of this data may not be suitable for the present purpose as the measurement locations were not selected with the verification of SSI analysis in mind and hence are too few in number or inappropriate in character. Data from scale model testing that include the soil in the model - both in-situ and laboratory - are relatively scarce. If the difficulty in satisfying the requirements of similitude laws on the one hand and simulating realistic soil behavior on the other can be resolved, scale model testing may generate very useful data for relatively low cost. The current NRC sponsored programs are expected to generate data very useful for verifying analysis methods for SSI. A systematic effort to inventory, evaluate and classify existing data is first necessary. This effort would probably show that more data is needed for the better understanding of SSI aspects such as spatial variation of ground motion and the related issue of foundation input motion, and soil stiffness. Collection of response data from in-structure and free field (surface and downhole) through instrumentation of selected as-built structures in seismically active regions may be the most efficient way to obtain the needed data. Augmentation of this data from properly designed scale model tests should also be considered

  12. Data storage accounting and verification at LHC experiments

    Energy Technology Data Exchange (ETDEWEB)

    Huang, C. H. [Fermilab; Lanciotti, E. [CERN; Magini, N. [CERN; Ratnikova, N. [Moscow, ITEP; Sanchez-Hernandez, A. [CINVESTAV, IPN; Serfon, C. [Munich U.; Wildish, T. [Princeton U.; Zhang, X. [Beijing, Inst. High Energy Phys.

    2012-01-01

    All major experiments at the Large Hadron Collider (LHC) need to measure real storage usage at the Grid sites. This information is equally important for resource management, planning, and operations. To verify the consistency of central catalogs, experiments are asking sites to provide a full list of the files they have on storage, including size, checksum, and other file attributes. Such storage dumps, provided at regular intervals, give a realistic view of the storage resource usage by the experiments. Regular monitoring of the space usage and data verification serve as additional internal checks of the system integrity and performance. Both the importance and the complexity of these tasks increase with the constant growth of the total data volumes during the active data taking period at the LHC. The use of common solutions helps to reduce the maintenance costs, both at the large Tier1 facilities supporting multiple virtual organizations and at the small sites that often lack manpower. We discuss requirements and solutions to the common tasks of data storage accounting and verification, and present experiment-specific strategies and implementations used within the LHC experiments according to their computing models.

  13. IAEA verification of materials accounting in commercial reprocessing plants

    International Nuclear Information System (INIS)

    Gutmacher, R.G.; Hakkila, E.A.

    1987-01-01

    The reprocessing plants currently under International Atomic Energy Agency (IAEA) safeguards have design capacities up to 210 tonnes of heavy metal per year. All of the plants use conventional materials accounting for safeguards. However, several larger commercial reprocessing plants are being designed with capacities of 350 to 1200 tonnes of heavy metal per year. It is likely that many of these plants, as well as some of the existing smaller ones, will adopt near-real-time materials accounting. The major effect of the combination of larger plants and near-real-time accounting on IAEA safeguards will be the demand for greater timeliness of verification. Continuous inspector presence may be required, as well as more on-site measurements by the inspector. In this paper, the authors review what needs to be verified, as well as current inspector activities in the process area. The bulk of the paper describes rapid, easy-to-use measurement techniques and instruments that may be applied to on-site verification measurements

  14. Verification and Validation Issues in Systems of Systems

    Directory of Open Access Journals (Sweden)

    Eric Honour

    2013-11-01

    Full Text Available The cutting edge in systems development today is in the area of "systems of systems" (SoS large networks of inter-related systems that are developed and managed separately, but that also perform collective activities. Such large systems typically involve constituent systems operating with different life cycles, often with uncoordinated evolution. The result is an ever-changing SoS in which adaptation and evolution replace the older engineering paradigm of "development". This short paper presents key thoughts about verification and validation in this environment. Classic verification and validation methods rely on having (a a basis of proof, in requirements and in operational scenarios, and (b a known system configuration to be proven. However, with constant SoS evolution, management of both requirements and system configurations are problematic. Often, it is impossible to maintain a valid set of requirements for the SoS due to the ongoing changes in the constituent systems. Frequently, it is even difficult to maintain a vision of the SoS operational use as users find new ways to adapt the SoS. These features of the SoS result in significant challenges for system proof. In addition to discussing the issues, the paper also indicates some of the solutions that are currently used to prove the SoS.

  15. Calibration of laboratory equipment and its intermediate verification

    International Nuclear Information System (INIS)

    Remedi, Jorge O.

    2011-01-01

    When a laboratory wants to prove that he has technical competence to carry out tests or calibrations must demonstrate that it has complied with certain requirements that establish , among others, the mandatory : calibrate or verify equipment before putting it into service in order to ensure that it meets to the specifications of laboratory equipment to keep records evidencing the checks that equipment complies with the specification ; perform intermediate checks for maintain confidence in the calibration status of the equipment , ensure that the operation is checked and calibration status of equipment when the equipment goes outside the direct control of the laboratory , before be returned to service, establish a program and procedure for the calibration of equipment; show how determined the calibration periods of their equipment as well as evidence that intermediate checks are suitable for the calibration periods. However, some confusion is observed as to the meaning of the terms 'calibration' and 'verification' of a computer. This paper analyzes applicable documentation and suggests that the differences are generated in part by translations and by characterization concepts upon its usage, that is, if it is legal metrology or assessment conformity. Therefore, this study aims to characterize both concepts , fundamentals to zoom distinguish , outline appropriate strategies for calibration and verification activities to ensure the compliance with regulatory requirements [es

  16. Verification survey report of the south waste tank farm training/test tower and hazardous waste storage lockers at the West Valley demonstration project, West Valley, New York

    International Nuclear Information System (INIS)

    Weaver, Phyllis C.

    2012-01-01

    A team from ORAU's Independent Environmental Assessment and Verification Program performed verification survey activities on the South Test Tower and four Hazardous Waste Storage Lockers. Scan data collected by ORAU determined that both the alpha and alpha-plus-beta activity was representative of radiological background conditions. The count rate distribution showed no outliers that would be indicative of alpha or alpha-plus-beta count rates in excess of background. It is the opinion of ORAU that independent verification data collected support the site's conclusions that the South Tower and Lockers sufficiently meet the site criteria for release to recycle and reuse

  17. Cognitive Bias in the Verification and Validation of Space Flight Systems

    Science.gov (United States)

    Larson, Steve

    2012-01-01

    Cognitive bias is generally recognized as playing a significant role in virtually all domains of human decision making. Insight into this role is informally built into many of the system engineering practices employed in the aerospace industry. The review process, for example, typically has features that help to counteract the effect of bias. This paper presents a discussion of how commonly recognized biases may affect the verification and validation process. Verifying and validating a system is arguably more challenging than development, both technically and cognitively. Whereas there may be a relatively limited number of options available for the design of a particular aspect of a system, there is a virtually unlimited number of potential verification scenarios that may be explored. The probability of any particular scenario occurring in operations is typically very difficult to estimate, which increases reliance on judgment that may be affected by bias. Implementing a verification activity often presents technical challenges that, if they can be overcome at all, often result in a departure from actual flight conditions (e.g., 1-g testing, simulation, time compression, artificial fault injection) that may raise additional questions about the meaningfulness of the results, and create opportunities for the introduction of additional biases. In addition to mitigating the biases it can introduce directly, the verification and validation process must also overcome the cumulative effect of biases introduced during all previous stages of development. A variety of cognitive biases will be described, with research results for illustration. A handful of case studies will be presented that show how cognitive bias may have affected the verification and validation process on recent JPL flight projects, identify areas of strength and weakness, and identify potential changes or additions to commonly used techniques that could provide a more robust verification and validation of

  18. Production controls (PC) and technical verification testing (TVT). A methodology for the control and tracking of LILW waste package conditioning

    International Nuclear Information System (INIS)

    Leon, A.M.; Nieto, J.L.L.; Garrido, J.G.

    2003-01-01

    As part of its low and intermediate level radioactive waste (LILW) characterisation and acceptance activities, ENRESA has set up a quality control programme that covers the different phases of radioactive waste package production and implies different levels of tracking in generation, assessment of activity and control of the documentation associated therewith. Furthermore, ENRESA has made available the mechanisms required for verification, depending on the results of periodic sampling, of the quality of the end product delivered by the waste producers. Both processes are included within the framework of two programmes of complementary activities: production controls (PC) and technical verification testing (TVT). (orig.)

  19. Experimental verification of three-dimensional plasmonic cloaking in free-space

    International Nuclear Information System (INIS)

    Rainwater, D; Kerkhoff, A; Melin, K; Soric, J C; Moreno, G; Alù, A

    2012-01-01

    We report the experimental verification of metamaterial cloaking for a 3D object in free space. We apply the plasmonic cloaking technique, based on scattering cancellation, to suppress microwave scattering from a finite-length dielectric cylinder. We verify that scattering suppression is obtained all around the object in the near- and far-field and for different incidence angles, validating our measurements with analytical results and full-wave simulations. Our near-field and far-field measurements confirm that realistic and robust plasmonic metamaterial cloaks may be realized for elongated 3D objects with moderate transverse cross-section at microwave frequencies. (paper)

  20. Verification calculation of drum and pulley overhead travelling crane on gamma irradiators

    International Nuclear Information System (INIS)

    Syamsurrijal Ramdja; Ari Satmoko; Sutomo Budihardjo

    2010-01-01

    Having verified the calculation of dam drum pulleys found on cranes to facilitate the gamma irradiator. Drum is a device for rolling steel ropes while the pulley is a circular pieces called disks, which are made from metal or non-metal to transmit motion and force. Having verified calculation of forces acting style on drums, drum diameter and length and style of press that occurred on drums. Likewise, the pulley, pulley diameter verified calculations, measures of disc and shaft power pulleys. From the verification results will be obtained whether the data drums and pulley device is safe or not safe to use. (author)

  1. Finite Element Verification of Non-Homogeneous Strain and Stress Fields during Composite Material Testing

    DEFF Research Database (Denmark)

    Mikkelsen, Lars Pilgaard

    2015-01-01

    Uni-directional glass fiber reinforced polymers play a central role in the task increasing the length of wind turbines blades and thereby lowering the cost of energy from wind turbine installations. During this, optimizing the mechanical performance regarding material stiffness, compression...... strength and fatigue performance is essential. Nevertheless, testing composites includes some challenges regarding stiffness determination using conventional strain gauges and achieving correct material failure unaffected by the gripping region during fatigue testing. Challenges, which in the present study......, has been addressed using the finite element method. During this, a verification of experimental observations, a deeper understanding on the test coupon loading and thereby improved test methods has been achieved....

  2. Shield verification and validation action matrix summary

    International Nuclear Information System (INIS)

    Boman, C.

    1992-02-01

    WSRC-RP-90-26, Certification Plan for Reactor Analysis Computer Codes, describes a series of action items to be completed for certification of reactor analysis computer codes used in Technical Specifications development and for other safety and production support calculations. Validation and verification are integral part of the certification process. This document identifies the work performed and documentation generated to satisfy these action items for the SHIELD, SHLDED, GEDIT, GENPRT, FIPROD, FPCALC, and PROCES modules of the SHIELD system, it is not certification of the complete SHIELD system. Complete certification will follow at a later date. Each action item is discussed with the justification for its completion. Specific details of the work performed are not included in this document but can be found in the references. The validation and verification effort for the SHIELD, SHLDED, GEDIT, GENPRT, FIPROD, FPCALC, and PROCES modules of the SHIELD system computer code is completed

  3. Formal verification of industrial control systems

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Verification of critical software is a high priority but a challenging task for industrial control systems. For many kinds of problems, testing is not an efficient method. Formal methods, such as model checking appears to be an appropriate complementary method. However, it is not common to use model checking in industry yet, as this method needs typically formal methods expertise and huge computing power. In the EN-ICE-PLC section, we are working on a [methodology][1] and a tool ([PLCverif][2]) to overcome these challenges and to integrate formal verification in the development process of our PLC-based control systems. [1]: http://cern.ch/project-plc-formalmethods [2]: http://cern.ch/plcverif

  4. Development and verification of the CATHENA GUI

    International Nuclear Information System (INIS)

    Chin, T.

    2008-01-01

    This paper presents the development and verification of a graphical user interface for CATHENA MOD-3.5d. The thermalhydraulic computer code CATHENA has been developed to simulate the physical behaviour of the hydraulic components in nuclear reactors and experimental facilities. A representation of the facility is developed as an ASCII text file and used by CATHENA to perform the simulation. The existing method of manual generation of idealizations of a physical system for performing thermal hydraulic analysis is complex, time-consuming and prone to errors. An overview is presented of the CATHENA GUI and its depiction of a CATHENA idealization through the manipulation of a visual collection of objects. The methodologies and rigour involved in the verification of the CATHENA GUI will be discussed. (author)

  5. Packaged low-level waste verification system

    Energy Technology Data Exchange (ETDEWEB)

    Tuite, K.; Winberg, M.R.; McIsaac, C.V. [Idaho National Engineering Lab., Idaho Falls, ID (United States)

    1995-12-31

    The Department of Energy through the National Low-Level Waste Management Program and WMG Inc. have entered into a joint development effort to design, build, and demonstrate the Packaged Low-Level Waste Verification System. Currently, states and low-level radioactive waste disposal site operators have no method to independently verify the radionuclide content of packaged low-level waste that arrives at disposal sites for disposition. At this time, the disposal site relies on the low-level waste generator shipping manifests and accompanying records to ensure that low-level waste received meets the site`s waste acceptance criteria. The subject invention provides the equipment, software, and methods to enable the independent verification of low-level waste shipping records to ensure that the site`s waste acceptance criteria are being met. The objective of the prototype system is to demonstrate a mobile system capable of independently verifying the content of packaged low-level waste.

  6. Time Optimal Reachability Analysis Using Swarm Verification

    DEFF Research Database (Denmark)

    Zhang, Zhengkui; Nielsen, Brian; Larsen, Kim Guldstrand

    2016-01-01

    Time optimal reachability analysis employs model-checking to compute goal states that can be reached from an initial state with a minimal accumulated time duration. The model-checker may produce a corresponding diagnostic trace which can be interpreted as a feasible schedule for many scheduling...... and planning problems, response time optimization etc. We propose swarm verification to accelerate time optimal reachability using the real-time model-checker Uppaal. In swarm verification, a large number of model checker instances execute in parallel on a computer cluster using different, typically randomized...... search strategies. We develop four swarm algorithms and evaluate them with four models in terms scalability, and time- and memory consumption. Three of these cooperate by exchanging costs of intermediate solutions to prune the search using a branch-and-bound approach. Our results show that swarm...

  7. Systems Approach to Arms Control Verification

    Energy Technology Data Exchange (ETDEWEB)

    Allen, K; Neimeyer, I; Listner, C; Stein, G; Chen, C; Dreicer, M

    2015-05-15

    Using the decades of experience of developing concepts and technologies for verifying bilateral and multilateral arms control agreements, a broad conceptual systems approach is being developed that takes into account varying levels of information and risk. The IAEA has already demonstrated the applicability of a systems approach by implementing safeguards at the State level, with acquisition path analysis as the key element. In order to test whether such an approach could also be implemented for arms control verification, an exercise was conducted in November 2014 at the JRC ITU Ispra. Based on the scenario of a hypothetical treaty between two model nuclear weapons states aimed at capping their nuclear arsenals at existing levels, the goal of this exercise was to explore how to use acquisition path analysis in an arms control context. Our contribution will present the scenario, objectives and results of this exercise, and attempt to define future workshops aimed at further developing verification measures that will deter or detect treaty violations.

  8. GRIMHX verification and validation action matrix summary

    International Nuclear Information System (INIS)

    Trumble, E.F.

    1991-12-01

    WSRC-RP-90-026, Certification Plan for Reactor Analysis Computer Codes, describes a series of action items to be completed for certification of reactor analysis computer codes used in Technical Specifications development and for other safety and production support calculations. Validation and verification of the code is an integral part of this process. This document identifies the work performed and documentation generated to satisfy these action items for the Reactor Physics computer code GRIMHX. Each action item is discussed with the justification for its completion. Specific details of the work performed are not included in this document but are found in the references. The publication of this document signals the validation and verification effort for the GRIMHX code is completed

  9. Sensor-fusion-based biometric identity verification

    International Nuclear Information System (INIS)

    Carlson, J.J.; Bouchard, A.M.; Osbourn, G.C.; Martinez, R.F.; Bartholomew, J.W.; Jordan, J.B.; Flachs, G.M.; Bao, Z.; Zhu, L.

    1998-02-01

    Future generation automated human biometric identification and verification will require multiple features/sensors together with internal and external information sources to achieve high performance, accuracy, and reliability in uncontrolled environments. The primary objective of the proposed research is to develop a theoretical and practical basis for identifying and verifying people using standoff biometric features that can be obtained with minimal inconvenience during the verification process. The basic problem involves selecting sensors and discovering features that provide sufficient information to reliably verify a person's identity under the uncertainties caused by measurement errors and tactics of uncooperative subjects. A system was developed for discovering hand, face, ear, and voice features and fusing them to verify the identity of people. The system obtains its robustness and reliability by fusing many coarse and easily measured features into a near minimal probability of error decision algorithm

  10. Automated Formal Verification for PLC Control Systems

    CERN Multimedia

    Fernández Adiego, Borja

    2014-01-01

    Programmable Logic Controllers (PLCs) are widely used devices used in industrial control systems. Ensuring that the PLC software is compliant with its specification is a challenging task. Formal verification has become a recommended practice to ensure the correctness of the safety-critical software. However, these techniques are still not widely applied in industry due to the complexity of building formal models, which represent the system and the formalization of requirement specifications. We propose a general methodology to perform automated model checking of complex properties expressed in temporal logics (e.g. CTL, LTL) on PLC programs. This methodology is based on an Intermediate Model (IM), meant to transform PLC programs written in any of the languages described in the IEC 61131-3 standard (ST, IL, etc.) to different modeling languages of verification tools. This approach has been applied to CERN PLC programs validating the methodology.

  11. From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

    Directory of Open Access Journals (Sweden)

    Tieming Chen

    2016-01-01

    Full Text Available Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN and wireless body area networks (WBAN, formal modeling and verification for these domain-specific systems are quite challenging. In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification. At first, an abstract modeling data structure for CSP#, which is built in PAT, is developed to support the node mobility related specification for modeling location-based node activity. Then, the traditional Dolev-Yao model is redefined to facilitate modeling of location-specific attack behaviors on security mechanism. A throughout formal verification application on a location-based security protocol in WSN is described in detail to show the usability and effectiveness of the proposed methodology. Furthermore, also a novel location-based authentication security protocol in WBAN can be successfully modeled and verified directly using our method, which is, to the best of our knowledge, the first effort on employing model checking for automatic analysis of authentication protocol for WBAN.

  12. Getting ready for final disposal in Finland - Independent verification of spent fuel

    International Nuclear Information System (INIS)

    Tarvainen, Matti; Honkamaa, Tapani; Martikka, Elina; Varjoranta, Tero; Hautamaeki, Johanna; Tiitta, Antero

    2001-01-01

    Full text: Final disposal of spent nuclear fuel has been known to be the solution for the back-end of the fuel cycle in Finland already for a long time. This has allowed the State system for accounting and control (SSAC) to prepare for the safeguards requirements in time. The Finnish SSAC includes the operator, the State authority STUK and the parties above them e.g. the Ministry for Trade and Industry. Undisputed responsibility of the safe disposal of spent fuel is on the operator. The role of the safety authority STUK. is to set up detailed requirements, to inspect the operator plans and by using different tools of a quality audit approach to verity that the requirements will be complied with in practice. Responsibility on the safeguards issues is similar with the addition of the role of the regional and the international verification organizations represented by Euratom and the IAEA, As the competent safeguards authority, STUK has decided to maintain its active role also in the future. This will be reflected in the future in the increasing cooperation between the SSAC and the IAEA in the new safeguards activities related to the Additional Protocol. The role of Euratom will remain the same concerning the implementation of conventional safeguards. Based on its SSAC role, STUK has continued carrying out safeguards inspections including independent verification measurements on spent fuel also after joining the EU and Euratom safeguards in 1995. Verification of the operator declared data is the key verification element of safeguards. This will remain to be the case also under the Integrated Safeguards (IS) in the future. It is believed that the importance of high quality measurements will rather increase than decrease when the frequency of interim inspections will decrease. Maintaining the continuity of knowledge makes sense only when the knowledge is reliable and independently verified. One of the corner stones of the high quality of the Finnish SSAC activities is

  13. Face Verification using MLP and SVM

    OpenAIRE

    Cardinaux, Fabien; Marcel, Sébastien

    2002-01-01

    The performance of machine learning algorithms has steadily improved over the past few years, such as MLP or more recently SVM. In this paper, we compare two successful discriminant machine learning algorithms apply to the problem of face verification: MLP and SVM. These two algorithms are tested on a benchmark database, namely XM2VTS. Results show that a MLP is better than a SVM on this particular task.

  14. Verification tests for CANDU advanced fuel

    International Nuclear Information System (INIS)

    Chung, Chang Hwan; Chang, S.K.; Hong, S.D.

    1997-07-01

    For the development of a CANDU advanced fuel, the CANFLEX-NU fuel bundles were tested under reactor operating conditions at the CANDU-Hot test loop. This report describes test results and test methods in the performance verification tests for the CANFLEX-NU bundle design. The main items described in the report are as follows. - Fuel bundle cross-flow test - Endurance fretting/vibration test - Freon CHF test - Production of technical document. (author). 25 refs., 45 tabs., 46 figs

  15. Safety Verification for Probabilistic Hybrid Systems

    Czech Academy of Sciences Publication Activity Database

    Zhang, J.; She, Z.; Ratschan, Stefan; Hermanns, H.; Hahn, E.M.

    2012-01-01

    Roč. 18, č. 6 (2012), s. 572-587 ISSN 0947-3580 R&D Projects: GA MŠk OC10048; GA ČR GC201/08/J020 Institutional research plan: CEZ:AV0Z10300504 Keywords : model checking * hybrid system s * formal verification Subject RIV: IN - Informatics, Computer Science Impact factor: 1.250, year: 2012

  16. Stamp Verification for Automated Document Authentication

    DEFF Research Database (Denmark)

    Micenková, Barbora; van Beusekom, Joost; Shafait, Faisal

    Stamps, along with signatures, can be considered as the most widely used extrinsic security feature in paper documents. In contrast to signatures, however, for stamps little work has been done to automatically verify their authenticity. In this paper, an approach for verification of color stamps ...... and copied stamps. Sensitivity and specificity of up to 95% could be obtained on a data set that is publicly available....

  17. Component Verification and Certification in NASA Missions

    Science.gov (United States)

    Giannakopoulou, Dimitra; Penix, John; Norvig, Peter (Technical Monitor)

    2001-01-01

    Software development for NASA missions is a particularly challenging task. Missions are extremely ambitious scientifically, have very strict time frames, and must be accomplished with a maximum degree of reliability. Verification technologies must therefore be pushed far beyond their current capabilities. Moreover, reuse and adaptation of software architectures and components must be incorporated in software development within and across missions. This paper discusses NASA applications that we are currently investigating from these perspectives.

  18. Survey of Existing Tools for Formal Verification.

    Energy Technology Data Exchange (ETDEWEB)

    Punnoose, Ratish J.; Armstrong, Robert C.; Wong, Matthew H.; Jackson, Mayo

    2014-12-01

    Formal methods have come into wide use because of their effectiveness in verifying "safety and security" requirements of digital systems; a set of requirements for which testing is mostly ineffective. Formal methods are routinely used in the design and verification of high-consequence digital systems in industry. This report outlines our work in assessing the capabilities of commercial and open source formal tools and the ways in which they can be leveraged in digital design workflows.

  19. Analyzing personalized policies for online biometric verification.

    Science.gov (United States)

    Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M

    2014-01-01

    Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India's program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India's biometric program. The mean delay is [Formula: see text] sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32-41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident.

  20. System Description: Embedding Verification into Microsoft Excel

    OpenAIRE

    Collins, Graham; Dennis, Louise Abigail

    2000-01-01

    The aim of the PROSPER project is to allow the embedding of existing verification technology into applications in such a way that the theorem proving is hidden, or presented to the end user in a natural way. This paper describes a system built to test whether the PROSPER toolkit satisfied this aim. The system combines the toolkit with Microsoft Excel, a popular commercial spreadsheet application.