WorldWideScience

Sample records for check oro-dental implications

  1. Wolf-Hirschhorn syndrome; oro-dental manifestations and management.

    Science.gov (United States)

    Roberts, T; Stephen, L X G; Fieggen, K; Beighton, P

    2009-01-01

    The major manifestations of the Wolf-Hirschhorn syndrome are developmental delay, short stature, mental impairment and epilepsy. Clefts of the lip and palate are sometimes present. Dental problems which are overshadowed by the major syndromic manifestations warrant appropriate management. We have documented an affected South African boy, discussed his dental management and reviewed the oro-dental implications of the disorder.

  2. Oro-dental features of Pallister-Killian syndrome: Evaluation of 21 European probands.

    Science.gov (United States)

    Bagattoni, Simone; D'Alessandro, Giovanni; Sadotti, Agnese; Alkhamis, Nadia; Rocca, Alessandro; Cocchi, Guido; Krantz, Ian David; Piana, Gabriela

    2016-09-01

    Pallister-Killian syndrome (PKS) is a rare sporadic multi-systemic developmental disorder caused by a mosaic tetrasomy of the short arm of chromosome 12. A wide range of clinical characteristics including intellectual disability, seizures, and congenital malformations has previously been described. Individuals with PKS show a characteristic facial phenotype with frontal bossing, alopecia, sparse eyebrows, depressed nasal bridge, long philtrum, telecanthus, and posteriorly rotated ears. Oro-dental features, such as "Pallister lip," macroglossia, delayed eruption of primary teeth, high arched-palate, prognathism, and cleft palate have been occasionally reported in the medical literature. The aim of the study was to assess the oro-dental phenotype of PKS and to describe the oral health status in a cohort participating in the First European Workshop on PKS. A clinical dental examination was performed in 21 Caucasian probands and data regarding medical and dental history collected. Twelve probands (57%) showed an atypical dental pattern, with multiple missing teeth (primarily the first permanent molars) and 2 (10%) a double teeth. The severity of gingivitis and dental caries increased with age and gingival overgrowth was a common finding. A characteristic occlusive phenotype was found: a high-arched palate with mandibular prognathism associated with an anterior openbite and crossbite and with posterior crossbite (unilateral or bilateral). The prevalence of oral habits (non-nutritive sucking, mouth breathing, bruxism) was high, even in older probands. This study suggests that individuals affected by PKS should be observed closely for oro-dental diseases and a multidisciplinary approach is needed to implement the right preventive measures. © 2016 Wiley Periodicals, Inc.

  3. Evaluation of Child Self-perception Regarding Their Oro-dental Status

    Directory of Open Access Journals (Sweden)

    Krisztina Mártha I.

    2013-10-01

    Full Text Available Aim: The aim of this study was to evaluate the state of oral health and the self-perception of children regarding their oro-dental status, their knowledge and attitude towards oral health. Methods: A sample of 130 children (11-14 years and one of their parents were asked to complete a Child Perception Questionnaire (CPQ11-14 in Sfântu Gheorghe, Romania. From these, 69 children were examined and data was recorded about Decayed-Missing-Filled Teeth (DMFT, oral hygiene, dental malposition and malocclusion, Aesthetic Component of Index of Treatment Need (AC-IOTN. Consent of the parents was obtained. Statistical analyses were performed. Results: The optimal score of CPQ evaluation is 96 and the maximum score achieved was 93, the minimum was 43. 78.10 average score can be graded as medium. As the data points out, most of the children and their parents have a medium knowledge and self-perception. The clinical examination underline the main problems: dental caries (62%, occlusal coloration (23%, dental malposition (17%, rooftop deep bite (14%, dental rotation and crowding (12%, dental plaque and tartar (10%. As far as the AC-IOTN is concerned, 48 of 69 children have no need for treatment, 18 have a high need for treatment, and 3 have a moderate need for treatment. Conclusions: Overall, the children and their parents have a poor oral health knowledge, which is reflected in the medium level of the achieved CPQ scores, in the clinical examination and can be associated with high levels of dental caries and malocclusion

  4. Fractal features of soil particle size distribution in layered sediments behind two check dams: Implications for the Loess Plateau, China

    Science.gov (United States)

    Wei, Xia; Li, Xungui; Wei, Ning

    2016-08-01

    The layered sediment deposited behind a check dam can provide useful information about soil erosion processes in the dam-controlled area. This study aims to evaluate the possible fractal nature of layered sediments behind check dams, assessing whether fractal dimension can serve as a feasible index for evaluating the impact of land use types on the area controlled by the check dam. Fractal dimension measurement was employed to analyze the features of soil particle size distribution (PSD) for different layered sediments of the Shipanmao and Zhangshan check dams in the Dalihe River Basin of the Loess Plateau, China. Results show that the predominant soil particle sizes of the sediment layers behind the Shipanmao and Zhangshan dams are silt-clay (soil particle sizes coincide with larger CV values. The fractal dimension (Dm) of the PSD ranges from 2.111 to 2.219, and 2.144 to 2.447 for Shipanmao and Zhangshan, respectively. The Dm values tend to increase and decrease for the layered sediments from top to bottom with some turning points. The turning points of Dm are related to the trends of the soil PSDs in the adjacent sediment layers. Although Dm has significant positive and negative correlations with the silt-clay and the fine sand size fractions, respectively, no correlation with the coarse sand fraction was observed. Soil PSD is a more dominant factor affecting Dm than the time lag between soil erosion and sediment deposition. Overall, Dm decreased for Shipanmao during the deposition period (1972-1979). The total increment of the C factor in the universal soil loss equation and the soil erosion amount per rainfall erosivity were applied to analyze land use changes between 1972 and 1979 for the dam-controlled area of the Shipanmao dam. The total increment of C during 1972-1979 was 0.021 and the soil erosion amount per rainfall erosivity was smaller in 1972 than in 1979, indicating desertification in the dam-controlled area. In addition, the land use types prevalent

  5. Role of genes in oro-dental diseases

    Directory of Open Access Journals (Sweden)

    Kavitha B

    2010-01-01

    Full Text Available In oral cavity, the spectrum of diseases due to genetic alterations ranges from developmental disturbances of teeth to the pre-cancerous and cancerous lesions. Of late, significant progress has been made in the molecular analysis of tumors. With molecular genetic testing emerging as diagnostic, prognostic, and therapeutic approach, a review of genetic alterations ranging from the development of oro-facial structures to the tumors in the head and neck region are addressed in this article. The functional regulatory aspect of genes in relation to oro-facial structures are discussed separately, i.e., in relation to tooth genesis, tooth agenesis (non-syndromic, syndromic, tooth structural alterations, syndromic oro-facial defects, bone diseases, skin diseases (genodermatoses, and malignant tumors. In this literature, various genes involved in the development of the oro-facial structures and tooth in particular are discussed. The genetic basis of disorders in the tooth development (agenesis, hypodontia, tooth structural defects like amelogenesis imperfecta (AI, dentinogenesis imperfecta (DI, and oro-facial structural alterations (various syndromes are explained.

  6. Get Your Cholesterol Checked

    Science.gov (United States)

    ... Checked Print This Topic En español Get Your Cholesterol Checked Browse Sections The Basics Overview Cholesterol Test ... How often do I need to get my cholesterol checked? The general recommendation is to get your ...

  7. Regular health checks

    DEFF Research Database (Denmark)

    Grønhøj Larsen, Christian; Jørgensen, Karsten Juhl; Gøtzsche, Peter C

    2012-01-01

    To investigate whether Danish providers of general health checks present a balanced account of possible benefits and harms on their websites and whether the health checks are evidence-based.......To investigate whether Danish providers of general health checks present a balanced account of possible benefits and harms on their websites and whether the health checks are evidence-based....

  8. Automating checks of plan check automation.

    Science.gov (United States)

    Halabi, Tarek; Lu, Hsiao-Ming

    2014-07-08

    While a few physicists have designed new plan check automation solutions for their clinics, fewer, if any, managed to adapt existing solutions. As complex and varied as the systems they check, these programs must gain the full confidence of those who would run them on countless patient plans. The present automation effort, planCheck, therefore focuses on versatility and ease of implementation and verification. To demonstrate this, we apply planCheck to proton gantry, stereotactic proton gantry, stereotactic proton fixed beam (STAR), and IMRT treatments.

  9. Engineering Abstractions in Model Checking and Testing

    DEFF Research Database (Denmark)

    Achenbach, Michael; Ostermann, Klaus

    2009-01-01

    Abstractions are used in model checking to tackle problems like state space explosion or modeling of IO. The application of these abstractions in real software development processes, however, lacks engineering support. This is one reason why model checking is not widely used in practice yet...... and testing is still state of the art in falsification. We show how user-defined abstractions can be integrated into a Java PathFinder setting with tools like AspectJ or Javassist and discuss implications of remaining weaknesses of these tools. We believe that a principled engineering approach to designing...... and implementing abstractions will improve the applicability of model checking in practice....

  10. Symbolic model checking APSL

    Institute of Scientific and Technical Information of China (English)

    Wanwei LIU; Ji WANG; Huowang CHEN; Xiaodong MA; Zhaofei WANG

    2009-01-01

    Property specification language (PSL) is a specification language which has been accepted as an industrial standard. In PSL, SEREs are used as additional formula constructs. In this paper, we present a variant of PSL, namely APSL, which replaces SEREs with finite automata. APSL and PSL are of the exactly same expressiveness. Then, we extend the LTL symbolic model checking algorithm to that of APSL, and then present a tableau based APSL verification technique, which can be easily implemented via the BDD based symbolic approach. Moreover, we implement an extension of NuSMV, and this adapted version supports symbolic model checking of APSL. Experimental results show that this variant of PSL can be efficiently verified. Henceforth, symbolic model checking PSL can be carried out by a transformation from PSL to APSL and symbolic model checking APSL.

  11. Goat production check list

    DEFF Research Database (Denmark)

    Henriksen, Jørgen; Nielsen, Mette Benedicte Olaf; Madsen, Jørgen

    2009-01-01

    This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production.......This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production....

  12. Parallel Software Model Checking

    Science.gov (United States)

    2015-01-08

    JAN 2015 2. REPORT TYPE N/A 3. DATES COVERED 4. TITLE AND SUBTITLE Parallel Software Model Checking 5a. CONTRACT NUMBER 5b. GRANT NUMBER...AND ADDRESS(ES) Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 8. PERFORMING ORGANIZATION REPORT NUMBER 9...3: ∧ ≥ 10 ∧ ≠ 10 ⇒ : Parallel Software Model Checking Team Members Sagar Chaki, Arie Gurfinkel

  13. CMM Interim Check (U)

    Energy Technology Data Exchange (ETDEWEB)

    Montano, Joshua Daniel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-03-23

    Coordinate Measuring Machines (CMM) are widely used in industry, throughout the Nuclear Weapons Complex and at Los Alamos National Laboratory (LANL) to verify part conformance to design definition. Calibration cycles for CMMs at LANL are predominantly one year in length. Unfortunately, several nonconformance reports have been generated to document the discovery of a certified machine found out of tolerance during a calibration closeout. In an effort to reduce risk to product quality two solutions were proposed – shorten the calibration cycle which could be costly, or perform an interim check to monitor the machine’s performance between cycles. The CMM interim check discussed makes use of Renishaw’s Machine Checking Gauge. This off-the-shelf product simulates a large sphere within a CMM’s measurement volume and allows for error estimation. Data was gathered, analyzed, and simulated from seven machines in seventeen different configurations to create statistical process control run charts for on-the-floor monitoring.

  14. Interest Check List.

    Science.gov (United States)

    Bureau of Employment Security (DOL), Washington, DC.

    The original edition of the Department of Labor Interest Check List aims at helping students decide what kinds of work they would like and lists activities that are found in a broad range of industries and occupations. The student is advised to read each of approximately 175 items and indicate how he feels about the activity described by placing a…

  15. Checking BEBC superconducting magnet

    CERN Multimedia

    1974-01-01

    The superconducting coils of the magnet for the 3.7 m Big European Bubble Chamber (BEBC) had to be checked, see Annual Report 1974, p. 60. The photo shows a dismantled pancake. By December 1974 the magnet reached again the field design value of 3.5 T.

  16. Partial model checking

    DEFF Research Database (Denmark)

    Andersen, Henrik Reif

    1995-01-01

    A major obstacle in applying finite-state model checking to the verification of large systems is the combinatorial explosion of the state space arising when many loosely coupled parallel processes are considered. The problem also known as the state-explosion problem has been attacked from various...... sides. This paper presents a new approach based on partial model checking where parts of the concurrent system are gradually removed while transforming the specification accordingly. When the intermediate specifications constructed in this manner can be kept small, the state-explosion problem is avoided....... Experimental results with a prototype implemented in Standard ML, shows that for Milner's Scheduler-an often used benchmark-this approach improves on the published results on binary decision diagrams and is comparable to results obtained using generalized decision diagrams. Specifications are expressed...

  17. Check Verbraucherpolitik und Verbraucherbeteiligung

    DEFF Research Database (Denmark)

    Hagen, Kornelia; Micklitz, Hans-W.; Oehler, Andreas;

    2013-01-01

    The paper discusses the opportunities for an empirically grounded decision support system as an instrument for independent and scientifically based consumer policy consulting. To date, consumer policy is dominated by the information paradigm and the leitbild of the rational, sovereign...... and information-seeking consumer. Yet, both everyday practice and research in behavioural economics show that this view lacks empirical ground. In fact, there are different consumer types and different forms of rationalities at work. Effective consumer policy making should be based on the empirically revealed...... an empirically based “Check Consumer Policy and Consumer Participation” as a systematic decision and evaluation tool for policy makers. This check should be independent from the government and should be grounded on an empirical view of the consumer. Consumer policy tools should be tested with real consumers...

  18. Model Checking Feature Interactions

    DEFF Research Database (Denmark)

    Le Guilly, Thibaut; Olsen, Petur; Pedersen, Thomas;

    2015-01-01

    This paper presents an offline approach to analyzing feature interactions in embedded systems. The approach consists of a systematic process to gather the necessary information about system components and their models. The model is first specified in terms of predicates, before being refined to t...... to timed automata. The consistency of the model is verified at different development stages, and the correct linkage between the predicates and their semantic model is checked. The approach is illustrated on a use case from home automation....

  19. Check, check, double check: checking the autopilot causes distrust : Experimental studies on the effects of compulsive perseveration

    NARCIS (Netherlands)

    Dek, E.C.P.

    2015-01-01

    Obsessive-compulsive disorder (OCD) is characterized by persistent doubt. The majority of patients with OCD engage in repeated checking to reduce these feelings of uncertainty. However, numerous studies demonstrated that repetitive behavior ironically increases uncertainty: perseverative checking in

  20. Conditional Model Checking

    CERN Document Server

    Beyer, Dirk; Keremoglu, M Erkan; Wendler, Philipp

    2011-01-01

    Software model checking, as an undecidable problem, has three possible outcomes: (1) the program satisfies the specification, (2) the program does not satisfy the specification, and (3) the model checker fails. The third outcome usually manifests itself in a space-out, time-out, or one component of the verification tool giving up; in all of these failing cases, significant computation is performed by the verification tool before the failure, but no result is reported. We propose to reformulate the model-checking problem as follows, in order to have the verification tool report a summary of the performed work even in case of failure: given a program and a specification, the model checker returns a condition P ---usually a state predicate--- such that the program satisfies the specification under the condition P ---that is, as long as the program does not leave states in which P is satisfied. We are of course interested in model checkers that return conditions P that are as weak as possible. Instead of outcome ...

  1. Bounded Model Checking of CTL

    Institute of Scientific and Technical Information of China (English)

    Zhi-Hong Tao; Cong-Hua Zhou; Zhong Chen; Li-Fu Wang

    2007-01-01

    Bounded Model Checking has been recently introduced as an efficient verification method for reactive systems.This technique reduces model checking of linear temporal logic to propositional satisfiability.In this paper we first present how quantified Boolean decision procedures can replace BDDs.We introduce a bounded model checking procedure for temporal logic CTL* which reduces model checking to the satisfiability of quantified Boolean formulas.Our new technique avoids the space blow up of BDDs, and extends the concept of bounded model checking.

  2. Checking Security Policy Compliance

    CERN Document Server

    Gowadia, Vaibhav; Kudo, Michiharu

    2008-01-01

    Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

  3. Model Checking as Static Analysis

    DEFF Research Database (Denmark)

    Zhang, Fuyuan

    Both model checking and static analysis are prominent approaches to detecting software errors. Model Checking is a successful formal method for verifying properties specified in temporal logics with respect to transition systems. Static analysis is also a powerful method for validating program...... properties which can predict safe approximations to program behaviors. In this thesis, we have developed several static analysis based techniques to solve model checking problems, aiming at showing the link between static analysis and model checking. We focus on logical approaches to static analysis......-calculus can be encoded as the intended model of SFP. Our research results have strengthened the link between model checking and static analysis. This provides a theoretical foundation for developing a unied tool for both model checking and static analysis techniques....

  4. PERFORMANCE MANAGEMENT A NEW CONCEPT IN ORO-DENTAL HEALTH SYSTEM

    OpenAIRE

    ADRIANA DUTESCU; OANA STANILA; DANIELA SAHLIAN; DANIELA TRASCA

    2011-01-01

    The more and more specialized equipments, developed in the last time with applicability in medicine, the necessary of materials more and more increased, determine the need of a good flow of activities in the field of the logistic of supply-chain management). These premises determine the necessity of some interdisciplinary studies, for developing new management systems, and namely a management based on knowledge. By this research, we aim to a new approach reported to the actual state of knowle...

  5. Solutions against crisis applicable to the oro-dental health system in Romania

    Directory of Open Access Journals (Sweden)

    Adriana DUŢESCU

    2012-08-01

    Full Text Available The health systems consume a lot of resources. In the last thirty years, there was registered a continuous increase of the necessary resources’ level. This increase was mainly due to: the ageing of the population, discovery of more efficient medicines and of more advanced and costly technologies, the increase of the number of persons who benefits by medical assistance.Theoretically, the financial supporting could be upgraded by help of a series of measures: restriction of the access to services, reduction of the quality of the services or increase of the private financing weight (which has consequences connected to the limitation of the access to services. None of these is desired from social point of view.From social perspective, the most indicated modality of upgrading the financial supporting is the efficient increase of the health system. In this situation, the efficiency makes reference to the decrease of costs, maintaining at the same level the quantity and quality, achieved by preventing the overconsumption (which could be connected to oversupply of medical services and assignment of sufficient resources for the prevention and health maintenance programs with the purpose to reduce some future potential expenses. The performed comparisons between different international experiences based on the resulted/expenses rapport could represent a useful guide referring to the efficiency.

  6. Prevalence of oro-dental anomalies among schoolchildren in Sana'a city, Yemen.

    Science.gov (United States)

    Basalamah, M; Baroudi, K

    2016-04-19

    Practitioners and policy-makers need information about the relative frequency of dental anomalies among children in their region. This study investigated the prevalence of different oral anomalies among schoolchildren in Sana'a city, Yemen. A sample of 1000 private and public schoolchildren aged 4-12 years were examined by the same examiner using disposable tongue blades. The total prevalence of oral anomalies was 15.1%, most commonly in boys (male:female ratio 3.2:1) aged 7-12 years. The most prevalent dental anomaly related to hard tissues was tooth hypoplasia (2.8%), followed by hypocalcification (2.6%), then microdontia (0.5%), macrodontia (0.4%), hypodontia (0.4%), supernumerary teeth (0.3%), tooth transposition (0.3%), dental fusion (0.2%) and gemination (0.2%). The most prevalent soft tissues anomaly was fissured tongue (4.0%), followed by ankyloglossia (1.8%), geographic tongue (0.9%), macroglossia (0.4%) and hairy tongue (0.3%). Appropriate measures need to be taken early to mitigate the negative impact and later costs of treatment of anomalies.

  7. Perseveration causes automatization of checking behavior in obsessive-compulsive disorder.

    Science.gov (United States)

    Dek, Eliane C P; van den Hout, Marcel A; Engelhard, Iris M; Giele, Catharina L; Cath, Danielle C

    2015-08-01

    Repeated checking leads to reductions in meta-memory (i.e., memory confidence, vividness and detail), and automatization of checking behavior (Dek, van den Hout, Giele, & Engelhard, 2014, 2015). Dek et al. (2014) suggested that this is caused by increased familiarity with the checked stimuli. They predicted that defamiliarization of checking by modifying the perceptual characteristics of stimuli would cause de-automatization and attenuate the negative meta-memory effects of re-checking. However, their results were inconclusive. The present study investigated whether repeated checking leads to automatization of checking behavior, and if defamiliarization indeed leads to de-automatization and attenuation of meta-memory effects in patients with OCD and healthy controls. Participants performed a checking task, in which they activated, deactivated and checked threat-irrelevant stimuli. During a pre- and post-test checking trial, check duration was recorded and a reaction time task was simultaneously administered as dual-task to assess automatization. After the pre- and post-test checking trial, meta-memory was rated. Results showed that relevant checking led to automatization of checking behavior on the RT measure, and negative meta-memory effects for patients and controls. Defamiliarization led to de-automatization measured with the RT task, but did not attenuate the negative meta-memory effects of repeated checking. Clinical implications are discussed.

  8. Compositional and Quantitative Model Checking

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2010-01-01

    This paper gives a survey of a composition model checking methodology and its succesfull instantiation to the model checking of networks of finite-state, timed, hybrid and probabilistic systems with respect; to suitable quantitative versions of the modal mu-calculus [Koz82]. The method is based...

  9. Property Differencing for Incremental Checking

    Science.gov (United States)

    Yang, Guowei; Khurshid, Sarfraz; Person, Suzette; Rungta, Neha

    2014-01-01

    This paper introduces iProperty, a novel approach that facilitates incremental checking of programs based on a property di erencing technique. Speci cally, iProperty aims to reduce the cost of checking properties as they are initially developed and as they co-evolve with the program. The key novelty of iProperty is to compute the di erences between the new and old versions of expected properties to reduce the number and size of the properties that need to be checked during the initial development of the properties. Furthermore, property di erencing is used in synergy with program behavior di erencing techniques to optimize common regression scenarios, such as detecting regression errors or checking feature additions for conformance to new expected properties. Experimental results in the context of symbolic execution of Java programs annotated with properties written as assertions show the e ectiveness of iProperty in utilizing change information to enable more ecient checking.

  10. New methods of concurrent checking

    CERN Document Server

    Goessel, Michael; Sogomonyan, Egor; Marienfeld, Daniel

    2008-01-01

    Written by a team of two leading experts and two very successful young former PhD students, New Methods of Concurrent Checking describes new methods of concurrent checking, such as partial duplication, use of output dependencies, complementary circuits, self-dual parity, self-dual duplication and others. A special chapter demonstrates how the new general methods of concurrent checking can be more specifically applied to regular structures to obtain optimum results. This is exemplified for all types of adders up to 64 bits with a level of detail never before presented in the literature. The cle

  11. Model Checking Algorithms for CTMDPs

    DEFF Research Database (Denmark)

    Buchholz, Peter; Hahn, Ernst Moritz; Hermanns, Holger

    2011-01-01

    Continuous Stochastic Logic (CSL) can be interpreted over continuoustime Markov decision processes (CTMDPs) to specify quantitative properties of stochastic systems that allow some external control. Model checking CSL formulae over CTMDPs requires then the computation of optimal control strategie...

  12. Treasury Check Verification Query (TCVQ)

    Data.gov (United States)

    Social Security Administration — The TCVQ system determines the SSN of an individual whose check has been returned to a local field office. The FO is able to request this information via the TCVQ...

  13. Transaction management with integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide; Christiansen, Henning

    2005-01-01

    , which are difficult to maintain and error prone. Two important aspects must be taken care of. 1.~It is too time consuming to check integrity constraints from scratch after each update, so simplified checks before each update should be used relying on the assumption that the current state is consistent....... 2.~In concurrent database systems, besides the traditional correctness criterion, the execution schedule must ensure that the different transactions can overlap in time without destroying the consistency requirements tested by other, concurrent transactions....

  14. Coverage Metrics for Model Checking

    Science.gov (United States)

    Penix, John; Visser, Willem; Norvig, Peter (Technical Monitor)

    2001-01-01

    When using model checking to verify programs in practice, it is not usually possible to achieve complete coverage of the system. In this position paper we describe ongoing research within the Automated Software Engineering group at NASA Ames on the use of test coverage metrics to measure partial coverage and provide heuristic guidance for program model checking. We are specifically interested in applying and developing coverage metrics for concurrent programs that might be used to support certification of next generation avionics software.

  15. Automatization and familiarity in repeated checking

    NARCIS (Netherlands)

    Dek, Eliane C P; van den Hout, Marcel A.; Giele, Catharina L.; Engelhard, Iris M.

    2014-01-01

    Repeated checking paradoxically increases memory uncertainty. This study investigated the underlying mechanism of this effect. We hypothesized that as a result of repeated checking, familiarity with stimuli increases, and automatization of the checking procedure occurs, which should result in decrea

  16. Model Checking Linearizability via Refinement

    Science.gov (United States)

    Liu, Yang; Chen, Wei; Liu, Yanhong A.; Sun, Jun

    Linearizability is an important correctness criterion for implementations of concurrent objects. Automatic checking of linearizability is challenging because it requires checking that 1) all executions of concurrent operations be serializable, and 2) the serialized executions be correct with respect to the sequential semantics. This paper describes a new method to automatically check linearizability based on refinement relations from abstract specifications to concrete implementations. Our method avoids the often difficult task of determining linearization points in implementations, but can also take advantage of linearization points if they are given. The method exploits model checking of finite state systems specified as concurrent processes with shared variables. Partial order reduction is used to effectively reduce the search space. The approach is built into a toolset that supports a rich set of concurrent operators. The tool has been used to automatically check a variety of implementations of concurrent objects, including the first algorithms for the mailbox problem and scalable NonZero indicators. Our system was able to find all known and injected bugs in these implementations.

  17. Program Analysis as Model Checking

    DEFF Research Database (Denmark)

    Olesen, Mads Chr.

    and abstract interpretation. Model checking views the program as a finite automaton and tries to prove logical properties over the automaton model, or present a counter-example if not possible — with a focus on precision. Abstract interpretation translates the program semantics into abstract semantics...... problems as the other by a reformulation. This thesis argues that there is even a convergence on the practical level, and that a generalisation of the formalism of timed automata into lattice automata captures key aspects of both methods; indeed model checking timed automata can be formulated in terms...... of an abstract interpretation. For the generalisation to lattice automata to have benefit it is important that efficient tools exist. This thesis presents multi-core tools for efficient and scalable reachability and Büchi emptiness checking of timed/lattice automata. Finally, a number of case studies...

  18. Production mask composition checking flow

    Science.gov (United States)

    Ma, Shou-Yuan; Yang, Chuen-Huei; Tsai, Joe; Wang, Alice; Lin, Roger; Lee, Rachel; Deng, Erwin; Lin, Ling-Chieh; Liao, Hung-Yueh; Tsai, Jenny; Bowhill, Amanda; Vu, Hien; Russell, Gordon

    2016-05-01

    The mask composition checking flow is an evolution of the traditional mask rule check (MRC). In order to differentiate the flow from MRC, we call it Mask Data Correctness Check (MDCC). The mask house does MRC only to identify process limitations including writing, etching, metrology, etc. There still exist many potential errors that could occur when the frame, main circuit and dummies all together form a whole reticle. The MDCC flow combines the design rule check (DRC) and MRC concepts to adapt to the complex patterns in today's wafer production technologies. Although photomask data has unique characteristics, the MRC tool in Calibre® MDP can easily achieve mask composition by using the Extended MEBES job deck (EJB) format. In EJB format, we can customize the combination of any input layers in an IC design layout format, such as OASIS. Calibre MDP provides section-based processing for many standard verification rule format (SVRF) commands that support DRC-like checks on mask data. Integrating DRC-like checking with EJB for layer composition, we actually perform reticle-level DRC, which is the essence of MDCC. The flow also provides an early review environment before the photomask pattern files are available. Furthermore, to incorporate the MDCC in our production flow, runtime is one of the most important indexes we consider. When the MDCC is included in the tape-out flow, the runtime impact is very limited. Calibre, with its multi-threaded processes and good scalability, is the key to achieving acceptable runtime. In this paper, we present real case runtime data for 28nm and 14nm technology nodes, and prove the practicability of placing MDCC into mass production.

  19. Loess Plateau check dams can potentially sequester eroded soil organic carbon

    Science.gov (United States)

    Zhang, Haicheng; Liu, Shuguang; Yuan, Wenping; Dong, Wenjie; Xia, Jiangzhou; Cao, Yaojun; Jia, Yanwei

    2016-06-01

    Check dams are special soil and water conservation structures in the Loess Plateau, China. They play an important role in intercepting sediments and soil organic carbon (SOC). However, the decomposition of intercepted SOC and the environmental regulations at check dams have not been investigated. We conducted several paired field experiments at both check dams and slope lands in the Yanhe Watershed of the Loess Plateau to examine the characteristics of SOC decomposition at check dams. On average, the SOC mineralization rate in slope lands was approximately three times higher than in check dams. Increased soil moisture and compaction in check dams can constrain carbon mineralization by limiting the oxygen availability of SOC and can isolate substrate carbon from heterotrophic microorganisms. Our results indicate that check dams display a considerable potential for eroded SOC sequestration via reducing the soil respiration rate and highlight the important implications of lateral carbon redistribution and human engineering projects when estimating regional or global ecosystem carbon cycles.

  20. Model checking of component connectors

    NARCIS (Netherlands)

    Izadi, Mohammad

    2011-01-01

    We present a framework for automata theoretic model checking of coordination systems specified in Reo coordination language. To this goal, we introduce Buchi automata of records (BAR) and their augmented version (ABAR) as an operational modeling formalism that covers several intended forms of behavi

  1. Reducing Lookups for Invariant Checking

    DEFF Research Database (Denmark)

    Thomsen, Jakob Grauenkjær; Clausen, Christian; Andersen, Kristoffer Just;

    2013-01-01

    This paper helps reduce the cost of invariant checking in cases where access to data is expensive. Assume that a set of variables satisfy a given invariant and a request is received to update a subset of them. We reduce the set of variables to inspect, in order to verify that the invariant is sti...

  2. Direct Model Checking Matrix Algorithm

    Institute of Scientific and Technical Information of China (English)

    Zhi-Hong Tao; Hans Kleine Büning; Li-Fu Wang

    2006-01-01

    During the last decade, Model Checking has proven its efficacy and power in circuit design, network protocol analysis and bug hunting. Recent research on automatic verification has shown that no single model-checking technique has the edge over all others in all application areas. So, it is very difficult to determine which technique is the most suitable for a given model. It is thus sensible to apply different techniques to the same model. However, this is a very tedious and time-consuming task, for each algorithm uses its own description language. Applying Model Checking in software design and verification has been proved very difficult. Software architectures (SA) are engineering artifacts that provide high-level and abstract descriptions of complex software systems. In this paper a Direct Model Checking (DMC) method based on Kripke Structure and Matrix Algorithm is provided. Combined and integrated with domain specific software architecture description languages (ADLs), DMC can be used for computing consistency and other critical properties.

  3. 27 CFR 70.101 - Bad checks.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Bad checks. 70.101 Section....101 Bad checks. If any check or money order in payment of any amount receivable under Title 26 of the... appropriate TTB officer that such check was tendered in good faith and that such person had reasonable...

  4. 31 CFR 103.29 - Purchases of bank checks and drafts, cashier's checks, money orders and traveler's checks.

    Science.gov (United States)

    2010-07-01

    ... Regulations Relating to Money and Finance FINANCIAL RECORDKEEPING AND REPORTING OF CURRENCY AND FOREIGN..., cashier's check, money order or traveler's check for $3,000 or more in currency unless it maintains... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Purchases of bank checks and...

  5. Preventing the threat of credit-card fraud: Factors influencing cashiers' identification-checking behavior.

    Science.gov (United States)

    Downing, Christopher; Howard, E Henry; Goodwin, Christina; Geller, E Scott

    2016-01-01

    Two studies examined factors influencing cashiers' identification (ID)-checking behavior in order to inform the development of interventions to prevent credit-card fraud. In both studies, research assistants made credit purchases in various stores and noted the cashiers' ID-checking behavior. In the first study, the store type, whether the cashier swiped the credit/debit card, the amount of the purchase, and whether the credit/debit card was signed significantly influenced ID-checking behavior. In the second study, an A-B-A design was used to evaluate the impact of a "Check my ID" prompt placed on the credit/debit card. The prompt increased cashiers' ID-checking behavior from 5.9% at Baseline to 10.3% during the Intervention. When the prompt was removed, the cashiers' ID-checking behavior decreased to 7.2%. Implications for further intervention research to prevent credit-card fraud are discussed.

  6. 25 CFR 11.421 - Bad checks.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Bad checks. 11.421 Section 11.421 Indians BUREAU OF... Criminal Offenses § 11.421 Bad checks. (a) A person who issues or passes a check or similar sight order for..., and the issuer failed to make good within 10 days after receiving notice of that refusal....

  7. Timing analysis by model checking

    Science.gov (United States)

    Naydich, Dimitri; Guaspari, David

    2000-01-01

    The safety of modern avionics relies on high integrity software that can be verified to meet hard real-time requirements. The limits of verification technology therefore determine acceptable engineering practice. To simplify verification problems, safety-critical systems are commonly implemented under the severe constraints of a cyclic executive, which make design an expensive trial-and-error process highly intolerant of change. Important advances in analysis techniques, such as rate monotonic analysis (RMA), have provided a theoretical and practical basis for easing these onerous restrictions. But RMA and its kindred have two limitations: they apply only to verifying the requirement of schedulability (that tasks meet their deadlines) and they cannot be applied to many common programming paradigms. We address both these limitations by applying model checking, a technique with successful industrial applications in hardware design. Model checking algorithms analyze finite state machines, either by explicit state enumeration or by symbolic manipulation. Since quantitative timing properties involve a potentially unbounded state variable (a clock), our first problem is to construct a finite approximation that is conservative for the properties being analyzed-if the approximation satisfies the properties of interest, so does the infinite model. To reduce the potential for state space explosion we must further optimize this finite model. Experiments with some simple optimizations have yielded a hundred-fold efficiency improvement over published techniques.

  8. Compositional encoding for bounded model checking

    Institute of Scientific and Technical Information of China (English)

    Jun SUN; Yang LIU; Jin Song DONG; Jing SUN

    2008-01-01

    Verification techniques like SAT-based bounded model checking have been successfully applied to a variety of system models. Applying bounded model checking to compositional process algebras is, however, a highly non-trivial task. One challenge is that the number of system states for process algebra models is not statically known, whereas exploring the full state space is computa-tionally expensive. This paper presents a compositional encoding of hierarchical processes as SAT problems and then applies state-of-the-art SAT solvers for bounded model checking. The encoding avoids exploring the full state space for complex systems so as to deal with state space explosion. We developed an automated analyzer which combines complementing model checking tech-niques (I.e., bounded model checking and explicit on-the-fly model checking) to validate system models against event-based temporal properties. The experiment results show the analyzer handles large systems.

  9. Check valve slam analysis in pumping station

    Science.gov (United States)

    Himr, D.; Habán, V.; Dokoupil, P.

    2016-03-01

    Pumping station supplies water for technological process. The check valve in the station was replaced with a new one. The regular test of black out discovered the high pressure pulsations accompanied with noticeable pipeline movement of discharge pipe. It was caused by late check valve closing, probably, when the back flow reached the highest possible velocity. This statement was supported with analysis of results of pressure measurement near the check valve and with a numerical simulation of the flow in the pipeline system.

  10. Heteroscedasticity checks for regression models

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    For checking on heteroscedasticity in regression models, a unified approach is proposed to constructing test statistics in parametric and nonparametric regression models. For nonparametric regression, the test is not affected sensitively by the choice of smoothing parameters which are involved in estimation of the nonparametric regression function. The limiting null distribution of the test statistic remains the same in a wide range of the smoothing parameters. When the covariate is one-dimensional, the tests are, under some conditions, asymptotically distribution-free. In the high-dimensional cases, the validity of bootstrap approximations is investigated. It is shown that a variant of the wild bootstrap is consistent while the classical bootstrap is not in the general case, but is applicable if some extra assumption on conditional variance of the squared error is imposed. A simulation study is performed to provide evidence of how the tests work and compare with tests that have appeared in the literature. The approach may readily be extended to handle partial linear, and linear autoregressive models.

  11. Advanced microbial check valve development

    Science.gov (United States)

    Colombo, G. V.; Greenley, D. R.

    1980-01-01

    A flight certified assembly identified as a Microbial Check Valve (MCV) was developed and tested. The MCV is a canister packed with an iodinated anionic exchange resin. The device is used to destroy organisms in a water stream as the water passes through the device. The device is equally effective for fluid flow in either direction and its primary method of organism removal is killing rather than filtering. The MCV was successfully developed for the space shuttle to: disinfect fuel cell water; and prevent back contamination of the stored potable water supply. One version of the device consists of a high residual iodinated resin bed that imparts approximately 2 ppm of iodine to the fuel cell water as it flows to the potable water tanks. A second version of the device consists of a low residual iodinated resin bed. One of these low residual beds is located at each use port in the potable water system for the dual purpose of removing some iodine from the potable water as it is dispensed and also to prevent back contamination of the potable supply.

  12. 14 CFR 91.1093 - Initial and transition training and checking: Check pilots (aircraft), check pilots (simulator).

    Science.gov (United States)

    2010-01-01

    ... OPERATING RULES GENERAL OPERATING AND FLIGHT RULES Fractional Ownership Operations Program Management § 91... preceding 24 months, that person satisfactorily conducts a proficiency or competency check under the..., and emergency procedures to ensure competence to conduct the pilot flight checks required by...

  13. Heteroscedasticity checks for regression models

    Institute of Scientific and Technical Information of China (English)

    ZHU; Lixing

    2001-01-01

    [1]Carroll, R. J., Ruppert, D., Transformation and Weighting in Regression, New York: Chapman and Hall, 1988.[2]Cook, R. D., Weisberg, S., Diagnostics for heteroscedasticity in regression, Biometrika, 1988, 70: 1—10.[3]Davidian, M., Carroll, R. J., Variance function estimation, J. Amer. Statist. Assoc., 1987, 82: 1079—1091.[4]Bickel, P., Using residuals robustly I: Tests for heteroscedasticity, Ann. Statist., 1978, 6: 266—291.[5]Carroll, R. J., Ruppert, D., On robust tests for heteroscedasticity, Ann. Statist., 1981, 9: 205—209.[6]Eubank, R. L., Thomas, W., Detecting heteroscedasticity in nonparametric regression, J. Roy. Statist. Soc., Ser. B, 1993, 55: 145—155.[7]Diblasi, A., Bowman, A., Testing for constant variance in a linear model, Statist. and Probab. Letters, 1997, 33: 95—103.[8]Dette, H., Munk, A., Testing heteoscedasticity in nonparametric regression, J. R. Statist. Soc. B, 1998, 60: 693—708.[9]Müller, H. G., Zhao, P. L., On a semi-parametric variance function model and a test for heteroscedasticity, Ann. Statist., 1995, 23: 946—967.[10]Stute, W., Manteiga, G., Quindimil, M. P., Bootstrap approximations in model checks for regression, J. Amer. Statist. Asso., 1998, 93: 141—149.[11]Stute, W., Thies, G., Zhu, L. X., Model checks for regression: An innovation approach, Ann. Statist., 1998, 26: 1916—1939.[12]Shorack, G. R., Wellner, J. A., Empirical Processes with Applications to Statistics, New York: Wiley, 1986.[13]Efron, B., Bootstrap methods: Another look at the jackknife, Ann. Statist., 1979, 7: 1—26.[14]Wu, C. F. J., Jackknife, bootstrap and other re-sampling methods in regression analysis, Ann. Statist., 1986, 14: 1261—1295.[15]H rdle, W., Mammen, E., Comparing non-parametric versus parametric regression fits, Ann. Statist., 1993, 21: 1926—1947.[16]Liu, R. Y., Bootstrap procedures under some non-i.i.d. models, Ann. Statist., 1988, 16: 1696—1708.[17

  14. Tractor Mechanic Check Sheets for Modules.

    Science.gov (United States)

    Clemson Univ., SC. Vocational Education Media Center.

    Forms for student self-checks and the instructor's final checklist (student evaluation) are provided for use with thirty-three learning modules on maintaining and servicing fuel and electrical systems in tractor mechanics. The student self-check asks the students questions about their understanding of the modules' content. The instructor's…

  15. 32 CFR 635.6 - Name checks.

    Science.gov (United States)

    2010-07-01

    ... military police records may be released under the provisions of AR 340-21 to authorized personnel for valid... with AR 340-21. (b) Checks will be accomplished by a review of the COPS MPRS. Information will be... police reports filed worldwide. Authorized users of COPS MPRS can conduct name checks for...

  16. 7 CFR 58.243 - Checking quality.

    Science.gov (United States)

    2010-01-01

    ... Procedures § 58.243 Checking quality. All milk, milk products and dry milk products shall be subject to... aid to quality control in addition to the regular routine analysis made on the finished products. ... 7 Agriculture 3 2010-01-01 2010-01-01 false Checking quality. 58.243 Section 58.243...

  17. Automatization and familiarity in repeated checking

    NARCIS (Netherlands)

    Dek, E.C.P.|info:eu-repo/dai/nl/313959552; van den Hout, M.A.|info:eu-repo/dai/nl/070445354; Giele, C.L.|info:eu-repo/dai/nl/318754460; Engelhard, I.M.|info:eu-repo/dai/nl/239681533

    2015-01-01

    Repetitive, compulsive-like checking of an object leads to reductions in memory confidence, vividness, and detail. Experimental research suggests that this is caused by increased familiarity with perceptual characteristics of the stimulus and automatization of the checking procedure (Dek, van den Ho

  18. SPEED ROLLER STAND MEASUREMENT SYSTEM CHECKING TECHNIQUE

    OpenAIRE

    Zybtsev, Y.; I. Marmut

    2011-01-01

    The study has shown that the accuracy of brakes checking by inertial stands depends upon the applied methods of measurement of braking parameters (stand slowing down, braking distance, brakes triggering time, current speed) as well as the methods of metrological checking of measuring system canals.

  19. 14 CFR 91.1089 - Qualifications: Check pilots (aircraft) and check pilots (simulator).

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Qualifications: Check pilots (aircraft) and check pilots (simulator). 91.1089 Section 91.1089 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION... RULES Fractional Ownership Operations Program Management § 91.1089 Qualifications: Check...

  20. Enriched MU-Calculi Module Checking

    CERN Document Server

    Ferrante, Alessandro; Parente, Mimmo

    2008-01-01

    The model checking problem for open systems has been intensively studied in the literature, for both finite-state (module checking) and infinite-state (pushdown module checking) systems, with respect to Ctl and Ctl*. In this paper, we further investigate this problem with respect to the Mu-calculus enriched with nominals and graded modalities (hybrid graded Mu-calculus), in both the finite-state and infinite-state settings. Using an automata-theoretic approach, we show that hybrid graded Mu-calculus module checking is solvable in exponential time, while hybrid graded Mu-calculus pushdown module checking is solvable in double-exponential time. These results are also tight since they match the known lower bounds for Ctl. We also investigate the module checking problem with respect to the hybrid graded Mu-calculus enriched with inverse programs (Fully enriched Mu-calculus): by showing a reduction from the domino problem, we show its undecidability. We conclude with a short overview of the model checking problem ...

  1. QuickChecking Static Analysis Properties

    DEFF Research Database (Denmark)

    Midtgaard, Jan; Møller, Anders

    2015-01-01

    , to verified fixed point checking. In this paper we demonstrate how quickchecking can be useful for testing a range of static analysis properties with limited effort. We show how to check a range of algebraic lattice properties, to help ensure that an implementation follows the formal specification...... of a lattice. Moreover, we offer a number of generic, type-safe combinators to check transfer functions and operators on lattices, to help ensure that these are, e.g., monotone, strict, or invariant. We substantiate our claims by quickchecking a type analysis for the Lua programming language...

  2. Notification: Purchase Card and Convenience Check Audit

    Science.gov (United States)

    Project #OA-FY13-0116, April 11, 2013. The U.S. Environmental Protection Agency, Office of Inspector General, is beginning the fieldwork phase of its audit of the agency’s purchase card and convenience check programs.

  3. Check List: Are You a Gifted Principal?

    Science.gov (United States)

    Taylor, Vicki L.

    1984-01-01

    An 18-item check list is provided for principals to evaluate themselves relative to encouraging gifts and talents of their most able students. Suggestions are given in the areas of educational needs, specialized materials, and counseling. (MC)

  4. A Check List for the Reading Teacher.

    Science.gov (United States)

    Gemake, Josephine S.

    1979-01-01

    Presents a check list created by teachers to be used as an evaluation instrument in observations of reading laboratories in the New York City area. Reflects their ideas about the essential components of a remedial reading program. (FL)

  5. CMM Interim Check Design of Experiments (U)

    Energy Technology Data Exchange (ETDEWEB)

    Montano, Joshua Daniel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-07-29

    Coordinate Measuring Machines (CMM) are widely used in industry, throughout the Nuclear Weapons Complex and at Los Alamos National Laboratory (LANL) to verify part conformance to design definition. Calibration cycles for CMMs at LANL are predominantly one year in length and include a weekly interim check to reduce risk. The CMM interim check makes use of Renishaw’s Machine Checking Gauge which is an off-the-shelf product simulates a large sphere within a CMM’s measurement volume and allows for error estimation. As verification on the interim check process a design of experiments investigation was proposed to test a couple of key factors (location and inspector). The results from the two-factor factorial experiment proved that location influenced results more than the inspector or interaction.

  6. Computational fact checking from knowledge networks

    CERN Document Server

    Ciampaglia, Giovanni Luca; Rocha, Luis M; Bollen, Johan; Menczer, Filippo; Flammini, Alessandro

    2015-01-01

    Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation...

  7. Automated quality checks on repeat prescribing.

    OpenAIRE

    Rogers, Jeremy E; Wroe, Christopher J; Roberts, Angus; Swallow, Angela; Stables, David; Cantrill, Judith A; Rector, Alan L.

    2003-01-01

    BACKGROUND: Good clinical practice in primary care includes periodic review of repeat prescriptions. Markers of prescriptions that may need review have been described, but manually checking all repeat prescriptions against the markers would be impractical. AIM: To investigate the feasibility of computerising the application of repeat prescribing quality checks to electronic patient records in United Kingdom (UK) primary care. DESIGN OF STUDY: Software performance test against benchmark manual...

  8. Semantic Importance Sampling for Statistical Model Checking

    Science.gov (United States)

    2015-01-16

    approach called Statistical Model Checking (SMC) [16], which relies on Monte - Carlo -based simulations to solve this verification task more scalably...Conclusion Statistical model checking (SMC) is a prominent approach for rigorous analysis of stochastic systems using Monte - Carlo simulations. In this... Monte - Carlo simulations, for computing the bounded probability that a specific event occurs during a stochastic system’s execution. Estimating the

  9. Features of compulsive checking behavior mediated by nucleus accumbens and orbital frontal cortex.

    Science.gov (United States)

    Dvorkin, Anna; Silva, Charmaine; McMurran, Thomas; Bisnaire, Liane; Foster, Jane; Szechtman, Henry

    2010-11-01

    The quinpirole sensitization model of obsessive-compulsive disorder was used to investigate the functional role that brain regions implicated in a neuroanatomical circuit of obsessive-compulsive disorder may play in compulsive checking behavior. Following repeated injections of saline or quinpirole (0.5mg/kg, twice per week, ×8 injections) to induce compulsive checking, rats received N-methyl-d-aspartate lesions of the nucleus accumbens core (NAc), orbital frontal cortex (OFC) and basolateral amygdala, or sham lesions. When retested at 17days post-surgery, the results showed effects of NAc and OFC but not basolateral amygdala lesion. NAc lesions affected measures indicative of the amount of checking behavior, whereas OFC lesions affected indices of staying away from checking. The pattern of results suggested that the functional roles of the NAc and OFC in checking behavior are to control the vigor of motor performance and focus on goal-directed activity, respectively. Furthermore, similarities in behavior between quinpirole sham rats and saline NAc lesion rats suggested that quinpirole may drive the vigor of checking by inhibition of NAc neurons, and that the NAc may be a site for the negative feedback control of checking.

  10. Moderate-Density Parity-Check Codes

    CERN Document Server

    Ouzan, Samuel

    2009-01-01

    We propose a new type of short to moderate block-length, linear error-correcting codes, called moderate-density parity-check (MDPC) codes. The number of ones of the parity-check matrix of the codes presented is typically higher than the number of ones of the parity-check matrix of low-density parity-check (LDPC) codes. But, still lower than those of the parity-check matrix of classical block codes. The proposed MDPC codes are cyclic and are designed by constructing idempotents using cyclotomic cosets. The construction is simple and allows finding short block-length, high-rate codes with good minimum distance. Inspired by some recent iterative soft-input soft-output (SISO) decoders used in a context of classical block codes, we propose a low complexity, efficient, iterative decoder called Auto-Diversity (AD) decoder. AD decoder is based on belief propagation (BP) decoder and takes advantage of the fundamental property of automorphism group of the constructed cyclic code.

  11. A PSL Bounded Model Checking Method

    Institute of Scientific and Technical Information of China (English)

    YU Lei; ZHAO Zongtao

    2012-01-01

    SAT-based bounded model checking (BMC) is introduced as an important complementary technique to OBDD-based symbolic model checking, and is an efficient verification method for parallel and reactive systems. However, until now the properties verified by bounded model checking are very finite. Temporal logic PSL is a property specification language (IEEE-1850) describing parallel systems and is divided into two parts, i.e. the linear time logic FL and the branch time logic OBE. In this paper, the specification checked by BMC is extended to PSL and its algorithm is also proposed. Firstly, define the bounded semantics of PSL, and then reduce the bounded semantics into SAT by translating PSL specification formula and the state transition relation of the system to the propositional formula A and B, respectively. Finally, verify the satisfiability of the conjunction propositional formula of A and B. The algorithm results in the translation of the existential model checking of the temporal logic PSL into the satisfiability problem of propositional formula. An example of a queue controlling circuit is used to interpret detailedly the executing procedure of the algorithm.

  12. Glovebox pressure relief and check valve

    Energy Technology Data Exchange (ETDEWEB)

    Blaedel, K.L.

    1986-03-17

    This device is a combined pressure relief valve and check valve providing overpressure protection and preventing back flow into an inert atmosphere enclosure. The pressure relief is embodied by a submerged vent line in a mercury reservior, the releif pressure being a function of the submerged depth. The pressure relief can be vented into an exhaust system and the relieving pressure is only slightly influenced by the varying pressure in the exhaust system. The check valve is embodied by a ball which floats on the mercury column and contacts a seat whenever vacuum exists within the glovebox enclosure. Alternatively, the check valve is embodied by a vertical column of mercury, the maximum back pressure being a function of the height of the column of mercury.

  13. HCH for Checking Containment of XPath Fragment

    Institute of Scientific and Technical Information of China (English)

    Jian-Hua Feng; Yu-Guo Liao; Yong Zhang

    2007-01-01

    XPath is ubiquitous in XML applications for navigating XML trees and selecting a set of element nodes. In XPath query processing, one of the most important issues is how to efficiently check containment relationship between two XPath expressions. To get out of the intricacy and complexity caused by numerous XPath features, we investigate this issue on a frequently used fragment of XPath expressions that consists of node tests, the child axis (/), the descendant axis (//), branches ([]) and label wildcards (*). Prior work has shown that homomorphism technology can be used for containment checking. However, homomorphism is the sufficient but not necessary condition for containment. For special classes of this fragment, the homomorphism algorithm returns false negatives. To address this problem, this paper proposes two containment techniques, conditioned homomorphism and hidden conditioned homomorphism, and then presents sound algorithms for checking containment. Experimental results confirm the practicability and efficiency of the proposed algorithms.

  14. Checking Timed Automata for Linear Duration Properties

    Institute of Scientific and Technical Information of China (English)

    赵建华

    2000-01-01

    It is proved in this paper that checking a timed automaton M with respect to a linear duration property D can be done by investigating only the integral timed states of M. An equivalence relation is introduced in this paper to divide the infinite number of integral timed states into finite number of equivalence classes. Based on this, a method is proposed for checking whether M satisfies D. In some cases, the number of equivalence classes is too large for a computer to manipulate. A technique for reducing the search-space for checking linear duration property is also described. This technique is more suitable for the case in this paper than those in the literature because most of those techniques are designed for reachability analysis.

  15. Graded CTL Model Checking for Test Generation

    CERN Document Server

    Napoli, Margherita

    2011-01-01

    Recently there has been a great attention from the scientific community towards the use of the model-checking technique as a tool for test generation in the simulation field. This paper aims to provide a useful mean to get more insights along these lines. By applying recent results in the field of graded temporal logics, we present a new efficient model-checking algorithm for Hierarchical Finite State Machines (HSM), a well established symbolism long and widely used for representing hierarchical models of discrete systems. Performing model-checking against specifications expressed using graded temporal logics has the peculiarity of returning more counterexamples within a unique run. We think that this can greatly improve the efficacy of automatically getting test cases. In particular we verify two different models of HSM against branching time temporal properties.

  16. The Effects of Check-In/Check-Out on Kindergarten Students in an Urban Setting

    Science.gov (United States)

    Sobalvarro, Adriana; Graves, Scott L., Jr.; Hughes, Tammy

    2016-01-01

    The purpose of this project was to investigate the effectiveness of Check-in/Check-out (CICO), a targeted behavioral intervention, on reducing the problem behaviors of kindergarten students in an urban setting. Participants were referred by their teacher for exhibiting disruptive classroom behaviors, which resulted in classroom removal. Results…

  17. Check In / Check Out. The Public Space as an Internet of Things

    NARCIS (Netherlands)

    van t Hof, C.C.G.; van Est, R.; Daemen, F.

    2011-01-01

    Mobile phones, public transport smart cards, security cameras and GPS systems in our car - we are surrounded by digital devices. They track us, guide us, help us, and control us. The book Check In / Check Out. The Public Space as an Internet of Things shows us how our digital and physical worlds are

  18. Adaptable Assertion Checking for Scientific Software Components

    Energy Technology Data Exchange (ETDEWEB)

    Dahlgren, T L; Devanbu, P T

    2004-03-12

    We present a proposal for lowering the overhead of interface contract checking for science and engineering applications. Run-time enforcement of assertions is a well-known technique for improving the quality of software; however, the performance penalty is often too high for their retention during deployment, especially for long-running applications that depend upon iterative operations. With an efficient adaptive approach the benefits of run-time checking can continue to accrue with minimal overhead. Examples from scientific software interfaces being developed in the high performance computing research community will be used to measure the efficiency and effectiveness of this approach.

  19. A Method for Model Checking Feature Interactions

    DEFF Research Database (Denmark)

    Pedersen, Thomas; Le Guilly, Thibaut; Ravn, Anders Peter;

    2015-01-01

    This paper presents a method to check for feature interactions in a system assembled from independently developed concurrent processes as found in many reactive systems. The method combines and refines existing definitions and adds a set of activities. The activities describe how to populate the ...... the definitions with models to ensure that all interactions are captured. The method is illustrated on a home automation example with model checking as analysis tool. In particular, the modelling formalism is timed automata and the analysis uses UPPAAL to find interactions....

  20. Consistency Checking of Web Service Contracts

    DEFF Research Database (Denmark)

    Cambronero, M. Emilia; Okika, Joseph C.; Ravn, Anders Peter

    2008-01-01

    Behavioural properties are analyzed for web service contracts formulated in Business Process Execution Language (BPEL) and Choreography Description Language (CDL). The key result reported is an automated technique to check consistency between protocol aspects of the contracts. The contracts...... are abstracted to (timed) automata and from there a simulation is set up, which is checked using automated tools for analyzing networks of finite state processes. Here we use the Concurrency Work Bench. The proposed techniques are illustrated with a case study that include otherwise difficult to analyze fault...

  1. Model checking Quasi Birth Death processes

    NARCIS (Netherlands)

    Remke, A.K.I.

    2004-01-01

    Quasi-Birth Death processes (QBDs) are a special class of infinite state CTMCs that combines a large degree of modeling expressiveness with efficient solution methods. This work adapts the well-known stochastic logic CSL for use on QBDs as CSL and presents model checking algorithms for so-called lev

  2. Check list of European Hymenomycetous Heterobasidiae

    NARCIS (Netherlands)

    Donk, M.A.

    1966-01-01

    With this check list an attempt is made to account for the recorded European species of those Basidiomycetes that Patouillard called the “Hétérobasidies”, excluding, however, the Uredinales and Ustilaginales. Therefore, it covers the Septobasidiales, Tremellales (comprising the Auriculariineae and T

  3. Photogrammetric approach to automated checking of DTMs

    DEFF Research Database (Denmark)

    Potucková, Marketa

    2005-01-01

    approach to automated checking and improving of DTMs is evaluated. Corresponding points in two overlapping orthoimages are found by means of area based matching. Provided the image orientation is correct, discovered displacements correspond to DTM errors. Improvements of the method regarding its...

  4. Model Checking Software Systems: A Case Study.

    Science.gov (United States)

    1995-03-10

    gained. We suggest a radically different tack: model checking. The two formal objects compared are a finite state machine model of the software...simply terminates. 3.1.1. State Machine Model Let’s consider a simplified model with just one client, one server, and one file. The top graph

  5. Anchor Stress Checking of Security Injection Tank

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    The intention of the calculating is to check the anchor stresses of the security injection tank to know whether the stress is satisfied the code requirements on the basis of all the reaction forces gained in the static, seismic and thermal stress results.

  6. 25 CFR 141.19 - Check cashing.

    Science.gov (United States)

    2010-04-01

    ... INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES BUSINESS PRACTICES ON THE NAVAJO, HOPI AND ZUNI RESERVATIONS General Business Practices § 141.19 Check cashing. (a) A reservation business... order. A reservation business may not give scrip, credit or other substitute for U.S. currency...

  7. Model Checking as Static Analysis: Revisited

    DEFF Research Database (Denmark)

    Zhang, Fuyuan; Nielson, Flemming; Nielson, Hanne Riis

    2012-01-01

    We show that the model checking problem of the μ-calculus can be viewed as an instance of static analysis. We propose Succinct Fixed Point Logic (SFP) within our logical approach to static analysis as an extension of Alternation-free Least Fixed Logic (ALFP). We generalize the notion...

  8. Posterior Predictive Model Checking in Bayesian Networks

    Science.gov (United States)

    Crawford, Aaron

    2014-01-01

    This simulation study compared the utility of various discrepancy measures within a posterior predictive model checking (PPMC) framework for detecting different types of data-model misfit in multidimensional Bayesian network (BN) models. The investigated conditions were motivated by an applied research program utilizing an operational complex…

  9. Efficient CSL Model Checking Using Stratification

    DEFF Research Database (Denmark)

    Zhang, Lijun; Jansen, David N.; Nielson, Flemming;

    2012-01-01

    For continuous-time Markov chains, the model-checking problem with respect to continuous-time stochastic logic (CSL) has been introduced and shown to be decidable by Aziz, Sanwal, Singhal and Brayton in 1996 [ 1, 2]. Their proof can be turned into an approximation algorithm with worse than expone...

  10. Automata-Based CSL Model Checking

    DEFF Research Database (Denmark)

    Zhang, Lijun; Jansen, David N.; Nielson, Flemming;

    2011-01-01

    For continuous-time Markov chains, the model-checking problem with respect to continuous-time stochastic logic (CSL) has been introduced and shown to be decidable by Aziz, Sanwal, Singhal and Brayton in 1996. The presented decision procedure, however, has exponential complexity. In this paper, we...

  11. Statistical Model Checking for Biological Systems

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel

    2014-01-01

    Statistical Model Checking (SMC) is a highly scalable simulation-based verification approach for testing and estimating the probability that a stochastic system satisfies a given linear temporal property. The technique has been applied to (discrete and continuous time) Markov chains, stochastic t...

  12. Incremental Integrity Checking: Limitations and Possibilities

    DEFF Research Database (Denmark)

    Christiansen, Henning; Martinenghi, Davide

    2005-01-01

    to query containment, we show that no procedure exists that always returns the best incremental test (aka simplification of integrity constraints), and this according to any reasonable criterion measuring the checking effort. In spite of this theoretical limitation, we develop an effective procedure...

  13. Inkjet 3D printed check microvalve

    Science.gov (United States)

    Walczak, Rafał; Adamski, Krzysztof; Lizanets, Danylo

    2017-04-01

    3D printing enables fast and relatively easy fabrication of various microfluidic structures including microvalves. A check microvalve is the simplest valve enabling control of the fluid flow in microchannels. Proper operation of the check valve is ensured by a movable element that tightens the valve seat during backward flow and enables free flow for forward pressure. Thus, knowledge of the mechanical properties of the movable element is crucial for optimal design and operation of the valve. In this paper, we present for the first time the results of investigations on basic mechanical properties of the building material used in multijet 3D printing. Specified mechanical properties were used in the design and fabrication of two types of check microvalve—with deflecting or hinge-fixed microflap—with 200 µm and 300 µm thickness. Results of numerical simulation and experimental data of the microflap deflection were obtained and compared. The valves were successfully 3D printed and characterised. Opening/closing characteristics of the microvalve for forward and backward pressures were determined. Thus, proper operation of the check microvalve so developed was confirmed.

  14. Software Model Checking for Verifying Distributed Algorithms

    Science.gov (United States)

    2014-10-28

    Verification procedure is an intelligent exhaustive search of the state space of the design Model Checking 6 Verifying Synchronous Distributed App...Distributed App Sagar Chaki, June 11, 2014 © 2014 Carnegie Mellon University Tool Usage Project webpage (http://mcda.googlecode.com) • Tutorial

  15. Type checking with open type functions

    DEFF Research Database (Denmark)

    Schrijvers, Tom; Jones, Simon Peyton; Chakravarty, Manual

    2008-01-01

    We report on an extension of Haskell with open type-level functions and equality constraints that unifies earlier work on GADTs, functional dependencies, and associated types. The contribution of the paper is that we identify and characterise the key technical challenge of entailment checking; an...

  16. Statistical Model Checking for Stochastic Hybrid Systems

    DEFF Research Database (Denmark)

    David, Alexandre; Du, Dehui; Larsen, Kim Guldstrand

    2012-01-01

    This paper presents novel extensions and applications of the UPPAAL-SMC model checker. The extensions allow for statistical model checking of stochastic hybrid systems. We show how our race-based stochastic semantics extends to networks of hybrid systems, and indicate the integration technique ap...

  17. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    Romijn, J.M.T.

    1999-01-01

    The HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the tools Spin a

  18. 14 CFR 121.315 - Cockpit check procedure.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Cockpit check procedure. 121.315 Section... Cockpit check procedure. (a) Each certificate holder shall provide an approved cockpit check procedure for... for items to be checked. (c) The approved procedures must be readily usable in the cockpit of...

  19. The Dynamic Checking of Complex Real Time System

    Institute of Scientific and Technical Information of China (English)

    YU Chao; HUANG Benwen; WU Guoqing

    2006-01-01

    The paper presents an dynamic execution model of complex real-time software based on requirement description model RTRSM, and then propose a checking method based on configuration covering and its corresponding algorithm. This checking method can check the execution situations between parallel elements in a dynamic execution step of real-time software systems. It also can check all the states and transitions which assure the completeness of checking. In the end, related theorem is proofed.

  20. 32 CFR Attachment A to Subpart B... - Standard A-National Agency Check With Local Agency Checks and Credit Check (NACLC)

    Science.gov (United States)

    2010-07-01

    ... Access Programs by sect. 4.4 of Executive Order 12958) (60 FR 19825, 3 CFR 1995 Comp., p. 333); (2) “L... Agency Checks and Credit Check (NACLC) A Attachment A to Subpart B of Part 147 National Defense..., Subpt. B, Att. A Attachment A to Subpart B of Part 147—Standard A—National Agency Check With...

  1. Clamp force and alignment checking device

    Energy Technology Data Exchange (ETDEWEB)

    Spicer, John Patrick; Cai, Wayne W.; Chakraborty, Debejyo; Mink, Keith

    2017-04-11

    A check fixture measures a total clamp force applied by a welder device. The welder device includes a welding horn having a plurality of weld pads and welding anvil having a plurality of weld pads. The check fixture includes a base member operatively supporting a plurality of force sensors. The base member and the force sensors are received between the weld pads of the welding horn and the anvil pads of the welding anvil. Each force sensor is configured to measure an individual clamp force applied thereto by corresponding weld and anvil pads when the base member is received between the welding horn and the welding anvil and the welder device is in the clamped position. The individual clamp forces are used to determine whether the weld and/or anvil pads are worn or misaligned.

  2. Model Checking with Probabilistic Tabled Logic Programming

    CERN Document Server

    Gorlin, Andrey; Smolka, Scott A

    2012-01-01

    We present a formulation of the problem of probabilistic model checking as one of query evaluation over probabilistic logic programs. To the best of our knowledge, our formulation is the first of its kind, and it covers a rich class of probabilistic models and probabilistic temporal logics. The inference algorithms of existing probabilistic logic-programming systems are well defined only for queries with a finite number of explanations. This restriction prohibits the encoding of probabilistic model checkers, where explanations correspond to executions of the system being model checked. To overcome this restriction, we propose a more general inference algorithm that uses finite generative structures (similar to automata) to represent families of explanations. The inference algorithm computes the probability of a possibly infinite set of explanations directly from the finite generative structure. We have implemented our inference algorithm in XSB Prolog, and use this implementation to encode probabilistic model...

  3. Model Checking the Remote Agent Planner

    Science.gov (United States)

    Khatib, Lina; Muscettola, Nicola; Havelund, Klaus; Norvig, Peter (Technical Monitor)

    2001-01-01

    This work tackles the problem of using Model Checking for the purpose of verifying the HSTS (Scheduling Testbed System) planning system. HSTS is the planner and scheduler of the remote agent autonomous control system deployed in Deep Space One (DS1). Model Checking allows for the verification of domain models as well as planning entries. We have chosen the real-time model checker UPPAAL for this work. We start by motivating our work in the introduction. Then we give a brief description of HSTS and UPPAAL. After that, we give a sketch for the mapping of HSTS models into UPPAAL and we present samples of plan model properties one may want to verify.

  4. Speed checks on the CERN site

    CERN Multimedia

    2007-01-01

    In view of the significant number of speeding incidents that have been reported, CERN will shortly start to carry out speed checks on the site. The radar used for this purpose will show drivers the speed measured. The disciplinary measures taken against those exceeding the authorised limit (generally 50 k.p.h.) will include a ban from driving on the site for a minimum of one month. Maximilian Metzger
Secretary-General

  5. A Reality Check on a Cyber Force

    Science.gov (United States)

    2016-07-01

    policy and global affairs at the Air Force Re- search Institute. His research interests include the intersection of cyberspace and global security. He...holds PhD and MS degrees in global affairs from Rutgers University and an ALB degree in philosophy from Harvard University. A Reality Check on a Cyber...mili- tary strategy and doctrine as an operational domain in which to orga- nize, train, and equip forces to ensure it has the necessary capabilities

  6. Water system microbial check valve development

    Science.gov (United States)

    Colombo, G. V.; Greenley, D. R.; Putnam, D. F.

    1978-01-01

    A residual iodine microbial check valve (RIMCV) assembly was developed and tested. The assembly is designed to be used in the space shuttle potable water system. The RIMCV is based on an anion exchange resin that is supersaturated with an iodine solution. This system causes a residual to be present in the effluent water which provides continuing bactericidal action. A flight prototype design was finalized and five units were manufactured and delivered.

  7. Model checking the HAVi leader election protocol

    OpenAIRE

    Romijn, J.M.T.

    1999-01-01

    The HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the tools Spin and Xtl (from the Caesar/Aldebaran package). It turns out that the protocol does not meet some safety properties and that there are situations in which the protocol may never converge to designate a l...

  8. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  9. A Little Training Helps Couples Ease into Skin Cancer Checks

    Science.gov (United States)

    ... html A Little Training Helps Couples Ease Into Skin Cancer Checks Study finds the potentially life-saving routine ... 14, 2016 WEDNESDAY, Dec. 14, 2016 (HealthDay News) -- Skin cancer checks between couples don't have to be ...

  10. Checking MSC Specifications for Timing Inconsistency

    Institute of Scientific and Technical Information of China (English)

    LI Xuandong(李宣东); TAN Wenkai(谭文凯); ZHENG Guoliang(郑国梁)

    2002-01-01

    Message sequence chart (MSC) is a graphical and textual language for the description and specification of the interactions between system components. MSC specifica tions allow convenient expression of multiple scenarios, and offer an intuitive and visual way of describing design requirements. Like any other aspect of the specification and design process, MSCs are amenable to errors, and their analysis is important. In this paper, the verification problem of MSC specification for timing inconsistency is studied, which means that no execu tion scenario described by an MSC specification is timing consistent. An algorithm is developed to check MSC specifications for timing inconsistency.

  11. Political and judicial checks on corruption

    DEFF Research Database (Denmark)

    Alt, James E.; Lassen, David Dreyer

    2008-01-01

    This paper investigates the effects of checks and balances on corruption. Within a presidential system, effective separation of powers is achieved under a divided government, with the executive and legislative branches being controlled by different political parties. When government is unified......, no effective separation exists even within a presidential system, but, we argue, can be partially restored by having an accountable judiciary. Our empirical findings show that a divided government and elected, rather than appointed, state supreme court judges are associated with lower corruption and...

  12. Outage maintenance checks on large generator windings

    Energy Technology Data Exchange (ETDEWEB)

    Nindra, B.; Jeney, S.I.; Slobodinsky, Y. [National Electric Coil, Columbus, OH (United States)

    1995-12-31

    In the present days of austerity, more constraints and pressures are being brought on the maintenance engineers to certify the generators for their reliability and life extension. The outages are shorter and intervals between the outages are becoming longer. The annual outages were very common when utilities had no regulatory constraints and also had standby capacities. Furthermore, due to lean and mean budgets, outage maintenance programs are being pursued more aggressively, so that longer interval outages can be achieved to ensure peak generator performance. This paper will discuss various visual checks, electrical tests and recommended fixes to achieve the above mentioned objectives, in case any deficiencies are found.

  13. Found Poems, Member Checking and Crises of Representation

    Science.gov (United States)

    Reilly, Rosemary C.

    2013-01-01

    In order to establish veracity, qualitative researchers frequently rely on member checks to insure credibility by giving participants opportunities to correct errors, challenge interpretations and assess results; however, member checks are not without drawbacks. This paper describes an innovative approach to conducting member checks. Six members…

  14. 30 CFR 77.309 - Visual check of system equipment.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Visual check of system equipment. 77.309... COAL MINES Thermal Dryers § 77.309 Visual check of system equipment. Frequent visual checks shall be made by the operator of the thermal dryer system control station, or by some other competent person,...

  15. Preventive Maintenance Checks and Services (PMCS). Do We Check Too Much and Maintain Too Little

    Science.gov (United States)

    1990-03-26

    They were similar to the trucks and tractors that many soldiers had back home on the farms . Since the U.S. was predominantly a rural society then, the...of an item requiring before-operation checks would render the :t m - iot mission-capable. Currently there are over 200 PMCS checks on the new Abrams...ensure that we are maintaining our vehicles in a go-to-war condition and that we are doing it the smart way. Our system requires significant changes

  16. Model-Based Trace-Checking

    CERN Document Server

    Howard, Y; Gravell, A; Ferreira, C; Augusto, J C

    2011-01-01

    Trace analysis can be a useful way to discover problems in a program under test. Rather than writing a special purpose trace analysis tool, this paper proposes that traces can usefully be analysed by checking them against a formal model using a standard model-checker or else an animator for executable specifications. These techniques are illustrated using a Travel Agent case study implemented in J2EE. We added trace beans to this code that write trace information to a database. The traces are then extracted and converted into a form suitable for analysis by Spin, a popular model-checker, and Pro-B, a model-checker and animator for the B notation. This illustrates the technique, and also the fact that such a system can have a variety of models, in different notations, that capture different features. These experiments have demonstrated that model-based trace-checking is feasible. Future work is focussed on scaling up the approach to larger systems by increasing the level of automation.

  17. Model Checking of Boolean Process Models

    CERN Document Server

    Schneider, Christoph

    2011-01-01

    In the field of Business Process Management formal models for the control flow of business processes have been designed since more than 15 years. Which methods are best suited to verify the bulk of these models? The first step is to select a formal language which fixes the semantics of the models. We adopt the language of Boolean systems as reference language for Boolean process models. Boolean systems form a simple subclass of coloured Petri nets. Their characteristics are low tokens to model explicitly states with a subsequent skipping of activations and arbitrary logical rules of type AND, XOR, OR etc. to model the split and join of the control flow. We apply model checking as a verification method for the safeness and liveness of Boolean systems. Model checking of Boolean systems uses the elementary theory of propositional logic, no modal operators are needed. Our verification builds on a finite complete prefix of a certain T-system attached to the Boolean system. It splits the processes of the Boolean sy...

  18. Model Checking over Paraconsistent Temporal Logic

    Institute of Scientific and Technical Information of China (English)

    CHEN Dong-huo; WANG Lin-zhang; CUI Jia-lin

    2008-01-01

    Classical logic cannot be used to effectively reason about concurrent systems with inconsistencies (inconsistencies often occur, especially in the early stage of the development, when large and complex concurrent systems are developed). In this paper, we propose the use of a guasi-classical temporal logic (QCTL) for supporting the verification of temporal properties of such systems even where the consistent model is not available. Our models are paraKripke structures ( extended standard Kripke structures), in which both a formula and its negation are satisfied in a same state, and properties to be verified are expressed by QCTL with paraKripke structures semantics. We introduce a novel notion of paraKripke models, which grasps the paraconsistent character of the entailment relation of QCTL. Furthermore, we explore the methodology of model checking over QCTL, and describe the detailed algorithm of implementing QCTL model checker. In the sequel, a simple example is presented, showing how to exploit the proposed model checking technique to verify the temporal properties of inconsistent concurrent systems.

  19. Requirements Specifications Checking of Embedded Real-Time Software

    Institute of Scientific and Technical Information of China (English)

    WU Guoqing(毋国庆); SHU Fengdi(舒风笛); WANG Min(王敏); CHEN Weiqing(陈伟清)

    2002-01-01

    After introducing the overview of our requirements description model HRFSM,the paper presents a dynamic software execution model (DERTS) of embedded real-time software, which can integrate control flow, data flow and time. Based on DERTS, a checking method is also presented. It consists of three kinds of checking and can check the consistency and completeness of the requirement specifications of embedded real-time software. Besides providing information helpful to improve the efficiency of analyzing and checking specifications,the checking method is flexible, and easy to understand and to use for the analyst.

  20. Improved Integrity Constraints Checking in Distributed Databases by Exploiting Local Checking

    Institute of Scientific and Technical Information of China (English)

    Ali A.Alwan; Hamidah Ibrahim; Nur Izura Udzir

    2009-01-01

    Most of the previous studies concerning checking the integrity constraints in distributed database derive simplified forms of the initial integrity constraints with the sufficiency property, since the sufficient test is known to be cheaper than the complete test and its initial integrity constraint as it involves less data to be transferred across the network and can always be evaluated at the target site (single site). Their studies are limited as they depend strictly on the assumption that an update operation will be executed at a site where the relation specified in the update operation is located, which is not always true. Hence, the sufficient test, which is proven to be local test by previous study, is no longer appropriate. This paper proposes an approach to checking integrity constraints in a distributed database by utilizing as much as possible the local information stored at the target site. The proposed approach derives support tests as an alternative to the existing complete and sufficient tests proposed by previous researchers with the intention to increase the number of local checking regardless the location of the submitted update operation. Several analyses have been performed to evaluate the proposed approach, and the results show that support tests can benefit the distributed database, where local constraint checking can be achieved.

  1. Body checking and avoidance in ethnically diverse female college students.

    Science.gov (United States)

    White, Emily K; Warren, Cortney S

    2013-09-01

    Although body checking and avoidance behaviors are common in women with eating disorders, minimal research has examined the nature or correlates of these behaviors in ethnically diverse female college students without eating disorders. Self-identified European American (n=268), Asian American (n=163), Latina (n=146), and African American (n=73) women completed self-report measures of body checking and avoidance, thin-ideal internalization, eating pathology, and clinical impairment. Results indicated that European and Asian American women reported significantly more body checking and avoidance than African American and Latina women. Generally, correlates of body checking and avoidance were consistent across ethnic groups: Regression analyses indicated that type of ethnicity predicted body checking and avoidance; and ethnicity, body checking, and body avoidance predicted eating pathology and clinical impairment. These associations suggest that body checking and avoidance are not benign behaviors in diverse nonclinical women.

  2. Model Checking JAVA Programs Using Java Pathfinder

    Science.gov (United States)

    Havelund, Klaus; Pressburger, Thomas

    2000-01-01

    This paper describes a translator called JAVA PATHFINDER from JAVA to PROMELA, the "programming language" of the SPIN model checker. The purpose is to establish a framework for verification and debugging of JAVA programs based on model checking. This work should be seen in a broader attempt to make formal methods applicable "in the loop" of programming within NASA's areas such as space, aviation, and robotics. Our main goal is to create automated formal methods such that programmers themselves can apply these in their daily work (in the loop) without the need for specialists to manually reformulate a program into a different notation in order to analyze the program. This work is a continuation of an effort to formally verify, using SPIN, a multi-threaded operating system programmed in Lisp for the Deep-Space 1 spacecraft, and of previous work in applying existing model checkers and theorem provers to real applications.

  3. Automated Environment Generation for Software Model Checking

    Science.gov (United States)

    Tkachuk, Oksana; Dwyer, Matthew B.; Pasareanu, Corina S.

    2003-01-01

    A key problem in model checking open systems is environment modeling (i.e., representing the behavior of the execution context of the system under analysis). Software systems are fundamentally open since their behavior is dependent on patterns of invocation of system components and values defined outside the system but referenced within the system. Whether reasoning about the behavior of whole programs or about program components, an abstract model of the environment can be essential in enabling sufficiently precise yet tractable verification. In this paper, we describe an approach to generating environments of Java program fragments. This approach integrates formally specified assumptions about environment behavior with sound abstractions of environment implementations to form a model of the environment. The approach is implemented in the Bandera Environment Generator (BEG) which we describe along with our experience using BEG to reason about properties of several non-trivial concurrent Java programs.

  4. Statically checked documentation with design patterns

    DEFF Research Database (Denmark)

    Cornils, Aino; Hedin, Görel

    2000-01-01

    Over the past years, along with the increase in popularity of design patterns, some problems with the use of design patterns have been identified. The so-called tracing problem describes the difficulty in documenting software systems using design patterns. Initial approaches to solving the tracing...... problem have focused on guidelines for documenting design pattern roles and rules within a system, but experience has shown that both in the initial design, and especially in later code revisions, it is all too easy for code and documentation to diverge, rendering the documentation misleading. The authors...... present a flexible and extensible tool which enables designers to use design patterns in a safe and efficient way, which checks the design pattern rules, and which semi-automatically documents, and maintains the documentation of a software system...

  5. Statistical Model Checking for Product Lines

    DEFF Research Database (Denmark)

    ter Beek, Maurice H.; Legay, Axel; Lluch Lafuente, Alberto

    2016-01-01

    average cost of products (in terms of the attributes of the products’ features) and the probability of features to be (un)installed at runtime. The product lines must be modelled in QFLan, which extends the probabilistic feature-oriented language PFLan with novel quantitative constraints among features......We report on the suitability of statistical model checking for the analysis of quantitative properties of product line models by an extended treatment of earlier work by the authors. The type of analysis that can be performed includes the likelihood of specific product behaviour, the expected...... and on behaviour and with advanced feature installation options. QFLan is a rich process-algebraic specification language whose operational behaviour interacts with a store of constraints, neatly separating product configuration from product behaviour. The resulting probabilistic configurations and probabilistic...

  6. Conformant Planning via Symbolic Model Checking

    CERN Document Server

    Cimatti, A; 10.1613/jair.774

    2011-01-01

    We tackle the problem of planning in nondeterministic domains, by presenting a new approach to conformant planning. Conformant planning is the problem of finding a sequence of actions that is guaranteed to achieve the goal despite the nondeterminism of the domain. Our approach is based on the representation of the planning domain as a finite state automaton. We use Symbolic Model Checking techniques, in particular Binary Decision Diagrams, to compactly represent and efficiently search the automaton. In this paper we make the following contributions. First, we present a general planning algorithm for conformant planning, which applies to fully nondeterministic domains, with uncertainty in the initial condition and in action effects. The algorithm is based on a breadth-first, backward search, and returns conformant plans of minimal length, if a solution to the planning problem exists, otherwise it terminates concluding that the problem admits no conformant solution. Second, we provide a symbolic representation ...

  7. Improving Atm Security Check Using DNA Biometrics

    Directory of Open Access Journals (Sweden)

    Igwe, Agu Felix

    2015-06-01

    Full Text Available This paper exposes how DNA can be used to identify account owner of a particular bank.DNA samples were obtained from body fluid. Buccal swab was used for sample collection .Buccal cell collection involves wiping a small piece of filter paper or a cotton swab against the inside of armpit in order to collect shed epithelial cells. The swab was then air dried or could be pressed against a treated collection card in order to transfer epithelial cells for storage purposes. The stored samples were later amplified and separated .The data generated from the samples were stored and saved in the database so that if a customer comes to claim money, the system checks whether it matches with what is stored in the database ,if it matches with the one in the database, access is granted to the customer,.if it does not match with what is stored in the database ,access is denied from the customer

  8. Advanced techniques for efficient data integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide

    ” that may go beyond predefined constraints such as primary keys and foreign keys. General integrity constraints are, however, far from being widely available in commercial systems; in fact, their usage is commonly not encouraged, since the database management system would not be able to provide...... their incremental evaluation. Given the size of today’s data repositories and the frequency at which updates may occur, any non-incremental approach, even for conditions whose complexity is only linear in the size of the database, may prove unfeasible in practice. Typically it is the database designer...... modifications in such programs. In this respect, database management systems need to be extended with means to verify, automatically and incrementally, that no violation of integrity is introduced by database updates. For this purpose we develop a procedure aimed at producing incremental checks whose...

  9. The Mars Science Laboratory Organic Check Material

    Science.gov (United States)

    Conrad, Pamela G.; Eigenbrode, J. E.; Mogensen, C. T.; VonderHeydt, M. O.; Glavin, D. P.; Mahaffy, P. M.; Johnson, J. A.

    2011-01-01

    The Organic Check Material (OCM) has been developed for use on the Mars Science Laboratory mission to serve as a sample standard for verification of organic cleanliness and characterization of potential sample alteration as a function of the sample acquisition and portioning process on the Curiosity rover. OCM samples will be acquired using the same procedures for drilling, portioning and delivery as are used to study martian samples with The Sample Analysis at Mars (SAM) instrument suite during MSL surface operations. Because the SAM suite is highly sensitive to organic molecules, the mission can better verify the cleanliness of Curiosity's sample acquisition hardware if a known material can be processed through SAM and compared with the results obtained from martian samples.

  10. Type Checking with XML Schema in XACT

    DEFF Research Database (Denmark)

    Kirkegaard, Christian; Møller, Anders

    ACT is an extension of Java for making type-safe XML transformations. Unlike other approaches, XACT provides a programming model based on XML templates and XPath together with a type checker based on data-flow analysis. We show how to extend the data-flow analysis technique used in the XACT system...... to support XML Schema as type formalism. The technique is able to model advanced features, such as type derivations and overloaded local element declarations, and also datatypes of attribute values and character data. Moreover, we introduce optional type annotations to improve modularity of the type checking....... The resulting system supports a flexible style of programming XML transformations and provides static guarantees of validity of the generated XML data....

  11. Probabilistic Model--Checking of Quantum Protocols

    CERN Document Server

    Gay, S; Papanikolaou, N; Gay, Simon; Nagarajan, Rajagopal; Papanikolaou, Nikolaos

    2005-01-01

    We establish fundamental and general techniques for formal verification of quantum protocols. Quantum protocols are novel communication schemes involving the use of quantum-mechanical phenomena for representation, storage and transmission of data. As opposed to quantum computers, quantum communication systems can and have been implemented using present-day technology; therefore, the ability to model and analyse such systems rigorously is of primary importance. While current analyses of quantum protocols use a traditional mathematical approach and require considerable understanding of the underlying physics, we argue that automated verification techniques provide an elegant alternative. We demonstrate these techniques through the use of PRISM, a probabilistic model-checking tool. Our approach is conceptually simpler than existing proofs, and allows us to disambiguate protocol definitions and assess their properties. It also facilitates detailed analyses of actual implemented systems. We illustrate our techniqu...

  12. Temporal Check-All-That-Apply Characterization of Syrah Wine.

    Science.gov (United States)

    Baker, Allison K; Castura, John C; Ross, Carolyn F

    2016-06-01

    Temporal Check-All-That-Apply (TCATA) is a new dynamic sensory method for which analysis techniques are still being developed and optimized. In this study, TCATA methodology was applied for the evaluation of wine finish by trained panelists (n = 13) on Syrah wines with different ethanol concentrations (10.5% v/v and 15.5% v/v). Raw data were time standardized to create a percentage of finish duration, subsequently segmented into thirds (beginning, middle, and end) to capture panel perception. Results indicated the finish of the high ethanol treatments lasted longer (approximately 12 s longer) than the low ethanol treatment (P ≤ 0.05). Within each finish segment, Cochran's Q was conducted on each attribute and differences were detected amongst treatments (P ≤ 0.05). Pairwise tests showed the high ethanol treatments were more described by astringency, heat/ethanol burn, bitterness, dark fruit, and spices, whereas the low ethanol treatment was more characterized by sourness, red fruit, and green flavors (P ≤ 0.05). This study demonstrated techniques for dealing with the data generated by TCATA. Furthermore, this study further characterized the influence of ethanol on wine finish, and by extension wine quality, with implications to winemakers responsible for wine processing decisions involving alcohol management.

  13. Experiences of patients and healthcare professionals of NHS cardiovascular health checks: a qualitative study

    Science.gov (United States)

    Riley, R.; Coghill, N.; Montgomery, A.; Feder, G.; Horwood, J.

    2016-01-01

    Background NHS Health Checks are a national cardiovascular risk assessment and management programme in England and Wales. We examined the experiences of patients attending and healthcare professionals (HCPs) conducting NHS Health Checks. Methods Interviews were conducted with a purposive sample of 28 patients and 16 HCPs recruited from eight general practices across a range of socio-economic localities. Interviews were audio recorded, transcribed, anonymized and analysed thematically. Results Patients were motivated to attend an NHS Health Check because of health beliefs, the perceived value of the programme, a family history of cardiovascular and other diseases and expectations of receiving a general health assessment. Some patients reported benefits including reassurance and reinforcement of healthy lifestyles. Others experienced confusion and frustration about how results and advice were communicated, some having a poor understanding of the implications of their results. HCPs raised concerns about the skill set of some staff to competently communicate risk and lifestyle information. Conclusions To improve the satisfaction of patients attending and improve facilitation of lifestyle change, HCPs conducting the NHS Health Checks require sufficient training to equip them with appropriate skills and knowledge to deliver the service effectively. PMID:26408822

  14. A correspondence between type checking via reduction and type checking via evaluation

    DEFF Research Database (Denmark)

    Sergey, Ilya; Clark, Dave

    2012-01-01

    We describe a derivational approach to proving the equivalence of different representations of a type system. Different ways of representing type assignments are convenient for particular applications such as reasoning or implementation, but some kind of correspondence between them should be proven....... In this paper we address two such semantics for type checking: one, due to Kuan et al., in the form of a term rewriting system and the other in the form of a traditional set of derivation rules. By employing a set of techniques investigated by Danvy et al., we mechanically derive the correspondence between...... a reduction-based semantics for type checking and a traditional one in the form of derivation rules, implemented as a recursive descent. The correspondence is established through a series of semantics-preserving functional program transformations....

  15. Analyzing Mode Confusion via Model Checking

    Science.gov (United States)

    Luettgen, Gerald; Carreno, Victor

    1999-01-01

    Mode confusion is one of the most serious problems in aviation safety. Today's complex digital flight decks make it difficult for pilots to maintain awareness of the actual states, or modes, of the flight deck automation. NASA Langley leads an initiative to explore how formal techniques can be used to discover possible sources of mode confusion. As part of this initiative, a flight guidance system was previously specified as a finite Mealy automaton, and the theorem prover PVS was used to reason about it. The objective of the present paper is to investigate whether state-exploration techniques, especially model checking, are better able to achieve this task than theorem proving and also to compare several verification tools for the specific application. The flight guidance system is modeled and analyzed in Murphi, SMV, and Spin. The tools are compared regarding their system description language, their practicality for analyzing mode confusion, and their capabilities for error tracing and for animating diagnostic information. It turns out that their strengths are complementary.

  16. Analyzing Interoperability of Protocols Using Model Checking

    Institute of Scientific and Technical Information of China (English)

    WUPeng

    2005-01-01

    In practical terms, protocol interoperability testing is still laborious and error-prone with little effect, even for those products that have passed conformance testing. Deadlock and unsymmetrical data communication are familiar in interoperability testing, and it is always very hard to trace their causes. The previous work has not provided a coherent way to analyze why the interoperability was broken among protocol implementations under test. In this paper, an alternative approach is presented to analyzing these problems from a viewpoint of implementation structures. Sequential and concurrent structures are both representative implementation structures, especially in event-driven development model. Our research mainly discusses the influence of sequential and concurrent structures on interoperability, with two instructive conclusions: (a) a sequential structure may lead to deadlock; (b) a concurrent structure may lead to unsymmetrical data communication. Therefore, implementation structures carry weight on interoperability, which may not gain much attention before. To some extent, they are decisive on the result of interoperability testing. Moreover, a concurrent structure with a sound task-scheduling strategy may contribute to the interoperability of a protocol implementation. Herein model checking technique is introduced into interoperability analysis for the first time. As the paper shows, it is an effective way to validate developers' selections on implementation structures or strategies.

  17. Check-up examination: recommendations in adults.

    Science.gov (United States)

    Virgini, Vanessa; Meindl-Fridez, Claudine; Battegay, Edouard; Zimmerli, Lukas U

    2015-01-01

    Check-up examinations, or periodic health examinations (PHEs), have gained in importance during the last decades and are nowadays among the most common reasons for consultations in primary care settings. The aim of PHEs is to identify risk factors and early signs of disease, but also to prevent future illness by early intervention. Therefore, each PHE should include counselling, immunisation and physical examination according to the patient's age and gender. However, deciding whether to screen a patient and choosing the most appropriate screening method can be challenging for general practitioners. The U.S. Preventive Service Task Force (USPSTF) provides updated recommendations on different existing preventive care measures based on relevant literature review. The aim of this review is to provide an updated statement of recommendations regarding preventive care measures based mostly on the guidelines derived from the USPSTF and the Swiss Medical Board. Among the major updates, there is no recommendation anymore to routinely screen for breast cancer and prostate cancer in asymptomatic adults. Since 2013, however, the USPSTF recommends annual screening for lung cancer with low-dose CT in patients aged 55 to 80 years with a smoking history of ≥30 pack years. During PHEs, the physician should be alert to the patients' hidden agendas, which are the reason for one third of all consultations in primary care.

  18. CFD analysis of a ball check microvalve

    Science.gov (United States)

    Cǎlimǎnescu, Ioan; Dumitrache, Constantin L.; Grigorescu, Lucian

    2015-02-01

    The microvalves with balls as seen before are used in many applications and their behaviour in terms of fluid dynamics mainly at their opening time (when as demonstrated the ball is bouncing up and down altering the flow parameters) is of a paramount importance. The present study is focused on a micro check ball valve circulating a fluid air-like (with the same constant proprieties). The CFD model is taking into account a transitory zone of functioning from zero time when the pressure inside a "tank" is reaching the opening pressure of the valve, to the final step 0.05 seconds when the ball is stabilizing after bouncing up and down. The geometry of the valve with dimensions in μm is given below (the model is comprising a "slice" of 5 μm thickness extracted from the entire valve. In this paper by using advanced numeric techniques, the behavior of the valve in its transitory opening stage was studied with credible and useful results for further optimisation studies.

  19. Effective ambiguity checking in biosequence analysis

    Directory of Open Access Journals (Sweden)

    Giegerich Robert

    2005-06-01

    Full Text Available Abstract Background Ambiguity is a problem in biosequence analysis that arises in various analysis tasks solved via dynamic programming, and in particular, in the modeling of families of RNA secondary structures with stochastic context free grammars. Several types of analysis are invalidated by the presence of ambiguity. As this problem inherits undecidability (as we show here from the namely problem for context free languages, there is no complete algorithmic solution to the problem of ambiguity checking. Results We explain frequently observed sources of ambiguity, and show how to avoid them. We suggest four testing procedures that may help to detect ambiguity when present, including a just-in-time test that permits to work safely with a potentially ambiguous grammar. We introduce, for the special case of stochastic context free grammars and RNA structure modeling, an automated partial procedure for proving non-ambiguity. It is used to demonstrate non-ambiguity for several relevant grammars. Conclusion Our mechanical proof procedure and our testing methods provide a powerful arsenal of methods to ensure non-ambiguity.

  20. Attentive Turkers: MTurk participants perform better on online attention checks than do subject pool participants.

    Science.gov (United States)

    Hauser, David J; Schwarz, Norbert

    2016-03-01

    Participant attentiveness is a concern for many researchers using Amazon's Mechanical Turk (MTurk). Although studies comparing the attentiveness of participants on MTurk versus traditional subject pool samples have provided mixed support for this concern, attention check questions and other methods of ensuring participant attention have become prolific in MTurk studies. Because MTurk is a population that learns, we hypothesized that MTurkers would be more attentive to instructions than are traditional subject pool samples. In three online studies, participants from MTurk and collegiate populations participated in a task that included a measure of attentiveness to instructions (an instructional manipulation check: IMC). In all studies, MTurkers were more attentive to the instructions than were college students, even on novel IMCs (Studies 2 and 3), and MTurkers showed larger effects in response to a minute text manipulation. These results have implications for the sustainable use of MTurk samples for social science research and for the conclusions drawn from research with MTurk and college subject pool samples.

  1. Buying in and Checking out: Identity Development and Meaning Making in the Practice of Mathematics Homework

    Directory of Open Access Journals (Sweden)

    Mara Landers

    2013-06-01

    Full Text Available This paper presents findings from an ethnographic study of the role and meaning of mathematics homework in the lives of middle school students. The study conceptualizes and examines homework as a social practice, with a focus on how students make meaning out of their experiences and the role of identity development in meaning making. Specifically, the study examines how middle school students come to value or reject mathematics homework. Case study analyses revealed two ways of characterizing students’ experiences with homework. Students who buy into homework develop aspects of their identities related to school, math and homework that support them in valuing homework. Students who check out develop aspects of their identities that support them in rejecting homework. The concepts of buying in and checking out have implications for theory development around motivation and identity and for school practices around homework.

  2. Verifying Multi-Agent Systems via Unbounded Model Checking

    Science.gov (United States)

    Kacprzak, M.; Lomuscio, A.; Lasica, T.; Penczek, W.; Szreter, M.

    2004-01-01

    We present an approach to the problem of verification of epistemic properties in multi-agent systems by means of symbolic model checking. In particular, it is shown how to extend the technique of unbounded model checking from a purely temporal setting to a temporal-epistemic one. In order to achieve this, we base our discussion on interpreted systems semantics, a popular semantics used in multi-agent systems literature. We give details of the technique and show how it can be applied to the well known train, gate and controller problem. Keywords: model checking, unbounded model checking, multi-agent systems

  3. Diagnostic framework and health check tool for engineering and technology projects

    Directory of Open Access Journals (Sweden)

    Simon P Philbin

    2014-10-01

    Full Text Available Purpose: Development of a practitioner oriented diagnostic framework and health check tool to support the robust assessment of engineering and technology projects.Design/methodology/approach: The research is based on a literature review that draws together insights on project assessment and critical success factors to establish an integrated systems view of projects. This is extended to allow a comprehensive diagnostic framework to be developed along with a high-level health check tool that can be readily deployed on projects. The utility of the diagnostic framework and health check tool are explored through three illustrative case studies, with two from Canada and one from the United Kingdom. Findings andOriginality/value: The performance of engineering and technology projects can be viewed through a systems perspective and being a function of six sub-systems that are: process, technology, resources, impact, knowledge and culture. The diagnostic framework that is developed through this research integrates these sub-systems to provide a comprehensive assessment methodology for projects, which is linked to existing best practice for project reviews, performance management and maturity models. The case studies provide managerial insights that are related to the diagnostic framework but crucially also position the approach in the context of industrial applications for construction engineering and technology management.Research limitations/implications: The case study approach includes two case studies from the construction and facilities development sector with the third case study from the research and technology sector. Further work is required to investigate the use of the diagnostic framework and health check tool in other sectors.Practical implications: The health check tool will be of practical benefit to new projects managers that require access to a robust and convenient project review methodology for assessing the status and health of a

  4. Dynamic State Space Partitioning for External Memory Model Checking

    DEFF Research Database (Denmark)

    Evangelista, Sami; Kristensen, Lars Michael

    2009-01-01

    We describe a dynamic partitioning scheme usable by model checking techniques that divide the state space into partitions, such as most external memory and distributed model checking algorithms. The goal of the scheme is to reduce the number of transitions that link states belonging to different...

  5. 76 FR 16861 - Availability of Funds and Collection of Checks

    Science.gov (United States)

    2011-03-25

    ... proposed rule. \\29\\ See Regulation CC Sec. 229.20 and EFA Act Sec. 608. A state's funds-availability law...: Background Regulation CC (12 CFR part 229) implements the Expedited Funds Availability Act (EFA Act) and the Check Clearing for the 21st Century Act (Check 21 Act).\\1\\ The Board implemented the EFA Act in...

  6. Modern Trends in Airport Self Check-in Kiosks

    Directory of Open Access Journals (Sweden)

    Jarmila Sabatová

    2016-10-01

    Full Text Available Due to maintain the flow of the check-in process of air passengers, it is essential that services that ensure this process have been carried as quickly and effectively. One of the major current problems in this area is the efficiency of clearance of a large number of passengers over the check-in counters. By the gradual development of so-called self check-in services eventually delegate some activities in check-in process to passengers and the entire clearance process to speed up. In this article the authors deal with current state of the use of self check-in services in the world and predict the expected evolution of these services in the future. Subsequently, the authors present a new design of self-service kiosk and graphical user interface (GUI of application such self-service check-in kiosk based on the analysis of the functions and features of similar solutions available on the market and with considering all currently known IATA requirements and the criteria relating to disabled passengers in order to lighten the load check-in counters and thereby accelerated the clearance of the passenger at the airport. The aim of the authors was to create a cost competitive solution offering such new features and services that do not offer other solutions, with an emphasis on improving the efficiency of the check-in process of passengers at the airport.

  7. U.T.E.S. Interest Check List.

    Science.gov (United States)

    Manpower Administration (DOL), Washington, DC.

    The revised Oregon metro edition of the U.T.E.S. interest check list for intermediate education aims at helping students decide what kinds of work they would like and lists activities that are found in a broad range of industries and occupations in the nation. Specific instructions advise the student that the check list is not a test and that…

  8. Development of a stainless steel check valve for cryogenic applications

    NARCIS (Netherlands)

    Veenstra, T.T.; Venhorst, G.C.F.; Burger, J.F.; Holland, H.J.; Brake, ter H.J.M.; Sirbi, A.; Rogalla, H.

    2007-01-01

    This paper describes the development of a check valve for use in a sorption compressor that will drive a 10 mW 4.5 K Joule–Thomson cryocooler. For the check valve extremely low backflow rates are tolerable at an operating temperature of the valve of 50 K. To fulfill these requirements, the sealing m

  9. 19 CFR 111.41 - Endorsement of checks.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Endorsement of checks. 111.41 Section 111.41 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BROKERS Duties and Responsibilities of Customs Brokers § 111.41 Endorsement of checks....

  10. 16 CFR 240.12 - Checking customer's use of payments.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Checking customer's use of payments. 240.12 Section 240.12 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR ADVERTISING ALLOWANCES AND OTHER MERCHANDISING PAYMENTS AND SERVICES § 240.12 Checking customer's use...

  11. 31 CFR 10.31 - Negotiation of taxpayer checks.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Negotiation of taxpayer checks. 10.31 Section 10.31 Money and Finance: Treasury Office of the Secretary of the Treasury PRACTICE BEFORE THE... § 10.31 Negotiation of taxpayer checks. A practitioner who prepares tax returns may not endorse...

  12. 26 CFR 301.6657-1 - Bad checks.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Bad checks. 301.6657-1 Section 301.6657-1... Additions to the Tax and Additional Amounts § 301.6657-1 Bad checks. (a) In general. Except as provided in... district director that it was tendered in good faith with reasonable cause to believe that it would be...

  13. Check-up Measurement (update). Deliverable D5.22

    NARCIS (Netherlands)

    Holtzer, A.C.G.; Giessen, A.M.D. van der; Djurica, M.

    2015-01-01

    This deliverable D5.22 presents the GEN6 check-up measurement. It describes the most prominent outcomes of the GEN6 project up to this point in time. The check-up measurement helps to focus the monitoring towards the most relevant achievements of the project, such that an efficient and well-targeted

  14. 31 CFR 240.11 - Treasury Check Offset.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Treasury Check Offset. 240.11 Section 240.11 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE INDORSEMENT AND PAYMENT OF CHECKS...

  15. BACKGROUND ELIMINATION IN BANK CHECKS USING GREYSCALE MORPHOLOGY

    NARCIS (Netherlands)

    Shetty, S.; Shridhar, M.; Houle, G.

    2004-01-01

    In this paper we propose a new method of background elimination in personal bank checks to facilitate machine recognition of user entered information. One of the key problems that affect the extraction of user entered information is the wide diversity of the backgrounds of checks. They have differen

  16. Checking Consistency of Pedigree Information is NP-complete

    DEFF Research Database (Denmark)

    Aceto, Luca; Hansen, Jens A.; Ingolfsdottir, Anna

    Consistency checking is a fundamental computational problem in genetics. Given a pedigree and information on the genotypes of some of the individuals in it, the aim of consistency checking is to determine whether these data are consistent with the classic Mendelian laws of inheritance. This probl...

  17. Statistical Model Checking of Rich Models and Properties

    DEFF Research Database (Denmark)

    Poulsen, Danny Bøgsted

    in undecidability issues for the traditional model checking approaches. Statistical model checking has proven itself a valuable supplement to model checking and this thesis is concerned with extending this software validation technique to stochastic hybrid systems. The thesis consists of two parts: the first part......Software is in increasing fashion embedded within safety- and business critical processes of society. Errors in these embedded systems can lead to human casualties or severe monetary loss. Model checking technology has proven formal methods capable of finding and correcting errors in software....... However, software is approaching the boundary in terms of the complexity and size that model checking can handle. Furthermore, software systems are nowadays more frequently interacting with their environment hence accurately modelling such systems requires modelling the environment as well - resulting...

  18. Check dam and polyacrylamide performance under simulated stormwater runoff.

    Science.gov (United States)

    Kang, Jihoon; McCaleb, Melanie M; McLaughlin, Richard A

    2013-11-15

    High levels of turbidity and fine suspended sediments are often found in stormwater discharges from construction sites even when best management practices (BMPs) for sediment control are in place. This study evaluated turbidity reduction by three check dam types: 1) rock check dam representing a standard BMP, 2) excelsior wattle representing a fiber check dam (FCD), and 3) rock check dam wrapped with excelsior erosion control blanket (rock + excelsior ECB) representing an alternative FCD. Three check dams (all same type) were installed in a lined, 24-m ditch on a 5-7% slope and three consecutive simulated stormwater flows were run in the ditch. Additional tests were performed by adding granular polyacrylamide (PAM) on the check dams in the same manner using two sediment sources differing in clay content. Without PAM treatment, significantly higher effluent turbidity (>900 nephelometric turbidity units (NTU)) exited the ditch with rock check dams than with excelsior wattles or rock + excelsior ECBs (dam types was in the order of excelsior wattle > rock + excelsior ECB > rock check dam, indicating better water pooling behind the wattle. The PAM treatment reduced turbidity substantially (>75% relative to no PAM treatment) for all check dam types and it was very effective in excelsior wattles (<57 NTU) and rock + excelsior ECBs (<90 NTU) even during the third storm event. This study demonstrates that the passive treatment of runoff with PAM on FCDs (or rock + excelsior ECB) in construction site ditches can be very effective for sediment retention and turbidity reduction.

  19. Electronic mail dysfunction: a reality check.

    Science.gov (United States)

    Case, C J

    1999-01-01

    Computer-mediated communication systems, including electronic mail, are systems that businesses employ to improve efficiency, effectiveness, and communication within the organization. As use of these systems proliferate, it is crucial that the communication systems have a positive, rather than negative impact, on the organization. Negative behavior could include flaming and personal use of the electronic mail system. Much of prior research has examined the use of electronic mail in academic settings. Results indicate that flaming and personal use have a relative high incidence. However, is electronic mail dysfunction a consistent reality for both academia and the business world? This case study empirically examines the role of electronic messaging in business firms. Specifically, this research investigates the usage of inter-organizational electronic messaging in intermediate-size firms. Electronic mail messages were analyzed in a three-site case study. Results indicate that dysfunctional electronic mail uses such as personal use and flaming have minimal incidence in a business environment. Implications relate to organizational professionalism and the use of students as electronic mail research subjects.

  20. Implementing Model-Check for Employee and Management Satisfaction

    Science.gov (United States)

    Jones, Corey; LaPha, Steven

    2013-01-01

    This presentation will discuss methods to which ModelCheck can be implemented to not only improve model quality, but also satisfy both employees and management through different sets of quality checks. This approach allows a standard set of modeling practices to be upheld throughout a company, with minimal interaction required by the end user. The presenter will demonstrate how to create multiple ModelCheck standards, preventing users from evading the system, and how it can improve the quality of drawings and models.

  1. Towards an automated checked baggage inspection system augmented with robots

    Science.gov (United States)

    DeDonato, Matthew P.; Dimitrov, Velin; Padır, Taskin

    2014-05-01

    We present a novel system for enhancing the efficiency and accuracy of checked baggage screening process at airports. The system requirements address the identification and retrieval of objects of interest that are prohibited in a checked luggage. The automated testbed is comprised of a Baxter research robot designed by Rethink Robotics for luggage and object manipulation, and a down-looking overhead RGB-D sensor for inspection and detection. We discuss an overview of current system implementations, areas of opportunity for improvements, robot system integration challenges, details of the proposed software architecture and experimental results from a case study for identifying various kinds of lighters in checked bags.

  2. PREREQUISITE PROGRAMMES IN OWN CHECKS IN STATUTORY AND VOLUNTARY LEGISLATION

    Directory of Open Access Journals (Sweden)

    E. Guidi

    2012-08-01

    Full Text Available Prerequisite Programmes approach is a requirement for implementing a correct own check plan. This new approach, born according to the European Legislation, is completely recognized by third Nation Authorities and private Inspection and Accreditation Bodies. This method is the basis to verify if an own check system is under control and to verify if corrective actions are built up to warrant hygienic production standards. The present work demonstrate that a correct own check plan is built up only by a Pre Requisites Program approach. The new UNI EN ISO 22000:2005 standard describe this concept specifying the difference between PRP and CCP.

  3. An Item Factor Analysis of the Mooney Problem Check List

    Science.gov (United States)

    Stewart, David W.; Deiker, Thomas

    1976-01-01

    Explores the factor structure of the Mooney Problem Check List (MPCL) at the junior and senior high school level by undertaking a large obverse factor analysis of item responses in three adolescent criterion groups. (Author/DEP)

  4. Monitoring Blood Sugar: The Importance of Checking Blood Sugar Levels

    Science.gov (United States)

    ... Your 1- to 2-Year-Old Monitoring Blood Sugar KidsHealth > For Parents > Monitoring Blood Sugar Print A ... Tests Record Keeping The Importance of Checking Blood Sugar Levels Besides helping to keep blood sugar levels ( ...

  5. Monitoring Blood Sugar: The Importance of Checking Blood Sugar Levels

    Science.gov (United States)

    ... Feeding Your 1- to 2-Year-Old Monitoring Blood Sugar KidsHealth > For Parents > Monitoring Blood Sugar A ... Other Tests Record Keeping The Importance of Checking Blood Sugar Levels Besides helping to keep blood sugar ...

  6. An Extended Ontology Model and Ontology Checking Based on Description Logics

    Institute of Scientific and Technical Information of China (English)

    王洪伟; 蒋馥; 吴家春

    2004-01-01

    Ontology is defined as an explicit specification of a conceptualization. In this paper, an extended ontology model was constructed using description logics, which is a 5-tuples including term set, individual set, term definition set, instantiation assertion set and term restriction set. Based on the extended model, the issue on ontology checking was studied with the conclusion that the four kinds of term checking, including term satisfiability checking, term subsumption checking, term equivalence checking and term disjointness checking, can be reduced to the satisfiability checking, and satisfiability checking can be transformed into instantiation consistence checking.

  7. Performance of Compiler-Assisted Memory Safety Checking

    Science.gov (United States)

    2014-08-01

    Performance of Compiler -Assisted Memory Safety Checking David Keaton Robert C. Seacord August 2014 TECHNICAL NOTE CMU/SEI-2014-TN...014 | vii Abstract Buffer overflows affect a large installed base of C code. This technical note describes the criteria for deploying a compiler ...describes a modification to the LLVM compiler to enable hoisting bounds checks from loops and functions. This proof-of-concept prototype has been used

  8. Model checking biological systems described using ambient calculus

    DEFF Research Database (Denmark)

    Mardare, Radu Iulian; Priami, Corrado; Qualia, Paola;

    2005-01-01

    Model checking biological systems described using ambient calculus. In Proc. of the second International Workshop on Computational Methods in Systems Biology (CMSB04), Lecture Notes in Bioinformatics 3082:85-103, Springer, 2005.......Model checking biological systems described using ambient calculus. In Proc. of the second International Workshop on Computational Methods in Systems Biology (CMSB04), Lecture Notes in Bioinformatics 3082:85-103, Springer, 2005....

  9. Strategy optimization for mask rule check in wafer fab

    Science.gov (United States)

    Yang, Chuen Huei; Lin, Shaina; Lin, Roger; Wang, Alice; Lee, Rachel; Deng, Erwin

    2015-07-01

    Photolithography process is getting more and more sophisticated for wafer production following Moore's law. Therefore, for wafer fab, consolidated and close cooperation with mask house is a key to achieve silicon wafer success. However, generally speaking, it is not easy to preserve such partnership because many engineering efforts and frequent communication are indispensable. The inattentive connection is obvious in mask rule check (MRC). Mask houses will do their own MRC at job deck stage, but the checking is only for identification of mask process limitation including writing, etching, inspection, metrology, etc. No further checking in terms of wafer process concerned mask data errors will be implemented after data files of whole mask are composed in mask house. There are still many potential data errors even post-OPC verification has been done for main circuits. What mentioned here are the kinds of errors which will only occur as main circuits combined with frame and dummy patterns to form whole reticle. Therefore, strategy optimization is on-going in UMC to evaluate MRC especially for wafer fab concerned errors. The prerequisite is that no impact on mask delivery cycle time even adding this extra checking. A full-mask checking based on job deck in gds or oasis format is necessary in order to secure acceptable run time. Form of the summarized error report generated by this checking is also crucial because user friendly interface will shorten engineers' judgment time to release mask for writing. This paper will survey the key factors of MRC in wafer fab.

  10. Experimental and Analytical Study on the Lift Check Valve

    Energy Technology Data Exchange (ETDEWEB)

    Kim, J. H.; Song, C. S.; Kim, H. S.; Hong, S. C. [Korea Institute of Machinery and Materials, Daejeon (Korea, Republic of); Lee, W. H. [Samshin Limited Co., Chonan (Korea, Republic of)

    2009-10-15

    In general, the check valve mounted on the flow line is used for the purpose of protecting the pump and the related facility, making the flow path, and maintaining the pressure boundary during the operation mode change in steam power plant and nuclear power plant. Fig. 1 shows the example of check valve in nuclear power plant. Especially, the check valve mounted on safety feed system and nuclear safety system is operated to open state and has a role of acquiring enough fluid such as safety feed and auxiliary feed water in the Design Basis Accident. And the check valve is operated with enough sealing and with protecting steam hammer in normal operational mode. For this purpose, the check valve can be open easily and be maintained in the open state in case of small flow velocity. In this research, the experimental and analytical study on the check vale was performed. The flow coefficient and closure time were compared between the experimental and the analytical result by numerical simulation. The validation of the analytical method was performed.

  11. Improved Bounded Model Checking for the Universal Fragment of CTL

    Institute of Scientific and Technical Information of China (English)

    Liang Xu; Wei Chen; Yan-Yan Xu; Wen-Hui Zhang

    2009-01-01

    SAT-based bounded model checking (BMC) has been introduced as a complementary technique to BDD-based symbolic model checking in recent years, and a lot of successful work has been done in this direction. The approach was first introduced by A. Biere et al. in checking linear temporal logic (LTL) formulae and then also adapted to check formulae of the universal fragment of computation tree logic (ACTL) by W. Penczek et al. As the efficiency of model checking is still an important issue, we present an improved BMC approach for ACTL based on Penczek's method. We consider two aspects of the approach. One is reduction of the number of variables and transitions in the k-model by distinguishing the temporal operator EX from the others. The other is simplification of the transformation of formulae by using uniform path encoding instead of a disjunction of all paths needed in the k-model. With these improvements, for an ACTI, formula, the length of the final encoding of the formula in the worst case is reduced. The improved approach is implemented in the tool BMV and is compared with the original one by applying both to two well known examples, mutual exclusion and dining philosophers. The comparison shows the advantages of the improved approach with respect to the efficiency of model checking.

  12. Intelligent Data Visualization for Cross-Checking Spacecraft System Diagnosis

    Science.gov (United States)

    Ong, James C.; Remolina, Emilio; Breeden, David; Stroozas, Brett A.; Mohammed, John L.

    2012-01-01

    Any reasoning system is fallible, so crew members and flight controllers must be able to cross-check automated diagnoses of spacecraft or habitat problems by considering alternate diagnoses and analyzing related evidence. Cross-checking improves diagnostic accuracy because people can apply information processing heuristics, pattern recognition techniques, and reasoning methods that the automated diagnostic system may not possess. Over time, cross-checking also enables crew members to become comfortable with how the diagnostic reasoning system performs, so the system can earn the crew s trust. We developed intelligent data visualization software that helps users cross-check automated diagnoses of system faults more effectively. The user interface displays scrollable arrays of timelines and time-series graphs, which are tightly integrated with an interactive, color-coded system schematic to show important spatial-temporal data patterns. Signal processing and rule-based diagnostic reasoning automatically identify alternate hypotheses and data patterns that support or rebut the original and alternate diagnoses. A color-coded matrix display summarizes the supporting or rebutting evidence for each diagnosis, and a drill-down capability enables crew members to quickly view graphs and timelines of the underlying data. This system demonstrates that modest amounts of diagnostic reasoning, combined with interactive, information-dense data visualizations, can accelerate system diagnosis and cross-checking.

  13. Deployment of check-in nodes in complex networks

    Science.gov (United States)

    Jiang, Zhong-Yuan; Ma, Jian-Feng

    2017-01-01

    In many real complex networks such as the city road networks and highway networks, vehicles often have to pass through some specially functioned nodes to receive check-in like services such as gas supplement at gas stations. Based on existing network structures, to guarantee every shortest path including at least a check-in node, the location selection of all check-in nodes is very essential and important to make vehicles to easily visit these check-in nodes, and it is still remains an open problem in complex network studies. In this work, we aim to find possible solutions for this problem. We first convert it into a set cover problem which is NP-complete and propose to employ the greedy algorithm to achieve an approximate result. Inspired by heuristic information of network structure, we discuss other four check-in node location deployment methods including high betweenness first (HBF), high degree first (HDF), random and low degree first (LDF). Finally, we compose extensive simulations in classical scale-free networks, random networks and real network models, and the results can well confirm the effectiveness of the greedy algorithm. This work has potential applications into many real networks.

  14. COMMON AGRICULTURAL POLICY FROM HEALTH CHECK DECISIONS TO THE POST-2013 REFORM

    Directory of Open Access Journals (Sweden)

    Niculescu Oana Marilena

    2011-07-01

    Full Text Available The paper proposed for being presented belongs to the field research International Affairs and European Integration. The paper entitled Common Agricultural Policy from Health Check decisions to the post-2013 reform aims to analyze the Common Agricultural Policy (CAP from the Health Check adoption in November 2008 to a new reform post-2013. The objectives of the paper are the presentation of the Health Check with its advantages and disadvantages as well as the analysis of the opportunity of a new European policy and its reforming having in view that the analysis of Health Check condition was considered a compromise. The paper is related to the internal and international research consisting in several books, studies, documents that analyze the particularities of the most debated, controversial and reformed EU policy. A personal study is represented by the first report within the PhD paper called The reform of CAP and its implications for Romanias agriculture(coordinator prof. Gheorghe Hurduzeu PhD, Academy of Economic Studies Bucharest, Faculty of International Business, research studies in the period 2009-2012. The research methodology used consists in collecting and analysis data from national and international publications, their validation, followed by a dissemination of the results in order to express a personal opinion regarding CAP and its reform. The results of the research consist in proving the opportunity of a new reform due to the fact that Health Check belongs already to the past. The paper belongs to the field research mentioned, in the attempt to prove the opportunity of building a new EU agricultural policy. The challenges CAP is facing are: food safety, environmental and climate changes, territorial balance as well as new challenges-improving sustainable management of natural resources, maintaining competitiveness in the context of globalization growth, strengthening EU cohesion in rural areas, increasing the support of CAP for

  15. The use of check valve performance data to support new concepts (probabilistic risk assessment, condition monitoring) for check valve program

    Energy Technology Data Exchange (ETDEWEB)

    Hart, K.A.; Gower, D.

    1996-12-01

    The concept of developing an integrated check valve database based on the Nuclear Power Reliability Data System (NPRDS) data was presented at the last Symposium. The Nuclear Industry Check Valve Group (NIC), working in cooperation with the Oak Ridge National Laboratory (ORNL), has completed an operational database of check valve performance from 1984 to the present. NIC has committed to the nuclear industry to periodically update the data and maintain this information accessible. As the new concepts of probabilistic risk analysis and condition monitoring are integrated into the American Society of Mechanical Engineers (ASME) Code, a critical element will be performance data. From check valve performance data, feasible failure modes and rates can be established. When a failure rate or frequency of failures can be established based on a significant enough population (sampling), a more solid foundation for focusing resources and determining appropriate frequencies and testing can be determined. The presentation will give the updated status of the NIC Check Valve Performance Database covering (1) methodology used to combine the original ORNL data; (2) process/controls established for continuing update and refinement of the data; (3) discussion of how this data is being utilized by (a) OM-22 for condition monitoring, and (b) risk-based inservice testing work of Westinghouse Owners` Group; and (4) results/trends of data evaluations. At the 1994 Symposium, ORNL provided an update as of 1991 to their original work of 1984 -1990 which they had performed to characterize check valve degradations and failures in the nuclear industry. These characterizations will be updated to 1995 and additional reviews provided to give insight into the current condition and trends of check valve performance.

  16. Model Checking-Based Testing of Web Applications

    Institute of Scientific and Technical Information of China (English)

    ZENG Hongwei; MIAO Huaikou

    2007-01-01

    A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagram as the object model is employed to describe the object structure of a Web application design and can be translated into the behavior model. A key problem of model checking-based test generation for a Web application is how to construct a set of trap properties that intend to cause the violations of model checking against the behavior model and output of counterexamples used to construct the test sequences.We give an algorithm that derives trap properties from the object model with respect to node and edge coverage criteria.

  17. Effects of monetary reward and punishment on information checking behaviour.

    Science.gov (United States)

    Li, Simon Y W; Cox, Anna L; Or, Calvin; Blandford, Ann

    2016-03-01

    Two experiments were conducted to examine whether checking one's own work can be motivated by monetary reward and punishment. Participants were randomly assigned to one of three conditions: a flat-rate payment for completing the task (Control); payment increased for error-free performance (Reward); payment decreased for error performance (Punishment). Experiment 1 (N = 90) was conducted with liberal arts students, using a general data-entry task. Experiment 2 (N = 90) replicated Experiment 1 with clinical students and a safety-critical 'cover story' for the task. In both studies, Reward and Punishment resulted in significantly fewer errors, more frequent and longer checking, than Control. No such differences were obtained between the Reward and Punishment conditions. It is concluded that error consequences in terms of monetary reward and punishment can result in more accurate task performance and more rigorous checking behaviour than errors without consequences. However, whether punishment is more effective than reward, or vice versa, remains inconclusive.

  18. A Spatialization-based Method for Checking and Updating Metadata

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In this paper the application of spatialization technology on metadata quality check and updating was discussed. A new method based on spatialization was proposed for checking and updating metadata to overcome the deficiency of text based methods with the powerful functions of spatial query and analysis provided by GIS software. This method employs the technology of spatialization to transform metadata into a coordinate space and the functions of spatial analysis in GIS to check and update spatial metadata in a visual environment. The basic principle and technical flow of this method were explained in detail, and an example of implementation using ArcMap of GIS software was illustrated with a metadata set of digital raster maps. The result shows the new method with the support of interaction of graph and text is much more intuitive and convenient than the ordinary text based method, and can fully utilize the functions of GIS spatial query and analysis with more accuracy and efficiency.

  19. Field trials of the Baby Check score card in hospital.

    Science.gov (United States)

    Thornton, A J; Morley, C J; Cole, T J; Green, S J; Walker, K A; Rennie, J M

    1991-01-01

    The Baby Check score card was used by junior paediatric doctors to assess 262 babies under 6 months old presenting to hospital. The duty registrar and two consultants independently graded the severity of each baby's illness without knowledge of the Baby Check score. The registrars assessed the babies at presentation while the consultants reviewed the notes. The consultants and registrars agreed about the need for hospital admission only about 75% of the time. The score's sensitivity and predictive values were similar to those of the registrars' grading. The score's specificity was 87%. Babies with serious diagnosis scored high, while minor illnesses scored low. The predictive value for requiring hospital admission increased with the score, rising to 100% for scores of 20 or more. The appropriate use of Baby Check should improve the detection of serious illness. It could also reduce the number of babies admitted with minor illness, without putting them at increased risk.

  20. Schedulability of Herschel revisited using statistical model checking

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel

    2015-01-01

    Schedulability analysis is a main concern for several embedded applications due to their safety-critical nature. The classical method of response time analysis provides an efficient technique used in industrial practice. However, the method is based on conservative assumptions related to execution...... to obtain some guarantee on the (un)schedulability of the model even in the presence of undecidability. Two methods are considered: symbolic model checking and statistical model checking. Since the model uses stop-watches, the reachability problem becomes undecidable so we are using an over......-approximation technique. We can safely conclude that the system is schedulable for varying values of BCET. For the cases where deadlines are violated, we use polyhedra to try to confirm the witnesses. Our alternative method to confirm non-schedulability uses statistical model-checking (SMC) to generate counter...

  1. CheckMATE 2: From the model to the limit

    CERN Document Server

    Dercks, Daniel; Kim, Jong Soo; Rolbiecki, Krzysztof; Tattersall, Jamie; Weber, Torsten

    2016-01-01

    We present the latest developments to the CheckMATE program that allows models of new physics to be easily tested against the recent LHC data. To achieve this goal, the core of CheckMATE now contains over 60 LHC analyses of which 12 are from the 13 TeV run. The main new feature is that CheckMATE 2 now integrates the Monte Carlo event generation via Madgraph and Pythia 8. This allows users to go directly from a SLHA file or UFO model to the result of whether a model is allowed or not. In addition, the integration of the event generation leads to a significant increase in the speed of the program. Many other improvements have also been made, including the possibility to now combine signal regions to give a total likelihood for a model.

  2. Error Checking for Chinese Query by Mining Web Log

    Directory of Open Access Journals (Sweden)

    Jianyong Duan

    2015-01-01

    Full Text Available For the search engine, error-input query is a common phenomenon. This paper uses web log as the training set for the query error checking. Through the n-gram language model that is trained by web log, the queries are analyzed and checked. Some features including query words and their number are introduced into the model. At the same time data smoothing algorithm is used to solve data sparseness problem. It will improve the overall accuracy of the n-gram model. The experimental results show that it is effective.

  3. The Complexity of Model Checking Higher-Order Fixpoint Logic

    DEFF Research Database (Denmark)

    Axelsson, Roland; Lange, Martin; Somla, Rafal

    2007-01-01

    of solving rather large parity games of small index. As a consequence of this we obtain an ExpTime upper bound on the expression complexity of each HFLk,m. The lower bound is established by a reduction from the word problem for alternating (k-1)-fold exponential space bounded Turing Machines. As a corollary...... provides complexity results for its model checking problem. In particular we consider its fragments HFLk,m which are formed using types of bounded order k and arity m only. We establish k-ExpTime-completeness for model checking each HFLk,m fragment. For the upper bound we reduce the problem to the problem...

  4. Model Checking Event-B by Encoding into Alloy

    CERN Document Server

    Matos, Paulo J

    2008-01-01

    As systems become ever more complex, verification becomes more main stream. Event-B and Alloy are two formal specification languages based on fairly different methodologies. While Event-B uses theorem provers to prove that invariants hold for a given specification, Alloy uses a SAT-based model finder. In some settings, Event-B invariants may not be proved automatically, and so the often difficult step of interactive proof is required. One solution for this problem is to validate invariants with model checking. This work studies the encoding of Event-B machines and contexts to Alloy in order to perform temporal model checking with Alloy's SAT-based engine.

  5. The check and error analysis of the BRDF experiment bench

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    In this paper, a detailed introduction is given to the check method of the BRDF experiment bench which is built on our own. Measurement is made on the BRDF of the standard white plate made of polytetrafluoroethylene(PTFE) with reference to the existing standard white plate whose surface reflectance is known and by the method of theory approximate and relative comparison. On the basis of that, the BRDF value of the standard white plate in the wave band of 0. 6328 μm is given and the experiment bench is checked, the relative error of the experiment bench being within 20%.

  6. Check list of the Hungarian Salticidae with biogeographical notes

    Directory of Open Access Journals (Sweden)

    Szüts, Tamás

    2003-04-01

    Full Text Available An updated check list of the Hungarian jumping spider fauna is presented. 70 species are recorded from Hungary so far. Four species are new to the Hungarian fauna: Hasarius adansoni, Neon valentulus, Sitticus caricis, Synageles subcingulatus. With 12 original drawings.

  7. Combining monitoring with run-time assertion checking

    NARCIS (Netherlands)

    Gouw, Stijn de

    2013-01-01

    We develop a new technique for Run-time Checking for two object-oriented languages: Java and the Abstract Behavioral Specification language ABS. In object-oriented languages, objects communicate by sending each other messages. Assuming encapsulation, the behavior of objects is completely determine

  8. The Role of Personal Ethical Checking in Courageous School Leadership

    Science.gov (United States)

    Buskey, Frederick C.; Pitts, Eric M.

    2013-01-01

    When school leaders make calculated decisions to deviate from hierarchical or cultural directives and norms, they may be viewed as mavericks or brigands. This paper details a process of ethical checking to help differentiate ethical decisions from more arbitrary or self-serving decisions. The paper examines conflicts inherent in many professional…

  9. Operational workforce planning for check-in counters at airports

    DEFF Research Database (Denmark)

    Stolletz, Raik

    2010-01-01

    This paper addresses operation models for workforce planning for check-in systems at airports. We characterize different tasks of the hierarchical workforce planning problem with time-dependent demand. A binary linear programming formulation is developed for the fortnightly tour scheduling problem...

  10. Check list of European hymenomycetous Heterobasidiae. Supplement and corrections

    NARCIS (Netherlands)

    Donk, M.A.

    1974-01-01

    This continuation of the “Check list of European hymenomycetous Heterobasidiae” (published in Persoonia 4: 145-335. 1966) contains supplementary matter as well as corrections. — Ypsilonidium (Donk) Donk is published as a new genus. Two new specific combinations are made with this generic name. — Mur

  11. A Check List for Evaluating Persuasive Features of Mathematics Courseware

    Science.gov (United States)

    Aris, Baharuddin; Gharbaghi, Alireza; Ahmad, Maizah Hura; Rosli, Mohd Shafie

    2013-01-01

    The main purpose of this study is to introduce a check list for evaluating persuasive features of mathematics courseware. Since mathematics is a source of anxiety among students (Zeidner & Matthews, 2010), this research is an attempt to employ persuasive features that can be used in mathematics courseware. Specifically, we sought to determine…

  12. Check list of the helminths of equines in Turkey.

    Science.gov (United States)

    Gürler, Ali Tümay; Bölükbaş, Cenk Soner; Açici, Mustafa; Umur, Sinasi

    2010-01-01

    Helminths of equines are one of the most important agents of parasitic diseases. Therefore, many studies have been conducted on helminths of equines in Turkey. In this article, a check list and prevalence rates of helminths of equines in Turkey have been given.

  13. Decentralized Consistency Checking in Cross-organizational Workflows

    NARCIS (Netherlands)

    Wombacher, A.

    2006-01-01

    Service Oriented Architectures facilitate loosely coupled composed services, which are established in a decentralized way. One challenge for such composed services is to guarantee consistency, i.e., deadlock-freeness. This paper presents a decentralized approach to consistency checking, which utiliz

  14. Two Types of Test Assembly Checked and Accepted for CEFR

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    The detail design of two types of test assembly used in the simulating transportation, and themounting and hydraulic test were completed in 2002. This two types of test assembly are manufactured inshanghai No.1 machine tool works, and checked and accepted in March 2003. The former is used in the

  15. Multi-core and/or symbolic model checking

    NARCIS (Netherlands)

    Dijk, van Tom; Laarman, Alfons; Pol, van de Jaco; Luettgen, G.; Merz, S.

    2012-01-01

    We review our progress in high-performance model checking. Our multi-core model checker is based on a scalable hash-table design and parallel random-walk traversal. Our symbolic model checker is based on Multiway Decision Diagrams and the saturation strategy. The LTSmin tool is based on the PINS arc

  16. Radiation therapy plan checks in a paperless clinic.

    Science.gov (United States)

    Siochi, R Alfredo; Pennington, Edward C; Waldron, Timothy J; Bayouth, John E

    2009-01-27

    Traditional quality assurance checks of a patient's radiation therapy plan involve printing out treatment parameters from the treatment planning system and the "record and verify" (R&V) system and visually checking the information for one-to-one correspondence. In a paperless environment, one can automate this process through independent software that can read the treatment planning data directly and compare it against the parameters in the R&V system's database. In addition to verifying the data integrity, it is necessary to check the logical consistency of the data and the accuracy of various calculations. The results are then imported into the patient's electronic medical record. Appropriate workflows must be developed to ensure that no steps of the QA process are missed. This paper describes our electronic QA system (EQS), consisting of in-house software and workflows. The EQS covers 3D conformal and intensity modulated radiation therapy, electrons, stereotactic radiosurgery, total body irradiation, and clinical set ups with and without virtual simulation. The planning systems handled by our EQS are ADAC Pinnacle and Varian FASTPLAN, while the R&V systems are LANTIS and VARIS. The improvement in our plan check process over the paperless system is described in terms of the types of detected errors. The potential problems with the implementation and use of the EQS, as well as workarounds for data that are not easily accessible through electronic means, are described.

  17. Symmetry and partial order reduction techniques in model checking Rebeca

    NARCIS (Netherlands)

    Jaghouri, M.M.; Sirjani, M.; Mousavi, M.R.; Movaghar, A.

    2007-01-01

    Rebeca is an actor-based language with formal semantics that can be used in modeling concurrent and distributed software and protocols. In this paper, we study the application of partial order and symmetry reduction techniques to model checking dynamic Rebeca models. Finding symmetry based equivalen

  18. Using Model Checking for Analyzing Distributed Power Control Problems

    DEFF Research Database (Denmark)

    Brihaye, Thomas; Jungers, Marc; Lasaulce, Samson

    2010-01-01

    Model checking (MC) is a formal verification technique which has been known and still knows a resounding success in the computer science community. Realizing that the distributed power control ( PC) problem can be modeled by a timed game between a given transmitter and its environment, the authors...

  19. Efficient Integrity Checking for Databases with Recursive Views

    DEFF Research Database (Denmark)

    Martinenghi, Davide; Christiansen, Henning

    2005-01-01

    into incremental and optimized tests specialized for given update patterns. These tests may involve the introduction of new views, but for relevant cases of recursion, simplified integrity constraints are obtained that can be checked more efficiently than the original ones and without auxiliary views. Notably...

  20. Preservation Health Check: Monitoring Threats to Digital Repository Content

    Science.gov (United States)

    Kool, Wouter; van der Werf, Titia; Lavoie, Brian

    2014-01-01

    The Preservation Health Check (PHC) project, undertaken as a joint effort by Open Planets Foundation (OPF) and OCLC Research, aims to evaluate the usefulness of the preservation metadata created and maintained by operational repositories for assessing basic preservation properties. The PHC project seeks to develop an implementable logic to support…

  1. Integrity Checking and Maintenance with Active Rules in XML Databases

    DEFF Research Database (Denmark)

    Christiansen, Henning; Rekouts, Maria

    2007-01-01

    While specification languages for integrity constraints for XML data have been considered in the literature, actual technologies and methodologies for checking and maintaining integrity are still in their infancy. Triggers, or active rules, which are widely used in previous technologies for the p...

  2. Surrogate headform accelerations associated with stick checks in girls' lacrosse.

    Science.gov (United States)

    Crisco, Joseph J; Costa, Laura; Rich, Ryan; Schwartz, Joel B; Wilcox, Bethany

    2015-04-01

    Girls' lacrosse is fundamentally a different sport than boys' lacrosse, and girls are not required to wear protective headgear. Recent epidemiological studies have found that stick checks are the leading cause of concussion injury in girls' lacrosse. The purpose of this study was to determine stick check speeds and estimate the head acceleration associated with direct checks to the head. In addition, we briefly examine if commercially available headgear can mitigate the accelerations. Seven (n = 7) experienced female lacrosse players checked, with varying severity, a NOSCAE and an ASTM headform. Stick speed at impact and the associated peak linear accelerations of the headform were recorded. The NOCSAE headform was fitted with four commercially available headgear and similar stick impact testing was performed. The median stick impact speed was 8.1 m/s and 777 deg/s. At these speeds, peak linear acceleration was approximately 60g. Three out of the four headgear significantly reduced the peak linear acceleration when compared with the bare headform. These data serve as baseline for understanding the potential mechanism and reduction of concussions from stick impacts in girls' lacrosse.

  3. Model checking conditional CSL for continuous-time Markov chains

    DEFF Research Database (Denmark)

    Gao, Yang; Xu, Ming; Zhan, Naijun;

    2013-01-01

    In this paper, we consider the model-checking problem of continuous-time Markov chains (CTMCs) with respect to conditional logic. To the end, we extend Continuous Stochastic Logic introduced in Aziz et al. (2000) [1] to Conditional Continuous Stochastic Logic (CCSL) by introducing a conditional...

  4. Applied Bounded Model Checking for Interlocking System Designs

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, Jan; Pinger, Ralf

    2014-01-01

    of behavioural (operational) semantics. The former checks that the plant model – that is, the software components reflecting the physical components of the interlocking system – has been set up in an adequate way. The latter investigates trains moving through the network, with the objective to uncover potential...

  5. Lessons Learned Model Checking an Industrial Communications Library

    Science.gov (United States)

    2005-09-01

    Lecture Notes in Computer Science [LNCS], volume 2057). Toronto, Canada, May 19-20, 2001. Berlin...Model Checking,” 128-147. Integrated Formal Methods: The 4th International Conference (IFM 2004) ( Lecture Notes in Computer Science [LNCS], volume...on Computer Aided Verification (CAV 1990). ( Lecture Notes in Computer Science [LNCS], volume 531). New Brunswick, NJ, June 18-21, 1990.

  6. Feasibility Checking for Dial-a-Ride Problems

    DEFF Research Database (Denmark)

    Haugland, Dag; Ho, Sin C.

    Hunsaker and Savelsbergh have proposed an algorithm for testing feasibility of a route in the solution to the dial-a-ride problem. The constraints that are checked are load capacity constraints, time windows, ride time bounds and wait time bounds. The algorithm has linear running time. By virtue...

  7. Mandatory Identification Bar Checks: How Bouncers Are Doing Their Job

    Science.gov (United States)

    Monk-Turner, Elizabeth; Allen, John; Casten, John; Cowling, Catherine; Gray, Charles; Guhr, David; Hoofnagle, Kara; Huffman, Jessica; Mina, Moises; Moore, Brian

    2011-01-01

    The behavior of bouncers at on site establishments that served alcohol was observed. Our aim was to better understand how bouncers went about their job when the bar had a mandatory policy to check identification of all customers. Utilizing an ethnographic decision model, we found that bouncers were significantly more likely to card customers that…

  8. Level of agency in sub-clinical checking.

    Science.gov (United States)

    Belayachi, S; Van der Linden, M

    2009-03-01

    This study examined cognitive representations of routine action, through the assessment of level of agency, in individuals with sub-clinical checking. The level of agency stems from Action Identification Theory [Vallacher, R. R., Wegner, D. M. (1989). Levels of personal agency: Individual variation in action identification. Journal of Personality and Social Psychology 57, 660-671], which states that how actions are usually identified (based on instrumental aspects or purpose) reflects the predominant accessibility of internal representation (movements executed vs. goal pursued). Furthermore, this framework proposed that altered action regulation is related to low-level of agency (i.e., action identification at an instrumental level). In the current study, the main result indicated that checking symptoms were related to a low-level of agency, that is, individuals with sub-clinical checking identified habitual actions on the basis of instrumental aspects. This seems to indicate that checkers may act with a lack of goal representations. The results are discussed in terms of the role of low-level of agency in checking phenomena and related cognitive dysfunction.

  9. Model Checking Timed Automata with Priorities using DBM Subtraction

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Pettersson, Paul;

    2006-01-01

    In this paper we describe an extension of timed automata with priorities, and efficient algorithms to compute subtraction on DBMs (difference bounded matrices), needed in symbolic model-checking of timed automata with priorities. The subtraction is one of the few operations on DBMs that result in...

  10. First experiences with the LHC BLM sanity checks

    CERN Document Server

    Emery, J; Effinger, E; Nordt, A; Sapinski, M G; Zamantzas, C

    2010-01-01

    The reliability concerns have driven the design of the Large Hardron Collider (LHC) Beam Loss Monitoring (BLM) system from the early stage of the studies up to the present commissioning and the latest development of diagnostic tools. To protect the system against non-conformities, new ways of automatic checking have been developed and implemented. These checks are regularly and systematically executed by the LHC operation team to ensure that the system status is after each test "as good as new". The sanity checks are part of this strategy. They are testing the electrical part of the detectors (ionisation chamber or secondary emission detector), their cable connections to the front-end electronics, further connections to the back-end electronics and their ability to request a beam abort. During the installation and in the early commissioning phase, these checks have shown their ability to find also non-conformities caused by unexpected failure event scenarios. In every day operation, a non-conformity discovere...

  11. Generation of serine/threonine check points in HN(C)N spectra

    Indian Academy of Sciences (India)

    Dinesh Kumar; Jeetender Chugh; Ramakrishna V Hosur

    2009-11-01

    We describe here a simple modification of the HN(C)N experiment for the generation of serine/threonine check points in the three-dimensional experiment. The various `triplet of residue’ specific peak patterns in the spectra are documented for ease of analysis and sequential backbone resonance assignment. The performance of this experiment, referred to as HN(C)N-ST, is demonstrated using two proteins, one properly folded and the other completely denatured. It is noteworthy that, even in the denatured protein, where spectral dispersions are rather poor, about 90% of the sequential connectivities through the chain could be established from this single experiment. This would have great implications for structural genomics efforts.

  12. Check dams effects on sediment transport in steep slope flume

    Science.gov (United States)

    Piton, Guillaume; Recking, Alain

    2014-05-01

    Depending on many influences (geology, relief, hydrology, land use, etc.) some mountainous watershed are prone to cause casualties and facilities damages. Large amounts of sediments episodically released by torrents are often the biggest problem in torrent related hazard mitigation. Series of transversal structures as check dams and ground sills are often used in the panel of risk mitigation technics. A large literature exits on check dams and it mainly concerns engineering design, e.g. toe scouring, stability stress diagram, changes in upper and lower reaches equilibrium slopes. Check dams in steep slope rivers constitute fixed points in the bed profile and prevent general bed incision. However their influence on sediment transport once they are filled is not yet clear. Two flume test campaigns, synthetize in Table 1, were performed to investigate this question: Table 1 : experiment plan Run (duration) Ref1 (50h)CD1a (30h)CD1b (30h)Ref2 (92h)CD2 (18h) Solid feeding discharge (g.s^-1) 44 44 44 60 60 Number of check dams none 1 3 none 2 A nearly 5-m-long, 10-cm-wide and 12%-steep flume was used. The water discharge was set to 0,55 l/s in all runs. A mixture of poorly sorted natural sediments with diameters between 0.8 and 40 mm was used. An open solid-discharge-feeding circuit kept the inlet sediment flux constant during all experiments. As both feeding rates did not present variation, changes in outlet solid discharge were assumed to be due to bed variations in the bed storage. We observed strong fluctuations of solid flux and slope in each reaches of all runs between: (i) steep aggradating armoured bed and (ii) less steep and finer bed releasing bedload sheets during erosion events and inducing bedload pulses. All experiments showed consistent results: transported volume associated with erosion event decreased with the length between two subsequent check dams. Solid transversal structures shorten the upstream erosion-propagation and avoid downstream change in the

  13. Efficient family-based model checking via variability abstractions

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar; Al-Sibahi, Ahmad Salim; Brabrand, Claus

    2016-01-01

    variational models using the standard version of (single-system) Spin. The variability abstractions are first defined as Galois connections on semantic domains. We then show how to use them for defining abstract family-based model checking, where a variability model is replaced with an abstract version of it......Many software systems are variational: they can be configured to meet diverse sets of requirements. They can produce a (potentially huge) number of related systems, known as products or variants, by systematically reusing common parts. For variational models (variational systems or families...... of related systems), specialized family-based model checking algorithms allow efficient verification of multiple variants, simultaneously, in a single run. These algorithms, implemented in a tool Snip, scale much better than ``the brute force'' approach, where all individual systems are verified using...

  14. HDL Implementation of Low Density Parity Check (LDPC Decoder

    Directory of Open Access Journals (Sweden)

    Pawandip Kaur

    2012-03-01

    Full Text Available Low-Density Parity-Check (LDPC codes are one of the most promising error-correcting codes approaching Shannon capacity and have been adopted in many applications. These codes offer huge advantages in terms of coding gain, throughput and power dissipation. Error correction algorithms are often implemented in hardware for fast processing to meet the real-time needs of communication systems. However hardwareimplementation of LDPC decoders using traditional Hardware Description Language (HDL based approach is a complex and time consuming task. In this paper HDL Implementation of Low Density Parity Check Decoder architecture is presented with different rates i.e. 1/2, 2/3, 3/4, 4/7, 8/9, 9/10 and variable data lengths i.e. 8, 16, 32, 64, 128, 256 bits and consequent changeable precision factor.

  15. A Novel Nanometric Reversible Signed Divider with Overflow Checking Capability

    Directory of Open Access Journals (Sweden)

    Faraz Dastan

    2012-03-01

    Full Text Available One of the best approaches for designing future computers is that we use reversible logic. Reversible logic circuits have lower power consumption than the common circuits, used in computers nowadays. In this study we propose a new reversible division circuit. This reversible division circuit is signed divider and has an overflow checking capability. Among the designed and proposed reversible division circuits, our proposed division circuit is the first reversible signed divider with overflow checking capability which has been designed. In this circuit we use some reversible components like reversible parallel adder, reversible left-shift register, reversible multiplexer, reversible n-bit register and reversible n-bit register with parallel load line. In this paper all the scales are in the nanometric area.

  16. Checking for Optimal Solutions in Some NP-Complete Problems

    Science.gov (United States)

    Bauer, Michel; Orland, Henri

    2005-09-01

    For some weighted NP-complete problems, checking whether a proposed solution is optimal is a nontrivial task. Such is the case for the traveling salesman problem, or the spin-glass problem in three dimensions. In this Letter, we consider the weighted tripartite matching problem, a well known NP-complete problem. We write mean-field finite temperature equations for this model and derive their zero temperature limit. We show that any solution of the zero temperature equations provides an exact absolute ground state of the system. As a consequence, we propose a criterion which can be checked in polynomial time, and such that given a putative optimal solution, if the criterion is satisfied, then the solution is indeed optimal. This criterion is generalized to a class of variants of the multiple traveling salesmen problems.

  17. Spectral Shape of Check-Hybrid GLDPC Codes

    CERN Document Server

    Paolini, Enrico; Chiani, Marco; Fossorier, Marc P C

    2010-01-01

    This paper analyzes the asymptotic exponent of both the weight spectrum and the stopping set size spectrum for a class of generalized low-density parity-check (GLDPC) codes. Specifically, all variable nodes (VNs) are assumed to have the same degree (regular VN set), while the check node (CN) set is assumed to be composed of a mixture of different linear block codes (hybrid CN set). A simple expression for the exponent (which is also referred to as the growth rate or the spectral shape) is developed. This expression is consistent with previous results, including the case where the normalized weight or stopping set size tends to zero. Furthermore, it is shown how certain symmetry properties of the local weight distribution at the CNs induce a symmetry in the overall weight spectral shape function.

  18. A Succinct Approach to Static Analysis and Model Checking

    DEFF Research Database (Denmark)

    Filipiuk, Piotr

    In a number of areas software correctness is crucial, therefore it is often desirable to formally verify the presence of various properties or the absence of errors. This thesis presents a framework for concisely expressing static analysis and model checking problems. The framework facilitates...... in the classical formulation of ALFP logic. Finally, we show that the logics and the associated solvers can be used for rapid prototyping. We illustrate that by a variety of case studies from static analysis and model checking....... rapid prototyping of new analyses and consists of variants of ALFP logic and associated solvers. First, we present a Lattice based Least Fixed Point Logic (LLFP) that allows interpretations over complete lattices satisfying Ascending Chain Condition. We establish a Moore Family result for LLFP...

  19. Mixed Portmanteau Test for Diagnostic Checking of Time Series Models

    Directory of Open Access Journals (Sweden)

    Sohail Chand

    2014-01-01

    Full Text Available Model criticism is an important stage of model building and thus goodness of fit tests provides a set of tools for diagnostic checking of the fitted model. Several tests are suggested in literature for diagnostic checking. These tests use autocorrelation or partial autocorrelation in the residuals to criticize the adequacy of fitted model. The main idea underlying these portmanteau tests is to identify if there is any dependence structure which is yet unexplained by the fitted model. In this paper, we suggest mixed portmanteau tests based on autocorrelation and partial autocorrelation functions of the residuals. We derived the asymptotic distribution of the mixture test and studied its size and power using Monte Carlo simulations.

  20. Asymptomatic brain tumor detected at brain check-up

    Energy Technology Data Exchange (ETDEWEB)

    Onizuka, Masanari; Suyama, Kazuhiko; Shibayama, Akira; Hiura, Tsuyoshi; Horie, Nobutaka; Miyazaki, Hisaya [Sankoukai Miyazaki Hospital, Isahaya, Nagasaki (Japan)

    2001-09-01

    Brain check-up was performed in 4000 healthy subjects who underwent medical and radiological examinations for possible brain diseases in our hospital from April 1996 to March 2000. Magnetic resonance imaging revealed 11 brain tumors which consisted of six meningiomas, three pituitary adenomas, one astrocytoma, and one epidermoid cyst. The detection rate of incidental brain tumor in our hospital was 0.3%. Nine patients underwent surgery, with one case of morbidity due to postoperative transient oculomotor nerve paresis. The widespread use of brain check-up may increasingly detect asymptomatic brain tumors. Surgical indications for such lesions remain unclear, and the strategy for treatment should be determined with consideration of the patient's wishes. (author)

  1. Model Checking Real-Time Value-Passing Systems

    Institute of Scientific and Technical Information of China (English)

    Jing Chen; Zio-Ning Cao

    2004-01-01

    In this paper,to model check real-time value-passing systems,a formal language Timed Symbolic Transition Graph and a logic system named Timed Predicate μ-Calculus are proposed.An algorithm is presented which is local in that it generates and investigates the reachable state space in top-down fashion and maintains the partition for time evaluations as coarse as possible while on-the-fly instantiating data variables.It can deal with not only data variables with finite value domain,but also the so called data independent variables with infinite value domain.To authors knowledge,this is the first algorithm for model checking timed systems containing value-passing features.

  2. Analysis of DIRAC's behavior using model checking with process algebra

    CERN Document Server

    Remenska, Daniela; Willemse, Tim; Bal, Henri; Verstoep, Kees; Fokkink, Wan; Charpentier, Philippe; Diaz, Ricardo Graciani; Lanciotti, Elisa; Roiser, Stefan; Ciba, Krzysztof

    2012-01-01

    DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple, the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike con...

  3. SMT-based Bounded Model Checking with Difference Logic Constraints

    CERN Document Server

    Bersani, Marcello M; Morzenti, Angelo; Pradella, Matteo; Rossi, Matteo; Pietro, Pierluigi San

    2010-01-01

    Traditional Bounded Model Checking (BMC) is based on translating the model checking problem into SAT, the Boolean satisfiability problem. This paper introduces an encoding of Linear Temporal Logic with Past operators (PLTL) into the Quantifier-Free Difference Logic with Uninterpreted Functions (QF-UFIDL). The resulting encoding is a simpler and more concise version of existing SATbased encodings, currently used in BMC. In addition, we present an extension of PLTL augmented with arithmetic relations over integers, which can express unbounded counters; as such, the extended logic is more expressive than PLTL. We introduce suitable restrictions and assumptions that are shown to make the verification problem for the extended logic decidable, and we define an encoding of the new logic into QF-UFIDL. Finally, a performance comparison with the SAT-based approach on purely PLTL examples shows significant improvements in terms of both execution time and memory occupation.

  4. Non-trivial checks of novel consistency relations

    Energy Technology Data Exchange (ETDEWEB)

    Berezhiani, Lasha; Khoury, Justin [Center for Particle Cosmology, Department of Physics and Astronomy, University of Pennsylvania, Philadelphia, PA 19104 (United States); Wang, Junpu, E-mail: lashaber@gmail.com, E-mail: jkhoury@sas.upenn.edu, E-mail: jwang217@jhu.edu [Department of Physics and Astronomy, Johns Hopkins University, Baltimore, MD 21218 (United States)

    2014-06-01

    Single-field perturbations satisfy an infinite number of consistency relations constraining the squeezed limit of correlation functions at each order in the soft momentum. These can be understood as Ward identities for an infinite set of residual global symmetries, or equivalently as Slavnov-Taylor identities for spatial diffeomorphisms. In this paper, we perform a number of novel, non-trivial checks of the identities in the context of single field inflationary models with arbitrary sound speed. We focus for concreteness on identities involving 3-point functions with a soft external mode, and consider all possible scalar and tensor combinations for the hard-momentum modes. In all these cases, we check the consistency relations up to and including cubic order in the soft momentum. For this purpose, we compute for the first time the 3-point functions involving 2 scalars and 1 tensor, as well as 2 tensors and 1 scalar, for arbitrary sound speed.

  5. Non-Trivial Checks of Novel Consistency Relations

    CERN Document Server

    Berezhiani, Lasha; Wang, Junpu

    2014-01-01

    Single-field perturbations satisfy an infinite number of consistency relations constraining the squeezed limit of correlation functions at each order in the soft momentum. These can be understood as Ward identities for an infinite set of residual global symmetries, or equivalently as Slavnov-Taylor identities for spatial diffeomorphisms. In this paper, we perform a number of novel, non-trivial checks of the identities in the context of slow-roll single field inflationary models with arbitrary sound speed. We focus for concreteness on identities involving 3-point functions with a soft external mode, and consider all possible scalar and tensor combinations for the hard-momentum modes. In all these cases, we check the consistency relations up to and including cubic order in the soft momentum. For this purpose, we compute for the first time the 3-point functions involving 2 scalars and 1 tensor, as well as 2 tensors and 1 scalar, for arbitrary sound speed.

  6. Changes to criminal records checks used to safeguard vulnerable patients.

    Science.gov (United States)

    Griffith, Richard; Tengnah, Cassam

    2012-07-01

    The Protection of Freedoms Act 2012 is introducing changes to the Criminal Records Bureau (CRB) checks carried out on those people who work with vulnerable groups. The new law is the coalition Government's response to the criticism of the Safeguarding Vulnerable Group Act 2006. It will merge the CRB and Independent Safeguarding Authority into a new Disclosure and Barring Service and will enhance the rights of applicants to challenge the CRB's right to disclose non-conviction information as part of an enhanced criminal records check. In the first of two articles on the Protection of Freedoms Act 2012, Richard Griffith and Cassam Tengnah discuss the current framework for disclosing criminal records and the impact of the changes on district nurses applying for new posts.

  7. Detecting feature interactions in Web services with model checking techniques

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    As a platform-independent software system, a Web service is designed to offer interoperability among diverse and heterogeneous applications.With the introduction of service composition in the Web service creation, various message interactions among the atomic services result in a problem resembling the feature interaction problem in the telecommunication area.This article defines the problem as feature interaction in Web services and proposes a model checking-based detection method.In the method, the Web service description is translated to the Promela language - the input language of the model checker simple promela interpreter (SPIN), and the specific properties, expressed as linear temporal logic (LTL) formulas, are formulated according to our classification of feature interaction.Then, SPIN is used to check these specific properties to detect the feature interaction in Web services.

  8. Model checking abstract state machines with answer set programming

    OpenAIRE

    2006-01-01

    Answer Set Programming (ASP) is a logic programming paradigm that has been shown as a useful tool in various application areas due to its expressive modelling language. These application areas include Bourided Model Checking (BMC). BMC is a verification technique that is recognized for its strong ability of finding errors in computer systems. To apply BMC, a system needs to be modelled in a formal specification language, such as the widely used formalism of Abstract State Machines (ASMs). In ...

  9. Logic Model Checking of Unintended Acceleration Claims in Toyota Vehicles

    Science.gov (United States)

    Gamble, Ed

    2012-01-01

    Part of the US Department of Transportation investigation of Toyota sudden unintended acceleration (SUA) involved analysis of the throttle control software, JPL Laboratory for Reliable Software applied several techniques including static analysis and logic model checking, to the software; A handful of logic models were build, Some weaknesses were identified; however, no cause for SUA was found; The full NASA report includes numerous other analyses

  10. Building Reusable Software Component For Optimization Check in ABAP Coding

    OpenAIRE

    Shireesha, P.; S.S.V.N.Sharma

    2010-01-01

    Software component reuse is the software engineering practice of developing new software products from existing components. A reuse library or component reuse repository organizes stores and manages reusable components. This paper describes how a reusable component is created, how it reuses the function and checking if optimized code is being used in building programs and applications. Finally providing coding guidelines, standards and best practices used for creating reusable components and ...

  11. Proof Validation in Real Analysis: Inferring and Checking Warrants

    Science.gov (United States)

    Alcock, Lara; Weber, Keith

    2005-01-01

    In the study reported here, we investigate the skills needed to validate a proof in real analysis, i.e., to determine whether a proof is valid. We first argue that when one is validating a proof, it is not sufficient to make certain that each statement in the argument is true. One must also check that there is good reason to believe that each…

  12. Strength Check Analysis for Gear Shaft of Automobile Transmission

    OpenAIRE

    Yongxiang Li; Weiqiang Xia; Liwen Nan; Youjia Zhao; Fujin Yu

    2013-01-01

    As the main drive components of the automobile transmission, the performance of gear shaft plays an important role on transmission performance. Aiming at the existing problems of the traditional strength check method of gear shaft, the objective of this study is to take a five-speed transmission as an example, to accomplish the strength analysis of gear shaft of the automobile transmission based on the MASTA software. Furthermore, the simulation modeling of the transmission is built completel...

  13. A Graphical μ-Calculus and Local Model Checking

    Institute of Scientific and Technical Information of China (English)

    林惠民

    2002-01-01

    A graphical notation for the propositionalμ-calculus, called modal graphs, ispresented. It is shown that both the textual and equational presentations of theμ-calculus canbe translated into modal graphs. A model checking algorithm based on such graphs is proposed.The algorithm is truly local in the sense that it only generates the parts of the underlyingsearch space which are necessary for the computation of the final result. The correctness of thealgorithm is proven and its complexity analysed.

  14. Building Reusable Software Component For Optimization Check in ABAP Coding

    Directory of Open Access Journals (Sweden)

    P.Shireesha

    2010-07-01

    Full Text Available Software component reuse is the software engineering practice of developing newsoftware products from existing components. A reuse library or component reuserepository organizes stores and manages reusable components. This paper describeshow a reusable component is created, how it reuses the function and checking ifoptimized code is being used in building programs and applications. Finally providingcoding guidelines, standards and best practices used for creating reusable componentsand guidelines and best practices for making configurable and easy to use.

  15. Grounding devices of electrical equipment's installation and check to maintain

    Institute of Scientific and Technical Information of China (English)

    王鹏

    2009-01-01

    At this stage in real life,the incidents of electricity are increasing,the main reason is that the subjective sense is weak,non-importance,especially the operation and maintenance is more neglected,and even there is no sense in this area.In this paper,based on electrical equipment grounding system for use in practice,simple introdusing grounding device of electrical equipment's installation and maintenance checks.

  16. Model Checking Processes Specified In Join-Calculus Algebra

    Directory of Open Access Journals (Sweden)

    Sławomir Piotr Maludziński

    2014-01-01

    Full Text Available This article presents a model checking tool used to verify concurrent systems specified in join-calculus algebra. The temporal properties of systems under verification are expressed in CTL logic. Join-calculus algebra with its operational semantics defined by the chemical abstract machine serves as the basic method for the specification of concurrent systems and their synchronization mechanisms, and allows the examination of more complex systems.

  17. Model Checking with Multi-Threaded IC3 Portfolios

    Science.gov (United States)

    2015-01-15

    Model Checking with Multi-Threaded IC3 Portfolios Sagar Chaki and Derrick Karimi Software Engineering Institute, Carnegie Mellon University {chaki...different runs varies randomly depending on the thread interleaving. The use of a portfolio of solvers to maximize the likelihood of a quick solution is...investigated. Using the Extreme Value theorem, the runtime of each variant, as well as their portfolios is analysed statistically. A formula for the

  18. Building Reusable Software Component For Optimization Check in ABAP Coding

    CERN Document Server

    Shireesha, P; 10.5121/ijsea.2010.1303

    2010-01-01

    Software component reuse is the software engineering practice of developing new software products from existing components. A reuse library or component reuse repository organizes stores and manages reusable components. This paper describes how a reusable component is created, how it reuses the function and checking if optimized code is being used in building programs and applications. Finally providing coding guidelines, standards and best practices used for creating reusable components and guidelines and best practices for making configurable and easy to use.

  19. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  20. Assembly-Line Health Check up in Digitalized Hospital

    Institute of Scientific and Technical Information of China (English)

    刘雅兰; 姚斌; 张子刚

    2002-01-01

    Summary: The health check up flow of digital hospital can be consulted with the assembly line ofindustry factory. Because they have the following same features: highly specialized workstation,closeness and continuance, rhythm, balanced production, continuous production. The essentialprerequisites are as the follows: The inspecting items and methods should be stable; advancedproduct mix and stable production design; standardized raw material, consumption, procedure,inspection method; there are lots of request for health inspection; the customers move at the leastunit; the space arrangement should be reasonable; the time arrangement should be proportion.With the computer net, the digital inspection can achieves the raw material controlling accurately.The basis of check up line concerns about equipment, net and software, data collection, and per-sonnel. The group technology is used in the health inspection flow design of the digital hospital inthe field of items customers and zone redivided. The digital assembly linemic health inspect has thefollowing stages: member registering, notice, check in, arrange order, time control, report, feed-back and analysis. The assembly linemic has following advantages: increasing the productivity,the space utility, satisfaction of customer, fund returning, lowering the cost and ensuring thequality.

  1. Network segregation in a model of misinformation and fact checking

    CERN Document Server

    Tambuscio, Marcella; Ciampaglia, Giovanni Luca; Ruffo, Giancarlo

    2016-01-01

    Misinformation under the form of rumor, hoaxes, and conspiracy theories spreads on social media at alarming rates. One hypothesis is that, since social media are shaped by homophily, belief in misinformation may be more likely to thrive on those social circles that are segregated from the rest of the network. One possible antidote is fact checking which, in some cases, is known to stop rumors from spreading further. However, fact checking may also backfire and reinforce the belief in a hoax. Here we take into account the combination of network segregation, finite memory and attention, and fact-checking efforts. We consider a compartmental model of two interacting epidemic processes over a network that is segregated between gullible and skeptic users. Extensive simulation and mean-field analysis show that a more segregated network facilitates the spread of a hoax only at low forgetting rates, but has no effect when agents forget at faster rates. This finding may inform the development of mitigation techniques ...

  2. Approximating Attractors of Boolean Networks by Iterative CTL Model Checking.

    Science.gov (United States)

    Klarner, Hannes; Siebert, Heike

    2015-01-01

    This paper introduces the notion of approximating asynchronous attractors of Boolean networks by minimal trap spaces. We define three criteria for determining the quality of an approximation: "faithfulness" which requires that the oscillating variables of all attractors in a trap space correspond to their dimensions, "univocality" which requires that there is a unique attractor in each trap space, and "completeness" which requires that there are no attractors outside of a given set of trap spaces. Each is a reachability property for which we give equivalent model checking queries. Whereas faithfulness and univocality can be decided by model checking the corresponding subnetworks, the naive query for completeness must be evaluated on the full state space. Our main result is an alternative approach which is based on the iterative refinement of an initially poor approximation. The algorithm detects so-called autonomous sets in the interaction graph, variables that contain all their regulators, and considers their intersection and extension in order to perform model checking on the smallest possible state spaces. A benchmark, in which we apply the algorithm to 18 published Boolean networks, is given. In each case, the minimal trap spaces are faithful, univocal, and complete, which suggests that they are in general good approximations for the asymptotics of Boolean networks.

  3. Improved Trial Division Technique for Primality Checking in RSA Algorithm

    Directory of Open Access Journals (Sweden)

    Kumarjit Banerjee

    2012-07-01

    Full Text Available The RSA cryptosystem, invented by Ron Rivest, Adi Shamir and Len Adleman was first publicized in the August 1977 issue of Scientific American. The security level of this algorithm very much depends on two large prime numbers. To check the primality of large number in personal computer is huge time consuming using the best known trial division algorithm. The time complexity for primality testing has been reduced using the representation of divisors in the form of 6n±1. According to the fundamental theorem of Arithmetic, every number has unique factorization. So to check primality, it is sufficient to check if the number is divisible by any prime below the square root of the number. The set of divisors obtained by 6n±1 form representation contains many composites. These composite numbers have been reduced by 30k approach. In this paper, the number of composites has been further reduced using 210k approach. A performance analysis in time complexity has been given between 210k approach and other prior applied methods. It has been observed that the time complexity for primality testing has been reduced using 210k approach.

  4. Energy reduction through voltage scaling and lightweight checking

    Science.gov (United States)

    Kadric, Edin

    As the semiconductor roadmap reaches smaller feature sizes and the end of Dennard Scaling, design goals change, and managing the power envelope often dominates delay minimization. Voltage scaling remains a powerful tool to reduce energy. We find that it results in about 60% geomean energy reduction on top of other common low-energy optimizations with 22nm CMOS technology. However, when voltage is reduced, it becomes easier for noise and particle strikes to upset a node, potentially causing Silent Data Corruption (SDC). The 60% energy reduction, therefore, comes with a significant drop in reliability. Duplication with checking and triple-modular redundancy are traditional approaches used to combat transient errors, but spending 2--3x the energy for redundant computation can diminish or reverse the benefits of voltage scaling. As an alternative, we explore the opportunity to use checking operations that are cheaper than the base computation they are guarding. We devise a classification system for applications and their lightweight checking characteristics. In particular, we identify and evaluate the effectiveness of lightweight checks in a broad set of common tasks in scientific computing and signal processing. We find that the lightweight checks cost only a fraction of the base computation (0-25%) and allow us to recover the reliability losses from voltage scaling. Overall, we show about 50% net energy reduction without compromising reliability compared to operation at the nominal voltage. We use FPGAs (Field-Programmable Gate Arrays) in our work, although the same ideas can be applied to different systems. On top of voltage scaling, we explore other common low-energy techniques for FPGAs: transmission gates, gate boosting, power gating, low-leakage (high-Vth) processes, and dual-V dd architectures. We do not scale voltage for memories, so lower voltages help us reduce logic and interconnect energy, but not memory energy. At lower voltages, memories become dominant

  5. Mobile Attendance Checking System on Android Platform for Kazakhstani University

    Science.gov (United States)

    Saparkhojayev, N.; Shakhov, E.; Mailybayev, Y.

    2016-04-01

    In the 21st century-the century of Information Technology, it is difficult to imagine life without any gadgets: phones, tablets, computers, laptops, and so on. Today, smartphones and tablets are becoming popular, and thus their operating systems become popular too. Android is designed for low-power devices that run on battery power at full capacity, using all of its services, such as cameras, lights, GPS navigation, Wi-Fi, etc. In Kazakhstani universities, the process of checking students’ attendance is one of the important issues, because final grade evaluation of students is based on their total number of appearances and their grades during the whole semester. This raises the question of having some tool to control students’ attendance. There are many possible ways of controlling attendance: there are many examples when universities prefer to control attendance by the use of paper sheet, and some universities prefer to use two-stage way of controlling attendance: firstly, teachers and professors use paper sheet for checking students’ attendance and after this, they fill out these information into a system manually. However, this is not an efficient way since there will be spent much of time for calling students names and putting marks like “presence” or “absence” if the class is a lecture class, and in this class at least 5 groups are presented. Furthermore, some students may call his/her friend as “presence” nevertheless to the fact that this student is currently absent. After taking into consideration all these issues and the fact that many gadgets use Android platform, authors of the following research paper decided to create a mobile system that makes easier to check students’ attendance automatically, and this system is implemented in Almaty Management University, Kazakhstan. The system is based on Android platform, and in this paper, details of this system are presented.

  6. 76 FR 69287 - National Instant Criminal Background Check System Section Agency Information Collection...

    Science.gov (United States)

    2011-11-08

    ... Federal Bureau of Investigation National Instant Criminal Background Check System Section Agency Information Collection Activities: Existing collection, comments requested the Voluntary Appeal File (VAF... Criminal Justice Information Services (CJIS) Division's National Instant Criminal Background Check...

  7. Using Stochastic Model Checking to Provision Complex Business Services

    DEFF Research Database (Denmark)

    Herbert, Luke Thomas; Sharp, Robin

    2012-01-01

    bounds on resources consumed during execution of business processes. Accurate resource provisioning is often central to ensuring the safe execution of a process. We first introduce a formalised core subset of the Business Process Modelling and Notation (BPMN), which we extend with probabilistic and non......-deterministic branching and reward annotations. We then develop an algorithm for the efficient translation of these models into the guarded command language used by the model checker PRISM, in turn enabling model checking of BPMN processes and allowing for the calculation of a wide range of quantitative properties...

  8. Optimisation of BPMN Business Models via Model Checking

    DEFF Research Database (Denmark)

    Herbert, Luke Thomas; Sharp, Robin

    2013-01-01

    We present a framework for the optimisation of business processes modelled in the business process modelling language BPMN, which builds upon earlier work, where we developed a model checking based method for the analysis of BPMN models. We define a structure for expressing optimisation goals...... for synthesized BPMN components, based on probabilistic computation tree logic and real-valued reward structures of the BPMN model, allowing for the specification of complex quantitative goals. We here present a simple algorithm, inspired by concepts from evolutionary algorithms, which iteratively generates...

  9. Modelling Chinese Smart Grid: A Stochastic Model Checking Case Study

    CERN Document Server

    Yüksel, Ender; Nielson, Flemming; Zhu, Huibiao; Huang, Heqing

    2012-01-01

    Cyber-physical systems integrate information and communication technology functions to the physical elements of a system for monitoring and controlling purposes. The conversion of traditional power grid into a smart grid, a fundamental example of a cyber-physical system, raises a number of issues that require novel methods and applications. In this context, an important issue is the verification of certain quantitative properties of the system. In this technical report, we consider a specific Chinese Smart Grid implementation and try to address the verification problem for certain quantitative properties including performance and battery consumption. We employ stochastic model checking approach and present our modelling and analysis study using PRISM model checker.

  10. Model Checking Data Consistency for Cache Coherence Protocols

    Institute of Scientific and Technical Information of China (English)

    Hong Pan; Hui-Min Lin; Yi Lv

    2006-01-01

    A method for automatic verification of cache coherence protocols is presented, in which cache coherence protocols are modeled as concurrent value-passing processes, and control and data consistency requirement are described as formulas in first-orderμ-calculus. A model checker is employed to check if the protocol under investigation satisfies the required properties. Using this method a data consistency error has been revealed in a well-known cache coherence protocol.The error has been corrected, and the revised protocol has been shown free from data consistency error for any data domain size, by appealing to data independence technique.

  11. Android Security (Decompilation of APK File to Check Permissions

    Directory of Open Access Journals (Sweden)

    Hemant Bansal

    2016-01-01

    Full Text Available The world wide revolution in Android technology is changing our lives in term of the way we learn and use. Android Security fits into this because the technology has been around long enough and can provide various benefits for security in this area. The main objective of this paper is to Decompile the Android App And Check the permissions Used By That App (What The permissions any app is accessing Like reading messages, Using our internet data, reading our call logs. This Research Paper Helps Peoples To aware About the Un necessary Applications and Their Permissions That Are in Our Phone Stealing Our Credit Card details, secret details etc.

  12. [Discharge of very preterm infants from neonatology: check list].

    Science.gov (United States)

    Arnaud, F

    2004-02-01

    Key elements of the check list for neonatal discharge include: discharge discussion with parents, relation with maternal and child welfare assistants and family practitioner, scheduling of follow-up visits, request for insurance coverage, parental presence allowance, special education allowance, debriefing with nurses and nurses providers, clinical and biological appraisal, discharge prescription. For a former extremely premature baby, going home - often after a long hospitalization and a variety of pathologic problems - must be prepared and should not be decided in haste, not only for the baby and his/her parents, but also. for the neonatal staff!

  13. Astronaut Charles Conrad checks out Human Vestibular Function experiment

    Science.gov (United States)

    1973-01-01

    Astronaut Charles Conrad Jr., commander of the first manned Skylab mission, checks out the Human Vestibular Function, Experiment M131, during Skylab training at JSC. Conrad is in the work and experiments compartment of the crew quarters of the Skylab Orbital Workshop (OWS) trainer at JSC. The reference sphere with a magnetic rod is used by the astronaut to indicate body orientation non-visually. The litter chair in which he is seated can be rotated by a motor at its base or, when not being rotated, can tilt forward, backward or to either side.

  14. Daily check of the electron beams with a diode system

    Energy Technology Data Exchange (ETDEWEB)

    Pilette, P. [Hospital Civil de Charleroi (Belgium). Centre for Radiotherapy

    1995-12-01

    A fast systems to check all the accelerator beams on a daily basis has been developed. A cheap home-made detector, based on non-medical diodes (type 1N5408), has been used since July 1992 to verify all the electron beams every day. The relative energy and Top-cGy correspondence is verified with one single irradiation of less than 1 minute by 6 diodes fixed in a polystyrene phantom. The principle of construction, software implementation and results are presented.

  15. Introduction of Virtualization Technology to Multi-Process Model Checking

    Science.gov (United States)

    Leungwattanakit, Watcharin; Artho, Cyrille; Hagiya, Masami; Tanabe, Yoshinori; Yamamoto, Mitsuharu

    2009-01-01

    Model checkers find failures in software by exploring every possible execution schedule. Java PathFinder (JPF), a Java model checker, has been extended recently to cover networked applications by caching data transferred in a communication channel. A target process is executed by JPF, whereas its peer process runs on a regular virtual machine outside. However, non-deterministic target programs may produce different output data in each schedule, causing the cache to restart the peer process to handle the different set of data. Virtualization tools could help us restore previous states of peers, eliminating peer restart. This paper proposes the application of virtualization technology to networked model checking, concentrating on JPF.

  16. Energy Audit Checks - A socioeconomic assessment; Energikartlaeggningscheckar - En samhaellsekonomisk utvaerdering

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-09-01

    This review is part of the Swedish Energy Agency's work with skills and methodology development on economic analyzes. The present socioeconomic analysis is the first of its kind to evaluate the current support for energy audit checks and is based on the instrument's purpose, goals and obstacles. Cost effectiveness is the main focus, as well as a description of the instrument's benefits and costs. The evaluation also aims to further develop the instrument in conjunction with the implementation of energy efficiency directive. Proposals for new instruments have however not been part of the mission.

  17. Injection Beam Loss and Beam Quality Checks for the LHC

    CERN Document Server

    Kain, Verena; Bartmann, Wolfgang; Bracco, Chiara; Drosdal, Lene; Holzer, Eva; Khasbulatov, Denis; Magnin, Nicolas; Meddahi, Malika; Nordt, Annika; Sapinski, Mariusz; Vogt, Mathias

    2010-01-01

    The quality of the injection into the LHC is monitored by a dedicated software system which acquires and analyses the pulse waveforms from the injection kickers, and measures key beam parameters and compares them with the nominal ones. The beam losses at injection are monitored on many critical devices in the injection regions, together with the longitudinal filling pattern and maximum trajectory offset on the first 100 turns. The paper describes the injection quality check system and the results from LHC beam commissioning, in particular the beam losses measured during injection at the various aperture limits. The results are extrapolated to full intensity and the consequences are discussed

  18. Equivalence Checking of Combinational Circuits using Boolean Expression Diagrams

    DEFF Research Database (Denmark)

    Hulgaard, Henrik; Williams, Poul Frederick; Andersen, Henrik Reif

    1999-01-01

    The combinational logic-level equivalence problem is to determine whether two given combinational circuits implement the same Boolean function. This problem arises in a number of CAD applications, for example when checking the correctness of incremental design changes (performed either manually...... or by a design automation tool).This paper introduces a data structure called Boolean Expression Diagrams (BEDs) and two algorithms for transforming a BED into a Reduced Ordered Binary Decision Diagram (OBDD). BEDs are capable of representing any Boolean circuit in linear space and can exploit structural...

  19. Optimizing ZigBee Security using Stochastic Model Checking

    CERN Document Server

    Yüksel, Ender; Nielson, Flemming; Fruth, Matthias; Kwiatkowska, Marta

    2012-01-01

    ZigBee is a fairly new but promising wireless sensor network standard that offers the advantages of simple and low resource communication. Nevertheless, security is of great concern to ZigBee, and enhancements are prescribed in the latest ZigBee specication: ZigBee-2007. In this technical report, we identify an important gap in the specification on key updates, and present a methodology for determining optimal key update policies and security parameters. We exploit the stochastic model checking approach using the probabilistic model checker PRISM, and assess the security needs for realistic application scenarios.

  20. Probabilistic Priority Message Checking Modeling Based on Controller Area Networks

    Science.gov (United States)

    Lin, Cheng-Min

    Although the probabilistic model checking tool called PRISM has been applied in many communication systems, such as wireless local area network, Bluetooth, and ZigBee, the technique is not used in a controller area network (CAN). In this paper, we use PRISM to model the mechanism of priority messages for CAN because the mechanism has allowed CAN to become the leader in serial communication for automobile and industry control. Through modeling CAN, it is easy to analyze the characteristic of CAN for further improving the security and efficiency of automobiles. The Markov chain model helps us to model the behaviour of priority messages.

  1. Model Checking Workflow Net Based on Petri Net

    Institute of Scientific and Technical Information of China (English)

    ZHOU Conghua; CHEN Zhenyu

    2006-01-01

    The soundness is a very important criterion for the correctness of the workflow.Specifying the soundness with Computation Tree Logic (CTL) allows us to verify the soundness with symbolic model checkers.Therefore the state explosion problem in verifying soundness can be overcome efficiently.When the property is not satisfied by the system,model checking can give a counter-example, which can guide us to correct the workflow.In addition, relaxed soundness is another important criterion for the workflow.We also prove that Computation Tree Logic * (CTL * ) can be used to character the relaxed soundness of the workflow.

  2. Optimizing ZigBee Security using Stochastic Model Checking

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    ZigBee is a fairly new but promising wireless sensor network standard that offers the advantages of simple and low resource communication. Nevertheless, security is of great concern to ZigBee, and enhancements are prescribed in the latest ZigBee specication: ZigBee-2007. In this technical report......, we identify an important gap in the specification on key updates, and present a methodology for determining optimal key update policies and security parameters. We exploit the stochastic model checking approach using the probabilistic model checker PRISM, and assess the security needs for realistic...

  3. 42 CFR 457.216 - Treatment of uncashed or canceled (voided) CHIP checks.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Treatment of uncashed or canceled (voided) CHIP... canceled (voided) CHIP checks. (a) Purpose. This section provides rules to ensure that States refund the... section— Canceled (voided) check means an CHIP check issued by a State or fiscal agent that prior to...

  4. Assessing Personality and Mood With Adjective Check List Methodology: A Review

    Science.gov (United States)

    Craig, Robert J.

    2005-01-01

    This article addresses the benefits and problems in using adjective check list methodology to assess personality. Recent developments in this assessment method are reviewed, emphasizing seminal adjective-based personality tests (Gough's Adjective Check List), mood tests (Lubin's Depressive Adjective Test, Multiple Affect Adjective Check List),…

  5. 30 CFR 75.902-1 - Maximum voltage ground check circuits.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Maximum voltage ground check circuits. 75.902-1... Alternating Current Circuits § 75.902-1 Maximum voltage ground check circuits. The maximum voltage used for such ground check circuits shall not exceed 40 volts....

  6. 30 CFR 75.803-1 - Maximum voltage ground check circuits.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Maximum voltage ground check circuits. 75.803-1 Section 75.803-1 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR COAL MINE... § 75.803-1 Maximum voltage ground check circuits. The maximum voltage used for ground check...

  7. 28 CFR 105.23 - Procedure for requesting criminal history record check.

    Science.gov (United States)

    2010-07-01

    ... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal... checks, declaring that it is an authorized employer that employs private security officers; that all fingerprints and requests for criminal history background checks are being submitted for private...

  8. High pressure check valve for application in a miniature cryogenic scorption cooler

    NARCIS (Netherlands)

    Burger, J.F.; Wekken, van der M.C.; Berenschot, E.; Holland, H.J.; Brake, ter H.J.M.; Rogalla, H.; Gardeniers, J.G.E.; Elwenspoek, M.

    1999-01-01

    This paper presents a check valve with integrated filter that can stand gas pressures of more than 100 bar in the closed direction and which has a very low pressure drop at low absolute gas pressures in the forward direction. The check valve is designed as a part of a check valve unit for applicatio

  9. Model-Checking with Edge-Valued Decision Diagrams

    Science.gov (United States)

    Roux, Pierre; Siminiceanu, Radu I.

    2010-01-01

    We describe an algebra of Edge-Valued Decision Diagrams (EVMDDs) to encode arithmetic functions and its implementation in a model checking library along with state-of-the-art algorithms for building the transition relation and the state space of discrete state systems. We provide efficient algorithms for manipulating EVMDDs and give upper bounds of the theoretical time complexity of these algorithms for all basic arithmetic and relational operators. We also demonstrate that the time complexity of the generic recursive algorithm for applying a binary operator on EVMDDs is no worse than that of Multi-Terminal Decision Diagrams. We have implemented a new symbolic model checker with the intention to represent in one formalism the best techniques available at the moment across a spectrum of existing tools: EVMDDs for encoding arithmetic expressions, identity-reduced MDDs for representing the transition relation, and the saturation algorithm for reachability analysis. We compare our new symbolic model checking EVMDD library with the widely used CUDD package and show that, in many cases, our tool is several orders of magnitude faster than CUDD.

  10. Model Checking Degrees of Belief in a System of Agents

    Science.gov (United States)

    Raimondi, Franco; Primero, Giuseppe; Rungta, Neha

    2014-01-01

    Reasoning about degrees of belief has been investigated in the past by a number of authors and has a number of practical applications in real life. In this paper we present a unified framework to model and verify degrees of belief in a system of agents. In particular, we describe an extension of the temporal-epistemic logic CTLK and we introduce a semantics based on interpreted systems for this extension. In this way, degrees of beliefs do not need to be provided externally, but can be derived automatically from the possible executions of the system, thereby providing a computationally grounded formalism. We leverage the semantics to (a) construct a model checking algorithm, (b) investigate its complexity, (c) provide a Java implementation of the model checking algorithm, and (d) evaluate our approach using the standard benchmark of the dining cryptographers. Finally, we provide a detailed case study: using our framework and our implementation, we assess and verify the situational awareness of the pilot of Air France 447 flying in off-nominal conditions.

  11. Model checking coalitional games in shortage resource scenarios

    Directory of Open Access Journals (Sweden)

    Dario Della Monica

    2013-07-01

    Full Text Available Verification of multi-agents systems (MAS has been recently studied taking into account the need of expressing resource bounds. Several logics for specifying properties of MAS have been presented in quite a variety of scenarios with bounded resources. In this paper, we study a different formalism, called Priced Resource-Bounded Alternating-time Temporal Logic (PRBATL, whose main novelty consists in moving the notion of resources from a syntactic level (part of the formula to a semantic one (part of the model. This allows us to track the evolution of the resource availability along the computations and provides us with a formalisms capable to model a number of real-world scenarios. Two relevant aspects are the notion of global availability of the resources on the market, that are shared by the agents, and the notion of price of resources, depending on their availability. In a previous work of ours, an initial step towards this new formalism was introduced, along with an EXPTIME algorithm for the model checking problem. In this paper we better analyze the features of the proposed formalism, also in comparison with previous approaches. The main technical contribution is the proof of the EXPTIME-hardness of the the model checking problem for PRBATL, based on a reduction from the acceptance problem for Linearly-Bounded Alternating Turing Machines. In particular, since the problem has multiple parameters, we show two fixed-parameter reductions.

  12. Stat-LRC: statistical rules check for variational lithography

    Science.gov (United States)

    Sreedhar, Aswin; Kundu, Sandip

    2010-03-01

    As interconnect densities increase with each technology generation, the lithographic processes required to print all features with acceptable irregularities have become more complex. Restricted design rules (RDR) and modelbased Design for Manufacturability (DFM) guidelines have been added to the existing Design Rule Check (DRC) software to prevent unprintable patterns to be drawn on the mask by predicting their imprint on the wafer. It is evident from analyses of predicted patterns that edge placement errors have a continuous distribution, hence a pass/fail cut-off is somewhat arbitrary. In this paper, we describe a methodology to perform Statistical Lithography Rules Check (Stat-LRC) involving design yield based on interconnect linewidth distribution for variation in lithographic input error sources. In this scheme, a list of error locations indicating polygons that have yield below a user specified threshold are listed. The overall design yield is recovered by trading-off slightly poorer EPE distributions for lines with short runs with excellent ones. The simulation/analysis environment is fully automated and yield recovery improvement has been demonstrated.

  13. Development of a stainless steel check valve for cryogenic applications

    Science.gov (United States)

    Veenstra, T. T.; Venhorst, G. C. F.; Burger, J. F.; Holland, H. J.; ter Brake, H. J. M.; Sirbi, A.; Rogalla, H.

    2007-02-01

    This paper describes the development of a check valve for use in a sorption compressor that will drive a 10 mW 4.5 K Joule-Thomson cryocooler. For the check valve extremely low backflow rates are tolerable at an operating temperature of the valve of 50 K. To fulfill these requirements, the sealing mechanism of the valve is based on a full metal to metal contact. In order to obtain sufficiently low leak rates, both parts were machined to a surface flatness in the order of 100 nm. In addition, the closing plate (boss) of the valve deforms (bends) slightly under pressure, forming itself to the opposite valve seat and thus reducing the gap between these parts. The measured leak flow at 50 K was 1.6 μg/s helium @ 16 bar pressure difference, which is well below the aim of 3 μg/s. The valve was subjected to an accelerated lifetime test of 300,000 cycles. It was observed that the leak flow through the valve during this test steadily decreased to a level of 0.15 μg/s after 100,000 cycles.

  14. Efficient Parallel Statistical Model Checking of Biochemical Networks

    Directory of Open Access Journals (Sweden)

    Paolo Ballarini

    2009-12-01

    Full Text Available We consider the problem of verifying stochastic models of biochemical networks against behavioral properties expressed in temporal logic terms. Exact probabilistic verification approaches such as, for example, CSL/PCTL model checking, are undermined by a huge computational demand which rule them out for most real case studies. Less demanding approaches, such as statistical model checking, estimate the likelihood that a property is satisfied by sampling executions out of the stochastic model. We propose a methodology for efficiently estimating the likelihood that a LTL property P holds of a stochastic model of a biochemical network. As with other statistical verification techniques, the methodology we propose uses a stochastic simulation algorithm for generating execution samples, however there are three key aspects that improve the efficiency: first, the sample generation is driven by on-the-fly verification of P which results in optimal overall simulation time. Second, the confidence interval estimation for the probability of P to hold is based on an efficient variant of the Wilson method which ensures a faster convergence. Third, the whole methodology is designed according to a parallel fashion and a prototype software tool has been implemented that performs the sampling/verification process in parallel over an HPC architecture.

  15. Maintenance Check-ups Following Treatment for Cannabis Dependence.

    Science.gov (United States)

    Walker, Denise D; Stephens, Robert S; Towe, Sheri; Banes, Kelsey; Roffman, Roger

    2015-09-01

    Substance use disorders, including cannabis use disorders and associated negative consequences, are best considered chronic and in need of continuing care. In contrast, most treatment efficacy studies evaluate a fixed number of intervention sessions at a single point in time. The present study evaluated the efficacy of posttreatment maintenance check-ups (MCUs) in maintaining and improving outcomes following nine sessions of motivational enhancement treatment/cognitive behavioral treatment (MET/CBT). Adults dependent on cannabis (n=74) were randomly assigned to the MCU or a no check-up (NCU) condition and followed up at 3- and 9-months. MCU sessions occurred 1 and 4months following the completion of the base treatment. Additional MET/CBT sessions were available to participants throughout the follow-up period. The MCUs specifically encouraged treatment re-entry for those showing ongoing signs of disorder. Participants in the MCU condition reported significantly greater abstinent rates at both follow-ups and were using on fewer days at the 3-month but not the 9-month follow-up. Contrary to hypotheses, MCU participants did not attend more additional treatment and differences in rates of cannabis use emerged prior to the first MCU session. Future research with longer follow-up periods and longer monitoring of outcomes is needed to fully evaluate the utility of MCUs or other forms of continuing care.

  16. Tarmo: A Framework for Parallelized Bounded Model Checking

    CERN Document Server

    Wieringa, Siert; Heljanko, Keijo; 10.4204/EPTCS.14.5

    2009-01-01

    This paper investigates approaches to parallelizing Bounded Model Checking (BMC) for shared memory environments as well as for clusters of workstations. We present a generic framework for parallelized BMC named Tarmo. Our framework can be used with any incremental SAT encoding for BMC but for the results in this paper we use only the current state-of-the-art encoding for full PLTL. Using this encoding allows us to check both safety and liveness properties, contrary to an earlier work on distributing BMC that is limited to safety properties only. Despite our focus on BMC after it has been translated to SAT, existing distributed SAT solvers are not well suited for our application. This is because solving a BMC problem is not solving a set of independent SAT instances but rather involves solving multiple related SAT instances, encoded incrementally, where the satisfiability of each instance corresponds to the existence of a counterexample of a specific length. Our framework includes a generic architecture for a ...

  17. Model-checking techniques based on cumulative residuals.

    Science.gov (United States)

    Lin, D Y; Wei, L J; Ying, Z

    2002-03-01

    Residuals have long been used for graphical and numerical examinations of the adequacy of regression models. Conventional residual analysis based on the plots of raw residuals or their smoothed curves is highly subjective, whereas most numerical goodness-of-fit tests provide little information about the nature of model misspecification. In this paper, we develop objective and informative model-checking techniques by taking the cumulative sums of residuals over certain coordinates (e.g., covariates or fitted values) or by considering some related aggregates of residuals, such as moving sums and moving averages. For a variety of statistical models and data structures, including generalized linear models with independent or dependent observations, the distributions of these stochastic processes tinder the assumed model can be approximated by the distributions of certain zero-mean Gaussian processes whose realizations can be easily generated by computer simulation. Each observed process can then be compared, both graphically and numerically, with a number of realizations from the Gaussian process. Such comparisons enable one to assess objectively whether a trend seen in a residual plot reflects model misspecification or natural variation. The proposed techniques are particularly useful in checking the functional form of a covariate and the link function. Illustrations with several medical studies are provided.

  18. SoS contract verification using statistical model checking

    Directory of Open Access Journals (Sweden)

    Alessandro Mignogna

    2013-11-01

    Full Text Available Exhaustive formal verification for systems of systems (SoS is impractical and cannot be applied on a large scale. In this paper we propose to use statistical model checking for efficient verification of SoS. We address three relevant aspects for systems of systems: 1 the model of the SoS, which includes stochastic aspects; 2 the formalization of the SoS requirements in the form of contracts; 3 the tool-chain to support statistical model checking for SoS. We adapt the SMC technique for application to heterogeneous SoS. We extend the UPDM/SysML specification language to express the SoS requirements that the implemented strategies over the SoS must satisfy. The requirements are specified with a new contract language specifically designed for SoS, targeting a high-level English- pattern language, but relying on an accurate semantics given by the standard temporal logics. The contracts are verified against the UPDM/SysML specification using the Statistical Model Checker (SMC PLASMA combined with the simulation engine DESYRE, which integrates heterogeneous behavioral models through the functional mock-up interface (FMI standard. The tool-chain allows computing an estimation of the satisfiability of the contracts by the SoS. The results help the system architect to trade-off different solutions to guide the evolution of the SoS.

  19. Using Hybrid Decision Tree -Houph Transform Approach For Automatic Bank Check Processing

    Directory of Open Access Journals (Sweden)

    Heba A. Elnemr

    2012-05-01

    Full Text Available One of the first steps in the realization of an automatic system of bank check processing is the automatic classification of checks and extraction of handwritten area. This paper presents a new hybrid method which couple together the statistical color histogram features, the entropy, the energy and the Houph transform to achieve the automatic classification of checks as well as the segmentation and recognition of the various information on the check. The proposed method relies on two stages. First, a two-step classification algorithm is implemented. In the first step, a decision classification tree is built using the entropy, the energy, the logo location and histogram features of colored bank checks. These features are used to classify checks into several groups. Each group may contain one or more type of checks. Therefore, in the second step the bank logo or bank name are matched against its stored template to identify the correct prototype. Second, Hough transform is utilized to detect lines in the classified checks. These lines are used as indicator to the bank check fields. A group of experiments is performed showing that the proposed technique is promising as regards classifying the bank checks and extracting the important fields in that check.

  20. Practical Type Checking of Functions Defined on Context-Free Languages

    Institute of Scientific and Technical Information of China (English)

    Hai-Ming Chen; Yun-Mei Dong

    2004-01-01

    A type checking method for the functional language LFC is presented. A distinct feature of LFC is that it uses Context-Free (CF) languages as data types to represent compound data structures. This makes LFC a dynamically typed language. To improve efficiency, a practical type checking method is presented, which consists of both static and dynamic type checking. Although the inclusion relation of CF languages is not decidable, a special subset of the relation is decidable, i.e., the sentential form relation, which can be statically checked. Moreover, most of the expressions in actual LFC programs appear to satisfy this relation according to the statistic data of experiments. So, despite that the static type checking is not complete, it undertakes most of the type checking task. Consequently the run-time efficiency is effectively improved. Another feature of the type checking is that it converts the expressions with implicit structures to structured representation. Structure reconstruction technique is presented.

  1. LHCb: Analysing DIRAC's Behavior using Model Checking with Process Algebra

    CERN Multimedia

    Remenska, Daniela

    2012-01-01

    DIRAC is the Grid solution designed to support LHCb production activities as well as user data analysis. Based on a service-oriented architecture, DIRAC consists of many cooperating distributed services and agents delivering the workload to the Grid resources. Services accept requests from agents and running jobs, while agents run as light-weight components, fulfilling specific goals. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check for changes in the service states, and react to these accordingly. A characteristic of DIRAC's architecture is the relatively low complexity in the logic of each agent; the main source of complexity lies in their cooperation. These agents run concurrently, and communicate using the services' databases as a shared memory for synchronizing the state transitions. Although much effort is invested in making DIRAC reliable, entities occasionally get into inconsistent states, leadi...

  2. Model Checking with Edge-Valued Decision Diagrams

    Science.gov (United States)

    Roux, Pierre; Siminiceanu, Radu I.

    2010-01-01

    We describe an algebra of Edge-Valued Decision Diagrams (EVMDDs) to encode arithmetic functions and its implementation in a model checking library. We provide efficient algorithms for manipulating EVMDDs and review the theoretical time complexity of these algorithms for all basic arithmetic and relational operators. We also demonstrate that the time complexity of the generic recursive algorithm for applying a binary operator on EVMDDs is no worse than that of Multi- Terminal Decision Diagrams. We have implemented a new symbolic model checker with the intention to represent in one formalism the best techniques available at the moment across a spectrum of existing tools. Compared to the CUDD package, our tool is several orders of magnitude faster

  3. Neurology check list. 5. rev. and enl. ed.; Checkliste Neurologie

    Energy Technology Data Exchange (ETDEWEB)

    Grehl, Holger [Evangelisches und Johanniter Klinikum, Duisburg (Germany). Neurologische Klinik; Reinhardt, Frank

    2013-02-01

    The neurology check list covers the following issues, organized in four parts: Grey part - diagnostic fundamentals, therapeutic principles: clinical neurological examination, liquor puncture, specific laboratory diagnostics, neurophysical diagnostics, imaging techniques, therapeutic principles, legal aspects, neurological assessment. Green Part - leading syndromes and leading symptoms. Blue part - neurological disease appearance: pains in head and face, pain syndrome, congenital and development disturbances, liquor circulation disturbances, ZNS hemorrhages, tumors and neoplasm, paraneoplastic syndromes, inflammatory diseases of the nervous system, dementia diseases, metabolic and other encephalopathy, cerebellum diseases and system surmounting processes, movement degeneration, basal ganglion diseases, epilepsy, non-epileptic attacks, medulla diseases, brain nerve diseases, plexus lesions, radicular lesions, peripheric neuropathy, neuromuscular transfer disturbances, muscular diseases. Red part: neurological intensive medicine.

  4. Cross-checking different sources of mobility information

    CERN Document Server

    Lenormand, Maxime; Cantu-Ros, Oliva G; Tugores, Antonia; Louail, Thomas; Herranz, Ricardo; Barthelemy, Marc; Frias-Martinez, Enrique; Ramasco, Jose J

    2014-01-01

    The pervasive use of new mobile devices has allowed a better characterization in space and time of human concentrations and mobility in general. Besides its theoretical interest, describing mobility is of great importance for a number of practical applications ranging from the forecast of disease spreading to the design of new spaces in urban environments. While classical data sources, such as surveys or census, have a limited level of geographical resolution (e.g., districts, municipalities, counties are typically used) or are restricted to generic workdays or weekends, the data coming from mobile devices can be precisely located both in time and space. Most previous works have used a single data source to study human mobility patterns. Here we perform instead a cross-check analysis by comparing results obtained with data collected from three different sources: Twitter, census and cell phones. The analysis is focused on the urban areas of Barcelona and Madrid, for which data of the three types is available. ...

  5. Miniaturized passive hydrogel check valve for hydrocephalus treatment.

    Science.gov (United States)

    Schwerdt, Helen N; Bristol, Ruth E; Junseok Chae

    2014-03-01

    Improvements in cerebrospinal fluid (CSF) draining techniques for treatment of hydrocephalus are urgently sought after to substitute for current CSF shunts that are plagued by high failure rates. The passive check valve aims to restore near natural CSF draining operations while mitigating possible failure mechanisms caused by finite leakage or low resilience that frequently constrain practical implementation of miniaturized valves. A simple hydrogel diaphragm structures core passive valve operations and enforce valve sealing properties to substantially lower reverse flow leakage. Experimental measurements demonstrate realization of targeted cracking pressures (PT ≈ 20-110 mmH2O) and operation at -800 <; ΔP <; 600 mmH2O without observable degradation or leakage.

  6. Numerical methods for checking the regularity of subdivision schemes

    CERN Document Server

    Charina, Maria

    2012-01-01

    In this paper, motivated by applications in computer graphics and animation, we study the numerical methods for checking $C^k-$regularity of vector multivariate subdivision schemes with dilation 2I. These numerical methods arise from the joint spectral radius and restricted spectral radius approaches, which were shown in Charina (Charina, 2011) to characterize $W^k_p-$regularity of subdivision in terms of the same quantity. Namely, the $(k,p)-$joint spectral radius and the $(k,p)-$restricted spectral radius are equal. We show that the corresponding numerical methods in the univariate scalar and vector cases even yield the same upper estimate for the $(k,\\infty)-$joint spectral radius for a certain choice of a matrix norm. The difference between the two approaches becomes apparent in the multivariate case and we confirm that they indeed offer different numerical schemes for estimating the regularity of subdivision. We illustrate our results with several examples.

  7. Checking the Quality of Clinical Guidelines using Automated Reasoning Tools

    CERN Document Server

    Hommersom, Arjen; van Bommel, Patrick

    2008-01-01

    Requirements about the quality of clinical guidelines can be represented by schemata borrowed from the theory of abductive diagnosis, using temporal logic to model the time-oriented aspects expressed in a guideline. Previously, we have shown that these requirements can be verified using interactive theorem proving techniques. In this paper, we investigate how this approach can be mapped to the facilities of a resolution-based theorem prover, Otter, and a complementary program that searches for finite models of first-order statements, Mace. It is shown that the reasoning required for checking the quality of a guideline can be mapped to such fully automated theorem-proving facilities. The medical quality of an actual guideline concerning diabetes mellitus 2 is investigated in this way.

  8. Ground-based complex for checking the optical system

    Science.gov (United States)

    Grebenyuk, V.; Boreiko, V.; Dmitrotsa, A.; Gorbunov, N.; Khrenov, B.; Klimov, P.; Lavrova, M.; Popescu, E. M.; Sabirov, B.; Tkachenko, A.; Tkachev, L.; Volvach, A.; Yashin, I.

    2016-09-01

    The purpose TUS space experiment is to study cosmic rays of ultrahigh energies produced by extensive air showers from space. The concentrator is located on satellite, made in the form of the Fresnel mirror towards the earth's atmosphere, the focus of which is a photodetector. The angle of view of the mirror is ±4.5° that for a given height of the orbit corresponds to the area 80 × 80 km2 on ground. The ground complex consisting of a number of stations, to check the optical system of the experiment is created, (their location and the amount will be determined after the launch of the satellite based on its actual orbit).

  9. Check Point金融行业客户案例

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    此案例的金融行业用户为国家重点金融交易机构,承担了非常重要的多种金融业务,安全性和可靠性的重要在该机构中是不言而喻的。在没有选择Check Point之前,该用户只采用了传统的利用交换架构的路由交换设备配置Access List的防火墙保护方案。但该架构在安全问题日益严重的今天,已经越来越不能满足用户的需求,主要体现在:

  10. Checking EABC performance in comparison others cryptography algorithms

    Directory of Open Access Journals (Sweden)

    Hamid Mehdi

    2013-08-01

    Full Text Available Nowadays, selecting algorithm to encryption data is very important considering attacks are varied andaccording to there are many encryption algorithms to protect information. Therefore choosing one algorithmis hard among many algorithms. Data confidentiality is one of the most important functions of encryptionalgorithms, it means when the transferring data between different systems is vague for unauthorized systemsor people. Moreover, Encryption algorithms must maintain data integrity and provide availability forinformation. New encryption methods cause the attackers cannot simply access to the information and do notallow discovering the relationship between information and the encrypted one. Therefore, availability can bedifficult for them. Existing complexities make their longevity and effectiveness increase. In This Article, Ithas been tried to check EABC performance considering execution time, CPU Utilization, Throughput ofencrypting/decrypting database.

  11. Using Model Checking for Analyzing Distributed Power Control Problems

    Directory of Open Access Journals (Sweden)

    Thomas Brihaye

    2010-01-01

    Full Text Available Model checking (MC is a formal verification technique which has been known and still knows a resounding success in the computer science community. Realizing that the distributed power control (PC problem can be modeled by a timed game between a given transmitter and its environment, the authors wanted to know whether this approach can be applied to distributed PC. It turns out that it can be applied successfully and allows one to analyze realistic scenarios including the case of discrete transmit powers and games with incomplete information. The proposed methodology is as follows. We state some objectives a transmitter-receiver pair would like to reach. The network is modeled by a game where transmitters are considered as timed automata interacting with each other. The objectives are then translated into timed alternating-time temporal logic formulae and MC is exploited to know whether the desired properties are verified and determine a winning strategy.

  12. SimCheck: An Expressive Type System for Simulink

    Science.gov (United States)

    Roy, Pritam; Shankar, Natarajan

    2010-01-01

    MATLAB Simulink is a member of a class of visual languages that are used for modeling and simulating physical and cyber-physical systems. A Simulink model consists of blocks with input and output ports connected using links that carry signals. We extend the type system of Simulink with annotations and dimensions/units associated with ports and links. These types can capture invariants on signals as well as relations between signals. We define a type-checker that checks the wellformedness of Simulink blocks with respect to these type annotations. The type checker generates proof obligations that are solved by SRI's Yices solver for satisfiability modulo theories (SMT). This translation can be used to detect type errors, demonstrate counterexamples, generate test cases, or prove the absence of type errors. Our work is an initial step toward the symbolic analysis of MATLAB Simulink models.

  13. Nonlinear smoothing identification algorithm with application to data consistency checks

    Science.gov (United States)

    Idan, M.

    1993-01-01

    A parameter identification algorithm for nonlinear systems is presented. It is based on smoothing test data with successively improved sets of model parameters. The smoothing, which is iterative, provides all of the information needed to compute the gradients of the smoothing performance measure with respect to the parameters. The parameters are updated using a quasi-Newton procedure, until convergence is achieved. The advantage of this algorithm over standard maximum likelihood identification algorithms is the computational savings in calculating the gradient. This algorithm was used for flight-test data consistency checks based on a nonlinear model of aircraft kinematics. Measurement biases and scale factors were identified. The advantages of the presented algorithm and model are discussed.

  14. DEPUTY:Analysing Architectural Structures and Checking Style

    Institute of Scientific and Technical Information of China (English)

    D.Gorshkov; J.P.Wellisch

    2001-01-01

    The DepUty(dependencies utility)can be classified as a project and process management tool.The main goal of DepUty is to assist by means of source code analysis and graphical representation using UML,in understanding dependencies of sub-systems and packages in CMS object Oriented software,to understand architectureal structure,and to schedule code release in modularised integration.It also allows a new-comer to more easily understand the global structure, of CMS software,and to void circular dependencies up-front or re-factor the code,in case it was already too close to the edge of non-maintainability.We will discuss the various views DepUty provides to analyse package dependencies and illustrate both the metrics and style checking facilities it provides.

  15. Model-checking dense-time Duration Calculus

    DEFF Research Database (Denmark)

    Fränzle, Martin

    2004-01-01

    Since the seminal work of Zhou Chaochen, M. R. Hansen, and P. Sestoft on decidability of dense-time Duration Calculus [Zhou, Hansen, Sestoft, 1993] it is well-known that decidable fragments of Duration Calculus can only be obtained through withdrawal of much of the interesting vocabulary...... of this logic. While this was formerly taken as an indication that key-press verification of implementations with respect to elaborate Duration Calculus specifications were also impossible, we show that the model property is well decidable for realistic designs which feature natural constraints...... suitably sparser model classes we obtain model-checking procedures for rich subsets of Duration Calculus. Together with undecidability results also obtained, this sheds light upon the exact borderline between decidability and undecidability of Duration Calculi and related logics....

  16. Application of Model-Checking Technology to Controller Synthesis

    DEFF Research Database (Denmark)

    David, Alexandre; Grunnet, Jacob Deleuran; Jessen, Jan Jacob

    2011-01-01

    its continuous environment, which is modelled and taken care of in our frameworks. Our first technique does it by using Matlab to discretise the problem and then Uppaal-tiga to solve the obtained timed game. This is implemented as a toolbox. The second technique relies on the user defining a timed......In this paper we present two frameworks that have been implemented to link traditional model-checking techniques to the domain of control. The techniques are based on solving a timed game and using the resulting solution (a strategy) as a controller. The obtained discrete controller must fit within...... game model in Uppaal- tiga. Then the strategy is automatically imported in Simulink as an S-function for simulation and validation purposes. We demonstrate the effectiveness of these frameworks in different case-studies....

  17. Checking the new IRI model The bottomside B parameters

    CERN Document Server

    Mosert, M; Ezquer, R; Lazo, B; Miro, G

    2002-01-01

    Electron density profiles obtained at Pruhonice (50.0, 15.0), El Arenosillo (37.1, 353.2) and Havana (23, 278) were used to check the bottom-side B parameters BO (thickness parameter) and B1 (shape parameter) predicted by the new IRI - 2000 version. The electron density profiles were derived from ionograms using the ARP technique. The data base includes daytime and nighttime ionograms recorded under different seasonal and solar activity conditions. Comparisons with IRI predictions were also done. The analysis shows that: a) The parameter B1 given by IRI 2000 reproduces better the observed ARP values than the IRI-90 version and b) The observed BO values are in general well reproduced by both IRI versions: IRI-90 and IRI-2000.

  18. A Formal Verification Methodology for Checking Data Integrity

    CERN Document Server

    Umezawa, Yasushi

    2011-01-01

    Formal verification techniques have been playing an important role in pre-silicon validation processes. One of the most important points considered in performing formal verification is to define good verification scopes; we should define clearly what to be verified formally upon designs under tests. We considered the following three practical requirements when we defined the scope of formal verification. They are (a) hard to verify (b) small to handle, and (c) easy to understand. Our novel approach is to break down generic properties for system into stereotype properties in block level and to define requirements for Verifiable RTL. Consequently, each designer instead of verification experts can describe properties of the design easily, and formal model checking can be applied systematically and thoroughly to all the leaf modules. During the development of a component chip for server platforms, we focused on RAS (Reliability, Availability, and Serviceability) features and described more than 2000 properties in...

  19. Applying Model Checking to Industrial-Sized PLC Programs

    CERN Document Server

    AUTHOR|(CDS)2079190; Darvas, Daniel; Blanco Vinuela, Enrique; Tournier, Jean-Charles; Bliudze, Simon; Blech, Jan Olaf; Gonzalez Suarez, Victor M

    2015-01-01

    Programmable logic controllers (PLCs) are embedded computers widely used in industrial control systems. Ensuring that a PLC software complies with its specification is a challenging task. Formal verification has become a recommended practice to ensure the correctness of safety-critical software but is still underused in industry due to the complexity of building and managing formal models of real applications. In this paper, we propose a general methodology to perform automated model checking of complex properties expressed in temporal logics (\\eg CTL, LTL) on PLC programs. This methodology is based on an intermediate model (IM), meant to transform PLC programs written in various standard languages (ST, SFC, etc.) to different modeling languages of verification tools. We present the syntax and semantics of the IM and the transformation rules of the ST and SFC languages to the nuXmv model checker passing through the intermediate model. Finally, two real cases studies of \\CERN PLC programs, written mainly in th...

  20. Advanced Microbial Check Valve development. [for Space Shuttle

    Science.gov (United States)

    Colombo, G. V.; Greenley, D. R.; Putnam, D. F.; Sauer, R. L.

    1981-01-01

    The Microbial Check Valve (MCV) is a flight qualified assembly that provides bacteriologically safe drinking water for the Space Shuttle. The 1-lb unit is basically a canister packed with an iodinated ion-exchange resin. The device is used to destroy organisms in a water stream as the water passes through it. It is equally effective for fluid flow in either direction and its primary method of disinfection is killing rather than filtering. The MCV was developed to disinfect the fuel cell water and to prevent back contamination of stored potable water on the Space Shuttle. This paper reports its potential for space applications beyond the basic Shuttle mission. Data are presented that indicate the MCV is suitable for use in advanced systems that NASA has under development for the reclamation of humidity condensate, wash water and human urine.

  1. Deterministic and Probabilistic Approach in Primality Checking for RSA Algorithm

    Directory of Open Access Journals (Sweden)

    Sanjoy Das

    2013-04-01

    Full Text Available The RSA cryptosystem, invented by Ron Rivest, Adi Shamir and Len Adleman was first publicized in the August 1977 issue of Scientific American [1]. The security level of this algorithm very much depends on two large prime numbers [2]. In this paper two distinct approaches have been dealt with for primality checking. These are deterministic approach and probabilistic approach. For the deterministic approach, it has chosen modified trial division and for probabilistic approach, Miller-Rabin algorithm is considered. The different kinds of attacks on RSA and their remedy are also being discussed. This includes the chosen cipher text attacks, short private key exponent attack and frequency attack. Apart from these attacks, discussion has been made on how to choose the primes for the RSA algorithm. The time complexity has been demonstrated for the various algorithms implemented and compared with others. Finally the future modifications and expectations arising out of the current limitations have also been stated at the end.

  2. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications.

  3. Checks and balances: the welcomed tension between philosophy and science.

    Science.gov (United States)

    Watson, Jamie Carlin; Arp, Robert

    2008-03-01

    There is a tension between science and philosophy, but this tension need not engender enmity or derision. Scientists and philosophers can work together, and we argue that working together is beneficial to both, even if it is sometimes uncomfortable. We offer examples of how philosophy can autonomously and effectively inform scientific practice. Science and philosophy share certain methodological concerns and practices; therefore, scientists who disregard philosophy are vulnerable to critical conceptual mistakes. If our arguments are correct, and if it can also be shown that science informs philosophy, then, while it is possible for both disciplines to operate autonomously, each should welcome the checks and balances that each provides for one another in the investigation and explanation of reality.

  4. Development of Healthcare Kiosk for Checking Heart Health

    Directory of Open Access Journals (Sweden)

    Riyanto Sigit

    2016-04-01

    Full Text Available The main problem encountered nowadays in the health field, especially in health care is the growing number of population and the decreasing health facilities. In this regard, healthcare kiosk is used as an alternative to the health care facilities. Heart disease is a dangerous one which could threaten human life. Many people have died due to heart disease and the surgery itself is still very expensive. To analyze heart diseases, doctor usually takes a video of the heart movement using ultrasound equipment to distinguish between normal and abnormal case. The results of analysis vary depending on the accuracy and experience of each doctor so it is difficult to determine the actual situation. Therefore, a method using healthcare kiosk to check the heart health is needed to help doctor and improve the health care facilities. The aim of this research is to develop healthcare kiosk which can be used to check the heart health. This research method is divided into three main parts: firstly, preprocessing to clarify the quality of the image.In this section, the writers propose a Median High Boost Filter method which is a combined method of Median Filtering and High Boost Filtering. Secondly, segmentation is used to obtain local cavities of the heart. In this part, the writers propose using Triangle Equation that is a new method to be developed. Thirdly, classification using Partial Monte Carlo method and artificial neural network method; these methods are used to measure the area of the heart cavity and discover the possibility of cardiac abnormalities. Methods for detecting heart health are placed in the kiosk. Therefore, it is expected to facilitate and improve the healthcare facilities. Keywords: Healthcare kiosk, heart health, reprocessing, segmentation, classification.

  5. Comparative evaluation of Map-Check and Arc-Check for dosimetric verification in patients treaties with IMRT; Evaluacion comparativa de MapCHECK y ArcCHECK para verificacion dosimetrica en pacientes tratados con IMRT

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, B.; Marquina, J.; Ramirez, J.; Gonzales, A., E-mail: bertha.garcia@aliada.com.pe [ALIADA, Oncologia Integral, Av. Jose Galvez Barrenechea 1044, San Isidro, Lima 27 (Peru)

    2014-08-15

    The dosimetric controls that are realized to the patients in the Intensity-Modulated Radiation Therapy (IMRT) and Volumetric Modulated Arc Therapy (VMAT) techniques; are indispensable since allows in real time to verify the quantity of imparted dose to the patient, these controls should be carried out every time that will begin a treatment, because these techniques impart dose dynamically modulating the dose intensity and movements of the Multi leaf Collimator (MLC), for they exist different diodes devices prepared in spiral (3-D) and planar form (2-D); that allows to estimate the dose fluence in a certain area. Treatment studies for head and neck with IMRT were compared regarding the reading average carried out by the diodes in the corresponding areas, using the criteria of the gamma index like dose difference 3% or 3m m of distance for both diode arrangements, in the IMRT case was found in Arc-Check a minor difference of 3/3 for an average of 99.37% of read diodes in a correct way contrary to the reading obtained with the Map-Check 3/3 an average of difference of 96.19%; in IMRT the difference was lower due to different factors like sensibility of the diodes reading, resolution, diodes disposition, as well as the average reading of entrance and exit of the radiation beams. Within the parameters delivered by the diodes arrangement is considered the positioning correction for both acceptance indexes like the gamma factor and the Distance-to-agreement (Dta), the existent difference of reading in factor gamma and Dta fundamentally is the way in like they compare the dose distribution; the Gamma uses dose averages of high and low gradients and Dta use only averages of areas of high gradients between the nearest points giving the distance as a result among the distribution point and the nearest point what makes stricter. (Author)

  6. A conceptual model of check dam hydraulics for gully control

    Directory of Open Access Journals (Sweden)

    C. Castillo

    2013-09-01

    Full Text Available There is little information in scientific literature regarding the modifications induced by check dam systems in flow regimes in restored gully reaches, despite it being a crucial issue for the design of conservation measures. Here, we develop a conceptual model to classify flow regimes in straight rectangular channels for initial and dam-filling conditions as well as a method of estimating efficiency in order to provide guidelines for optimal design. The model integrates several previous mathematical approaches for assessing the main processes involved (hydraulic jump HJ, impact flow, gradually varied flows. Its performance was compared with the simulations obtained from IBER, a bi-dimensional hydrodynamic model. The impact of check dam spacing (defined by the geometric factor of influence c on efficiency was explored. Eleven main classifications of flow regimes were identified depending on the element and level of influence. The model produced similar results when compared with IBER, but led to higher estimations of HJ and impact lengths. Total influence guaranteed maximum efficiency and HJ control defining the location of the optimal c. Geometric total influence (c = 1 was a valid criterion for the different stages of the structures in a wide range of situations provided that hydraulic roughness conditions remained high within the gully, e.g. through revegetation. Our total influence criterion involved shorter spacing than that habitually recommended in technical manuals for restoration, but was in line with those values found in spontaneous and stable step-pools systems, which might serve as a reference for man-made interventions.

  7. Applicability of refractometry for fast routine checking of hospital preparations.

    Science.gov (United States)

    Hendrickx, Stijn; Verón, Aurora Monteagudo; Van Schepdael, Ann; Adams, Erwin

    2016-04-30

    Quality control of hospital pharmacy formulations is of the utmost importance to ensure constant quality and to avoid potential mistakes before administration to the patient. In this study we investigated the applicability of refractometry as a fast, inexpensive and easy-to-use quality control measurement. Refractive indices (RI) of a multitude of different hospital formulations with varying concentrations of active compound were measured. The samples consisted of a number of binary aqueous solutions (one compound in water), complex aqueous solutions (multiple compounds in water or in a constant matrix), two suspensions and one emulsion. For all these formulations, linear regression analysis was performed, quality control limits determined and accuracy and repeatability were checked. Subsequently, actual hospital pharmacy samples were analyzed to check whether they were within the specified limits. For both binary and complex aqueous formulations, repeatability was good and a linear correlation for all samples could be observed on condition that the concentration of the active compound was sufficiently high. The refractometer was not sensitive enough for solutions of folic acid and levothyroxine, which had too low a concentration of active compound. Due to lack of homogeneity and light scattering, emulsions and suspensions do not seem suitable for quality control by refractometry. A mathematical equation was generated to predict the refractive index of an aqueous solution containing clonidine HCl as active compound. Values calculated from the equation were compared with measured values and deviations of all samples were found to be lower than 1.3%. In order to use refractometry in a hospital pharmacy for quality control of multicomponent samples, additional intermediate measurements would be required, to overcome the fact that refractometry is not compound specific. In conclusion, we found that refractometry could potentially be useful for daily, fast quality

  8. Tarmo: A Framework for Parallelized Bounded Model Checking

    Directory of Open Access Journals (Sweden)

    Siert Wieringa

    2009-12-01

    Full Text Available This paper investigates approaches to parallelizing Bounded Model Checking (BMC for shared memory environments as well as for clusters of workstations. We present a generic framework for parallelized BMC named Tarmo. Our framework can be used with any incremental SAT encoding for BMC but for the results in this paper we use only the current state-of-the-art encoding for full PLTL. Using this encoding allows us to check both safety and liveness properties, contrary to an earlier work on distributing BMC that is limited to safety properties only. Despite our focus on BMC after it has been translated to SAT, existing distributed SAT solvers are not well suited for our application. This is because solving a BMC problem is not solving a set of independent SAT instances but rather involves solving multiple related SAT instances, encoded incrementally, where the satisfiability of each instance corresponds to the existence of a counterexample of a specific length. Our framework includes a generic architecture for a shared clause database that allows easy clause sharing between SAT solver threads solving various such instances. We present extensive experimental results obtained with multiple variants of our Tarmo implementation. Our shared memory variants have a significantly better performance than conventional single threaded approaches, which is a result that many users can benefit from as multi-core and multi-processor technology is widely available. Furthermore we demonstrate that our framework can be deployed in a typical cluster of workstations, where several multi-core machines are connected by a network.

  9. Analysis of DIRAC's behavior using model checking with process algebra

    Science.gov (United States)

    Remenska, Daniela; Templon, Jeff; Willemse, Tim; Bal, Henri; Verstoep, Kees; Fokkink, Wan; Charpentier, Philippe; Graciani Diaz, Ricardo; Lanciotti, Elisa; Roiser, Stefan; Ciba, Krzysztof

    2012-12-01

    DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple; the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike conventional testing, it allows full control over the parallel processes execution, and supports exhaustive state-space exploration. We used the mCRL2 language and toolset to model the behavior of two related DIRAC subsystems: the workload and storage management system. Based on process algebra, mCRL2 allows defining custom data types as well as functions over these. This makes it suitable for modeling the data manipulations made by DIRAC's agents. By visualizing the state space and replaying scenarios with the toolkit's simulator, we have detected race-conditions and deadlocks in these systems, which, in several cases, were confirmed to occur in the reality. Several properties of interest were formulated and verified with the tool. Our future direction is automating the translation from DIRAC to a formal model.

  10. A Game-Based Approach for PCTL* Stochastic Model Checking with Evidence

    Institute of Scientific and Technical Information of China (English)

    Yang Liu; Xuan-Dong Li; Yan Ma

    2016-01-01

    Stochastic model checking is a recent extension and generalization of the classical model checking, which focuses on quantitatively checking the temporal property of a system model. PCTL* is one of the important quantitative property specification languages, which is strictly more expressive than either PCTL (probabilistic computation tree logic) or LTL (linear temporal logic) with probability bounds. At present, PCTL* stochastic model checking algorithm is very complicated, and cannot provide any relevant explanation of why a formula does or does not hold in a given model. For dealing with this problem, an intuitive and succinct approach for PCTL* stochastic model checking with evidence is put forward in this paper, which includes: presenting the game semantics for PCTL* in release-PNF (release-positive normal form), defining the PCTL*stochastic model checking game, using strategy solving in game to achieve the PCTL*stochastic model checking, and refining winning strategy as the evidence to certify stochastic model checking result. The soundness and the completeness of game-based PCTL* stochastic model checking are proved, and its complexity matches the known lower and upper bounds. The game-based PCTL*stochastic model checking algorithm is implemented in a visual prototype tool, and its feasibility is demonstrated by an illustrative example.

  11. Emodnet Med Sea Check-Point - Indicators for decision- maker

    Science.gov (United States)

    Besnard, Sophie; Claverie, Vincent; Blanc, Frédérique

    2015-04-01

    The Emodnet Checkpoint projects aim is to assess the cost-effectiveness, reliability and utility of the existing monitoring at the sea basin level. This involves the development of monitoring system indicators and a GIS Platform to perform the assessment and make it available. Assessment or production of Check-Point information is made by developing targeted products based on the monitoring data and determining whether the products are meeting the needs of industry and public authorities. Check-point users are the research community, the 'institutional' policy makers for IMP and MSFD implementation, the 'intermediate users', i.e., users capable to understand basic raw data but that benefit from seeing the Checkpoint targeted products and the assessment of the fitness for purpose. We define assessment criteria aimed to characterize/depict the input datasets in terms of 3 territories capable to show performance and gaps of the present monitoring system, appropriateness, availability and fitness for purpose. • Appropriateness: What is made available to users? What motivate/decide them to select this observation rather than this one. • Availability: How this is made available to the user? Place to understand the readiness and service performance of the EU infrastructure • Fitness for use / fitness for purpose: Ability for non-expert user to appreciate the data exploitability (feedback on efficiency & reliability of marine data) For each territory (appropriateness, Availability and Fitness for purpose / for use), we define several indicators. For example, for Availability we define Visibility, Accessibility and Performance. And Visibility is itself defined by "Easily found" and "EU service". So these indicators can be classified according to their territory and sub-territory as seen above, but also according to the complexity to build them. Indicators are built from raw descriptors in 3 stages:  Stage 1: to give a neutral and basic status directly computed from

  12. Component unavailability versus inservice test (IST) interval: Evaluations of component aging effects with applications to check valves

    Energy Technology Data Exchange (ETDEWEB)

    Vesely, W.E. [Vesely, (W.E.), Dublin, OH (United States); Poole, A.B. [Oak Ridge National Lab., TN (United States)

    1997-07-01

    Methods are presented for calculating component unavailabilities when inservice test (IST) intervals are changed and when component aging is explicitly included. The methods extend usual approaches for calculating unavailability and risk effects of changing IST intervals which utilize Probabilistic Risk Assessment (PRA) methods that do not explicitly include component aging. Different IST characteristics are handled including ISTs which are followed by corrective maintenances which completely renew or partially renew the component. ISTs which are not followed by maintenance activities needed to renew the component are also handled. Any downtime associated with IST, including the test downtime and the following maintenance downtime, is included in the unavailability evaluations. A range of component aging behaviors is studied including both linear and nonlinear aging behaviors. Based upon evaluations completed to date, pooled failure data on check valves show relatively small aging (e.g., less than 7% per year). However, data from some plant systems could be evidence for larger aging rates occurring in time periods less than 5 years. The methods are utilized in this report to carry out a range of sensitivity evaluations to evaluate aging effects for different possible applications. Based on the sensitivity evaluations, summary tables are constructed showing how optimal IST interval ranges for check valves can vary relative to different aging behaviors which might exist. The evaluations are also used to identify IST intervals for check valves which are robust to component aging effects. General insights on aging effects are also extracted. These sensitivity studies and extracted results provide useful information which can be supplemented or be updated with plant specific information. The models and results can also be input to PRAs to determine associated risk implications.

  13. The Design of E-Traveler’s Check with Efficiency and Mutual Authentication

    Directory of Open Access Journals (Sweden)

    Chin-Chen Chang

    2010-03-01

    Full Text Available Nowadays, traveling has become a popular leisure activity in our daily lives. Travelers can either use cash or credit cards to pay their bills. However, there is risk of cash being robbed or credit cards being copied. The traveler’s check, which is a third choice, comes in to get travelers around such risks and to protect their rights. Nevertheless, traditional travelers’ checks cannot keep imposters from forging and cashing them illegally. Hence, we propose a new type of check, called the e-traveler’s check, to preserve the rights of holders of e-traveler’s check and to prevent the check-issuing banks from being damaged.

  14. Trellis-Based Check Node Processing for Low-Complexity Nonbinary LP Decoding

    CERN Document Server

    Punekar, Mayur

    2011-01-01

    Linear Programming (LP) decoding is emerging as an attractive alternative to decode Low-Density Parity-Check (LDPC) codes. However, the earliest LP decoders proposed for binary and nonbinary LDPC codes are not suitable for use at moderate and large code lengths. To overcome this problem, Vontobel et al. developed an iterative Low-Complexity LP (LCLP) decoding algorithm for binary LDPC codes. The variable and check node calculations of binary LCLP decoding algorithm are related to those of binary Belief Propagation (BP). The present authors generalized this work to derive an iterative LCLP decoding algorithm for nonbinary linear codes. Contrary to binary LCLP, the variable and check node calculations of this algorithm are in general different from that of nonbinary BP. The overall complexity of nonbinary LCLP decoding is linear in block length; however the complexity of its check node calculations is exponential in the check node degree. In this paper, we propose a modified BCJR algorithm for efficient check n...

  15. SU-D-BRD-04: The Impact of Automatic Radiation Therapy Plan Checks in Treatment Planning

    Energy Technology Data Exchange (ETDEWEB)

    Gopan, O; Yang, F; Ford, E [University of Washington, Seattle, WA (United States)

    2015-06-15

    Purpose: The physics plan check verifies various aspects of a treatment plan after dosimetrists have finished creating the plan. Some errors in the plan which are caught by the physics check could be caught earlier in the departmental workflow. The purpose of this project was to evaluate a plan checking script that can be run within the treatment planning system (TPS) by the dosimetrists prior to plan approval and export to the record and verify system. Methods: A script was created in the Pinnacle TPS to automatically check 15 aspects of a plan for clinical practice conformity. The script outputs a list of checks which the plan has passed and a list of checks which the plan has failed so that appropriate adjustments can be made. For this study, the script was run on a total of 108 plans: IMRT (46/108), VMAT (35/108) and SBRT (27/108). Results: Of the plans checked by the script, 77/108 (71%) failed at least one of the fifteen checks. IMRT plans resulted in more failed checks (91%) than VMAT (51%) or SBRT (63%), due to the high failure rate of an IMRT-specific check, which checks that no IMRT segment < 5 MU. The dose grid size and couch removal checks caught errors in 10% and 14% of all plans – errors that ultimately may have resulted in harm to the patient. Conclusion: Approximately three-fourths of the plans being examined contain errors that could be caught by dosimetrists running an automated script embedded in the TPS. The results of this study will improve the departmental workflow by cutting down on the number of plans that, due to these types of errors, necessitate re-planning and re-approval of plans, increase dosimetrist and physician workload and, in urgent cases, inconvenience patients by causing treatment delays.

  16. SU-D-BRD-03: Improving Plan Quality with Automation of Treatment Plan Checks

    Energy Technology Data Exchange (ETDEWEB)

    Covington, E; Younge, K; Chen, X; Lee, C; Matuszak, M; Kessler, M; Acosta, E; Orow, A; Filpansick, S; Moran, J [University of Michigan Hospital and Health System, Ann Arbor, MI (United States); Keranen, W [Varian Medical Systems, Palo Alto, CA (United States)

    2015-06-15

    Purpose: To evaluate the effectiveness of an automated plan check tool to improve first-time plan quality as well as standardize and document performance of physics plan checks. Methods: The Plan Checker Tool (PCT) uses the Eclipse Scripting API to check and compare data from the treatment planning system (TPS) and treatment management system (TMS). PCT was created to improve first-time plan quality, reduce patient delays, increase efficiency of our electronic workflow, and to standardize and partially automate plan checks in the TPS. A framework was developed which can be configured with different reference values and types of checks. One example is the prescribed dose check where PCT flags the user when the planned dose and the prescribed dose disagree. PCT includes a comprehensive checklist of automated and manual checks that are documented when performed by the user. A PDF report is created and automatically uploaded into the TMS. Prior to and during PCT development, errors caught during plan checks and also patient delays were tracked in order to prioritize which checks should be automated. The most common and significant errors were determined. Results: Nineteen of 33 checklist items were automated with data extracted with the PCT. These include checks for prescription, reference point and machine scheduling errors which are three of the top six causes of patient delays related to physics and dosimetry. Since the clinical roll-out, no delays have been due to errors that are automatically flagged by the PCT. Development continues to automate the remaining checks. Conclusion: With PCT, 57% of the physics plan checklist has been partially or fully automated. Treatment delays have declined since release of the PCT for clinical use. By tracking delays and errors, we have been able to measure the effectiveness of automating checks and are using this information to prioritize future development. This project was supported in part by P01CA059827.

  17. The Model Checking Problem for Propositional Intuitionistic Logic with One Variable is AC1-Complete

    CERN Document Server

    Weiss, Martin Mundhenk And Felix

    2010-01-01

    We investigate the complexity of the model checking problem for propositional intuitionistic logic. We show that the model checking problem for intuitionistic logic with one variable is complete for logspace-uniform AC1, and for intuitionistic logic with two variables it is P-complete. For superintuitionistic logics with one variable, we obtain NC1-completeness for the model checking problem and for the tautology problem.

  18. Verification of Quantum Cryptography Protocols by Model Checking

    Directory of Open Access Journals (Sweden)

    Mohamed Elboukhari

    2010-10-01

    Full Text Available Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography orQuantum Key Distribution (QKD exploits the laws of quantum physics to offer unconditionally securecommunication. The progress of research in this field allows the anticipation of QKD to be availableoutside of laboratories within the next few years and efforts are made to improve the performance andreliability of the implemented technologies. But despite this big progress, several challenges remain. Forexample the task of how to test the devices of QKD did not yet receive enough attention. These apparatusesbecome heterogeneous, complex and so demand a big verification effort. In this paper we propose to studyquantum cryptography protocols by applying the technique of probabilistic model checking. Using PRISMtool, we analyze the security of BB84 protocol and we are focused on the specific security property ofeavesdropper's information gain on the key derived from the implementation of this protocol. We show thatthis property is affected by the parameters of the eavesdropper’s power and the quantum channel.

  19. Model Checking Vector Addition Systems with one zero-test

    CERN Document Server

    Bonet, Rémi; Leroux, Jérôme; Zeitoun, Marc

    2012-01-01

    We design a variation of the Karp-Miller algorithm to compute, in a forward manner, a finite representation of the cover (i.e., the downward closure of the reachability set) of a vector addition system with one zero-test. This algorithm yields decision procedures for several problems for these systems, open until now, such as place-boundedness or LTL model-checking. The proof techniques to handle the zero-test are based on two new notions of cover: the refined and the filtered cover. The refined cover is a hybrid between the reachability set and the classical cover. It inherits properties of the reachability set: equality of two refined covers is undecidable, even for usual Vector Addition Systems (with no zero-test), but the refined cover of a Vector Addition System is a recursive set. The second notion of cover, called the filtered cover, is the central tool of our algorithms. It inherits properties of the classical cover, and in particular, one can effectively compute a finite representation of this set, e...

  20. Systematics for checking geometric errors in CNC lathes

    Science.gov (United States)

    Araújo, R. P.; Rolim, T. L.

    2015-10-01

    Non-idealities presented in machine tools compromise directly both the geometry and the dimensions of machined parts, generating distortions in the project. Given the competitive scenario among different companies, it is necessary to have knowledge of the geometric behavior of these machines in order to be able to establish their processing capability, avoiding waste of time and materials as well as satisfying customer requirements. But despite the fact that geometric tests are important and necessary to clarify the use of the machine correctly, therefore preventing future damage, most users do not apply such tests on their machines for lack of knowledge or lack of proper motivation, basically due to two factors: long period of time and high costs of testing. This work proposes a systematics for checking straightness and perpendicularity errors in CNC lathes demanding little time and cost with high metrological reliability, to be used on factory floors of small and medium-size businesses to ensure the quality of its products and make them competitive.

  1. Dynamic Data Possession Checking for Secure Cloud Storage Service

    Directory of Open Access Journals (Sweden)

    Wenzhe Jiao

    2013-12-01

    Full Text Available Using cloud storage service, data owners can access their data anywhere at any time and enjoy the on-demand high quality applications and services, without the burden of local data storage and maintenance. Meanwhile, the risk of losing data stored with any untrustworthy service provider is the key barrier to widely adopt cloud storage service. To verify the integrity of data stored in cloud and relieve the security concerns of customers, a privacy-preserving data possession checking (DPC scheme is presented. This scheme uses Merkle Hash Tree to support fully dynamic data operations. To achieve robustness, forward error-correcting codes can be combined with the proposed DPC scheme, which can recover the data when a small amount of file has been corrupted. The scheme allows unlimited times verification without the need for the verifier to compare against the original data, which reduces the communication and computation complexity dramatically and preserves the privacy of the data. Extensive security analysis and simulation show that the proposed scheme is highly provably secure.

  2. Grab Windows training opportunities; check CERN Windows roadmap!

    CERN Multimedia

    IT Department

    2011-01-01

    CERN Operating Systems and Information Services group (IT-OIS) actively monitors market trends to check how new software products correspond to CERN needs. In the Windows world, Windows 7 has been a big hit, with over 1500 Windows 7 PCs within less than a year since its support was introduced at CERN. No wonder: Windows XP is nearly 10 years old and is steadily approaching the end of its life-cycle. At CERN, support for Windows XP will stop at the end of December 2012. Compared to Vista, Windows 7 has the same basic hardware requirements, but offers higher performance, so the decision to upgrade is rather straightforward. CERN support for Vista will end in June 2011. In the world of Microsoft Office, version 2007 offers better integration with the central services than the older version 2003. Progressive upgrade from 2003 to 2007 is planned to finish in September 2011, but users are encouraged to pro-actively upgrade at their convenience. Please note that Office 2007 brings an important change in the area of ...

  3. Time for a reality check on global climate change policies

    Energy Technology Data Exchange (ETDEWEB)

    O`Keefe, W.F.

    1995-12-31

    Right now no one knows enough about global warming to advocate with certainty the kinds of actions that could jeopardize our economic well being -- and the economic aspirations of developing countries. That doesn`t mean no action, which is usually described perjoratively and erroneously as business as usual. It does mean actions must be based on facts, not misperceptions and myths. It does mean a mindset that reexamines, rethinks and changes course based on new knowledge. In short, I am advocating a reality check on the process based on the political, scientific and economic realities. Each of these realities has an important role in determining how we respond to the global warming threat. Our goal should be to identify actions that do the least damage to material well-being and that preserve the path to a better way of life, especially for the developing nations. What we have instead is a process driven by political gamesmanship that will devolve into beggar the neighbor policies reminiscent of 18th century mercantilism.

  4. Strength Check Analysis for Gear Shaft of Automobile Transmission

    Directory of Open Access Journals (Sweden)

    Yongxiang Li

    2013-09-01

    Full Text Available As the main drive components of the automobile transmission, the performance of gear shaft plays an important role on transmission performance. Aiming at the existing problems of the traditional strength check method of gear shaft, the objective of this study is to take a five-speed transmission as an example, to accomplish the strength analysis of gear shaft of the automobile transmission based on the MASTA software. Furthermore, the simulation modeling of the transmission is built completely to simulate the actual load conditions and complete the process of analysis for the gear shaft. Analytical results show that all gear shafts can fully meet the strength requirements, in addition to the input shaft which has any further improvements. Hence, it is indicated that a new design concept is put forward, that is, using specialized software MASTA for transmission modeling and simulation analysis can heavily improve the design level of the gear shaft, provide the theoretic basis to analyze the dynamic characteristics of gear shaft as well. Finally, it can provide references for the development and application of gear shaft of the automobile transmission.

  5. Preservation of Thiobacillus ferrooxidans and Thiobacillus thiooxidans with activity check.

    Science.gov (United States)

    Gupta, S G; Agate, A D

    1986-01-01

    Cultures of Thiobacillus ferrooxidans and Thiobacillus thiooxidans, used in biohydrometallurgical processes of economic importance, are very difficult to preserve by conventional methods. Hence, to preserve the cultures with their activity intact, various techniques were tried, after determining their respective activity in terms of Iron Oxidation Rate (IOR) and Sulfur Oxidation Rate (SOR). Among the methods tested, along with the recommended method of serial transfer in a liquid medium, were methods such as lyophilization, storage in a liquid nitrogen and mixing with sterile, inert carriers like lignite or chalcopyrite ores. After a period check-up at 4 months and 8 months storage, it was found that out of these methods, mixing with sterile ore followed by storage at 8 degrees C, kept both types of activities intact. The temperature of storage was observed to have a definite effect on activity, in that when the preserved cultures were stored at 8 degrees C, the activity was retained, whereas at 28-30 degrees C (RT) storage, the activity of all the cultures preserved by various techniques, dropped significantly.

  6. Check, please. Don't expect after-dinner mints.

    Science.gov (United States)

    1994-03-30

    That's because when the check arrives, there'll be condoms instead. Cabbage and Condoms, a Thai restaurant overseen by the Bangkok-based Population and Development Association, serves both items. The eatery plans to open its first overseas outlet in Beijing next month. "We have been working with Chinese family-planning groups and chose Beijing because it is the capital of the world's most populous country," says PDA founding chairman Mechai Viravaidya, who is widely known as "Mr. Condom" for his promotion of the device to stem population growth and the spread of sexually transmitted diseases. Stressing public awareness over coercion represents the next wave of birth control in China. The country's population is projected to hit 1.65 billion stabilizing around 2044. "Our food is guaranteed not to cause pregnancy," quips Mechai. Cabbages and condoms plans to serve Chinese and Thai dishes and offer karaoke. Profits will go to promoting birth control and AIDS awareness. The opening is timely: the World Health Organization recently urged China to boost its efforts to fight the spread of AIDS. Officially the country has 1159 cases of the disease, but the real number may be a lot higher. The PDA also plans to open restaurants in Vietnam, Australia and the US.

  7. Using surface integrals for checking the Archimedes' law of buoyancy

    CERN Document Server

    Lima, F M S

    2011-01-01

    A mathematical derivation of the force exerted by an \\emph{inhomogeneous} (i.e., compressible) fluid on the surface of an \\emph{arbitrarily-shaped} body immersed in it is not found in literature, which may be attributed to our trust on Archimedes' law of buoyancy. However, this law, also known as Archimedes' principle (AP), does not yield the force observed when the body is in contact to the container walls, as is more evident in the case of a block immersed in a liquid and in contact to the bottom, in which a \\emph{downward} force that \\emph{increases with depth} is observed. In this work, by taking into account the surface integral of the pressure force exerted by a fluid over the surface of a body, the general validity of AP is checked. For a body fully surrounded by a fluid, homogeneous or not, a gradient version of the divergence theorem applies, yielding a volume integral that simplifies to an upward force which agrees to the force predicted by AP, as long as the fluid density is a \\emph{continuous func...

  8. Multi-Objective Model Checking of Markov Decision Processes

    CERN Document Server

    Etessami, Kousha; Vardi, Moshe Y; Yannakakis, Mihalis

    2008-01-01

    We study and provide efficient algorithms for multi-objective model checking problems for Markov Decision Processes (MDPs). Given an MDP, $M$, and given multiple linear-time ($\\omega$-regular or LTL) properties $\\varphi_i$, and probabilities $r_i \\in [0,1]$, $i=1,...,k$, we ask whether there exists a strategy $\\sigma$ for the controller such that, for all $i$, the probability that a trajectory of $M$ controlled by $\\sigma$ satisfies $\\varphi_i$ is at least $r_i$. We provide an algorithm that decides whether there exists such a strategy and if so produces it, and which runs in time polynomial in the size of the MDP. Such a strategy may require the use of both randomization and memory. We also consider more general multi-objective $\\omega$-regular queries, which we motivate with an application to assume-guarantee compositional reasoning for probabilistic systems. Note that there can be trade-offs between different properties: satisfying property $\\varphi_1$ with high probability may necessitate satisfying $\\var...

  9. Astronaut Neil A. Armstrong Undergoes Communications Systems Final Check

    Science.gov (United States)

    1969-01-01

    Dunned in his space suit, mission commander Neil A. Armstrong does a final check of his communications system before before the boarding of the Apollo 11 mission. Launched via a Saturn V launch vehicle, the first manned lunar mission launched from the Kennedy Space Center, Florida on July 16, 1969 and safely returned to Earth on July 24, 1969. The Saturn V vehicle was developed by the Marshall Space Flight Center (MSFC) under the direction of Dr. Wernher von Braun. The 3-man crew aboard the flight consisted of astronauts Armstrong; Michael Collins, Command Module (CM) pilot; and Edwin E. Aldrin, Jr., Lunar Module (LM) Pilot. Armstrong was the first human to ever stand on the lunar surface, followed by Edwin (Buzz) Aldrin. Meanwhile, astronaut Collins piloted the CM in a parking orbit around the Moon. During a 2½ hour surface exploration, the crew collected 47 pounds of lunar surface material which was returned to Earth for analysis. With the success of Apollo 11, the national objective to land men on the Moon and return them safely to Earth had been accomplished.

  10. MS Noriega and Tanner check out STS-97 payload

    Science.gov (United States)

    2000-01-01

    In the Space Station Processing Facility, STS-97 Mission Specialists Carlos Noriega (left) and Joe Tanner check out the mission payload, the P6 integrated truss segment. Mission STS-97 is the sixth construction flight to the International Space Station. The P6 comprises Solar Array Wing-3 and the Integrated Electronic Assembly, to be installed on the International Space Station. The Station's electrical power system will use eight photovoltaic solar arrays, each 112 feet long by 39 feet wide, to convert sunlight to electricity. The solar arrays are mounted on a '''blanket''' that can be folded like an accordion for delivery. Once in orbit, astronauts will deploy the blankets to their full size. Gimbals will be used to rotate the arrays so that they will face the Sun to provide maximum power to the Space Station. The mission includes two spacewalks by Noriega and Tanner to complete the solar array connections. STS-97 is scheduled to launch Nov. 30 at about 10:06 p.m. EST.

  11. The method of a joint intraday security check system based on cloud computing

    Science.gov (United States)

    Dong, Wei; Feng, Changyou; Zhou, Caiqi; Cai, Zhi; Dan, Xu; Dai, Sai; Zhang, Chuancheng

    2017-01-01

    The intraday security check is the core application in the dispatching control system. The existing security check calculation only uses the dispatch center’s local model and data as the functional margin. This paper introduces the design of all-grid intraday joint security check system based on cloud computing and its implementation. To reduce the effect of subarea bad data on the all-grid security check, a new power flow algorithm basing on comparison and adjustment with inter-provincial tie-line plan is presented. And the numerical example illustrated the effectiveness and feasibility of the proposed method.

  12. ErrorCheck: A New Method for Controlling the Accuracy of Pose Estimates

    DEFF Research Database (Denmark)

    Holm, Preben Hagh Strunge; Petersen, Henrik Gordon

    2011-01-01

    In this paper, we present ErrorCheck, which is a new method for controlling the accuracy of a computer vision based pose refinement method. ErrorCheck consists of a way for validating robustness of a pose refinement method towards false correspondences and a way of controlling the accuracy...... of a validated pose refinement method. ErrorCheck uses a theoretical estimate of the pose error covariance both for validating robustness and controlling the accuracy.We illustrate the first usage of ErrorCheck by applying it to state-of-the-art methods for pose refinement and some variations of these methods...

  13. The quantitative check-measure of the bend strain parameters of the rotating components

    Institute of Scientific and Technical Information of China (English)

    李文华; 乔中涛

    2002-01-01

    Based on the principle of the electric-magnetic check-measure, this paper puts forward a new technology and method that use the magnetic marks to check and measure the dynamic physical parameters such as angle speed, bending strain,stress and bending moment. The principles of the check-measure and the dealing and exchanging technology about signals have been demonstrated and the rotating components have been made up. The timely and quantitative check-measure of the dynamic physical parameters during the component in working has been realized by using computer control.

  14. Subsumption Checking between Concept Queries in Different Ontologies Based on Mutual Instances

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper proposes a checking method based on mutual instances and discusses three key problems in the method: how to deal with mistakes in the mutual instances and how to deal with too many or too few mutual instances. It provides the checking based on the weighted mutual instances considering fault tolerance, gives a way to partition the large-scale mutual instances, and proposes a process greatly reducing the manual annotation work to get more mutual instances. Intension annotation that improves the checking method is also discussed. The method is practical and effective to check subsumption relations between concept queries in different ontologies based on mutual instances.

  15. 'Check it out!' Decision-making of vulnerable groups about participation in a two-stage cardiometabolic health check: a qualitative study

    NARCIS (Netherlands)

    Groenenberg, I.; Crone, M.R.; Dijk, S. van; Gebhardt, W.A.; Meftah, J. Ben; Middelkoop, B.J.C.; Stiggelbout, A.M.; Assendelft, W.J.

    2015-01-01

    OBJECTIVE: Exploring determinants influencing vulnerable groups regarding (non-) participation in the Dutch two-stage cardiometabolic health check, comprising a health risk assessment (HRA) and prevention consultations (PCs) for high-risk individuals. METHODS: Qualitative study comprising 21 focus g

  16. Drug Checking: A prevention measure for a heterogeneous group with high consumption frequency and polydrug use - evaluation of zurich's drug checking services

    Directory of Open Access Journals (Sweden)

    Schaub Michael

    2011-06-01

    Full Text Available Abstract Background The increasing party culture in Zurich presents new challenges, especially regarding the consumption of alcohol and so-called party drugs. Streetwork, the youth advisory service of the city of Zurich, has provided onsite and stationary Drug Checking facilities since 2001 and 2006, respectively. Drug Checking always involves filling out an anonymous questionnaire, which allows the collection of important information about a largely unknown group of users and their consumption patterns. Methods The questionnaires assessed sociodemographic characteristics, consumption patterns, Drug Checking experiences, information behavior and social support. The collected data were statistically analyzed by the Research Institute for Public Health and Addiction (RIPHA. Results The majority of Drug Checking service patrons were male and between 20 and 35 years old. These patrons reported high lifetime prevalences and high consumption frequencies of legal and illegal substances, and they often reported polydrug use. Aside from tobacco and alcohol, the most consumed drugs during typical party nights were ecstasy, amphetamines, cannabis and cocaine. Party drug consumers using Drug Checking services form a heterogeneous group with respect to sociodemographic characteristics and consumption patterns. Users of the onsite Drug Checking facilities were significantly younger, were less experienced with drug testing, and reported more polydrug use than users of the stationary Drug Checking service. Conclusions Drug Checking combined with a consultation appears to be an important harm reduction and prevention measure that reaches a group of consumers with high consumption frequency and polydrug use. Because of the heterogeneity of the target group, different prevention measures must be offered and embedded in an overall local concept.

  17. Cross-checking different sources of mobility information.

    Directory of Open Access Journals (Sweden)

    Maxime Lenormand

    Full Text Available The pervasive use of new mobile devices has allowed a better characterization in space and time of human concentrations and mobility in general. Besides its theoretical interest, describing mobility is of great importance for a number of practical applications ranging from the forecast of disease spreading to the design of new spaces in urban environments. While classical data sources, such as surveys or census, have a limited level of geographical resolution (e.g., districts, municipalities, counties are typically used or are restricted to generic workdays or weekends, the data coming from mobile devices can be precisely located both in time and space. Most previous works have used a single data source to study human mobility patterns. Here we perform instead a cross-check analysis by comparing results obtained with data collected from three different sources: Twitter, census, and cell phones. The analysis is focused on the urban areas of Barcelona and Madrid, for which data of the three types is available. We assess the correlation between the datasets on different aspects: the spatial distribution of people concentration, the temporal evolution of people density, and the mobility patterns of individuals. Our results show that the three data sources are providing comparable information. Even though the representativeness of Twitter geolocated data is lower than that of mobile phone and census data, the correlations between the population density profiles and mobility patterns detected by the three datasets are close to one in a grid with cells of 2×2 and 1×1 square kilometers. This level of correlation supports the feasibility of interchanging the three data sources at the spatio-temporal scales considered.

  18. 21 CFR 1301.93 - Sources of information for employee checks.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Sources of information for employee checks. 1301...-Practitioners § 1301.93 Sources of information for employee checks. DEA recommends that inquiries concerning... place of birth, and other identifying information, to local courts and law enforcement agencies...

  19. 30 CFR 77.902-1 - Fail safe ground check circuits; maximum voltage.

    Science.gov (United States)

    2010-07-01

    ... voltage. 77.902-1 Section 77.902-1 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF... OF UNDERGROUND COAL MINES Low- and Medium-Voltage Alternating Current Circuits § 77.902-1 Fail safe ground check circuits; maximum voltage. The maximum voltage used for ground check circuits under §...

  20. 30 CFR 77.803-1 - Fail safe ground check circuits; maximum voltage.

    Science.gov (United States)

    2010-07-01

    ... voltage. 77.803-1 Section 77.803-1 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF... OF UNDERGROUND COAL MINES Surface High-Voltage Distribution § 77.803-1 Fail safe ground check circuits; maximum voltage. The maximum voltage used for ground check circuits under § 77.803 shall...

  1. 48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or...

  2. 48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.

    Science.gov (United States)

    2010-10-01

    ... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead...

  3. Cross-Validation of a Creativity Scale for the Adjective Check List

    Science.gov (United States)

    Albaum, Gerald; Baker, Kenneth

    1977-01-01

    The validity of the creativity scale of the Adjective Check List was investigated with a sample of inventors and non-inventors. Eight scales of the Adjective Check List showed significant differences for the two groups, including the creativity scale. (Author/JKS)

  4. 78 FR 26656 - Agency Information Collection Activities; Proposed Collection; Comments Requested: Police Check...

    Science.gov (United States)

    2013-05-07

    ... Collection; Comments Requested: Police Check Inquiry and Pre-Screening Qualifications Certification ACTION... Budget (OMB) for review and approval in accordance with the Paperwork Reduction Act of 1995. The proposed... existing collection of information. (2) Title of the Form/Collection: Police Check Inquiry and...

  5. 42 CFR 84.137 - Inhalation and exhalation valves; check valves; minimum requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Inhalation and exhalation valves; check valves... PROTECTIVE DEVICES Supplied-Air Respirators § 84.137 Inhalation and exhalation valves; check valves; minimum requirements. (a) Inhalation and exhalation valves shall be provided where necessary and protected...

  6. Urinary tract infections at first antenatal check-up: a single centre prospective study

    Directory of Open Access Journals (Sweden)

    Saubhagya Kumar Jena

    2016-09-01

    Conclusions: ASB is more common during pregnancy even in first antenatal check-up. We suggest routine urine culture and sensitivity during first antenatal check-up to detect ASB and treat with proper antibiotic to prevent the complications and development of resistance. [Int J Reprod Contracept Obstet Gynecol 2016; 5(9.000: 3103-3106

  7. 75 FR 79312 - Requirements for Fingerprint-Based Criminal History Records Checks for Individuals Seeking...

    Science.gov (United States)

    2010-12-20

    ... test reactor licensees to obtain a fingerprint- based criminal history records check before granting...; ] NUCLEAR REGULATORY COMMISSION 10 CFR Part 73 RIN 3150-AI25 Requirements for Fingerprint-Based Criminal History Records Checks for Individuals Seeking Unescorted Access to Research or Test Reactors...

  8. For People with Diabetes or High Blood Pressure: Get Checked for Kidney Disease

    Science.gov (United States)

    ... Language URL Español For People with Diabetes or High Blood Pressure: Get Checked for Kidney Disease Page Content Make ... I be checked for kidney disease? Diabetes and high blood pressure can damage the kidneys and lead to kidney ...

  9. Using Canonical Forms for Isomorphism Reduction in Graph-based Model Checking

    NARCIS (Netherlands)

    Kant, Gijs

    2010-01-01

    Graph isomorphism checking can be used in graph-based model checking to achieve symmetry reduction. Instead of one-to-one comparing the graph representations of states, canonical forms of state graphs can be computed. These canonical forms can be used to store and compare states. However, computing

  10. General health checks in adults for reducing morbidity and mortality from disease

    DEFF Research Database (Denmark)

    Krogsbøll, Lasse T; Jørgensen, Karsten Juhl; Grønhøj Larsen, Christian;

    2012-01-01

    To quantify the benefits and harms of general health checks in adults with an emphasis on patient-relevant outcomes such as morbidity and mortality rather than on surrogate outcomes.......To quantify the benefits and harms of general health checks in adults with an emphasis on patient-relevant outcomes such as morbidity and mortality rather than on surrogate outcomes....

  11. General health checks in adults for reducing morbidity and mortality from disease

    DEFF Research Database (Denmark)

    Krogsbøll, Lasse T; Jørgensen, Karsten Juhl; Grønhøj Larsen, Christian;

    2012-01-01

    General health checks are common elements of health care in some countries. These aim to detect disease and risk factors for disease with the purpose of reducing morbidity and mortality. Most of the commonly used screening tests offered in general health checks have been incompletely studied. Also...

  12. The Impact of Repeated Health Checks for Adults with Intellectual Disabilities

    Science.gov (United States)

    Felce, David; Baxter, Helen; Lowe, Kathy; Dunstan, Frank; Houston, Helen; Jones, Glyn; Felce, Janet; Kerr, Michael

    2008-01-01

    Background: An earlier study (Baxter "et al." 2006) found that a structured health check conducted in primary care identified clinically significant previously unrecognized morbidity among adults with intellectual disabilities. The aim here was to examine whether follow-up health checks would identify equally significant newly identified morbidity…

  13. Test and Check Out Cart (T.A.C.O. Cart)

    Science.gov (United States)

    2015-05-14

    Technical Briefing 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Test and Check Out Cart (T.A.C.O. Cart ) 5a. CONTRACT NUMBER...This briefing will discuss the Test and Check-Out (TACO) cart . It is basically a mobile weatherproof laboratory. The primary purpose is to

  14. 31 CFR 515.531 - Payment of certain checks and drafts.

    Science.gov (United States)

    2010-07-01

    ... Licenses, Authorizations, and Statements of Licensing Policy § 515.531 Payment of certain checks and drafts... $500; or (ii) The check or draft was within the United States in process of collection by a domestic... authorization contained in this section shall expire at the close of business on August 8, 1963....

  15. Teaching Children with Autism Spectrum Disorders to Check the Spelling of Words

    Science.gov (United States)

    Kagohara, Debora M.; Sigafoos, Jeff; Achmadi, Donna; O'Reilly, Mark; Lancioni, Giulio

    2012-01-01

    This study aimed to teach two students with autism spectrum disorders (ASD) to check the spelling of words using the spell-check function on common word processor programs. A multiple-baseline across participants design with baseline, video modeling, and follow-up phases was implemented. During baseline, the participants performed less than 40% of…

  16. Gender Check - veel kord soolisusest Ida-Euroopa kunstis / Mare Tralla

    Index Scriptorium Estoniae

    Tralla, Mare, 1967-

    2010-01-01

    Novembris 2010 Viinis toimunud konverentsist, kus analüüsiti näituse "Gender Check. Feminiinsus ja maskuliinsus Ida-Euroopa kunstis" kogemust ning sellele eelnenud ja järgnenud uurimistöö tulemusi. Esitleti artiklite kogumikku "Gender check: a reader : art and theory in Eastern Europe". "Gender Checki" projekti edasisest saatusest ja mõjust

  17. Check-in based routing strategy in scale-free networks

    Science.gov (United States)

    Jiang, Zhong-Yuan; Ma, Jian-Feng; Shen, Yu-Long

    2017-02-01

    In many real complex artificial networks, a navigation route between a pair of source and destination is often desired to pass through at least a specified node called check-in node for doing check-in like services, such as gas fuel supplement for vehicles, GPS recording for express packages and so on. However, currently, there is a lack of routing study for complex networks equipped with check-in nodes. In this work, we first propose a general routing mechanism called check-in based routing (CBR) which can guarantee that every efficient path must include at least one check-in node. With a finite fraction of check-in nodes in the network, it can be observed that the higher the degrees of check-in nodes, the higher the network traffic capacity will be by employing the shortest path routing into CBR (namely CBR-SP). It is a great challenge on routing optimization for a network with a fraction of check-in nodes of the lowest degrees. We then employ the degree-based efficient routing (ER) into the CBR to efficiently redistribute heavy traffic from hub nodes to non-hub nodes. Under the CBR-ER, the traffic capacity can be significantly enhanced at the cost of a little network diameter and average path lengthening. The extensive simulations in scale-free networks can well confirm the effectiveness of CBR-ER.

  18. 27 CFR 70.61 - Payment by check or money order.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Payment by check or money... Collection of Excise and Special (Occupational) Tax Receipt of Payment § 70.61 Payment by check or money... State, Territory, or possession of the United States, or money orders in payment for internal...

  19. Carbon sequestration function of check-dams: a case study of the Loess plateau in China.

    Science.gov (United States)

    Wang, Yafeng; Chen, Liding; Gao, Yang; Wang, Shuai; Lü, Yihe; Fu, Bojie

    2014-11-01

    Check-dams are the most common structures for controlling soil erosion in the Loess Plateau. However, the effect of check-dams on carbon sequestration, along with sediment transport and deposition, has not been assessed over large areas. In this study, we evaluated the carbon sequestration function of check-dams in the Loess Plateau. The results indicate that there were approximately 11 000 check-dams distributed in the Loess Plateau, with an estimate of the amount of sediment of 21 × 10⁹ m³ and a soil organic carbon storage amount of 0.945 Pg. Our study reveals that check-dams in the Loess Plateau not only conserve soil and water but also sequester carbon.

  20. Field trials of the Baby Check score card: mothers scoring their babies at home.

    Science.gov (United States)

    Thornton, A J; Morley, C J; Green, S J; Cole, T J; Walker, K A; Bonnett, J M

    1991-01-01

    The Baby Check score card has been developed to help parents and health professionals grade the severity of acute illness in babies. This paper reports the results of two field trials in which mothers used Baby Check at home, 104 mothers scoring their babies daily for a week and 56 using it for six months. They all found Baby Check easy to use, between 68% and 81% found it useful, and 96% would recommended it to others. Over 70% of those using it daily used it very competently. Those using it infrequently did less well, suggesting that familiarity with the assessment is important. The scores obtained show that Baby Check's use would not increase the number of mothers seeking medical advice. With introduction and practice most mothers should be able to use Baby Check effectively. It should help them assess their babies' illnesses and make appropriate decisions about seeking medical advice.

  1. The Complexity of Checking Consistency of Pedigree Information and Related Problems

    Institute of Scientific and Technical Information of China (English)

    Luca Aceto; Jens A. Hansen; Anna Ingólfsdóttir; Jacob Johnsen; John Knudsen

    2004-01-01

    Consistency checking is a fundamental computational problem in genetics. Given a pedigree and information on the genotypes (of some) of the individuals in it, the aim of consistency checking is to determine whether these data are consistent with the classic Mendelian laws of inheritance. This problem arose originally from the geneticists' need to filter their input data from erroneous information, and is well motivated from both a biological and a sociological viewpoint. This paper shows that consistency checking is NP-complete, even with focus on a single gene and in the presence of three alleles. Several other results on the computational complexity of problems from genetics that are related to consistency checking are also offered. In particular, it is shown that checking the consistency of pedigrees over two alleles, and of pedigrees without loops, can be done in polynomial time.

  2. Towards Symbolic Model-Based Mutation Testing: Combining Reachability and Refinement Checking

    CERN Document Server

    Aichernig, Bernhard K; 10.4204/EPTCS.80.7

    2012-01-01

    Model-based mutation testing uses altered test models to derive test cases that are able to reveal whether a modelled fault has been implemented. This requires conformance checking between the original and the mutated model. This paper presents an approach for symbolic conformance checking of action systems, which are well-suited to specify reactive systems. We also consider nondeterminism in our models. Hence, we do not check for equivalence, but for refinement. We encode the transition relation as well as the conformance relation as a constraint satisfaction problem and use a constraint solver in our reachability and refinement checking algorithms. Explicit conformance checking techniques often face state space explosion. First experimental evaluations show that our approach has potential to outperform explicit conformance checkers.

  3. PVeStA: A Parallel Statistical Model Checking and Quantitative Analysis Tool

    KAUST Repository

    AlTurki, Musab

    2011-01-01

    Statistical model checking is an attractive formal analysis method for probabilistic systems such as, for example, cyber-physical systems which are often probabilistic in nature. This paper is about drastically increasing the scalability of statistical model checking, and making such scalability of analysis available to tools like Maude, where probabilistic systems can be specified at a high level as probabilistic rewrite theories. It presents PVeStA, an extension and parallelization of the VeStA statistical model checking tool [10]. PVeStA supports statistical model checking of probabilistic real-time systems specified as either: (i) discrete or continuous Markov Chains; or (ii) probabilistic rewrite theories in Maude. Furthermore, the properties that it can model check can be expressed in either: (i) PCTL/CSL, or (ii) the QuaTEx quantitative temporal logic. As our experiments show, the performance gains obtained from parallelization can be very high. © 2011 Springer-Verlag.

  4. Turbomachinery Design Quality Checks to Avoid Friction Induced Structural Failure

    Science.gov (United States)

    Moore, Jerry H.

    1999-01-01

    A unique configuration of the P&W SSME Alternate Fuel Turbopump turbine disk/blade assembly, combined with a severe thermal environment, resulted in several structural anomalies that were driven by frictional contact forces. Understanding the mechanics of these problems provides new quality checks for future turbo machinery designs. During development testing in 1997 of the SSME alternate fuel turbopump at Stennis Space Center, several potentially serious problems surfaced with the turbine disk/blade assembly that had not been experienced in extensive earlier testing. Changes to the operational thermal environment were noted based on analytical prediction of modifications that affected performance and on stationary thermal measurements adjacent to the rotor assembly. A detailed structural investigation was required to reveal the mechanism of distress induced by the change. The turbine disk experienced cracking in several locations due to increased thermal gradient induced stress during start and shutdown transients. This was easily predictable using standard analysis procedures and expected once the thermal environment was characterized. What was not expected was the curling of a piston ring used for blade axial retention in the disk, indentation of the axial face of the blade attachment by a spacer separating the first and second stage blades, and most significantly, galling and cracking of the blade root attachment that could have resulted in blade release. Past experience, in gas turbine environments, set a precedent of never relying on friction for help and to evaluate it only in specific instances where it was obvious that it would degrade capability. In each of the three cases above, friction proved to be a determining factor that pushed the components into an unsatisfactory mode of operation. The higher than expected temperatures and rapid thermal transients combined with friction to move beyond past experience. The turbine disk/blade assembly configuration

  5. Failure Modes and Causes for Swing and Lift Type Check Valves.

    Energy Technology Data Exchange (ETDEWEB)

    McElhaney, K.L.

    1997-12-31

    Prior to the recent work performed by Oak Ridge National Laboratory (ORNL)relative to nuclear industry check valve performance, no information was readily available regarding the failure characteristics of check valves based on valve type (e.g., swing check, lift check). Although it had been recognized by component experts that the two most significant factors in determining check valve performance were valve design (i.e., type) and operating conditions, no industry data was available relative to the former. In cooperation with the Nuclear Industry Check Valve Group (NIC), ORNL has reviewed and analyzed check valve failures from the Institute of Nuclear Power Operations` (INPOs`) Nuclear Plant Reliability Database System (NPRDS) according to several parameters,including valve type. Since the valve type identification is not inherently included within the NPRDS engineering record for each component, ORNL had to rely upon input from NIC, valve manufacturers, and catalogs to supply the missing information. As a result of this effort, approximately 77% of the check valve failures occurring during the 1991-1996 study period and nearly 62% of the overall installed population were identified according to type. This data provided the basis to perform previously unavailable cross-correlations between parameters such as valve type versus failure mode and failure cause. Design characteristics and service applications differ markedly among check valve types, resulting in discernible differences in performance. This paper focuses on the performance characteristics of swing and lift type check valves since failure and population distributions have shown these to be the two most common types employed in a wide range of nuclear plant applications.

  6. Application of risk-based methods to inservice testing of check valves

    Energy Technology Data Exchange (ETDEWEB)

    Closky, N.B.; Balkey, K.R.; McAllister, W.J. [and others

    1996-12-01

    Research efforts have been underway in the American Society of Mechanical Engineers (ASME) and industry to define appropriate methods for the application of risk-based technology in the development of inservice testing (IST) programs for pumps and valves in nuclear steam supply systems. This paper discusses a pilot application of these methods to the inservice testing of check valves in the emergency core cooling system of Georgia Power`s Vogtle nuclear power station. The results of the probabilistic safety assessment (PSA) are used to divide the check valves into risk-significant and less-risk-significant groups. This information is reviewed by a plant expert panel along with the consideration of appropriate deterministic insights to finally categorize the check valves into more safety-significant and less safety-significant component groups. All of the more safety-significant check valves are further evaluated in detail using a failure modes and causes analysis (FMCA) to assist in defining effective IST strategies. A template has been designed to evaluate how effective current and emerging tests for check valves are in detecting failures or in finding significant conditions that are precursors to failure for the likely failure causes. This information is then used to design and evaluate appropriate IST strategies that consider both the test method and frequency. A few of the less safety-significant check valves are also evaluated using this process since differences exist in check valve design, function, and operating conditions. Appropriate test strategies are selected for each check valve that has been evaluated based on safety and cost considerations. Test strategies are inferred from this information for the other check valves based on similar check valve conditions. Sensitivity studies are performed using the PSA model to arrive at an overall IST program that maintains or enhances safety at the lowest achievable cost.

  7. SU-D-BRD-01: An Automated Physics Weekly Chart Checking System Supporting ARIA

    Energy Technology Data Exchange (ETDEWEB)

    Chang, X; Yang, D [Washington University in St Louis, St Louis, MO (United States)

    2015-06-15

    Purpose: A software tool was developed in this study to perform automatic weekly physics chart check on the patient data in ARIA. The tool accesses the electronic patient data directly from ARIA server and checks the accuracy of treatment deliveries, and generates reports which summarize the delivery history and highlight the errors. Methods: The tool has four modules. 1) The database interface is designed to directly access treatment delivery data from the ARIA database before reorganizing the data into the patient chart tree (PCT). 2) PCT is a core data structure designed to store and organize the data in logical hierarchies, and to be passed among functions. 3) The treatment data check module analyzes the organized data in PCT and stores the checking results into PCT. 4) Report generation module generates reports containing the treatment delivery summary, chart checking results and plots of daily treatment setup parameters (couch table positions, shifts of image guidance). The errors that are found by the tool are highlighted with colors. Results: The weekly check tool has been implemented in MATLAB and clinically tested at two major cancer centers. Javascript, cascading style sheets (CSS) and dynamic HTML were employed to create the user-interactive reports. It takes 0.06 second to search the delivery records of one beam with PCT and compare the delivery records with beam plan. The reports, saved in the HTML files on shared network folder, can be accessed by web browser on computers and mobile devices. Conclusion: The presented weekly check tool is useful to check the electronic patient treatment data in Varian ARIA system. It could be more efficient and reliable than the manually check by physicists. The work was partially supported by a research grant from Varian Medical System.

  8. The Check Your Cannabis Screener: A New Online Personalized Feedback Tool

    OpenAIRE

    Cunningham, John A; van Mierlo, Trevor

    2009-01-01

    This brief report describes the development and first year of use of an Internet-based screener for Cannabis users. Two versions of the Check Your Cannabis screener were compared, one linked to an already established harm reduction website for young Cannabis users (as an exercise called “Check how I compare with others,” on www.WhatsWithWeed.ca) and the other a standalone version (www.CheckYourCannabis.net). The What’s With Weed version attracted ten times more users and had a significantly y...

  9. An Approach to Checking 3D Model with Related Engineering Drawings

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    For some reasons, engineers build their product 3D mo del according to a set of related engineering drawings. The problem is how we ca n know the 3D model is correct. The manual checking is very boring and time cons uming, and still could not avoid mistakes. Thus, we could not confirm the model, maybe try checking again. It will effect the production preparing cycle greatly , and should be solved in a intelligent way. The difficulties are quite obvious, unlike word checking in a word processing package, ...

  10. The check your cannabis screener: a new online personalized feedback tool.

    Science.gov (United States)

    Cunningham, John A; van Mierlo, Trevor

    2009-01-01

    This brief report describes the development and first year of use of an Internet-based screener for Cannabis users. Two versions of the Check Your Cannabis screener were compared, one linked to an already established harm reduction website for young Cannabis users (as an exercise called "Check how I compare with others," on www.WhatsWithWeed.ca) and the other a standalone version (www.CheckYourCannabis.net). The What's With Weed version attracted ten times more users and had a significantly younger audience as compared to the standalone version, underlining the benefits of targeting a website to a specific audience and linking to websites with already established reputations. Further work is needed to establish any impact on actual Cannabis use from taking the Check Your Cannabis screener.

  11. Notification: Fiscal Year 2015 Risk Assessment of EPA's Purchase Card and Convenience Check Programs

    Science.gov (United States)

    Project #OA-FY15-0064, August 26, 2015. The U.S. Environmental Protection Agency (EPA) Office oflnspector General (OIG) plans to begin the preliminary research phase ofauditing the agency's purchase card and convenience check programs.

  12. Notification: Review of the U.S. Environmental Protection Agency's Purchase Card and Convenience Check Program

    Science.gov (United States)

    Project #OA-FY13-0116, December 20, 2012. The U.S. Environmental Protection Agency, Office of Inspector General, plans to begin preliminary research for an audit of the agency’s purchase card and convenience check programs.

  13. Annotated Check List of the Spiders (Araneae) of the Mountain Zebra National Park

    OpenAIRE

    Anna S. Dippenaar-Schoeman

    1988-01-01

    A preliminary check list of the spider fauna of the Mountain Zebra National Park is given. Sixteen families, comprising 29 genera and 32 species, are recorded. Observations on the distribution, diagnostic morphology and behaviour of 15 species are given.

  14. Construct Validity evidence for the Intercultural Readiness Check against the Multicultural Personality Questionnaire.

    NARCIS (Netherlands)

    Van der Zee, KI; Brinkmann, U

    2004-01-01

    The psychometric qualities of the intercultural readiness check (IRC) were evaluated against an existing instrument for multicultural effectiveness: the Multicultural Personality Questionnaire (MPQ). The IRC has scales for intercultural sensitivity, intercultural communication, intercultural relatio

  15. Deterministic Compilation of Temporal Safety Properties in Explicit State Model Checking

    Data.gov (United States)

    National Aeronautics and Space Administration — The translation of temporal logic specifications constitutes an essen- tial step in model checking and a major influence on the efficiency of formal verification via...

  16. Get Your Kids Moving and Check Some Chores off Your List

    Science.gov (United States)

    ... Workplace Food and Beverage Toolkit Get Your Kids Moving and Check Some Chores Off Your List Updated: ... When you think about activities to get them moving, don’t forget to spread the love with ...

  17. Southeastern Cooperative wildlife disease study: Tennessee National Wildlife Refuge deer herd health checks

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Enclosed are our reports on the deer herd health checks we conducted on the Duck River and Big Sandy Units, Tennessee National Wildlife Refuge, Humphrey and Henry...

  18. [Southeastern Cooperative wildlife disease study: Tennessee National Wildlife Refuge deer herd health checks

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Enclosed are the reports on the deer herd health checks conducted on the Big Sandy and Duck River Units of Tennessee National Wildlife Refuge, Henry and Humphrey...

  19. Untreated hypertension in the UK household population — Who are missed by the general health checks?

    Directory of Open Access Journals (Sweden)

    Jakob Petersen

    2016-12-01

    Notably, many reported their health as good to excellent. A fact which emphasises the importance of motivating individuals to take part in the general health checks for an asymptomatic condition such as hypertension.

  20. 78 FR 23872 - HIPAA Privacy Rule and the National Instant Criminal Background Check System (NICS)

    Science.gov (United States)

    2013-04-23

    .../ola/testimony/112-1/11-15-11-fbi-cuthbertson-testimony-re-the-fix-gun-checks-act.pdf . \\6\\ The other... to the NICS. Such an amendment might produce clarity regarding the Privacy Rule and help make it...

  1. Mitigating check valve slamming and subsequentwater hammer events for PPFS using MOC

    Institute of Scientific and Technical Information of China (English)

    TIAN Wenxi; SU Guanghui; WANG Gaopeng; QIU Suizheng; XIAO Zejun

    2009-01-01

    The method of characteristic (MOC) was adopted to analyze the check valve-induced water hammer behaviors for a Parallel Pumps Feedwater System (PPFS) during the alternate startup process. The motion of check valve disc was simulated using inertial valve model. Transient parameters including the pressure oscillation, local flow velocity and slamming of the check valve disc etc. have been obtained. The results showed that severe slamming between the valve disc and valve seat occurred during the alternate startup of parallel pumps. The induced maximum pressure vibration amplitude is up to 5.0 MPa. The scheme of appending a damping torque to slow down the check valve closing speed was also performed to mitigate of water hammer. It has been numerically approved to be an effective approach.

  2. Low-Density Parity-Check Codes for High Data Rate Receivers Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Low-Density Parity-Check (LDPC) Forward Error Correction (FEC) schemes are excellent tools in optimizing telemetry data integrity within the limited space to ground...

  3. Efficient Symmetry Reduction and the Use of State Symmetries for Symbolic Model Checking

    Directory of Open Access Journals (Sweden)

    Christian Appold

    2010-06-01

    Full Text Available One technique to reduce the state-space explosion problem in temporal logic model checking is symmetry reduction. The combination of symmetry reduction and symbolic model checking by using BDDs suffered a long time from the prohibitively large BDD for the orbit relation. Dynamic symmetry reduction calculates representatives of equivalence classes of states dynamically and thus avoids the construction of the orbit relation. In this paper, we present a new efficient model checking algorithm based on dynamic symmetry reduction. Our experiments show that the algorithm is very fast and allows the verification of larger systems. We additionally implemented the use of state symmetries for symbolic symmetry reduction. To our knowledge we are the first who investigated state symmetries in combination with BDD based symbolic model checking.

  4. AB049. The importance of Uro-Andro-check in sexual medicine

    Science.gov (United States)

    Soebadi, Doddy M.

    2015-01-01

    Anomalies and pathologic conditions in human male can be detected pre-natal. "Uro-Andro-check" is a set of simple questions every physician can use to diagnose physically or with the help of a simple imaging e.g., ultrasound and laboratory tests in male from the birth until the end of life. This check begins prenatal when the pregnancy was routinely check with an ultrasound device, and when the baby boy was born, during the early stages of life, toddler, puberty, young adult, adult and aging male. The findings can be useful for early diagnosis and eventually treatment or prevention of diseases in the later stages of life, including the sexual life and preservation of other medical conditions in the objective of a good quality of life. We reviewed those conditions in connection with "Uro-Andro-check" and as an introduction for further studies in Male Health, especially in Sexual Medicine.

  5. THE CRITICALITY DEFINITIONS OF INFORMATION MANAGEMENT NETWORK UNITS IN VIEW OF CHECKING PROCEDURES

    Directory of Open Access Journals (Sweden)

    Mr. Sergey A. Sherstobitov

    2016-09-01

    Full Text Available The problem of improving quality of work of a complex system, depending on system components that have the greatest influence on its performance is being analyzed in the paper. The author justifies the urgency of solving the problem of determining the critical elements of the system under certain probabilistic performance of their work. The probable model of information management system is considered, the effect of checking procedures at different stages of the management cycle is investigated. The article discusses an approach to the definition of critical components of information management network in view of checking its parameters at different stages. The sensitivity of the probable error-free system operation in relation to the probabilities of stage checking is adopted as an indicator of the criticality. Finally, a numerical example of the sensitivity calculation of probable error-free system operation in relation to the probable checking of stages based on the proposed model is submitted.

  6. CrossCheck plagiarism screening : Experience of the Journal of Epidemiology

    Science.gov (United States)

    Hashimoto, Katsumi

    Due to technological advances in the past two decades, researchers now have unprecedented access to a tremendous amount of useful information. However, because of the extreme pressure to publish, this abundance of information can sometimes tempt researchers to commit scientific misconduct. A serious form of such misconduct is plagiarism. Editors are always concerned about the possibility of publishing plagiarized manuscripts. The plagiarism detection tool CrossCheck allows editors to scan and analyze manuscripts effectively. The Journal of Epidemiology took part in a trial of CrossCheck, and this article discusses the concerns journal editors might have regarding the use of CrossCheck and its analysis. In addition, potential problems identified by CrossCheck, including self-plagiarism, are introduced.

  7. Effects of check dams on runoff characteristics along gully reaches, the case of Northern Ethiopia

    Science.gov (United States)

    Guyassa, Etefa; Frankl, Amaury; Zenebe, Amanuel; Poesen, Jean; Nyssen, Jan

    2017-02-01

    In the Highlands of Northern Ethiopia soil and water conservation (SWC) practices, including construction of check dams in gullies, have been widely implemented for the last three decades. Despite this extensive installation of check dams, their effects on runoff response are not well understood as compared to those of other SWC practices. Hence, this study examines the effects of check dams on runoff response in gully channels. 90 degree V-notch weirs were installed to measure a wide range of runoff discharges at the upper and lower sections of five gully reaches: two channel cut in sandstone (a gully with check dams and vegetation (SCV) and an untreated gully (S)) and three cut in limestone (an untreated gully (L), a gully with check dams but no vegetation (LC) and a gully with check dams and vegetation (LCV)). Automatic sensors were installed to monitor runoff depth during two rainy seasons (29/08/14 - 17/09/14 and 24/7/15 - 14/09/15). All runoff characteristics at the lower section of each gully reaches were calculated for a gully reaches length of 50 m. In the sandstone area, the results show longer lag times of runoff to reach the lower section of the channel reach in the treated gully (SCV) compared to the untreated gully: difference in time lag equal lag to production of runoff equals 51% for runoff initiation, 61% for peak runoff and 44% for runoff end. An increase of hydraulic roughness by check dams and water transmission losses in deposited sediments are responsible for the delay of runoff to reach the lower part of the gully channels. In the limestone area, different time lags were recorded in different gully reaches regardless of the treatment effects (lag to runoff initiation, lag to peak flow and lag to runoff end were larger at LC, L and LCV, respectively). The reduction of peak runoff discharge between the upper and lower gully sections was larger in the gullies with check dam and vegetation (8-17%) than in gullies without treatment (5

  8. Automatic Post-Operational Checks for the LHC Beam Dump System

    CERN Document Server

    Gallet, E; Baggiolini, V; Carlier, E; Goddard, B; Kain, V; Lamont, M; Magnin, N; Verhagen, H; Uythoven, J

    2008-01-01

    In order to ensure the required level of reliability of the LHC beam dump system a series of post-operational checks must be performed after each dump action. This paper describes the various data handling and data analysis systems which are required internally and at different levels of the LHC control system, for postoperational checks, and the experience from the commissioning of the equipment where these systems were used to analyse the dump kicker performance.

  9. Towards Symbolic Model Checking for Multi-Agent Systems via OBDDs

    Science.gov (United States)

    Raimondi, Franco; Lomunscio, Alessio

    2004-01-01

    We present an algorithm for model checking temporal-epistemic properties of multi-agent systems, expressed in the formalism of interpreted systems. We first introduce a technique for the translation of interpreted systems into boolean formulae, and then present a model-checking algorithm based on this translation. The algorithm is based on OBDD's, as they offer a compact and efficient representation for boolean formulae.

  10. An analysis of check valve performance characteristics based on valve design

    Energy Technology Data Exchange (ETDEWEB)

    McElhaney, K.L. [Oak Ridge National Lab., TN (United States). Engineering Technology Div.

    2000-04-01

    Although it had been theorized by nuclear industry valve experts that the two most significant factors in assessing check valve performance were valve type (or design) and operating conditions, until recently, no data was available to support their assumptions. In co-operation with the Nuclear Industry Check Valve Group (NIC), Oak Ridge National Laboratory (ORNL) undertook a review and analysis of check valve failures recorded in the Institute of Nuclear Power Operations' (INPO) Nuclear Plant Reliability Data System (NPRDS). This study involved the characterization of failures according to several parameters, including valve design (e.g. swing check, lift check). Since the valve design is not inherently included within the NPRDS engineering record for each component in the database, ORNL relied on input from NIC, valve manufacturers and catalogs to supply the missing information. As a result, nearly 60% of the 21000 check valves listed in the NPRDS component database and 85% of the 838 failures occurring during 1991-1992 were identified according to valve design. This data provided the basis to perform previously unavailable cross-correlations between parameters such as valve design versus failure mode, valve design versus failure discovery method, population/failure distributions by valve design, etc. Performance assessments and predictions based on more specific sets of parameters (as opposed to generic check valve failure rates obtained from standard reference sources that generally ignore the valve design) should result in a significant impact on future nuclear plant operations, including inservice testing (IST) practices, maintenance, and probabilistic risk assessments (PRAs) by providing a means to calculate more appropriate relative (and ultimately absolute) failure rates for check valves. (orig.)

  11. REGULAR LOW-DENSITY PARITY-CHECK CODES BASED ON SHIFTED IDENTITY MATRICES

    Institute of Scientific and Technical Information of China (English)

    He Shanbao; Zhao Chunming; Jiang Ming

    2006-01-01

    This paper extends the class of Low-Density Parity-Check (LDPC) codes that can be constructed from shifted identity matrices. To construct regular LDPC codes, a new method is proposed. Two simple inequations are adopted to avoid the short cycles in Tanner graph, which makes the girth of Tanner graphs at least 8. Because their parity-check matrices are made up of circulant matrices, the new codes are quasi-cyclic codes. They perform well with iterative decoding.

  12. Long Term Implementation of a 100 Percent Checked Baggage Screening System: A Value Focused Thinking Approach

    Science.gov (United States)

    2003-03-01

    baggage checking system. The checked baggage system in place at Dayton International Airport is an interim solution. EDS and explosive trace detection machines...system will include detection equipment such as Explosive Trace Detection (ETD) systems, EDS machines, conveyor systems, and operators necessary to run...4.1.1 Terminal Floor System – Interim as of 31 December 2002 This interim system consists of the placement of EDS and Explosive Trace Detection machines

  13. ELECTRO-RESISTANCE METHOD OF CHECK A PROCESS GRINDING THE ROLLING BEARINGS

    Directory of Open Access Journals (Sweden)

    K. V. Podmasteryev

    2015-01-01

    Full Text Available Base a possibility of monitoring processes of grinding the rolling bearings with use electroresistance method of check. Is write of essence this method, are analyses his peculiarities, which are provide objective information on the condition a object by his grinding. Are consider the results of experimental researches the effective different diagnostically parameters, which are confirm a possibility of realization objective check of grinding the rolling bearings with use electro-resistance method.

  14. A standardized vascular disease health check in europe: a cost-effectiveness analysis.

    Directory of Open Access Journals (Sweden)

    C Andy Schuetz

    Full Text Available BACKGROUND: No clinical trials have assessed the effects or cost-effectiveness of health check strategies to detect and manage vascular disease. We used a mathematical model to estimate the cost-effectiveness of several health check strategies in six European countries. METHODS: We used country-specific data from Denmark, France, Germany, Italy, Poland, and the United Kingdom to generate simulated populations of individuals aged 40-75 eligible for health checks in those countries (e.g. individuals without a previous diagnosis of diabetes, myocardial infarction, stroke, or serious chronic kidney disease. For each country, we used the Archimedes model to compare seven health check strategies consisting of assessments for diabetes, hypertension, lipids, and smoking. For patients diagnosed with vascular disease, treatment was simulated in a standard manner. We calculated the effects of each strategy on the incidence of type 2 diabetes, major adverse cardiovascular events (MACE, and microvascular complications in addition to quality of life, costs, and cost per quality-adjusted life-year (QALY. RESULTS: Compared with current care, health checks reduced the incidence of MACE (6-17 events prevented per 1000 people screened and diabetes related microvasular complications (5-11 events prevented per 1000 people screened, and increased QALYs (31-59 discounted QALYs over 30 years, in all countries. The cost per QALY of offering a health check to all individuals in the study cohort ranged from €14903 (France to cost saving (Poland. Pre-screening the population and offering health checks only to higher risk individuals lowered the cost per QALY. Pre-screening on the basis of obesity had a cost per QALY of €10200 (France or less, and pre-screening with a non-invasive risk score was similar. CONCLUSIONS: A vascular disease health check would likely be cost effective at 30 years in Denmark, France, Germany, Italy, Poland, and the United Kingdom.

  15. Introducing EbolaCheck: potential for point-of-need infectious disease diagnosis

    OpenAIRE

    Moschos, S.

    2015-01-01

    The 2013–2015 Ebolavirus disease humanitarian crisis has spurred the development of laboratory-free, point-of-care nucleic acid testing solutions. EbolaCheck is an international consortium of public health, academic and biotechnology industry stakeholders aiming to deliver clinical molecular diagnostic standard-of-care testing suitable for the West African milieu within 12 months. In this article, the current status of the EbolaCheck platform is discussed in the context of the current regulat...

  16. Hydrologic response of streams restored with check dams in the Chiricahua Mountains, Arizona

    Science.gov (United States)

    Norman, Laura M.; Brinkerhoff, Fletcher C.; Gwilliam, Evan; Guertin, D. Phillip; Callegary, James B.; Goodrich, David C.; Nagler, Pamela L.; Gray, Floyd

    2016-01-01

    In this study, hydrological processes are evaluated to determine impacts of stream restoration in the West Turkey Creek, Chiricahua Mountains, southeast Arizona, during a summer-monsoon season (June–October of 2013). A paired-watershed approach was used to analyze the effectiveness of check dams to mitigate high flows and impact long-term maintenance of hydrologic function. One watershed had been extensively altered by the installation of numerous small check dams over the past 30 years, and the other was untreated (control). We modified and installed a new stream-gauging mechanism developed for remote areas, to compare the water balance and calculate rainfall–runoff ratios. Results show that even 30 years after installation, most of the check dams were still functional. The watershed treated with check dams has a lower runoff response to precipitation compared with the untreated, most notably in measurements of peak flow. Concerns that downstream flows would be reduced in the treated watershed, due to storage of water behind upstream check dams, were not realized; instead, flow volumes were actually higher overall in the treated stream, even though peak flows were dampened. We surmise that check dams are a useful management tool for reducing flow velocities associated with erosion and degradation and posit they can increase baseflow in aridlands.

  17. Evaporation Ponds or Recharge Structures ? the Role of Check Dams in Arkavathy River Basin, India

    Science.gov (United States)

    Jeremiah, K.; Srinivasan, V.; R, A.

    2014-12-01

    "Watershed development" has been the dominant paradigm for water management in India for the last two decades. Current spending on watershed development programmes rivals spending on large dams. In practice, watershed development involves a range of soil and water conservation measures including building check dams, gully plugs, contour bunds etc. Despite their dominance in water management paradigms, relatively little empirical data exists on these structures. Importantly, even though the benefits of individual watershed structures are recognized, the cumulative impact of building hundreds of such structures on hydrologic partitioning of a watershed remains unknown. We investigated the role of check dams in two small milli-watersheds in the Arkavathy River basin in South India. We conducted a comprehensive census of all check dams in the two milli-watersheds with a total area of 26 sq km. 40 check dams (representing a density of 1.35/sq km of watershed area) were geotagged, photographed, measured and their condition was recorded. We then selected twelve check dams and monitored the water stored using capacitance sensors. We also set up Automatic Weather Stations in each watershed. Inflows, evaporation and infiltration were calculated at each site to evaluate how check dams alter hydrologic partitioning in the watershed as a whole.

  18. On Diagnostic Checking of Vector ARMA-GARCH Models with Gaussian and Student-t Innovations

    Directory of Open Access Journals (Sweden)

    Yongning Wang

    2013-04-01

    Full Text Available This paper focuses on the diagnostic checking of vector ARMA (VARMA models with multivariate GARCH errors. For a fitted VARMA-GARCH model with Gaussian or Student-t innovations, we derive the asymptotic distributions of autocorrelation matrices of the cross-product vector of standardized residuals. This is different from the traditional approach that employs only the squared series of standardized residuals. We then study two portmanteau statistics, called Q1(M and Q2(M, for model checking. A residual-based bootstrap method is provided and demonstrated as an effective way to approximate the diagnostic checking statistics. Simulations are used to compare the performance of the proposed statistics with other methods available in the literature. In addition, we also investigate the effect of GARCH shocks on checking a fitted VARMA model. Empirical sizes and powers of the proposed statistics are investigated and the results suggest a procedure of using jointly Q1(M and Q2(M in diagnostic checking. The bivariate time series of FTSE 100 and DAX index returns is used to illustrate the performance of the proposed portmanteau statistics. The results show that it is important to consider the cross-product series of standardized residuals and GARCH effects in model checking.

  19. Seeking more Opportunities of Check Dams' harmony with nearby Circumstances via Design Thinking Process

    Science.gov (United States)

    Lin, Huan-Chun; Chen, Su-Chin; Tsai, Chen-Chen

    2014-05-01

    The contents of engineering design should indeed contain both science and art fields. However, the art aspect is too less discussed to cause an inharmonic impact with natural surroundings, and so are check dams. This study would like to seek more opportunities of check dams' harmony with nearby circumstances. According to literatures review of philosophy and cognition science fields, we suggest a thinking process of three phases to do check dams design work for reference. The first phase, conceptualization, is to list critical problems, such as the characteristics of erosion or deposition, and translate them into some goal situations. The second phase, transformation, is to use cognition methods such as analogy, association and metaphors to shape an image and prototypes. The third phase, formation, is to decide the details of the construction, such as stable safety analysis of shapes or materials. According to the previous descriptions, Taiwan's technological codes or papers about check dam design mostly emphasize the first and third phases, still quite a few lacks of the second phase. We emphases designers shouldn't ignore any phase of the framework especially the second one, or they may miss some chances to find more suitable solutions. Otherwise, this conceptual framework is simple to apply and we suppose it's a useful tool to design a more harmonic check dam with nearby natural landscape. Key Words: check dams, design thinking process, conceptualization, transformation, formation.

  20. Postcode Lotteries in Public Health - The NHS Health Checks Programme in North West London

    Directory of Open Access Journals (Sweden)

    McCoy David C

    2011-09-01

    Full Text Available Abstract Background Postcode lotteries in health refer to differences in health care between different geographic areas. These have been previously associated with clinical services. However there has been little documentation of postcode lotteries relating to preventative health care services. This paper describes a postcode lottery effect in relation to the NHS Health Checks Programme (a national cardiovascular screening programme in England in eight PCTs in the North West sector of London. Methods A descriptive cross-sectional analysis of the Health Checks Programme was carried out in eight PCTs in North West London using a structured data-collecting instrument. Results The analysis found variation in the implementation of the national Health Checks Programme in terms of: the screening approach taken; the allocated budget (which varied from £69,000 to £1.4 million per 100,000 eligible population; payment rates made to providers of Health Checks; tools used to identify and measure risk of cardiovascular disease and diabetes; monitoring and evaluation; and preventative services available following the health check. Conclusions This study identifies a postcode lottery effect related to a national public health programme. Although it is important to allow enough flexibility in the design of the Health Checks Programme so that it fits in with local factors, aspects of the programme may benefit from greater standardisation or stronger national guidance.

  1. A Parallel Decoding Algorithm for Short Polar Codes Based on Error Checking and Correcting

    Directory of Open Access Journals (Sweden)

    Yingxian Zhang

    2014-01-01

    Full Text Available We propose a parallel decoding algorithm based on error checking and correcting to improve the performance of the short polar codes. In order to enhance the error-correcting capacity of the decoding algorithm, we first derive the error-checking equations generated on the basis of the frozen nodes, and then we introduce the method to check the errors in the input nodes of the decoder by the solutions of these equations. In order to further correct those checked errors, we adopt the method of modifying the probability messages of the error nodes with constant values according to the maximization principle. Due to the existence of multiple solutions of the error-checking equations, we formulate a CRC-aided optimization problem of finding the optimal solution with three different target functions, so as to improve the accuracy of error checking. Besides, in order to increase the throughput of decoding, we use a parallel method based on the decoding tree to calculate probability messages of all the nodes in the decoder. Numerical results show that the proposed decoding algorithm achieves better performance than that of some existing decoding algorithms with the same code length.

  2. Influence of check dams on debris-flow run-out intensity

    Directory of Open Access Journals (Sweden)

    A. Remaître

    2008-12-01

    Full Text Available Debris flows are very dangerous phenomena claiming thousands of lives and millions of Euros each year over the world. Disaster mitigation includes non-structural (hazard mapping, insurance policies, active structural (drainage systems and passive structural (check dams, stilling basins countermeasures. Since over twenty years, many efforts are devoted by the scientific and engineering communities to the design of proper devices able to capture the debris-flow volume and/or break down the energy. If considerable theoretical and numerical work has been performed on the size, the shape and structure of check dams, allowing the definition of general design criteria, it is worth noting that less research has focused on the optimal location of these dams along the debris-flow pathway.

    In this paper, a methodological framework is proposed to evaluate the influence of the number and the location of the check dams on the reduction of the debris-flow intensity (in term of flow thickness, flow velocity and volume. A debris-flow model is used to simulate the run-out of the debris flow. The model uses the Janbu force diagram to resolve the force equilibrium equations; a bingham fluid rheology is introduced and represents the resistance term. The model has been calibrated on two muddy debris-flow events that occurred in 1996 and 2003 at the Faucon watershed (South French Alps.

    Influence of the check dams on the debris-flow intensity is quantified taking into account several check dams configurations (number and location as input geometrical parameters. Results indicate that debris-flow intensity is decreasing with the distance between the source area and the first check dams. The study demonstrates that a small number of check dams located near the source area may decrease substantially the debris-flow intensity on the alluvial fans.

  3. Impact of alcohol checks and social norm on driving under the influence of alcohol (DUI).

    Science.gov (United States)

    Meesmann, Uta; Martensen, Heike; Dupont, Emmanuelle

    2015-07-01

    This study investigated the influence of alcohol checks and social norm on self-reported driving under the influence of alcohol above the legal limit (DUI). The analysis was based on the responses of 12,507 car drivers from 19 European countries to the SARTRE-4 survey (2010). The data were analysed by means of a multiple logistic regression-model on two levels: (1) individual and (2) national level. On the individual level the results revealed that driving under the influence (DUI) was positively associated with male gender, young age (17-34), personal experience with alcohol checks, the perceived likelihood of being checked for alcohol, perceived drunk driving behaviour of friends (social norm) and was negatively associated with higher age (55+). On a national level, the results showed a negative association with a lower legal alcohol limit (BAC 0.2g/l compared with BAC 0.5g/l) and the percentage of drivers checked for alcohol. DUI was positively associated with the percentage of respondents in the country that reported that their friends drink and drive (social norm). The comparison of the results obtained on national and individual levels shows a paradoxical effect of alcohol checks: Countries with more alcohol checks show lower DUI (negative association) but respondents who have been personally checked for alcohol show a higher chance of DUI (positive association). Possible explanations of this paradox are discussed. The effects of the social norm variable (perceived drunk driving behaviour of friends) are positively associated with DUI on both levels.

  4. Check Box List组件在ADO.net中的应用%Application of Check Box List Component to ADO.Net

    Institute of Scientific and Technical Information of China (English)

    谷宝磊; 姜秀柱

    2010-01-01

    通过对一个WEB应用程序分析,旨在阐述如何将数据库中的字段绑定到Check Box List组件,并将数据库的某一字段的值作为其Item集合的成员,当Check Box List中的若干选项被选中时,触发读取数据库中对应的数据记录并在WEB页面上显示.从数据绑定、选中项判断、选中项的获取、数据读取显示等不同方面进行阐述,希望对实际的WEB应用程序的开发具有一定的参考价值.

  5. Assessing the hydrological effect of the check dams in the Loess Plateau, China by model simulations

    Directory of Open Access Journals (Sweden)

    Y. D. Xu

    2012-12-01

    Full Text Available Check dams are commonly used for soil conservation. In the Loess Plateau of China, check dams have been widely constructed as the principal means to retain floodwater and intercept soil sediments since the 1970s. However, little research has been done to quantify the hydrological effects of the check dams.

    In this research, the SWAT model (Soil and Water Assessment Tool was applied to simulate the runoff and sediment in the Yanhe watershed in the Loess Plateau. We treated the 1950s to 1960s as "reference period" since there were very few check dams during the period. The model was first calibrated and validated in the "reference period". The calibrated model was then used in the later periods to simulate the hydrological effects of the check dams.

    The results showed that the check dams had a regulation effect on runoff and a retention effect on sediment. From 1984 to 1987, the runoff in rainy season (from May to October decreased by 14.7 to 25.9% due to the check dams, while in dry season (from November to the following April, runoff increased by 60.5 to 101.2%; the sediment in rainy season decreased by 34.6 to 48.0%. From 2006 to 2008, the runoff in rainy season decreased by 15.5 to 28.9%, and the runoff in dry season increased by 20.1 to 46.4%; the sediment in rainy season decreased by 79.4 to 85.5%.

    Construction of the large number of in the Loess Plateau has enhanced the region's capacity to control the runoff and sediment. In the Yanhe watershed, the annual runoff was reduced by less than 14.3% due to the check dams; and the sediment in rainy season was blocked by up to 85.5%. Thus, check dams are effective measures for soil erosion control in the Loess Plateau.

  6. Check Point FireWall-1防火墙的特性及应用%Check Point FireWall-1 Technical Features and Application

    Institute of Scientific and Technical Information of China (English)

    刘昌华; 左爱群

    2004-01-01

    介绍Check Point FireWall-1 防火墙专有的状态监测技术和安全企业连通性开放平台(OPSEC)技术,分布式客户机/服务器的体系结构与组成,并给出其在企业Intranet安全系统中的应用方案.

  7. Pump, and earth-testable spacecraft capillary heat transport loop using augmentation pump and check valves

    Science.gov (United States)

    Baker, David (Inventor)

    1998-01-01

    A spacecraft includes heat-generating payload equipment, and a heat transport system with a cold plate thermally coupled to the equipment and a capillary-wick evaporator, for evaporating coolant liquid to cool the equipment. The coolant vapor is coupled to a condenser and in a loop back to the evaporator. A heated coolant reservoir is coupled to the loop for pressure control. If the wick is not wetted, heat transfer will not begin or continue. A pair of check valves are coupled in the loop, and the heater is cycled for augmentation pumping of coolant to and from the reservoir. This augmentation pumping, in conjunction with the check valves, wets the wick. The wick liquid storage capacity allows the augmentation pump to provide continuous pulsed liquid flow to assure continuous vapor transport and a continuously operating heat transport system. The check valves are of the ball type to assure maximum reliability. However, any type of check valve can be used, including designs which are preloaded in the closed position. The check valve may use any ball or poppet material which resists corrosion. For optimum performance during testing on Earth, the ball or poppet would have neutral buoyancy or be configured in a closed position when the heat transport system is not operating. The ball may be porous to allow passage of coolant vapor.

  8. Model checking methodology for large systems, faults and asynchronous behaviour. SARANA 2011 work report

    Energy Technology Data Exchange (ETDEWEB)

    Lahtinen, J. [VTT Technical Research Centre of Finland, Espoo (Finland); Launiainen, T.; Heljanko, K.; Ropponen, J. [Aalto Univ., Espoo (Finland). Dept. of Information and Computer Science

    2012-07-01

    Digital instrumentation and control (I and C) systems are challenging to verify. They enable complicated control functions, and the state spaces of the models easily become too large for comprehensive verification through traditional methods. Model checking is a formal method that can be used for system verification. A number of efficient model checking systems are available that provide analysis tools to determine automatically whether a given state machine model satisfies the desired safety properties. This report reviews the work performed in the Safety Evaluation and Reliability Analysis of Nuclear Automation (SARANA) project in 2011 regarding model checking. We have developed new, more exact modelling methods that are able to capture the behaviour of a system more realistically. In particular, we have developed more detailed fault models depicting the hardware configuration of a system, and methodology to model function-block-based systems asynchronously. In order to improve the usability of our model checking methods, we have developed an algorithm for model checking large modular systems. The algorithm can be used to verify properties of a model that could otherwise not be verified in a straightforward manner. (orig.)

  9. Cross-entropy optimisation of importance sampling parameters for statistical model checking

    CERN Document Server

    Jégourel, Cyrille; Sedwards, Sean

    2012-01-01

    Statistical model checking avoids the exponential growth of states associated with probabilistic model checking by estimating properties from multiple executions of a system and by giving results within confidence bounds. Rare properties are often very important but pose a particular challenge for simulation-based approaches, hence a key objective under these circumstances is to reduce the number and length of simulations necessary to produce a given level of confidence. Importance sampling is a well-established technique that achieves this, however to maintain the advantages of statistical model checking it is necessary to find good importance sampling distributions without considering the entire state space. Motivated by the above, we present a simple algorithm that uses the notion of cross-entropy to find the optimal parameters for an importance sampling distribution. In contrast to previous work, our algorithm uses a low dimensional vector of parameters to define this distribution and thus avoids the ofte...

  10. Family-Based Model Checking Without a Family-Based Model Checker

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar; Al-Sibahi, Ahmad Salim; Brabrand, Claus

    2015-01-01

    (systems with variability), specialized family-based model checking algorithms allow efficient verification of multiple variants, simultaneously. These algorithms scale much better than ``brute force'' verification of individual systems, one-by-one. Nevertheless, they can deal with only very small...... variational models. We address two key problems of family-based model checking. First, we improve scalability by introducing abstractions that simplify variability. Second, we reduce the burden of maintaining specialized family-based model checkers, by showing how the presented variability abstractions can...... be used to model-check variational models using the standard version of (single system) SPIN. The abstractions are first defined as Galois connections on semantic domains. We then show how to translate them into syntactic source-to-source transformations on variational models. This allows the use of SPIN...

  11. Quantitative Safety: Linking Proof-Based Verification with Model Checking for Probabilistic Systems

    CERN Document Server

    Ndukwu, Ukachukwu

    2009-01-01

    This paper presents a novel approach for augmenting proof-based verification with performance-style analysis of the kind employed in state-of-the-art model checking tools for probabilistic systems. Quantitative safety properties usually specified as probabilistic system invariants and modeled in proof-based environments are evaluated using bounded model checking techniques. Our specific contributions include the statement of a theorem that is central to model checking safety properties of proof-based systems, the establishment of a procedure; and its full implementation in a prototype system (YAGA) which readily transforms a probabilistic model specified in a proof-based environment to its equivalent verifiable PRISM model equipped with reward structures. The reward structures capture the exact interpretation of the probabilistic invariants and can reveal succinct information about the model during experimental investigations. Finally, we demonstrate the novelty of the technique on a probabilistic library cas...

  12. [Helsinki Declaration on Patient Safety in Anaesthesiology--Part 8: SOP for checking equipment and drugs].

    Science.gov (United States)

    Happel, Oliver; Roewer, Norbert; Kranke, Peter

    2013-09-01

    In 2010 the Helsinki Declaration on Patient Safety in Anaesthesiology was launched. In this joined statement under the auspice of the European Society of Anaesthesiology the need for protocols for different aspects of perioperative procedures that could affect patient safety was stated. All participating institutions should have--among others--protocols for checking equipment and drugs required for the delivery of safe anaesthesia. The background for this being the fact that the lack of carefully checking equipment and drugs--or not adhering to existing checklists--is a latent threat to patient safety and thus may increase morbidity and mortality.In this part of a series the authors present protocols existing in their clinic for checking anaesthesia equipment and drugs.

  13. Chinese Primary Standard Seawater: Stability checks and comparisons with IAPSO Standard Seawater

    Science.gov (United States)

    Li, Yanan; Luo, Yan; Kang, Ying; Yu, Tao; Wang, Aijun; Zhang, Chuan

    2016-07-01

    The authors give a brief introduction to the Chinese Primary Standard Seawater, with a description of its preparation procedures. IAPSO Standard Seawater (IAPSO SSW), was taken as a stable reference in the stability check of Chinese Primary Standard Seawater (CP SSW), and linear regression model as well as hypothesis testing were introduced into the analysis of check results; a demonstration check of CP SSW (batch number P8) achieved a positive conclusion. In comparisons of several batches of these two kinds of standard seawater on Practical Salinity, identical seawater samples from a homogeneous source were measured repeatedly. To evaluate the comparison results, performance criteria referred to as En numbers were adopted, the maximum of which was 0.42, indicating that no significant differences lay between these two kinds of SSWs when used to determine Practical Salinity. Measures taken to assure the reliability of measurement results are presented.

  14. Quasi Cyclic Low Density Parity Check Code for High SNR Data Transfer

    Directory of Open Access Journals (Sweden)

    M. R. Islam

    2010-06-01

    Full Text Available An improved Quasi Cyclic Low Density Parity Check code (QC-LDPC is proposed to reduce the complexity of the Low Density Parity Check code (LDPC while obtaining the similar performance. The proposed QC-LDPC presents an improved construction at high SNR with circulant sub-matrices. The proposed construction yields a performance gain of about 1 dB at a 0.0003 bit error rate (BER and it is tested on 4 different decoding algorithms. Proposed QC-LDPC is compared with the existing QC-LDPC and the simulation results show that the proposed approach outperforms the existing one at high SNR. Simulations are also performed varying the number of horizontal sub matrices and the results show that the parity check matrix with smaller horizontal concatenation shows better performance.

  15. Field trials of the Baby Check score card in general practice.

    Science.gov (United States)

    Morley, C J; Thornton, A J; Green, S J; Cole, T J

    1991-01-01

    Sixteen general practitioners (GPs) used the Baby Check score card to assess illness severity in 86 babies under 6 months old. Their reactions to Baby Check were positive: in 79 (92%) it gave an accurate assessment of the baby's illness and 16 (100%) said they would trust it. Fifteen (94%) found it useful, and most of those who did not said the baby was not ill or had an obvious diagnosis. Thirteen (81%) said they would use it and wanted their health visitors and midwives to use it and 15 (94%) wanted the mothers in their practice to use it. The majority (64%) of babies scored 0-7; 31% scored 8 to 19; and only 5% scored over 20. Well babies had low scores, while the two sickest babies, needing urgent hospital treatment, scored 29 and 33. The use of Baby Check by GPs would help them assess babies thoroughly and quantify illness severity objectively.

  16. Local Model Checking of Weighted CTL with Upper-Bound Constraints

    DEFF Research Database (Denmark)

    Jensen, Jonas Finnemann; Larsen, Kim Guldstrand; Srba, Jiri

    2013-01-01

    graphs. We implement all algorithms in a publicly available tool prototype and evaluate them on several experiments. The principal conclusion is that our local algorithm is the most efficient one with an order of magnitude improvement for model checking problems with a high number of “witnesses”.......We present a symbolic extension of dependency graphs by Liu and Smolka in order to model-check weighted Kripke structures against the logic CTL with upper-bound weight constraints. Our extension introduces a new type of edges into dependency graphs and lifts the computation of fixed-points from...... boolean domain to nonnegative integers in order to cope with the weights. We present both global and local algorithms for the fixed-point computation on symbolic dependency graphs and argue for the advantages of our approach compared to the direct encoding of the model checking problem into dependency...

  17. Neighborhood deprivation is strongly associated with participation in a population-based health check

    DEFF Research Database (Denmark)

    Bender, Anne Mette; Kawachi, Ichiro; Jørgensen, Torben;

    2015-01-01

    screening for ischemic heart disease and lifestyle counseling. The study population was randomly drawn from a population of 179,097 persons living in 73 neighborhoods in Denmark. Data on neighborhood deprivation (percentage with basic education, with low income and not in work) and individual socioeconomic...... for income deprivation remained statistically significant. CONCLUSION: Neighborhood deprivation was associated with participation in a population-based health check in a dose-response manner, in which increasing neighborhood deprivation was associated with decreasing participation. This suggests the need......BACKGROUND: We sought to examine whether neighborhood deprivation is associated with participation in a large population-based health check. Such analyses will help answer the question whether health checks, which are designed to meet the needs of residents in deprived neighborhoods, may increase...

  18. The value of including spirometry in health checks - a randomized controlled study in primary health care

    DEFF Research Database (Denmark)

    Ørts, Lene Maria; Ottesen, Anders Løkke; Bjerregaard, Anne-Louise

    aged 30-49 years will be randomized into two groups: The intervention group receives an invitation which highlights the value of spirometry as part of a health check and information about lung diseases. The control group will receive a standard invitation. Primary outcome measure is effect...... on attendance. The characteristics of the 2 groups will be described according to sex, age, smoking history, spirometry values and lung symptoms. Results This is a presentation of the method, therefore we do not have any results yet. Conclusion The results from the present study are expected to contribute...... with important knowledge about the value of information on spirometry in invitations to health checks measured at different levels of attendance – as described above. Point of discussion The study is part of a Ph.D. project evaluating the use of spirometry as an element in preventive health checks. Further...

  19. CheckMATE: Confronting your Favourite New Physics Model with LHC Data

    CERN Document Server

    Drees, Manuel; Kim, Jong Soo; Schmeier, Daniel; Tattersall, Jamie

    2013-01-01

    In the first three years of running, the LHC has delivered a wealth of new data that is now being analysed. With over 20 fb$^{-1}$ of integrated luminosity, both ATLAS and CMS have performed many searches for new physics that theorists are eager to test their model against. However, tuning the detector simulations, understanding the particular analysis details and interpreting the results can be a tedious task. CheckMATE (Check Models At Terascale Energies) is a program package which accepts simulated event files in many formats for any model. The program then determines whether the model is excluded or not at 95% C.L. by comparing to many recent experimental analyses. Furthermore the program can calculate confidence limits and provide detailed information about signal regions of interest. It is simple to use and the program structure allows for easy extensions to upcoming LHC results in the future. CheckMATE can be found at: http://checkmate.hepforge.org

  20. GPS based checking survey and precise DEM development in Open mine

    Institute of Scientific and Technical Information of China (English)

    XU Ai-gong

    2008-01-01

    The checking survey in Open mine is one of the most frequent and important work. It plays the role of forming a connecting link between open mine planning and production. Traditional checking method has such disadvantages as long time consumption,heavy workload, complicated calculating process, and lower automation. Used GPS and GIS technologies to systematically study the core issues of checking survey in open mine.A detail GPS data acquisition coding scheme was presented. Based on the scheme an algorithm used for computer semiautomatic cartography was made. Three methods used for eliminating gross errors from raw data which were needed for creating DEM was discussed. Two algorithms were researched and realized which can be used to create open mine fine DEM model with constrained conditions and to dynamically update the model.The precision analysis and evaluation of the created model were carried out.

  1. Checking of seismic and tsunami hazard for coastal NPP of Chinese continent after Fukushima nuclear accident

    Institute of Scientific and Technical Information of China (English)

    Chang Xiangdong; Zhou Bengang; Zhao Lianda

    2013-01-01

    A checking on seismic and tsunami hazard for coastal nuclear power plant (NPP) of Chinese continent has been made after Japanese Fukushima nuclear accident caused by earthquake tsunami.The results of the checking are introduced briefly in this paper,including the evaluations of seismic and tsunami hazard in NPP siting period,checking results on seismic and tsunami hazard.Because Chinese coastal area belongs to the continental shelf and far from the boundary of plate collision,the tsunami hazard is not significant for coastal area of Chinese continent.However,the effect from tsunami still can' t be excluded absolutely since calculated result of Manila trench tsunami source although the tsunami wave is lower than water level from storm surge.The research about earthquake tsunami will continue in future.The tsunami warning system and emergency program of NPP will be established based on principle of defense in depth in China.

  2. Neighborhood social capital is associated with participation in health checks of a general population

    DEFF Research Database (Denmark)

    Bender, Anne Mette Flenstrup; Kawachi, Ichiro; Jørgensen, Torben;

    2015-01-01

    on participation in the health check phase of a population-based lifestyle intervention. METHODS: The study population comprised 12,568 residents of 73 Danish neighborhoods in the intervention group of a large population-based lifestyle intervention study - the Inter99. Two measures of social capital were applied......BACKGROUND: Participation in population-based preventive health check has declined over the past decades. More research is needed to determine factors enhancing participation. The objective of this study was to examine the association between two measures of neighborhood level social capital......; informal socializing and voting turnout. RESULTS: In a multilevel analysis only adjusting for age and sex, a higher level of neighborhood social capital was associated with higher probability of participating in the health check. Inclusion of both individual socioeconomic position and neighborhood...

  3. PENERAPAN MODEL PEMBELAJARAN KOOPERATIF TIPE PAIR CHECKS PEMECAHAN MASALAH UNTUK MENINGKATKAN SOCIAL SKILL SISWA

    Directory of Open Access Journals (Sweden)

    R. Lestari

    2012-12-01

    Full Text Available Tujuan penelitian tindakan kelas ini untuk mengetahui pengaruh proses pembelajaran dengan menggunakan model pembelajaran kooperatif tipe Pair Checks pemecahan masalah terhadap peningkatan social skill siswa. Pada proses penerapan model pembelajaran kooperatif tipe Pair Checks pemecahan masalah siswa dibagi dalam kelompok-kelompok dan satu kelompok terdiri dari dua orang. Setiap kelompok berdiskusi untuk menyelesaikan suatu masalah, kemudian hasil diskusi kelompok akan dicek oleh pasangan dari kelompok lain. Metode Penelitian yang digunakan adalah penelitian tindakan kelas yang dilaksanakan dua siklus. Metode pengumpulan data menggunakan tes dan angket skala sikap, sedangkan teknik analisis data menggunakan teknik analisis data kuantitatif. Social Skill siswa dari siklus I ke siklus II mengalami peningkatan. Hal ini didapatkan dari data angket skala sikap siklus I ke siklus II ketuntasan klasikalnya meningkat dan sebagian besar siswa sudah memiliki social skill yang baik. Hasil belajar kognitif siswa juga mengalami peningkatan. Model pembelajaran kooperatif tipe Pair Checks pemecahan masalah dapat meningkatkan social skill siswa.This two cycles-action research aimed to know learning process applying cooperative learning model-pair checks problem solving type and improvement of student’s social skills. The process of the model was as follows: deviding students into some groups consisting of two students, solving problem by each group and checking result of the discussion by other groups. Data collection method used was test and the use of attitude scale questionnaire, while technique of data analysis used was quantitative data analysis technique. The data analysis result showed that there was an increase of student’s social skill and students’ achievement from cycle one to two. It is concluded that cooperative learning model-pair checks problem solving type can enhance student’s social skills

  4. Modeling of feed water check valves using RELAP5; Modellierung von Speisewasserrueckschlagventilen in RELAP5

    Energy Technology Data Exchange (ETDEWEB)

    Ben Said, Nader; Bregulla, Wolfgang; Kalk, Andreas [Westinghouse Electric Germany GmbH, Mannheim (Germany)

    2009-07-01

    Westinghouse Electric Germany GmbH has developed fluid dynamic models for medium-actuated armatures using the thermal hydraulic code RELAP5 in order to reach a more realistic description of the armature behavior including fluid-structure interactions in case of transient flow conditions in piping systems. The contribution is concerned with the modeling of damped check valves. The model allows the description of the behavior during opening and closure of a check armature. The calculated results show good agreement with the available measured data.

  5. Analysing sensory panel performance in a proficiency test using the PanelCheck software

    DEFF Research Database (Denmark)

    Tomic, O.; Luciano, G.; Nilsen, A.

    2010-01-01

    results plays an important role as this provides a time saving and efficient way of screening and investigating sensory panel performances. Most of the statistical methods used in this paper are available in the open source software PanelCheck, which may be downloaded and used for free.......Check software, a workflow is proposed that guides the user through the data analysis process. This allows practitioners and non-statisticians to get an overview over panel performances in a rapid manner without the need to be familiar with details on the statistical methods. Visualisation of data analysis...

  6. Verifying Real-time Commit Protocols Using Dense-time Model Checking Technology

    CERN Document Server

    Al-Bataineh, Omar I; French, Tim; Woodings, Terry

    2012-01-01

    The timed-based automata model, introduced by Alur and Dill, provides a useful formalism for describing real-time systems. Over the last two decades, several dense-time model checking tools have been developed based on that model. The paper considers the verification of real-time distributed commit protocols using dense-time model checking technology. More precisely, we model and verify the well-known timed two phase commit protocol in three different state-of-the-art real-time model checkers: UPPAAL, Rabbit, and RED, and compare the results.

  7. DiVinE-CUDA - A Tool for GPU Accelerated LTL Model Checking

    Directory of Open Access Journals (Sweden)

    Jiří Barnat

    2009-12-01

    Full Text Available In this paper we present a tool that performs CUDA accelerated LTL Model Checking. The tool exploits parallel algorithm MAP adjusted to the NVIDIA CUDA architecture in order to efficiently detect the presence of accepting cycles in a directed graph. Accepting cycle detection is the core algorithmic procedure in automata-based LTL Model Checking. We demonstrate that the tool outperforms non-accelerated version of the algorithm and we discuss where the limits of the tool are and what we intend to do in the future to avoid them.

  8. Belief-Propagation-Approximated Decoding of Low-Density Parity-Check Codes

    Institute of Scientific and Technical Information of China (English)

    SONG Hui-shi; ZHANG Ping

    2004-01-01

    In this paper, we propose a new reduced-complexity decoding algorithm of Low-Density Parity-Check (LDPC) codes, called Belief-Propagation-Approximated (BPA) algorithm, which utilizes the idea of normalization and translates approximately the intricate nonlinear operation in the check nodes of the original BP algorithm to only one operation of looking up the table. The normalization factors can be obtained by simulation, or theoretically. Simulation results demonstrate that BPA algorithm exhibits fairly satisfactory bit error performance on the Additive White Gaussian Noise (AWGN) channel.

  9. Geometric Design Rule Check of VLSI Layouts in Mesh Connected Processors

    Directory of Open Access Journals (Sweden)

    S. K. Nandy

    1994-01-01

    Full Text Available Design Rule Checking is a compute-intensive VLSI CAD tool. In this paper we propose a parallel algorithm to perform Design Rule Check (DRC of Layout geometries in a VLSI layout. The algorithm assumes the parallel architecture to be a two-dimensional mesh of processors. The algorithm is based on a linear quadtree representation of the layout. Through a complexity analysis it is shown that it is possible to achieve a linear speedup in DRC with respect to the number of processors.

  10. Monitor-Based Statistical Model Checking for Weighted Metric Temporal Logic

    DEFF Research Database (Denmark)

    Bulychev, Petr; David, Alexandre; Larsen, Kim Guldstrand

    2012-01-01

    We present a novel approach and implementation for ana- lysing weighted timed automata (WTA) with respect to the weighted metric temporal logic (WMTL≤ ). Based on a stochastic semantics of WTAs, we apply statistical model checking (SMC) to estimate and test probabilities of satisfaction with desi......We present a novel approach and implementation for ana- lysing weighted timed automata (WTA) with respect to the weighted metric temporal logic (WMTL≤ ). Based on a stochastic semantics of WTAs, we apply statistical model checking (SMC) to estimate and test probabilities of satisfaction...

  11. Extraction of handwritten areas from colored image of bank checks by an hybrid method

    CERN Document Server

    Haboubi, Sofiene

    2011-01-01

    One of the first step in the realization of an automatic system of check recognition is the extraction of the handwritten area. We propose in this paper an hybrid method to extract these areas. This method is based on digit recognition by Fourier descriptors and different steps of colored image processing . It requires the bank recognition of its code which is located in the check marking band as well as the handwritten color recognition by the method of difference of histograms. The areas extraction is then carried out by the use of some mathematical morphology tools.

  12. Benchmarking the gamma pass score using ArcCHECK for routine dosimetric QA of VMAT plans

    Science.gov (United States)

    Arumugam, Sankar; Young, Tony; Xing, Aitang; Thwaites, David; Holloway, Lois

    2015-01-01

    A minimum expected gamma (γ) pass rate for VMAT plan verification using ArcCHECK was established based on the RTTQA, TGI 19 test cases and 10 clinical plans with varying levels of complexity. The impact of the 'Measurement Uncertainty' parameter as available in the ArcCHECK software on γ pass rate was studied for both global and local γ analysis. Our results show that excluding measurement uncertainty adds tighter tolerance in local γ comparison. From the verification of our benchmark cases we established minimum expected γ pass rates of 85% and 88% for 2%/2mm global and 3%/3mm local tolerance criteria.

  13. Model Checking and Model-based Testing in the Railway Domain

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, Jan

    2015-01-01

    This chapter describes some approaches and emerging trends for verification and model-based testing of railway control systems. We describe state-of-the-art methods and associated tools for verifying interlocking systems and their configuration data, using bounded model checking and k-induction. ......This chapter describes some approaches and emerging trends for verification and model-based testing of railway control systems. We describe state-of-the-art methods and associated tools for verifying interlocking systems and their configuration data, using bounded model checking and k...

  14. Checking Correctness of TypeScript Interfaces for JavaScript Libraries

    DEFF Research Database (Denmark)

    Feldthaus, Asger; Møller, Anders

    2014-01-01

    The TypeScript programming language adds optional types to JavaScript, with support for interaction with existing JavaScript libraries via interface declarations. Such declarations have been written for hundreds of libraries, but they can be difficult to write and often contain errors, which may...... affect the type checking and misguide code completion for the application code in IDEs. We present a pragmatic approach to check correctness of TypeScript declaration files with respect to JavaScript library implementations. The key idea in our algorithm is that many declaration errors can be detected...

  15. Using Spec Explorer for Automatic Checking of Constraints in Software Controlled Systems.

    Directory of Open Access Journals (Sweden)

    Izzat Mahmoud ALSMADI

    2011-01-01

    Full Text Available In software engineering, several formal models and tools are proposed for defining system requirements and constraints formally. Such formal definitions can help in the automatic checking and verification for them. It can also help in the automatic test case generation, execution and verification. In this paper, we will demonstrate and evaluate the usage of Spec Explorer from Microsoft for defining and checking examples of software controlled system such as cruise control. Such formal requirements can be eventually embedded in the developed system or can help in exposing important elements to test in the testing stage or through the usage of the application

  16. A Data Transmission Method Using a Cyclic Redundancy Check and Inaudible Frequencies

    Institute of Scientific and Technical Information of China (English)

    Myoungbeom Chung

    2016-01-01

    This paper describes a data transmission method using a cyclic redundancy check and inaudible frequencies. The proposed method uses inaudible high frequencies from 18 kHz to 22 kHz generated via the inner speaker of smart devices. Using the proposed method, the performance is evaluated by conducting data transmission tests between a smart book and smart phone. The test results confirm that the proposed method can send 32 bits of data in an average of 235 ms, the transmission success rate reaches 99.47%, and the error detection rate of the cyclic redundancy check is 0.53%.

  17. The Modeling Library of Eavesdropping Methods in Quantum Cryptography Protocols by Model Checking

    Science.gov (United States)

    Yang, Fan; Yang, Guowu; Hao, Yujie

    2016-07-01

    The most crucial issue of quantum cryptography protocols is its security. There exists many ways to attack the quantum communication process. In this paper, we present a model checking method for modeling the eavesdropping in quantum information protocols. So when the security properties of a certain protocol are needed to be verified, we can directly use the models which are already built. Here we adopt the probabilistic model checking tool—PRISM to model these attack methods. The verification results show that the detection rate of eavesdropping is approximately close to 1 when enough photons are transmitted.

  18. "Smart shopping" : Implications of hard-discounters and multiple-store patronage

    NARCIS (Netherlands)

    Vroegrijk, M.J.J.

    2012-01-01

    The recent economic downturn has made consumers more focused on obtaining good value-for-money and on keeping their spending in check. This dissertation covers the implications of two recent developments indicative of such “smart shopping”: the increased popularity of the “hard-discounter” format, a

  19. Reality Check

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A powerful influx of capital saw China post its second largest trade surplus of $15.3 billion this September. "For the first time in nine months, China's trade surplus reached $110 billion, exceeding last year's total," reported Bloomberg News, citing the latest China's customs statistics. The soaring trade surplus not only further strains economic ties with the United States, but also threatens China's economic security. As the Chinese Government is working to curb the trade surplus through encouraging ...

  20. Abstraction and Model Checking in the PEPA Plug-in for Eclipse

    DEFF Research Database (Denmark)

    Smith, Michael James Andrew

    2010-01-01

    lead to very large Markov chains. One way of analysing such models is to use abstraction - constructing a smaller model that bounds the properties of the original. We present an extension to the PEPA plug-in for Eclipse that enables abstracting and model checking of PEPA models. This implements two new...

  1. Cost Estimation of a Health-Check Intervention for Adults with Intellectual Disabilities in the UK

    Science.gov (United States)

    Romeo, R.; Knapp, M.; Morrison, J.; Melville, C.; Allan, L.; Finlayson, J.; Cooper, S.-A.

    2009-01-01

    Background: High rates of health needs among adults with intellectual disabilities flag the need for information about the economic consequences of strategies to identify and address unmet needs. Health-check interventions are one such strategy, and have been demonstrated to effect health gains over the following 12-month period. However, little…

  2. 49 CFR 1544.230 - Fingerprint-based criminal history records checks (CHRC): Flightcrew members.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fingerprint-based criminal history records checks (CHRC): Flightcrew members. 1544.230 Section 1544.230 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR...

  3. Selective indication for check cystogram before catheter removal following robot assisted radical prostatectomy

    Directory of Open Access Journals (Sweden)

    Rajiv Yadav

    2016-01-01

    Conclusion: In usual circumstances, catheter removal can be done safely on a postoperative day 7 without routine cystography. Selective use of check cystogram can be done in the case where bladder neck reconstruction is performed or those had a prior TURP and a wide bladder neck.

  4. Run-time assertion checking of JML annotations in multithreaded applications with e-OpenJML

    NARCIS (Netherlands)

    Kandziora, Jorne; Huisman, Marieke; Bockisch, Christoph; Zaharieva-Stojanovski, Marina; Monahan, R.

    2015-01-01

    Run-time assertion checking of multithreaded programs is challenging, as assertion evaluation should not interfere with the execution of other threads. This paper describes the prototype implementation of a run-time assertion checker that achieves this by evaluating assertions over snapshots of the

  5. Bandwidth and Wavefront Reduction for Static Variable Ordering in Symbolic Model Checking

    NARCIS (Netherlands)

    Meijer, Jeroen; Pol, van de Jaco

    2015-01-01

    We demonstrate the applicability of bandwidth and wavefront reduction algorithms to static variable ordering. In symbolic model checking event locality plays a major role in time and memory usage. For example, in Petri nets event locality can be captured by dependency matrices, where nonzero entries

  6. A practical approach to model checking Duration Calculus using Presburger Arithmetic

    DEFF Research Database (Denmark)

    Hansen, Michael Reichhardt; Dung, Phan Anh; Brekling, Aske Wiid

    2014-01-01

    This paper investigates the feasibility of reducing a model-checking problem K ⊧ ϕ for discrete time Duration Calculus to the decision problem for Presburger Arithmetic. Theoretical results point at severe limitations of this approach: (1) the reduction in Fränzle and Hansen (Int J Softw Inform 3...

  7. A "Brutus" model checking of a spi-calculus dialect (Extended Abstract)

    NARCIS (Netherlands)

    Gnesi, S.; Latella, D.; Lenzini, G.

    2000-01-01

    This paper proposes a preliminary framework in which protocols, expressed in a dialect of the spi-calculus, can be verified using model checking algorithms. In particular we define a formal semantics for a dialect of the spi-calculus based on labeled transition systems in such a way that the model c

  8. Logic Model Checking of Unintended Acceleration Claims in the 2005 Toyota Camry Electronic Throttle Control System

    Science.gov (United States)

    Gamble, Ed; Holzmann, Gerard

    2011-01-01

    Part of the US DOT investigation of Toyota SUA involved analysis of the throttle control software. JPL LaRS applied several techniques, including static analysis and logic model checking, to the software. A handful of logic models were built. Some weaknesses were identified; however, no cause for SUA was found. The full NASA report includes numerous other analyses

  9. Logic Column 19: Symbolic Model Checking for Temporal-Epistemic Logics

    CERN Document Server

    Lomuscio, Alessio

    2007-01-01

    This article surveys some of the recent work in verification of temporal epistemic logic via symbolic model checking, focusing on OBDD-based and SAT-based approaches for epistemic logics built on discrete and real-time branching time temporal logics.

  10. 14 CFR 91.1095 - Initial and transition training and checking: Flight instructors (aircraft), flight instructors...

    Science.gov (United States)

    2010-01-01

    ... Management § 91.1095 Initial and transition training and checking: Flight instructors (aircraft), flight... methods, procedures, and techniques for conducting flight instruction. (4) Proper evaluation of student... instructor certificate— (i) The fundamental principles of the teaching-learning process; (ii)...

  11. Notification: Fiscal Year 2016 Risk Assessment of EPA’s Purchase Card and Convenience Check Program

    Science.gov (United States)

    Project #OA-FY16-0229, July 14, 2016. The EPA OIG plans to begin a risk assessment of the EPA’s purchase card and convenience check program with the Office of Acquisition Management (OAM) within the Office of Administration and Resources Management (OARM).

  12. Hydrologic response of streams restored with check dams in the Chiricahua Mountains

    Science.gov (United States)

    In this study, hydrological processes are evaluated to determine impacts of stream restoration in the West Turkey Creek, Chiricahua Mountains, southeast Arizona, during a summer-monsoon season (June–October of 2013). A paired-watershed approach was used to analyze the effectiveness of check dams to ...

  13. A provisional check list of the reptiles and amphibians of Golden Gate Highlands National Park

    Directory of Open Access Journals (Sweden)

    M.F. Bates

    1991-09-01

    Full Text Available A provisional check list of 26 reptile and amphibian species (8 frog, 8 lizard and 10 snake species occurring in Golden Gate Highlands National Park is presented. The list does not reflect the results of an intensive survey, but is a record of specimens collected in the park and preserved at the National Museum, Bloemfontein.

  14. A systematic check list of flowering plants collected in the Addo Elephant National Park

    Directory of Open Access Journals (Sweden)

    B.L. Penzhorn

    1974-07-01

    Full Text Available The vegetation and botanical exploration of the Park are discussed briefly. The 301 species of flowering plants recorded in the Park are listed in a systematic check list. Of the 54 families recorded, Compositae (39 spp., Gramineae (32 spp., Liliaceae (28 spp. and Aizoaceae (28 spp. are the best represented.

  15. Annotated Check List of the Spiders (Araneae of the Mountain Zebra National Park

    Directory of Open Access Journals (Sweden)

    Anna S. Dippenaar-Schoeman

    1988-10-01

    Full Text Available A preliminary check list of the spider fauna of the Mountain Zebra National Park is given. Sixteen families, comprising 29 genera and 32 species, are recorded. Observations on the distribution, diagnostic morphology and behaviour of 15 species are given.

  16. [Check list of the helminths in the respiratory system of domesticated animals in Turkey].

    Science.gov (United States)

    Gürler, Ali Tümay

    2006-01-01

    Helminths of the respiratory system make up an important part of the parasitic diseases found in domestic animals. Therefore, many studies have been carried out on these helminths in Turkey. In this article, a check list and the prevalence rates of helminths of respiratory system found in domestic animals in Turkey has been given.

  17. Working and reference check list for fireflies of Melanesia (Coleoptera: Lampyridae: Luciolinae).

    Science.gov (United States)

    Ballantyne, Lesley A; Lloyd, James E

    2013-11-13

    Twenty-three species of Lampyridae (fifteen of them new) collected during the 1969-70 Alpha Helix scientific expedition to New Guinea are now characterized by both behavioural and taxonomic data. For ease of identification, relocation of specimens, and location of all pertinent literature this check list is presented.

  18. An Annotated Check List of the Birds of the Golden Gate Highlands National Park

    OpenAIRE

    R.A. Earle; A.B. Lawson

    1988-01-01

    This paper presents a check list of 159 bird species occuring in the Golden Gate Higlands National Park and lists another 14 species needing confirmation Temporal distribution of the species on a monthly basis was obtained during one year, between April 1983 and March 1984. Brief discussion on present status and breeding is given where possible.

  19. Social Validity: Perceptions of Check and Connect with Early Literacy Support

    Science.gov (United States)

    Miltich Lyst, Aimee; Gabriel, Stacey; O'Shaughnessy, Tam E.; Meyers, Joel; Meyers, Barbara

    2005-01-01

    This article underscores the potential advantages of qualitative methods to illustrate the depth and complexity of social validity. This investigation evaluates the social validity of Check and Connect with Early Literacy Support (CCEL), through the perspectives of teachers and caregivers whose children participated in the intervention. Teachers…

  20. Three Notes on the Complexity of Model Checking Fixpoint Logic with Chop

    DEFF Research Database (Denmark)

    Lange, Martin

    2007-01-01

    This paper provides lower complexity bounds of deterministic exponential time for the combined, data and expression complexity of Fixpoint Logic with Chop. This matches the previously known upper bound showing that its model checking problem is EXPTIME-complete, even when the transition system or...

  1. Microscopic analysis and simulation of check-mark stain on the galvanized steel strip

    Science.gov (United States)

    So, Hongyun; Yoon, Hyun Gi; Chung, Myung Kyoon

    2010-11-01

    When galvanized steel strip is produced through a continuous hot-dip galvanizing process, the thickness of adhered zinc film is controlled by plane impinging air gas jet referred to as "air-knife system". In such a gas-jet wiping process, stain of check-mark or sag line shape frequently appears. The check-mark defect is caused by non-uniform zinc coating and the oblique patterns such as "W", "V" or "X" on the coated surface. The present paper presents a cause and analysis of the check-mark formation and a numerical simulation of sag lines by using the numerical data produced by Large Eddy Simulation (LES) of the three-dimensional compressible turbulent flow field around the air-knife system. It was found that there is alternating plane-wise vortices near the impinging stagnation region and such alternating vortices move almost periodically to the right and to the left sides on the stagnation line due to the jet flow instability. Meanwhile, in order to simulate the check-mark formation, a novel perturbation model has been developed to predict the variation of coating thickness along the transverse direction. Finally, the three-dimensional zinc coating surface was obtained by the present perturbation model. It was found that the sag line formation is determined by the combination of the instantaneous coating thickness distribution along the transverse direction near the stagnation line and the feed speed of the steel strip.

  2. 26 CFR 301.6311-1 - Payment by check or money order.

    Science.gov (United States)

    2010-04-01

    ... payment. (c) Payment in nonconvertible foreign currency. For rules relating to payment of income taxes and taxes under the Federal Insurance Contributions Act in nonconvertible foreign currency, see section 6316... revenue taxes, provided the checks, drafts, or money orders are collectible in United States currency...

  3. Analysis of an emergency diesel generator control system by compositional model checking. MODSAFE 2010 work report

    Energy Technology Data Exchange (ETDEWEB)

    Lahtinen, J.; Bjoerkman, K.; Valkonen, J.; Frits, J.; Niemelae, I.

    2010-12-15

    Digital instrumentation and control (I and C) systems containing programmable logic controllers are challenging to verify. They enable complicated control functions and the state spaces (number of distinct values of inputs, outputs and internal memory) of the designs easily become too large for comprehensive manual inspection. Model checking is a formal method that can be used for verifying that systems have been correctly designed. A number of efficient model checking systems are available which provide analysis tools that are able to determine automatically whether a given state machine model satisfies the desired safety properties. The practical case analysed in this research project is called an 'emergency diesel generator control system' and its purpose is to provide reserve power to critical devices and computers that must be available without interruption. This report describes 1) the development of a compositional approach for checking the models in large system designs, 2) the development of a modular model checking approach for modelling function block diagrams with the Uppaal model checker and 3) the experience of utilising the new modelling approaches in practice. (orig.)

  4. Assessing the physical vulnerability of check dams through an empirical damage index

    Directory of Open Access Journals (Sweden)

    Andrea Dell'Agnese

    2013-06-01

    Full Text Available A comprehensive analysis of flood risk in mountain streams has to include an assessment of the vulnerability of the protection systems, in addition to an assessment of the vulnerability of the constructed environment on alluvial fans and floodplains. Structures forming the protection systems are of a dual nature, i.e. they are designed to mitigate natural process-related hazards and, on the other hand, are prone to be damaged during their lifecycle by the same processes they should mitigate. Therefore, their effectiveness declines over time. Hence, the knowledge of how effectively control structures perform is essential for risk management. A procedure was developed to assess the physical vulnerability of check dams based on empirical evidence collected in South Tyrol, Northern Italy. A damage index defined on pre- and postevent comparisons of check dam conditions was evaluated for 362 structures in 18 mountain streams along with the relevant processes and the structural characteristics affecting it. Although the available dataset did not allow conclusive functional relationships between damage index and impact variables to be established, it was possible to assess the average expected residual functionality of check dams according to structure characteristics, and event type and intensity. These results may help plan appropriate check dam maintenance.

  5. 76 FR 23515 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications

    Science.gov (United States)

    2011-04-27

    ... COMMISSION 10 CFR Part 73 RIN 3150-AI49 Enhanced Weapons, Firearms Background Checks, and Security Event... material and would add new event notification requirements on the theft or loss of enhanced weapons... ``Weapons Safety Assessment'' (76 FR 6087) , the draft Regulatory Guide DG-5020, ``Applying for...

  6. 76 FR 6199 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications

    Science.gov (United States)

    2011-02-03

    ... February 3, 2011 Part II Nuclear Regulatory Commission 10 CFR Part 73 Enhanced Weapons, Firearms Background...-AI49 Enhanced Weapons, Firearms Background Checks, and Security Event Notifications AGENCY: Nuclear... revisions in these implementing regulations that address the voluntary application for enhanced weapons...

  7. 78 FR 2214 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications

    Science.gov (United States)

    2013-01-10

    ...; ] NUCLEAR REGULATORY COMMISSION 10 CFR Part 73 RIN 3150-AI49 Enhanced Weapons, Firearms Background Checks... proposing to further revise its regulations that address the voluntary application for enhanced weapons... for preemption or enhanced weapon authority. Section 161A also mandates that all security...

  8. Efficient model checking for duration calculus based on branching-time approximations

    DEFF Research Database (Denmark)

    Fränzle, Martin; Hansen, Michael Reichhardt

    2008-01-01

    Duration Calculus (abbreviated to DC) is an interval-based, metric-time temporal logic designed for reasoning about embedded real-time systems at a high level of abstraction. But the complexity of model checking any decidable fragment featuring both negation and chop, DC's only modality, is non...

  9. Southwest Research Institute astronomer Dan Durda checks the alignment of the SWUIS-A Xybion digital

    Science.gov (United States)

    2002-01-01

    Southwest Research Institute astronomer Dan Durda checks the alignment of the SWUIS-A Xybion digital camera mounted in the rear cockpit of a NASA Dryden F/A-18B before taking off on an astronomy mission to search for small vulcanoids (asteroids) that may be orbiting between the sun and the planet Mercury.

  10. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  11. Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study

    DEFF Research Database (Denmark)

    Yuksel, Ender; Zhu, Huibiao; Nielson, Hanne Riis

    2012-01-01

    Cyber-physical systems integrate information and communication technology functions to the physical elements of a system for monitoring and controlling purposes. The conversion of traditional power grid into a smart grid, a fundamental example of a cyber-physical system, raises a number of issues...... consumption. We employ stochastic model checking approach and present our modelling and analysis study using PRISM model checker....

  12. Is self-selection the main driver of positive interpretations of general health checks?

    DEFF Research Database (Denmark)

    Bender, Anne Mette; Jørgensen, Torben; Pisinger, Charlotta

    2015-01-01

    OBJECTIVE: To investigate if the lower mortality among participants of a health check followed by lifestyle intervention of high risk persons is explained by self-selection. METHODS: All persons residing in the study area (Copenhagen; Denmark) were randomized to intervention (n=11,629) or control...

  13. Vocal cord dysfunction diagnosis may be improved by a screening check list

    Directory of Open Access Journals (Sweden)

    Lucia Helena Eduardo Pinto

    2016-04-01

    Conclusions: A finding of wheezing or stridor on auscultation of the cervical region is suggestive of vocal cord dysfunction, especially in elderly patients, and such dysfunction can be confirmed through laryngoscopy. Our VCD screening check list proved to be useful in the screening of VCD among patients with severe asthma.

  14. Validity of 42-Item Mooney Problem Check List Scale for Counseling.

    Science.gov (United States)

    Tryon, Georgiana Shick

    Studies employing the Mooney Problem Check List (MPCL) have found that counseling center clients indicate more problems on the MPCL than nonclients. Domino and DeGroote identified 42 MPCL items concerned with self-satisfaction and a need for social contacts which further differentiated counseling seekers from nonseekers. In order to further…

  15. Check list Doppler and duplex sonography. 4. rev. ed.; Checkliste Doppler- und Duplexsonografie

    Energy Technology Data Exchange (ETDEWEB)

    Kopp, Helmut [MED-Facharztzentrum, Mainz (Germany). Praxis fuer Gefaessmedizin; Ludwig, Malte [Benedictus Krankenhaus Tutzing (Germany). Gefaesszentrum

    2012-11-01

    Check list Doppler and duplex sonography includes 4 parts: (1) Basic information: technical fundamentals, equipment premises, hemodynamics. (2) Flow schemata and pitfalls. (3) Special vascular regions: arteries in the upper and lower extremities, veins in the upper and lower extremities, abdominal arteries, abdominal veins, ex-cranial brain sustaining arteries, intra-cranial brain sustaining arteries. (4) Attachment: diagnostic criteria and case studies.

  16. An Evaluation Framework for Energy Aware Buildings using Statistical Model Checking

    DEFF Research Database (Denmark)

    David, Alexandre; Du, DeHui; Larsen, Kim Guldstrand

    2012-01-01

    extend in this paper the modelling formalism of the tool Uppaal-smc to stochastic hybrid automata, thus providing the expressive power required for modeling complex cyber-physical systems. The application of Statistical Model Checking provides a highly scalable technique for analyzing performance...

  17. Model based feasibility study on bidirectional check valves in wave energy converters

    DEFF Research Database (Denmark)

    Hansen, Anders Hedegaard; Pedersen, Henrik C.; Andersen, Torben Ole

    2014-01-01

    Discrete fluid power force systems have been proposed as the primary stage for Wave Energy Converters (WEC’s) when converting ocean waves into electricity, this to improve the overall efficiency of wave energy devices. This paper presents a model based feasibility study of using bidirectional check...

  18. Cap check helps reconcile payments with eligibility lists to improve cash flow.

    Science.gov (United States)

    2003-05-01

    Some capitated provider groups are becoming more adept at using software solutions to effectively manage retroactive deletions, additions and changes in membership enrollment. While a variety of software programs are available, several sources recommend using Cap Check to help match up eligibility lists with capitation payment.

  19. Stochastic Discount Factor Approach to International Risk-Sharing:A Robustness Check of the Bilateral Setting

    NARCIS (Netherlands)

    Hadzi-Vaskov, M.; Kool, C.J.M.

    2007-01-01

    This paper presents a robustness check of the stochastic discount factor approach to international (bilateral) risk-sharing given in Brandt, Cochrane, and Santa-Clara (2006). We demonstrate two main inherent limitations of the bilateral SDF approach to international risk-sharing. First, the discount

  20. 75 FR 95 - Endorsement and Payment of Checks Drawn on the United States Treasury

    Science.gov (United States)

    2010-01-04

    ...] [FR Doc No: E9-31166] DEPARTMENT OF THE TREASURY Fiscal Service 31 CFR Part 240 RIN 1510-AB25 Endorsement and Payment of Checks Drawn on the United States Treasury AGENCY: Financial Management Service, Fiscal Service, Treasury. ACTION: Notice of proposed rulemaking, with request for comment. SUMMARY:...

  1. 14 CFR 135.299 - Pilot in command: Line checks: Routes and airports.

    Science.gov (United States)

    2010-01-01

    ... airports. 135.299 Section 135.299 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... Crewmember Testing Requirements § 135.299 Pilot in command: Line checks: Routes and airports. (a) No...; and (3) Include takeoffs and landings at one or more representative airports. In addition to...

  2. Effects of Check and Connect on Attendance, Behavior, and Academics: A Randomized Effectiveness Trial

    Science.gov (United States)

    Maynard, Brandy R.; Kjellstrand, Elizabeth K.; Thompson, Aaron M.

    2014-01-01

    Objectives: This study examined the effects of Check & Connect (C&C) on the attendance, behavior, and academic outcomes of at-risk youth in a field-based effectiveness trial. Method: A multisite randomized block design was used, wherein 260 primarily Hispanic (89%) and economically disadvantaged (74%) students were randomized to treatment…

  3. Effects of Check & Connect on Attendance, Behavior, and Academics: A Randomized Effectiveness Trial

    Science.gov (United States)

    Maynard, Brandy R.; Kjellstrand, Elizabeth K.; Thompson, Aaron M.

    2014-01-01

    The present study evaluates the effectiveness of Check & Connect (C&C) in a randomly assigned sample of students who were all receiving Communities in Schools (CIS) services. The research questions for the study include: Are there differences in attendance, academics, and behavior for CIS students who also receive C&C compared to…

  4. On model checking the dynamics of object-based software : a foundational approach

    NARCIS (Netherlands)

    Distefano, Dino Salvo

    2003-01-01

    This dissertation is concerned with software verication, in particular automated techniques to assess the correct functioning of object-based programs. We focus on the dynamic aspects of these programs and consider model-checking based verication techniques. The major obstacle to the design of model

  5. Additions to the check-list of birds of the Addo Elephant National Park

    Directory of Open Access Journals (Sweden)

    B. L. Penzhorn

    1976-08-01

    Full Text Available In his original check-list of the birds of the Addo Elephant National Park, Liversidge (1965 recorded 120 species. In a subsequent publication six additional species were reported from the Park (Penzhorn and Morris 1969. A further seven species are reported here, increasing the species total for the Park to 133.

  6. An Annotated Check List of the Birds of the Golden Gate Highlands National Park

    Directory of Open Access Journals (Sweden)

    R.A. Earle

    1988-10-01

    Full Text Available This paper presents a check list of 159 bird species occuring in the Golden Gate Higlands National Park and lists another 14 species needing confirmation Temporal distribution of the species on a monthly basis was obtained during one year, between April 1983 and March 1984. Brief discussion on present status and breeding is given where possible.

  7. THE Q-MATRIX LOW-DENSITY PARITY-CHECK CODES

    Institute of Scientific and Technical Information of China (English)

    Peng Li; Zhu Guangxi

    2006-01-01

    This paper presents a matrix permuting approach to the construction of Low-Density Parity-Check (LDPC) code. It investigates the structure of the sparse parity-check matrix defined by Gallager. It is discovered that the problem of constructing the sparse parity-check matrix requires an algorithm that is efficient in search environments and also is able to work with constraint satisfaction problem. The definition of Q-matrix is given, and it is found that the queen algorithm enables to search the Q-matrix. With properly permuting Q-matrix as sub-matrix, the sparse parity-check matrix which satisfied constraint condition is created, and the good regular-LDPC code that is called the Q-matrix LDPC code is generated. The result of this paper is significant not only for designing low complexity encoder, improving performance and reducing complexity of iterative decoding arithmetic, but also for building practical system of encodable and decodable LDPC code.

  8. Check-In Computation and Optimization by Stimulation and IP in Combination

    NARCIS (Netherlands)

    van Dijk, N.M.; van der Sluis, E.

    2006-01-01

    This paper presents and investigates a check-in problem for a twofold reason: (i) as a problem of practical and novel scientific interest in itself and (ii) as a problem which requires both a stochastic (simulation) and deterministic (integer programming) approach. First, simulation is used to deter

  9. Check-in computation and optimalization by simulation and IP in combination

    NARCIS (Netherlands)

    van Dijk, N.M.; van der Sluis, E.

    2003-01-01

    This paper presents and investigates a check-in problem for a twofold reason: i) as a problem of practical and novel scientific interest in itself and ii) as a problem which requires both a stochastic (simulation) and deterministic (integer programming) approach. First, simulation is used to determi

  10. 48 CFR 352.237-72 - Crime Control Act-requirement for background checks.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Crime Control Act... and Clauses 352.237-72 Crime Control Act—requirement for background checks. As prescribed in 337.103-70(c), the Contracting Officer shall insert the following clause: Crime Control Act of...

  11. Beyond Member-Checking: A Dialogic Approach to the Research Interview

    Science.gov (United States)

    Harvey, Lou

    2015-01-01

    This article presents a dialogic qualitative interview design for a narrative study of six international UK university students' motivation for learning English. Based on the work of Mikhail Bakhtin, this design was developed in order to address the limitations of member-checking [Lincoln, Y. S., and E. G. Guba. 1985. "Naturalistic…

  12. Performance of compulsive behavior in rats is not a unitary phenomenon - validation of separate functional components in compulsive checking behavior.

    Science.gov (United States)

    Tucci, Mark C; Dvorkin-Gheva, Anna; Johnson, Eric; Cheon, Paul; Taji, Leena; Agarwal, Arnav; Foster, Jane; Szechtman, Henry

    2014-09-01

    A previous analysis of the quinpirole sensitisation rat model of obsessive-compulsive disorder revealed that the behavioral phenotype of compulsive checking consists of three constitutive components - vigor of checking performance, focus on the task of checking, and satiety following a bout of checking. As confirmation of this analysis, the aim of the present study was to reconstitute, without quinpirole treatment, each of the putative components, with the expectation that these would self-assemble into compulsive checking. To reconstitute vigor and satiety, the employed treatment was a bilateral lesion of the nucleus accumbens core (NAc), as this treatment was shown previously to exaggerate these components. To reconstitute focus, the employed treatment was a low dose of the serotonin-1A receptor agonist 8-hydroxy-2-(di-n-propylamino) tetralin hydrochloride (DPAT) (0.0625 mg/kg), as high doses of this drug induce compulsive behavior and exacerbate focus. Results showed that injection of DPAT to NAc lesion rats did yield compulsive checking. Neither the drug alone nor the NAc lesion by itself produced compulsive checking. The demonstrated synthesis of compulsive checking by the combined treatment of low-dose DPAT and NAc lesion strengthened the previous fractionation of the model obsessive-compulsive disorder phenotype into three constitutive components, and suggested a role for serotonin-1A receptors outside the NAc in enhanced focus on the task of checking.

  13. [Spanish Society of Anaesthesia (SEDAR) guidelines for pre-anaesthesia checking procedures].

    Science.gov (United States)

    Cassinello, F; Ariño, J J; Bartolomé Ruibal, A; de la Pinta, J C; de la Quintana, F B; Espinosa, M E; Gilsanz, F; Gómez-Arnau, J; González Arévalo, A; López-Quero, L; López-Romero, J L; Moret, E; Mourelle, I; Pensado, A; Planas, A; Perez-Cerdá, F; Rincón, R

    2012-04-01

    We present this document as a guide to preparing a specific institutional pre-anaesthesia checklist, as recommended in the Helsinki declaration on patient safety in anaesthesiology. Also, the recently recommended WHO "safe surgery check-list" includes a check-list for anaesthesia. A working group was established in accordance with the charter of the Spanish Society of Anaesthesiology and Resuscitation (Sociedad Española de Anestesiología y Reanimación [SEDAR]). The new patient safety culture introduced into medicine, and the recommendations of European anaesthesia societies has led us to design and update protocols in order to improve results in this important part of our speciality. We have prepared these recommendations or guidelines using, as examples, updates of pre-anaesthesia check-lists by other American (ASA), British, or Canadian societies of anaesthesia. With that aim, we enlisted the help of anaesthesia ventilator experts and the participation and advice of experienced anaesthesiologists from all parts of Spain. After various corrections and modifications, the document was available at www.sedar.es, so that any anaesthesiologist could propose any correction, or give their opinion. Finally, these guidelines have been approved by the SEDAR Board of Directors, before it was sent for publication in this journal. The aims of this document are to provide: a guideline applicable to all anaesthesia machines, a descriptive pre-anaesthesia check-list that include everything necessary for the anaesthesia procedure, and a resumed check-list to be available in all the anaesthesia machines or other equivalent, but prepared for each institution, which should include anaesthetic equipment and drugs. So, in order to ensure the aims and requirements of the European Board of Anaesthesiology, the European Society of Anaesthesiology, and the WHO are met, each institution should have a protocol for checking equipment and drugs. These guidelines are applicable to any

  14. Periodic medical check-up among residents of three Nigerian South-western States

    Directory of Open Access Journals (Sweden)

    Saheed Opeyemi Usman

    2016-09-01

    Full Text Available Objectives: General medical examination is a common form of preventive medicine. Periodic medical check-up generally involves thorough history, physical examination and screening of asymptomatic persons by physicians on a regular basis as part of a routine health care process. Periodic medical check-up is considered effective in preventing illness and promoting health and reducing morbidity and mortality. This study is therefore designed to determine the knowledge, attitude and practice of periodic medical check-up among residents of Osun, Ondo and Ekiti States of Nigeria. It is also to determine the influence of educational status on its practice and compare the outcomes in the three states. Materials and Methods: The cross-sectional survey study utilizing both qualitative and quantitative method of data collection was conducted at various locations across the three states. The locations included those of public servants, private sector workers, artisans, traders, business men/women, farmers, among others. Results: 1200 consenting residents participated in the study in each of the three states. 518 (43.2% of the respondents in Ondo State are males while 682 (57.8% are females. 465 (38.8% of the respondents in Ekiti State are males while 735 (61.2% are females. 494 (41.2% of the respondents in Osun State are males while 706 (59.8% are females. The mean age in Ondo, Ekiti and Osun were 43.8 +/- 10.7 years, 44.6 +/- 11.5 years and 41.7 +/- 10.1 years respectively. 89.2%, 88.3% and 87.4% of the respondents are aware of periodic medical check-up in Ondo, Ekiti and Osun states respectively. Conclusion: There is high level of awareness of periodic medical check-up in all three states but the level of practice of routine medical check-up is low. The majority of the respondents probably don't practice it because their health insurance plan does not cover the medical check-up or due to individual/organizational financial constraints. [J Contemp Med 2016

  15. SU-D-BRD-05: Online Framework for Plan Tracking and Automatic Checks in Radiation Therapy

    Energy Technology Data Exchange (ETDEWEB)

    Zaks, D; Fletcher, R; Salamon, S; Kim, G; Ning, T; Cornell, M; Pawlicki, T; Cervino, L [UCSD Medical Center, La Jolla, CA (United States)

    2015-06-15

    Purpose: To develop an online framework that tracks a patient’s plan from initial simulation to treatment and that helps automate elements of the physics plan checks usually performed in the record and verify (RV) system and treatment planning system. Methods: We have developed PlanTracker, an online plan tracking system that automatically imports new patients tasks and follows it through treatment planning, physics checks, therapy check, and chart rounds. A survey was designed to collect information about the amount of time spent by medical physicists in non-physics related tasks. We then assessed these non-physics tasks for automation. Using these surveys, we directed our PlanTracker software development towards the automation of intra-plan physics review. We then conducted a systematic evaluation of PlanTracker’s accuracy by generating test plans in the RV system software designed to mimic real plans, in order to test its efficacy in catching errors both real and theoretical. Results: PlanTracker has proven to be an effective improvement to the clinical workflow in a radiotherapy clinic. We present data indicating that roughly 1/3 of the physics plan check can be automated, and the workflow optimized, and show the functionality of PlanTracker. When the full system is in clinical use we will present data on improvement of time use in comparison to survey data prior to PlanTracker implementation. Conclusion: We have developed a framework for plan tracking and automatic checks in radiation therapy. We anticipate using PlanTracker as a basis for further development in clinical/research software. We hope that by eliminating the most simple and time consuming checks, medical physicists may be able to spend their time on plan quality and other physics tasks rather than in arithmetic and logic checks. We see this development as part of a broader initiative to advance the clinical/research informatics infrastructure surrounding the radiotherapy clinic. This research

  16. Survey for Stochastic Model Checking%随机模型检验研究

    Institute of Scientific and Technical Information of China (English)

    刘阳; 李宣东; 马艳; 王林章

    2015-01-01

    随机模型检验作为模型检验理论的延伸和推广,可用于验证分析系统模型的定性或定量性质,其已经应用到随机分布式算法验证、通信协议性能分析甚至是系统生物学等跨学科领域。从20世纪90年代末至今,随机模型检验引起了形式验证等领域的广泛关注,并取得了很大的进展。该文追溯了随机模型检验的渊源,系统地概括了其最基本的原理及几类典型的 PCTL、概率的 LTL、PCTL*和 CSL 模型检验随机系统的算法框架。然后归纳总结了随机模型检验的主要研究方向及其进展,分析了基于随机模型检验的验证过程及其优势与劣势,并分类列出了目前出现的随机模型检验工具。最后介绍了随机模型检验的应用领域并指出了其未来的应用挑战。%Stochastic model checking is extension and generalization of the theory of model checking,which can verify and analyze system model quantitatively and qualitatively,and has been applied in the areas of verification of randomized distributed algorithms,performance analysis of communication protocols,and even the cross-disciplinary fields such as systems biology.Since the late 1990s,stochastic model checking has received widespread concern in the formal verification filed,and has made great progress.In this paper,we retrospect the origin of stochastic model checking,and discuss the basic principle of stochastic model checking systematically including the PCTL,LTL with probability bounds,PCTL* and CSL model checking algorithm.Then we summarize the main research direction and progress of stochastic model checking in recent years, analyze the verification process and advantages/disadvantages of stochastic model checking deeply, classify and list tools for stochastic model checking.Finally,we introduce the application areas of stochastic model checking and point out its future challenge.

  17. Reaching soldiers with untreated substance use disorder: lessons learned in the development of a marketing campaign for the Warrior Check-Up study.

    Science.gov (United States)

    Walton, Thomas O; Walker, Denise D; Kaysen, Debra L; Roffman, Roger A; Mbilinyi, Lyungai; Neighbors, Clayton

    2013-07-01

    The Warrior Check-Up, a confidential telephone-delivered intervention, is designed to reach active-duty soldiers with untreated substance-use disorder at a large U.S. military base. This paper describes the development and successful implementation of the study's marketing strategies at the recruitment period's midpoint (2010-2012). Qualitative analyses of focus groups (n = 26) and survey responses (n = 278) describe the process of campaign design. Measures of demographics, media exposure, post-traumatic stress, anxiety and depression gathered from callers (n = 172) are used in quantitative analysis assessing the campaign's success in reaching this population. Implications, limitations, and suggestions for future research are discussed. Department of Defense provided study funding.

  18. Open and hidden agendas of "asymptomatic" patients who request check-up exams

    Directory of Open Access Journals (Sweden)

    Nüesch Reto

    2011-04-01

    Full Text Available Abstract Background Current guidelines for a check-up recommend routine screening not triggered by specific symptoms for some known risk factors and diseases in the general population. Patients' perceptions and expectations regarding a check-up exam may differ from these principles. However, quantitative and qualitative data about the discrepancy between patient- and provider expectations for this type of clinic consultation is lacking. Methods For a year, we prospectively enrolled 66 patients who explicitly requested a "check-up" at our medical outpatient division. All patients actively denied upon prompting having any symptoms or specific health concerns at the time they made their appointment. All consultations were videotaped and analysed for information about spontaneously mentioned symptoms and reasons for the clinic consultation ("open agendas" and for cues to hidden patient agendas using the Roter interaction analysis system (RIAS. Results All patients initially declared to be asymptomatic but this was ultimately the case in only 7 out of 66 patients. The remaining 59 patients spontaneously mentioned a mean of 4.2 ± 3.3 symptoms during their first consultation. In 23 patients a total of 31 hidden agendas were revealed. The primary categories for hidden agendas were health concerns, psychosocial concerns and the patient's concept of disease. Conclusions The majority of patients requesting a general check-up tend to be motivated by specific symptoms and health concerns and are not "asymptomatic" patients who primarily come for preventive issues. Furthermore, physicians must be alert for possible hidden agendas, as one in three patients have one or more hidden reasons for requesting a check-up.

  19. Model Checking - My 27-Year Quest to Overcome the State Explosion Problem

    Science.gov (United States)

    Clarke, Ed

    2009-01-01

    Model Checking is an automatic verification technique for state-transition systems that are finite=state or that have finite-state abstractions. In the early 1980 s in a series of joint papers with my graduate students E.A. Emerson and A.P. Sistla, we proposed that Model Checking could be used for verifying concurrent systems and gave algorithms for this purpose. At roughly the same time, Joseph Sifakis and his student J.P. Queille at the University of Grenoble independently developed a similar technique. Model Checking has been used successfully to reason about computer hardware and communication protocols and is beginning to be used for verifying computer software. Specifications are written in temporal logic, which is particularly valuable for expressing concurrency properties. An intelligent, exhaustive search is used to determine if the specification is true or not. If the specification is not true, the Model Checker will produce a counterexample execution trace that shows why the specification does not hold. This feature is extremely useful for finding obscure errors in complex systems. The main disadvantage of Model Checking is the state-explosion problem, which can occur if the system under verification has many processes or complex data structures. Although the state-explosion problem is inevitable in worst case, over the past 27 years considerable progress has been made on the problem for certain classes of state-transition systems that occur often in practice. In this talk, I will describe what Model Checking is, how it works, and the main techniques that have been developed for combating the state explosion problem.

  20. Mic Check/Reality Check

    Directory of Open Access Journals (Sweden)

    Wanda Vrasti

    2012-03-01

    Full Text Available Over the past couple of months history has been unfolding with dizzying speed. The #occupy model of leaderless, demandless direct action, which in the beginning no one with only a slim understanding of how capitalism works thought could become anything more than a facile if charming jab at anti-corporate activism, has gone viral. Every morning we wake up to new reports about ‘occupying X’, where X can be anything from cities, campuses, boardrooms, buildings, highways, and public events, all the way to academic disciplines. What originally seemed like a romantic fantasy about temporary autonomous zones now feels like history. And no one likes to find themselves on thewrong side of history, especially not intellectuals, let alone intellectuals in the business of explaining global politics.