WorldWideScience

Sample records for check oro-dental implications

  1. Pattern of referral and management of oro-dental problems in patients with cancer: a retrospective study

    OpenAIRE

    Kaberi Das; Manigreeva Krishnatreya; Amal Chandra Kataki

    2014-01-01

    Background: General dentistry care is of paramount importance in maintaining oral hygiene of cancer patients. Methods: The data of patients registered at the dental wing in a tertiary care cancer center for one year period (2013) was used for the present analysis. All the cases were retrospectively analyzed for the pattern of referral, diagnosis of different oro-dental conditions, and different interventions done for the various oro-dental conditions. Results: A total of 798 patients w...

  2. Oro-dental mucoadhesive proniosomal gel formulation loaded with lornoxicam for management of dental pain.

    Science.gov (United States)

    Abdelbary, Ghada Ahmed; Aburahma, Mona Hassan

    2015-01-01

    Oro-dental diseases are generally associated with pain that is controlled using oral tablets containing NSAIDs. Lornoxicam, a relatively new NSAID, is effective in relieving pain accompanying different oro-dental problems. The aim of the current research is to prepare oro-dental analgesic and anti-inflammatory gel using provesicular approach to deliver lornoxicam directly to the site of action in the oral cavity. Local administration of lornoxicam is expected to be superior to systemic delivery in pain relieving and poses less GIT adverse effects. Different surfactants were utilized to prepare the proniosomal gels that rapidly transform into nano-sized niosomes after hydration with the oral saliva. The effect of the surfactant structure on vesicles size distribution and entrapment efficiency percentage (EE%) was investigated. The proniosomal formulations were incorporated into carbopol hydrogels that were characterized regarding rheological and mucoadhesion properties. Moreover, ex-vivo mucosal membrane permeation studies were conducted for selected proniosomal gels to quantify the permeation parameters and assess the amount of drug deposited within the oral mucosa. Results revealed that mucoadhesive proniosomes formulation prepared using Span 60 was optimal as it was nano-sized and also showed the highest EE%. The transmucosal flux of lornoxicam, from these proniosomal formulations, across the oral mucosa was significantly higher (p < 0.05) than lornoxicam containing carbopol gel and the percent drug diffused increased more than twofolds. The results collectively suggest that the mucoadhesive proniosomal gels can be assertively considered as a promising carrier for transmucosal delivery of lornoxicam into the oral cavity. PMID:25058447

  3. Oro-dental features of Pallister-Killian syndrome: Evaluation of 21 European probands.

    Science.gov (United States)

    Bagattoni, Simone; D'Alessandro, Giovanni; Sadotti, Agnese; Alkhamis, Nadia; Rocca, Alessandro; Cocchi, Guido; Krantz, Ian David; Piana, Gabriela

    2016-09-01

    Pallister-Killian syndrome (PKS) is a rare sporadic multi-systemic developmental disorder caused by a mosaic tetrasomy of the short arm of chromosome 12. A wide range of clinical characteristics including intellectual disability, seizures, and congenital malformations has previously been described. Individuals with PKS show a characteristic facial phenotype with frontal bossing, alopecia, sparse eyebrows, depressed nasal bridge, long philtrum, telecanthus, and posteriorly rotated ears. Oro-dental features, such as "Pallister lip," macroglossia, delayed eruption of primary teeth, high arched-palate, prognathism, and cleft palate have been occasionally reported in the medical literature. The aim of the study was to assess the oro-dental phenotype of PKS and to describe the oral health status in a cohort participating in the First European Workshop on PKS. A clinical dental examination was performed in 21 Caucasian probands and data regarding medical and dental history collected. Twelve probands (57%) showed an atypical dental pattern, with multiple missing teeth (primarily the first permanent molars) and 2 (10%) a double teeth. The severity of gingivitis and dental caries increased with age and gingival overgrowth was a common finding. A characteristic occlusive phenotype was found: a high-arched palate with mandibular prognathism associated with an anterior openbite and crossbite and with posterior crossbite (unilateral or bilateral). The prevalence of oral habits (non-nutritive sucking, mouth breathing, bruxism) was high, even in older probands. This study suggests that individuals affected by PKS should be observed closely for oro-dental diseases and a multidisciplinary approach is needed to implement the right preventive measures. © 2016 Wiley Periodicals, Inc. PMID:27354242

  4. Evaluation of Child Self-perception Regarding Their Oro-dental Status

    OpenAIRE

    Krisztina Mártha I.; Sorana Roșu; Réka Gyergyay; Katalin Vikárius

    2013-01-01

    Aim: The aim of this study was to evaluate the state of oral health and the self-perception of children regarding their oro-dental status, their knowledge and attitude towards oral health. Methods: A sample of 130 children (11-14 years) and one of their parents were asked to complete a Child Perception Questionnaire (CPQ11-14) in Sfântu Gheorghe, Romania. From these, 69 children were examined and data was recorded about Decayed-Missing-Filled Teeth (DMFT), oral hygiene, dental malposition and...

  5. Pattern of referral and management of oro-dental problems in patients with cancer: a retrospective study

    Directory of Open Access Journals (Sweden)

    Kaberi Das

    2014-08-01

    Results: A total of 798 patients were referred from various oncology wings for management of oro-dental problems, 50.1% patients were referred from head and neck oncology, 31% were from radiation department, 6.2% patients were from medical oncology and palliative care department each, 4% patients were from gynecologic oncology, and 2.5% patients were from screening wing. Acute gingivitis (62% in pre treatment and mucositis (28% in post treatment were major symptoms and signs for referral. 47% patients were managed with tooth extraction, grinding was done on 23%, scaling were done on 12.5%, desensitization was done on 8.7% patients, filling was done on 2.5% patients, prosthesis fitting in 2.5% patients, root canal treatment in 2.2% patients, and post surgical obturator fittings in 0.75% patients. Conclusion: Majority of cancer patients were referred for oro-dental care from head and neck oncology department with head and neck cancers and extraction of tooth pre radiotherapy and chemotherapy remains an important part of oro-dental care in cancer patients. [Int J Res Med Sci 2014; 2(4.000: 1545-1547

  6. Evaluation of Child Self-perception Regarding Their Oro-dental Status

    Directory of Open Access Journals (Sweden)

    Krisztina Mártha I.

    2013-10-01

    Full Text Available Aim: The aim of this study was to evaluate the state of oral health and the self-perception of children regarding their oro-dental status, their knowledge and attitude towards oral health. Methods: A sample of 130 children (11-14 years and one of their parents were asked to complete a Child Perception Questionnaire (CPQ11-14 in Sfântu Gheorghe, Romania. From these, 69 children were examined and data was recorded about Decayed-Missing-Filled Teeth (DMFT, oral hygiene, dental malposition and malocclusion, Aesthetic Component of Index of Treatment Need (AC-IOTN. Consent of the parents was obtained. Statistical analyses were performed. Results: The optimal score of CPQ evaluation is 96 and the maximum score achieved was 93, the minimum was 43. 78.10 average score can be graded as medium. As the data points out, most of the children and their parents have a medium knowledge and self-perception. The clinical examination underline the main problems: dental caries (62%, occlusal coloration (23%, dental malposition (17%, rooftop deep bite (14%, dental rotation and crowding (12%, dental plaque and tartar (10%. As far as the AC-IOTN is concerned, 48 of 69 children have no need for treatment, 18 have a high need for treatment, and 3 have a moderate need for treatment. Conclusions: Overall, the children and their parents have a poor oral health knowledge, which is reflected in the medium level of the achieved CPQ scores, in the clinical examination and can be associated with high levels of dental caries and malocclusion

  7. Oro-dental health in children with chronic renal failure and after renal transplantation: a clinical review.

    Science.gov (United States)

    Lucas, Victoria S; Roberts, Graham J

    2005-10-01

    As a consequence of chronic renal failure (CRF) and its treatment, a number of oro-dental changes occur that persist after the end-stage is reached. An early effect is enamel hypoplasia due to a defect of enamel development and mineralisation. This is usually reparable to a high aesthetic standard using dental composite filling material. Children with CRF have significantly less dental caries than healthy children due to the inhibitory effect of increased salivary urea levels. Grafted patients frequently develop gingival enlargement as a result of immunosuppression with cyclosporine A, which is further exacerbated by the additional use of antihypertensive calcium-blocking agents. Surgical reduction of gingival hyperplasia is effective and is required in approximately one third of adolescents. A very high standard of home care should be encouraged for all children with CRF in the form of thorough mechanical tooth cleaning and plaque inhibition through the use of an antibacterial mouthwash. In transplanted children presenting an increased risk of infection, antibiotic prophylaxis may be indicated for dental treatment procedures. The drug dosage should be adapted to the reduced renal function. Pediatric nephrologists should be aware that dental surgeons can make a considerable contribution to the general health and well-being of children with CRF. Thus, only oro-dental problems that are mainly encountered and treated by dental surgeons are reviewed. PMID:15947987

  8. ORO dental complications of radiotherapy

    International Nuclear Information System (INIS)

    Radiation and radioactivity were discovered more than 100 years ago. Since then, radiation has become important in cancer treatment. Approximately one million people will develop invasive cancer each year. Of these, 40% will receive curative benefit from surgery, radiation, chemotherapy, or a combination modality. Normal body tissues vary in their response to radiation. As with tumors, normal tissues in which cells are quickly dividing may be affected. This causes some of the side effects of radiation treatment. Since radiation is a local treatment, side effects depend on the area of the body being treated. The early effects of radiation may be seen a few days or weeks after treatments have started and may go on for several weeks after treatments have ended. Other effects may not show up until months, or even years, later. As radiotherapy is a viable treatment modality for head and neck cancer, however a wide range of potentially debilitating dental complications may accompany this treatment. The orofacial tissues of dental significance that may be affected by head and neck radiotherapy are the salivary glands, mucous membranes, taste buds, bone and teeth. (author)

  9. ORO-DENTAL PATTERN IN MENTALLY RETARDED

    OpenAIRE

    Tandon, Pradeep; Jha, Sanjeev; Tandon, Ragini; Sondhi, Deepak; Chandra, Mahesh; Trivedi, J.K.

    1990-01-01

    SUMMARY The study was carried out in 25 mentally retarded children and compared with equal number of normal children. They were subjected to detailed psychiatric evaluation and dental examination. The dental anomalies were corroborated with cephalometric analysis of lateral cephalograms. It was concluded that all mentally retarded children had some dental abnormality in them in form of dental malocclusion, wide inter dental spaces, absence of teeth etc. We suggest early dental management for ...

  10. Check valve

    International Nuclear Information System (INIS)

    A check valve for use in a GDCS of a nuclear reactor and having a motor driven disk including a rotatable armature for rotating the check valve disk over its entire range of motion is described. In one embodiment, the check valve includes a valve body having a coolant flow channel extending therethrough. The coolant flow channel includes an inlet end and an outlet end. A valve body seat is located on an inner surface of the valve body. The check valve further includes a disk assembly, sometimes referred to as the motor driven disc, having a counterweight and a disk shaped valve. The disk valve includes a disk base having a seat for seating with the valve body seat. The disk assembly further includes a first hinge pin member which extends at least partially through the disk assembly and is engaged to the disk. The disk valve is rotatable relative to the first hinge pin member. The check valve also includes a motor having a stator frame with a stator bore therein. An armature is rotatably positioned within the stator bore and the armature is coupled to the disk valve to cause the disk valve to rotate about its full range of motion. 5 figs

  11. Fractal features of soil particle size distribution in layered sediments behind two check dams: Implications for the Loess Plateau, China

    Science.gov (United States)

    Wei, Xia; Li, Xungui; Wei, Ning

    2016-08-01

    The layered sediment deposited behind a check dam can provide useful information about soil erosion processes in the dam-controlled area. This study aims to evaluate the possible fractal nature of layered sediments behind check dams, assessing whether fractal dimension can serve as a feasible index for evaluating the impact of land use types on the area controlled by the check dam. Fractal dimension measurement was employed to analyze the features of soil particle size distribution (PSD) for different layered sediments of the Shipanmao and Zhangshan check dams in the Dalihe River Basin of the Loess Plateau, China. Results show that the predominant soil particle sizes of the sediment layers behind the Shipanmao and Zhangshan dams are silt-clay (< 0.05 mm) and fine sand (0.25-0.05 mm). The overall gradients of the trends for silt-clay and fine sand are 0.0622 (slight increase) and - 0.0618 (slight decrease), respectively, for Shipanmao, and - 0.8415 (decrease) and 0.8448 (increase), respectively, for Zhangshan. There are considerable differences in the PSDs among different layers, especially in the coarse and fine sand fractions. The coefficient of variation (CV) for the coarse sand fraction is highest, followed by the fine sand and the silt-clay size fractions. Larger soil particle sizes coincide with larger CV values. The fractal dimension (Dm) of the PSD ranges from 2.111 to 2.219, and 2.144 to 2.447 for Shipanmao and Zhangshan, respectively. The Dm values tend to increase and decrease for the layered sediments from top to bottom with some turning points. The turning points of Dm are related to the trends of the soil PSDs in the adjacent sediment layers. Although Dm has significant positive and negative correlations with the silt-clay and the fine sand size fractions, respectively, no correlation with the coarse sand fraction was observed. Soil PSD is a more dominant factor affecting Dm than the time lag between soil erosion and sediment deposition. Overall, Dm

  12. Role of genes in oro-dental diseases

    OpenAIRE

    Kavitha B; Priyadharshini Vijayashree; Sivapathasundharam B; Saraswathi T

    2010-01-01

    In oral cavity, the spectrum of diseases due to genetic alterations ranges from developmental disturbances of teeth to the pre-cancerous and cancerous lesions. Of late, significant progress has been made in the molecular analysis of tumors. With molecular genetic testing emerging as diagnostic, prognostic, and therapeutic approach, a review of genetic alterations ranging from the development of oro-facial structures to the tumors in the head and neck region are addressed in this article. The ...

  13. Role of genes in oro-dental diseases

    Directory of Open Access Journals (Sweden)

    Kavitha B

    2010-01-01

    Full Text Available In oral cavity, the spectrum of diseases due to genetic alterations ranges from developmental disturbances of teeth to the pre-cancerous and cancerous lesions. Of late, significant progress has been made in the molecular analysis of tumors. With molecular genetic testing emerging as diagnostic, prognostic, and therapeutic approach, a review of genetic alterations ranging from the development of oro-facial structures to the tumors in the head and neck region are addressed in this article. The functional regulatory aspect of genes in relation to oro-facial structures are discussed separately, i.e., in relation to tooth genesis, tooth agenesis (non-syndromic, syndromic, tooth structural alterations, syndromic oro-facial defects, bone diseases, skin diseases (genodermatoses, and malignant tumors. In this literature, various genes involved in the development of the oro-facial structures and tooth in particular are discussed. The genetic basis of disorders in the tooth development (agenesis, hypodontia, tooth structural defects like amelogenesis imperfecta (AI, dentinogenesis imperfecta (DI, and oro-facial structural alterations (various syndromes are explained.

  14. Regular health checks

    DEFF Research Database (Denmark)

    Grønhøj Larsen, Christian; Jørgensen, Karsten Juhl; Gøtzsche, Peter C

    2012-01-01

    To investigate whether Danish providers of general health checks present a balanced account of possible benefits and harms on their websites and whether the health checks are evidence-based.......To investigate whether Danish providers of general health checks present a balanced account of possible benefits and harms on their websites and whether the health checks are evidence-based....

  15. Annual Check-up

    Science.gov (United States)

    ... Medical Conditions Nutrition & Fitness Emotional Health Annual Check-Up Posted under Health Guides . Updated 7 January 2015. + ... I get ready for my annual medical check-up? If this is your first visit to your ...

  16. Checking Java Programs

    CERN Document Server

    Darwin, Ian

    2007-01-01

    This Short Cut tells you about tools that will improve the quality of your Java code, using checking above and beyond what the standard tools do, including: Using javac options, JUnit and assertions Making your IDE work harder Checking your source code with PMD Checking your compiled code (.class files) with FindBugs Checking your program's run-time behavior with Java PathFinder

  17. Health Check Tools

    Science.gov (United States)

    ... https://www.nlm.nih.gov/medlineplus/healthchecktools.html Health Check Tools To use the sharing features on ... Schedule (Centers for Disease Control and Prevention) Children's Health Body Mass Index: Calculator for Child and Teen ( ...

  18. Check It Out

    Science.gov (United States)

    ... Materials The Healthy Heart Handbook for Women Check it Out Tests That Can Help Protect Your Heart ... years, or more often if your doctor recommends it. Other Tests There also are several tests that ...

  19. Goat production check list

    DEFF Research Database (Denmark)

    Henriksen, Jørgen; Nielsen, Mette Benedicte Olaf; Madsen, Jørgen;

    2009-01-01

    This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production.......This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production....

  20. Check valves aging assessment

    International Nuclear Information System (INIS)

    In support of the NRC Nuclear Plant Aging Research (NPAR) program, the Oak Ridge National Laboratory (ORNL) has carried out an assessment of several check value diagnostic monitoring methods, in particular, those based on measurements of acoustic emission, ultrasonics, and magnetic flux. The evaluations have focussed on the capabilities of each method to provide information useful in determining check valve aging and service wear effects, check valve failures, and undesirable operating modes. This paper describes the benefits and limitations associated with each method and includes recent laboratory and field test data, including data obtained from the vendors who recently participated in a comprehensive series of tests directed by a nuclear industry users group. In addition, as part of the ORNL Advanced Diagnostic Engineering Research and Development Center (ADEC), two novel nonintrusive monitoring methods were developed that provide several unique capabilities. These methods, based on external ac- an dc-magnetic monitoring are also described. None of the examined methods could, by themselves, monitor both the instantaneous position and motion of check valve internals and valve leakage; however, the combination of acoustic emission monitoring with one of the other methods provides the means to determine vital check valve operational information

  1. CMM Interim Check (U)

    Energy Technology Data Exchange (ETDEWEB)

    Montano, Joshua Daniel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-03-23

    Coordinate Measuring Machines (CMM) are widely used in industry, throughout the Nuclear Weapons Complex and at Los Alamos National Laboratory (LANL) to verify part conformance to design definition. Calibration cycles for CMMs at LANL are predominantly one year in length. Unfortunately, several nonconformance reports have been generated to document the discovery of a certified machine found out of tolerance during a calibration closeout. In an effort to reduce risk to product quality two solutions were proposed – shorten the calibration cycle which could be costly, or perform an interim check to monitor the machine’s performance between cycles. The CMM interim check discussed makes use of Renishaw’s Machine Checking Gauge. This off-the-shelf product simulates a large sphere within a CMM’s measurement volume and allows for error estimation. Data was gathered, analyzed, and simulated from seven machines in seventeen different configurations to create statistical process control run charts for on-the-floor monitoring.

  2. Checking for Ketones

    Science.gov (United States)

    ... by Mail Close www.diabetes.org > Living With Diabetes > Treatment and Care > Blood Glucose Testing Share: Print Page Text Size: ... glucose-and-a1c, In this section Living With Diabetes Treatment and Care Blood Glucose Testing Checking Your Blood Glucose A1C ...

  3. Engineering Abstractions in Model Checking and Testing

    DEFF Research Database (Denmark)

    Achenbach, Michael; Ostermann, Klaus

    2009-01-01

    Abstractions are used in model checking to tackle problems like state space explosion or modeling of IO. The application of these abstractions in real software development processes, however, lacks engineering support. This is one reason why model checking is not widely used in practice yet and...... testing is still state of the art in falsification. We show how user-defined abstractions can be integrated into a Java PathFinder setting with tools like AspectJ or Javassist and discuss implications of remaining weaknesses of these tools. We believe that a principled engineering approach to designing...

  4. Swing check valve

    International Nuclear Information System (INIS)

    A swing check valve which includes a valve body having an inlet and outlet is described. A recess in the valve body designed to hold a seal ring and a check valve disc swingable between open and closed positions. The disc is supported by a high strength wire secured at one end in a support spacer pinned through bearing blocks fixed to the valve body and at its other end in a groove formed on the outer peripheral surface of the disc. The parts are designed and chosen such to provide a lightweight valve disc which is held open by minimum velocity of fluid flowing through the valve which thus reduces oscillations and accompanying wear of bearings supporting the valve operating parts. (Auth.)

  5. Keeping valves in check

    International Nuclear Information System (INIS)

    Check valves are located in almost all safety and non-safety related fluid systems in a nuclear power plant. Malfunction or failure of these valves during plant operations, or in some cases under cold shutdown conditions, can seriously affect plant safety and result in costly, time-consuming maintenance. A major cause of check valve failure in the past has been excessive wear of internal components due to high disc flutter. Valve operation under conditions that cause the valve disc and hinge arm to oscillate or flutter can lead to degradations which, if undetected and not corrected, may result in malfunction or failure. Checkmate II, a portable, non-intrusive diagnostic system, has been developed to test various types of check valves using patented ultrasonic testing technology. The system comprises a computer, ultrasonic oscilloscope, transducers, and supporting hardware, and can identify many different phenomena, including: disc position and disc flutter; backstop and seat tapping; relative motion between hinge arm and disc; hinge pin wear and uneven hinge pin wear; disc stud wear and loosened stud nuts; combined stud and hinge pin wear, stuck and missing discs; broken springs. (author)

  6. Checking Model Transformation Refinement

    OpenAIRE

    Büttner, Fabian; Egea, Marina; Guerra, Esther; Lara, Juan De

    2013-01-01

    The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-642-38883-5_15 Proceedings of 6th International Conference, ICMT 2013, Budapest, Hungary, June 18-19, 2013 Refinement is a central notion in computer science, meaning that some artefact S can be safely replaced by a refinement R, which preserves S’s properties. Having available techniques and tools to check transformation refinement would enable (a) the reasoning on whether a transformation correctly impl...

  7. Oro-Dental Health Status and Salivary Characteristics in Children with Chronic Renal Failure

    Directory of Open Access Journals (Sweden)

    A. Mashayekhi

    2011-09-01

    Full Text Available Children suffering from decreased renal function may demand unique considerations regarding special oral and dental conditions they are encountered to. It is mentioned that renal function deterioration may affect the hard or soft tissues of the mouth. Havingknowledge about the high prevalence of dental defects, calculus, gingival hyperplasia, modified salivary composition and tissue responses to the dental plaque may aid the physician and the dentist to help nurture the patient with chronic renal failure through the crisis, with an aesthetically satisfying and functioning dentition.

  8. Solutions against crisis applicable to the oro-dental health system in Romania

    Directory of Open Access Journals (Sweden)

    Adriana DUŢESCU

    2012-08-01

    Full Text Available The health systems consume a lot of resources. In the last thirty years, there was registered a continuous increase of the necessary resources’ level. This increase was mainly due to: the ageing of the population, discovery of more efficient medicines and of more advanced and costly technologies, the increase of the number of persons who benefits by medical assistance.Theoretically, the financial supporting could be upgraded by help of a series of measures: restriction of the access to services, reduction of the quality of the services or increase of the private financing weight (which has consequences connected to the limitation of the access to services. None of these is desired from social point of view.From social perspective, the most indicated modality of upgrading the financial supporting is the efficient increase of the health system. In this situation, the efficiency makes reference to the decrease of costs, maintaining at the same level the quantity and quality, achieved by preventing the overconsumption (which could be connected to oversupply of medical services and assignment of sufficient resources for the prevention and health maintenance programs with the purpose to reduce some future potential expenses. The performed comparisons between different international experiences based on the resulted/expenses rapport could represent a useful guide referring to the efficiency.

  9. Prevalence of oro-dental anomalies among schoolchildren in Sana'a city, Yemen.

    Science.gov (United States)

    Basalamah, M; Baroudi, K

    2016-01-01

    Practitioners and policy-makers need information about the relative frequency of dental anomalies among children in their region. This study investigated the prevalence of different oral anomalies among schoolchildren in Sana'a city, Yemen. A sample of 1000 private and public schoolchildren aged 4-12 years were examined by the same examiner using disposable tongue blades. The total prevalence of oral anomalies was 15.1%, most commonly in boys (male:female ratio 3.2:1) aged 7-12 years. The most prevalent dental anomaly related to hard tissues was tooth hypoplasia (2.8%), followed by hypocalcification (2.6%), then microdontia (0.5%), macrodontia (0.4%), hypodontia (0.4%), supernumerary teeth (0.3%), tooth transposition (0.3%), dental fusion (0.2%) and gemination (0.2%). The most prevalent soft tissues anomaly was fissured tongue (4.0%), followed by ankyloglossia (1.8%), geographic tongue (0.9%), macroglossia (0.4%) and hairy tongue (0.3%). Appropriate measures need to be taken early to mitigate the negative impact and later costs of treatment of anomalies. PMID:27117648

  10. Oro-Dental Health Status and Salivary Characteristics in Children with Chronic Renal Failure

    OpenAIRE

    Mashayekhi, A.; Ahmadi, M; Ramezani, N.; R. Ahmadi; Seraj, B.

    2011-01-01

    Children suffering from decreased renal function may demand unique considerations regarding special oral and dental conditions they are encountered to. It is mentioned that renal function deterioration may affect the hard or soft tissues of the mouth. Having knowledge about the high prevalence of dental defects, calculus, gingival hyperplasia, modified salivary composition and tissue responses to the dental plaque may aid the physician and the dentist to help nurture the patient with chronic ...

  11. Burning mouth syndrome: controversial place as a symptom of Oro-dental pathology.

    Science.gov (United States)

    Coculescu, E C; Manole, G; Coculescu, B I; Purcărea, V L

    2015-01-01

    As defined by WHO experts, disease involves a change of the physical, mental and social welfare, generating chronic stress condition if unresolved. One of the symptoms almost constantly found in any condition is pain. This feeling manifests differently depending on the subjective perception. The burning mouth syndrome (BMS) is included in such a framework. The BMS is considered as one of the characteristic states of chronic stress syndromes associated with nonspecific clinical manifestations and requires special medical attention in terms of assessing and treating the condition. However, the insufficient knowledge of its etiopathogenic mechanisms requires comprehensive research undertaken on such a subject. PMID:26361508

  12. Bounded Model Checking of CTL

    Institute of Scientific and Technical Information of China (English)

    Zhi-Hong Tao; Cong-Hua Zhou; Zhong Chen; Li-Fu Wang

    2007-01-01

    Bounded Model Checking has been recently introduced as an efficient verification method for reactive systems.This technique reduces model checking of linear temporal logic to propositional satisfiability.In this paper we first present how quantified Boolean decision procedures can replace BDDs.We introduce a bounded model checking procedure for temporal logic CTL* which reduces model checking to the satisfiability of quantified Boolean formulas.Our new technique avoids the space blow up of BDDs, and extends the concept of bounded model checking.

  13. 14 CFR 91.1093 - Initial and transition training and checking: Check pilots (aircraft), check pilots (simulator).

    Science.gov (United States)

    2010-01-01

    ... checking: Check pilots (aircraft), check pilots (simulator). 91.1093 Section 91.1093 Aeronautics and Space....1093 Initial and transition training and checking: Check pilots (aircraft), check pilots (simulator... observation check may be accomplished in part or in full in an aircraft, in a flight simulator, or in a...

  14. Checking Security Policy Compliance

    CERN Document Server

    Gowadia, Vaibhav; Kudo, Michiharu

    2008-01-01

    Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

  15. 14 CFR 135.339 - Initial and transition training and checking: Check airmen (aircraft), check airmen (simulator).

    Science.gov (United States)

    2010-01-01

    ... checking: Check airmen (aircraft), check airmen (simulator). 135.339 Section 135.339 Aeronautics and Space... and checking: Check airmen (aircraft), check airmen (simulator). (a) No certificate holder may use a... an aircraft, in a flight simulator, or in a flight training device. This paragraph applies...

  16. Compositional and Quantitative Model Checking

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    This paper gives a survey of a composition model checking methodology and its succesfull instantiation to the model checking of networks of finite-state, timed, hybrid and probabilistic systems with respect; to suitable quantitative versions of the modal mu-calculus [Koz82]. The method is based on...

  17. Model Checking as Static Analysis

    DEFF Research Database (Denmark)

    Zhang, Fuyuan

    properties which can predict safe approximations to program behaviors. In this thesis, we have developed several static analysis based techniques to solve model checking problems, aiming at showing the link between static analysis and model checking. We focus on logical approaches to static analysis......Both model checking and static analysis are prominent approaches to detecting software errors. Model Checking is a successful formal method for verifying properties specified in temporal logics with respect to transition systems. Static analysis is also a powerful method for validating program...... multi-valued setting, and we therefore obtain a multivalued analysis for temporal properties specied by CTL formulas. In particular, we have shown that the three-valued CTL model checking problem over Kripke modal transition systems can be exactly encoded in three-valued ALFP. Last, we come back to two...

  18. Scram system with continuos check

    International Nuclear Information System (INIS)

    The equipment described pretends to be a further step to the use of integrated circuits in nuclear instrumentation, considering that this type of control was traditionally carried out on the bases of electromechanical elements. A continuous self-check method has been applied in accordance with the high reliability requiered for this type of equipments. The developed equipment fulfils the condition that any deficiency in its component elements, causes an anormal self-detected operation. The equipment covers two systems: the Scram one, that includes the sequence generator-detector, the rods check and scram chain, and the Check system that uses pulses from the sequence detector. (author)

  19. New methods of concurrent checking

    CERN Document Server

    Goessel, Michael; Sogomonyan, Egor; Marienfeld, Daniel

    2008-01-01

    Written by a team of two leading experts and two very successful young former PhD students, New Methods of Concurrent Checking describes new methods of concurrent checking, such as partial duplication, use of output dependencies, complementary circuits, self-dual parity, self-dual duplication and others. A special chapter demonstrates how the new general methods of concurrent checking can be more specifically applied to regular structures to obtain optimum results. This is exemplified for all types of adders up to 64 bits with a level of detail never before presented in the literature. The cle

  20. Model Checking Algorithms for CTMDPs

    DEFF Research Database (Denmark)

    Buchholz, Peter; Hahn, Ernst Moritz; Hermanns, Holger;

    2011-01-01

    Continuous Stochastic Logic (CSL) can be interpreted over continuoustime Markov decision processes (CTMDPs) to specify quantitative properties of stochastic systems that allow some external control. Model checking CSL formulae over CTMDPs requires then the computation of optimal control strategie...

  1. Treasury Check Verification Query (TCVQ)

    Data.gov (United States)

    Social Security Administration — The TCVQ system determines the SSN of an individual whose check has been returned to a local field office. The FO is able to request this information via the TCVQ...

  2. Advances in Probabilistic Model Checking

    OpenAIRE

    Kwiatkowska, Marta; Parker, David

    2012-01-01

    Probabilistic model checking is an automated verification method that aims to establish the correctness of probabilistic systems. Probability may arise, for example, due to failures of unreliable components, communication across lossy media, or through the use of randomisation in distributed protocols. Probabilistic model checking enables a range of exhaustive, quantitative analyses of properties such as "the probability of a message being delivered within 5ms is at least 0.89". In the last t...

  3. Model checking PSL safety properties

    OpenAIRE

    Launiainen, Tuomas

    2009-01-01

    Model checking is a modern, efficient approach to gaining confidence of the correctness of complex systems. It outperforms conventional testing methods especially in cases where a high degree of confidence in the correctness of the system is required, or when the test runs of the system are difficult to reproduce accurately. In model checking the system is verified against a specification that is expressed in a formal specification language. The main challenges are that the process requires q...

  4. Community perspectives: Community check cashing

    OpenAIRE

    Daniel Leibsohn

    2011-01-01

    In May of 2009, Community Development Finance (CDF) opened the first nonprofit, full-service check cashing store in the country in Fruitvale, California. The project is designed to provide low-income households with the financial services they need, without the asset-stripping characteristics common to the fringe banking industry. In addition to providing affordable check cashing services and a payday loan product, CDF also provides financial coaching and literacy training, small business ass...

  5. Model composition in model checking

    OpenAIRE

    Felscher, Ingo

    2014-01-01

    Model-checking allows one to formally check properties of systems: these properties are modeled as logic formulas and the systems as structures like transition systems. These transition systems are often composed, i.e., they arise in form of products or sums. The composition technique allows us to deduce the truth of a formula in the composed system from "interface information": the truth of formulas for the component systems and information in which components which of these formulas hold. W...

  6. Body checking behaviors in men

    OpenAIRE

    Walker, D. Catherine; Anderson, Drew A.; Hildebrandt, Thomas

    2009-01-01

    Males have been facing increasing pressure from the media to attain a lean, muscular physique, and are at risk for body dissatisfaction, disturbed eating and exercise behaviors, and abuse of appearance- and performance-enhancing drugs (APEDs). The aim of the current study was to examine the relationship between body checking and mood, symptoms of muscle dysmorphia, importance of shape and weight, and APED use in undergraduate males. Body checking in males was correlated with weight and shape ...

  7. Uncertainty in Cross Orthogonality Checks

    Science.gov (United States)

    Matsumura, Yuichi

    Finite element structural dynamic models are typically validated using data obtained from a modal testing. Although it is known that test variability may affect the verification, the test variability is typically ignored in the verification process. This paper describes the sensitivities of cross orthogonality check to the test variability. The cross orthogonality check is one of correlation techniques which is gaining acceptance in the structural dynamics community, because of its improved accuracy over the standard modal assurance criterion. Then an uncertainty index of the cross orthogonality check is proposed based on the fact that the sensitivities are much dependent on sensor placement. The results of some artificially generated test cases are presented to demonstrate the applicability of the proposed approach.

  8. Direct Model Checking Matrix Algorithm

    Institute of Scientific and Technical Information of China (English)

    Zhi-Hong Tao; Hans Kleine Büning; Li-Fu Wang

    2006-01-01

    During the last decade, Model Checking has proven its efficacy and power in circuit design, network protocol analysis and bug hunting. Recent research on automatic verification has shown that no single model-checking technique has the edge over all others in all application areas. So, it is very difficult to determine which technique is the most suitable for a given model. It is thus sensible to apply different techniques to the same model. However, this is a very tedious and time-consuming task, for each algorithm uses its own description language. Applying Model Checking in software design and verification has been proved very difficult. Software architectures (SA) are engineering artifacts that provide high-level and abstract descriptions of complex software systems. In this paper a Direct Model Checking (DMC) method based on Kripke Structure and Matrix Algorithm is provided. Combined and integrated with domain specific software architecture description languages (ADLs), DMC can be used for computing consistency and other critical properties.

  9. From preventive to permissive checks

    DEFF Research Database (Denmark)

    Weisdorf, Jacob Louis; Sharp, Paul Richard

    2009-01-01

    The Malthusian "preventive check" mechanism has been well documented for pre-industrial England through evidence for a negative correlation between the marriage rate and the price of wheat. Other literature, however, speculates that the correlation was in fact positive from the early nineteenth...

  10. Loess Plateau check dams can potentially sequester eroded soil organic carbon

    Science.gov (United States)

    Zhang, Haicheng; Liu, Shuguang; Yuan, Wenping; Dong, Wenjie; Xia, Jiangzhou; Cao, Yaojun; Jia, Yanwei

    2016-06-01

    Check dams are special soil and water conservation structures in the Loess Plateau, China. They play an important role in intercepting sediments and soil organic carbon (SOC). However, the decomposition of intercepted SOC and the environmental regulations at check dams have not been investigated. We conducted several paired field experiments at both check dams and slope lands in the Yanhe Watershed of the Loess Plateau to examine the characteristics of SOC decomposition at check dams. On average, the SOC mineralization rate in slope lands was approximately three times higher than in check dams. Increased soil moisture and compaction in check dams can constrain carbon mineralization by limiting the oxygen availability of SOC and can isolate substrate carbon from heterotrophic microorganisms. Our results indicate that check dams display a considerable potential for eroded SOC sequestration via reducing the soil respiration rate and highlight the important implications of lateral carbon redistribution and human engineering projects when estimating regional or global ecosystem carbon cycles.

  11. The Effects of Peer-Mediated Check-In/Check-Out on the Social Skills of Socially Neglected Students.

    Science.gov (United States)

    Collins, Tai A; Gresham, Frank M; Dart, Evan H

    2016-07-01

    Check-In/Check-Out (CICO) is a moderately effective Tier 2 intervention often used to address attention-maintained problem behaviors in schools. Recent studies on CICO have demonstrated the effectiveness of the intervention when combined with social skills training and when utilizing students' peers as interventionists. Using a concurrent multiple baseline across participants design, the present study evaluated the effectiveness of peer-mediated CICO to target social skills in elementary school students identified as socially neglected using a sociometric classification system. Results, implications for practice, limitations, and future directions are discussed. PMID:27056878

  12. Transaction management with integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide; Christiansen, Henning

    2005-01-01

    Database integrity constraints, understood as logical conditions that must hold for any database state, are not fully supported by current database technology. It is typically up to the database designer and application programmer to enforce integrity via triggers or tests at the application level......, which are difficult to maintain and error prone. Two important aspects must be taken care of. 1.~It is too time consuming to check integrity constraints from scratch after each update, so simplified checks before each update should be used relying on the assumption that the current state is consistent....... 2.~In concurrent database systems, besides the traditional correctness criterion, the execution schedule must ensure that the different transactions can overlap in time without destroying the consistency requirements tested by other, concurrent transactions....

  13. From Preventive to Permissive Checks

    DEFF Research Database (Denmark)

    Sharp, Paul Richard; Weisdorf, Jacob Louis

    The Malthusian "preventive check" mechanism has been well documented for pre-industrial England through evidence for a negativcorrelation between the marriage rate and the price of wheat. Other literature, however, speculates that the correlation was in fact positive from the early nineteenth cen...... shows that this result is not in fact inconsistent with a stylized Malthusian mechanism, and can be understood within the context of an increasing dominance of shocks to aggregate demand rather than to aggregate supply...

  14. Program Analysis as Model Checking

    DEFF Research Database (Denmark)

    Olesen, Mads Chr.

    of an abstract interpretation. For the generalisation to lattice automata to have benefit it is important that efficient tools exist. This thesis presents multi-core tools for efficient and scalable reachability and Büchi emptiness checking of timed/lattice automata. Finally, a number of case studies...... overapproximation of the hardware is needed; the case of identifying timing anomalous hardware for which such abstractions are hard to find is considered....

  15. Checking modes of HAL programs

    OpenAIRE

    de la Banda, MG; Harvey, W; Marriott, K.; Stuckey, PJ; Demoen, Bart

    2005-01-01

    Recent constraint logic programming (CLP) languages, such as HAL and Mercury, require type, mode and determinism declarations for predicates. This information allows the generation of efficient target code and the detection of many errors at compile-time. Unfortunately, mode checking in such languages is difficult. One of the main reasons is that, for each predicate mode declaration, the compiler is required to appropriately re-order literals in the predicate's definition. The task is further...

  16. Preventing the threat of credit-card fraud: Factors influencing cashiers' identification-checking behavior.

    Science.gov (United States)

    Downing, Christopher; Howard, E Henry; Goodwin, Christina; Geller, E Scott

    2016-01-01

    Two studies examined factors influencing cashiers' identification (ID)-checking behavior in order to inform the development of interventions to prevent credit-card fraud. In both studies, research assistants made credit purchases in various stores and noted the cashiers' ID-checking behavior. In the first study, the store type, whether the cashier swiped the credit/debit card, the amount of the purchase, and whether the credit/debit card was signed significantly influenced ID-checking behavior. In the second study, an A-B-A design was used to evaluate the impact of a "Check my ID" prompt placed on the credit/debit card. The prompt increased cashiers' ID-checking behavior from 5.9% at Baseline to 10.3% during the Intervention. When the prompt was removed, the cashiers' ID-checking behavior decreased to 7.2%. Implications for further intervention research to prevent credit-card fraud are discussed. PMID:27309026

  17. 25 CFR 141.19 - Check cashing.

    Science.gov (United States)

    2010-04-01

    ... may give a fully negotiable check in addition to U.S. currency when cashing a draft, check or money... or any other obligation the customer owes to the business, but in no event may the owner or...

  18. Checking Out Cuts, Scratches, and Abrasions

    Science.gov (United States)

    ... Skating Crushes What's a Booger? Checking Out Cuts, Scratches, and Abrasions KidsHealth > For Kids > Checking Out Cuts, ... weren't wearing kneepads. How Do Cuts and Scratches Heal? After getting a cut, scratch, or abrasion, ...

  19. 14 CFR 91.1089 - Qualifications: Check pilots (aircraft) and check pilots (simulator).

    Science.gov (United States)

    2010-01-01

    ... check pilots (simulator). 91.1089 Section 91.1089 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION... (aircraft) and check pilots (simulator). (a) For the purposes of this section and § 91.1093: (1) A check... simulator, or in a flight training device for a particular type aircraft. (2) A check pilot (simulator) is...

  20. 14 CFR 121.411 - Qualifications: Check airmen (airplane) and check airmen (simulator).

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Qualifications: Check airmen (airplane) and... § 121.411 Qualifications: Check airmen (airplane) and check airmen (simulator). (a) For the purposes of this section and § 121.413: (1) A check airman (airplane) is a person who is qualified, and...

  1. Anonymity control in electronic check systems

    Institute of Scientific and Technical Information of China (English)

    Ma Chunguang; Yang Yixian; Hu Zhengming

    2005-01-01

    Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single check is used to pay any price that is not more than the face value. The main problem in check systems is to design an efficient refund mechanism that makes refund checks undistinguished from initial checks during payment and deposit. The problem of anonymity control also called fairness is also an important issue in check systems. All check systems yet are unconditional anonymity that opens the door to misuse for crime such as laundering and blackmailing. In this paper, the notion of anonymity revocation is introduced to electronic check system for the first time, and a model of fair electronic check system is proposed. An efficient fair online electronic check system with reusable refund is presented. In the system, a passive trustee is employed to revoke the anonymity of un-honest users. Moreover, the system solves the reusability problem of refunds thanks to the RSA-based partially signature. The system is efficient and meets all basic security requirements.

  2. Heteroscedasticity checks for regression models

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    For checking on heteroscedasticity in regression models, a unified approach is proposed to constructing test statistics in parametric and nonparametric regression models. For nonparametric regression, the test is not affected sensitively by the choice of smoothing parameters which are involved in estimation of the nonparametric regression function. The limiting null distribution of the test statistic remains the same in a wide range of the smoothing parameters. When the covariate is one-dimensional, the tests are, under some conditions, asymptotically distribution-free. In the high-dimensional cases, the validity of bootstrap approximations is investigated. It is shown that a variant of the wild bootstrap is consistent while the classical bootstrap is not in the general case, but is applicable if some extra assumption on conditional variance of the squared error is imposed. A simulation study is performed to provide evidence of how the tests work and compare with tests that have appeared in the literature. The approach may readily be extended to handle partial linear, and linear autoregressive models.

  3. Control-flow checking via regular expressions

    OpenAIRE

    Benso, Alfredo; Di Natale, Giorgio; Di Carlo, Stefano; Prinetto, Paolo Ernesto; Tagliaferri, Luca

    2001-01-01

    The present paper explains a new approach to program control flow checking. The check has been inserted at source-code level using a signature methodology based on regular expressions. The signature checking is performed without a dedicated watchdog processor but resorting to inter-process communication (IPC) facilities offered by most of the modern operating systems. The proposed approach allows very low memory overhead and trade-off between fault latency and program execution time overhead

  4. An experimental analysis of body checking

    OpenAIRE

    Shafran, Roz; Lee, Michelle; Payne, Elizabeth; Fairburn, Christopher G.

    2007-01-01

    The relationship between repeated body checking and its impact on body size estimation and body dissatisfaction is of interest for two reasons. First, it has importance in theoretical accounts of the maintenance of eating disorders and, second, body checking is targeted in cognitive-behavioural treatment. The aim of this study was to determine the impact of manipulating body checking on body size estimation and body dissatisfaction. Sixty women were randomly assigned either to repeatedly scru...

  5. Check valve slam analysis in pumping station

    OpenAIRE

    Himr D.; Habán V.; Dokoupil P.

    2016-01-01

    Pumping station supplies water for technological process. The check valve in the station was replaced with a new one. The regular test of black out discovered the high pressure pulsations accompanied with noticeable pipeline movement of discharge pipe. It was caused by late check valve closing, probably, when the back flow reached the highest possible velocity. This statement was supported with analysis of results of pressure measurement near the check valve and with a numerical simulation of...

  6. Check valve slam analysis in pumping station

    Science.gov (United States)

    Himr, D.; Habán, V.; Dokoupil, P.

    2016-03-01

    Pumping station supplies water for technological process. The check valve in the station was replaced with a new one. The regular test of black out discovered the high pressure pulsations accompanied with noticeable pipeline movement of discharge pipe. It was caused by late check valve closing, probably, when the back flow reached the highest possible velocity. This statement was supported with analysis of results of pressure measurement near the check valve and with a numerical simulation of the flow in the pipeline system.

  7. Heteroscedasticity checks for regression models

    Institute of Scientific and Technical Information of China (English)

    ZHU; Lixing

    2001-01-01

    [1]Carroll, R. J., Ruppert, D., Transformation and Weighting in Regression, New York: Chapman and Hall, 1988.[2]Cook, R. D., Weisberg, S., Diagnostics for heteroscedasticity in regression, Biometrika, 1988, 70: 1—10.[3]Davidian, M., Carroll, R. J., Variance function estimation, J. Amer. Statist. Assoc., 1987, 82: 1079—1091.[4]Bickel, P., Using residuals robustly I: Tests for heteroscedasticity, Ann. Statist., 1978, 6: 266—291.[5]Carroll, R. J., Ruppert, D., On robust tests for heteroscedasticity, Ann. Statist., 1981, 9: 205—209.[6]Eubank, R. L., Thomas, W., Detecting heteroscedasticity in nonparametric regression, J. Roy. Statist. Soc., Ser. B, 1993, 55: 145—155.[7]Diblasi, A., Bowman, A., Testing for constant variance in a linear model, Statist. and Probab. Letters, 1997, 33: 95—103.[8]Dette, H., Munk, A., Testing heteoscedasticity in nonparametric regression, J. R. Statist. Soc. B, 1998, 60: 693—708.[9]Müller, H. G., Zhao, P. L., On a semi-parametric variance function model and a test for heteroscedasticity, Ann. Statist., 1995, 23: 946—967.[10]Stute, W., Manteiga, G., Quindimil, M. P., Bootstrap approximations in model checks for regression, J. Amer. Statist. Asso., 1998, 93: 141—149.[11]Stute, W., Thies, G., Zhu, L. X., Model checks for regression: An innovation approach, Ann. Statist., 1998, 26: 1916—1939.[12]Shorack, G. R., Wellner, J. A., Empirical Processes with Applications to Statistics, New York: Wiley, 1986.[13]Efron, B., Bootstrap methods: Another look at the jackknife, Ann. Statist., 1979, 7: 1—26.[14]Wu, C. F. J., Jackknife, bootstrap and other re-sampling methods in regression analysis, Ann. Statist., 1986, 14: 1261—1295.[15]H rdle, W., Mammen, E., Comparing non-parametric versus parametric regression fits, Ann. Statist., 1993, 21: 1926—1947.[16]Liu, R. Y., Bootstrap procedures under some non-i.i.d. models, Ann. Statist., 1988, 16: 1696—1708.[17

  8. Check-In Check-Out + Social Skills: Enhancing the Effects of Check-In Check-Out for Students With Social Skill Deficits

    Science.gov (United States)

    Ross, Scott W.; Sabey, Christian V.

    2015-01-01

    Check-In Check-Out is a Tier 2 intervention designed to reduce problem behavior and increase prosocial behavior. Although the intervention has demonstrated effects in several studies, few research efforts have considered how the intervention can be modified to support students with social skill deficits. Through a multiple baseline design across…

  9. 7 CFR 58.243 - Checking quality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Checking quality. 58.243 Section 58.243 Agriculture... Procedures § 58.243 Checking quality. All milk, milk products and dry milk products shall be subject to inspection and analysis by the dairy plant for quality and condition throughout each processing...

  10. Tractor Mechanic Check Sheets for Modules.

    Science.gov (United States)

    Clemson Univ., SC. Vocational Education Media Center.

    Forms for student self-checks and the instructor's final checklist (student evaluation) are provided for use with thirty-three learning modules on maintaining and servicing fuel and electrical systems in tractor mechanics. The student self-check asks the students questions about their understanding of the modules' content. The instructor's…

  11. Vertical pump with free floating check valve

    International Nuclear Information System (INIS)

    A vertical pump is described which has a bottom discharge with a free floating check valve disposed in the outlet plenum thereof. The free floating check valve comprises a spherical member with a hemispherical cage-like member attached thereto which is capable of allowing forward or reverse flow under appropriate conditions while preventing reverse flow under inappropriate conditions

  12. The model checking fingerprints of CTL operators

    OpenAIRE

    Krebs, Andreas; Meier, Arne; Mundhenk, Martin

    2015-01-01

    The aim of this study is to understand the inherent expressive power of CTL operators. We investigate the complexity of model checking for all CTL fragments with one CTL operator and arbitrary Boolean operators. This gives us a fingerprint of each CTL operator. The comparison between the fingerprints yields a hierarchy of the operators that mirrors their strength with respect to model checking.

  13. Automatization and familiarity in repeated checking

    NARCIS (Netherlands)

    Dek, E.C.P.; van den Hout, M.A.; Giele, C.L.; Engelhard, I.M.

    2015-01-01

    Repetitive, compulsive-like checking of an object leads to reductions in memory confidence, vividness, and detail. Experimental research suggests that this is caused by increased familiarity with perceptual characteristics of the stimulus and automatization of the checking procedure (Dek, van den Ho

  14. QuickChecking Static Analysis Properties

    DEFF Research Database (Denmark)

    Midtgaard, Jan; Møller, Anders

    2015-01-01

    A static analysis can check programs for potential errors. A natural question that arises is therefore: who checks the checker? Researchers have given this question varying attention, ranging from basic testing techniques, informal monotonicity arguments, thorough pen-and-paper soundness proofs, ...

  15. Arithmetic Operand Ordering for Equivalence Checking

    Institute of Scientific and Technical Information of China (English)

    WENG Yanling; GE Haitong; YAN Xiaolang; Ren Kun

    2007-01-01

    An information extraction-based technique is proposed for RTL-to-gate equivalence checking. Distances are calculated on directed acyclic graph (AIG). Multiplier and multiplicand are distinguished on multiplications with different coding methods, with which the operand ordering/grouping information could be extracted from a given implementation gate netlist, helping the RTL synthesis engine generate a gate netlist with great similarity. This technique has been implemented in an internal equivalence checking tool, ZD_VIS. Compared with the simple equivalence checking, the speed is accelerated by at least 40% in its application to a class of arithmetic designs, addition and multiplication trees. The method can be easily incorporated into existing RTL-to-gate equivalence checking frameworks, increasing the robustness of equivalence checking for arithmetic circuits.

  16. 14 CFR 135.337 - Qualifications: Check airmen (aircraft) and check airmen (simulator).

    Science.gov (United States)

    2010-01-01

    ... check airmen (simulator). 135.337 Section 135.337 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION... (simulator). (a) For the purposes of this section and § 135.339: (1) A check airman (aircraft) is a person who is qualified to conduct flight checks in an aircraft, in a flight simulator, or in a...

  17. Simple Check Valves for Microfluidic Devices

    Science.gov (United States)

    Willis, Peter A.; Greer, Harold F.; Smith, J. Anthony

    2010-01-01

    A simple design concept for check valves has been adopted for microfluidic devices that consist mostly of (1) deformable fluorocarbon polymer membranes sandwiched between (2) borosilicate float glass wafers into which channels, valve seats, and holes have been etched. The first microfluidic devices in which these check valves are intended to be used are micro-capillary electrophoresis (microCE) devices undergoing development for use on Mars in detecting compounds indicative of life. In this application, it will be necessary to store some liquid samples in reservoirs in the devices for subsequent laboratory analysis, and check valves are needed to prevent cross-contamination of the samples. The simple check-valve design concept is also applicable to other microfluidic devices and to fluidic devices in general. These check valves are simplified microscopic versions of conventional rubber- flap check valves that are parts of numerous industrial and consumer products. These check valves are fabricated, not as separate components, but as integral parts of microfluidic devices. A check valve according to this concept consists of suitably shaped portions of a deformable membrane and the two glass wafers between which the membrane is sandwiched (see figure). The valve flap is formed by making an approximately semicircular cut in the membrane. The flap is centered over a hole in the lower glass wafer, through which hole the liquid in question is intended to flow upward into a wider hole, channel, or reservoir in the upper glass wafer. The radius of the cut exceeds the radius of the hole by an amount large enough to prevent settling of the flap into the hole. As in a conventional rubber-flap check valve, back pressure in the liquid pushes the flap against the valve seat (in this case, the valve seat is the adjacent surface of the lower glass wafer), thereby forming a seal that prevents backflow.

  18. Population growth can be checked.

    Science.gov (United States)

    Shukla, J P

    Since independence, India's population size has doubled. The rate of growth was 2.5% during 1971-81, an increase from the rate of 2.15% observed during the 1951-61 period. The increase indicated that efforts to decrease population growth have not succeeded. The implications with respect to food, housing, clothing, education, and health facilities, which are fundamental to improving the physical quality of life, are severe. This demographic trend is a serious impediment to progress. The population growth is due to a constant birthrate and a sharp decline in mortality. Reducing the birthrate is necessary to reduce the rate of growth. An attitudinal change adopting the norm of family limitation should be encouraged through propaganda, socioeconomic programs, and religious and cultural organizations. Other measures to bring about a decline in the birthrate include: increasing the marriage age, and expanding educational and employment opportunities for women and girls. These measures will require substantial effort and time. Incentives may show more immediate effects. Monetary incentives are not desired because of the possibility of misuse. However the government could assume responsibility for the education and guarantee employment of children of couples who have only one child, and provide free education to children of couples with only 2 children. These incentives are not likely to be misused, can be available to all segments of the population, and involve no immediate large financial burden on the government. In addition, scholarships to the Harijan students should be limited to 2 per family. If these measures are accepted, they could quickly reduce the birth rate. PMID:12311944

  19. Incremental Integrity Checking: Limitations and Possibilities

    DEFF Research Database (Denmark)

    Christiansen, Henning; Martinenghi, Davide

    2005-01-01

    Integrity checking is an essential means for the preservation of the intended semantics of a deductive database. Incrementality is the only feasible approach to checking and can be obtained with respect to given update patterns by exploiting query optimization techniques. By reducing the problem to...... query containment, we show that no procedure exists that always returns the best incremental test (aka simplification of integrity constraints), and this according to any reasonable criterion measuring the checking effort. In spite of this theoretical limitation, we develop an effective procedure...

  20. Why your practice must do background checks.

    Science.gov (United States)

    Zupko, Karen

    2007-01-01

    Hiring qualified staff is critical for a medical practice. As many physicians have discovered, taking applicants' resumes on faith can be a mistake. Background company searches show that one in three applicants provide false, inaccurate, misleading, or incomplete information. Fake degrees, false licenses and certifications, and criminal histories are a few of the problems that a proper background check can reveal. This article describes further why background checks are essential, how to incorporate a background check into your hiring process, and some of the legalities involved in the process. PMID:17494489

  1. Check valve slam analysis in pumping station

    Directory of Open Access Journals (Sweden)

    Himr D.

    2016-01-01

    Full Text Available Pumping station supplies water for technological process. The check valve in the station was replaced with a new one. The regular test of black out discovered the high pressure pulsations accompanied with noticeable pipeline movement of discharge pipe. It was caused by late check valve closing, probably, when the back flow reached the highest possible velocity. This statement was supported with analysis of results of pressure measurement near the check valve and with a numerical simulation of the flow in the pipeline system.

  2. Automatic check of the RFX machine signals

    International Nuclear Information System (INIS)

    The paper deals with an automatic computer procedure developed to detect errors or faults in the signal waveforms measured during the operation of the RFX machine. These data are generated by the diagnostic equipment and other sensors installed in the machine and in its power supplies. The signal check is paramount, since even a single faulty waveform may lead to wrong results in the post-processing phase. Due to their large number, the manual inspection of each signal after the pulse is impossible. The check has to be performed as quickly as possible, in order to identify and discard the defective waveforms before their on-line elaboration. To this purpose, the on-line signal check program is integrated in the control data acquisition system of RFX. Presently, the procedure is being used to check the quality of the saved machine pulse data

  3. Computational fact checking from knowledge networks

    CERN Document Server

    Ciampaglia, Giovanni Luca; Rocha, Luis M; Bollen, Johan; Menczer, Filippo; Flammini, Alessandro

    2015-01-01

    Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation...

  4. Computational Fact Checking from Knowledge Networks.

    Directory of Open Access Journals (Sweden)

    Giovanni Luca Ciampaglia

    Full Text Available Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation.

  5. For Better Skin Cancer Checks, Partner Up

    Science.gov (United States)

    ... medlineplus.gov/news/fullstory_159632.html For Better Skin Cancer Checks, Partner Up Melanoma survivors benefited when they ... out: Getting a partner trained to spot potential skin cancers can be a lifesaver for melanoma survivors, a ...

  6. Computational Fact Checking from Knowledge Networks

    Science.gov (United States)

    Ciampaglia, Giovanni Luca; Shiralkar, Prashant; Rocha, Luis M.; Bollen, Johan; Menczer, Filippo; Flammini, Alessandro

    2015-01-01

    Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation. PMID:26083336

  7. Consistency Checking of Web Service Contracts

    DEFF Research Database (Denmark)

    Cambronero, M. Emilia; Okika, Joseph C.; Ravn, Anders Peter

    2008-01-01

    Behavioural properties are analyzed for web service contracts formulated in Business Process Execution Language (BPEL) and Choreography Description Language (CDL). The key result reported is an automated technique to check consistency between protocol aspects of the contracts. The contracts are...

  8. CMM Interim Check Design of Experiments (U)

    Energy Technology Data Exchange (ETDEWEB)

    Montano, Joshua Daniel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-07-29

    Coordinate Measuring Machines (CMM) are widely used in industry, throughout the Nuclear Weapons Complex and at Los Alamos National Laboratory (LANL) to verify part conformance to design definition. Calibration cycles for CMMs at LANL are predominantly one year in length and include a weekly interim check to reduce risk. The CMM interim check makes use of Renishaw’s Machine Checking Gauge which is an off-the-shelf product simulates a large sphere within a CMM’s measurement volume and allows for error estimation. As verification on the interim check process a design of experiments investigation was proposed to test a couple of key factors (location and inspector). The results from the two-factor factorial experiment proved that location influenced results more than the inspector or interaction.

  9. Health Check Tools: MedlinePlus

    Science.gov (United States)

    ... of this page: https://medlineplus.gov/healthchecktools.html Health Check Tools To use the sharing features on ... Schedule (Centers for Disease Control and Prevention) Children's Health Body Mass Index: Calculator for Child and Teen ( ...

  10. Engineering Abstractions in Model Checking and Testing

    OpenAIRE

    Achenbach, Michael; Ostermann, Klaus

    2009-01-01

    Abstractions are used in model checking to tackle problems like state space explosion or modeling of IO. The application of these abstractions in real software development processes, however, lacks engineering support. This is one reason why model checking is not widely used in practice yet and testing is still state of the art in falsification. We show how user-defined abstractions can be integrated into a Java PathFinder setting with tools like AspectJ or Javassist and discuss implicati...

  11. Check Point认证简介

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    Check Point软件技术有限公司是因特网安全领域的全球著名企业,占有全球65%VPN/防火墙市场份额(IDC 2002),财富前100强中有97家公司采用Check Point的安全产品。

  12. Online treatment compliance checking for clinical pathways.

    Science.gov (United States)

    Huang, Zhengxing; Bao, Yurong; Dong, Wei; Lu, Xudong; Duan, Huilong

    2014-10-01

    Compliance checking for clinical pathways (CPs) is getting increasing attention in health-care organizations due to stricter requirements for cost control and treatment excellence. Many compliance measures have been proposed for treatment behavior inspection in CPs. However, most of them look at aggregated data seen from an external perspective, e.g. length of stay, cost, infection rate, etc., which may provide only a posterior impression of the overall conformance with the established CPs such that in-depth and in near real time checking on the compliance of the essential/critical treatment behaviors of CPs is limited. To provide clinicians real time insights into violations of the established CP specification and support online compliance checking, this article presents a semantic rule-based CP compliance checking system. In detail, we construct a CP ontology (CPO) model to provide a formal grounding of CP compliance checking. Using the proposed CPO, domain treatment constraints are modeled into Semantic Web Rule Language (SWRL) rules to specify the underlying treatment behaviors and their quantified temporal structure in a CP. The established SWRL rules are integrated with the CP workflow such that a series of applicable compliance checking and evaluation can be reminded and recommended during the pathway execution. The proposed approach can, therefore, provides a comprehensive compliance checking service as a paralleling activity to the patient treatment journey of a CP rather than an afterthought. The proposed approach is illustrated with a case study on the unstable angina clinical pathway implemented in the Cardiology Department of a Chinese hospital. The results demonstrate that the approach, as a feasible solution to provide near real time conformance checking of CPs, not only enables clinicians to uncover non-compliant treatment behaviors, but also empowers clinicians with the capability to make informed decisions when dealing with treatment compliance

  13. Generic Architecture for Mobile Check System

    OpenAIRE

    KARIMA MAAZOUZ; HABIB.BENLAHMER; NACEUR.ACHTAICH

    2013-01-01

    the explosion of the market of Smartphone has rapidly changed the way of m-commerce transactions, especially the m-payment systems which are knowing a wide acceptance due to their diversity and the new mobile technologies. In this work we have introduced the system m-check as a mobile payment system, we have presented a generic architecture of the system and the different protocols for the implementation of the system m-check

  14. Generic Architecture for Mobile Check System

    Directory of Open Access Journals (Sweden)

    KARIMA MAAZOUZ

    2013-11-01

    Full Text Available the explosion of the market of Smartphone has rapidly changed the way of m-commerce transactions, especially the m-payment systems which are knowing a wide acceptance due to their diversity and the new mobile technologies. In this work we have introduced the system m-check as a mobile payment system, we have presented a generic architecture of the system and the different protocols for the implementation of the system m-check

  15. Patients With Obsessive-Compulsive Disorder Check Excessively in Response to Mild Uncertainty.

    Science.gov (United States)

    Toffolo, Marieke B J; van den Hout, Marcel A; Engelhard, Iris M; Hooge, Ignace T C; Cath, Daniëlle C

    2016-07-01

    Patients with obsessive-compulsive disorder (OCD) not only respond to obsessions with perseverative checking, but also engage in more general checking, irrespective of their obsessive concerns. This study investigated whether general checking is specific to OCD and exacerbated when only mild uncertainty is induced. Thirty-one patients with OCD, 26 anxiety- and 31 healthy controls performed a visual search task with eye-tracking and indicated in 50 search displays whether a target was "present" or "absent". Target-present trials were unambiguous, whereas target-absent trials induced mild uncertainty, because participants had to rely on not overlooking the target. Checking behavior was measured by assessing search time and the number of fixations, measured with an eye-tracker. Results showed that in both target-present and target-absent trials patients with OCD searched longer and made more fixations than healthy and anxiety controls. However, the difference in checking behavior between patients with OCD and the control groups was larger in target-absent trials (where mild uncertainty was induced). Anxiety and healthy controls did not differ in checking behavior. Thus, mild uncertainty appears to specifically promote checking in patients with OCD, which has implications for treatment. PMID:27423170

  16. 31 CFR 235.4 - Check Forgery Insurance Fund.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Check Forgery Insurance Fund. 235.4... SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE ISSUANCE OF SETTLEMENT CHECKS FOR FORGED CHECKS DRAWN ON DESIGNATED DEPOSITARIES § 235.4 Check Forgery Insurance Fund. The Check Forgery...

  17. Semantic rule-checking for regulation compliance checking: an overview of strategies and approaches

    OpenAIRE

    Pauwels, Pieter; Zhang, Sijie

    2015-01-01

    As more and more architectural design and construction data is represented in the Resource Description Framework (RDF) data model, it makes sense to take advantage of the underlying logical basis of RDF and realise a semantic rule-checking process as it is currently not available in architectural design and construction industry. Such a semantic rule-checking process would be of considerable value to regulation compliance checking procedures, because the additional logical basis would (1) all...

  18. MPST Software: grl_pef_check

    Science.gov (United States)

    Call, Jared A.; Kwok, John H.; Fisher, Forest W.

    2013-01-01

    This innovation is a tool used to verify and validate spacecraft sequences at the predicted events file (PEF) level for the GRAIL (Gravity Recovery and Interior Laboratory, see http://www.nasa. gov/mission_pages/grail/main/index. html) mission as part of the Multi-Mission Planning and Sequencing Team (MPST) operations process to reduce the possibility for errors. This tool is used to catch any sequence related errors or issues immediately after the seqgen modeling to streamline downstream processes. This script verifies and validates the seqgen modeling for the GRAIL MPST process. A PEF is provided as input, and dozens of checks are performed on it to verify and validate the command products including command content, command ordering, flight-rule violations, modeling boundary consistency, resource limits, and ground commanding consistency. By performing as many checks as early in the process as possible, grl_pef_check streamlines the MPST task of generating GRAIL command and modeled products on an aggressive schedule. By enumerating each check being performed, and clearly stating the criteria and assumptions made at each step, grl_pef_check can be used as a manual checklist as well as an automated tool. This helper script was written with a focus on enabling the user with the information they need in order to evaluate a sequence quickly and efficiently, while still keeping them informed and active in the overall sequencing process. grl_pef_check verifies and validates the modeling and sequence content prior to investing any more effort into the build. There are dozens of various items in the modeling run that need to be checked, which is a time-consuming and errorprone task. Currently, no software exists that provides this functionality. Compared to a manual process, this script reduces human error and saves considerable man-hours by automating and streamlining the mission planning and sequencing task for the GRAIL mission.

  19. Recent improvements in check valve monitoring methods

    International Nuclear Information System (INIS)

    In support of the NRC Nuclear Plant Aging Research (NPAR) program, ORNL has carried out an evaluation of three check valve monitoring methods: acoustic emission, ultrasonic inspection, and magnetic flux signature analysis (MFSA). This work has focused on determining the capabilities of each method to provide diagnostic information useful in determining check valve aging and service wear effects (degradation) and undesirable operating modes. In addition, as part of the ORNL Advanced Diagnostic Engineering Research and Development Center (ADEC), two noval nonintrusive monitoring methods were developed (external ac- and dc-magnetic monitoring) that provide several improvements over the other methods. None of the examined methods could, by themselves, monitor the instantaneous position and motion of check valve internals and valve leakage; however, the combination of acoustic emission monitoring with one of the other methods provides the means to determine vital check valve operational information. This paper describes the benefits and limitations associated with each method and includes recent laboratory and field test data to illustrate the capabilities of these methods to detect simulated check valve degradation. 3 refs., 22 figs., 4 tabs

  20. A PSL Bounded Model Checking Method

    Institute of Scientific and Technical Information of China (English)

    YU Lei; ZHAO Zongtao

    2012-01-01

    SAT-based bounded model checking (BMC) is introduced as an important complementary technique to OBDD-based symbolic model checking, and is an efficient verification method for parallel and reactive systems. However, until now the properties verified by bounded model checking are very finite. Temporal logic PSL is a property specification language (IEEE-1850) describing parallel systems and is divided into two parts, i.e. the linear time logic FL and the branch time logic OBE. In this paper, the specification checked by BMC is extended to PSL and its algorithm is also proposed. Firstly, define the bounded semantics of PSL, and then reduce the bounded semantics into SAT by translating PSL specification formula and the state transition relation of the system to the propositional formula A and B, respectively. Finally, verify the satisfiability of the conjunction propositional formula of A and B. The algorithm results in the translation of the existential model checking of the temporal logic PSL into the satisfiability problem of propositional formula. An example of a queue controlling circuit is used to interpret detailedly the executing procedure of the algorithm.

  1. Check Point任命新总裁

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    近日,互联网安全解决方案供应商Check Point软件技术有限公司宣布,Amnon Bar—Lev晋升为公司总裁。Bar--Lev将继续掌管公司面向客户的工作,包括销售、市场营销、业务发展、技术服务和合作伙伴计划。Bar—Lev于2005年加入Check Point,担任技术服务副总裁,并于2006年开始领导全球市场运营。在此期间,Check Point营业额增长了1倍多,达到约12亿美元。

  2. Glovebox pressure relief and check valve

    Energy Technology Data Exchange (ETDEWEB)

    Blaedel, K.L.

    1986-03-17

    This device is a combined pressure relief valve and check valve providing overpressure protection and preventing back flow into an inert atmosphere enclosure. The pressure relief is embodied by a submerged vent line in a mercury reservior, the releif pressure being a function of the submerged depth. The pressure relief can be vented into an exhaust system and the relieving pressure is only slightly influenced by the varying pressure in the exhaust system. The check valve is embodied by a ball which floats on the mercury column and contacts a seat whenever vacuum exists within the glovebox enclosure. Alternatively, the check valve is embodied by a vertical column of mercury, the maximum back pressure being a function of the height of the column of mercury.

  3. HCH for Checking Containment of XPath Fragment

    Institute of Scientific and Technical Information of China (English)

    Jian-Hua Feng; Yu-Guo Liao; Yong Zhang

    2007-01-01

    XPath is ubiquitous in XML applications for navigating XML trees and selecting a set of element nodes. In XPath query processing, one of the most important issues is how to efficiently check containment relationship between two XPath expressions. To get out of the intricacy and complexity caused by numerous XPath features, we investigate this issue on a frequently used fragment of XPath expressions that consists of node tests, the child axis (/), the descendant axis (//), branches ([]) and label wildcards (*). Prior work has shown that homomorphism technology can be used for containment checking. However, homomorphism is the sufficient but not necessary condition for containment. For special classes of this fragment, the homomorphism algorithm returns false negatives. To address this problem, this paper proposes two containment techniques, conditioned homomorphism and hidden conditioned homomorphism, and then presents sound algorithms for checking containment. Experimental results confirm the practicability and efficiency of the proposed algorithms.

  4. Quality checking of radioactive and hazardous waste

    International Nuclear Information System (INIS)

    This report describes the work of the HMIP Waste Quality Checking Laboratory (WQCL) for the period September 1989 -August 1991. The WQCL has conducted research and development of procedures for the receipt, sampling and analysis of low level solid radioactive waste (LLW), intermediate level radioactive waste (ILW) and hazardous chemical waste (HW). Operational facilities have been commissioned for quality checking both LLW and HW. Waste quality checking has been completed on LLW packages seized from the UK waste disposal route by HMIP Inspectors. Packages have ranged in size from the 200 litre steel drum to half-height ISO freight container. Development work was continued on methods of sample extraction and radio-chemical analysis for cement encapsulated ILW in the form of magnox, graphite and stainless steel. This work was undertaken on non-radioactive simulants. (author)

  5. Checking Timed Automata for Linear Duration Properties

    Institute of Scientific and Technical Information of China (English)

    赵建华

    2000-01-01

    It is proved in this paper that checking a timed automaton M with respect to a linear duration property D can be done by investigating only the integral timed states of M. An equivalence relation is introduced in this paper to divide the infinite number of integral timed states into finite number of equivalence classes. Based on this, a method is proposed for checking whether M satisfies D. In some cases, the number of equivalence classes is too large for a computer to manipulate. A technique for reducing the search-space for checking linear duration property is also described. This technique is more suitable for the case in this paper than those in the literature because most of those techniques are designed for reachability analysis.

  6. Constraint LTL Satisfiability Checking without Automata

    CERN Document Server

    Bersani, Marcello M; Morzenti, Angelo; Pradella, Matteo; Rossi, Matteo; Pietro, Pierluigi San

    2012-01-01

    This paper introduces a novel technique to decide the satisfiability of formulae written in the language of Linear Temporal Logic with Both future and past operators and atomic formulae belonging to constraint system D (CLTLB(D) for short). The technique is based on the concept of bounded satisfiability, and hinges on an encoding of CLTLB(D) formulae into QF-EUD, the theory of quantifier-free equality and uninterpreted functions combined with D. Similarly to standard LTL, where bounded model-checking and SAT-solvers can be used as an alternative to automata-theoretic approaches to model-checking, our approach allows users to solve the satisfiability problem for CLTLB(D) formulae through SMT-solving techniques, rather than by checking the emptiness of the language of a suitable automaton A{\\phi}. The technique is effective, and it has been implemented in our Zot formal verification tool.

  7. A Metric Encoding for Bounded Model Checking

    Science.gov (United States)

    Pradella, Matteo; Morzenti, Angelo; San Pietro, Pierluigi

    In Bounded Model Checking, both the system model and the checked property are translated into a Boolean formula to be analyzed by a SAT-solver. We introduce a new encoding technique which is particularly optimized for managing quantitative future and past metric temporal operators, typically found in properties of hard real time systems. The encoding is simple and intuitive in principle, but it is made more complex by the presence, typical of the Bounded Model Checking technique, of backward and forward loops used to represent an ultimately periodic infinite domain by a finite structure. We report and comment on the new encoding technique and on an extensive set of experiments carried out to assess its feasibility and effectiveness.

  8. Graded CTL Model Checking for Test Generation

    CERN Document Server

    Napoli, Margherita

    2011-01-01

    Recently there has been a great attention from the scientific community towards the use of the model-checking technique as a tool for test generation in the simulation field. This paper aims to provide a useful mean to get more insights along these lines. By applying recent results in the field of graded temporal logics, we present a new efficient model-checking algorithm for Hierarchical Finite State Machines (HSM), a well established symbolism long and widely used for representing hierarchical models of discrete systems. Performing model-checking against specifications expressed using graded temporal logics has the peculiarity of returning more counterexamples within a unique run. We think that this can greatly improve the efficacy of automatically getting test cases. In particular we verify two different models of HSM against branching time temporal properties.

  9. Glovebox pressure relief and check valve

    International Nuclear Information System (INIS)

    This device is a combined pressure relief valve and check valve providing overpressure protection and preventing back flow into an inert atmosphere enclosure. The pressure relief is embodied by a submerged vent line in a mercury reservior, the releif pressure being a function of the submerged depth. The pressure relief can be vented into an exhaust system and the relieving pressure is only slightly influenced by the varying pressure in the exhaust system. The check valve is embodied by a ball which floats on the mercury column and contacts a seat whenever vacuum exists within the glovebox enclosure. Alternatively, the check valve is embodied by a vertical column of mercury, the maximum back pressure being a function of the height of the column of mercury

  10. Gate-Check System for Outotec Company

    OpenAIRE

    Zajac, Lukas; Bartusek, Petr

    2014-01-01

    The main purpose of the thesis was to create the interactive, electronic web application Gate-Check for Outotec Company, which replaced the old system based on MS Excel document. Another purpose was gaining new skills and experiences in communication with the company, in which the team acted as a Supply Company. The created web application (Gate-Check System) should be compatible with any device with integrated web browser with support HTML5, JavaScript and CSS3 and active internet connect...

  11. A Systematic Review of the Empirical Support for Check-in Check-Out

    Science.gov (United States)

    Wolfe, Katie; Pyle, Daniel; Charlton, Cade T.; Sabey, Christian V.; Lund, Emily M.; Ross, Scott W.

    2016-01-01

    Tier 2 interventions play an important role within the Positive Behavioral Interventions and Supports framework, bridging the gap between schoolwide Tier 1 interventions and individualized Tier 3 supports. Check-in Check-out (CICO) is a promising Tier 2 intervention for addressing mild problem behavior and potentially preventing the need for more…

  12. Function-Based Modification of Check-In/Check-Out to Influence Escape-Maintained Behavior

    Science.gov (United States)

    Kilgus, Stephen P.; Fallon, Lindsay M.; Feinberg, Adam B.

    2016-01-01

    Prior research has suggested Check-In/Check-Out (CICO) effectiveness is linked to the function of problem behavior. Though effective for students whose misbehavior occurs to gain attention, findings are equivocal for behavior that occurs to escape academic tasks. The purpose of this study was to therefore evaluate a modification to CICO, wherein…

  13. Anchor Stress Checking of Security Injection Tank

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    The intention of the calculating is to check the anchor stresses of the security injection tank to know whether the stress is satisfied the code requirements on the basis of all the reaction forces gained in the static, seismic and thermal stress results.

  14. Regulatory Conformance Checking: Logic and Logical Form

    Science.gov (United States)

    Dinesh, Nikhil

    2010-01-01

    We consider the problem of checking whether an organization conforms to a body of regulation. Conformance is studied in a runtime verification setting. The regulation is translated to a logic, from which we synthesize monitors. The monitors are evaluated as the state of an organization evolves over time, raising an alarm if a violation is…

  15. Statistical Model Checking for Biological Systems

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel;

    2014-01-01

    Statistical Model Checking (SMC) is a highly scalable simulation-based verification approach for testing and estimating the probability that a stochastic system satisfies a given linear temporal property. The technique has been applied to (discrete and continuous time) Markov chains, stochastic...

  16. A Method for Model Checking Feature Interactions

    DEFF Research Database (Denmark)

    Pedersen, Thomas; Le Guilly, Thibaut; Ravn, Anders Peter; Skou, Arne Joachim

    This paper presents a method to check for feature interactions in a system assembled from independently developed concurrent processes as found in many reactive systems. The method combines and refines existing definitions and adds a set of activities. The activities describe how to populate the ...

  17. Using chemical organization theory for model checking

    OpenAIRE

    Kaleta, Christoph; Richter, Stephan; Dittrich, Peter

    2009-01-01

    Motivation: The increasing number and complexity of biomodels makes automatic procedures for checking the models' properties and quality necessary. Approaches like elementary mode analysis, flux balance analysis, deficiency analysis and chemical organization theory (OT) require only the stoichiometric structure of the reaction network for derivation of valuable information. In formalisms like Systems Biology Markup Language (SBML), however, information about the stoichiometric coefficients re...

  18. Efficient CSL Model Checking Using Stratification

    DEFF Research Database (Denmark)

    Zhang, Lijun; Jansen, David N.; Nielson, Flemming; Hermanns, Holger

    2012-01-01

    For continuous-time Markov chains, the model-checking problem with respect to continuous-time stochastic logic (CSL) has been introduced and shown to be decidable by Aziz, Sanwal, Singhal and Brayton in 1996 [ 1, 2]. Their proof can be turned into an approximation algorithm with worse than...

  19. Automata-Based CSL Model Checking

    DEFF Research Database (Denmark)

    Zhang, Lijun; Jansen, David N.; Nielson, Flemming; Hermanns, Holger

    For continuous-time Markov chains, the model-checking problem with respect to continuous-time stochastic logic (CSL) has been introduced and shown to be decidable by Aziz, Sanwal, Singhal and Brayton in 1996. The presented decision procedure, however, has exponential complexity. In this paper, we...

  20. Type checking with open type functions

    DEFF Research Database (Denmark)

    Schrijvers, Tom; Jones, Simon Peyton; Chakravarty, Manual; Sulzmann, Martin

    We report on an extension of Haskell with open type-level functions and equality constraints that unifies earlier work on GADTs, functional dependencies, and associated types. The contribution of the paper is that we identify and characterise the key technical challenge of entailment checking; and...

  1. Availability of a Renewable, Checked System

    DEFF Research Database (Denmark)

    Platz, O.

    1976-01-01

    Recurrent expressions are given for point and interval unavailability of a renewable system subjected to periodic checking/repair. The expressions are generalizations of the basic relations in the theory of discrete renewal processes. The asymptotic limits for long times follow simply from a...

  2. The common agricultural policy health check

    OpenAIRE

    Erjavec, Emil; Lovec, Marko

    2016-01-01

    In 2008, the ministers of agriculture of European Union member states made a political agreement on the Common Agricultural Policy reform, also known as the Health Check. The reform coincided with three things: the ongoing Doha round of the World Trade Organization negotiations

  3. 40 CFR 86.327-79 - Quench checks; NOX analyzer.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Quench checks; NOX analyzer. 86.327-79... Quench checks; NOX analyzer. (a) Perform the reaction chamber quench check for each model of high vacuum... capillary, and if used, dilution capillary. (c) Quench check as follows: (1) Calibrate the NOX analyzer...

  4. Quality control checks and balances in ENSDF

    International Nuclear Information System (INIS)

    The Evaluated Nuclear Structure Data File (ENSDF) is the repository of data evaluated by the members of the International Nuclear Structure and Decay Data Network. This network includes evaluators at 15 data centers in 10 countries and operates under the auspices of the International Atomic Energy Agency. The main output of the data from this file is the journal Nuclear Data Sheets, widely used by the nuclear structure research community; however, specialized output from this file is also prepared for applied users in the fields of medical practice and research, health physics, industry, nuclear power, and environmental protection. This paper describes the various means each evaluator has access to including format-checking programs and programs for checking/evaluating physical quantities and calculations

  5. Advanced techniques for efficient data integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide

    Integrity constraint checking, understood as the verification of data correctness and well-formedness conditions that must be satisfied in any state of a database, is not fully supported by current database technology. In a typical scenario, a database is required to comply with given semantic cr...... contexts, such as recursive databases, concurrent database systems, data integration systems and XML document collections, and provide a performance evaluation of the proposed model.......Integrity constraint checking, understood as the verification of data correctness and well-formedness conditions that must be satisfied in any state of a database, is not fully supported by current database technology. In a typical scenario, a database is required to comply with given semantic...... criteria (the integrity constraints) and to maintain the compliance each time data are updated. Since the introduction of the SQL2 standard, the SQL language started supporting assertions, which allow one to define general data consistency requirements expressing arbitrarily complex “business rules” that...

  6. CHECK-IN/CHECK-OUT: A SYSTEMATIC EVALUATION AND COMPONENT ANALYSIS

    OpenAIRE

    Campbell, Amy; Anderson, Cynthia M.

    2011-01-01

    Tier 2 interventions are implemented similarly across students and thus serve as an efficient and cost-effective method of behavior support in school settings. Check-in/check-out is a Tier 2 intervention with documented effectiveness (e.g., Hawken & Horner, 2003; Todd, Campbell, Meyer, & Horner, 2008). Key features of the intervention include brief morning and afternoon meetings with the intervention coordinator, use of a point card on which the teacher monitors student behavior, and teacher ...

  7. Speed checks on the CERN site

    CERN Multimedia

    2007-01-01

    In view of the significant number of speeding incidents that have been reported, CERN will shortly start to carry out speed checks on the site. The radar used for this purpose will show drivers the speed measured. The disciplinary measures taken against those exceeding the authorised limit (generally 50 k.p.h.) will include a ban from driving on the site for a minimum of one month. Maximilian Metzger
Secretary-General

  8. Checking C Pointer Programs for Memory Safety

    OpenAIRE

    Moy, Yannick

    2007-01-01

    We propose an original approach for checking memory safety of C pointer programs possibly including pointer arithmetic and sharing (but no casts, structures, double indirection or memory deallocation). This involves first identifying aliasing and strings, which we do in a local setting rather than through a global analysis as it is done usually. Our separation analysis in particular is a totally new treatment of non-aliasing. We present for the first time two abstract lattices to deal with lo...

  9. Statistical Model Checking for Stochastic Hybrid Systems

    DEFF Research Database (Denmark)

    David, Alexandre; Du, Dehui; Larsen, Kim Guldstrand; Legay, Axel; Mikučionis, Marius; Poulsen, Danny Bøgsted; Sedwards, Sean

    This paper presents novel extensions and applications of the UPPAAL-SMC model checker. The extensions allow for statistical model checking of stochastic hybrid systems. We show how our race-based stochastic semantics extends to networks of hybrid systems, and indicate the integration technique...... applied for implementing this semantics in the UPPAAL-SMC simulation engine. We report on two applications of the resulting tool-set coming from systems biology and energy aware buildings....

  10. From model checking to model measuring

    OpenAIRE

    Henzinger, Thomas A.; Otop, Jan

    2013-01-01

    We define the model-measuring problem: given a model $M$ and specification~$\\varphi$, what is the maximal distance $\\rho$ such that all models $M'$ within distance $\\rho$ from $M$ satisfy (or violate)~$\\varphi$. The model measuring problem presupposes a distance function on models. We concentrate on automatic distance functions, which are defined by weighted automata. The model-measuring problem subsumes several generalizations of the classical model-checking problem, in particular, qu...

  11. The Activity Check of Brachytherapy Isotope

    International Nuclear Information System (INIS)

    An isotope Ir-192, which is used in brachytherapy depends on import in whole quantities. There are a few ways for its activity. measurement using Welltype chamber or the way to rely on authentic decay table of manufacturer. In-air dosimetry using Farmer Chamber, etc. In this paper, let me introduce the way using Farmer chamber which is easier and simple. With the Farmer chamber and source calibration jig, take a measurement the activity of an isotope Ir-192 and compare the value with the value from decay table of manufacturer and check the activity of source. The result of measurement, compared the value from decay table, by ±2.1. (which belongs to recommendable value for AAPM ±5% as difference of error range). It is possible to use on clinical medicine. With the increase in use of brachytherapy, the increase of import is essential. And an accurate activity check of source is compulsory. For the activity check of source, it was possible to use Farmer chamber and source calibration jig without additional purchase of Well type chamber.

  12. A rigorous approach to self-checking programming

    Science.gov (United States)

    Hua, Kien A.; Abraham, Jacob A.

    1986-01-01

    Self-checking programming is shown to be an effective concurrent error detection technique. The reliability of a self-checking program however relies on the quality of its assertion statements. A self-checking program written without formal guidelines could provide a poor coverage of the errors. A constructive technique for self-checking programming is presented. A Structured Program Design Language (SPDL) suitable for self-checking software development is defined. A set of formal rules, was also developed, that allows the transfromation of SPDL designs into self-checking designs to be done in a systematic manner.

  13. SAT-Based Model Checking without Unrolling

    Science.gov (United States)

    Bradley, Aaron R.

    A new form of SAT-based symbolic model checking is described. Instead of unrolling the transition relation, it incrementally generates clauses that are inductive relative to (and augment) stepwise approximate reachability information. In this way, the algorithm gradually refines the property, eventually producing either an inductive strengthening of the property or a counterexample trace. Our experimental studies show that induction is a powerful tool for generalizing the unreachability of given error states: it can refine away many states at once, and it is effective at focusing the proof search on aspects of the transition system relevant to the property. Furthermore, the incremental structure of the algorithm lends itself to a parallel implementation.

  14. Checking MSC Specifications for Timing Inconsistency

    Institute of Scientific and Technical Information of China (English)

    LI Xuandong(李宣东); TAN Wenkai(谭文凯); ZHENG Guoliang(郑国梁)

    2002-01-01

    Message sequence chart (MSC) is a graphical and textual language for the description and specification of the interactions between system components. MSC specifica tions allow convenient expression of multiple scenarios, and offer an intuitive and visual way of describing design requirements. Like any other aspect of the specification and design process, MSCs are amenable to errors, and their analysis is important. In this paper, the verification problem of MSC specification for timing inconsistency is studied, which means that no execu tion scenario described by an MSC specification is timing consistent. An algorithm is developed to check MSC specifications for timing inconsistency.

  15. Political and judicial checks on corruption

    DEFF Research Database (Denmark)

    Alt, James E.; Lassen, David Dreyer

    2008-01-01

    This paper investigates the effects of checks and balances on corruption. Within a presidential system, effective separation of powers is achieved under a divided government, with the executive and legislative branches being controlled by different political parties. When government is unified, no...... effective separation exists even within a presidential system, but, we argue, can be partially restored by having an accountable judiciary. Our empirical findings show that a divided government and elected, rather than appointed, state supreme court judges are associated with lower corruption and...

  16. Quantum anonymous voting with anonymity check

    International Nuclear Information System (INIS)

    We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.

  17. Applying GPS to check horizontal control quality

    OpenAIRE

    Jakub Vincent; Weiss Gabriel; Sabová Jana

    2004-01-01

    GPS technologies can also be used for check quality in available horizontal point set with coordinates CJ of the frame S-JTSK. When survey and setting-out tasks should be performed in certain area, one can found in it allways some points of the fundamental and detail state controls. To use these points for some actual aims, it is necessary to investigate their compatibility (among the point mark positions and the point coordinate of control points). This can be done using GPS surveying that m...

  18. Distributed Parametric and Statistical Model Checking

    Directory of Open Access Journals (Sweden)

    Peter Bulychev

    2011-10-01

    Full Text Available Statistical Model Checking (SMC is a trade-off between testing and formal verification. The core idea of the approach is to conduct some simulations of the system and verify if they satisfy some given property. In this paper we show that SMC is easily parallelizable on a master/slaves architecture by introducing a series of algorithms that scale almost linearly with respect to the number of slave computers. Our approach has been implemented in the UPPAAL SMC toolset and applied on non-trivial case studies.

  19. Infeasibility of Quantum Cryptography Without Eavesdropping Check

    Science.gov (United States)

    Yang, Wei; Huang, Liusheng; Song, Fang; Wang, Qiyan

    Secure key distribution is impossible in pure classical environment. Unconditional secure key distribution is available when quantum means are introduced, assisted by a classical communication channel. What is possible when a quantum key distribution scheme is without classical communication? We present a general model with this constraint and show that quantum key distribution without classical eavesdropping check is in principle impossible. For an adversary can always succeed in obtaining the secret key via a special case of man-in-the-middle attack, namely intercept-and-forward attack without any risk of being captured.

  20. A computer-checked verification of Milner's scheduler

    OpenAIRE

    Korver, H.; Springintveld, J.

    1993-01-01

    We present an equational verification of Milner's scheduler, which we checked by computer.To our knowledge this is the first time that the scheduler is proof-checked for a general number n of scheduled processes.

  1. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  2. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  3. Buckling check tools for plate panel and column structures

    OpenAIRE

    Vuorela, Pia

    2014-01-01

    Buckling is, besides yielding, one of the major causes of failures in structures, and buckling checks are therefore an integral part of strength analyses. Checks can be performed either with methods requiring heavy numerical calculations or with equations based on rules and recommendations from a classification society. Numerical calculations are extremely time-consuming and commercial buckling check programs are expensive. There is therefore a need for buckling check tools based on the recom...

  4. Model Checking Is Static Analysis of Modal Logic

    DEFF Research Database (Denmark)

    Nielson, Flemming; Nielson, Hanne Riis

    2010-01-01

    it can give an exact characterisation of the semantics of formulae in a modal logic. This shows that model checking can be performed by means of state-of-the-art approaches to static analysis and allow us to conclude that the problems of model checking and static analysis are reducible to each other....... In terms of computational complexity we show that model checking by means of static analysis gives the same complexity bounds as are known for traditional approaches to model checking....

  5. Model-Based Trace-Checking

    CERN Document Server

    Howard, Y; Gravell, A; Ferreira, C; Augusto, J C

    2011-01-01

    Trace analysis can be a useful way to discover problems in a program under test. Rather than writing a special purpose trace analysis tool, this paper proposes that traces can usefully be analysed by checking them against a formal model using a standard model-checker or else an animator for executable specifications. These techniques are illustrated using a Travel Agent case study implemented in J2EE. We added trace beans to this code that write trace information to a database. The traces are then extracted and converted into a form suitable for analysis by Spin, a popular model-checker, and Pro-B, a model-checker and animator for the B notation. This illustrates the technique, and also the fact that such a system can have a variety of models, in different notations, that capture different features. These experiments have demonstrated that model-based trace-checking is feasible. Future work is focussed on scaling up the approach to larger systems by increasing the level of automation.

  6. Model Checking over Paraconsistent Temporal Logic

    Institute of Scientific and Technical Information of China (English)

    CHEN Dong-huo; WANG Lin-zhang; CUI Jia-lin

    2008-01-01

    Classical logic cannot be used to effectively reason about concurrent systems with inconsistencies (inconsistencies often occur, especially in the early stage of the development, when large and complex concurrent systems are developed). In this paper, we propose the use of a guasi-classical temporal logic (QCTL) for supporting the verification of temporal properties of such systems even where the consistent model is not available. Our models are paraKripke structures ( extended standard Kripke structures), in which both a formula and its negation are satisfied in a same state, and properties to be verified are expressed by QCTL with paraKripke structures semantics. We introduce a novel notion of paraKripke models, which grasps the paraconsistent character of the entailment relation of QCTL. Furthermore, we explore the methodology of model checking over QCTL, and describe the detailed algorithm of implementing QCTL model checker. In the sequel, a simple example is presented, showing how to exploit the proposed model checking technique to verify the temporal properties of inconsistent concurrent systems.

  7. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K1 and K2; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K1, and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K2. Then, the encrypted message and the intermediary MAC is again encrypted by using the K2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K2 and compared to the received MAC. The received ciphertext again is decrypted by the key K2 and compared with the first decrypted MAC twice by the key K2. The plaintext is obtained by decrypting the received ciphertext first by K2 and then by K1, using the corresponding decryption techniques respectively. The encryption techniques with key K2 provides the authentication and with key K1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  8. Testing Intelligently Includes Double-Checking Wechsler IQ Scores

    Science.gov (United States)

    Kuentzel, Jeffrey G.; Hetterscheidt, Lesley A.; Barnett, Douglas

    2011-01-01

    The rigors of standardized testing make for numerous opportunities for examiner error, including simple computational mistakes in scoring. Although experts recommend that test scoring be double-checked, the extent to which independent double-checking would reduce scoring errors is not known. A double-checking procedure was established at a…

  9. 32 CFR 809a.1 - Random installation entry point checks.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Random installation entry point checks. 809a.1... Entry Policy § 809a.1 Random installation entry point checks. The installation commander determines when, where, and how to implement random checks of vehicles or pedestrians. The commander conducts...

  10. Improved Integrity Constraints Checking in Distributed Databases by Exploiting Local Checking

    Institute of Scientific and Technical Information of China (English)

    Ali A.Alwan; Hamidah Ibrahim; Nur Izura Udzir

    2009-01-01

    Most of the previous studies concerning checking the integrity constraints in distributed database derive simplified forms of the initial integrity constraints with the sufficiency property, since the sufficient test is known to be cheaper than the complete test and its initial integrity constraint as it involves less data to be transferred across the network and can always be evaluated at the target site (single site). Their studies are limited as they depend strictly on the assumption that an update operation will be executed at a site where the relation specified in the update operation is located, which is not always true. Hence, the sufficient test, which is proven to be local test by previous study, is no longer appropriate. This paper proposes an approach to checking integrity constraints in a distributed database by utilizing as much as possible the local information stored at the target site. The proposed approach derives support tests as an alternative to the existing complete and sufficient tests proposed by previous researchers with the intention to increase the number of local checking regardless the location of the submitted update operation. Several analyses have been performed to evaluate the proposed approach, and the results show that support tests can benefit the distributed database, where local constraint checking can be achieved.

  11. Check all SCHE Supply Purge Check Valves to Prevent Back Flow from SCHE into Helium Supply

    Energy Technology Data Exchange (ETDEWEB)

    MISKA, C.R.

    2000-10-23

    These valves are 1/2-inch check valves used to prevent SCHe backflow into the Helium System if pressure in the Helium System drops below the pressure of the control valve downstream of the SCHe supply bottles. (14 psig in trains A and B and 2 psig in trains C and D).

  12. Check all SCHe Supply Purge Check Valves to Prevent Back Flow from SCHe into Helium Supply

    International Nuclear Information System (INIS)

    These valves are 1/2-inch check valves used to prevent SCHe backflow into the Helium System if pressure in the Helium System drops below the pressure of the control valve downstream of the SCHe supply bottles. (14 psig in trains A and B and 2 psig in trains C and D)

  13. The Mars Science Laboratory Organic Check Material

    Science.gov (United States)

    Conrad, Pamela G.; Eigenbrode, Jennifer L.; Von der Heydt, Max O.; Mogensen, Claus T.; Canham, John; Harpold, Dan N.; Johnson, Joel; Errigo, Therese; Glavin, Daniel P.; Mahaffy, Paul R.

    2012-09-01

    Mars Science Laboratory's Curiosity rover carries a set of five external verification standards in hermetically sealed containers that can be sampled as would be a Martian rock, by drilling and then portioning into the solid sample inlet of the Sample Analysis at Mars (SAM) suite. Each organic check material (OCM) canister contains a porous ceramic solid, which has been doped with a fluorinated hydrocarbon marker that can be detected by SAM. The purpose of the OCM is to serve as a verification tool for the organic cleanliness of those parts of the sample chain that cannot be cleaned other than by dilution, i.e., repeated sampling of Martian rock. SAM possesses internal calibrants for verification of both its performance and its internal cleanliness, and the OCM is not used for that purpose. Each OCM unit is designed for one use only, and the choice to do so will be made by the project science group (PSG).

  14. Improving Atm Security Check Using DNA Biometrics

    Directory of Open Access Journals (Sweden)

    Igwe, Agu Felix

    2015-06-01

    Full Text Available This paper exposes how DNA can be used to identify account owner of a particular bank.DNA samples were obtained from body fluid. Buccal swab was used for sample collection .Buccal cell collection involves wiping a small piece of filter paper or a cotton swab against the inside of armpit in order to collect shed epithelial cells. The swab was then air dried or could be pressed against a treated collection card in order to transfer epithelial cells for storage purposes. The stored samples were later amplified and separated .The data generated from the samples were stored and saved in the database so that if a customer comes to claim money, the system checks whether it matches with what is stored in the database ,if it matches with the one in the database, access is granted to the customer,.if it does not match with what is stored in the database ,access is denied from the customer

  15. Workflow Fault Tree Generation Through Model Checking

    DEFF Research Database (Denmark)

    Herbert, Luke Thomas; Sharp, Robin

    2014-01-01

    probabilistic structure of the system being modelled. From these calculations, a comprehensive fault tree is generated. Further, we show that annotating the model with rewards (data) allows the expected mean values of reward structures to be calculated at points of failure....... with probabilistic non-deterministic branching. We present an algorithm that allows for exhaustive generation of possible error states that could arise in execution of the model, where the generated error states allow for both fail-stop behaviour and continued system execution. We employ stochastic...... model checking to calculate the probabilities of reaching each non-error system state. Each generated error state is assigned a variable indicating its individual probability of occurrence. Our method can determine the probability of combined faults occurring, while accounting for the basic...

  16. Thermodynamic Pressure/Temperature Transducer Health Check

    Science.gov (United States)

    Immer, Christopher D. (Inventor); Eckhoff, Anthony (Inventor); Medelius, Pedro J. (Inventor); Deyoe, Richard T. (Inventor); Starr, Stanley O. (Inventor)

    2004-01-01

    A device and procedure for checking the health of a pressure transducer in situ is provided. The procedure includes measuring a fixed change in pressure above ambient pressure and a fixed change in pressure below ambient pressure. This is done by first sealing an enclosed volume around the transducer with a valve. A piston inside the sealed volume is increasing the pressure. A fixed pressure below ambient pressure is obtained by opening the valve, driving the piston The output of the pressure transducer is recorded for both the overpressuring and the underpressuring. By comparing this data with data taken during a preoperative calibration, the health of the transducer is determined from the linearity, the hysteresis, and the repeatability of its output. The further addition of a thermometer allows constant offset error in the transducer output to be determined.

  17. Static Checking of Interrupt-driven Software

    DEFF Research Database (Denmark)

    Brylow, Dennis; Damgaard, Niels; Palsberg, Jens

    2001-01-01

    Resource-constrained devices are becoming ubiquitous. Examples include cell phones, palm pilots, and digital thermostats. It can be difficult to fit required functionality into such a device without sacrificing the simplicity and clarity of the software. Increasingly complex embedded systems...... require extensive brute-force testing, making development and maintenance costly. This is particularly true for system components that are written in assembly language. Static checking has the potential of alleviating these problems, but until now there has been little tool support for programming at the...... assembly level. In this paper we present the design and implementation of a static checker for interrupt-driven Z86-based software with hard real-time requirements. For six commercial microcontrollers, our checker has produced upper bounds on interrupt latencies and stack sizes, as well as verified...

  18. Model Checking JAVA Programs Using Java Pathfinder

    Science.gov (United States)

    Havelund, Klaus; Pressburger, Thomas

    2000-01-01

    This paper describes a translator called JAVA PATHFINDER from JAVA to PROMELA, the "programming language" of the SPIN model checker. The purpose is to establish a framework for verification and debugging of JAVA programs based on model checking. This work should be seen in a broader attempt to make formal methods applicable "in the loop" of programming within NASA's areas such as space, aviation, and robotics. Our main goal is to create automated formal methods such that programmers themselves can apply these in their daily work (in the loop) without the need for specialists to manually reformulate a program into a different notation in order to analyze the program. This work is a continuation of an effort to formally verify, using SPIN, a multi-threaded operating system programmed in Lisp for the Deep-Space 1 spacecraft, and of previous work in applying existing model checkers and theorem provers to real applications.

  19. Conformant Planning via Symbolic Model Checking

    CERN Document Server

    Cimatti, A; 10.1613/jair.774

    2011-01-01

    We tackle the problem of planning in nondeterministic domains, by presenting a new approach to conformant planning. Conformant planning is the problem of finding a sequence of actions that is guaranteed to achieve the goal despite the nondeterminism of the domain. Our approach is based on the representation of the planning domain as a finite state automaton. We use Symbolic Model Checking techniques, in particular Binary Decision Diagrams, to compactly represent and efficiently search the automaton. In this paper we make the following contributions. First, we present a general planning algorithm for conformant planning, which applies to fully nondeterministic domains, with uncertainty in the initial condition and in action effects. The algorithm is based on a breadth-first, backward search, and returns conformant plans of minimal length, if a solution to the planning problem exists, otherwise it terminates concluding that the problem admits no conformant solution. Second, we provide a symbolic representation ...

  20. Probabilistic Model--Checking of Quantum Protocols

    CERN Document Server

    Gay, S; Papanikolaou, N; Gay, Simon; Nagarajan, Rajagopal; Papanikolaou, Nikolaos

    2005-01-01

    We establish fundamental and general techniques for formal verification of quantum protocols. Quantum protocols are novel communication schemes involving the use of quantum-mechanical phenomena for representation, storage and transmission of data. As opposed to quantum computers, quantum communication systems can and have been implemented using present-day technology; therefore, the ability to model and analyse such systems rigorously is of primary importance. While current analyses of quantum protocols use a traditional mathematical approach and require considerable understanding of the underlying physics, we argue that automated verification techniques provide an elegant alternative. We demonstrate these techniques through the use of PRISM, a probabilistic model-checking tool. Our approach is conceptually simpler than existing proofs, and allows us to disambiguate protocol definitions and assess their properties. It also facilitates detailed analyses of actual implemented systems. We illustrate our techniqu...

  1. Statically checked documentation with design patterns

    DEFF Research Database (Denmark)

    Cornils, Aino; Hedin, Görel

    2000-01-01

    Over the past years, along with the increase in popularity of design patterns, some problems with the use of design patterns have been identified. The so-called tracing problem describes the difficulty in documenting software systems using design patterns. Initial approaches to solving the tracing...... problem have focused on guidelines for documenting design pattern roles and rules within a system, but experience has shown that both in the initial design, and especially in later code revisions, it is all too easy for code and documentation to diverge, rendering the documentation misleading. The authors...... present a flexible and extensible tool which enables designers to use design patterns in a safe and efficient way, which checks the design pattern rules, and which semi-automatically documents, and maintains the documentation of a software system...

  2. DEPUTY: analysing architectural structures and checking style

    International Nuclear Information System (INIS)

    The DepUty (dependencies utility) can be classified as a project and process management tool. The main goal of DepUty is to assist by means of source code analysis and graphical representation using UML, in understanding dependencies of sub-systems and packages in CMS Object Oriented software, to understand architectural structure, and to schedule code release in modularised integration. It also allows a new-comer to more easily understand the global structure of CMS software, and to void circular dependencies up-front or re-factor the code, in case it was already too close to the edge of non-maintainability. The authors will discuss the various views DepUty provides to analyse package dependencies, and illustrate both the metrics and style checking facilities it provides

  3. Probabilistic and hybrid model checking deployments for wireless sensor networks

    International Nuclear Information System (INIS)

    In the early stages of system development, model checking is a good practice for examining the WSNs (Wireless Sensor Networks). Model checking involves verifying a system's properties based on the system's finite state model. For varying applications like computers and wireless communication prior to expensive simulations, model checking has become a vital requirement in order to investigate the performance and reliability. In this paper for the first time, we are presenting probabilistic and hybrid model checking tools which are being implemented to analyse and verify the WSN applications and their examples. Here we are categorizing the model checking tools and presenting how they have been used for the investigation of various behaviours of WSN solutions. Consequently, this paper helps readers/researchers to choose the appropriate model checking tool and to get benefited in shape of validating their solutions. The paper has also highlighted the problems of existing model checking tools within WSN domain. (author)

  4. Temporal Check-All-That-Apply Characterization of Syrah Wine.

    Science.gov (United States)

    Baker, Allison K; Castura, John C; Ross, Carolyn F

    2016-06-01

    Temporal Check-All-That-Apply (TCATA) is a new dynamic sensory method for which analysis techniques are still being developed and optimized. In this study, TCATA methodology was applied for the evaluation of wine finish by trained panelists (n = 13) on Syrah wines with different ethanol concentrations (10.5% v/v and 15.5% v/v). Raw data were time standardized to create a percentage of finish duration, subsequently segmented into thirds (beginning, middle, and end) to capture panel perception. Results indicated the finish of the high ethanol treatments lasted longer (approximately 12 s longer) than the low ethanol treatment (P ≤ 0.05). Within each finish segment, Cochran's Q was conducted on each attribute and differences were detected amongst treatments (P ≤ 0.05). Pairwise tests showed the high ethanol treatments were more described by astringency, heat/ethanol burn, bitterness, dark fruit, and spices, whereas the low ethanol treatment was more characterized by sourness, red fruit, and green flavors (P ≤ 0.05). This study demonstrated techniques for dealing with the data generated by TCATA. Furthermore, this study further characterized the influence of ethanol on wine finish, and by extension wine quality, with implications to winemakers responsible for wine processing decisions involving alcohol management. PMID:27272248

  5. Checking for normality in linear mixed models

    Institute of Scientific and Technical Information of China (English)

    WU Ping; ZHU LiXing; FANG Yun

    2012-01-01

    Linear mixed models are popularly used to fit continuous longitudinal data,and the random effects are commonly assumed to have normal distribution.However,this assumption needs to be tested so that further analysis can be proceeded well.In this paper,we consider the Baringhaus-Henze-Epps-Pulley (BHEP) tests,which are based on an empirical characteristic function.Differing from their case,we consider the normality checking for the random effects which are unobservable and the test should be based on their predictors.The test is consistent against global alternatives,and is sensitive to the local alternatives converging to the null at a certain rate arbitrarily close to 1/(√)n where n is sample size.Furthermore,to overcome the problem that the limiting null distribution of the test is not tractable,we suggest a new method:use a conditional Monte Carlo test (CMCT) to approximate the null distribution,and then to simulate p-values.The test is compared with existing methods,the power is examined,and several examples are applied to illustrate the usefulness of our test in the analysis of longitudinal data.

  6. Analyzing Interoperability of Protocols Using Model Checking

    Institute of Scientific and Technical Information of China (English)

    WUPeng

    2005-01-01

    In practical terms, protocol interoperability testing is still laborious and error-prone with little effect, even for those products that have passed conformance testing. Deadlock and unsymmetrical data communication are familiar in interoperability testing, and it is always very hard to trace their causes. The previous work has not provided a coherent way to analyze why the interoperability was broken among protocol implementations under test. In this paper, an alternative approach is presented to analyzing these problems from a viewpoint of implementation structures. Sequential and concurrent structures are both representative implementation structures, especially in event-driven development model. Our research mainly discusses the influence of sequential and concurrent structures on interoperability, with two instructive conclusions: (a) a sequential structure may lead to deadlock; (b) a concurrent structure may lead to unsymmetrical data communication. Therefore, implementation structures carry weight on interoperability, which may not gain much attention before. To some extent, they are decisive on the result of interoperability testing. Moreover, a concurrent structure with a sound task-scheduling strategy may contribute to the interoperability of a protocol implementation. Herein model checking technique is introduced into interoperability analysis for the first time. As the paper shows, it is an effective way to validate developers' selections on implementation structures or strategies.

  7. Effective ambiguity checking in biosequence analysis

    Directory of Open Access Journals (Sweden)

    Giegerich Robert

    2005-06-01

    Full Text Available Abstract Background Ambiguity is a problem in biosequence analysis that arises in various analysis tasks solved via dynamic programming, and in particular, in the modeling of families of RNA secondary structures with stochastic context free grammars. Several types of analysis are invalidated by the presence of ambiguity. As this problem inherits undecidability (as we show here from the namely problem for context free languages, there is no complete algorithmic solution to the problem of ambiguity checking. Results We explain frequently observed sources of ambiguity, and show how to avoid them. We suggest four testing procedures that may help to detect ambiguity when present, including a just-in-time test that permits to work safely with a potentially ambiguous grammar. We introduce, for the special case of stochastic context free grammars and RNA structure modeling, an automated partial procedure for proving non-ambiguity. It is used to demonstrate non-ambiguity for several relevant grammars. Conclusion Our mechanical proof procedure and our testing methods provide a powerful arsenal of methods to ensure non-ambiguity.

  8. Assessment of the Risk Factors for Oro-Dental Injuries to Occur during General Anesthesia and Measures taken by Anesthesiologist to Prevent them

    OpenAIRE

    Darawade, Dattatray Anant; Dubey, Alok; Gondhalekar, Rajashree; Dahapute, Swapnil; Deshmukh, Sonali B; Darawade, Ashish Dattatray

    2015-01-01

    Background and Aim: Anesthesiologist gain access to the airway passage orally with the help of laryngoscope. Dental trauma can occur during different steps in anesthesia. The aim of the study is to evaluate the risk factor for dental trauma perioperatively and to look for the preventive measures mostly employed by the anesthesiologist to prevent dental insult. Materials and Methods: The present study involved 40 anesthetists working in private hospitals using simple random sampling. They were...

  9. Sufficiency-based Filtering of Invariants for Sequential Equivalence Checking

    OpenAIRE

    Hu, Wei

    2011-01-01

    Verification, as opposed to Testing and Post-Silicon Validation, is a critical step for Integrated Circuits (IC) Design, answering the question â Are we designing the right function?â before the chips are manufactured. One of the core areas of Verification is Equivalence Checking (EC), which is a special yet independent case of Model Checking (MC). Equivalence Checking aims to prove that two circuits, when fed with the same inputs, produce the exact same outputs. There are broadly two ways...

  10. Buying in and Checking out: Identity Development and Meaning Making in the Practice of Mathematics Homework

    Directory of Open Access Journals (Sweden)

    Mara Landers

    2013-06-01

    Full Text Available This paper presents findings from an ethnographic study of the role and meaning of mathematics homework in the lives of middle school students. The study conceptualizes and examines homework as a social practice, with a focus on how students make meaning out of their experiences and the role of identity development in meaning making. Specifically, the study examines how middle school students come to value or reject mathematics homework. Case study analyses revealed two ways of characterizing students’ experiences with homework. Students who buy into homework develop aspects of their identities related to school, math and homework that support them in valuing homework. Students who check out develop aspects of their identities that support them in rejecting homework. The concepts of buying in and checking out have implications for theory development around motivation and identity and for school practices around homework.

  11. Interference checking approach with tolerance based on assembly dimension chain

    Institute of Scientific and Technical Information of China (English)

    Wang Lei; Li Yingguang; Wang Wei; and Liao Wenhe

    2012-01-01

    CAD model with nominal dimension is implemented in interference checking of assembly simulation of aircraft complex parts at present, which causes inadequate availability. In order to address this challenging issue, interference checking method with tolerance based on assembly dimension chain was proposed. Worst case and maximum error probability of tolerance of composing loop were used, and CAD models were respectively re-constructed and inserted into simulation system. Before dynamic interference checking, engineering semantic interference condition was set to assembly requirements. Finally, the interface checking result was a basis for reasonability of assembly process and tolerance. A prototype system was developed based on the above research.

  12. Verifying Multi-Agent Systems via Unbounded Model Checking

    Science.gov (United States)

    Kacprzak, M.; Lomuscio, A.; Lasica, T.; Penczek, W.; Szreter, M.

    2004-01-01

    We present an approach to the problem of verification of epistemic properties in multi-agent systems by means of symbolic model checking. In particular, it is shown how to extend the technique of unbounded model checking from a purely temporal setting to a temporal-epistemic one. In order to achieve this, we base our discussion on interpreted systems semantics, a popular semantics used in multi-agent systems literature. We give details of the technique and show how it can be applied to the well known train, gate and controller problem. Keywords: model checking, unbounded model checking, multi-agent systems

  13. Diagnostic framework and health check tool for engineering and technology projects

    Directory of Open Access Journals (Sweden)

    Simon P Philbin

    2014-10-01

    Full Text Available Purpose: Development of a practitioner oriented diagnostic framework and health check tool to support the robust assessment of engineering and technology projects.Design/methodology/approach: The research is based on a literature review that draws together insights on project assessment and critical success factors to establish an integrated systems view of projects. This is extended to allow a comprehensive diagnostic framework to be developed along with a high-level health check tool that can be readily deployed on projects. The utility of the diagnostic framework and health check tool are explored through three illustrative case studies, with two from Canada and one from the United Kingdom. Findings andOriginality/value: The performance of engineering and technology projects can be viewed through a systems perspective and being a function of six sub-systems that are: process, technology, resources, impact, knowledge and culture. The diagnostic framework that is developed through this research integrates these sub-systems to provide a comprehensive assessment methodology for projects, which is linked to existing best practice for project reviews, performance management and maturity models. The case studies provide managerial insights that are related to the diagnostic framework but crucially also position the approach in the context of industrial applications for construction engineering and technology management.Research limitations/implications: The case study approach includes two case studies from the construction and facilities development sector with the third case study from the research and technology sector. Further work is required to investigate the use of the diagnostic framework and health check tool in other sectors.Practical implications: The health check tool will be of practical benefit to new projects managers that require access to a robust and convenient project review methodology for assessing the status and health of a

  14. 32 CFR Attachment A to Subpart B... - Standard A-National Agency Check With Local Agency Checks and Credit Check (NACLC)

    Science.gov (United States)

    2010-07-01

    ... Access Programs by sect. 4.4 of Executive Order 12958) (60 FR 19825, 3 CFR 1995 Comp., p. 333); (2) “L...) Date and Place of Birth: Corroboration of date and place of birth through a check of...

  15. 25 CFR 115.704 - May we accept for deposit into a trust account retirement checks/payments or pension fund checks...

    Science.gov (United States)

    2010-04-01

    ... checks/payments or pension fund checks/payments even though those funds are not specified in § 115.702... May we accept for deposit into a trust account retirement checks/payments or pension fund checks.../payments or pension fund checks/payments or any funds from sources that are not identified in the table...

  16. In-phantom dosimetric measurements as quality control for brachytherapy. System check and constancy check

    International Nuclear Information System (INIS)

    In brachytherapy dosimetric measurements are difficult due to the inherent dose-inhomogeneities. Typically in routine clinical practice only the nominal dose rate is determined for computer controlled afterloading systems. The region of interest lies close to the source when measuring the spatial dose distribution. In this region small errors in the positioning of the detector, and its finite size, lead to large measurement uncertainties that exacerbate the routine dosimetric control of the system in the clinic. The size of the measurement chamber, its energy dependence, and the directional dependence of the measurement apparatus are the factors which have a significant influence on dosimetry. Although ionisation chambers are relatively large, they are employed since similar chambers are commonly found on clinical brachytherapy units. The dose is determined using DIN 6800 [11] since DIN 6809-2 [12], which deals with dosimetry in brachytherapy, is antiquated and is currently in the process of revision. Further information regarding dosimetry for brachytherapy can be found in textbooks [1] and [2]. The measurements for this work were performed with a HDR (High-Dose-Rate) 192Ir source, type mHDR V2, and a Microselectron Afterloader V2 both from Nucletron/Elekta. In this work two dosimetric procedures are presented which, despite the aforemention difficulties, should assist in performing checks of the proper operation of the system. The first is a system check that measures the dose distribution along a line and is to be performed when first bringing the afterloader into operation, or after significant changes to the system. The other is a dosimetric constancy check, which with little effort can be performed monthly or weekly. It simultaneously verifies the positioning of the source at two positions, the functionality of the system clock and the automatic re-calculation of the source activity.

  17. 42 CFR 60.52 - The student's loan check.

    Science.gov (United States)

    2010-10-01

    ... expenses due before the time of enrollment, the school may obtain the student's endorsement and disburse to... ASSISTANCE LOAN PROGRAM The School § 60.52 The student's loan check. (a) When a school receives from a HEAL lender a loan disbursement check or draft payable jointly to the school and to one of its students,...

  18. 42 CFR 35.47 - Disposition of Government checks.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Disposition of Government checks. 35.47 Section 35... Disposition of Government checks. Notwithstanding any other provisions of this subpart, immediately upon... to the department, agency, or establishment of the Government of the United States issuing...

  19. Checking Consistency of Pedigree Information is NP-complete

    DEFF Research Database (Denmark)

    Aceto, Luca; Hansen, Jens A.; Ingolfsdottir, Anna;

    Consistency checking is a fundamental computational problem in genetics. Given a pedigree and information on the genotypes of some of the individuals in it, the aim of consistency checking is to determine whether these data are consistent with the classic Mendelian laws of inheritance. This probl...

  20. 40 CFR 89.317 - NOX converter check.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false NOX converter check. 89.317 Section 89... Provisions § 89.317 NOX converter check. (a) Prior to its introduction into service, and monthly thereafter... of the NOX generator to the sample inlet of the oxides of nitrogen analyzer which has been set to...

  1. 40 CFR 90.319 - NOX converter check.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false NOX converter check. 90.319 Section 90... Provisions § 90.319 NOX converter check. (a) The efficiency of the converter used for the conversion of NO2... percent of the NO concentration). The NOX analyzer must be in the NO mode so that the span gas does...

  2. 16 CFR 240.12 - Checking customer's use of payments.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Checking customer's use of payments. 240.12... ADVERTISING ALLOWANCES AND OTHER MERCHANDISING PAYMENTS AND SERVICES § 240.12 Checking customer's use of... are furnished and that the seller is not overpaying for them. The customer should expend the...

  3. Statistical Model Checking of Rich Models and Properties

    DEFF Research Database (Denmark)

    Poulsen, Danny Bøgsted

    undecidability issues for the traditional model checking approaches. Statistical model checking has proven itself a valuable supplement to model checking and this thesis is concerned with extending this software validation technique to stochastic hybrid systems. The thesis consists of two parts: the first part...... motivates why existing model checking technology should be supplemented by new techniques. It also contains a brief introduction to probability theory and concepts covered by the six papers making up the second part. The first two papers are concerned with developing online monitoring techniques for...... systems. The fifth paper shows how stochastic hybrid automata are useful for modelling biological systems and the final paper is concerned with showing how statistical model checking is efficiently distributed. In parallel with developing the theory contained in the papers, a substantial part of this work...

  4. Adapting a Tier 2 Behavioral Intervention, Check-in/Check-out, to Meet Students' Needs

    Science.gov (United States)

    Swoszowski, Nicole Cain

    2014-01-01

    Check-in/check-out (CICO) is a resource-efficient, mentor-based, Tier 2 intervention. Various problem behaviors of students with and without disabilities across traditional and alternative school settings have been impacted positively by CICO. Not all students respond to the traditional, five-step approach, however. This article provides an…

  5. Implementing Model-Check for Employee and Management Satisfaction

    Science.gov (United States)

    Jones, Corey; LaPha, Steven

    2013-01-01

    This presentation will discuss methods to which ModelCheck can be implemented to not only improve model quality, but also satisfy both employees and management through different sets of quality checks. This approach allows a standard set of modeling practices to be upheld throughout a company, with minimal interaction required by the end user. The presenter will demonstrate how to create multiple ModelCheck standards, preventing users from evading the system, and how it can improve the quality of drawings and models.

  6. Pump check valve failures in BWR residual heat removal systems

    International Nuclear Information System (INIS)

    Pump check valve failure mechanisms are often complex and represent a unique challenge, since in many cases, the location of these check valves is critical to proper system operation. Contributing factors identified at the James A. FitzPatrick Nuclear Power Plant included low flow operation of the system as well as excessive flow induced turbulence and cavitation in the system upstream of the check valves. A modification to the system was made to eliminate, or reduce the contribution of the above factors to these valve problems. Several non-standard approaches were taken during the course of modifying the system

  7. Towards an automated checked baggage inspection system augmented with robots

    Science.gov (United States)

    DeDonato, Matthew P.; Dimitrov, Velin; Padır, Taskin

    2014-05-01

    We present a novel system for enhancing the efficiency and accuracy of checked baggage screening process at airports. The system requirements address the identification and retrieval of objects of interest that are prohibited in a checked luggage. The automated testbed is comprised of a Baxter research robot designed by Rethink Robotics for luggage and object manipulation, and a down-looking overhead RGB-D sensor for inspection and detection. We discuss an overview of current system implementations, areas of opportunity for improvements, robot system integration challenges, details of the proposed software architecture and experimental results from a case study for identifying various kinds of lighters in checked bags.

  8. Review and analysis of check valve failure data

    Science.gov (United States)

    Todd, M. D.; Casada, D. A.

    Check valve operating problems in recent years have resulted in significant operating transients, increased cost and decreased system availability. There has been, in response, additional attention given to check valves by utilities, as well as the US Nuclear Regulatory Commission and the American Society of Mechanical Engineers Operation and Maintenance Committee. All these organizations have the fundamental goal of ensuring reliable operation of check valves. A key ingredient to an engineering-oriented reliability improvement effort is a thorough understanding of relevant historical experience. Oak Ridge National Laboratory is currently conducting a detailed review of historical failure data available through the Institute of Nuclear Power Operation's Nuclear Plant Reliability Data System. The focus of the review is on check valve failures that have involved significant degradation of the valve internal parts. A variety of parameters are being considered during the review, including size, age, system of service, method of failure discovery, the affected valve parts, attributed causes, and corrective actions.

  9. Monitoring Blood Sugar: The Importance of Checking Blood Sugar Levels

    Science.gov (United States)

    ... 5 Things to Know About Zika & Pregnancy Monitoring Blood Sugar KidsHealth > For Parents > Monitoring Blood Sugar Print ... Other Tests Record Keeping The Importance of Checking Blood Sugar Levels Besides helping to keep blood sugar ...

  10. Imagery versus verbal interpretive cognitive bias modification for compulsive checking.

    Science.gov (United States)

    Black, Melissa J; Grisham, Jessica R

    2016-08-01

    Pathological doubting and checking is a common symptom presentation in obsessive-compulsive disorder (OCD). Previous research has established that compulsive checkers do not display an actual memory deficit, but lack confidence in their memories and experience intolerance of uncertainty regarding the completion of tasks. We investigated whether interpretive cognitive bias modification (CBM-I) reduced memory distrust and intolerance of uncertainty in a nonclinical sample. We also examined the possible enhancement of CBM-I for OCD through imagery training. The results provide evidence that participants who received positive imagery CBM-I training may have interpreted novel ambiguous checking scenarios more adaptively and endorsed negative checking beliefs less relative to participants in the control imagery CBM-I condition. Findings on behavioural checking tasks did not indicate any specific response to CBM-I training. Future research may translate these suggestive findings into a useful adjunct to traditional strategies targeting maladaptive OCD beliefs. PMID:27300752

  11. Decentralized Checking Context Inconsistency in Ubiquitous Mobile Computing Environments

    Science.gov (United States)

    Zhang, Daqiang; Yang, Zhijun; Huang, Hongyu; Zou, Qin

    Contexts are often noisy in ubiquitous mobile computing environments due to user mobility, unreliable wireless connectivity and resource constraints. Various schemes have been proposed to check context inconsistency for ubiquitous mobile applications. However, most of them require central control. This requirement inhibits their working in ubiquitous mobile environments, which are characterized by the asynchronous coordination among computing devices. In this paper, we propose DCCI scheme - Decentralized Checking Context Inconsistency for ubiquitous mobile applications by exploiting the preference-based locality that denotes context inconsistency occurs among the nodes that impose various restrictions on the same context. According to this locality, DCCI constructs a preference-based shortcut structure to check inconsistency within shortcuts. Extensive experiments show that DCCI can accurately and efficiently check context inconsistency in a fully distributed manner.

  12. Exercise May Keep Diabetes in Check During Pregnancy

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_160113.html Exercise May Keep Diabetes in Check During Pregnancy Short ... university news release. "We advise all women to exercise during pregnancy, as long as there aren't ...

  13. Skin Cancer Check? Do Some Sole-Searching

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159385.html Skin Cancer Check? Do Some Sole-Searching Deadly melanoma is ... wear-and-tear appears to promote the deadly skin cancer in at least one place where the sun ...

  14. 31 CFR 240.15 - Checks issued to deceased payees.

    Science.gov (United States)

    2010-07-01

    ...) FISCAL SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE INDORSEMENT AND PAYMENT OF CHECKS... a financial institution, it will be paid by Treasury without the submission of documentary proof...

  15. Automatic checking system of radioactivity in motor-cars 'AKKORD'

    International Nuclear Information System (INIS)

    A monitoring device has been developed for an automated checking of all vehicles leaving or entering a nuclear installation against uncontrolled lost of radioactive material. This device is an excellent tool for radioactive material flow control. (orig.)

  16. Ist-Versteuerung und ein Cross-Check-Verfahren

    OpenAIRE

    Barbara Hendricks

    2004-01-01

    Auch Dr. Barbara Hendricks, Parlamentarische Staatssekretärin im Bundesfinanzministerium, brachte einen Wechsel von der gegenwärtigen Soll-Besteuerung zur Ist-Besteuerung verbunden mit einem Cross-Check in die Diskussion ein.

  17. The impact of debit card regulation on checking account fees

    OpenAIRE

    Richard J. Sullivan

    2013-01-01

    Starting in 2011, when new regulations capped the interchange fees paid to banks for debit card transactions, some news reports predicted banks might increase checking account fees. The cap reduced many banks' revenue and the concern was that they might offset their losses by charging more for checking accounts. Sullivan examines data from broad samples of banks and finds that many large banks raised fees—but among the thousands of smaller banks that had been exempted from the regulations, so...

  18. Check Point:极速灵动安全

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    8月25日,Check Point软件技术有限公司推出了号称业界速度最快的安全网关。这款名为Check Point 61000的安全系统能为数据中心、电信和云服务供应商提供可扩展的性能。

  19. Efficient Checking of Individual Rewards Properties in Markov Population Models

    OpenAIRE

    Bortolussi, Luca; Hillston, Jane

    2015-01-01

    In recent years fluid approaches to the analysis of Markov populations models have been demonstrated to have great pragmatic value. Initially developed to estimate the behaviour of the system in terms of the expected values of population counts, the fluid approach has subsequently been extended to more sophisticated interrogations of models through its embedding within model checking procedures. In this paper we extend recent work on checking CSL properties of individual agents within a Marko...

  20. Dynamic State Space Partitioning for External Memory Model Checking

    DEFF Research Database (Denmark)

    Evangelista, Sami; Kristensen, Lars Michael

    2009-01-01

    We describe a dynamic partitioning scheme usable by model checking techniques that divide the state space into partitions, such as most external memory and distributed model checking algorithms. The goal of the scheme is to reduce the number of transitions that link states belonging to different...... partitions, and thereby limit the amount of disk access and network communication. We report on several experiments made with our verification platform ASAP that implements the dynamic partitioning scheme proposed in this paper....

  1. Model checking biological systems described using ambient calculus

    DEFF Research Database (Denmark)

    Mardare, Radu Iulian; Priami, Corrado; Qualia, Paola; Vagin, Oleksander

    2005-01-01

    Model checking biological systems described using ambient calculus. In Proc. of the second International Workshop on Computational Methods in Systems Biology (CMSB04), Lecture Notes in Bioinformatics 3082:85-103, Springer, 2005.......Model checking biological systems described using ambient calculus. In Proc. of the second International Workshop on Computational Methods in Systems Biology (CMSB04), Lecture Notes in Bioinformatics 3082:85-103, Springer, 2005....

  2. Inferring loop invariants by mutation, dynamic analysis, and static checking

    OpenAIRE

    Galeotti, J.P.; Furia, C.A.; May, E.; Fraser, G.; Zeller, A.

    2015-01-01

    Verifiers that can prove programs correct against their full functional specification require, for programs with loops, additional annotations in the form of loop invariants - properties that hold for every iteration of a loop. We show that significant loop invariant candidates can be generated by systematically mutating postconditions; then, dynamic checking (based on automatically generated tests) weeds out invalid candidates, and static checking selects provably valid ones. We present a fr...

  3. The NHS health check programme in England: a qualitative study.

    Science.gov (United States)

    Perry, Catherine; Thurston, Miranda; Alford, Simon; Cushing, Jill; Panter, Lee

    2016-03-01

    Despite an extensive evidence-base linking patterns of health with social determinants, recent public health policy has emphasized 'lifestyle diseases' and risk factor modification through behavioural and pharmacological intervention. In England, one manifestation of this has been the launch of the National Health Service Health Check programme. This paper reports findings from a small-scale qualitative study exploring experiences of engaging with a community-based health check in Knowsley, England, among 17 males and 19 females, with varying levels of risk for cardiovascular disease, who agreed to be contacted for the purpose of research at the time they underwent their check. Analysis revealed that the community-based nature of the checks provided opportunities for people to find out more about their health who might not otherwise have done so. Participants expressed a range of responses to the communication of the risk score, often revealing their confusion about its meaning. Changes in behaviour were identified, which participants connected with having had a check. This study raises questions about where, how and by whom health checks are delivered. Emphasis on health checks reflects the dominant individualist ideology, but this study also suggests that the process provides opportunities to enable and empower individuals, albeit in small ways. However, they remain a 'downstream' approach to public health, emphasizing medical and behavioural options for risk factor reduction rather than focussing on primary prevention through changes to the wider environment. Furthermore, although developed as a central feature of the UK's strategy to reduce health inequalities, health checks may widen them. PMID:25073761

  4. Query containment checking as a view updating problem

    OpenAIRE

    Farré Tost, Carles; Teniente López, Ernest; Urpí Tubella, Antoni

    1998-01-01

    In this paper we present a new approach that handles query containment problems by expressing them as a view updating problem. Since this approach is independent of any particular view updating method, it provides a general framework that joins research efforts in both the query containment checking and view updating fields. In particular, the larger development of current view updating technology allows us to check properly query containment when considering negative-der...

  5. Improved Bounded Model Checking for the Universal Fragment of CTL

    Institute of Scientific and Technical Information of China (English)

    Liang Xu; Wei Chen; Yan-Yan Xu; Wen-Hui Zhang

    2009-01-01

    SAT-based bounded model checking (BMC) has been introduced as a complementary technique to BDD-based symbolic model checking in recent years, and a lot of successful work has been done in this direction. The approach was first introduced by A. Biere et al. in checking linear temporal logic (LTL) formulae and then also adapted to check formulae of the universal fragment of computation tree logic (ACTL) by W. Penczek et al. As the efficiency of model checking is still an important issue, we present an improved BMC approach for ACTL based on Penczek's method. We consider two aspects of the approach. One is reduction of the number of variables and transitions in the k-model by distinguishing the temporal operator EX from the others. The other is simplification of the transformation of formulae by using uniform path encoding instead of a disjunction of all paths needed in the k-model. With these improvements, for an ACTI, formula, the length of the final encoding of the formula in the worst case is reduced. The improved approach is implemented in the tool BMV and is compared with the original one by applying both to two well known examples, mutual exclusion and dining philosophers. The comparison shows the advantages of the improved approach with respect to the efficiency of model checking.

  6. Assessment of diagnostic methods for determining degradation of check valves

    International Nuclear Information System (INIS)

    The Oak Ridge National Laboratory (ORNL) has carried out a comprehensive aging assessment of check valves in support of the Nuclear Plant Aging Research (NPAR) program. This paper provides a summary of the ORNL check valve aging assessment with emphasis on the identification, evaluation, and application of check valve monitoring methods and techniques. Several check valve monitoring methods are described and compared. These methods include: acoustic emission monitoring, ultrasonic inspection, magnetic flux signature analysis (MFSA), external magnetics. These diagnostic technologies were shown to be useful in determining check valve condition (e.g., disc position, disc motion, and seat leakage), although none of the methods was by itself, successful in monitoring all three condition indicators. The combination of acoustic emission with either ultrasonics or one of the magnetic technologies, however, yields a monitoring system that succeeds in providing the sensitivity to detect all major check valve operating conditions. Other areas covered in the paper include descriptions of relevant regulatory issues, utility group activities, and interactions ORNL has had with outside organizations for the purpose of disseminating research results

  7. An Extended Ontology Model and Ontology Checking Based on Description Logics

    Institute of Scientific and Technical Information of China (English)

    王洪伟; 蒋馥; 吴家春

    2004-01-01

    Ontology is defined as an explicit specification of a conceptualization. In this paper, an extended ontology model was constructed using description logics, which is a 5-tuples including term set, individual set, term definition set, instantiation assertion set and term restriction set. Based on the extended model, the issue on ontology checking was studied with the conclusion that the four kinds of term checking, including term satisfiability checking, term subsumption checking, term equivalence checking and term disjointness checking, can be reduced to the satisfiability checking, and satisfiability checking can be transformed into instantiation consistence checking.

  8. Gender Differences in the Prevalence of Metabolic Syndrome and Its Components among Adults with Disabilities Based on a Community Health Check Up Data

    Science.gov (United States)

    Lin, Jin-Ding; Lin, Lan-Ping; Liou, Shih-Wen; Chen, Yu-Chung; Hsu, Shang-Wei; Liu, Chien-Ting

    2013-01-01

    Metabolic syndrome is highly prevalent in society gradually and has important implications for public health in recent years. The present study aims to examine the gender effect on the prevalence of metabolic syndrome among adults with disabilities. A cross-sectional study was conduct to analyze annual health check-up chart of 419 people with…

  9. 45 CFR 205.32 - Procedures for issuance of replacement checks.

    Science.gov (United States)

    2010-10-01

    ...) Issue a stop payment order on the original AFDC check through appropriate banking procedures; and (ii... replacement check, a recipient is required to report a lost or stolen AFDC check to the police or...

  10. Action plans for motor-operated valves and check valves

    International Nuclear Information System (INIS)

    The proper performance of motor-operated valves (MOVs) and check valves is necessary for the safety operation of a nuclear power plant. Problems have been experienced, however, with these valves for many years. Currently, the US Nuclear Regulatory Commission (NRC) and the nuclear industry have a number of activities under way to provide assurance that MOVs and check valves will successfully perform their safety functions when needed. The Mechanical Engineering Branch (EMEB) of the NRC Office of Nuclear Reactor Regulation has been assigned the responsibility of coordinating NRC activities and monitoring industry activities regarding MOVs and check valves. To meet this responsibility, EMEB has prepared action plans to provide assurance of the proper performance of these valves. Among the staff activities described in the action plans is the consideration of the need to revise the regulations to clarify the inservice testing (IST) requirements for these valves. The need for regulatory guidance for the development of acceptable IST programs, as well as for other licensee activities relating to the performance of MOVs and check valves, will also be evaluated. In addition, NRC personnel will have to verify, in a consistent manner, implementation of licensee commitments in response to NRC generic letters and bulletins. Another important aspect of the action plans is the provision for the NRC staff to provide assistance, where appropriate, to the industry in its efforts to address MOV and check valve issues. Finally, the action plans include a tentative schedule for accomplishing the described staff activities

  11. Independent checks of linear accelerators equipped with multileaf collimators

    International Nuclear Information System (INIS)

    National Radiation Protection Institute (NRPI) provides independent checks of therapeutic equipment as a part of state supervision. In the end of 2003, the audit was broaden for linear accelerators equipped with multileaf collimators (MLC). NRPI provides TLD postal audits and on-site independent checks. This contribution describes tests for multileaf collimators and intensity modulated radiation therapy (IMRT) technique that are accomplished within the independent on-site check of linear accelerators. The character and type of tests that are necessary to pursue for multileaf collimator depends on application technique. There are three basic application of the MLC. The first we call 'static MLC' and it serves for replacing conventional blocking or for adjusting the field shape to match the beam's-eye view projection of a planning target volume during an arc rotation of the x-ray beam. This procedure is called conformal radiotherapy. The most advanced technique with MLC is intensity modulated radiation therapy. The dose can be delivered to the patient with IMRT in various different ways: dynamic MLC, segmented MLC and IMRT arc therapy. Independent audits represent an important instrument of quality assurance. Methodology for independent check of static MLC was successfully verified on two types of accelerators: Varian and Elekta. Results from pilot measurements with dynamic MLC imply that the methodology is applicable for Varian accelerators. In the future, the experience with other types of linear accelerators will contribute to renovation, modification, and broaden independent checks methodology. (authors)

  12. Intelligent Data Visualization for Cross-Checking Spacecraft System Diagnosis

    Science.gov (United States)

    Ong, James C.; McCann, Robert S.; Remolina, Emilio; Breeden, David; Stroozas, Brett A.; Mohammed, John L.

    2012-01-01

    Any reasoning system is fallible, so crew members and flight controllers must be able to cross-check automated diagnoses of spacecraft or habitat problems by considering alternate diagnoses and analyzing related evidence. Cross-checking improves diagnostic accuracy because people can apply information processing heuristics, pattern recognition techniques, and reasoning methods that the automated diagnostic system may not possess. Over time, cross-checking also enables crew members to become comfortable with how the diagnostic reasoning system performs, so the system can earn the crew s trust. We developed intelligent data visualization software that helps users cross-check automated diagnoses of system faults more effectively. The user interface displays scrollable arrays of timelines and time-series graphs, which are tightly integrated with an interactive, color-coded system schematic to show important spatial-temporal data patterns. Signal processing and rule-based diagnostic reasoning automatically identify alternate hypotheses and data patterns that support or rebut the original and alternate diagnoses. A color-coded matrix display summarizes the supporting or rebutting evidence for each diagnosis, and a drill-down capability enables crew members to quickly view graphs and timelines of the underlying data. This system demonstrates that modest amounts of diagnostic reasoning, combined with interactive, information-dense data visualizations, can accelerate system diagnosis and cross-checking.

  13. Helical tomotherapy quality assurance with ArcCHECK

    International Nuclear Information System (INIS)

    To design a quality assurance (QA) procedure for helical tomotherapy that measures multiple beam parameters with 1 delivery and uses a rotating gantry to simulate treatment conditions. The customized QA procedure was preprogrammed on the tomotherapy operator station. The dosimetry measurements were performed using an ArcCHECK diode array and an A1SL ion chamber inserted in the central holder. The ArcCHECK was positioned 10 cm above the isocenter so that the 21-cm diameter detector array could measure the 40-cm wide tomotherapy beam. During the implementation of the new QA procedure, separate comparative measurements were made using ion chambers in both liquid and solid water, the tomotherapy onboard detector array, and a MapCHECK diode array for a period of 10 weeks. There was good agreement (within 1.3%) for the beam output and cone ratio obtained with the new procedure and the routine QA measurements. The measured beam energy was comparable (0.3%) to solid water measurement during the 10-week evaluation period, excluding 2 of the 10 measurements with unusually high background. The symmetry reading was similarly compromised for those 2 weeks, and on the other weeks, it deviated from the solid water reading by ∼2.5%. The ArcCHECK phantom presents a suitable alternative for performing helical tomotherapy QA, provided the background is collected properly. The proposed weekly procedure using ArcCHECK and water phantom makes the QA process more efficient

  14. COMMON AGRICULTURAL POLICY FROM HEALTH CHECK DECISIONS TO THE POST-2013 REFORM

    Directory of Open Access Journals (Sweden)

    Niculescu Oana Marilena

    2011-07-01

    Full Text Available The paper proposed for being presented belongs to the field research International Affairs and European Integration. The paper entitled Common Agricultural Policy from Health Check decisions to the post-2013 reform aims to analyze the Common Agricultural Policy (CAP from the Health Check adoption in November 2008 to a new reform post-2013. The objectives of the paper are the presentation of the Health Check with its advantages and disadvantages as well as the analysis of the opportunity of a new European policy and its reforming having in view that the analysis of Health Check condition was considered a compromise. The paper is related to the internal and international research consisting in several books, studies, documents that analyze the particularities of the most debated, controversial and reformed EU policy. A personal study is represented by the first report within the PhD paper called The reform of CAP and its implications for Romanias agriculture(coordinator prof. Gheorghe Hurduzeu PhD, Academy of Economic Studies Bucharest, Faculty of International Business, research studies in the period 2009-2012. The research methodology used consists in collecting and analysis data from national and international publications, their validation, followed by a dissemination of the results in order to express a personal opinion regarding CAP and its reform. The results of the research consist in proving the opportunity of a new reform due to the fact that Health Check belongs already to the past. The paper belongs to the field research mentioned, in the attempt to prove the opportunity of building a new EU agricultural policy. The challenges CAP is facing are: food safety, environmental and climate changes, territorial balance as well as new challenges-improving sustainable management of natural resources, maintaining competitiveness in the context of globalization growth, strengthening EU cohesion in rural areas, increasing the support of CAP for

  15. The use of check valve performance data to support new concepts (probabilistic risk assessment, condition monitoring) for check valve program

    Energy Technology Data Exchange (ETDEWEB)

    Hart, K.A.; Gower, D.

    1996-12-01

    The concept of developing an integrated check valve database based on the Nuclear Power Reliability Data System (NPRDS) data was presented at the last Symposium. The Nuclear Industry Check Valve Group (NIC), working in cooperation with the Oak Ridge National Laboratory (ORNL), has completed an operational database of check valve performance from 1984 to the present. NIC has committed to the nuclear industry to periodically update the data and maintain this information accessible. As the new concepts of probabilistic risk analysis and condition monitoring are integrated into the American Society of Mechanical Engineers (ASME) Code, a critical element will be performance data. From check valve performance data, feasible failure modes and rates can be established. When a failure rate or frequency of failures can be established based on a significant enough population (sampling), a more solid foundation for focusing resources and determining appropriate frequencies and testing can be determined. The presentation will give the updated status of the NIC Check Valve Performance Database covering (1) methodology used to combine the original ORNL data; (2) process/controls established for continuing update and refinement of the data; (3) discussion of how this data is being utilized by (a) OM-22 for condition monitoring, and (b) risk-based inservice testing work of Westinghouse Owners` Group; and (4) results/trends of data evaluations. At the 1994 Symposium, ORNL provided an update as of 1991 to their original work of 1984 -1990 which they had performed to characterize check valve degradations and failures in the nuclear industry. These characterizations will be updated to 1995 and additional reviews provided to give insight into the current condition and trends of check valve performance.

  16. A Spatialization-based Method for Checking and Updating Metadata

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In this paper the application of spatialization technology on metadata quality check and updating was discussed. A new method based on spatialization was proposed for checking and updating metadata to overcome the deficiency of text based methods with the powerful functions of spatial query and analysis provided by GIS software. This method employs the technology of spatialization to transform metadata into a coordinate space and the functions of spatial analysis in GIS to check and update spatial metadata in a visual environment. The basic principle and technical flow of this method were explained in detail, and an example of implementation using ArcMap of GIS software was illustrated with a metadata set of digital raster maps. The result shows the new method with the support of interaction of graph and text is much more intuitive and convenient than the ordinary text based method, and can fully utilize the functions of GIS spatial query and analysis with more accuracy and efficiency.

  17. A Metric Encoding for Bounded Model Checking (extended version)

    CERN Document Server

    Pradella, Matteo; Pietro, Pierluigi San

    2009-01-01

    In Bounded Model Checking both the system model and the checked property are translated into a Boolean formula to be analyzed by a SAT-solver. We introduce a new encoding technique which is particularly optimized for managing quantitative future and past metric temporal operators, typically found in properties of hard real time systems. The encoding is simple and intuitive in principle, but it is made more complex by the presence, typical of the Bounded Model Checking technique, of backward and forward loops used to represent an ultimately periodic infinite domain by a finite structure. We report and comment on the new encoding technique and on an extensive set of experiments carried out to assess its feasibility and effectiveness.

  18. Applied Bounded Model Checking for Interlocking System Designs

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, Jan; Pinger, Ralf

    2013-01-01

    In this article the verification and validation of interlocking systems is investigated. Reviewing both geographical and route-related interlocking, the verification objectives can be structured from a perspective of computer science into (1) verification of static semantics, and (2) verification...... of behavioural (operational) semantics. The former checks that the plant model – that is, the software components reflecting the physical components of the interlocking system – has been set up in an adequate way. The latter investigates trains moving through the network, with the objective to uncover potential...... safety violations. From a formal methods perspective, these verification objectives can be approached by theorem proving, global, or bounded model checking. This article explains the techniques for application of bounded model checking techniques, and discusses their advantages in comparison...

  19. Self-checking state machine realizations in CMOS

    Science.gov (United States)

    Lala, P. K.

    1994-06-01

    In this reporting period, we have studied the currently available techniques for designing totally self-check checkers for m-out-of-n codes. Such codes can be used for state assignment in self-checking state machines. The major advantage of m-out-of-n codes is that they can detect single and unidirectional multibit errors in the encoded information bits. Thus, if a circuit is designed such that its output forms an m-out-of-n code, any fault in the circuit which creates a single bit error or unidirectional multibit error at the output can be detected on-line. On-line error detection, also known as self-checking, can be accomplished by using a checker to monitor the circuit output. The output of the checker is 01 or 10 if there is no fault in the circuit under test or in the checker itself, otherwise the output will be 00 or 11.

  20. Applied Bounded Model Checking for Interlocking System Designs

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, Jan; Pinger, Ralf

    2014-01-01

    In this paper the verification and validation of interlocking systems is investigated. Reviewing both geographical and route-related interlocking, the verification objectives can be structured from a perspective of computer science into (1) verification of static semantics, and (2) verification of...... behavioural (operational) semantics. The former checks that the plant model – that is, the software components reflecting the physical components of the interlocking system – has been set up in an adequate way. The latter investigates trains moving through the network, with the objective to uncover potential...... safety violations. From a formal methods perspective, these verification objectives can be approached by theorem proving, global, or bounded model checking. This paper explains the techniques for application of bounded model checking techniques, and discusses their advantages in comparison to the...

  1. Model Checking-Based Testing of Web Applications

    Institute of Scientific and Technical Information of China (English)

    ZENG Hongwei; MIAO Huaikou

    2007-01-01

    A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagram as the object model is employed to describe the object structure of a Web application design and can be translated into the behavior model. A key problem of model checking-based test generation for a Web application is how to construct a set of trap properties that intend to cause the violations of model checking against the behavior model and output of counterexamples used to construct the test sequences.We give an algorithm that derives trap properties from the object model with respect to node and edge coverage criteria.

  2. LOAD-CHECK. Disposal planning for LWR fuel elements

    International Nuclear Information System (INIS)

    With the changes of the German atomic law from November 8, 2011 the operation licensing of LWR plants expire latest 2022, for eight NPPs the operation licenses are already expired. In order to optimize the fuel element management in the still operated but also in the decommissioned nuclear power plants the computer code module LOAD-CHECK was developed. LOAD-CHECK allows the foresight container planning for an optimized schedule and the container amount for loading campaigns esp. in case of the disposal of special fuel elements (MOX fuel elements or high-burnup fuel elements). The program can also be used a s tool for development of transport licensing and storage licensing according of CASTOR registered V casks. In the contribution the LOAD-CHECK program for the PWR and BWR fuel element disposal management in CASTOR registered B casks is presented.

  3. MOM: A meteorological data checking expert system in CLIPS

    Science.gov (United States)

    Odonnell, Richard

    1990-01-01

    Meteorologists have long faced the problem of verifying the data they use. Experience shows that there is a sizable number of errors in the data reported by meteorological observers. This is unacceptable for computer forecast models, which depend on accurate data for accurate results. Most errors that occur in meteorological data are obvious to the meteorologist, but time constraints prevent hand-checking. For this reason, it is necessary to have a 'front end' to the computer model to ensure the accuracy of input. Various approaches to automatic data quality control have been developed by several groups. MOM is a rule-based system implemented in CLIPS and utilizing 'consistency checks' and 'range checks'. The system is generic in the sense that it knows some meteorological principles, regardless of specific station characteristics. Specific constraints kept as CLIPS facts in a separate file provide for system flexibility. Preliminary results show that the expert system has detected some inconsistencies not noticed by a local expert.

  4. Check Point推出NGX版本Connectra SSL VPN

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    6月7日,互联网安全解决方案供应商Check Point软件技术有限公司在美国宣布推出Connectra NGX,这是其SSL VPN解决方案的增强版本。Connectra NGX充分发挥了Check Point最近推出的NGX平台的全新连接功能,以及支持中央化安全监控及维护的SmartCenter。Connectra NGX有下列特点:

  5. An analysis of prostate patient computer plan checks

    International Nuclear Information System (INIS)

    Full text: The physics group at the Cancer Therapy Centre, Liverpool Hospital performs independent quality assurance checks on all radiation treatment fields. These checks involve calculating doses from the prescribed monitor units using data independent of the planning computer. In the physics check the dose at the isocentre or other prescription point is calculated and usually no consideration is given to patient inhomogeneities and curvature. This dose is compared with the dose at the same position as derived from the Varian CADPLAN treatment planning system (CTPS). For the treatment of prostate cancer, the most common technique involves four 6MV x-ray fields: AP, PA and two laterals with the dose prescribed to the isocentre as recommended by I.C.R.U. Report 50 ('Prescribing, Recording and Reporting Photon Beam Therapy', International Commission on Radiation Units and Measurements, Bethesda, Maryland, U.S.A., 1993). This work attempts to determine the cause and magnitude of dose variations between CTPS and -physics check derived doses in prostate patients. A set of 50 prostate patients, treated with the above technique, was selected for the study. The physics checks were evaluated and the average patient separations and dose variations were determined. These dose variations were between zero and 5% (median 4%). A median isocentre dose difference of 6.2% between using and not using a bone inhomogeneity correction method has been observed in 6MV x-ray arc treatments of the prostate (Nemeth et al, Med. Dosim., 18:171-177, 1993). The physics check method was benchmarked in a homogeneous solid water phantom using a PTW Farmer type ionisation chamber with the four field prostate technique and compared with the CTPS derived doses. This showed good agreement. An anthropomorphic phantom was treated with the above prostate technique, using a field size of 9x9 cm2 for all four fields. The CTPS and physics check derived doses at the isocentre were calculated and compared

  6. The check and error analysis of the BRDF experiment bench

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    In this paper, a detailed introduction is given to the check method of the BRDF experiment bench which is built on our own. Measurement is made on the BRDF of the standard white plate made of polytetrafluoroethylene(PTFE) with reference to the existing standard white plate whose surface reflectance is known and by the method of theory approximate and relative comparison. On the basis of that, the BRDF value of the standard white plate in the wave band of 0. 6328 μm is given and the experiment bench is checked, the relative error of the experiment bench being within 20%.

  7. Using Model Checking to Validate AI Planner Domain Models

    Science.gov (United States)

    Penix, John; Pecheur, Charles; Havelund, Klaus

    1999-01-01

    This report describes an investigation into using model checking to assist validation of domain models for the HSTS planner. The planner models are specified using a qualitative temporal interval logic with quantitative duration constraints. We conducted several experiments to translate the domain modeling language into the SMV, Spin and Murphi model checkers. This allowed a direct comparison of how the different systems would support specific types of validation tasks. The preliminary results indicate that model checking is useful for finding faults in models that may not be easily identified by generating test plans.

  8. Spell-checking in Spanish: the case of diacritic accents

    OpenAIRE

    Atserias Batalla, Jordi; Fuentes Fort, Maria; Nazar, Rogelio; Renau, Irene

    2012-01-01

    This article presents the problem of diacritic restoration (or diacritization) in the context of spell-checking, with the focus on an orthographically rich language such as Spanish. We argue that despite the large volume of work published on the topic of diacritization, currently available spell-checking tools have still not found a proper solution to the problem in those cases where both forms of a word are listed in the checker’s dictionary. This is the case, for instance, when a word form ...

  9. Attentive Turkers: MTurk participants perform better on online attention checks than do subject pool participants.

    Science.gov (United States)

    Hauser, David J; Schwarz, Norbert

    2016-03-01

    Participant attentiveness is a concern for many researchers using Amazon's Mechanical Turk (MTurk). Although studies comparing the attentiveness of participants on MTurk versus traditional subject pool samples have provided mixed support for this concern, attention check questions and other methods of ensuring participant attention have become prolific in MTurk studies. Because MTurk is a population that learns, we hypothesized that MTurkers would be more attentive to instructions than are traditional subject pool samples. In three online studies, participants from MTurk and collegiate populations participated in a task that included a measure of attentiveness to instructions (an instructional manipulation check: IMC). In all studies, MTurkers were more attentive to the instructions than were college students, even on novel IMCs (Studies 2 and 3), and MTurkers showed larger effects in response to a minute text manipulation. These results have implications for the sustainable use of MTurk samples for social science research and for the conclusions drawn from research with MTurk and college subject pool samples. PMID:25761395

  10. Preservation Health Check: Monitoring Threats to Digital Repository Content

    Science.gov (United States)

    Kool, Wouter; van der Werf, Titia; Lavoie, Brian

    2014-01-01

    The Preservation Health Check (PHC) project, undertaken as a joint effort by Open Planets Foundation (OPF) and OCLC Research, aims to evaluate the usefulness of the preservation metadata created and maintained by operational repositories for assessing basic preservation properties. The PHC project seeks to develop an implementable logic to support…

  11. Spanish Language Versions of the Depression Adjective Check Lists.

    Science.gov (United States)

    Lubin, Bernard; And Others

    1980-01-01

    The study aimed to develop an instrument that could be used for mental health research with Spanish-speaking populations. The Depression Adjective Check Lists (DACL) used to measure depressive mood was translated into Spanish and administered to 70 Hispanic subjects. Reliability determinations were high and close to those for the English version.…

  12. Checking the odd Goldbach conjecture up to 10(20)

    Science.gov (United States)

    Saouter, Y.

    1998-04-01

    Vinogradov's theorem states that any sufficiently large odd integer is the sum of three prime numbers. This theorem allows us to suppose the conjecture that this is true for all odd integers. In this paper, we describe the implementation of an algorithm which allowed us to-check this conjecture up to 10(20).

  13. 76 FR 16861 - Availability of Funds and Collection of Checks

    Science.gov (United States)

    2011-03-25

    ... checks to depositary banks electronically.\\8\\ Based on information from banking industry sources, the... of the rule.\\20\\ \\18\\ 57 FR 46956 (Oct. 14, 1992). \\19\\ Times are stated as local time of the paying... is applicable to the Reserve Banks. (53 FR 11911 (Apr. 11, 1988)) The overwhelming majority...

  14. Two Types of Test Assembly Checked and Accepted for CEFR

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    The detail design of two types of test assembly used in the simulating transportation, and themounting and hydraulic test were completed in 2002. This two types of test assembly are manufactured inshanghai No.1 machine tool works, and checked and accepted in March 2003. The former is used in the

  15. Homeland Security Initiatives and Background Checks in Higher Education

    Science.gov (United States)

    Hughes, Stephanie; Keller, Eileen Weisenbach; Hertz, Giles T.

    2010-01-01

    In recent years, colleges and universities have faced a new challenge. While there has been a movement underway on college campuses to increase the safety of a wide range of university constituents through criminal background checks (CBCs), in most cases this movement has failed to include CBCs of foreign faculty and student populations. The…

  16. Self-checking state machine realization in CMOS

    Science.gov (United States)

    Lala, P. K.; Walker, A.

    1994-12-01

    In this reporting period we have accomplished the following: (1) developed a procedure for totally self-checking (TSC) checker design for m-out-of-2m codes at the transistor level and (2) derived a technique for designing TSC fault-tolerant systems.

  17. Modelling Chinese Smart Grid : A stochastic model checking case study

    Energy Technology Data Exchange (ETDEWEB)

    Yuksel, E.; Nielson, H.R.; Nielson, F. (Technical Univ. of Denmark. DTU Informatics, Kgs. Lyngby (Denmark)); Zhu, H. (East China Normal Univ. (China)); Huang, H. (Wuxi SensingNet Industrialization Research Institute (China))

    2012-07-01

    In this document, we consider a specific Chinese Smart Grid implementation and try to address the verification problem for certain quantitative properties including performance and battery consumption. We employ stochastic model checking approach and present our modelling and analysis study using PRISM model checker. (Author)

  18. A Standardization of the Mooney Problem Check List - College Form.

    Science.gov (United States)

    Dreger, Ralph Mason; And Others

    The Mooney Problem Check List, College Form, was administered to 2,261 students from six Louisiana universities, for standardization purposes. Usable protocols were obtained for 1,929 subjects. Comparisons among schools, school classes, sex, race, and marital status were made for the 11 Mooney categories. Norm tables were developed for all groups…

  19. Mandatory Identification Bar Checks: How Bouncers Are Doing Their Job

    Science.gov (United States)

    Monk-Turner, Elizabeth; Allen, John; Casten, John; Cowling, Catherine; Gray, Charles; Guhr, David; Hoofnagle, Kara; Huffman, Jessica; Mina, Moises; Moore, Brian

    2011-01-01

    The behavior of bouncers at on site establishments that served alcohol was observed. Our aim was to better understand how bouncers went about their job when the bar had a mandatory policy to check identification of all customers. Utilizing an ethnographic decision model, we found that bouncers were significantly more likely to card customers that…

  20. Bounded Model Checking of Temporal Formulas with Alloy

    OpenAIRE

    Cunha, Alcino

    2012-01-01

    Alloy is formal modeling language based on first-order relational logic, with no specific support for specifying reactive systems. We propose the usage of temporal logic to specify such systems, and show how bounded model checking can be performed with the Alloy Analyzer.

  1. Periodical check of the NPP Dukovany fuel cycles safety

    International Nuclear Information System (INIS)

    Safety analyses are among the most important parts of Safety Analysis Reports (SARs). The analyses are based, among other things, on reactor core characteristics that can change due to fuel burnup or can vary in dependence on the actual fuel cycle design (fuel composition and core design) or other operational conditions. The validity of the SAR must be preserved under all circumstances. This is why elaboration of a methodology for checking the core characteristics was necessary. This concerns especially those core characteristics that can undergo major changes during operation and play an important role in safety analysis. Evaluation of validity of the results of a safety analysis is vital for application of such methodology. The main methodological principles are summarized and some illustrative results for Dukovany NPP units are presented. The following aspects are discussed: History and goals of fuel cycle key parameters checking; Basic principles of methodology (key reactor core parameters for safety analyses: reactivity coefficients and kinetic parameters, efficiency of control assemblies, reactor core power distribution characteristics, combination of parameters for specific events; structure of representative values for safety analyses); Illustration of present state in application of the checking procedure; Possible consequences of the checking procedure application; and Future of the methodology. (P.A.)

  2. A review of historical check valve failure data

    International Nuclear Information System (INIS)

    Check valve operating problems in recent years have resulted in significant operating transients, increased cost, and decreased system availability. In response, additional attention has been given to check valves by utilities, as well as the US Nuclear Regulatory Commission (NRC) and the American Society of Mechanical Engineers Operation and Maintenance Committee. All these organizations have the fundamental goal of ensuring reliable operation of check valves. A key ingredient of an engineering-oriented reliability improvement effort is a thorough understanding of relevant historical experience. Oak Ridge National Laboratory is currently conducting a detailed review of historical failure data available through the Institute of Nuclear Power Operation's Nuclear Plant Reliability Data System. The focus of the review is on check valve failures that have involved significant degradation of the valve internal parts. A variety of parameters are being considered during the review, including size, age, system of service, method of failure discovery, the affected valve parts, attributed causes, and corrective actions. This work is being carried out under the auspices of the NRC's Nuclear Plant Aging Research program. At this time, the study is approximately 50% complete. All failure records have been reviewed and categorized, and preliminary tabulation and correlation of data is underway. The bulk of the tabulation and correlation portion of the work is expected to be completed by the end of June 1992. A report draft is expected in the fall of 1992

  3. Towards Model Checking a Spi-Calculus Dialect

    NARCIS (Netherlands)

    Gnesi, S.; Latella, D.; Lenzini, G.

    2002-01-01

    We present a model checking framework for a spi-calculus dialect which uses a linear time temporal logic for expressing security properties. We have provided our spi-calculus dialect, called SPID, with a semantics based on labeled transition systems (LTS), where the intruder is modeled in the Dolev-

  4. Using Model Checking for Analyzing Distributed Power Control Problems

    DEFF Research Database (Denmark)

    Brihaye, Thomas; Jungers, Marc; Lasaulce, Samson; Markey, Nicolas; Oreiby, Ghassan

    2010-01-01

    Model checking (MC) is a formal verification technique which has been known and still knows a resounding success in the computer science community. Realizing that the distributed power control ( PC) problem can be modeled by a timed game between a given transmitter and its environment, the authors...

  5. 31 CFR 240.14 - Checks issued to incompetent payees.

    Science.gov (United States)

    2010-07-01

    ...) FISCAL SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE INDORSEMENT AND PAYMENT OF CHECKS... without submission of documentary proof of the authority of the guardian or other fiduciary, with the... the certifying agency with information as to the incompetence of the payee and documentary...

  6. Model checking conditional CSL for continuous-time Markov chains

    DEFF Research Database (Denmark)

    Gao, Yang; Xu, Ming; Zhan, Naijun;

    2013-01-01

    probabilistic operator. CCSL allows us to express a richer class of properties for CTMCs. Based on a parameterized product obtained from the CTMC and an automaton extracted from a given CCSL formula, we propose an approximate model checking algorithm and analyse its complexity....

  7. Operational workforce planning for check-in counters at airports

    DEFF Research Database (Denmark)

    Stolletz, Raik

    2010-01-01

    This paper addresses operation models for workforce planning for check-in systems at airports. We characterize different tasks of the hierarchical workforce planning problem with time-dependent demand. A binary linear programming formulation is developed for the fortnightly tour scheduling problem...

  8. 40 CFR 91.319 - NOX converter check.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false NOX converter check. 91.319 Section 91...) CONTROL OF EMISSIONS FROM MARINE SPARK-IGNITION ENGINES Emission Test Equipment Provisions § 91.319 NOX... of the NO concentration). The NOX analyzer must be in the NO mode so that the span gas does not...

  9. Modeling Environment for Component Model Checking from Hierarchical Architecture

    Czech Academy of Sciences Publication Activity Database

    Pařízek, P.; Plášil, František

    2007-01-01

    Roč. 182, - (2007), s. 139-153. ISSN 1571-0661 R&D Projects: GA ČR GA201/06/0770 Institutional research plan: CEZ:AV0Z10300504 Keywords : software components * behavior protocols * environment model checking * hierarchical component architecture Subject RIV: JC - Computer Hardware ; Software

  10. Generation of serine/threonine check points in HN(C)N spectra

    Indian Academy of Sciences (India)

    Dinesh Kumar; Jeetender Chugh; Ramakrishna V Hosur

    2009-11-01

    We describe here a simple modification of the HN(C)N experiment for the generation of serine/threonine check points in the three-dimensional experiment. The various `triplet of residue’ specific peak patterns in the spectra are documented for ease of analysis and sequential backbone resonance assignment. The performance of this experiment, referred to as HN(C)N-ST, is demonstrated using two proteins, one properly folded and the other completely denatured. It is noteworthy that, even in the denatured protein, where spectral dispersions are rather poor, about 90% of the sequential connectivities through the chain could be established from this single experiment. This would have great implications for structural genomics efforts.

  11. 47 CFR 80.293 - Check bearings by authorized ship personnel.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Check bearings by authorized ship personnel. 80... Check bearings by authorized ship personnel. The requirement for calibration by check bearings is met if: (a) The required verification by check bearings are made not more than 90 days prior to the date...

  12. Recommended Screening-Checks for Placed Orders in Industry Internal Tool- OMS

    Directory of Open Access Journals (Sweden)

    Niranjanamurthy M

    2014-07-01

    Full Text Available This paper gives the information and proposed solution regarding Screening Checks for Industry Internal Tool-Order Management System. After placing orders by customers through shopping website the industry people should verify the orders in different ways to avoid loss. Need to do Screening and in different checks for Maximize acceptance of valid orders, Increase customer service productivity, More tailored and effective screening strategies, Minimize online fraud losses. Free up your teams to focus on their core competency – running your business. Here mainly proposing screening checks sectors are Credit card information checks, Basic Information checks, financing information checks, Electronic information checks.

  13. Check dams effects on sediment transport in steep slope flume

    Science.gov (United States)

    Piton, Guillaume; Recking, Alain

    2014-05-01

    Depending on many influences (geology, relief, hydrology, land use, etc.) some mountainous watershed are prone to cause casualties and facilities damages. Large amounts of sediments episodically released by torrents are often the biggest problem in torrent related hazard mitigation. Series of transversal structures as check dams and ground sills are often used in the panel of risk mitigation technics. A large literature exits on check dams and it mainly concerns engineering design, e.g. toe scouring, stability stress diagram, changes in upper and lower reaches equilibrium slopes. Check dams in steep slope rivers constitute fixed points in the bed profile and prevent general bed incision. However their influence on sediment transport once they are filled is not yet clear. Two flume test campaigns, synthetize in Table 1, were performed to investigate this question: Table 1 : experiment plan Run (duration) Ref1 (50h)CD1a (30h)CD1b (30h)Ref2 (92h)CD2 (18h) Solid feeding discharge (g.s^-1) 44 44 44 60 60 Number of check dams none 1 3 none 2 A nearly 5-m-long, 10-cm-wide and 12%-steep flume was used. The water discharge was set to 0,55 l/s in all runs. A mixture of poorly sorted natural sediments with diameters between 0.8 and 40 mm was used. An open solid-discharge-feeding circuit kept the inlet sediment flux constant during all experiments. As both feeding rates did not present variation, changes in outlet solid discharge were assumed to be due to bed variations in the bed storage. We observed strong fluctuations of solid flux and slope in each reaches of all runs between: (i) steep aggradating armoured bed and (ii) less steep and finer bed releasing bedload sheets during erosion events and inducing bedload pulses. All experiments showed consistent results: transported volume associated with erosion event decreased with the length between two subsequent check dams. Solid transversal structures shorten the upstream erosion-propagation and avoid downstream change in the

  14. Non-trivial checks of novel consistency relations

    International Nuclear Information System (INIS)

    Single-field perturbations satisfy an infinite number of consistency relations constraining the squeezed limit of correlation functions at each order in the soft momentum. These can be understood as Ward identities for an infinite set of residual global symmetries, or equivalently as Slavnov-Taylor identities for spatial diffeomorphisms. In this paper, we perform a number of novel, non-trivial checks of the identities in the context of single field inflationary models with arbitrary sound speed. We focus for concreteness on identities involving 3-point functions with a soft external mode, and consider all possible scalar and tensor combinations for the hard-momentum modes. In all these cases, we check the consistency relations up to and including cubic order in the soft momentum. For this purpose, we compute for the first time the 3-point functions involving 2 scalars and 1 tensor, as well as 2 tensors and 1 scalar, for arbitrary sound speed

  15. Immune Check Point Inhibitors Combination in Melanoma: Worth the Toxicity?

    Science.gov (United States)

    Orloff, Marlana; Weight, Ryan; Valsecchi, Matias E; Sato, Takami

    2016-01-01

    The combination of immune checkpoint inhibitors ipilimumab and nivolumab has been recently been FDA approved for first line treatment of unresectable and metastatic BRAF wild type melanoma. The approval came following the impressive results of the CheckMate 067, where the combination of ipilimumab and nivolumab appeared to outperform each as a single agent in regards to response rate and progression free survival. Though we await final overall survival data, the combination will likely be adapted by many oncologists and integrated into the ever changing melanoma treatment algorithm. In this article we aim to summarize the data leading up to the recent FDA approval and publication by Larkin et al. that presents the results from the CheckMate 067 trial. We will also further explore the feasibility, challenges, and applicability of combination immune checkpoint inhibitor therapy. PMID:27028970

  16. Application of acoustic emission technique for check valve monitoring

    International Nuclear Information System (INIS)

    Very limited choice is available in monitoring the health of check valves during service. Ultrasonics, magnetic flux leakage and acoustic emission (AE) monitoring are three methods, of which AE is the prominent. The paper describes work done on swing check valves in the ECCS circuit of Cirus using AE. It indicates that the valves can be monitored for any abnormal behaviour during their stable operation and during opening and closing. AE can also sense any abnormality at the hinge pin, hinge arm, disc etc., if they give AE emission. However, many of these may require background data from a spare valve of similar design or a working stand by. In absence of such a valve, data from the present study will be used as a baseline data for comparison with signatures taken during future inspections. (author). 3 refs., 5 figs., 1 tab

  17. Schedulability of Herschel revisited using statistical model checking

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel;

    2015-01-01

    Schedulability analysis is a main concern for several embedded applications due to their safety-critical nature. The classical method of response time analysis provides an efficient technique used in industrial practice. However, the method is based on conservative assumptions related to execution...... and blocking times of tasks. Consequently, the method may falsely declare deadline violations that will never occur during execution. This paper is a continuation of previous work of the authors in applying extended timed automata model checking (using the tool UPPAAL) to obtain more exact...... schedulability analysis, here in the presence of non-deterministic computation times of tasks given by intervals [BCET,WCET]. Computation intervals with preemptive schedulers make the schedulability analysis of the resulting task model undecidable. Our contribution is to propose a combination of model checking...

  18. Mixed Portmanteau Test for Diagnostic Checking of Time Series Models

    Directory of Open Access Journals (Sweden)

    Sohail Chand

    2014-01-01

    Full Text Available Model criticism is an important stage of model building and thus goodness of fit tests provides a set of tools for diagnostic checking of the fitted model. Several tests are suggested in literature for diagnostic checking. These tests use autocorrelation or partial autocorrelation in the residuals to criticize the adequacy of fitted model. The main idea underlying these portmanteau tests is to identify if there is any dependence structure which is yet unexplained by the fitted model. In this paper, we suggest mixed portmanteau tests based on autocorrelation and partial autocorrelation functions of the residuals. We derived the asymptotic distribution of the mixture test and studied its size and power using Monte Carlo simulations.

  19. Asymptomatic brain tumor detected at brain check-up

    Energy Technology Data Exchange (ETDEWEB)

    Onizuka, Masanari; Suyama, Kazuhiko; Shibayama, Akira; Hiura, Tsuyoshi; Horie, Nobutaka; Miyazaki, Hisaya [Sankoukai Miyazaki Hospital, Isahaya, Nagasaki (Japan)

    2001-09-01

    Brain check-up was performed in 4000 healthy subjects who underwent medical and radiological examinations for possible brain diseases in our hospital from April 1996 to March 2000. Magnetic resonance imaging revealed 11 brain tumors which consisted of six meningiomas, three pituitary adenomas, one astrocytoma, and one epidermoid cyst. The detection rate of incidental brain tumor in our hospital was 0.3%. Nine patients underwent surgery, with one case of morbidity due to postoperative transient oculomotor nerve paresis. The widespread use of brain check-up may increasingly detect asymptomatic brain tumors. Surgical indications for such lesions remain unclear, and the strategy for treatment should be determined with consideration of the patient's wishes. (author)

  20. Analysis of DIRAC's behavior using model checking with process algebra

    CERN Document Server

    Remenska, Daniela; Willemse, Tim; Bal, Henri; Verstoep, Kees; Fokkink, Wan; Charpentier, Philippe; Diaz, Ricardo Graciani; Lanciotti, Elisa; Roiser, Stefan; Ciba, Krzysztof

    2012-01-01

    DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple, the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike con...

  1. Detecting feature interactions in Web services with model checking techniques

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    As a platform-independent software system, a Web service is designed to offer interoperability among diverse and heterogeneous applications.With the introduction of service composition in the Web service creation, various message interactions among the atomic services result in a problem resembling the feature interaction problem in the telecommunication area.This article defines the problem as feature interaction in Web services and proposes a model checking-based detection method.In the method, the Web service description is translated to the Promela language - the input language of the model checker simple promela interpreter (SPIN), and the specific properties, expressed as linear temporal logic (LTL) formulas, are formulated according to our classification of feature interaction.Then, SPIN is used to check these specific properties to detect the feature interaction in Web services.

  2. SMT-based Bounded Model Checking with Difference Logic Constraints

    CERN Document Server

    Bersani, Marcello M; Morzenti, Angelo; Pradella, Matteo; Rossi, Matteo; Pietro, Pierluigi San

    2010-01-01

    Traditional Bounded Model Checking (BMC) is based on translating the model checking problem into SAT, the Boolean satisfiability problem. This paper introduces an encoding of Linear Temporal Logic with Past operators (PLTL) into the Quantifier-Free Difference Logic with Uninterpreted Functions (QF-UFIDL). The resulting encoding is a simpler and more concise version of existing SATbased encodings, currently used in BMC. In addition, we present an extension of PLTL augmented with arithmetic relations over integers, which can express unbounded counters; as such, the extended logic is more expressive than PLTL. We introduce suitable restrictions and assumptions that are shown to make the verification problem for the extended logic decidable, and we define an encoding of the new logic into QF-UFIDL. Finally, a performance comparison with the SAT-based approach on purely PLTL examples shows significant improvements in terms of both execution time and memory occupation.

  3. L2C2: Logic-based LSC Consistency Checking

    CERN Document Server

    Guo, Hai-Feng; Subramaniam, Mahadevan

    2010-01-01

    Live sequence charts (LSCs) have been proposed as an inter-object scenario-based specification and visual programming language for reactive systems. In this paper, we introduce a logic-based framework to check the consistency of an LSC specification. An LSC simulator has been implemented in logic programming, utilizing a memoized depth-first search strategy, to show how a reactive system in LSCs would response to a set of external event sequences. A formal notation is defined to specify external event sequences, extending the regular expression with a parallel operator and a testing control. The parallel operator allows interleaved parallel external events to be tested in LSCs simultaneously; while the testing control provides users to a new approach to specify and test certain temporal properties (e.g., CTL formula) in a form of LSC. Our framework further provides either a state transition graph or a failure trace to justify the consistency checking results.

  4. Will online bill payment spell the demise of paper checks?

    OpenAIRE

    James C. McGrath

    2005-01-01

    Over the past several years, the emergence and adoption of electronic payment instruments have acutely affected check usage. This transition has been especially evident at the point of sale as debit and credit cards have become pervasive. Today, the rapid growth of online bill payment looks to threaten checks’ last redoubt. However, bill payment technology is still in its adolescence; the interplay of many stakeholders in the industry, including technology firms, banks, billers, payment cards...

  5. Checking Session-Oriented Interactions between Web Services

    Czech Academy of Sciences Publication Activity Database

    Parízek, P.; Adámek, Jiří

    Los Alamitos: IEEE Computer Society, 2008, s. 3-10. ISBN 978-0-7695-3276-9. [SEAA 2008. EUROMICRO Conference on Software Engineering and Advanced Applications /34./. Parma (IT), 03.09.2008-05.09.2008] R&D Projects: GA AV ČR 1ET400300504 Institutional research plan: CEZ:AV0Z10300504 Keywords : web services * BPEL * session-oriented interactions * behavior protocols * model checking Subject RIV: JC - Computer Hardware ; Software

  6. Fast Liveness Checking for SSA-Form Programs

    OpenAIRE

    Boissinot B.; Hack S.; Grund D.; De Dinechin B.D.; Rastello F.

    2007-01-01

    Liveness analysis is an important analysis in optimizing compilers. Liveness information is used in several optimizations and is mandatory during the code-generation phase. Two drawbacks of conventional liveness analyses are that their computations are fairly expensive and their results are easily invalidated by program transformations. We present a method to check liveness of variables that overcomes both obstacles. The major advantage of the proposed method is that the analysis result survi...

  7. Logic Model Checking of Unintended Acceleration Claims in Toyota Vehicles

    Science.gov (United States)

    Gamble, Ed

    2012-01-01

    Part of the US Department of Transportation investigation of Toyota sudden unintended acceleration (SUA) involved analysis of the throttle control software, JPL Laboratory for Reliable Software applied several techniques including static analysis and logic model checking, to the software; A handful of logic models were build, Some weaknesses were identified; however, no cause for SUA was found; The full NASA report includes numerous other analyses

  8. A Novel Nanometric Reversible Signed Divider with Overflow Checking Capability

    OpenAIRE

    Faraz Dastan; Majid Haghparast

    2012-01-01

    One of the best approaches for designing future computers is that we use reversible logic. Reversible logic circuits have lower power consumption than the common circuits, used in computers nowadays. In this study we propose a new reversible division circuit. This reversible division circuit is signed divider and has an overflow checking capability. Among the designed and proposed reversible division circuits, our proposed division circuit is the first reversible signed divider with overflow ...

  9. Practical Run-time Checking via Unobtrusive Property Caching

    OpenAIRE

    Stulova, Nataliia; Morales, José F.; Hermenegildo, Manuel V.

    2015-01-01

    The use of annotations, referred to as assertions or contracts, to describe program properties for which run-time tests are to be generated, has become frequent in dynamic programing languages. However, the frameworks proposed to support such run-time testing generally incur high time and/or space overheads over standard program execution. We present an approach for reducing this overhead that is based on the use of memoization to cache intermediate results of check evaluation, avoiding repea...

  10. 309 Facility deactivation and decommisioning Criteria Completion Check Lists

    International Nuclear Information System (INIS)

    To facilitate and track completion of the 309 Facility turnover criteria completion an Applicability Matrix and Criteria Completion Check Lists were prepared. The applicability matrix documents the required turnover criteria for a given area in the facility or scope of work. The applicable criteria is selected for 16 different areas. For each area a completion checklist is provided to document completion of a requirement by WHC and the Environmental Restoration Contractor

  11. Building Reusable Software Component For Optimization Check in ABAP Coding

    Directory of Open Access Journals (Sweden)

    P.Shireesha

    2010-07-01

    Full Text Available Software component reuse is the software engineering practice of developing newsoftware products from existing components. A reuse library or component reuserepository organizes stores and manages reusable components. This paper describeshow a reusable component is created, how it reuses the function and checking ifoptimized code is being used in building programs and applications. Finally providingcoding guidelines, standards and best practices used for creating reusable componentsand guidelines and best practices for making configurable and easy to use.

  12. Time-of-flight spectroscopy: energy calibration and consistensy check

    Science.gov (United States)

    Stunault, A.; Andersen, K. H.; Blanc, Y.; Fåk, B.; Godfrin, H.; Guckelsberger, K.; Scherm, R.

    1992-06-01

    A method for calibration of the energy transfers at a time-of-flight (TOF) spectrometer is presented: flight pamths and wavelength are determined to 10 -3 using the arrival times of neutron pulses and prompt capture γs from the sample. We also developed a method to check the reproducibility of a series of TFO data sets, each with over 50 000 data points.

  13. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  14. Model Checking Processes Specified In Join-Calculus Algebra

    Directory of Open Access Journals (Sweden)

    Sławomir Piotr Maludziński

    2014-01-01

    Full Text Available This article presents a model checking tool used to verify concurrent systems specified in join-calculus algebra. The temporal properties of systems under verification are expressed in CTL logic. Join-calculus algebra with its operational semantics defined by the chemical abstract machine serves as the basic method for the specification of concurrent systems and their synchronization mechanisms, and allows the examination of more complex systems.

  15. Model Checking Processes Specified In Join-Calculus Algebra

    OpenAIRE

    Sławomir Piotr Maludziński; Grzegorz Dobrowolski

    2014-01-01

    This article presents a model checking tool used to verify concurrent systems specified in join-calculus algebra. The temporal properties of systems under verification are expressed in CTL logic. Join-calculus algebra with its operational semantics defined by the chemical abstract machine serves as the basic method for the specification of concurrent systems and their synchronization mechanisms, and allows the examination of more complex systems.

  16. A Graphical μ-Calculus and Local Model Checking

    Institute of Scientific and Technical Information of China (English)

    林惠民

    2002-01-01

    A graphical notation for the propositionalμ-calculus, called modal graphs, ispresented. It is shown that both the textual and equational presentations of theμ-calculus canbe translated into modal graphs. A model checking algorithm based on such graphs is proposed.The algorithm is truly local in the sense that it only generates the parts of the underlyingsearch space which are necessary for the computation of the final result. The correctness of thealgorithm is proven and its complexity analysed.

  17. Model Checking for Licensing Support in the Finnish Nuclear Industry

    Energy Technology Data Exchange (ETDEWEB)

    Antti, Pakonen; Janne, Valkonen [VTT Technical Research, VTT (Finland); Sami, Matinaho; Markus, Hartikainen [Protum Power and Heat, Fortum (Finland)

    2014-08-15

    This paper examines how model checking can be used to support the qualification of digital I and C software in nuclear power plants, in a way that is consistent with regulatory demands specifically, the common position of seven European nuclear regulators and authorised technical support organisations. As a practical example, we discuss the third-party review service provided by VTT for the power company Fortum in the I and C renewal project of the Loviisa plant in southern Finland.

  18. Feasibility Checking for Dial-a-Ride Problems

    DEFF Research Database (Denmark)

    Haugland, Dag; Ho, Sin C.

    Hunsaker and Savelsbergh have proposed an algorithm for testing feasibility of a route in the solution to the dial-a-ride problem. The constraints that are checked are load capacity constraints, time windows, ride time bounds and wait time bounds. The algorithm has linear running time. By virtue ...... a simple example, we show in this work that their algorithm is incorrect. We also prove that by increasing the time complexity by only a logarithmic factor, a correct algorithm is obtained....

  19. INVESTING FORMULA ENFORCEABLE BILL OF EXCHANGE, PROMISSORY NOTES AND CHECK

    OpenAIRE

    SILVIA - ELENA OLARU

    2011-01-01

    Right bills constituted a proper, solemn and formal training both bills of exchange, promissory notes or checks, but also in terms of bills receivable realization and autonomy is manifested in the sphere of application, and in priority and exclusivity of its incidence from common law, namely the Civil Procedure Code. Legal rules relating to bills of rights realization is a perfect rigorous regime. The special regime, derogating governing procedure execution quality bills is justified and bill...

  20. Parallel State Space Construction for Model-Checking

    OpenAIRE

    Garavel, Hubert; Mateescu, Radu; Smarandache, Irina

    2001-01-01

    The verification of concurrent finite-state systems by model-checking often requires to generate (a large part of) the state space of the system under analysis. Because of the state explosion problem, this may be a resource-consuming operation, both in terms of memory and CPU time. In this report, we aim at improving the performances of state space construction by using parallelization techniques. We present parallel algorithms for constructing state spaces (or Labeled Transition Systems) on ...

  1. Residential Landscape Water Check Programs: Exploring a Conservation Tool

    OpenAIRE

    Glenn, Diana T.

    2010-01-01

    In response to drought and regional growth in the arid western United States, urban water demand management is increasingly important. Single family residences use approximately 60% of their water consumption to irrigate landscapes often in excess of plant water requirements. This study utilized a quasi-experimental design to investigate outdoor water consumption and assess the effectiveness of a landscape water check conservation program. Study objectives included describing a contextualized...

  2. Correctness of Sensor Network Applications by Software Bounded Model Checking

    Science.gov (United States)

    Werner, Frank; Faragó, David

    We investigate the application of the software bounded model checking tool CBMC to the domain of wireless sensor networks (WSNs). We automatically generate a software behavior model from a network protocol (ESAWN) implementation in a WSN development and deployment platform (TinyOS), which is used to rigorously verify the protocol. Our work is a proof of concept that automatic verification of programs of practical size (≈ 21 000 LoC) and complexity is possible with CBMC and can be integrated into TinyOS. The developer can automatically check for pointer dereference and array index out of bound errors. She can also check additional, e.g., functional, properties that she provides by assume- and assert-statements. This experience paper shows that our approach is in general feasible since we managed to verify about half of the properties. We made the verification process scalable in the size of the code by abstraction (eg, from hardware) and by simplification heuristics. The latter also achieved scalability in data type complexity for the properties that were verifiable. The others require technical advancements for complex data types within CBMC's core.

  3. Assembly-line health check up in digitalized hospital.

    Science.gov (United States)

    Liu, Yalan; Yao, Bin; Zhang, Zigang

    2002-01-01

    The health check up flow of digital hospital can be consulted with the assembly line of industry factory. Because they have the following same features: highly specialized workstation, closeness and continuance, rhythm, balanced production, continuous production. The essential prerequisites are as the follows: The inspecting items and methods should be stable; advanced product mix and stable production design; standardized raw material, consumption, procedure, inspection method; there are lots of request for health inspection; the customers move at the least unit; the space arrangement should be reasonable; the time arrangement should be proportion. With the computer net, the digital inspection can achieves the raw material controlling accurately. The basis of check up line concerns about equipment, net and software, data collection, and personnel. The group technology is used in the health inspection flow design of the digital hospital in the field of items customers and zone redivided. The digital assembly linemic health inspect has the following stages: member registering, notice, check in, arrange order, time control, report, feedback and analysis. The assembly linemic has following advantages: increasing the productivity, the space utility, satisfaction of customer, fund returning, lowering the cost and ensuring the quality. PMID:12674786

  4. Assembly-Line Health Check up in Digitalized Hospital

    Institute of Scientific and Technical Information of China (English)

    刘雅兰; 姚斌; 张子刚

    2002-01-01

    Summary: The health check up flow of digital hospital can be consulted with the assembly line ofindustry factory. Because they have the following same features: highly specialized workstation,closeness and continuance, rhythm, balanced production, continuous production. The essentialprerequisites are as the follows: The inspecting items and methods should be stable; advancedproduct mix and stable production design; standardized raw material, consumption, procedure,inspection method; there are lots of request for health inspection; the customers move at the leastunit; the space arrangement should be reasonable; the time arrangement should be proportion.With the computer net, the digital inspection can achieves the raw material controlling accurately.The basis of check up line concerns about equipment, net and software, data collection, and per-sonnel. The group technology is used in the health inspection flow design of the digital hospital inthe field of items customers and zone redivided. The digital assembly linemic health inspect has thefollowing stages: member registering, notice, check in, arrange order, time control, report, feed-back and analysis. The assembly linemic has following advantages: increasing the productivity,the space utility, satisfaction of customer, fund returning, lowering the cost and ensuring thequality.

  5. Improved Trial Division Technique for Primality Checking in RSA Algorithm

    Directory of Open Access Journals (Sweden)

    Kumarjit Banerjee

    2012-07-01

    Full Text Available The RSA cryptosystem, invented by Ron Rivest, Adi Shamir and Len Adleman was first publicized in the August 1977 issue of Scientific American. The security level of this algorithm very much depends on two large prime numbers. To check the primality of large number in personal computer is huge time consuming using the best known trial division algorithm. The time complexity for primality testing has been reduced using the representation of divisors in the form of 6n±1. According to the fundamental theorem of Arithmetic, every number has unique factorization. So to check primality, it is sufficient to check if the number is divisible by any prime below the square root of the number. The set of divisors obtained by 6n±1 form representation contains many composites. These composite numbers have been reduced by 30k approach. In this paper, the number of composites has been further reduced using 210k approach. A performance analysis in time complexity has been given between 210k approach and other prior applied methods. It has been observed that the time complexity for primality testing has been reduced using 210k approach.

  6. SU8 diaphragm micropump with monolithically integrated cantilever check valves.

    Science.gov (United States)

    Ezkerra, Aitor; Fernández, Luis José; Mayora, Kepa; Ruano-López, Jesús Miguel

    2011-10-01

    This paper presents a SU8 unidirectional diaphragm micropump with embedded out-of-plane cantilever check valves. The device represents a reliable and low-cost solution for integration of microfluidic control in lab-on-a-chip devices. Its planar architecture allows monolithic definition of its components in a single step and potential integration with previously reported PCR, electrophoresis and flow-sensing SU8 microdevices. Pneumatic actuation is applied on a PDMS diaphragm, which is bonded to the SU8 body at wafer level, further enhancing its integration and mass production capabilities. The cantilever check valves move synchronously with the diaphragm, feature fast response (10ms), low dead volume (86nl) and a 94% flow blockage up to 300kPa. The micropump achieves a maximum flow rate of 177 μl min(-1) at 6 Hz and 200 kPa with an effective area of 10 mm(2). The device is reliable, self-priming and tolerant to particles and big bubbles. To the knowledge of the authors, this is the first micropump in SU8 with monolithically integrated cantilever check valves. PMID:21853192

  7. Check Point瞄准新的市场和方向%Check Point Aims at New Market and New Direction

    Institute of Scientific and Technical Information of China (English)

    白洁

    2007-01-01

    互联网安全解决方案供应商Check Point软件技术有限公司市场运营及技术服务副总裁Amnon Bar-Lev日前来京,他负责Checkpoint产品的全球销售、合作伙伴计划、国际市场营销以及技术服务管理。Bar-Lev表示,中国市场对安全方案的需求日益扩大,已经成为Check Point锁定的4大重点新兴市场之一,此外,该公司今后将以网络安全、数据安全及统一管理架构3个方面,进一步巩固Check Point在安全市场的领导地位。

  8. A magnetically driven PDMS micropump with ball check-valves

    Science.gov (United States)

    Pan, Tingrui; McDonald, Scott J.; Kai, Eleanor M.; Ziaie, Babak

    2005-05-01

    In this paper, we present a low-cost, PDMS-membrane micropump with two one-way ball check-valves for lab-on-a-chip and microfluidic applications. The micropump consists of two functional PDMS layers, one holding the ball check-valves and an actuating chamber, and the other covering the chamber and holding a miniature permanent magnet on top for actuation. An additional PDMS layer is used to cover the top magnet, and thereby encapsulate the entire device. A simple approach was used to assemble a high-performance ball check-valve using a micropipette and heat shrink tubing. The micropump can be driven by an external magnetic force provided by another permanent magnet or an integrated coil. In the first driving scheme, a small dc motor (6 mm in diameter and 15 mm in length) with a neodymium-iron-boron permanent magnet embedded in its shaft was used to actuate the membrane-mounted magnet. This driving method yielded a large pumping rate with very low power consumption. A maximum pumping rate of 774 µL min-1 for deionized water was achieved at the input power of 13 mW, the highest pumping rate reported in the literature for micropumps at such power consumptions. Alternatively, we actuated the micropump with a 10-turn planar coil fabricated on a PC board. This method resulted in a higher pumping rate of 1 mL min-1 for deionized water. Although more integratable and compact, the planar microcoil driving technique has a much higher power consumption.

  9. Functional consistency checking module for signal validation: Topical report

    International Nuclear Information System (INIS)

    This report discusses the basic principles of a functional consistency checking module for signal validation in nuclear plants. This module will add additional features to the signal validation system currently being designed at the University of Tennessee. The goals of the functional consistency module are to provide solutions to the common mode features and single or dual sensor failures. The basic principle lies in the comparison of the actual outputs and outputs derived from reference static or dynamics models. The only requirement needed for this method is that the plant must be decomposed into subsystems with observable inputs and outputs. The reference models can be either empirical or derived from physical laws. The main feature of this module is its capability to separate component failures from sensor failures. The failures which can be isolated are bias, drifts, absormal noise or changes in the dynamic sensor characteristics. The decision-making process relies basically on truth table look-up. The truth table contents are derived from an apriori knowledge of the failure causes. More elaborate decision making processes based on pattern recognition techniques or expert systems are proposed to improve the reliability of the decisions. A modified sequential probability ratio test is suggested to handle adequately the modeling errors. The proposed functional consistency checking is valid for both steady state and transient conditions. In the latter case, the transfer functions of the instrumentation channels must be taken into account for a fast and accurate failure identification. To conclude the report, anticipated benefits of the functional consistency checking are listed

  10. Mobile Attendance Checking System on Android Platform for Kazakhstani University

    Science.gov (United States)

    Saparkhojayev, N.; Shakhov, E.; Mailybayev, Y.

    2016-04-01

    In the 21st century-the century of Information Technology, it is difficult to imagine life without any gadgets: phones, tablets, computers, laptops, and so on. Today, smartphones and tablets are becoming popular, and thus their operating systems become popular too. Android is designed for low-power devices that run on battery power at full capacity, using all of its services, such as cameras, lights, GPS navigation, Wi-Fi, etc. In Kazakhstani universities, the process of checking students’ attendance is one of the important issues, because final grade evaluation of students is based on their total number of appearances and their grades during the whole semester. This raises the question of having some tool to control students’ attendance. There are many possible ways of controlling attendance: there are many examples when universities prefer to control attendance by the use of paper sheet, and some universities prefer to use two-stage way of controlling attendance: firstly, teachers and professors use paper sheet for checking students’ attendance and after this, they fill out these information into a system manually. However, this is not an efficient way since there will be spent much of time for calling students names and putting marks like “presence” or “absence” if the class is a lecture class, and in this class at least 5 groups are presented. Furthermore, some students may call his/her friend as “presence” nevertheless to the fact that this student is currently absent. After taking into consideration all these issues and the fact that many gadgets use Android platform, authors of the following research paper decided to create a mobile system that makes easier to check students’ attendance automatically, and this system is implemented in Almaty Management University, Kazakhstan. The system is based on Android platform, and in this paper, details of this system are presented.

  11. Astronaut Charles Conrad checks out Human Vestibular Function experiment

    Science.gov (United States)

    1973-01-01

    Astronaut Charles Conrad Jr., commander of the first manned Skylab mission, checks out the Human Vestibular Function, Experiment M131, during Skylab training at JSC. Conrad is in the work and experiments compartment of the crew quarters of the Skylab Orbital Workshop (OWS) trainer at JSC. The reference sphere with a magnetic rod is used by the astronaut to indicate body orientation non-visually. The litter chair in which he is seated can be rotated by a motor at its base or, when not being rotated, can tilt forward, backward or to either side.

  12. Model-Checking Linear-Time Properties of Quantum Systems

    CERN Document Server

    Ying, Mingsheng; Yu, Nengkun; Feng, Yuan

    2011-01-01

    We define a formal framework for reasoning about linear-time properties of quantum systems in which quantum automata are employed in the modeling of systems and certain closed subspaces of state (Hilbert) spaces are used as the atomic propositions about the behavior of systems. We provide an algorithm for verifying invariants of quantum automata. Then automata-based model-checking technique is generalized for the verification of safety properties recognizable by reversible automata and omega-properties recognizable by reversible Buechi automata.

  13. Halo White Dwarfs, Thick Disks and a Sanity Check

    OpenAIRE

    Hansen, Brad M. S.

    2001-01-01

    The discovery of a population of high proper motion white dwarfs by Oppenheimer et al (2001) has caused a lot of speculation as to the origin of these stars. I show that the age distribution of the white dwarfs offers a kind of sanity check in these discussions. In particular, this population appears to have a similar age distribution to those in the standard, thin disk white dwarf population. This is not what is expected for either the halo or thick disk, which are thought to be old populati...

  14. Stochastic Model Checking of the Stochastic Quality Calculus

    DEFF Research Database (Denmark)

    Nielson, Flemming; Nielson, Hanne Riis; Zeng, Kebin

    2015-01-01

    The Quality Calculus uses quality binders for input to express strategies for continuing the computation even when the desired input has not been received. The Stochastic Quality Calculus adds generally distributed delays for output actions and real-time constraints on the quality binders for inp...... based on stochastic model checking and we compute closed form solutions for a number of interesting scenarios. The analyses are applied to the design of an intelligent smart electrical meter of the kind to be installed in European households by 2020....

  15. An efficient decoding for low density parity check codes

    Science.gov (United States)

    Zhao, Ling; Zhang, Xiaolin; Zhu, Manjie

    2009-12-01

    Low density parity check (LDPC) codes are a class of forward-error-correction codes. They are among the best-known codes capable of achieving low bit error rates (BER) approaching Shannon's capacity limit. Recently, LDPC codes have been adopted by the European Digital Video Broadcasting (DVB-S2) standard, and have also been proposed for the emerging IEEE 802.16 fixed and mobile broadband wireless-access standard. The consultative committee for space data system (CCSDS) has also recommended using LDPC codes in the deep space communications and near-earth communications. It is obvious that LDPC codes will be widely used in wired and wireless communication, magnetic recording, optical networking, DVB, and other fields in the near future. Efficient hardware implementation of LDPC codes is of great interest since LDPC codes are being considered for a wide range of applications. This paper presents an efficient partially parallel decoder architecture suited for quasi-cyclic (QC) LDPC codes using Belief propagation algorithm for decoding. Algorithmic transformation and architectural level optimization are incorporated to reduce the critical path. First, analyze the check matrix of LDPC code, to find out the relationship between the row weight and the column weight. And then, the sharing level of the check node updating units (CNU) and the variable node updating units (VNU) are determined according to the relationship. After that, rearrange the CNU and the VNU, and divide them into several smaller parts, with the help of some assistant logic circuit, these smaller parts can be grouped into CNU during the check node update processing and grouped into VNU during the variable node update processing. These smaller parts are called node update kernel units (NKU) and the assistant logic circuit are called node update auxiliary unit (NAU). With NAUs' help, the two steps of iteration operation are completed by NKUs, which brings in great hardware resource reduction. Meanwhile

  16. Performance checking of an indigenously fabricated TIMS: evaluation of accuracy

    International Nuclear Information System (INIS)

    Performance checking of the indigenously fabricated multi-collector Thermal ionization mass spectrometer (TIMS) was continued prior to commissioning it for the determination of isotopic composition of plutonium. In an earlier paper, results of the precision obtained for Nd isotopes (142-146) were reported. Thereafter, a number of changes were made for improving the precision. In the present paper, results obtained for 235U/238U ratios for SRM standard are reported along with the results for precision and accuracy obtained by the TIMS

  17. Energy Audit Checks - A socioeconomic assessment; Energikartlaeggningscheckar - En samhaellsekonomisk utvaerdering

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-09-01

    This review is part of the Swedish Energy Agency's work with skills and methodology development on economic analyzes. The present socioeconomic analysis is the first of its kind to evaluate the current support for energy audit checks and is based on the instrument's purpose, goals and obstacles. Cost effectiveness is the main focus, as well as a description of the instrument's benefits and costs. The evaluation also aims to further develop the instrument in conjunction with the implementation of energy efficiency directive. Proposals for new instruments have however not been part of the mission.

  18. Android Security (Decompilation of APK File to Check Permissions

    Directory of Open Access Journals (Sweden)

    Hemant Bansal

    2016-01-01

    Full Text Available The world wide revolution in Android technology is changing our lives in term of the way we learn and use. Android Security fits into this because the technology has been around long enough and can provide various benefits for security in this area. The main objective of this paper is to Decompile the Android App And Check the permissions Used By That App (What The permissions any app is accessing Like reading messages, Using our internet data, reading our call logs. This Research Paper Helps Peoples To aware About the Un necessary Applications and Their Permissions That Are in Our Phone Stealing Our Credit Card details, secret details etc.

  19. Symbolic Game Semantics for Model Checking Program Families

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar

    this paper, we propose an efficient game semantics based approach for verifying open program families, i.e. program families with free (undefined) identifiers. We use symbolic representation of algorithmic game semantics, where concrete values are replaced with symbolic ones. In this way, we can...... compactly represent program families with infinite integers as so-called (finite-state) featured symbolic automata. Specifically designed model checking algorithms are then employed to verify safety of all programs from a family at once and pinpoint those programs that are unsafe (respectively, safe). We...

  20. Towards an Authorization Framework for App Security Checking

    OpenAIRE

    Hallett, Joseph; Aspinall, David

    2014-01-01

    Apps don't come with any guarantees that they are not malicious. This paper introduces a PhD project designing the authorization framework used for App Guarden. App Guarden is a new project that uses a exible assurance framework based on distribution of evidence, attestation and checking algorithms to make explicit why an app isn't dangerous and to allow users to describe how they want apps on their devices to behave. We use the SecPAL policy language to implement a device policy and give a b...

  1. Daily check of the electron beams with a diode system

    Energy Technology Data Exchange (ETDEWEB)

    Pilette, P. [Hospital Civil de Charleroi (Belgium). Centre for Radiotherapy

    1995-12-01

    A fast systems to check all the accelerator beams on a daily basis has been developed. A cheap home-made detector, based on non-medical diodes (type 1N5408), has been used since July 1992 to verify all the electron beams every day. The relative energy and Top-cGy correspondence is verified with one single irradiation of less than 1 minute by 6 diodes fixed in a polystyrene phantom. The principle of construction, software implementation and results are presented.

  2. Model Checking Data Consistency for Cache Coherence Protocols

    Institute of Scientific and Technical Information of China (English)

    Hong Pan; Hui-Min Lin; Yi Lv

    2006-01-01

    A method for automatic verification of cache coherence protocols is presented, in which cache coherence protocols are modeled as concurrent value-passing processes, and control and data consistency requirement are described as formulas in first-orderμ-calculus. A model checker is employed to check if the protocol under investigation satisfies the required properties. Using this method a data consistency error has been revealed in a well-known cache coherence protocol.The error has been corrected, and the revised protocol has been shown free from data consistency error for any data domain size, by appealing to data independence technique.

  3. Thermodynamic check calculation for the turboset of CEFR

    International Nuclear Information System (INIS)

    CEFR is the first sodium coolant fast reactor in China. The main function of the three loops is to transform the heat energy from the nuclear island to electricity energy. The turboset has completed three auxiliary steam impact tests and the grid-connected power generation test in 40% P0 working condition after installed and commissioned, but its rated power thermodynamic performance cannot be demonstrated at all times. By thermodynamic check calculation, this paper demonstrates that its capacity at rated power and gets its thermal economics. It also provides significant reference for the whole plant thermal equilibrium calculation of CEFR. (authors)

  4. Regenerable Microbial Check Valve - Life cycle tests results

    Science.gov (United States)

    Atwater, James E.; Wheeler, Richard R., Jr.; Olivadoti, J. T.; Sauer, Richard L.; Flanagan, David T.

    1992-01-01

    Life cycle regeneration testing of the Microbial Check Valve (MCV) that is used on the Shuttle Orbiter to provide microbial control of potable water is currently in progress. Four beds are being challenged with simulated reclaimed waters and repeatedly regenerated. Preliminary results indicate that contaminant systems exhibit unique regeneration periodicities. Cyclic throughput diminishes with increasing cumulative flow. It is considered to be feasible to design a regenerable MCV system which will function without human intervention and with minimal resupply penalty for the 30 year life of the Space Station.

  5. 76 FR 69287 - National Instant Criminal Background Check System Section Agency Information Collection...

    Science.gov (United States)

    2011-11-08

    ... Criminal Justice Information Services (CJIS) Division's National Instant Criminal Background Check System... Federal Bureau of Investigation National Instant Criminal Background Check System Section Agency... Sherry L. Kuneff, Management and Program Analyst, FBI, Criminal Justice Information Services...

  6. Tester automatically checks insulation of individual conductors in multiple-strand cables

    Science.gov (United States)

    Shaw, J.; Vuckovich, M.

    1967-01-01

    Insulation tester checks multiple-strand electrical cables in nuclear rocket reactors. It has both manual and automatic capabilities and can check the insulation of a cable with 200 or more conductors in a few minutes.

  7. The research of the stud bolt bore checking equipment of the nuclear reactor pressure vessel

    International Nuclear Information System (INIS)

    This article introduces a kind of new equipment that can work under the environment of high radiation and can-automaticly check the main stud bolt bore. The technical parameters and key techniques of the checking equipment are presented. (authors)

  8. Model Checking Degrees of Belief in a System of Agents

    Science.gov (United States)

    Raimondi, Franco; Primero, Giuseppe; Rungta, Neha

    2014-01-01

    Reasoning about degrees of belief has been investigated in the past by a number of authors and has a number of practical applications in real life. In this paper we present a unified framework to model and verify degrees of belief in a system of agents. In particular, we describe an extension of the temporal-epistemic logic CTLK and we introduce a semantics based on interpreted systems for this extension. In this way, degrees of beliefs do not need to be provided externally, but can be derived automatically from the possible executions of the system, thereby providing a computationally grounded formalism. We leverage the semantics to (a) construct a model checking algorithm, (b) investigate its complexity, (c) provide a Java implementation of the model checking algorithm, and (d) evaluate our approach using the standard benchmark of the dining cryptographers. Finally, we provide a detailed case study: using our framework and our implementation, we assess and verify the situational awareness of the pilot of Air France 447 flying in off-nominal conditions.

  9. Model checking as an aid to procedure design

    International Nuclear Information System (INIS)

    The OECD Halden Reactor Project has been actively working on computer assisted operating procedures for many years. The objective of the research has been to provide computerised assistance for procedure design, verification and validation, implementation and maintenance. For the verification purpose, the application of formal methods has been considered in several reports. The recent formal verification activity conducted at the Halden Project is based on using model checking to the verification of procedures. This report presents verification approaches based on different model checking techniques and tools for the formalization and verification of operating procedures. Possible problems and relative merits of the different approaches are discussed. A case study of one of the approaches is presented to show the practical application of formal verification. Application of formal verification in the traditional procedure design process can reduce the human resources involved in reviews and simulations, and hence reduce the cost of verification and validation. A discussion of the integration of the formal verification with the traditional procedure design process is given at the end of this report. (Author)

  10. SoS contract verification using statistical model checking

    Directory of Open Access Journals (Sweden)

    Alessandro Mignogna

    2013-11-01

    Full Text Available Exhaustive formal verification for systems of systems (SoS is impractical and cannot be applied on a large scale. In this paper we propose to use statistical model checking for efficient verification of SoS. We address three relevant aspects for systems of systems: 1 the model of the SoS, which includes stochastic aspects; 2 the formalization of the SoS requirements in the form of contracts; 3 the tool-chain to support statistical model checking for SoS. We adapt the SMC technique for application to heterogeneous SoS. We extend the UPDM/SysML specification language to express the SoS requirements that the implemented strategies over the SoS must satisfy. The requirements are specified with a new contract language specifically designed for SoS, targeting a high-level English- pattern language, but relying on an accurate semantics given by the standard temporal logics. The contracts are verified against the UPDM/SysML specification using the Statistical Model Checker (SMC PLASMA combined with the simulation engine DESYRE, which integrates heterogeneous behavioral models through the functional mock-up interface (FMI standard. The tool-chain allows computing an estimation of the satisfiability of the contracts by the SoS. The results help the system architect to trade-off different solutions to guide the evolution of the SoS.

  11. Model-checking techniques based on cumulative residuals.

    Science.gov (United States)

    Lin, D Y; Wei, L J; Ying, Z

    2002-03-01

    Residuals have long been used for graphical and numerical examinations of the adequacy of regression models. Conventional residual analysis based on the plots of raw residuals or their smoothed curves is highly subjective, whereas most numerical goodness-of-fit tests provide little information about the nature of model misspecification. In this paper, we develop objective and informative model-checking techniques by taking the cumulative sums of residuals over certain coordinates (e.g., covariates or fitted values) or by considering some related aggregates of residuals, such as moving sums and moving averages. For a variety of statistical models and data structures, including generalized linear models with independent or dependent observations, the distributions of these stochastic processes tinder the assumed model can be approximated by the distributions of certain zero-mean Gaussian processes whose realizations can be easily generated by computer simulation. Each observed process can then be compared, both graphically and numerically, with a number of realizations from the Gaussian process. Such comparisons enable one to assess objectively whether a trend seen in a residual plot reflects model misspecification or natural variation. The proposed techniques are particularly useful in checking the functional form of a covariate and the link function. Illustrations with several medical studies are provided. PMID:11890304

  12. Generalized Symbolic Execution for Model Checking and Testing

    Science.gov (United States)

    Khurshid, Sarfraz; Pasareanu, Corina; Visser, Willem; Kofmeyer, David (Technical Monitor)

    2003-01-01

    Modern software systems, which often are concurrent and manipulate complex data structures must be extremely reliable. We present a novel framework based on symbolic execution, for automated checking of such systems. We provide a two-fold generalization of traditional symbolic execution based approaches: one, we define a program instrumentation, which enables standard model checkers to perform symbolic execution; two, we give a novel symbolic execution algorithm that handles dynamically allocated structures (e.g., lists and trees), method preconditions (e.g., acyclicity of lists), data (e.g., integers and strings) and concurrency. The program instrumentation enables a model checker to automatically explore program heap configurations (using a systematic treatment of aliasing) and manipulate logical formulae on program data values (using a decision procedure). We illustrate two applications of our framework: checking correctness of multi-threaded programs that take inputs from unbounded domains with complex structure and generation of non-isomorphic test inputs that satisfy a testing criterion. Our implementation for Java uses the Java PathFinder model checker.

  13. Assertion checking environment (ACE) for formal verification of C programs

    International Nuclear Information System (INIS)

    In this paper we describe an Assertion Checking Environment (ACE) for compositional verification of programs, which are written in an industrially sponsored safe subset of C programming language called MISRA C [Guidelines for the Use of the C Language in Vehicle Based Software, 1998]. The theory is based on Hoare logic [Commun. ACM 12 (1969) 576] and the C programs are verified using static assertion checking technique. First the functional specifications of the program, captured in the form of pre- and post-conditions for each C function, are derived from the specifications. These pre- and post-conditions are then introduced as assertions (also called annotations or formal comments) in the program code. The assertions are then proved formally using ACE and theorem proving tool called Stanford Temporal Prover [The Stanford Temporal Prover User's Manual, 1998]. ACE has been developed by us and consists mainly of a translator c2spl, a GUI and some utility programs. The technique and tools developed are targeted towards verification of real-time embedded software

  14. Reasoning About Strategies: On the Model-Checking Problem

    CERN Document Server

    Mogavero, Fabio; Perelli, Giuseppe; Vardi, Moshe Y

    2011-01-01

    In open systems verification, to formally check for reliability, one needs an appropriate formalism to model the interaction between agents and express the correctness of the system no matter how the environment behaves. An important contribution in this context is given by modal logics for strategic ability, in the setting of multi-agent games, such as ATL, ATL*, and the like. Recently, Chatterjee, Henzinger, and Piterman introduced Strategy Logic (CHP-SL), with the aim of getting a powerful framework for reasoning explicitly about strategies. CHP-SL is obtained by using first-order quantifications over strategies and it has been investigated in the setting of two-agents turned-based games, where a non-elementary model-checking algorithm has been provided. While CHP-SL is a very expressive logic, we claim that it does not fully capture the strategic aspects of multi-agent systems. In this paper, we introduce and study a more general strategy logic, denoted SL, for reasoning about strategies in multi-agent co...

  15. 75 FR 24796 - FBI Records Management Division National Name Check Program Section User Fees

    Science.gov (United States)

    2010-05-06

    ... and related cost models based upon the concept and principles of activity-based costing (ABC). The...-based background checks conducted by the National Name Check Program (NNCP) of the Records Management... FBI's statutory authority to establish and collect fees for named-based NNCP checks and...

  16. The Effects of Check, Connect, and Expect on Behavioral and Academic Growth

    Science.gov (United States)

    McDaniel, Sara C.; Houchins, David E.; Robinson, Cecil

    2016-01-01

    "Check, Connect, and Expect" (CCE) is a secondary tier behavioral intervention that provides students with levels of support including a dedicated "coach" for check-in and check-out procedures, and social skills instruction. Elementary students (n = 22) in an alternative education school setting received CCE for 13 weeks…

  17. Combining Decision Diagrams and SAT Procedures for Efficient Symbolic Model Checking

    DEFF Research Database (Denmark)

    Williams, Poul Frederick; Biere, Armin; Clarke, Edmund M.;

    2000-01-01

    , combined with BDDs and SAT-solvers to perform satisfiability checking. As a result we are able to model check systems for which standard BDD-based methods fail. For example, we model check a liveness property of a 256 bit shift-and-add multiplier and we are able to find a previously undetected bug...

  18. 42 CFR 457.216 - Treatment of uncashed or canceled (voided) CHIP checks.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Treatment of uncashed or canceled (voided) CHIP... canceled (voided) CHIP checks. (a) Purpose. This section provides rules to ensure that States refund the... section— Canceled (voided) check means an CHIP check issued by a State or fiscal agent that prior to...

  19. Learn & Check - Integration von Wissenserwerb und Wissenskontrolle [10] [

    Directory of Open Access Journals (Sweden)

    Krammer, Sandra

    2006-02-01

    Full Text Available [english] The acquisition of knowledge with subsequent automatic check makes learning more effective. A learning environment is presented which follows these paradigms and integrates learning objects in the form of information units and exercise units. The learning objects are primarily sequentially arranged and summarised hierarchically into chapters; however, they can also be interlinked via metadata. A number of different types of quiz questions are available for the exercise units. The learner can work on the components of a course in a variety of modes. In the learning mode only the information units are seen, in the practice mode the practice units can be seen as well. In the drill mode, only those practice units can be worked upon which have previously been answered incorrectly. The complete learning contents are represented in XML in order to achieve a division between content, representation and sequential control. The implementation architecture allows for the efficient generation of web version and single-position version of the learning environment. On the basis of Learn & Check, a variety of learning systems were developed which are used in medical training curricular: for neurological liquor-diagnostics and for the subject "basics of medicine". [german] Wissenserwerb mit anschließender Selbstkontrolle macht Lernen effektiver. Es wird eine Lernumgebung vorgestellt, die diesem Paradigma folgt und Lernobjekte in Form von Informationseinheiten und Übungseinheiten integriert. Die Lernobjekte sind primär sequentiell angeordnet und hierarchisch zu Kapiteln zusammengefasst, sie können aber auch über Metadaten vernetzt werden. Für die Übungseinheiten stehen verschiedene Quizfragentypen zur Verfügung. Der Lerner kann die Teile eines Kurses in unterschiedlichen Modi bearbeiten. Im Lernmodus werden nur die Informationseinheiten gesehen, im Übungsmodus zusätzlich die Übungseinheiten. Im Paukmodus können nur die

  20. Check-hybrid GLDPC Codes: Systematic Elimination of Trapping Sets and Guaranteed Error Correction Capability

    OpenAIRE

    Ravanmehr, Vida; Khatami, Mehrdad; Declercq, David; Vasic, Bane

    2016-01-01

    In this paper, we propose a new approach to construct a class of check-hybrid generalized low-density parity-check (CH-GLDPC) codes which are free of small trapping sets. The approach is based on converting some selected check nodes involving a trapping set into super checks corresponding to a 2-error correcting component code. Specifically, we follow two main purposes to construct the check-hybrid codes; first, based on the knowledge of the trapping sets of the global LDPC code, single parit...

  1. Quality checking task force destructive testing of active waste forms

    International Nuclear Information System (INIS)

    The implications of sampling and testing of full size active packages of intermediate level wastes are summarised in this report. Sampling operations are technically feasible but a major difficulty will be the disposal of secondary waste. A literature survey indicated that destructive testing of wasteforms is not carried out as a routine operation in Europe or the USA. (author)

  2. Using Model Checking for Analyzing Distributed Power Control Problems

    Directory of Open Access Journals (Sweden)

    Thomas Brihaye

    2010-01-01

    Full Text Available Model checking (MC is a formal verification technique which has been known and still knows a resounding success in the computer science community. Realizing that the distributed power control (PC problem can be modeled by a timed game between a given transmitter and its environment, the authors wanted to know whether this approach can be applied to distributed PC. It turns out that it can be applied successfully and allows one to analyze realistic scenarios including the case of discrete transmit powers and games with incomplete information. The proposed methodology is as follows. We state some objectives a transmitter-receiver pair would like to reach. The network is modeled by a game where transmitters are considered as timed automata interacting with each other. The objectives are then translated into timed alternating-time temporal logic formulae and MC is exploited to know whether the desired properties are verified and determine a winning strategy.

  3. Check of OH rotational temperature using an interferometric method

    International Nuclear Information System (INIS)

    This paper presents an interferometric method used to check the rotational temperature of the OH free radical obtained using emission spectroscopy. The temperature is extracted from an interferogram via the phase shifting introduced by the refractive index of the studied medium. The refractive index is related to the temperature through the Gladstone-Dale equation and the ideal gas law. The method is tested on the laminar premixed flame of an oxy-acetylene burner and on the laminar plume of a dc argon plasma torch. The results obtained are compared with those obtained from the UV OH band at 306.357 nm (transition A2Σ, ν = 0 → X2Π, ν' = 0) by emission spectroscopy using the Boltzmann plot method and using a method based on numerical simulated spectra with the amplitude ratios of groups of unresolved rotational lines

  4. Routine health check-ups of unemployed in Norway.

    Science.gov (United States)

    Ytterdahl, T

    1999-01-01

    In 1994 all the 273 long-term unemployed in the municipality Lillesand, Norway were invited to participate in a proactive health care program. 229 were included in the program, consisting of a medical examination by a general practitioner, councelling, personal support and referrals. The job-loss aroused lots of negative emotions, mostly defensive feelings and resignations, which are likely to reduce self-esteem and coping ability. The prevalence of somatoform symptoms and anxiety was twice as high as in the normal population, and for depression the prevalence was three times higher. 24% of the unemployed were referred to further examination. Invitation to a health examination may be the ticket of entry for revealing some of the concealed morbidity among long-term unemployed. Health check-ups of unemployed will probably be very cost-effective PMID:10197474

  5. A Formal Verification Methodology for Checking Data Integrity

    CERN Document Server

    Umezawa, Yasushi

    2011-01-01

    Formal verification techniques have been playing an important role in pre-silicon validation processes. One of the most important points considered in performing formal verification is to define good verification scopes; we should define clearly what to be verified formally upon designs under tests. We considered the following three practical requirements when we defined the scope of formal verification. They are (a) hard to verify (b) small to handle, and (c) easy to understand. Our novel approach is to break down generic properties for system into stereotype properties in block level and to define requirements for Verifiable RTL. Consequently, each designer instead of verification experts can describe properties of the design easily, and formal model checking can be applied systematically and thoroughly to all the leaf modules. During the development of a component chip for server platforms, we focused on RAS (Reliability, Availability, and Serviceability) features and described more than 2000 properties in...

  6. Shuttle Atlantis is used for Safe Haven fit check

    Science.gov (United States)

    2000-01-01

    Shuttle Atlantis, with twin solid rocket boosters and external tank atop the Mobile Launcher Platform and Crawler-Transporter, inches toward high bay 2, on the west side, in the Vehicle Assembly Building (VAB). For the first time in Space Shuttle history, a fully stacked Shuttle is moving into the bay. The VAB and nearby rock-paved crawlerway have recently undergone major modifications to provide Shuttle flight hardware more storage space and protection '''Safe Haven''' - from hurricanes or tropical storms. Atlantis began moving out of VAB high bay 1 on the east side at 2:59 a.m. EDT. After the successful Safe Haven fit check, Shuttle Atlantis is scheduled to roll out to Launch Pad 39B in preparation for the STS-106 launch on Sept. 8.

  7. A Succinct Approach to Static Analysis and Model Checking

    DEFF Research Database (Denmark)

    Filipiuk, Piotr

    In a number of areas software correctness is crucial, therefore it is often desirable to formally verify the presence of various properties or the absence of errors. This thesis presents a framework for concisely expressing static analysis and model checking problems. The framework facilitates...... guarantees that there always is single best solution for a problem under consideration. We also develop a solving algorithm, based on a dierential worklist, that computes the least solution guaranteed by the Moore Family result. Furthermore, we present a logic for specifying analysis problems called Layered...... Fixed Point Logic. Its most prominent feature is the direct support for both inductive computations of behaviors as well as co-inductive specications of properties. Two main theoretical contributions are a Moore Family result and a parametrized worst-case time complexity result. We develop a BDD...

  8. Analysis of the Security of BB84 by Model Checking

    CERN Document Server

    Elboukhari, Mohamed; Azizi, Abdelmalek; 10.5121/ijnsa.2010.2207

    2010-01-01

    Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was noted that quantum computers could break public key cryptosystems based on number theory extensive studies have been undertaken on QKD. Based on quantum mechanics, QKD offers unconditionally secure communication. Now, the progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years. Efforts are made to improve the performance and reliability of the implemented technologies. But several challenges remain despite this big progress. The task of how to test the apparatuses of QKD For example did not yet receive enough attention. These devises become complex and demand a big verification effort. In this paper we are interested in an approach based on the technique of probabilistic model checking for studying quantum information. Precisely, we use the PRISM tool to analyze ...

  9. Neurology check list. 5. rev. and enl. ed.; Checkliste Neurologie

    Energy Technology Data Exchange (ETDEWEB)

    Grehl, Holger [Evangelisches und Johanniter Klinikum, Duisburg (Germany). Neurologische Klinik; Reinhardt, Frank

    2013-02-01

    The neurology check list covers the following issues, organized in four parts: Grey part - diagnostic fundamentals, therapeutic principles: clinical neurological examination, liquor puncture, specific laboratory diagnostics, neurophysical diagnostics, imaging techniques, therapeutic principles, legal aspects, neurological assessment. Green Part - leading syndromes and leading symptoms. Blue part - neurological disease appearance: pains in head and face, pain syndrome, congenital and development disturbances, liquor circulation disturbances, ZNS hemorrhages, tumors and neoplasm, paraneoplastic syndromes, inflammatory diseases of the nervous system, dementia diseases, metabolic and other encephalopathy, cerebellum diseases and system surmounting processes, movement degeneration, basal ganglion diseases, epilepsy, non-epileptic attacks, medulla diseases, brain nerve diseases, plexus lesions, radicular lesions, peripheric neuropathy, neuromuscular transfer disturbances, muscular diseases. Red part: neurological intensive medicine.

  10. LHCb: Analysing DIRAC's Behavior using Model Checking with Process Algebra

    CERN Multimedia

    Remenska, Daniela

    2012-01-01

    DIRAC is the Grid solution designed to support LHCb production activities as well as user data analysis. Based on a service-oriented architecture, DIRAC consists of many cooperating distributed services and agents delivering the workload to the Grid resources. Services accept requests from agents and running jobs, while agents run as light-weight components, fulfilling specific goals. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check for changes in the service states, and react to these accordingly. A characteristic of DIRAC's architecture is the relatively low complexity in the logic of each agent; the main source of complexity lies in their cooperation. These agents run concurrently, and communicate using the services' databases as a shared memory for synchronizing the state transitions. Although much effort is invested in making DIRAC reliable, entities occasionally get into inconsistent states, leadi...

  11. Checking the Quality of Clinical Guidelines using Automated Reasoning Tools

    CERN Document Server

    Hommersom, Arjen; van Bommel, Patrick

    2008-01-01

    Requirements about the quality of clinical guidelines can be represented by schemata borrowed from the theory of abductive diagnosis, using temporal logic to model the time-oriented aspects expressed in a guideline. Previously, we have shown that these requirements can be verified using interactive theorem proving techniques. In this paper, we investigate how this approach can be mapped to the facilities of a resolution-based theorem prover, Otter, and a complementary program that searches for finite models of first-order statements, Mace. It is shown that the reasoning required for checking the quality of a guideline can be mapped to such fully automated theorem-proving facilities. The medical quality of an actual guideline concerning diabetes mellitus 2 is investigated in this way.

  12. Use of statistical checks as maintenance tools for TLD readers

    International Nuclear Information System (INIS)

    Although the values of different parameters may remain within permissible limits during the operation of a thermoluminescent dosemeter (TLD) reader, certain effects can become apparent only when a long-term followup of these parameters is performed. In order to ensure an accurate and reliable operation of a TLD reader, the system characteristics must be monitored continuously. Long-term statistical checks of key system parameters may give a broader insight into the operational characteristics of the TLD reader and may help for proper maintenance of the system. The photomultipliers noise, the internal reference light source stability and the A to D reference voltage were found to be critical parameters, which have a major influence on the accuracy and stability of the system. A followup of these parameters for a period of about 10 y is presented, and some problems are seen to be reflected in the distributions. (authors)

  13. DEPUTY:Analysing Architectural Structures and Checking Style

    Institute of Scientific and Technical Information of China (English)

    D.Gorshkov; J.P.Wellisch

    2001-01-01

    The DepUty(dependencies utility)can be classified as a project and process management tool.The main goal of DepUty is to assist by means of source code analysis and graphical representation using UML,in understanding dependencies of sub-systems and packages in CMS object Oriented software,to understand architectureal structure,and to schedule code release in modularised integration.It also allows a new-comer to more easily understand the global structure, of CMS software,and to void circular dependencies up-front or re-factor the code,in case it was already too close to the edge of non-maintainability.We will discuss the various views DepUty provides to analyse package dependencies and illustrate both the metrics and style checking facilities it provides.

  14. Model-checking dense-time Duration Calculus

    DEFF Research Database (Denmark)

    Fränzle, Martin

    2004-01-01

    Since the seminal work of Zhou Chaochen, M. R. Hansen, and P. Sestoft on decidability of dense-time Duration Calculus [Zhou, Hansen, Sestoft, 1993] it is well-known that decidable fragments of Duration Calculus can only be obtained through withdrawal of much of the interesting vocabulary of this...... logic. While this was formerly taken as an indication that key-press verification of implementations with respect to elaborate Duration Calculus specifications were also impossible, we show that the model property is well decidable for realistic designs which feature natural constraints on their...... suitably sparser model classes we obtain model-checking procedures for rich subsets of Duration Calculus. Together with undecidability results also obtained, this sheds light upon the exact borderline between decidability and undecidability of Duration Calculi and related logics....

  15. Constraint-based deadlock checking of high-level specifications

    DEFF Research Database (Denmark)

    Hallerstede, Stefan; Leuschel, Michael

    2011-01-01

    Establishing the absence of deadlocks is important in many applications of formal methods. The use of model checking for finding deadlocks in formal models is limited because in many industrial applications the state space is either infinite or much too large to be explored exhaustively....... In this paper we propose a constraint-based approach to finding deadlocks employing the ProB constraint solver to find values for the constants and variables of formal models that describe a deadlocking state. We present the general technique, as well as various improvements that had to be performed on Pro......B's Prolog kernel, such as reification of membership and arithmetic constraints. ProB typically finds counter examples to deadlock-freedom constraints, a formula of about 900 partly nested conjunctions and disjunction among them 80 arithmetic and 150 set-theoretic predicates (in total a formula of 30 pages...

  16. Application of function generator for checking reactivity meter accuracy

    International Nuclear Information System (INIS)

    The accuracy of reactivity meters is usually checked with a reactor kinetic simulator operating to an accuracy exceeding the expected accuracy of the measuring device. The present report describes a method to evaluate accuracy by comparing the response R(t) of the reactivity meter to a given function n(t) with the value of the reactivity function r(t) calculated from the same input function instead of using the input reference signal r(t) to the simulator with the output signal R(t) from the reactivity meter. This method has been successfully used by applying sawtooth and exponential input signals for the determination of the accuracy of reactivity meters developed in the Central Research Institute for Physics. (author)

  17. Technophobia, prescription checking and the future of diabetes management.

    Science.gov (United States)

    Albisser, A M

    2009-06-01

    Is the medical prescription the root cause of the long-term complications of diabetes mellitus? This article presents the argument for introducing prescription checking into diabetes disease management. It discusses an evidence-based need for frequent revisions of the medical prescription as the key to preventing treatment-related complications in diabetes while achieving the now mandated standards in patient care. To do this it will be prudent for diabetes healthcare providers to enrich their clinical services with new information technology-based tools. These are easily acquired by participating in professional workshops focused on advanced diabetes management. In this light, the case presented here challenges leading practitioners to become early participants in the evolution of information technology that will ultimately enhance the management of all patients with diabetes. PMID:19357829

  18. SimCheck: An Expressive Type System for Simulink

    Science.gov (United States)

    Roy, Pritam; Shankar, Natarajan

    2010-01-01

    MATLAB Simulink is a member of a class of visual languages that are used for modeling and simulating physical and cyber-physical systems. A Simulink model consists of blocks with input and output ports connected using links that carry signals. We extend the type system of Simulink with annotations and dimensions/units associated with ports and links. These types can capture invariants on signals as well as relations between signals. We define a type-checker that checks the wellformedness of Simulink blocks with respect to these type annotations. The type checker generates proof obligations that are solved by SRI's Yices solver for satisfiability modulo theories (SMT). This translation can be used to detect type errors, demonstrate counterexamples, generate test cases, or prove the absence of type errors. Our work is an initial step toward the symbolic analysis of MATLAB Simulink models.

  19. Cross-checking different sources of mobility information

    CERN Document Server

    Lenormand, Maxime; Cantu-Ros, Oliva G; Tugores, Antonia; Louail, Thomas; Herranz, Ricardo; Barthelemy, Marc; Frias-Martinez, Enrique; Ramasco, Jose J

    2014-01-01

    The pervasive use of new mobile devices has allowed a better characterization in space and time of human concentrations and mobility in general. Besides its theoretical interest, describing mobility is of great importance for a number of practical applications ranging from the forecast of disease spreading to the design of new spaces in urban environments. While classical data sources, such as surveys or census, have a limited level of geographical resolution (e.g., districts, municipalities, counties are typically used) or are restricted to generic workdays or weekends, the data coming from mobile devices can be precisely located both in time and space. Most previous works have used a single data source to study human mobility patterns. Here we perform instead a cross-check analysis by comparing results obtained with data collected from three different sources: Twitter, census and cell phones. The analysis is focused on the urban areas of Barcelona and Madrid, for which data of the three types is available. ...

  20. Constraint-Based Deadlock Checking of High-Level Specifications

    CERN Document Server

    Hallerstede, Stefan

    2011-01-01

    Establishing the absence of deadlocks is important in many applications of formal methods. The use of model checking for finding deadlocks in formal models is often limited. In this paper we propose a constraint-based approach to finding deadlocks employing the ProB constraint solver. We present the general technique, as well as various improvements that had to be performed on ProB's Prolog kernel, such as reification of membership and arithmetic constraints. This work was guided by an industrial case study, where a team from Bosch was modeling a cruise control system. Within this case study, ProB was able to quickly find counter examples to very large deadlock-freedom constraints. In the paper, we also present other successful applications of this new technique. Experiments using SAT and SMT solvers on these constraints were thus far unsuccessful.

  1. Applying Model Checking to Industrial-Sized PLC Programs

    CERN Document Server

    AUTHOR|(CDS)2079190; Darvas, Daniel; Blanco Vinuela, Enrique; Tournier, Jean-Charles; Bliudze, Simon; Blech, Jan Olaf; Gonzalez Suarez, Victor M

    2015-01-01

    Programmable logic controllers (PLCs) are embedded computers widely used in industrial control systems. Ensuring that a PLC software complies with its specification is a challenging task. Formal verification has become a recommended practice to ensure the correctness of safety-critical software but is still underused in industry due to the complexity of building and managing formal models of real applications. In this paper, we propose a general methodology to perform automated model checking of complex properties expressed in temporal logics (\\eg CTL, LTL) on PLC programs. This methodology is based on an intermediate model (IM), meant to transform PLC programs written in various standard languages (ST, SFC, etc.) to different modeling languages of verification tools. We present the syntax and semantics of the IM and the transformation rules of the ST and SFC languages to the nuXmv model checker passing through the intermediate model. Finally, two real cases studies of \\CERN PLC programs, written mainly in th...

  2. Methods to model-check parallel systems software.

    Energy Technology Data Exchange (ETDEWEB)

    Matlin, O. S.; McCune, W.; Lusk, E.

    2003-12-15

    We report on an effort to develop methodologies for formal verification of parts of the Multi-Purpose Daemon (MPD) parallel process management system. MPD is a distributed collection of communicating processes. While the individual components of the collection execute simple algorithms, their interaction leads to unexpected errors that are difficult to uncover by conventional means. Two verification approaches are discussed here: the standard model checking approach using the software model checker SPIN and the nonstandard use of a general-purpose first-order resolution-style theorem prover OTTER to conduct the traditional state space exploration. We compare modeling methodology and analyze performance and scalability of the two methods with respect to verification of MPD.

  3. Checking the new IRI model The bottomside B parameters

    CERN Document Server

    Mosert, M; Ezquer, R; Lazo, B; Miro, G

    2002-01-01

    Electron density profiles obtained at Pruhonice (50.0, 15.0), El Arenosillo (37.1, 353.2) and Havana (23, 278) were used to check the bottom-side B parameters BO (thickness parameter) and B1 (shape parameter) predicted by the new IRI - 2000 version. The electron density profiles were derived from ionograms using the ARP technique. The data base includes daytime and nighttime ionograms recorded under different seasonal and solar activity conditions. Comparisons with IRI predictions were also done. The analysis shows that: a) The parameter B1 given by IRI 2000 reproduces better the observed ARP values than the IRI-90 version and b) The observed BO values are in general well reproduced by both IRI versions: IRI-90 and IRI-2000.

  4. Using Hybrid Decision Tree -Houph Transform Approach For Automatic Bank Check Processing

    Directory of Open Access Journals (Sweden)

    Heba A. Elnemr

    2012-05-01

    Full Text Available One of the first steps in the realization of an automatic system of bank check processing is the automatic classification of checks and extraction of handwritten area. This paper presents a new hybrid method which couple together the statistical color histogram features, the entropy, the energy and the Houph transform to achieve the automatic classification of checks as well as the segmentation and recognition of the various information on the check. The proposed method relies on two stages. First, a two-step classification algorithm is implemented. In the first step, a decision classification tree is built using the entropy, the energy, the logo location and histogram features of colored bank checks. These features are used to classify checks into several groups. Each group may contain one or more type of checks. Therefore, in the second step the bank logo or bank name are matched against its stored template to identify the correct prototype. Second, Hough transform is utilized to detect lines in the classified checks. These lines are used as indicator to the bank check fields. A group of experiments is performed showing that the proposed technique is promising as regards classifying the bank checks and extracting the important fields in that check.

  5. Comparative evaluation of Map-Check and Arc-Check for dosimetric verification in patients treaties with IMRT; Evaluacion comparativa de MapCHECK y ArcCHECK para verificacion dosimetrica en pacientes tratados con IMRT

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, B.; Marquina, J.; Ramirez, J.; Gonzales, A., E-mail: bertha.garcia@aliada.com.pe [ALIADA, Oncologia Integral, Av. Jose Galvez Barrenechea 1044, San Isidro, Lima 27 (Peru)

    2014-08-15

    The dosimetric controls that are realized to the patients in the Intensity-Modulated Radiation Therapy (IMRT) and Volumetric Modulated Arc Therapy (VMAT) techniques; are indispensable since allows in real time to verify the quantity of imparted dose to the patient, these controls should be carried out every time that will begin a treatment, because these techniques impart dose dynamically modulating the dose intensity and movements of the Multi leaf Collimator (MLC), for they exist different diodes devices prepared in spiral (3-D) and planar form (2-D); that allows to estimate the dose fluence in a certain area. Treatment studies for head and neck with IMRT were compared regarding the reading average carried out by the diodes in the corresponding areas, using the criteria of the gamma index like dose difference 3% or 3m m of distance for both diode arrangements, in the IMRT case was found in Arc-Check a minor difference of 3/3 for an average of 99.37% of read diodes in a correct way contrary to the reading obtained with the Map-Check 3/3 an average of difference of 96.19%; in IMRT the difference was lower due to different factors like sensibility of the diodes reading, resolution, diodes disposition, as well as the average reading of entrance and exit of the radiation beams. Within the parameters delivered by the diodes arrangement is considered the positioning correction for both acceptance indexes like the gamma factor and the Distance-to-agreement (Dta), the existent difference of reading in factor gamma and Dta fundamentally is the way in like they compare the dose distribution; the Gamma uses dose averages of high and low gradients and Dta use only averages of areas of high gradients between the nearest points giving the distance as a result among the distribution point and the nearest point what makes stricter. (Author)

  6. A conceptual model of check dam hydraulics for gully control

    Directory of Open Access Journals (Sweden)

    C. Castillo

    2013-09-01

    Full Text Available There is little information in scientific literature regarding the modifications induced by check dam systems in flow regimes in restored gully reaches, despite it being a crucial issue for the design of conservation measures. Here, we develop a conceptual model to classify flow regimes in straight rectangular channels for initial and dam-filling conditions as well as a method of estimating efficiency in order to provide guidelines for optimal design. The model integrates several previous mathematical approaches for assessing the main processes involved (hydraulic jump HJ, impact flow, gradually varied flows. Its performance was compared with the simulations obtained from IBER, a bi-dimensional hydrodynamic model. The impact of check dam spacing (defined by the geometric factor of influence c on efficiency was explored. Eleven main classifications of flow regimes were identified depending on the element and level of influence. The model produced similar results when compared with IBER, but led to higher estimations of HJ and impact lengths. Total influence guaranteed maximum efficiency and HJ control defining the location of the optimal c. Geometric total influence (c = 1 was a valid criterion for the different stages of the structures in a wide range of situations provided that hydraulic roughness conditions remained high within the gully, e.g. through revegetation. Our total influence criterion involved shorter spacing than that habitually recommended in technical manuals for restoration, but was in line with those values found in spontaneous and stable step-pools systems, which might serve as a reference for man-made interventions.

  7. Applicability of refractometry for fast routine checking of hospital preparations.

    Science.gov (United States)

    Hendrickx, Stijn; Verón, Aurora Monteagudo; Van Schepdael, Ann; Adams, Erwin

    2016-04-30

    Quality control of hospital pharmacy formulations is of the utmost importance to ensure constant quality and to avoid potential mistakes before administration to the patient. In this study we investigated the applicability of refractometry as a fast, inexpensive and easy-to-use quality control measurement. Refractive indices (RI) of a multitude of different hospital formulations with varying concentrations of active compound were measured. The samples consisted of a number of binary aqueous solutions (one compound in water), complex aqueous solutions (multiple compounds in water or in a constant matrix), two suspensions and one emulsion. For all these formulations, linear regression analysis was performed, quality control limits determined and accuracy and repeatability were checked. Subsequently, actual hospital pharmacy samples were analyzed to check whether they were within the specified limits. For both binary and complex aqueous formulations, repeatability was good and a linear correlation for all samples could be observed on condition that the concentration of the active compound was sufficiently high. The refractometer was not sensitive enough for solutions of folic acid and levothyroxine, which had too low a concentration of active compound. Due to lack of homogeneity and light scattering, emulsions and suspensions do not seem suitable for quality control by refractometry. A mathematical equation was generated to predict the refractive index of an aqueous solution containing clonidine HCl as active compound. Values calculated from the equation were compared with measured values and deviations of all samples were found to be lower than 1.3%. In order to use refractometry in a hospital pharmacy for quality control of multicomponent samples, additional intermediate measurements would be required, to overcome the fact that refractometry is not compound specific. In conclusion, we found that refractometry could potentially be useful for daily, fast quality

  8. Analysis of DIRAC's behavior using model checking with process algebra

    International Nuclear Information System (INIS)

    DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple; the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike conventional testing, it allows full control over the parallel processes execution, and supports exhaustive state-space exploration. We used the mCRL2 language and toolset to model the behavior of two related DIRAC subsystems: the workload and storage management system. Based on process algebra, mCRL2 allows defining custom data types as well as functions over these. This makes it suitable for modeling the data manipulations made by DIRAC's agents. By visualizing the state space and replaying scenarios with the toolkit's simulator, we have detected race-conditions and deadlocks in these systems, which, in several cases, were confirmed to occur in the reality. Several properties of interest were formulated and verified with the tool. Our future direction is automating the translation from DIRAC to a formal model.

  9. IMPORTANCE OF PERIODIC HEALTH CHECK UP FOR INDIAN WOMEN

    Directory of Open Access Journals (Sweden)

    Avtar Singh

    2014-07-01

    Full Text Available OBJECTIVE: In the past women’s health care services were focused mainly on the health problems during pregnancy and childbirth. Although these are major contributors of morbidity and mortality in women life and require to be addressed in correct perspective, but at the same time the question arises that why should women’s health remain limited to traditional Maternal and Child Health issues, as they are also exposed to strong risks of lifestyle diseases and specific conditions like certain cancers, anaemia, besides hazards of pregnancy/ child birth. Due largely to asymptomatic nature of these conditions, women may not be aware that they are at risk for non-communicable diseases, therefore screening for these diseases are important for assessing risk of future medical problems and to encourage a healthy lifestyle by women. MATERIAL AND METHODS: At the outset, to sensitize the women regarding importance of health check-up, health awareness campaign was run, followed by health examination including anthropometry, general medical checkup, blood tests for haemoglobin, blood sugar, ( Random, serum cholesterol, urine test for albumin and sugar, clinical breast examination for presence of lump and PAP smear for cervical cancer. Subjects with abnormal results were counseled by counselor and referred for further managements. SAMPLING: 1760 females married to Armed Forces personnel between the ages of 22 years to 55 years of age were selected for screening excluding pregnant women. 1384 women participated in the study. RESULTS: The prevalence of various parameters studied was comparable to national figures and other studies. CONCLUSION: Results suggest that women are vulnerable to lifestyle diseases, certain cancers and non-communicable diseases. Strict preventive measures and health education is mandatory to limit this menace; a formalized periodic health check up for women in different age groups is strongly recommended.

  10. Analysis of DIRAC's behavior using model checking with process algebra

    Science.gov (United States)

    Remenska, Daniela; Templon, Jeff; Willemse, Tim; Bal, Henri; Verstoep, Kees; Fokkink, Wan; Charpentier, Philippe; Graciani Diaz, Ricardo; Lanciotti, Elisa; Roiser, Stefan; Ciba, Krzysztof

    2012-12-01

    DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple; the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike conventional testing, it allows full control over the parallel processes execution, and supports exhaustive state-space exploration. We used the mCRL2 language and toolset to model the behavior of two related DIRAC subsystems: the workload and storage management system. Based on process algebra, mCRL2 allows defining custom data types as well as functions over these. This makes it suitable for modeling the data manipulations made by DIRAC's agents. By visualizing the state space and replaying scenarios with the toolkit's simulator, we have detected race-conditions and deadlocks in these systems, which, in several cases, were confirmed to occur in the reality. Several properties of interest were formulated and verified with the tool. Our future direction is automating the translation from DIRAC to a formal model.

  11. Emodnet Med Sea Check-Point - Indicators for decision- maker

    Science.gov (United States)

    Besnard, Sophie; Claverie, Vincent; Blanc, Frédérique

    2015-04-01

    The Emodnet Checkpoint projects aim is to assess the cost-effectiveness, reliability and utility of the existing monitoring at the sea basin level. This involves the development of monitoring system indicators and a GIS Platform to perform the assessment and make it available. Assessment or production of Check-Point information is made by developing targeted products based on the monitoring data and determining whether the products are meeting the needs of industry and public authorities. Check-point users are the research community, the 'institutional' policy makers for IMP and MSFD implementation, the 'intermediate users', i.e., users capable to understand basic raw data but that benefit from seeing the Checkpoint targeted products and the assessment of the fitness for purpose. We define assessment criteria aimed to characterize/depict the input datasets in terms of 3 territories capable to show performance and gaps of the present monitoring system, appropriateness, availability and fitness for purpose. • Appropriateness: What is made available to users? What motivate/decide them to select this observation rather than this one. • Availability: How this is made available to the user? Place to understand the readiness and service performance of the EU infrastructure • Fitness for use / fitness for purpose: Ability for non-expert user to appreciate the data exploitability (feedback on efficiency & reliability of marine data) For each territory (appropriateness, Availability and Fitness for purpose / for use), we define several indicators. For example, for Availability we define Visibility, Accessibility and Performance. And Visibility is itself defined by "Easily found" and "EU service". So these indicators can be classified according to their territory and sub-territory as seen above, but also according to the complexity to build them. Indicators are built from raw descriptors in 3 stages:  Stage 1: to give a neutral and basic status directly computed from

  12. Grab Windows training opportunities; check CERN Windows roadmap!

    CERN Multimedia

    IT Department

    2011-01-01

    CERN Operating Systems and Information Services group (IT-OIS) actively monitors market trends to check how new software products correspond to CERN needs. In the Windows world, Windows 7 has been a big hit, with over 1500 Windows 7 PCs within less than a year since its support was introduced at CERN. No wonder: Windows XP is nearly 10 years old and is steadily approaching the end of its life-cycle. At CERN, support for Windows XP will stop at the end of December 2012. Compared to Vista, Windows 7 has the same basic hardware requirements, but offers higher performance, so the decision to upgrade is rather straightforward. CERN support for Vista will end in June 2011. In the world of Microsoft Office, version 2007 offers better integration with the central services than the older version 2003. Progressive upgrade from 2003 to 2007 is planned to finish in September 2011, but users are encouraged to pro-actively upgrade at their convenience. Please note that Office 2007 brings an important change in the area of ...

  13. Selecting Female Mice in Estrus and Checking Plugs.

    Science.gov (United States)

    Behringer, Richard; Gertsenstein, Marina; Nagy, Kristina Vintersten; Nagy, Andras

    2016-01-01

    The female mouse estrous cycle is divided into four phases: proestrus (development of ovarian follicles), estrus (ovulation), metestrus (formation of corpora lutea), and diestrus (beginning of follicle development for next ovulation and elimination of previous oocytes). The appearance of the epithelium of the external genitalia is used to identify the stage of the estrous cycle of a female mouse. This is usually easier to see in strains with either no or only light skin pigmentation. By examining the color, moistness, and degree of swelling of the vagina, females in estrus can readily be identified. To set up the matings, females are examined in the afternoon, and those in estrus are placed into the cages with males (one or two females in each cage with one male). Usually, 50% or more of the selected females will mate. The presence of a vaginal copulation plug next morning indicates that mating has occurred, but it does not mean that a pregnancy will result even if proven breeder fertile males were used. It is important to check vaginal plugs early in the morning because they fall out or are no longer detectable ~12 h after mating or sometimes earlier. PMID:27480722

  14. Structure-Based Deadlock Checking of Asynchronous Circuits

    Institute of Scientific and Technical Information of China (English)

    Hong-Guang Ren; Zhi-Ying Wang; Doug Edwards

    2011-01-01

    It is important to verify the absence of deadlocks in asynchronous circuits.Much previous work relies on a reachability analysis of the circuits' states,with the use of binary decision diagrams (BDDs) or Petri nets to model the behaviors of circuits.This paper presents an alternative approach focusing on the structural properties of well-formed asynchronous circuits that will never suffer deadlocks.A class of data-driven asynchronous pipelines is targeted in this paper,which can be viewed as a network of basic components connected by handshake channels.The sufficient and necessary conditions for a component network consisting of Steer,Merge,Fork and Join are given.The slack elasticity of the channels is analyzed in order to introduce pipelining.As an application,a deadlock checking method is implemented in a syntax-directed asynchronous design tool - Teak.The proposed method shows a great runtime advantage when compared against previous Petri net based verification tools.

  15. Analysis of the Security of BB84 by Model Checking

    Directory of Open Access Journals (Sweden)

    Mohamed Elboukhari

    2010-04-01

    Full Text Available Quantum Cryptography or Quantum key distribution (QKD is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was noted that quantum computers could break public key cryptosystems based on number theory extensive studies have been undertaken on QKD. Based on quantum mechanics, QKD offers unconditionally secure communication. Now, the progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years. Efforts are made to improve the performance and reliability of the implemented technologies. But several challenges remain despite this big progress. The task of how to test the apparatuses of QKD For example did not yet receive enough attention. These devises become complex and demand a big verification effort. In this paper we are interested in an approach based on the technique of probabilistic model checking for studying quantum information. Precisely, we use the PRISM tool to analyze the security of BB84 protocol and we are focused on the specific security property of eavesdropping detection. We show that this property is affected by the parameters of quantum channel and the power of eavesdropper

  16. Systematics for checking geometric errors in CNC lathes

    Science.gov (United States)

    Araújo, R. P.; Rolim, T. L.

    2015-10-01

    Non-idealities presented in machine tools compromise directly both the geometry and the dimensions of machined parts, generating distortions in the project. Given the competitive scenario among different companies, it is necessary to have knowledge of the geometric behavior of these machines in order to be able to establish their processing capability, avoiding waste of time and materials as well as satisfying customer requirements. But despite the fact that geometric tests are important and necessary to clarify the use of the machine correctly, therefore preventing future damage, most users do not apply such tests on their machines for lack of knowledge or lack of proper motivation, basically due to two factors: long period of time and high costs of testing. This work proposes a systematics for checking straightness and perpendicularity errors in CNC lathes demanding little time and cost with high metrological reliability, to be used on factory floors of small and medium-size businesses to ensure the quality of its products and make them competitive.

  17. Use of statistical checks as maintenance tools for TLD readers

    International Nuclear Information System (INIS)

    Background signals, which are non-radiation related, are produced during the readout process in the TL reader systems. The source of these signals can be the reader itself or effects in the TL crystal. The TL signal is received during the heating process by applying a defined temperature profile. The photomultiplier converts the light accumulated to current that is translated to dose according to calibration parameters. If during the accumulation process additional light or current sources are present, these contributions will be added to the exposure induced data. In order to ensure an accurate and reliable operation of the reader, the background sources must be monitored continuously, and proper calibration of the system must be performed. However, there may be small drifts, or background signals covered by fluctuation processes, that may remain undetected. We propose some statistical checks of system parameters which may give a broader insight into the operational characteristics of the TLD reader and may help for proper maintenance of the system

  18. Using surface integrals for checking the Archimedes' law of buoyancy

    CERN Document Server

    Lima, F M S

    2011-01-01

    A mathematical derivation of the force exerted by an \\emph{inhomogeneous} (i.e., compressible) fluid on the surface of an \\emph{arbitrarily-shaped} body immersed in it is not found in literature, which may be attributed to our trust on Archimedes' law of buoyancy. However, this law, also known as Archimedes' principle (AP), does not yield the force observed when the body is in contact to the container walls, as is more evident in the case of a block immersed in a liquid and in contact to the bottom, in which a \\emph{downward} force that \\emph{increases with depth} is observed. In this work, by taking into account the surface integral of the pressure force exerted by a fluid over the surface of a body, the general validity of AP is checked. For a body fully surrounded by a fluid, homogeneous or not, a gradient version of the divergence theorem applies, yielding a volume integral that simplifies to an upward force which agrees to the force predicted by AP, as long as the fluid density is a \\emph{continuous func...

  19. Development of sensors for checking corrosion processes in reinforced concrete

    International Nuclear Information System (INIS)

    Argentina's National Atomic Energy Commission is responsible for developing a program for the management of radioactive wastes. This program includes, among other activities, the design and construction of a facility for the final disposal of half-life radioactive wastes. The model consists of the use of multiple, redundant and independent barriers, including the container and its cover made of reinforced concrete. The useful life of these structures should be over 300 years, and to meet this requirement, quantitative information is needed about the coating properties and threshold values at the start of the corrosive process. This work presents the development of corrosion sensors for the on-line measurement of the corrosion potential, the corrosion current density of the structures, the flow of oxygen in the structures, the concrete's electrical resistance, its chloride content and the structure's internal temperature. These sensors, duly installed in a structure, check on the corrosive process. With this data the final design of the container can be prepared that will last as long or longer than that foreseen for this type of facility (CW)

  20. Dynamic Data Possession Checking for Secure Cloud Storage Service

    Directory of Open Access Journals (Sweden)

    Wenzhe Jiao

    2013-12-01

    Full Text Available Using cloud storage service, data owners can access their data anywhere at any time and enjoy the on-demand high quality applications and services, without the burden of local data storage and maintenance. Meanwhile, the risk of losing data stored with any untrustworthy service provider is the key barrier to widely adopt cloud storage service. To verify the integrity of data stored in cloud and relieve the security concerns of customers, a privacy-preserving data possession checking (DPC scheme is presented. This scheme uses Merkle Hash Tree to support fully dynamic data operations. To achieve robustness, forward error-correcting codes can be combined with the proposed DPC scheme, which can recover the data when a small amount of file has been corrupted. The scheme allows unlimited times verification without the need for the verifier to compare against the original data, which reduces the communication and computation complexity dramatically and preserves the privacy of the data. Extensive security analysis and simulation show that the proposed scheme is highly provably secure.

  1. Using surface integrals for checking Archimedes' law of buoyancy

    International Nuclear Information System (INIS)

    A mathematical derivation of the force exerted by an inhomogeneous (i.e. compressible) fluid on the surface of an arbitrarily shaped body immersed in it is not found in the literature, which may be attributed to our trust in Archimedes' law of buoyancy. However, this law, also known as Archimedes' principle (AP), does not yield the force observed when the body is in contact with the container walls, as is more evident in the case of a block immersed in a liquid and in contact with the bottom, in which a downward force that increases with depth is observed. In this work, by taking into account the surface integral of the pressure force exerted by a fluid over the surface of a body, the general validity of AP is checked. For a body fully surrounded by a fluid, homogeneous or not, a gradient version of the divergence theorem applies, yielding a volume integral that simplifies to an upward force which agrees with the force predicted by AP, as long as the fluid density is a continuous function of depth. For the bottom case, this approach yields a downward force that increases with depth, which contrasts to AP but is in agreement with experiments. It also yields a formula for this force which shows that it increases with the area of contact.

  2. The Design of E-Traveler’s Check with Efficiency and Mutual Authentication

    Directory of Open Access Journals (Sweden)

    Chin-Chen Chang

    2010-03-01

    Full Text Available Nowadays, traveling has become a popular leisure activity in our daily lives. Travelers can either use cash or credit cards to pay their bills. However, there is risk of cash being robbed or credit cards being copied. The traveler’s check, which is a third choice, comes in to get travelers around such risks and to protect their rights. Nevertheless, traditional travelers’ checks cannot keep imposters from forging and cashing them illegally. Hence, we propose a new type of check, called the e-traveler’s check, to preserve the rights of holders of e-traveler’s check and to prevent the check-issuing banks from being damaged.

  3. Risk and Scope of Debit Check Card in Competitive Market of Pakistan

    OpenAIRE

    Ali Zaidi, Syed Najaf; Ali, Syed Babar

    2006-01-01

    Today, even the smallest of transactions, from fast food to digital content, are attracting Debit Check cardholders, and more and more merchants are opening their doors to this burgeoning payment method. The topic for this dissertation is to review the Debit Card marketplace, culminating in addressing the question “What is the scope of new Debit check cards?” The literature review indicates that there are developing opportunities within the marketplace that could offer the Debit Check Card pr...

  4. SU-D-BRD-03: Improving Plan Quality with Automation of Treatment Plan Checks

    International Nuclear Information System (INIS)

    Purpose: To evaluate the effectiveness of an automated plan check tool to improve first-time plan quality as well as standardize and document performance of physics plan checks. Methods: The Plan Checker Tool (PCT) uses the Eclipse Scripting API to check and compare data from the treatment planning system (TPS) and treatment management system (TMS). PCT was created to improve first-time plan quality, reduce patient delays, increase efficiency of our electronic workflow, and to standardize and partially automate plan checks in the TPS. A framework was developed which can be configured with different reference values and types of checks. One example is the prescribed dose check where PCT flags the user when the planned dose and the prescribed dose disagree. PCT includes a comprehensive checklist of automated and manual checks that are documented when performed by the user. A PDF report is created and automatically uploaded into the TMS. Prior to and during PCT development, errors caught during plan checks and also patient delays were tracked in order to prioritize which checks should be automated. The most common and significant errors were determined. Results: Nineteen of 33 checklist items were automated with data extracted with the PCT. These include checks for prescription, reference point and machine scheduling errors which are three of the top six causes of patient delays related to physics and dosimetry. Since the clinical roll-out, no delays have been due to errors that are automatically flagged by the PCT. Development continues to automate the remaining checks. Conclusion: With PCT, 57% of the physics plan checklist has been partially or fully automated. Treatment delays have declined since release of the PCT for clinical use. By tracking delays and errors, we have been able to measure the effectiveness of automating checks and are using this information to prioritize future development. This project was supported in part by P01CA059827

  5. Model Checking Classes of Metric LTL Properties of Object-Oriented Real-Time Maude Specifications

    OpenAIRE

    Erika Ábrahám; Peter Csaba Ölveczky; Daniela Lepri

    2010-01-01

    This paper presents a transformational approach for model checking two important classes of metric temporal logic (MTL) properties, namely, bounded response and minimum separation, for nonhierarchical object-oriented Real-Time Maude specifications. We prove the correctness of our model checking algorithms, which terminate under reasonable non-Zeno-ness assumptions when the reachable state space is finite. These new model checking features have been integrated into Real-Time Maude, and are use...

  6. Risk and Scope of Debit Check Card in Competitive Market of Pakistan

    OpenAIRE

    Ali Zaidi, Syed Najaf; Ali, Syed Babar

    2006-01-01

    Today, even the smallest of transactions, from fast food to digital content, are attracting Debit Check cardholders, and more and more merchants are opening their doors to this burgeoning payment method. The topic for this dissertation is to review the Debit Card marketplace, culminating in addressing the question “What is the scope of new Debit check cards?” The literature review indicates that there are developing opportunities within the marketplace that could offer the Debit Check Car...

  7. SU-D-BRD-04: The Impact of Automatic Radiation Therapy Plan Checks in Treatment Planning

    International Nuclear Information System (INIS)

    Purpose: The physics plan check verifies various aspects of a treatment plan after dosimetrists have finished creating the plan. Some errors in the plan which are caught by the physics check could be caught earlier in the departmental workflow. The purpose of this project was to evaluate a plan checking script that can be run within the treatment planning system (TPS) by the dosimetrists prior to plan approval and export to the record and verify system. Methods: A script was created in the Pinnacle TPS to automatically check 15 aspects of a plan for clinical practice conformity. The script outputs a list of checks which the plan has passed and a list of checks which the plan has failed so that appropriate adjustments can be made. For this study, the script was run on a total of 108 plans: IMRT (46/108), VMAT (35/108) and SBRT (27/108). Results: Of the plans checked by the script, 77/108 (71%) failed at least one of the fifteen checks. IMRT plans resulted in more failed checks (91%) than VMAT (51%) or SBRT (63%), due to the high failure rate of an IMRT-specific check, which checks that no IMRT segment < 5 MU. The dose grid size and couch removal checks caught errors in 10% and 14% of all plans – errors that ultimately may have resulted in harm to the patient. Conclusion: Approximately three-fourths of the plans being examined contain errors that could be caught by dosimetrists running an automated script embedded in the TPS. The results of this study will improve the departmental workflow by cutting down on the number of plans that, due to these types of errors, necessitate re-planning and re-approval of plans, increase dosimetrist and physician workload and, in urgent cases, inconvenience patients by causing treatment delays

  8. SU-D-BRD-03: Improving Plan Quality with Automation of Treatment Plan Checks

    Energy Technology Data Exchange (ETDEWEB)

    Covington, E; Younge, K; Chen, X; Lee, C; Matuszak, M; Kessler, M; Acosta, E; Orow, A; Filpansick, S; Moran, J [University of Michigan Hospital and Health System, Ann Arbor, MI (United States); Keranen, W [Varian Medical Systems, Palo Alto, CA (United States)

    2015-06-15

    Purpose: To evaluate the effectiveness of an automated plan check tool to improve first-time plan quality as well as standardize and document performance of physics plan checks. Methods: The Plan Checker Tool (PCT) uses the Eclipse Scripting API to check and compare data from the treatment planning system (TPS) and treatment management system (TMS). PCT was created to improve first-time plan quality, reduce patient delays, increase efficiency of our electronic workflow, and to standardize and partially automate plan checks in the TPS. A framework was developed which can be configured with different reference values and types of checks. One example is the prescribed dose check where PCT flags the user when the planned dose and the prescribed dose disagree. PCT includes a comprehensive checklist of automated and manual checks that are documented when performed by the user. A PDF report is created and automatically uploaded into the TMS. Prior to and during PCT development, errors caught during plan checks and also patient delays were tracked in order to prioritize which checks should be automated. The most common and significant errors were determined. Results: Nineteen of 33 checklist items were automated with data extracted with the PCT. These include checks for prescription, reference point and machine scheduling errors which are three of the top six causes of patient delays related to physics and dosimetry. Since the clinical roll-out, no delays have been due to errors that are automatically flagged by the PCT. Development continues to automate the remaining checks. Conclusion: With PCT, 57% of the physics plan checklist has been partially or fully automated. Treatment delays have declined since release of the PCT for clinical use. By tracking delays and errors, we have been able to measure the effectiveness of automating checks and are using this information to prioritize future development. This project was supported in part by P01CA059827.

  9. The check sheet for diagnosis of postmortem CT. Development and the first impression

    International Nuclear Information System (INIS)

    We developed the check sheet for diagnosis of postmortem CT. We listed the findings that had been reported as causes of death, postmortem changes, and changes caused by cardiopulmonary resuscitation on the sheet. We used the check sheet for 26 postmortem CT of cases with cardiopulmonary arrest on arrival. The causes of death were proposed in 11 cases. The check sheet was useful to diagnose postmortem CT. (author)

  10. The evolution of the check as a means of payment: A historical survey

    OpenAIRE

    Quinn, Stephen; Roberds, William

    2008-01-01

    Though checks' popularity is now waning in favor of electronic payments, checks were, for much of the twentieth century, the most widely used noncash payment method in the United States. How did such a relatively inefficient form of payment become so dominant? This article traces the historical evolution of the check, focusing on its relation to complementary and competing payment technologies. ; Originating in the eastern Mediterranean during the first millennium as a convenient form of paym...

  11. Scoping study to develop understanding of a natural capital asset check. Revised final report for Defra

    OpenAIRE

    Dickie, Ian; Haines-Young, Roy; Atkinson, Giles; Hails, Rosie

    2012-01-01

    This study has scoped a Natural Capital Asset Check, which was a commitment in the 2010 Natural Environment White Paper. The development of this asset check approach is continuing under the UK National Ecosystem Assessment follow-on project, which will conclude in October 2013. This summary attempts to answer some basic questions about a Natural Capital Asset Check that this scoping study has investigated.

  12. The Structure of Wheel Check Valve Influence on Air Block Phenomenon of Piezoelectric Micro-Pump

    OpenAIRE

    Song Chen; Yong Liu; Yanhu Shen; Jiantao Wang; Zhigang Yang

    2015-01-01

    To improve the stability and reliability of the piezoelectric micro-pump, the cause of air block phenomenon is analyzed on the structure of wheel check valve. During the movement of the bubble in the micro-channel, pressure drop occurs, the main factor which influences the bubble going through is opening height of the wheel check valve. Five groups of wheel check valves with different structures are used to test the wheel check valve opening height and air block probability. The experiment re...

  13. Check Point收购诺基亚的安全设备业务

    Institute of Scientific and Technical Information of China (English)

    谢晴

    2009-01-01

    5月11日,Check Point宣布完成收购诺基亚的安全设备业务,这是双方长达12年紧密合作后的合理演进。除了Check Point UTM-1以及Power-1设备外,现在客户还可向Check Point直接购买先前在诺基亚IP硬件平台上运行Check Point安全软件的设备。

  14. Check Point完成诺基亚安全业务收购

    Institute of Scientific and Technical Information of China (English)

    阿呆

    2009-01-01

    Check Point日前宣布,已经完成收购诺基亚的安全设备业务,这是双方长达12年紧密合作后的合理演进。除了Check Point UTM-1以及Power-1设备,现在Check Point还直接销售先前在诺基亚IP硬件平台上运行Check Point安全软件的设备。

  15. Two questions of L. Va${\\rm \\check{\\textbf{s}}}$ on *-clean rings

    OpenAIRE

    Chen, Jianlong; Cui, Jian

    2011-01-01

    A ring $R$ with an involution * is called (strongly) *-clean if every element of $R$ is the sum of a unit and a projection (that commute). All *-clean rings are clean. Va${\\rm \\check{s}}$ [L. Va${\\rm \\check{s}}$, *-Clean rings; some clean and almost clean Baer *-rings and von Neumann algebras, J. Algebra 324 (12) (2010) 3388-3400] asked whether there exists a *-ring that is clean but not *-clean and whether a unit regular and *-regular ring is strongly *-clean. In this paper, we answer both q...

  16. Drug Checking: A prevention measure for a heterogeneous group with high consumption frequency and polydrug use - evaluation of Zurich's drug checking services

    OpenAIRE

    Hungerbühler, I; Buecheli, A; Schaub, Michael P.

    2011-01-01

    BACKGROUND: The increasing party culture in Zurich presents new challenges, especially regarding the consumption of alcohol and so-called party drugs. Streetwork, the youth advisory service of the city of Zurich, has provided onsite and stationary Drug Checking facilities since 2001 and 2006, respectively. Drug Checking always involves filling out an anonymous questionnaire, which allows the collection of important information about a largely unknown group of users and their consumption pa...

  17. Commissioning and Implementation of an EPID Based IMRT QA System "Dosimetry Check" for 3D Absolute Dose Measurements and Quantitative Comparisons to MapCheck

    Science.gov (United States)

    Patel, Jalpa A.

    The software package "Dosimetry Check" by MathResolutions, LLC, provides an absolute 3D volumetric dose measurement for IMRT QA using the existing Electronic Portal Imaging Device (EPID) mounted on most linear accelerators. This package provides a feedback loop using the patient's treatment planning CT data as the phantom for dose reconstruction. The aim of this work is to study the difference between point, planar and volumetric doses with MapCheck and Dosimetry Check via the use of the EPID and the diode array respectively. Evaluating tools such as point doses at isocenter, 1-D profiles, gamma volume histograms, and dose volume histograms are used for IMRT dose comparison in three types of cases: head and neck, prostate, and lung. Dosimetry Check can be a valuable tool for IMRT QA as it uses patient specific attenuation corrections and the superiority of the EPID as compared to the MapCheck diode array. This helps reduce the uncertainty in dose for less variability in delivery and a more realistic measured vs computed dose verification system as compared to MapCheck.

  18. Cross-checking different sources of mobility information.

    Science.gov (United States)

    Lenormand, Maxime; Picornell, Miguel; Cantú-Ros, Oliva G; Tugores, Antònia; Louail, Thomas; Herranz, Ricardo; Barthelemy, Marc; Frías-Martínez, Enrique; Ramasco, José J

    2014-01-01

    The pervasive use of new mobile devices has allowed a better characterization in space and time of human concentrations and mobility in general. Besides its theoretical interest, describing mobility is of great importance for a number of practical applications ranging from the forecast of disease spreading to the design of new spaces in urban environments. While classical data sources, such as surveys or census, have a limited level of geographical resolution (e.g., districts, municipalities, counties are typically used) or are restricted to generic workdays or weekends, the data coming from mobile devices can be precisely located both in time and space. Most previous works have used a single data source to study human mobility patterns. Here we perform instead a cross-check analysis by comparing results obtained with data collected from three different sources: Twitter, census, and cell phones. The analysis is focused on the urban areas of Barcelona and Madrid, for which data of the three types is available. We assess the correlation between the datasets on different aspects: the spatial distribution of people concentration, the temporal evolution of people density, and the mobility patterns of individuals. Our results show that the three data sources are providing comparable information. Even though the representativeness of Twitter geolocated data is lower than that of mobile phone and census data, the correlations between the population density profiles and mobility patterns detected by the three datasets are close to one in a grid with cells of 2×2 and 1×1 square kilometers. This level of correlation supports the feasibility of interchanging the three data sources at the spatio-temporal scales considered. PMID:25133549

  19. Cross-Checking Different Sources of Mobility Information

    Science.gov (United States)

    Lenormand, Maxime; Picornell, Miguel; Cantú-Ros, Oliva G.; Tugores, Antònia; Louail, Thomas; Herranz, Ricardo; Barthelemy, Marc; Frías-Martínez, Enrique; Ramasco, José J.

    2014-01-01

    The pervasive use of new mobile devices has allowed a better characterization in space and time of human concentrations and mobility in general. Besides its theoretical interest, describing mobility is of great importance for a number of practical applications ranging from the forecast of disease spreading to the design of new spaces in urban environments. While classical data sources, such as surveys or census, have a limited level of geographical resolution (e.g., districts, municipalities, counties are typically used) or are restricted to generic workdays or weekends, the data coming from mobile devices can be precisely located both in time and space. Most previous works have used a single data source to study human mobility patterns. Here we perform instead a cross-check analysis by comparing results obtained with data collected from three different sources: Twitter, census, and cell phones. The analysis is focused on the urban areas of Barcelona and Madrid, for which data of the three types is available. We assess the correlation between the datasets on different aspects: the spatial distribution of people concentration, the temporal evolution of people density, and the mobility patterns of individuals. Our results show that the three data sources are providing comparable information. Even though the representativeness of Twitter geolocated data is lower than that of mobile phone and census data, the correlations between the population density profiles and mobility patterns detected by the three datasets are close to one in a grid with cells of 2×2 and 1×1 square kilometers. This level of correlation supports the feasibility of interchanging the three data sources at the spatio-temporal scales considered. PMID:25133549

  20. Cross-checking different sources of mobility information.

    Directory of Open Access Journals (Sweden)

    Maxime Lenormand

    Full Text Available The pervasive use of new mobile devices has allowed a better characterization in space and time of human concentrations and mobility in general. Besides its theoretical interest, describing mobility is of great importance for a number of practical applications ranging from the forecast of disease spreading to the design of new spaces in urban environments. While classical data sources, such as surveys or census, have a limited level of geographical resolution (e.g., districts, municipalities, counties are typically used or are restricted to generic workdays or weekends, the data coming from mobile devices can be precisely located both in time and space. Most previous works have used a single data source to study human mobility patterns. Here we perform instead a cross-check analysis by comparing results obtained with data collected from three different sources: Twitter, census, and cell phones. The analysis is focused on the urban areas of Barcelona and Madrid, for which data of the three types is available. We assess the correlation between the datasets on different aspects: the spatial distribution of people concentration, the temporal evolution of people density, and the mobility patterns of individuals. Our results show that the three data sources are providing comparable information. Even though the representativeness of Twitter geolocated data is lower than that of mobile phone and census data, the correlations between the population density profiles and mobility patterns detected by the three datasets are close to one in a grid with cells of 2×2 and 1×1 square kilometers. This level of correlation supports the feasibility of interchanging the three data sources at the spatio-temporal scales considered.

  1. Got the Flu (or Mumps)? Check the Eigenvalue!

    CERN Document Server

    Prakash, B Aditya; Faloutsos, Michalis; Valler, Nicholas; Faloutsos, Christos

    2010-01-01

    For a given, arbitrary graph, what is the epidemic threshold? That is, under what conditions will a virus result in an epidemic? We provide the super-model theorem, which generalizes older results in two important, orthogonal dimensions. The theorem shows that (a) for a wide range of virus propagation models (VPM) that include all virus propagation models in standard literature (say, [8][5]), and (b) for any contact graph, the answer always depends on the first eigenvalue of the connectivity matrix. We give the proof of the theorem, arithmetic examples for popular VPMs, like flu (SIS), mumps (SIR), SIRS and more. We also show the implications of our discovery: easy (although sometimes counter-intuitive) answers to `what-if' questions; easier design and evaluation of immunization policies, and significantly faster agent-based simulations.

  2. 27 CFR 70.61 - Payment by check or money order.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Payment by check or money... Collection of Excise and Special (Occupational) Tax Receipt of Payment § 70.61 Payment by check or money... State, Territory, or possession of the United States, or money orders in payment for internal...

  3. 26 CFR 301.6311-1 - Payment by check or money order.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Payment by check or money order. 301.6311-1... by check or money order. (a) Authority to receive—(1) In general. (i) District directors, Service... District of Columbia, or any possession of the United States, or money orders in payment for...

  4. The Structure of Wheel Check Valve Influence on Air Block Phenomenon of Piezoelectric Micro-Pump

    Directory of Open Access Journals (Sweden)

    Song Chen

    2015-11-01

    Full Text Available To improve the stability and reliability of the piezoelectric micro-pump, the cause of air block phenomenon is analyzed on the structure of wheel check valve. During the movement of the bubble in the micro-channel, pressure drop occurs, the main factor which influences the bubble going through is opening height of the wheel check valve. Five groups of wheel check valves with different structures are used to test the wheel check valve opening height and air block probability. The experiment results show that reducing the wheel check valve thickness or diameter ratio can both increase the wheel check valve opening height, and decrease the air block probability. Through experiment, the optimum combination of the wheel check valve structure is obtained within the samples: as the thickness is 0.02 mm, the diameter ratio is 1.2, the wheel check valve opening height gets 252 µm, and within the given bubble volume, the air block probability is less than 2%.

  5. 21 CFR 1301.93 - Sources of information for employee checks.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Sources of information for employee checks. 1301...-Practitioners § 1301.93 Sources of information for employee checks. DEA recommends that inquiries concerning... place of birth, and other identifying information, to local courts and law enforcement agencies...

  6. 32 CFR Appendix A to Part 86 - Criminal History Background Check Procedures

    Science.gov (United States)

    2010-07-01

    ..., security office, criminal investigators, or local law enforcement) local files checks, Drug and Alcohol... using currently established procedures for completing background checks described in 32 CFR part 310... report through the Privacy Program described in 32 CFR part 310. The individual may provide...

  7. Gender Check - veel kord soolisusest Ida-Euroopa kunstis / Mare Tralla

    Index Scriptorium Estoniae

    Tralla, Mare, 1967-

    2010-01-01

    Novembris 2010 Viinis toimunud konverentsist, kus analüüsiti näituse "Gender Check. Feminiinsus ja maskuliinsus Ida-Euroopa kunstis" kogemust ning sellele eelnenud ja järgnenud uurimistöö tulemusi. Esitleti artiklite kogumikku "Gender check: a reader : art and theory in Eastern Europe". "Gender Checki" projekti edasisest saatusest ja mõjust

  8. 14 CFR 91.1095 - Initial and transition training and checking: Flight instructors (aircraft), flight instructors...

    Science.gov (United States)

    2010-01-01

    ... instructors (simulator). (a) No program manager may use a person nor may any person serve as a flight... observation of an FAA inspector, a program manager check pilot, or an aircrew designated examiner employed by the program manager. The observation check may be accomplished in part or in full in an aircraft, in...

  9. 28 CFR 105.23 - Procedure for requesting criminal history record check.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Procedure for requesting criminal history record check. 105.23 Section 105.23 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting...

  10. 14 CFR 91.171 - VOR equipment check for IFR operations.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false VOR equipment check for IFR operations. 91... Instrument Flight Rules § 91.171 VOR equipment check for IFR operations. (a) No person may operate a civil aircraft under IFR using the VOR system of radio navigation unless the VOR equipment of that aircraft—...

  11. Yarning about health checks: barriers and enablers in an urban Aboriginal medical service.

    Science.gov (United States)

    Jennings, Warren; Spurling, Geoffrey K; Askew, Deborah A

    2014-01-01

    The annual health check for Aboriginal and Torres Strait Islander People has been welcomed as a means of conducting a comprehensive assessment to address preventive health care delivery, identify new diagnoses and initiate new treatments. Rates of health check uptake across Australia have been poor with less than 12% of the eligible population receiving one during 2009/10. This qualitative study sought to identify barriers and enablers to undertaking health checks in an urban Aboriginal Medical Service through semistructured interviews with 25 clinical staff (doctors, nurses and Aboriginal and Torres Strait Islander health workers). Clinical systems for conducting health checks were unclear to staff, with barriers relating to time pressures for both patients and clinic staff, and lack of clarity about staff responsibilities for initiating and conducting the health check. Additionally some staff perceived some content as sensitive, invasive, culturally inappropriate and of questionable value. Other barriers included concerns about community health literacy, disengagement with preventative health care, and suspicion about confidentiality and privacy. The development of clear service-wide systems that support the conduct of health checks are required to increase uptake, combined with supportive local clinical leadership and audit and feedback systems. Staff training, consideration of culture and roles, and critical review of health check content may improve staff confidence and community acceptance. Community-based health education and promotion is strongly supported by staff to increase client engagement, knowledge and acceptance of the health check. PMID:23552601

  12. 78 FR 14121 - Agency Information Collection Activities: Proposed Collection; Comments Requested: Police Check...

    Science.gov (United States)

    2013-03-04

    ... Collection; Comments Requested: Police Check Inquiry and Pre-Screening Qualifications Certification ACTION...: Revision of an existing collection of information. (2) Title of the Form/Collection: Police Check Inquiry...: Jerri Murray, Department Clearance Officer, Policy and Planning Staff, Justice Management...

  13. EASY-2005: validation and new tools for data checking

    International Nuclear Information System (INIS)

    The European Activation System (EASY) is the tool developed for activation calculations as part of the Fusion Technology programme. It comprises the EAF nuclear data libraries and the FISPACT inventory code. The version EASY-2005, released last year contains many more neutron-induced reactions than the previous version; an increase of about a factor of five to 62,637. The reason for this was the increase in the upper energy limit from 20 to 60 MeV. A major strand of work within Europe has been the measurement of activation in a series of well-defined neutron spectra, these integral results can then be used to validate a subset of the EAF-2005 library, demonstrating that it can be relied on for activation predictions in similar spectra. A validation report has been produced covering 453 reactions; this shows the integral results and the available differential data from EXFOR for these reactions. For 202 reactions there is good agreement, indicating that the data for the reaction are adequate. In cases of disagreement the report indicates where additional measurements are required or where the library data can be improved. The majority of the data above 20 MeV were obtained from model calculations, and this is also the case for many of the reactions at all energies. Because of the large number of reactions and the lack of experimental data, there was a need to develop new tools that could help in the checking of such a large library. Within the SAFEPAQ-II code that is used for evaluation and production of the EAF libraries, the new methodology of Statistical Analysis of Cross Sections (SACS) has been developed. This enables various quantities such as maximum cross section (σmax), energy at maximum (Emax) and width at half maximum (W0.5) to be plotted as functions of atomic mass (A) and asymmetry parameter (s) for each type of reaction. Such plots show well defined trends and inconsistent data for a particular reaction can easily be identified. Using the integral

  14. A study of condition monitoring of check valve using acoustic emission and neural network technique

    International Nuclear Information System (INIS)

    The check valve is one of typical component being extensively used in safety systems of nuclear power plants. The failures of check valves have resulted in significant maintenance efforts, on occasion, have resulted in water hammer, over-pressurization of low-pressure systems, and damage to flow system components. The objective of this research is to demonstrate condition-monitoring system based on acoustic emission, AE detection that can provide timely detection of check valve degradation and service aging so that maintenance/ replacement could be preformed prior to loss of safety function. This work is also focused on the capability of neural network technique to provide diagnostic information useful in determining check valve aging and degradation, check valve failures and undesirable operating modes

  15. The Complexity of Checking Consistency of Pedigree Information and Related Problems

    Institute of Scientific and Technical Information of China (English)

    Luca Aceto; Jens A. Hansen; Anna Ingólfsdóttir; Jacob Johnsen; John Knudsen

    2004-01-01

    Consistency checking is a fundamental computational problem in genetics. Given a pedigree and information on the genotypes (of some) of the individuals in it, the aim of consistency checking is to determine whether these data are consistent with the classic Mendelian laws of inheritance. This problem arose originally from the geneticists' need to filter their input data from erroneous information, and is well motivated from both a biological and a sociological viewpoint. This paper shows that consistency checking is NP-complete, even with focus on a single gene and in the presence of three alleles. Several other results on the computational complexity of problems from genetics that are related to consistency checking are also offered. In particular, it is shown that checking the consistency of pedigrees over two alleles, and of pedigrees without loops, can be done in polynomial time.

  16. Effect of check valve on consequences of coolant pump rotor seizure accident for EPR reactor

    International Nuclear Information System (INIS)

    Counter current flow phenomenon would appear during reactor coolant pump rotor seizure accident. Present work analyzes the coolant pump rotor seizure accident for European Pressurized Reactor (EPR). The accident safety analysis results of model with check valve and with out check valve are compared. It can be found that the check valve can increase the core inlet flow rate of model about 4%. The increasing of coolant flow rate is beneficial to the reactor core cooling. Check valve can increase the minimum departure from nucleate boiling ratio (DNBR), reduce the departure from nucleate boiling (DNB) fraction and the fuel rod cladding temperature about 14℃ during coolant pump rotor seizure accident. The analyses results show that the model with check valve can maintain the integrity of nuclear fuel rod effectively during reactor coolant pump rotor seizure accident. (authors)

  17. PVeStA: A Parallel Statistical Model Checking and Quantitative Analysis Tool

    KAUST Repository

    AlTurki, Musab

    2011-01-01

    Statistical model checking is an attractive formal analysis method for probabilistic systems such as, for example, cyber-physical systems which are often probabilistic in nature. This paper is about drastically increasing the scalability of statistical model checking, and making such scalability of analysis available to tools like Maude, where probabilistic systems can be specified at a high level as probabilistic rewrite theories. It presents PVeStA, an extension and parallelization of the VeStA statistical model checking tool [10]. PVeStA supports statistical model checking of probabilistic real-time systems specified as either: (i) discrete or continuous Markov Chains; or (ii) probabilistic rewrite theories in Maude. Furthermore, the properties that it can model check can be expressed in either: (i) PCTL/CSL, or (ii) the QuaTEx quantitative temporal logic. As our experiments show, the performance gains obtained from parallelization can be very high. © 2011 Springer-Verlag.

  18. Application of risk-based methods to inservice testing of check valves

    Energy Technology Data Exchange (ETDEWEB)

    Closky, N.B.; Balkey, K.R.; McAllister, W.J. [and others

    1996-12-01

    Research efforts have been underway in the American Society of Mechanical Engineers (ASME) and industry to define appropriate methods for the application of risk-based technology in the development of inservice testing (IST) programs for pumps and valves in nuclear steam supply systems. This paper discusses a pilot application of these methods to the inservice testing of check valves in the emergency core cooling system of Georgia Power`s Vogtle nuclear power station. The results of the probabilistic safety assessment (PSA) are used to divide the check valves into risk-significant and less-risk-significant groups. This information is reviewed by a plant expert panel along with the consideration of appropriate deterministic insights to finally categorize the check valves into more safety-significant and less safety-significant component groups. All of the more safety-significant check valves are further evaluated in detail using a failure modes and causes analysis (FMCA) to assist in defining effective IST strategies. A template has been designed to evaluate how effective current and emerging tests for check valves are in detecting failures or in finding significant conditions that are precursors to failure for the likely failure causes. This information is then used to design and evaluate appropriate IST strategies that consider both the test method and frequency. A few of the less safety-significant check valves are also evaluated using this process since differences exist in check valve design, function, and operating conditions. Appropriate test strategies are selected for each check valve that has been evaluated based on safety and cost considerations. Test strategies are inferred from this information for the other check valves based on similar check valve conditions. Sensitivity studies are performed using the PSA model to arrive at an overall IST program that maintains or enhances safety at the lowest achievable cost.

  19. The NHS Health Check in England: an evaluation of the first 4 years

    Science.gov (United States)

    Robson, John; Dostal, Isabel; Sheikh, Aziz; Eldridge, Sandra; Madurasinghe, Vichithranie; Griffiths, Chris; Coupland, Carol; Hippisley-Cox, Julia

    2016-01-01

    Objectives To describe implementation of a new national preventive programme to reduce cardiovascular morbidity. Design Observational study over 4 years (April 2009—March 2013). Setting 655 general practices across England from the QResearch database. Participants Eligible adults aged 40–74 years including attendees at a National Health Service (NHS) Health Check. Intervention NHS Health Check: routine structured cardiovascular check with support for behavioural change and in those at highest risk, treatment of risk factors and newly identified comorbidity. Results Of 1.68 million people eligible for an NHS Health Check, 214 295 attended in the period 2009–12. Attendance quadrupled as the programme progressed; 5.8% in 2010 to 30.1% in 2012. Attendance was relatively higher among older people, of whom 19.6% of those eligible at age 60–74 years attended and 9.0% at age 40–59 years. Attendance by population groups at higher cardiovascular disease (CVD) risk, such as the more socially disadvantaged 14.9%, was higher than that of the more affluent 12.3%. Among attendees 7844 new cases of hypertension (38/1000 Checks), 1934 new cases of type 2 diabetes (9/1000 Checks) and 807 new cases of chronic kidney disease (4/1000 Checks) were identified. Of the 27 624 people found to be at high CVD risk (20% or more 10-year risk) when attending an NHS Health Check, 19.3% (5325) were newly prescribed statins and 8.8% (2438) were newly prescribed antihypertensive therapy. Conclusions NHS Health Check coverage was lower than expected but showed year-on-year improvement. Newly identified comorbidities were an important feature of the NHS Health Checks. Statin treatment at national scale for 1 in 5 attendees at highest CVD risk is likely to have contributed to important reductions in their CVD events. PMID:26762161

  20. Application of risk-based methods to inservice testing of check valves

    International Nuclear Information System (INIS)

    Research efforts have been underway in the American Society of Mechanical Engineers (ASME) and industry to define appropriate methods for the application of risk-based technology in the development of inservice testing (IST) programs for pumps and valves in nuclear steam supply systems. This paper discusses a pilot application of these methods to the inservice testing of check valves in the emergency core cooling system of Georgia Power's Vogtle nuclear power station. The results of the probabilistic safety assessment (PSA) are used to divide the check valves into risk-significant and less-risk-significant groups. This information is reviewed by a plant expert panel along with the consideration of appropriate deterministic insights to finally categorize the check valves into more safety-significant and less safety-significant component groups. All of the more safety-significant check valves are further evaluated in detail using a failure modes and causes analysis (FMCA) to assist in defining effective IST strategies. A template has been designed to evaluate how effective current and emerging tests for check valves are in detecting failures or in finding significant conditions that are precursors to failure for the likely failure causes. This information is then used to design and evaluate appropriate IST strategies that consider both the test method and frequency. A few of the less safety-significant check valves are also evaluated using this process since differences exist in check valve design, function, and operating conditions. Appropriate test strategies are selected for each check valve that has been evaluated based on safety and cost considerations. Test strategies are inferred from this information for the other check valves based on similar check valve conditions. Sensitivity studies are performed using the PSA model to arrive at an overall IST program that maintains or enhances safety at the lowest achievable cost

  1. Medication double-checking procedures in clinical practice: a cross-sectional survey of oncology nurses' experiences

    Science.gov (United States)

    Pfeiffer, Yvonne; Taxis, Katja

    2016-01-01

    Background Double-checking is widely recommended as an essential method to prevent medication errors. However, prior research has shown that the concept of double-checking is not clearly defined, and that little is known about actual practice in oncology, for example, what kind of checking procedures are applied. Objective To study the practice of different double-checking procedures in chemotherapy administration and to explore nurses' experiences, for example, how often they actually find errors using a certain procedure. General evaluations regarding double-checking, for example, frequency of interruptions during and caused by a check, or what is regarded as its essential feature was assessed. Methods In a cross-sectional survey, qualified nurses working in oncology departments of 3 hospitals were asked to rate 5 different scenarios of double-checking procedures regarding dimensions such as frequency of use in practice and appropriateness to prevent medication errors; they were also asked general questions about double-checking. Results Overall, 274 nurses (70% response rate) participated in the survey. The procedure of jointly double-checking (read-read back) was most commonly used (69% of respondents) and rated as very appropriate to prevent medication errors. Jointly checking medication was seen as the essential characteristic of double-checking—more frequently than ‘carrying out checks independently’ (54% vs 24%). Most nurses (78%) found the frequency of double-checking in their department appropriate. Being interrupted in one's own current activity for supporting a double-check was reported to occur frequently. Regression analysis revealed a strong preference towards checks that are currently implemented at the responders' workplace. Conclusions Double-checking is well regarded by oncology nurses as a procedure to help prevent errors, with jointly checking being used most frequently. Our results show that the notion of independent checking needs to be

  2. Evidence for the safety assurance of the radiation associated equipments for stat-up check

    International Nuclear Information System (INIS)

    Based on the new amendment of the Medical Service Law and the Pharmaceutical Affairs Law, the safety control for the medical equipments and devices was strengthened; and a radiological technologist should be stipulated as a safety control manager for the medical equipments and devices. Although it is thought that Start-up check is important for the safety assurance, the enforcement situation is not clear until now. In this report, on the occasion of the start-up of the new Law, questionnaire about the start up check (time and a check items) were investigated from 56 hospitals applying the visit interview. Modality by modality check up time was obtained from 261 institutions by the descriptive study paper type. Start-up check and arming up were applied for almost all modalities about 30 minutes before start of the clinical tests. The check up items for the medical equipments and devices depended on each hospital. Therefore, safety assurance should be established, cooperating with the medical equipment distributors, the hospital sharing the checked results for the patients' safety. (author)

  3. Transient analysis for a system with a tilted disc check valve

    International Nuclear Information System (INIS)

    Check valves are used to prevent reverse flow conditions in a variety of systems in nuclear power plants. When a check valve is closed by a reverse flow, the transient load can jeopardize the structural integrity on the piping system and its supports. It may also damage intended function of the in-line components even though the severity of the load differs and depends strongly on types of the check valves. To incorporate the transient load in the piping system, it is very important to properly predict the system response to transients such as a check valve closure accompanied by pump trip and to evaluate the system transient. The one-dimensional transient simulation codes such as the RELAP5/MOD3.3 and TRACE were used. There has not been a single model that integrates the two codes to handle the behavior of a tilted disc check valve, which is designed to mitigate check valve slams by shorting the travel of the disc. In this paper a model is presented to predict the dynamic motion of a tilted disc check valve in the transient simulation using the RELAP5/MOD3.3 code and the model is incorporated in a system transient analysis using control variables of the code. In addition, transient analysis for Essential Service Water (ESW) system is performed using the proposed model and the associated load is evaluated for the system. (author)

  4. Development of a butterfly check valve model under natural circulation conditions

    International Nuclear Information System (INIS)

    Highlights: • Bases on Lim’s swing check valve model, a butterfly check valve model was developed. • The method to quantify the friction torque TF in Li’s model was corrected. • The developed model was implemented into the RELAP5 code and verified. - Abstract: A butterfly check valve is widely used to prevent a reverse flow in the pipe lines of a marine nuclear power plant. Under some conditions, the natural circulation conditions in particular, the fluid velocity through the butterfly check valve might become too low to hold the valve disk fully open, thereby the flow resistance of the butterfly check valve varies with the location of the valve disk and as a result the fluid flow is significantly affected by the dynamic motion of the valve disk. Simulation of a pipe line that includes some butterfly check valves, especially under natural circulation conditions, is thus complicated. This paper focuses on the development of a butterfly check valve model to enhance the capability of the thermal–hydraulic system code and the developed model is implemented into the RELAP5 code. Both steady-state calculations and transient calculations were carried out for the primary loop system of a marine nuclear power plant and the calculation results are compared with the experimental data for verification purpose. The simulation results show an agreement with the experimental data

  5. SU-D-BRD-01: An Automated Physics Weekly Chart Checking System Supporting ARIA

    Energy Technology Data Exchange (ETDEWEB)

    Chang, X; Yang, D [Washington University in St Louis, St Louis, MO (United States)

    2015-06-15

    Purpose: A software tool was developed in this study to perform automatic weekly physics chart check on the patient data in ARIA. The tool accesses the electronic patient data directly from ARIA server and checks the accuracy of treatment deliveries, and generates reports which summarize the delivery history and highlight the errors. Methods: The tool has four modules. 1) The database interface is designed to directly access treatment delivery data from the ARIA database before reorganizing the data into the patient chart tree (PCT). 2) PCT is a core data structure designed to store and organize the data in logical hierarchies, and to be passed among functions. 3) The treatment data check module analyzes the organized data in PCT and stores the checking results into PCT. 4) Report generation module generates reports containing the treatment delivery summary, chart checking results and plots of daily treatment setup parameters (couch table positions, shifts of image guidance). The errors that are found by the tool are highlighted with colors. Results: The weekly check tool has been implemented in MATLAB and clinically tested at two major cancer centers. Javascript, cascading style sheets (CSS) and dynamic HTML were employed to create the user-interactive reports. It takes 0.06 second to search the delivery records of one beam with PCT and compare the delivery records with beam plan. The reports, saved in the HTML files on shared network folder, can be accessed by web browser on computers and mobile devices. Conclusion: The presented weekly check tool is useful to check the electronic patient treatment data in Varian ARIA system. It could be more efficient and reliable than the manually check by physicists. The work was partially supported by a research grant from Varian Medical System.

  6. SU-D-BRD-01: An Automated Physics Weekly Chart Checking System Supporting ARIA

    International Nuclear Information System (INIS)

    Purpose: A software tool was developed in this study to perform automatic weekly physics chart check on the patient data in ARIA. The tool accesses the electronic patient data directly from ARIA server and checks the accuracy of treatment deliveries, and generates reports which summarize the delivery history and highlight the errors. Methods: The tool has four modules. 1) The database interface is designed to directly access treatment delivery data from the ARIA database before reorganizing the data into the patient chart tree (PCT). 2) PCT is a core data structure designed to store and organize the data in logical hierarchies, and to be passed among functions. 3) The treatment data check module analyzes the organized data in PCT and stores the checking results into PCT. 4) Report generation module generates reports containing the treatment delivery summary, chart checking results and plots of daily treatment setup parameters (couch table positions, shifts of image guidance). The errors that are found by the tool are highlighted with colors. Results: The weekly check tool has been implemented in MATLAB and clinically tested at two major cancer centers. Javascript, cascading style sheets (CSS) and dynamic HTML were employed to create the user-interactive reports. It takes 0.06 second to search the delivery records of one beam with PCT and compare the delivery records with beam plan. The reports, saved in the HTML files on shared network folder, can be accessed by web browser on computers and mobile devices. Conclusion: The presented weekly check tool is useful to check the electronic patient treatment data in Varian ARIA system. It could be more efficient and reliable than the manually check by physicists. The work was partially supported by a research grant from Varian Medical System

  7. Check Point Puts Out Completely New Solution VPN-I VE%Check Point推出全新解决方案VPN-1 VE

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ 日前,Check Point软件技术有限公司推出了VPN-1虚拟版本(VE),它能为虚拟应用程序提供财富500强用于企业网络和数据中心一样水平的安全保护.Check Point是首个可同时为物理网络和虚拟应用程序提供统一网络管理的厂商.

  8. An Approach to Checking 3D Model with Related Engineering Drawings

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    For some reasons, engineers build their product 3D mo del according to a set of related engineering drawings. The problem is how we ca n know the 3D model is correct. The manual checking is very boring and time cons uming, and still could not avoid mistakes. Thus, we could not confirm the model, maybe try checking again. It will effect the production preparing cycle greatly , and should be solved in a intelligent way. The difficulties are quite obvious, unlike word checking in a word processing package, ...

  9. A transactional approach to preventing early childhood neglect: The Family Check-Up as a public health strategy.

    Science.gov (United States)

    Dishion, Thomas J; Mun, Chung Jung; Drake, Emily C; Tein, Jenn-Yun; Shaw, Daniel S; Wilson, Melvin

    2015-11-01

    This study examined the hypothesis that a brief, strengths-based home visiting strategy can promote positive engagement between caregiver and child and thereby reduce various forms of early childhood neglect. A total of 731 low-income families receiving services through the Women, Infants, and Children nutritional supplement program were randomized to the Women, Infants, and Children as usual or the Family Check-Up intervention. Assessments and intervention services were delivered in the home environment at ages 2, 3, 4, and 5. During the assessments, staff videotaped caregiver-child interactions and rated various features of the home environment, including the physical appropriateness of the home setting for children. Trained observers later coded the videotapes, unaware of the family's intervention condition. Specific caregiver-child interaction patterns were coded and macroratings were made of the caregiver's affection, monitoring, and involvement with the child. An intention to treat design revealed that randomization to the Family Check-Up increased duration of positive engagement between caregivers and children by age 3, which in turn was prognostic of less neglect of the child at age 4, controlling for family adversity. It was also found that family adversity moderated the impact of the intervention, such that the families with the most adverse circumstances were highly responsive to the intervention. Families with the highest levels of adversity exhibited the strongest mediation between positive engagement and reduction of neglect. Findings are discussed with respect to developmental theory and their potential implications for a public health approach to the prevention of early childhood maltreatment. PMID:26535950

  10. What African Americans with Diabetes or High Blood Pressure Need to Know: Get Checked for Kidney Disease

    Science.gov (United States)

    ... Language URL What African Americans with Diabetes or High Blood Pressure Need to Know Page Content Get Checked for ... I be checked for kidney disease? Diabetes and high blood pressure can damage the kidneys and lead to kidney ...

  11. Gamma field characterization within building area of new sanitary check point

    International Nuclear Information System (INIS)

    Results of angular distribution, gamma spectra and exposure dose rate measurements at different height from earth surface within building site of new sanitary check point are submitted. Analysis of data collected is made

  12. Check Point完成收购诺基亚的安全设备业务

    Institute of Scientific and Technical Information of China (English)

    李明

    2009-01-01

    互联网安全保护领域首屈一指的Check Point软件技术有限公司宣布,该公司已经完成收购诺基亚的安全设备业务,这是双方长达12年紧密合作后的合理演进。除了Check Point UTMJ以及Power-1设备,现在客户可向Check Point直接购买先前在诺基亚口硬件平台上运行Check Point安全软件的设备。

  13. CrossCheck plagiarism screening : Experience of the Journal of Epidemiology

    Science.gov (United States)

    Hashimoto, Katsumi

    Due to technological advances in the past two decades, researchers now have unprecedented access to a tremendous amount of useful information. However, because of the extreme pressure to publish, this abundance of information can sometimes tempt researchers to commit scientific misconduct. A serious form of such misconduct is plagiarism. Editors are always concerned about the possibility of publishing plagiarized manuscripts. The plagiarism detection tool CrossCheck allows editors to scan and analyze manuscripts effectively. The Journal of Epidemiology took part in a trial of CrossCheck, and this article discusses the concerns journal editors might have regarding the use of CrossCheck and its analysis. In addition, potential problems identified by CrossCheck, including self-plagiarism, are introduced.

  14. Efficient model checking for duration calculus based on branching-time approximations

    DEFF Research Database (Denmark)

    Fränzle, Martin; Hansen, Michael Reichhardt

    2008-01-01

    Duration Calculus (abbreviated to DC) is an interval-based, metric-time temporal logic designed for reasoning about embedded real-time systems at a high level of abstraction. But the complexity of model checking any decidable fragment featuring both negation and chop, DC's only modality, is non......-elementary and thus impractical. We here investigate a similar approximation as frequently employed in model checking situation-based temporal logics, where linear-time problems are safely approximated by branching-time counterparts amenable to more efficient model-checking algorithms. Mimicking the role that a...... situation has in (A)CTL as origin of a set of linear traces, we define a branching-time counterpart to interval-based temporal logics building on situation pairs spanning sets of intervals. While this branching-time interval semantics yields the desired reduction in complexity of the model-checking problem...

  15. Efficient Symmetry Reduction and the Use of State Symmetries for Symbolic Model Checking

    Directory of Open Access Journals (Sweden)

    Christian Appold

    2010-06-01

    Full Text Available One technique to reduce the state-space explosion problem in temporal logic model checking is symmetry reduction. The combination of symmetry reduction and symbolic model checking by using BDDs suffered a long time from the prohibitively large BDD for the orbit relation. Dynamic symmetry reduction calculates representatives of equivalence classes of states dynamically and thus avoids the construction of the orbit relation. In this paper, we present a new efficient model checking algorithm based on dynamic symmetry reduction. Our experiments show that the algorithm is very fast and allows the verification of larger systems. We additionally implemented the use of state symmetries for symbolic symmetry reduction. To our knowledge we are the first who investigated state symmetries in combination with BDD based symbolic model checking.

  16. Validation of mission critical software design and implementation using model checking

    Science.gov (United States)

    Pingree, P. J.; Mikk, E.; Holzmann, G.; Smith, M.; Dams, D.

    2002-01-01

    Model Checking conducts an exhaustive exploration of all possible behaviors of a software system design and as such can be used to detect defects in designs that are typically difficult to discover with conventional testing approaches.

  17. [Southeastern Cooperative wildlife disease study: Tennessee National Wildlife Refuge deer herd health checks

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Enclosed are the reports on the deer herd health checks conducted on the Big Sandy and Duck River Units of Tennessee National Wildlife Refuge, Henry and Humphrey...

  18. Southeastern Cooperative wildlife disease study: Tennessee National Wildlife Refuge deer herd health checks

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Enclosed are our reports on the deer herd health checks we conducted on the Duck River and Big Sandy Units, Tennessee National Wildlife Refuge, Humphrey and Henry...

  19. Acoustic emission condition monitoring of a nuclear power plant check valve using artificial neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Joon Hyun; Lee, Min Rae [Pusan National University, Pusan (Korea, Republic of); Kim, Jung Teak [Korea Atomic Energy Research Institute, Taejeon (Korea, Republic of)

    2005-11-15

    In this study, an advanced condition monitoring technique based on acoustic emission (AE) detection and artificial neural networks was applied to a check valve, one of the components being used extensively in a safety system of a nuclear power plant (Npp). AE testing for a check valve under controlled flow loop conditions was performed to detect and evaluate disk movement for valve degradation such as wear and leakage due to foreign object interference in a check valve. It is clearly demonstrated that the evaluation of different types of failure modes such as disk wear and check valve leakage were successful by systematically analyzing the characteristics of various AE parameters. It is also shown that the leak size can be determined with an artificial neural network.

  20. Acoustic emission condition monitoring of a nuclear power plant check valve using artificial neural networks

    International Nuclear Information System (INIS)

    In this study, an advanced condition monitoring technique based on acoustic emission (AE) detection and artificial neural networks was applied to a check valve, one of the components being used extensively in a safety system of a nuclear power plant (Npp). AE testing for a check valve under controlled flow loop conditions was performed to detect and evaluate disk movement for valve degradation such as wear and leakage due to foreign object interference in a check valve. It is clearly demonstrated that the evaluation of different types of failure modes such as disk wear and check valve leakage were successful by systematically analyzing the characteristics of various AE parameters. It is also shown that the leak size can be determined with an artificial neural network

  1. Check for Safety: A Home Fall Prevention Checklist for Older Adults

    Science.gov (United States)

    ... in another outlet. P Check for Safety 4 STAIRS AND STEPS: Look at the stairs you use both inside and outside your home. ... papers, shoes, books, or other objects on the stairs? Pick up things on the stairs. Always keep ...

  2. Mitigating check valve slamming and subsequentwater hammer events for PPFS using MOC

    Institute of Scientific and Technical Information of China (English)

    TIAN Wenxi; SU Guanghui; WANG Gaopeng; QIU Suizheng; XIAO Zejun

    2009-01-01

    The method of characteristic (MOC) was adopted to analyze the check valve-induced water hammer behaviors for a Parallel Pumps Feedwater System (PPFS) during the alternate startup process. The motion of check valve disc was simulated using inertial valve model. Transient parameters including the pressure oscillation, local flow velocity and slamming of the check valve disc etc. have been obtained. The results showed that severe slamming between the valve disc and valve seat occurred during the alternate startup of parallel pumps. The induced maximum pressure vibration amplitude is up to 5.0 MPa. The scheme of appending a damping torque to slow down the check valve closing speed was also performed to mitigate of water hammer. It has been numerically approved to be an effective approach.

  3. 78 FR 55014 - Machine Guns, Destructive Devices and Certain Other Firearms; Background Checks for Responsible...

    Science.gov (United States)

    2013-09-09

    ... for each responsible person, including each responsible person's full name, position, social security... information, including the responsible person's full name, position, social security number (optional), home..., Destructive Devices and Certain Other Firearms; Background Checks for Responsible Persons of a...

  4. Deterministic Compilation of Temporal Safety Properties in Explicit State Model Checking

    Data.gov (United States)

    National Aeronautics and Space Administration — The translation of temporal logic specifications constitutes an essen- tial step in model checking and a major influence on the efficiency of formal verification...

  5. Low-Density Parity-Check Codes for High Data Rate Receivers Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Low-Density Parity-Check (LDPC) Forward Error Correction (FEC) schemes are excellent tools in optimizing telemetry data integrity within the limited space to ground...

  6. The Quality Assurance and Constancy Checking of Fluoroscopy and Fluorography Systems

    International Nuclear Information System (INIS)

    X ray procedures which involve fluoroscopy often give significant radiation doses to patients. A valuable radiation protection procedure is the adoption of a quality assurance programme which will ensure the continual production of optimal quality images with the minimum necessary dose to the patient. Various publications exist which provide information on quality assurance (QA) and constancy checking of fluoroscopy and fluorography systems. These publications were reviewed and tests recommended for QA and constancy checking of fluoroscopy and fluorography systems are presented. It was found that not much information exists on QA and constancy checking for digital subtraction angiography and digital fluorography systems. More research is required in this field. Information on protocols used by various countries of the European Community for QA and constancy checking of fluoroscopy and fluorography systems was gathered. From this information it is apparent that there is a need for harmonisation within Europe. (author)

  7. Neural Network Approach to Automated Condition Classification of a Check Valve by Acoustic Emission Signals

    International Nuclear Information System (INIS)

    This paper presents new techniques under development for monitoring the health and vibration of the active components in nuclear power plants, The purpose of this study is to develop an automated system for condition classification of a check valve one of the components being used extensively in a safety system of a nuclear power plant. Acoustic emission testing for a check valve under controlled flow loop conditions was performed to detect and evaluate disc movement for valve failure such as wear and leakage due to foreign object interference in a check valve, It is clearly demonstrated that the evaluation of different types of failure types such as disc wear and check valve leakage were successful by systematically analyzing the characteristics of various AE parameters, It is also shown that the leak size can be determined with an artificial neural network

  8. Library-based scalable refinement checking for contract-based design

    OpenAIRE

    Iannopollo, A; Nuzzo, P; Tripakis, S; Sangiovanni-Vincentelli, A.

    2014-01-01

    Given a global specification contract and a system described by a composition of contracts, system verification reduces to checking that the composite contract refines the specification contract, i.e. that any implementation of the composite contract implements the specification contract and is able to operate in any environment admitted by it. Contracts are captured using high-level declarative languages, for example, linear temporal logic (LTL). In this case, refinement checking reduces to ...

  9. Five Percent Post Survey Check Of National Family Health Survey (NFHS) In ORISSA

    OpenAIRE

    Kumar Benera Sudhir; Singh Padam

    1999-01-01

    Research questions: How well a post survey sample check of NFHS correlates with the findings of NFHS? Objective: Post survey check of National Family Health Survey carried out in 1992-93. Study design: Multistage sampling method with 5 percent sample of original NFHS sample. Setting: Study covered 5 percent sample of original NFHS sample. Subjects: Five percent household sample (1093 members) of original NFHS sample was studied and compared with NFHS data. Method: Information from five percen...

  10. Check Point召开中国区代理商发展大会

    Institute of Scientific and Technical Information of China (English)

    王晓梅

    2004-01-01

    10月29日,Check Point公司在北京召开中国区代理商发展大会,中国区总经理金丁在会上宣布,Check Point的全球崭新渠道伙伴合作计划已经在中国全面开展。

  11. Check Point跻身Gartner网络防火墙Magic Quadrant领导者行列

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    在全球互联网安全领域首屈一指的Check Point软件技术有限公司宣布,Gartner在其最近发表的“企业网络防火墙魔术象限”报告(Magic Quadrant)中.把Check Point评为“领导者级别”。

  12. Presence of Check-off Programs and Industry Concentration in the Food Manufacturing Sector

    OpenAIRE

    Schulz, Lee L.; Crespi, John M.

    2012-01-01

    The authors examine industry concentration for the U.S. food manufacturing sector. This study is the first to examine whether particular subsectors within the food manufacturing industry, which operate in the presence of industry-funded check-off programs such as marketing orders, are more or less concentrated than industries without such research and marketing programs. The authors find evidence to the hypothesis that industries with demand-enhancing check-off programs have lower concentrati...

  13. Model checking and strategy synthesis for stochastic games: from theory to practice

    OpenAIRE

    Kwiatkowska, MZ

    2016-01-01

    Probabilistic model checking is an automatic procedure for establishing if a desired property holds in a probabilistic model, aimed at verifying quantitative probabilistic specifications such as the probability of a critical failure occurring or expected time to termination. Much progress has been made in recent years in algorithms, tools and applications of probabilistic model checking, as exemplified by the probabilistic model checker PRISM (www.prismmodelchecker.org). However, the unstoppa...

  14. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    OpenAIRE

    Bing Du; Jun Zhang

    2010-01-01

    A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC) model, a common compact model in hierarchical wireless sensor networks (WSNs). The scheme uses Low-Density Parity-Check (LDPC) as the ...

  15. ELECTRO-RESISTANCE METHOD OF CHECK A PROCESS GRINDING THE ROLLING BEARINGS

    Directory of Open Access Journals (Sweden)

    K. V. Podmasteryev

    2015-08-01

    Full Text Available Base a possibility of monitoring processes of grinding the rolling bearings with use electroresistance method of check. Is write of essence this method, are analyses his peculiarities, which are provide objective information on the condition a object by his grinding. Are consider the results of experimental researches the effective different diagnostically parameters, which are confirm a possibility of realization objective check of grinding the rolling bearings with use electro-resistance method.

  16. On Self-Checking Design of CMOS Circuits for Multiple Faults

    OpenAIRE

    Fadi Busaba; Parag K. Lala; Alvernon Walker

    1998-01-01

    A technique for designing totally self-checking (TSC) FCMOS (Fully Complementary MOS) designs for multiple faults is presented in this paper. The existing techniques for self checking design consider only single faults, and suffer from high silicon area overhead. The multiple faults considered in this paper are multiple breaks, multiple transistors stuck-offs and multiple transistors stuck-ons. Starting from FCMOS design, small modifications (addition of two-weak transistors) make the origina...

  17. REGULAR LOW-DENSITY PARITY-CHECK CODES BASED ON SHIFTED IDENTITY MATRICES

    Institute of Scientific and Technical Information of China (English)

    He Shanbao; Zhao Chunming; Jiang Ming

    2006-01-01

    This paper extends the class of Low-Density Parity-Check (LDPC) codes that can be constructed from shifted identity matrices. To construct regular LDPC codes, a new method is proposed. Two simple inequations are adopted to avoid the short cycles in Tanner graph, which makes the girth of Tanner graphs at least 8. Because their parity-check matrices are made up of circulant matrices, the new codes are quasi-cyclic codes. They perform well with iterative decoding.

  18. Checking Fine and Gray Subdistribution Hazards Model with Cumulative Sums of Residuals

    OpenAIRE

    Li, Jianing; Scheike, Thomas H.; Zhang, Mei-Jie

    2014-01-01

    Recently, Fine and Gray (1999) proposed a semi-parametric proportional regression model for the subdistribution hazard function which has been used extensively for analyzing competing risks data. However, failure of model adequacy could lead to severe bias in parameter estimation, and only a limited contribution has been made to check the model assumptions. In this paper, we present a class of analytical methods and graphical approaches for checking the assumptions of Fine and Gray’s model. T...

  19. Recommended Screening-Checks for Placed Orders in Industry Internal Tool- OMS

    OpenAIRE

    Niranjanamurthy M; Dr. Dharmendra Chahar

    2014-01-01

    This paper gives the information and proposed solution regarding Screening Checks for Industry Internal Tool-Order Management System. After placing orders by customers through shopping website the industry people should verify the orders in different ways to avoid loss. Need to do Screening and in different checks for Maximize acceptance of valid orders, Increase customer service productivity, More tailored and effective screening strategies, Minimize online fraud losses. Free up your teams t...

  20. The importance of check-cashing businesses to the unbanked: racial/ethnic differences

    OpenAIRE

    Greene, William H.; Sherrie L. W. Rhine; Maude Toussaint-Comeau

    2003-01-01

    The roughly 9.5 percent of all U.S. families that are without some type of transaction account (unbanked) are disproportionately represented by minorities. The unbanked often must rely on alternative ways to carry out basic financial transactions such as cashing payroll checks and paying bills. This study analyzes unique survey data and finds that a consumer's decision to patronize check-cashing businesses is jointly made with the decision to be unbanked. For the unbanked, these businesses ar...

  1. Vocal cord dysfunction diagnosis may be improved by a screening check list

    OpenAIRE

    Lucia Helena Eduardo Pinto; Marcelo Vivolo Aun; Sabrina Cukier-Blaj; Rafael Stelmach; Alberto Cukier; Jorge Kalil; Rosana Câmara Agondi; Pedro Giavina-Bianchi

    2016-01-01

    Background: Many patients with vocal cord dysfunction (VCD), with or without asthma, receive inappropriate treatment because they are misdiagnosed as having difficult-to-control asthma alone. We developed a clinical screening check list designed to aid the diagnosis of VCD. Methods: A prospective observational study involving 80 patients aged ≥18 years, diagnosed with severe asthma. After anamnesis and physical examination, physicians completed a check list with 6 questions to identify VCD...

  2. Why Households Don’t Have Checking Accounts

    OpenAIRE

    Jeanne M. Hogarth; Chris E. Anguelov; Jinkook Lee

    2003-01-01

    Using the Surveys of Consumer Finances from 1992 to 1998, this article explores the reasons for not having a checking account, including product design, human capital, motivation for having a checking account, and institutional factors. Focusing primarily on reasons related to product design, we found that smaller family units, unemployed people, those with shorter planning horizons, older people, families with higher levels of education, those who have some other bank account, and those with...

  3. A standardized vascular disease health check in europe: a cost-effectiveness analysis.

    Directory of Open Access Journals (Sweden)

    C Andy Schuetz

    Full Text Available BACKGROUND: No clinical trials have assessed the effects or cost-effectiveness of health check strategies to detect and manage vascular disease. We used a mathematical model to estimate the cost-effectiveness of several health check strategies in six European countries. METHODS: We used country-specific data from Denmark, France, Germany, Italy, Poland, and the United Kingdom to generate simulated populations of individuals aged 40-75 eligible for health checks in those countries (e.g. individuals without a previous diagnosis of diabetes, myocardial infarction, stroke, or serious chronic kidney disease. For each country, we used the Archimedes model to compare seven health check strategies consisting of assessments for diabetes, hypertension, lipids, and smoking. For patients diagnosed with vascular disease, treatment was simulated in a standard manner. We calculated the effects of each strategy on the incidence of type 2 diabetes, major adverse cardiovascular events (MACE, and microvascular complications in addition to quality of life, costs, and cost per quality-adjusted life-year (QALY. RESULTS: Compared with current care, health checks reduced the incidence of MACE (6-17 events prevented per 1000 people screened and diabetes related microvasular complications (5-11 events prevented per 1000 people screened, and increased QALYs (31-59 discounted QALYs over 30 years, in all countries. The cost per QALY of offering a health check to all individuals in the study cohort ranged from €14903 (France to cost saving (Poland. Pre-screening the population and offering health checks only to higher risk individuals lowered the cost per QALY. Pre-screening on the basis of obesity had a cost per QALY of €10200 (France or less, and pre-screening with a non-invasive risk score was similar. CONCLUSIONS: A vascular disease health check would likely be cost effective at 30 years in Denmark, France, Germany, Italy, Poland, and the United Kingdom.

  4. Simple and Effective Type Check Removal through Lazy Basic Block Versioning

    OpenAIRE

    Chevalier-Boisvert, Maxime; Feeley, Marc

    2015-01-01

    Dynamically typed programming languages such as JavaScript and Python defer type checking to run time. In order to maximize performance, dynamic language VM implementations must attempt to eliminate redundant dynamic type checks. However, type inference analyses are often costly and involve tradeoffs between compilation time and resulting precision. This has lead to the creation of increasingly complex multi-tiered VM architectures. This paper introduces lazy basic block versioning, a sim...

  5. A personalized system of instruction for teaching checking account skills to adults with mild disabilities.

    OpenAIRE

    Zencius, A H; Davis, P K; Cuvo, A J

    1990-01-01

    This study evaluated the efficacy of a personalized system of instruction to teach checking account skills to persons with mild disabilities. Using a self-paced manual, 8 participants in two groups were taught to write checks, complete deposit slips, and reconcile monthly bank statements. Four participants were assessed for generalization from the classroom to community sites and demonstrated nearly perfect performance. A multiple probe design showed that acquisition occurred sequentially for...

  6. Towards Symbolic Model Checking for Multi-Agent Systems via OBDDs

    Science.gov (United States)

    Raimondi, Franco; Lomunscio, Alessio

    2004-01-01

    We present an algorithm for model checking temporal-epistemic properties of multi-agent systems, expressed in the formalism of interpreted systems. We first introduce a technique for the translation of interpreted systems into boolean formulae, and then present a model-checking algorithm based on this translation. The algorithm is based on OBDD's, as they offer a compact and efficient representation for boolean formulae.

  7. Pre-flight Functionality Check to Enhance Mission Efficacy of Precision Guided Munitions

    Directory of Open Access Journals (Sweden)

    A. K. Maini

    2009-09-01

    Full Text Available Precision-guided munitions (PGMs, because of their precision strike capability, are used extensively in the modern warfare. The efficacy of the mission is critically dependent on the successful deployment of the weapon. To ensure high level of effectiveness of these sophisticated weapons, these must be tested at regular intervals. Periodic functionality checks of these weapons are carried out using comprehensive characterisation systems. In addition to comprehensive testing, pre-flight functionality checks with the weapon strapped on to the launchplatform using portable test systems should be carried out. These functionality checks, also referred to as serviceability checks, perform Go/No Go testing of the weapon by focusing on one or two vital parameters of the guided weapon. Pre-flight functionality check of PGM allows a quick appraisal on the functional status of the vital operational parameters of relevance to efficacy of the mission. This review highlights the parameters that need to be checked, both for comprehensive testing of these weapons on a periodic basis and also those required for pre-flight functionality or readiness checks. International systems available for the purpose have also been reviewed, vis-à-vis, their capabilities and limitations to perform the two types of tests with particular emphasis on the pre-flight functionality checks with guided weapon in strap-on condition. Some alternative design approaches have also been proposed.Defence Science Journal, 2009, 59(5, pp.459-465, DOI:http://dx.doi.org/10.14429/dsj.59.1547

  8. Factors affecting response to an invitation to attend for a health check.

    OpenAIRE

    Thorogood, M; Coulter, A.; Jones, L.; Yudkin, P; Muir, J; Mant, D.

    1993-01-01

    OBJECTIVE--To describe the characteristics of general practice patients who fail to respond to an invitation to attend for a health check, in relation to demographic variables, risk factor status, health status, and attitudes to behaviour modification. DESIGN--Postal questionnaire before invitation to attend a health check and subsequent record of attendance. SETTING--Five urban general practices in Bedfordshire, UK. SUBJECTS--A total of 2678 patients aged 35-64 years were invited for a healt...

  9. Phase Two Feasibility Study for Software Safety Requirements Analysis Using Model Checking

    Science.gov (United States)

    Turgeon, Gregory; Price, Petra

    2010-01-01

    A feasibility study was performed on a representative aerospace system to determine the following: (1) the benefits and limitations to using SCADE , a commercially available tool for model checking, in comparison to using a proprietary tool that was studied previously [1] and (2) metrics for performing the model checking and for assessing the findings. This study was performed independently of the development task by a group unfamiliar with the system, providing a fresh, external perspective free from development bias.

  10. Reactivity in Rapidly Collected Hygiene and Toilet Spot Check Measurements: A Cautionary Note for Longitudinal Studies

    OpenAIRE

    Arnold, Benjamin F.; Khush, Ranjiv S.; Ramaswamy, Padmavathi; Rajkumar, Paramasivan; Durairaj, Natesan; Ramaprabha, Prabhakar; Balakrishnan, Kalpana; Colford Jr., John M.

    2015-01-01

    Discreet collection of spot check observations to measure household hygiene conditions is a common measurement technique in epidemiologic studies of hygiene in low-income countries. The objective of this study was to determine whether the collection of spot check observations in longitudinal studies could itself induce reactivity (i.e., change participant behavior). We analyzed data from a 12-month prospective cohort study in rural Tamil Nadu, India that was conducted in the absence of any hy...

  11. SPELL CHECKING AND ERROR CORRECTING SYSTEM FOR TEXT PARAGRAPHS WRITTEN IN PUNJABI OR HINDI LANGUAGEUSING HYBRID APPROACH

    OpenAIRE

    Amandeep Singh; Prof. Meenakshi Sharma

    2016-01-01

    Spell-checking is the process of detecting and correcting incorrectly spelled words in a text paragraph. Spell checking system first detects the incorrect words and then provide the best possible solution of corrected words. Spell checking system is a combination of handcrafted rules of the language for which spell checking system is to be created and a dictionary which contain the accurate spellings of various words. Better rules and large dictionary of words is help to improve the rate of e...

  12. Postcode Lotteries in Public Health - The NHS Health Checks Programme in North West London

    Directory of Open Access Journals (Sweden)

    McCoy David C

    2011-09-01

    Full Text Available Abstract Background Postcode lotteries in health refer to differences in health care between different geographic areas. These have been previously associated with clinical services. However there has been little documentation of postcode lotteries relating to preventative health care services. This paper describes a postcode lottery effect in relation to the NHS Health Checks Programme (a national cardiovascular screening programme in England in eight PCTs in the North West sector of London. Methods A descriptive cross-sectional analysis of the Health Checks Programme was carried out in eight PCTs in North West London using a structured data-collecting instrument. Results The analysis found variation in the implementation of the national Health Checks Programme in terms of: the screening approach taken; the allocated budget (which varied from £69,000 to £1.4 million per 100,000 eligible population; payment rates made to providers of Health Checks; tools used to identify and measure risk of cardiovascular disease and diabetes; monitoring and evaluation; and preventative services available following the health check. Conclusions This study identifies a postcode lottery effect related to a national public health programme. Although it is important to allow enough flexibility in the design of the Health Checks Programme so that it fits in with local factors, aspects of the programme may benefit from greater standardisation or stronger national guidance.

  13. Condition monitoring of a check valve for nuclear power plants by means of acoustic emission technique

    International Nuclear Information System (INIS)

    The primary object of this work is to investigate advanced condition monitoring systems based on acoustic emission (AE) detection that can provide timely detection of check valve degradation and service aging so that maintenance/replacement could be performed prior to loss of safety function. The research is focused on the capability of AE technique to provide diagnostic information useful in determining check valve aging and degradation, check valve failures and undesirable operating modes. The systematic approach to classify the dynamic responses of AE signatures associated with typical failure modes of check valve for nuclear power plants is performed in this study. The characteristics of AE signature responses of internal parts of check valves due to local aging and degradation is analyzed by extracting effective AE parameters. This work also includes the investigation and adaptation of several advanced sensor technologies such as accelerometer and advanced ultrasonic technique. In addition, this work will develop advanced sophisticated signal processing, noise reduction, and pattern recognition techniques and algorithms from check valve degradation. (author)

  14. Sediment impact assessment of check-dam removal strategies on a mountain river in Taiwan

    Science.gov (United States)

    Kuo, W.; Wang, H.; Stark, C. P.

    2011-12-01

    Dam removal is important for reconnecting river habitats and restoring the free flow of water and sediment, so managing accumulated sediments is crucial in dam removal planning as the cost and potential impacts of dam removal can vary substantially depending on local conditions. A key uncertainty in dam removal is the fate of reservoir sediment stored upstream of the dam. Release of impounded sediment could raise downstream bed elevations leading to flooding, increase lateral channel mobility leading to bank erosion, and potentially bury downstream ecologically sensitive habitats if the sediment is fine. The ability to predict the sediment impacts of dam removal in highly sediment-filled systems is thus increasingly important as the number of such dam-removal cases is growing. Due to the safety concerns and the need for habitat restoration for the Formosan landlocked salmon, the Shei-Pa National Park in Taiwan removed the 15m high Chijiawan "No. 1 Check Dam" in late May 2011. During the planning process prior to removal, we conducted field surveys, numerical simulations, and flume experiments to determine sediment impacts and to suggest appropriate dam removal strategies. We collected river-bed topography and sediment bulk samples in 2010 to establish the channel geometry and grain-size distribution for modeling input. The scaled flume experiment was designed to provide insights on how and if the position of a notch location and size would affect the rate and amount of reservoir erosion under particular discharges. Observations indicated that choices of notch location can force the river to migrate differently. For long-term prediction, we used the quasi-two-dimensional numerical model NETSTARS (Network of Stream Tube model for Alluvial River Simulation) to simulate the channel responses. These simulations indicated that high suspended sediment concentrations would be the most likely major concern in the first year, while concerns for downstream sediment deposition

  15. Evaluation of the Machine Performance Check application for TrueBeam Linac

    International Nuclear Information System (INIS)

    Machine Performance Check (MPC) is an application to verify geometry and beam performances of TrueBeam Linacs, through automated checks based on their kV-MV imaging systems. In this study, preliminary tests with MPC were analyzed using all photon beam energies of our TrueBeam, comparing whenever possible with external independent checks. Data acquisition comprises a series of 39 images (12 with kV and 27 with MV detector) acquired at predefined positions without and with the IsoCal phantom in the beam, and with particular MLC pattern settings. MPC performs geometric and dosimetric checks. The geometric checks intend to test the treatment isocenter size and its coincidence with imaging devices, the positioning accuracy of the imaging systems, the collimator, the gantry, the jaws, the MLC leaves and the couch position. The dosimetric checks: refer to a reference MV image and give the beam output, uniformity and center change relative to the reference. MPC data were acquired during 10 repetitions on different consecutive days. Alternative independent checks were performed. Geometric: routine mechanical tests, Winston-Lutz test for treatment isocenter radius. Dosimetric: the 2D array StarCheck (PTW) was used just after the MPC data acquisition. Results were analyzed for 6, 10, 15 MV flattened, and 6, 10 MV FFF beams. Geometric checks: treatment isocenter was between 0.31 ± 0.01 mm and 0.42 ± 0.02 mm with MPC, compared to 0.27 ± 0.01 mm averaged on all energies with the Winston-Lutz test. Coincidence of kV and MV imaging isocenters was within 0.36 ± 0.0 and 0.43 ± 0.06 mm, respectively (0.4 ± 0.1 mm with external tests). Positioning accuracy of MLC was within 0.5 mm; accuracy of jaws was 0.04 ± 0.02, 0.10 ± 0.05, −1.01 ± 0.03, 0.92 ± 0.04 mm for X1, X2, Y1, Y2 jaws, respectively, with MPC. Dosimetric tests: the output stability relative to the baseline was in average 0.15 ± 0.07% for MPC to compare with 0.3 ± 0.2% with the independent measurement. MPC

  16. Check Point为亚太市场演绎3D安全方针

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    CheckPoint软件技术有限公司于8月31日至9月6日期间分别在曼谷和悉尼成功举行了2011 Check Point Experience (CPX)亚太年会,此次年会聚焦于Check Point 3D安全方针,这个革新性构想整合了政策、员工以及执行力三个要素,将安全保护演变为商业流程.来自亚太各地的900多位客户、合作伙伴、媒体和分析师与Check Point代表济济一堂,共同探讨安全热点问题.Check Point高层主持了多个专题演讲,主题包括安全威胁不断演变下企业面对的挑战,以及3D安全方针如何应用于实际客户环境等.Check Point安全专家还为与会人士介绍了重要的行业趋势,包括维基及Stuxnet泄密带来的安全教训;Web 2.0、移动计算和虚拟技术等新兴科技带来的安全隐患等.此外,与会者也观摩了Check Point现场所演示的尖端安全解决方案,包括最新发布的R75.20软件刀片、21400安全设备和61000安全系统.

  17. The PapilloCheck Assay for Detection of High-Grade Cervical Intraepithelial Neoplasia.

    Science.gov (United States)

    Crosbie, Emma J; Bailey, Andrew; Sargent, Alex; Gilham, Clare; Peto, Julian; Kitchener, Henry C

    2015-11-01

    Human papillomavirus (HPV) testing is used in primary cervical screening, as an adjunct to cervical cytology for the management of low grade abnormal cytology, and in a test of cure. PapilloCheck (Greiner Bio-One) is a PCR-based DNA microarray system that can individually identify 24 HPV types, including the 13 high-risk (HR) types identified by Hybrid Capture 2 (HC2). Here, we compare PapilloCheck with HC2 for the detection of high-grade cervical intraepithelial neoplasia (CIN2+) in a total of 8,610 cervical cytology samples from the ARTISTIC population-based cervical screening study. We performed a retrospective analysis of 3,518 cytology samples from round 1 ARTISTIC enriched for underlying CIN2+ (n = 723) and a prospective analysis of 5,092 samples from round 3 ARTISTIC. Discrepant results were tested using the Roche reverse line blot (RLB) or Linear Array (LA) assay. The relative sensitivity and specificity of HR PapilloCheck compared with that of HC2 for the detection of CIN2+ in women aged over 30 years were 0.94 (95% confidence interval [CI], 0.91, 0.97) and 1.05 (95% CI, 1.04, 1.05), respectively. HC2 missed 44/672 (7%) CIN2+ lesions, while HR PapilloCheck missed 74/672 (11%) CIN2+ lesions. Thirty-six percent of HC2-positive normal cytology samples were HR HPV negative by both PapilloCheck and RLB/LA, indicating that the use of HR PapilloCheck rather than HC2 in population-based primary screening would reduce the number of additional tests required (e.g., reflex cytology) in women where underlying CIN2+ is extremely unlikely. HR PapilloCheck could be a suitable HPV detection assay for use in the cervical screening setting. PMID:26338859

  18. Influence of check dams on debris-flow run-out intensity

    Directory of Open Access Journals (Sweden)

    A. Remaître

    2008-12-01

    Full Text Available Debris flows are very dangerous phenomena claiming thousands of lives and millions of Euros each year over the world. Disaster mitigation includes non-structural (hazard mapping, insurance policies, active structural (drainage systems and passive structural (check dams, stilling basins countermeasures. Since over twenty years, many efforts are devoted by the scientific and engineering communities to the design of proper devices able to capture the debris-flow volume and/or break down the energy. If considerable theoretical and numerical work has been performed on the size, the shape and structure of check dams, allowing the definition of general design criteria, it is worth noting that less research has focused on the optimal location of these dams along the debris-flow pathway.

    In this paper, a methodological framework is proposed to evaluate the influence of the number and the location of the check dams on the reduction of the debris-flow intensity (in term of flow thickness, flow velocity and volume. A debris-flow model is used to simulate the run-out of the debris flow. The model uses the Janbu force diagram to resolve the force equilibrium equations; a bingham fluid rheology is introduced and represents the resistance term. The model has been calibrated on two muddy debris-flow events that occurred in 1996 and 2003 at the Faucon watershed (South French Alps.

    Influence of the check dams on the debris-flow intensity is quantified taking into account several check dams configurations (number and location as input geometrical parameters. Results indicate that debris-flow intensity is decreasing with the distance between the source area and the first check dams. The study demonstrates that a small number of check dams located near the source area may decrease substantially the debris-flow intensity on the alluvial fans.

  19. Impact of alcohol checks and social norm on driving under the influence of alcohol (DUI).

    Science.gov (United States)

    Meesmann, Uta; Martensen, Heike; Dupont, Emmanuelle

    2015-07-01

    This study investigated the influence of alcohol checks and social norm on self-reported driving under the influence of alcohol above the legal limit (DUI). The analysis was based on the responses of 12,507 car drivers from 19 European countries to the SARTRE-4 survey (2010). The data were analysed by means of a multiple logistic regression-model on two levels: (1) individual and (2) national level. On the individual level the results revealed that driving under the influence (DUI) was positively associated with male gender, young age (17-34), personal experience with alcohol checks, the perceived likelihood of being checked for alcohol, perceived drunk driving behaviour of friends (social norm) and was negatively associated with higher age (55+). On a national level, the results showed a negative association with a lower legal alcohol limit (BAC 0.2g/l compared with BAC 0.5g/l) and the percentage of drivers checked for alcohol. DUI was positively associated with the percentage of respondents in the country that reported that their friends drink and drive (social norm). The comparison of the results obtained on national and individual levels shows a paradoxical effect of alcohol checks: Countries with more alcohol checks show lower DUI (negative association) but respondents who have been personally checked for alcohol show a higher chance of DUI (positive association). Possible explanations of this paradox are discussed. The effects of the social norm variable (perceived drunk driving behaviour of friends) are positively associated with DUI on both levels. PMID:25957934

  20. Check Point推出Safe@Office500 UTM设备%Check Point: brings Safe@OfficeS00 UTM device

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Check Point Safe@Office 500与Safe@Office 500W统一威胁管理(UTM)设备,是一款一步到位、容易部署及价格相宜的解决方案.为小企业提供卓越的网络保护,抵御随时爆发的互联网攻击。

  1. Check Point借安全之旅与客户"亲密接触"

    Institute of Scientific and Technical Information of China (English)

    段红

    2006-01-01

    @@ Check Point的产品名传遐尔,在知名媒体及权威评测机构的评选中屡获大奖和好评.Check Point所创立的开放式安全平台(OPSEC)更是凝集了众多的企业,OPSEC作为行业中推动整合和互操作性的一个联盟和平台,把Check Point的解决方案与350多家企业的卓越解决方案集成及协同工作.以往,Check Point通过渠道及与厂商协作或捆绑销售其产品,都取得不俗的业绩,2005年收入达5.794亿,比2004年增长12%.2006年第一季度增长态势良好,尤其是中国市场的增长更为显著.Check Point的产品广受渠道、合作伙伴、用户的赞誉和推崇,似乎是皇帝的女儿不愁嫁.

  2. Model checking methodology for large systems, faults and asynchronous behaviour. SARANA 2011 work report

    Energy Technology Data Exchange (ETDEWEB)

    Lahtinen, J. [VTT Technical Research Centre of Finland, Espoo (Finland); Launiainen, T.; Heljanko, K.; Ropponen, J. [Aalto Univ., Espoo (Finland). Dept. of Information and Computer Science

    2012-07-01

    Digital instrumentation and control (I and C) systems are challenging to verify. They enable complicated control functions, and the state spaces of the models easily become too large for comprehensive verification through traditional methods. Model checking is a formal method that can be used for system verification. A number of efficient model checking systems are available that provide analysis tools to determine automatically whether a given state machine model satisfies the desired safety properties. This report reviews the work performed in the Safety Evaluation and Reliability Analysis of Nuclear Automation (SARANA) project in 2011 regarding model checking. We have developed new, more exact modelling methods that are able to capture the behaviour of a system more realistically. In particular, we have developed more detailed fault models depicting the hardware configuration of a system, and methodology to model function-block-based systems asynchronously. In order to improve the usability of our model checking methods, we have developed an algorithm for model checking large modular systems. The algorithm can be used to verify properties of a model that could otherwise not be verified in a straightforward manner. (orig.)

  3. Integrated CAE system for nuclear power plants. Development of piping design check system

    International Nuclear Information System (INIS)

    Toshiba Corporation has developed and operated the integrated CAE system for nuclear power plants, the core of which is the engineering data base to manage accurately and efficiently enormous amount of data on machinery, equipment and piping. As the first step of putting knowledge base system to practical use, piping design check system has been developed. By automatically checking up piping design, this system aims at the prevention of overlooking mistakes, efficient design works and the overall quality improvement of design. This system is based on the thought that it supports designers, and final decision is made by designers. This system is composed of the integrated data base, a two-dimensional CAD system and three-dimensional CAD system. The piping design check system is one of the application systems of the integrated CAE system. Object-oriented programming is the base of the piping design check system, and design knowledge and CAD data are necessary. As to the method of realizing the check system, the flow of piping design, the checkup functions, the checkup of interference and attribute base, and the integration of the system are explained. (K.I)

  4. Check Point公司推出Connectra NGX R66

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    (本刊讯)近日,互联网安全解决方案供应商Check Point公司CEO Gil Shwed来到中国,并与客户和合作伙伴见面,分享了在网络安全行业的经验。Gil Shwed表示,目前有80多个国家和地区在使用Check Point公司的解决方案,涉及互联网、社交网、电子商务等领域。Check Point公司对中国市场非常重视,与中国金融企业始终保持着密切合作。

  5. check Point安全产品突出整体优势

    Institute of Scientific and Technical Information of China (English)

    李志宇

    2008-01-01

    从1993年创立至今的15年间,致力于网络安全产品的Check Point营销网络遍及全球80多个国家和地区。今年,Check Point的销售总额预计将会突破1亿美元。公司董事长兼CEO Shwed表示:“Check Point在中国开展了7年业务,市场份额不断扩大。中国市场重要性日益突出,已经成为了一个独立的销售区域。”

  6. Checking of seismic and tsunami hazard for coastal NPP of Chinese continent after Fukushima nuclear accident

    Institute of Scientific and Technical Information of China (English)

    Chang Xiangdong; Zhou Bengang; Zhao Lianda

    2013-01-01

    A checking on seismic and tsunami hazard for coastal nuclear power plant (NPP) of Chinese continent has been made after Japanese Fukushima nuclear accident caused by earthquake tsunami.The results of the checking are introduced briefly in this paper,including the evaluations of seismic and tsunami hazard in NPP siting period,checking results on seismic and tsunami hazard.Because Chinese coastal area belongs to the continental shelf and far from the boundary of plate collision,the tsunami hazard is not significant for coastal area of Chinese continent.However,the effect from tsunami still can' t be excluded absolutely since calculated result of Manila trench tsunami source although the tsunami wave is lower than water level from storm surge.The research about earthquake tsunami will continue in future.The tsunami warning system and emergency program of NPP will be established based on principle of defense in depth in China.

  7. Neighborhood social capital is associated with participation in health checks of a general population

    DEFF Research Database (Denmark)

    Bender, Anne Mette; Kawachi, Ichiro; Jørgensen, Torben;

    2015-01-01

    BACKGROUND: Participation in population-based preventive health check has declined over the past decades. More research is needed to determine factors enhancing participation. The objective of this study was to examine the association between two measures of neighborhood level social capital...... on participation in the health check phase of a population-based lifestyle intervention. METHODS: The study population comprised 12,568 residents of 73 Danish neighborhoods in the intervention group of a large population-based lifestyle intervention study - the Inter99. Two measures of social capital were applied......; informal socializing and voting turnout. RESULTS: In a multilevel analysis only adjusting for age and sex, a higher level of neighborhood social capital was associated with higher probability of participating in the health check. Inclusion of both individual socioeconomic position and neighborhood...

  8. Multi-Core Emptiness Checking of Timed Büchi Automata using Inclusion Abstraction

    DEFF Research Database (Denmark)

    Laarman, Alfons; Olesen, Mads Chr.; Dalsgaard, Andreas;

    2013-01-01

    the first parallel LTL model checking algorithm for timed automata. The algorithms are implemented in LTSmin, and experimental evaluations show the effectiveness and scalability of both contributions: subsumption halves the number of states in the real-world FDDI case study, and the multi......This paper contributes to the multi-core model checking of timed automata (TA) with respect to liveness properties, by investigating checking of TA Büchi emptiness under the very coarse inclusion abstraction or zone subsumption, an open problem in this field. We show that in general Büchi emptiness...... is not preserved under this abstraction, but some other structural properties are preserved. Based on those, we propose a variation of the classical nested depth-first search (NDFS) algorithm that exploits subsumption. In addition, we extend the multi-core cndfs algorithm with subsumption, providing...

  9. The realization of 60Co container inspection system's check-in station

    International Nuclear Information System (INIS)

    The functional design and realizing mode of the check-in station software of 60Co container inspection system are illustrated. Check-in station plays an important role in 60Co container inspection system. It undertakes the tasks of inputting the container's relative information, flow control of containers waiting for inspections and the information transfer. Of all the information of check-in station inputs, the customs declaration or the encasement declaration is the main information to be input. In this software, they are input by scanner and the control module of scanner is programmed according to Twain criterion. As Twain criterion is generally followed by image industry, this software has high generality and facility independence

  10. Prediction Interval Development for Wind-Tunnel Balance Check-Loading

    Science.gov (United States)

    Landman, Drew; Toro, Kenneth G.; Commo, Sean A.; Lynn, Keith C.

    2014-01-01

    Results from the Facility Analysis Verification and Operational Reliability project revealed a critical gap in capability in ground-based aeronautics research applications. Without a standardized process for check-loading the wind-tunnel balance or the model system, the quality of the aerodynamic force data collected varied significantly between facilities. A prediction interval is required in order to confirm a check-loading. The prediction interval provides an expected upper and lower bound on balance load prediction at a given confidence level. A method has been developed which accounts for sources of variability due to calibration and check-load application. The prediction interval method of calculation and a case study demonstrating its use is provided. Validation of the methods is demonstrated for the case study based on the probability of capture of confirmation points.

  11. Check valve slam caused by air intrusion in emergency cooling water system

    International Nuclear Information System (INIS)

    Waterhammer pressures were experienced during periodic starting of Residual Heat Removal (RHR) pumps at a nuclear plant. Prior to an analytical investigation careful analysis performed by plant engineers indicated that the spring effect of entrapped air in a heat exchanger resulted in water hammer due to check valve slam following flow reversal. In order to determine in more detail the values of pertinent parameters controlling this water hammer a hydraulic transient analysis was performed of the RHR piping system, including essential elements such as the pump, check valve, and heat exchanger. Using characteristic torque and pressure loss curves the motion of the check valve was determined. By comparing output of the water hammer analysis with site recordings of pump discharge pressure the computer model was calibrated, allowing for a realistic estimate of the quantity of entrapped air in the heat exchanger. (author)

  12. Application safety enhancement model using self-checking with software enzymes

    Science.gov (United States)

    Subramaniam, Chandrasekaran; Ravishankar, Arthi; Gopal, Deepthi; Subramanian, Dhaarini

    2011-12-01

    The objective of the paper is to propose a safety enhancement model for application software in accelerating the respective self checking strategies similar to bio enzymatic actions. The application software components which are safety critical may have to be assessed periodically or on demand to achieve not only the functional correctness but also the safety specifications or features while getting executed. The design and deployment of such software modules can be formally verified for possible safety flaws using self checking capabilities and software enzymatic actions. The self checks must sense the safety holes in the software and decide to activate the built-in software components called enzymes to do the safe guard operations in a timely manner to mitigate the safety faults using the proposed enzyme calculus. The various application hazards due to the boolean faults in the functional and behavioral model that lead to software safety issues are considered in this approach.

  13. Compreshensive industry poll sparks ideas on new push for GAS check

    International Nuclear Information System (INIS)

    This paper provides a comprehensive survey of active participants, inactive participants, and non-participants in the GAS Check program which served as the focus of considerable discussion at a recent GAS Check Committee meeting in Oak Brook, Ill. In an effort to encourage greater involvement in the program by marketers and consumers alike, committee members voted to undertake a number of important activities now and in the near future. These actions include: Contacting homeowners' insurance companies (through their national association, if applicable) regarding possible discounts or other incentives that would encourage policyholders to participate in GAS Check. NPGA's desire to obtain insurance company endorsement arose from the finding that many homeowners are simply not interested in the program

  14. Quasi Cyclic Low Density Parity Check Code for High SNR Data Transfer

    Directory of Open Access Journals (Sweden)

    M. R. Islam

    2010-06-01

    Full Text Available An improved Quasi Cyclic Low Density Parity Check code (QC-LDPC is proposed to reduce the complexity of the Low Density Parity Check code (LDPC while obtaining the similar performance. The proposed QC-LDPC presents an improved construction at high SNR with circulant sub-matrices. The proposed construction yields a performance gain of about 1 dB at a 0.0003 bit error rate (BER and it is tested on 4 different decoding algorithms. Proposed QC-LDPC is compared with the existing QC-LDPC and the simulation results show that the proposed approach outperforms the existing one at high SNR. Simulations are also performed varying the number of horizontal sub matrices and the results show that the parity check matrix with smaller horizontal concatenation shows better performance.

  15. PENERAPAN MODEL PEMBELAJARAN KOOPERATIF TIPE PAIR CHECKS PEMECAHAN MASALAH UNTUK MENINGKATKAN SOCIAL SKILL SISWA

    Directory of Open Access Journals (Sweden)

    R. Lestari

    2012-12-01

    Full Text Available Tujuan penelitian tindakan kelas ini untuk mengetahui pengaruh proses pembelajaran dengan menggunakan model pembelajaran kooperatif tipe Pair Checks pemecahan masalah terhadap peningkatan social skill siswa. Pada proses penerapan model pembelajaran kooperatif tipe Pair Checks pemecahan masalah siswa dibagi dalam kelompok-kelompok dan satu kelompok terdiri dari dua orang. Setiap kelompok berdiskusi untuk menyelesaikan suatu masalah, kemudian hasil diskusi kelompok akan dicek oleh pasangan dari kelompok lain. Metode Penelitian yang digunakan adalah penelitian tindakan kelas yang dilaksanakan dua siklus. Metode pengumpulan data menggunakan tes dan angket skala sikap, sedangkan teknik analisis data menggunakan teknik analisis data kuantitatif. Social Skill siswa dari siklus I ke siklus II mengalami peningkatan. Hal ini didapatkan dari data angket skala sikap siklus I ke siklus II ketuntasan klasikalnya meningkat dan sebagian besar siswa sudah memiliki social skill yang baik. Hasil belajar kognitif siswa juga mengalami peningkatan. Model pembelajaran kooperatif tipe Pair Checks pemecahan masalah dapat meningkatkan social skill siswa.This two cycles-action research aimed to know learning process applying cooperative learning model-pair checks problem solving type and improvement of student’s social skills. The process of the model was as follows: deviding students into some groups consisting of two students, solving problem by each group and checking result of the discussion by other groups. Data collection method used was test and the use of attitude scale questionnaire, while technique of data analysis used was quantitative data analysis technique. The data analysis result showed that there was an increase of student’s social skill and students’ achievement from cycle one to two. It is concluded that cooperative learning model-pair checks problem solving type can enhance student’s social skills

  16. Check Point助浙江中大期货实现安全办公

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    6月20日,Check Point软件技术有限公司宣布,浙江中大期货为确保其移动办公室自动化(OA)和经纪业务管理系统的安全及满足远程管理维护需要,日前部署了来自Check Point IP395网络安全设备、Abra移动办公系列产品以及Smart-1安全管理系列产品等卓越的安全解决方案,

  17. Taxes and Voluntary Contributions: Evidence from State Tax Form Check-off Programs

    OpenAIRE

    Newsome, Michael A.; Blomquist, Glenn C.; Romain, Wendy S.

    2001-01-01

    This paper analyzes taxpayer contributions to state check-off funds using four years of Kentucky household income tax data. An ordered probit shows that a taxpayer tends to give to more check-off funds as income increases and tax price of contribution decreases. A Heckman selection model shows that the Nature Fund and Child Fund are normal goods, with income elasticities of contribution of 0.20 and 0.14. With values of -0.58 and -0.29, the tax price elasticities of contribution are even great...

  18. Benchmarking the gamma pass score using ArcCHECK for routine dosimetric QA of VMAT plans

    International Nuclear Information System (INIS)

    A minimum expected gamma (γ) pass rate for VMAT plan verification using ArcCHECK was established based on the RTTQA, TGI 19 test cases and 10 clinical plans with varying levels of complexity. The impact of the 'Measurement Uncertainty' parameter as available in the ArcCHECK software on γ pass rate was studied for both global and local γ analysis. Our results show that excluding measurement uncertainty adds tighter tolerance in local γ comparison. From the verification of our benchmark cases we established minimum expected γ pass rates of 85% and 88% for 2%/2mm global and 3%/3mm local tolerance criteria

  19. Tank 30 and 37 Supernatant Sample Cross-Check and Evaporator Feed Qualification Analysis-2012

    Energy Technology Data Exchange (ETDEWEB)

    Oji, L. N.

    2013-03-07

    This report summarizes the analytical data reported by the F/H and Savannah River National Laboratories for the 2012 cross-check analysis for high level waste supernatant liquid samples from SRS Tanks 30 and 37. The intent of this Tank 30 and 37 sample analyses was to perform cross-checks against routine F/H Laboratory analyses (corrosion and evaporator feed qualification programs) using samples collected at the same time from both tanks as well as split samples from the tanks.

  20. Parameters for Viability Check on Gravitational Theories Regarding the Experimental Data

    Directory of Open Access Journals (Sweden)

    Celakoska E. G.

    2009-01-01

    Full Text Available Parameterized post-Newtonian formalism requires an existence of a symmetric metric in a gravitational theory in order to perform aviability check regarding the experimental data. The requirement of a symmetric metric is a strong constraint satisfied by very narrowclass of theories. In this letter we propose a viability check of a theory using the corresponding theory equations of motion. It issufficient that a connection exists, not necessarily a metrical one. The method is based on an analysis of the Lorentz invariant terms in the equations of motion. An example of the method is presented on the Einstein-Infeld-Hoffmann equations.

  1. DiVinE-CUDA - A Tool for GPU Accelerated LTL Model Checking

    Directory of Open Access Journals (Sweden)

    Jiří Barnat

    2009-12-01

    Full Text Available In this paper we present a tool that performs CUDA accelerated LTL Model Checking. The tool exploits parallel algorithm MAP adjusted to the NVIDIA CUDA architecture in order to efficiently detect the presence of accepting cycles in a directed graph. Accepting cycle detection is the core algorithmic procedure in automata-based LTL Model Checking. We demonstrate that the tool outperforms non-accelerated version of the algorithm and we discuss where the limits of the tool are and what we intend to do in the future to avoid them.

  2. Explorative Analysis of Wuhan Intra-Urban Human Mobility Using Social Media Check-In Data

    OpenAIRE

    LI Lin; Yang, Lei; ZHU Haihong; Dai, Rongrong

    2015-01-01

    Social media check-in data as a geo-tagged information source have been used for revealing spatio-temporal patterns in the field of social and urban study, such as human behavior or public issues. This paper investigates a case study and presents a new method of representing the mobility of people within a city from check-in data. By dividing the data in a temporal sequence, this study examines the overall mobility in the case study city through the gradient/difference of population density w...

  3. Verifying Real-time Commit Protocols Using Dense-time Model Checking Technology

    OpenAIRE

    Al-Bataineh, Omar I.; Reynolds, Mark; French, Tim; Woodings, Terry

    2012-01-01

    The timed-based automata model, introduced by Alur and Dill, provides a useful formalism for describing real-time systems. Over the last two decades, several dense-time model checking tools have been developed based on that model. The paper considers the verification of real-time distributed commit protocols using dense-time model checking technology. More precisely, we model and verify the well-known timed two phase commit protocol in three different state-of-the-art real-time model checkers...

  4. A Fine Grain Configurable Logic Block for Self-checking FPGAs

    OpenAIRE

    P. K. Lala; Walker, A

    2001-01-01

    This paper proposes a logic cell that can be used as a building block for Self-checking FPGAs. The proposed logic cell consists of two 2-to-1 multiplexers, three 4-to-1 multiplexers and a D flip-flop. The cell has been designed using Differential Cascode Voltage Switch Logic. It is self-checking for all single transistor stuck-on and stuck-off faults as well as stuck-at faults at the inputs of each multiplexers and the D flip-flop. The multiplexers and the D flip-flop provide either correct (...

  5. Verifying Real-time Commit Protocols Using Dense-time Model Checking Technology

    CERN Document Server

    Al-Bataineh, Omar I; French, Tim; Woodings, Terry

    2012-01-01

    The timed-based automata model, introduced by Alur and Dill, provides a useful formalism for describing real-time systems. Over the last two decades, several dense-time model checking tools have been developed based on that model. The paper considers the verification of real-time distributed commit protocols using dense-time model checking technology. More precisely, we model and verify the well-known timed two phase commit protocol in three different state-of-the-art real-time model checkers: UPPAAL, Rabbit, and RED, and compare the results.

  6. Local Model Checking of Weighted CTL with Upper-Bound Constraints

    DEFF Research Database (Denmark)

    Jensen, Jonas Finnemann; Larsen, Kim Guldstrand; Srba, Jiri; Østergaard, Lars

    We present a symbolic extension of dependency graphs by Liu and Smolka in order to model-check weighted Kripke structures against the logic CTL with upper-bound weight constraints. Our extension introduces a new type of edges into dependency graphs and lifts the computation of fixed-points from...... boolean domain to nonnegative integers in order to cope with the weights. We present both global and local algorithms for the fixed-point computation on symbolic dependency graphs and argue for the advantages of our approach compared to the direct encoding of the model checking problem into dependency...

  7. Using Spec Explorer for Automatic Checking of Constraints in Software Controlled Systems.

    Directory of Open Access Journals (Sweden)

    Izzat Mahmoud ALSMADI

    2011-01-01

    Full Text Available In software engineering, several formal models and tools are proposed for defining system requirements and constraints formally. Such formal definitions can help in the automatic checking and verification for them. It can also help in the automatic test case generation, execution and verification. In this paper, we will demonstrate and evaluate the usage of Spec Explorer from Microsoft for defining and checking examples of software controlled system such as cruise control. Such formal requirements can be eventually embedded in the developed system or can help in exposing important elements to test in the testing stage or through the usage of the application

  8. A k-Bounded Symbolic Execution for Checking Strong Heap Properties of Open Systems

    DEFF Research Database (Denmark)

    Lee, Jooyong; Deng, Xianghua; Bogor, Robby

    2006-01-01

    strong heap properties, and it is fully automatic and flexible in terms of its cost and the guarantees it provides. It allows a user-adjustable mixed compositional/non-compositional reasoning and naturally produces error traces as fault evidence. We implemented Kiasan using the Bogor model checking......This paper presents Kiasan, a bounded technique to reason about open systems based on a path sensitive, relatively sound and complete symbolic execution instead of the usual compositional reasoning through weakest precondition calculation that summarizes all execution paths. Kiasan is able to check...

  9. VERIFICATION OF CONFLICTION AND UNREACHABILITY IN RULE-BASED EXPERT SYSTEMS WITH MODEL CHECKING

    Directory of Open Access Journals (Sweden)

    Einollah pira

    2014-03-01

    Full Text Available It is important to find optimal solutions for structural errors in rule-based expert systems .Solutions to discovering such errors by using model checking techniques have already been proposed, but these solutions have problems such as state space explosion. In this paper, to overcome these problems, we model the rule-based systems as finite state transition systems and express confliction and unreachabilityas Computation Tree Logic (CTL logic formula and then use the technique of model checking to detect confliction and unreachability in rule-based systems with the model checker UPPAAL.

  10. Extraction of handwritten areas from colored image of bank checks by an hybrid method

    CERN Document Server

    Haboubi, Sofiene

    2011-01-01

    One of the first step in the realization of an automatic system of check recognition is the extraction of the handwritten area. We propose in this paper an hybrid method to extract these areas. This method is based on digit recognition by Fourier descriptors and different steps of colored image processing . It requires the bank recognition of its code which is located in the check marking band as well as the handwritten color recognition by the method of difference of histograms. The areas extraction is then carried out by the use of some mathematical morphology tools.

  11. Checking Correctness of TypeScript Interfaces for JavaScript Libraries

    DEFF Research Database (Denmark)

    Feldthaus, Asger; Møller, Anders

    2014-01-01

    affect the type checking and misguide code completion for the application code in IDEs. We present a pragmatic approach to check correctness of TypeScript declaration files with respect to JavaScript library implementations. The key idea in our algorithm is that many declaration errors can be detected by......The TypeScript programming language adds optional types to JavaScript, with support for interaction with existing JavaScript libraries via interface declarations. Such declarations have been written for hundreds of libraries, but they can be difficult to write and often contain errors, which may...

  12. The Modeling Library of Eavesdropping Methods in Quantum Cryptography Protocols by Model Checking

    Science.gov (United States)

    Yang, Fan; Yang, Guowu; Hao, Yujie

    2016-07-01

    The most crucial issue of quantum cryptography protocols is its security. There exists many ways to attack the quantum communication process. In this paper, we present a model checking method for modeling the eavesdropping in quantum information protocols. So when the security properties of a certain protocol are needed to be verified, we can directly use the models which are already built. Here we adopt the probabilistic model checking tool—PRISM to model these attack methods. The verification results show that the detection rate of eavesdropping is approximately close to 1 when enough photons are transmitted.

  13. The Modeling Library of Eavesdropping Methods in Quantum Cryptography Protocols by Model Checking

    Science.gov (United States)

    Yang, Fan; Yang, Guowu; Hao, Yujie

    2016-03-01

    The most crucial issue of quantum cryptography protocols is its security. There exists many ways to attack the quantum communication process. In this paper, we present a model checking method for modeling the eavesdropping in quantum information protocols. So when the security properties of a certain protocol are needed to be verified, we can directly use the models which are already built. Here we adopt the probabilistic model checking tool—PRISM to model these attack methods. The verification results show that the detection rate of eavesdropping is approximately close to 1 when enough photons are transmitted.

  14. Constancy check of beam quality in conventional diagnostic X-ray equipment

    International Nuclear Information System (INIS)

    A tandem ionization chamber was developed for quality control programs of X-ray equipment used in conventional radiography and mammography. A methodology for the use of the tandem chamber in the constancy check of diagnostic X-ray beam qualities was established. The application at a medical X-ray imaging facility of this established methodology is presented. The use of the tandem chamber in the constancy check of diagnostic X-ray beam qualities is a useful method to control the performance of the X-ray equipment

  15. Model Checking Process Algebra of Communicating Resources for Real-time Systems

    DEFF Research Database (Denmark)

    Boudjadar, Jalil; Kim, Jin Hyun; Larsen, Kim Guldstrand;

    2014-01-01

    This paper presents a new process algebra, called PACOR, for real-time systems which deals with resource constrained timed behavior as an improved version of the ACSR algebra. We define PACOR as a Process Algebra of Communicating Resources which allows to express preemptiveness, urgent ness and...... original semantics of PACOR and enables the verification of PACOR systems using symbolic model checking in UPPAAL and statistical model checking UPPAAL SMC. Finally we provide an example to illustrate system specification in PACOR, translation and verification....

  16. Model checking process algebra of communicating resources for real-time systems

    DEFF Research Database (Denmark)

    Boudjadar, Jalil; Kim, Jin Hyun; Larsen, Kim Guldstrand;

    2014-01-01

    This paper presents a new process algebra, called PACoR, for real-time systems which deals with resource- constrained timed behavior as an improved version of the ACSR algebra. We define PACoR as a Process Algebra of Communicating Resources which allows to explicitly express preemptiveness...... preserves the original semantics of PACoR and enables the verification of PACoR systems using symbolic model checking in Uppaal and statistical model checking UppaalSMC. Finally we provide an example to illustrate system specification in PACoR, translation and verification....

  17. Students' Participation in Social Networking Sites: Implications for Social Work Education

    Science.gov (United States)

    Mukherjee, Dhrubodhi; Clark, Janet

    2012-01-01

    Social work students have few guidelines to help them evaluate the implication of their posted information on Internet-based social networking sites (SNSs). There is a national trend among employers of human services to cross-check publicly available online information on applicants. Based on data from a survey of 105 baccalaureate and master's…

  18. "Smart shopping" : Implications of hard-discounters and multiple-store patronage

    NARCIS (Netherlands)

    Vroegrijk, M.J.J.

    2012-01-01

    The recent economic downturn has made consumers more focused on obtaining good value-for-money and on keeping their spending in check. This dissertation covers the implications of two recent developments indicative of such “smart shopping”: the increased popularity of the “hard-discounter” format, a

  19. Continuity check

    Energy Technology Data Exchange (ETDEWEB)

    Woof, M.

    2002-10-01

    This paper looks into both safety and technological developments in continuous mining. Manufacturers covered include Hydraphase, Eimco, Deilmann-Haniel, DBT and Joy. A recent Health and Safety Executive report mentioned three in incidents of frictional ignition of flammable gas by cutting equipment in a five year period to April 1999. 4 photos.

  20. In-phantom dosimetric measurements as quality control for brachytherapy. System check and constancy check; Messungen im Festkoerperphantom als Qualitaetskontrolle in der Brachytherapie. Systempruefung und Konstanzpruefung

    Energy Technology Data Exchange (ETDEWEB)

    Kollefrath, Michael; Bruggmoser, Gregor; Nanko, Norbert; Gainey, Mark [Universitaetsklinik Freiburg (Germany). Klinik fuer Strahlenheilkunde

    2015-09-01

    In brachytherapy dosimetric measurements are difficult due to the inherent dose-inhomogeneities. Typically in routine clinical practice only the nominal dose rate is determined for computer controlled afterloading systems. The region of interest lies close to the source when measuring the spatial dose distribution. In this region small errors in the positioning of the detector, and its finite size, lead to large measurement uncertainties that exacerbate the routine dosimetric control of the system in the clinic. The size of the measurement chamber, its energy dependence, and the directional dependence of the measurement apparatus are the factors which have a significant influence on dosimetry. Although ionisation chambers are relatively large, they are employed since similar chambers are commonly found on clinical brachytherapy units. The dose is determined using DIN 6800 [11] since DIN 6809-2 [12], which deals with dosimetry in brachytherapy, is antiquated and is currently in the process of revision. Further information regarding dosimetry for brachytherapy can be found in textbooks [1] and [2]. The measurements for this work were performed with a HDR (High-Dose-Rate) {sup 192}Ir source, type mHDR V2, and a Microselectron Afterloader V2 both from Nucletron/Elekta. In this work two dosimetric procedures are presented which, despite the aforemention difficulties, should assist in performing checks of the proper operation of the system. The first is a system check that measures the dose distribution along a line and is to be performed when first bringing the afterloader into operation, or after significant changes to the system. The other is a dosimetric constancy check, which with little effort can be performed monthly or weekly. It simultaneously verifies the positioning of the source at two positions, the functionality of the system clock and the automatic re-calculation of the source activity.