WorldWideScience

Sample records for check oro-dental implications

  1. Oro-dental manifestations of the Schwartz-Jampel syndrome.

    Science.gov (United States)

    Stephen, L X G; Beighton, P H

    2002-01-01

    A boy with the Schwartz-Jampel syndrome (chondrodystrophic myotonia) had a number of oro-dental complications. These included difficulty in tooth extraction and orthodontic care due to a small oral aperture and rigidity of the temporo-mandibular joints. General anaesthesia was hazardous because of a propensity to malignant hyperthermia, and endotracheal intubation was difficult because of shortness and rigidity of the neck and the small size of the laryngeal structures. Awareness of these potential problems is crucial for anaesthesia and comprehensive dental management. The radiological demonstration of dentigerous cysts is a hitherto unreported observation in this disorder. PMID:12413175

  2. Pattern of referral and management of oro-dental problems in patients with cancer: a retrospective study

    OpenAIRE

    Kaberi Das; Manigreeva Krishnatreya; Amal Chandra Kataki

    2014-01-01

    Background: General dentistry care is of paramount importance in maintaining oral hygiene of cancer patients. Methods: The data of patients registered at the dental wing in a tertiary care cancer center for one year period (2013) was used for the present analysis. All the cases were retrospectively analyzed for the pattern of referral, diagnosis of different oro-dental conditions, and different interventions done for the various oro-dental conditions. Results: A total of 798 patients w...

  3. Oro-dental mucoadhesive proniosomal gel formulation loaded with lornoxicam for management of dental pain.

    Science.gov (United States)

    Abdelbary, Ghada Ahmed; Aburahma, Mona Hassan

    2015-01-01

    Oro-dental diseases are generally associated with pain that is controlled using oral tablets containing NSAIDs. Lornoxicam, a relatively new NSAID, is effective in relieving pain accompanying different oro-dental problems. The aim of the current research is to prepare oro-dental analgesic and anti-inflammatory gel using provesicular approach to deliver lornoxicam directly to the site of action in the oral cavity. Local administration of lornoxicam is expected to be superior to systemic delivery in pain relieving and poses less GIT adverse effects. Different surfactants were utilized to prepare the proniosomal gels that rapidly transform into nano-sized niosomes after hydration with the oral saliva. The effect of the surfactant structure on vesicles size distribution and entrapment efficiency percentage (EE%) was investigated. The proniosomal formulations were incorporated into carbopol hydrogels that were characterized regarding rheological and mucoadhesion properties. Moreover, ex-vivo mucosal membrane permeation studies were conducted for selected proniosomal gels to quantify the permeation parameters and assess the amount of drug deposited within the oral mucosa. Results revealed that mucoadhesive proniosomes formulation prepared using Span 60 was optimal as it was nano-sized and also showed the highest EE%. The transmucosal flux of lornoxicam, from these proniosomal formulations, across the oral mucosa was significantly higher (p < 0.05) than lornoxicam containing carbopol gel and the percent drug diffused increased more than twofolds. The results collectively suggest that the mucoadhesive proniosomal gels can be assertively considered as a promising carrier for transmucosal delivery of lornoxicam into the oral cavity. PMID:25058447

  4. Oro-dental features of Pallister-Killian syndrome: Evaluation of 21 European probands.

    Science.gov (United States)

    Bagattoni, Simone; D'Alessandro, Giovanni; Sadotti, Agnese; Alkhamis, Nadia; Rocca, Alessandro; Cocchi, Guido; Krantz, Ian David; Piana, Gabriela

    2016-09-01

    Pallister-Killian syndrome (PKS) is a rare sporadic multi-systemic developmental disorder caused by a mosaic tetrasomy of the short arm of chromosome 12. A wide range of clinical characteristics including intellectual disability, seizures, and congenital malformations has previously been described. Individuals with PKS show a characteristic facial phenotype with frontal bossing, alopecia, sparse eyebrows, depressed nasal bridge, long philtrum, telecanthus, and posteriorly rotated ears. Oro-dental features, such as "Pallister lip," macroglossia, delayed eruption of primary teeth, high arched-palate, prognathism, and cleft palate have been occasionally reported in the medical literature. The aim of the study was to assess the oro-dental phenotype of PKS and to describe the oral health status in a cohort participating in the First European Workshop on PKS. A clinical dental examination was performed in 21 Caucasian probands and data regarding medical and dental history collected. Twelve probands (57%) showed an atypical dental pattern, with multiple missing teeth (primarily the first permanent molars) and 2 (10%) a double teeth. The severity of gingivitis and dental caries increased with age and gingival overgrowth was a common finding. A characteristic occlusive phenotype was found: a high-arched palate with mandibular prognathism associated with an anterior openbite and crossbite and with posterior crossbite (unilateral or bilateral). The prevalence of oral habits (non-nutritive sucking, mouth breathing, bruxism) was high, even in older probands. This study suggests that individuals affected by PKS should be observed closely for oro-dental diseases and a multidisciplinary approach is needed to implement the right preventive measures. © 2016 Wiley Periodicals, Inc. PMID:27354242

  5. Evaluation of Child Self-perception Regarding Their Oro-dental Status

    OpenAIRE

    Krisztina Mártha I.; Sorana Roșu; Réka Gyergyay; Katalin Vikárius

    2013-01-01

    Aim: The aim of this study was to evaluate the state of oral health and the self-perception of children regarding their oro-dental status, their knowledge and attitude towards oral health. Methods: A sample of 130 children (11-14 years) and one of their parents were asked to complete a Child Perception Questionnaire (CPQ11-14) in Sfântu Gheorghe, Romania. From these, 69 children were examined and data was recorded about Decayed-Missing-Filled Teeth (DMFT), oral hygiene, dental malposition and...

  6. Pattern of referral and management of oro-dental problems in patients with cancer: a retrospective study

    Directory of Open Access Journals (Sweden)

    Kaberi Das

    2014-08-01

    Results: A total of 798 patients were referred from various oncology wings for management of oro-dental problems, 50.1% patients were referred from head and neck oncology, 31% were from radiation department, 6.2% patients were from medical oncology and palliative care department each, 4% patients were from gynecologic oncology, and 2.5% patients were from screening wing. Acute gingivitis (62% in pre treatment and mucositis (28% in post treatment were major symptoms and signs for referral. 47% patients were managed with tooth extraction, grinding was done on 23%, scaling were done on 12.5%, desensitization was done on 8.7% patients, filling was done on 2.5% patients, prosthesis fitting in 2.5% patients, root canal treatment in 2.2% patients, and post surgical obturator fittings in 0.75% patients. Conclusion: Majority of cancer patients were referred for oro-dental care from head and neck oncology department with head and neck cancers and extraction of tooth pre radiotherapy and chemotherapy remains an important part of oro-dental care in cancer patients. [Int J Res Med Sci 2014; 2(4.000: 1545-1547

  7. Evaluation of Child Self-perception Regarding Their Oro-dental Status

    Directory of Open Access Journals (Sweden)

    Krisztina Mártha I.

    2013-10-01

    Full Text Available Aim: The aim of this study was to evaluate the state of oral health and the self-perception of children regarding their oro-dental status, their knowledge and attitude towards oral health. Methods: A sample of 130 children (11-14 years and one of their parents were asked to complete a Child Perception Questionnaire (CPQ11-14 in Sfântu Gheorghe, Romania. From these, 69 children were examined and data was recorded about Decayed-Missing-Filled Teeth (DMFT, oral hygiene, dental malposition and malocclusion, Aesthetic Component of Index of Treatment Need (AC-IOTN. Consent of the parents was obtained. Statistical analyses were performed. Results: The optimal score of CPQ evaluation is 96 and the maximum score achieved was 93, the minimum was 43. 78.10 average score can be graded as medium. As the data points out, most of the children and their parents have a medium knowledge and self-perception. The clinical examination underline the main problems: dental caries (62%, occlusal coloration (23%, dental malposition (17%, rooftop deep bite (14%, dental rotation and crowding (12%, dental plaque and tartar (10%. As far as the AC-IOTN is concerned, 48 of 69 children have no need for treatment, 18 have a high need for treatment, and 3 have a moderate need for treatment. Conclusions: Overall, the children and their parents have a poor oral health knowledge, which is reflected in the medium level of the achieved CPQ scores, in the clinical examination and can be associated with high levels of dental caries and malocclusion

  8. ORO-DENTAL PATTERN IN MENTALLY RETARDED

    OpenAIRE

    Tandon, Pradeep; Jha, Sanjeev; Tandon, Ragini; Sondhi, Deepak; Chandra, Mahesh; Trivedi, J.K.

    1990-01-01

    SUMMARY The study was carried out in 25 mentally retarded children and compared with equal number of normal children. They were subjected to detailed psychiatric evaluation and dental examination. The dental anomalies were corroborated with cephalometric analysis of lateral cephalograms. It was concluded that all mentally retarded children had some dental abnormality in them in form of dental malocclusion, wide inter dental spaces, absence of teeth etc. We suggest early dental management for ...

  9. Fractal features of soil particle size distribution in layered sediments behind two check dams: Implications for the Loess Plateau, China

    Science.gov (United States)

    Wei, Xia; Li, Xungui; Wei, Ning

    2016-08-01

    The layered sediment deposited behind a check dam can provide useful information about soil erosion processes in the dam-controlled area. This study aims to evaluate the possible fractal nature of layered sediments behind check dams, assessing whether fractal dimension can serve as a feasible index for evaluating the impact of land use types on the area controlled by the check dam. Fractal dimension measurement was employed to analyze the features of soil particle size distribution (PSD) for different layered sediments of the Shipanmao and Zhangshan check dams in the Dalihe River Basin of the Loess Plateau, China. Results show that the predominant soil particle sizes of the sediment layers behind the Shipanmao and Zhangshan dams are silt-clay (land use changes between 1972 and 1979 for the dam-controlled area of the Shipanmao dam. The total increment of C during 1972-1979 was 0.021 and the soil erosion amount per rainfall erosivity was smaller in 1972 than in 1979, indicating desertification in the dam-controlled area. In addition, the land use types prevalent in 1979 were more prone to soil loss than those in 1972. Dm is a useful parameter to assess land use types and soil degradation processes in dam-controlled areas of the Loess Plateau.

  10. Fractal features of soil particle size distribution in layered sediments behind two check dams: Implications for the Loess Plateau, China

    Science.gov (United States)

    Wei, Xia; Li, Xungui; Wei, Ning

    2016-08-01

    The layered sediment deposited behind a check dam can provide useful information about soil erosion processes in the dam-controlled area. This study aims to evaluate the possible fractal nature of layered sediments behind check dams, assessing whether fractal dimension can serve as a feasible index for evaluating the impact of land use types on the area controlled by the check dam. Fractal dimension measurement was employed to analyze the features of soil particle size distribution (PSD) for different layered sediments of the Shipanmao and Zhangshan check dams in the Dalihe River Basin of the Loess Plateau, China. Results show that the predominant soil particle sizes of the sediment layers behind the Shipanmao and Zhangshan dams are silt-clay (soil particle sizes coincide with larger CV values. The fractal dimension (Dm) of the PSD ranges from 2.111 to 2.219, and 2.144 to 2.447 for Shipanmao and Zhangshan, respectively. The Dm values tend to increase and decrease for the layered sediments from top to bottom with some turning points. The turning points of Dm are related to the trends of the soil PSDs in the adjacent sediment layers. Although Dm has significant positive and negative correlations with the silt-clay and the fine sand size fractions, respectively, no correlation with the coarse sand fraction was observed. Soil PSD is a more dominant factor affecting Dm than the time lag between soil erosion and sediment deposition. Overall, Dm decreased for Shipanmao during the deposition period (1972-1979). The total increment of the C factor in the universal soil loss equation and the soil erosion amount per rainfall erosivity were applied to analyze land use changes between 1972 and 1979 for the dam-controlled area of the Shipanmao dam. The total increment of C during 1972-1979 was 0.021 and the soil erosion amount per rainfall erosivity was smaller in 1972 than in 1979, indicating desertification in the dam-controlled area. In addition, the land use types prevalent

  11. Role of genes in oro-dental diseases

    Directory of Open Access Journals (Sweden)

    Kavitha B

    2010-01-01

    Full Text Available In oral cavity, the spectrum of diseases due to genetic alterations ranges from developmental disturbances of teeth to the pre-cancerous and cancerous lesions. Of late, significant progress has been made in the molecular analysis of tumors. With molecular genetic testing emerging as diagnostic, prognostic, and therapeutic approach, a review of genetic alterations ranging from the development of oro-facial structures to the tumors in the head and neck region are addressed in this article. The functional regulatory aspect of genes in relation to oro-facial structures are discussed separately, i.e., in relation to tooth genesis, tooth agenesis (non-syndromic, syndromic, tooth structural alterations, syndromic oro-facial defects, bone diseases, skin diseases (genodermatoses, and malignant tumors. In this literature, various genes involved in the development of the oro-facial structures and tooth in particular are discussed. The genetic basis of disorders in the tooth development (agenesis, hypodontia, tooth structural defects like amelogenesis imperfecta (AI, dentinogenesis imperfecta (DI, and oro-facial structural alterations (various syndromes are explained.

  12. Annual Check-up

    Science.gov (United States)

    ... Medical Conditions Nutrition & Fitness Emotional Health Annual Check-Up Posted under Health Guides . Updated 7 January 2015. + ... I get ready for my annual medical check-up? If this is your first visit to your ...

  13. Checking Java Programs

    CERN Document Server

    Darwin, Ian

    2007-01-01

    This Short Cut tells you about tools that will improve the quality of your Java code, using checking above and beyond what the standard tools do, including: Using javac options, JUnit and assertions Making your IDE work harder Checking your source code with PMD Checking your compiled code (.class files) with FindBugs Checking your program's run-time behavior with Java PathFinder

  14. Symbolic model checking APSL

    Institute of Scientific and Technical Information of China (English)

    Wanwei LIU; Ji WANG; Huowang CHEN; Xiaodong MA; Zhaofei WANG

    2009-01-01

    Property specification language (PSL) is a specification language which has been accepted as an industrial standard. In PSL, SEREs are used as additional formula constructs. In this paper, we present a variant of PSL, namely APSL, which replaces SEREs with finite automata. APSL and PSL are of the exactly same expressiveness. Then, we extend the LTL symbolic model checking algorithm to that of APSL, and then present a tableau based APSL verification technique, which can be easily implemented via the BDD based symbolic approach. Moreover, we implement an extension of NuSMV, and this adapted version supports symbolic model checking of APSL. Experimental results show that this variant of PSL can be efficiently verified. Henceforth, symbolic model checking PSL can be carried out by a transformation from PSL to APSL and symbolic model checking APSL.

  15. Check It Out

    Science.gov (United States)

    ... Materials The Healthy Heart Handbook for Women Check it Out Tests That Can Help Protect Your Heart ... years, or more often if your doctor recommends it. Other Tests There also are several tests that ...

  16. Goat production check list

    DEFF Research Database (Denmark)

    Henriksen, Jørgen; Nielsen, Mette Benedicte Olaf; Madsen, Jørgen;

    2009-01-01

    This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production.......This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production....

  17. NHS Health Checks

    OpenAIRE

    Abdalrahman, Bayad; Soljak, Michael

    2014-01-01

    Cardiovascular disease is the leading cause of mortality and morbidity worldwide. In England, the government has adopted a population-wide prevention program for cardiovascular disease, the NHS Health Check program. The program has sparked controversies over the evidence base and feasibility of implementation. We aim to provide an update on the debate and program implementation. In conclusion, the evidence base for the NHS Health Check program has a number of uncertainties and program deliver...

  18. CMM Interim Check (U)

    Energy Technology Data Exchange (ETDEWEB)

    Montano, Joshua Daniel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-03-23

    Coordinate Measuring Machines (CMM) are widely used in industry, throughout the Nuclear Weapons Complex and at Los Alamos National Laboratory (LANL) to verify part conformance to design definition. Calibration cycles for CMMs at LANL are predominantly one year in length. Unfortunately, several nonconformance reports have been generated to document the discovery of a certified machine found out of tolerance during a calibration closeout. In an effort to reduce risk to product quality two solutions were proposed – shorten the calibration cycle which could be costly, or perform an interim check to monitor the machine’s performance between cycles. The CMM interim check discussed makes use of Renishaw’s Machine Checking Gauge. This off-the-shelf product simulates a large sphere within a CMM’s measurement volume and allows for error estimation. Data was gathered, analyzed, and simulated from seven machines in seventeen different configurations to create statistical process control run charts for on-the-floor monitoring.

  19. Partial model checking

    DEFF Research Database (Denmark)

    Andersen, Henrik Reif

    1995-01-01

    A major obstacle in applying finite-state model checking to the verification of large systems is the combinatorial explosion of the state space arising when many loosely coupled parallel processes are considered. The problem also known as the state-explosion problem has been attacked from various...... sides. This paper presents a new approach based on partial model checking where parts of the concurrent system are gradually removed while transforming the specification accordingly. When the intermediate specifications constructed in this manner can be kept small, the state-explosion problem is avoided...

  20. Check My School

    OpenAIRE

    SHKABATUR, Jennifer

    2012-01-01

    Check My School (CMS) is a community monitoring project that aims to promote transparency and social accountability in the Philippine education sector by tracking the provision of services in public schools. The project uses a blended approach, which combines on-the-ground community monitoring with the use of information and communication technology (ICT). CMS had been initiated and design...

  1. Checking BEBC superconducting magnet

    CERN Multimedia

    1974-01-01

    The superconducting coils of the magnet for the 3.7 m Big European Bubble Chamber (BEBC) had to be checked, see Annual Report 1974, p. 60. The photo shows a dismantled pancake. By December 1974 the magnet reached again the field design value of 3.5 T.

  2. Checking for Ketones

    Science.gov (United States)

    ... by Mail Close www.diabetes.org > Living With Diabetes > Treatment and Care > Blood Glucose Testing Share: Print Page Text Size: ... glucose-and-a1c, In this section Living With Diabetes Treatment and Care Blood Glucose Testing Checking Your Blood Glucose A1C ...

  3. Engineering Abstractions in Model Checking and Testing

    DEFF Research Database (Denmark)

    Achenbach, Michael; Ostermann, Klaus

    2009-01-01

    Abstractions are used in model checking to tackle problems like state space explosion or modeling of IO. The application of these abstractions in real software development processes, however, lacks engineering support. This is one reason why model checking is not widely used in practice yet...... and testing is still state of the art in falsification. We show how user-defined abstractions can be integrated into a Java PathFinder setting with tools like AspectJ or Javassist and discuss implications of remaining weaknesses of these tools. We believe that a principled engineering approach to designing...

  4. Check Verbraucherpolitik und Verbraucherbeteiligung

    DEFF Research Database (Denmark)

    Hagen, Kornelia; Micklitz, Hans-W.; Oehler, Andreas;

    2013-01-01

    The paper discusses the opportunities for an empirically grounded decision support system as an instrument for independent and scientifically based consumer policy consulting. To date, consumer policy is dominated by the information paradigm and the leitbild of the rational, sovereign...... and information-seeking consumer. Yet, both everyday practice and research in behavioural economics show that this view lacks empirical ground. In fact, there are different consumer types and different forms of rationalities at work. Effective consumer policy making should be based on the empirically revealed...... an empirically based “Check Consumer Policy and Consumer Participation” as a systematic decision and evaluation tool for policy makers. This check should be independent from the government and should be grounded on an empirical view of the consumer. Consumer policy tools should be tested with real consumers...

  5. Burning mouth syndrome: controversial place as a symptom of Oro-dental pathology.

    Science.gov (United States)

    Coculescu, E C; Manole, G; Coculescu, B I; Purcărea, V L

    2015-01-01

    As defined by WHO experts, disease involves a change of the physical, mental and social welfare, generating chronic stress condition if unresolved. One of the symptoms almost constantly found in any condition is pain. This feeling manifests differently depending on the subjective perception. The burning mouth syndrome (BMS) is included in such a framework. The BMS is considered as one of the characteristic states of chronic stress syndromes associated with nonspecific clinical manifestations and requires special medical attention in terms of assessing and treating the condition. However, the insufficient knowledge of its etiopathogenic mechanisms requires comprehensive research undertaken on such a subject. PMID:26361508

  6. Prevalence of oro-dental anomalies among schoolchildren in Sana'a city, Yemen.

    Science.gov (United States)

    Basalamah, M; Baroudi, K

    2016-01-01

    Practitioners and policy-makers need information about the relative frequency of dental anomalies among children in their region. This study investigated the prevalence of different oral anomalies among schoolchildren in Sana'a city, Yemen. A sample of 1000 private and public schoolchildren aged 4-12 years were examined by the same examiner using disposable tongue blades. The total prevalence of oral anomalies was 15.1%, most commonly in boys (male:female ratio 3.2:1) aged 7-12 years. The most prevalent dental anomaly related to hard tissues was tooth hypoplasia (2.8%), followed by hypocalcification (2.6%), then microdontia (0.5%), macrodontia (0.4%), hypodontia (0.4%), supernumerary teeth (0.3%), tooth transposition (0.3%), dental fusion (0.2%) and gemination (0.2%). The most prevalent soft tissues anomaly was fissured tongue (4.0%), followed by ankyloglossia (1.8%), geographic tongue (0.9%), macroglossia (0.4%) and hairy tongue (0.3%). Appropriate measures need to be taken early to mitigate the negative impact and later costs of treatment of anomalies. PMID:27117648

  7. Oro-Dental Health Status and Salivary Characteristics in Children with Chronic Renal Failure

    Directory of Open Access Journals (Sweden)

    A. Mashayekhi

    2011-09-01

    Full Text Available Children suffering from decreased renal function may demand unique considerations regarding special oral and dental conditions they are encountered to. It is mentioned that renal function deterioration may affect the hard or soft tissues of the mouth. Havingknowledge about the high prevalence of dental defects, calculus, gingival hyperplasia, modified salivary composition and tissue responses to the dental plaque may aid the physician and the dentist to help nurture the patient with chronic renal failure through the crisis, with an aesthetically satisfying and functioning dentition.

  8. Check, check, double check: checking the autopilot causes distrust : Experimental studies on the effects of compulsive perseveration

    NARCIS (Netherlands)

    Dek, E.C.P.

    2015-01-01

    Obsessive-compulsive disorder (OCD) is characterized by persistent doubt. The majority of patients with OCD engage in repeated checking to reduce these feelings of uncertainty. However, numerous studies demonstrated that repetitive behavior ironically increases uncertainty: perseverative checking in

  9. Checking Model Transformation Refinement

    OpenAIRE

    Büttner, Fabian; Egea, Marina; Guerra, Esther; Lara, Juan De

    2013-01-01

    The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-642-38883-5_15 Proceedings of 6th International Conference, ICMT 2013, Budapest, Hungary, June 18-19, 2013 Refinement is a central notion in computer science, meaning that some artefact S can be safely replaced by a refinement R, which preserves S’s properties. Having available techniques and tools to check transformation refinement would enable (a) the reasoning on whether a transformation correctly impl...

  10. Bounded Model Checking of CTL

    Institute of Scientific and Technical Information of China (English)

    Zhi-Hong Tao; Cong-Hua Zhou; Zhong Chen; Li-Fu Wang

    2007-01-01

    Bounded Model Checking has been recently introduced as an efficient verification method for reactive systems.This technique reduces model checking of linear temporal logic to propositional satisfiability.In this paper we first present how quantified Boolean decision procedures can replace BDDs.We introduce a bounded model checking procedure for temporal logic CTL* which reduces model checking to the satisfiability of quantified Boolean formulas.Our new technique avoids the space blow up of BDDs, and extends the concept of bounded model checking.

  11. Model Checking as Static Analysis

    DEFF Research Database (Denmark)

    Zhang, Fuyuan

    Both model checking and static analysis are prominent approaches to detecting software errors. Model Checking is a successful formal method for verifying properties specified in temporal logics with respect to transition systems. Static analysis is also a powerful method for validating program...... properties which can predict safe approximations to program behaviors. In this thesis, we have developed several static analysis based techniques to solve model checking problems, aiming at showing the link between static analysis and model checking. We focus on logical approaches to static analysis......-calculus can be encoded as the intended model of SFP. Our research results have strengthened the link between model checking and static analysis. This provides a theoretical foundation for developing a unied tool for both model checking and static analysis techniques....

  12. 14 CFR 135.339 - Initial and transition training and checking: Check airmen (aircraft), check airmen (simulator).

    Science.gov (United States)

    2010-01-01

    ... checking: Check airmen (aircraft), check airmen (simulator). 135.339 Section 135.339 Aeronautics and Space... and checking: Check airmen (aircraft), check airmen (simulator). (a) No certificate holder may use a... an aircraft, in a flight simulator, or in a flight training device. This paragraph applies...

  13. Transaction management with integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide; Christiansen, Henning

    2005-01-01

    , which are difficult to maintain and error prone. Two important aspects must be taken care of. 1.~It is too time consuming to check integrity constraints from scratch after each update, so simplified checks before each update should be used relying on the assumption that the current state is consistent...

  14. Checks and Controls in Spreadsheets

    CERN Document Server

    O'Beirne, Patrick

    2009-01-01

    Spreadsheets that are informally created are harder to test than they should be. Simple cross-foot checks or being easily readable are modest but attainable goals for every spreadsheet developer. This paper lists some tips on building self-checking into a spreadsheet in order to provide more confidence to the reader that a spreadsheet is robust.

  15. New methods of concurrent checking

    CERN Document Server

    Goessel, Michael; Sogomonyan, Egor; Marienfeld, Daniel

    2008-01-01

    Written by a team of two leading experts and two very successful young former PhD students, New Methods of Concurrent Checking describes new methods of concurrent checking, such as partial duplication, use of output dependencies, complementary circuits, self-dual parity, self-dual duplication and others. A special chapter demonstrates how the new general methods of concurrent checking can be more specifically applied to regular structures to obtain optimum results. This is exemplified for all types of adders up to 64 bits with a level of detail never before presented in the literature. The cle

  16. Body checking behaviors in men.

    Science.gov (United States)

    Walker, D Catherine; Anderson, Drew A; Hildebrandt, Thomas

    2009-06-01

    Males have been facing increasing pressure from the media to attain a lean, muscular physique, and are at risk for body dissatisfaction, disturbed eating and exercise behaviors, and abuse of appearance- and performance-enhancing drugs (APEDs). The aim of the current study was to examine the relationship between body checking and mood, symptoms of muscle dysmorphia, importance of shape and weight, and APED use in undergraduate males. Body checking in males was correlated with weight and shape concern, symptoms of muscle dysmorphia, depression, negative affect, and APED use. Body checking predicted APED use and uniquely accounted for the largest amount of variance in Muscle Dysmorphic Disorder Inventory (MDDI) scores (16%). Findings support the view that body checking is an important construct in male body image, muscle dysmorphia, and body change strategies and suggest a need for further research. PMID:19482568

  17. Model Checking Algorithms for CTMDPs

    DEFF Research Database (Denmark)

    Buchholz, Peter; Hahn, Ernst Moritz; Hermanns, Holger;

    2011-01-01

    Continuous Stochastic Logic (CSL) can be interpreted over continuoustime Markov decision processes (CTMDPs) to specify quantitative properties of stochastic systems that allow some external control. Model checking CSL formulae over CTMDPs requires then the computation of optimal control strategie...

  18. Treasury Check Verification Query (TCVQ)

    Data.gov (United States)

    Social Security Administration — The TCVQ system determines the SSN of an individual whose check has been returned to a local field office. The FO is able to request this information via the TCVQ...

  19. Body checking behaviors in men

    OpenAIRE

    Walker, D. Catherine; Anderson, Drew A.; Hildebrandt, Thomas

    2009-01-01

    Males have been facing increasing pressure from the media to attain a lean, muscular physique, and are at risk for body dissatisfaction, disturbed eating and exercise behaviors, and abuse of appearance- and performance-enhancing drugs (APEDs). The aim of the current study was to examine the relationship between body checking and mood, symptoms of muscle dysmorphia, importance of shape and weight, and APED use in undergraduate males. Body checking in males was correlated with weight and shape ...

  20. Model checking PSL safety properties

    OpenAIRE

    Launiainen, Tuomas

    2009-01-01

    Model checking is a modern, efficient approach to gaining confidence of the correctness of complex systems. It outperforms conventional testing methods especially in cases where a high degree of confidence in the correctness of the system is required, or when the test runs of the system are difficult to reproduce accurately. In model checking the system is verified against a specification that is expressed in a formal specification language. The main challenges are that the process requires q...

  1. Model composition in model checking

    OpenAIRE

    Felscher, Ingo

    2014-01-01

    Model-checking allows one to formally check properties of systems: these properties are modeled as logic formulas and the systems as structures like transition systems. These transition systems are often composed, i.e., they arise in form of products or sums. The composition technique allows us to deduce the truth of a formula in the composed system from "interface information": the truth of formulas for the component systems and information in which components which of these formulas hold. W...

  2. Automatization and familiarity in repeated checking

    NARCIS (Netherlands)

    Dek, Eliane C P; van den Hout, Marcel A.; Giele, Catharina L.; Engelhard, Iris M.

    2014-01-01

    Repeated checking paradoxically increases memory uncertainty. This study investigated the underlying mechanism of this effect. We hypothesized that as a result of repeated checking, familiarity with stimuli increases, and automatization of the checking procedure occurs, which should result in decrea

  3. Model Checking Linearizability via Refinement

    Science.gov (United States)

    Liu, Yang; Chen, Wei; Liu, Yanhong A.; Sun, Jun

    Linearizability is an important correctness criterion for implementations of concurrent objects. Automatic checking of linearizability is challenging because it requires checking that 1) all executions of concurrent operations be serializable, and 2) the serialized executions be correct with respect to the sequential semantics. This paper describes a new method to automatically check linearizability based on refinement relations from abstract specifications to concrete implementations. Our method avoids the often difficult task of determining linearization points in implementations, but can also take advantage of linearization points if they are given. The method exploits model checking of finite state systems specified as concurrent processes with shared variables. Partial order reduction is used to effectively reduce the search space. The approach is built into a toolset that supports a rich set of concurrent operators. The tool has been used to automatically check a variety of implementations of concurrent objects, including the first algorithms for the mailbox problem and scalable NonZero indicators. Our system was able to find all known and injected bugs in these implementations.

  4. Loess Plateau check dams can potentially sequester eroded soil organic carbon

    Science.gov (United States)

    Zhang, Haicheng; Liu, Shuguang; Yuan, Wenping; Dong, Wenjie; Xia, Jiangzhou; Cao, Yaojun; Jia, Yanwei

    2016-06-01

    Check dams are special soil and water conservation structures in the Loess Plateau, China. They play an important role in intercepting sediments and soil organic carbon (SOC). However, the decomposition of intercepted SOC and the environmental regulations at check dams have not been investigated. We conducted several paired field experiments at both check dams and slope lands in the Yanhe Watershed of the Loess Plateau to examine the characteristics of SOC decomposition at check dams. On average, the SOC mineralization rate in slope lands was approximately three times higher than in check dams. Increased soil moisture and compaction in check dams can constrain carbon mineralization by limiting the oxygen availability of SOC and can isolate substrate carbon from heterotrophic microorganisms. Our results indicate that check dams display a considerable potential for eroded SOC sequestration via reducing the soil respiration rate and highlight the important implications of lateral carbon redistribution and human engineering projects when estimating regional or global ecosystem carbon cycles.

  5. Direct Model Checking Matrix Algorithm

    Institute of Scientific and Technical Information of China (English)

    Zhi-Hong Tao; Hans Kleine Büning; Li-Fu Wang

    2006-01-01

    During the last decade, Model Checking has proven its efficacy and power in circuit design, network protocol analysis and bug hunting. Recent research on automatic verification has shown that no single model-checking technique has the edge over all others in all application areas. So, it is very difficult to determine which technique is the most suitable for a given model. It is thus sensible to apply different techniques to the same model. However, this is a very tedious and time-consuming task, for each algorithm uses its own description language. Applying Model Checking in software design and verification has been proved very difficult. Software architectures (SA) are engineering artifacts that provide high-level and abstract descriptions of complex software systems. In this paper a Direct Model Checking (DMC) method based on Kripke Structure and Matrix Algorithm is provided. Combined and integrated with domain specific software architecture description languages (ADLs), DMC can be used for computing consistency and other critical properties.

  6. Compositional and Quantitative Model Checking

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2010-01-01

    on the existence of a quotient construction, allowing a property phi of a parallel system phi/A to be transformed into a sufficient and necessary quotient-property yolA to be satisfied by the component 13. Given a model checking problem involving a network Pi I and a property yo, the method gradually move (by...

  7. Formal Checking of Multiple Firewalls

    Directory of Open Access Journals (Sweden)

    Nihel Ben Youssef

    2012-05-01

    Full Text Available When enterprises deploy multiple firewalls, a packet may be examined by different sets of firewalls. It has been observed that the resulting complex firewall network is highly error prone and causes serious security holes. Hence, automated solutions are needed in order to check its correctness. In this paper, we propose a formal and automatic method for checking whether multiple firewalls react correctly with respect to a security policy given in a high level declarative language. When errors are detected, some useful feedback is returned in order to correct the firewall configurations. Furthermore, we propose a priority-based approach to ensure that no incoherencies exist within the security policy. We show that our method is both correct and complete. Finally, it has been implemented in a prototype of verifier based on a satisfiability solver modulo theories. Experiment conducted on relevant case studies demonstrates the efficiency of our approach.

  8. Checking modes of HAL programs

    OpenAIRE

    de la Banda, MG; Harvey, W; Marriott, K.; Stuckey, PJ; Demoen, Bart

    2005-01-01

    Recent constraint logic programming (CLP) languages, such as HAL and Mercury, require type, mode and determinism declarations for predicates. This information allows the generation of efficient target code and the detection of many errors at compile-time. Unfortunately, mode checking in such languages is difficult. One of the main reasons is that, for each predicate mode declaration, the compiler is required to appropriately re-order literals in the predicate's definition. The task is further...

  9. Preventing the threat of credit-card fraud: Factors influencing cashiers' identification-checking behavior.

    Science.gov (United States)

    Downing, Christopher; Howard, E Henry; Goodwin, Christina; Geller, E Scott

    2016-01-01

    Two studies examined factors influencing cashiers' identification (ID)-checking behavior in order to inform the development of interventions to prevent credit-card fraud. In both studies, research assistants made credit purchases in various stores and noted the cashiers' ID-checking behavior. In the first study, the store type, whether the cashier swiped the credit/debit card, the amount of the purchase, and whether the credit/debit card was signed significantly influenced ID-checking behavior. In the second study, an A-B-A design was used to evaluate the impact of a "Check my ID" prompt placed on the credit/debit card. The prompt increased cashiers' ID-checking behavior from 5.9% at Baseline to 10.3% during the Intervention. When the prompt was removed, the cashiers' ID-checking behavior decreased to 7.2%. Implications for further intervention research to prevent credit-card fraud are discussed. PMID:27309026

  10. Preventing the threat of credit-card fraud: Factors influencing cashiers' identification-checking behavior.

    Science.gov (United States)

    Downing, Christopher; Howard, E Henry; Goodwin, Christina; Geller, E Scott

    2016-01-01

    Two studies examined factors influencing cashiers' identification (ID)-checking behavior in order to inform the development of interventions to prevent credit-card fraud. In both studies, research assistants made credit purchases in various stores and noted the cashiers' ID-checking behavior. In the first study, the store type, whether the cashier swiped the credit/debit card, the amount of the purchase, and whether the credit/debit card was signed significantly influenced ID-checking behavior. In the second study, an A-B-A design was used to evaluate the impact of a "Check my ID" prompt placed on the credit/debit card. The prompt increased cashiers' ID-checking behavior from 5.9% at Baseline to 10.3% during the Intervention. When the prompt was removed, the cashiers' ID-checking behavior decreased to 7.2%. Implications for further intervention research to prevent credit-card fraud are discussed.

  11. 14 CFR 121.411 - Qualifications: Check airmen (airplane) and check airmen (simulator).

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Qualifications: Check airmen (airplane) and... § 121.411 Qualifications: Check airmen (airplane) and check airmen (simulator). (a) For the purposes of this section and § 121.413: (1) A check airman (airplane) is a person who is qualified, and...

  12. Microbial Check Valve for Shuttle

    Science.gov (United States)

    Colombo, G. V.; Putnam, D. F.; Sauer, R. L.

    1978-01-01

    The Microbial Check Valve (MCV) is a device developed for the Space Shuttle that prevents the transfer of viable microorganisms within water systems. The device is essentially a bed of resin material, impregnated with iodine, that kills microorganisms on contact. It prevents the cross-contamination of microorganisms from a nonpotable system into the potable water system when these systems are interconnected. In this regard, the function of the device is similar to that of the 'air gap' found in conventional one-gravity systems. Basic design data are presented including pressure drop, scaling factors, sizing criteria, and the results of challenging the device with suspensions of seven microorganisms including aerobes, anaerobes and spore formers.

  13. Anonymity control in electronic check systems

    Institute of Scientific and Technical Information of China (English)

    Ma Chunguang; Yang Yixian; Hu Zhengming

    2005-01-01

    Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single check is used to pay any price that is not more than the face value. The main problem in check systems is to design an efficient refund mechanism that makes refund checks undistinguished from initial checks during payment and deposit. The problem of anonymity control also called fairness is also an important issue in check systems. All check systems yet are unconditional anonymity that opens the door to misuse for crime such as laundering and blackmailing. In this paper, the notion of anonymity revocation is introduced to electronic check system for the first time, and a model of fair electronic check system is proposed. An efficient fair online electronic check system with reusable refund is presented. In the system, a passive trustee is employed to revoke the anonymity of un-honest users. Moreover, the system solves the reusability problem of refunds thanks to the RSA-based partially signature. The system is efficient and meets all basic security requirements.

  14. Advanced microbial check valve development

    Science.gov (United States)

    Colombo, G. V.; Greenley, D. R.

    1980-01-01

    A flight certified assembly identified as a Microbial Check Valve (MCV) was developed and tested. The MCV is a canister packed with an iodinated anionic exchange resin. The device is used to destroy organisms in a water stream as the water passes through the device. The device is equally effective for fluid flow in either direction and its primary method of organism removal is killing rather than filtering. The MCV was successfully developed for the space shuttle to: disinfect fuel cell water; and prevent back contamination of the stored potable water supply. One version of the device consists of a high residual iodinated resin bed that imparts approximately 2 ppm of iodine to the fuel cell water as it flows to the potable water tanks. A second version of the device consists of a low residual iodinated resin bed. One of these low residual beds is located at each use port in the potable water system for the dual purpose of removing some iodine from the potable water as it is dispensed and also to prevent back contamination of the potable supply.

  15. Heteroscedasticity checks for regression models

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    For checking on heteroscedasticity in regression models, a unified approach is proposed to constructing test statistics in parametric and nonparametric regression models. For nonparametric regression, the test is not affected sensitively by the choice of smoothing parameters which are involved in estimation of the nonparametric regression function. The limiting null distribution of the test statistic remains the same in a wide range of the smoothing parameters. When the covariate is one-dimensional, the tests are, under some conditions, asymptotically distribution-free. In the high-dimensional cases, the validity of bootstrap approximations is investigated. It is shown that a variant of the wild bootstrap is consistent while the classical bootstrap is not in the general case, but is applicable if some extra assumption on conditional variance of the squared error is imposed. A simulation study is performed to provide evidence of how the tests work and compare with tests that have appeared in the literature. The approach may readily be extended to handle partial linear, and linear autoregressive models.

  16. Check valve slam analysis in pumping station

    Science.gov (United States)

    Himr, D.; Habán, V.; Dokoupil, P.

    2016-03-01

    Pumping station supplies water for technological process. The check valve in the station was replaced with a new one. The regular test of black out discovered the high pressure pulsations accompanied with noticeable pipeline movement of discharge pipe. It was caused by late check valve closing, probably, when the back flow reached the highest possible velocity. This statement was supported with analysis of results of pressure measurement near the check valve and with a numerical simulation of the flow in the pipeline system.

  17. Check valve slam analysis in pumping station

    OpenAIRE

    Himr D.; Habán V.; Dokoupil P.

    2016-01-01

    Pumping station supplies water for technological process. The check valve in the station was replaced with a new one. The regular test of black out discovered the high pressure pulsations accompanied with noticeable pipeline movement of discharge pipe. It was caused by late check valve closing, probably, when the back flow reached the highest possible velocity. This statement was supported with analysis of results of pressure measurement near the check valve and with a numerical simulation of...

  18. Control-flow checking via regular expressions

    OpenAIRE

    Benso, Alfredo; Di Natale, Giorgio; Di Carlo, Stefano; Prinetto, Paolo Ernesto; Tagliaferri, Luca

    2001-01-01

    The present paper explains a new approach to program control flow checking. The check has been inserted at source-code level using a signature methodology based on regular expressions. The signature checking is performed without a dedicated watchdog processor but resorting to inter-process communication (IPC) facilities offered by most of the modern operating systems. The proposed approach allows very low memory overhead and trade-off between fault latency and program execution time overhead

  19. 14 CFR 91.1093 - Initial and transition training and checking: Check pilots (aircraft), check pilots (simulator).

    Science.gov (United States)

    2010-01-01

    ... OPERATING RULES GENERAL OPERATING AND FLIGHT RULES Fractional Ownership Operations Program Management § 91... preceding 24 months, that person satisfactorily conducts a proficiency or competency check under the..., and emergency procedures to ensure competence to conduct the pilot flight checks required by...

  20. Heteroscedasticity checks for regression models

    Institute of Scientific and Technical Information of China (English)

    ZHU; Lixing

    2001-01-01

    [1]Carroll, R. J., Ruppert, D., Transformation and Weighting in Regression, New York: Chapman and Hall, 1988.[2]Cook, R. D., Weisberg, S., Diagnostics for heteroscedasticity in regression, Biometrika, 1988, 70: 1—10.[3]Davidian, M., Carroll, R. J., Variance function estimation, J. Amer. Statist. Assoc., 1987, 82: 1079—1091.[4]Bickel, P., Using residuals robustly I: Tests for heteroscedasticity, Ann. Statist., 1978, 6: 266—291.[5]Carroll, R. J., Ruppert, D., On robust tests for heteroscedasticity, Ann. Statist., 1981, 9: 205—209.[6]Eubank, R. L., Thomas, W., Detecting heteroscedasticity in nonparametric regression, J. Roy. Statist. Soc., Ser. B, 1993, 55: 145—155.[7]Diblasi, A., Bowman, A., Testing for constant variance in a linear model, Statist. and Probab. Letters, 1997, 33: 95—103.[8]Dette, H., Munk, A., Testing heteoscedasticity in nonparametric regression, J. R. Statist. Soc. B, 1998, 60: 693—708.[9]Müller, H. G., Zhao, P. L., On a semi-parametric variance function model and a test for heteroscedasticity, Ann. Statist., 1995, 23: 946—967.[10]Stute, W., Manteiga, G., Quindimil, M. P., Bootstrap approximations in model checks for regression, J. Amer. Statist. Asso., 1998, 93: 141—149.[11]Stute, W., Thies, G., Zhu, L. X., Model checks for regression: An innovation approach, Ann. Statist., 1998, 26: 1916—1939.[12]Shorack, G. R., Wellner, J. A., Empirical Processes with Applications to Statistics, New York: Wiley, 1986.[13]Efron, B., Bootstrap methods: Another look at the jackknife, Ann. Statist., 1979, 7: 1—26.[14]Wu, C. F. J., Jackknife, bootstrap and other re-sampling methods in regression analysis, Ann. Statist., 1986, 14: 1261—1295.[15]H rdle, W., Mammen, E., Comparing non-parametric versus parametric regression fits, Ann. Statist., 1993, 21: 1926—1947.[16]Liu, R. Y., Bootstrap procedures under some non-i.i.d. models, Ann. Statist., 1988, 16: 1696—1708.[17

  1. Tractor Mechanic Check Sheets for Modules.

    Science.gov (United States)

    Clemson Univ., SC. Vocational Education Media Center.

    Forms for student self-checks and the instructor's final checklist (student evaluation) are provided for use with thirty-three learning modules on maintaining and servicing fuel and electrical systems in tractor mechanics. The student self-check asks the students questions about their understanding of the modules' content. The instructor's…

  2. The model checking fingerprints of CTL operators

    OpenAIRE

    Krebs, Andreas; Meier, Arne; Mundhenk, Martin

    2015-01-01

    The aim of this study is to understand the inherent expressive power of CTL operators. We investigate the complexity of model checking for all CTL fragments with one CTL operator and arbitrary Boolean operators. This gives us a fingerprint of each CTL operator. The comparison between the fingerprints yields a hierarchy of the operators that mirrors their strength with respect to model checking.

  3. 25 CFR 141.19 - Check cashing.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Check cashing. 141.19 Section 141.19 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES BUSINESS PRACTICES ON THE NAVAJO, HOPI AND ZUNI RESERVATIONS General Business Practices § 141.19 Check cashing. (a) A reservation...

  4. 7 CFR 58.243 - Checking quality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Checking quality. 58.243 Section 58.243 Agriculture... Procedures § 58.243 Checking quality. All milk, milk products and dry milk products shall be subject to inspection and analysis by the dairy plant for quality and condition throughout each processing...

  5. Automatization and familiarity in repeated checking

    NARCIS (Netherlands)

    Dek, E.C.P.; van den Hout, M.A.; Giele, C.L.; Engelhard, I.M.

    2015-01-01

    Repetitive, compulsive-like checking of an object leads to reductions in memory confidence, vividness, and detail. Experimental research suggests that this is caused by increased familiarity with perceptual characteristics of the stimulus and automatization of the checking procedure (Dek, van den Ho

  6. SPEED ROLLER STAND MEASUREMENT SYSTEM CHECKING TECHNIQUE

    OpenAIRE

    Zybtsev, Y.; I. Marmut

    2011-01-01

    The study has shown that the accuracy of brakes checking by inertial stands depends upon the applied methods of measurement of braking parameters (stand slowing down, braking distance, brakes triggering time, current speed) as well as the methods of metrological checking of measuring system canals.

  7. QuickChecking Static Analysis Properties

    DEFF Research Database (Denmark)

    Midtgaard, Jan; Møller, Anders

    2015-01-01

    A static analysis can check programs for potential errors. A natural question that arises is therefore: who checks the checker? Researchers have given this question varying attention, ranging from basic testing techniques, informal monotonicity arguments, thorough pen-and-paper soundness proofs......, to verified fixed point checking. In this paper we demonstrate how quickchecking can be useful for testing a range of static analysis properties with limited effort. We show how to check a range of algebraic lattice properties, to help ensure that an implementation follows the formal specification...... of a lattice. Moreover, we offer a number of generic, type-safe combinators to check transfer functions and operators on lattices, to help ensure that these are, e.g., monotone, strict, or invariant. We substantiate our claims by quickchecking a type analysis for the Lua programming language...

  8. Arithmetic Operand Ordering for Equivalence Checking

    Institute of Scientific and Technical Information of China (English)

    WENG Yanling; GE Haitong; YAN Xiaolang; Ren Kun

    2007-01-01

    An information extraction-based technique is proposed for RTL-to-gate equivalence checking. Distances are calculated on directed acyclic graph (AIG). Multiplier and multiplicand are distinguished on multiplications with different coding methods, with which the operand ordering/grouping information could be extracted from a given implementation gate netlist, helping the RTL synthesis engine generate a gate netlist with great similarity. This technique has been implemented in an internal equivalence checking tool, ZD_VIS. Compared with the simple equivalence checking, the speed is accelerated by at least 40% in its application to a class of arithmetic designs, addition and multiplication trees. The method can be easily incorporated into existing RTL-to-gate equivalence checking frameworks, increasing the robustness of equivalence checking for arithmetic circuits.

  9. 14 CFR 135.337 - Qualifications: Check airmen (aircraft) and check airmen (simulator).

    Science.gov (United States)

    2010-01-01

    ... check airmen (simulator). 135.337 Section 135.337 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION... (simulator). (a) For the purposes of this section and § 135.339: (1) A check airman (aircraft) is a person who is qualified to conduct flight checks in an aircraft, in a flight simulator, or in a...

  10. 14 CFR 91.1089 - Qualifications: Check pilots (aircraft) and check pilots (simulator).

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Qualifications: Check pilots (aircraft) and check pilots (simulator). 91.1089 Section 91.1089 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION... RULES Fractional Ownership Operations Program Management § 91.1089 Qualifications: Check...

  11. Enriched MU-Calculi Module Checking

    CERN Document Server

    Ferrante, Alessandro; Parente, Mimmo

    2008-01-01

    The model checking problem for open systems has been intensively studied in the literature, for both finite-state (module checking) and infinite-state (pushdown module checking) systems, with respect to Ctl and Ctl*. In this paper, we further investigate this problem with respect to the Mu-calculus enriched with nominals and graded modalities (hybrid graded Mu-calculus), in both the finite-state and infinite-state settings. Using an automata-theoretic approach, we show that hybrid graded Mu-calculus module checking is solvable in exponential time, while hybrid graded Mu-calculus pushdown module checking is solvable in double-exponential time. These results are also tight since they match the known lower bounds for Ctl. We also investigate the module checking problem with respect to the hybrid graded Mu-calculus enriched with inverse programs (Fully enriched Mu-calculus): by showing a reduction from the domino problem, we show its undecidability. We conclude with a short overview of the model checking problem ...

  12. Improved microbial-check-valve resins

    Science.gov (United States)

    Colombo, G. V.; Putnam, D. F.

    1980-01-01

    Improved microbial-check-valve resins have been tested for their microbicidal effectiveness and long-term stability. Resins give more-stable iodine concentrations than previous preparations and do not impart objectionable odor or taste to treated water. Microbial check valve is small cylindrical device, packed with iodide-saturated resin, that is installed in water line where contamination by micro-organisms is to be prevented. Prototype microbial check valve was tested for stability and performance under harsh environmental conditions. Effectiveness was 100 percent at 35 deg, 70 deg, and 160 deg F (2 deg, 21 deg, and 71 deg C).

  13. Check valve slam analysis in pumping station

    Directory of Open Access Journals (Sweden)

    Himr D.

    2016-01-01

    Full Text Available Pumping station supplies water for technological process. The check valve in the station was replaced with a new one. The regular test of black out discovered the high pressure pulsations accompanied with noticeable pipeline movement of discharge pipe. It was caused by late check valve closing, probably, when the back flow reached the highest possible velocity. This statement was supported with analysis of results of pressure measurement near the check valve and with a numerical simulation of the flow in the pipeline system.

  14. Computational Fact Checking from Knowledge Networks.

    Directory of Open Access Journals (Sweden)

    Giovanni Luca Ciampaglia

    Full Text Available Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation.

  15. Computational Fact Checking from Knowledge Networks.

    Science.gov (United States)

    Ciampaglia, Giovanni Luca; Shiralkar, Prashant; Rocha, Luis M; Bollen, Johan; Menczer, Filippo; Flammini, Alessandro

    2015-01-01

    Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation. PMID:26083336

  16. Consistency Checking of Web Service Contracts

    DEFF Research Database (Denmark)

    Cambronero, M. Emilia; Okika, Joseph C.; Ravn, Anders Peter

    2008-01-01

    Behavioural properties are analyzed for web service contracts formulated in Business Process Execution Language (BPEL) and Choreography Description Language (CDL). The key result reported is an automated technique to check consistency between protocol aspects of the contracts. The contracts...

  17. Computational fact checking from knowledge networks

    CERN Document Server

    Ciampaglia, Giovanni Luca; Rocha, Luis M; Bollen, Johan; Menczer, Filippo; Flammini, Alessandro

    2015-01-01

    Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation...

  18. Computational Fact Checking from Knowledge Networks

    Science.gov (United States)

    Ciampaglia, Giovanni Luca; Shiralkar, Prashant; Rocha, Luis M.; Bollen, Johan; Menczer, Filippo; Flammini, Alessandro

    2015-01-01

    Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation. PMID:26083336

  19. CMM Interim Check Design of Experiments (U)

    Energy Technology Data Exchange (ETDEWEB)

    Montano, Joshua Daniel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-07-29

    Coordinate Measuring Machines (CMM) are widely used in industry, throughout the Nuclear Weapons Complex and at Los Alamos National Laboratory (LANL) to verify part conformance to design definition. Calibration cycles for CMMs at LANL are predominantly one year in length and include a weekly interim check to reduce risk. The CMM interim check makes use of Renishaw’s Machine Checking Gauge which is an off-the-shelf product simulates a large sphere within a CMM’s measurement volume and allows for error estimation. As verification on the interim check process a design of experiments investigation was proposed to test a couple of key factors (location and inspector). The results from the two-factor factorial experiment proved that location influenced results more than the inspector or interaction.

  20. For Better Skin Cancer Checks, Partner Up

    Science.gov (United States)

    ... medlineplus.gov/news/fullstory_159632.html For Better Skin Cancer Checks, Partner Up Melanoma survivors benefited when they ... out: Getting a partner trained to spot potential skin cancers can be a lifesaver for melanoma survivors, a ...

  1. Generic Architecture for Mobile Check System

    OpenAIRE

    KARIMA MAAZOUZ; HABIB.BENLAHMER; NACEUR.ACHTAICH

    2013-01-01

    the explosion of the market of Smartphone has rapidly changed the way of m-commerce transactions, especially the m-payment systems which are knowing a wide acceptance due to their diversity and the new mobile technologies. In this work we have introduced the system m-check as a mobile payment system, we have presented a generic architecture of the system and the different protocols for the implementation of the system m-check

  2. Generic Architecture for Mobile Check System

    Directory of Open Access Journals (Sweden)

    KARIMA MAAZOUZ

    2013-11-01

    Full Text Available the explosion of the market of Smartphone has rapidly changed the way of m-commerce transactions, especially the m-payment systems which are knowing a wide acceptance due to their diversity and the new mobile technologies. In this work we have introduced the system m-check as a mobile payment system, we have presented a generic architecture of the system and the different protocols for the implementation of the system m-check

  3. Engineering Abstractions in Model Checking and Testing

    OpenAIRE

    Achenbach, Michael; Ostermann, Klaus

    2009-01-01

    Abstractions are used in model checking to tackle problems like state space explosion or modeling of IO. The application of these abstractions in real software development processes, however, lacks engineering support. This is one reason why model checking is not widely used in practice yet and testing is still state of the art in falsification. We show how user-defined abstractions can be integrated into a Java PathFinder setting with tools like AspectJ or Javassist and discuss implicati...

  4. Floating-disk parylene micro check valve

    OpenAIRE

    Chen, Po-Jui; Tai, Yu-Chong

    2008-01-01

    A novel micro check valve which has nearly ideal fluidic shunting behaviors is presented. Featuring a parylene-based floating disk, this surface-micromachined check valve ultimately realizes both zero forward cracking pressure and zero reverse leakage in fluidic operations. Two different floating disk designs have been implemented to demonstrate functionality of the microvalve. Experimental data of underwater testing successfully show that in-channel floating-disk valv...

  5. Online treatment compliance checking for clinical pathways.

    Science.gov (United States)

    Huang, Zhengxing; Bao, Yurong; Dong, Wei; Lu, Xudong; Duan, Huilong

    2014-10-01

    Compliance checking for clinical pathways (CPs) is getting increasing attention in health-care organizations due to stricter requirements for cost control and treatment excellence. Many compliance measures have been proposed for treatment behavior inspection in CPs. However, most of them look at aggregated data seen from an external perspective, e.g. length of stay, cost, infection rate, etc., which may provide only a posterior impression of the overall conformance with the established CPs such that in-depth and in near real time checking on the compliance of the essential/critical treatment behaviors of CPs is limited. To provide clinicians real time insights into violations of the established CP specification and support online compliance checking, this article presents a semantic rule-based CP compliance checking system. In detail, we construct a CP ontology (CPO) model to provide a formal grounding of CP compliance checking. Using the proposed CPO, domain treatment constraints are modeled into Semantic Web Rule Language (SWRL) rules to specify the underlying treatment behaviors and their quantified temporal structure in a CP. The established SWRL rules are integrated with the CP workflow such that a series of applicable compliance checking and evaluation can be reminded and recommended during the pathway execution. The proposed approach can, therefore, provides a comprehensive compliance checking service as a paralleling activity to the patient treatment journey of a CP rather than an afterthought. The proposed approach is illustrated with a case study on the unstable angina clinical pathway implemented in the Cardiology Department of a Chinese hospital. The results demonstrate that the approach, as a feasible solution to provide near real time conformance checking of CPs, not only enables clinicians to uncover non-compliant treatment behaviors, but also empowers clinicians with the capability to make informed decisions when dealing with treatment compliance

  6. Check Point认证简介

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    Check Point软件技术有限公司是因特网安全领域的全球著名企业,占有全球65%VPN/防火墙市场份额(IDC 2002),财富前100强中有97家公司采用Check Point的安全产品。

  7. Online treatment compliance checking for clinical pathways.

    Science.gov (United States)

    Huang, Zhengxing; Bao, Yurong; Dong, Wei; Lu, Xudong; Duan, Huilong

    2014-10-01

    Compliance checking for clinical pathways (CPs) is getting increasing attention in health-care organizations due to stricter requirements for cost control and treatment excellence. Many compliance measures have been proposed for treatment behavior inspection in CPs. However, most of them look at aggregated data seen from an external perspective, e.g. length of stay, cost, infection rate, etc., which may provide only a posterior impression of the overall conformance with the established CPs such that in-depth and in near real time checking on the compliance of the essential/critical treatment behaviors of CPs is limited. To provide clinicians real time insights into violations of the established CP specification and support online compliance checking, this article presents a semantic rule-based CP compliance checking system. In detail, we construct a CP ontology (CPO) model to provide a formal grounding of CP compliance checking. Using the proposed CPO, domain treatment constraints are modeled into Semantic Web Rule Language (SWRL) rules to specify the underlying treatment behaviors and their quantified temporal structure in a CP. The established SWRL rules are integrated with the CP workflow such that a series of applicable compliance checking and evaluation can be reminded and recommended during the pathway execution. The proposed approach can, therefore, provides a comprehensive compliance checking service as a paralleling activity to the patient treatment journey of a CP rather than an afterthought. The proposed approach is illustrated with a case study on the unstable angina clinical pathway implemented in the Cardiology Department of a Chinese hospital. The results demonstrate that the approach, as a feasible solution to provide near real time conformance checking of CPs, not only enables clinicians to uncover non-compliant treatment behaviors, but also empowers clinicians with the capability to make informed decisions when dealing with treatment compliance

  8. Patients With Obsessive-Compulsive Disorder Check Excessively in Response to Mild Uncertainty.

    Science.gov (United States)

    Toffolo, Marieke B J; van den Hout, Marcel A; Engelhard, Iris M; Hooge, Ignace T C; Cath, Daniëlle C

    2016-07-01

    Patients with obsessive-compulsive disorder (OCD) not only respond to obsessions with perseverative checking, but also engage in more general checking, irrespective of their obsessive concerns. This study investigated whether general checking is specific to OCD and exacerbated when only mild uncertainty is induced. Thirty-one patients with OCD, 26 anxiety- and 31 healthy controls performed a visual search task with eye-tracking and indicated in 50 search displays whether a target was "present" or "absent". Target-present trials were unambiguous, whereas target-absent trials induced mild uncertainty, because participants had to rely on not overlooking the target. Checking behavior was measured by assessing search time and the number of fixations, measured with an eye-tracker. Results showed that in both target-present and target-absent trials patients with OCD searched longer and made more fixations than healthy and anxiety controls. However, the difference in checking behavior between patients with OCD and the control groups was larger in target-absent trials (where mild uncertainty was induced). Anxiety and healthy controls did not differ in checking behavior. Thus, mild uncertainty appears to specifically promote checking in patients with OCD, which has implications for treatment. PMID:27423170

  9. The Comrey Validity Check Scale as a Predictor of Reliable Personality Test Data

    Science.gov (United States)

    Booth, Richard F.; Norton, Richard S.

    1976-01-01

    Usefulness of the Comrey Validity Check scale score as an index of random or indiscriminate responding to the Comrey Personality Scales was evaluated on a large sample of Navy paramedical personnel. Tables are presented and implications are discussed. (Author/JKS)

  10. Semantic rule-checking for regulation compliance checking: an overview of strategies and approaches

    OpenAIRE

    Pauwels, Pieter; Zhang, Sijie

    2015-01-01

    As more and more architectural design and construction data is represented in the Resource Description Framework (RDF) data model, it makes sense to take advantage of the underlying logical basis of RDF and realise a semantic rule-checking process as it is currently not available in architectural design and construction industry. Such a semantic rule-checking process would be of considerable value to regulation compliance checking procedures, because the additional logical basis would (1) all...

  11. MPST Software: grl_pef_check

    Science.gov (United States)

    Call, Jared A.; Kwok, John H.; Fisher, Forest W.

    2013-01-01

    This innovation is a tool used to verify and validate spacecraft sequences at the predicted events file (PEF) level for the GRAIL (Gravity Recovery and Interior Laboratory, see http://www.nasa. gov/mission_pages/grail/main/index. html) mission as part of the Multi-Mission Planning and Sequencing Team (MPST) operations process to reduce the possibility for errors. This tool is used to catch any sequence related errors or issues immediately after the seqgen modeling to streamline downstream processes. This script verifies and validates the seqgen modeling for the GRAIL MPST process. A PEF is provided as input, and dozens of checks are performed on it to verify and validate the command products including command content, command ordering, flight-rule violations, modeling boundary consistency, resource limits, and ground commanding consistency. By performing as many checks as early in the process as possible, grl_pef_check streamlines the MPST task of generating GRAIL command and modeled products on an aggressive schedule. By enumerating each check being performed, and clearly stating the criteria and assumptions made at each step, grl_pef_check can be used as a manual checklist as well as an automated tool. This helper script was written with a focus on enabling the user with the information they need in order to evaluate a sequence quickly and efficiently, while still keeping them informed and active in the overall sequencing process. grl_pef_check verifies and validates the modeling and sequence content prior to investing any more effort into the build. There are dozens of various items in the modeling run that need to be checked, which is a time-consuming and errorprone task. Currently, no software exists that provides this functionality. Compared to a manual process, this script reduces human error and saves considerable man-hours by automating and streamlining the mission planning and sequencing task for the GRAIL mission.

  12. A PSL Bounded Model Checking Method

    Institute of Scientific and Technical Information of China (English)

    YU Lei; ZHAO Zongtao

    2012-01-01

    SAT-based bounded model checking (BMC) is introduced as an important complementary technique to OBDD-based symbolic model checking, and is an efficient verification method for parallel and reactive systems. However, until now the properties verified by bounded model checking are very finite. Temporal logic PSL is a property specification language (IEEE-1850) describing parallel systems and is divided into two parts, i.e. the linear time logic FL and the branch time logic OBE. In this paper, the specification checked by BMC is extended to PSL and its algorithm is also proposed. Firstly, define the bounded semantics of PSL, and then reduce the bounded semantics into SAT by translating PSL specification formula and the state transition relation of the system to the propositional formula A and B, respectively. Finally, verify the satisfiability of the conjunction propositional formula of A and B. The algorithm results in the translation of the existential model checking of the temporal logic PSL into the satisfiability problem of propositional formula. An example of a queue controlling circuit is used to interpret detailedly the executing procedure of the algorithm.

  13. Checking Timed Automata for Linear Duration Properties

    Institute of Scientific and Technical Information of China (English)

    赵建华

    2000-01-01

    It is proved in this paper that checking a timed automaton M with respect to a linear duration property D can be done by investigating only the integral timed states of M. An equivalence relation is introduced in this paper to divide the infinite number of integral timed states into finite number of equivalence classes. Based on this, a method is proposed for checking whether M satisfies D. In some cases, the number of equivalence classes is too large for a computer to manipulate. A technique for reducing the search-space for checking linear duration property is also described. This technique is more suitable for the case in this paper than those in the literature because most of those techniques are designed for reachability analysis.

  14. A Metric Encoding for Bounded Model Checking

    Science.gov (United States)

    Pradella, Matteo; Morzenti, Angelo; San Pietro, Pierluigi

    In Bounded Model Checking, both the system model and the checked property are translated into a Boolean formula to be analyzed by a SAT-solver. We introduce a new encoding technique which is particularly optimized for managing quantitative future and past metric temporal operators, typically found in properties of hard real time systems. The encoding is simple and intuitive in principle, but it is made more complex by the presence, typical of the Bounded Model Checking technique, of backward and forward loops used to represent an ultimately periodic infinite domain by a finite structure. We report and comment on the new encoding technique and on an extensive set of experiments carried out to assess its feasibility and effectiveness.

  15. Glovebox pressure relief and check valve

    Energy Technology Data Exchange (ETDEWEB)

    Blaedel, K.L.

    1986-03-17

    This device is a combined pressure relief valve and check valve providing overpressure protection and preventing back flow into an inert atmosphere enclosure. The pressure relief is embodied by a submerged vent line in a mercury reservior, the releif pressure being a function of the submerged depth. The pressure relief can be vented into an exhaust system and the relieving pressure is only slightly influenced by the varying pressure in the exhaust system. The check valve is embodied by a ball which floats on the mercury column and contacts a seat whenever vacuum exists within the glovebox enclosure. Alternatively, the check valve is embodied by a vertical column of mercury, the maximum back pressure being a function of the height of the column of mercury.

  16. Check Point任命新总裁

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    近日,互联网安全解决方案供应商Check Point软件技术有限公司宣布,Amnon Bar—Lev晋升为公司总裁。Bar--Lev将继续掌管公司面向客户的工作,包括销售、市场营销、业务发展、技术服务和合作伙伴计划。Bar—Lev于2005年加入Check Point,担任技术服务副总裁,并于2006年开始领导全球市场运营。在此期间,Check Point营业额增长了1倍多,达到约12亿美元。

  17. HCH for Checking Containment of XPath Fragment

    Institute of Scientific and Technical Information of China (English)

    Jian-Hua Feng; Yu-Guo Liao; Yong Zhang

    2007-01-01

    XPath is ubiquitous in XML applications for navigating XML trees and selecting a set of element nodes. In XPath query processing, one of the most important issues is how to efficiently check containment relationship between two XPath expressions. To get out of the intricacy and complexity caused by numerous XPath features, we investigate this issue on a frequently used fragment of XPath expressions that consists of node tests, the child axis (/), the descendant axis (//), branches ([]) and label wildcards (*). Prior work has shown that homomorphism technology can be used for containment checking. However, homomorphism is the sufficient but not necessary condition for containment. For special classes of this fragment, the homomorphism algorithm returns false negatives. To address this problem, this paper proposes two containment techniques, conditioned homomorphism and hidden conditioned homomorphism, and then presents sound algorithms for checking containment. Experimental results confirm the practicability and efficiency of the proposed algorithms.

  18. Graded CTL Model Checking for Test Generation

    CERN Document Server

    Napoli, Margherita

    2011-01-01

    Recently there has been a great attention from the scientific community towards the use of the model-checking technique as a tool for test generation in the simulation field. This paper aims to provide a useful mean to get more insights along these lines. By applying recent results in the field of graded temporal logics, we present a new efficient model-checking algorithm for Hierarchical Finite State Machines (HSM), a well established symbolism long and widely used for representing hierarchical models of discrete systems. Performing model-checking against specifications expressed using graded temporal logics has the peculiarity of returning more counterexamples within a unique run. We think that this can greatly improve the efficacy of automatically getting test cases. In particular we verify two different models of HSM against branching time temporal properties.

  19. A Systematic Review of the Empirical Support for Check-in Check-Out

    Science.gov (United States)

    Wolfe, Katie; Pyle, Daniel; Charlton, Cade T.; Sabey, Christian V.; Lund, Emily M.; Ross, Scott W.

    2016-01-01

    Tier 2 interventions play an important role within the Positive Behavioral Interventions and Supports framework, bridging the gap between schoolwide Tier 1 interventions and individualized Tier 3 supports. Check-in Check-out (CICO) is a promising Tier 2 intervention for addressing mild problem behavior and potentially preventing the need for more…

  20. Function-Based Modification of Check-In/Check-Out to Influence Escape-Maintained Behavior

    Science.gov (United States)

    Kilgus, Stephen P.; Fallon, Lindsay M.; Feinberg, Adam B.

    2016-01-01

    Prior research has suggested Check-In/Check-Out (CICO) effectiveness is linked to the function of problem behavior. Though effective for students whose misbehavior occurs to gain attention, findings are equivocal for behavior that occurs to escape academic tasks. The purpose of this study was to therefore evaluate a modification to CICO, wherein…

  1. Check In / Check Out. The Public Space as an Internet of Things

    NARCIS (Netherlands)

    van t Hof, C.C.G.; van Est, R.; Daemen, F.

    2011-01-01

    Mobile phones, public transport smart cards, security cameras and GPS systems in our car - we are surrounded by digital devices. They track us, guide us, help us, and control us. The book Check In / Check Out. The Public Space as an Internet of Things shows us how our digital and physical worlds are

  2. Gate-Check System for Outotec Company

    OpenAIRE

    Zajac, Lukas; Bartusek, Petr

    2014-01-01

    The main purpose of the thesis was to create the interactive, electronic web application Gate-Check for Outotec Company, which replaced the old system based on MS Excel document. Another purpose was gaining new skills and experiences in communication with the company, in which the team acted as a Supply Company. The created web application (Gate-Check System) should be compatible with any device with integrated web browser with support HTML5, JavaScript and CSS3 and active internet connect...

  3. A Method for Model Checking Feature Interactions

    DEFF Research Database (Denmark)

    Pedersen, Thomas; Le Guilly, Thibaut; Ravn, Anders Peter;

    2015-01-01

    This paper presents a method to check for feature interactions in a system assembled from independently developed concurrent processes as found in many reactive systems. The method combines and refines existing definitions and adds a set of activities. The activities describe how to populate the ...... the definitions with models to ensure that all interactions are captured. The method is illustrated on a home automation example with model checking as analysis tool. In particular, the modelling formalism is timed automata and the analysis uses UPPAAL to find interactions....

  4. Check list of European Hymenomycetous Heterobasidiae

    NARCIS (Netherlands)

    Donk, M.A.

    1966-01-01

    With this check list an attempt is made to account for the recorded European species of those Basidiomycetes that Patouillard called the “Hétérobasidies”, excluding, however, the Uredinales and Ustilaginales. Therefore, it covers the Septobasidiales, Tremellales (comprising the Auriculariineae and T

  5. Model Checking as Static Analysis: Revisited

    DEFF Research Database (Denmark)

    Zhang, Fuyuan; Nielson, Flemming; Nielson, Hanne Riis

    2012-01-01

    We show that the model checking problem of the μ-calculus can be viewed as an instance of static analysis. We propose Succinct Fixed Point Logic (SFP) within our logical approach to static analysis as an extension of Alternation-free Least Fixed Logic (ALFP). We generalize the notion...

  6. Incremental Integrity Checking: Limitations and Possibilities

    DEFF Research Database (Denmark)

    Christiansen, Henning; Martinenghi, Davide

    2005-01-01

    to query containment, we show that no procedure exists that always returns the best incremental test (aka simplification of integrity constraints), and this according to any reasonable criterion measuring the checking effort. In spite of this theoretical limitation, we develop an effective procedure...

  7. Efficient CSL Model Checking Using Stratification

    DEFF Research Database (Denmark)

    Zhang, Lijun; Jansen, David N.; Nielson, Flemming;

    2012-01-01

    For continuous-time Markov chains, the model-checking problem with respect to continuous-time stochastic logic (CSL) has been introduced and shown to be decidable by Aziz, Sanwal, Singhal and Brayton in 1996 [ 1, 2]. Their proof can be turned into an approximation algorithm with worse than expone...

  8. Explicit State Model Checking for Graph Grammars

    NARCIS (Netherlands)

    Rensink, A.; De Nicola, R.; Degano, P.; Meseguer, J.

    2008-01-01

    In this paper we present the philosophy behind the GROOVE project, in which graph transformation is used as a modelling formalism on top of which a model checking approach to software verification is being built. We describe the basic formalism, the current state of the project, and (current and fut

  9. Anchor Stress Checking of Security Injection Tank

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    The intention of the calculating is to check the anchor stresses of the security injection tank to know whether the stress is satisfied the code requirements on the basis of all the reaction forces gained in the static, seismic and thermal stress results.

  10. Using chemical organization theory for model checking

    OpenAIRE

    Kaleta, Christoph; Richter, Stephan; Dittrich, Peter

    2009-01-01

    Motivation: The increasing number and complexity of biomodels makes automatic procedures for checking the models' properties and quality necessary. Approaches like elementary mode analysis, flux balance analysis, deficiency analysis and chemical organization theory (OT) require only the stoichiometric structure of the reaction network for derivation of valuable information. In formalisms like Systems Biology Markup Language (SBML), however, information about the stoichiometric coefficients re...

  11. Availability of a Renewable, Checked System

    DEFF Research Database (Denmark)

    Platz, O.

    1976-01-01

    Recurrent expressions are given for point and interval unavailability of a renewable system subjected to periodic checking/repair. The expressions are generalizations of the basic relations in the theory of discrete renewal processes. The asymptotic limits for long times follow simply from a...

  12. The common agricultural policy health check

    OpenAIRE

    Erjavec, Emil; Lovec, Marko

    2016-01-01

    In 2008, the ministers of agriculture of European Union member states made a political agreement on the Common Agricultural Policy reform, also known as the Health Check. The reform coincided with three things: the ongoing Doha round of the World Trade Organization negotiations

  13. 40 CFR 86.327-79 - Quench checks; NOX analyzer.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Quench checks; NOX analyzer. 86.327-79... Quench checks; NOX analyzer. (a) Perform the reaction chamber quench check for each model of high vacuum... capillary, and if used, dilution capillary. (c) Quench check as follows: (1) Calibrate the NOX analyzer...

  14. 14 CFR 121.315 - Cockpit check procedure.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Cockpit check procedure. 121.315 Section... Cockpit check procedure. (a) Each certificate holder shall provide an approved cockpit check procedure for... for items to be checked. (c) The approved procedures must be readily usable in the cockpit of...

  15. The Dynamic Checking of Complex Real Time System

    Institute of Scientific and Technical Information of China (English)

    YU Chao; HUANG Benwen; WU Guoqing

    2006-01-01

    The paper presents an dynamic execution model of complex real-time software based on requirement description model RTRSM, and then propose a checking method based on configuration covering and its corresponding algorithm. This checking method can check the execution situations between parallel elements in a dynamic execution step of real-time software systems. It also can check all the states and transitions which assure the completeness of checking. In the end, related theorem is proofed.

  16. 32 CFR Attachment A to Subpart B... - Standard A-National Agency Check With Local Agency Checks and Credit Check (NACLC)

    Science.gov (United States)

    2010-07-01

    ... Access Programs by sect. 4.4 of Executive Order 12958) (60 FR 19825, 3 CFR 1995 Comp., p. 333); (2) “L... Agency Checks and Credit Check (NACLC) A Attachment A to Subpart B of Part 147 National Defense..., Subpt. B, Att. A Attachment A to Subpart B of Part 147—Standard A—National Agency Check With...

  17. Advanced techniques for efficient data integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide

    Integrity constraint checking, understood as the verification of data correctness and well-formedness conditions that must be satisfied in any state of a database, is not fully supported by current database technology. In a typical scenario, a database is required to comply with given semantic cr...... contexts, such as recursive databases, concurrent database systems, data integration systems and XML document collections, and provide a performance evaluation of the proposed model.......Integrity constraint checking, understood as the verification of data correctness and well-formedness conditions that must be satisfied in any state of a database, is not fully supported by current database technology. In a typical scenario, a database is required to comply with given semantic...... criteria (the integrity constraints) and to maintain the compliance each time data are updated. Since the introduction of the SQL2 standard, the SQL language started supporting assertions, which allow one to define general data consistency requirements expressing arbitrarily complex “business rules” that...

  18. Advanced techniques for efficient data integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide

    ” that may go beyond predefined constraints such as primary keys and foreign keys. General integrity constraints are, however, far from being widely available in commercial systems; in fact, their usage is commonly not encouraged, since the database management system would not be able to provide...... modifications in such programs. In this respect, database management systems need to be extended with means to verify, automatically and incrementally, that no violation of integrity is introduced by database updates. For this purpose we develop a procedure aimed at producing incremental checks whose...... be found in which optimality can indeed a lways be guaranteed. Furthermore, non-optimal simplification may imply a slight loss of efficiency, but still is a great improvement with respect to non-incremental checking. Finally, we extend the applicability of simplification to a number of different contexts...

  19. Type checking with open type functions

    DEFF Research Database (Denmark)

    Schrijvers, Tom; Jones, Simon Peyton; Chakravarty, Manual;

    2008-01-01

    We report on an extension of Haskell with open type-level functions and equality constraints that unifies earlier work on GADTs, functional dependencies, and associated types. The contribution of the paper is that we identify and characterise the key technical challenge of entailment checking; an......; and we give a novel, decidable, sound, and complete algorithm to solve it, together with some practically-important variants. Our system is implemented in GHC, and is already in active use....

  20. Speed checks on the CERN site

    CERN Multimedia

    2007-01-01

    In view of the significant number of speeding incidents that have been reported, CERN will shortly start to carry out speed checks on the site. The radar used for this purpose will show drivers the speed measured. The disciplinary measures taken against those exceeding the authorised limit (generally 50 k.p.h.) will include a ban from driving on the site for a minimum of one month. Maximilian Metzger
Secretary-General

  1. From model checking to model measuring

    OpenAIRE

    Henzinger, Thomas A.; Otop, Jan

    2013-01-01

    We define the model-measuring problem: given a model $M$ and specification~$\\varphi$, what is the maximal distance $\\rho$ such that all models $M'$ within distance $\\rho$ from $M$ satisfy (or violate)~$\\varphi$. The model measuring problem presupposes a distance function on models. We concentrate on automatic distance functions, which are defined by weighted automata. The model-measuring problem subsumes several generalizations of the classical model-checking problem, in particular, qu...

  2. The Activity Check of Brachytherapy Isotope

    International Nuclear Information System (INIS)

    An isotope Ir-192, which is used in brachytherapy depends on import in whole quantities. There are a few ways for its activity. measurement using Welltype chamber or the way to rely on authentic decay table of manufacturer. In-air dosimetry using Farmer Chamber, etc. In this paper, let me introduce the way using Farmer chamber which is easier and simple. With the Farmer chamber and source calibration jig, take a measurement the activity of an isotope Ir-192 and compare the value with the value from decay table of manufacturer and check the activity of source. The result of measurement, compared the value from decay table, by ±2.1. (which belongs to recommendable value for AAPM ±5% as difference of error range). It is possible to use on clinical medicine. With the increase in use of brachytherapy, the increase of import is essential. And an accurate activity check of source is compulsory. For the activity check of source, it was possible to use Farmer chamber and source calibration jig without additional purchase of Well type chamber.

  3. A computer-checked verification of Milner's scheduler

    OpenAIRE

    Korver, H.; Springintveld, J.

    1993-01-01

    We present an equational verification of Milner's scheduler, which we checked by computer.To our knowledge this is the first time that the scheduler is proof-checked for a general number n of scheduled processes.

  4. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  5. Infeasibility of Quantum Cryptography Without Eavesdropping Check

    Science.gov (United States)

    Yang, Wei; Huang, Liusheng; Song, Fang; Wang, Qiyan

    Secure key distribution is impossible in pure classical environment. Unconditional secure key distribution is available when quantum means are introduced, assisted by a classical communication channel. What is possible when a quantum key distribution scheme is without classical communication? We present a general model with this constraint and show that quantum key distribution without classical eavesdropping check is in principle impossible. For an adversary can always succeed in obtaining the secret key via a special case of man-in-the-middle attack, namely intercept-and-forward attack without any risk of being captured.

  6. Political and judicial checks on corruption

    DEFF Research Database (Denmark)

    Alt, James E.; Lassen, David Dreyer

    2008-01-01

    This paper investigates the effects of checks and balances on corruption. Within a presidential system, effective separation of powers is achieved under a divided government, with the executive and legislative branches being controlled by different political parties. When government is unified......, no effective separation exists even within a presidential system, but, we argue, can be partially restored by having an accountable judiciary. Our empirical findings show that a divided government and elected, rather than appointed, state supreme court judges are associated with lower corruption and...

  7. Checking MSC Specifications for Timing Inconsistency

    Institute of Scientific and Technical Information of China (English)

    LI Xuandong(李宣东); TAN Wenkai(谭文凯); ZHENG Guoliang(郑国梁)

    2002-01-01

    Message sequence chart (MSC) is a graphical and textual language for the description and specification of the interactions between system components. MSC specifica tions allow convenient expression of multiple scenarios, and offer an intuitive and visual way of describing design requirements. Like any other aspect of the specification and design process, MSCs are amenable to errors, and their analysis is important. In this paper, the verification problem of MSC specification for timing inconsistency is studied, which means that no execu tion scenario described by an MSC specification is timing consistent. An algorithm is developed to check MSC specifications for timing inconsistency.

  8. Statistical Model Checking for Biological Systems

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel;

    2014-01-01

    Statistical Model Checking (SMC) is a highly scalable simulation-based verification approach for testing and estimating the probability that a stochastic system satisfies a given linear temporal property. The technique has been applied to (discrete and continuous time) Markov chains, stochastic...... timed automata and most recently hybrid systems using the tool Uppaal SMC. In this paper we enable the application of SMC to complex biological systems, by combining Uppaal SMC with ANIMO, a plugin of the tool Cytoscape used by biologists, as well as with SimBiology®, a plugin of Matlab to simulate...

  9. SAT-Based Model Checking without Unrolling

    Science.gov (United States)

    Bradley, Aaron R.

    A new form of SAT-based symbolic model checking is described. Instead of unrolling the transition relation, it incrementally generates clauses that are inductive relative to (and augment) stepwise approximate reachability information. In this way, the algorithm gradually refines the property, eventually producing either an inductive strengthening of the property or a counterexample trace. Our experimental studies show that induction is a powerful tool for generalizing the unreachability of given error states: it can refine away many states at once, and it is effective at focusing the proof search on aspects of the transition system relevant to the property. Furthermore, the incremental structure of the algorithm lends itself to a parallel implementation.

  10. Automata-Based CSL Model Checking

    DEFF Research Database (Denmark)

    Zhang, Lijun; Jansen, David N.; Nielson, Flemming;

    2011-01-01

    For continuous-time Markov chains, the model-checking problem with respect to continuous-time stochastic logic (CSL) has been introduced and shown to be decidable by Aziz, Sanwal, Singhal and Brayton in 1996. The presented decision procedure, however, has exponential complexity. In this paper, we...... probability can then be approximated in polynomial time (using uniformization). This makes the present work the centerpiece of a broadly applicable full CSL model checker. Recently, the decision algorithm by Aziz et al. was shown to be incorrect in general. In fact, it works only for stratified CTMCs...

  11. Buckling check tools for plate panel and column structures

    OpenAIRE

    Vuorela, Pia

    2014-01-01

    Buckling is, besides yielding, one of the major causes of failures in structures, and buckling checks are therefore an integral part of strength analyses. Checks can be performed either with methods requiring heavy numerical calculations or with equations based on rules and recommendations from a classification society. Numerical calculations are extremely time-consuming and commercial buckling check programs are expensive. There is therefore a need for buckling check tools based on the recom...

  12. 7 CFR 1944.540 - Requesting TSA checks.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 13 2010-01-01 2009-01-01 true Requesting TSA checks. 1944.540 Section 1944.540... TSA checks. (a) The initial TSA check may cover the applicant's needs for the first calendar month. If... the next whole month. (b) The initial advance of TSA grant funds may not be requested...

  13. Testing Intelligently Includes Double-Checking Wechsler IQ Scores

    Science.gov (United States)

    Kuentzel, Jeffrey G.; Hetterscheidt, Lesley A.; Barnett, Douglas

    2011-01-01

    The rigors of standardized testing make for numerous opportunities for examiner error, including simple computational mistakes in scoring. Although experts recommend that test scoring be double-checked, the extent to which independent double-checking would reduce scoring errors is not known. A double-checking procedure was established at a…

  14. Model-Based Trace-Checking

    CERN Document Server

    Howard, Y; Gravell, A; Ferreira, C; Augusto, J C

    2011-01-01

    Trace analysis can be a useful way to discover problems in a program under test. Rather than writing a special purpose trace analysis tool, this paper proposes that traces can usefully be analysed by checking them against a formal model using a standard model-checker or else an animator for executable specifications. These techniques are illustrated using a Travel Agent case study implemented in J2EE. We added trace beans to this code that write trace information to a database. The traces are then extracted and converted into a form suitable for analysis by Spin, a popular model-checker, and Pro-B, a model-checker and animator for the B notation. This illustrates the technique, and also the fact that such a system can have a variety of models, in different notations, that capture different features. These experiments have demonstrated that model-based trace-checking is feasible. Future work is focussed on scaling up the approach to larger systems by increasing the level of automation.

  15. Model Checking of Boolean Process Models

    CERN Document Server

    Schneider, Christoph

    2011-01-01

    In the field of Business Process Management formal models for the control flow of business processes have been designed since more than 15 years. Which methods are best suited to verify the bulk of these models? The first step is to select a formal language which fixes the semantics of the models. We adopt the language of Boolean systems as reference language for Boolean process models. Boolean systems form a simple subclass of coloured Petri nets. Their characteristics are low tokens to model explicitly states with a subsequent skipping of activations and arbitrary logical rules of type AND, XOR, OR etc. to model the split and join of the control flow. We apply model checking as a verification method for the safeness and liveness of Boolean systems. Model checking of Boolean systems uses the elementary theory of propositional logic, no modal operators are needed. Our verification builds on a finite complete prefix of a certain T-system attached to the Boolean system. It splits the processes of the Boolean sy...

  16. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K1 and K2; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K1, and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K2. Then, the encrypted message and the intermediary MAC is again encrypted by using the K2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K2 and compared to the received MAC. The received ciphertext again is decrypted by the key K2 and compared with the first decrypted MAC twice by the key K2. The plaintext is obtained by decrypting the received ciphertext first by K2 and then by K1, using the corresponding decryption techniques respectively. The encryption techniques with key K2 provides the authentication and with key K1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  17. Model Checking over Paraconsistent Temporal Logic

    Institute of Scientific and Technical Information of China (English)

    CHEN Dong-huo; WANG Lin-zhang; CUI Jia-lin

    2008-01-01

    Classical logic cannot be used to effectively reason about concurrent systems with inconsistencies (inconsistencies often occur, especially in the early stage of the development, when large and complex concurrent systems are developed). In this paper, we propose the use of a guasi-classical temporal logic (QCTL) for supporting the verification of temporal properties of such systems even where the consistent model is not available. Our models are paraKripke structures ( extended standard Kripke structures), in which both a formula and its negation are satisfied in a same state, and properties to be verified are expressed by QCTL with paraKripke structures semantics. We introduce a novel notion of paraKripke models, which grasps the paraconsistent character of the entailment relation of QCTL. Furthermore, we explore the methodology of model checking over QCTL, and describe the detailed algorithm of implementing QCTL model checker. In the sequel, a simple example is presented, showing how to exploit the proposed model checking technique to verify the temporal properties of inconsistent concurrent systems.

  18. Requirements Specifications Checking of Embedded Real-Time Software

    Institute of Scientific and Technical Information of China (English)

    WU Guoqing(毋国庆); SHU Fengdi(舒风笛); WANG Min(王敏); CHEN Weiqing(陈伟清)

    2002-01-01

    After introducing the overview of our requirements description model HRFSM,the paper presents a dynamic software execution model (DERTS) of embedded real-time software, which can integrate control flow, data flow and time. Based on DERTS, a checking method is also presented. It consists of three kinds of checking and can check the consistency and completeness of the requirement specifications of embedded real-time software. Besides providing information helpful to improve the efficiency of analyzing and checking specifications,the checking method is flexible, and easy to understand and to use for the analyst.

  19. Improved Integrity Constraints Checking in Distributed Databases by Exploiting Local Checking

    Institute of Scientific and Technical Information of China (English)

    Ali A.Alwan; Hamidah Ibrahim; Nur Izura Udzir

    2009-01-01

    Most of the previous studies concerning checking the integrity constraints in distributed database derive simplified forms of the initial integrity constraints with the sufficiency property, since the sufficient test is known to be cheaper than the complete test and its initial integrity constraint as it involves less data to be transferred across the network and can always be evaluated at the target site (single site). Their studies are limited as they depend strictly on the assumption that an update operation will be executed at a site where the relation specified in the update operation is located, which is not always true. Hence, the sufficient test, which is proven to be local test by previous study, is no longer appropriate. This paper proposes an approach to checking integrity constraints in a distributed database by utilizing as much as possible the local information stored at the target site. The proposed approach derives support tests as an alternative to the existing complete and sufficient tests proposed by previous researchers with the intention to increase the number of local checking regardless the location of the submitted update operation. Several analyses have been performed to evaluate the proposed approach, and the results show that support tests can benefit the distributed database, where local constraint checking can be achieved.

  20. CHECK-IN/CHECK-OUT: A SYSTEMATIC EVALUATION AND COMPONENT ANALYSIS

    Science.gov (United States)

    Campbell, Amy; Anderson, Cynthia M

    2011-01-01

    Tier 2 interventions are implemented similarly across students and thus serve as an efficient and cost-effective method of behavior support in school settings. Check-in/check-out is a Tier 2 intervention with documented effectiveness (e.g., Hawken & Horner, 2003; Todd, Campbell, Meyer, & Horner, 2008). Key features of the intervention include brief morning and afternoon meetings with the intervention coordinator, use of a point card on which the teacher monitors student behavior, and teacher feedback at predetermined times. The present study sought to add to the literature by examining the relative contributions of the teacher-feedback components of check-in/check-out via the use of a component analysis. Working with 4 children in a general education setting, we first evaluated the effectiveness of the procedure using reversal designs. Next, we systematically removed teacher-feedback components to assess effects on problem behavior and academic engagement. For 3 of 4 participants, we were able to remove all teacher-feedback sessions and the point card; for the 4th participant, we removed only 2 of 3 teacher-feedback sessions due to time constraints. PMID:21709787

  1. Probabilistic and hybrid model checking deployments for wireless sensor networks

    International Nuclear Information System (INIS)

    In the early stages of system development, model checking is a good practice for examining the WSNs (Wireless Sensor Networks). Model checking involves verifying a system's properties based on the system's finite state model. For varying applications like computers and wireless communication prior to expensive simulations, model checking has become a vital requirement in order to investigate the performance and reliability. In this paper for the first time, we are presenting probabilistic and hybrid model checking tools which are being implemented to analyse and verify the WSN applications and their examples. Here we are categorizing the model checking tools and presenting how they have been used for the investigation of various behaviours of WSN solutions. Consequently, this paper helps readers/researchers to choose the appropriate model checking tool and to get benefited in shape of validating their solutions. The paper has also highlighted the problems of existing model checking tools within WSN domain. (author)

  2. Water system microbial check valve development

    Science.gov (United States)

    Colombo, G. V.; Greenley, D. R.; Putnam, D. F.

    1978-01-01

    Development work on a device for the Space Shuttle that will prevent the transfer of viable microorganisms within water systems is described. The device serves as a check valve in that it prevents the transfer or cross-contamination of microorganisms from a nonpotable system into a potable water system when these systems are interconnected. In this regard, the function of the device is similar to that of the air gap found in conventional one gravity systems. The device is essentially a bed of resin material impregnated with iodine. Basic design data for a variety of flow and temperature conditions are presented, together with results of challenging the beds with suspensions of seven microorganisms including aerobes, anaerobes, and spore formers.

  3. Static Checking of Interrupt-driven Software

    DEFF Research Database (Denmark)

    Brylow, Dennis; Damgaard, Niels; Palsberg, Jens

    2001-01-01

    in a few seconds on a standard PC. Our tool is one of the first to give an efficient and useful static analysis of assembly code. It enables increased confidence in correctness, significantly reduced testing requirements, and support for maintenance throughout the system life-cycle....... require extensive brute-force testing, making development and maintenance costly. This is particularly true for system components that are written in assembly language. Static checking has the potential of alleviating these problems, but until now there has been little tool support for programming...... at the assembly level. In this paper we present the design and implementation of a static checker for interrupt-driven Z86-based software with hard real-time requirements. For six commercial microcontrollers, our checker has produced upper bounds on interrupt latencies and stack sizes, as well as verified...

  4. Model Checking JAVA Programs Using Java Pathfinder

    Science.gov (United States)

    Havelund, Klaus; Pressburger, Thomas

    2000-01-01

    This paper describes a translator called JAVA PATHFINDER from JAVA to PROMELA, the "programming language" of the SPIN model checker. The purpose is to establish a framework for verification and debugging of JAVA programs based on model checking. This work should be seen in a broader attempt to make formal methods applicable "in the loop" of programming within NASA's areas such as space, aviation, and robotics. Our main goal is to create automated formal methods such that programmers themselves can apply these in their daily work (in the loop) without the need for specialists to manually reformulate a program into a different notation in order to analyze the program. This work is a continuation of an effort to formally verify, using SPIN, a multi-threaded operating system programmed in Lisp for the Deep-Space 1 spacecraft, and of previous work in applying existing model checkers and theorem provers to real applications.

  5. Workflow Fault Tree Generation Through Model Checking

    DEFF Research Database (Denmark)

    Herbert, Luke Thomas; Sharp, Robin

    2014-01-01

    We present a framework for the automated generation of fault trees from models of realworld process workflows, expressed in a formalised subset of the popular Business Process Modelling and Notation (BPMN) language. To capture uncertainty and unreliability in workflows, we extend this formalism...... with probabilistic non-deterministic branching. We present an algorithm that allows for exhaustive generation of possible error states that could arise in execution of the model, where the generated error states allow for both fail-stop behaviour and continued system execution. We employ stochastic model checking...... to calculate the probabilities of reaching each non-error system state. Each generated error state is assigned a variable indicating its individual probability of occurrence. Our method can determine the probability of combined faults occurring, while accounting for the basic probabilistic structure...

  6. Conformant Planning via Symbolic Model Checking

    CERN Document Server

    Cimatti, A; 10.1613/jair.774

    2011-01-01

    We tackle the problem of planning in nondeterministic domains, by presenting a new approach to conformant planning. Conformant planning is the problem of finding a sequence of actions that is guaranteed to achieve the goal despite the nondeterminism of the domain. Our approach is based on the representation of the planning domain as a finite state automaton. We use Symbolic Model Checking techniques, in particular Binary Decision Diagrams, to compactly represent and efficiently search the automaton. In this paper we make the following contributions. First, we present a general planning algorithm for conformant planning, which applies to fully nondeterministic domains, with uncertainty in the initial condition and in action effects. The algorithm is based on a breadth-first, backward search, and returns conformant plans of minimal length, if a solution to the planning problem exists, otherwise it terminates concluding that the problem admits no conformant solution. Second, we provide a symbolic representation ...

  7. Improving Atm Security Check Using DNA Biometrics

    Directory of Open Access Journals (Sweden)

    Igwe, Agu Felix

    2015-06-01

    Full Text Available This paper exposes how DNA can be used to identify account owner of a particular bank.DNA samples were obtained from body fluid. Buccal swab was used for sample collection .Buccal cell collection involves wiping a small piece of filter paper or a cotton swab against the inside of armpit in order to collect shed epithelial cells. The swab was then air dried or could be pressed against a treated collection card in order to transfer epithelial cells for storage purposes. The stored samples were later amplified and separated .The data generated from the samples were stored and saved in the database so that if a customer comes to claim money, the system checks whether it matches with what is stored in the database ,if it matches with the one in the database, access is granted to the customer,.if it does not match with what is stored in the database ,access is denied from the customer

  8. Statically checked documentation with design patterns

    DEFF Research Database (Denmark)

    Cornils, Aino; Hedin, Görel

    2000-01-01

    Over the past years, along with the increase in popularity of design patterns, some problems with the use of design patterns have been identified. The so-called tracing problem describes the difficulty in documenting software systems using design patterns. Initial approaches to solving the tracing...... problem have focused on guidelines for documenting design pattern roles and rules within a system, but experience has shown that both in the initial design, and especially in later code revisions, it is all too easy for code and documentation to diverge, rendering the documentation misleading. The authors...... present a flexible and extensible tool which enables designers to use design patterns in a safe and efficient way, which checks the design pattern rules, and which semi-automatically documents, and maintains the documentation of a software system...

  9. The Mars Science Laboratory Organic Check Material

    Science.gov (United States)

    Conrad, Pamela G.; Eigenbrode, J. E.; Mogensen, C. T.; VonderHeydt, M. O.; Glavin, D. P.; Mahaffy, P. M.; Johnson, J. A.

    2011-01-01

    The Organic Check Material (OCM) has been developed for use on the Mars Science Laboratory mission to serve as a sample standard for verification of organic cleanliness and characterization of potential sample alteration as a function of the sample acquisition and portioning process on the Curiosity rover. OCM samples will be acquired using the same procedures for drilling, portioning and delivery as are used to study martian samples with The Sample Analysis at Mars (SAM) instrument suite during MSL surface operations. Because the SAM suite is highly sensitive to organic molecules, the mission can better verify the cleanliness of Curiosity's sample acquisition hardware if a known material can be processed through SAM and compared with the results obtained from martian samples.

  10. Temporal Check-All-That-Apply Characterization of Syrah Wine.

    Science.gov (United States)

    Baker, Allison K; Castura, John C; Ross, Carolyn F

    2016-06-01

    Temporal Check-All-That-Apply (TCATA) is a new dynamic sensory method for which analysis techniques are still being developed and optimized. In this study, TCATA methodology was applied for the evaluation of wine finish by trained panelists (n = 13) on Syrah wines with different ethanol concentrations (10.5% v/v and 15.5% v/v). Raw data were time standardized to create a percentage of finish duration, subsequently segmented into thirds (beginning, middle, and end) to capture panel perception. Results indicated the finish of the high ethanol treatments lasted longer (approximately 12 s longer) than the low ethanol treatment (P ≤ 0.05). Within each finish segment, Cochran's Q was conducted on each attribute and differences were detected amongst treatments (P ≤ 0.05). Pairwise tests showed the high ethanol treatments were more described by astringency, heat/ethanol burn, bitterness, dark fruit, and spices, whereas the low ethanol treatment was more characterized by sourness, red fruit, and green flavors (P ≤ 0.05). This study demonstrated techniques for dealing with the data generated by TCATA. Furthermore, this study further characterized the influence of ethanol on wine finish, and by extension wine quality, with implications to winemakers responsible for wine processing decisions involving alcohol management.

  11. Temporal Check-All-That-Apply Characterization of Syrah Wine.

    Science.gov (United States)

    Baker, Allison K; Castura, John C; Ross, Carolyn F

    2016-06-01

    Temporal Check-All-That-Apply (TCATA) is a new dynamic sensory method for which analysis techniques are still being developed and optimized. In this study, TCATA methodology was applied for the evaluation of wine finish by trained panelists (n = 13) on Syrah wines with different ethanol concentrations (10.5% v/v and 15.5% v/v). Raw data were time standardized to create a percentage of finish duration, subsequently segmented into thirds (beginning, middle, and end) to capture panel perception. Results indicated the finish of the high ethanol treatments lasted longer (approximately 12 s longer) than the low ethanol treatment (P ≤ 0.05). Within each finish segment, Cochran's Q was conducted on each attribute and differences were detected amongst treatments (P ≤ 0.05). Pairwise tests showed the high ethanol treatments were more described by astringency, heat/ethanol burn, bitterness, dark fruit, and spices, whereas the low ethanol treatment was more characterized by sourness, red fruit, and green flavors (P ≤ 0.05). This study demonstrated techniques for dealing with the data generated by TCATA. Furthermore, this study further characterized the influence of ethanol on wine finish, and by extension wine quality, with implications to winemakers responsible for wine processing decisions involving alcohol management. PMID:27272248

  12. Experiences of patients and healthcare professionals of NHS cardiovascular health checks: a qualitative study

    Science.gov (United States)

    Riley, R.; Coghill, N.; Montgomery, A.; Feder, G.; Horwood, J.

    2016-01-01

    Background NHS Health Checks are a national cardiovascular risk assessment and management programme in England and Wales. We examined the experiences of patients attending and healthcare professionals (HCPs) conducting NHS Health Checks. Methods Interviews were conducted with a purposive sample of 28 patients and 16 HCPs recruited from eight general practices across a range of socio-economic localities. Interviews were audio recorded, transcribed, anonymized and analysed thematically. Results Patients were motivated to attend an NHS Health Check because of health beliefs, the perceived value of the programme, a family history of cardiovascular and other diseases and expectations of receiving a general health assessment. Some patients reported benefits including reassurance and reinforcement of healthy lifestyles. Others experienced confusion and frustration about how results and advice were communicated, some having a poor understanding of the implications of their results. HCPs raised concerns about the skill set of some staff to competently communicate risk and lifestyle information. Conclusions To improve the satisfaction of patients attending and improve facilitation of lifestyle change, HCPs conducting the NHS Health Checks require sufficient training to equip them with appropriate skills and knowledge to deliver the service effectively. PMID:26408822

  13. Check-up examination: recommendations in adults.

    Science.gov (United States)

    Virgini, Vanessa; Meindl-Fridez, Claudine; Battegay, Edouard; Zimmerli, Lukas U

    2015-01-01

    Check-up examinations, or periodic health examinations (PHEs), have gained in importance during the last decades and are nowadays among the most common reasons for consultations in primary care settings. The aim of PHEs is to identify risk factors and early signs of disease, but also to prevent future illness by early intervention. Therefore, each PHE should include counselling, immunisation and physical examination according to the patient's age and gender. However, deciding whether to screen a patient and choosing the most appropriate screening method can be challenging for general practitioners. The U.S. Preventive Service Task Force (USPSTF) provides updated recommendations on different existing preventive care measures based on relevant literature review. The aim of this review is to provide an updated statement of recommendations regarding preventive care measures based mostly on the guidelines derived from the USPSTF and the Swiss Medical Board. Among the major updates, there is no recommendation anymore to routinely screen for breast cancer and prostate cancer in asymptomatic adults. Since 2013, however, the USPSTF recommends annual screening for lung cancer with low-dose CT in patients aged 55 to 80 years with a smoking history of ≥30 pack years. During PHEs, the physician should be alert to the patients' hidden agendas, which are the reason for one third of all consultations in primary care.

  14. Analyzing Interoperability of Protocols Using Model Checking

    Institute of Scientific and Technical Information of China (English)

    WUPeng

    2005-01-01

    In practical terms, protocol interoperability testing is still laborious and error-prone with little effect, even for those products that have passed conformance testing. Deadlock and unsymmetrical data communication are familiar in interoperability testing, and it is always very hard to trace their causes. The previous work has not provided a coherent way to analyze why the interoperability was broken among protocol implementations under test. In this paper, an alternative approach is presented to analyzing these problems from a viewpoint of implementation structures. Sequential and concurrent structures are both representative implementation structures, especially in event-driven development model. Our research mainly discusses the influence of sequential and concurrent structures on interoperability, with two instructive conclusions: (a) a sequential structure may lead to deadlock; (b) a concurrent structure may lead to unsymmetrical data communication. Therefore, implementation structures carry weight on interoperability, which may not gain much attention before. To some extent, they are decisive on the result of interoperability testing. Moreover, a concurrent structure with a sound task-scheduling strategy may contribute to the interoperability of a protocol implementation. Herein model checking technique is introduced into interoperability analysis for the first time. As the paper shows, it is an effective way to validate developers' selections on implementation structures or strategies.

  15. Effective ambiguity checking in biosequence analysis

    Directory of Open Access Journals (Sweden)

    Giegerich Robert

    2005-06-01

    Full Text Available Abstract Background Ambiguity is a problem in biosequence analysis that arises in various analysis tasks solved via dynamic programming, and in particular, in the modeling of families of RNA secondary structures with stochastic context free grammars. Several types of analysis are invalidated by the presence of ambiguity. As this problem inherits undecidability (as we show here from the namely problem for context free languages, there is no complete algorithmic solution to the problem of ambiguity checking. Results We explain frequently observed sources of ambiguity, and show how to avoid them. We suggest four testing procedures that may help to detect ambiguity when present, including a just-in-time test that permits to work safely with a potentially ambiguous grammar. We introduce, for the special case of stochastic context free grammars and RNA structure modeling, an automated partial procedure for proving non-ambiguity. It is used to demonstrate non-ambiguity for several relevant grammars. Conclusion Our mechanical proof procedure and our testing methods provide a powerful arsenal of methods to ensure non-ambiguity.

  16. Checking for normality in linear mixed models

    Institute of Scientific and Technical Information of China (English)

    WU Ping; ZHU LiXing; FANG Yun

    2012-01-01

    Linear mixed models are popularly used to fit continuous longitudinal data,and the random effects are commonly assumed to have normal distribution.However,this assumption needs to be tested so that further analysis can be proceeded well.In this paper,we consider the Baringhaus-Henze-Epps-Pulley (BHEP) tests,which are based on an empirical characteristic function.Differing from their case,we consider the normality checking for the random effects which are unobservable and the test should be based on their predictors.The test is consistent against global alternatives,and is sensitive to the local alternatives converging to the null at a certain rate arbitrarily close to 1/(√)n where n is sample size.Furthermore,to overcome the problem that the limiting null distribution of the test is not tractable,we suggest a new method:use a conditional Monte Carlo test (CMCT) to approximate the null distribution,and then to simulate p-values.The test is compared with existing methods,the power is examined,and several examples are applied to illustrate the usefulness of our test in the analysis of longitudinal data.

  17. Attentive Turkers: MTurk participants perform better on online attention checks than do subject pool participants.

    Science.gov (United States)

    Hauser, David J; Schwarz, Norbert

    2016-03-01

    Participant attentiveness is a concern for many researchers using Amazon's Mechanical Turk (MTurk). Although studies comparing the attentiveness of participants on MTurk versus traditional subject pool samples have provided mixed support for this concern, attention check questions and other methods of ensuring participant attention have become prolific in MTurk studies. Because MTurk is a population that learns, we hypothesized that MTurkers would be more attentive to instructions than are traditional subject pool samples. In three online studies, participants from MTurk and collegiate populations participated in a task that included a measure of attentiveness to instructions (an instructional manipulation check: IMC). In all studies, MTurkers were more attentive to the instructions than were college students, even on novel IMCs (Studies 2 and 3), and MTurkers showed larger effects in response to a minute text manipulation. These results have implications for the sustainable use of MTurk samples for social science research and for the conclusions drawn from research with MTurk and college subject pool samples.

  18. Buying in and Checking out: Identity Development and Meaning Making in the Practice of Mathematics Homework

    Directory of Open Access Journals (Sweden)

    Mara Landers

    2013-06-01

    Full Text Available This paper presents findings from an ethnographic study of the role and meaning of mathematics homework in the lives of middle school students. The study conceptualizes and examines homework as a social practice, with a focus on how students make meaning out of their experiences and the role of identity development in meaning making. Specifically, the study examines how middle school students come to value or reject mathematics homework. Case study analyses revealed two ways of characterizing students’ experiences with homework. Students who buy into homework develop aspects of their identities related to school, math and homework that support them in valuing homework. Students who check out develop aspects of their identities that support them in rejecting homework. The concepts of buying in and checking out have implications for theory development around motivation and identity and for school practices around homework.

  19. Verifying Multi-Agent Systems via Unbounded Model Checking

    Science.gov (United States)

    Kacprzak, M.; Lomuscio, A.; Lasica, T.; Penczek, W.; Szreter, M.

    2004-01-01

    We present an approach to the problem of verification of epistemic properties in multi-agent systems by means of symbolic model checking. In particular, it is shown how to extend the technique of unbounded model checking from a purely temporal setting to a temporal-epistemic one. In order to achieve this, we base our discussion on interpreted systems semantics, a popular semantics used in multi-agent systems literature. We give details of the technique and show how it can be applied to the well known train, gate and controller problem. Keywords: model checking, unbounded model checking, multi-agent systems

  20. Interference checking approach with tolerance based on assembly dimension chain

    Institute of Scientific and Technical Information of China (English)

    Wang Lei; Li Yingguang; Wang Wei; and Liao Wenhe

    2012-01-01

    CAD model with nominal dimension is implemented in interference checking of assembly simulation of aircraft complex parts at present, which causes inadequate availability. In order to address this challenging issue, interference checking method with tolerance based on assembly dimension chain was proposed. Worst case and maximum error probability of tolerance of composing loop were used, and CAD models were respectively re-constructed and inserted into simulation system. Before dynamic interference checking, engineering semantic interference condition was set to assembly requirements. Finally, the interface checking result was a basis for reasonability of assembly process and tolerance. A prototype system was developed based on the above research.

  1. 25 CFR 115.704 - May we accept for deposit into a trust account retirement checks/payments or pension fund checks...

    Science.gov (United States)

    2010-04-01

    ... checks/payments or pension fund checks/payments even though those funds are not specified in § 115.702... May we accept for deposit into a trust account retirement checks/payments or pension fund checks.../payments or pension fund checks/payments or any funds from sources that are not identified in the table...

  2. Diagnostic framework and health check tool for engineering and technology projects

    Directory of Open Access Journals (Sweden)

    Simon P Philbin

    2014-10-01

    Full Text Available Purpose: Development of a practitioner oriented diagnostic framework and health check tool to support the robust assessment of engineering and technology projects.Design/methodology/approach: The research is based on a literature review that draws together insights on project assessment and critical success factors to establish an integrated systems view of projects. This is extended to allow a comprehensive diagnostic framework to be developed along with a high-level health check tool that can be readily deployed on projects. The utility of the diagnostic framework and health check tool are explored through three illustrative case studies, with two from Canada and one from the United Kingdom. Findings andOriginality/value: The performance of engineering and technology projects can be viewed through a systems perspective and being a function of six sub-systems that are: process, technology, resources, impact, knowledge and culture. The diagnostic framework that is developed through this research integrates these sub-systems to provide a comprehensive assessment methodology for projects, which is linked to existing best practice for project reviews, performance management and maturity models. The case studies provide managerial insights that are related to the diagnostic framework but crucially also position the approach in the context of industrial applications for construction engineering and technology management.Research limitations/implications: The case study approach includes two case studies from the construction and facilities development sector with the third case study from the research and technology sector. Further work is required to investigate the use of the diagnostic framework and health check tool in other sectors.Practical implications: The health check tool will be of practical benefit to new projects managers that require access to a robust and convenient project review methodology for assessing the status and health of a

  3. 16 CFR 240.12 - Checking customer's use of payments.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Checking customer's use of payments. 240.12... ADVERTISING ALLOWANCES AND OTHER MERCHANDISING PAYMENTS AND SERVICES § 240.12 Checking customer's use of... are furnished and that the seller is not overpaying for them. The customer should expend the...

  4. 40 CFR 89.317 - NOX converter check.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false NOX converter check. 89.317 Section 89... Provisions § 89.317 NOX converter check. (a) Prior to its introduction into service, and monthly thereafter... of the NOX generator to the sample inlet of the oxides of nitrogen analyzer which has been set to...

  5. 40 CFR 90.319 - NOX converter check.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false NOX converter check. 90.319 Section 90... Provisions § 90.319 NOX converter check. (a) The efficiency of the converter used for the conversion of NO2... percent of the NO concentration). The NOX analyzer must be in the NO mode so that the span gas does...

  6. Development of a stainless steel check valve for cryogenic applications

    NARCIS (Netherlands)

    Veenstra, T.T.; Venhorst, G.C.F.; Burger, J.F.; Holland, H.J.; Brake, ter H.J.M.; Sirbi, A.; Rogalla, H.

    2007-01-01

    This paper describes the development of a check valve for use in a sorption compressor that will drive a 10 mW 4.5 K Joule–Thomson cryocooler. For the check valve extremely low backflow rates are tolerable at an operating temperature of the valve of 50 K. To fulfill these requirements, the sealing m

  7. The Complexity of Model Checking Higher-Order Fixpoint Logic

    DEFF Research Database (Denmark)

    Axelsson, Roland; Lange, Martin; Somla, Rafal

    2007-01-01

    provides complexity results for its model checking problem. In particular we consider its fragments HFLk,m which are formed using types of bounded order k and arity m only. We establish k-ExpTime-completeness for model checking each HFLk,m fragment. For the upper bound we reduce the problem to the problem...

  8. The Remote Product Check and Acceptance Technology Based on Web

    Institute of Scientific and Technical Information of China (English)

    YANG Musheng; ZHANG Yu

    2006-01-01

    This paper analyzes the feasibility of the remote check and acceptance of product and presents an architecture through which the remote product check and acceptance system can be realized. This paper also illuminates the work process of this system and discusses the technological details of the quality inspection as well as the key technologies.

  9. How To Check PML/PaGE-OM Schema [

    Lifescience Database Archive (English)

    Full Text Available How To Check PML/PaGE-OM Schema PML Schema Cheker page stopped serving. To check yo...ur XML schema validation, please use standard XML editor commonly used in. How to validate XML schema file P

  10. Modern Trends in Airport Self Check-in Kiosks

    Directory of Open Access Journals (Sweden)

    Jarmila Sabatová

    2016-10-01

    Full Text Available Due to maintain the flow of the check-in process of air passengers, it is essential that services that ensure this process have been carried as quickly and effectively. One of the major current problems in this area is the efficiency of clearance of a large number of passengers over the check-in counters. By the gradual development of so-called self check-in services eventually delegate some activities in check-in process to passengers and the entire clearance process to speed up. In this article the authors deal with current state of the use of self check-in services in the world and predict the expected evolution of these services in the future. Subsequently, the authors present a new design of self-service kiosk and graphical user interface (GUI of application such self-service check-in kiosk based on the analysis of the functions and features of similar solutions available on the market and with considering all currently known IATA requirements and the criteria relating to disabled passengers in order to lighten the load check-in counters and thereby accelerated the clearance of the passenger at the airport. The aim of the authors was to create a cost competitive solution offering such new features and services that do not offer other solutions, with an emphasis on improving the efficiency of the check-in process of passengers at the airport.

  11. Check-up Measurement (update). Deliverable D5.22

    NARCIS (Netherlands)

    Holtzer, A.C.G.; Giessen, A.M.D. van der; Djurica, M.

    2015-01-01

    This deliverable D5.22 presents the GEN6 check-up measurement. It describes the most prominent outcomes of the GEN6 project up to this point in time. The check-up measurement helps to focus the monitoring towards the most relevant achievements of the project, such that an efficient and well-targeted

  12. Checking Consistency of Pedigree Information is NP-complete

    DEFF Research Database (Denmark)

    Aceto, Luca; Hansen, Jens A.; Ingolfsdottir, Anna;

    Consistency checking is a fundamental computational problem in genetics. Given a pedigree and information on the genotypes of some of the individuals in it, the aim of consistency checking is to determine whether these data are consistent with the classic Mendelian laws of inheritance. This probl...

  13. The Effects of Check-In/Check-Out on Problem Behavior and Academic Engagement in Elementary School Students

    Science.gov (United States)

    Miller, Leila M.; Dufrene, Brad A.; Sterling, Heather E.; Olmi, D. Joe; Bachmayer, Erica

    2015-01-01

    This study evaluated the effectiveness of Check-in/Check-out (CICO) for improving behavioral performance for three students referred for Tier 2 behavioral supports. An ABAB withdrawal design was used to evaluate CICO and results indicate that intervention was effective for reducing problem behavior as well as increasing academic engagement for all…

  14. PREREQUISITE PROGRAMMES IN OWN CHECKS IN STATUTORY AND VOLUNTARY LEGISLATION

    Directory of Open Access Journals (Sweden)

    E. Guidi

    2012-08-01

    Full Text Available Prerequisite Programmes approach is a requirement for implementing a correct own check plan. This new approach, born according to the European Legislation, is completely recognized by third Nation Authorities and private Inspection and Accreditation Bodies. This method is the basis to verify if an own check system is under control and to verify if corrective actions are built up to warrant hygienic production standards. The present work demonstrate that a correct own check plan is built up only by a Pre Requisites Program approach. The new UNI EN ISO 22000:2005 standard describe this concept specifying the difference between PRP and CCP.

  15. Towards an automated checked baggage inspection system augmented with robots

    Science.gov (United States)

    DeDonato, Matthew P.; Dimitrov, Velin; Padır, Taskin

    2014-05-01

    We present a novel system for enhancing the efficiency and accuracy of checked baggage screening process at airports. The system requirements address the identification and retrieval of objects of interest that are prohibited in a checked luggage. The automated testbed is comprised of a Baxter research robot designed by Rethink Robotics for luggage and object manipulation, and a down-looking overhead RGB-D sensor for inspection and detection. We discuss an overview of current system implementations, areas of opportunity for improvements, robot system integration challenges, details of the proposed software architecture and experimental results from a case study for identifying various kinds of lighters in checked bags.

  16. Checking RTECTL properties of STSs via SMT-based Bounded Model Checking

    Directory of Open Access Journals (Sweden)

    Agnieszka Zbrzezny

    2015-12-01

    Full Text Available We present an SMT-based bounded model checking (BMC method for Simply-Timed Systems (STSs and for the existential fragment of the Real-time Computation Tree Logic. We implemented the SMT-based BMC algorithm and compared it with the SAT-based BMC method for the same systems and the same property language on several benchmarks for STSs. For the SAT- based BMC we used the PicoSAT solver and for the SMT-based BMC we used the Z3 solver. The experimental results show that the SMT-based BMC performs quite well and is, in fact, sometimes significantly faster than the tested SAT-based BMC.

  17. Review and analysis of check valve failure data

    Science.gov (United States)

    Todd, M. D.; Casada, D. A.

    Check valve operating problems in recent years have resulted in significant operating transients, increased cost and decreased system availability. There has been, in response, additional attention given to check valves by utilities, as well as the US Nuclear Regulatory Commission and the American Society of Mechanical Engineers Operation and Maintenance Committee. All these organizations have the fundamental goal of ensuring reliable operation of check valves. A key ingredient to an engineering-oriented reliability improvement effort is a thorough understanding of relevant historical experience. Oak Ridge National Laboratory is currently conducting a detailed review of historical failure data available through the Institute of Nuclear Power Operation's Nuclear Plant Reliability Data System. The focus of the review is on check valve failures that have involved significant degradation of the valve internal parts. A variety of parameters are being considered during the review, including size, age, system of service, method of failure discovery, the affected valve parts, attributed causes, and corrective actions.

  18. Model Checking Is Static Analysis of Modal Logic

    DEFF Research Database (Denmark)

    Nielson, Flemming; Nielson, Hanne Riis

    2010-01-01

    Flow Logic is an approach to the static analysis of programs that has been developed for functional, imperative and object-oriented programming languages and for concurrent, distributed, mobile and cryptographic process calculi. In this paper we extend it; to deal with modal logics and prove...... that it can give an exact characterisation of the semantics of formulae in a modal logic. This shows that model checking can be performed by means of state-of-the-art approaches to static analysis and allow us to conclude that the problems of model checking and static analysis are reducible to each other....... In terms of computational complexity we show that model checking by means of static analysis gives the same complexity bounds as are known for traditional approaches to model checking....

  19. Automatic checking system of radioactivity in motor-cars 'AKKORD'

    International Nuclear Information System (INIS)

    A monitoring device has been developed for an automated checking of all vehicles leaving or entering a nuclear installation against uncontrolled lost of radioactive material. This device is an excellent tool for radioactive material flow control. (orig.)

  20. Model checking biological systems described using ambient calculus

    DEFF Research Database (Denmark)

    Mardare, Radu Iulian; Priami, Corrado; Qualia, Paola;

    2005-01-01

    Model checking biological systems described using ambient calculus. In Proc. of the second International Workshop on Computational Methods in Systems Biology (CMSB04), Lecture Notes in Bioinformatics 3082:85-103, Springer, 2005....

  1. Monitoring Blood Sugar: The Importance of Checking Blood Sugar Levels

    Science.gov (United States)

    ... 5 Things to Know About Zika & Pregnancy Monitoring Blood Sugar KidsHealth > For Parents > Monitoring Blood Sugar Print ... Other Tests Record Keeping The Importance of Checking Blood Sugar Levels Besides helping to keep blood sugar ...

  2. Imagery versus verbal interpretive cognitive bias modification for compulsive checking.

    Science.gov (United States)

    Black, Melissa J; Grisham, Jessica R

    2016-08-01

    Pathological doubting and checking is a common symptom presentation in obsessive-compulsive disorder (OCD). Previous research has established that compulsive checkers do not display an actual memory deficit, but lack confidence in their memories and experience intolerance of uncertainty regarding the completion of tasks. We investigated whether interpretive cognitive bias modification (CBM-I) reduced memory distrust and intolerance of uncertainty in a nonclinical sample. We also examined the possible enhancement of CBM-I for OCD through imagery training. The results provide evidence that participants who received positive imagery CBM-I training may have interpreted novel ambiguous checking scenarios more adaptively and endorsed negative checking beliefs less relative to participants in the control imagery CBM-I condition. Findings on behavioural checking tasks did not indicate any specific response to CBM-I training. Future research may translate these suggestive findings into a useful adjunct to traditional strategies targeting maladaptive OCD beliefs. PMID:27300752

  3. Decentralized Checking Context Inconsistency in Ubiquitous Mobile Computing Environments

    Science.gov (United States)

    Zhang, Daqiang; Yang, Zhijun; Huang, Hongyu; Zou, Qin

    Contexts are often noisy in ubiquitous mobile computing environments due to user mobility, unreliable wireless connectivity and resource constraints. Various schemes have been proposed to check context inconsistency for ubiquitous mobile applications. However, most of them require central control. This requirement inhibits their working in ubiquitous mobile environments, which are characterized by the asynchronous coordination among computing devices. In this paper, we propose DCCI scheme - Decentralized Checking Context Inconsistency for ubiquitous mobile applications by exploiting the preference-based locality that denotes context inconsistency occurs among the nodes that impose various restrictions on the same context. According to this locality, DCCI constructs a preference-based shortcut structure to check inconsistency within shortcuts. Extensive experiments show that DCCI can accurately and efficiently check context inconsistency in a fully distributed manner.

  4. Skin Cancer Check? Do Some Sole-Searching

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159385.html Skin Cancer Check? Do Some Sole-Searching Deadly melanoma is ... wear-and-tear appears to promote the deadly skin cancer in at least one place where the sun ...

  5. 31 CFR 240.15 - Checks issued to deceased payees.

    Science.gov (United States)

    2010-07-01

    ...) FISCAL SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE INDORSEMENT AND PAYMENT OF CHECKS... a financial institution, it will be paid by Treasury without the submission of documentary proof...

  6. Dynamic State Space Partitioning for External Memory Model Checking

    DEFF Research Database (Denmark)

    Evangelista, Sami; Kristensen, Lars Michael

    2009-01-01

    We describe a dynamic partitioning scheme usable by model checking techniques that divide the state space into partitions, such as most external memory and distributed model checking algorithms. The goal of the scheme is to reduce the number of transitions that link states belonging to different ...... partitions, and thereby limit the amount of disk access and network communication. We report on several experiments made with our verification platform ASAP that implements the dynamic partitioning scheme proposed in this paper....

  7. Check Point:极速灵动安全

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    8月25日,Check Point软件技术有限公司推出了号称业界速度最快的安全网关。这款名为Check Point 61000的安全系统能为数据中心、电信和云服务供应商提供可扩展的性能。

  8. Efficient Checking of Individual Rewards Properties in Markov Population Models

    OpenAIRE

    Bortolussi, Luca; Hillston, Jane

    2015-01-01

    In recent years fluid approaches to the analysis of Markov populations models have been demonstrated to have great pragmatic value. Initially developed to estimate the behaviour of the system in terms of the expected values of population counts, the fluid approach has subsequently been extended to more sophisticated interrogations of models through its embedding within model checking procedures. In this paper we extend recent work on checking CSL properties of individual agents within a Marko...

  9. An Extended Ontology Model and Ontology Checking Based on Description Logics

    Institute of Scientific and Technical Information of China (English)

    王洪伟; 蒋馥; 吴家春

    2004-01-01

    Ontology is defined as an explicit specification of a conceptualization. In this paper, an extended ontology model was constructed using description logics, which is a 5-tuples including term set, individual set, term definition set, instantiation assertion set and term restriction set. Based on the extended model, the issue on ontology checking was studied with the conclusion that the four kinds of term checking, including term satisfiability checking, term subsumption checking, term equivalence checking and term disjointness checking, can be reduced to the satisfiability checking, and satisfiability checking can be transformed into instantiation consistence checking.

  10. Strategy optimization for mask rule check in wafer fab

    Science.gov (United States)

    Yang, Chuen Huei; Lin, Shaina; Lin, Roger; Wang, Alice; Lee, Rachel; Deng, Erwin

    2015-07-01

    Photolithography process is getting more and more sophisticated for wafer production following Moore's law. Therefore, for wafer fab, consolidated and close cooperation with mask house is a key to achieve silicon wafer success. However, generally speaking, it is not easy to preserve such partnership because many engineering efforts and frequent communication are indispensable. The inattentive connection is obvious in mask rule check (MRC). Mask houses will do their own MRC at job deck stage, but the checking is only for identification of mask process limitation including writing, etching, inspection, metrology, etc. No further checking in terms of wafer process concerned mask data errors will be implemented after data files of whole mask are composed in mask house. There are still many potential data errors even post-OPC verification has been done for main circuits. What mentioned here are the kinds of errors which will only occur as main circuits combined with frame and dummy patterns to form whole reticle. Therefore, strategy optimization is on-going in UMC to evaluate MRC especially for wafer fab concerned errors. The prerequisite is that no impact on mask delivery cycle time even adding this extra checking. A full-mask checking based on job deck in gds or oasis format is necessary in order to secure acceptable run time. Form of the summarized error report generated by this checking is also crucial because user friendly interface will shorten engineers' judgment time to release mask for writing. This paper will survey the key factors of MRC in wafer fab.

  11. Experimental and Analytical Study on the Lift Check Valve

    Energy Technology Data Exchange (ETDEWEB)

    Kim, J. H.; Song, C. S.; Kim, H. S.; Hong, S. C. [Korea Institute of Machinery and Materials, Daejeon (Korea, Republic of); Lee, W. H. [Samshin Limited Co., Chonan (Korea, Republic of)

    2009-10-15

    In general, the check valve mounted on the flow line is used for the purpose of protecting the pump and the related facility, making the flow path, and maintaining the pressure boundary during the operation mode change in steam power plant and nuclear power plant. Fig. 1 shows the example of check valve in nuclear power plant. Especially, the check valve mounted on safety feed system and nuclear safety system is operated to open state and has a role of acquiring enough fluid such as safety feed and auxiliary feed water in the Design Basis Accident. And the check valve is operated with enough sealing and with protecting steam hammer in normal operational mode. For this purpose, the check valve can be open easily and be maintained in the open state in case of small flow velocity. In this research, the experimental and analytical study on the check vale was performed. The flow coefficient and closure time were compared between the experimental and the analytical result by numerical simulation. The validation of the analytical method was performed.

  12. Improved Bounded Model Checking for the Universal Fragment of CTL

    Institute of Scientific and Technical Information of China (English)

    Liang Xu; Wei Chen; Yan-Yan Xu; Wen-Hui Zhang

    2009-01-01

    SAT-based bounded model checking (BMC) has been introduced as a complementary technique to BDD-based symbolic model checking in recent years, and a lot of successful work has been done in this direction. The approach was first introduced by A. Biere et al. in checking linear temporal logic (LTL) formulae and then also adapted to check formulae of the universal fragment of computation tree logic (ACTL) by W. Penczek et al. As the efficiency of model checking is still an important issue, we present an improved BMC approach for ACTL based on Penczek's method. We consider two aspects of the approach. One is reduction of the number of variables and transitions in the k-model by distinguishing the temporal operator EX from the others. The other is simplification of the transformation of formulae by using uniform path encoding instead of a disjunction of all paths needed in the k-model. With these improvements, for an ACTI, formula, the length of the final encoding of the formula in the worst case is reduced. The improved approach is implemented in the tool BMV and is compared with the original one by applying both to two well known examples, mutual exclusion and dining philosophers. The comparison shows the advantages of the improved approach with respect to the efficiency of model checking.

  13. Assessment of diagnostic methods for determining degradation of check valves

    International Nuclear Information System (INIS)

    The Oak Ridge National Laboratory (ORNL) has carried out a comprehensive aging assessment of check valves in support of the Nuclear Plant Aging Research (NPAR) program. This paper provides a summary of the ORNL check valve aging assessment with emphasis on the identification, evaluation, and application of check valve monitoring methods and techniques. Several check valve monitoring methods are described and compared. These methods include: acoustic emission monitoring, ultrasonic inspection, magnetic flux signature analysis (MFSA), external magnetics. These diagnostic technologies were shown to be useful in determining check valve condition (e.g., disc position, disc motion, and seat leakage), although none of the methods was by itself, successful in monitoring all three condition indicators. The combination of acoustic emission with either ultrasonics or one of the magnetic technologies, however, yields a monitoring system that succeeds in providing the sensitivity to detect all major check valve operating conditions. Other areas covered in the paper include descriptions of relevant regulatory issues, utility group activities, and interactions ORNL has had with outside organizations for the purpose of disseminating research results

  14. Checking dwelling performance for Aging-in-Place.

    Science.gov (United States)

    van der Vlies, Remy D; Nauta, Joram; Smit-Rietveld, Charlotte

    2015-01-01

    About 90% of persons aged 55 and older would prefer to stay in their current residences as long as possible because older adults value their independence. However, aging-in-place is not always a choice. Recently, the Dutch government tightened the criteria for older adults to be admitted in a nursing home. Throughout the past 5 years TNO was requested by the trade association for building service contractors in the Netherlands to develop a number of tools for building service professionals. The 'dwelling check' was developed as a 'basic' check on the possibility for aging-in-place. A pilot study was conducted to assess the added value of the dwelling check for older adults. During this pilot study the occupants of over 200 dwellings were interviewed by 11 building services contractors using the dwelling check. Based on these interviews a personal advice was written. After which the interviewees were asked to evaluate this service, comprising the interview and written advice. The dwelling check contributed most to the awareness of and interest in possible alterations for aging-in-place. In a few cases the decision (17%) or even action (5%) was taken to make alterations. Overall the dwelling check was rated 8 out of 10 by the interviewees and may therefore be considered of added value. PMID:26294608

  15. Gender Differences in the Prevalence of Metabolic Syndrome and Its Components among Adults with Disabilities Based on a Community Health Check Up Data

    Science.gov (United States)

    Lin, Jin-Ding; Lin, Lan-Ping; Liou, Shih-Wen; Chen, Yu-Chung; Hsu, Shang-Wei; Liu, Chien-Ting

    2013-01-01

    Metabolic syndrome is highly prevalent in society gradually and has important implications for public health in recent years. The present study aims to examine the gender effect on the prevalence of metabolic syndrome among adults with disabilities. A cross-sectional study was conduct to analyze annual health check-up chart of 419 people with…

  16. Action plans for motor-operated valves and check valves

    International Nuclear Information System (INIS)

    The proper performance of motor-operated valves (MOVs) and check valves is necessary for the safety operation of a nuclear power plant. Problems have been experienced, however, with these valves for many years. Currently, the US Nuclear Regulatory Commission (NRC) and the nuclear industry have a number of activities under way to provide assurance that MOVs and check valves will successfully perform their safety functions when needed. The Mechanical Engineering Branch (EMEB) of the NRC Office of Nuclear Reactor Regulation has been assigned the responsibility of coordinating NRC activities and monitoring industry activities regarding MOVs and check valves. To meet this responsibility, EMEB has prepared action plans to provide assurance of the proper performance of these valves. Among the staff activities described in the action plans is the consideration of the need to revise the regulations to clarify the inservice testing (IST) requirements for these valves. The need for regulatory guidance for the development of acceptable IST programs, as well as for other licensee activities relating to the performance of MOVs and check valves, will also be evaluated. In addition, NRC personnel will have to verify, in a consistent manner, implementation of licensee commitments in response to NRC generic letters and bulletins. Another important aspect of the action plans is the provision for the NRC staff to provide assistance, where appropriate, to the industry in its efforts to address MOV and check valve issues. Finally, the action plans include a tentative schedule for accomplishing the described staff activities

  17. Independent checks of linear accelerators equipped with multileaf collimators

    International Nuclear Information System (INIS)

    National Radiation Protection Institute (NRPI) provides independent checks of therapeutic equipment as a part of state supervision. In the end of 2003, the audit was broaden for linear accelerators equipped with multileaf collimators (MLC). NRPI provides TLD postal audits and on-site independent checks. This contribution describes tests for multileaf collimators and intensity modulated radiation therapy (IMRT) technique that are accomplished within the independent on-site check of linear accelerators. The character and type of tests that are necessary to pursue for multileaf collimator depends on application technique. There are three basic application of the MLC. The first we call 'static MLC' and it serves for replacing conventional blocking or for adjusting the field shape to match the beam's-eye view projection of a planning target volume during an arc rotation of the x-ray beam. This procedure is called conformal radiotherapy. The most advanced technique with MLC is intensity modulated radiation therapy. The dose can be delivered to the patient with IMRT in various different ways: dynamic MLC, segmented MLC and IMRT arc therapy. Independent audits represent an important instrument of quality assurance. Methodology for independent check of static MLC was successfully verified on two types of accelerators: Varian and Elekta. Results from pilot measurements with dynamic MLC imply that the methodology is applicable for Varian accelerators. In the future, the experience with other types of linear accelerators will contribute to renovation, modification, and broaden independent checks methodology. (authors)

  18. Helical tomotherapy quality assurance with ArcCHECK

    International Nuclear Information System (INIS)

    To design a quality assurance (QA) procedure for helical tomotherapy that measures multiple beam parameters with 1 delivery and uses a rotating gantry to simulate treatment conditions. The customized QA procedure was preprogrammed on the tomotherapy operator station. The dosimetry measurements were performed using an ArcCHECK diode array and an A1SL ion chamber inserted in the central holder. The ArcCHECK was positioned 10 cm above the isocenter so that the 21-cm diameter detector array could measure the 40-cm wide tomotherapy beam. During the implementation of the new QA procedure, separate comparative measurements were made using ion chambers in both liquid and solid water, the tomotherapy onboard detector array, and a MapCHECK diode array for a period of 10 weeks. There was good agreement (within 1.3%) for the beam output and cone ratio obtained with the new procedure and the routine QA measurements. The measured beam energy was comparable (0.3%) to solid water measurement during the 10-week evaluation period, excluding 2 of the 10 measurements with unusually high background. The symmetry reading was similarly compromised for those 2 weeks, and on the other weeks, it deviated from the solid water reading by ∼2.5%. The ArcCHECK phantom presents a suitable alternative for performing helical tomotherapy QA, provided the background is collected properly. The proposed weekly procedure using ArcCHECK and water phantom makes the QA process more efficient

  19. Intelligent Data Visualization for Cross-Checking Spacecraft System Diagnosis

    Science.gov (United States)

    Ong, James C.; Remolina, Emilio; Breeden, David; Stroozas, Brett A.; Mohammed, John L.

    2012-01-01

    Any reasoning system is fallible, so crew members and flight controllers must be able to cross-check automated diagnoses of spacecraft or habitat problems by considering alternate diagnoses and analyzing related evidence. Cross-checking improves diagnostic accuracy because people can apply information processing heuristics, pattern recognition techniques, and reasoning methods that the automated diagnostic system may not possess. Over time, cross-checking also enables crew members to become comfortable with how the diagnostic reasoning system performs, so the system can earn the crew s trust. We developed intelligent data visualization software that helps users cross-check automated diagnoses of system faults more effectively. The user interface displays scrollable arrays of timelines and time-series graphs, which are tightly integrated with an interactive, color-coded system schematic to show important spatial-temporal data patterns. Signal processing and rule-based diagnostic reasoning automatically identify alternate hypotheses and data patterns that support or rebut the original and alternate diagnoses. A color-coded matrix display summarizes the supporting or rebutting evidence for each diagnosis, and a drill-down capability enables crew members to quickly view graphs and timelines of the underlying data. This system demonstrates that modest amounts of diagnostic reasoning, combined with interactive, information-dense data visualizations, can accelerate system diagnosis and cross-checking.

  20. COMMON AGRICULTURAL POLICY FROM HEALTH CHECK DECISIONS TO THE POST-2013 REFORM

    Directory of Open Access Journals (Sweden)

    Niculescu Oana Marilena

    2011-07-01

    Full Text Available The paper proposed for being presented belongs to the field research International Affairs and European Integration. The paper entitled Common Agricultural Policy from Health Check decisions to the post-2013 reform aims to analyze the Common Agricultural Policy (CAP from the Health Check adoption in November 2008 to a new reform post-2013. The objectives of the paper are the presentation of the Health Check with its advantages and disadvantages as well as the analysis of the opportunity of a new European policy and its reforming having in view that the analysis of Health Check condition was considered a compromise. The paper is related to the internal and international research consisting in several books, studies, documents that analyze the particularities of the most debated, controversial and reformed EU policy. A personal study is represented by the first report within the PhD paper called The reform of CAP and its implications for Romanias agriculture(coordinator prof. Gheorghe Hurduzeu PhD, Academy of Economic Studies Bucharest, Faculty of International Business, research studies in the period 2009-2012. The research methodology used consists in collecting and analysis data from national and international publications, their validation, followed by a dissemination of the results in order to express a personal opinion regarding CAP and its reform. The results of the research consist in proving the opportunity of a new reform due to the fact that Health Check belongs already to the past. The paper belongs to the field research mentioned, in the attempt to prove the opportunity of building a new EU agricultural policy. The challenges CAP is facing are: food safety, environmental and climate changes, territorial balance as well as new challenges-improving sustainable management of natural resources, maintaining competitiveness in the context of globalization growth, strengthening EU cohesion in rural areas, increasing the support of CAP for

  1. The use of check valve performance data to support new concepts (probabilistic risk assessment, condition monitoring) for check valve program

    Energy Technology Data Exchange (ETDEWEB)

    Hart, K.A.; Gower, D.

    1996-12-01

    The concept of developing an integrated check valve database based on the Nuclear Power Reliability Data System (NPRDS) data was presented at the last Symposium. The Nuclear Industry Check Valve Group (NIC), working in cooperation with the Oak Ridge National Laboratory (ORNL), has completed an operational database of check valve performance from 1984 to the present. NIC has committed to the nuclear industry to periodically update the data and maintain this information accessible. As the new concepts of probabilistic risk analysis and condition monitoring are integrated into the American Society of Mechanical Engineers (ASME) Code, a critical element will be performance data. From check valve performance data, feasible failure modes and rates can be established. When a failure rate or frequency of failures can be established based on a significant enough population (sampling), a more solid foundation for focusing resources and determining appropriate frequencies and testing can be determined. The presentation will give the updated status of the NIC Check Valve Performance Database covering (1) methodology used to combine the original ORNL data; (2) process/controls established for continuing update and refinement of the data; (3) discussion of how this data is being utilized by (a) OM-22 for condition monitoring, and (b) risk-based inservice testing work of Westinghouse Owners` Group; and (4) results/trends of data evaluations. At the 1994 Symposium, ORNL provided an update as of 1991 to their original work of 1984 -1990 which they had performed to characterize check valve degradations and failures in the nuclear industry. These characterizations will be updated to 1995 and additional reviews provided to give insight into the current condition and trends of check valve performance.

  2. 78 FR 26656 - Agency Information Collection Activities; Proposed Collection; Comments Requested: Police Check...

    Science.gov (United States)

    2013-05-07

    ... Collection; Comments Requested: Police Check Inquiry and Pre-Screening Qualifications Certification ACTION... existing collection of information. (2) Title of the Form/Collection: Police Check Inquiry and...

  3. Field trials of the Baby Check score card in hospital.

    Science.gov (United States)

    Thornton, A J; Morley, C J; Cole, T J; Green, S J; Walker, K A; Rennie, J M

    1991-01-01

    The Baby Check score card was used by junior paediatric doctors to assess 262 babies under 6 months old presenting to hospital. The duty registrar and two consultants independently graded the severity of each baby's illness without knowledge of the Baby Check score. The registrars assessed the babies at presentation while the consultants reviewed the notes. The consultants and registrars agreed about the need for hospital admission only about 75% of the time. The score's sensitivity and predictive values were similar to those of the registrars' grading. The score's specificity was 87%. Babies with serious diagnosis scored high, while minor illnesses scored low. The predictive value for requiring hospital admission increased with the score, rising to 100% for scores of 20 or more. The appropriate use of Baby Check should improve the detection of serious illness. It could also reduce the number of babies admitted with minor illness, without putting them at increased risk.

  4. A Spatialization-based Method for Checking and Updating Metadata

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In this paper the application of spatialization technology on metadata quality check and updating was discussed. A new method based on spatialization was proposed for checking and updating metadata to overcome the deficiency of text based methods with the powerful functions of spatial query and analysis provided by GIS software. This method employs the technology of spatialization to transform metadata into a coordinate space and the functions of spatial analysis in GIS to check and update spatial metadata in a visual environment. The basic principle and technical flow of this method were explained in detail, and an example of implementation using ArcMap of GIS software was illustrated with a metadata set of digital raster maps. The result shows the new method with the support of interaction of graph and text is much more intuitive and convenient than the ordinary text based method, and can fully utilize the functions of GIS spatial query and analysis with more accuracy and efficiency.

  5. A Metric Encoding for Bounded Model Checking (extended version)

    CERN Document Server

    Pradella, Matteo; Pietro, Pierluigi San

    2009-01-01

    In Bounded Model Checking both the system model and the checked property are translated into a Boolean formula to be analyzed by a SAT-solver. We introduce a new encoding technique which is particularly optimized for managing quantitative future and past metric temporal operators, typically found in properties of hard real time systems. The encoding is simple and intuitive in principle, but it is made more complex by the presence, typical of the Bounded Model Checking technique, of backward and forward loops used to represent an ultimately periodic infinite domain by a finite structure. We report and comment on the new encoding technique and on an extensive set of experiments carried out to assess its feasibility and effectiveness.

  6. Effects of monetary reward and punishment on information checking behaviour.

    Science.gov (United States)

    Li, Simon Y W; Cox, Anna L; Or, Calvin; Blandford, Ann

    2016-03-01

    Two experiments were conducted to examine whether checking one's own work can be motivated by monetary reward and punishment. Participants were randomly assigned to one of three conditions: a flat-rate payment for completing the task (Control); payment increased for error-free performance (Reward); payment decreased for error performance (Punishment). Experiment 1 (N = 90) was conducted with liberal arts students, using a general data-entry task. Experiment 2 (N = 90) replicated Experiment 1 with clinical students and a safety-critical 'cover story' for the task. In both studies, Reward and Punishment resulted in significantly fewer errors, more frequent and longer checking, than Control. No such differences were obtained between the Reward and Punishment conditions. It is concluded that error consequences in terms of monetary reward and punishment can result in more accurate task performance and more rigorous checking behaviour than errors without consequences. However, whether punishment is more effective than reward, or vice versa, remains inconclusive. PMID:26549151

  7. Statistical Model Checking of Rich Models and Properties

    DEFF Research Database (Denmark)

    Poulsen, Danny Bøgsted

    Software is in increasing fashion embedded within safety- and business critical processes of society. Errors in these embedded systems can lead to human casualties or severe monetary loss. Model checking technology has proven formal methods capable of finding and correcting errors in software...... motivates why existing model checking technology should be supplemented by new techniques. It also contains a brief introduction to probability theory and concepts covered by the six papers making up the second part. The first two papers are concerned with developing online monitoring techniques....... However, software is approaching the boundary in terms of the complexity and size that model checking can handle. Furthermore, software systems are nowadays more frequently interacting with their environment hence accurately modelling such systems requires modelling the environment as well - resulting...

  8. Effects of monetary reward and punishment on information checking behaviour.

    Science.gov (United States)

    Li, Simon Y W; Cox, Anna L; Or, Calvin; Blandford, Ann

    2016-03-01

    Two experiments were conducted to examine whether checking one's own work can be motivated by monetary reward and punishment. Participants were randomly assigned to one of three conditions: a flat-rate payment for completing the task (Control); payment increased for error-free performance (Reward); payment decreased for error performance (Punishment). Experiment 1 (N = 90) was conducted with liberal arts students, using a general data-entry task. Experiment 2 (N = 90) replicated Experiment 1 with clinical students and a safety-critical 'cover story' for the task. In both studies, Reward and Punishment resulted in significantly fewer errors, more frequent and longer checking, than Control. No such differences were obtained between the Reward and Punishment conditions. It is concluded that error consequences in terms of monetary reward and punishment can result in more accurate task performance and more rigorous checking behaviour than errors without consequences. However, whether punishment is more effective than reward, or vice versa, remains inconclusive.

  9. Model Checking-Based Testing of Web Applications

    Institute of Scientific and Technical Information of China (English)

    ZENG Hongwei; MIAO Huaikou

    2007-01-01

    A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagram as the object model is employed to describe the object structure of a Web application design and can be translated into the behavior model. A key problem of model checking-based test generation for a Web application is how to construct a set of trap properties that intend to cause the violations of model checking against the behavior model and output of counterexamples used to construct the test sequences.We give an algorithm that derives trap properties from the object model with respect to node and edge coverage criteria.

  10. MOM: A meteorological data checking expert system in CLIPS

    Science.gov (United States)

    Odonnell, Richard

    1990-01-01

    Meteorologists have long faced the problem of verifying the data they use. Experience shows that there is a sizable number of errors in the data reported by meteorological observers. This is unacceptable for computer forecast models, which depend on accurate data for accurate results. Most errors that occur in meteorological data are obvious to the meteorologist, but time constraints prevent hand-checking. For this reason, it is necessary to have a 'front end' to the computer model to ensure the accuracy of input. Various approaches to automatic data quality control have been developed by several groups. MOM is a rule-based system implemented in CLIPS and utilizing 'consistency checks' and 'range checks'. The system is generic in the sense that it knows some meteorological principles, regardless of specific station characteristics. Specific constraints kept as CLIPS facts in a separate file provide for system flexibility. Preliminary results show that the expert system has detected some inconsistencies not noticed by a local expert.

  11. The check and error analysis of the BRDF experiment bench

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    In this paper, a detailed introduction is given to the check method of the BRDF experiment bench which is built on our own. Measurement is made on the BRDF of the standard white plate made of polytetrafluoroethylene(PTFE) with reference to the existing standard white plate whose surface reflectance is known and by the method of theory approximate and relative comparison. On the basis of that, the BRDF value of the standard white plate in the wave band of 0. 6328 μm is given and the experiment bench is checked, the relative error of the experiment bench being within 20%.

  12. Using Model Checking to Validate AI Planner Domain Models

    Science.gov (United States)

    Penix, John; Pecheur, Charles; Havelund, Klaus

    1999-01-01

    This report describes an investigation into using model checking to assist validation of domain models for the HSTS planner. The planner models are specified using a qualitative temporal interval logic with quantitative duration constraints. We conducted several experiments to translate the domain modeling language into the SMV, Spin and Murphi model checkers. This allowed a direct comparison of how the different systems would support specific types of validation tasks. The preliminary results indicate that model checking is useful for finding faults in models that may not be easily identified by generating test plans.

  13. Error Checking for Chinese Query by Mining Web Log

    Directory of Open Access Journals (Sweden)

    Jianyong Duan

    2015-01-01

    Full Text Available For the search engine, error-input query is a common phenomenon. This paper uses web log as the training set for the query error checking. Through the n-gram language model that is trained by web log, the queries are analyzed and checked. Some features including query words and their number are introduced into the model. At the same time data smoothing algorithm is used to solve data sparseness problem. It will improve the overall accuracy of the n-gram model. The experimental results show that it is effective.

  14. Check Point推出NGX版本Connectra SSL VPN

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    6月7日,互联网安全解决方案供应商Check Point软件技术有限公司在美国宣布推出Connectra NGX,这是其SSL VPN解决方案的增强版本。Connectra NGX充分发挥了Check Point最近推出的NGX平台的全新连接功能,以及支持中央化安全监控及维护的SmartCenter。Connectra NGX有下列特点:

  15. Spell-checking in Spanish: the case of diacritic accents

    OpenAIRE

    Atserias Batalla, Jordi; Fuentes Fort, Maria; Nazar, Rogelio; Renau, Irene

    2012-01-01

    This article presents the problem of diacritic restoration (or diacritization) in the context of spell-checking, with the focus on an orthographically rich language such as Spanish. We argue that despite the large volume of work published on the topic of diacritization, currently available spell-checking tools have still not found a proper solution to the problem in those cases where both forms of a word are listed in the checker’s dictionary. This is the case, for instance, when a word form ...

  16. The Role of Personal Ethical Checking in Courageous School Leadership

    Science.gov (United States)

    Buskey, Frederick C.; Pitts, Eric M.

    2013-01-01

    When school leaders make calculated decisions to deviate from hierarchical or cultural directives and norms, they may be viewed as mavericks or brigands. This paper details a process of ethical checking to help differentiate ethical decisions from more arbitrary or self-serving decisions. The paper examines conflicts inherent in many professional…

  17. Check list of European hymenomycetous Heterobasidiae. Supplement and corrections

    NARCIS (Netherlands)

    Donk, M.A.

    1974-01-01

    This continuation of the “Check list of European hymenomycetous Heterobasidiae” (published in Persoonia 4: 145-335. 1966) contains supplementary matter as well as corrections. — Ypsilonidium (Donk) Donk is published as a new genus. Two new specific combinations are made with this generic name. — Mur

  18. 40 CFR 53.52 - Leak check test.

    Science.gov (United States)

    2010-07-01

    ..., NIST-traceable. (2) Flow rate measurement adaptor (40 CFR part 50, appendix L, figure L-30) or... valve of the adaptor to seal the flow system. Conduct the external leak check procedure as described in... MONITORING REFERENCE AND EQUIVALENT METHODS Procedures for Testing Physical (Design) and...

  19. Spanish Language Versions of the Depression Adjective Check Lists.

    Science.gov (United States)

    Lubin, Bernard; And Others

    1980-01-01

    The study aimed to develop an instrument that could be used for mental health research with Spanish-speaking populations. The Depression Adjective Check Lists (DACL) used to measure depressive mood was translated into Spanish and administered to 70 Hispanic subjects. Reliability determinations were high and close to those for the English version.…

  20. 40 CFR 91.319 - NOX converter check.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false NOX converter check. 91.319 Section 91...) CONTROL OF EMISSIONS FROM MARINE SPARK-IGNITION ENGINES Emission Test Equipment Provisions § 91.319 NOX... of the NO concentration). The NOX analyzer must be in the NO mode so that the span gas does not...

  1. 7 CFR 70.55 - Check grading officially identified product.

    Science.gov (United States)

    2010-01-01

    ... AND STANDARDS UNDER THE AGRICULTURAL MARKETING ACT OF 1946 AND THE EGG PRODUCTS INSPECTION ACT (CONTINUED) VOLUNTARY GRADING OF POULTRY PRODUCTS AND RABBIT PRODUCTS Grading of Poultry Products and Rabbit... identified poultry or rabbit products may be subject to final check grading prior to their shipment....

  2. 40 CFR 89.318 - Analyzer interference checks.

    Science.gov (United States)

    2010-07-01

    ...) Bubble a mixture of 3 percent CO2 in N2 through water at room temperature and record analyzer response... check. A CO2 span gas having a concentration of 80 percent to 100 percent of full scale of the maximum operating range used during testing shall be passed through the CO2 NDIR analyzer and the value recorded...

  3. 40 CFR 91.325 - Analyzer interference checks.

    Science.gov (United States)

    2010-07-01

    ... room temperature a CO2 span gas having a concentration of between 80 percent and 100 percent inclusive... expected concentrations experienced during testing. (1) NOX analyzer CO2 quench check. (i) Pass a CO2 span... used during testing through the CO2 NDIR analyzer and record the value as “a.” (ii) Dilute the CO2...

  4. Mandatory Identification Bar Checks: How Bouncers Are Doing Their Job

    Science.gov (United States)

    Monk-Turner, Elizabeth; Allen, John; Casten, John; Cowling, Catherine; Gray, Charles; Guhr, David; Hoofnagle, Kara; Huffman, Jessica; Mina, Moises; Moore, Brian

    2011-01-01

    The behavior of bouncers at on site establishments that served alcohol was observed. Our aim was to better understand how bouncers went about their job when the bar had a mandatory policy to check identification of all customers. Utilizing an ethnographic decision model, we found that bouncers were significantly more likely to card customers that…

  5. Surrogate headform accelerations associated with stick checks in girls' lacrosse.

    Science.gov (United States)

    Crisco, Joseph J; Costa, Laura; Rich, Ryan; Schwartz, Joel B; Wilcox, Bethany

    2015-04-01

    Girls' lacrosse is fundamentally a different sport than boys' lacrosse, and girls are not required to wear protective headgear. Recent epidemiological studies have found that stick checks are the leading cause of concussion injury in girls' lacrosse. The purpose of this study was to determine stick check speeds and estimate the head acceleration associated with direct checks to the head. In addition, we briefly examine if commercially available headgear can mitigate the accelerations. Seven (n = 7) experienced female lacrosse players checked, with varying severity, a NOSCAE and an ASTM headform. Stick speed at impact and the associated peak linear accelerations of the headform were recorded. The NOCSAE headform was fitted with four commercially available headgear and similar stick impact testing was performed. The median stick impact speed was 8.1 m/s and 777 deg/s. At these speeds, peak linear acceleration was approximately 60g. Three out of the four headgear significantly reduced the peak linear acceleration when compared with the bare headform. These data serve as baseline for understanding the potential mechanism and reduction of concussions from stick impacts in girls' lacrosse. PMID:25411762

  6. Checking the odd Goldbach conjecture up to 10(20)

    Science.gov (United States)

    Saouter, Y.

    1998-04-01

    Vinogradov's theorem states that any sufficiently large odd integer is the sum of three prime numbers. This theorem allows us to suppose the conjecture that this is true for all odd integers. In this paper, we describe the implementation of an algorithm which allowed us to-check this conjecture up to 10(20).

  7. Model checking: one can do much more than you think!

    NARCIS (Netherlands)

    Katoen, Joost-Pieter

    2012-01-01

    Model checking is an automated verification technique that actively is applied to find bugs in hardware and software designs. Companies like IBM and Cadence developed their in-house model checkers, and acted as driving forces behind the design of the IEEE-standardized temporal logic PSL. On the othe

  8. Two Types of Test Assembly Checked and Accepted for CEFR

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    The detail design of two types of test assembly used in the simulating transportation, and themounting and hydraulic test were completed in 2002. This two types of test assembly are manufactured inshanghai No.1 machine tool works, and checked and accepted in March 2003. The former is used in the

  9. Model checking conditional CSL for continuous-time Markov chains

    DEFF Research Database (Denmark)

    Gao, Yang; Xu, Ming; Zhan, Naijun;

    2013-01-01

    probabilistic operator. CCSL allows us to express a richer class of properties for CTMCs. Based on a parameterized product obtained from the CTMC and an automaton extracted from a given CCSL formula, we propose an approximate model checking algorithm and analyse its complexity....

  10. Homeland Security Initiatives and Background Checks in Higher Education

    Science.gov (United States)

    Hughes, Stephanie; Keller, Eileen Weisenbach; Hertz, Giles T.

    2010-01-01

    In recent years, colleges and universities have faced a new challenge. While there has been a movement underway on college campuses to increase the safety of a wide range of university constituents through criminal background checks (CBCs), in most cases this movement has failed to include CBCs of foreign faculty and student populations. The…

  11. 17 CFR 230.419 - Offerings by blank check companies.

    Science.gov (United States)

    2010-04-01

    ... plan is to engage in a merger or acquisition with an unidentified company or companies, or other entity... companies. 230.419 Section 230.419 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... check companies. (a) Scope of the rule and definitions. (1) The provisions of this section shall...

  12. Surrogate headform accelerations associated with stick checks in girls' lacrosse.

    Science.gov (United States)

    Crisco, Joseph J; Costa, Laura; Rich, Ryan; Schwartz, Joel B; Wilcox, Bethany

    2015-04-01

    Girls' lacrosse is fundamentally a different sport than boys' lacrosse, and girls are not required to wear protective headgear. Recent epidemiological studies have found that stick checks are the leading cause of concussion injury in girls' lacrosse. The purpose of this study was to determine stick check speeds and estimate the head acceleration associated with direct checks to the head. In addition, we briefly examine if commercially available headgear can mitigate the accelerations. Seven (n = 7) experienced female lacrosse players checked, with varying severity, a NOSCAE and an ASTM headform. Stick speed at impact and the associated peak linear accelerations of the headform were recorded. The NOCSAE headform was fitted with four commercially available headgear and similar stick impact testing was performed. The median stick impact speed was 8.1 m/s and 777 deg/s. At these speeds, peak linear acceleration was approximately 60g. Three out of the four headgear significantly reduced the peak linear acceleration when compared with the bare headform. These data serve as baseline for understanding the potential mechanism and reduction of concussions from stick impacts in girls' lacrosse.

  13. Applied Bounded Model Checking for Interlocking System Designs

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, Jan; Pinger, Ralf

    2013-01-01

    of behavioural (operational) semantics. The former checks that the plant model – that is, the software components reflecting the physical components of the interlocking system – has been set up in an adequate way. The latter investigates trains moving through the network, with the objective to uncover potential...

  14. Applied Bounded Model Checking for Interlocking System Designs

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, Jan; Pinger, Ralf

    2014-01-01

    of behavioural (operational) semantics. The former checks that the plant model – that is, the software components reflecting the physical components of the interlocking system – has been set up in an adequate way. The latter investigates trains moving through the network, with the objective to uncover potential...

  15. Model Checking Timed Automata with Priorities using DBM Subtraction

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Pettersson, Paul;

    2006-01-01

    In this paper we describe an extension of timed automata with priorities, and efficient algorithms to compute subtraction on DBMs (difference bounded matrices), needed in symbolic model-checking of timed automata with priorities. The subtraction is one of the few operations on DBMs that result in...

  16. Optimisation of BPMN Business Models via Model Checking

    DEFF Research Database (Denmark)

    Herbert, Luke Thomas; Sharp, Robin

    2013-01-01

    We present a framework for the optimisation of business processes modelled in the business process modelling language BPMN, which builds upon earlier work, where we developed a model checking based method for the analysis of BPMN models. We define a structure for expressing optimisation goals...

  17. Towards Model Checking a Spi-Calculus Dialect

    NARCIS (Netherlands)

    Gnesi, S.; Latella, D.; Lenzini, G.

    2002-01-01

    We present a model checking framework for a spi-calculus dialect which uses a linear time temporal logic for expressing security properties. We have provided our spi-calculus dialect, called SPID, with a semantics based on labeled transition systems (LTS), where the intruder is modeled in the Dolev-

  18. 31 CFR 240.14 - Checks issued to incompetent payees.

    Science.gov (United States)

    2010-07-01

    ...) FISCAL SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE INDORSEMENT AND PAYMENT OF CHECKS... without submission of documentary proof of the authority of the guardian or other fiduciary, with the... the certifying agency with information as to the incompetence of the payee and documentary...

  19. Level of agency in sub-clinical checking.

    Science.gov (United States)

    Belayachi, S; Van der Linden, M

    2009-03-01

    This study examined cognitive representations of routine action, through the assessment of level of agency, in individuals with sub-clinical checking. The level of agency stems from Action Identification Theory [Vallacher, R. R., Wegner, D. M. (1989). Levels of personal agency: Individual variation in action identification. Journal of Personality and Social Psychology 57, 660-671], which states that how actions are usually identified (based on instrumental aspects or purpose) reflects the predominant accessibility of internal representation (movements executed vs. goal pursued). Furthermore, this framework proposed that altered action regulation is related to low-level of agency (i.e., action identification at an instrumental level). In the current study, the main result indicated that checking symptoms were related to a low-level of agency, that is, individuals with sub-clinical checking identified habitual actions on the basis of instrumental aspects. This seems to indicate that checkers may act with a lack of goal representations. The results are discussed in terms of the role of low-level of agency in checking phenomena and related cognitive dysfunction.

  20. Generation of serine/threonine check points in HN(C)N spectra

    Indian Academy of Sciences (India)

    Dinesh Kumar; Jeetender Chugh; Ramakrishna V Hosur

    2009-11-01

    We describe here a simple modification of the HN(C)N experiment for the generation of serine/threonine check points in the three-dimensional experiment. The various `triplet of residue’ specific peak patterns in the spectra are documented for ease of analysis and sequential backbone resonance assignment. The performance of this experiment, referred to as HN(C)N-ST, is demonstrated using two proteins, one properly folded and the other completely denatured. It is noteworthy that, even in the denatured protein, where spectral dispersions are rather poor, about 90% of the sequential connectivities through the chain could be established from this single experiment. This would have great implications for structural genomics efforts.

  1. Checks and balances on cholinergic signaling in brain and body function.

    Science.gov (United States)

    Soreq, Hermona

    2015-07-01

    A century after the discovery of acetylcholine (ACh), we recognize both ACh receptors, transporters, and synthesizing and degrading enzymes and regulators of their expression as contributors to cognition, metabolism, and immunity. Recent discoveries indicate that pre- and post-transcriptional ACh signaling controllers coordinate the identity, functioning, dynamics, and brain-to-body communication of cholinergic cells. Checks and balances including epigenetic mechanisms, alternative splicing, and miRNAs may all expand or limit the diversity of these cholinergic components by consistently performing genome-related surveillance. This regulatory network enables homeostatic maintenance of brain-to-body ACh signaling as well as reactions to nicotine, Alzheimer's disease anticholinesterase therapeutics, and agricultural pesticides. Here I review recent reports on the functional implications of these controllers of cholinergic signaling in and out of the brain. PMID:26100140

  2. 47 CFR 80.293 - Check bearings by authorized ship personnel.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Check bearings by authorized ship personnel. 80... Check bearings by authorized ship personnel. The requirement for calibration by check bearings is met if: (a) The required verification by check bearings are made not more than 90 days prior to the date...

  3. Check dams effects on sediment transport in steep slope flume

    Science.gov (United States)

    Piton, Guillaume; Recking, Alain

    2014-05-01

    Depending on many influences (geology, relief, hydrology, land use, etc.) some mountainous watershed are prone to cause casualties and facilities damages. Large amounts of sediments episodically released by torrents are often the biggest problem in torrent related hazard mitigation. Series of transversal structures as check dams and ground sills are often used in the panel of risk mitigation technics. A large literature exits on check dams and it mainly concerns engineering design, e.g. toe scouring, stability stress diagram, changes in upper and lower reaches equilibrium slopes. Check dams in steep slope rivers constitute fixed points in the bed profile and prevent general bed incision. However their influence on sediment transport once they are filled is not yet clear. Two flume test campaigns, synthetize in Table 1, were performed to investigate this question: Table 1 : experiment plan Run (duration) Ref1 (50h)CD1a (30h)CD1b (30h)Ref2 (92h)CD2 (18h) Solid feeding discharge (g.s^-1) 44 44 44 60 60 Number of check dams none 1 3 none 2 A nearly 5-m-long, 10-cm-wide and 12%-steep flume was used. The water discharge was set to 0,55 l/s in all runs. A mixture of poorly sorted natural sediments with diameters between 0.8 and 40 mm was used. An open solid-discharge-feeding circuit kept the inlet sediment flux constant during all experiments. As both feeding rates did not present variation, changes in outlet solid discharge were assumed to be due to bed variations in the bed storage. We observed strong fluctuations of solid flux and slope in each reaches of all runs between: (i) steep aggradating armoured bed and (ii) less steep and finer bed releasing bedload sheets during erosion events and inducing bedload pulses. All experiments showed consistent results: transported volume associated with erosion event decreased with the length between two subsequent check dams. Solid transversal structures shorten the upstream erosion-propagation and avoid downstream change in the

  4. Model Checking Real-Time Value-Passing Systems

    Institute of Scientific and Technical Information of China (English)

    Jing Chen; Zio-Ning Cao

    2004-01-01

    In this paper,to model check real-time value-passing systems,a formal language Timed Symbolic Transition Graph and a logic system named Timed Predicate μ-Calculus are proposed.An algorithm is presented which is local in that it generates and investigates the reachable state space in top-down fashion and maintains the partition for time evaluations as coarse as possible while on-the-fly instantiating data variables.It can deal with not only data variables with finite value domain,but also the so called data independent variables with infinite value domain.To authors knowledge,this is the first algorithm for model checking timed systems containing value-passing features.

  5. Detecting feature interactions in Web services with model checking techniques

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    As a platform-independent software system, a Web service is designed to offer interoperability among diverse and heterogeneous applications.With the introduction of service composition in the Web service creation, various message interactions among the atomic services result in a problem resembling the feature interaction problem in the telecommunication area.This article defines the problem as feature interaction in Web services and proposes a model checking-based detection method.In the method, the Web service description is translated to the Promela language - the input language of the model checker simple promela interpreter (SPIN), and the specific properties, expressed as linear temporal logic (LTL) formulas, are formulated according to our classification of feature interaction.Then, SPIN is used to check these specific properties to detect the feature interaction in Web services.

  6. Mixed Portmanteau Test for Diagnostic Checking of Time Series Models

    Directory of Open Access Journals (Sweden)

    Sohail Chand

    2014-01-01

    Full Text Available Model criticism is an important stage of model building and thus goodness of fit tests provides a set of tools for diagnostic checking of the fitted model. Several tests are suggested in literature for diagnostic checking. These tests use autocorrelation or partial autocorrelation in the residuals to criticize the adequacy of fitted model. The main idea underlying these portmanteau tests is to identify if there is any dependence structure which is yet unexplained by the fitted model. In this paper, we suggest mixed portmanteau tests based on autocorrelation and partial autocorrelation functions of the residuals. We derived the asymptotic distribution of the mixture test and studied its size and power using Monte Carlo simulations.

  7. A Succinct Approach to Static Analysis and Model Checking

    DEFF Research Database (Denmark)

    Filipiuk, Piotr

    In a number of areas software correctness is crucial, therefore it is often desirable to formally verify the presence of various properties or the absence of errors. This thesis presents a framework for concisely expressing static analysis and model checking problems. The framework facilitates...... in the classical formulation of ALFP logic. Finally, we show that the logics and the associated solvers can be used for rapid prototyping. We illustrate that by a variety of case studies from static analysis and model checking....... that guarantees that there always is single best solution for a problem under consideration. We also develop a solving algorithm, based on a dierential worklist, that computes the least solution guaranteed by the Moore Family result. Furthermore, we present a logic for specifying analysis problems called Layered...

  8. L2C2: Logic-based LSC Consistency Checking

    CERN Document Server

    Guo, Hai-Feng; Subramaniam, Mahadevan

    2010-01-01

    Live sequence charts (LSCs) have been proposed as an inter-object scenario-based specification and visual programming language for reactive systems. In this paper, we introduce a logic-based framework to check the consistency of an LSC specification. An LSC simulator has been implemented in logic programming, utilizing a memoized depth-first search strategy, to show how a reactive system in LSCs would response to a set of external event sequences. A formal notation is defined to specify external event sequences, extending the regular expression with a parallel operator and a testing control. The parallel operator allows interleaved parallel external events to be tested in LSCs simultaneously; while the testing control provides users to a new approach to specify and test certain temporal properties (e.g., CTL formula) in a form of LSC. Our framework further provides either a state transition graph or a failure trace to justify the consistency checking results.

  9. Analysis of DIRAC's behavior using model checking with process algebra

    CERN Document Server

    Remenska, Daniela; Willemse, Tim; Bal, Henri; Verstoep, Kees; Fokkink, Wan; Charpentier, Philippe; Diaz, Ricardo Graciani; Lanciotti, Elisa; Roiser, Stefan; Ciba, Krzysztof

    2012-01-01

    DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple, the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike con...

  10. Non-trivial checks of novel consistency relations

    Energy Technology Data Exchange (ETDEWEB)

    Berezhiani, Lasha; Khoury, Justin [Center for Particle Cosmology, Department of Physics and Astronomy, University of Pennsylvania, Philadelphia, PA 19104 (United States); Wang, Junpu, E-mail: lashaber@gmail.com, E-mail: jkhoury@sas.upenn.edu, E-mail: jwang217@jhu.edu [Department of Physics and Astronomy, Johns Hopkins University, Baltimore, MD 21218 (United States)

    2014-06-01

    Single-field perturbations satisfy an infinite number of consistency relations constraining the squeezed limit of correlation functions at each order in the soft momentum. These can be understood as Ward identities for an infinite set of residual global symmetries, or equivalently as Slavnov-Taylor identities for spatial diffeomorphisms. In this paper, we perform a number of novel, non-trivial checks of the identities in the context of single field inflationary models with arbitrary sound speed. We focus for concreteness on identities involving 3-point functions with a soft external mode, and consider all possible scalar and tensor combinations for the hard-momentum modes. In all these cases, we check the consistency relations up to and including cubic order in the soft momentum. For this purpose, we compute for the first time the 3-point functions involving 2 scalars and 1 tensor, as well as 2 tensors and 1 scalar, for arbitrary sound speed.

  11. Non-Trivial Checks of Novel Consistency Relations

    CERN Document Server

    Berezhiani, Lasha; Wang, Junpu

    2014-01-01

    Single-field perturbations satisfy an infinite number of consistency relations constraining the squeezed limit of correlation functions at each order in the soft momentum. These can be understood as Ward identities for an infinite set of residual global symmetries, or equivalently as Slavnov-Taylor identities for spatial diffeomorphisms. In this paper, we perform a number of novel, non-trivial checks of the identities in the context of slow-roll single field inflationary models with arbitrary sound speed. We focus for concreteness on identities involving 3-point functions with a soft external mode, and consider all possible scalar and tensor combinations for the hard-momentum modes. In all these cases, we check the consistency relations up to and including cubic order in the soft momentum. For this purpose, we compute for the first time the 3-point functions involving 2 scalars and 1 tensor, as well as 2 tensors and 1 scalar, for arbitrary sound speed.

  12. HDL Implementation of Low Density Parity Check (LDPC Decoder

    Directory of Open Access Journals (Sweden)

    Pawandip Kaur

    2012-03-01

    Full Text Available Low-Density Parity-Check (LDPC codes are one of the most promising error-correcting codes approaching Shannon capacity and have been adopted in many applications. These codes offer huge advantages in terms of coding gain, throughput and power dissipation. Error correction algorithms are often implemented in hardware for fast processing to meet the real-time needs of communication systems. However hardwareimplementation of LDPC decoders using traditional Hardware Description Language (HDL based approach is a complex and time consuming task. In this paper HDL Implementation of Low Density Parity Check Decoder architecture is presented with different rates i.e. 1/2, 2/3, 3/4, 4/7, 8/9, 9/10 and variable data lengths i.e. 8, 16, 32, 64, 128, 256 bits and consequent changeable precision factor.

  13. Asymptomatic brain tumor detected at brain check-up

    Energy Technology Data Exchange (ETDEWEB)

    Onizuka, Masanari; Suyama, Kazuhiko; Shibayama, Akira; Hiura, Tsuyoshi; Horie, Nobutaka; Miyazaki, Hisaya [Sankoukai Miyazaki Hospital, Isahaya, Nagasaki (Japan)

    2001-09-01

    Brain check-up was performed in 4000 healthy subjects who underwent medical and radiological examinations for possible brain diseases in our hospital from April 1996 to March 2000. Magnetic resonance imaging revealed 11 brain tumors which consisted of six meningiomas, three pituitary adenomas, one astrocytoma, and one epidermoid cyst. The detection rate of incidental brain tumor in our hospital was 0.3%. Nine patients underwent surgery, with one case of morbidity due to postoperative transient oculomotor nerve paresis. The widespread use of brain check-up may increasingly detect asymptomatic brain tumors. Surgical indications for such lesions remain unclear, and the strategy for treatment should be determined with consideration of the patient's wishes. (author)

  14. SMT-based Bounded Model Checking with Difference Logic Constraints

    CERN Document Server

    Bersani, Marcello M; Morzenti, Angelo; Pradella, Matteo; Rossi, Matteo; Pietro, Pierluigi San

    2010-01-01

    Traditional Bounded Model Checking (BMC) is based on translating the model checking problem into SAT, the Boolean satisfiability problem. This paper introduces an encoding of Linear Temporal Logic with Past operators (PLTL) into the Quantifier-Free Difference Logic with Uninterpreted Functions (QF-UFIDL). The resulting encoding is a simpler and more concise version of existing SATbased encodings, currently used in BMC. In addition, we present an extension of PLTL augmented with arithmetic relations over integers, which can express unbounded counters; as such, the extended logic is more expressive than PLTL. We introduce suitable restrictions and assumptions that are shown to make the verification problem for the extended logic decidable, and we define an encoding of the new logic into QF-UFIDL. Finally, a performance comparison with the SAT-based approach on purely PLTL examples shows significant improvements in terms of both execution time and memory occupation.

  15. Immune Check Point Inhibitors Combination in Melanoma: Worth the Toxicity?

    Science.gov (United States)

    Orloff, Marlana; Weight, Ryan; Valsecchi, Matias E; Sato, Takami

    2016-01-01

    The combination of immune checkpoint inhibitors ipilimumab and nivolumab has been recently been FDA approved for first line treatment of unresectable and metastatic BRAF wild type melanoma. The approval came following the impressive results of the CheckMate 067, where the combination of ipilimumab and nivolumab appeared to outperform each as a single agent in regards to response rate and progression free survival. Though we await final overall survival data, the combination will likely be adapted by many oncologists and integrated into the ever changing melanoma treatment algorithm. In this article we aim to summarize the data leading up to the recent FDA approval and publication by Larkin et al. that presents the results from the CheckMate 067 trial. We will also further explore the feasibility, challenges, and applicability of combination immune checkpoint inhibitor therapy. PMID:27028970

  16. Checking for Optimal Solutions in Some NP-Complete Problems

    Science.gov (United States)

    Bauer, Michel; Orland, Henri

    2005-09-01

    For some weighted NP-complete problems, checking whether a proposed solution is optimal is a nontrivial task. Such is the case for the traveling salesman problem, or the spin-glass problem in three dimensions. In this Letter, we consider the weighted tripartite matching problem, a well known NP-complete problem. We write mean-field finite temperature equations for this model and derive their zero temperature limit. We show that any solution of the zero temperature equations provides an exact absolute ground state of the system. As a consequence, we propose a criterion which can be checked in polynomial time, and such that given a putative optimal solution, if the criterion is satisfied, then the solution is indeed optimal. This criterion is generalized to a class of variants of the multiple traveling salesmen problems.

  17. Schedulability of Herschel revisited using statistical model checking

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel;

    2015-01-01

    Schedulability analysis is a main concern for several embedded applications due to their safety-critical nature. The classical method of response time analysis provides an efficient technique used in industrial practice. However, the method is based on conservative assumptions related to execution...... and blocking times of tasks. Consequently, the method may falsely declare deadline violations that will never occur during execution. This paper is a continuation of previous work of the authors in applying extended timed automata model checking (using the tool UPPAAL) to obtain more exact...... schedulability analysis, here in the presence of non-deterministic computation times of tasks given by intervals [BCET,WCET]. Computation intervals with preemptive schedulers make the schedulability analysis of the resulting task model undecidable. Our contribution is to propose a combination of model checking...

  18. Feasibility Checking for Dial-a-Ride Problems

    DEFF Research Database (Denmark)

    Haugland, Dag; Ho, Sin C.

    Hunsaker and Savelsbergh have proposed an algorithm for testing feasibility of a route in the solution to the dial-a-ride problem. The constraints that are checked are load capacity constraints, time windows, ride time bounds and wait time bounds. The algorithm has linear running time. By virtue ...... of a simple example, we show in this work that their algorithm is incorrect. We also prove that by increasing the time complexity by only a logarithmic factor, a correct algorithm is obtained....

  19. Building Reusable Software Component For Optimization Check in ABAP Coding

    Directory of Open Access Journals (Sweden)

    P.Shireesha

    2010-07-01

    Full Text Available Software component reuse is the software engineering practice of developing newsoftware products from existing components. A reuse library or component reuserepository organizes stores and manages reusable components. This paper describeshow a reusable component is created, how it reuses the function and checking ifoptimized code is being used in building programs and applications. Finally providingcoding guidelines, standards and best practices used for creating reusable componentsand guidelines and best practices for making configurable and easy to use.

  20. Fast Liveness Checking for SSA-Form Programs

    OpenAIRE

    Boissinot B.; Hack S.; Grund D.; De Dinechin B.D.; Rastello F.

    2007-01-01

    Liveness analysis is an important analysis in optimizing compilers. Liveness information is used in several optimizations and is mandatory during the code-generation phase. Two drawbacks of conventional liveness analyses are that their computations are fairly expensive and their results are easily invalidated by program transformations. We present a method to check liveness of variables that overcomes both obstacles. The major advantage of the proposed method is that the analysis result survi...

  1. A Novel Nanometric Reversible Signed Divider with Overflow Checking Capability

    OpenAIRE

    Faraz Dastan; Majid Haghparast

    2012-01-01

    One of the best approaches for designing future computers is that we use reversible logic. Reversible logic circuits have lower power consumption than the common circuits, used in computers nowadays. In this study we propose a new reversible division circuit. This reversible division circuit is signed divider and has an overflow checking capability. Among the designed and proposed reversible division circuits, our proposed division circuit is the first reversible signed divider with overflow ...

  2. Practical Run-time Checking via Unobtrusive Property Caching

    OpenAIRE

    Stulova, Nataliia; Morales, José F.; Hermenegildo, Manuel V.

    2015-01-01

    The use of annotations, referred to as assertions or contracts, to describe program properties for which run-time tests are to be generated, has become frequent in dynamic programing languages. However, the frameworks proposed to support such run-time testing generally incur high time and/or space overheads over standard program execution. We present an approach for reducing this overhead that is based on the use of memoization to cache intermediate results of check evaluation, avoiding repea...

  3. Time-of-flight spectroscopy: energy calibration and consistensy check

    Science.gov (United States)

    Stunault, A.; Andersen, K. H.; Blanc, Y.; Fåk, B.; Godfrin, H.; Guckelsberger, K.; Scherm, R.

    1992-06-01

    A method for calibration of the energy transfers at a time-of-flight (TOF) spectrometer is presented: flight pamths and wavelength are determined to 10 -3 using the arrival times of neutron pulses and prompt capture γs from the sample. We also developed a method to check the reproducibility of a series of TFO data sets, each with over 50 000 data points.

  4. Logic Model Checking of Unintended Acceleration Claims in Toyota Vehicles

    Science.gov (United States)

    Gamble, Ed

    2012-01-01

    Part of the US Department of Transportation investigation of Toyota sudden unintended acceleration (SUA) involved analysis of the throttle control software, JPL Laboratory for Reliable Software applied several techniques including static analysis and logic model checking, to the software; A handful of logic models were build, Some weaknesses were identified; however, no cause for SUA was found; The full NASA report includes numerous other analyses

  5. Parallel State Space Construction for Model-Checking

    OpenAIRE

    Garavel, Hubert; Mateescu, Radu; Smarandache, Irina

    2001-01-01

    The verification of concurrent finite-state systems by model-checking often requires to generate (a large part of) the state space of the system under analysis. Because of the state explosion problem, this may be a resource-consuming operation, both in terms of memory and CPU time. In this report, we aim at improving the performances of state space construction by using parallelization techniques. We present parallel algorithms for constructing state spaces (or Labeled Transition Systems) on ...

  6. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  7. A Graphical μ-Calculus and Local Model Checking

    Institute of Scientific and Technical Information of China (English)

    林惠民

    2002-01-01

    A graphical notation for the propositionalμ-calculus, called modal graphs, ispresented. It is shown that both the textual and equational presentations of theμ-calculus canbe translated into modal graphs. A model checking algorithm based on such graphs is proposed.The algorithm is truly local in the sense that it only generates the parts of the underlyingsearch space which are necessary for the computation of the final result. The correctness of thealgorithm is proven and its complexity analysed.

  8. Model Checking Processes Specified In Join-Calculus Algebra

    Directory of Open Access Journals (Sweden)

    Sławomir Piotr Maludziński

    2014-01-01

    Full Text Available This article presents a model checking tool used to verify concurrent systems specified in join-calculus algebra. The temporal properties of systems under verification are expressed in CTL logic. Join-calculus algebra with its operational semantics defined by the chemical abstract machine serves as the basic method for the specification of concurrent systems and their synchronization mechanisms, and allows the examination of more complex systems.

  9. Network segregation in a model of misinformation and fact checking

    CERN Document Server

    Tambuscio, Marcella; Ciampaglia, Giovanni Luca; Ruffo, Giancarlo

    2016-01-01

    Misinformation under the form of rumor, hoaxes, and conspiracy theories spreads on social media at alarming rates. One hypothesis is that, since social media are shaped by homophily, belief in misinformation may be more likely to thrive on those social circles that are segregated from the rest of the network. One possible antidote is fact checking which, in some cases, is known to stop rumors from spreading further. However, fact checking may also backfire and reinforce the belief in a hoax. Here we take into account the combination of network segregation, finite memory and attention, and fact-checking efforts. We consider a compartmental model of two interacting epidemic processes over a network that is segregated between gullible and skeptic users. Extensive simulation and mean-field analysis show that a more segregated network facilitates the spread of a hoax only at low forgetting rates, but has no effect when agents forget at faster rates. This finding may inform the development of mitigation techniques ...

  10. Correctness of Sensor Network Applications by Software Bounded Model Checking

    Science.gov (United States)

    Werner, Frank; Faragó, David

    We investigate the application of the software bounded model checking tool CBMC to the domain of wireless sensor networks (WSNs). We automatically generate a software behavior model from a network protocol (ESAWN) implementation in a WSN development and deployment platform (TinyOS), which is used to rigorously verify the protocol. Our work is a proof of concept that automatic verification of programs of practical size (≈ 21 000 LoC) and complexity is possible with CBMC and can be integrated into TinyOS. The developer can automatically check for pointer dereference and array index out of bound errors. She can also check additional, e.g., functional, properties that she provides by assume- and assert-statements. This experience paper shows that our approach is in general feasible since we managed to verify about half of the properties. We made the verification process scalable in the size of the code by abstraction (eg, from hardware) and by simplification heuristics. The latter also achieved scalability in data type complexity for the properties that were verifiable. The others require technical advancements for complex data types within CBMC's core.

  11. Approximating Attractors of Boolean Networks by Iterative CTL Model Checking.

    Science.gov (United States)

    Klarner, Hannes; Siebert, Heike

    2015-01-01

    This paper introduces the notion of approximating asynchronous attractors of Boolean networks by minimal trap spaces. We define three criteria for determining the quality of an approximation: "faithfulness" which requires that the oscillating variables of all attractors in a trap space correspond to their dimensions, "univocality" which requires that there is a unique attractor in each trap space, and "completeness" which requires that there are no attractors outside of a given set of trap spaces. Each is a reachability property for which we give equivalent model checking queries. Whereas faithfulness and univocality can be decided by model checking the corresponding subnetworks, the naive query for completeness must be evaluated on the full state space. Our main result is an alternative approach which is based on the iterative refinement of an initially poor approximation. The algorithm detects so-called autonomous sets in the interaction graph, variables that contain all their regulators, and considers their intersection and extension in order to perform model checking on the smallest possible state spaces. A benchmark, in which we apply the algorithm to 18 published Boolean networks, is given. In each case, the minimal trap spaces are faithful, univocal, and complete, which suggests that they are in general good approximations for the asymptotics of Boolean networks.

  12. SU8 diaphragm micropump with monolithically integrated cantilever check valves.

    Science.gov (United States)

    Ezkerra, Aitor; Fernández, Luis José; Mayora, Kepa; Ruano-López, Jesús Miguel

    2011-10-01

    This paper presents a SU8 unidirectional diaphragm micropump with embedded out-of-plane cantilever check valves. The device represents a reliable and low-cost solution for integration of microfluidic control in lab-on-a-chip devices. Its planar architecture allows monolithic definition of its components in a single step and potential integration with previously reported PCR, electrophoresis and flow-sensing SU8 microdevices. Pneumatic actuation is applied on a PDMS diaphragm, which is bonded to the SU8 body at wafer level, further enhancing its integration and mass production capabilities. The cantilever check valves move synchronously with the diaphragm, feature fast response (10ms), low dead volume (86nl) and a 94% flow blockage up to 300kPa. The micropump achieves a maximum flow rate of 177 μl min(-1) at 6 Hz and 200 kPa with an effective area of 10 mm(2). The device is reliable, self-priming and tolerant to particles and big bubbles. To the knowledge of the authors, this is the first micropump in SU8 with monolithically integrated cantilever check valves. PMID:21853192

  13. Assembly-Line Health Check up in Digitalized Hospital

    Institute of Scientific and Technical Information of China (English)

    刘雅兰; 姚斌; 张子刚

    2002-01-01

    Summary: The health check up flow of digital hospital can be consulted with the assembly line ofindustry factory. Because they have the following same features: highly specialized workstation,closeness and continuance, rhythm, balanced production, continuous production. The essentialprerequisites are as the follows: The inspecting items and methods should be stable; advancedproduct mix and stable production design; standardized raw material, consumption, procedure,inspection method; there are lots of request for health inspection; the customers move at the leastunit; the space arrangement should be reasonable; the time arrangement should be proportion.With the computer net, the digital inspection can achieves the raw material controlling accurately.The basis of check up line concerns about equipment, net and software, data collection, and per-sonnel. The group technology is used in the health inspection flow design of the digital hospital inthe field of items customers and zone redivided. The digital assembly linemic health inspect has thefollowing stages: member registering, notice, check in, arrange order, time control, report, feed-back and analysis. The assembly linemic has following advantages: increasing the productivity,the space utility, satisfaction of customer, fund returning, lowering the cost and ensuring thequality.

  14. Algorithmic metatheorems for decidable LTL model checking over infinite systems

    CERN Document Server

    To, Anthony Widjaja

    2009-01-01

    By algorithmic metatheorems for a model checking problem P over infinite-state systems we mean generic results that can be used to infer decidability (possibly complexity) of P not only over a specific class of infinite systems, but over a large family of classes of infinite systems. Such results normally start with a powerful formalism of infinite-state systems, over which P is undecidable, and assert decidability when is restricted by means of an extra "semantic condition" C. We prove various algorithmic metatheorems for the problems of model checking LTL and its two common fragments LTL(Fs,Gs) and LTLdet over the expressive class of word/tree automatic transition systems, which are generated by synchronized finite-state transducers operating on finite words and trees. We present numerous applications, where we derive (in a unified manner) many known and previously unknown decidability and complexity results of model checking LTL and its fragments over specific classes of infinite-state systems including pu...

  15. Assembly-line health check up in digitalized hospital.

    Science.gov (United States)

    Liu, Yalan; Yao, Bin; Zhang, Zigang

    2002-01-01

    The health check up flow of digital hospital can be consulted with the assembly line of industry factory. Because they have the following same features: highly specialized workstation, closeness and continuance, rhythm, balanced production, continuous production. The essential prerequisites are as the follows: The inspecting items and methods should be stable; advanced product mix and stable production design; standardized raw material, consumption, procedure, inspection method; there are lots of request for health inspection; the customers move at the least unit; the space arrangement should be reasonable; the time arrangement should be proportion. With the computer net, the digital inspection can achieves the raw material controlling accurately. The basis of check up line concerns about equipment, net and software, data collection, and personnel. The group technology is used in the health inspection flow design of the digital hospital in the field of items customers and zone redivided. The digital assembly linemic health inspect has the following stages: member registering, notice, check in, arrange order, time control, report, feedback and analysis. The assembly linemic has following advantages: increasing the productivity, the space utility, satisfaction of customer, fund returning, lowering the cost and ensuring the quality. PMID:12674786

  16. Improved Trial Division Technique for Primality Checking in RSA Algorithm

    Directory of Open Access Journals (Sweden)

    Kumarjit Banerjee

    2012-07-01

    Full Text Available The RSA cryptosystem, invented by Ron Rivest, Adi Shamir and Len Adleman was first publicized in the August 1977 issue of Scientific American. The security level of this algorithm very much depends on two large prime numbers. To check the primality of large number in personal computer is huge time consuming using the best known trial division algorithm. The time complexity for primality testing has been reduced using the representation of divisors in the form of 6n±1. According to the fundamental theorem of Arithmetic, every number has unique factorization. So to check primality, it is sufficient to check if the number is divisible by any prime below the square root of the number. The set of divisors obtained by 6n±1 form representation contains many composites. These composite numbers have been reduced by 30k approach. In this paper, the number of composites has been further reduced using 210k approach. A performance analysis in time complexity has been given between 210k approach and other prior applied methods. It has been observed that the time complexity for primality testing has been reduced using 210k approach.

  17. Energy reduction through voltage scaling and lightweight checking

    Science.gov (United States)

    Kadric, Edin

    As the semiconductor roadmap reaches smaller feature sizes and the end of Dennard Scaling, design goals change, and managing the power envelope often dominates delay minimization. Voltage scaling remains a powerful tool to reduce energy. We find that it results in about 60% geomean energy reduction on top of other common low-energy optimizations with 22nm CMOS technology. However, when voltage is reduced, it becomes easier for noise and particle strikes to upset a node, potentially causing Silent Data Corruption (SDC). The 60% energy reduction, therefore, comes with a significant drop in reliability. Duplication with checking and triple-modular redundancy are traditional approaches used to combat transient errors, but spending 2--3x the energy for redundant computation can diminish or reverse the benefits of voltage scaling. As an alternative, we explore the opportunity to use checking operations that are cheaper than the base computation they are guarding. We devise a classification system for applications and their lightweight checking characteristics. In particular, we identify and evaluate the effectiveness of lightweight checks in a broad set of common tasks in scientific computing and signal processing. We find that the lightweight checks cost only a fraction of the base computation (0-25%) and allow us to recover the reliability losses from voltage scaling. Overall, we show about 50% net energy reduction without compromising reliability compared to operation at the nominal voltage. We use FPGAs (Field-Programmable Gate Arrays) in our work, although the same ideas can be applied to different systems. On top of voltage scaling, we explore other common low-energy techniques for FPGAs: transmission gates, gate boosting, power gating, low-leakage (high-Vth) processes, and dual-V dd architectures. We do not scale voltage for memories, so lower voltages help us reduce logic and interconnect energy, but not memory energy. At lower voltages, memories become dominant

  18. Check Point瞄准新的市场和方向%Check Point Aims at New Market and New Direction

    Institute of Scientific and Technical Information of China (English)

    白洁

    2007-01-01

    互联网安全解决方案供应商Check Point软件技术有限公司市场运营及技术服务副总裁Amnon Bar-Lev日前来京,他负责Checkpoint产品的全球销售、合作伙伴计划、国际市场营销以及技术服务管理。Bar-Lev表示,中国市场对安全方案的需求日益扩大,已经成为Check Point锁定的4大重点新兴市场之一,此外,该公司今后将以网络安全、数据安全及统一管理架构3个方面,进一步巩固Check Point在安全市场的领导地位。

  19. Mobile Attendance Checking System on Android Platform for Kazakhstani University

    Science.gov (United States)

    Saparkhojayev, N.; Shakhov, E.; Mailybayev, Y.

    2016-04-01

    In the 21st century-the century of Information Technology, it is difficult to imagine life without any gadgets: phones, tablets, computers, laptops, and so on. Today, smartphones and tablets are becoming popular, and thus their operating systems become popular too. Android is designed for low-power devices that run on battery power at full capacity, using all of its services, such as cameras, lights, GPS navigation, Wi-Fi, etc. In Kazakhstani universities, the process of checking students’ attendance is one of the important issues, because final grade evaluation of students is based on their total number of appearances and their grades during the whole semester. This raises the question of having some tool to control students’ attendance. There are many possible ways of controlling attendance: there are many examples when universities prefer to control attendance by the use of paper sheet, and some universities prefer to use two-stage way of controlling attendance: firstly, teachers and professors use paper sheet for checking students’ attendance and after this, they fill out these information into a system manually. However, this is not an efficient way since there will be spent much of time for calling students names and putting marks like “presence” or “absence” if the class is a lecture class, and in this class at least 5 groups are presented. Furthermore, some students may call his/her friend as “presence” nevertheless to the fact that this student is currently absent. After taking into consideration all these issues and the fact that many gadgets use Android platform, authors of the following research paper decided to create a mobile system that makes easier to check students’ attendance automatically, and this system is implemented in Almaty Management University, Kazakhstan. The system is based on Android platform, and in this paper, details of this system are presented.

  20. The research of the stud bolt bore checking equipment of the nuclear reactor pressure vessel

    International Nuclear Information System (INIS)

    This article introduces a kind of new equipment that can work under the environment of high radiation and can-automaticly check the main stud bolt bore. The technical parameters and key techniques of the checking equipment are presented. (authors)

  1. 76 FR 69287 - National Instant Criminal Background Check System Section Agency Information Collection...

    Science.gov (United States)

    2011-11-08

    ... Federal Bureau of Investigation National Instant Criminal Background Check System Section Agency Information Collection Activities: Existing collection, comments requested the Voluntary Appeal File (VAF... Criminal Justice Information Services (CJIS) Division's National Instant Criminal Background Check...

  2. Tester automatically checks insulation of individual conductors in multiple-strand cables

    Science.gov (United States)

    Shaw, J.; Vuckovich, M.

    1967-01-01

    Insulation tester checks multiple-strand electrical cables in nuclear rocket reactors. It has both manual and automatic capabilities and can check the insulation of a cable with 200 or more conductors in a few minutes.

  3. 78 FR 14121 - Agency Information Collection Activities: Proposed Collection; Comments Requested: Police Check...

    Science.gov (United States)

    2013-03-04

    ... Collection; Comments Requested: Police Check Inquiry and Pre-Screening Qualifications Certification ACTION...: Revision of an existing collection of information. (2) Title of the Form/Collection: Police Check...

  4. Android Security (Decompilation of APK File to Check Permissions

    Directory of Open Access Journals (Sweden)

    Hemant Bansal

    2016-01-01

    Full Text Available The world wide revolution in Android technology is changing our lives in term of the way we learn and use. Android Security fits into this because the technology has been around long enough and can provide various benefits for security in this area. The main objective of this paper is to Decompile the Android App And Check the permissions Used By That App (What The permissions any app is accessing Like reading messages, Using our internet data, reading our call logs. This Research Paper Helps Peoples To aware About the Un necessary Applications and Their Permissions That Are in Our Phone Stealing Our Credit Card details, secret details etc.

  5. Energy Audit Checks - A socioeconomic assessment; Energikartlaeggningscheckar - En samhaellsekonomisk utvaerdering

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-09-01

    This review is part of the Swedish Energy Agency's work with skills and methodology development on economic analyzes. The present socioeconomic analysis is the first of its kind to evaluate the current support for energy audit checks and is based on the instrument's purpose, goals and obstacles. Cost effectiveness is the main focus, as well as a description of the instrument's benefits and costs. The evaluation also aims to further develop the instrument in conjunction with the implementation of energy efficiency directive. Proposals for new instruments have however not been part of the mission.

  6. Model Checking Data Consistency for Cache Coherence Protocols

    Institute of Scientific and Technical Information of China (English)

    Hong Pan; Hui-Min Lin; Yi Lv

    2006-01-01

    A method for automatic verification of cache coherence protocols is presented, in which cache coherence protocols are modeled as concurrent value-passing processes, and control and data consistency requirement are described as formulas in first-orderμ-calculus. A model checker is employed to check if the protocol under investigation satisfies the required properties. Using this method a data consistency error has been revealed in a well-known cache coherence protocol.The error has been corrected, and the revised protocol has been shown free from data consistency error for any data domain size, by appealing to data independence technique.

  7. Equivalence Checking of Combinational Circuits using Boolean Expression Diagrams

    DEFF Research Database (Denmark)

    Hulgaard, Henrik; Williams, Poul Frederick; Andersen, Henrik Reif

    1999-01-01

    The combinational logic-level equivalence problem is to determine whether two given combinational circuits implement the same Boolean function. This problem arises in a number of CAD applications, for example when checking the correctness of incremental design changes (performed either manually...... or by a design automation tool).This paper introduces a data structure called Boolean Expression Diagrams (BEDs) and two algorithms for transforming a BED into a Reduced Ordered Binary Decision Diagram (OBDD). BEDs are capable of representing any Boolean circuit in linear space and can exploit structural...

  8. Daily check of the electron beams with a diode system

    Energy Technology Data Exchange (ETDEWEB)

    Pilette, P. [Hospital Civil de Charleroi (Belgium). Centre for Radiotherapy

    1995-12-01

    A fast systems to check all the accelerator beams on a daily basis has been developed. A cheap home-made detector, based on non-medical diodes (type 1N5408), has been used since July 1992 to verify all the electron beams every day. The relative energy and Top-cGy correspondence is verified with one single irradiation of less than 1 minute by 6 diodes fixed in a polystyrene phantom. The principle of construction, software implementation and results are presented.

  9. An efficient decoding for low density parity check codes

    Science.gov (United States)

    Zhao, Ling; Zhang, Xiaolin; Zhu, Manjie

    2009-12-01

    Low density parity check (LDPC) codes are a class of forward-error-correction codes. They are among the best-known codes capable of achieving low bit error rates (BER) approaching Shannon's capacity limit. Recently, LDPC codes have been adopted by the European Digital Video Broadcasting (DVB-S2) standard, and have also been proposed for the emerging IEEE 802.16 fixed and mobile broadband wireless-access standard. The consultative committee for space data system (CCSDS) has also recommended using LDPC codes in the deep space communications and near-earth communications. It is obvious that LDPC codes will be widely used in wired and wireless communication, magnetic recording, optical networking, DVB, and other fields in the near future. Efficient hardware implementation of LDPC codes is of great interest since LDPC codes are being considered for a wide range of applications. This paper presents an efficient partially parallel decoder architecture suited for quasi-cyclic (QC) LDPC codes using Belief propagation algorithm for decoding. Algorithmic transformation and architectural level optimization are incorporated to reduce the critical path. First, analyze the check matrix of LDPC code, to find out the relationship between the row weight and the column weight. And then, the sharing level of the check node updating units (CNU) and the variable node updating units (VNU) are determined according to the relationship. After that, rearrange the CNU and the VNU, and divide them into several smaller parts, with the help of some assistant logic circuit, these smaller parts can be grouped into CNU during the check node update processing and grouped into VNU during the variable node update processing. These smaller parts are called node update kernel units (NKU) and the assistant logic circuit are called node update auxiliary unit (NAU). With NAUs' help, the two steps of iteration operation are completed by NKUs, which brings in great hardware resource reduction. Meanwhile

  10. TABLE GRAPE PUNNET PACKAGING: THE INFLUENCE OF CHECK-WEIGHING

    Directory of Open Access Journals (Sweden)

    Smit, R.

    2012-11-01

    Full Text Available Most of South Africas table grapes are exported to the EU and the UK. In recent years, pre-packaged table grapes are now preferred in many European supermarkets. This increased demand has resulted in stringent quality standards, including the specification of punnet mass. Locally, table grapes are packed manually using seasonal labour, who often have limited formal education. Punnets must conform to upper and lower mass limits, but many deviations occur due to human and machine error. Check-weighing proved effective in reducing out-of-specification punnets, but human and machine errors were still problem factors.

  11. Injection Beam Loss and Beam Quality Checks for the LHC

    CERN Document Server

    Kain, Verena; Bartmann, Wolfgang; Bracco, Chiara; Drosdal, Lene; Holzer, Eva; Khasbulatov, Denis; Magnin, Nicolas; Meddahi, Malika; Nordt, Annika; Sapinski, Mariusz; Vogt, Mathias

    2010-01-01

    The quality of the injection into the LHC is monitored by a dedicated software system which acquires and analyses the pulse waveforms from the injection kickers, and measures key beam parameters and compares them with the nominal ones. The beam losses at injection are monitored on many critical devices in the injection regions, together with the longitudinal filling pattern and maximum trajectory offset on the first 100 turns. The paper describes the injection quality check system and the results from LHC beam commissioning, in particular the beam losses measured during injection at the various aperture limits. The results are extrapolated to full intensity and the consequences are discussed

  12. Regenerable Microbial Check Valve - Life cycle tests results

    Science.gov (United States)

    Atwater, James E.; Wheeler, Richard R., Jr.; Olivadoti, J. T.; Sauer, Richard L.; Flanagan, David T.

    1992-01-01

    Life cycle regeneration testing of the Microbial Check Valve (MCV) that is used on the Shuttle Orbiter to provide microbial control of potable water is currently in progress. Four beds are being challenged with simulated reclaimed waters and repeatedly regenerated. Preliminary results indicate that contaminant systems exhibit unique regeneration periodicities. Cyclic throughput diminishes with increasing cumulative flow. It is considered to be feasible to design a regenerable MCV system which will function without human intervention and with minimal resupply penalty for the 30 year life of the Space Station.

  13. The Modern Measurement Technology And Checking Of Shafs Parameters

    Science.gov (United States)

    Tichá, Šárka; Botek, Jan

    2015-12-01

    This paper is focused on rationalization checking parameters of shaft in companies engaged in the production of components of electric motors, wind turbines and vacuum systems. Customers increasing constantly their requirements to ensure the overall quality of the product, i.e. the quality of machining, dimensional and shape accuracy and overall purity of the subscribed products. The aim of this paper is to introduce using modern measurement technology in controlling these components and compare the results with existing control methodology. The main objective of this rationalization is to eliminate mistakes and shortcomings of current inspection methods.

  14. UPPAAL-SMC: Statistical Model Checking for Priced Timed Automata

    DEFF Research Database (Denmark)

    Bulychev, Petr; David, Alexandre; Larsen, Kim Guldstrand;

    2012-01-01

    in the form of probability distributions and compare probabilities to analyze performance aspects of systems. The focus of the survey is on the evolution of the tool – including modeling and specification formalisms as well as techniques applied – together with applications of the tool to case studies....... on a series of extensions of the statistical model checking approach generalized to handle real-time systems and estimate undecidable problems. U PPAAL - SMC comes together with a friendly user interface that allows a user to specify complex problems in an efficient manner as well as to get feedback...

  15. Optimizing ZigBee Security using Stochastic Model Checking

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming;

    ZigBee is a fairly new but promising wireless sensor network standard that offers the advantages of simple and low resource communication. Nevertheless, security is of great concern to ZigBee, and enhancements are prescribed in the latest ZigBee specication: ZigBee-2007. In this technical report......, we identify an important gap in the specification on key updates, and present a methodology for determining optimal key update policies and security parameters. We exploit the stochastic model checking approach using the probabilistic model checker PRISM, and assess the security needs for realistic...

  16. Using Model Checking for Analyzing Distributed Power Control Problems

    DEFF Research Database (Denmark)

    Brihaye, Thomas; Jungers, Marc; Lasaulce, Samson;

    2010-01-01

    Model checking (MC) is a formal verification technique which has been known and still knows a resounding success in the computer science community. Realizing that the distributed power control ( PC) problem can be modeled by a timed game between a given transmitter and its environment, the authors...... objectives a transmitter-receiver pair would like to reach. The network is modeled by a game where transmitters are considered as timed automata interacting with each other. The objectives are then translated into timed alternating-time temporal logic formulae and MC is exploited to know whether the desired...

  17. Assessing Personality and Mood With Adjective Check List Methodology: A Review

    Science.gov (United States)

    Craig, Robert J.

    2005-01-01

    This article addresses the benefits and problems in using adjective check list methodology to assess personality. Recent developments in this assessment method are reviewed, emphasizing seminal adjective-based personality tests (Gough's Adjective Check List), mood tests (Lubin's Depressive Adjective Test, Multiple Affect Adjective Check List),…

  18. 42 CFR 457.216 - Treatment of uncashed or canceled (voided) CHIP checks.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Treatment of uncashed or canceled (voided) CHIP... canceled (voided) CHIP checks. (a) Purpose. This section provides rules to ensure that States refund the... section— Canceled (voided) check means an CHIP check issued by a State or fiscal agent that prior to...

  19. Assertion checking environment (ACE) for formal verification of C programs

    International Nuclear Information System (INIS)

    In this paper we describe an Assertion Checking Environment (ACE) for compositional verification of programs, which are written in an industrially sponsored safe subset of C programming language called MISRA C [Guidelines for the Use of the C Language in Vehicle Based Software, 1998]. The theory is based on Hoare logic [Commun. ACM 12 (1969) 576] and the C programs are verified using static assertion checking technique. First the functional specifications of the program, captured in the form of pre- and post-conditions for each C function, are derived from the specifications. These pre- and post-conditions are then introduced as assertions (also called annotations or formal comments) in the program code. The assertions are then proved formally using ACE and theorem proving tool called Stanford Temporal Prover [The Stanford Temporal Prover User's Manual, 1998]. ACE has been developed by us and consists mainly of a translator c2spl, a GUI and some utility programs. The technique and tools developed are targeted towards verification of real-time embedded software

  20. Development of a stainless steel check valve for cryogenic applications

    Science.gov (United States)

    Veenstra, T. T.; Venhorst, G. C. F.; Burger, J. F.; Holland, H. J.; ter Brake, H. J. M.; Sirbi, A.; Rogalla, H.

    2007-02-01

    This paper describes the development of a check valve for use in a sorption compressor that will drive a 10 mW 4.5 K Joule-Thomson cryocooler. For the check valve extremely low backflow rates are tolerable at an operating temperature of the valve of 50 K. To fulfill these requirements, the sealing mechanism of the valve is based on a full metal to metal contact. In order to obtain sufficiently low leak rates, both parts were machined to a surface flatness in the order of 100 nm. In addition, the closing plate (boss) of the valve deforms (bends) slightly under pressure, forming itself to the opposite valve seat and thus reducing the gap between these parts. The measured leak flow at 50 K was 1.6 μg/s helium @ 16 bar pressure difference, which is well below the aim of 3 μg/s. The valve was subjected to an accelerated lifetime test of 300,000 cycles. It was observed that the leak flow through the valve during this test steadily decreased to a level of 0.15 μg/s after 100,000 cycles.

  1. Reasoning About Strategies: On the Model-Checking Problem

    CERN Document Server

    Mogavero, Fabio; Perelli, Giuseppe; Vardi, Moshe Y

    2011-01-01

    In open systems verification, to formally check for reliability, one needs an appropriate formalism to model the interaction between agents and express the correctness of the system no matter how the environment behaves. An important contribution in this context is given by modal logics for strategic ability, in the setting of multi-agent games, such as ATL, ATL*, and the like. Recently, Chatterjee, Henzinger, and Piterman introduced Strategy Logic (CHP-SL), with the aim of getting a powerful framework for reasoning explicitly about strategies. CHP-SL is obtained by using first-order quantifications over strategies and it has been investigated in the setting of two-agents turned-based games, where a non-elementary model-checking algorithm has been provided. While CHP-SL is a very expressive logic, we claim that it does not fully capture the strategic aspects of multi-agent systems. In this paper, we introduce and study a more general strategy logic, denoted SL, for reasoning about strategies in multi-agent co...

  2. Tarmo: A Framework for Parallelized Bounded Model Checking

    CERN Document Server

    Wieringa, Siert; Heljanko, Keijo; 10.4204/EPTCS.14.5

    2009-01-01

    This paper investigates approaches to parallelizing Bounded Model Checking (BMC) for shared memory environments as well as for clusters of workstations. We present a generic framework for parallelized BMC named Tarmo. Our framework can be used with any incremental SAT encoding for BMC but for the results in this paper we use only the current state-of-the-art encoding for full PLTL. Using this encoding allows us to check both safety and liveness properties, contrary to an earlier work on distributing BMC that is limited to safety properties only. Despite our focus on BMC after it has been translated to SAT, existing distributed SAT solvers are not well suited for our application. This is because solving a BMC problem is not solving a set of independent SAT instances but rather involves solving multiple related SAT instances, encoded incrementally, where the satisfiability of each instance corresponds to the existence of a counterexample of a specific length. Our framework includes a generic architecture for a ...

  3. Model checking coalitional games in shortage resource scenarios

    Directory of Open Access Journals (Sweden)

    Dario Della Monica

    2013-07-01

    Full Text Available Verification of multi-agents systems (MAS has been recently studied taking into account the need of expressing resource bounds. Several logics for specifying properties of MAS have been presented in quite a variety of scenarios with bounded resources. In this paper, we study a different formalism, called Priced Resource-Bounded Alternating-time Temporal Logic (PRBATL, whose main novelty consists in moving the notion of resources from a syntactic level (part of the formula to a semantic one (part of the model. This allows us to track the evolution of the resource availability along the computations and provides us with a formalisms capable to model a number of real-world scenarios. Two relevant aspects are the notion of global availability of the resources on the market, that are shared by the agents, and the notion of price of resources, depending on their availability. In a previous work of ours, an initial step towards this new formalism was introduced, along with an EXPTIME algorithm for the model checking problem. In this paper we better analyze the features of the proposed formalism, also in comparison with previous approaches. The main technical contribution is the proof of the EXPTIME-hardness of the the model checking problem for PRBATL, based on a reduction from the acceptance problem for Linearly-Bounded Alternating Turing Machines. In particular, since the problem has multiple parameters, we show two fixed-parameter reductions.

  4. Maintenance Check-ups Following Treatment for Cannabis Dependence.

    Science.gov (United States)

    Walker, Denise D; Stephens, Robert S; Towe, Sheri; Banes, Kelsey; Roffman, Roger

    2015-09-01

    Substance use disorders, including cannabis use disorders and associated negative consequences, are best considered chronic and in need of continuing care. In contrast, most treatment efficacy studies evaluate a fixed number of intervention sessions at a single point in time. The present study evaluated the efficacy of posttreatment maintenance check-ups (MCUs) in maintaining and improving outcomes following nine sessions of motivational enhancement treatment/cognitive behavioral treatment (MET/CBT). Adults dependent on cannabis (n=74) were randomly assigned to the MCU or a no check-up (NCU) condition and followed up at 3- and 9-months. MCU sessions occurred 1 and 4months following the completion of the base treatment. Additional MET/CBT sessions were available to participants throughout the follow-up period. The MCUs specifically encouraged treatment re-entry for those showing ongoing signs of disorder. Participants in the MCU condition reported significantly greater abstinent rates at both follow-ups and were using on fewer days at the 3-month but not the 9-month follow-up. Contrary to hypotheses, MCU participants did not attend more additional treatment and differences in rates of cannabis use emerged prior to the first MCU session. Future research with longer follow-up periods and longer monitoring of outcomes is needed to fully evaluate the utility of MCUs or other forms of continuing care.

  5. SoS contract verification using statistical model checking

    Directory of Open Access Journals (Sweden)

    Alessandro Mignogna

    2013-11-01

    Full Text Available Exhaustive formal verification for systems of systems (SoS is impractical and cannot be applied on a large scale. In this paper we propose to use statistical model checking for efficient verification of SoS. We address three relevant aspects for systems of systems: 1 the model of the SoS, which includes stochastic aspects; 2 the formalization of the SoS requirements in the form of contracts; 3 the tool-chain to support statistical model checking for SoS. We adapt the SMC technique for application to heterogeneous SoS. We extend the UPDM/SysML specification language to express the SoS requirements that the implemented strategies over the SoS must satisfy. The requirements are specified with a new contract language specifically designed for SoS, targeting a high-level English- pattern language, but relying on an accurate semantics given by the standard temporal logics. The contracts are verified against the UPDM/SysML specification using the Statistical Model Checker (SMC PLASMA combined with the simulation engine DESYRE, which integrates heterogeneous behavioral models through the functional mock-up interface (FMI standard. The tool-chain allows computing an estimation of the satisfiability of the contracts by the SoS. The results help the system architect to trade-off different solutions to guide the evolution of the SoS.

  6. Check-hybrid GLDPC Codes: Systematic Elimination of Trapping Sets and Guaranteed Error Correction Capability

    OpenAIRE

    Ravanmehr, Vida; Khatami, Mehrdad; Declercq, David; Vasic, Bane

    2016-01-01

    In this paper, we propose a new approach to construct a class of check-hybrid generalized low-density parity-check (CH-GLDPC) codes which are free of small trapping sets. The approach is based on converting some selected check nodes involving a trapping set into super checks corresponding to a 2-error correcting component code. Specifically, we follow two main purposes to construct the check-hybrid codes; first, based on the knowledge of the trapping sets of the global LDPC code, single parit...

  7. Comparing a Behavioral Check-In/Check-Out (CICO) Intervention to Standard Practice in an Urban Middle School Setting Using an Experimental Group Design

    Science.gov (United States)

    Simonsen, Brandi; Myers, Diane; Briere, Donald E., III

    2011-01-01

    Students who continue to demonstrate at-risk behaviors after a school implements schoolwide primary (Tier 1) interventions require targeted-group secondary (Tier 2) interventions. This study was conducted to compare the effectiveness of a targeted-group behavioral check-in/check-out (CICO) intervention with the school's standard practice (SP) with…

  8. Practical Type Checking of Functions Defined on Context-Free Languages

    Institute of Scientific and Technical Information of China (English)

    Hai-Ming Chen; Yun-Mei Dong

    2004-01-01

    A type checking method for the functional language LFC is presented. A distinct feature of LFC is that it uses Context-Free (CF) languages as data types to represent compound data structures. This makes LFC a dynamically typed language. To improve efficiency, a practical type checking method is presented, which consists of both static and dynamic type checking. Although the inclusion relation of CF languages is not decidable, a special subset of the relation is decidable, i.e., the sentential form relation, which can be statically checked. Moreover, most of the expressions in actual LFC programs appear to satisfy this relation according to the statistic data of experiments. So, despite that the static type checking is not complete, it undertakes most of the type checking task. Consequently the run-time efficiency is effectively improved. Another feature of the type checking is that it converts the expressions with implicit structures to structured representation. Structure reconstruction technique is presented.

  9. Checking the new IRI model The bottomside B parameters

    CERN Document Server

    Mosert, M; Ezquer, R; Lazo, B; Miro, G

    2002-01-01

    Electron density profiles obtained at Pruhonice (50.0, 15.0), El Arenosillo (37.1, 353.2) and Havana (23, 278) were used to check the bottom-side B parameters BO (thickness parameter) and B1 (shape parameter) predicted by the new IRI - 2000 version. The electron density profiles were derived from ionograms using the ARP technique. The data base includes daytime and nighttime ionograms recorded under different seasonal and solar activity conditions. Comparisons with IRI predictions were also done. The analysis shows that: a) The parameter B1 given by IRI 2000 reproduces better the observed ARP values than the IRI-90 version and b) The observed BO values are in general well reproduced by both IRI versions: IRI-90 and IRI-2000.

  10. Routine health check-ups of unemployed in Norway.

    Science.gov (United States)

    Ytterdahl, T

    1999-01-01

    In 1994 all the 273 long-term unemployed in the municipality Lillesand, Norway were invited to participate in a proactive health care program. 229 were included in the program, consisting of a medical examination by a general practitioner, councelling, personal support and referrals. The job-loss aroused lots of negative emotions, mostly defensive feelings and resignations, which are likely to reduce self-esteem and coping ability. The prevalence of somatoform symptoms and anxiety was twice as high as in the normal population, and for depression the prevalence was three times higher. 24% of the unemployed were referred to further examination. Invitation to a health examination may be the ticket of entry for revealing some of the concealed morbidity among long-term unemployed. Health check-ups of unemployed will probably be very cost-effective PMID:10197474

  11. Check Point金融行业客户案例

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    此案例的金融行业用户为国家重点金融交易机构,承担了非常重要的多种金融业务,安全性和可靠性的重要在该机构中是不言而喻的。在没有选择Check Point之前,该用户只采用了传统的利用交换架构的路由交换设备配置Access List的防火墙保护方案。但该架构在安全问题日益严重的今天,已经越来越不能满足用户的需求,主要体现在:

  12. Checking the Quality of Clinical Guidelines using Automated Reasoning Tools

    CERN Document Server

    Hommersom, Arjen; van Bommel, Patrick

    2008-01-01

    Requirements about the quality of clinical guidelines can be represented by schemata borrowed from the theory of abductive diagnosis, using temporal logic to model the time-oriented aspects expressed in a guideline. Previously, we have shown that these requirements can be verified using interactive theorem proving techniques. In this paper, we investigate how this approach can be mapped to the facilities of a resolution-based theorem prover, Otter, and a complementary program that searches for finite models of first-order statements, Mace. It is shown that the reasoning required for checking the quality of a guideline can be mapped to such fully automated theorem-proving facilities. The medical quality of an actual guideline concerning diabetes mellitus 2 is investigated in this way.

  13. LHCb: Analysing DIRAC's Behavior using Model Checking with Process Algebra

    CERN Multimedia

    Remenska, Daniela

    2012-01-01

    DIRAC is the Grid solution designed to support LHCb production activities as well as user data analysis. Based on a service-oriented architecture, DIRAC consists of many cooperating distributed services and agents delivering the workload to the Grid resources. Services accept requests from agents and running jobs, while agents run as light-weight components, fulfilling specific goals. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check for changes in the service states, and react to these accordingly. A characteristic of DIRAC's architecture is the relatively low complexity in the logic of each agent; the main source of complexity lies in their cooperation. These agents run concurrently, and communicate using the services' databases as a shared memory for synchronizing the state transitions. Although much effort is invested in making DIRAC reliable, entities occasionally get into inconsistent states, leadi...

  14. Miniaturized passive hydrogel check valve for hydrocephalus treatment.

    Science.gov (United States)

    Schwerdt, Helen N; Bristol, Ruth E; Junseok Chae

    2014-03-01

    Improvements in cerebrospinal fluid (CSF) draining techniques for treatment of hydrocephalus are urgently sought after to substitute for current CSF shunts that are plagued by high failure rates. The passive check valve aims to restore near natural CSF draining operations while mitigating possible failure mechanisms caused by finite leakage or low resilience that frequently constrain practical implementation of miniaturized valves. A simple hydrogel diaphragm structures core passive valve operations and enforce valve sealing properties to substantially lower reverse flow leakage. Experimental measurements demonstrate realization of targeted cracking pressures (PT ≈ 20-110 mmH2O) and operation at -800 <; ΔP <; 600 mmH2O without observable degradation or leakage.

  15. Applying Model Checking to Industrial-Sized PLC Programs

    CERN Document Server

    AUTHOR|(CDS)2079190; Darvas, Daniel; Blanco Vinuela, Enrique; Tournier, Jean-Charles; Bliudze, Simon; Blech, Jan Olaf; Gonzalez Suarez, Victor M

    2015-01-01

    Programmable logic controllers (PLCs) are embedded computers widely used in industrial control systems. Ensuring that a PLC software complies with its specification is a challenging task. Formal verification has become a recommended practice to ensure the correctness of safety-critical software but is still underused in industry due to the complexity of building and managing formal models of real applications. In this paper, we propose a general methodology to perform automated model checking of complex properties expressed in temporal logics (\\eg CTL, LTL) on PLC programs. This methodology is based on an intermediate model (IM), meant to transform PLC programs written in various standard languages (ST, SFC, etc.) to different modeling languages of verification tools. We present the syntax and semantics of the IM and the transformation rules of the ST and SFC languages to the nuXmv model checker passing through the intermediate model. Finally, two real cases studies of \\CERN PLC programs, written mainly in th...

  16. Numerical methods for checking the regularity of subdivision schemes

    CERN Document Server

    Charina, Maria

    2012-01-01

    In this paper, motivated by applications in computer graphics and animation, we study the numerical methods for checking $C^k-$regularity of vector multivariate subdivision schemes with dilation 2I. These numerical methods arise from the joint spectral radius and restricted spectral radius approaches, which were shown in Charina (Charina, 2011) to characterize $W^k_p-$regularity of subdivision in terms of the same quantity. Namely, the $(k,p)-$joint spectral radius and the $(k,p)-$restricted spectral radius are equal. We show that the corresponding numerical methods in the univariate scalar and vector cases even yield the same upper estimate for the $(k,\\infty)-$joint spectral radius for a certain choice of a matrix norm. The difference between the two approaches becomes apparent in the multivariate case and we confirm that they indeed offer different numerical schemes for estimating the regularity of subdivision. We illustrate our results with several examples.

  17. Neurology check list. 5. rev. and enl. ed.; Checkliste Neurologie

    Energy Technology Data Exchange (ETDEWEB)

    Grehl, Holger [Evangelisches und Johanniter Klinikum, Duisburg (Germany). Neurologische Klinik; Reinhardt, Frank

    2013-02-01

    The neurology check list covers the following issues, organized in four parts: Grey part - diagnostic fundamentals, therapeutic principles: clinical neurological examination, liquor puncture, specific laboratory diagnostics, neurophysical diagnostics, imaging techniques, therapeutic principles, legal aspects, neurological assessment. Green Part - leading syndromes and leading symptoms. Blue part - neurological disease appearance: pains in head and face, pain syndrome, congenital and development disturbances, liquor circulation disturbances, ZNS hemorrhages, tumors and neoplasm, paraneoplastic syndromes, inflammatory diseases of the nervous system, dementia diseases, metabolic and other encephalopathy, cerebellum diseases and system surmounting processes, movement degeneration, basal ganglion diseases, epilepsy, non-epileptic attacks, medulla diseases, brain nerve diseases, plexus lesions, radicular lesions, peripheric neuropathy, neuromuscular transfer disturbances, muscular diseases. Red part: neurological intensive medicine.

  18. Cross-checking different sources of mobility information

    CERN Document Server

    Lenormand, Maxime; Cantu-Ros, Oliva G; Tugores, Antonia; Louail, Thomas; Herranz, Ricardo; Barthelemy, Marc; Frias-Martinez, Enrique; Ramasco, Jose J

    2014-01-01

    The pervasive use of new mobile devices has allowed a better characterization in space and time of human concentrations and mobility in general. Besides its theoretical interest, describing mobility is of great importance for a number of practical applications ranging from the forecast of disease spreading to the design of new spaces in urban environments. While classical data sources, such as surveys or census, have a limited level of geographical resolution (e.g., districts, municipalities, counties are typically used) or are restricted to generic workdays or weekends, the data coming from mobile devices can be precisely located both in time and space. Most previous works have used a single data source to study human mobility patterns. Here we perform instead a cross-check analysis by comparing results obtained with data collected from three different sources: Twitter, census and cell phones. The analysis is focused on the urban areas of Barcelona and Madrid, for which data of the three types is available. ...

  19. Using Model Checking for Analyzing Distributed Power Control Problems

    Directory of Open Access Journals (Sweden)

    Thomas Brihaye

    2010-01-01

    Full Text Available Model checking (MC is a formal verification technique which has been known and still knows a resounding success in the computer science community. Realizing that the distributed power control (PC problem can be modeled by a timed game between a given transmitter and its environment, the authors wanted to know whether this approach can be applied to distributed PC. It turns out that it can be applied successfully and allows one to analyze realistic scenarios including the case of discrete transmit powers and games with incomplete information. The proposed methodology is as follows. We state some objectives a transmitter-receiver pair would like to reach. The network is modeled by a game where transmitters are considered as timed automata interacting with each other. The objectives are then translated into timed alternating-time temporal logic formulae and MC is exploited to know whether the desired properties are verified and determine a winning strategy.

  20. DEPUTY:Analysing Architectural Structures and Checking Style

    Institute of Scientific and Technical Information of China (English)

    D.Gorshkov; J.P.Wellisch

    2001-01-01

    The DepUty(dependencies utility)can be classified as a project and process management tool.The main goal of DepUty is to assist by means of source code analysis and graphical representation using UML,in understanding dependencies of sub-systems and packages in CMS object Oriented software,to understand architectureal structure,and to schedule code release in modularised integration.It also allows a new-comer to more easily understand the global structure, of CMS software,and to void circular dependencies up-front or re-factor the code,in case it was already too close to the edge of non-maintainability.We will discuss the various views DepUty provides to analyse package dependencies and illustrate both the metrics and style checking facilities it provides.

  1. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications.

  2. A Formal Verification Methodology for Checking Data Integrity

    CERN Document Server

    Umezawa, Yasushi

    2011-01-01

    Formal verification techniques have been playing an important role in pre-silicon validation processes. One of the most important points considered in performing formal verification is to define good verification scopes; we should define clearly what to be verified formally upon designs under tests. We considered the following three practical requirements when we defined the scope of formal verification. They are (a) hard to verify (b) small to handle, and (c) easy to understand. Our novel approach is to break down generic properties for system into stereotype properties in block level and to define requirements for Verifiable RTL. Consequently, each designer instead of verification experts can describe properties of the design easily, and formal model checking can be applied systematically and thoroughly to all the leaf modules. During the development of a component chip for server platforms, we focused on RAS (Reliability, Availability, and Serviceability) features and described more than 2000 properties in...

  3. Application of function generator for checking reactivity meter accuracy

    International Nuclear Information System (INIS)

    The accuracy of reactivity meters is usually checked with a reactor kinetic simulator operating to an accuracy exceeding the expected accuracy of the measuring device. The present report describes a method to evaluate accuracy by comparing the response R(t) of the reactivity meter to a given function n(t) with the value of the reactivity function r(t) calculated from the same input function instead of using the input reference signal r(t) to the simulator with the output signal R(t) from the reactivity meter. This method has been successfully used by applying sawtooth and exponential input signals for the determination of the accuracy of reactivity meters developed in the Central Research Institute for Physics. (author)

  4. Technophobia, prescription checking and the future of diabetes management.

    Science.gov (United States)

    Albisser, A M

    2009-06-01

    Is the medical prescription the root cause of the long-term complications of diabetes mellitus? This article presents the argument for introducing prescription checking into diabetes disease management. It discusses an evidence-based need for frequent revisions of the medical prescription as the key to preventing treatment-related complications in diabetes while achieving the now mandated standards in patient care. To do this it will be prudent for diabetes healthcare providers to enrich their clinical services with new information technology-based tools. These are easily acquired by participating in professional workshops focused on advanced diabetes management. In this light, the case presented here challenges leading practitioners to become early participants in the evolution of information technology that will ultimately enhance the management of all patients with diabetes. PMID:19357829

  5. Model-checking dense-time Duration Calculus

    DEFF Research Database (Denmark)

    Fränzle, Martin

    2004-01-01

    Since the seminal work of Zhou Chaochen, M. R. Hansen, and P. Sestoft on decidability of dense-time Duration Calculus [Zhou, Hansen, Sestoft, 1993] it is well-known that decidable fragments of Duration Calculus can only be obtained through withdrawal of much of the interesting vocabulary...... of this logic. While this was formerly taken as an indication that key-press verification of implementations with respect to elaborate Duration Calculus specifications were also impossible, we show that the model property is well decidable for realistic designs which feature natural constraints...... suitably sparser model classes we obtain model-checking procedures for rich subsets of Duration Calculus. Together with undecidability results also obtained, this sheds light upon the exact borderline between decidability and undecidability of Duration Calculi and related logics....

  6. Analysis of DIRAC's behavior using model checking with process algebra

    Science.gov (United States)

    Remenska, Daniela; Templon, Jeff; Willemse, Tim; Bal, Henri; Verstoep, Kees; Fokkink, Wan; Charpentier, Philippe; Graciani Diaz, Ricardo; Lanciotti, Elisa; Roiser, Stefan; Ciba, Krzysztof

    2012-12-01

    DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple; the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike conventional testing, it allows full control over the parallel processes execution, and supports exhaustive state-space exploration. We used the mCRL2 language and toolset to model the behavior of two related DIRAC subsystems: the workload and storage management system. Based on process algebra, mCRL2 allows defining custom data types as well as functions over these. This makes it suitable for modeling the data manipulations made by DIRAC's agents. By visualizing the state space and replaying scenarios with the toolkit's simulator, we have detected race-conditions and deadlocks in these systems, which, in several cases, were confirmed to occur in the reality. Several properties of interest were formulated and verified with the tool. Our future direction is automating the translation from DIRAC to a formal model.

  7. Applicability of refractometry for fast routine checking of hospital preparations.

    Science.gov (United States)

    Hendrickx, Stijn; Verón, Aurora Monteagudo; Van Schepdael, Ann; Adams, Erwin

    2016-04-30

    Quality control of hospital pharmacy formulations is of the utmost importance to ensure constant quality and to avoid potential mistakes before administration to the patient. In this study we investigated the applicability of refractometry as a fast, inexpensive and easy-to-use quality control measurement. Refractive indices (RI) of a multitude of different hospital formulations with varying concentrations of active compound were measured. The samples consisted of a number of binary aqueous solutions (one compound in water), complex aqueous solutions (multiple compounds in water or in a constant matrix), two suspensions and one emulsion. For all these formulations, linear regression analysis was performed, quality control limits determined and accuracy and repeatability were checked. Subsequently, actual hospital pharmacy samples were analyzed to check whether they were within the specified limits. For both binary and complex aqueous formulations, repeatability was good and a linear correlation for all samples could be observed on condition that the concentration of the active compound was sufficiently high. The refractometer was not sensitive enough for solutions of folic acid and levothyroxine, which had too low a concentration of active compound. Due to lack of homogeneity and light scattering, emulsions and suspensions do not seem suitable for quality control by refractometry. A mathematical equation was generated to predict the refractive index of an aqueous solution containing clonidine HCl as active compound. Values calculated from the equation were compared with measured values and deviations of all samples were found to be lower than 1.3%. In order to use refractometry in a hospital pharmacy for quality control of multicomponent samples, additional intermediate measurements would be required, to overcome the fact that refractometry is not compound specific. In conclusion, we found that refractometry could potentially be useful for daily, fast quality

  8. Analysis of DIRAC's behavior using model checking with process algebra

    International Nuclear Information System (INIS)

    DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple; the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike conventional testing, it allows full control over the parallel processes execution, and supports exhaustive state-space exploration. We used the mCRL2 language and toolset to model the behavior of two related DIRAC subsystems: the workload and storage management system. Based on process algebra, mCRL2 allows defining custom data types as well as functions over these. This makes it suitable for modeling the data manipulations made by DIRAC's agents. By visualizing the state space and replaying scenarios with the toolkit's simulator, we have detected race-conditions and deadlocks in these systems, which, in several cases, were confirmed to occur in the reality. Several properties of interest were formulated and verified with the tool. Our future direction is automating the translation from DIRAC to a formal model.

  9. Tarmo: A Framework for Parallelized Bounded Model Checking

    Directory of Open Access Journals (Sweden)

    Siert Wieringa

    2009-12-01

    Full Text Available This paper investigates approaches to parallelizing Bounded Model Checking (BMC for shared memory environments as well as for clusters of workstations. We present a generic framework for parallelized BMC named Tarmo. Our framework can be used with any incremental SAT encoding for BMC but for the results in this paper we use only the current state-of-the-art encoding for full PLTL. Using this encoding allows us to check both safety and liveness properties, contrary to an earlier work on distributing BMC that is limited to safety properties only. Despite our focus on BMC after it has been translated to SAT, existing distributed SAT solvers are not well suited for our application. This is because solving a BMC problem is not solving a set of independent SAT instances but rather involves solving multiple related SAT instances, encoded incrementally, where the satisfiability of each instance corresponds to the existence of a counterexample of a specific length. Our framework includes a generic architecture for a shared clause database that allows easy clause sharing between SAT solver threads solving various such instances. We present extensive experimental results obtained with multiple variants of our Tarmo implementation. Our shared memory variants have a significantly better performance than conventional single threaded approaches, which is a result that many users can benefit from as multi-core and multi-processor technology is widely available. Furthermore we demonstrate that our framework can be deployed in a typical cluster of workstations, where several multi-core machines are connected by a network.

  10. A conceptual model of check dam hydraulics for gully control

    Directory of Open Access Journals (Sweden)

    C. Castillo

    2013-09-01

    Full Text Available There is little information in scientific literature regarding the modifications induced by check dam systems in flow regimes in restored gully reaches, despite it being a crucial issue for the design of conservation measures. Here, we develop a conceptual model to classify flow regimes in straight rectangular channels for initial and dam-filling conditions as well as a method of estimating efficiency in order to provide guidelines for optimal design. The model integrates several previous mathematical approaches for assessing the main processes involved (hydraulic jump HJ, impact flow, gradually varied flows. Its performance was compared with the simulations obtained from IBER, a bi-dimensional hydrodynamic model. The impact of check dam spacing (defined by the geometric factor of influence c on efficiency was explored. Eleven main classifications of flow regimes were identified depending on the element and level of influence. The model produced similar results when compared with IBER, but led to higher estimations of HJ and impact lengths. Total influence guaranteed maximum efficiency and HJ control defining the location of the optimal c. Geometric total influence (c = 1 was a valid criterion for the different stages of the structures in a wide range of situations provided that hydraulic roughness conditions remained high within the gully, e.g. through revegetation. Our total influence criterion involved shorter spacing than that habitually recommended in technical manuals for restoration, but was in line with those values found in spontaneous and stable step-pools systems, which might serve as a reference for man-made interventions.

  11. Comparative evaluation of Map-Check and Arc-Check for dosimetric verification in patients treaties with IMRT; Evaluacion comparativa de MapCHECK y ArcCHECK para verificacion dosimetrica en pacientes tratados con IMRT

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, B.; Marquina, J.; Ramirez, J.; Gonzales, A., E-mail: bertha.garcia@aliada.com.pe [ALIADA, Oncologia Integral, Av. Jose Galvez Barrenechea 1044, San Isidro, Lima 27 (Peru)

    2014-08-15

    The dosimetric controls that are realized to the patients in the Intensity-Modulated Radiation Therapy (IMRT) and Volumetric Modulated Arc Therapy (VMAT) techniques; are indispensable since allows in real time to verify the quantity of imparted dose to the patient, these controls should be carried out every time that will begin a treatment, because these techniques impart dose dynamically modulating the dose intensity and movements of the Multi leaf Collimator (MLC), for they exist different diodes devices prepared in spiral (3-D) and planar form (2-D); that allows to estimate the dose fluence in a certain area. Treatment studies for head and neck with IMRT were compared regarding the reading average carried out by the diodes in the corresponding areas, using the criteria of the gamma index like dose difference 3% or 3m m of distance for both diode arrangements, in the IMRT case was found in Arc-Check a minor difference of 3/3 for an average of 99.37% of read diodes in a correct way contrary to the reading obtained with the Map-Check 3/3 an average of difference of 96.19%; in IMRT the difference was lower due to different factors like sensibility of the diodes reading, resolution, diodes disposition, as well as the average reading of entrance and exit of the radiation beams. Within the parameters delivered by the diodes arrangement is considered the positioning correction for both acceptance indexes like the gamma factor and the Distance-to-agreement (Dta), the existent difference of reading in factor gamma and Dta fundamentally is the way in like they compare the dose distribution; the Gamma uses dose averages of high and low gradients and Dta use only averages of areas of high gradients between the nearest points giving the distance as a result among the distribution point and the nearest point what makes stricter. (Author)

  12. Quality checking task force destructive testing of active waste forms

    International Nuclear Information System (INIS)

    The implications of sampling and testing of full size active packages of intermediate level wastes are summarised in this report. Sampling operations are technically feasible but a major difficulty will be the disposal of secondary waste. A literature survey indicated that destructive testing of wasteforms is not carried out as a routine operation in Europe or the USA. (author)

  13. A Game-Based Approach for PCTL* Stochastic Model Checking with Evidence

    Institute of Scientific and Technical Information of China (English)

    Yang Liu; Xuan-Dong Li; Yan Ma

    2016-01-01

    Stochastic model checking is a recent extension and generalization of the classical model checking, which focuses on quantitatively checking the temporal property of a system model. PCTL* is one of the important quantitative property specification languages, which is strictly more expressive than either PCTL (probabilistic computation tree logic) or LTL (linear temporal logic) with probability bounds. At present, PCTL* stochastic model checking algorithm is very complicated, and cannot provide any relevant explanation of why a formula does or does not hold in a given model. For dealing with this problem, an intuitive and succinct approach for PCTL* stochastic model checking with evidence is put forward in this paper, which includes: presenting the game semantics for PCTL* in release-PNF (release-positive normal form), defining the PCTL*stochastic model checking game, using strategy solving in game to achieve the PCTL*stochastic model checking, and refining winning strategy as the evidence to certify stochastic model checking result. The soundness and the completeness of game-based PCTL* stochastic model checking are proved, and its complexity matches the known lower and upper bounds. The game-based PCTL*stochastic model checking algorithm is implemented in a visual prototype tool, and its feasibility is demonstrated by an illustrative example.

  14. Emodnet Med Sea Check-Point - Indicators for decision- maker

    Science.gov (United States)

    Besnard, Sophie; Claverie, Vincent; Blanc, Frédérique

    2015-04-01

    The Emodnet Checkpoint projects aim is to assess the cost-effectiveness, reliability and utility of the existing monitoring at the sea basin level. This involves the development of monitoring system indicators and a GIS Platform to perform the assessment and make it available. Assessment or production of Check-Point information is made by developing targeted products based on the monitoring data and determining whether the products are meeting the needs of industry and public authorities. Check-point users are the research community, the 'institutional' policy makers for IMP and MSFD implementation, the 'intermediate users', i.e., users capable to understand basic raw data but that benefit from seeing the Checkpoint targeted products and the assessment of the fitness for purpose. We define assessment criteria aimed to characterize/depict the input datasets in terms of 3 territories capable to show performance and gaps of the present monitoring system, appropriateness, availability and fitness for purpose. • Appropriateness: What is made available to users? What motivate/decide them to select this observation rather than this one. • Availability: How this is made available to the user? Place to understand the readiness and service performance of the EU infrastructure • Fitness for use / fitness for purpose: Ability for non-expert user to appreciate the data exploitability (feedback on efficiency & reliability of marine data) For each territory (appropriateness, Availability and Fitness for purpose / for use), we define several indicators. For example, for Availability we define Visibility, Accessibility and Performance. And Visibility is itself defined by "Easily found" and "EU service". So these indicators can be classified according to their territory and sub-territory as seen above, but also according to the complexity to build them. Indicators are built from raw descriptors in 3 stages:  Stage 1: to give a neutral and basic status directly computed from

  15. Trellis-Based Check Node Processing for Low-Complexity Nonbinary LP Decoding

    CERN Document Server

    Punekar, Mayur

    2011-01-01

    Linear Programming (LP) decoding is emerging as an attractive alternative to decode Low-Density Parity-Check (LDPC) codes. However, the earliest LP decoders proposed for binary and nonbinary LDPC codes are not suitable for use at moderate and large code lengths. To overcome this problem, Vontobel et al. developed an iterative Low-Complexity LP (LCLP) decoding algorithm for binary LDPC codes. The variable and check node calculations of binary LCLP decoding algorithm are related to those of binary Belief Propagation (BP). The present authors generalized this work to derive an iterative LCLP decoding algorithm for nonbinary linear codes. Contrary to binary LCLP, the variable and check node calculations of this algorithm are in general different from that of nonbinary BP. The overall complexity of nonbinary LCLP decoding is linear in block length; however the complexity of its check node calculations is exponential in the check node degree. In this paper, we propose a modified BCJR algorithm for efficient check n...

  16. The Design of E-Traveler’s Check with Efficiency and Mutual Authentication

    Directory of Open Access Journals (Sweden)

    Chin-Chen Chang

    2010-03-01

    Full Text Available Nowadays, traveling has become a popular leisure activity in our daily lives. Travelers can either use cash or credit cards to pay their bills. However, there is risk of cash being robbed or credit cards being copied. The traveler’s check, which is a third choice, comes in to get travelers around such risks and to protect their rights. Nevertheless, traditional travelers’ checks cannot keep imposters from forging and cashing them illegally. Hence, we propose a new type of check, called the e-traveler’s check, to preserve the rights of holders of e-traveler’s check and to prevent the check-issuing banks from being damaged.

  17. Selecting Female Mice in Estrus and Checking Plugs.

    Science.gov (United States)

    Behringer, Richard; Gertsenstein, Marina; Nagy, Kristina Vintersten; Nagy, Andras

    2016-01-01

    The female mouse estrous cycle is divided into four phases: proestrus (development of ovarian follicles), estrus (ovulation), metestrus (formation of corpora lutea), and diestrus (beginning of follicle development for next ovulation and elimination of previous oocytes). The appearance of the epithelium of the external genitalia is used to identify the stage of the estrous cycle of a female mouse. This is usually easier to see in strains with either no or only light skin pigmentation. By examining the color, moistness, and degree of swelling of the vagina, females in estrus can readily be identified. To set up the matings, females are examined in the afternoon, and those in estrus are placed into the cages with males (one or two females in each cage with one male). Usually, 50% or more of the selected females will mate. The presence of a vaginal copulation plug next morning indicates that mating has occurred, but it does not mean that a pregnancy will result even if proven breeder fertile males were used. It is important to check vaginal plugs early in the morning because they fall out or are no longer detectable ~12 h after mating or sometimes earlier. PMID:27480722

  18. Model Checking Vector Addition Systems with one zero-test

    CERN Document Server

    Bonet, Rémi; Leroux, Jérôme; Zeitoun, Marc

    2012-01-01

    We design a variation of the Karp-Miller algorithm to compute, in a forward manner, a finite representation of the cover (i.e., the downward closure of the reachability set) of a vector addition system with one zero-test. This algorithm yields decision procedures for several problems for these systems, open until now, such as place-boundedness or LTL model-checking. The proof techniques to handle the zero-test are based on two new notions of cover: the refined and the filtered cover. The refined cover is a hybrid between the reachability set and the classical cover. It inherits properties of the reachability set: equality of two refined covers is undecidable, even for usual Vector Addition Systems (with no zero-test), but the refined cover of a Vector Addition System is a recursive set. The second notion of cover, called the filtered cover, is the central tool of our algorithms. It inherits properties of the classical cover, and in particular, one can effectively compute a finite representation of this set, e...

  19. Verification of Quantum Cryptography Protocols by Model Checking

    Directory of Open Access Journals (Sweden)

    Mohamed Elboukhari

    2010-10-01

    Full Text Available Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography orQuantum Key Distribution (QKD exploits the laws of quantum physics to offer unconditionally securecommunication. The progress of research in this field allows the anticipation of QKD to be availableoutside of laboratories within the next few years and efforts are made to improve the performance andreliability of the implemented technologies. But despite this big progress, several challenges remain. Forexample the task of how to test the devices of QKD did not yet receive enough attention. These apparatusesbecome heterogeneous, complex and so demand a big verification effort. In this paper we propose to studyquantum cryptography protocols by applying the technique of probabilistic model checking. Using PRISMtool, we analyze the security of BB84 protocol and we are focused on the specific security property ofeavesdropper's information gain on the key derived from the implementation of this protocol. We show thatthis property is affected by the parameters of the eavesdropper’s power and the quantum channel.

  20. Astronaut Neil A. Armstrong Undergoes Communications Systems Final Check

    Science.gov (United States)

    1969-01-01

    Dunned in his space suit, mission commander Neil A. Armstrong does a final check of his communications system before before the boarding of the Apollo 11 mission. Launched via a Saturn V launch vehicle, the first manned lunar mission launched from the Kennedy Space Center, Florida on July 16, 1969 and safely returned to Earth on July 24, 1969. The Saturn V vehicle was developed by the Marshall Space Flight Center (MSFC) under the direction of Dr. Wernher von Braun. The 3-man crew aboard the flight consisted of astronauts Armstrong; Michael Collins, Command Module (CM) pilot; and Edwin E. Aldrin, Jr., Lunar Module (LM) Pilot. Armstrong was the first human to ever stand on the lunar surface, followed by Edwin (Buzz) Aldrin. Meanwhile, astronaut Collins piloted the CM in a parking orbit around the Moon. During a 2½ hour surface exploration, the crew collected 47 pounds of lunar surface material which was returned to Earth for analysis. With the success of Apollo 11, the national objective to land men on the Moon and return them safely to Earth had been accomplished.

  1. Systematics for checking geometric errors in CNC lathes

    Science.gov (United States)

    Araújo, R. P.; Rolim, T. L.

    2015-10-01

    Non-idealities presented in machine tools compromise directly both the geometry and the dimensions of machined parts, generating distortions in the project. Given the competitive scenario among different companies, it is necessary to have knowledge of the geometric behavior of these machines in order to be able to establish their processing capability, avoiding waste of time and materials as well as satisfying customer requirements. But despite the fact that geometric tests are important and necessary to clarify the use of the machine correctly, therefore preventing future damage, most users do not apply such tests on their machines for lack of knowledge or lack of proper motivation, basically due to two factors: long period of time and high costs of testing. This work proposes a systematics for checking straightness and perpendicularity errors in CNC lathes demanding little time and cost with high metrological reliability, to be used on factory floors of small and medium-size businesses to ensure the quality of its products and make them competitive.

  2. Time for a reality check on global climate change policies

    Energy Technology Data Exchange (ETDEWEB)

    O`Keefe, W.F.

    1995-12-31

    Right now no one knows enough about global warming to advocate with certainty the kinds of actions that could jeopardize our economic well being -- and the economic aspirations of developing countries. That doesn`t mean no action, which is usually described perjoratively and erroneously as business as usual. It does mean actions must be based on facts, not misperceptions and myths. It does mean a mindset that reexamines, rethinks and changes course based on new knowledge. In short, I am advocating a reality check on the process based on the political, scientific and economic realities. Each of these realities has an important role in determining how we respond to the global warming threat. Our goal should be to identify actions that do the least damage to material well-being and that preserve the path to a better way of life, especially for the developing nations. What we have instead is a process driven by political gamesmanship that will devolve into beggar the neighbor policies reminiscent of 18th century mercantilism.

  3. Structure-Based Deadlock Checking of Asynchronous Circuits

    Institute of Scientific and Technical Information of China (English)

    Hong-Guang Ren; Zhi-Ying Wang; Doug Edwards

    2011-01-01

    It is important to verify the absence of deadlocks in asynchronous circuits.Much previous work relies on a reachability analysis of the circuits' states,with the use of binary decision diagrams (BDDs) or Petri nets to model the behaviors of circuits.This paper presents an alternative approach focusing on the structural properties of well-formed asynchronous circuits that will never suffer deadlocks.A class of data-driven asynchronous pipelines is targeted in this paper,which can be viewed as a network of basic components connected by handshake channels.The sufficient and necessary conditions for a component network consisting of Steer,Merge,Fork and Join are given.The slack elasticity of the channels is analyzed in order to introduce pipelining.As an application,a deadlock checking method is implemented in a syntax-directed asynchronous design tool - Teak.The proposed method shows a great runtime advantage when compared against previous Petri net based verification tools.

  4. Dynamic Data Possession Checking for Secure Cloud Storage Service

    Directory of Open Access Journals (Sweden)

    Wenzhe Jiao

    2013-12-01

    Full Text Available Using cloud storage service, data owners can access their data anywhere at any time and enjoy the on-demand high quality applications and services, without the burden of local data storage and maintenance. Meanwhile, the risk of losing data stored with any untrustworthy service provider is the key barrier to widely adopt cloud storage service. To verify the integrity of data stored in cloud and relieve the security concerns of customers, a privacy-preserving data possession checking (DPC scheme is presented. This scheme uses Merkle Hash Tree to support fully dynamic data operations. To achieve robustness, forward error-correcting codes can be combined with the proposed DPC scheme, which can recover the data when a small amount of file has been corrupted. The scheme allows unlimited times verification without the need for the verifier to compare against the original data, which reduces the communication and computation complexity dramatically and preserves the privacy of the data. Extensive security analysis and simulation show that the proposed scheme is highly provably secure.

  5. Preservation of Thiobacillus ferrooxidans and Thiobacillus thiooxidans with activity check.

    Science.gov (United States)

    Gupta, S G; Agate, A D

    1986-01-01

    Cultures of Thiobacillus ferrooxidans and Thiobacillus thiooxidans, used in biohydrometallurgical processes of economic importance, are very difficult to preserve by conventional methods. Hence, to preserve the cultures with their activity intact, various techniques were tried, after determining their respective activity in terms of Iron Oxidation Rate (IOR) and Sulfur Oxidation Rate (SOR). Among the methods tested, along with the recommended method of serial transfer in a liquid medium, were methods such as lyophilization, storage in a liquid nitrogen and mixing with sterile, inert carriers like lignite or chalcopyrite ores. After a period check-up at 4 months and 8 months storage, it was found that out of these methods, mixing with sterile ore followed by storage at 8 degrees C, kept both types of activities intact. The temperature of storage was observed to have a definite effect on activity, in that when the preserved cultures were stored at 8 degrees C, the activity was retained, whereas at 28-30 degrees C (RT) storage, the activity of all the cultures preserved by various techniques, dropped significantly.

  6. Grab Windows training opportunities; check CERN Windows roadmap!

    CERN Multimedia

    IT Department

    2011-01-01

    CERN Operating Systems and Information Services group (IT-OIS) actively monitors market trends to check how new software products correspond to CERN needs. In the Windows world, Windows 7 has been a big hit, with over 1500 Windows 7 PCs within less than a year since its support was introduced at CERN. No wonder: Windows XP is nearly 10 years old and is steadily approaching the end of its life-cycle. At CERN, support for Windows XP will stop at the end of December 2012. Compared to Vista, Windows 7 has the same basic hardware requirements, but offers higher performance, so the decision to upgrade is rather straightforward. CERN support for Vista will end in June 2011. In the world of Microsoft Office, version 2007 offers better integration with the central services than the older version 2003. Progressive upgrade from 2003 to 2007 is planned to finish in September 2011, but users are encouraged to pro-actively upgrade at their convenience. Please note that Office 2007 brings an important change in the area of ...

  7. Risk and Scope of Debit Check Card in Competitive Market of Pakistan

    OpenAIRE

    Ali Zaidi, Syed Najaf; Ali, Syed Babar

    2006-01-01

    Today, even the smallest of transactions, from fast food to digital content, are attracting Debit Check cardholders, and more and more merchants are opening their doors to this burgeoning payment method. The topic for this dissertation is to review the Debit Card marketplace, culminating in addressing the question “What is the scope of new Debit check cards?” The literature review indicates that there are developing opportunities within the marketplace that could offer the Debit Check Car...

  8. SU-D-BRD-04: The Impact of Automatic Radiation Therapy Plan Checks in Treatment Planning

    Energy Technology Data Exchange (ETDEWEB)

    Gopan, O; Yang, F; Ford, E [University of Washington, Seattle, WA (United States)

    2015-06-15

    Purpose: The physics plan check verifies various aspects of a treatment plan after dosimetrists have finished creating the plan. Some errors in the plan which are caught by the physics check could be caught earlier in the departmental workflow. The purpose of this project was to evaluate a plan checking script that can be run within the treatment planning system (TPS) by the dosimetrists prior to plan approval and export to the record and verify system. Methods: A script was created in the Pinnacle TPS to automatically check 15 aspects of a plan for clinical practice conformity. The script outputs a list of checks which the plan has passed and a list of checks which the plan has failed so that appropriate adjustments can be made. For this study, the script was run on a total of 108 plans: IMRT (46/108), VMAT (35/108) and SBRT (27/108). Results: Of the plans checked by the script, 77/108 (71%) failed at least one of the fifteen checks. IMRT plans resulted in more failed checks (91%) than VMAT (51%) or SBRT (63%), due to the high failure rate of an IMRT-specific check, which checks that no IMRT segment < 5 MU. The dose grid size and couch removal checks caught errors in 10% and 14% of all plans – errors that ultimately may have resulted in harm to the patient. Conclusion: Approximately three-fourths of the plans being examined contain errors that could be caught by dosimetrists running an automated script embedded in the TPS. The results of this study will improve the departmental workflow by cutting down on the number of plans that, due to these types of errors, necessitate re-planning and re-approval of plans, increase dosimetrist and physician workload and, in urgent cases, inconvenience patients by causing treatment delays.

  9. Model Checking Classes of Metric LTL Properties of Object-Oriented Real-Time Maude Specifications

    OpenAIRE

    Erika Ábrahám; Peter Csaba Ölveczky; Daniela Lepri

    2010-01-01

    This paper presents a transformational approach for model checking two important classes of metric temporal logic (MTL) properties, namely, bounded response and minimum separation, for nonhierarchical object-oriented Real-Time Maude specifications. We prove the correctness of our model checking algorithms, which terminate under reasonable non-Zeno-ness assumptions when the reachable state space is finite. These new model checking features have been integrated into Real-Time Maude, and are use...

  10. The evolution of the check as a means of payment: A historical survey

    OpenAIRE

    Quinn, Stephen; Roberds, William

    2008-01-01

    Though checks' popularity is now waning in favor of electronic payments, checks were, for much of the twentieth century, the most widely used noncash payment method in the United States. How did such a relatively inefficient form of payment become so dominant? This article traces the historical evolution of the check, focusing on its relation to complementary and competing payment technologies. ; Originating in the eastern Mediterranean during the first millennium as a convenient form of paym...

  11. The Model Checking Problem for Propositional Intuitionistic Logic with One Variable is AC1-Complete

    CERN Document Server

    Weiss, Martin Mundhenk And Felix

    2010-01-01

    We investigate the complexity of the model checking problem for propositional intuitionistic logic. We show that the model checking problem for intuitionistic logic with one variable is complete for logspace-uniform AC1, and for intuitionistic logic with two variables it is P-complete. For superintuitionistic logics with one variable, we obtain NC1-completeness for the model checking problem and for the tautology problem.

  12. SU-D-BRD-03: Improving Plan Quality with Automation of Treatment Plan Checks

    Energy Technology Data Exchange (ETDEWEB)

    Covington, E; Younge, K; Chen, X; Lee, C; Matuszak, M; Kessler, M; Acosta, E; Orow, A; Filpansick, S; Moran, J [University of Michigan Hospital and Health System, Ann Arbor, MI (United States); Keranen, W [Varian Medical Systems, Palo Alto, CA (United States)

    2015-06-15

    Purpose: To evaluate the effectiveness of an automated plan check tool to improve first-time plan quality as well as standardize and document performance of physics plan checks. Methods: The Plan Checker Tool (PCT) uses the Eclipse Scripting API to check and compare data from the treatment planning system (TPS) and treatment management system (TMS). PCT was created to improve first-time plan quality, reduce patient delays, increase efficiency of our electronic workflow, and to standardize and partially automate plan checks in the TPS. A framework was developed which can be configured with different reference values and types of checks. One example is the prescribed dose check where PCT flags the user when the planned dose and the prescribed dose disagree. PCT includes a comprehensive checklist of automated and manual checks that are documented when performed by the user. A PDF report is created and automatically uploaded into the TMS. Prior to and during PCT development, errors caught during plan checks and also patient delays were tracked in order to prioritize which checks should be automated. The most common and significant errors were determined. Results: Nineteen of 33 checklist items were automated with data extracted with the PCT. These include checks for prescription, reference point and machine scheduling errors which are three of the top six causes of patient delays related to physics and dosimetry. Since the clinical roll-out, no delays have been due to errors that are automatically flagged by the PCT. Development continues to automate the remaining checks. Conclusion: With PCT, 57% of the physics plan checklist has been partially or fully automated. Treatment delays have declined since release of the PCT for clinical use. By tracking delays and errors, we have been able to measure the effectiveness of automating checks and are using this information to prioritize future development. This project was supported in part by P01CA059827.

  13. The quantitative check-measure of the bend strain parameters of the rotating components

    Institute of Scientific and Technical Information of China (English)

    李文华; 乔中涛

    2002-01-01

    Based on the principle of the electric-magnetic check-measure, this paper puts forward a new technology and method that use the magnetic marks to check and measure the dynamic physical parameters such as angle speed, bending strain,stress and bending moment. The principles of the check-measure and the dealing and exchanging technology about signals have been demonstrated and the rotating components have been made up. The timely and quantitative check-measure of the dynamic physical parameters during the component in working has been realized by using computer control.

  14. Subsumption Checking between Concept Queries in Different Ontologies Based on Mutual Instances

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper proposes a checking method based on mutual instances and discusses three key problems in the method: how to deal with mistakes in the mutual instances and how to deal with too many or too few mutual instances. It provides the checking based on the weighted mutual instances considering fault tolerance, gives a way to partition the large-scale mutual instances, and proposes a process greatly reducing the manual annotation work to get more mutual instances. Intension annotation that improves the checking method is also discussed. The method is practical and effective to check subsumption relations between concept queries in different ontologies based on mutual instances.

  15. The Structure of Wheel Check Valve Influence on Air Block Phenomenon of Piezoelectric Micro-Pump

    OpenAIRE

    Song Chen; Yong Liu; Yanhu Shen; Jiantao Wang; Zhigang Yang

    2015-01-01

    To improve the stability and reliability of the piezoelectric micro-pump, the cause of air block phenomenon is analyzed on the structure of wheel check valve. During the movement of the bubble in the micro-channel, pressure drop occurs, the main factor which influences the bubble going through is opening height of the wheel check valve. Five groups of wheel check valves with different structures are used to test the wheel check valve opening height and air block probability. The experiment re...

  16. Check Point收购诺基亚的安全设备业务

    Institute of Scientific and Technical Information of China (English)

    谢晴

    2009-01-01

    5月11日,Check Point宣布完成收购诺基亚的安全设备业务,这是双方长达12年紧密合作后的合理演进。除了Check Point UTM-1以及Power-1设备外,现在客户还可向Check Point直接购买先前在诺基亚IP硬件平台上运行Check Point安全软件的设备。

  17. Check Point完成诺基亚安全业务收购

    Institute of Scientific and Technical Information of China (English)

    阿呆

    2009-01-01

    Check Point日前宣布,已经完成收购诺基亚的安全设备业务,这是双方长达12年紧密合作后的合理演进。除了Check Point UTM-1以及Power-1设备,现在Check Point还直接销售先前在诺基亚IP硬件平台上运行Check Point安全软件的设备。

  18. ErrorCheck: A New Method for Controlling the Accuracy of Pose Estimates

    DEFF Research Database (Denmark)

    Holm, Preben Hagh Strunge; Petersen, Henrik Gordon

    2011-01-01

    In this paper, we present ErrorCheck, which is a new method for controlling the accuracy of a computer vision based pose refinement method. ErrorCheck consists of a way for validating robustness of a pose refinement method towards false correspondences and a way of controlling the accuracy...... of a validated pose refinement method. ErrorCheck uses a theoretical estimate of the pose error covariance both for validating robustness and controlling the accuracy.We illustrate the first usage of ErrorCheck by applying it to state-of-the-art methods for pose refinement and some variations of these methods...

  19. Drug Checking: A prevention measure for a heterogeneous group with high consumption frequency and polydrug use - evaluation of zurich's drug checking services

    Directory of Open Access Journals (Sweden)

    Schaub Michael

    2011-06-01

    Full Text Available Abstract Background The increasing party culture in Zurich presents new challenges, especially regarding the consumption of alcohol and so-called party drugs. Streetwork, the youth advisory service of the city of Zurich, has provided onsite and stationary Drug Checking facilities since 2001 and 2006, respectively. Drug Checking always involves filling out an anonymous questionnaire, which allows the collection of important information about a largely unknown group of users and their consumption patterns. Methods The questionnaires assessed sociodemographic characteristics, consumption patterns, Drug Checking experiences, information behavior and social support. The collected data were statistically analyzed by the Research Institute for Public Health and Addiction (RIPHA. Results The majority of Drug Checking service patrons were male and between 20 and 35 years old. These patrons reported high lifetime prevalences and high consumption frequencies of legal and illegal substances, and they often reported polydrug use. Aside from tobacco and alcohol, the most consumed drugs during typical party nights were ecstasy, amphetamines, cannabis and cocaine. Party drug consumers using Drug Checking services form a heterogeneous group with respect to sociodemographic characteristics and consumption patterns. Users of the onsite Drug Checking facilities were significantly younger, were less experienced with drug testing, and reported more polydrug use than users of the stationary Drug Checking service. Conclusions Drug Checking combined with a consultation appears to be an important harm reduction and prevention measure that reaches a group of consumers with high consumption frequency and polydrug use. Because of the heterogeneity of the target group, different prevention measures must be offered and embedded in an overall local concept.

  20. Commissioning and Implementation of an EPID Based IMRT QA System "Dosimetry Check" for 3D Absolute Dose Measurements and Quantitative Comparisons to MapCheck

    Science.gov (United States)

    Patel, Jalpa A.

    The software package "Dosimetry Check" by MathResolutions, LLC, provides an absolute 3D volumetric dose measurement for IMRT QA using the existing Electronic Portal Imaging Device (EPID) mounted on most linear accelerators. This package provides a feedback loop using the patient's treatment planning CT data as the phantom for dose reconstruction. The aim of this work is to study the difference between point, planar and volumetric doses with MapCheck and Dosimetry Check via the use of the EPID and the diode array respectively. Evaluating tools such as point doses at isocenter, 1-D profiles, gamma volume histograms, and dose volume histograms are used for IMRT dose comparison in three types of cases: head and neck, prostate, and lung. Dosimetry Check can be a valuable tool for IMRT QA as it uses patient specific attenuation corrections and the superiority of the EPID as compared to the MapCheck diode array. This helps reduce the uncertainty in dose for less variability in delivery and a more realistic measured vs computed dose verification system as compared to MapCheck.

  1. Cross-checking different sources of mobility information.

    Directory of Open Access Journals (Sweden)

    Maxime Lenormand

    Full Text Available The pervasive use of new mobile devices has allowed a better characterization in space and time of human concentrations and mobility in general. Besides its theoretical interest, describing mobility is of great importance for a number of practical applications ranging from the forecast of disease spreading to the design of new spaces in urban environments. While classical data sources, such as surveys or census, have a limited level of geographical resolution (e.g., districts, municipalities, counties are typically used or are restricted to generic workdays or weekends, the data coming from mobile devices can be precisely located both in time and space. Most previous works have used a single data source to study human mobility patterns. Here we perform instead a cross-check analysis by comparing results obtained with data collected from three different sources: Twitter, census, and cell phones. The analysis is focused on the urban areas of Barcelona and Madrid, for which data of the three types is available. We assess the correlation between the datasets on different aspects: the spatial distribution of people concentration, the temporal evolution of people density, and the mobility patterns of individuals. Our results show that the three data sources are providing comparable information. Even though the representativeness of Twitter geolocated data is lower than that of mobile phone and census data, the correlations between the population density profiles and mobility patterns detected by the three datasets are close to one in a grid with cells of 2×2 and 1×1 square kilometers. This level of correlation supports the feasibility of interchanging the three data sources at the spatio-temporal scales considered.

  2. a Quality Analysis and Uncertainty Modeling Approach for Crowd-Sourcing Location Check-In Data

    Science.gov (United States)

    Zhou, M.; Hu, Q.; Wang, M.

    2013-05-01

    The location check-in data, developing along with social network, are considered as user-generated crowd-sourcing geospatial data. With massive data volume, abundance in contained information, and high up-to-date status, the check-in data provide a new data source for geographic information service represented by location-based service. However, there is a significant quality issue regarding to crowd-sourcing data, which has a direct influence to data availability. In this paper, a data quality analysis approach is designed for the location check-in data and a check-in data uncertainty model is proposed. First of all, the quality issue of location check-in data is discussed. Then, according to the characteristics of check-in data, a location check-in data quality analysis and data processing approach is proposed, using certain standard dataset as reference to conduct an affine transformation for the check-in dataset, during which the RANSAC algorithm is adopted for outlier elimination. Subsequently, combining GIS data uncertainty theory, an uncertainty model of processed check-in data is set up. At last, using location check-in data obtained from jiepang.com as experimental data and selected navigation data as data standard, multiple location check-in data quality analysis and uncertainty modeling experiments are conducted. By comprehensive analysis of experimental results, the feasibility of proposed location checkin data quality analysis and process approach and the availability of proposed uncertainty model are verified. The novel approach is proved to have a certain practical significance to the study of the quality issue of crowd-sourcing geographic data.

  3. General health checks in adults for reducing morbidity and mortality from disease

    DEFF Research Database (Denmark)

    Krogsbøll, Lasse T; Jørgensen, Karsten Juhl; Grønhøj Larsen, Christian;

    2012-01-01

    To quantify the benefits and harms of general health checks in adults with an emphasis on patient-relevant outcomes such as morbidity and mortality rather than on surrogate outcomes.......To quantify the benefits and harms of general health checks in adults with an emphasis on patient-relevant outcomes such as morbidity and mortality rather than on surrogate outcomes....

  4. General health checks in adults for reducing morbidity and mortality from disease

    DEFF Research Database (Denmark)

    Krogsbøll, Lasse T; Jørgensen, Karsten Juhl; Grønhøj Larsen, Christian;

    2012-01-01

    General health checks are common elements of health care in some countries. These aim to detect disease and risk factors for disease with the purpose of reducing morbidity and mortality. Most of the commonly used screening tests offered in general health checks have been incompletely studied. Also...

  5. The Structure of Wheel Check Valve Influence on Air Block Phenomenon of Piezoelectric Micro-Pump

    Directory of Open Access Journals (Sweden)

    Song Chen

    2015-11-01

    Full Text Available To improve the stability and reliability of the piezoelectric micro-pump, the cause of air block phenomenon is analyzed on the structure of wheel check valve. During the movement of the bubble in the micro-channel, pressure drop occurs, the main factor which influences the bubble going through is opening height of the wheel check valve. Five groups of wheel check valves with different structures are used to test the wheel check valve opening height and air block probability. The experiment results show that reducing the wheel check valve thickness or diameter ratio can both increase the wheel check valve opening height, and decrease the air block probability. Through experiment, the optimum combination of the wheel check valve structure is obtained within the samples: as the thickness is 0.02 mm, the diameter ratio is 1.2, the wheel check valve opening height gets 252 µm, and within the given bubble volume, the air block probability is less than 2%.

  6. 21 CFR 1301.93 - Sources of information for employee checks.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Sources of information for employee checks. 1301...-Practitioners § 1301.93 Sources of information for employee checks. DEA recommends that inquiries concerning... place of birth, and other identifying information, to local courts and law enforcement agencies...

  7. Examination of body checking, body image dissatisfaction, and negative affect using Ecological momentary assessment.

    Science.gov (United States)

    Stefano, Emily C; Hudson, Danae L; Whisenhunt, Brooke L; Buchanan, Erin M; Latner, Janet D

    2016-08-01

    Research has shown that non-clinical women, particularly those with high body concern, engage in frequent body checking behaviors. The purpose of this study was to use ecological momentary assessment (EMA) to examine the frequency and correlates of body checking behavior, including its association with body image dissatisfaction and negative affect, in non-clinical women with high body concern. Undergraduate female participants with high body concern (n=22) were assessed five times per day for five days via text messages sent to their smart phones. During each assessment, participants reported the number of times they engaged in eight different body checking behaviors and their current level of negative affect and body dissatisfaction. After aggregation, a total of 3064 body checking behaviors were reported by the sample during the five-day period. All participants reported engaging in body checking at least once per day, with a mean of 27.85 checking behaviors per day. Hierarchical Linear Modeling revealed that body checking significantly predicted both body dissatisfaction and negative affect. These results provide preliminary support for the cognitive behavioral theory of eating disorders, suggesting that as women engage in more frequent body checking behaviors, they also experience higher levels of body dissatisfaction and negative affect. PMID:27086048

  8. 14 CFR 91.171 - VOR equipment check for IFR operations.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false VOR equipment check for IFR operations. 91... Instrument Flight Rules § 91.171 VOR equipment check for IFR operations. (a) No person may operate a civil aircraft under IFR using the VOR system of radio navigation unless the VOR equipment of that aircraft—...

  9. 40 CFR 86.322-79 - NDIR CO2 rejection ratio check.

    Science.gov (United States)

    2010-07-01

    ...) Record the CO2 calibration gas concentration in ppm. (d) Record the analyzers' response (AR) in ppm to... 40 Protection of Environment 18 2010-07-01 2010-07-01 false NDIR CO2 rejection ratio check. 86.322....322-79 NDIR CO2 rejection ratio check. (a) Zero and span the analyzer on the lowest range that will...

  10. 75 FR 79312 - Requirements for Fingerprint-Based Criminal History Records Checks for Individuals Seeking...

    Science.gov (United States)

    2010-12-20

    ... test reactor licensees to obtain a fingerprint- based criminal history records check before granting...; ] NUCLEAR REGULATORY COMMISSION 10 CFR Part 73 RIN 3150-AI25 Requirements for Fingerprint-Based Criminal History Records Checks for Individuals Seeking Unescorted Access to Research or Test Reactors...

  11. Gender Check - veel kord soolisusest Ida-Euroopa kunstis / Mare Tralla

    Index Scriptorium Estoniae

    Tralla, Mare, 1967-

    2010-01-01

    Novembris 2010 Viinis toimunud konverentsist, kus analüüsiti näituse "Gender Check. Feminiinsus ja maskuliinsus Ida-Euroopa kunstis" kogemust ning sellele eelnenud ja järgnenud uurimistöö tulemusi. Esitleti artiklite kogumikku "Gender check: a reader : art and theory in Eastern Europe". "Gender Checki" projekti edasisest saatusest ja mõjust

  12. 42 CFR 84.137 - Inhalation and exhalation valves; check valves; minimum requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Inhalation and exhalation valves; check valves... PROTECTIVE DEVICES Supplied-Air Respirators § 84.137 Inhalation and exhalation valves; check valves; minimum requirements. (a) Inhalation and exhalation valves shall be provided where necessary and protected...

  13. 32 CFR Appendix A to Part 86 - Criminal History Background Check Procedures

    Science.gov (United States)

    2010-07-01

    ..., security office, criminal investigators, or local law enforcement) local files checks, Drug and Alcohol... using currently established procedures for completing background checks described in 32 CFR part 310... report through the Privacy Program described in 32 CFR part 310. The individual may provide...

  14. 28 CFR 105.23 - Procedure for requesting criminal history record check.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Procedure for requesting criminal history record check. 105.23 Section 105.23 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting...

  15. Teaching Children with Autism Spectrum Disorders to Check the Spelling of Words

    Science.gov (United States)

    Kagohara, Debora M.; Sigafoos, Jeff; Achmadi, Donna; O'Reilly, Mark; Lancioni, Giulio

    2012-01-01

    This study aimed to teach two students with autism spectrum disorders (ASD) to check the spelling of words using the spell-check function on common word processor programs. A multiple-baseline across participants design with baseline, video modeling, and follow-up phases was implemented. During baseline, the participants performed less than 40% of…

  16. 31 CFR 515.531 - Payment of certain checks and drafts.

    Science.gov (United States)

    2010-07-01

    ... Licenses, Authorizations, and Statements of Licensing Policy § 515.531 Payment of certain checks and drafts... $500; or (ii) The check or draft was within the United States in process of collection by a domestic... authorization contained in this section shall expire at the close of business on August 8, 1963....

  17. 27 CFR 70.61 - Payment by check or money order.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Payment by check or money... Collection of Excise and Special (Occupational) Tax Receipt of Payment § 70.61 Payment by check or money... State, Territory, or possession of the United States, or money orders in payment for internal...

  18. 26 CFR 301.6311-1 - Payment by check or money order.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Payment by check or money order. 301.6311-1... by check or money order. (a) Authority to receive—(1) In general. (i) District directors, Service... District of Columbia, or any possession of the United States, or money orders in payment for...

  19. 75 FR 40033 - Proposed Collection; Comment Request for Taxpayer Advocacy Panel (TAP) Tax Check Waiver

    Science.gov (United States)

    2010-07-13

    ... Internal Revenue Service Proposed Collection; Comment Request for Taxpayer Advocacy Panel (TAP) Tax Check...(c)(2)(A)). Currently, the IRS is soliciting comments concerning Taxpayer Advocacy Panel (TAP) Tax...: Taxpayer Advocacy Panel (TAP) Tax Check Waiver. OMB Number: 1545-2092. Abstract: Taxpayer Advocacy...

  20. PVeStA: A Parallel Statistical Model Checking and Quantitative Analysis Tool

    KAUST Repository

    AlTurki, Musab

    2011-01-01

    Statistical model checking is an attractive formal analysis method for probabilistic systems such as, for example, cyber-physical systems which are often probabilistic in nature. This paper is about drastically increasing the scalability of statistical model checking, and making such scalability of analysis available to tools like Maude, where probabilistic systems can be specified at a high level as probabilistic rewrite theories. It presents PVeStA, an extension and parallelization of the VeStA statistical model checking tool [10]. PVeStA supports statistical model checking of probabilistic real-time systems specified as either: (i) discrete or continuous Markov Chains; or (ii) probabilistic rewrite theories in Maude. Furthermore, the properties that it can model check can be expressed in either: (i) PCTL/CSL, or (ii) the QuaTEx quantitative temporal logic. As our experiments show, the performance gains obtained from parallelization can be very high. © 2011 Springer-Verlag.

  1. Field trials of the Baby Check score card: mothers scoring their babies at home.

    Science.gov (United States)

    Thornton, A J; Morley, C J; Green, S J; Cole, T J; Walker, K A; Bonnett, J M

    1991-01-01

    The Baby Check score card has been developed to help parents and health professionals grade the severity of acute illness in babies. This paper reports the results of two field trials in which mothers used Baby Check at home, 104 mothers scoring their babies daily for a week and 56 using it for six months. They all found Baby Check easy to use, between 68% and 81% found it useful, and 96% would recommended it to others. Over 70% of those using it daily used it very competently. Those using it infrequently did less well, suggesting that familiarity with the assessment is important. The scores obtained show that Baby Check's use would not increase the number of mothers seeking medical advice. With introduction and practice most mothers should be able to use Baby Check effectively. It should help them assess their babies' illnesses and make appropriate decisions about seeking medical advice.

  2. Towards Symbolic Model-Based Mutation Testing: Combining Reachability and Refinement Checking

    CERN Document Server

    Aichernig, Bernhard K; 10.4204/EPTCS.80.7

    2012-01-01

    Model-based mutation testing uses altered test models to derive test cases that are able to reveal whether a modelled fault has been implemented. This requires conformance checking between the original and the mutated model. This paper presents an approach for symbolic conformance checking of action systems, which are well-suited to specify reactive systems. We also consider nondeterminism in our models. Hence, we do not check for equivalence, but for refinement. We encode the transition relation as well as the conformance relation as a constraint satisfaction problem and use a constraint solver in our reachability and refinement checking algorithms. Explicit conformance checking techniques often face state space explosion. First experimental evaluations show that our approach has potential to outperform explicit conformance checkers.

  3. Combining Decision Diagrams and SAT Procedures for Efficient Symbolic Model Checking

    DEFF Research Database (Denmark)

    Williams, Poul Frederick; Biere, Armin; Clarke, Edmund M.;

    2000-01-01

    In this paper we show how to do symbolic model checking using Boolean Expression Diagrams (BEDs), a non-canonical representation for Boolean formulas, instead of Binary Decision Diagrams (BDDs), the traditionally used canonical representation. The method is based on standard fixed point algorithms......, combined with BDDs and SAT-solvers to perform satisfiability checking. As a result we are able to model check systems for which standard BDD-based methods fail. For example, we model check a liveness property of a 256 bit shift-and-add multiplier and we are able to find a previously undetected bug...... in the specification of a 16 bit multiplier. As opposed to Bounded Model Checking (BMC) our method is complete in practice. Our technique is based on a quantification procedure that allows us to eliminate quantifiers in Quantified Boolean Formulas (QBF). The basic step of this procedure is the up-one operation...

  4. The value of including spirometry in health checks - a randomized controlled study in primary health care

    DEFF Research Database (Denmark)

    Ørts, Lene Maria; Ottesen, Anders Løkke; Bjerregaard, Anne-Louise;

    with important knowledge about the value of information on spirometry in invitations to health checks measured at different levels of attendance – as described above. Point of discussion The study is part of a Ph.D. project evaluating the use of spirometry as an element in preventive health checks. Further......Background Lung diseases are among the most frequent and most serious ailments in Denmark. Preventive health checks including spirometry can be used to detect lung diseases earlier. Over time the attendance at preventive health checks has decreased and at present the response rate is approximately...... 50%. Little is known about initiatives that can influence the attendance rate. Objectives To examine whether focused information on spirometry in the invitation material will influence the attendance in preventive health checks. Materiel/Methods Design: A randomized controlled study on information...

  5. The Complexity of Checking Consistency of Pedigree Information and Related Problems

    Institute of Scientific and Technical Information of China (English)

    Luca Aceto; Jens A. Hansen; Anna Ingólfsdóttir; Jacob Johnsen; John Knudsen

    2004-01-01

    Consistency checking is a fundamental computational problem in genetics. Given a pedigree and information on the genotypes (of some) of the individuals in it, the aim of consistency checking is to determine whether these data are consistent with the classic Mendelian laws of inheritance. This problem arose originally from the geneticists' need to filter their input data from erroneous information, and is well motivated from both a biological and a sociological viewpoint. This paper shows that consistency checking is NP-complete, even with focus on a single gene and in the presence of three alleles. Several other results on the computational complexity of problems from genetics that are related to consistency checking are also offered. In particular, it is shown that checking the consistency of pedigrees over two alleles, and of pedigrees without loops, can be done in polynomial time.

  6. Got the Flu (or Mumps)? Check the Eigenvalue!

    CERN Document Server

    Prakash, B Aditya; Faloutsos, Michalis; Valler, Nicholas; Faloutsos, Christos

    2010-01-01

    For a given, arbitrary graph, what is the epidemic threshold? That is, under what conditions will a virus result in an epidemic? We provide the super-model theorem, which generalizes older results in two important, orthogonal dimensions. The theorem shows that (a) for a wide range of virus propagation models (VPM) that include all virus propagation models in standard literature (say, [8][5]), and (b) for any contact graph, the answer always depends on the first eigenvalue of the connectivity matrix. We give the proof of the theorem, arithmetic examples for popular VPMs, like flu (SIS), mumps (SIR), SIRS and more. We also show the implications of our discovery: easy (although sometimes counter-intuitive) answers to `what-if' questions; easier design and evaluation of immunization policies, and significantly faster agent-based simulations.

  7. Combining Ratio Estimation for Low Density Parity Check (LDPC) Coding

    Science.gov (United States)

    Mahmoud, Saad; Hi, Jianjun

    2012-01-01

    The Low Density Parity Check (LDPC) Code decoding algorithm make use of a scaled receive signal derived from maximizing the log-likelihood ratio of the received signal. The scaling factor (often called the combining ratio) in an AWGN channel is a ratio between signal amplitude and noise variance. Accurately estimating this ratio has shown as much as 0.6 dB decoding performance gain. This presentation briefly describes three methods for estimating the combining ratio: a Pilot-Guided estimation method, a Blind estimation method, and a Simulation-Based Look-Up table. The Pilot Guided Estimation method has shown that the maximum likelihood estimates of signal amplitude is the mean inner product of the received sequence and the known sequence, the attached synchronization marker (ASM) , and signal variance is the difference of the mean of the squared received sequence and the square of the signal amplitude. This method has the advantage of simplicity at the expense of latency since several frames worth of ASMs. The Blind estimation method s maximum likelihood estimator is the average of the product of the received signal with the hyperbolic tangent of the product combining ratio and the received signal. The root of this equation can be determined by an iterative binary search between 0 and 1 after normalizing the received sequence. This method has the benefit of requiring one frame of data to estimate the combining ratio which is good for faster changing channels compared to the previous method, however it is computationally expensive. The final method uses a look-up table based on prior simulated results to determine signal amplitude and noise variance. In this method the received mean signal strength is controlled to a constant soft decision value. The magnitude of the deviation is averaged over a predetermined number of samples. This value is referenced in a look up table to determine the combining ratio that prior simulation associated with the average magnitude of

  8. Application of risk-based methods to inservice testing of check valves

    International Nuclear Information System (INIS)

    Research efforts have been underway in the American Society of Mechanical Engineers (ASME) and industry to define appropriate methods for the application of risk-based technology in the development of inservice testing (IST) programs for pumps and valves in nuclear steam supply systems. This paper discusses a pilot application of these methods to the inservice testing of check valves in the emergency core cooling system of Georgia Power's Vogtle nuclear power station. The results of the probabilistic safety assessment (PSA) are used to divide the check valves into risk-significant and less-risk-significant groups. This information is reviewed by a plant expert panel along with the consideration of appropriate deterministic insights to finally categorize the check valves into more safety-significant and less safety-significant component groups. All of the more safety-significant check valves are further evaluated in detail using a failure modes and causes analysis (FMCA) to assist in defining effective IST strategies. A template has been designed to evaluate how effective current and emerging tests for check valves are in detecting failures or in finding significant conditions that are precursors to failure for the likely failure causes. This information is then used to design and evaluate appropriate IST strategies that consider both the test method and frequency. A few of the less safety-significant check valves are also evaluated using this process since differences exist in check valve design, function, and operating conditions. Appropriate test strategies are selected for each check valve that has been evaluated based on safety and cost considerations. Test strategies are inferred from this information for the other check valves based on similar check valve conditions. Sensitivity studies are performed using the PSA model to arrive at an overall IST program that maintains or enhances safety at the lowest achievable cost

  9. Application of risk-based methods to inservice testing of check valves

    Energy Technology Data Exchange (ETDEWEB)

    Closky, N.B.; Balkey, K.R.; McAllister, W.J. [and others

    1996-12-01

    Research efforts have been underway in the American Society of Mechanical Engineers (ASME) and industry to define appropriate methods for the application of risk-based technology in the development of inservice testing (IST) programs for pumps and valves in nuclear steam supply systems. This paper discusses a pilot application of these methods to the inservice testing of check valves in the emergency core cooling system of Georgia Power`s Vogtle nuclear power station. The results of the probabilistic safety assessment (PSA) are used to divide the check valves into risk-significant and less-risk-significant groups. This information is reviewed by a plant expert panel along with the consideration of appropriate deterministic insights to finally categorize the check valves into more safety-significant and less safety-significant component groups. All of the more safety-significant check valves are further evaluated in detail using a failure modes and causes analysis (FMCA) to assist in defining effective IST strategies. A template has been designed to evaluate how effective current and emerging tests for check valves are in detecting failures or in finding significant conditions that are precursors to failure for the likely failure causes. This information is then used to design and evaluate appropriate IST strategies that consider both the test method and frequency. A few of the less safety-significant check valves are also evaluated using this process since differences exist in check valve design, function, and operating conditions. Appropriate test strategies are selected for each check valve that has been evaluated based on safety and cost considerations. Test strategies are inferred from this information for the other check valves based on similar check valve conditions. Sensitivity studies are performed using the PSA model to arrive at an overall IST program that maintains or enhances safety at the lowest achievable cost.

  10. SU-D-BRD-01: An Automated Physics Weekly Chart Checking System Supporting ARIA

    Energy Technology Data Exchange (ETDEWEB)

    Chang, X; Yang, D [Washington University in St Louis, St Louis, MO (United States)

    2015-06-15

    Purpose: A software tool was developed in this study to perform automatic weekly physics chart check on the patient data in ARIA. The tool accesses the electronic patient data directly from ARIA server and checks the accuracy of treatment deliveries, and generates reports which summarize the delivery history and highlight the errors. Methods: The tool has four modules. 1) The database interface is designed to directly access treatment delivery data from the ARIA database before reorganizing the data into the patient chart tree (PCT). 2) PCT is a core data structure designed to store and organize the data in logical hierarchies, and to be passed among functions. 3) The treatment data check module analyzes the organized data in PCT and stores the checking results into PCT. 4) Report generation module generates reports containing the treatment delivery summary, chart checking results and plots of daily treatment setup parameters (couch table positions, shifts of image guidance). The errors that are found by the tool are highlighted with colors. Results: The weekly check tool has been implemented in MATLAB and clinically tested at two major cancer centers. Javascript, cascading style sheets (CSS) and dynamic HTML were employed to create the user-interactive reports. It takes 0.06 second to search the delivery records of one beam with PCT and compare the delivery records with beam plan. The reports, saved in the HTML files on shared network folder, can be accessed by web browser on computers and mobile devices. Conclusion: The presented weekly check tool is useful to check the electronic patient treatment data in Varian ARIA system. It could be more efficient and reliable than the manually check by physicists. The work was partially supported by a research grant from Varian Medical System.

  11. Check Point Puts Out Completely New Solution VPN-I VE%Check Point推出全新解决方案VPN-1 VE

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ 日前,Check Point软件技术有限公司推出了VPN-1虚拟版本(VE),它能为虚拟应用程序提供财富500强用于企业网络和数据中心一样水平的安全保护.Check Point是首个可同时为物理网络和虚拟应用程序提供统一网络管理的厂商.

  12. The Check Your Cannabis Screener: A New Online Personalized Feedback Tool

    OpenAIRE

    Cunningham, John A; van Mierlo, Trevor

    2009-01-01

    This brief report describes the development and first year of use of an Internet-based screener for Cannabis users. Two versions of the Check Your Cannabis screener were compared, one linked to an already established harm reduction website for young Cannabis users (as an exercise called “Check how I compare with others,” on www.WhatsWithWeed.ca) and the other a standalone version (www.CheckYourCannabis.net). The What’s With Weed version attracted ten times more users and had a significantly y...

  13. An Approach to Checking 3D Model with Related Engineering Drawings

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    For some reasons, engineers build their product 3D mo del according to a set of related engineering drawings. The problem is how we ca n know the 3D model is correct. The manual checking is very boring and time cons uming, and still could not avoid mistakes. Thus, we could not confirm the model, maybe try checking again. It will effect the production preparing cycle greatly , and should be solved in a intelligent way. The difficulties are quite obvious, unlike word checking in a word processing package, ...

  14. The interfollicular epidermal stem cell saga: sensationalism versus reality check.

    Science.gov (United States)

    Kaur, Pritinder; Potten, Christopher S

    2011-09-01

    Adult stem cells in rapidly renewing tissues have been classically defined as rare, relatively quiescent cells with the unique capacity to constantly self-renew and regenerate tissues during homeostasis. Although this view remains firmly embedded in the skin field, particularly in the area of hair follicle stem cell biology, it has been challenged by a number of notable publications in 2007. These papers leave an uncomfortable feeling with the reader if one believes that stem cells and transit amplifying cells are two polar opposites and 'never the twain shall meet.' Even if you do not subscribe to this extreme view, the implications appear to be far-reaching given that the majority of techniques devised for stem cell identification have used the fundamental tenet that the proliferating compartment is comprised of two distinct, mutually exclusive compartments, i.e. a minor proportion of long-lived quiescent stem cells with unlimited self-renewal and a large pool of rapidly cycling, short-lived transient amplifying cells with limited or no self-renewal capacity in normal steady-state conditions. However, these recent findings have resulted in papers that could be described as sensationalistic because they make little or no attempt to reconcile their observations with the large bulk of historical data with direct bearing on the interpretation of stem cell activity in normal steady-state conditions. Here, we offer some explanations that may help to integrate all of the data while presenting a case that both quiescent stem cells and cycling 'transit amplifying' cells contribute to epidermal replacement. PMID:21834906

  15. A transactional approach to preventing early childhood neglect: The Family Check-Up as a public health strategy.

    Science.gov (United States)

    Dishion, Thomas J; Mun, Chung Jung; Drake, Emily C; Tein, Jenn-Yun; Shaw, Daniel S; Wilson, Melvin

    2015-11-01

    This study examined the hypothesis that a brief, strengths-based home visiting strategy can promote positive engagement between caregiver and child and thereby reduce various forms of early childhood neglect. A total of 731 low-income families receiving services through the Women, Infants, and Children nutritional supplement program were randomized to the Women, Infants, and Children as usual or the Family Check-Up intervention. Assessments and intervention services were delivered in the home environment at ages 2, 3, 4, and 5. During the assessments, staff videotaped caregiver-child interactions and rated various features of the home environment, including the physical appropriateness of the home setting for children. Trained observers later coded the videotapes, unaware of the family's intervention condition. Specific caregiver-child interaction patterns were coded and macroratings were made of the caregiver's affection, monitoring, and involvement with the child. An intention to treat design revealed that randomization to the Family Check-Up increased duration of positive engagement between caregivers and children by age 3, which in turn was prognostic of less neglect of the child at age 4, controlling for family adversity. It was also found that family adversity moderated the impact of the intervention, such that the families with the most adverse circumstances were highly responsive to the intervention. Families with the highest levels of adversity exhibited the strongest mediation between positive engagement and reduction of neglect. Findings are discussed with respect to developmental theory and their potential implications for a public health approach to the prevention of early childhood maltreatment. PMID:26535950

  16. What African Americans with Diabetes or High Blood Pressure Need to Know: Get Checked for Kidney Disease

    Science.gov (United States)

    ... Language URL What African Americans with Diabetes or High Blood Pressure Need to Know Page Content Get Checked for ... I be checked for kidney disease? Diabetes and high blood pressure can damage the kidneys and lead to kidney ...

  17. Deterministic Compilation of Temporal Safety Properties in Explicit State Model Checking

    Data.gov (United States)

    National Aeronautics and Space Administration — The translation of temporal logic specifications constitutes an essen- tial step in model checking and a major influence on the efficiency of formal verification...

  18. 40 CFR 86.319-79 - Analyzer checks and calibrations; frequency and overview.

    Science.gov (United States)

    2010-07-01

    ... testing, check the NOX converter efficiency, as described in § 86.332. (c) At least once every 30 days...) Verify that the automatic data collection system (if used) meets the chart reading requirements found...

  19. Low-Density Parity-Check Codes for High Data Rate Receivers Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Low-Density Parity-Check (LDPC) Forward Error Correction (FEC) schemes are excellent tools in optimizing telemetry data integrity within the limited space to ground...

  20. [Southeastern Cooperative wildlife disease study: Tennessee National Wildlife Refuge deer herd health checks

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Enclosed are the reports on the deer herd health checks conducted on the Big Sandy and Duck River Units of Tennessee National Wildlife Refuge, Henry and Humphrey...

  1. Neural Network Approach to Automated Condition Classification of a Check Valve by Acoustic Emission Signals

    International Nuclear Information System (INIS)

    This paper presents new techniques under development for monitoring the health and vibration of the active components in nuclear power plants, The purpose of this study is to develop an automated system for condition classification of a check valve one of the components being used extensively in a safety system of a nuclear power plant. Acoustic emission testing for a check valve under controlled flow loop conditions was performed to detect and evaluate disc movement for valve failure such as wear and leakage due to foreign object interference in a check valve, It is clearly demonstrated that the evaluation of different types of failure types such as disc wear and check valve leakage were successful by systematically analyzing the characteristics of various AE parameters, It is also shown that the leak size can be determined with an artificial neural network

  2. Efficient Symmetry Reduction and the Use of State Symmetries for Symbolic Model Checking

    Directory of Open Access Journals (Sweden)

    Christian Appold

    2010-06-01

    Full Text Available One technique to reduce the state-space explosion problem in temporal logic model checking is symmetry reduction. The combination of symmetry reduction and symbolic model checking by using BDDs suffered a long time from the prohibitively large BDD for the orbit relation. Dynamic symmetry reduction calculates representatives of equivalence classes of states dynamically and thus avoids the construction of the orbit relation. In this paper, we present a new efficient model checking algorithm based on dynamic symmetry reduction. Our experiments show that the algorithm is very fast and allows the verification of larger systems. We additionally implemented the use of state symmetries for symbolic symmetry reduction. To our knowledge we are the first who investigated state symmetries in combination with BDD based symbolic model checking.

  3. Design of Bidirectional Check Valve for Discrete Fluid Power Force System for Wave Energy Converters

    DEFF Research Database (Denmark)

    Hansen, Anders Hedegaard; Pedersen, Henrik C.; Andersen, Torben Ole

    2014-01-01

    Discrete fluid power force systems consisting of a multichamber cylinder, a witching manifold and common pressure lines have been proposed as a technology for increasing the efficiency of the power take off system in ocean wave energy converters. However the force shifting of these discrete systems...... introduces large switching losses, especially when large pressure difference is present across the valves in the manifold. The current paper therefore focus on designing a bidirectional check valve for use in the switching manifold of the discrete force systems. The use of the bidirectional check valve...... enables passive force switching under minimal pressure difference, hence minimal energy loss. The bidirectional check valve is designed with a rated flow in the range of 1000L/min@5bar. The flow direction of the bidirectional check valve is set by the setting the pilot pressure. This paper presents...

  4. CrossCheck plagiarism screening : Experience of the Journal of Epidemiology

    Science.gov (United States)

    Hashimoto, Katsumi

    Due to technological advances in the past two decades, researchers now have unprecedented access to a tremendous amount of useful information. However, because of the extreme pressure to publish, this abundance of information can sometimes tempt researchers to commit scientific misconduct. A serious form of such misconduct is plagiarism. Editors are always concerned about the possibility of publishing plagiarized manuscripts. The plagiarism detection tool CrossCheck allows editors to scan and analyze manuscripts effectively. The Journal of Epidemiology took part in a trial of CrossCheck, and this article discusses the concerns journal editors might have regarding the use of CrossCheck and its analysis. In addition, potential problems identified by CrossCheck, including self-plagiarism, are introduced.

  5. 78 FR 55014 - Machine Guns, Destructive Devices and Certain Other Firearms; Background Checks for Responsible...

    Science.gov (United States)

    2013-09-09

    ... for each responsible person, including each responsible person's full name, position, social security... information, including the responsible person's full name, position, social security number (optional), home..., Destructive Devices and Certain Other Firearms; Background Checks for Responsible Persons of a...

  6. Gamma field characterization within building area of new sanitary check point

    International Nuclear Information System (INIS)

    Results of angular distribution, gamma spectra and exposure dose rate measurements at different height from earth surface within building site of new sanitary check point are submitted. Analysis of data collected is made

  7. Check Point完成收购诺基亚的安全设备业务

    Institute of Scientific and Technical Information of China (English)

    李明

    2009-01-01

    互联网安全保护领域首屈一指的Check Point软件技术有限公司宣布,该公司已经完成收购诺基亚的安全设备业务,这是双方长达12年紧密合作后的合理演进。除了Check Point UTMJ以及Power-1设备,现在客户可向Check Point直接购买先前在诺基亚口硬件平台上运行Check Point安全软件的设备。

  8. The check your cannabis screener: a new online personalized feedback tool.

    Science.gov (United States)

    Cunningham, John A; van Mierlo, Trevor

    2009-01-01

    This brief report describes the development and first year of use of an Internet-based screener for Cannabis users. Two versions of the Check Your Cannabis screener were compared, one linked to an already established harm reduction website for young Cannabis users (as an exercise called "Check how I compare with others," on www.WhatsWithWeed.ca) and the other a standalone version (www.CheckYourCannabis.net). The What's With Weed version attracted ten times more users and had a significantly younger audience as compared to the standalone version, underlining the benefits of targeting a website to a specific audience and linking to websites with already established reputations. Further work is needed to establish any impact on actual Cannabis use from taking the Check Your Cannabis screener.

  9. Mitigating check valve slamming and subsequentwater hammer events for PPFS using MOC

    Institute of Scientific and Technical Information of China (English)

    TIAN Wenxi; SU Guanghui; WANG Gaopeng; QIU Suizheng; XIAO Zejun

    2009-01-01

    The method of characteristic (MOC) was adopted to analyze the check valve-induced water hammer behaviors for a Parallel Pumps Feedwater System (PPFS) during the alternate startup process. The motion of check valve disc was simulated using inertial valve model. Transient parameters including the pressure oscillation, local flow velocity and slamming of the check valve disc etc. have been obtained. The results showed that severe slamming between the valve disc and valve seat occurred during the alternate startup of parallel pumps. The induced maximum pressure vibration amplitude is up to 5.0 MPa. The scheme of appending a damping torque to slow down the check valve closing speed was also performed to mitigate of water hammer. It has been numerically approved to be an effective approach.

  10. THE CRITICALITY DEFINITIONS OF INFORMATION MANAGEMENT NETWORK UNITS IN VIEW OF CHECKING PROCEDURES

    Directory of Open Access Journals (Sweden)

    Mr. Sergey A. Sherstobitov

    2016-09-01

    Full Text Available The problem of improving quality of work of a complex system, depending on system components that have the greatest influence on its performance is being analyzed in the paper. The author justifies the urgency of solving the problem of determining the critical elements of the system under certain probabilistic performance of their work. The probable model of information management system is considered, the effect of checking procedures at different stages of the management cycle is investigated. The article discusses an approach to the definition of critical components of information management network in view of checking its parameters at different stages. The sensitivity of the probable error-free system operation in relation to the probabilities of stage checking is adopted as an indicator of the criticality. Finally, a numerical example of the sensitivity calculation of probable error-free system operation in relation to the probable checking of stages based on the proposed model is submitted.

  11. Consistency check on volume and triad operator quantization in loop quantum gravity: II

    Energy Technology Data Exchange (ETDEWEB)

    Giesel, K [MPI f. Gravitationsphysik, Albert-Einstein-Institut, Am Muehlenberg 1, 14476 Potsdam (Germany); Thiemann, T [MPI f. Gravitationsphysik, Albert-Einstein-Institut, Am Muehlenberg 1, 14476 Potsdam (Germany)

    2006-09-21

    In this paper, we provide the techniques and proofs for the results presented in our companion paper concerning the consistency check on volume and triad operator quantization in loop quantum gravity.

  12. Southeastern Cooperative wildlife disease study: Tennessee National Wildlife Refuge deer herd health checks

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Enclosed are our reports on the deer herd health checks we conducted on the Duck River and Big Sandy Units, Tennessee National Wildlife Refuge, Humphrey and Henry...

  13. SPELL CHECKING AND ERROR CORRECTING SYSTEM FOR TEXT PARAGRAPHS WRITTEN IN PUNJABI OR HINDI LANGUAGEUSING HYBRID APPROACH

    OpenAIRE

    Amandeep Singh; Prof. Meenakshi Sharma

    2016-01-01

    Spell-checking is the process of detecting and correcting incorrectly spelled words in a text paragraph. Spell checking system first detects the incorrect words and then provide the best possible solution of corrected words. Spell checking system is a combination of handcrafted rules of the language for which spell checking system is to be created and a dictionary which contain the accurate spellings of various words. Better rules and large dictionary of words is help to improve the rate of e...

  14. Library-based scalable refinement checking for contract-based design

    OpenAIRE

    Iannopollo, A; Nuzzo, P; Tripakis, S; Sangiovanni-Vincentelli, A.

    2014-01-01

    Given a global specification contract and a system described by a composition of contracts, system verification reduces to checking that the composite contract refines the specification contract, i.e. that any implementation of the composite contract implements the specification contract and is able to operate in any environment admitted by it. Contracts are captured using high-level declarative languages, for example, linear temporal logic (LTL). In this case, refinement checking reduces to ...

  15. Model checking and strategy synthesis for stochastic games: from theory to practice

    OpenAIRE

    Kwiatkowska, MZ

    2016-01-01

    Probabilistic model checking is an automatic procedure for establishing if a desired property holds in a probabilistic model, aimed at verifying quantitative probabilistic specifications such as the probability of a critical failure occurring or expected time to termination. Much progress has been made in recent years in algorithms, tools and applications of probabilistic model checking, as exemplified by the probabilistic model checker PRISM (www.prismmodelchecker.org). However, the unstoppa...

  16. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    OpenAIRE

    Bing Du; Jun Zhang

    2010-01-01

    A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC) model, a common compact model in hierarchical wireless sensor networks (WSNs). The scheme uses Low-Density Parity-Check (LDPC) as the ...

  17. Checking Fine and Gray Subdistribution Hazards Model with Cumulative Sums of Residuals

    OpenAIRE

    Li, Jianing; Scheike, Thomas H.; Zhang, Mei-Jie

    2014-01-01

    Recently, Fine and Gray (1999) proposed a semi-parametric proportional regression model for the subdistribution hazard function which has been used extensively for analyzing competing risks data. However, failure of model adequacy could lead to severe bias in parameter estimation, and only a limited contribution has been made to check the model assumptions. In this paper, we present a class of analytical methods and graphical approaches for checking the assumptions of Fine and Gray’s model. T...

  18. ELECTRO-RESISTANCE METHOD OF CHECK A PROCESS GRINDING THE ROLLING BEARINGS

    Directory of Open Access Journals (Sweden)

    K. V. Podmasteryev

    2015-01-01

    Full Text Available Base a possibility of monitoring processes of grinding the rolling bearings with use electroresistance method of check. Is write of essence this method, are analyses his peculiarities, which are provide objective information on the condition a object by his grinding. Are consider the results of experimental researches the effective different diagnostically parameters, which are confirm a possibility of realization objective check of grinding the rolling bearings with use electro-resistance method.

  19. Check Point召开中国区代理商发展大会

    Institute of Scientific and Technical Information of China (English)

    王晓梅

    2004-01-01

    10月29日,Check Point公司在北京召开中国区代理商发展大会,中国区总经理金丁在会上宣布,Check Point的全球崭新渠道伙伴合作计划已经在中国全面开展。

  20. Check Point跻身Gartner网络防火墙Magic Quadrant领导者行列

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    在全球互联网安全领域首屈一指的Check Point软件技术有限公司宣布,Gartner在其最近发表的“企业网络防火墙魔术象限”报告(Magic Quadrant)中.把Check Point评为“领导者级别”。

  1. Vocal cord dysfunction diagnosis may be improved by a screening check list

    OpenAIRE

    Lucia Helena Eduardo Pinto; Marcelo Vivolo Aun; Sabrina Cukier-Blaj; Rafael Stelmach; Alberto Cukier; Jorge Kalil; Rosana Câmara Agondi; Pedro Giavina-Bianchi

    2016-01-01

    Background: Many patients with vocal cord dysfunction (VCD), with or without asthma, receive inappropriate treatment because they are misdiagnosed as having difficult-to-control asthma alone. We developed a clinical screening check list designed to aid the diagnosis of VCD. Methods: A prospective observational study involving 80 patients aged ≥18 years, diagnosed with severe asthma. After anamnesis and physical examination, physicians completed a check list with 6 questions to identify VCD...

  2. Five Percent Post Survey Check Of National Family Health Survey (NFHS) In ORISSA

    OpenAIRE

    Kumar Benera Sudhir; Singh Padam

    1999-01-01

    Research questions: How well a post survey sample check of NFHS correlates with the findings of NFHS? Objective: Post survey check of National Family Health Survey carried out in 1992-93. Study design: Multistage sampling method with 5 percent sample of original NFHS sample. Setting: Study covered 5 percent sample of original NFHS sample. Subjects: Five percent household sample (1093 members) of original NFHS sample was studied and compared with NFHS data. Method: Information from five percen...

  3. Recommended Screening-Checks for Placed Orders in Industry Internal Tool- OMS

    OpenAIRE

    Niranjanamurthy M; Dr. Dharmendra Chahar

    2014-01-01

    This paper gives the information and proposed solution regarding Screening Checks for Industry Internal Tool-Order Management System. After placing orders by customers through shopping website the industry people should verify the orders in different ways to avoid loss. Need to do Screening and in different checks for Maximize acceptance of valid orders, Increase customer service productivity, More tailored and effective screening strategies, Minimize online fraud losses. Free up your teams t...

  4. Factors affecting response to an invitation to attend for a health check.

    OpenAIRE

    Thorogood, M; Coulter, A.; Jones, L.; Yudkin, P; Muir, J; Mant, D.

    1993-01-01

    OBJECTIVE--To describe the characteristics of general practice patients who fail to respond to an invitation to attend for a health check, in relation to demographic variables, risk factor status, health status, and attitudes to behaviour modification. DESIGN--Postal questionnaire before invitation to attend a health check and subsequent record of attendance. SETTING--Five urban general practices in Bedfordshire, UK. SUBJECTS--A total of 2678 patients aged 35-64 years were invited for a healt...

  5. A standardized vascular disease health check in europe: a cost-effectiveness analysis.

    Directory of Open Access Journals (Sweden)

    C Andy Schuetz

    Full Text Available BACKGROUND: No clinical trials have assessed the effects or cost-effectiveness of health check strategies to detect and manage vascular disease. We used a mathematical model to estimate the cost-effectiveness of several health check strategies in six European countries. METHODS: We used country-specific data from Denmark, France, Germany, Italy, Poland, and the United Kingdom to generate simulated populations of individuals aged 40-75 eligible for health checks in those countries (e.g. individuals without a previous diagnosis of diabetes, myocardial infarction, stroke, or serious chronic kidney disease. For each country, we used the Archimedes model to compare seven health check strategies consisting of assessments for diabetes, hypertension, lipids, and smoking. For patients diagnosed with vascular disease, treatment was simulated in a standard manner. We calculated the effects of each strategy on the incidence of type 2 diabetes, major adverse cardiovascular events (MACE, and microvascular complications in addition to quality of life, costs, and cost per quality-adjusted life-year (QALY. RESULTS: Compared with current care, health checks reduced the incidence of MACE (6-17 events prevented per 1000 people screened and diabetes related microvasular complications (5-11 events prevented per 1000 people screened, and increased QALYs (31-59 discounted QALYs over 30 years, in all countries. The cost per QALY of offering a health check to all individuals in the study cohort ranged from €14903 (France to cost saving (Poland. Pre-screening the population and offering health checks only to higher risk individuals lowered the cost per QALY. Pre-screening on the basis of obesity had a cost per QALY of €10200 (France or less, and pre-screening with a non-invasive risk score was similar. CONCLUSIONS: A vascular disease health check would likely be cost effective at 30 years in Denmark, France, Germany, Italy, Poland, and the United Kingdom.

  6. Simple and Effective Type Check Removal through Lazy Basic Block Versioning

    OpenAIRE

    Chevalier-Boisvert, Maxime; Feeley, Marc

    2015-01-01

    Dynamically typed programming languages such as JavaScript and Python defer type checking to run time. In order to maximize performance, dynamic language VM implementations must attempt to eliminate redundant dynamic type checks. However, type inference analyses are often costly and involve tradeoffs between compilation time and resulting precision. This has lead to the creation of increasingly complex multi-tiered VM architectures. This paper introduces lazy basic block versioning, a sim...

  7. A personalized system of instruction for teaching checking account skills to adults with mild disabilities.

    OpenAIRE

    Zencius, A H; Davis, P K; Cuvo, A J

    1990-01-01

    This study evaluated the efficacy of a personalized system of instruction to teach checking account skills to persons with mild disabilities. Using a self-paced manual, 8 participants in two groups were taught to write checks, complete deposit slips, and reconcile monthly bank statements. Four participants were assessed for generalization from the classroom to community sites and demonstrated nearly perfect performance. A multiple probe design showed that acquisition occurred sequentially for...

  8. Pre-flight Functionality Check to Enhance Mission Efficacy of Precision Guided Munitions

    Directory of Open Access Journals (Sweden)

    A. K. Maini

    2009-09-01

    Full Text Available Precision-guided munitions (PGMs, because of their precision strike capability, are used extensively in the modern warfare. The efficacy of the mission is critically dependent on the successful deployment of the weapon. To ensure high level of effectiveness of these sophisticated weapons, these must be tested at regular intervals. Periodic functionality checks of these weapons are carried out using comprehensive characterisation systems. In addition to comprehensive testing, pre-flight functionality checks with the weapon strapped on to the launchplatform using portable test systems should be carried out. These functionality checks, also referred to as serviceability checks, perform Go/No Go testing of the weapon by focusing on one or two vital parameters of the guided weapon. Pre-flight functionality check of PGM allows a quick appraisal on the functional status of the vital operational parameters of relevance to efficacy of the mission. This review highlights the parameters that need to be checked, both for comprehensive testing of these weapons on a periodic basis and also those required for pre-flight functionality or readiness checks. International systems available for the purpose have also been reviewed, vis-à-vis, their capabilities and limitations to perform the two types of tests with particular emphasis on the pre-flight functionality checks with guided weapon in strap-on condition. Some alternative design approaches have also been proposed.Defence Science Journal, 2009, 59(5, pp.459-465, DOI:http://dx.doi.org/10.14429/dsj.59.1547

  9. REGULAR LOW-DENSITY PARITY-CHECK CODES BASED ON SHIFTED IDENTITY MATRICES

    Institute of Scientific and Technical Information of China (English)

    He Shanbao; Zhao Chunming; Jiang Ming

    2006-01-01

    This paper extends the class of Low-Density Parity-Check (LDPC) codes that can be constructed from shifted identity matrices. To construct regular LDPC codes, a new method is proposed. Two simple inequations are adopted to avoid the short cycles in Tanner graph, which makes the girth of Tanner graphs at least 8. Because their parity-check matrices are made up of circulant matrices, the new codes are quasi-cyclic codes. They perform well with iterative decoding.

  10. Seeking more Opportunities of Check Dams' harmony with nearby Circumstances via Design Thinking Process

    Science.gov (United States)

    Lin, Huan-Chun; Chen, Su-Chin; Tsai, Chen-Chen

    2014-05-01

    The contents of engineering design should indeed contain both science and art fields. However, the art aspect is too less discussed to cause an inharmonic impact with natural surroundings, and so are check dams. This study would like to seek more opportunities of check dams' harmony with nearby circumstances. According to literatures review of philosophy and cognition science fields, we suggest a thinking process of three phases to do check dams design work for reference. The first phase, conceptualization, is to list critical problems, such as the characteristics of erosion or deposition, and translate them into some goal situations. The second phase, transformation, is to use cognition methods such as analogy, association and metaphors to shape an image and prototypes. The third phase, formation, is to decide the details of the construction, such as stable safety analysis of shapes or materials. According to the previous descriptions, Taiwan's technological codes or papers about check dam design mostly emphasize the first and third phases, still quite a few lacks of the second phase. We emphases designers shouldn't ignore any phase of the framework especially the second one, or they may miss some chances to find more suitable solutions. Otherwise, this conceptual framework is simple to apply and we suppose it's a useful tool to design a more harmonic check dam with nearby natural landscape. Key Words: check dams, design thinking process, conceptualization, transformation, formation.

  11. Hydrologic response of streams restored with check dams in the Chiricahua Mountains, Arizona

    Science.gov (United States)

    Norman, Laura M.; Brinkerhoff, Fletcher C.; Gwilliam, Evan; Guertin, D. Phillip; Callegary, James B.; Goodrich, David C.; Nagler, Pamela L.; Gray, Floyd

    2016-01-01

    In this study, hydrological processes are evaluated to determine impacts of stream restoration in the West Turkey Creek, Chiricahua Mountains, southeast Arizona, during a summer-monsoon season (June–October of 2013). A paired-watershed approach was used to analyze the effectiveness of check dams to mitigate high flows and impact long-term maintenance of hydrologic function. One watershed had been extensively altered by the installation of numerous small check dams over the past 30 years, and the other was untreated (control). We modified and installed a new stream-gauging mechanism developed for remote areas, to compare the water balance and calculate rainfall–runoff ratios. Results show that even 30 years after installation, most of the check dams were still functional. The watershed treated with check dams has a lower runoff response to precipitation compared with the untreated, most notably in measurements of peak flow. Concerns that downstream flows would be reduced in the treated watershed, due to storage of water behind upstream check dams, were not realized; instead, flow volumes were actually higher overall in the treated stream, even though peak flows were dampened. We surmise that check dams are a useful management tool for reducing flow velocities associated with erosion and degradation and posit they can increase baseflow in aridlands.

  12. On Diagnostic Checking of Vector ARMA-GARCH Models with Gaussian and Student-t Innovations

    Directory of Open Access Journals (Sweden)

    Yongning Wang

    2013-04-01

    Full Text Available This paper focuses on the diagnostic checking of vector ARMA (VARMA models with multivariate GARCH errors. For a fitted VARMA-GARCH model with Gaussian or Student-t innovations, we derive the asymptotic distributions of autocorrelation matrices of the cross-product vector of standardized residuals. This is different from the traditional approach that employs only the squared series of standardized residuals. We then study two portmanteau statistics, called Q1(M and Q2(M, for model checking. A residual-based bootstrap method is provided and demonstrated as an effective way to approximate the diagnostic checking statistics. Simulations are used to compare the performance of the proposed statistics with other methods available in the literature. In addition, we also investigate the effect of GARCH shocks on checking a fitted VARMA model. Empirical sizes and powers of the proposed statistics are investigated and the results suggest a procedure of using jointly Q1(M and Q2(M in diagnostic checking. The bivariate time series of FTSE 100 and DAX index returns is used to illustrate the performance of the proposed portmanteau statistics. The results show that it is important to consider the cross-product series of standardized residuals and GARCH effects in model checking.

  13. Postcode Lotteries in Public Health - The NHS Health Checks Programme in North West London

    Directory of Open Access Journals (Sweden)

    McCoy David C

    2011-09-01

    Full Text Available Abstract Background Postcode lotteries in health refer to differences in health care between different geographic areas. These have been previously associated with clinical services. However there has been little documentation of postcode lotteries relating to preventative health care services. This paper describes a postcode lottery effect in relation to the NHS Health Checks Programme (a national cardiovascular screening programme in England in eight PCTs in the North West sector of London. Methods A descriptive cross-sectional analysis of the Health Checks Programme was carried out in eight PCTs in North West London using a structured data-collecting instrument. Results The analysis found variation in the implementation of the national Health Checks Programme in terms of: the screening approach taken; the allocated budget (which varied from £69,000 to £1.4 million per 100,000 eligible population; payment rates made to providers of Health Checks; tools used to identify and measure risk of cardiovascular disease and diabetes; monitoring and evaluation; and preventative services available following the health check. Conclusions This study identifies a postcode lottery effect related to a national public health programme. Although it is important to allow enough flexibility in the design of the Health Checks Programme so that it fits in with local factors, aspects of the programme may benefit from greater standardisation or stronger national guidance.

  14. Influence of check dams on debris-flow run-out intensity

    Directory of Open Access Journals (Sweden)

    A. Remaître

    2008-12-01

    Full Text Available Debris flows are very dangerous phenomena claiming thousands of lives and millions of Euros each year over the world. Disaster mitigation includes non-structural (hazard mapping, insurance policies, active structural (drainage systems and passive structural (check dams, stilling basins countermeasures. Since over twenty years, many efforts are devoted by the scientific and engineering communities to the design of proper devices able to capture the debris-flow volume and/or break down the energy. If considerable theoretical and numerical work has been performed on the size, the shape and structure of check dams, allowing the definition of general design criteria, it is worth noting that less research has focused on the optimal location of these dams along the debris-flow pathway.

    In this paper, a methodological framework is proposed to evaluate the influence of the number and the location of the check dams on the reduction of the debris-flow intensity (in term of flow thickness, flow velocity and volume. A debris-flow model is used to simulate the run-out of the debris flow. The model uses the Janbu force diagram to resolve the force equilibrium equations; a bingham fluid rheology is introduced and represents the resistance term. The model has been calibrated on two muddy debris-flow events that occurred in 1996 and 2003 at the Faucon watershed (South French Alps.

    Influence of the check dams on the debris-flow intensity is quantified taking into account several check dams configurations (number and location as input geometrical parameters. Results indicate that debris-flow intensity is decreasing with the distance between the source area and the first check dams. The study demonstrates that a small number of check dams located near the source area may decrease substantially the debris-flow intensity on the alluvial fans.

  15. The PapilloCheck Assay for Detection of High-Grade Cervical Intraepithelial Neoplasia.

    Science.gov (United States)

    Crosbie, Emma J; Bailey, Andrew; Sargent, Alex; Gilham, Clare; Peto, Julian; Kitchener, Henry C

    2015-11-01

    Human papillomavirus (HPV) testing is used in primary cervical screening, as an adjunct to cervical cytology for the management of low grade abnormal cytology, and in a test of cure. PapilloCheck (Greiner Bio-One) is a PCR-based DNA microarray system that can individually identify 24 HPV types, including the 13 high-risk (HR) types identified by Hybrid Capture 2 (HC2). Here, we compare PapilloCheck with HC2 for the detection of high-grade cervical intraepithelial neoplasia (CIN2+) in a total of 8,610 cervical cytology samples from the ARTISTIC population-based cervical screening study. We performed a retrospective analysis of 3,518 cytology samples from round 1 ARTISTIC enriched for underlying CIN2+ (n = 723) and a prospective analysis of 5,092 samples from round 3 ARTISTIC. Discrepant results were tested using the Roche reverse line blot (RLB) or Linear Array (LA) assay. The relative sensitivity and specificity of HR PapilloCheck compared with that of HC2 for the detection of CIN2+ in women aged over 30 years were 0.94 (95% confidence interval [CI], 0.91, 0.97) and 1.05 (95% CI, 1.04, 1.05), respectively. HC2 missed 44/672 (7%) CIN2+ lesions, while HR PapilloCheck missed 74/672 (11%) CIN2+ lesions. Thirty-six percent of HC2-positive normal cytology samples were HR HPV negative by both PapilloCheck and RLB/LA, indicating that the use of HR PapilloCheck rather than HC2 in population-based primary screening would reduce the number of additional tests required (e.g., reflex cytology) in women where underlying CIN2+ is extremely unlikely. HR PapilloCheck could be a suitable HPV detection assay for use in the cervical screening setting. PMID:26338859

  16. Check Point为亚太市场演绎3D安全方针

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    CheckPoint软件技术有限公司于8月31日至9月6日期间分别在曼谷和悉尼成功举行了2011 Check Point Experience (CPX)亚太年会,此次年会聚焦于Check Point 3D安全方针,这个革新性构想整合了政策、员工以及执行力三个要素,将安全保护演变为商业流程.来自亚太各地的900多位客户、合作伙伴、媒体和分析师与Check Point代表济济一堂,共同探讨安全热点问题.Check Point高层主持了多个专题演讲,主题包括安全威胁不断演变下企业面对的挑战,以及3D安全方针如何应用于实际客户环境等.Check Point安全专家还为与会人士介绍了重要的行业趋势,包括维基及Stuxnet泄密带来的安全教训;Web 2.0、移动计算和虚拟技术等新兴科技带来的安全隐患等.此外,与会者也观摩了Check Point现场所演示的尖端安全解决方案,包括最新发布的R75.20软件刀片、21400安全设备和61000安全系统.

  17. Impact of alcohol checks and social norm on driving under the influence of alcohol (DUI).

    Science.gov (United States)

    Meesmann, Uta; Martensen, Heike; Dupont, Emmanuelle

    2015-07-01

    This study investigated the influence of alcohol checks and social norm on self-reported driving under the influence of alcohol above the legal limit (DUI). The analysis was based on the responses of 12,507 car drivers from 19 European countries to the SARTRE-4 survey (2010). The data were analysed by means of a multiple logistic regression-model on two levels: (1) individual and (2) national level. On the individual level the results revealed that driving under the influence (DUI) was positively associated with male gender, young age (17-34), personal experience with alcohol checks, the perceived likelihood of being checked for alcohol, perceived drunk driving behaviour of friends (social norm) and was negatively associated with higher age (55+). On a national level, the results showed a negative association with a lower legal alcohol limit (BAC 0.2g/l compared with BAC 0.5g/l) and the percentage of drivers checked for alcohol. DUI was positively associated with the percentage of respondents in the country that reported that their friends drink and drive (social norm). The comparison of the results obtained on national and individual levels shows a paradoxical effect of alcohol checks: Countries with more alcohol checks show lower DUI (negative association) but respondents who have been personally checked for alcohol show a higher chance of DUI (positive association). Possible explanations of this paradox are discussed. The effects of the social norm variable (perceived drunk driving behaviour of friends) are positively associated with DUI on both levels.

  18. Impact of alcohol checks and social norm on driving under the influence of alcohol (DUI).

    Science.gov (United States)

    Meesmann, Uta; Martensen, Heike; Dupont, Emmanuelle

    2015-07-01

    This study investigated the influence of alcohol checks and social norm on self-reported driving under the influence of alcohol above the legal limit (DUI). The analysis was based on the responses of 12,507 car drivers from 19 European countries to the SARTRE-4 survey (2010). The data were analysed by means of a multiple logistic regression-model on two levels: (1) individual and (2) national level. On the individual level the results revealed that driving under the influence (DUI) was positively associated with male gender, young age (17-34), personal experience with alcohol checks, the perceived likelihood of being checked for alcohol, perceived drunk driving behaviour of friends (social norm) and was negatively associated with higher age (55+). On a national level, the results showed a negative association with a lower legal alcohol limit (BAC 0.2g/l compared with BAC 0.5g/l) and the percentage of drivers checked for alcohol. DUI was positively associated with the percentage of respondents in the country that reported that their friends drink and drive (social norm). The comparison of the results obtained on national and individual levels shows a paradoxical effect of alcohol checks: Countries with more alcohol checks show lower DUI (negative association) but respondents who have been personally checked for alcohol show a higher chance of DUI (positive association). Possible explanations of this paradox are discussed. The effects of the social norm variable (perceived drunk driving behaviour of friends) are positively associated with DUI on both levels. PMID:25957934

  19. Check Box List组件在ADO.net中的应用%Application of Check Box List Component to ADO.Net

    Institute of Scientific and Technical Information of China (English)

    谷宝磊; 姜秀柱

    2010-01-01

    通过对一个WEB应用程序分析,旨在阐述如何将数据库中的字段绑定到Check Box List组件,并将数据库的某一字段的值作为其Item集合的成员,当Check Box List中的若干选项被选中时,触发读取数据库中对应的数据记录并在WEB页面上显示.从数据绑定、选中项判断、选中项的获取、数据读取显示等不同方面进行阐述,希望对实际的WEB应用程序的开发具有一定的参考价值.

  20. Assessing the hydrological effect of the check dams in the Loess Plateau, China by model simulations

    Directory of Open Access Journals (Sweden)

    Y. D. Xu

    2012-12-01

    Full Text Available Check dams are commonly used for soil conservation. In the Loess Plateau of China, check dams have been widely constructed as the principal means to retain floodwater and intercept soil sediments since the 1970s. However, little research has been done to quantify the hydrological effects of the check dams.

    In this research, the SWAT model (Soil and Water Assessment Tool was applied to simulate the runoff and sediment in the Yanhe watershed in the Loess Plateau. We treated the 1950s to 1960s as "reference period" since there were very few check dams during the period. The model was first calibrated and validated in the "reference period". The calibrated model was then used in the later periods to simulate the hydrological effects of the check dams.

    The results showed that the check dams had a regulation effect on runoff and a retention effect on sediment. From 1984 to 1987, the runoff in rainy season (from May to October decreased by 14.7 to 25.9% due to the check dams, while in dry season (from November to the following April, runoff increased by 60.5 to 101.2%; the sediment in rainy season decreased by 34.6 to 48.0%. From 2006 to 2008, the runoff in rainy season decreased by 15.5 to 28.9%, and the runoff in dry season increased by 20.1 to 46.4%; the sediment in rainy season decreased by 79.4 to 85.5%.

    Construction of the large number of in the Loess Plateau has enhanced the region's capacity to control the runoff and sediment. In the Yanhe watershed, the annual runoff was reduced by less than 14.3% due to the check dams; and the sediment in rainy season was blocked by up to 85.5%. Thus, check dams are effective measures for soil erosion control in the Loess Plateau.

  1. Check Point推出Safe@Office500 UTM设备%Check Point: brings Safe@OfficeS00 UTM device

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Check Point Safe@Office 500与Safe@Office 500W统一威胁管理(UTM)设备,是一款一步到位、容易部署及价格相宜的解决方案.为小企业提供卓越的网络保护,抵御随时爆发的互联网攻击。

  2. Check Point FireWall-1防火墙的特性及应用%Check Point FireWall-1 Technical Features and Application

    Institute of Scientific and Technical Information of China (English)

    刘昌华; 左爱群

    2004-01-01

    介绍Check Point FireWall-1 防火墙专有的状态监测技术和安全企业连通性开放平台(OPSEC)技术,分布式客户机/服务器的体系结构与组成,并给出其在企业Intranet安全系统中的应用方案.

  3. Model checking methodology for large systems, faults and asynchronous behaviour. SARANA 2011 work report

    Energy Technology Data Exchange (ETDEWEB)

    Lahtinen, J. [VTT Technical Research Centre of Finland, Espoo (Finland); Launiainen, T.; Heljanko, K.; Ropponen, J. [Aalto Univ., Espoo (Finland). Dept. of Information and Computer Science

    2012-07-01

    Digital instrumentation and control (I and C) systems are challenging to verify. They enable complicated control functions, and the state spaces of the models easily become too large for comprehensive verification through traditional methods. Model checking is a formal method that can be used for system verification. A number of efficient model checking systems are available that provide analysis tools to determine automatically whether a given state machine model satisfies the desired safety properties. This report reviews the work performed in the Safety Evaluation and Reliability Analysis of Nuclear Automation (SARANA) project in 2011 regarding model checking. We have developed new, more exact modelling methods that are able to capture the behaviour of a system more realistically. In particular, we have developed more detailed fault models depicting the hardware configuration of a system, and methodology to model function-block-based systems asynchronously. In order to improve the usability of our model checking methods, we have developed an algorithm for model checking large modular systems. The algorithm can be used to verify properties of a model that could otherwise not be verified in a straightforward manner. (orig.)

  4. Pump, and earth-testable spacecraft capillary heat transport loop using augmentation pump and check valves

    Science.gov (United States)

    Baker, David (Inventor)

    1998-01-01

    A spacecraft includes heat-generating payload equipment, and a heat transport system with a cold plate thermally coupled to the equipment and a capillary-wick evaporator, for evaporating coolant liquid to cool the equipment. The coolant vapor is coupled to a condenser and in a loop back to the evaporator. A heated coolant reservoir is coupled to the loop for pressure control. If the wick is not wetted, heat transfer will not begin or continue. A pair of check valves are coupled in the loop, and the heater is cycled for augmentation pumping of coolant to and from the reservoir. This augmentation pumping, in conjunction with the check valves, wets the wick. The wick liquid storage capacity allows the augmentation pump to provide continuous pulsed liquid flow to assure continuous vapor transport and a continuously operating heat transport system. The check valves are of the ball type to assure maximum reliability. However, any type of check valve can be used, including designs which are preloaded in the closed position. The check valve may use any ball or poppet material which resists corrosion. For optimum performance during testing on Earth, the ball or poppet would have neutral buoyancy or be configured in a closed position when the heat transport system is not operating. The ball may be porous to allow passage of coolant vapor.

  5. Check Point借安全之旅与客户"亲密接触"

    Institute of Scientific and Technical Information of China (English)

    段红

    2006-01-01

    @@ Check Point的产品名传遐尔,在知名媒体及权威评测机构的评选中屡获大奖和好评.Check Point所创立的开放式安全平台(OPSEC)更是凝集了众多的企业,OPSEC作为行业中推动整合和互操作性的一个联盟和平台,把Check Point的解决方案与350多家企业的卓越解决方案集成及协同工作.以往,Check Point通过渠道及与厂商协作或捆绑销售其产品,都取得不俗的业绩,2005年收入达5.794亿,比2004年增长12%.2006年第一季度增长态势良好,尤其是中国市场的增长更为显著.Check Point的产品广受渠道、合作伙伴、用户的赞誉和推崇,似乎是皇帝的女儿不愁嫁.

  6. Integrated CAE system for nuclear power plants. Development of piping design check system

    International Nuclear Information System (INIS)

    Toshiba Corporation has developed and operated the integrated CAE system for nuclear power plants, the core of which is the engineering data base to manage accurately and efficiently enormous amount of data on machinery, equipment and piping. As the first step of putting knowledge base system to practical use, piping design check system has been developed. By automatically checking up piping design, this system aims at the prevention of overlooking mistakes, efficient design works and the overall quality improvement of design. This system is based on the thought that it supports designers, and final decision is made by designers. This system is composed of the integrated data base, a two-dimensional CAD system and three-dimensional CAD system. The piping design check system is one of the application systems of the integrated CAE system. Object-oriented programming is the base of the piping design check system, and design knowledge and CAD data are necessary. As to the method of realizing the check system, the flow of piping design, the checkup functions, the checkup of interference and attribute base, and the integration of the system are explained. (K.I)

  7. Field trials of the Baby Check score card in general practice.

    Science.gov (United States)

    Morley, C J; Thornton, A J; Green, S J; Cole, T J

    1991-01-01

    Sixteen general practitioners (GPs) used the Baby Check score card to assess illness severity in 86 babies under 6 months old. Their reactions to Baby Check were positive: in 79 (92%) it gave an accurate assessment of the baby's illness and 16 (100%) said they would trust it. Fifteen (94%) found it useful, and most of those who did not said the baby was not ill or had an obvious diagnosis. Thirteen (81%) said they would use it and wanted their health visitors and midwives to use it and 15 (94%) wanted the mothers in their practice to use it. The majority (64%) of babies scored 0-7; 31% scored 8 to 19; and only 5% scored over 20. Well babies had low scores, while the two sickest babies, needing urgent hospital treatment, scored 29 and 33. The use of Baby Check by GPs would help them assess babies thoroughly and quantify illness severity objectively.

  8. Neighborhood deprivation is strongly associated with participation in a population-based health check

    DEFF Research Database (Denmark)

    Bender, Anne Mette; Kawachi, Ichiro; Jørgensen, Torben;

    2015-01-01

    screening for ischemic heart disease and lifestyle counseling. The study population was randomly drawn from a population of 179,097 persons living in 73 neighborhoods in Denmark. Data on neighborhood deprivation (percentage with basic education, with low income and not in work) and individual socioeconomic...... for income deprivation remained statistically significant. CONCLUSION: Neighborhood deprivation was associated with participation in a population-based health check in a dose-response manner, in which increasing neighborhood deprivation was associated with decreasing participation. This suggests the need......BACKGROUND: We sought to examine whether neighborhood deprivation is associated with participation in a large population-based health check. Such analyses will help answer the question whether health checks, which are designed to meet the needs of residents in deprived neighborhoods, may increase...

  9. Checking of seismic and tsunami hazard for coastal NPP of Chinese continent after Fukushima nuclear accident

    Institute of Scientific and Technical Information of China (English)

    Chang Xiangdong; Zhou Bengang; Zhao Lianda

    2013-01-01

    A checking on seismic and tsunami hazard for coastal nuclear power plant (NPP) of Chinese continent has been made after Japanese Fukushima nuclear accident caused by earthquake tsunami.The results of the checking are introduced briefly in this paper,including the evaluations of seismic and tsunami hazard in NPP siting period,checking results on seismic and tsunami hazard.Because Chinese coastal area belongs to the continental shelf and far from the boundary of plate collision,the tsunami hazard is not significant for coastal area of Chinese continent.However,the effect from tsunami still can' t be excluded absolutely since calculated result of Manila trench tsunami source although the tsunami wave is lower than water level from storm surge.The research about earthquake tsunami will continue in future.The tsunami warning system and emergency program of NPP will be established based on principle of defense in depth in China.

  10. GPS based checking survey and precise DEM development in Open mine

    Institute of Scientific and Technical Information of China (English)

    XU Ai-gong

    2008-01-01

    The checking survey in Open mine is one of the most frequent and important work. It plays the role of forming a connecting link between open mine planning and production. Traditional checking method has such disadvantages as long time consumption,heavy workload, complicated calculating process, and lower automation. Used GPS and GIS technologies to systematically study the core issues of checking survey in open mine.A detail GPS data acquisition coding scheme was presented. Based on the scheme an algorithm used for computer semiautomatic cartography was made. Three methods used for eliminating gross errors from raw data which were needed for creating DEM was discussed. Two algorithms were researched and realized which can be used to create open mine fine DEM model with constrained conditions and to dynamically update the model.The precision analysis and evaluation of the created model were carried out.

  11. Quasi Cyclic Low Density Parity Check Code for High SNR Data Transfer

    Directory of Open Access Journals (Sweden)

    M. R. Islam

    2010-06-01

    Full Text Available An improved Quasi Cyclic Low Density Parity Check code (QC-LDPC is proposed to reduce the complexity of the Low Density Parity Check code (LDPC while obtaining the similar performance. The proposed QC-LDPC presents an improved construction at high SNR with circulant sub-matrices. The proposed construction yields a performance gain of about 1 dB at a 0.0003 bit error rate (BER and it is tested on 4 different decoding algorithms. Proposed QC-LDPC is compared with the existing QC-LDPC and the simulation results show that the proposed approach outperforms the existing one at high SNR. Simulations are also performed varying the number of horizontal sub matrices and the results show that the parity check matrix with smaller horizontal concatenation shows better performance.

  12. Prediction Interval Development for Wind-Tunnel Balance Check-Loading

    Science.gov (United States)

    Landman, Drew; Toro, Kenneth G.; Commo, Sean A.; Lynn, Keith C.

    2014-01-01

    Results from the Facility Analysis Verification and Operational Reliability project revealed a critical gap in capability in ground-based aeronautics research applications. Without a standardized process for check-loading the wind-tunnel balance or the model system, the quality of the aerodynamic force data collected varied significantly between facilities. A prediction interval is required in order to confirm a check-loading. The prediction interval provides an expected upper and lower bound on balance load prediction at a given confidence level. A method has been developed which accounts for sources of variability due to calibration and check-load application. The prediction interval method of calculation and a case study demonstrating its use is provided. Validation of the methods is demonstrated for the case study based on the probability of capture of confirmation points.

  13. Check Point公司推出Connectra NGX R66

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    (本刊讯)近日,互联网安全解决方案供应商Check Point公司CEO Gil Shwed来到中国,并与客户和合作伙伴见面,分享了在网络安全行业的经验。Gil Shwed表示,目前有80多个国家和地区在使用Check Point公司的解决方案,涉及互联网、社交网、电子商务等领域。Check Point公司对中国市场非常重视,与中国金融企业始终保持着密切合作。

  14. check Point安全产品突出整体优势

    Institute of Scientific and Technical Information of China (English)

    李志宇

    2008-01-01

    从1993年创立至今的15年间,致力于网络安全产品的Check Point营销网络遍及全球80多个国家和地区。今年,Check Point的销售总额预计将会突破1亿美元。公司董事长兼CEO Shwed表示:“Check Point在中国开展了7年业务,市场份额不断扩大。中国市场重要性日益突出,已经成为了一个独立的销售区域。”

  15. Model based feasibility study on bidirectional check valves in wave energy converters

    DEFF Research Database (Denmark)

    Hansen, Anders Hedegaard; Pedersen, Henrik C.; Andersen, Torben Ole

    2014-01-01

    /Off and bidirectional check valves. Based on the analysis it is found that the energy production may be slightly improved by using bidirectional check valves as compared to on/off valves, due to a decrease in switching losses. Furthermore a reduction in high flow peaks are realised. The downside being increased...... valves in wave energy converters to improve the system efficiency. A single float arm of the Wavestar wave energy converter is modelled including the power take-off (PTO) system. The primary stage of the utilised PTO-system is a discrete fluid power force system consisting of a multi-chamber cylinder...... and multiple common pressure lines. The valve manifold, employed in the discrete PTO system and conventionally equipped with On/Off valves, is instead considered fitted with bidirectional check valves. The energy output from the primary stage is compared for PTO systems occupying respectively On...

  16. Check valve slam caused by air intrusion in emergency cooling water system

    International Nuclear Information System (INIS)

    Waterhammer pressures were experienced during periodic starting of Residual Heat Removal (RHR) pumps at a nuclear plant. Prior to an analytical investigation careful analysis performed by plant engineers indicated that the spring effect of entrapped air in a heat exchanger resulted in water hammer due to check valve slam following flow reversal. In order to determine in more detail the values of pertinent parameters controlling this water hammer a hydraulic transient analysis was performed of the RHR piping system, including essential elements such as the pump, check valve, and heat exchanger. Using characteristic torque and pressure loss curves the motion of the check valve was determined. By comparing output of the water hammer analysis with site recordings of pump discharge pressure the computer model was calibrated, allowing for a realistic estimate of the quantity of entrapped air in the heat exchanger. (author)

  17. CheckMATE: Confronting your Favourite New Physics Model with LHC Data

    CERN Document Server

    Drees, Manuel; Kim, Jong Soo; Schmeier, Daniel; Tattersall, Jamie

    2013-01-01

    In the first three years of running, the LHC has delivered a wealth of new data that is now being analysed. With over 20 fb$^{-1}$ of integrated luminosity, both ATLAS and CMS have performed many searches for new physics that theorists are eager to test their model against. However, tuning the detector simulations, understanding the particular analysis details and interpreting the results can be a tedious task. CheckMATE (Check Models At Terascale Energies) is a program package which accepts simulated event files in many formats for any model. The program then determines whether the model is excluded or not at 95% C.L. by comparing to many recent experimental analyses. Furthermore the program can calculate confidence limits and provide detailed information about signal regions of interest. It is simple to use and the program structure allows for easy extensions to upcoming LHC results in the future. CheckMATE can be found at: http://checkmate.hepforge.org

  18. Neighborhood social capital is associated with participation in health checks of a general population

    DEFF Research Database (Denmark)

    Bender, Anne Mette; Kawachi, Ichiro; Jørgensen, Torben;

    2015-01-01

    BACKGROUND: Participation in population-based preventive health check has declined over the past decades. More research is needed to determine factors enhancing participation. The objective of this study was to examine the association between two measures of neighborhood level social capital...... on participation in the health check phase of a population-based lifestyle intervention. METHODS: The study population comprised 12,568 residents of 73 Danish neighborhoods in the intervention group of a large population-based lifestyle intervention study - the Inter99. Two measures of social capital were applied......; informal socializing and voting turnout. RESULTS: In a multilevel analysis only adjusting for age and sex, a higher level of neighborhood social capital was associated with higher probability of participating in the health check. Inclusion of both individual socioeconomic position and neighborhood...

  19. Effect of Check Dams on Erosion and Flow Dynamics on Small Semi-Arid Watersheds

    Science.gov (United States)

    Polyakov, V.; Nearing, M.; Nichols, M.; McClaran, M. P.

    2012-12-01

    Erosion dynamics in semi-arid environments is defined by high magnitude, low frequency rainfalls that produce runoff with high sediment concentration. Check dams were shown to be an effective sedimentation mitigation technique on small watersheds. Constructed of rocks, or other materials placed across the flow and anchored into the bottom and sides of the channel, these barriers produce upstream and downstream effects. By impounding runoff they reduce flow velocity, increase infiltration and allow sediment settling thus decreasing channel slope. Decreased sediment load downstream of the dam may result in accelerated channel scouring. While the effect of check dams on channel stability has been studied extensively their impact on overall watershed sediment balance is not well known. In 2008 a total of 37 loose rock semi permeable check dams were installed on two small (4.0 and 3.1 ha) watersheds located on the alluvial fan of the Santa Rita Mountains in southern Arizona, USA. Each watershed was equipped with high resolution weighing type rain gauge a supercritical flow flume and sediment sampler. Hyetographs, hydrographs, and sediment load data for the watersheds were collected since 1975. The erosion dynamics and flow characteristics following the check dam installation were compared with historical records. The volume of the sediment retained upstream of each dam was calculated through survey. After 4 years the check dams were filled to over 80% of their capacity and no significant increase in downstream scouring has been observed. Maximum 30-min intensity (I30) was overall best predictor variable for total runoff. After check dam installation the number ratio of runoff to rainfall events has been reduced by half. However, runoff peak rates were not significantly effected.

  20. PENERAPAN MODEL PEMBELAJARAN KOOPERATIF TIPE PAIR CHECKS PEMECAHAN MASALAH UNTUK MENINGKATKAN SOCIAL SKILL SISWA

    Directory of Open Access Journals (Sweden)

    R. Lestari

    2012-12-01

    Full Text Available Tujuan penelitian tindakan kelas ini untuk mengetahui pengaruh proses pembelajaran dengan menggunakan model pembelajaran kooperatif tipe Pair Checks pemecahan masalah terhadap peningkatan social skill siswa. Pada proses penerapan model pembelajaran kooperatif tipe Pair Checks pemecahan masalah siswa dibagi dalam kelompok-kelompok dan satu kelompok terdiri dari dua orang. Setiap kelompok berdiskusi untuk menyelesaikan suatu masalah, kemudian hasil diskusi kelompok akan dicek oleh pasangan dari kelompok lain. Metode Penelitian yang digunakan adalah penelitian tindakan kelas yang dilaksanakan dua siklus. Metode pengumpulan data menggunakan tes dan angket skala sikap, sedangkan teknik analisis data menggunakan teknik analisis data kuantitatif. Social Skill siswa dari siklus I ke siklus II mengalami peningkatan. Hal ini didapatkan dari data angket skala sikap siklus I ke siklus II ketuntasan klasikalnya meningkat dan sebagian besar siswa sudah memiliki social skill yang baik. Hasil belajar kognitif siswa juga mengalami peningkatan. Model pembelajaran kooperatif tipe Pair Checks pemecahan masalah dapat meningkatkan social skill siswa.This two cycles-action research aimed to know learning process applying cooperative learning model-pair checks problem solving type and improvement of student’s social skills. The process of the model was as follows: deviding students into some groups consisting of two students, solving problem by each group and checking result of the discussion by other groups. Data collection method used was test and the use of attitude scale questionnaire, while technique of data analysis used was quantitative data analysis technique. The data analysis result showed that there was an increase of student’s social skill and students’ achievement from cycle one to two. It is concluded that cooperative learning model-pair checks problem solving type can enhance student’s social skills

  1. Small watershed response to porous rock check dams in a semiarid watershed

    Science.gov (United States)

    Nichols, Mary; Polyakov, Viktor; Nearing, Mark

    2016-04-01

    Rock check dams are used throughout the world as technique for mitigating erosion problems on degraded lands. Increasingly, they are being used in restoration efforts on rangelands in the southwestern US, however, their impact on watershed response and channel morphology is not well quantified. In 2008, 37 porous rock structures were built on two small (4.0 and 3.1 ha) instrumented watersheds on an alluvial fan at the base of the Santa Rita Mountains in southern Arizona, USA. 35 years of historical rainfall and runoff, and sediment data are available to compare with 7 years of data collected after check dam construction. In addition, post construction measurements of channel geometry and longitudinal channel profiles were compared with pre-construction measurements to characterize the impact of check dams on sediment retention and channel morphology. The primary impact of the check dams is was retention of channel sediment and reduction in channel gradient; however response varied between the proximal watersheds with 80% of the check dams on one of the watersheds filled to 100% of their capacity after 7 runoff seasons. In addition, initial impact on precipitation runoff ratios is was not persistent. The contrasting watershed experiences lower sediment yields and only 20% of the check dams on this watershed are were filled to capacity and continue to influence runoff during small events. Within the watersheds the mean gradient of the channel reach immediately upstream of the structures has been reduced by 35% (from 0.061 to 0.039) and 34% on (from 0.071 to 0.047).

  2. Molecular double-check strategy for the identification and characterization of European Lyssaviruses

    DEFF Research Database (Denmark)

    Fischer, Melina; Freuling, Conrad M.; Müller, Thomas;

    2014-01-01

    -systems for Rabies virus, European bat lyssavirus type 1 and 2 as well as Bokeloh bat lyssavirus. All assays were validated successfully with a comprehensive panel of lyssavirus positive samples, as well as negative material from various host species. This double-check strategy allows for both safe and sensitive......-lyssavirus intercalating dye assays are performed in a double-check application to increase the method's diagnostic safety. For the second step, characterization of the lyssavirus positive samples via two independent multiplex PCR-systems was performed. Both assays were probe-based, species-specific multiplex PCR...

  3. Constancy check of beam quality in conventional diagnostic X-ray equipment

    International Nuclear Information System (INIS)

    A tandem ionization chamber was developed for quality control programs of X-ray equipment used in conventional radiography and mammography. A methodology for the use of the tandem chamber in the constancy check of diagnostic X-ray beam qualities was established. The application at a medical X-ray imaging facility of this established methodology is presented. The use of the tandem chamber in the constancy check of diagnostic X-ray beam qualities is a useful method to control the performance of the X-ray equipment

  4. Modeling of feed water check valves using RELAP5; Modellierung von Speisewasserrueckschlagventilen in RELAP5

    Energy Technology Data Exchange (ETDEWEB)

    Ben Said, Nader; Bregulla, Wolfgang; Kalk, Andreas [Westinghouse Electric Germany GmbH, Mannheim (Germany)

    2009-07-01

    Westinghouse Electric Germany GmbH has developed fluid dynamic models for medium-actuated armatures using the thermal hydraulic code RELAP5 in order to reach a more realistic description of the armature behavior including fluid-structure interactions in case of transient flow conditions in piping systems. The contribution is concerned with the modeling of damped check valves. The model allows the description of the behavior during opening and closure of a check armature. The calculated results show good agreement with the available measured data.

  5. VERIFICATION OF CONFLICTION AND UNREACHABILITY IN RULE-BASED EXPERT SYSTEMS WITH MODEL CHECKING

    Directory of Open Access Journals (Sweden)

    Einollah pira

    2014-03-01

    Full Text Available It is important to find optimal solutions for structural errors in rule-based expert systems .Solutions to discovering such errors by using model checking techniques have already been proposed, but these solutions have problems such as state space explosion. In this paper, to overcome these problems, we model the rule-based systems as finite state transition systems and express confliction and unreachabilityas Computation Tree Logic (CTL logic formula and then use the technique of model checking to detect confliction and unreachability in rule-based systems with the model checker UPPAAL.

  6. Checking Correctness of TypeScript Interfaces for JavaScript Libraries

    DEFF Research Database (Denmark)

    Feldthaus, Asger; Møller, Anders

    2014-01-01

    The TypeScript programming language adds optional types to JavaScript, with support for interaction with existing JavaScript libraries via interface declarations. Such declarations have been written for hundreds of libraries, but they can be difficult to write and often contain errors, which may...... affect the type checking and misguide code completion for the application code in IDEs. We present a pragmatic approach to check correctness of TypeScript declaration files with respect to JavaScript library implementations. The key idea in our algorithm is that many declaration errors can be detected...

  7. Analysing sensory panel performance in a proficiency test using the PanelCheck software

    DEFF Research Database (Denmark)

    Tomic, O.; Luciano, G.; Nilsen, A.;

    2010-01-01

    results plays an important role as this provides a time saving and efficient way of screening and investigating sensory panel performances. Most of the statistical methods used in this paper are available in the open source software PanelCheck, which may be downloaded and used for free.......Check software, a workflow is proposed that guides the user through the data analysis process. This allows practitioners and non-statisticians to get an overview over panel performances in a rapid manner without the need to be familiar with details on the statistical methods. Visualisation of data analysis...

  8. Verifying Real-time Commit Protocols Using Dense-time Model Checking Technology

    CERN Document Server

    Al-Bataineh, Omar I; French, Tim; Woodings, Terry

    2012-01-01

    The timed-based automata model, introduced by Alur and Dill, provides a useful formalism for describing real-time systems. Over the last two decades, several dense-time model checking tools have been developed based on that model. The paper considers the verification of real-time distributed commit protocols using dense-time model checking technology. More precisely, we model and verify the well-known timed two phase commit protocol in three different state-of-the-art real-time model checkers: UPPAAL, Rabbit, and RED, and compare the results.

  9. Check Point助浙江中大期货实现安全办公

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    6月20日,Check Point软件技术有限公司宣布,浙江中大期货为确保其移动办公室自动化(OA)和经纪业务管理系统的安全及满足远程管理维护需要,日前部署了来自Check Point IP395网络安全设备、Abra移动办公系列产品以及Smart-1安全管理系列产品等卓越的安全解决方案,

  10. A Data Transmission Method Using a Cyclic Redundancy Check and Inaudible Frequencies

    Institute of Scientific and Technical Information of China (English)

    Myoungbeom Chung

    2016-01-01

    This paper describes a data transmission method using a cyclic redundancy check and inaudible frequencies. The proposed method uses inaudible high frequencies from 18 kHz to 22 kHz generated via the inner speaker of smart devices. Using the proposed method, the performance is evaluated by conducting data transmission tests between a smart book and smart phone. The test results confirm that the proposed method can send 32 bits of data in an average of 235 ms, the transmission success rate reaches 99.47%, and the error detection rate of the cyclic redundancy check is 0.53%.

  11. Tank 30 and 37 Supernatant Sample Cross-Check and Evaporator Feed Qualification Analysis-2012

    Energy Technology Data Exchange (ETDEWEB)

    Oji, L. N.

    2013-03-07

    This report summarizes the analytical data reported by the F/H and Savannah River National Laboratories for the 2012 cross-check analysis for high level waste supernatant liquid samples from SRS Tanks 30 and 37. The intent of this Tank 30 and 37 sample analyses was to perform cross-checks against routine F/H Laboratory analyses (corrosion and evaporator feed qualification programs) using samples collected at the same time from both tanks as well as split samples from the tanks.

  12. Parameters for Viability Check on Gravitational Theories Regarding the Experimental Data

    Directory of Open Access Journals (Sweden)

    Celakoska E. G.

    2009-01-01

    Full Text Available Parameterized post-Newtonian formalism requires an existence of a symmetric metric in a gravitational theory in order to perform aviability check regarding the experimental data. The requirement of a symmetric metric is a strong constraint satisfied by very narrowclass of theories. In this letter we propose a viability check of a theory using the corresponding theory equations of motion. It issufficient that a connection exists, not necessarily a metrical one. The method is based on an analysis of the Lorentz invariant terms in the equations of motion. An example of the method is presented on the Einstein-Infeld-Hoffmann equations.

  13. DiVinE-CUDA - A Tool for GPU Accelerated LTL Model Checking

    Directory of Open Access Journals (Sweden)

    Jiří Barnat

    2009-12-01

    Full Text Available In this paper we present a tool that performs CUDA accelerated LTL Model Checking. The tool exploits parallel algorithm MAP adjusted to the NVIDIA CUDA architecture in order to efficiently detect the presence of accepting cycles in a directed graph. Accepting cycle detection is the core algorithmic procedure in automata-based LTL Model Checking. We demonstrate that the tool outperforms non-accelerated version of the algorithm and we discuss where the limits of the tool are and what we intend to do in the future to avoid them.

  14. Verifying Real-time Commit Protocols Using Dense-time Model Checking Technology

    OpenAIRE

    Al-Bataineh, Omar I.; Reynolds, Mark; French, Tim; Woodings, Terry

    2012-01-01

    The timed-based automata model, introduced by Alur and Dill, provides a useful formalism for describing real-time systems. Over the last two decades, several dense-time model checking tools have been developed based on that model. The paper considers the verification of real-time distributed commit protocols using dense-time model checking technology. More precisely, we model and verify the well-known timed two phase commit protocol in three different state-of-the-art real-time model checkers...

  15. Formal Specification and Model-Checking of CSMA/CA Using Finite Precision Timed Automata

    Institute of Scientific and Technical Information of China (English)

    LI Liang; MA Hua-dong; LI Guang-yuan

    2005-01-01

    This paper presents the formal specification and model-checking of Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA) protocol using the model checker we developed for real-time systems, which are specified as networks of finite precision timed automata. The CSMA/CA protocol proposed in the IEEE 802.11 standard is designed to reduce the probability of collision during a transmission in wireless random access environments. However, it does not eliminate completely the possibility of a collision between two or more frames transmitted simultaneously. We investigate what will give rise to a collision between frames and use our automatic verification tool for model-checking.

  16. The Modeling Library of Eavesdropping Methods in Quantum Cryptography Protocols by Model Checking

    Science.gov (United States)

    Yang, Fan; Yang, Guowu; Hao, Yujie

    2016-07-01

    The most crucial issue of quantum cryptography protocols is its security. There exists many ways to attack the quantum communication process. In this paper, we present a model checking method for modeling the eavesdropping in quantum information protocols. So when the security properties of a certain protocol are needed to be verified, we can directly use the models which are already built. Here we adopt the probabilistic model checking tool—PRISM to model these attack methods. The verification results show that the detection rate of eavesdropping is approximately close to 1 when enough photons are transmitted.

  17. Checking Fine and Gray subdistribution hazards model with cumulative sums of residuals

    DEFF Research Database (Denmark)

    Li, Jianing; Scheike, Thomas; Zhang, Mei Jie

    2015-01-01

    estimation, and only a limited contribution has been made to check the model assumptions. In this paper, we present a class of analytical methods and graphical approaches for checking the assumptions of Fine and Gray’s model. The proposed goodness-of-fit test procedures are based on the cumulative sums...... of residuals, which validate the model in three aspects: (1) proportionality of hazard ratio, (2) the linear functional form and (3) the link function. For each assumption testing, we provide a p-values and a visualized plot against the null hypothesis using a simulation-based approach. We also consider...

  18. "Smart shopping" : Implications of hard-discounters and multiple-store patronage

    NARCIS (Netherlands)

    Vroegrijk, M.J.J.

    2012-01-01

    The recent economic downturn has made consumers more focused on obtaining good value-for-money and on keeping their spending in check. This dissertation covers the implications of two recent developments indicative of such “smart shopping”: the increased popularity of the “hard-discounter” format, a

  19. Continuity check

    Energy Technology Data Exchange (ETDEWEB)

    Woof, M.

    2002-10-01

    This paper looks into both safety and technological developments in continuous mining. Manufacturers covered include Hydraphase, Eimco, Deilmann-Haniel, DBT and Joy. A recent Health and Safety Executive report mentioned three in incidents of frictional ignition of flammable gas by cutting equipment in a five year period to April 1999. 4 photos.

  20. In-phantom dosimetric measurements as quality control for brachytherapy. System check and constancy check; Messungen im Festkoerperphantom als Qualitaetskontrolle in der Brachytherapie. Systempruefung und Konstanzpruefung

    Energy Technology Data Exchange (ETDEWEB)

    Kollefrath, Michael; Bruggmoser, Gregor; Nanko, Norbert; Gainey, Mark [Universitaetsklinik Freiburg (Germany). Klinik fuer Strahlenheilkunde

    2015-09-01

    In brachytherapy dosimetric measurements are difficult due to the inherent dose-inhomogeneities. Typically in routine clinical practice only the nominal dose rate is determined for computer controlled afterloading systems. The region of interest lies close to the source when measuring the spatial dose distribution. In this region small errors in the positioning of the detector, and its finite size, lead to large measurement uncertainties that exacerbate the routine dosimetric control of the system in the clinic. The size of the measurement chamber, its energy dependence, and the directional dependence of the measurement apparatus are the factors which have a significant influence on dosimetry. Although ionisation chambers are relatively large, they are employed since similar chambers are commonly found on clinical brachytherapy units. The dose is determined using DIN 6800 [11] since DIN 6809-2 [12], which deals with dosimetry in brachytherapy, is antiquated and is currently in the process of revision. Further information regarding dosimetry for brachytherapy can be found in textbooks [1] and [2]. The measurements for this work were performed with a HDR (High-Dose-Rate) {sup 192}Ir source, type mHDR V2, and a Microselectron Afterloader V2 both from Nucletron/Elekta. In this work two dosimetric procedures are presented which, despite the aforemention difficulties, should assist in performing checks of the proper operation of the system. The first is a system check that measures the dose distribution along a line and is to be performed when first bringing the afterloader into operation, or after significant changes to the system. The other is a dosimetric constancy check, which with little effort can be performed monthly or weekly. It simultaneously verifies the positioning of the source at two positions, the functionality of the system clock and the automatic re-calculation of the source activity.

  1. 77 FR 10508 - Agency Information Collection Activities; Proposed Collection; Comment Request; Background Checks...

    Science.gov (United States)

    2012-02-22

    ... 1320.12. On October 31, 2011, 76 FR 67182, EPA sought comments on this ICR pursuant to 5 CFR 1320.8(d... Reading Room is open from 8 a.m. to 4:30 p.m., Monday through Friday, excluding legal holidays. The... checks for contractor personnel working in sensitive sites or sensitive projects. The background...

  2. Two-mode optical tomograms: a possible experimental check of the Robertson uncertainty relations

    International Nuclear Information System (INIS)

    An experimental check of the two-mode Robertson uncertainty relations and inequalities for the highest quadrature moments using homodyne photon detection is suggested. The relation between optical tomograms and symplectic tomograms is used to connect the tomographic dispersion matrix and the quadrature components dispersion matrix of the two-mode field states. (paper)

  3. Two--mode optical tomograms: a possible experimental check of the Robertson uncertainty relations

    CERN Document Server

    Man'ko, V I; Simoni, A; Ventriglia, F

    2012-01-01

    The experimental check of two--mode Robertson uncertainty relations and inequalities for highest quadrature moments is suggested by using homodyne photon detection. The relation between optical tomograms and symplectic tomograms is used to connect the tomographic dispersion matrix and the quadrature components dispersion matrix of the two--mode field states.

  4. Two-mode optical tomograms: a possible experimental check of the Robertson uncertainty relations

    Science.gov (United States)

    Man'ko, V. I.; Marmo, G.; Simoni, A.; Ventriglia, F.

    2012-02-01

    An experimental check of the two-mode Robertson uncertainty relations and inequalities for the highest quadrature moments using homodyne photon detection is suggested. The relation between optical tomograms and symplectic tomograms is used to connect the tomographic dispersion matrix and the quadrature components dispersion matrix of the two-mode field states.

  5. A self-priming, high performance, check valve diaphragm micropump made from SOI wafers

    Science.gov (United States)

    Kang, Jianke; Mantese, Joseph V.; Auner, Gregory W.

    2008-12-01

    In this paper, we describe a self-priming high performance piezoelectrically actuated check valve diaphragm micropump. The micropump was fabricated from three wafers: two silicon-on-insulator (SOI) wafers and one silicon wafer. A process named 'SOI/SOI wafer bonding and etching back followed by a second wafer bonding' was developed in order to make the core components of this device which included an inlet check valve, an outlet check valve, a diaphragm and a chamber. The movable structures of this device, i.e. the check valves and the diaphragm, were fabricated from the device layers of the two bonded SOI wafers. Taking advantages of SOI wafer technology and etch-stop layers, the vertical parameters of the movable structures were precisely controlled in fabrication. The micropump was self-priming without any pre-filling process. The pumping rate of the micropump was linearly adjustable from 0 to 650l µm min-1 by adjusting frequency. The maximum pumping rate was 860 µl min-1 and the maximum pumping pressure was approximately 10.5 psi. The power consumption of the device was less than 1.2 mW.

  6. A self-priming, high performance, check valve diaphragm micropump made from SOI wafers

    International Nuclear Information System (INIS)

    In this paper, we describe a self-priming high performance piezoelectrically actuated check valve diaphragm micropump. The micropump was fabricated from three wafers: two silicon-on-insulator (SOI) wafers and one silicon wafer. A process named 'SOI/SOI wafer bonding and etching back followed by a second wafer bonding' was developed in order to make the core components of this device which included an inlet check valve, an outlet check valve, a diaphragm and a chamber. The movable structures of this device, i.e. the check valves and the diaphragm, were fabricated from the device layers of the two bonded SOI wafers. Taking advantages of SOI wafer technology and etch-stop layers, the vertical parameters of the movable structures were precisely controlled in fabrication. The micropump was self-priming without any pre-filling process. The pumping rate of the micropump was linearly adjustable from 0 to 650l µm min−1 by adjusting frequency. The maximum pumping rate was 860 µl min−1 and the maximum pumping pressure was approximately 10.5 psi. The power consumption of the device was less than 1.2 mW

  7. 14 CFR 91.1095 - Initial and transition training and checking: Flight instructors (aircraft), flight instructors...

    Science.gov (United States)

    2010-01-01

    ... Management § 91.1095 Initial and transition training and checking: Flight instructors (aircraft), flight... required normal, abnormal, and emergency maneuvers to ensure competence to conduct the flight instruction... normal, abnormal, and emergency procedures to ensure competence to conduct the flight...

  8. Is self-selection the main driver of positive interpretations of general health checks?

    DEFF Research Database (Denmark)

    Bender, Anne Mette; Jørgensen, Torben; Pisinger, Charlotta

    2015-01-01

    OBJECTIVE: To investigate if the lower mortality among participants of a health check followed by lifestyle intervention of high risk persons is explained by self-selection. METHODS: All persons residing in the study area (Copenhagen; Denmark) were randomized to intervention (n=11,629) or control...

  9. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  10. Validity of 42-Item Mooney Problem Check List Scale for Counseling.

    Science.gov (United States)

    Tryon, Georgiana Shick

    Studies employing the Mooney Problem Check List (MPCL) have found that counseling center clients indicate more problems on the MPCL than nonclients. Domino and DeGroote identified 42 MPCL items concerned with self-satisfaction and a need for social contacts which further differentiated counseling seekers from nonseekers. In order to further…

  11. Accuracy Test of Software Architecture Compliance Checking Tools – Test Instruction

    NARCIS (Netherlands)

    Pruijt, Leo; van der Werf, J.M.E.M.; Brinkkemper., Sjaak

    2015-01-01

    Software Architecture Compliance Checking (SACC) is an approach to verify conformance of implemented program code to high-level models of architectural design. Static SACC focuses on the modular software architecture and on the existence of rule violating dependencies between modules. Accurate tool

  12. Efficient on-the-fly Algorithm for Checking Alternating Timed Simulation

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Chatain, Thomas;

    2009-01-01

    of building a symbolic turn-based two-player game such that the existence of a winning strategy is equivalent to the simulation being satisfied. We also propose an on-the-fly algorithm for solving this game. This simulation checking method can be applied to the case of non-alternating or strong simulations...

  13. Membrane Matrix models and non-perturbative checks of gauge/gravity duality

    CERN Document Server

    O'Connor, Denjoe

    2016-01-01

    We compare the bosonic and maximally supersymmetric membrane models. We find that in Hoppe regulated form the bosonic membrane is well approximated by massive Gaussian quantum matrix models. In contrast the similarly regulated supersymmetric membrane, which is equivalent to the BFSS model, has a gravity dual description. We sketch recent progress in checking gauge/gravity duality in this context.

  14. A practical approach to model checking Duration Calculus using Presburger Arithmetic

    DEFF Research Database (Denmark)

    Hansen, Michael Reichhardt; Dung, Phan Anh; Brekling, Aske Wiid

    2014-01-01

    This paper investigates the feasibility of reducing a model-checking problem K ⊧ ϕ for discrete time Duration Calculus to the decision problem for Presburger Arithmetic. Theoretical results point at severe limitations of this approach: (1) the reduction in Fränzle and Hansen (Int J Softw Inform 3...... limits of the approach are illustrated by a family of examples....

  15. Check Calibration of the NASA Glenn 10- by 10-Foot Supersonic Wind Tunnel (2014 Test Entry)

    Science.gov (United States)

    Johnson, Aaron; Pastor-Barsi, Christine; Arrington, E. Allen

    2016-01-01

    A check calibration of the 10- by 10-Foot Supersonic Wind Tunnel (SWT) was conducted in May/June 2014 using an array of five supersonic wedge probes to verify the 1999 Calibration. This check calibration was necessary following a control systems upgrade and an integrated systems test (IST). This check calibration was required to verify the tunnel flow quality was unchanged by the control systems upgrade prior to the next test customer beginning their test entry. The previous check calibration of the tunnel occurred in 2007, prior to the Mars Science Laboratory test program. Secondary objectives of this test entry included the validation of the new Cobra data acquisition system (DAS) against the current Escort DAS and the creation of statistical process control (SPC) charts through the collection of series of repeated test points at certain predetermined tunnel parameters. The SPC charts secondary objective was not completed due to schedule constraints. It is hoped that this effort will be readdressed and completed in the near future.

  16. Model Checking and Model-based Testing in the Railway Domain

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, Jan

    2015-01-01

    This chapter describes some approaches and emerging trends for verification and model-based testing of railway control systems. We describe state-of-the-art methods and associated tools for verifying interlocking systems and their configuration data, using bounded model checking and k-induction. ...

  17. "Eye Know": Translating Needs from Annual Health Checks for People with Learning Disabilities to Demand

    Science.gov (United States)

    Codling, Mary

    2013-01-01

    Annual health checks for people with learning disabilities are a concept that was introduced by the Government in 2001 as a catalyst to improve access to health services and identify health needs that have previously gone undetected. Nonetheless, to date, there has been little evidence of the effectiveness of these

  18. Logic Column 19: Symbolic Model Checking for Temporal-Epistemic Logics

    CERN Document Server

    Lomuscio, Alessio

    2007-01-01

    This article surveys some of the recent work in verification of temporal epistemic logic via symbolic model checking, focusing on OBDD-based and SAT-based approaches for epistemic logics built on discrete and real-time branching time temporal logics.

  19. 40 CFR 1065.341 - CVS and batch sampler verification (propane check).

    Science.gov (United States)

    2010-07-01

    ... overflow HC concentration does not exceed 2 µmol/mol, record this value as x THCinit and use it to correct... background concentrations of HC, measure and record background HC in the dilution air. (4) Zero any... CO2 or CO. A failed propane check might indicate one or more problems that may require...

  20. Cost Estimation of a Health-Check Intervention for Adults with Intellectual Disabilities in the UK

    Science.gov (United States)

    Romeo, R.; Knapp, M.; Morrison, J.; Melville, C.; Allan, L.; Finlayson, J.; Cooper, S.-A.

    2009-01-01

    Background: High rates of health needs among adults with intellectual disabilities flag the need for information about the economic consequences of strategies to identify and address unmet needs. Health-check interventions are one such strategy, and have been demonstrated to effect health gains over the following 12-month period. However, little…