WorldWideScience

Sample records for concomitant histological verification

  1. Verification of computed tomographic estimates of cochlear implant array position: a micro-CT and histologic analysis.

    Science.gov (United States)

    Teymouri, Jessica; Hullar, Timothy E; Holden, Timothy A; Chole, Richard A

    2011-08-01

    To determine the efficacy of clinical computed tomographic (CT) imaging to verify postoperative electrode array placement in cochlear implant (CI) patients. Nine fresh cadaver heads underwent clinical CT scanning, followed by bilateral CI insertion and postoperative clinical CT scanning. Temporal bones were removed, trimmed, and scanned using micro-CT. Specimens were then dehydrated, embedded in either methyl methacrylate or LR White resin, and sectioned with a diamond wafering saw. Histology sections were examined by 3 blinded observers to determine the position of individual electrodes relative to soft tissue structures within the cochlea. Electrodes were judged to be within the scala tympani, scala vestibuli, or in an intermediate position between scalae. The position of the array could be estimated accurately from clinical CT scans in all specimens using micro-CT and histology as a criterion standard. Verification using micro-CT yielded 97% agreement, and histologic analysis revealed 95% agreement with clinical CT results. A composite, 3-dimensional image derived from a patient's preoperative and postoperative CT images using a clinical scanner accurately estimates the position of the electrode array as determined by micro-CT imaging and histologic analyses. Information obtained using the CT method provides valuable insight into numerous variables of interest to patient performance such as surgical technique, array design, and processor programming and troubleshooting.

  2. Autoimmune gastritis: histology phenotype and OLGA staging.

    Science.gov (United States)

    Rugge, M; Fassan, M; Pizzi, M; Zorzetto, V; Maddalo, G; Realdon, S; De Bernard, M; Betterle, C; Cappellesso, R; Pennelli, G; de Boni, M; Farinati, F

    2012-06-01

    Among Western populations, the declining incidence of Helicobacter pylori infection coincides with a growing clinical impact of autoimmune gastritis. To describe the histological phenotype of autoimmune gastritis, also to test the prognostic impact of OLGA staging in the autoimmune setting. A single-institutional series (spanning the years 2003-2011) of 562 consecutive patients (M:F ratio: 1:3.7; mean age = 57.6 ± 14.4 years) with serologically confirmed autoimmune gastritis underwent histology review and OLGA staging. Helicobacter pylori infection was ascertained histologically in 44/562 cases (7.8%). Forty six biopsy sets (8.2%) featured OLGA stages III-IV; they included all four cases of incidental epithelial neoplasia (three intraepithelial and one invasive; three of these four cases had concomitant H. pylori infection). There were 230 (40.9%) and 139 (24.7%) cases, respectively, of linear and micro-nodular enterochromaffin-like cell hyperplasia; 19 (3.4%) type I carcinoids were detected. The series included 116 patients who underwent repeated endoscopy/biopsy sampling (mean time elapsing between the two procedures = 54 months; range 24-108). Paired histology showed a significant (P = 0.009) trend towards a stage progression [the stage increased in 25/116 cases (22%); it remained unchanged in 87/116 cases (75%)]. In autoimmune gastritis, the cancer risk is restricted to high-risk gastritis stages (III-IV), and is associated mainly with concomitant H. pylori infection. OLGA staging consistently depicts the time-dependent organic progression of the autoimmune disease and provides key information for secondary gastric cancer prevention strategies. © 2012 Blackwell Publishing Ltd.

  3. Improved correlation of histological data with DCE MRI parameter maps by 3D reconstruction, reslicing and parameterization of the histological images

    International Nuclear Information System (INIS)

    Kiessling, Fabian; Le-Huu, Martin; Semmler, Wolfhard; Kunert, Tobias; Thorn, Matthias; Meinzer, Hans-Peter; Vosseler, Silvia; Fusenig, Norbert E.; Schmidt, Kerstin; Hoffend, Johannes

    2005-01-01

    Due to poor correlation of slice thickness and orientation, verification of radiological methods with histology is difficult. Thus, a procedure for three-dimensional reconstruction, reslicing and parameterization of histological data was developed, enabling a proper correlation with radiological data. Two different subcutaneous tumors were examined by MR microangiography and DCE-MRI, the latter being post-processed using a pharmacokinetic two-compartment model. Subsequently, tumors were serially sectioned and vessels stained with immunofluorescence markers. A ray-tracing algorithm performed three-dimensional visualization of the histological data, allowing virtually reslicing to thicker sections analogous to MRI slice geometry. Thick slices were processed as parameter maps color coding the marker density in the depth of the slice. Histological 3D reconstructions displayed the diffuse angioarchitecture of malignant tumors. Resliced histological images enabled specification of high enhancing areas seen on MR microangiography as large single vessels or vessel assemblies. In orthogonally reconstructed histological slices, single vessels were delineated. ROI analysis showed significant correlation between histological parameter maps of vessel density and MR parameter maps (r=0.83, P=0.05). The 3D approach to histology improves correlation of histological and radiological data due to proper matching of slice geometry. This method can be used with any histological stain, thus enabling a multivariable correlation of non-invasive data and histology. (orig.)

  4. Concomitant occurrence of sinus histiocytosis with massive lymphadenopathy and nodal marginal zone lymphoma.

    Science.gov (United States)

    Pang, Changlee S; Grier, David D; Beaty, Michael W

    2011-03-01

    Sinus histiocytosis with massive lymphadenopathy (SHML), also known as Rosai-Dorfman disease, is a rare self-limiting disorder of histiocytes with unknown etiology. Sinus histiocytosis with massive lymphadenopathy is most common in children and young adults and is characterized by painless lymphadenopathy. Histologically there is a proliferation of sinus histiocytes with lymphophagocytosis or emperipolesis. On rare occasions, SHML has been associated with lymphoma, usually involving different anatomic sites and developing at different times. We report a case of concomitant SHML and nodal marginal zone lymphoma involving the same lymph node without involvement of other nodal or extranodal sites. The presence of concomitant SHML within the lymph node involved by nodal marginal zone lymphoma may represent the responsiveness of SHML histiocytes to B-cell-derived cytokines in lymphoproliferative disorders. To our knowledge, this is the first description of concomitant occurrence of SHML and nodal marginal zone lymphoma.

  5. Verification of the anatomy and newly discovered histology of the G-spot complex.

    Science.gov (United States)

    Ostrzenski, A; Krajewski, P; Ganjei-Azar, P; Wasiutynski, A J; Scheinberg, M N; Tarka, S; Fudalej, M

    2014-10-01

    To expand the anatomical investigations of the G-spot and to assess the G-spot's characteristic histological and immunohistochemical features. An observational study. International multicentre. Eight consecutive fresh human female cadavers. Anterior vaginal wall dissections were executed and G-spot microdissections were performed. All specimens were stained with haematoxylin and eosin (H&E). The tissues of two women were selected at random for immunohistochemical staining. The primary outcome measure was to document the anatomy of the G-spot. The secondary outcome measures were to identify the histology of the G-spot and to determine whether histological samples stained with H&E are sufficient to identify the G-spot. The anatomical existence of the G-spot was identified in all women and was in a diagonal plane. In seven (87.5%) and one (12.5%) of the women the G-spot complex was found on the left or right side, respectively. The G-spot was intimately fused with vessels, creating a complex. A large tangled vein-like vascular structure resembled an arteriovenous malformation and there were a few smaller feeding arteries. A band-like structure protruded from the tail of the G-spot. The size of the G-spot varied. Histologically, the G-spot was determined as a neurovascular complex structure. The neural component contained abundant peripheral nerve bundles and a nerve ganglion. The vascular component comprised large vein-like vessels and smaller feeding arteries. Circular and longitudinal muscles covered the G-complex. The anatomy of the G-spot complex was confirmed. The histology of the G-spot presents as neurovascular tissues with a nerve ganglion. H&E staining is sufficient for the identification of the G-spot complex. © 2014 Royal College of Obstetricians and Gynaecologists.

  6. Bias associated with delayed verification in test accuracy studies: accuracy of tests for endometrial hyperplasia may be much higher than we think!

    Directory of Open Access Journals (Sweden)

    Coomarasamy Aravinthan

    2004-05-01

    Full Text Available Abstract Background To empirically evaluate bias in estimation of accuracy associated with delay in verification of diagnosis among studies evaluating tests for predicting endometrial hyperplasia. Methods Systematic reviews of all published research on accuracy of miniature endometrial biopsy and endometr ial ultrasonography for diagnosing endometrial hyperplasia identified 27 test accuracy studies (2,982 subjects. Of these, 16 had immediate histological verification of diagnosis while 11 had verification delayed > 24 hrs after testing. The effect of delay in verification of diagnosis on estimates of accuracy was evaluated using meta-regression with diagnostic odds ratio (dOR as the accuracy measure. This analysis was adjusted for study quality and type of test (miniature endometrial biopsy or endometrial ultrasound. Results Compared to studies with immediate verification of diagnosis (dOR 67.2, 95% CI 21.7–208.8, those with delayed verification (dOR 16.2, 95% CI 8.6–30.5 underestimated the diagnostic accuracy by 74% (95% CI 7%–99%; P value = 0.048. Conclusion Among studies of miniature endometrial biopsy and endometrial ultrasound, diagnostic accuracy is considerably underestimated if there is a delay in histological verification of diagnosis.

  7. Doses to organs and tissues from concomitant imaging in radiotherapy: a suggested framework for clinical justification.

    Science.gov (United States)

    Harrison, R M

    2008-12-01

    The increasing use of imaging for localization and verification in radiotherapy has raised issues concerning the justifiable doses to critical organs and tissues from concomitant exposures, particularly when extensive image-guided radiotherapy is indicated. Doses at positions remote from the target volume include components from high-energy leakage and scatter, as well as from concomitant imaging. In this paper, simulated prostate, breast and larynx treatments are used to compare doses from both high-energy and concomitant exposures as a function of distance from the target volume. It is suggested that the fraction, R, of the total dose at any point within the patient that is attributable to concomitant exposures may be a useful aid in their justification. R is small within the target volume and at large distances from it. However, there is a critical region immediately adjacent to the planning target volume where the dose from concomitant imaging combines with leakage and scatter to give values of R that approach 0.5 in the examples given here. This is noteworthy because the regions just outside the target volume will receive total doses in the order of 1 Gy, where commensurately high risk factors may not be substantially reduced because of cell kill. Other studies have identified these regions as sites of second cancers. The justification of an imaging regimen might therefore usefully take into account the maximum value of R encountered from the combination of imaging and radiotherapy for particular treatment sites.

  8. Breast pathology after cryotherapy. Histological regression of breast cancer after cryotherapy.

    Science.gov (United States)

    Gajda, Mieczyslaw R; Mireskandari, Masoud; Baltzer, Pascal A; Pfleiderer, Stefan O; Camara, Oumar; Runnebaum, Ingo B; Kaiser, Werner A; Petersen, Iver

    2014-03-01

    A breast saving treatment is contemporary the preferred method of treatment with comparable results in comparing with mastectomy. In this study were evaluated the effects of cryotherapy by histological verification of changes in post treatment resection specimens. Fifty-three patients in age of 38-81 year with histologically confirmed breast cancer in needle biopsies were managed by cryotherapy between 1999 and 2007. The patients were operated between day 1 and 35 after cryotherapy. The histologic examination of operation materials showed in all cases at least partial tumor destruction. In general in 54.7% of all handled cases (29 patient) there was no residual tumor. In 6 cases (22.2%) from group 1 and in 23 cases (88.5%) of group 2 no tumor rest was found. Cryotherapy can lead to complete destruction of tumoral tissue. In our study all 29 (54.7%) of tumor-free cases after cryotherapy were those with cT1 stage. The experience of operator and the correct selection of appropriate patients (primarily taking the tumor size into account) play the most important role for achieving the best results.

  9. Bias associated with delayed verification in test accuracy studies: accuracy of tests for endometrial hyperplasia may be much higher than we think!

    OpenAIRE

    Clark, T Justin; ter Riet, Gerben; Coomarasamy, Aravinthan; Khan, Khalid S

    2004-01-01

    Abstract Background To empirically evaluate bias in estimation of accuracy associated with delay in verification of diagnosis among studies evaluating tests for predicting endometrial hyperplasia. Methods Systematic reviews of all published research on accuracy of miniature endometrial biopsy and endometr ial ultrasonography for diagnosing endometrial hyperplasia identified 27 test accuracy studies (2,982 subjects). Of these, 16 had immediate histological verification of diagnosis while 11 ha...

  10. HistologiQuiz

    DEFF Research Database (Denmark)

    Brent, Mikkel Bo

    2015-01-01

    HistologiQuiz er en quiz-app udviklet til almen og speciel histologi. Den består af mere end 1400 spørgsmål og over 320 histologiske billeder. Alle spørgsmål tager udgangspunkt i lærebogen Genesers Histologi af Annemarie Brüel m.fl.......HistologiQuiz er en quiz-app udviklet til almen og speciel histologi. Den består af mere end 1400 spørgsmål og over 320 histologiske billeder. Alle spørgsmål tager udgangspunkt i lærebogen Genesers Histologi af Annemarie Brüel m.fl....

  11. Radiological characteristics, histological features and clinical outcomes of lung cancer patients with coexistent idiopathic pulmonary fibrosis.

    Science.gov (United States)

    Khan, K A; Kennedy, M P; Moore, E; Crush, L; Prendeville, S; Maher, M M; Burke, L; Henry, M T

    2015-02-01

    Despite advances in diagnosis and management, the outcomes for both lung cancer and idiopathic pulmonary fibrosis (IPF) are still unfavourable. The pathophysiology and outcomes for patients with concomitant lung cancer and IPF remains unclear. A retrospective analysis was performed of all patients presenting with concomitant IPF and lung cancer to our centre over a 3-year period. Patients with connective tissue disease, asbestos exposure, sarcoidosis, previous thoracic radiation, radiological evidence of fibrosis but no histological confirmation of lung cancer, or the use of medications known to cause pulmonary fibrosis were excluded. We describe clinical, radiological and pathological characteristics of this group. We also report the response to standardized lung cancer therapy in this cohort. Of 637 lung cancer patients, 34 were identified with concomitant IPF (5.3 %) and all were smokers. 85 % had non-small cell lung cancer, 41 % were squamous cell cancers. The majority of tumours were located in the lower lobes, peripheral and present in an area of honeycombing. Despite the fact that approximately 2/3rds of the patients had localised or locally advanced lung cancer, the outcome of therapy for lung cancer was extremely poor regardless of tumour stage or severity of IPF. At our centre, 1/20 patients with lung cancer have concomitant IPF. The majority of these tumours are small in size, peripheral in location and squamous cell carcinoma; in an area of honey combing. The outcome for concomitant lung cancer and IPF regardless of stage or therapy is poor.

  12. Effects of concomitant use of fibroblast growth factor (FGF)-2 with beta-tricalcium phosphate (β-TCP) on the beagle dog 1-wall periodontal defect model

    International Nuclear Information System (INIS)

    Anzai, Jun; Kitamura, Masahiro; Nozaki, Takenori; Nagayasu, Toshie; Terashima, Akio; Asano, Taiji; Murakami, Shinya

    2010-01-01

    Research highlights: → Concomitant use of FGF-2 and β-TCP (an osteo-conductive scaffold) significantly promotes periodontal regeneration in the severe periodontitis model (1-wall defect model) of beagle dog. → FGF-2 enhanced new bone formation via β-TCP at the defects. → In particular, FGF-2 dramatically regenerated new periodontal ligament and cementum formations at the defects, that is one of the most important healing outcomes during the process of periodontal regeneration. → Epithelial downgrowth (undesirable wound healing) was decreased by administration of FGF-2. → This manuscript indicates for the first time that concomitant use of FGF-2 and β-TCP is efficacious in regenerating periodontal tissue following severe destruction of the tissue by progression of periodontitis. -- Abstract: The effects of concomitant use of fibroblast growth factor-2 (FGF-2) and beta-tricalcium phosphate (β-TCP) on periodontal regeneration were investigated in the beagle dog 1-wall periodontal defect model. One-wall periodontal defects were created in the mesial portion of both sides of the mandibular first molars, and 0.3% FGF-2 plus β-TCP or β-TCP alone was administered. Radiographic evaluation was performed at 0, 3, and 6 weeks. At 6 weeks, the periodontium with the defect site was removed and histologically analyzed. Radiographic findings showed that co-administration of FGF-2 significantly increased bone mineral contents of the defect sites compared with β-TCP alone. Histologic analysis revealed that the length of the regenerated periodontal ligament, the cementum, distance to the junctional epithelium, new bone height, and area of newly formed bone were significantly increased in the FGF-2 group. No abnormal inflammatory response or ankylosis was observed in either group. These findings indicate the efficacy of concomitant use of FGF-2 and β-TCP as an osteoconductive material for periodontal regeneration following severe destruction by progressive

  13. Effects of concomitant use of fibroblast growth factor (FGF)-2 with beta-tricalcium phosphate ({beta}-TCP) on the beagle dog 1-wall periodontal defect model

    Energy Technology Data Exchange (ETDEWEB)

    Anzai, Jun, E-mail: anzai_jun@kaken.co.jp [Pharmacology Department, Central Research Laboratories, Kaken Pharmaceutical Co., Ltd., 14, Shinomiya, Minamigawara-cho, Yamashina-ku, Kyoto 607-8042 (Japan); Department of Periodontology, Osaka University Graduate School of Dentistry, 1-8 Yamadaoka, Suita, Osaka 565-0871 (Japan); Kitamura, Masahiro, E-mail: kitamura@dent.osaka-u.ac.jp [Department of Periodontology, Osaka University Graduate School of Dentistry, 1-8 Yamadaoka, Suita, Osaka 565-0871 (Japan); Nozaki, Takenori, E-mail: tnozaki@dent.osaka-u.ac.jp [Department of Periodontology, Osaka University Graduate School of Dentistry, 1-8 Yamadaoka, Suita, Osaka 565-0871 (Japan); Nagayasu, Toshie, E-mail: nagayasu_toshie@kaken.co.jp [Pharmacology Department, Central Research Laboratories, Kaken Pharmaceutical Co., Ltd., 14, Shinomiya, Minamigawara-cho, Yamashina-ku, Kyoto 607-8042 (Japan); Terashima, Akio, E-mail: terashima_akio@kaken.co.jp [Pharmacology Department, Central Research Laboratories, Kaken Pharmaceutical Co., Ltd., 14, Shinomiya, Minamigawara-cho, Yamashina-ku, Kyoto 607-8042 (Japan); Asano, Taiji, E-mail: asano_taiji@kaken.co.jp [Pharmacology Department, Central Research Laboratories, Kaken Pharmaceutical Co., Ltd., 14, Shinomiya, Minamigawara-cho, Yamashina-ku, Kyoto 607-8042 (Japan); Murakami, Shinya, E-mail: ipshinya@dent.osaka-u.ac.jp [Department of Periodontology, Osaka University Graduate School of Dentistry, 1-8 Yamadaoka, Suita, Osaka 565-0871 (Japan)

    2010-12-17

    Research highlights: {yields} Concomitant use of FGF-2 and {beta}-TCP (an osteo-conductive scaffold) significantly promotes periodontal regeneration in the severe periodontitis model (1-wall defect model) of beagle dog. {yields} FGF-2 enhanced new bone formation via {beta}-TCP at the defects. {yields} In particular, FGF-2 dramatically regenerated new periodontal ligament and cementum formations at the defects, that is one of the most important healing outcomes during the process of periodontal regeneration. {yields} Epithelial downgrowth (undesirable wound healing) was decreased by administration of FGF-2. {yields} This manuscript indicates for the first time that concomitant use of FGF-2 and {beta}-TCP is efficacious in regenerating periodontal tissue following severe destruction of the tissue by progression of periodontitis. -- Abstract: The effects of concomitant use of fibroblast growth factor-2 (FGF-2) and beta-tricalcium phosphate ({beta}-TCP) on periodontal regeneration were investigated in the beagle dog 1-wall periodontal defect model. One-wall periodontal defects were created in the mesial portion of both sides of the mandibular first molars, and 0.3% FGF-2 plus {beta}-TCP or {beta}-TCP alone was administered. Radiographic evaluation was performed at 0, 3, and 6 weeks. At 6 weeks, the periodontium with the defect site was removed and histologically analyzed. Radiographic findings showed that co-administration of FGF-2 significantly increased bone mineral contents of the defect sites compared with {beta}-TCP alone. Histologic analysis revealed that the length of the regenerated periodontal ligament, the cementum, distance to the junctional epithelium, new bone height, and area of newly formed bone were significantly increased in the FGF-2 group. No abnormal inflammatory response or ankylosis was observed in either group. These findings indicate the efficacy of concomitant use of FGF-2 and {beta}-TCP as an osteoconductive material for periodontal

  14. Comparative digital cartilage histology for human and common osteoarthritis models

    Directory of Open Access Journals (Sweden)

    Pedersen DR

    2013-02-01

    Full Text Available Douglas R Pedersen, Jessica E Goetz, Gail L Kurriger, James A MartinDepartment of Orthopaedics and Rehabilitation, University of Iowa, Iowa City, IA, USAPurpose: This study addresses the species-specific and site-specific details of weight-bearing articular cartilage zone depths and chondrocyte distributions among humans and common osteoarthritis (OA animal models using contemporary digital imaging tools. Histological analysis is the gold-standard research tool for evaluating cartilage health, OA severity, and treatment efficacy. Historically, evaluations were made by expert analysts. However, state-of-the-art tools have been developed that allow for digitization of entire histological sections for computer-aided analysis. Large volumes of common digital cartilage metrics directly complement elucidation of trends in OA inducement and concomitant potential treatments.Materials and methods: Sixteen fresh human knees, 26 adult New Zealand rabbit stifles, and 104 bovine lateral plateaus were measured for four cartilage zones and the cell densities within each zone. Each knee was divided into four weight-bearing sites: the medial and lateral plateaus and femoral condyles.Results: One-way analysis of variance followed by pairwise multiple comparisons (Holm–Sidak method at a significance of 0.05 clearly confirmed the variability between cartilage depths at each site, between sites in the same species, and between weight-bearing articular cartilage definitions in different species.Conclusion: The present study clearly demonstrates multisite, multispecies differences in normal weight-bearing articular cartilage, which can be objectively quantified by a common digital histology imaging technique. The clear site-specific differences in normal cartilage must be taken into consideration when characterizing the pathoetiology of OA models. Together, these provide a path to consistently analyze the volume and variety of histologic slides necessarily generated

  15. Advanced verification topics

    CERN Document Server

    Bhattacharya, Bishnupriya; Hall, Gary; Heaton, Nick; Kashai, Yaron; Khan Neyaz; Kirshenbaum, Zeev; Shneydor, Efrat

    2011-01-01

    The Accellera Universal Verification Methodology (UVM) standard is architected to scale, but verification is growing and in more than just the digital design dimension. It is growing in the SoC dimension to include low-power and mixed-signal and the system integration dimension to include multi-language support and acceleration. These items and others all contribute to the quality of the SOC so the Metric-Driven Verification (MDV) methodology is needed to unify it all into a coherent verification plan. This book is for verification engineers and managers familiar with the UVM and the benefits it brings to digital verification but who also need to tackle specialized tasks. It is also written for the SoC project manager that is tasked with building an efficient worldwide team. While the task continues to become more complex, Advanced Verification Topics describes methodologies outside of the Accellera UVM standard, but that build on it, to provide a way for SoC teams to stay productive and profitable.

  16. Concomitant chemoradiotherapy in esophageal cancer

    International Nuclear Information System (INIS)

    Calais, G.

    1998-01-01

    Radiation therapy with concomitant chemotherapy is the standard treatment for non resectable esophageal carcinoma. For patients with operable tumors, surgery is the traditional treatment. However several data could improve therapeutic results. At the present time, no randomized trial has demonstrated, except for adenocarcinoma of the cardia, the benefit of preoperative treatment. Other randomized trials are needed to determine the role and the optimal modalities of these treatments. This is a review of the literature data in concomitant chemotherapy and radiation in the management of esophagus. (author)

  17. CLINICAL STUDY OF CONCOMITANT SQUINT

    Directory of Open Access Journals (Sweden)

    Vijay Chopra

    2017-07-01

    Full Text Available BACKGROUND Malalignment in the visual axes of the two eyes is called strabismus. Fusion of both images is replaced either by diplopia or suppression of one image. Squint leads to loss of binocular single vision. Concomitant squint is a type of manifest squint in which the amount of deviation in the squinting eye is same in all gazes. Binocular single vision and ocular movement coordination are not present since birth, but are acquired in the early childhood. This process starts by the age of 3-6 months and is completed up to 5-6 years. Any hindrance in the development of these processes may result in concomitant squint. MATERIALS AND METHODS In 100 cases of concomitant squint, patients were included in our study. Detailed history was taken regarding the onset of squint and duration. Past history and family history was also elicited. General examination was done to detect any abnormalities of central nervous system. Routine ophthalmic examination including best corrected visual acuity, cover test performed to detect the type of deviation whether uniocular or alternating and the type of fixation. Angle of deviation was measured by Hirschberg’s test and on the synoptophore. Binocular single vision was assessed using Worth’s 4-dot test and synoptophore. Cycloplegic refraction and fundus evaluation done in all patients. Inclusion Criteria- All primary non-paralytic deviations, sensory deprivation strabismus. Exclusion Criteria- Paralytic strabismus, strabismus associated with neurological disorders, consecutive strabismus and palpebral fissure abnormalities patients. RESULTS Majority of cases of concomitant squint were of esotropic type. Most common form of esotropia seen was infantile esotropia. Most common form of exotropia was intermittent exotropia. 19% of cases were secondary to other ocular diseases namely cataract, macular lesion, high myopia, etc. Amblyopia was present in 54% patients and of very dense type, which could not be treated

  18. Concomitant overdosing of other drugs in patients with paracetamol poisoning

    DEFF Research Database (Denmark)

    Schmidt, Lars E; Dalhoff, Kim

    2002-01-01

    AIMS: Paracetamol is frequently involved in intended self-poisoning, and concomitant overdosing of other drugs is commonly reported. The purpose of the study was to investigate further concomitant drug overdose in patients with paracetamol poisoning and to evaluate its effects on the outcome...... of the paracetamol intoxication. METHODS: Six hundred and seventy-one consecutive patients admitted with paracetamol poisoning were studied and concomitant drug intake was recorded. The relative risk of hepatic encephalopathy, death or liver transplantation, hepatic dysfunction, liver cell damage, and renal...... favourable outcome was observed in patients with concomitant NSAID overdose. CONCLUSIONS: Concomitant overdosing of benzodiazepines or analgesics is frequent in patients admitted with paracetamol poisoning. Concomitant benzodiazepine or acetylsalicylic acid overdose was associated with more severe toxicity...

  19. Multilateral disarmament verification

    International Nuclear Information System (INIS)

    Persbo, A.

    2013-01-01

    Non-governmental organisations, such as VERTIC (Verification Research, Training and Information Centre), can play an important role in the promotion of multilateral verification. Parties involved in negotiating nuclear arms accords are for the most part keen that such agreements include suitable and robust provisions for monitoring and verification. Generally progress in multilateral arms control verification is often painstakingly slow, but from time to time 'windows of opportunity' - that is, moments where ideas, technical feasibility and political interests are aligned at both domestic and international levels - may occur and we have to be ready, so the preparatory work is very important. In the context of nuclear disarmament, verification (whether bilateral or multilateral) entails an array of challenges, hurdles and potential pitfalls relating to national security, health, safety and even non-proliferation, so preparatory work is complex and time-greedy. A UK-Norway Initiative was established in order to investigate the role that a non-nuclear-weapon state such as Norway could potentially play in the field of nuclear arms control verification. (A.C.)

  20. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  1. Software verification for nuclear industry

    International Nuclear Information System (INIS)

    Wilburn, N.P.

    1985-08-01

    Why verification of software products throughout the software life cycle is necessary is considered. Concepts of verification, software verification planning, and some verification methodologies for products generated throughout the software life cycle are then discussed

  2. The design of verification regimes

    International Nuclear Information System (INIS)

    Gallagher, N.W.

    1991-01-01

    Verification of a nuclear agreement requires more than knowledge of relevant technologies and institutional arrangements. It also demands thorough understanding of the nature of verification and the politics of verification design. Arms control efforts have been stymied in the past because key players agreed to verification in principle, only to disagree radically over verification in practice. In this chapter, it is shown that the success and stability of arms control endeavors can be undermined by verification designs which promote unilateral rather than cooperative approaches to security, and which may reduce, rather than enhance, the security of both sides. Drawing on logical analysis and practical lessons from previous superpower verification experience, this chapter summarizes the logic and politics of verification and suggests implications for South Asia. The discussion begins by determining what properties all forms of verification have in common, regardless of the participants or the substance and form of their agreement. Viewing verification as the political process of making decisions regarding the occurrence of cooperation points to four critical components: (1) determination of principles, (2) information gathering, (3) analysis and (4) projection. It is shown that verification arrangements differ primarily in regards to how effectively and by whom these four stages are carried out

  3. Improved verification methods for safeguards verifications at enrichment plants

    International Nuclear Information System (INIS)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D.

    2009-01-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF 6 cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  4. Improved verification methods for safeguards verifications at enrichment plants

    Energy Technology Data Exchange (ETDEWEB)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D. [Department of Safeguards, International Atomic Energy Agency, Wagramer Strasse 5, A1400 Vienna (Austria)

    2009-07-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF{sub 6} cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  5. Randomized clinical trial of post-operative radiotherapy versus concomitant carboplatin and radiotherapy for head and neck cancers with lymph node involvement

    International Nuclear Information System (INIS)

    Racadot, Severine; Mercier, Mariette; Dussart, Sophie; Dessard-Diana, Bernadette; Bensadoun, Rene-Jean; Martin, Michel; Malaurie, Emmanuelle; Favrel, Veronique; Housset, Martin; Durdux, Catherine; Journel, Catherine; Calais, Gilles; Huet, Jocelyne; Pillet, Gerard; Hennequin, Christophe; Haddad, Elias; Diana, Christian; Blaska-Jaulerry, Brigitte; Henry-Amar, Michel; Gehanno, Pierre

    2008-01-01

    Background and purpose: Post-operative radiotherapy is indicated for the treatment of head and neck cancers. In vitro, chemotherapy potentiates the cytotoxic effects of radiation. We report the results of a randomized trial testing post-operative radiotherapy alone versus concomitant carboplatin and radiotherapy for head and neck cancers with lymph node involvement. Materials and methods: The study involved patients undergoing curative-intent surgery for head and neck cancers with histological evidence of lymph node involvement. Patients were randomly assigned to receive radiotherapy alone (54-72 Gy, 30-40 fractions, 6-8 weeks) or identical treatment plus concomitant Carboplatin (50 mg/m 2 administered by IV infusion twice weekly). Results: Between February 1994 and June 2002, 144 patients were included. With a median follow-up of 106 months (95% confidence interval (CI) [92-119]), the 2-year rate of loco-regional control was 73% (95% CI: 0.61-0.84) in the combined treatment group and 68% (95% CI: 0.57-0.80) in the radiotherapy group (p = 0.26). Overall survival did not differ significantly between groups (hazard ratio for death, 1.05; 95% CI: 0.69-1.60; p = 0.81). Conclusions: Twice-weekly administration of carboplatin concomitant to post-operative radiotherapy did not improve local control or overall survival rates in this population of patients with node-positive head and neck cancers

  6. DeepMitosis: Mitosis detection via deep detection, verification and segmentation networks.

    Science.gov (United States)

    Li, Chao; Wang, Xinggang; Liu, Wenyu; Latecki, Longin Jan

    2018-04-01

    Mitotic count is a critical predictor of tumor aggressiveness in the breast cancer diagnosis. Nowadays mitosis counting is mainly performed by pathologists manually, which is extremely arduous and time-consuming. In this paper, we propose an accurate method for detecting the mitotic cells from histopathological slides using a novel multi-stage deep learning framework. Our method consists of a deep segmentation network for generating mitosis region when only a weak label is given (i.e., only the centroid pixel of mitosis is annotated), an elaborately designed deep detection network for localizing mitosis by using contextual region information, and a deep verification network for improving detection accuracy by removing false positives. We validate the proposed deep learning method on two widely used Mitosis Detection in Breast Cancer Histological Images (MITOSIS) datasets. Experimental results show that we can achieve the highest F-score on the MITOSIS dataset from ICPR 2012 grand challenge merely using the deep detection network. For the ICPR 2014 MITOSIS dataset that only provides the centroid location of mitosis, we employ the segmentation model to estimate the bounding box annotation for training the deep detection network. We also apply the verification model to eliminate some false positives produced from the detection model. By fusing scores of the detection and verification models, we achieve the state-of-the-art results. Moreover, our method is very fast with GPU computing, which makes it feasible for clinical practice. Copyright © 2018 Elsevier B.V. All rights reserved.

  7. Physics Verification Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-12

    The purpose of the verification project is to establish, through rigorous convergence analysis, that each ASC computational physics code correctly implements a set of physics models and algorithms (code verification); Evaluate and analyze the uncertainties of code outputs associated with the choice of temporal and spatial discretization (solution or calculation verification); and Develop and maintain the capability to expand and update these analyses on demand. This presentation describes project milestones.

  8. Practical requirements for software tools to assist in the validation and verification of hybrid expert systems

    International Nuclear Information System (INIS)

    Singh, G.P.; Cadena, D.; Burgess, J.

    1992-01-01

    Any practical software development effort must remain focused on verification and validation of user requirements. Knowledge-based system development is no different in this regard. In industry today, most expert systems being produced are, in reality, hybrid software systems which, in addition to those components that provide the knowledge base and expert reasoning over the problem domain using various rule-based and object-oriented paradigms, incorporate significant bodies of code based on more traditional software techniques such as database management, graphical user interfaces, hypermedia, spreadsheets, as well as specially developed sequential code. Validation and verification of such hybrid systems must perforce integrate suitable methodologies from all such fields. This paper attempts to provide a broad overview of the practical requirements for methodologies and the concomitant groupware tools which would assist in such an enterprise. These methodologies and groupware tools would facilitate the teamwork efforts necessary to validate and verify all components of such hybrid systems by emphasizing cooperative recording of requirements and negotiated resolutions of any conflicts grounded in a solid understanding of the semantics of such a system

  9. Concomitant overdosing of other drugs in patients with paracetamol poisoning

    DEFF Research Database (Denmark)

    Schmidt, Lars E; Dalhoff, Kim

    2002-01-01

    of the paracetamol intoxication. METHODS: Six hundred and seventy-one consecutive patients admitted with paracetamol poisoning were studied and concomitant drug intake was recorded. The relative risk of hepatic encephalopathy, death or liver transplantation, hepatic dysfunction, liver cell damage, and renal...... was a protective factor in the development of hepatic encephalopathy (OR 0.26; CI 0.07, 0.96). Concomitant acetylsalicylic acid overdose was a risk factor in the development of hepatic encephalopathy (OR 4.87; CI 1.52, 15.7) and death or liver transplantation (OR 6.04; CI 1.69, 21.6). A tendency towards a more...... favourable outcome was observed in patients with concomitant NSAID overdose. CONCLUSIONS: Concomitant overdosing of benzodiazepines or analgesics is frequent in patients admitted with paracetamol poisoning. Concomitant benzodiazepine or acetylsalicylic acid overdose was associated with more severe toxicity...

  10. Histology Verification Demonstrates That Biospectroscopy Analysis of Cervical Cytology Identifies Underlying Disease More Accurately than Conventional Screening: Removing the Confounder of Discordance

    Science.gov (United States)

    Gajjar, Ketan; Ahmadzai, Abdullah A.; Valasoulis, George; Trevisan, Júlio; Founta, Christina; Nasioutziki, Maria; Loufopoulos, Aristotelis; Kyrgiou, Maria; Stasinou, Sofia Melina; Karakitsos, Petros; Paraskevaidis, Evangelos; Da Gama-Rose, Bianca; Martin-Hirsch, Pierre L.; Martin, Francis L.

    2014-01-01

    Background Subjective visual assessment of cervical cytology is flawed, and this can manifest itself by inter- and intra-observer variability resulting ultimately in the degree of discordance in the grading categorisation of samples in screening vs. representative histology. Biospectroscopy methods have been suggested as sensor-based tools that can deliver objective assessments of cytology. However, studies to date have been apparently flawed by a corresponding lack of diagnostic efficiency when samples have previously been classed using cytology screening. This raises the question as to whether categorisation of cervical cytology based on imperfect conventional screening reduces the diagnostic accuracy of biospectroscopy approaches; are these latter methods more accurate and diagnose underlying disease? The purpose of this study was to compare the objective accuracy of infrared (IR) spectroscopy of cervical cytology samples using conventional cytology vs. histology-based categorisation. Methods Within a typical clinical setting, a total of n = 322 liquid-based cytology samples were collected immediately before biopsy. Of these, it was possible to acquire subsequent histology for n = 154. Cytology samples were categorised according to conventional screening methods and subsequently interrogated employing attenuated total reflection Fourier-transform IR (ATR-FTIR) spectroscopy. IR spectra were pre-processed and analysed using linear discriminant analysis. Dunn’s test was applied to identify the differences in spectra. Within the diagnostic categories, histology allowed us to determine the comparative efficiency of conventional screening vs. biospectroscopy to correctly identify either true atypia or underlying disease. Results Conventional cytology-based screening results in poor sensitivity and specificity. IR spectra derived from cervical cytology do not appear to discriminate in a diagnostic fashion when categories were based on conventional screening

  11. FMCT verification: Case studies

    International Nuclear Information System (INIS)

    Hui Zhang

    2001-01-01

    Full text: How to manage the trade-off between the need for transparency and the concern about the disclosure of sensitive information would be a key issue during the negotiations of FMCT verification provision. This paper will explore the general concerns on FMCT verification; and demonstrate what verification measures might be applied to those reprocessing and enrichment plants. A primary goal of an FMCT will be to have the five declared nuclear weapon states and the three that operate unsafeguarded nuclear facilities become parties. One focus in negotiating the FMCT will be verification. Appropriate verification measures should be applied in each case. Most importantly, FMCT verification would focus, in the first instance, on these states' fissile material production facilities. After the FMCT enters into force, all these facilities should be declared. Some would continue operating to produce civil nuclear power or to produce fissile material for non- explosive military uses. The verification measures necessary for these operating facilities would be essentially IAEA safeguards, as currently being applied to non-nuclear weapon states under the NPT. However, some production facilities would be declared and shut down. Thus, one important task of the FMCT verifications will be to confirm the status of these closed facilities. As case studies, this paper will focus on the verification of those shutdown facilities. The FMCT verification system for former military facilities would have to differ in some ways from traditional IAEA safeguards. For example, there could be concerns about the potential loss of sensitive information at these facilities or at collocated facilities. Eventually, some safeguards measures such as environmental sampling might be seen as too intrusive. Thus, effective but less intrusive verification measures may be needed. Some sensitive nuclear facilities would be subject for the first time to international inspections, which could raise concerns

  12. Inspector measurement verification activities

    International Nuclear Information System (INIS)

    George, R.S.; Crouch, R.

    e most difficult and complex activity facing a safeguards inspector involves the verification of measurements and the performance of the measurement system. Remeasurement is the key to measurement verification activities. Remeasurerements using the facility's measurement system provide the bulk of the data needed for determining the performance of the measurement system. Remeasurements by reference laboratories are also important for evaluation of the measurement system and determination of systematic errors. The use of these measurement verification activities in conjunction with accepted inventory verification practices provides a better basis for accepting or rejecting an inventory. (U.S.)

  13. Verification and disarmament

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H. [IAEA, Vienna (Austria)

    1998-07-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed.

  14. Verification and disarmament

    International Nuclear Information System (INIS)

    Blix, H.

    1998-01-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed

  15. Histological and cytological studies on radiosensitivity of cervical carcinoma according to histological types

    International Nuclear Information System (INIS)

    Watanabe, Wataru; Kudo, Ryuichi

    1983-01-01

    Morphological investigation were made on the radiosensitivity, according to the histological types; 1 keratinizing(K), 2 large cell nonkeratinizing(LNK), and 3 small cell nonkeratinizing(S) type. The result obtained are as follows. 1) Histological and cytological estimation of irradiated effects were examined at the 7th day after 10 Gray test-irradiation: (i) Histological studies were done with the biopsy specimens (76 cases): There were significance differences among 3 histological types (LNK>K>S, P S, K>S, P<0.05). (iii) There was a correlation between the histological and cytological irradiation effects. 2) DNA histogram patterns were also examined spectrophotometrically. It seemed that the patterns after test-irradiation were broad and these peaks were situated rather to high ploidy in histologically and cytologically highly effective cases. 3) Early ultrastructural findings after test-irradiation were as follows: (i) appearance of intra-nuclear ''pseudoinclusion'', (ii) swelling of mitochondria, endoplasmic reticulum, and so on. Although these characteristics presented the same sequence of events without regard to their histological types, they were not synchronized. It seemed that they appeared earlier after test-irradiation in histologically high-sensitivity cases than in low-sensitivity cases. (author)

  16. HDL to verification logic translator

    Science.gov (United States)

    Gambles, J. W.; Windley, P. J.

    1992-01-01

    The increasingly higher number of transistors possible in VLSI circuits compounds the difficulty in insuring correct designs. As the number of possible test cases required to exhaustively simulate a circuit design explodes, a better method is required to confirm the absence of design faults. Formal verification methods provide a way to prove, using logic, that a circuit structure correctly implements its specification. Before verification is accepted by VLSI design engineers, the stand alone verification tools that are in use in the research community must be integrated with the CAD tools used by the designers. One problem facing the acceptance of formal verification into circuit design methodology is that the structural circuit descriptions used by the designers are not appropriate for verification work and those required for verification lack some of the features needed for design. We offer a solution to this dilemma: an automatic translation from the designers' HDL models into definitions for the higher-ordered logic (HOL) verification system. The translated definitions become the low level basis of circuit verification which in turn increases the designer's confidence in the correctness of higher level behavioral models.

  17. Does concomitant anterior fundoplication promote dysphagia after laparoscopic Heller myotomy?

    Science.gov (United States)

    Tapper, Donovan; Morton, Connor; Kraemer, Emily; Villadolid, Desiree; Ross, Sharona B; Cowgill, Sarah M; Rosemurgy, Alexander S

    2008-07-01

    Concerns for gastroesophageal reflux after laparoscopic Heller myotomy for achalasia justify considerations of concomitant anterior fundoplication. This study was undertaken to determine if concomitant anterior fundoplication reduces symptoms of reflux after myotomy without promoting dysphagia. From 1992 to 2004, 182 patients underwent laparoscopic Heller myotomy without fundoplication. After a prospective randomized trial justified its concomitant application, anterior fundoplication was undertaken with laparoscopic Heller myotomy in 171 patients from 2004 to 2007. All patients have been prospectively followed. Pre and postoperatively, patients scored the frequency and severity of symptoms of achalasia (including dysphagia, choking, vomiting, regurgitation, chest pain, and heartburn) using a Likert Scale (0 = never/not bothersome to 10 = always/very bothersome). Before myotomy, symptoms of achalasia were frequent and severe for all patients. After myotomy, the frequency and severity of all symptoms of achalasia significantly decreased for all patients (P Heller myotomy alone, concomitant anterior fundoplication led to significantly less frequent and severe heartburn after myotomy (P Heller myotomy reduces the frequency and severity of symptoms of achalasia. Concomitant anterior fundoplication decreases the frequency and severity of heartburn and dysphagia after laparoscopic Heller myotomy. Concomitant anterior fundoplication promotes salutary relief in the frequency and severity of symptoms after myotomy and is warranted.

  18. Likelihood-ratio-based biometric verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    2002-01-01

    This paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that for single-user verification the likelihood ratio is optimal.

  19. Likelihood Ratio-Based Biometric Verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    The paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that, for single-user verification, the likelihood ratio is optimal.

  20. Clinical, biochemical, serological, histological and ultrastructural features of liver disease in drug abusers.

    Science.gov (United States)

    Weller, I V; Cohn, D; Sierralta, A; Mitcheson, M; Ross, M G; Montano, L; Scheuer, P; Thomas, H C

    1984-01-01

    Heroin abusers are frequently found to have abnormal liver function tests and hepatic histology. Hepatitis viruses A, B, and NANB, other drugs or drug contaminants and excessive alcohol consumption are factors thought to contribute. One hundred and sixteen heroin abusers attending a London treatment centre were studied. Sixty two (53%) had a raised aspartate transaminase. This was not explained by current infection with hepatitis A and B, cytomegalo or Epstein-Barr viruses, excessive alcohol consumption (greater than 80 g/day) or concomitant drug taking. Abnormal liver function tests were as frequent in those with markers of current or past HBV infection as those without and there was evidence that both HBV infection and the cause of the abnormal liver function tests were acquired in the first few years of intravenous drug abuse. Liver biopsies from eight patients showed chronic hepatitis with a mild lobular and portal inflammatory infiltrate, fatty change and prominent sinusoidal cells. Electron microscopy showed cytoplasmic trilaminar tubular structures and dense fused membranes in dilated endoplasmic reticulum. These clinical, biochemical, serological, and histological features would suggest a major role for NANB virus infection in the aetiology of hepatitis in heroin abusers. Images Fig. 2 Fig. 3 Fig. 4 PMID:6423458

  1. Coeliac disease and the liver: spectrum of liver histology, serology and treatment response at a tertiary referral centre.

    Science.gov (United States)

    Majumdar, Kaushik; Sakhuja, Puja; Puri, Amarender Singh; Gaur, Kavita; Haider, Aiman; Gondal, Ranjana

    2018-05-01

    Coeliac disease (CD) is a gluten-sensitive enteropathy diagnosed on the basis of ESPGHAN criteria and clinical response to gluten-free diet (GFD). Histological abnormalities on liver biopsy have been noted in CD but have seldom been described. To assess the histological spectrum of 'coeliac hepatitis' and possibility of reversal of such features after a GFD. Twenty-five patients with concomitant CD and hepatic derangement were analysed for clinical profile, laboratory investigations and duodenal and liver biopsy. A histological comparison of pre- and post-GFD duodenal and liver biopsies was carried out, wherever possible. Fifteen patients presenting with CD subsequently developed abnormal liver function tests; 10 patients presenting with liver disease were found to have tissue positive transglutaminase in 70% and antigliadin antibodies in 60%. Serological markers for autoimmune liver disease (AILD) were positive in eight patients. Liver histology ranged from mild reactive hepatitis, chronic hepatitis, steatosis to cirrhosis. Liver biopsies after a GFD were available in six cases, of which five showed a decrease in steatosis, portal and lobular inflammation and fibrosis score. Coeliac hepatitis could be a distinct entity and the patients may present with either CD or secondary hepatic derangement. Evaluation for the presence of CD is recommended for patients presenting with AILD, unexplained transaminasaemia or anaemia. This is one of the very few studies demonstrating the continuum of liver histological changes in 'coeliac hepatitis'. Trial of a GFD may result in clinicopathological improvement of 'coeliac hepatitis'. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  2. Reimplantation of cultivated human bone cells from the posterior maxilla for sinus floor augmentation. Histological results from a randomized controlled clinical trial

    DEFF Research Database (Denmark)

    Hermund, N.U.; Stavropoulos, Andreas; Donatsky, O

    2012-01-01

    OBJECTIVES: The aim of the present randomized clinical study was to evaluate histologically whether the addition of cultivated, autogenous bone cells to a composite graft of deproteinized bovine bone mineral (DBBM) and autogenous bone (AB) for sinus floor augmentation (SFA) enhance bone formation...... bone cells, which were cultivated from a bone biopsy harvested earlier from the tuberosity area. Four months after SFA, two cylindrical biopsies were taken from the augmented sinuses concomitantly with the implant site preparation by means of a trephine bur. An additional biopsy was taken from...... the tuberosity area. Bone density at the augmented sinus and the tuberosity area and the height of augmentation were estimated on non-decalcified histological sections prepared from the biopsies. A relative bone density index (RBD) was also calculated by dividing bone density at the augmented sinus with bone...

  3. Concomitant medication of psychoses in a lifetime perspective

    OpenAIRE

    Vares, Maria; Saetre, Peter; Strålin, Pontus; Levander, Sten; Lindström, Eva; Jönsson, Erik G

    2011-01-01

    Objective Patients treated with antipsychotic drugs often receive concomitant psychotropic compounds. Few studies address this issue from a lifetime perspective. Here, an analysis is presented of the prescription pattern of such concomitant medication from the first contact with psychiatry until the last written note in the case history documents, in patients with a diagnosis of psychotic illness. Methods A retrospective descriptive analysis of all case history data of 66 patients diagnosed w...

  4. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  5. Clinical applications of continuous infusion chemotherapy ahd concomitant radiation therapy

    International Nuclear Information System (INIS)

    Rosenthal, C.J.; Rotman, M.

    1986-01-01

    This book presents information on the following topics: theoretical basis and clinical applications of 5-FU as a radiosensitizer; treatment of hepatic metastases from gastro intestingal primaries with split course radiation therapy; combined modality therapy with 5-FU, Mitomycin-C and radiation therapy for sqamous cell cancers; treatment of bladder carcinoma with concomitant infusion chemotherapy and irradiation; a treatment of invasiv bladder cancer by the XRT/5FU protocol; concomitant radiation therapy and doxorubicin by continuous infusion in advanced malignancies; cis platin by continuous infusion with concurrent radiation therapy in malignant tumors; combination of radiation with concomitant continuous adriamycin infusion in a patient with partially excised pleomorphic soft tissue sarcoma of the lower extremeity; treatment of recurrent carcinoma of the paranasal sinuses using concomitant infusion cis-platinum and radiation therapy; hepatic artery infusion for hepatic metastases in combination with hepatic resection and hepatic radiation; study of simultaneous radiation therapy, continuous infusion, 5FU and bolus mitomycin-C; cancer of the esophagus; continuous infusion VP-16, bolus cis-platinum and simultaneous radiation therapy as salvage therapy in small cell bronchogenic carcinoma; and concomitant radiation, mitomycin-C and 5-FU infusion in gastro intestinal cancer

  6. Can self-verification strivings fully transcend the self-other barrier? Seeking verification of ingroup identities.

    Science.gov (United States)

    Gómez, Angel; Seyle, D Conor; Huici, Carmen; Swann, William B

    2009-12-01

    Recent research has demonstrated self-verification strivings in groups, such that people strive to verify collective identities, which are personal self-views (e.g., "sensitive") associated with group membership (e.g., "women"). Such demonstrations stop short of showing that the desire for self-verification can fully transcend the self-other barrier, as in people working to verify ingroup identities (e.g., "Americans are loud") even when such identities are not self-descriptive ("I am quiet and unassuming"). Five studies focus on such ingroup verification strivings. Results indicate that people prefer to interact with individuals who verify their ingroup identities over those who enhance these identities (Experiments 1-5). Strivings for ingroup identity verification were independent of the extent to which the identities were self-descriptive but were stronger among participants who were highly invested in their ingroup identities, as reflected in high certainty of these identities (Experiments 1-4) and high identification with the group (Experiments 1-5). In addition, whereas past demonstrations of self-verification strivings have been limited to efforts to verify the content of identities (Experiments 1 to 3), the findings also show that they strive to verify the valence of their identities (i.e., the extent to which the identities are valued; Experiments 4 and 5). Self-verification strivings, rather than self-enhancement strivings, appeared to motivate participants' strivings for ingroup identity verification. Links to collective self-verification strivings and social identity theory are discussed.

  7. Concomitant boost radiotherapy for muscle invasive bladder cancer

    Energy Technology Data Exchange (ETDEWEB)

    Pos, Floris J; Tienhoven, Geertjan van; Hulshof, Maarten C.C.M.; Koedooder, Kees; Gonzalez Gonzalez, Dionisio

    2003-07-01

    Purpose: To evaluate the feasibility and efficacy of a concomitant partial bladder boost schedule in radiotherapy for invasive bladder cancer, coupling a limited boost volume with shortening of the overall treatment time. Methods and materials: Between 1994 and 1999, 50 patients with a T2-T4 N0M0 transitional cell carcinoma of the bladder received radiotherapy delivered in a short overall treatment time with a concomitant boost technique. With this technique a dose of 40 Gy in 2-Gy fractions was administered to the small pelvis with a concomitant boost limited to the bladder tumor area plus margin of 15 Gy in fractions of 0.75 Gy. The total tumor dose was 55 Gy in 20 fractions in 4 weeks. Toxicity was scored according to EORTC/RTOG toxicity criteria. Results: The feasibility of the treatment was good. Severe acute toxicity {>=}G3 was observed in seven patients (14%). Severe late toxicity {>=}G3 was observed in six patients (13%). Thirty-seven patients (74%) showed a complete and five (10 %) a partial remission after treatment. The actuarial 3-year freedom of local progression was 55%. Conclusion: In external radiotherapy for muscle invasive bladder cancer a concomitant boost technique coupling a partial bladder boost with shortening of the overall treatment time provides a high probability of local control with acceptable toxicity.

  8. Concomitant boost radiotherapy for muscle invasive bladder cancer

    International Nuclear Information System (INIS)

    Pos, Floris J.; Tienhoven, Geertjan van; Hulshof, Maarten C.C.M.; Koedooder, Kees; Gonzalez Gonzalez, Dionisio

    2003-01-01

    Purpose: To evaluate the feasibility and efficacy of a concomitant partial bladder boost schedule in radiotherapy for invasive bladder cancer, coupling a limited boost volume with shortening of the overall treatment time. Methods and materials: Between 1994 and 1999, 50 patients with a T2-T4 N0M0 transitional cell carcinoma of the bladder received radiotherapy delivered in a short overall treatment time with a concomitant boost technique. With this technique a dose of 40 Gy in 2-Gy fractions was administered to the small pelvis with a concomitant boost limited to the bladder tumor area plus margin of 15 Gy in fractions of 0.75 Gy. The total tumor dose was 55 Gy in 20 fractions in 4 weeks. Toxicity was scored according to EORTC/RTOG toxicity criteria. Results: The feasibility of the treatment was good. Severe acute toxicity ≥G3 was observed in seven patients (14%). Severe late toxicity ≥G3 was observed in six patients (13%). Thirty-seven patients (74%) showed a complete and five (10 %) a partial remission after treatment. The actuarial 3-year freedom of local progression was 55%. Conclusion: In external radiotherapy for muscle invasive bladder cancer a concomitant boost technique coupling a partial bladder boost with shortening of the overall treatment time provides a high probability of local control with acceptable toxicity

  9. New Colors for Histology: Optimized Bivariate Color Maps Increase Perceptual Contrast in Histological Images.

    Science.gov (United States)

    Kather, Jakob Nikolas; Weis, Cleo-Aron; Marx, Alexander; Schuster, Alexander K; Schad, Lothar R; Zöllner, Frank Gerrit

    2015-01-01

    Accurate evaluation of immunostained histological images is required for reproducible research in many different areas and forms the basis of many clinical decisions. The quality and efficiency of histopathological evaluation is limited by the information content of a histological image, which is primarily encoded as perceivable contrast differences between objects in the image. However, the colors of chromogen and counterstain used for histological samples are not always optimally distinguishable, even under optimal conditions. In this study, we present a method to extract the bivariate color map inherent in a given histological image and to retrospectively optimize this color map. We use a novel, unsupervised approach based on color deconvolution and principal component analysis to show that the commonly used blue and brown color hues in Hematoxylin-3,3'-Diaminobenzidine (DAB) images are poorly suited for human observers. We then demonstrate that it is possible to construct improved color maps according to objective criteria and that these color maps can be used to digitally re-stain histological images. To validate whether this procedure improves distinguishability of objects and background in histological images, we re-stain phantom images and N = 596 large histological images of immunostained samples of human solid tumors. We show that perceptual contrast is improved by a factor of 2.56 in phantom images and up to a factor of 2.17 in sets of histological tumor images. Thus, we provide an objective and reliable approach to measure object distinguishability in a given histological image and to maximize visual information available to a human observer. This method could easily be incorporated in digital pathology image viewing systems to improve accuracy and efficiency in research and diagnostics.

  10. Perinatal Outcomes in HIV Positive Pregnant Women with Concomitant Sexually Transmitted Infections

    Directory of Open Access Journals (Sweden)

    Erin Burnett

    2015-01-01

    Full Text Available Objective. To evaluate whether HIV infected pregnant women with concomitant sexually transmitted infection (STIs are at increased risk of adverse perinatal and neonatal outcomes. Methods. We conducted a cohort study of HIV positive women who delivered at an inner-city hospital in Atlanta, Georgia, from 2003 to 2013. Demographics, presence of concomitant STIs, prenatal care information, and maternal and neonatal outcomes were collected. The outcomes examined were the association of the presence of concomitant STIs on the risk of preterm birth (PTB, postpartum hemorrhage, chorioamnionitis, preeclampsia, intrauterine growth restriction, small for gestational age, low Apgar scores, and neonatal intensive care admission. Multiple logistic regression was performed to adjust for potential confounders. Results. HIV positive pregnant women with concomitant STIs had an increased risk of spontaneous PTB (odds ratio (OR 2.11, 95% confidence interval [CI] 1.12–3.97. After adjusting for a history of preterm birth, maternal age, and low CD4+ count at prenatal care entry the association between concomitant STIs and spontaneous PTB persisted (adjusted OR 1.96, 95% CI 1.01–3.78. Conclusions. HIV infected pregnant women with concomitant STIs relative to HIV positive pregnant women without a concomitant STI are at increased risk of spontaneous PTB.

  11. Oral lichen planus preceding concomitant lichen planopilaris.

    Science.gov (United States)

    Stoopler, Eric T; Alfaris, Sausan; Alomar, Dalal; Alawi, Faizan

    2016-09-01

    Lichen planus (LP) is an immune-mediated mucocutaneous disorder with a wide array of clinical presentations. Oral lichen planus (OLP) is characterized clinically by striae, desquamation, and/or ulceration. Lichen planopilaris (LPP), a variant of LP, affects the scalp, resulting in perifollicular erythema and scarring of cutaneous surfaces accompanied by hair loss. The association between OLP and LPP has been reported previously with scant information on concomitant or sequential disease presentation. We describe a patient with concomitant OLP and LPP, and to the best of our knowledge, this is the first report on OLP preceding the onset of LPP. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. [THE DIAGNOSTIC APPROACHES TO VERIFICATION OF STREPTOCOCCUS INFECTION IN PATIENTS WITH INFECTIOUS MONONUCLEOSIS].

    Science.gov (United States)

    Kim, M A; Labushkina, A V; Simovanian, E N; Kharseeva, G G

    2015-11-01

    The Rostovskii state medical university of Minzdrav of Russia, 344022 Rostov-on-Don, Russia The analysis is applied concerning significance of laboratory techniques of verification of streptococcus infection (bacteriological analysis, detection of anti-streptolysin O in pair serums) in 148 patients with infectious mononucleosis aged from 3 to 15 years. The content of anti-streptolysin O exceeded standard in 41 ± 4.8% of patients with concomitant in acute period and in 49.5 ± 4.9% during period of re-convalescence. This data differed from analogous indicator in patients with negative result of examination on streptococcus infection independently of period of disease (9.3 ± 2.8%). The exceeding of standard of anti-streptolysin O was detected more frequently (t ≥ 2, P ≥ 95%) in patients with isolation of Streptococcus pyogenes (56.9 ± 5.8%) than in patients with Streptococcus viridans (31.2 ± 6.5%). The concentration of anti-streptolysin 0 in patients with concomitant streptococcus infection varied within limits 200-1800 IE/ml. The minimal level of anti-streptolysin O (C = 200 IE/mI) was detected independently of type of isolated Streptococcus and period of disease. The high levels of anti-streptolysin O were observed exclusively in patients with isolation of Streptococcus pyogenes. In blood serum ofpatient with concomitant streptococcus infection (Streptococcus pyogenes + Streptococcus viridans) increasing of level of anti-streptolysin O was detected in dynamics of diseases from minimal (C = 200 IE/ ml) to moderately high (200 mononucleosis the anamnesis data is to be considered. The complex bacteriological and serological examination ofpatients is to be implemented This is necessary for early detection ofpatients with streptococcus infection and decreasing risk of formation of streptococcus carrier state.

  13. Utterance Verification for Text-Dependent Speaker Recognition

    DEFF Research Database (Denmark)

    Kinnunen, Tomi; Sahidullah, Md; Kukanov, Ivan

    2016-01-01

    Text-dependent automatic speaker verification naturally calls for the simultaneous verification of speaker identity and spoken content. These two tasks can be achieved with automatic speaker verification (ASV) and utterance verification (UV) technologies. While both have been addressed previously...

  14. New Colors for Histology: Optimized Bivariate Color Maps Increase Perceptual Contrast in Histological Images.

    Directory of Open Access Journals (Sweden)

    Jakob Nikolas Kather

    Full Text Available Accurate evaluation of immunostained histological images is required for reproducible research in many different areas and forms the basis of many clinical decisions. The quality and efficiency of histopathological evaluation is limited by the information content of a histological image, which is primarily encoded as perceivable contrast differences between objects in the image. However, the colors of chromogen and counterstain used for histological samples are not always optimally distinguishable, even under optimal conditions.In this study, we present a method to extract the bivariate color map inherent in a given histological image and to retrospectively optimize this color map. We use a novel, unsupervised approach based on color deconvolution and principal component analysis to show that the commonly used blue and brown color hues in Hematoxylin-3,3'-Diaminobenzidine (DAB images are poorly suited for human observers. We then demonstrate that it is possible to construct improved color maps according to objective criteria and that these color maps can be used to digitally re-stain histological images.To validate whether this procedure improves distinguishability of objects and background in histological images, we re-stain phantom images and N = 596 large histological images of immunostained samples of human solid tumors. We show that perceptual contrast is improved by a factor of 2.56 in phantom images and up to a factor of 2.17 in sets of histological tumor images.Thus, we provide an objective and reliable approach to measure object distinguishability in a given histological image and to maximize visual information available to a human observer. This method could easily be incorporated in digital pathology image viewing systems to improve accuracy and efficiency in research and diagnostics.

  15. A Practitioners Perspective on Verification

    Science.gov (United States)

    Steenburgh, R. A.

    2017-12-01

    NOAAs Space Weather Prediction Center offers a wide range of products and services to meet the needs of an equally wide range of customers. A robust verification program is essential to the informed use of model guidance and other tools by both forecasters and end users alike. In this talk, we present current SWPC practices and results, and examine emerging requirements and potential approaches to satisfy them. We explore the varying verification needs of forecasters and end users, as well as the role of subjective and objective verification. Finally, we describe a vehicle used in the meteorological community to unify approaches to model verification and facilitate intercomparison.

  16. Nuclear disarmament verification

    International Nuclear Information System (INIS)

    DeVolpi, A.

    1993-01-01

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification

  17. Local Control and Survival Following Concomitant Chemoradiotherapy in Inoperable Stage I Non-Small-Cell Lung Cancer

    International Nuclear Information System (INIS)

    Campeau, Marie-Pierre; Herschtal, Alan; Wheeler, Greg; Mac Manus, Michael; Wirth, Andrew; Michael, Michael; Hogg, Annette; Drummond, Elizabeth; Ball, David

    2009-01-01

    Purpose: Concomitant chemoradiotherapy (CRT) increases survival rates compared with radical radiotherapy alone (RT) in Stage III non-small-cell lung cancer (NSCLC), as a result of improved local control. The effect of CRT on local control in Stage I NSCLC is less well documented. We retrospectively reviewed local control and survival following CRT or RT for inoperable Stage I NSCLC patients. Methods and materials: Eligible patients had histologically/cytologically proved inoperable Stage I NSCLC and had undergone complete staging investigations including an F-18 fluorodeoxyglucose positron emission tomography (FDG-PET) scan. Radiotherapy was planned as (1) 60 Gy in 30 fractions over 6 weeks with or without concomitant chemotherapy or (2) 50-55 Gy in 20 fractions without chemotherapy. Results: Between 2000 and 2005, 73 patients met the eligibility criteria and were treated as follows: CRT (60 Gy)-39; RT (60 Gy)-23; RT (50-55 Gy)-11. The median follow-up time for all patients was 18 months (range, 1-81 months). Survival analysis was based on intent to treat. Local progression-free survival (PFS) at 2 years was 66% with CRT and 55% with RT. The 2-year distant PFS was 60% following CRT and 63% after RT. The 2-year PFS rates were 57% and 50%, respectively. The 2-year survival rate for patients treated with CRT was 57% and 33% in patients receiving RT. Conclusions: Despite the use of CRT and routine staging with FDG-PET, both local and distant recurrences remain important causes of treatment failure in patients with inoperable stage I NSCLC.

  18. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  19. Quantum money with classical verification

    Energy Technology Data Exchange (ETDEWEB)

    Gavinsky, Dmitry [NEC Laboratories America, Princeton, NJ (United States)

    2014-12-04

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  20. Quantum money with classical verification

    International Nuclear Information System (INIS)

    Gavinsky, Dmitry

    2014-01-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it

  1. Particularities of Verification Processes for Distributed Informatics Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2013-01-01

    Full Text Available This paper presents distributed informatics applications and characteristics of their development cycle. It defines the concept of verification and there are identified the differences from software testing. Particularities of the software testing and software verification processes are described. The verification steps and necessary conditions are presented and there are established influence factors of quality verification. Software optimality verification is analyzed and some metrics are defined for the verification process.

  2. Nuclear test ban verification

    International Nuclear Information System (INIS)

    Chun, Kin-Yip

    1991-07-01

    This report describes verification and its rationale, the basic tasks of seismic verification, the physical basis for earthquake/explosion source discrimination and explosion yield determination, the technical problems pertaining to seismic monitoring of underground nuclear tests, the basic problem-solving strategy deployed by the forensic seismology resarch team at the University of Toronto, and the scientific significance of the team's research. The research carried out at the Univeristy of Toronto has two components: teleseismic verification using P wave recordings from the Yellowknife Seismic Array (YKA), and regional (close-in) verification using high-frequency L g and P n recordings from the Eastern Canada Telemetered Network. Major differences have been found in P was attenuation among the propagation paths connecting the YKA listening post with seven active nuclear explosion testing areas in the world. Significant revisions have been made to previously published P wave attenuation results, leading to more interpretable nuclear explosion source functions. (11 refs., 12 figs.)

  3. Concomitant Bacterial Meningitis in Infants With Urinary Tract Infection.

    Science.gov (United States)

    Thomson, Joanna; Cruz, Andrea T; Nigrovic, Lise E; Freedman, Stephen B; Garro, Aris C; Ishimine, Paul T; Kulik, Dina M; Uspal, Neil G; Grether-Jones, Kendra L; Miller, Aaron S; Schnadower, David; Shah, Samir S; Aronson, Paul L; Balamuth, Fran

    2017-09-01

    To determine age-stratified prevalence of concomitant bacterial meningitis in infants ≤60 days with a urinary tract infection, we performed a 23-center, retrospective study of 1737 infants with urinary tract infection. Concomitant bacterial meningitis was rare, but more common in infants 0-28 days of age [0.9%; 95% confidence interval (CI): 0.4%-1.9%) compared with infants 29-60 days of age (0.2%; 95% CI: 0%-0.8%).

  4. Clinico-Histologic Conferences: Histology and Disease

    Science.gov (United States)

    Shaw, Phyllis A.; Friedman, Erica S.

    2012-01-01

    Providing a context for learning information and requiring learners to teach specific content has been demonstrated to enhance knowledge retention. To enhance students' appreciation of the role of science and specifically histology in clinical reasoning, disease diagnosis, and treatment, a new teaching format was created to provide clinical…

  5. Phase I/II Trial of Hyperfractionated Concomitant Boost Proton Radiotherapy for Supratentorial Glioblastoma Multiforme

    International Nuclear Information System (INIS)

    Mizumoto, Masashi; Tsuboi, Koji; Igaki, Hiroshi; Yamamoto, Tetsuya; Takano, Shingo; Oshiro, Yoshiko; Hayashi, Yasutaka; Hashii, Haruko; Kanemoto, Ayae; Nakayama, Hidetsugu; Sugahara, Shinji; Sakurai, Hideyuki; Matsumura, Akira; Tokuuye, Koichi

    2010-01-01

    Purpose: To evaluate the safety and efficacy of postoperative hyperfractionated concomitant boost proton radiotherapy with nimustine hydrochloride for supratentorial glioblastoma multiforme (GBM). Methods and Materials: Twenty patients with histologically confirmed supratentorial GBM met the following criteria: (1) a Karnofsky performance status of ≥60; (2) the diameter of the enhanced area before radiotherapy was ≤40 cm; and (3) the enhanced area did not extend to the brain stem, hypothalamus, or thalamus. Magnetic resonance imaging (MRI) T 2 -weighted high area (clinical tumor volume 3 [CTV3]) was treated by x-ray radiotherapy in the morning (50.4 Gy in 28 fractions). More than 6 hours later, 250 MeV proton beams were delivered to the enhanced area plus a 10-mm margin (CTV2) in the first half of the protocol (23.1 GyE in 14 fractions) and to the enhanced volume (CTV1) in the latter half (23.1 GyE in 14 fraction). The total dose to the CTV1 was 96.6 GyE. Nimustine hydrochloride (80 mg/m2) was administered during the first and fourth weeks. Results: Acute toxicity was mainly hematologic and was controllable. Late radiation necrosis and leukoencephalopathy were each seen in one patient. The overall survival rates after 1 and 2 years were 71.1% and 45.3%, respectively. The median survival period was 21.6 months. The 1- and 2-year progression-free survival rates were 45.0% and 15.5%, respectively. The median MRI change-free survival was 11.2 months. Conclusions: Hyperfractionated concomitant boost proton radiotherapy (96.6 GyE in 56 fractions) for GBM was tolerable and beneficial if the target size was well considered. Further studies are warranted to pursue the possibility of controlling border region recurrences.

  6. Effect of Cisplatin on Parotid Gland Function in Concomitant Radiochemotherapy

    International Nuclear Information System (INIS)

    Hey, Jeremias; Setz, Juergen; Gerlach, Reinhard; Vordermark, Dirk; Gernhardt, Christian R.; Kuhnt, Thomas

    2009-01-01

    Purpose: To determine the influence of concomitant radiochemotherapy with cisplatin on parotid gland tissue complication probability. Methods and Materials: Patients treated with either radiotherapy (n = 61) or concomitant radiochemotherapy with cisplatin (n = 36) for head-and-neck cancer were prospectively evaluated. The dose and volume distributions of the parotid glands were noted in dose-volume histograms. Stimulated salivary flow rates were measured before, during the 2nd and 6th weeks and at 4 weeks and 6 months after the treatment. The data were fit using the normal tissue complication probability model of Lyman. Complication was defined as a reduction of the salivary flow rate to less than 25% of the pretreatment flow rate. Results: The normal tissue complication probability model parameter TD 50 (the dose leading to a complication probability of 50%) was found to be 32.2 Gy at 4 weeks and 32.1 Gy at 6 months for concomitant radiochemotherapy and 41.1 Gy at 4 weeks and 39.6 Gy at 6 months for radiotherapy. The tolerated dose for concomitant radiochemotherapy was at least 7 to 8 Gy lower than for radiotherapy alone at TD 50 . Conclusions: In this study, the concomitant radiochemotherapy tended to cause a higher probability of parotid gland tissue damage. Advanced radiotherapy planning approaches such as intensity-modulated radiotherapy may be partiticularly important for parotid sparing in radiochemotherapy because of cisplatin-related increased radiosensitivity of glands.

  7. Java bytecode verification via static single assignment form

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian W.; Franz, Michael

    2008-01-01

    Java Virtual Machines (JVMs) traditionally perform bytecode verification by way of an iterative data-flow analysis. Bytecode verification is necessary to ensure type safety because temporary variables in the JVM are not statically typed. We present an alternative verification mechanism that trans......Java Virtual Machines (JVMs) traditionally perform bytecode verification by way of an iterative data-flow analysis. Bytecode verification is necessary to ensure type safety because temporary variables in the JVM are not statically typed. We present an alternative verification mechanism...

  8. Formal verification of algorithms for critical systems

    Science.gov (United States)

    Rushby, John M.; Von Henke, Friedrich

    1993-01-01

    We describe our experience with formal, machine-checked verification of algorithms for critical applications, concentrating on a Byzantine fault-tolerant algorithm for synchronizing the clocks in the replicated computers of a digital flight control system. First, we explain the problems encountered in unsynchronized systems and the necessity, and criticality, of fault-tolerant synchronization. We give an overview of one such algorithm, and of the arguments for its correctness. Next, we describe a verification of the algorithm that we performed using our EHDM system for formal specification and verification. We indicate the errors we found in the published analysis of the algorithm, and other benefits that we derived from the verification. Based on our experience, we derive some key requirements for a formal specification and verification system adequate to the task of verifying algorithms of the type considered. Finally, we summarize our conclusions regarding the benefits of formal verification in this domain, and the capabilities required of verification systems in order to realize those benefits.

  9. Challenges for effective WMD verification

    International Nuclear Information System (INIS)

    Andemicael, B.

    2006-01-01

    Effective verification is crucial to the fulfillment of the objectives of any disarmament treaty, not least as regards the proliferation of weapons of mass destruction (WMD). The effectiveness of the verification package depends on a number of factors, some inherent in the agreed structure and others related to the type of responses demanded by emerging challenges. The verification systems of three global agencies-the IAEA, the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO, currently the Preparatory Commission), and the Organization for the Prohibition of Chemical Weapons (OPCW)-share similarities in their broad objectives of confidence-building and deterrence by assuring members that rigorous verification would deter or otherwise detect non-compliance. Yet they are up against various constraints and other issues, both internal and external to the treaty regime. These constraints pose major challenges to the effectiveness and reliability of the verification operations. In the nuclear field, the IAEA safeguards process was the first to evolve incrementally from modest Statute beginnings to a robust verification system under the global Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The nuclear non-proliferation regime is now being supplemented by a technology-intensive verification system of the nuclear test-ban treaty (CTBT), a product of over three decades of negotiation. However, there still remain fundamental gaps and loopholes in the regime as a whole, which tend to diminish the combined effectiveness of the IAEA and the CTBT verification capabilities. He three major problems are (a) the lack of universality of membership, essentially because of the absence of three nuclear weapon-capable States-India, Pakistan and Israel-from both the NPT and the CTBT, (b) the changes in US disarmament policy, especially in the nuclear field, and (c) the failure of the Conference on Disarmament to conclude a fissile material cut-off treaty. The world is

  10. A Syntactic-Semantic Approach to Incremental Verification

    OpenAIRE

    Bianculli, Domenico; Filieri, Antonio; Ghezzi, Carlo; Mandrioli, Dino

    2013-01-01

    Software verification of evolving systems is challenging mainstream methodologies and tools. Formal verification techniques often conflict with the time constraints imposed by change management practices for evolving systems. Since changes in these systems are often local to restricted parts, an incremental verification approach could be beneficial. This paper introduces SiDECAR, a general framework for the definition of verification procedures, which are made incremental by the framework...

  11. Concomitant chemoradiotherapy with high dose rate brachytherapy ...

    African Journals Online (AJOL)

    Concomitant chemoradiotherapy with high dose rate brachytherapy as a definitive treatment modality for locally advanced cervical cancer. T Refaat, A Elsaid, N Lotfy, K Kiel, W Small Jr, P Nickers, E Lartigau ...

  12. Verification and validation benchmarks.

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of

  13. Verification of Ceramic Structures

    Science.gov (United States)

    Behar-Lafenetre, Stephanie; Cornillon, Laurence; Rancurel, Michael; De Graaf, Dennis; Hartmann, Peter; Coe, Graham; Laine, Benoit

    2012-07-01

    In the framework of the “Mechanical Design and Verification Methodologies for Ceramic Structures” contract [1] awarded by ESA, Thales Alenia Space has investigated literature and practices in affiliated industries to propose a methodological guideline for verification of ceramic spacecraft and instrument structures. It has been written in order to be applicable to most types of ceramic or glass-ceramic materials - typically Cesic®, HBCesic®, Silicon Nitride, Silicon Carbide and ZERODUR®. The proposed guideline describes the activities to be performed at material level in order to cover all the specific aspects of ceramics (Weibull distribution, brittle behaviour, sub-critical crack growth). Elementary tests and their post-processing methods are described, and recommendations for optimization of the test plan are given in order to have a consistent database. The application of this method is shown on an example in a dedicated article [7]. Then the verification activities to be performed at system level are described. This includes classical verification activities based on relevant standard (ECSS Verification [4]), plus specific analytical, testing and inspection features. The analysis methodology takes into account the specific behaviour of ceramic materials, especially the statistical distribution of failures (Weibull) and the method to transfer it from elementary data to a full-scale structure. The demonstration of the efficiency of this method is described in a dedicated article [8]. The verification is completed by classical full-scale testing activities. Indications about proof testing, case of use and implementation are given and specific inspection and protection measures are described. These additional activities are necessary to ensure the required reliability. The aim of the guideline is to describe how to reach the same reliability level as for structures made of more classical materials (metals, composites).

  14. Is flow verification necessary

    International Nuclear Information System (INIS)

    Beetle, T.M.

    1986-01-01

    Safeguards test statistics are used in an attempt to detect diversion of special nuclear material. Under assumptions concerning possible manipulation (falsification) of safeguards accounting data, the effects on the statistics due to diversion and data manipulation are described algebraically. A comprehensive set of statistics that is capable of detecting any diversion of material is defined in terms of the algebraic properties of the effects. When the assumptions exclude collusion between persons in two material balance areas, then three sets of accounting statistics are shown to be comprehensive. Two of the sets contain widely known accountancy statistics. One of them does not require physical flow verification - comparisons of operator and inspector data for receipts and shipments. The third set contains a single statistic which does not require physical flow verification. In addition to not requiring technically difficult and expensive flow verification, this single statistic has several advantages over other comprehensive sets of statistics. This algebraic approach as an alternative to flow verification for safeguards accountancy is discussed in this paper

  15. Procedure generation and verification

    International Nuclear Information System (INIS)

    Sheely, W.F.

    1986-01-01

    The Department of Energy has used Artificial Intelligence of ''AI'' concepts to develop two powerful new computer-based techniques to enhance safety in nuclear applications. The Procedure Generation System, and the Procedure Verification System, can be adapted to other commercial applications, such as a manufacturing plant. The Procedure Generation System can create a procedure to deal with the off-normal condition. The operator can then take correct actions on the system in minimal time. The Verification System evaluates the logic of the Procedure Generator's conclusions. This evaluation uses logic techniques totally independent of the Procedure Generator. The rapid, accurate generation and verification of corrective procedures can greatly reduce the human error, possible in a complex (stressful/high stress) situation

  16. A Scalable Approach for Hardware Semiformal Verification

    OpenAIRE

    Grimm, Tomas; Lettnin, Djones; Hübner, Michael

    2018-01-01

    The current verification flow of complex systems uses different engines synergistically: virtual prototyping, formal verification, simulation, emulation and FPGA prototyping. However, none is able to verify a complete architecture. Furthermore, hybrid approaches aiming at complete verification use techniques that lower the overall complexity by increasing the abstraction level. This work focuses on the verification of complex systems at the RT level to handle the hardware peculiarities. Our r...

  17. Feasibility and efficacy of accelerated weekly concomitant boost postoperative radiation therapy combined with concomitant chemotherapy in patients with locally advanced head and neck cancer.

    Science.gov (United States)

    Pehlivan, Berrin; Luthi, Francois; Matzinger, Oscar; Betz, Michael; Dragusanu, Daniela; Bulling, Shelley; Bron, Luc; Pasche, Philippe; Seelentag, Walter; Mirimanoff, René O; Zouhair, Abderrahim; Ozsahin, Mahmut

    2009-05-01

    The aim of this study was to assess feasibility and efficacy of weekly concomitant boost accelerated postoperative radiation therapy (PORT) with concomitant chemotherapy (CT) in patients with locally advanced head and neck cancer (LAHNC). Conformal or intensity-modulated 66-Gy RT was performed in 5.5 weeks in 40 patients. Cisplatin was given at days 1, 22, and 43. Median follow-up was 36 months. Grade 3 mucositis, dysphagia, and erythema was observed in ten (25%), nine (23%), and six (13%) patients, respectively. Grade 3 or more anemia was observed in two (6%) patients, and leukopenia in five (13%) patients. No grade 3 or 4 thrombocytopenia was observed. Grade 3 nephrotoxicity was observed in one patient (3%). No treatment-related mortality was observed. Grade 2 or more xerostomia and edema were observed in ten (25%) and one (3%) patient, respectively. Locoregional relapse occurred in eight patients, and seven patients developed distant metastases. Median time to locoregional relapse was 6 months. Three-year overall, disease-free survival, and locoregional control rates were 63%, 62%, and 81%, respectively. Multivariate analysis revealed that the only prognostic factor was nodal status. Reducing overall treatment time using accelerated PORT/CT by weekly concomitant boost (six fractions per week) combined with concomitant cisplatin CT is easily feasible with acceptable morbidity.

  18. Concomitant sensitization to glutaraldehyde and methacrylic monomers among dentists and their patients

    Directory of Open Access Journals (Sweden)

    Maya Grigorievna Lyapina

    2016-06-01

    Full Text Available Background: A multitude of methacrylic monomers is used in dentistry. Glutaraldehyde (G is used in dental practice and consumer products as a broad-spectrum antimicrobial agent. The purpose of our study is to evaluate the frequency and the risk of concomitant sensitization to some methacrylic monomers (methyl methacrylate (MMA, triethyleneglycol dimethacrylate (TEGDMA, ethyleneglycol dimethacrylate (EGDMA, 2,2-bis-[4-(2-hydroxy-3-methacrylo-xypropoxyphenyl]-propane (Bis-GMA, 2-hydroxy-ethyl methacrylate (2-HEMA and tetrahydrofurfuryl methacrylate (THFMA and glutaraldehyde in students of dentistry, students from the dental technician school, dental professionals and dental patients. Material and Methods: A total of 262 participants were included in the study: students of dentistry, students from the dental technician school, dental professionals, and dental patients as a control group. All were patch-tested with methacrylic monomers and glutaraldehyde. The results were subject to the statistical analysis (p < 0.05. Results: Among the group of dental students, the highest frequency of concomitant sensitization was to TEGDMA and G (15.5%. In the group of patients the highest frequency of concomitant sensitization was to EGDMA and G (16.4%. The frequency of concomitant sensitization among dental professionals was much lower, with the highest rate to TEGDMA and G (7.7%, too. We consider the students from the dental technician school, where the exposure to glutaraldehyde is less likely, to be the group at a lesser risk of concomitant sensitization. Conclusions: Dental students and dental patients could be outlined as groups at the risk of concomitant sensitization to glutaraldehyde and methacrylic monomers. For dental professionals, we assumed an increased risk for concomitant sensitization to TEGDMA and aldehydes that are commonly used in dentistry. We consider the students from the dental technician school to be the group at a lesser risk of

  19. Survey on Offline Finger Print Verification System

    NARCIS (Netherlands)

    Suman, R.; Kaur, R.

    2012-01-01

    The fingerprint verification, means where "verification" implies a user matching a fingerprint against a single fingerprint associated with the identity that the user claims. Biometrics can be classified into two types Behavioral (signature verification, keystroke dynamics, etc.) And Physiological

  20. 3D prostate histology image reconstruction: Quantifying the impact of tissue deformation and histology section location

    Directory of Open Access Journals (Sweden)

    Eli Gibson

    2013-01-01

    Full Text Available Background: Guidelines for localizing prostate cancer on imaging are ideally informed by registered post-prostatectomy histology. 3D histology reconstruction methods can support this by reintroducing 3D spatial information lost during histology processing. The need to register small, high-grade foci drives a need for high accuracy. Accurate 3D reconstruction method design is impacted by the answers to the following central questions of this work. (1 How does prostate tissue deform during histology processing? (2 What spatial misalignment of the tissue sections is induced by microtome cutting? (3 How does the choice of reconstruction model affect histology reconstruction accuracy? Materials and Methods: Histology, paraffin block face and magnetic resonance images were acquired for 18 whole mid-gland tissue slices from six prostates. 7-15 homologous landmarks were identified on each image. Tissue deformation due to histology processing was characterized using the target registration error (TRE after landmark-based registration under four deformation models (rigid, similarity, affine and thin-plate-spline [TPS]. The misalignment of histology sections from the front faces of tissue slices was quantified using manually identified landmarks. The impact of reconstruction models on the TRE after landmark-based reconstruction was measured under eight reconstruction models comprising one of four deformation models with and without constraining histology images to the tissue slice front faces. Results: Isotropic scaling improved the mean TRE by 0.8-1.0 mm (all results reported as 95% confidence intervals, while skew or TPS deformation improved the mean TRE by <0.1 mm. The mean misalignment was 1.1-1.9΀ (angle and 0.9-1.3 mm (depth. Using isotropic scaling, the front face constraint raised the mean TRE by 0.6-0.8 mm. Conclusions: For sub-millimeter accuracy, 3D reconstruction models should not constrain histology images to the tissue slice front faces and

  1. In-core Instrument Subcritical Verification (INCISV) - Core Design Verification Method - 358

    International Nuclear Information System (INIS)

    Prible, M.C.; Heibel, M.D.; Conner, S.L.; Sebastiani, P.J.; Kistler, D.P.

    2010-01-01

    According to the standard on reload startup physics testing, ANSI/ANS 19.6.1, a plant must verify that the constructed core behaves sufficiently close to the designed core to confirm that the various safety analyses bound the actual behavior of the plant. A large portion of this verification must occur before the reactor operates at power. The INCISV Core Design Verification Method uses the unique characteristics of a Westinghouse Electric Company fixed in-core self powered detector design to perform core design verification after a core reload before power operation. A Vanadium self powered detector that spans the length of the active fuel region is capable of confirming the required core characteristics prior to power ascension; reactivity balance, shutdown margin, temperature coefficient and power distribution. Using a detector element that spans the length of the active fuel region inside the core provides a signal of total integrated flux. Measuring the integrated flux distributions and changes at various rodded conditions and plant temperatures, and comparing them to predicted flux levels, validates all core necessary core design characteristics. INCISV eliminates the dependence on various corrections and assumptions between the ex-core detectors and the core for traditional physics testing programs. This program also eliminates the need for special rod maneuvers which are infrequently performed by plant operators during typical core design verification testing and allows for safer startup activities. (authors)

  2. Fingerprint verification prediction model in hand dermatitis.

    Science.gov (United States)

    Lee, Chew K; Chang, Choong C; Johor, Asmah; Othman, Puwira; Baba, Roshidah

    2015-07-01

    Hand dermatitis associated fingerprint changes is a significant problem and affects fingerprint verification processes. This study was done to develop a clinically useful prediction model for fingerprint verification in patients with hand dermatitis. A case-control study involving 100 patients with hand dermatitis. All patients verified their thumbprints against their identity card. Registered fingerprints were randomized into a model derivation and model validation group. Predictive model was derived using multiple logistic regression. Validation was done using the goodness-of-fit test. The fingerprint verification prediction model consists of a major criterion (fingerprint dystrophy area of ≥ 25%) and two minor criteria (long horizontal lines and long vertical lines). The presence of the major criterion predicts it will almost always fail verification, while presence of both minor criteria and presence of one minor criterion predict high and low risk of fingerprint verification failure, respectively. When none of the criteria are met, the fingerprint almost always passes the verification. The area under the receiver operating characteristic curve was 0.937, and the goodness-of-fit test showed agreement between the observed and expected number (P = 0.26). The derived fingerprint verification failure prediction model is validated and highly discriminatory in predicting risk of fingerprint verification in patients with hand dermatitis. © 2014 The International Society of Dermatology.

  3. Concomitant Persistent Pain in Classical Trigeminal Neuralgia – Evidence for Different Subtypes

    DEFF Research Database (Denmark)

    Maarbjerg, Stine; Gozalov, Aydin; Olesen, Jes

    2014-01-01

    and clinical importance of concomitant persistent pain in TN. This has led to subgrouping of TN into forms with and without concomitant persistent pain in the recent 3rd International Classification of Headache Disorders beta classification. METHODS: In this cross-sectional study, data on the clinical...... to sodium channel blockers (P = .001). There were no significant differences in other clinical characteristics. CONCLUSIONS: Concomitant persistent pain is very prevalent in TN and is not a consequence of paroxysmal pain. Findings support that the 3rd International Classification of Headache Disorders beta...

  4. Biological effects of concomitant influence of radioactive and chemical factors. (Experimental research)

    International Nuclear Information System (INIS)

    Meshkov, N.A.

    1995-01-01

    Remote consequences of concomitant influence of radioactive and chemical hazards substances, modeling the ecological situation at the territory of the Altaj region after the nuclear tests at the Semipalatinsk test site is studied on the mice. Negative effect of the concomitant impact of radioactive and hazardous chemical substances on the basic morpho-functional systems of animals is revealed; the reproduction function proved to be the most sensitive one. It is noted that the radiation factor constitutes the basis of all violations of bone marrow blood-producing function by concomitant influence

  5. Significant clinical differences in primary hyperparathyroidism between patients with and those without concomitant thyroid disease

    International Nuclear Information System (INIS)

    Masatsugu, Toshihiro; Kuroki, Syoji; Tanaka, Masao

    2005-01-01

    We evaluated the differences in diagnosis and treatment for primary hyperparathyroidism (pHPT) in patients with and those without concomitant thyroid disease. One hundred and ten patients with pHPT underwent parathyroid localization and thyroid examination by ultrasonography (US) and sestamibi scintigraphy (MIBI). The clinical and biochemical findings, parathyroid localization, and operations performed were compared in 49 patients without thyroid disease and 61 patients with thyroid disease. Asymptomatic hypercalcemia was significantly more prevalent in patients with concomitant thyroid disease (88.5%) than in those without thyroid disease (49.0%) (P<0.01). The mean serum calcium was significantly higher and the inorganic phosphate level was significantly lower in patients without concomitant thyroid disease than in those with concomitant thyroid disease (P<0.05, P<0.01, respectively). The pathologic parathyroid gland was identified significantly more often in patients without concomitant thyroid disease than in those with concomitant thyroid disease both by US and MIBI (P<0.05). Unilateral exploration was performed more often in patients without thyroid disease than in those with thyroid disease (P<0.01). Primary hyperparathyroidism was diagnosed at an earlier stage in patients with concomitant thyroid disease. Thyroid disease concomitant with pHPT influenced parathyroid localization as well as the indication for minimally invasive parathyroidectomy. (author)

  6. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  7. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William L.; Trucano, Timothy G.

    2008-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  8. Quantitative analysis of patient-specific dosimetric IMRT verification

    International Nuclear Information System (INIS)

    Budgell, G J; Perrin, B A; Mott, J H L; Fairfoul, J; Mackay, R I

    2005-01-01

    Patient-specific dosimetric verification methods for IMRT treatments are variable, time-consuming and frequently qualitative, preventing evidence-based reduction in the amount of verification performed. This paper addresses some of these issues by applying a quantitative analysis parameter to the dosimetric verification procedure. Film measurements in different planes were acquired for a series of ten IMRT prostate patients, analysed using the quantitative parameter, and compared to determine the most suitable verification plane. Film and ion chamber verification results for 61 patients were analysed to determine long-term accuracy, reproducibility and stability of the planning and delivery system. The reproducibility of the measurement and analysis system was also studied. The results show that verification results are strongly dependent on the plane chosen, with the coronal plane particularly insensitive to delivery error. Unexpectedly, no correlation could be found between the levels of error in different verification planes. Longer term verification results showed consistent patterns which suggest that the amount of patient-specific verification can be safely reduced, provided proper caution is exercised: an evidence-based model for such reduction is proposed. It is concluded that dose/distance to agreement (e.g., 3%/3 mm) should be used as a criterion of acceptability. Quantitative parameters calculated for a given criterion of acceptability should be adopted in conjunction with displays that show where discrepancies occur. Planning and delivery systems which cannot meet the required standards of accuracy, reproducibility and stability to reduce verification will not be accepted by the radiotherapy community

  9. Post-silicon and runtime verification for modern processors

    CERN Document Server

    Wagner, Ilya

    2010-01-01

    The purpose of this book is to survey the state of the art and evolving directions in post-silicon and runtime verification. The authors start by giving an overview of the state of the art in verification, particularly current post-silicon methodologies in use in the industry, both for the domain of processor pipeline design and for memory subsystems. They then dive into the presentation of several new post-silicon verification solutions aimed at boosting the verification coverage of modern processors, dedicating several chapters to this topic. The presentation of runtime verification solution

  10. Verification and the safeguards legacy

    International Nuclear Information System (INIS)

    Perricos, Demetrius

    2001-01-01

    A number of inspection or monitoring systems throughout the world over the last decades have been structured drawing upon the IAEA experience of setting up and operating its safeguards system. The first global verification system was born with the creation of the IAEA safeguards system, about 35 years ago. With the conclusion of the NPT in 1968, inspections were to be performed under safeguards agreements, concluded directly between the IAEA and non-nuclear weapon states parties to the Treaty. The IAEA developed the safeguards system within the limitations reflected in the Blue Book (INFCIRC 153), such as limitations of routine access by the inspectors to 'strategic points', including 'key measurement points', and the focusing of verification on declared nuclear material in declared installations. The system, based as it was on nuclear material accountancy. It was expected to detect a diversion of nuclear material with a high probability and within a given time and therefore determine also that there had been no diversion of nuclear material from peaceful purposes. The most vital element of any verification system is the inspector. Technology can assist but cannot replace the inspector in the field. Their experience, knowledge, intuition and initiative are invaluable factors contributing to the success of any inspection regime. The IAEA inspectors are however not part of an international police force that will intervene to prevent a violation taking place. To be credible they should be technically qualified with substantial experience in industry or in research and development before they are recruited. An extensive training program has to make sure that the inspectors retain their professional capabilities and that it provides them with new skills. Over the years, the inspectors and through them the safeguards verification system gained experience in: organization and management of large teams; examination of records and evaluation of material balances

  11. Differences Between Snakebites with Concomitant Use of Alcohol or Drugs and Single Snakebites.

    Science.gov (United States)

    Schulte, Joann; Kleinschmidt, Kurt C; Domanski, Kristina; Smith, Eric Anthony; Haynes, Ashley; Roth, Brett

    2018-02-01

    Published reports have suggested that the concurrent use of alcohol or drugs occurs among some snakebite victims, but no national assessment of such data exists. We used data from US poison control centers collected during telephone calls in calendar years 2000-2013 to compare snake envenomations with concomitant use of drugs, alcohol, or both to snakebites lacking such use. A total of 608 snakebites with 659 instances of concomitant alcohol/drug use were reported, which represent approximately 1% of 92,751 snakebites reported to US poison control centers. An annual mean of 48 snakebites with concomitant use of alcohol/drugs was reported, compared with a mean of 6625 snakebites per year with no concomitant use of alcohol/drugs. Most cases involved men, peaked during the summer months, and involved copperheads or rattlesnakes, which mirrored overall trends. Snakebite victims who also used alcohol/drugs were more likely than victims with only a snakebite reported to be bitten by rattlesnakes, to be admitted to the hospital, and die. Alcohol was the most common reported concomitant substance, but other substances were reported. Snakebites with concomitant use of alcohol/drugs are uncommon, accounting for approximately 1% of the snakebite envenomations reported annually to US poison control centers; however, snakebite victims also reporting alcohol/drug use are more likely to be bitten by rattlesnakes, be admitted to a healthcare facility, and die.

  12. RESRAD-BUILD verification

    International Nuclear Information System (INIS)

    Kamboj, S.; Yu, C.; Biwer, B. M.; Klett, T.

    2002-01-01

    The results generated by the RESRAD-BUILD code (version 3.0) were verified with hand or spreadsheet calculations using equations given in the RESRAD-BUILD manual for different pathways. For verification purposes, different radionuclides--H-3, C-14, Na-22, Al-26, Cl-36, Mn-54, Co-60, Au-195, Ra-226, Ra-228, Th-228, and U-238--were chosen to test all pathways and models. Tritium, Ra-226, and Th-228 were chosen because of the special tritium and radon models in the RESRAD-BUILD code. Other radionuclides were selected to represent a spectrum of radiation types and energies. Verification of the RESRAD-BUILD code was conducted with an initial check of all the input parameters for correctness against their original source documents. Verification of the calculations was performed external to the RESRAD-BUILD code with Microsoft Excel to verify all the major portions of the code. In some cases, RESRAD-BUILD results were compared with those of external codes, such as MCNP (Monte Carlo N-particle) and RESRAD. The verification was conducted on a step-by-step basis and used different test cases as templates. The following types of calculations were investigated: (1) source injection rate, (2) air concentration in the room, (3) air particulate deposition, (4) radon pathway model, (5) tritium model for volume source, (6) external exposure model, (7) different pathway doses, and (8) time dependence of dose. Some minor errors were identified in version 3.0; these errors have been corrected in later versions of the code. Some possible improvements in the code were also identified

  13. Spent fuel verification options for final repository safeguards in Finland. A study on verification methods, their feasibility and safety aspects

    International Nuclear Information System (INIS)

    Hautamaeki, J.; Tiitta, A.

    2000-12-01

    The verification possibilities of the spent fuel assemblies from the Olkiluoto and Loviisa NPPs and the fuel rods from the research reactor of VTT are contemplated in this report. The spent fuel assemblies have to be verified at the partial defect level before the final disposal into the geologic repository. The rods from the research reactor may be verified at the gross defect level. Developing a measurement system for partial defect verification is a complicated and time-consuming task. The Passive High Energy Gamma Emission Tomography and the Fork Detector combined with Gamma Spectrometry are the most potential measurement principles to be developed for this purpose. The whole verification process has to be planned to be as slick as possible. An early start in the planning of the verification and developing the measurement devices is important in order to enable a smooth integration of the verification measurements into the conditioning and disposal process. The IAEA and Euratom have not yet concluded the safeguards criteria for the final disposal. E.g. criteria connected to the selection of the best place to perform the verification. Measurements have not yet been concluded. Options for the verification places have been considered in this report. One option for a verification measurement place is the intermediate storage. The other option is the encapsulation plant. Crucial viewpoints are such as which one offers the best practical possibilities to perform the measurements effectively and which would be the better place in the safeguards point of view. Verification measurements may be needed both in the intermediate storages and in the encapsulation plant. In this report also the integrity of the fuel assemblies after wet intermediate storage period is assessed, because the assemblies have to stand the handling operations of the verification measurements. (orig.)

  14. Concomitant hypo-hyperdontia with dens invaginatus.

    Science.gov (United States)

    Manjunatha, B S; Nagarajappa, D; Singh, Santosh Kumar

    2011-01-01

    Although developmental anomalies of tooth number are quite common in permanent dentition, concomitant occurrence of hypohyperdontia is a very rare mixed numeric anomalous condition of teeth. Very few cases of this condition have been reported in the English literature. Here we report such a rare case noted in a 26 year-old male dental graduate with no other associated systemic condition or syndrome.

  15. Histologic progression in non-hodgkin's lymphoma

    International Nuclear Information System (INIS)

    Hubbard, S.M.; Chabner, B.A.; DeVita, V.T. Jr.; Simon, R.; Berard, C.W.; Jones, R.B.; Garvin, A.J.; Canellos, G.P.; Osborne, C.K.; Young, R.C.

    1982-01-01

    The clinical course and biopsy specimens from 515 consecutive non-Hodgkin's lymphoma patients was evaluated retrospectively in an attempt to determine the clinical importance of documented changes in histology over time. Two-hundred and five of these patients has an initial diagnosis of nodular lymphoma and were reviewed for this anaysis. Sixty-three underwent a repeat biopsy greater than 6 mo after initial diagnosis. In 23 patients, these repeat biopsies revealed a change in histology to a diffuse pattern and/or a change to a larger ''histiocytic'' cell type, while repeat biopsies for the other 40 (63%) disclosd persistence of a nodular pattern and no clear change in basic cell type. Progression from nodular lymphoma to diffuse histiocytic, mixed, or undifferentiated types of lymphomas of Rappaport was found in repeate biopsies obtained from 19 patients (30%). Prognosis for survival following a biopsy that demonstrated histologic change was related to the histology demonstrated at the most recent biopsy and to the response to subsequent drug treatment. Survival following repeat biopsy for these 19 patients was significantly shorter than for the 40 patients whose histology remained nodular (p < 0.001). However, attainment of a complete remission with intensive combination chemotherapy was associated with prolonged survival in eight patients and prolonged disease-free survival in one patient. Since prior treatment may compromise the ability to achieve a complete response to chemotherapy in patients with nodular lymphoma who develop an aggressive diffuse histology, the likelihood of histologic progression must be considered in the design of future clinical trials in nodular lymphoma. Histologic progression does not preclude attainment of a complete response to intensive chemotherapy

  16. Methods for addressing "innocent bystanders" when evaluating safety of concomitant vaccines.

    Science.gov (United States)

    Wang, Shirley V; Abdurrob, Abdurrahman; Spoendlin, Julia; Lewis, Edwin; Newcomer, Sophia R; Fireman, Bruce; Daley, Matthew F; Glanz, Jason M; Duffy, Jonathan; Weintraub, Eric S; Kulldorff, Martin

    2018-04-01

    The need to develop methods for studying the safety of childhood immunization schedules has been recognized by the Institute of Medicine and Department of Health and Human Services. The recommended childhood immunization schedule includes multiple vaccines in a visit. A key concern is safety of concomitant (same day) versus separate day vaccination. This paper addresses a methodological challenge for observational studies using a self-controlled design to investigate the safety of concomitant vaccination. We propose a process for distinguishing which of several concomitantly administered vaccines is responsible for increased risk of an adverse event while adjusting for confounding due to relationships between effect modifying risk factors and concomitant vaccine combinations. We illustrate the approach by re-examining the known increase in risk of seizure 7 to 10 days after measles-mumps-rubella (MMR) vaccination and evaluating potential independent or modifying effects of other vaccines. Initial analyses suggested that DTaP had both an independent and potentiating effect on seizure. After accounting for the relationship between age at vaccination and vaccine combination, there was little evidence for increased risk of seizure with same day administration of DTaP and MMR; incidence rate ratio, 95% confidence interval 1.2 (0.9-1.6), P value = θ.226. We have shown that when using a self-controlled design to investigate safety of concomitant vaccination, it can be critically important to adjust for time-invariant effect modifying risk factors, such as age at time of vaccination, which are structurally related to vaccination patterns due to recommended immunization schedules. Copyright © 2018 John Wiley & Sons, Ltd.

  17. Should anti-inhibitor coagulant complex and tranexamic acid be used concomitantly?

    Science.gov (United States)

    Valentino, L A; Holme, P A

    2015-11-01

    Inhibitor development in haemophilia patients is challenging especially when undergoing surgical procedures. The development of an inhibitor precludes using factor VIII (FVIII) therapy thereby requiring a bypassing agent (BPA) for surgical bleeding prophylaxis if the FVIII inhibitor titre >5 BU. Concomitant use of anti-inhibitor coagulant complex (AICC) and tranexamic acid has been reported in the literature as a beneficial treatment for this population. Anti-inhibitor coagulant complex is known to cause an increase in thrombin generation and tranexamic acid inhibits fibrinolysis. Hence, the combined used of AICC and tranexamic acid has been limited due to safety concerns over possibilities of increased risk of thrombotic events and disseminated intravascular coagulation. However, the rationale for concomitant therapy is to obtain a potential synergistic effect and to increase clot stability. We conducted a literature review of past studies and individual case reports of concomitant use of AICC and tranexamic acid, which was extensively used during dental procedures. Evidence also exists for concomitant use of the combined therapy in orthopaedic procedures, control of gastrointestinal bleeding, epistaxis and cerebral haemorrhages. Some patients who received the combined therapy had failed monotherapy with a single BPA prior to combined therapy. There were no reports of thrombotic complications related to the concomitant therapy and haemostasis was achieved in all cases. Anti-inhibitor coagulant complex and tranexamic acid therapy was found to be safe, well-tolerated and effective therapy in haemophilia patients with inhibitors. Additional randomized controlled studies should be performed to confirm these findings. © 2015 John Wiley & Sons Ltd.

  18. Endovenous Laser Ablation and Concomitant Foam Sclerotherapy: Experience in 504 Patients

    International Nuclear Information System (INIS)

    Yilmaz, Saim; Ceken, Kagan; Alparslan, Ahmet; Durmaz, Sedat; Sindel, Timur

    2012-01-01

    Purpose: To investigate the value of endovenous laser ablation (ELA) and concomitant ultrasound-guided foam sclerotherapy (USGFS) in patients with chronic venous insufficiency. Methods: During a 6-year period, concomitant USGFS of the varicose veins were performed in 504 out of 610 patients who underwent ELA for truncal or perforating vein insufficiency. In these 504 patients (944 legs; bilateral in 440 patients), the incompetent veins were greater saphenous vein in 615 legs, small saphenous vein in 118 veins, perforating veins in 42 legs, and a combination of these in 169 legs. In all patients, after ELA of the incompetent veins, USGFS was performed for the remaining varicosities with 1–3% polidocanol foam. Patients were followed up clinically and with color Doppler ultrasound at 1, 6, and 12 months. Results: ELA was technically successful in all cases, although another venous puncture was necessary in 29 legs. Concomitant USGFS was also technically successful in all cases, but one to three additional sclerotherapy sessions were performed in 203 legs with persistent varicosities. During the follow-up, recanalization of the laser-ablated refluxing veins occurred in 16 legs (1.7%) and was treated with repeat ELA or USGFS. Major complications occurred in 1.4% of the treated legs and included skin necrosis and calf vein thrombosis. Conclusion: ELA and concomitant foam sclerotherapy is feasible and effective. The procedures are associated with a low complication rate and can be performed in both legs in the same session. Concomitant use of laser and foam may potentially decrease the recanalization rate of laser-ablated vessels.

  19. Concomitant BCR-ABL1 positive chronic myelogenous leukemia emerging in a patient with MPL W515L associated primary myelofibrosis

    Directory of Open Access Journals (Sweden)

    Juan C. Gomez-Gelvez, MD

    2016-03-01

    Full Text Available Myeloproliferative neoplasms (MPNs are clonal hematopoietic stem cell disorders characterized by proliferation of one or more cell lineages in the bone marrow. At present, the main criterion in the 2008 World Health Organization classification of MPNs is the presence of an underlying genetic abnormality. These mutations are generally mutually exclusive except for rare reports in the literature. We report for the first time a detailed analysis of the clinical, histologic and cytogenetic/molecular features of a patient who initially presented with MPL W515L positive primary myelofibrosis and over the course of five years developed an MPN associated with both BCR-ABL1 and MPL W515L mutation. We discuss the diagnostic challenges and therapeutic implications of concomitant BCR-ABL1 translocation with MPL W515L mutation. Multiple genetic alterations may simultaneously coexist in patients exhibiting features of myeloproliferative disorders.

  20. Verification of safety critical software

    International Nuclear Information System (INIS)

    Son, Ki Chang; Chun, Chong Son; Lee, Byeong Joo; Lee, Soon Sung; Lee, Byung Chai

    1996-01-01

    To assure quality of safety critical software, software should be developed in accordance with software development procedures and rigorous software verification and validation should be performed. Software verification is the formal act of reviewing, testing of checking, and documenting whether software components comply with the specified requirements for a particular stage of the development phase[1]. New software verification methodology was developed and was applied to the Shutdown System No. 1 and 2 (SDS1,2) for Wolsung 2,3 and 4 nuclear power plants by Korea Atomic Energy Research Institute(KAERI) and Atomic Energy of Canada Limited(AECL) in order to satisfy new regulation requirements of Atomic Energy Control Boars(AECB). Software verification methodology applied to SDS1 for Wolsung 2,3 and 4 project will be described in this paper. Some errors were found by this methodology during the software development for SDS1 and were corrected by software designer. Outputs from Wolsung 2,3 and 4 project have demonstrated that the use of this methodology results in a high quality, cost-effective product. 15 refs., 6 figs. (author)

  1. Future of monitoring and verification

    International Nuclear Information System (INIS)

    Wagenmakers, H.

    1991-01-01

    The organized verification entrusted to IAEA for the implementation of the NPT, of the Treaty of Tlatelolco and of the Treaty of Rarotonga, reaches reasonable standards. The current dispute with the Democratic People's Republic of Korea about the conclusion of a safeguards agreement with IAEA, by its exceptional nature, underscores rather than undermines the positive judgement to be passed on IAEA's overall performance. The additional task given to the Director General of IAEA under Security Council resolution 687 (1991) regarding Iraq's nuclear-weapons-usable material is particularly challenging. For the purposes of this paper, verification is defined as the process for establishing whether the States parties are complying with an agreement. In the final stage verification may lead into consideration of how to respond to non-compliance. Monitoring is perceived as the first level in the verification system. It is one generic form of collecting information on objects, activities or events and it involves a variety of instruments ranging from communications satellites to television cameras or human inspectors. Monitoring may also be used as a confidence-building measure

  2. Concomitant Rotavirus and Salmonella Infections in Children with Acute Diarrhea

    Directory of Open Access Journals (Sweden)

    Wen-Tzong Lan

    2009-02-01

    Conclusion: Concomitant rotavirus and Salmonella infections accounted for 3.7% of cases in this study. Patients in group C (30.0% had a significantly higher incidence of hypokalemia than group R (7.3% or S (8.8%. Group C consisted of 33 cases of the 895 reviewed cases (3.7%. In a child with rotavirus gastroenteritis, concomitant infection with Salmonella should be considered if the child has sustained a high fever (≥ 39°C for over 4 days and a green stool with mucus and blood.

  3. ACCELERATED ONSET OF RETINAL TOXICITY FROM HYDROXYCHLOROQUINE USE WITH CONCOMITANT BREAST CANCER THERAPY.

    Science.gov (United States)

    Sharma, Aman; Maiz, Alejandra M; Tucker, William R; Cukras, Catherine

    2018-05-16

    To report a case of accelerated retinal toxicity due to hydroxychloroquine (HCQ) use for treatment of Sjögren syndrome in a patient treated with concomitant chemotherapy for breast cancer. Observational case report. A 56-year-old white woman using 400 mg HCQ (7.1 mg/kg real body weight) daily for a total of 2 years and 10 months for treatment of Sjögren syndrome with concomitant use of docetaxel and cyclophosphamide therapy (21-day cycle, 4 cycles) followed by anastrozole for breast cancer, presented with visual complaints and findings of severe HCQ toxicity. Concomitant breast cancer therapy may have a synergistic effect with HCQ leading to accelerated retinal toxicity. As such potential acceleration is poorly understood, patients on HCQ who are treated with concomitant chemotherapy should be considered for more frequent retinal screenings to maximize safety and preservation of vision.

  4. Concepts for inventory verification in critical facilities

    International Nuclear Information System (INIS)

    Cobb, D.D.; Sapir, J.L.; Kern, E.A.; Dietz, R.J.

    1978-12-01

    Materials measurement and inventory verification concepts for safeguarding large critical facilities are presented. Inspection strategies and methods for applying international safeguards to such facilities are proposed. The conceptual approach to routine inventory verification includes frequent visits to the facility by one inspector, and the use of seals and nondestructive assay (NDA) measurements to verify the portion of the inventory maintained in vault storage. Periodic verification of the reactor inventory is accomplished by sampling and NDA measurement of in-core fuel elements combined with measurements of integral reactivity and related reactor parameters that are sensitive to the total fissile inventory. A combination of statistical sampling and NDA verification with measurements of reactor parameters is more effective than either technique used by itself. Special procedures for assessment and verification for abnormal safeguards conditions are also considered. When the inspection strategies and inventory verification methods are combined with strict containment and surveillance methods, they provide a high degree of assurance that any clandestine attempt to divert a significant quantity of fissile material from a critical facility inventory will be detected. Field testing of specific hardware systems and procedures to determine their sensitivity, reliability, and operational acceptability is recommended. 50 figures, 21 tables

  5. Verification and Examination Management of Complex Systems

    Directory of Open Access Journals (Sweden)

    Stian Ruud

    2014-10-01

    Full Text Available As ship systems become more complex, with an increasing number of safety-critical functions, many interconnected subsystems, tight integration to other systems, and a large amount of potential failure modes, several industry parties have identified the need for improved methods for managing the verification and examination efforts of such complex systems. Such needs are even more prominent now that the marine and offshore industries are targeting more activities and operations in the Arctic environment. In this paper, a set of requirements and a method for verification and examination management are proposed for allocating examination efforts to selected subsystems. The method is based on a definition of a verification risk function for a given system topology and given requirements. The marginal verification risks for the subsystems may then be evaluated, so that examination efforts for the subsystem can be allocated. Two cases of requirements and systems are used to demonstrate the proposed method. The method establishes a systematic relationship between the verification loss, the logic system topology, verification method performance, examination stop criterion, the required examination effort, and a proposed sequence of examinations to reach the examination stop criterion.

  6. Concomitant hypo-hyperdontia with dens invaginatus

    Directory of Open Access Journals (Sweden)

    B S Manjunatha

    2011-01-01

    Full Text Available Although developmental anomalies of tooth number are quite common in permanent dentition, concomitant occurrence of hypohyperdontia is a very rare mixed numeric anomalous condition of teeth. Very few cases of this condition have been reported in the English literature. Here we report such a rare case noted in a 26 year-old male dental graduate with no other associated systemic condition or syndrome.

  7. Monitoring and verification R and D

    International Nuclear Information System (INIS)

    Pilat, Joseph F.; Budlong-Sylvester, Kory W.; Fearey, Bryan L.

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R and D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R and D required to address these gaps and other monitoring and verification challenges.

  8. Use of Lactoferrin in the Treatment of Patients with Severe Concomitant Injury

    Directory of Open Access Journals (Sweden)

    V. M. Kapitonov

    2009-01-01

    Full Text Available Objective: to define the degree of activation of lipid peroxidation in patients with severe concomitant injury and to determine whether they could be corrected with the antioxidant agent Laprot. Subjects and methods. The time course of changes in lipid peroxidation parameters and clinical data was studied in 68 patients with severe concomitant injury, in 35 of whom Laprot (made by P. A. Herzen Moscow Oncological Research Institute, Russian Agency for Medical Technologies (Russia, was added to the standard treatment. Results. The significant activation of oxidative processes and lipid peroxi-dation, which was accompanied by antioxidant system imbalance, was ascertained to occur in severe concomitant injury. Key words: injury, lipid peroxidation, lactoferrin.

  9. Face Verification for Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.

    2009-01-01

    In this thesis, we presented a detailed study of the face verification problem on the mobile device, covering every component of the system. The study includes face detection, registration, normalization, and verification. Furthermore, the information fusion problem is studied to verify face

  10. Gender Verification of Female Olympic Athletes.

    Science.gov (United States)

    Dickinson, Barry D.; Genel, Myron; Robinowitz, Carolyn B.; Turner, Patricia L.; Woods, Gary L.

    2002-01-01

    Gender verification of female athletes has long been criticized by geneticists, endocrinologists, and others in the medical community. Recently, the International Olympic Committee's Athletic Commission called for discontinuation of mandatory laboratory-based gender verification of female athletes. This article discusses normal sexual…

  11. Gastritis: the histology report.

    Science.gov (United States)

    Rugge, Massimo; Pennelli, Gianmaria; Pilozzi, Emanuela; Fassan, Matteo; Ingravallo, Giuseppe; Russo, Valentina M; Di Mario, Francesco

    2011-03-01

    Gastritis is defined as inflammation of the gastric mucosa. In histological terms, it is distinguishable into two main categories, i.e. non-atrophic and atrophic. In the gastric mucosa, atrophy is defined as the loss of appropriate glands. There are several etiological types of gastritis, their different etiology being related to different clinical manifestations and pathological features. Atrophic gastritis (resulting mainly from long-standing Helicobacter pylori infection) is a major risk factor for the onset of (intestinal type) gastric cancer. The extent and site of the atrophic changes correlate significantly with the cancer risk. The current format for histology reporting in cases of gastritis fails to establish an immediate link between gastritis phenotype and risk of malignancy. Building on current knowledge of the biology of gastritis, an international group of pathologists [Operative Link for Gastritis Assessment (OLGA)] has proposed a system for reporting gastritis in terms of its stage (the OLGA Staging System): this system places the histological phenotypes of gastritis on a scale of progressively increasing gastric cancer risk, from the lowest (Stage 0) to the highest (Stage IV). The aim of this tutorial is to provide unequivocal information on how to standardize histology reports on gastritis in diagnostic practice. Copyright © 2011 Editrice Gastroenterologica Italiana S.r.l. Published by Elsevier Ltd.. All rights reserved.

  12. Reload core safety verification

    International Nuclear Information System (INIS)

    Svetlik, M.; Minarcin, M.

    2003-01-01

    This paper presents a brief look at the process of reload core safety evaluation and verification in Slovak Republic. It gives an overview of experimental verification of selected nuclear parameters in the course of physics testing during reactor start-up. The comparison of IAEA recommendations and testing procedures at Slovak and European nuclear power plants of similar design is included. An introduction of two level criteria for evaluation of tests represents an effort to formulate the relation between safety evaluation and measured values (Authors)

  13. Validation of Embedded System Verification Models

    NARCIS (Netherlands)

    Marincic, J.; Mader, Angelika H.; Wieringa, Roelf J.

    The result of a model-based requirements verification shows that the model of a system satisfies (or not) formalised system requirements. The verification result is correct only if the model represents the system adequately. No matter what modelling technique we use, what precedes the model

  14. On Verification Modelling of Embedded Systems

    NARCIS (Netherlands)

    Brinksma, Hendrik; Mader, Angelika H.

    Computer-aided verification of embedded systems hinges on the availability of good verification models of the systems at hand. Such models must be much simpler than full design models or specifications to be of practical value, because of the unavoidable combinatorial complexities in the

  15. Efficient Smoothed Concomitant Lasso Estimation for High Dimensional Regression

    Science.gov (United States)

    Ndiaye, Eugene; Fercoq, Olivier; Gramfort, Alexandre; Leclère, Vincent; Salmon, Joseph

    2017-10-01

    In high dimensional settings, sparse structures are crucial for efficiency, both in term of memory, computation and performance. It is customary to consider ℓ 1 penalty to enforce sparsity in such scenarios. Sparsity enforcing methods, the Lasso being a canonical example, are popular candidates to address high dimension. For efficiency, they rely on tuning a parameter trading data fitting versus sparsity. For the Lasso theory to hold this tuning parameter should be proportional to the noise level, yet the latter is often unknown in practice. A possible remedy is to jointly optimize over the regression parameter as well as over the noise level. This has been considered under several names in the literature: Scaled-Lasso, Square-root Lasso, Concomitant Lasso estimation for instance, and could be of interest for uncertainty quantification. In this work, after illustrating numerical difficulties for the Concomitant Lasso formulation, we propose a modification we coined Smoothed Concomitant Lasso, aimed at increasing numerical stability. We propose an efficient and accurate solver leading to a computational cost no more expensive than the one for the Lasso. We leverage on standard ingredients behind the success of fast Lasso solvers: a coordinate descent algorithm, combined with safe screening rules to achieve speed efficiency, by eliminating early irrelevant features.

  16. Compositional verification of real-time systems using Ecdar

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel

    2012-01-01

    We present a specification theory for timed systems implemented in the Ecdar tool. We illustrate the operations of the specification theory on a running example, showing the models and verification checks. To demonstrate the power of the compositional verification, we perform an in depth case study...... of a leader election protocol; Modeling it in Ecdar as Timed input/output automata Specifications and performing both monolithic and compositional verification of two interesting properties on it. We compare the execution time of the compositional to the classical verification showing a huge difference...

  17. Disarmament Verification - the OPCW Experience

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  18. Verification of Chemical Weapons Destruction

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  19. Multi-modal image registration: matching MRI with histology

    Science.gov (United States)

    Alic, Lejla; Haeck, Joost C.; Klein, Stefan; Bol, Karin; van Tiel, Sandra T.; Wielopolski, Piotr A.; Bijster, Magda; Niessen, Wiro J.; Bernsen, Monique; Veenland, Jifke F.; de Jong, Marion

    2010-03-01

    Spatial correspondence between histology and multi sequence MRI can provide information about the capabilities of non-invasive imaging to characterize cancerous tissue. However, shrinkage and deformation occurring during the excision of the tumor and the histological processing complicate the co registration of MR images with histological sections. This work proposes a methodology to establish a detailed 3D relation between histology sections and in vivo MRI tumor data. The key features of the methodology are a very dense histological sampling (up to 100 histology slices per tumor), mutual information based non-rigid B-spline registration, the utilization of the whole 3D data sets, and the exploitation of an intermediate ex vivo MRI. In this proof of concept paper, the methodology was applied to one tumor. We found that, after registration, the visual alignment of tumor borders and internal structures was fairly accurate. Utilizing the intermediate ex vivo MRI, it was possible to account for changes caused by the excision of the tumor: we observed a tumor expansion of 20%. Also the effects of fixation, dehydration and histological sectioning could be determined: 26% shrinkage of the tumor was found. The annotation of viable tissue, performed in histology and transformed to the in vivo MRI, matched clearly with high intensity regions in MRI. With this methodology, histological annotation can be directly related to the corresponding in vivo MRI. This is a vital step for the evaluation of the feasibility of multi-spectral MRI to depict histological groundtruth.

  20. Concomitant glenohumeral pathologies in high-grade acromioclavicular separation (type III - V).

    Science.gov (United States)

    Markel, Jochen; Schwarting, Tim; Malcherczyk, Dominik; Peterlein, Christian-Dominik; Ruchholtz, Steffen; El-Zayat, Bilal Farouk

    2017-11-10

    Acromioclavicular joint (ACJ) dislocations are common injuries of the shoulder associated with physical activity. The diagnosis of concomitant injuries proves complicated due to the prominent clinical symptoms of acute ACJ dislocation. Because of increasing use of minimally invasive surgery techniques concomitant pathologies are diagnosed more often than with previous procedures. The aim of this study was to identify the incidence of concomitant intraarticular injuries in patients with high-grade acromioclavicular separation (Rockwood type III - V) as well as to reveal potential risk constellations. The concomitant pathologies were compiled during routine arthroscopically assisted treatment in altogether 163 patients (147 male; 16 female; mean age 36.8 years) with high-grade acromioclavicular separation (Rockwood type III: n = 60; Rockwood type IV: n = 6; Rockwood type V: n = 97). Acromioclavicular separation occurred less often in women than men (1:9). In patients under 35, the most common cause for ACJ dislocation was sporting activity (37.4%). Rockwood type V was observed significantly more often than the other types with 57.5% (Rockwood type III = 36.8%, Rockwood type IV 3.7%). Concomitant pathologies were diagnosed in 39.3% of the patients with that number rising to as much as 57.3% in patients above 35 years. Most common associated injuries were rotator cuff injuries (32.3%), chondral defects (30.6%) and SLAP-lesions (22.6%). Of all patients, 8.6% needed additional reconstructive surgery. Glenohumeral injuries are a much more common epiphenomenon during acromioclavicular separation than previously ascertained. High risk group for accompanying injuries are patients above 35 years with preexisting degenerative disease. The increasing use of minimally invasive techniques allows for an easier diagnosis and simultaneous treatment of the additional pathologies.

  1. A Model for Collaborative Runtime Verification

    NARCIS (Netherlands)

    Testerink, Bas; Bulling, Nils; Dastani, Mehdi

    2015-01-01

    Runtime verification concerns checking whether a system execution satisfies a given property. In this paper we propose a model for collaborative runtime verification where a network of local monitors collaborates in order to verify properties of the system. A local monitor has only a local view on

  2. HDM/PASCAL Verification System User's Manual

    Science.gov (United States)

    Hare, D.

    1983-01-01

    The HDM/Pascal verification system is a tool for proving the correctness of programs written in PASCAL and specified in the Hierarchical Development Methodology (HDM). This document assumes an understanding of PASCAL, HDM, program verification, and the STP system. The steps toward verification which this tool provides are parsing programs and specifications, checking the static semantics, and generating verification conditions. Some support functions are provided such as maintaining a data base, status management, and editing. The system runs under the TOPS-20 and TENEX operating systems and is written in INTERLISP. However, no knowledge is assumed of these operating systems or of INTERLISP. The system requires three executable files, HDMVCG, PARSE, and STP. Optionally, the editor EMACS should be on the system in order for the editor to work. The file HDMVCG is invoked to run the system. The files PARSE and STP are used as lower forks to perform the functions of parsing and proving.

  3. Self-verification and contextualized self-views.

    Science.gov (United States)

    Chen, Serena; English, Tammy; Peng, Kaiping

    2006-07-01

    Whereas most self-verification research has focused on people's desire to verify their global self-conceptions, the present studies examined self-verification with regard to contextualized selfviews-views of the self in particular situations and relationships. It was hypothesized that individuals whose core self-conceptions include contextualized self-views should seek to verify these self-views. In Study 1, the more individuals defined the self in dialectical terms, the more their judgments were biased in favor of verifying over nonverifying feedback about a negative, situation-specific self-view. In Study 2, consistent with research on gender differences in the importance of relationships to the self-concept, women but not men showed a similar bias toward feedback about a negative, relationship-specific self-view, a pattern not seen for global self-views. Together, the results support the notion that self-verification occurs for core self-conceptions, whatever form(s) they may take. Individual differences in self-verification and the nature of selfhood and authenticity are discussed.

  4. Verification of RESRAD-build computer code, version 3.1

    International Nuclear Information System (INIS)

    2003-01-01

    RESRAD-BUILD is a computer model for analyzing the radiological doses resulting from the remediation and occupancy of buildings contaminated with radioactive material. It is part of a family of codes that includes RESRAD, RESRAD-CHEM, RESRAD-RECYCLE, RESRAD-BASELINE, and RESRAD-ECORISK. The RESRAD-BUILD models were developed and codified by Argonne National Laboratory (ANL); version 1.5 of the code and the user's manual were publicly released in 1994. The original version of the code was written for the Microsoft DOS operating system. However, subsequent versions of the code were written for the Microsoft Windows operating system. The purpose of the present verification task (which includes validation as defined in the standard) is to provide an independent review of the latest version of RESRAD-BUILD under the guidance provided by ANSI/ANS-10.4 for verification and validation of existing computer programs. This approach consists of a posteriori V and V review which takes advantage of available program development products as well as user experience. The purpose, as specified in ANSI/ANS-10.4, is to determine whether the program produces valid responses when used to analyze problems within a specific domain of applications, and to document the level of verification. The culmination of these efforts is the production of this formal Verification Report. The first step in performing the verification of an existing program was the preparation of a Verification Review Plan. The review plan consisted of identifying: Reason(s) why a posteriori verification is to be performed; Scope and objectives for the level of verification selected; Development products to be used for the review; Availability and use of user experience; and Actions to be taken to supplement missing or unavailable development products. The purpose, scope and objectives for the level of verification selected are described in this section of the Verification Report. The development products that were used

  5. A Verification Logic for GOAL Agents

    Science.gov (United States)

    Hindriks, K. V.

    Although there has been a growing body of literature on verification of agents programs, it has been difficult to design a verification logic for agent programs that fully characterizes such programs and to connect agent programs to agent theory. The challenge is to define an agent programming language that defines a computational framework but also allows for a logical characterization useful for verification. The agent programming language GOAL has been originally designed to connect agent programming to agent theory and we present additional results here that GOAL agents can be fully represented by a logical theory. GOAL agents can thus be said to execute the corresponding logical theory.

  6. Secure optical verification using dual phase-only correlation

    International Nuclear Information System (INIS)

    Liu, Wei; Liu, Shutian; Zhang, Yan; Xie, Zhenwei; Liu, Zhengjun

    2015-01-01

    We introduce a security-enhanced optical verification system using dual phase-only correlation based on a novel correlation algorithm. By employing a nonlinear encoding, the inherent locks of the verification system are obtained in real-valued random distributions, and the identity keys assigned to authorized users are designed as pure phases. The verification process is implemented in two-step correlation, so only authorized identity keys can output the discriminate auto-correlation and cross-correlation signals that satisfy the reset threshold values. Compared with the traditional phase-only-correlation-based verification systems, a higher security level against counterfeiting and collisions are obtained, which is demonstrated by cryptanalysis using known attacks, such as the known-plaintext attack and the chosen-plaintext attack. Optical experiments as well as necessary numerical simulations are carried out to support the proposed verification method. (paper)

  7. Verification of DRAGON: the NXT tracking module

    International Nuclear Information System (INIS)

    Zkiek, A.; Marleau, G.

    2007-01-01

    The version of DRAGON-IST that has been verified for the calculation of the incremental cross sections associated with CANDU reactivity devices is version 3.04Bb that was released in 2001. Since then, various improvements were implemented in the code including the NXT: module that can track assemblies of clusters in 2-D and 3-D geometries. Here we will discuss the verification plan for the NXT: module of DRAGON, illustrate the verification procedure we selected and present our verification results. (author)

  8. Experimental investigation of the concomitant injection of gasoline and CNG in a turbocharged spark ignition engine

    International Nuclear Information System (INIS)

    Momeni Movahed, M.; Basirat Tabrizi, H.; Mirsalim, M.

    2014-01-01

    Highlights: • Concomitant injection of gasoline and CNG is compared with gasoline and CNG modes. • BSFC, HC and CO emissions of the concomitant injection are lower than gasoline mode. • Deteriorations of the concomitant injection are negligible compared to gasoline mode. • Cylinder peak pressure and heat loss to coolant of the concomitant injection are lower than CNG mode. • Some shortcomings in CNG mode can be solved by changing the spark timing and lambda. - Abstract: Concomitant injection of gasoline and CNG is a new concept to overcome problems of bi-fueled spark ignition engines, which operate in single fuel mode, either in gasoline or in CNG mode. This experimental study indicates how some problems of gasoline mode such as retarded ignition timings for knock prevention and rich air–fuel mixture for component protection can be resolved with the concomitant injection of gasoline and CNG. Results clearly show that the concomitant injection improves thermal efficiency compared to gasoline mode. On the other hand, simultaneous injection of gasoline and CNG reduces some problems of CNG mode such as high cylinder pressure and heat loss to the engine coolant. This decreases the stringent requirements for thermal and mechanical strength of the engine components in CNG mode. In addition, it is shown that by modifying the spark advance and air fuel ratio in CNG mode, the engine operation improves in terms of NOx emissions and maximum in-cylinder pressure as the concomitant injection does. Nevertheless, new requirements such as an intercooler with higher cooling capacity are implied to the engine configuration. Finally, the most important concerns in control strategies of the engine control unit for a vehicle with concomitant injection of gasoline and CNG are discussed

  9. Concomitant glenohumeral pathologies associated with acute and chronic grade III and grade V acromioclavicular joint injuries.

    Science.gov (United States)

    Jensen, Gunnar; Millett, Peter J; Tahal, Dimitri S; Al Ibadi, Mireille; Lill, Helmut; Katthagen, Jan Christoph

    2017-08-01

    The purpose of this study was to identify the risk of concomitant glenohumeral pathologies with acromioclavicular joint injuries grade III and V. Patients who underwent arthroscopically-assisted stabilization of acromioclavicular joint injuries grade III or grade V between 01/2007 and 12/2015 were identified in the patient databases of two surgical centres. Gender, age at index surgery, grade of acromioclavicular joint injury (Rockwood III or Rockwood V), and duration between injury and index surgery (classified as acute or chronic) were of interest. Concomitant glenohumeral pathologies were noted and their treatment was classified as debridement or reconstructive procedure. A total of 376 patients (336 male, 40 female) were included. Mean age at time of arthroscopic acromioclavicular joint reconstruction surgery was 42.1 ± 14.0 years. Overall, 201 patients (53%) had one or more concomitant glenohumeral pathologies. Lesions of the biceps tendon complex and rotator cuff were the most common. Forty-five patients (12.0%) had concomitant glenohumeral pathologies that required an additional repair. The remaining 156 patients (41.5%) received a debridement of their concomitant pathologies. Rockwood grade V compared to Rockwood grade III (p = 0.013; odds ratio 1.7), and chronic compared to acute injury were significantly associated with having a concomitant glenohumeral pathology (p = 0.019; odds ratio 1.7). The probability of having a concomitant glenohumeral pathology was also significantly associated with increasing age (p acromioclavicular joint injury of either grade III or V. Twenty-two percent of these patients with concomitant glenohumeral pathologies received an additional dedicated repair procedure. Although a significant difference in occurrence of concomitant glenohumeral pathologies was seen between Rockwood grades III and V, and between acute and chronic lesions, increasing age was identified as the most dominant predictor. Level IV, case series.

  10. CONCOMITANT HELMINTHIC AND ENTERO-PROTOZOAL INFESTATION IN INDIAN PEAFOWL

    Directory of Open Access Journals (Sweden)

    B. Dutta

    2013-06-01

    Full Text Available Concomitant infestation of Ascaridia spp. along with Raillietina spp. and Emeria spp. has been identified in Indian Peafowl (Pavo cristatus of Ramnabagan Mini Zoo, Burdwan, West Bengal, India.

  11. Technical challenges for dismantlement verification

    International Nuclear Information System (INIS)

    Olinger, C.T.; Stanbro, W.D.; Johnston, R.G.; Nakhleh, C.W.; Dreicer, J.S.

    1997-01-01

    In preparation for future nuclear arms reduction treaties, including any potential successor treaties to START I and II, the authors have been examining possible methods for bilateral warhead dismantlement verification. Warhead dismantlement verification raises significant challenges in the political, legal, and technical arenas. This discussion will focus on the technical issues raised by warhead arms controls. Technical complications arise from several sources. These will be discussed under the headings of warhead authentication, chain-of-custody, dismantlement verification, non-nuclear component tracking, component monitoring, and irreversibility. The authors will discuss possible technical options to address these challenges as applied to a generic dismantlement and disposition process, in the process identifying limitations and vulnerabilities. They expect that these considerations will play a large role in any future arms reduction effort and, therefore, should be addressed in a timely fashion

  12. Safety Verification for Probabilistic Hybrid Systems

    DEFF Research Database (Denmark)

    Zhang, Lijun; She, Zhikun; Ratschan, Stefan

    2010-01-01

    The interplay of random phenomena and continuous real-time control deserves increased attention for instance in wireless sensing and control applications. Safety verification for such systems thus needs to consider probabilistic variations of systems with hybrid dynamics. In safety verification o...... on a number of case studies, tackled using a prototypical implementation....

  13. SSN Verification Service

    Data.gov (United States)

    Social Security Administration — The SSN Verification Service is used by Java applications to execute the GUVERF02 service using the WebSphere/CICS Interface. It accepts several input data fields...

  14. Smoking habit and gastritis histology.

    Science.gov (United States)

    Namiot, A; Kemona, A; Namiot, Z

    2007-01-01

    Long-term cigarette smoking may increase the risk of digestive tract pathologies, however, what is the influence smoking habit on gastric mucosa histology is still poorly elicited. The aim of the study was to compare histological evaluation of gastritis in smoker and non-smoker groups. A total of 236 patients of various H. pylori status (109 infected, 127 non-infected), clinical diagnosis (107 duodenal ulcer disease, 129 dyspepsia), and smoking habit (92 smokers, 144 non-smokers) were included. Subjects were classified as smokers if they smoked 5 or more cigarettes per day for at least 3 years. A histological examination of endoscopically obtained samples was performed by two experienced pathomorphologists blinded to the diagnoses and smoking habit. Microscopic slices of the gastric mucosa were stained with hematoxylin-eosin and Giemsa. Apart from histological diagnosis, H. pylori status was additionally confirmed by an urease test (CLO-test) at least in one of two gastric locations (antrum or corpus). In the H. pylori infected population, H. pylori density, neutrophils, and mononuclear cells infiltration in the gastric corpus mucosa were lower in smokers than non-smokers, while in the antrum the differences were not significant. In the non-infected population, no significant differences in neutrophils and mononuclear cells infiltration between smokers and non-smokers were found. Since the significant differences in studied parameters of chronic gastritis between smokers and non-smokers were found in the corpus mucosa of H. pylori infected subjects, smoking should be taken into account when a histological evaluation of the gastric mucosa in the H. pylori infected population is performed.

  15. Enhanced Verification Test Suite for Physics Simulation Codes

    Energy Technology Data Exchange (ETDEWEB)

    Kamm, J R; Brock, J S; Brandon, S T; Cotrell, D L; Johnson, B; Knupp, P; Rider, W; Trucano, T; Weirs, V G

    2008-10-10

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations. The key points of this document are: (1) Verification deals with mathematical correctness of the numerical algorithms in a code, while validation deals with physical correctness of a simulation in a regime of interest. This document is about verification. (2) The current seven-problem Tri-Laboratory Verification Test Suite, which has been used for approximately five years at the DOE WP laboratories, is limited. (3) Both the methodology for and technology used in verification analysis have evolved and been improved since the original test suite was proposed. (4) The proposed test problems are in three basic areas: (a) Hydrodynamics; (b) Transport processes; and (c) Dynamic strength-of-materials. (5) For several of the proposed problems we provide a 'strong sense verification benchmark', consisting of (i) a clear mathematical statement of the problem with sufficient information to run a computer simulation, (ii) an explanation of how the code result and benchmark solution are to be evaluated, and (iii) a description of the acceptance criterion for simulation code results. (6) It is proposed that the set of verification test problems with which any particular code be evaluated include some of the problems described in this document. Analysis of the proposed verification test problems constitutes part of a necessary--but not sufficient--step that builds confidence in physics and engineering simulation codes. More complicated test cases, including physics models of

  16. Pain in adolescent girls receiving human papillomavirus vaccine with concomitantly administered vaccines.

    Science.gov (United States)

    Walter, Emmanuel B; Kemper, Alex R; Dolor, Rowena J; Dunne, Eileen F

    2015-02-01

    Using the Faces Pain Scale - Revised, we assessed injection site pain 10 minutes after vaccination in young females randomized to receive either quadrivalent human papillomavirus vaccine (HPV4) before or after concomitantly administered vaccines. Although pain was modestly more after HPV4 injection than after other vaccines, the pain intensity after HPV4 injection was significantly less in those who received HPV4 before receiving other concomitant vaccines.

  17. Lessons Learned From Microkernel Verification — Specification is the New Bottleneck

    Directory of Open Access Journals (Sweden)

    Thorsten Bormer

    2012-11-01

    Full Text Available Software verification tools have become a lot more powerful in recent years. Even verification of large, complex systems is feasible, as demonstrated in the L4.verified and Verisoft XT projects. Still, functional verification of large software systems is rare – for reasons beyond the large scale of verification effort needed due to the size alone. In this paper we report on lessons learned for verification of large software systems based on the experience gained in microkernel verification in the Verisoft XT project. We discuss a number of issues that impede widespread introduction of formal verification in the software life-cycle process.

  18. Advancing Disarmament Verification Tools: A Task for Europe?

    International Nuclear Information System (INIS)

    Göttsche, Malte; Kütt, Moritz; Neuneck, Götz; Niemeyer, Irmgard

    2015-01-01

    A number of scientific-technical activities have been carried out to establish more robust and irreversible disarmament verification schemes. Regardless of the actual path towards deeper reductions in nuclear arsenals or their total elimination in the future, disarmament verification will require new verification procedures and techniques. This paper discusses the information that would be required as a basis for building confidence in disarmament, how it could be principally verified and the role Europe could play. Various ongoing activities are presented that could be brought together to produce a more intensified research and development environment in Europe. The paper argues that if ‘effective multilateralism’ is the main goal of the European Union’s (EU) disarmament policy, EU efforts should be combined and strengthened to create a coordinated multilateral disarmament verification capacity in the EU and other European countries. The paper concludes with several recommendations that would have a significant impact on future developments. Among other things, the paper proposes a one-year review process that should include all relevant European actors. In the long run, an EU Centre for Disarmament Verification could be envisaged to optimize verification needs, technologies and procedures.

  19. The verification of DRAGON: progress and lessons learned

    International Nuclear Information System (INIS)

    Marleau, G.

    2002-01-01

    The general requirements for the verification of the legacy code DRAGON are somewhat different from those used for new codes. For example, the absence of a design manual for DRAGON makes it difficult to confirm that the each part of the code performs as required since these requirements are not explicitly spelled out for most of the DRAGON modules. In fact, this conformance of the code can only be assessed, in most cases, by making sure that the contents of the DRAGON data structures, which correspond to the output generated by a module of the code, contains the adequate information. It is also possible in some cases to use the self-verification options in DRAGON to perform additional verification or to evaluate, using an independent software, the performance of specific functions in the code. Here, we will describe the global verification process that was considered in order to bring DRAGON to an industry standard tool-set (IST) status. We will also discuss some of the lessons we learned in performing this verification and present some of the modification to DRAGON that were implemented as a consequence of this verification. (author)

  20. Simulation Environment Based on the Universal Verification Methodology

    CERN Document Server

    AUTHOR|(SzGeCERN)697338

    2017-01-01

    Universal Verification Methodology (UVM) is a standardized approach of verifying integrated circuit designs, targeting a Coverage-Driven Verification (CDV). It combines automatic test generation, self-checking testbenches, and coverage metrics to indicate progress in the design verification. The flow of the CDV differs from the traditional directed-testing approach. With the CDV, a testbench developer, by setting the verification goals, starts with an structured plan. Those goals are targeted further by a developed testbench, which generates legal stimuli and sends them to a device under test (DUT). The progress is measured by coverage monitors added to the simulation environment. In this way, the non-exercised functionality can be identified. Moreover, the additional scoreboards indicate undesired DUT behaviour. Such verification environments were developed for three recent ASIC and FPGA projects which have successfully implemented the new work-flow: (1) the CLICpix2 65 nm CMOS hybrid pixel readout ASIC desi...

  1. Hierarchical Representation Learning for Kinship Verification.

    Science.gov (United States)

    Kohli, Naman; Vatsa, Mayank; Singh, Richa; Noore, Afzel; Majumdar, Angshul

    2017-01-01

    Kinship verification has a number of applications such as organizing large collections of images and recognizing resemblances among humans. In this paper, first, a human study is conducted to understand the capabilities of human mind and to identify the discriminatory areas of a face that facilitate kinship-cues. The visual stimuli presented to the participants determine their ability to recognize kin relationship using the whole face as well as specific facial regions. The effect of participant gender and age and kin-relation pair of the stimulus is analyzed using quantitative measures such as accuracy, discriminability index d' , and perceptual information entropy. Utilizing the information obtained from the human study, a hierarchical kinship verification via representation learning (KVRL) framework is utilized to learn the representation of different face regions in an unsupervised manner. We propose a novel approach for feature representation termed as filtered contractive deep belief networks (fcDBN). The proposed feature representation encodes relational information present in images using filters and contractive regularization penalty. A compact representation of facial images of kin is extracted as an output from the learned model and a multi-layer neural network is utilized to verify the kin accurately. A new WVU kinship database is created, which consists of multiple images per subject to facilitate kinship verification. The results show that the proposed deep learning framework (KVRL-fcDBN) yields the state-of-the-art kinship verification accuracy on the WVU kinship database and on four existing benchmark data sets. Furthermore, kinship information is used as a soft biometric modality to boost the performance of face verification via product of likelihood ratio and support vector machine based approaches. Using the proposed KVRL-fcDBN framework, an improvement of over 20% is observed in the performance of face verification.

  2. Self-verification motives at the collective level of self-definition.

    Science.gov (United States)

    Chen, Serena; Chen, Karen Y; Shaw, Lindsay

    2004-01-01

    Three studies examined self-verification motives in relation to collective aspects of the self. Several moderators of collective self-verification were also examined--namely, the certainty with which collective self-views are held, the nature of one's ties to a source of self-verification, the salience of the collective self, and the importance of group identification. Evidence for collective self-verification emerged across all studies, particularly when collective self-views were held with high certainty (Studies 1 and 2), perceivers were somehow tied to the source of self-verification (Study 1), the collective self was salient (Study 2), and group identification was important (Study 3). To the authors' knowledge, these studies are the first to examine self-verification at the collective level of self-definition. The parallel and distinct ways in which self-verification processes may operate at different levels of self-definition are discussed.

  3. 24 CFR 5.512 - Verification of eligible immigration status.

    Science.gov (United States)

    2010-04-01

    ... immigration status. 5.512 Section 5.512 Housing and Urban Development Office of the Secretary, Department of... Noncitizens § 5.512 Verification of eligible immigration status. (a) General. Except as described in paragraph...) Primary verification—(1) Automated verification system. Primary verification of the immigration status of...

  4. Verification of RADTRAN

    International Nuclear Information System (INIS)

    Kanipe, F.L.; Neuhauser, K.S.

    1995-01-01

    This document presents details of the verification process of the RADTRAN computer code which was established for the calculation of risk estimates for radioactive materials transportation by highway, rail, air, and waterborne modes

  5. Using web-based animations to teach histology.

    Science.gov (United States)

    Brisbourne, Marc A S; Chin, Susan S-L; Melnyk, Erica; Begg, David A

    2002-02-15

    We have been experimenting with the use of animations to teach histology as part of an interactive multimedia program we are developing to replace the traditional lecture/laboratory-based histology course in our medical and dental curricula. This program, called HistoQuest, uses animations to illustrate basic histologic principles, explain dynamic processes, integrate histologic structure with physiological function, and assist students in forming mental models with which to organize and integrate new information into their learning. With this article, we first briefly discuss the theory of mental modeling, principles of visual presentation, and how mental modeling and visual presentation can be integrated to create effective animations. We then discuss the major Web-based animation technologies that are currently available and their suitability for different visual styles and navigational structures. Finally, we describe the process we use to produce animations for our program. The approach described in this study can be used by other developers to create animations for delivery over the Internet for the teaching of histology.

  6. Concomitant atrial fibrillation surgery for people undergoing cardiac surgery

    Science.gov (United States)

    Huffman, Mark D; Karmali, Kunal N; Berendsen, Mark A; Andrei, Adin-Cristian; Kruse, Jane; McCarthy, Patrick M; Malaisrie, S C

    2016-01-01

    Background People with atrial fibrillation (AF) often undergo cardiac surgery for other underlying reasons and are frequently offered concomitant AF surgery to reduce the frequency of short- and long-term AF and improve short- and long-term outcomes. Objectives To assess the effects of concomitant AF surgery among people with AF who are undergoing cardiac surgery on short-term and long-term (12 months or greater) health-related outcomes, health-related quality of life, and costs. Search methods Starting from the year when the first “maze” AF surgery was reported (1987), we searched the Cochrane Central Register of Controlled Trials (CENTRAL) in the Cochrane Library (March 2016), MEDLINE Ovid (March 2016), Embase Ovid (March 2016), Web of Science (March 2016), the Database of Abstracts of Reviews of Effects (DARE, April 2015), and Health Technology Assessment Database (HTA, March 2016). We searched trial registers in April 2016. We used no language restrictions. Selection criteria We included randomised controlled trials evaluating the effect of any concomitant AF surgery compared with no AF surgery among adults with preoperative AF, regardless of symptoms, who were undergoing cardiac surgery for another indication. Data collection and analysis Two review authors independently selected studies and extracted data. We evaluated the risk of bias using the Cochrane ‘Risk of bias’ tool. We included outcome data on all-cause and cardiovascular-specific mortality, freedom from atrial fibrillation, flutter, or tachycardia off antiarrhythmic medications, as measured by patient electrocardiographic monitoring greater than three months after the procedure, procedural safety, 30-day rehospitalisation, need for post-discharge direct current cardioversion, health-related quality of life, and direct costs. We calculated risk ratios (RR) for dichotomous data with 95% confidence intervals (CI) using a fixed-effect model when heterogeneity was low (I2 ≤ 50%) and random

  7. Contralateral Fracture of the Penis with Concomitant Urethral Injury ...

    African Journals Online (AJOL)

    ra

    2009-03-16

    Mar 16, 2009 ... 2, 2009. 103. 103-106. Case Report. Contralateral Fracture of the Penis with Concomitant. Urethral ... Examination revealed ecchymosis and swelling of the proximal shaft and ... of impotence due to infection and cavernosal.

  8. CASL Verification and Validation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Mousseau, Vincent Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dinh, Nam [North Carolina State Univ., Raleigh, NC (United States)

    2016-06-30

    This report documents the Consortium for Advanced Simulation of LWRs (CASL) verification and validation plan. The document builds upon input from CASL subject matter experts, most notably the CASL Challenge Problem Product Integrators, CASL Focus Area leaders, and CASL code development and assessment teams. This document will be a living document that will track progress on CASL to do verification and validation for both the CASL codes (including MPACT, CTF, BISON, MAMBA) and for the CASL challenge problems (CIPS, PCI, DNB). The CASL codes and the CASL challenge problems are at differing levels of maturity with respect to validation and verification. The gap analysis will summarize additional work that needs to be done. Additional VVUQ work will be done as resources permit. This report is prepared for the Department of Energy’s (DOE’s) CASL program in support of milestone CASL.P13.02.

  9. The monitoring and verification of nuclear weapons

    International Nuclear Information System (INIS)

    Garwin, Richard L.

    2014-01-01

    This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers

  10. DarcyTools, Version 2.1. Verification and validation

    International Nuclear Information System (INIS)

    Svensson, Urban

    2004-03-01

    DarcyTools is a computer code for simulation of flow and transport in porous and/or fractured media. The fractured media in mind is a fractured rock and the porous media the soil cover on the top of the rock; it is hence groundwater flows, which is the class of flows in mind. A number of novel methods and features form the present version of DarcyTools. In the verification studies, these methods are evaluated by comparisons with analytical solutions for idealized situations. The five verification groups, thus reflect the main areas of recent developments. The present report will focus on the Verification and Validation of DarcyTools. Two accompanying reports cover other aspects: - Concepts, Methods, Equations and Demo Simulations. - User's Guide. The objective of this report is to compile all verification and validation studies that have been carried out so far. After some brief introductory sections, all cases will be reported in Appendix A (verification cases) and Appendix B (validation cases)

  11. Verification and quality control of routine hematology analyzers.

    Science.gov (United States)

    Vis, J Y; Huisman, A

    2016-05-01

    Verification of hematology analyzers (automated blood cell counters) is mandatory before new hematology analyzers may be used in routine clinical care. The verification process consists of several items which comprise among others: precision, accuracy, comparability, carryover, background and linearity throughout the expected range of results. Yet, which standard should be met or which verification limit be used is at the discretion of the laboratory specialist. This paper offers practical guidance on verification and quality control of automated hematology analyzers and provides an expert opinion on the performance standard that should be met by the contemporary generation of hematology analyzers. Therefore (i) the state-of-the-art performance of hematology analyzers for complete blood count parameters is summarized, (ii) considerations, challenges, and pitfalls concerning the development of a verification plan are discussed, (iii) guidance is given regarding the establishment of reference intervals, and (iv) different methods on quality control of hematology analyzers are reviewed. © 2016 John Wiley & Sons Ltd.

  12. DarcyTools, Version 2.1. Verification and validation

    Energy Technology Data Exchange (ETDEWEB)

    Svensson, Urban [Computer-aided Fluid Engineering AB, Norrkoeping (Sweden)

    2004-03-01

    DarcyTools is a computer code for simulation of flow and transport in porous and/or fractured media. The fractured media in mind is a fractured rock and the porous media the soil cover on the top of the rock; it is hence groundwater flows, which is the class of flows in mind. A number of novel methods and features form the present version of DarcyTools. In the verification studies, these methods are evaluated by comparisons with analytical solutions for idealized situations. The five verification groups, thus reflect the main areas of recent developments. The present report will focus on the Verification and Validation of DarcyTools. Two accompanying reports cover other aspects: - Concepts, Methods, Equations and Demo Simulations. - User's Guide. The objective of this report is to compile all verification and validation studies that have been carried out so far. After some brief introductory sections, all cases will be reported in Appendix A (verification cases) and Appendix B (validation cases)

  13. Histologic characterization of canine dilated cardiomyopathy.

    Science.gov (United States)

    Tidholm, A; Jönsson, L

    2005-01-01

    Dilated cardiomyopathy (DCM), characterized by chamber dilatation and myocardial systolic and diastolic dysfunction, is one of the most common heart diseases in dogs. The clinical diagnosis is based on findings on echocardiographic and Doppler examinations, with the active exclusion of other acquired or congenital heart diseases. However, the echocardiographic criteria for the diagnosis of DCM are not wholly specific for the disease, and histologic examination may be necessary for final diagnosis. Review of reports on histologic findings in dogs with clinically diagnosed DCM reveals two histologically distinct forms of DCM: 1) cardiomyopathy of Boxers and Doberman Pinschers, corresponding to the "fatty infiltration-degenerative" type and 2) the form seen in many giant, large-, and medium-sized breeds, including some Boxers and Doberman Pinschers, classified as the "attenuated wavy fiber" type of DCM. The histologic changes of the attenuated wavy fiber type of DCM may precede clinical and echocardiographic signs of heart disease, thus indicating an early stage of DCM.

  14. Verification-Based Interval-Passing Algorithm for Compressed Sensing

    OpenAIRE

    Wu, Xiaofu; Yang, Zhen

    2013-01-01

    We propose a verification-based Interval-Passing (IP) algorithm for iteratively reconstruction of nonnegative sparse signals using parity check matrices of low-density parity check (LDPC) codes as measurement matrices. The proposed algorithm can be considered as an improved IP algorithm by further incorporation of the mechanism of verification algorithm. It is proved that the proposed algorithm performs always better than either the IP algorithm or the verification algorithm. Simulation resul...

  15. Multi-canister overpack project - verification and validation, MCNP 4A

    International Nuclear Information System (INIS)

    Goldmann, L.H.

    1997-01-01

    This supporting document contains the software verification and validation (V and V) package used for Phase 2 design of the Spent Nuclear Fuel Multi-Canister Overpack. V and V packages for both ANSYS and MCNP are included. Description of Verification Run(s): This software requires that it be compiled specifically for the machine it is to be used on. Therefore to facilitate ease in the verification process the software automatically runs 25 sample problems to ensure proper installation and compilation. Once the runs are completed the software checks for verification by performing a file comparison on the new output file and the old output file. Any differences between any of the files will cause a verification error. Due to the manner in which the verification is completed a verification error does not necessarily indicate a problem. This indicates that a closer look at the output files is needed to determine the cause of the error

  16. Long-Term Follow-Up of Preoperative Pelvic Radiation Therapy and Concomitant Boost Irradiation in Locally Advanced Rectal Cancer Patients: A Multi-Institutional Phase II Study (KROG 04-01)

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jong Hoon [Department of Radiation Oncology, Seoul St. Mary' s Hospital, College of Medicine, Catholic University of Korea, Seoul (Korea, Republic of); Department of Radiation Oncology, St. Vincent' s Hospital, Catholic University of Korea, Suwon (Korea, Republic of); Kim, Dae Yong [Center for Colorectal Cancer, Research Institute and Hospital, National Cancer Center, Go-Yang (Korea, Republic of); Nam, Taek-Keun [Department of Radiation Oncology, Chonnam National University Hospital, Hwa-Sun (Korea, Republic of); Yoon, Sei-Chul [Department of Radiation Oncology, Seoul St. Mary' s Hospital, College of Medicine, Catholic University of Korea, Seoul (Korea, Republic of); Lee, Doo Seok [Department of Colorectal Surgery, Daehang Hospital, Seoul (Korea, Republic of); Park, Ji Won; Oh, Jae Hwan; Chang, Hee Jin [Center for Colorectal Cancer, Research Institute and Hospital, National Cancer Center, Go-Yang (Korea, Republic of); Yoon, Mee Sun; Jeong, Jae-Uk [Department of Radiation Oncology, Chonnam National University Hospital, Hwa-Sun (Korea, Republic of); Jang, Hong Seok, E-mail: hsjang11@catholic.ac.kr [Department of Radiation Oncology, Seoul St. Mary' s Hospital, College of Medicine, Catholic University of Korea, Seoul (Korea, Republic of)

    2012-11-15

    Purpose: To perform a prospective phase II study to investigate the efficacy and safety of preoperative pelvic radiation therapy and concomitant small-field boost irradiation with 5-fluorouracil and leucovorin for 5 weeks in locally advanced rectal cancer patients. Methods and Materials: Sixty-nine patients with locally advanced, nonmetastatic, mid-to-lower rectal cancer were prospectively enrolled. They had received preoperative chemoradiation therapy and total mesorectal excision. Pelvic radiation therapy of 43.2 Gy in 24 fractions plus concomitant boost radiation therapy of 7.2 Gy in 12 fractions was delivered to the pelvis and tumor bed for 5 weeks. Two cycles of 5-fluorouracil and leucovorin were administered for 3 days in the first and fifth week of radiation therapy. The pathologic response, survival outcome, and treatment toxicity were evaluated for the study endpoints. Results: Of 69 patients, 8 (11.6%) had a pathologically complete response. Downstaging rates were 40.5% for T classification and 68.1% for N classification. At the median follow-up of 69 months, 36 patients have been followed up for more than 5 years. The 5-year disease-free survival (DFS) and overall survival rates were 66.0% and 75.3%, respectively. Higher pathologic T (P = .045) and N (P = .032) classification were significant adverse prognostic factors for DFS, and high-grade histology was an adverse prognostic factor for both DFS (P = .025) and overall survival (P = .031) on the multivariate analysis. Fifteen patients (21.7%) experienced grade 3 or 4 acute toxicity, and 7 patients (10.1%) had long-term toxicity. Conclusion: Preoperative pelvic radiation therapy with concomitant boost irradiation with 5-fluorouracil and leucovorin for 5 weeks showed acceptable acute and long-term toxicities. However, the benefit of concomitant small-field boost irradiation for 5 weeks in rectal cancer patients was not demonstrated beyond conventional irradiation for 6 weeks in terms of tumor response and

  17. PIONEERING WORK IN COMPUTER VISION FOR HISTOLOGY

    OpenAIRE

    Andrei Daniel Timofte; Irina-Draga Căruntu

    2017-01-01

    The concept of computer-assisted training was firstly implemented in UMF Iasi in 1997, through the development of two pioneering digital instruments, namely the Histology Album and the Oral Histology Album. Both were built for learning purposes and became available, at that time, as Internet resources worldwide visible. The application of this particular e-learning method was dictated by the importance of well-defined visual images in acquiring basic histologic principles. Thus, t...

  18. Key Nuclear Verification Priorities: Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  19. Key Nuclear Verification Priorities - Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  20. On the organisation of program verification competitions

    NARCIS (Netherlands)

    Huisman, Marieke; Klebanov, Vladimir; Monahan, Rosemary; Klebanov, Vladimir; Beckert, Bernhard; Biere, Armin; Sutcliffe, Geoff

    In this paper, we discuss the challenges that have to be addressed when organising program verification competitions. Our focus is on competitions for verification systems where the participants both formalise an informally stated requirement and (typically) provide some guidance for the tool to

  1. Simulation environment based on the Universal Verification Methodology

    International Nuclear Information System (INIS)

    Fiergolski, A.

    2017-01-01

    Universal Verification Methodology (UVM) is a standardized approach of verifying integrated circuit designs, targeting a Coverage-Driven Verification (CDV). It combines automatic test generation, self-checking testbenches, and coverage metrics to indicate progress in the design verification. The flow of the CDV differs from the traditional directed-testing approach. With the CDV, a testbench developer, by setting the verification goals, starts with an structured plan. Those goals are targeted further by a developed testbench, which generates legal stimuli and sends them to a device under test (DUT). The progress is measured by coverage monitors added to the simulation environment. In this way, the non-exercised functionality can be identified. Moreover, the additional scoreboards indicate undesired DUT behaviour. Such verification environments were developed for three recent ASIC and FPGA projects which have successfully implemented the new work-flow: (1) the CLICpix2 65 nm CMOS hybrid pixel readout ASIC design; (2) the C3PD 180 nm HV-CMOS active sensor ASIC design; (3) the FPGA-based DAQ system of the CLICpix chip. This paper, based on the experience from the above projects, introduces briefly UVM and presents a set of tips and advices applicable at different stages of the verification process-cycle.

  2. Contemporary Management of Patients with Concomitant Coronary and Carotid Artery Disease.

    Science.gov (United States)

    Poi, Mun J; Echeverria, Angela; Lin, Peter H

    2018-01-01

    The ideal management of concomitant carotid and coronary artery occlusive disease remains elusive. Although researchers have advocated the potential benefits of varying treatment strategies based on either concomitant or staged surgical treatment, there is no consensus in treatment guidelines among national or international clinical societies. Clinical studies show that coronary artery bypass grafting (CABG) with either staged or synchronous carotid endarterectomy (CEA) is associated with a high procedural stroke or death rate. Recent clinical studies have found carotid artery stenting (CAS) prior to CABG can lead to superior treatment outcomes in asymptomatic patients who are deemed high risk of CEA. With emerging data suggesting favorable outcome of CAS compared to CEA in patients with critical coronary artery disease, physicians must consider these diverging therapeutic options when treating patients with concurrent carotid and coronary disease. This review examines the available clinical data on therapeutic strategies in patients with concomitant carotid and coronary artery disease. A treatment paradigm for considering CAS or CEA as well as CABG and percutaneous coronary intervention is discussed.

  3. Correlation between ICDAS and histology: Differences between stereomicroscopy and microradiography with contrast solution as histological techniques.

    Directory of Open Access Journals (Sweden)

    Samara de Azevedo Gomes Campos

    Full Text Available Detection of occlusal caries with visual examination using ICDAS correlates strongly with histology under stereomicroscopy (SM, but dentin aspects under SM are ambiguous regarding mineral content. Thus, our aim was to test two null hypotheses: SM and microradiography result in similar correlations between ICDAS and histology; SM and microradiography result in similar positive (PPV and negative predictive values (NPV of ICDAS cut-off 1-2 (scores 0-2 as sound with histological threshold D3 (demineralization in the inner third of dentin. Occlusal surfaces of extracted permanent teeth (n = 115 were scored using ICDAS. Undemineralized ground sections were histologically scored using both SM without contrast solution and microradiography after immersion in Thoulet's solution 1.47 for 24 h (MRC. Correlation between ICDAS and histology differed from SM (0.782 to MRC (0.511 (p = 0.0002, with a large effect size "q" of 0.49 (95% CI: 0.638/0.338. For ICDAS cut-off 1-2 and D3, PPV from MRC (0.56 was higher than that from SM (0.28 (p< 0.00001; effect size h = 0.81, and NPV from MRC (0.72 was lower than that from SM (1,00 (p < 0.00001; effect size h = 1.58. In conclusion, SM overestimated the correlation between ICDAS and lesion depth, and underestimated the number of occlusal surfaces with ICDAS cut-off 1-2 and deep dentin demineralization.

  4. HTGR analytical methods and design verification

    International Nuclear Information System (INIS)

    Neylan, A.J.; Northup, T.E.

    1982-05-01

    Analytical methods for the high-temperature gas-cooled reactor (HTGR) include development, update, verification, documentation, and maintenance of all computer codes for HTGR design and analysis. This paper presents selected nuclear, structural mechanics, seismic, and systems analytical methods related to the HTGR core. This paper also reviews design verification tests in the reactor core, reactor internals, steam generator, and thermal barrier

  5. IMRT plan verification in radiotherapy

    International Nuclear Information System (INIS)

    Vlk, P.

    2006-01-01

    This article describes the procedure for verification of IMRT (Intensity modulated radiation therapy) plan, which is used in the Oncological Institute of St. Elisabeth in Bratislava. It contains basic description of IMRT technology and developing a deployment plan for IMRT planning system CORVUS 6.0, the device Mimic (Multilammelar intensity modulated collimator) and the overall process of verifying the schedule created. The aim of verification is particularly good control of the functions of MIMIC and evaluate the overall reliability of IMRT planning. (author)

  6. Automatic Verification of Timing Constraints for Safety Critical Space Systems

    Science.gov (United States)

    Fernandez, Javier; Parra, Pablo; Sanchez Prieto, Sebastian; Polo, Oscar; Bernat, Guillem

    2015-09-01

    In this paper is presented an automatic process of verification. We focus in the verification of scheduling analysis parameter. This proposal is part of process based on Model Driven Engineering to automate a Verification and Validation process of the software on board of satellites. This process is implemented in a software control unit of the energy particle detector which is payload of Solar Orbiter mission. From the design model is generated a scheduling analysis model and its verification model. The verification as defined as constraints in way of Finite Timed Automatas. When the system is deployed on target the verification evidence is extracted as instrumented points. The constraints are fed with the evidence, if any of the constraints is not satisfied for the on target evidence the scheduling analysis is not valid.

  7. A framework for nuclear agreement and verification

    International Nuclear Information System (INIS)

    Ali, A.

    1991-01-01

    This chapter assesses the prospects for a nuclear agreement between India and Pakistan. The chapter opens with a review of past and present political environments of the two countries. The discussion proceeds to describe the linkage of global arms control agreements, prospects for verification of a Comprehensive Test Ban Treaty, the role of nuclear power in any agreements, the intrusiveness of verification, and possible post-proliferation agreements. Various monitoring and verification technologies are described (mainly satellite oriented). The chapter concludes with an analysis of the likelihood of persuading India and Pakistan to agree to a nonproliferation arrangement

  8. Verification of Many-Qubit States

    Directory of Open Access Journals (Sweden)

    Yuki Takeuchi

    2018-06-01

    Full Text Available Verification is a task to check whether a given quantum state is close to an ideal state or not. In this paper, we show that a variety of many-qubit quantum states can be verified with only sequential single-qubit measurements of Pauli operators. First, we introduce a protocol for verifying ground states of Hamiltonians. We next explain how to verify quantum states generated by a certain class of quantum circuits. We finally propose an adaptive test of stabilizers that enables the verification of all polynomial-time-generated hypergraph states, which include output states of the Bremner-Montanaro-Shepherd-type instantaneous quantum polynomial time (IQP circuits. Importantly, we do not make any assumption that the identically and independently distributed copies of the same states are given: Our protocols work even if some highly complicated entanglement is created among copies in any artificial way. As applications, we consider the verification of the quantum computational supremacy demonstration with IQP models, and verifiable blind quantum computing.

  9. Formal Verification -26 ...

    Indian Academy of Sciences (India)

    by testing of the components and successful testing leads to the software being ... Formal verification is based on formal methods which are mathematically based ..... scenario under which a similar error could occur. There are various other ...

  10. MALIGNANT TUMORS OF BONES. MORBIDITY, MORTALITY, INDEX ACCURACY, SURVIVAL OF PATIENTS ACCORDING TO HISTOLOGICAL FORMS

    Directory of Open Access Journals (Sweden)

    V. M. Merabishvili

    2015-01-01

    Full Text Available Introduction. Standardized (world standard incidence of malignant tumors of bones (S40,41 does not have has significant fluctuations. According to IARC among male population the most common incidence rates range from 1 to 2 cases per 100.000 and among female population – from 0.5 to 1.0 among women.  Purpose of study. To study dynamics of morbidity and mortality from malignant tumors of bones, the quality of estimation, observed and relative survival of patients according to histological forms. The work of this level is held in Russia for the first time. Material and methods of study. There were used an open world and domestic sources to estimate the prevalence of malignant tumors of bones, databases of population-based cancer registers, classical methods of population-based estimation of the prevalence of malignant tumors of bones. results of study. The basis of this work is data from the Population-based Cancer Registry of St. Petersburg and special studies being held before its establishing in 1993. Annually in St. Petersburg there are registered 40–60 primary cases of malignant tumors of bones (S40, 41. The level of morphological verification of these malignancies in Russia is 82.1 %, in St. Petersburg – 84.9 %. There is a high rate of undefined stage: in Russia – 19.7 %, in St. Petersburg – 24.5 %, in Moscow – 23.5 %. During the first year of observation 27.3 % of patients die in Russia, 21.7 % in St. Petersburg, and 11.1 % in Moscow. In comparison with the average data (Eurocare program the relative survival of patients in St. Petersburg is significantly lower: in men (St. Petersburg – 42.2–48.2 %, (Eurocare-3,4 – 55–58 %, in women (St. Petersburg – 32.2–54.6 % (Eurocare – 59–63 %. conclusion. Thus, in this work for the first time in Russia it is showed dynamics of absolute and relative incidence rates of malignant tumors of bones since 1980 by sex and age-specific indicators. It is presented a set of

  11. Verification of wet blasting decontamination technology

    International Nuclear Information System (INIS)

    Matsubara, Sachito; Murayama, Kazunari; Yoshida, Hirohisa; Igei, Shigemitsu; Izumida, Tatsuo

    2013-01-01

    Macoho Co., Ltd. participated in the projects of 'Decontamination Verification Test FY 2011 by the Ministry of the Environment' and 'Decontamination Verification Test FY 2011 by the Cabinet Office.' And we tested verification to use a wet blasting technology for decontamination of rubble and roads contaminated by the accident of Fukushima Daiichi Nuclear Power Plant of the Tokyo Electric Power Company. As a results of the verification test, the wet blasting decontamination technology showed that a decontamination rate became 60-80% for concrete paving, interlocking, dense-grated asphalt pavement when applied to the decontamination of the road. When it was applied to rubble decontamination, a decontamination rate was 50-60% for gravel and approximately 90% for concrete and wood. It was thought that Cs-134 and Cs-137 attached to the fine sludge scraped off from a decontamination object and the sludge was found to be separated from abrasives by wet cyclene classification: the activity concentration of the abrasives is 1/30 or less than the sludge. The result shows that the abrasives can be reused without problems when the wet blasting decontamination technology is used. (author)

  12. Concomitant fibromyalgia in rheumatoid arthritis is associated with the more frequent use of biological therapy

    DEFF Research Database (Denmark)

    Rask Lage-Hansen, Philip; Chrysidis, S; Lage-Hansen, M

    2016-01-01

    identified. No group differences were found regarding disease duration, age, gender, and serological status. Of the RA patients with concomitant FM, 64% were treated with biological therapy vs. 32% of RA patients without concomitant FM (p = 0.002). The mean DAS28 in the FM group was 4.4 compared to 2......OBJECTIVES: To compare the 28-joint Disease Activity Score (DAS28) and its components in patients with rheumatoid arthritis (RA) with and without concomitant fibromyalgia (FM), and to investigate the use of biological treatment in the two groups. METHOD: Questionnaires developed to diagnose FM were...... applied to investigate group differences in the use of biological therapy, baseline characteristics, patient-reported outcomes, and DAS28 between groups when appropriate. RESULTS: Questionnaires were completed by 162 out of 264 (61%) patients. Twenty-five patients (15.4%) with concomitant FM were...

  13. K Basins Field Verification Program

    International Nuclear Information System (INIS)

    Booth, H.W.

    1994-01-01

    The Field Verification Program establishes a uniform and systematic process to ensure that technical information depicted on selected engineering drawings accurately reflects the actual existing physical configuration. This document defines the Field Verification Program necessary to perform the field walkdown and inspection process that identifies the physical configuration of the systems required to support the mission objectives of K Basins. This program is intended to provide an accurate accounting of the actual field configuration by documenting the as-found information on a controlled drawing

  14. Engineering drawing field verification program. Revision 3

    International Nuclear Information System (INIS)

    Ulk, P.F.

    1994-01-01

    Safe, efficient operation of waste tank farm facilities is dependent in part upon the availability of accurate, up-to-date plant drawings. Accurate plant drawings are also required in support of facility upgrades and future engineering remediation projects. This supporting document establishes the procedure for performing a visual field verification of engineering drawings, the degree of visual observation being performed and documenting the results. A copy of the drawing attesting to the degree of visual observation will be paginated into the released Engineering Change Notice (ECN) documenting the field verification for future retrieval and reference. All waste tank farm essential and support drawings within the scope of this program will be converted from manual to computer aided drafting (CAD) drawings. A permanent reference to the field verification status will be placed along the right border of the CAD-converted drawing, referencing the revision level, at which the visual verification was performed and documented

  15. Prevalence of Concomitant Sacroiliac joint Dysfunction in Patients With Image Proven Herniated Lumbar Discs

    Directory of Open Access Journals (Sweden)

    Salah Alalawi

    2009-05-01

    Full Text Available Background:Sacroiliac joint (SIJ dysfunction is a widely known but poorly defined cause of low back pain. To our knowledge, few published studies have been conducted to evaluate systematically the prevalence and significance of concomitant sacroiliac joint dysfunction in patients with herniated lumbar discs. As concomitant SIJ dysfunction in low back pain patients is likely to respond to particular noninvasive interventions such as manipulation,improved understanding of the relationship between these two diagnoses would improve clinical decision making and research.Methods:This study was designated to estimate the prevalence of concomitant sacroiliac joint dysfunction in sub acute low back pain patients with image proven discopathy and evaluate the theory that sacroiliac joint dysfunction can be a source of pain and functional disability in discopathy. A total of 202 patients with sub acute radicular back pain and MRI proven herniated lumbar discs underwent standardized   physiatrist history and physical examination, specified for detection of concomitant sacroiliac joint dysfunction.Results: Sacroiliac joint dysfunction is a concomitant finding in 72.3% of evaluated patients.There was significantly higher SIJ dysfunction prevalence in female patients (p <0.0001. Conclusion: SIJ dysfunction is a significant pathogenic factor with high possibility of occurrence in low back pain. Thus, in the presence of radicular and sacroiliac joint symptoms, SIJ dysfunction, regardless of intervertebral disc pathology, must be considered in clinical decisiomaking.

  16. Verification of Open Interactive Markov Chains

    OpenAIRE

    Brazdil, Tomas; Hermanns, Holger; Krcal, Jan; Kretinsky, Jan; Rehak, Vojtech

    2012-01-01

    Interactive Markov chains (IMC) are compositional behavioral models extending both labeled transition systems and continuous-time Markov chains. IMC pair modeling convenience - owed to compositionality properties - with effective verification algorithms and tools - owed to Markov properties. Thus far however, IMC verification did not consider compositionality properties, but considered closed systems. This paper discusses the evaluation of IMC in an open and thus compositional interpretation....

  17. Concomitant Hip Arthroscopy and Periacetabular Osteotomy.

    Science.gov (United States)

    Domb, Benjamin G; LaReau, Justin M; Hammarstedt, Jon E; Gupta, Asheesh; Stake, Christine E; Redmond, John M

    2015-11-01

    To detail our early experience using concomitant hip arthroscopy and periacetabular osteotomy (PAO) for the treatment of acetabular dysplasia. We prospectively collected and retrospectively reviewed the surgical and outcome data of 17 patients who underwent concomitant hip arthroscopy and PAO between October 2010 and July 2013. Preoperative and postoperative range of motion, outcome and pain scores, and radiographic data were collected. Intraoperative arthroscopic findings and postoperative complications were recorded. The group consisted of 3 male and 14 female patients with a mean follow-up period of 2.4 years. Three patients had undergone previous surgery on the affected hip. Chondrolabral pathology was identified in all 17 patients. Twelve patients underwent labral repair, and five patients underwent partial labral debridement. No patient was converted to total hip arthroplasty or required revision surgery at short-term follow-up. All 4 patient-reported outcome scores showed statistically significant changes from baseline to latest follow-up (P arthroscopy and PAO has been favorable. We noted that all our patients have evidence of chondrolabral damage at the time of PAO when the joint is distracted and evaluated. All patients in this series had intra-articular pathology treated arthroscopically and showed satisfactory mean clinical improvement. Hip arthroscopy with PAO did not appear to introduce complications beyond the PAO alone. Level IV, therapeutic case series. Copyright © 2015 Arthroscopy Association of North America. Published by Elsevier Inc. All rights reserved.

  18. Concomitant boost radiation therapy for inoperable non-small-cell lung cancer: preliminary report of a prospective randomized study

    International Nuclear Information System (INIS)

    Sun, L.-M.; Leung, Stephen Wan; Wang, C.-J.; Chen, H.-C.; Fang, F.-M.; Huang, E.-Y.; Hsu, H.-C.; Yeh, S.-A.; Hsiung, C.-Y.; Huang, David T.

    2000-01-01

    Purpose: The radiation therapy results for patients with inoperable non-small-cell lung cancer (NSCLC) have been disappointing. Tumor dose escalation using concomitant boost technique (CBT) has been shown to improve local control in a few prospective studies. This trial was carried out to prospectively assess the radiation response and acute toxicity of CBT in comparison to the conventional treatment technique (CTT). Methods and Materials: Ninety-seven consecutive eligible patients were entered in this prospective clinical trial between November 1994 and February 1998. Patients were randomized to receive either CBT (43 patients) or CTT (54 patients) radiation therapy. These patients either refused chemotherapy or were judged as unsuitable for chemotherapy. Patients in the CBT group received 46.8 Gy in 26 fractions using large fields that encompassed the gross and occult disease. A concomitant boost of 18.2 Gy (0.7 Gy per fraction) was delivered to the gross disease using small fields with 1.5-cm margins. The small fields were treated concurrently with the large fields and the total dose to the tumor area was 65 Gy in 26 fractions. Patients in the CTT group received 70.8 Gy in 38 fractions. The acute toxicity between each group was compared. The response rate was analyzed and compared by treatment group, gender, age, stage, histology, initial Karnofsky performance score (KPS), severity of acute toxicity, and maximum body weight loss (MBWL) during treatment course. Results: The demographic parameters such as sex, age, and stage were evenly distributed in each treatment group. The majority of these patients had Stage IIIA and IIIB disease. Overall median treatment times were 39 days for the CBT group of patients and 62 days for the CTT group. No treatment-related mortality was found. There were 2 patients in the CTT group with acute RTOG Grade 3 lung toxicity, and no Grade 3 lung or esophageal toxicity was observed in CBT group. The response rates, assessed by

  19. Earth Science Enterprise Scientific Data Purchase Project: Verification and Validation

    Science.gov (United States)

    Jenner, Jeff; Policelli, Fritz; Fletcher, Rosea; Holecamp, Kara; Owen, Carolyn; Nicholson, Lamar; Dartez, Deanna

    2000-01-01

    This paper presents viewgraphs on the Earth Science Enterprise Scientific Data Purchase Project's verification,and validation process. The topics include: 1) What is Verification and Validation? 2) Why Verification and Validation? 3) Background; 4) ESE Data Purchas Validation Process; 5) Data Validation System and Ingest Queue; 6) Shipment Verification; 7) Tracking and Metrics; 8) Validation of Contract Specifications; 9) Earth Watch Data Validation; 10) Validation of Vertical Accuracy; and 11) Results of Vertical Accuracy Assessment.

  20. Radiotherapy plus concomitant adjuvant temozolomide for glioblastoma: Japanese mono-institutional results.

    Directory of Open Access Journals (Sweden)

    Takahiro Oike

    Full Text Available This study was conducted to investigate the feasibility and survival benefits of combined treatment with radiotherapy and temozolomide (TMZ, which has been covered by the national health insurance in Japanese patients with glioblastoma since September 2006. Between September 2006 and December 2011, 47 patients with newly diagnosed and histologically confirmed glioblastoma received radiotherapy for 60 Gy in 30 fractions. Among them, 45 patients (TMZ group received concomitant TMZ (75 mg/m(2/day, every day and adjuvant TMZ (200 mg/m(2/day, 5 days during each 28-days. All 36 of the glioblastoma patients receiving radiotherapy between January 1988 and August 2006 were analyzed as historical controls (control group. All patients were followed for at least 1 year or until they died. The median survival was 15.8 months in the TMZ group and 12.0 months in the control group after a median follow-up of 14.0 months. The hazard ratio for death in the TMZ group relative to the control group was 0.52 (P<0.01; the 2-year survival rate was 27.7% in the TMZ group and 14.6% in the control group. Hematologic toxicity of grade 3 and higher was observed in 20.4% in the TMZ group. Multivariate analysis showed that extent of surgery had the strongest impact on survival (P<0.01, while the use of TMZ had the second largest impact on survival (P = 0.035. The results indicate that combined treatment with radiotherapy and TMZ has a significant survival benefit for Japanese patients with newly diagnosed glioblastoma with slightly higher toxicities than previously reported.

  1. Design verification for large reprocessing plants (Proposed procedures)

    International Nuclear Information System (INIS)

    Rolandi, G.

    1988-07-01

    In the 1990s, four large commercial reprocessing plants will progressively come into operation: If an effective and efficient safeguards system is to be applied to these large and complex plants, several important factors have to be considered. One of these factors, addressed in the present report, concerns plant design verification. Design verification provides an overall assurance on plant measurement data. To this end design verification, although limited to the safeguards aspects of the plant, must be a systematic activity, which starts during the design phase, continues during the construction phase and is particularly performed during the various steps of the plant's commissioning phase. The detailed procedures for design information verification on commercial reprocessing plants must be defined within the frame of the general provisions set forth in INFCIRC/153 for any type of safeguards related activities and specifically for design verification. The present report is intended as a preliminary contribution on a purely technical level, and focusses on the problems within the Agency. For the purpose of the present study the most complex case was assumed: i.e. a safeguards system based on conventional materials accountancy, accompanied both by special input and output verification and by some form of near-real-time accountancy involving in-process inventory taking, based on authenticated operator's measurement data. C/S measures are also foreseen, where necessary to supplement the accountancy data. A complete ''design verification'' strategy comprehends: informing the Agency of any changes in the plant system which are defined as ''safeguards relevant''; ''reverifying by the Agency upon receiving notice from the Operator on any changes, on ''design information''. 13 refs

  2. Material integrity verification radar

    International Nuclear Information System (INIS)

    Koppenjan, S.K.

    1999-01-01

    The International Atomic Energy Agency (IAEA) has the need for verification of 'as-built' spent fuel-dry storage containers and other concrete structures. The IAEA has tasked the Special Technologies Laboratory (STL) to fabricate, test, and deploy a stepped-frequency Material Integrity Verification Radar (MIVR) system to nondestructively verify the internal construction of these containers. The MIVR system is based on previously deployed high-frequency, ground penetrating radar (GPR) systems that have been developed by STL for the U.S. Department of Energy (DOE). Whereas GPR technology utilizes microwave radio frequency energy to create subsurface images, MTVR is a variation for which the medium is concrete instead of soil. The purpose is to nondestructively verify the placement of concrete-reinforcing materials, pipes, inner liners, and other attributes of the internal construction. The MIVR system underwent an initial field test on CANDU reactor spent fuel storage canisters at Atomic Energy of Canada Limited (AECL), Chalk River Laboratories, Ontario, Canada, in October 1995. A second field test at the Embalse Nuclear Power Plant in Embalse, Argentina, was completed in May 1996. The DOE GPR also was demonstrated at the site. Data collection and analysis were performed for the Argentine National Board of Nuclear Regulation (ENREN). IAEA and the Brazilian-Argentine Agency for the Control and Accounting of Nuclear Material (ABACC) personnel were present as observers during the test. Reinforcing materials were evident in the color, two-dimensional images produced by the MIVR system. A continuous pattern of reinforcing bars was evident and accurate estimates on the spacing, depth, and size were made. The potential uses for safeguard applications were jointly discussed. The MIVR system, as successfully demonstrated in the two field tests, can be used as a design verification tool for IAEA safeguards. A deployment of MIVR for Design Information Questionnaire (DIQ

  3. A histological ontology of the human cardiovascular system.

    Science.gov (United States)

    Mazo, Claudia; Salazar, Liliana; Corcho, Oscar; Trujillo, Maria; Alegre, Enrique

    2017-10-02

    In this paper, we describe a histological ontology of the human cardiovascular system developed in collaboration among histology experts and computer scientists. The histological ontology is developed following an existing methodology using Conceptual Models (CMs) and validated using OOPS!, expert evaluation with CMs, and how accurately the ontology can answer the Competency Questions (CQ). It is publicly available at http://bioportal.bioontology.org/ontologies/HO and https://w3id.org/def/System . The histological ontology is developed to support complex tasks, such as supporting teaching activities, medical practices, and bio-medical research or having natural language interactions.

  4. Specification and Automated Verification of Real-Time Behaviour

    DEFF Research Database (Denmark)

    Kristensen, C.H.; Andersen, J.H.; Skou, A.

    1995-01-01

    In this paper we sketch a method for specification and automatic verification of real-time software properties.......In this paper we sketch a method for specification and automatic verification of real-time software properties....

  5. Specification and Automated Verification of Real-Time Behaviour

    DEFF Research Database (Denmark)

    Andersen, J.H.; Kristensen, C.H.; Skou, A.

    1996-01-01

    In this paper we sketch a method for specification and automatic verification of real-time software properties.......In this paper we sketch a method for specification and automatic verification of real-time software properties....

  6. Formal Verification of Continuous Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer

    2012-01-01

    and the verification procedures should be algorithmically synthesizable. Autonomous control plays an important role in many safety-critical systems. This implies that a malfunction in the control system can have catastrophic consequences, e.g., in space applications where a design flaw can result in large economic...... losses. Furthermore, a malfunction in the control system of a surgical robot may cause death of patients. The previous examples involve complex systems that are required to operate according to complex specifications. The systems cannot be formally verified by modern verification techniques, due...

  7. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  8. Runtime Verification Through Forward Chaining

    Directory of Open Access Journals (Sweden)

    Alan Perotti

    2014-12-01

    Full Text Available In this paper we present a novel rule-based approach for Runtime Verification of FLTL properties over finite but expanding traces. Our system exploits Horn clauses in implication form and relies on a forward chaining-based monitoring algorithm. This approach avoids the branching structure and exponential complexity typical of tableaux-based formulations, creating monitors with a single state and a fixed number of rules. This allows for a fast and scalable tool for Runtime Verification: we present the technical details together with a working implementation.

  9. Current status of verification practices in clinical biochemistry in Spain.

    Science.gov (United States)

    Gómez-Rioja, Rubén; Alvarez, Virtudes; Ventura, Montserrat; Alsina, M Jesús; Barba, Núria; Cortés, Mariano; Llopis, María Antonia; Martínez, Cecilia; Ibarz, Mercè

    2013-09-01

    Verification uses logical algorithms to detect potential errors before laboratory results are released to the clinician. Even though verification is one of the main processes in all laboratories, there is a lack of standardization mainly in the algorithms used and the criteria and verification limits applied. A survey in clinical laboratories in Spain was conducted in order to assess the verification process, particularly the use of autoverification. Questionnaires were sent to the laboratories involved in the External Quality Assurance Program organized by the Spanish Society of Clinical Biochemistry and Molecular Pathology. Seven common biochemical parameters were included (glucose, cholesterol, triglycerides, creatinine, potassium, calcium, and alanine aminotransferase). Completed questionnaires were received from 85 laboratories. Nearly all the laboratories reported using the following seven verification criteria: internal quality control, instrument warnings, sample deterioration, reference limits, clinical data, concordance between parameters, and verification of results. The use of all verification criteria varied according to the type of verification (automatic, technical, or medical). Verification limits for these parameters are similar to biological reference ranges. Delta Check was used in 24% of laboratories. Most laboratories (64%) reported using autoverification systems. Autoverification use was related to laboratory size, ownership, and type of laboratory information system, but amount of use (percentage of test autoverified) was not related to laboratory size. A total of 36% of Spanish laboratories do not use autoverification, despite the general implementation of laboratory information systems, most of them, with autoverification ability. Criteria and rules for seven routine biochemical tests were obtained.

  10. Complementary technologies for verification of excess plutonium

    International Nuclear Information System (INIS)

    Langner, D.G.; Nicholas, N.J.; Ensslin, N.; Fearey, B.L.; Mitchell, D.J.; Marlow, K.W.; Luke, S.J.; Gosnell, T.B.

    1998-01-01

    Three complementary measurement technologies have been identified as candidates for use in the verification of excess plutonium of weapons origin. These technologies: high-resolution gamma-ray spectroscopy, neutron multiplicity counting, and low-resolution gamma-ray spectroscopy, are mature, robust technologies. The high-resolution gamma-ray system, Pu-600, uses the 630--670 keV region of the emitted gamma-ray spectrum to determine the ratio of 240 Pu to 239 Pu. It is useful in verifying the presence of plutonium and the presence of weapons-grade plutonium. Neutron multiplicity counting is well suited for verifying that the plutonium is of a safeguardable quantity and is weapons-quality material, as opposed to residue or waste. In addition, multiplicity counting can independently verify the presence of plutonium by virtue of a measured neutron self-multiplication and can detect the presence of non-plutonium neutron sources. The low-resolution gamma-ray spectroscopic technique is a template method that can provide continuity of knowledge that an item that enters the a verification regime remains under the regime. In the initial verification of an item, multiple regions of the measured low-resolution spectrum form a unique, gamma-radiation-based template for the item that can be used for comparison in subsequent verifications. In this paper the authors discuss these technologies as they relate to the different attributes that could be used in a verification regime

  11. A Synthesized Framework for Formal Verification of Computing Systems

    Directory of Open Access Journals (Sweden)

    Nikola Bogunovic

    2003-12-01

    Full Text Available Design process of computing systems gradually evolved to a level that encompasses formal verification techniques. However, the integration of formal verification techniques into a methodical design procedure has many inherent miscomprehensions and problems. The paper explicates the discrepancy between the real system implementation and the abstracted model that is actually used in the formal verification procedure. Particular attention is paid to the seamless integration of all phases of the verification procedure that encompasses definition of the specification language and denotation and execution of conformance relation between the abstracted model and its intended behavior. The concealed obstacles are exposed, computationally expensive steps identified and possible improvements proposed.

  12. Independent verification in operations at nuclear power plants

    International Nuclear Information System (INIS)

    Donderi, D.C.; Smiley, A.; Ostry, D.J.; Moray, N.P.

    1995-09-01

    A critical review of approaches to independent verification in operations used in nuclear power plant quality assurance programs in other countries, was conducted for this study. This report identifies the uses of independent verification and provides an assessment of the effectiveness of the various approaches. The findings indicate that at Canadian nuclear power plants as much, if not more, independent verification is performed than at power plants in the other countries included in the study. Additional requirements in this area are not proposed for Canadian stations. (author)

  13. Evaluation of haemato-biochemical and oxidative indices in naturally infected concomitant tick borne intracellular diseases in dogs

    Directory of Open Access Journals (Sweden)

    Kalyan Sarma

    2015-01-01

    Full Text Available Objective: To explore haemato-biochemical and oxidative stress indices due to concomitant tick borne intracellular diseases in dogs presented at Referral Veterinary Polyclinic, Indian Veterinary Research Institute, Bareilly during May 2010 to May 2012. Methods: Microscopy of Giemsa blood smear and ELISA test (SNAP 4D伊 were carried out in suspected cases to confirm haemo-parasitic infection. Blood and serum samples were analyzed for oxidative stress indices and haemato-biochemical changes. All the ailing conditions were recorded to investigate the clinical pattern of concomitant tick borne diseases. Ultrasonographic study was carried out to obtain the hepatic involvement. Results: Examination of 3 650 dogs revealed that 2.77% dog were positive for various tick borne diseases, out of which 21.78% were with concomitant infection. Clinical symptoms were noted with overall mean clinical score of 9.95依0.30. Ultrasonographic examination revealed hepatomegaly, distension of gall bladder, and ascites. Haemato-biochemical evaluation confirmed anaemia, leucopenia, thrombocytopenia, hypoproteinemia, hypoalbuminemia, hyperglobulinemia and hyperbilirubinemia with increased serum alanine amino transferase, alkaline phosphatase and gamma-glutamyl transpeptidase in concomitant infected dogs. The lipid peroxidation level of concomitant infection was significantly higher (P<0.05 than healthy group whereas superoxide dismutase, glutathione-reduced and catalase activity in concomitant infected group were decreased. Conclusions: The severity of infection was more pronounced in dogs harboring Ehrlichia, Babesia and Hepatozoon and the oxidative stress may have a pathophysiological role in concomitant infection in dogs.

  14. Verification in Referral-Based Crowdsourcing

    Science.gov (United States)

    Naroditskiy, Victor; Rahwan, Iyad; Cebrian, Manuel; Jennings, Nicholas R.

    2012-01-01

    Online social networks offer unprecedented potential for rallying a large number of people to accomplish a given task. Here we focus on information gathering tasks where rare information is sought through “referral-based crowdsourcing”: the information request is propagated recursively through invitations among members of a social network. Whereas previous work analyzed incentives for the referral process in a setting with only correct reports, misreporting is known to be both pervasive in crowdsourcing applications, and difficult/costly to filter out. A motivating example for our work is the DARPA Red Balloon Challenge where the level of misreporting was very high. In order to undertake a formal study of verification, we introduce a model where agents can exert costly effort to perform verification and false reports can be penalized. This is the first model of verification and it provides many directions for future research, which we point out. Our main theoretical result is the compensation scheme that minimizes the cost of retrieving the correct answer. Notably, this optimal compensation scheme coincides with the winning strategy of the Red Balloon Challenge. PMID:23071530

  15. Nuclear Data Verification and Standardization

    Energy Technology Data Exchange (ETDEWEB)

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  16. Verification and quality control of routine hematology analyzers

    NARCIS (Netherlands)

    Vis, J Y; Huisman, A

    2016-01-01

    Verification of hematology analyzers (automated blood cell counters) is mandatory before new hematology analyzers may be used in routine clinical care. The verification process consists of several items which comprise among others: precision, accuracy, comparability, carryover, background and

  17. Solid waste operations complex engineering verification program plan

    International Nuclear Information System (INIS)

    Bergeson, C.L.

    1994-01-01

    This plan supersedes, but does not replace, the previous Waste Receiving and Processing/Solid Waste Engineering Development Program Plan. In doing this, it does not repeat the basic definitions of the various types or classes of development activities nor provide the rigorous written description of each facility and assign the equipment to development classes. The methodology described in the previous document is still valid and was used to determine the types of verification efforts required. This Engineering Verification Program Plan will be updated on a yearly basis. This EVPP provides programmatic definition of all engineering verification activities for the following SWOC projects: (1) Project W-026 - Waste Receiving and Processing Facility Module 1; (2) Project W-100 - Waste Receiving and Processing Facility Module 2A; (3) Project W-112 - Phase V Storage Facility; and (4) Project W-113 - Solid Waste Retrieval. No engineering verification activities are defined for Project W-112 as no verification work was identified. The Acceptance Test Procedures/Operational Test Procedures will be part of each project's Title III operation test efforts. The ATPs/OTPs are not covered by this EVPP

  18. 21 CFR 21.44 - Verification of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Verification of identity. 21.44 Section 21.44 Food... Verification of identity. (a) An individual seeking access to records in a Privacy Act Record System may be... identity. The identification required shall be suitable considering the nature of the records sought. No...

  19. A methodology for the rigorous verification of plasma simulation codes

    Science.gov (United States)

    Riva, Fabio

    2016-10-01

    The methodology used to assess the reliability of numerical simulation codes constitutes the Verification and Validation (V&V) procedure. V&V is composed by two separate tasks: the verification, which is a mathematical issue targeted to assess that the physical model is correctly solved, and the validation, which determines the consistency of the code results, and therefore of the physical model, with experimental data. In the present talk we focus our attention on the verification, which in turn is composed by the code verification, targeted to assess that a physical model is correctly implemented in a simulation code, and the solution verification, that quantifies the numerical error affecting a simulation. Bridging the gap between plasma physics and other scientific domains, we introduced for the first time in our domain a rigorous methodology for the code verification, based on the method of manufactured solutions, as well as a solution verification based on the Richardson extrapolation. This methodology was applied to GBS, a three-dimensional fluid code based on a finite difference scheme, used to investigate the plasma turbulence in basic plasma physics experiments and in the tokamak scrape-off layer. Overcoming the difficulty of dealing with a numerical method intrinsically affected by statistical noise, we have now generalized the rigorous verification methodology to simulation codes based on the particle-in-cell algorithm, which are employed to solve Vlasov equation in the investigation of a number of plasma physics phenomena.

  20. Verification and Performance Analysis for Embedded Systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2009-01-01

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems.......This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems....

  1. Extraintestinal manifestations were common in children with coeliac disease and were more prevalent in patients with more severe clinical and histological presentation.

    Science.gov (United States)

    Nurminen, Samuli; Kivelä, Laura; Huhtala, Heini; Kaukinen, Katri; Kurppa, Kalle

    2018-03-22

    This study investigated the prevalence of extraintestinal manifestations (EIM) in paediatric coeliac disease and their associations with other disease features. Researchers at the University of Tampere, Finland, compared EIM in 511 children diagnosed with coeliac disease from 2003 to 2014 and 180 diagnosed with functional gastrointestinal disorders from 2007 to 2013. Disease severity and dietary responses were also compared between coeliac children diagnosed by screening (n = 146) or because of EIM (n = 116) or gastrointestinal symptoms (n = 249). Coeliac patients had more EIM (62%) than those with functional disorders (33%). The most common EIM in coeliac children were poor growth (27%) and anaemia (18%). Children with coeliac disease often showed fatigue (8%) and symptoms affecting the skin (15%), nervous system (9%) and joints (6%). Coeliac patients with EIM as their main clinical presentation had more severe symptoms and histological damage at diagnosis than those with gastrointestinal presentation and screen-detected cases. The subgroups did not differ with regard to other clinical and laboratory parameters and dietary adherence. Concomitant EIM were also common in children diagnosed because of gastrointestinal presentation (60%) and by screening (37%). EIM were common in coeliac disease and associated with more severe clinical and histological presentation. ©2018 Foundation Acta Paediatrica. Published by John Wiley & Sons Ltd.

  2. Tolerance Verification of Micro and Nano Structures on Polycarbonate Substrates

    DEFF Research Database (Denmark)

    Gasparin, Stefania; Tosello, Guido; Hansen, Hans Nørgaard

    2010-01-01

    Micro and nano structures are an increasing challenge in terms of tolerance verification and process quality control: smaller dimensions led to a smaller tolerance zone to be evaluated. This paper focuses on the verification of CD, DVD and HD-DVD nanoscale features. CD tolerance features are defi......Micro and nano structures are an increasing challenge in terms of tolerance verification and process quality control: smaller dimensions led to a smaller tolerance zone to be evaluated. This paper focuses on the verification of CD, DVD and HD-DVD nanoscale features. CD tolerance features...

  3. Histological characteristics of diffuse idiopathic skeletal hyperostosis

    NARCIS (Netherlands)

    Kuperus, JS; Westerveld, L Anneloes; Rutges, Joost A; Alblas, Jacqueline; van Rijen, Mattie H; Bleys, Ronald L A W; Oner, F Cumhur; Verlaan, JJ

    Diffuse idiopathic skeletal hyperostosis (DISH) is a predominantly radiographic diagnosis and histological knowledge of DISH is limited. The aim of this study was to describe the histological characteristics of DISH in the spinal column and to study the relation between DISH and intervertebral disc

  4. Clinical and Histologic Mimickers of Celiac Disease.

    Science.gov (United States)

    Kamboj, Amrit K; Oxentenko, Amy S

    2017-08-17

    Celiac disease is an autoimmune disorder of the small bowel, classically associated with diarrhea, abdominal pain, and malabsorption. The diagnosis of celiac disease is made when there are compatible clinical features, supportive serologic markers, representative histology from the small bowel, and response to a gluten-free diet. Histologic findings associated with celiac disease include intraepithelial lymphocytosis, crypt hyperplasia, villous atrophy, and a chronic inflammatory cell infiltrate in the lamina propria. It is important to recognize and diagnose celiac disease, as strict adherence to a gluten-free diet can lead to resolution of clinical and histologic manifestations of the disease. However, many other entities can present with clinical and/or histologic features of celiac disease. In this review article, we highlight key clinical and histologic mimickers of celiac disease. The evaluation of a patient with serologically negative enteropathy necessitates a carefully elicited history and detailed review by a pathologist. Medications can mimic celiac disease and should be considered in all patients with a serologically negative enteropathy. Many mimickers of celiac disease have clues to the underlying diagnosis, and many have a targeted therapy. It is necessary to provide patients with a correct diagnosis rather than subject them to a lifetime of an unnecessary gluten-free diet.

  5. Standard Verification System (SVS)

    Data.gov (United States)

    Social Security Administration — SVS is a mainframe program that accesses the NUMIDENT to perform SSN verifications. This program is called by SSA Internal applications to verify SSNs. There is also...

  6. Packaged low-level waste verification system

    International Nuclear Information System (INIS)

    Tuite, K.T.; Winberg, M.; Flores, A.Y.; Killian, E.W.; McIsaac, C.V.

    1996-01-01

    Currently, states and low-level radioactive waste (LLW) disposal site operators have no method of independently verifying the radionuclide content of packaged LLW that arrive at disposal sites for disposal. At this time, disposal sites rely on LLW generator shipping manifests and accompanying records to insure that LLW received meets the waste acceptance criteria. An independent verification system would provide a method of checking generator LLW characterization methods and help ensure that LLW disposed of at disposal facilities meets requirements. The Mobile Low-Level Waste Verification System (MLLWVS) provides the equipment, software, and methods to enable the independent verification of LLW shipping records to insure that disposal site waste acceptance criteria are being met. The MLLWVS system was developed under a cost share subcontract between WMG, Inc., and Lockheed Martin Idaho Technologies through the Department of Energy's National Low-Level Waste Management Program at the Idaho National Engineering Laboratory (INEL)

  7. Severe Late Toxicities Following Concomitant Chemoradiotherapy Compared to Radiotherapy Alone in Cervical Cancer: An Inter-era Analysis

    International Nuclear Information System (INIS)

    Gondi, Vinai; Bentzen, Søren M.; Sklenar, Kathryn L.; Dunn, Emily F.; Petereit, Daniel G.; Tannehill, Scott P.; Straub, Margaret; Bradley, Kristin A.

    2012-01-01

    Purpose: To compare rates of severe late toxicities following concomitant chemoradiotherapy and radiotherapy alone for cervical cancer. Methods and Materials: Patients with cervical cancer were treated at a single institution with radiotherapy alone or concomitant chemoradiotherapy for curative intent. Severe late toxicity was defined as grade ≥3 vaginal, urologic, or gastrointestinal toxicity or any pelvic fracture, using Common Terminology Criteria for Adverse Events version 4.0 (CTCAE), occurring ≥6 months from treatment completion and predating any salvage therapy. Severe late toxicity rates were compared after adjusting for pertinent covariates. Results: At 3 years, probability of vaginal severe late toxicity was 20.2% for radiotherapy alone and 35.1% for concomitant chemoradiotherapy (P=.026). At 3 years, probability of skeletal severe late toxicity was 1.6% for radiotherapy alone and 7.5% for concomitant chemoradiotherapy (P=.010). After adjustment for case mix, concomitant chemoradiotherapy was associated with higher vaginal (hazard ratio [HR] 3.0, 95% confidence interval [CI], 1.7-5.2, P 50 was associated with higher vaginal (HR 1.8, 95% CI 1.1-3.0, P=.013) and skeletal (HR 5.7, 95% CI 1.2-27.0, P=.028) severe late toxicity. Concomitant chemoradiotherapy was not associated with higher gastrointestinal (P=.886) or urologic (unadjusted, P=.053; adjusted, P=.063) severe late toxicity. Conclusion: Compared to radiotherapy alone, concomitant chemoradiotherapy is associated with higher rates of severe vaginal and skeletal late toxicities. Other predictive factors include dilator compliance for severe vaginal late toxicity and age for severe vaginal and skeletal late toxicities.

  8. Spent Nuclear Fuel (SNF) Project Design Verification and Validation Process

    International Nuclear Information System (INIS)

    OLGUIN, L.J.

    2000-01-01

    This document provides a description of design verification and validation activities implemented by the Spent Nuclear Fuel (SNF) Project. During the execution of early design verification, a management assessment (Bergman, 1999) and external assessments on configuration management (Augustenburg, 1999) and testing (Loscoe, 2000) were conducted and identified potential uncertainties in the verification process. This led the SNF Chief Engineer to implement corrective actions to improve process and design products. This included Design Verification Reports (DVRs) for each subproject, validation assessments for testing, and verification of the safety function of systems and components identified in the Safety Equipment List to ensure that the design outputs were compliant with the SNF Technical Requirements. Although some activities are still in progress, the results of the DVR and associated validation assessments indicate that Project requirements for design verification are being effectively implemented. These results have been documented in subproject-specific technical documents (Table 2). Identified punch-list items are being dispositioned by the Project. As these remaining items are closed, the technical reports (Table 2) will be revised and reissued to document the results of this work

  9. Histological evaluations and inflammatory responses of different dental implant abutment materials: A human histology pilot study.

    Science.gov (United States)

    Sampatanukul, Teeratida; Serichetaphongse, Pravej; Pimkhaokham, Atiphan

    2018-04-01

    Improvements of soft tissue to the abutment surface results in more stable peri-implant conditions, however, few human histological studies have compared soft tissue responses around different abutment materials. To describe the peri-implant tissue around 3 abutment materials; titanium, zirconia, and gold alloy, over an 8-week healing period. Fifteen edentulous sites were treated with implants. Eight weeks later, peri-implant tissue was harvested and processed using a nonseparation resin embedded technique. The tissue attachment characteristics were assessed at clinical stages using the gingival index (GI) score, surgical stage (surgical score), and histological stage (histological attachment percentage). Additionally, the inflammatory responses were evaluated using inflammatory extent and inflammatory cellularity grades. Nonparametrical statistics were used to describe the GI and surgical scores, and analytical statistics were used to analyze the histological attachment percentages as well as the inflammatory extent and cellularity grades amongst the 3 groups. There were no statistically significant differences among the groups for GI score (P = .071) and surgical score (P = .262). Titanium and zirconia exhibited nearly similar mean histological attachment percentages while gold alloy had a significantly lower percentage (P = .004). For the inflammatory extent and cellularity grades, the odds of being one grade higher for gold alloy abutment was 5.18 and 17.8 times that of titanium abutment, respectively. However, for the zirconia abutment, the odds were 0.87 and 7.5 times higher than the titanium group. The tissue around the gold alloy abutments resulted in worse attachment conditions compared with the titanium and zirconia abutments. Inflammation tended to be higher in the tissue around the gold alloy abutments than the titanium and zirconia abutments. © 2017 Wiley Periodicals, Inc.

  10. Predictive value of histologic tumor necrosis after radiation.

    Science.gov (United States)

    Chen, Y; Taghian, A G; Rosenberg, A E; O'Connell, J; Okunieff, P; Suit, H D

    2001-12-20

    Postsurgical evaluation of histologic changes of tumors after preoperative chemotherapy and/or radiotherapy has been a routine clinical practice of pathologists and oncologists. There appears to be secure evidence that the extent of tumor necrosis vs. viable tumor cells postchemotherapy is a clinically useful predictor of outcome. The significance of histologic tumor necrosis after radiotherapy, however, has not been clearly established and deserves further investigation. We investigated the correlation between histological extent of tumor necrosis, survival of tumor transplants, and radiation doses in an experimental model using three human tumor xenografts. Three human tumor cell lines were investigated: STS-26, SCC-21, and HGL-21. Tumors were grown subcutaneously in athymic nude mice and received external beam radiation of different doses. Tumors were excised 2 weeks postirradiation. One-half of the tumor was divided into 1-mm(3) fragments and transplanted to naive mice. The other half was examined for histologic tumor necrosis. Transplant survival was strongly correlated with radiation dose, TCD(p) (radiation dose that results in local tumor control in proportion, p, to irradiated tumors). In contrast, there was no clear association between transplant survival rate and the extent of tumor necrosis. The experimental model demonstrated a strong inverse correlation between radiation doses and tumor transplant survival. Histologic tumor necrosis did not correlate well with radiation doses or transplant survival rates. Despite common practices in histologic examination of tumors posttherapy, clinical interpretations and implications of histologic tumor necrosis after radiotherapy should be considered with caution. Copyright 2001 Wiley-Liss, Inc.

  11. Single-shot imaging with higher-dimensional encoding using magnetic field monitoring and concomitant field correction.

    Science.gov (United States)

    Testud, Frederik; Gallichan, Daniel; Layton, Kelvin J; Barmet, Christoph; Welz, Anna M; Dewdney, Andrew; Cocosco, Chris A; Pruessmann, Klaas P; Hennig, Jürgen; Zaitsev, Maxim

    2015-03-01

    PatLoc (Parallel Imaging Technique using Localized Gradients) accelerates imaging and introduces a resolution variation across the field-of-view. Higher-dimensional encoding employs more spatial encoding magnetic fields (SEMs) than the corresponding image dimensionality requires, e.g. by applying two quadratic and two linear spatial encoding magnetic fields to reconstruct a 2D image. Images acquired with higher-dimensional single-shot trajectories can exhibit strong artifacts and geometric distortions. In this work, the source of these artifacts is analyzed and a reliable correction strategy is derived. A dynamic field camera was built for encoding field calibration. Concomitant fields of linear and nonlinear spatial encoding magnetic fields were analyzed. A combined basis consisting of spherical harmonics and concomitant terms was proposed and used for encoding field calibration and image reconstruction. A good agreement between the analytical solution for the concomitant fields and the magnetic field simulations of the custom-built PatLoc SEM coil was observed. Substantial image quality improvements were obtained using a dynamic field camera for encoding field calibration combined with the proposed combined basis. The importance of trajectory calibration for single-shot higher-dimensional encoding is demonstrated using the combined basis including spherical harmonics and concomitant terms, which treats the concomitant fields as an integral part of the encoding. © 2014 Wiley Periodicals, Inc.

  12. The role of bentonite binders in single or concomitant mycotoxin contamination of chicken diets.

    Science.gov (United States)

    Pappas, A C; Tsiplakou, E; Tsitsigiannis, D I; Georgiadou, M; Iliadi, M K; Sotirakoglou, K; Zervas, G

    2016-08-01

    Concomitant presence of mycotoxins is more likely to appear than a single mycotoxicosis since many mycotoxigenic fungi grow and produce their toxic metabolites under similar conditions. The present study was designed to evaluate the efficacy of 4 mycotoxin binders to protect meat-type chickens against single and concomitant administration in the feed of two mycotoxins, namely aflatoxin B1 (AFB1) and ochratoxin A (OTA) both at concentration of 0.1 mg/kg. A total of 440 as hatched, d-old, Ross 308 broilers were reared for 42 d. There were 11 dietary treatments. Chickens were fed on either an uncontaminated basal diet, basal diet and AFB1, basal with concomitant presence of AFB1 and OTA, basal diet and three binders A, B and C (1%) with or without AFB1 or basal diet and binder D (0.5%) with or without concomitant presence of AFB1 and OTA. Performance, carcass yield and several biochemical parameters were examined. Mycotoxin concentration in liver and breast muscle samples was determined. Broiler performance under concomitant mycotoxin contamination was poorer than that under single mycotoxicosis. Mycotoxin presence increased relative heart weight compared to that of broilers fed on uncontaminated diets. Only OTA and not AFB1 was detected and only in the liver. OTA concentration was four-fold lower in broilers fed on a diet with binder compared to those fed on contaminated diets without binder. In conclusion, the study revealed that binder composition and presence or not of multiple toxins may be important factors for optimum broiler performance under mycotoxicosis.

  13. As-Built Verification Plan Spent Nuclear Fuel Canister Storage Building MCO Handling Machine

    International Nuclear Information System (INIS)

    SWENSON, C.E.

    2000-01-01

    This as-built verification plan outlines the methodology and responsibilities that will be implemented during the as-built field verification activity for the Canister Storage Building (CSB) MCO HANDLING MACHINE (MHM). This as-built verification plan covers THE ELECTRICAL PORTION of the CONSTRUCTION PERFORMED BY POWER CITY UNDER CONTRACT TO MOWAT. The as-built verifications will be performed in accordance Administrative Procedure AP 6-012-00, Spent Nuclear Fuel Project As-Built Verification Plan Development Process, revision I. The results of the verification walkdown will be documented in a verification walkdown completion package, approved by the Design Authority (DA), and maintained in the CSB project files

  14. Integration of Histology Lectures and Practical Teaching in China

    Science.gov (United States)

    Lu, Xiaoye; Cheng, Xin; Li, Ke; Lee, Kenneth Ka Ho; Yang, Xuesong

    2016-01-01

    Objectives: Human histology is a discipline concerning the study of microscopic structures of human tissues and organs--with the aid of light or electron microscopes. Traditional teaching of histology is composed of two separated components, theory and practice. The main disadvantage with traditional histology teaching is the detachment of theory…

  15. 37 CFR 262.7 - Verification of royalty payments.

    Science.gov (United States)

    2010-07-01

    ... Designated Agent have agreed as to proper verification methods. (b) Frequency of verification. A Copyright Owner or a Performer may conduct a single audit of the Designated Agent upon reasonable notice and... COPYRIGHT ARBITRATION ROYALTY PANEL RULES AND PROCEDURES RATES AND TERMS FOR CERTAIN ELIGIBLE...

  16. 40 CFR 1065.675 - CLD quench verification calculations.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false CLD quench verification calculations... POLLUTION CONTROLS ENGINE-TESTING PROCEDURES Calculations and Data Requirements § 1065.675 CLD quench verification calculations. Perform CLD quench-check calculations as follows: (a) Perform a CLD analyzer quench...

  17. Analysis and Transformation Tools for Constrained Horn Clause Verification

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick

    2014-01-01

    Several techniques and tools have been developed for verification of properties expressed as Horn clauses with constraints over a background theory (CHC). Current CHC verification tools implement intricate algorithms and are often limited to certain subclasses of CHC problems. Our aim in this work...... is to investigate the use of a combination of off-the-shelf techniques from the literature in analysis and transformation of Constraint Logic Programs (CLPs) to solve challenging CHC verification problems. We find that many problems can be solved using a combination of tools based on well-known techniques from...... abstract interpretation, semantics-preserving transformations, program specialisation and query-answer transformations. This gives insights into the design of automatic, more general CHC verification tools based on a library of components....

  18. Verification of the thermal design of electronic equipment

    Energy Technology Data Exchange (ETDEWEB)

    Hienonen, R.; Karjalainen, M.; Lankinen, R. [VTT Automation, Espoo (Finland). ProTechno

    1997-12-31

    The project `Verification of the thermal design of electronic equipment` studied the methodology to be followed in the verification of thermal design of electronic equipment. This project forms part of the `Cool Electronics` research programme funded by TEKES, the Finnish Technology Development Centre. This project was carried out jointly by VTT Automation, Lappeenranta University of Technology, Nokia Research Center and ABB Industry Oy VSD-Technology. The thermal design of electronic equipment has a significant impact on the cost, reliability, tolerance to different environments, selection of components and materials, and ergonomics of the product. This report describes the method for verification of thermal design. It assesses the goals set for thermal design, environmental requirements, technical implementation of the design, thermal simulation and modelling, and design qualification testing and the measurements needed. The verification method covers all packaging levels of electronic equipment from the system level to the electronic component level. The method described in this report can be used as part of the quality system of a corporation. The report includes information about the measurement and test methods needed in the verification process. Some measurement methods for the temperature, flow and pressure of air are described. (orig.) Published in Finnish VTT Julkaisuja 824. 22 refs.

  19. Methods of Software Verification

    Directory of Open Access Journals (Sweden)

    R. E. Gurin

    2015-01-01

    Full Text Available This article is devoted to the problem of software verification (SW. Methods of software verification designed to check the software for compliance with the stated requirements such as correctness, system security and system adaptability to small changes in the environment, portability and compatibility, etc. These are various methods both by the operation process and by the way of achieving result. The article describes the static and dynamic methods of software verification and paid attention to the method of symbolic execution. In its review of static analysis are discussed and described the deductive method, and methods for testing the model. A relevant issue of the pros and cons of a particular method is emphasized. The article considers classification of test techniques for each method. In this paper we present and analyze the characteristics and mechanisms of the static analysis of dependencies, as well as their views, which can reduce the number of false positives in situations where the current state of the program combines two or more states obtained both in different paths of execution and in working with multiple object values. Dependences connect various types of software objects: single variables, the elements of composite variables (structure fields, array elements, the size of the heap areas, the length of lines, the number of initialized array elements in the verification code using static methods. The article pays attention to the identification of dependencies within the framework of the abstract interpretation, as well as gives an overview and analysis of the inference tools.Methods of dynamic analysis such as testing, monitoring and profiling are presented and analyzed. Also some kinds of tools are considered which can be applied to the software when using the methods of dynamic analysis. Based on the work a conclusion is drawn, which describes the most relevant problems of analysis techniques, methods of their solutions and

  20. Residual and Past Entropy for Concomitants of Ordered Random Variables of Morgenstern Family

    Directory of Open Access Journals (Sweden)

    M. M. Mohie EL-Din

    2015-01-01

    Full Text Available For a system, which is observed at time t, the residual and past entropies measure the uncertainty about the remaining and the past life of the distribution, respectively. In this paper, we have presented the residual and past entropy of Morgenstern family based on the concomitants of the different types of generalized order statistics (gos and give the linear transformation of such model. Characterization results for these dynamic entropies for concomitants of ordered random variables have been considered.

  1. Verification and Validation in Systems Engineering

    CERN Document Server

    Debbabi, Mourad; Jarraya, Yosr; Soeanu, Andrei; Alawneh, Luay

    2010-01-01

    "Verification and validation" represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle. Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic verification and validation of systems engineering design models expressed in standardized modeling languages. Their presentation includes a bird's eye view of the most prominent modeling languages for software and systems engineering, namely the Unified Model

  2. 37 CFR 260.6 - Verification of royalty payments.

    Science.gov (United States)

    2010-07-01

    ... verification of the payment of royalty fees to those parties entitled to receive such fees, according to terms... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Verification of royalty... COPYRIGHT ARBITRATION ROYALTY PANEL RULES AND PROCEDURES RATES AND TERMS FOR PREEXISTING SUBSCRIPTION...

  3. Prevalence of Concomitant Sacroiliac joint Dysfunction in Patients With Image Proven Herniated Lumbar Discs

    OpenAIRE

    Salah Alalawi; Ali akbar Jafarian; Seyed Pezhman Madani; Mohammad Dadian; Keykavous Firouznia

    2009-01-01

    Background:Sacroiliac joint (SIJ) dysfunction is a widely known but poorly defined cause of low back pain. To our knowledge, few published studies have been conducted to evaluate systematically the prevalence and significance of concomitant sacroiliac joint dysfunction in patients with herniated lumbar discs. As concomitant SIJ dysfunction in low back pain patients is likely to respond to particular noninvasive interventions such as manipulation,improved understanding of the relationship bet...

  4. Endovascular image-guided treatment of in-vivo model aneurysms with asymmetric vascular stents (AVS): evaluation with time-density curve angiographic analysis and histology.

    Science.gov (United States)

    Dohatcu, A; Ionita, C N; Paciorek, A; Bednarek, D R; Hoffmann, K R; Rudin, S

    2008-01-01

    In this study, we compare the results obtained from Time-Density Curve (TDC) analysis of angiographic imaging sequences with histological evaluation for a rabbit aneurysm model treated with standard stents and new asymmetric vascular stents (AVS) placed by image-guided endovascular deployment. AVSs are stents having a low-porosity patch region designed to cover the aneurysm neck and occlude blood flow inside. To evaluate the AVSs, rabbits with elastase-induced aneurysm models (n=20) were divided into three groups: the first (n=10) was treated with an AVS, the second (n=5) with a non-patch standard coronary stent, and third was untreated as a control (n=5). We used TDC analysis to measure how much contrast media entered the aneurysm before and after treatment. TDCs track contrast-media-density changes as a function of time over the region of interest in x-ray DSA cine-sequences. After 28 days, the animals were sacrificed and the explanted specimens were histologically evaluated. The first group showed an average reduction of contrast flow into the aneurysm of 95% after treatment with an AVS with fully developed thrombus at 28 days follow-up. The rabbits treated with standard stents showed an increase in TDC residency time after treatment and partial-thrombogenesis. The untreated control aneurysms displayed no reduction in flow and were still patent at follow-up. The quantitative TDC analysis findings were confirmed by histological evaluation suggesting that the new AVS has great potential as a definitive treatment for cerebro-vascular aneurysms and that angiographic TDC analysis can provide in-vivo verification.

  5. A Roadmap for the Implementation of Continued Process Verification.

    Science.gov (United States)

    Boyer, Marcus; Gampfer, Joerg; Zamamiri, Abdel; Payne, Robin

    2016-01-01

    In 2014, the members of the BioPhorum Operations Group (BPOG) produced a 100-page continued process verification case study, entitled "Continued Process Verification: An Industry Position Paper with Example Protocol". This case study captures the thought processes involved in creating a continued process verification plan for a new product in response to the U.S. Food and Drug Administration's guidance on the subject introduced in 2011. In so doing, it provided the specific example of a plan developed for a new molecular antibody product based on the "A MAb Case Study" that preceded it in 2009.This document provides a roadmap that draws on the content of the continued process verification case study to provide a step-by-step guide in a more accessible form, with reference to a process map of the product life cycle. It could be used as a basis for continued process verification implementation in a number of different scenarios: For a single product and process;For a single site;To assist in the sharing of data monitoring responsibilities among sites;To assist in establishing data monitoring agreements between a customer company and a contract manufacturing organization. The U.S. Food and Drug Administration issued guidance on the management of manufacturing processes designed to improve quality and control of drug products. This involved increased focus on regular monitoring of manufacturing processes, reporting of the results, and the taking of opportunities to improve. The guidance and practice associated with it is known as continued process verification This paper summarizes good practice in responding to continued process verification guidance, gathered from subject matter experts in the biopharmaceutical industry. © PDA, Inc. 2016.

  6. Land surface Verification Toolkit (LVT)

    Science.gov (United States)

    Kumar, Sujay V.

    2017-01-01

    LVT is a framework developed to provide an automated, consolidated environment for systematic land surface model evaluation Includes support for a range of in-situ, remote-sensing and other model and reanalysis products. Supports the analysis of outputs from various LIS subsystems, including LIS-DA, LIS-OPT, LIS-UE. Note: The Land Information System Verification Toolkit (LVT) is a NASA software tool designed to enable the evaluation, analysis and comparison of outputs generated by the Land Information System (LIS). The LVT software is released under the terms and conditions of the NASA Open Source Agreement (NOSA) Version 1.1 or later. Land Information System Verification Toolkit (LVT) NOSA.

  7. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  8. 78 FR 27882 - VA Veteran-Owned Small Business (VOSB) Verification Guidelines

    Science.gov (United States)

    2013-05-13

    ... Verification Self-Assessment Tool that walks the veteran through the regulation and how it applies to the...) Verification Guidelines AGENCY: Department of Veterans Affairs. ACTION: Advanced notice of proposed rulemaking... regulations governing the Department of Veterans Affairs (VA) Veteran-Owned Small Business (VOSB) Verification...

  9. Verification and validation for waste disposal models

    International Nuclear Information System (INIS)

    1987-07-01

    A set of evaluation criteria has been developed to assess the suitability of current verification and validation techniques for waste disposal methods. A survey of current practices and techniques was undertaken and evaluated using these criteria with the items most relevant to waste disposal models being identified. Recommendations regarding the most suitable verification and validation practices for nuclear waste disposal modelling software have been made

  10. The impact of haemoglobin level and concomitant infections on ...

    African Journals Online (AJOL)

    ... of paroxysm during Plasmodium infection. Likewise, the presence of concomitant infections in the clinically ill subjects quickened the on-set of clinical signs. The need for proper laboratory diagnosis to ascertain real cause/s of fever during malaria attack so as to avoid wrong treatment/under treatment, and balanced diet to ...

  11. Histological spectrum of angiofibroma of soft tissue: histological and genetic analysis of 13 cases.

    Science.gov (United States)

    Yamada, Yuichi; Yamamoto, Hidetaka; Kohashi, Kenichi; Ishii, Takeaki; Iura, Kunio; Maekawa, Akira; Bekki, Hirofumi; Otsuka, Hiroshi; Yamashita, Kyoko; Tanaka, Hiroyuki; Hiraki, Tsubasa; Mukai, Munenori; Shirakawa, Atsuko; Shinnou, Yoko; Jinno, Mari; Yanai, Hiroyuki; Taguchi, Kenichi; Maehara, Yoshihiko; Iwamoto, Yukihide; Oda, Yosinao

    2016-09-01

    Angiofibroma of soft tissue (AFST) is a rare soft tissue neoplasm characterized by a fibroblastic cytomorphology and a prominent vascular structure. AFSTs possess a novel fusion gene, i.e. NCOA2-AHRR/AHRR-NCOA2 or GTF2I-NCOA2, providing a useful approach to diagnosing AFST. Morphologically, AFSTs span a wide spectrum, making diagnosis a challenge. The aim of this study was to review AFST cases and to report previously unknown histological features, which we confirmed by genetic analysis. We reviewed 276 cases diagnosed as solitary fibrous tumours/haemangiopericytomas (232 cases), unclassified tumours of fibroblastic differentiation (36 cases), and recently diagnosed AFSTs (eight cases), and retrieved 13 cases compatible with AFST. Immunohistochemical staining was performed for these cases, all 13 of which were analysed by reverse transcription polymerase chain reaction and fluorescence in-situ hybridization. The histological findings were as follows: amianthoid fibres, extravasation of red blood cells, haemosiderin deposition, aggregates of foamy histiocytes, cystic change, necrosis, and haemorrhage. Immunohistochemically, the tumour cells were positive for epithelial membrane antigen (four of 13 cases), desmin (six of 13 cases), CD163 (13 of 13 cases), CD68 (seven of 13 cases), oestrogen receptor (13 of 13 cases), progesterone receptor (three of 13 cases), and STAT6 (one of 13 cases, weak nuclear staining), but they were negative for CD34, α-smooth muscle actin, muscle-specific actin, S100, pan-cytokeratin, MDM2, and CDK4. The AHRR-NCOA2 fusion gene was detected in eight cases, and NCOA2 gene rearrangement in nine cases. We revealed the previously unreported histological variation and immunohistochemical findings of AFST, and confirmed them by using genetic methods. The results suggested that AFST should be considered in the diagnosis of fibrous or fibrohistiocytic tumours with the above histological features. © 2016 John Wiley & Sons Ltd.

  12. Property-driven functional verification technique for high-speed vision system-on-chip processor

    Science.gov (United States)

    Nshunguyimfura, Victor; Yang, Jie; Liu, Liyuan; Wu, Nanjian

    2017-04-01

    The implementation of functional verification in a fast, reliable, and effective manner is a challenging task in a vision chip verification process. The main reason for this challenge is the stepwise nature of existing functional verification techniques. This vision chip verification complexity is also related to the fact that in most vision chip design cycles, extensive efforts are focused on how to optimize chip metrics such as performance, power, and area. Design functional verification is not explicitly considered at an earlier stage at which the most sound decisions are made. In this paper, we propose a semi-automatic property-driven verification technique. The implementation of all verification components is based on design properties. We introduce a low-dimension property space between the specification space and the implementation space. The aim of this technique is to speed up the verification process for high-performance parallel processing vision chips. Our experimentation results show that the proposed technique can effectively improve the verification effort up to 20% for the complex vision chip design while reducing the simulation and debugging overheads.

  13. Design verification methodology for a solenoid valve for industrial applications

    International Nuclear Information System (INIS)

    Park, Chang Dae; Lim, Byung Ju; Chun, Kyung Yul

    2015-01-01

    Solenoid operated valves (SOV) are widely used in many applications due to their fast dynamic responses, cost effectiveness, and less contamination sensitive characteristics. In this paper, we tried to provide a convenient method of design verification of SOV to design engineers who depend on their experiences and experiment during design and development process of SOV. First, we summarize a detailed procedure for designing SOVs for industrial applications. All of the design constraints are defined in the first step of the design, and then the detail design procedure is presented based on design experiences as well as various physical and electromagnetic relationships. Secondly, we have suggested a verification method of this design using theoretical relationships, which enables optimal design of SOV from a point of view of safety factor of design attraction force. Lastly, experimental performance tests using several prototypes manufactured based on this design method show that the suggested design verification methodology is appropriate for designing new models of solenoids. We believe that this verification process is novel logic and useful to save time and expenses during development of SOV because verification tests with manufactured specimen may be substituted partly by this verification methodology.

  14. Imaging and concomitant dose in radiotherapy

    International Nuclear Information System (INIS)

    Negi, P.S.

    2008-01-01

    Image guidance in radiotherapy now involves multiple imaging procedures for planning, simulation, set-up inter and intrafraction monitoring. Presently ALARA (i.e. as low as reasonable achievable) is the principle of management of dose to radiation workers and patients in any diagnostic imaging procedures including image guided surgery. The situation is different in repeated radiographic/fluoroscopic imaging performed for simulation, dose planning, patient positioning and set-up corrections during preparation/execution of Image guided radiotherapy (IGRT) as well as for Intensity Modulated Radiotherapy (IMRT). Reported imaging and concomitant doses will be highlighted and discussed for the management and optimization of imaging techniques in IMRT and IGRT

  15. Verification test report on a solar heating and hot water system

    Science.gov (United States)

    1978-01-01

    Information is provided on the development, qualification and acceptance verification of commercial solar heating and hot water systems and components. The verification includes the performances, the efficiences and the various methods used, such as similarity, analysis, inspection, test, etc., that are applicable to satisfying the verification requirements.

  16. The Role of Concomitant Radiation Boost in Neoadjuvant Chemoradiotherapy for Locally Advanced Rectal Cancer.

    Science.gov (United States)

    Badakhshi, Harun; Ismail, Mahmoud; Boskos, Christos; Zhao, Kuaile; Kaul, David

    2017-06-01

    This study analyzed the impact of concomitant boost on long-term clinical outcomes in locally advanced rectal cancer. A total of 141 patients (median age=61 years) were treated with neoadjuvant chemoradiotherapy. Median total dose was 50.4 Gy. Forty-three patients received a concomitant boost. Concurrent chemotherapy consisted of 5-fluorouracil (5-FU), given as a 24-h continuous infusion. Mean follow-up was 83.7 months. The 3, 5-, and 10-year overall survival (OS) rates were 91.9%, 84.6%, and 52.9%, respectively. Recurrence-free survival (RFS) rates at 3, 5, and 10 years were 91.4%, 88.9%, and 79.3%, respectively. Metastasis-free survival (MFS) rates at 3, 5, and 10 years were 84.6%, 75.4%, and 49.9%, respectively. Overall, 9.9% of all patients achieved pathological complete response. Down-staging of T- or N-stage was achieved in 55.1% and 41.5% of patients. Multivariate analysis revealed that female sex (p=0.011), concomitant boost-radiotherapy (p=0.014), and the presence of fewer than five positive lymph nodes (prectal cancer in terms of local outcomes. Intensified radiotherapy using a concomitant boost has a positive effect on OS. Copyright© 2017, International Institute of Anticancer Research (Dr. George J. Delinasios), All rights reserved.

  17. [Breast cancer: histological prognosis from biopsy material].

    Science.gov (United States)

    Veith, F; Picco, C

    1977-01-01

    Two histological factors to be taken into consideration for prognosis in pretreatment schedules of breast cancer have been studied on a group of 352 cases treated by non-mutilating therapeutics at the Fondation Curie between 1960 and 1970. The tumour material the slides of which we have reexamined "blindly", i.e. ignoring the evolution of the case had been obtained mostly by drill-biopsy. Histological groups and types have been determined following an analytical classification for computer purpose. The degree of malignancy was calculated with the method of Scarff-Bloom-Richardson. The analyzed data have been memorized on computer and then confronted with the elements of the T.N.M. classification and the survival of the patients involved. It appeared that if drill-biopsie have been performed correctly the histological type may be defined in eighty percent of cases. And it is likewise possible to calculate the histological grade of malignancy for each mammary cancer. With such a material the value for prognosis by means of the Scarff-Bloom-Richardson method still remains if applied only to adenocarcinoma of the "common infiltrating type".

  18. Temporal Specification and Verification of Real-Time Systems.

    Science.gov (United States)

    1991-08-30

    of concrete real - time systems can be modeled adequately. Specification: We present two conservative extensions of temporal logic that allow for the...logic. We present both model-checking algorithms for the automatic verification of finite-state real - time systems and proof methods for the deductive verification of real - time systems .

  19. Apixaban vs. warfarin with concomitant aspirin in patients with atrial fibrillation: insights from the ARISTOTLE trial

    NARCIS (Netherlands)

    Alexander, J.H.; Lopes, R.D.; Thomas, L.; Alings, M.; Atar, D.; Aylward, P.; Goto, S.; Hanna, M.; Huber, K.; Husted, S.; Lewis, B.S.; McMurray, J.J.; Pais, P.; Pouleur, H.; Steg, P.G.; Verheugt, F.W.A.; Wojdyla, D.M.; Granger, C.B.; Wallentin, L.

    2014-01-01

    AIMS: We assessed the effect of concomitant aspirin use on the efficacy and safety of apixaban compared with warfarin in patients with atrial fibrillation (AF). METHODS AND RESULTS: In ARISTOTLE, 18 201 patients were randomized to apixaban 5 mg twice daily or warfarin. Concomitant aspirin use was

  20. A verification regime for the spatial discretization of the SN transport equations

    Energy Technology Data Exchange (ETDEWEB)

    Schunert, S.; Azmy, Y. [North Carolina State Univ., Dept. of Nuclear Engineering, 2500 Stinson Drive, Raleigh, NC 27695 (United States)

    2012-07-01

    The order-of-accuracy test in conjunction with the method of manufactured solutions is the current state of the art in computer code verification. In this work we investigate the application of a verification procedure including the order-of-accuracy test on a generic SN transport solver that implements the AHOTN spatial discretization. Different types of semantic errors, e.g. removal of a line of code or changing a single character, are introduced randomly into the previously verified S{sub N} code and the proposed verification procedure is used to identify the coding mistakes (if possible) and classify them. Itemized by error type we record the stage of the verification procedure where the error is detected and report the frequency with which the errors are correctly identified at various stages of the verification. Errors that remain undetected by the verification procedure are further scrutinized to determine the reason why the introduced coding mistake eluded the verification procedure. The result of this work is that the verification procedure based on an order-of-accuracy test finds almost all detectable coding mistakes but rarely, 1.44% of the time, and under certain circumstances can fail. (authors)

  1. Adapting lean to histology laboratories.

    Science.gov (United States)

    Buesa, René J

    2009-10-01

    Histology laboratories (histolabs) can increase productivity and reduce turnaround time and errors by using any one of several available management tools. After a few years of operation, all histolabs develop workflow problems. Histology laboratories handling more than 20,000 cases per year benefit the most from implementing management tools, as occurred in the 25 facilities summarized in this article. Discontinuous workflow, lack of "pulling" between steps, accepting unavoidable waiting times while working with small batches within work cells, and a workflow with an uneven rate of completion, are some of the adaptations required by the Lean system when it is used in histology because 70% of the tasks are manual and the flow has to be interrupted to add value to the pieces of tissue during tissue processing, no matter how short that step is. After all these adaptations are incorporated, the histolab becomes as "Lean" as it can be, and the qualifier is also a recognition of the effort and personnel involvement in the implementation. Given its service nature, productivity increments do not expand the histolab customer base and could lead to staffing reductions. This is one of the causes of reluctance by some employees for implementing these techniques which are mostly driven by cost reductions sought by insurance companies and administrators, and not necessarily because of a real medical need to reduce the turnaround time. Finally, any histolab wanting to improve its workflow can follow some easy steps presented here as a guide to accomplish that objective. These steps stress the need for the supervisors to insure that the personnel in the histology laboratory are being paid at a comparable rate as other histolabs in the area.

  2. Environmental technology verification methods

    CSIR Research Space (South Africa)

    Szewczuk, S

    2016-03-01

    Full Text Available Environmental Technology Verification (ETV) is a tool that has been developed in the United States of America, Europe and many other countries around the world to help innovative environmental technologies reach the market. Claims about...

  3. Verification and Optimization of a PLC Control Schedule

    NARCIS (Netherlands)

    Brinksma, Hendrik; Mader, Angelika H.; Havelund, K.; Penix, J.; Visser, W.

    We report on the use of the SPIN model checker for both the verification of a process control program and the derivation of optimal control schedules. This work was carried out as part of a case study for the EC VHS project (Verification of Hybrid Systems), in which the program for a Programmable

  4. Compressive sensing using optimized sensing matrix for face verification

    Science.gov (United States)

    Oey, Endra; Jeffry; Wongso, Kelvin; Tommy

    2017-12-01

    Biometric appears as one of the solutions which is capable in solving problems that occurred in the usage of password in terms of data access, for example there is possibility in forgetting password and hard to recall various different passwords. With biometrics, physical characteristics of a person can be captured and used in the identification process. In this research, facial biometric is used in the verification process to determine whether the user has the authority to access the data or not. Facial biometric is chosen as its low cost implementation and generate quite accurate result for user identification. Face verification system which is adopted in this research is Compressive Sensing (CS) technique, in which aims to reduce dimension size as well as encrypt data in form of facial test image where the image is represented in sparse signals. Encrypted data can be reconstructed using Sparse Coding algorithm. Two types of Sparse Coding namely Orthogonal Matching Pursuit (OMP) and Iteratively Reweighted Least Squares -ℓp (IRLS-ℓp) will be used for comparison face verification system research. Reconstruction results of sparse signals are then used to find Euclidean norm with the sparse signal of user that has been previously saved in system to determine the validity of the facial test image. Results of system accuracy obtained in this research are 99% in IRLS with time response of face verification for 4.917 seconds and 96.33% in OMP with time response of face verification for 0.4046 seconds with non-optimized sensing matrix, while 99% in IRLS with time response of face verification for 13.4791 seconds and 98.33% for OMP with time response of face verification for 3.1571 seconds with optimized sensing matrix.

  5. 340 and 310 drawing field verification

    International Nuclear Information System (INIS)

    Langdon, J.

    1996-01-01

    The purpose of the drawing field verification work plan is to provide reliable drawings for the 310 Treated Effluent Disposal Facility (TEDF) and 340 Waste Handling Facility (340 Facility). The initial scope of this work plan is to provide field verified and updated versions of all the 340 Facility essential drawings. This plan can also be used for field verification of any other drawings that the facility management directs to be so updated. Any drawings revised by this work plan will be issued in an AutoCAD format

  6. Verification of Scientific Simulations via Hypothesis-Driven Comparative and Quantitative Visualization

    Energy Technology Data Exchange (ETDEWEB)

    Ahrens, James P [ORNL; Heitmann, Katrin [ORNL; Petersen, Mark R [ORNL; Woodring, Jonathan [Los Alamos National Laboratory (LANL); Williams, Sean [Los Alamos National Laboratory (LANL); Fasel, Patricia [Los Alamos National Laboratory (LANL); Ahrens, Christine [Los Alamos National Laboratory (LANL); Hsu, Chung-Hsing [ORNL; Geveci, Berk [ORNL

    2010-11-01

    This article presents a visualization-assisted process that verifies scientific-simulation codes. Code verification is necessary because scientists require accurate predictions to interpret data confidently. This verification process integrates iterative hypothesis verification with comparative, feature, and quantitative visualization. Following this process can help identify differences in cosmological and oceanographic simulations.

  7. Echocardiographic versus histologic findings in Marfan syndrome.

    Science.gov (United States)

    Gu, Xiaoyan; He, Yihua; Li, Zhian; Han, Jiancheng; Chen, Jian; Nixon, J V Ian

    2015-02-01

    This retrospective study attempted to establish the prevalence of multiple-valve involvement in Marfan syndrome and to compare echocardiographic with histopathologic findings in Marfan patients undergoing valvular or aortic surgery. We reviewed echocardiograms of 73 Marfan patients who underwent cardiovascular surgery from January 2004 through October 2009. Tissue histology was available for comparison in 29 patients. Among the 73 patients, 66 underwent aortic valve replacement or the Bentall procedure. Histologic findings were available in 29 patients, all of whom had myxomatous degeneration. Of 63 patients with moderate or severe aortic regurgitation as determined by echocardiography, 4 had thickened aortic valves. The echocardiographic findings in 18 patients with mitral involvement included mitral prolapse in 15. Of 11 patients with moderate or severe mitral regurgitation as determined by echocardiography, 4 underwent mitral valve repair and 7 mitral valve replacement. Histologic findings among mitral valve replacement patients showed thickened valve tissue and myxomatous degeneration. Tricuspid involvement was seen echocardiographically in 8 patients, all of whom had tricuspid prolapse. Two patients had severe tricuspid regurgitation, and both underwent repair. Both mitral and tricuspid involvement were seen echocardiographically in 7 patients. Among the 73 patients undergoing cardiac surgery for Marfan syndrome, 66 had moderate or severe aortic regurgitation, although their valves manifested few histologic changes. Eighteen patients had mitral involvement (moderate or severe mitral regurgitation, prolapse, or both), and 8 had tricuspid involvement. Mitral valves were most frequently found to have histologic changes, but the tricuspid valve was invariably involved.

  8. Formal verification of Simulink/Stateflow diagrams a deductive approach

    CERN Document Server

    Zhan, Naijun; Zhao, Hengjun

    2017-01-01

    This book presents a state-of-the-art technique for formal verification of continuous-time Simulink/Stateflow diagrams, featuring an expressive hybrid system modelling language, a powerful specification logic and deduction-based verification approach, and some impressive, realistic case studies. Readers will learn the HCSP/HHL-based deductive method and the use of corresponding tools for formal verification of Simulink/Stateflow diagrams. They will also gain some basic ideas about fundamental elements of formal methods such as formal syntax and semantics, and especially the common techniques applied in formal modelling and verification of hybrid systems. By investigating the successful case studies, readers will realize how to apply the pure theory and techniques to real applications, and hopefully will be inspired to start to use the proposed approach, or even develop their own formal methods in their future work.

  9. Extracorporeal Detoxification in Victims with Severe Concomitant Injury

    Directory of Open Access Journals (Sweden)

    S. Ye. Khoroshilov

    2009-01-01

    Full Text Available Objective: to improve the results of victims with massive crushes of soft tissues in severe concomitant injury (SCI, by applying extracorporeal detoxification techniques as soon as possible. Subjects and methods. The results of examination and treatment were studied in 41 victims with SCI treated at the N. N. Burdenko Main Military Clinical Hospital in 2006 to 2008. In the early posttraumatic period (on days 1—3, all the victims (n=41 were divided into 2 groups. Group 1 victims (n=19 underwent hemodiafiltration (HDF with replacement at 35 ml/kg/hr; Group 2 (n=22 had plasmapheresis. Results. Early HDF applied to Group 1 victims could achieve 32, 44, and 37% reductions in the elevated levels creatine phosphokinase, myoglobin, and middle-sized molecules, respectively. In Group 2, plasmapheresis showed a lower effect (19, 25, and 26% reductions. Furthermore, there was a decrease in total protein in Group 1, which was absent in Group 2. Conclusion. The timely use of extracorporeal detoxification techniques in victims with massive crushes of soft tissues in the early posttraumatic period prevents the development of fatal complications of SCI, at the same time HDF is more effective and safe than plasmapheresis. Key words: severe concomitant injury, rhabdomyolysis, myoglobin, plasmapheresis, hemodiafiltration.

  10. Ontology Matching with Semantic Verification.

    Science.gov (United States)

    Jean-Mary, Yves R; Shironoshita, E Patrick; Kabuka, Mansur R

    2009-09-01

    ASMOV (Automated Semantic Matching of Ontologies with Verification) is a novel algorithm that uses lexical and structural characteristics of two ontologies to iteratively calculate a similarity measure between them, derives an alignment, and then verifies it to ensure that it does not contain semantic inconsistencies. In this paper, we describe the ASMOV algorithm, and then present experimental results that measure its accuracy using the OAEI 2008 tests, and that evaluate its use with two different thesauri: WordNet, and the Unified Medical Language System (UMLS). These results show the increased accuracy obtained by combining lexical, structural and extensional matchers with semantic verification, and demonstrate the advantage of using a domain-specific thesaurus for the alignment of specialized ontologies.

  11. Interpolant tree automata and their application in Horn clause verification

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick

    2016-01-01

    This paper investigates the combination of abstract interpretation over the domain of convex polyhedra with interpolant tree automata, in an abstraction-refinement scheme for Horn clause verification. These techniques have been previously applied separately, but are combined in a new way in this ......This paper investigates the combination of abstract interpretation over the domain of convex polyhedra with interpolant tree automata, in an abstraction-refinement scheme for Horn clause verification. These techniques have been previously applied separately, but are combined in a new way...... clause verification problems indicates that the combination of interpolant tree automaton with abstract interpretation gives some increase in the power of the verification tool, while sometimes incurring a performance overhead....

  12. Diagnosis of gastro-oesophageal reflux disease is enhanced by adding oesophageal histology and excluding epigastric pain.

    Science.gov (United States)

    Vakil, N; Vieth, M; Wernersson, B; Wissmar, J; Dent, J

    2017-05-01

    The diagnosis of gastro-oesophageal reflux disease (GERD) in clinical practice is limited by the sensitivity and specificity of symptoms and diagnostic testing. To determine if adding histology as a criterion and excluding patients with epigastric pain enhances the diagnosis for GERD. Patients with frequent upper gastrointestinal symptoms who had not taken a proton pump inhibitor in the previous 2 months and who had evaluable distal oesophageal biopsies were included (Diamond study: NCT00291746). Epithelial hyperplasia was identified when total epithelial thickness was at least 430 μm. Investigation-based GERD criteria were: presence of erosive oesophagitis, pathological oesophageal acid exposure and/or positive symptom-acid association probability. Symptoms were assessed using the Reflux Disease Questionnaire and a pre-specified checklist. Overall, 127 (55%) of the 231 included patients met investigation-based GERD criteria and 195 (84%) met symptom-based criteria. Epithelial hyperplasia was present in 89 individuals, of whom 61 (69%) met investigation-based criteria and 83 (93%) met symptom-based criteria. Adding epithelial hyperplasia as a criterion increased the number of patients diagnosed with GERD on investigation by 28 [12%; number needed to diagnose (NND): 8], to 155 (67%). The proportion of patients with a symptom-based GERD diagnosis who met investigation-based criteria including epithelial hyperplasia was significantly greater when concomitant epigastric pain was absent than when it was present (P < 0.05; NND: 8). Histology increases diagnosis of GERD and should be performed when clinical suspicion is high and endoscopy is negative. Excluding patients with epigastric pain enhances sensitivity for the diagnosis of GERD. © 2017 John Wiley & Sons Ltd.

  13. FASTR: A novel data format for concomitant representation of RNA ...

    Indian Academy of Sciences (India)

    FASTR: A novel data format for concomitant representation of RNA sequence and secondary structure information. Tungadri Bose ... Data archival; data dissemination; file format; RNA; RNA secondary structure ... Bio-Sciences R&D Division, TCS Innovation Labs, Tata Consultancy Services Limited, Pune 411 013, India ...

  14. Multi-modal image registration: matching MRI with histology

    NARCIS (Netherlands)

    Alić, L.; Haeck, J.C.; Klein, S.; Bol, K.; Tiel, S.T. van; Wielopolski, P.A.; Bijster, M.; Niessen, W.J.; Bernsen, M.; Veenland, J.F.; Jong, M. de

    2010-01-01

    Spatial correspondence between histology and multi sequence MRI can provide information about the capabilities of non-invasive imaging to characterize cancerous tissue. However, shrinkage and deformation occurring during the excision of the tumor and the histological processing complicate the co

  15. Synergies across verification regimes: Nuclear safeguards and chemical weapons convention compliance

    International Nuclear Information System (INIS)

    Kadner, Steven P.; Turpen, Elizabeth

    2001-01-01

    In the implementation of all arms control agreements, accurate verification is essential. In setting a course for verifying compliance with a given treaty - whether the NPT or the CWC, one must make a technical comparison of existing information-gathering capabilities against the constraints in an agreement. Then it must be decided whether this level of verifiability is good enough. Generally, the policy standard of 'effective verification' includes the ability to detect significant violations, with high confidence, in sufficient time to respond effectively with policy adjustments or other responses, as needed. It is at this juncture where verification approaches have traditionally diverged. Nuclear safeguards requirements have taken one path while chemical verification methods have pursued another. However, recent technological advances have brought a number of changes affecting verification, and lately their pace has been accelerating. First, all verification regimes have more and better information as a result of new kinds of sensors, imagery, and other technologies. Second, the verification provisions in agreements have also advanced, to include on-site inspections, portal monitoring, data exchanges, and a variety of transparency, confidence-building, and other cooperative measures, Together these developments translate into a technological overlap of certain institutional verification measures such as the NPT's safeguards requirements and the IAEA and the CWC's verification visions and the OPCW. Hence, a priority of international treaty-implementing organizations is exploring the development of a synergistic and coordinated approach to WMD policy making that takes into account existing inter-linkages between nuclear, chemical, and biological weapons issues. Specific areas of coordination include harmonizing information systems and information exchanges and the shared application of scientific mechanisms, as well as collaboration on technological developments

  16. Heavy water physical verification in power plants

    International Nuclear Information System (INIS)

    Morsy, S.; Schuricht, V.; Beetle, T.; Szabo, E.

    1986-01-01

    This paper is a report on the Agency experience in verifying heavy water inventories in power plants. The safeguards objectives and goals for such activities are defined in the paper. The heavy water is stratified according to the flow within the power plant, including upgraders. A safeguards scheme based on a combination of records auditing, comparing records and reports, and physical verification has been developed. This scheme has elevated the status of heavy water safeguards to a level comparable to nuclear material safeguards in bulk facilities. It leads to attribute and variable verification of the heavy water inventory in the different system components and in the store. The verification methods include volume and weight determination, sampling and analysis, non-destructive assay (NDA), and criticality check. The analysis of the different measurement methods and their limits of accuracy are discussed in the paper

  17. A Correctness Verification Technique for Commercial FPGA Synthesis Tools

    International Nuclear Information System (INIS)

    Kim, Eui Sub; Yoo, Jun Beom; Choi, Jong Gyun; Kim, Jang Yeol; Lee, Jang Soo

    2014-01-01

    Once the FPGA (Filed-Programmable Gate Array) designers designs Verilog programs, the commercial synthesis tools automatically translate the Verilog programs into EDIF programs so that the designers can have largely focused on HDL designs for correctness of functionality. Nuclear regulation authorities, however, require more considerate demonstration of the correctness and safety of mechanical synthesis processes of FPGA synthesis tools, even if the FPGA industry have acknowledged them empirically as correct and safe processes and tools. In order to assure of the safety, the industry standards for the safety of electronic/electrical devices, such as IEC 61508 and IEC 60880, recommend using the formal verification technique. There are several formal verification tools (i.e., 'FormalPro' 'Conformal' 'Formality' and so on) to verify the correctness of translation from Verilog into EDIF programs, but it is too expensive to use and hard to apply them to the works of 3rd-party developers. This paper proposes a formal verification technique which can contribute to the correctness demonstration in part. It formally checks the behavioral equivalence between Verilog and subsequently synthesized Net list with the VIS verification system. A Net list is an intermediate output of FPGA synthesis process, and EDIF is used as a standard format of Net lists. If the formal verification succeeds, then we can assure that the synthesis process from Verilog into Net list worked correctly at least for the Verilog used. In order to support the formal verification, we developed the mechanical translator 'EDIFtoBLIFMV,' which translates EDIF into BLIF-MV as an input front-end of VIS system, while preserving their behavior equivalence.. We performed the case study with an example of a preliminary version of RPS in a Korean nuclear power plant in order to provide the efficiency of the proposed formal verification technique and implemented translator. It

  18. A Correctness Verification Technique for Commercial FPGA Synthesis Tools

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Eui Sub; Yoo, Jun Beom [Konkuk University, Seoul (Korea, Republic of); Choi, Jong Gyun; Kim, Jang Yeol; Lee, Jang Soo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-10-15

    Once the FPGA (Filed-Programmable Gate Array) designers designs Verilog programs, the commercial synthesis tools automatically translate the Verilog programs into EDIF programs so that the designers can have largely focused on HDL designs for correctness of functionality. Nuclear regulation authorities, however, require more considerate demonstration of the correctness and safety of mechanical synthesis processes of FPGA synthesis tools, even if the FPGA industry have acknowledged them empirically as correct and safe processes and tools. In order to assure of the safety, the industry standards for the safety of electronic/electrical devices, such as IEC 61508 and IEC 60880, recommend using the formal verification technique. There are several formal verification tools (i.e., 'FormalPro' 'Conformal' 'Formality' and so on) to verify the correctness of translation from Verilog into EDIF programs, but it is too expensive to use and hard to apply them to the works of 3rd-party developers. This paper proposes a formal verification technique which can contribute to the correctness demonstration in part. It formally checks the behavioral equivalence between Verilog and subsequently synthesized Net list with the VIS verification system. A Net list is an intermediate output of FPGA synthesis process, and EDIF is used as a standard format of Net lists. If the formal verification succeeds, then we can assure that the synthesis process from Verilog into Net list worked correctly at least for the Verilog used. In order to support the formal verification, we developed the mechanical translator 'EDIFtoBLIFMV,' which translates EDIF into BLIF-MV as an input front-end of VIS system, while preserving their behavior equivalence.. We performed the case study with an example of a preliminary version of RPS in a Korean nuclear power plant in order to provide the efficiency of the proposed formal verification technique and implemented translator. It

  19. Logic verification system for power plant sequence diagrams

    International Nuclear Information System (INIS)

    Fukuda, Mitsuko; Yamada, Naoyuki; Teshima, Toshiaki; Kan, Ken-ichi; Utsunomiya, Mitsugu.

    1994-01-01

    A logic verification system for sequence diagrams of power plants has been developed. The system's main function is to verify correctness of the logic realized by sequence diagrams for power plant control systems. The verification is based on a symbolic comparison of the logic of the sequence diagrams with the logic of the corresponding IBDs (interlock Block Diagrams) in combination with reference to design knowledge. The developed system points out the sub-circuit which is responsible for any existing mismatches between the IBD logic and the logic realized by the sequence diagrams. Applications to the verification of actual sequence diagrams of power plants confirmed that the developed system is practical and effective. (author)

  20. Formal verification of complex properties on PLC programs

    CERN Document Server

    Darvas, D; Voros, A; Bartha, T; Blanco Vinuela, E; Gonzalez Suarez, V M

    2014-01-01

    Formal verification has become a recommended practice in the safety-critical application areas. However, due to the complexity of practical control and safety systems, the state space explosion often prevents the use of formal analysis. In this paper we extend our former verification methodology with effective property preserving reduction techniques. For this purpose we developed general rule-based reductions and a customized version of the Cone of Influence (COI) reduction. Using these methods, the verification of complex requirements formalised with temporal logics (e.g. CTL, LTL) can be orders of magnitude faster. We use the NuSMV model checker on a real-life PLC program from CERN to demonstrate the performance of our reduction techniques.

  1. Implementation and verification of global optimization benchmark problems

    Science.gov (United States)

    Posypkin, Mikhail; Usov, Alexander

    2017-12-01

    The paper considers the implementation and verification of a test suite containing 150 benchmarks for global deterministic box-constrained optimization. A C++ library for describing standard mathematical expressions was developed for this purpose. The library automate the process of generating the value of a function and its' gradient at a given point and the interval estimates of a function and its' gradient on a given box using a single description. Based on this functionality, we have developed a collection of tests for an automatic verification of the proposed benchmarks. The verification has shown that literary sources contain mistakes in the benchmarks description. The library and the test suite are available for download and can be used freely.

  2. Projected Impact of Compositional Verification on Current and Future Aviation Safety Risk

    Science.gov (United States)

    Reveley, Mary S.; Withrow, Colleen A.; Leone, Karen M.; Jones, Sharon M.

    2014-01-01

    The projected impact of compositional verification research conducted by the National Aeronautic and Space Administration System-Wide Safety and Assurance Technologies on aviation safety risk was assessed. Software and compositional verification was described. Traditional verification techniques have two major problems: testing at the prototype stage where error discovery can be quite costly and the inability to test for all potential interactions leaving some errors undetected until used by the end user. Increasingly complex and nondeterministic aviation systems are becoming too large for these tools to check and verify. Compositional verification is a "divide and conquer" solution to addressing increasingly larger and more complex systems. A review of compositional verification research being conducted by academia, industry, and Government agencies is provided. Forty-four aviation safety risks in the Biennial NextGen Safety Issues Survey were identified that could be impacted by compositional verification and grouped into five categories: automation design; system complexity; software, flight control, or equipment failure or malfunction; new technology or operations; and verification and validation. One capability, 1 research action, 5 operational improvements, and 13 enablers within the Federal Aviation Administration Joint Planning and Development Office Integrated Work Plan that could be addressed by compositional verification were identified.

  3. Towards automatic verification of ladder logic programs

    OpenAIRE

    Zoubek , Bohumir; Roussel , Jean-Marc; Kwiatkowska , Martha

    2003-01-01

    International audience; Control system programs are usually validated by testing prior to their deployment. Unfortunately, testing is not exhaustive and therefore it is possible that a program which passed all the required tests still contains errors. In this paper we apply techniques of automatic verification to a control program written in ladder logic. A model is constructed mechanically from the ladder logic program and subjected to automatic verification against requirements that include...

  4. Inventory verification measurements using neutron multiplicity counting

    International Nuclear Information System (INIS)

    Ensslin, N.; Foster, L.A.; Harker, W.C.; Krick, M.S.; Langner, D.G.

    1998-01-01

    This paper describes a series of neutron multiplicity measurements of large plutonium samples at the Los Alamos Plutonium Facility. The measurements were corrected for bias caused by neutron energy spectrum shifts and nonuniform multiplication, and are compared with calorimetry/isotopics. The results show that multiplicity counting can increase measurement throughput and yield good verification results for some inventory categories. The authors provide recommendations on the future application of the technique to inventory verification

  5. [Pathogenic mechanisms of proatherogenic changes in pregnant women with concomitant obesity].

    Science.gov (United States)

    Tarasenko, K V; Mamontova, T V

    2013-12-01

    The concentration of insulin, high sensitivity C-reactive protein (CRP) and indices of lipid metabolism (concentrations of triacylglycerols, total cholesterol, cholesterol of low density lipoproteins and cholesterol of very low density lipoproteins) in women with concomitant obesity in the second trimester of pregnancy were studied. Changes of the lipid profile in the pregnant women with concomitant obesity indicate development of type IV hyperlipoproteinemia. Concentrations of insulin and CRP in the blood serum of the pregnant women with obesity were respectively 92.1% and 62.5% higher than in the control group. On the basis of literature data and our own research it was concluded that the complex of the metabolic changes (insulin resistance, dislipidemia, endothelial dysfunction, systemic inflammation) in pregnant women with obesity promotes development of proatherogenic changes.

  6. Gastroesophageal Reflux Disease After Laparoscopic Sleeve Gastrectomy with Concomitant Hiatal Hernia Repair: an Unresolved Question.

    Science.gov (United States)

    Dakour Aridi, Hanaa; Asali, Mohammad; Fouani, Tarek; Alami, Ramzi S; Safadi, Bassem Y

    2017-11-01

    The effectiveness of the concomitant repair of hiatal hernia (HHR) during laparoscopic sleeve gastrectomy (LSG) in reducing gastroesophageal reflux disease (GERD) symptoms is still unclear. The aim of this study is to assess the effect of concomitant HHR on postoperative GERD symptoms in our patient population. A retrospective review of patients who underwent LSG with or without HHR between 2011and 2014 was performed. Pre- and postoperative GERD symptoms were assessed at different time intervals until a maximum of 2 years after the surgery. The study included 165 patients; 76 (46%) underwent LSG with concomitant HHR (group A) while the rest underwent only LSG (group B). Baseline GERD complaints were more prevalent in group A (61.8 vs 41.6%, p = 0.04), in which 44 patients (57.9%) had evidence of hiatal hernia on preoperative EGD. In the remaining 32 patients, it was diagnosed intraoperatively. GERD symptoms did not significantly differ between the two groups after years 1 and 2. GERD remission was observed in 21.3% of the 76 patients who underwent concomitant HHR (group A) and in 29.7% of those who did not (group B) while new-onset GERD symptoms were reported in 12 patients (41.4%) in group A and in 24 patients (46.2%) in group B. Routine HHR at the time of LSG does not show an improvement in GERD symptoms. More prospective studies are needed to clarify the role of the routine dissection, identification, and repair of concomitant hiatal hernia during LSG.

  7. Effectiveness of Alveolar Opening in Patients with Acute Lung Injury and Concomitant Pneumothorax

    Directory of Open Access Journals (Sweden)

    Yu. V. Marchenkov

    2009-01-01

    Full Text Available Objective: to study the efficiency of a lung opening maneuver in patients with acute lung injury (ALI and concomitant pneumothorax, who were on biphasic positive airway pressure ventilation (BIPAP and synchronized intermittent mandatory ventilation. Subject and methods. Seventy-three patients with acute lung injury and concomitant pneumoth-orax resulting from blunt chest trauma were examined. Their condition was an APACHE II of 18—24 scores. After elimination of pneumothorax, an open lung maneuver was made using different modes of lung support 3—5 times daily. Results. The study has shown that BIPAP used in patients with ALI and concomitant pneumothorax reduces the time of pleural cavity drainage, which allows the lung opening maneuver to be applied earlier. The employment of the latter in patients with ALI and pneumothorax permits a prompter recovery of lung function during different types of respiratory support, which is attended by reductions in the number of complications, artificial ventilation, and mortality. When the lung opening maneuver is combined with BIPAP, its efficiency considerably increases. Key words: acute lung injury, pneumothorax, BIPAP, lung opening maneuver.

  8. The MODUS Approach to Formal Verification

    Directory of Open Access Journals (Sweden)

    Brewka Lukasz

    2014-03-01

    Full Text Available Background: Software reliability is of great importance for the development of embedded systems that are often used in applications that have requirements for safety. Since the life cycle of embedded products is becoming shorter, productivity and quality simultaneously required and closely in the process of providing competitive products Objectives: In relation to this, MODUS (Method and supporting toolset advancing embedded systems quality project aims to provide small and medium-sized businesses ways to improve their position in the embedded market through a pragmatic and viable solution Methods/Approach: This paper will describe the MODUS project with focus on the technical methodologies that can assist formal verification and formal model checking. Results: Based on automated analysis of the characteristics of the system and by controlling the choice of the existing opensource model verification engines, model verification producing inputs to be fed into these engines. Conclusions: The MODUS approach is aligned with present market needs; the familiarity with tools, the ease of use and compatibility/interoperability remain among the most important criteria when selecting the development environment for a project

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION: TEST/QA PLAN FOR THE VERIFICATION TESTING OF SELECTIVE CATALYTIC REDUCTION CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    Science.gov (United States)

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  10. Malignant pleural mesothelioma: Computed tomography and correlation with histology

    Energy Technology Data Exchange (ETDEWEB)

    Seely, Jean M. [Department of Diagnostic Imaging, Ottawa Hospital, 1053 Carling Avenue, Ottawa, Ontario K1Y 4E9 (Canada)], E-mail: jeseely@ottawahospital.on.ca; Nguyen, Elsie T., E-mail: nguyen_elsie@hotmail.com; Churg, Andrew M. [University of British Columbia, 2211 Wesbrook Mall, Vancouver, BC V6T 1W5 (Canada)], E-mail: achurg@interchange.ubc.ca; Mueller, Nestor L. [University of British Columbia, Vancouver Hospital and Health Sciences Centre, 855 West 12th Avenue, Vancouver, BC V5Z 1M9 (Canada)], E-mail: nmuller@vanhosp.bc.ca

    2009-06-15

    Objective: To review the computed tomography (CT) imaging findings of pleural mesothelioma at presentation and to correlate the CT with the histological subtype. Materials and methods: Pathology reports from 1997 to 2006 were reviewed at two academic institutions to identify patients with proven pleural mesothelioma. Diagnosis was based on histologic findings in specimens obtained by transthoracic needle biopsy, surgical biopsy or resection. All histology slides were reviewed by a lung pathologist. CT scans, available in 92 patients, were reviewed blindly and in random order by two independent radiologists. Kappa analysis was completed to assess inter-observer agreement. Eighty patients in whom there was no significant delay between CT imaging and histological diagnosis were assessed by logistic regression analysis to correlate CT and histologic findings. Results: Seventy-two of the 92 mesotheliomas were epithelial, 15 sarcomatous, and 5 of mixed histology. All patients (77 male, 15 female, mean age 68 years) had pleural thickening on CT; the thickening was nodular in 79 patients (86%) and mediastinal in 87 (95%). Ipsilateral volume loss was seen in 42 patients (46%). Pleural effusions were present in 80 patients (87%), being large (>2/3 hemithorax) in 19 patients (21%). Atypical features at presentation included bilateral disease in three patients (3%), and spontaneous pneumothoraces in nine patients (10%). Internal mammary lymphadenopathy was observed in 48 patients (52%) and cardiophrenic lymphadenopathy in 42 (46%). Inter-observer agreement was excellent (average kappa = 0.89). Ipsilateral volume loss was associated with sarcomatous or mixed mesothelioma (p = 0.004). Using logistic regression analysis, other CT findings did not correlate with histological subtype. Conclusions: Ipsilateral volume loss is most frequently associated with sarcomatous or mixed mesothelioma. The remaining imaging findings are not helpful in predicting the histological subtype of

  11. Malignant pleural mesothelioma: Computed tomography and correlation with histology

    International Nuclear Information System (INIS)

    Seely, Jean M.; Nguyen, Elsie T.; Churg, Andrew M.; Mueller, Nestor L.

    2009-01-01

    Objective: To review the computed tomography (CT) imaging findings of pleural mesothelioma at presentation and to correlate the CT with the histological subtype. Materials and methods: Pathology reports from 1997 to 2006 were reviewed at two academic institutions to identify patients with proven pleural mesothelioma. Diagnosis was based on histologic findings in specimens obtained by transthoracic needle biopsy, surgical biopsy or resection. All histology slides were reviewed by a lung pathologist. CT scans, available in 92 patients, were reviewed blindly and in random order by two independent radiologists. Kappa analysis was completed to assess inter-observer agreement. Eighty patients in whom there was no significant delay between CT imaging and histological diagnosis were assessed by logistic regression analysis to correlate CT and histologic findings. Results: Seventy-two of the 92 mesotheliomas were epithelial, 15 sarcomatous, and 5 of mixed histology. All patients (77 male, 15 female, mean age 68 years) had pleural thickening on CT; the thickening was nodular in 79 patients (86%) and mediastinal in 87 (95%). Ipsilateral volume loss was seen in 42 patients (46%). Pleural effusions were present in 80 patients (87%), being large (>2/3 hemithorax) in 19 patients (21%). Atypical features at presentation included bilateral disease in three patients (3%), and spontaneous pneumothoraces in nine patients (10%). Internal mammary lymphadenopathy was observed in 48 patients (52%) and cardiophrenic lymphadenopathy in 42 (46%). Inter-observer agreement was excellent (average kappa = 0.89). Ipsilateral volume loss was associated with sarcomatous or mixed mesothelioma (p = 0.004). Using logistic regression analysis, other CT findings did not correlate with histological subtype. Conclusions: Ipsilateral volume loss is most frequently associated with sarcomatous or mixed mesothelioma. The remaining imaging findings are not helpful in predicting the histological subtype of

  12. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards (including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  13. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards (including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security.

  14. Pattern of Midface Trauma with Associated Concomitant Injuries in a ...

    African Journals Online (AJOL)

    Recognizing concomitant injuries in patients with facial fracture is important for rapid assessment and further management of these patients. These results support the use of head computed tomography scan and cervical spine radiographs in most general trauma work‑ups, but specifically validates their use in patients with.

  15. Concomitant injuries are an important determinant of outcome of high-grade blunt hepatic trauma.

    Science.gov (United States)

    Schnüriger, B; Inderbitzin, D; Schafer, M; Kickuth, R; Exadaktylos, A; Candinas, D

    2009-01-01

    Little is known about the clinical importance of concomitant injuries in polytraumatized patients with high-grade blunt liver injury. A retrospective single-centre study was performed to investigate the safety of non-operative management of liver injury and the impact of concomitant intra- and extra-abdominal injuries on clinical outcome. Some 183 patients with blunt liver injury were admitted to Berne University Hospital, Switzerland, between January 2000 and December 2006. Grade 3-5 injuries were considered to be high grade. Immediate laparotomy was required by 35 patients (19.1 per cent), owing to extrahepatic intra-abdominal injury (splenic and vascular injuries, perforations) in 21 cases. The mortality rate was 16.9 per cent; 22 of the 31 deaths were due to concomitant lesions. Of 81 patients with high-grade liver injury, 63 (78 per cent) were managed without surgery; liver-related and extra-abdominal complication rates in these patients were 11 and 17 per cent respectively. Grades 4 and 5 liver injury were associated with hepatic-related and extra-abdominal complications. Concomitant injuries are a major determinant of outcome in patients with blunt hepatic injury and should be given high priority by trauma surgeons. An algorithm for the management of blunt liver injury is proposed. Copyright (c) 2008 British Journal of Surgery Society Ltd. Published by John Wiley & Sons, Ltd.

  16. Verification Games: Crowd-Sourced Formal Verification

    Science.gov (United States)

    2016-03-01

    additional paintbrushes. Additionally, in Paradox , human players are never given small optimization problems (for example, toggling the values of 50...were developed by the Center for Game Science: Pipe Jam, Traffic Jam, Flow Jam and Paradox . Verification tools and games were integrated to verify...4 4. Paradox …………………………………………………......5 5. MyClass ………………………………………………….....7 6. Results …………………………………………………......11 7. Time to

  17. Histological changes in the pancreas following administration of ...

    African Journals Online (AJOL)

    The experiment lasted for 28 days. The animals were anaesthetized using chloroform inhalation and the peritoneum stripped open and the pancreas removed and prepared for histological observation using haematoxylin and eosin staining technique. Histology showed regenerative changes of pancreatic islet cell at a dose ...

  18. Phase II study of concomitant chemoradiotherapy in bulky refractory or chemoresistant relapsed lymphomas

    International Nuclear Information System (INIS)

    Girinsky, Theodore; Lapusan, Simona; Ribrag, Vincent; Koscielny, Serge; Ferme, Christophe; Carde, Patrice

    2005-01-01

    Purpose: To evaluate the local efficacy of concomitant chemoradiotherapy in patients with mostly refractory lymphoma. Methods and materials: Patients with refractory or chemoresistant-relapsed lymphoma and bulky life-threatening masses were included in this study. A split course of concomitant radiotherapy and chemotherapy (mostly cisplatin and etoposide) was delivered during a 6-week period. Weekly blood tests and a clinical examination using the Radiation Therapy Oncology Group guidelines were performed to assess acute toxicity. The tumor response was evaluated 1-3 months after treatment and at regular follow-up visits. Results: We enrolled 21 patients in the study between January 1998 and April 2003. Of the 21 patients, 60% had disseminated disease with bulky tumor masses and 85% had refractory lymphoma, of which most had been treated with at least two different chemotherapy regimens before concomitant chemoradiotherapy. Seventy-five percent received regimens containing cisplatinum and etoposide. The median radiation dose was 40 Gy (range, 12-62.5 Gy). Grade 3-4 hematologic toxicity and mucositis was observed in 70% and 30% of cases respectively, without any deaths. The overall response and complete remission rate was 70% and 20%, respectively. The 1-year overall survival and local progression-free survival rate was 20.4% and 54%, respectively. Three patients with localized disease were still alive 16, 33, and 48 months after treatment. Conclusion: Concomitant chemoradiotherapy for refractory or chemoresistant-relapsed lymphoma induced high hematologic toxicity, but seemed adequate for controlling local bulky tumor masses. No toxicity-related death was observed

  19. Verification of product design using regulation knowledge base and Web services

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ik June [KAERI, Daejeon (Korea, Republic of); Lee, Jae Chul; Mun Du Hwan [Kyungpook National University, Daegu (Korea, Republic of); Kim, Byung Chul [Dong-A University, Busan (Korea, Republic of); Hwang, Jin Sang [PartDB Co., Ltd., Daejeom (Korea, Republic of); Lim, Chae Ho [Korea Institute of Industrial Technology, Incheon (Korea, Republic of)

    2015-11-15

    Since product regulations contain important rules or codes that manufacturers must follow, automatic verification of product design with the regulations related to a product is necessary. For this, this study presents a new method for the verification of product design using regulation knowledge base and Web services. Regulation knowledge base consisting of product ontology and rules was built with a hybrid technique combining ontology and programming languages. Web service for design verification was developed ensuring the flexible extension of knowledge base. By virtue of two technical features, design verification is served to various products while the change of system architecture is minimized.

  20. Verification of product design using regulation knowledge base and Web services

    International Nuclear Information System (INIS)

    Kim, Ik June; Lee, Jae Chul; Mun Du Hwan; Kim, Byung Chul; Hwang, Jin Sang; Lim, Chae Ho

    2015-01-01

    Since product regulations contain important rules or codes that manufacturers must follow, automatic verification of product design with the regulations related to a product is necessary. For this, this study presents a new method for the verification of product design using regulation knowledge base and Web services. Regulation knowledge base consisting of product ontology and rules was built with a hybrid technique combining ontology and programming languages. Web service for design verification was developed ensuring the flexible extension of knowledge base. By virtue of two technical features, design verification is served to various products while the change of system architecture is minimized.

  1. Compromises produced by the dialectic between self-verification and self-enhancement.

    Science.gov (United States)

    Morling, B; Epstein, S

    1997-12-01

    Three studies of people's reactions to evaluative feedback demonstrated that the dialectic between self-enhancement and self-verification results in compromises between these 2 motives, as hypothesized in cognitive-experiential self-theory. The demonstration was facilitated by 2 procedural improvements: Enhancement and verification were established by calibrating evaluative feedback against self appraisals, and degree of enhancement and of verification were varied along a continuum, rather than categorically. There was also support for the hypotheses that processing in an intuitive-experiential mode favors enhancement and processing in an analytical-rational mode favors verification in the kinds of situations investigated.

  2. Calibration and verification of surface contamination meters --- Procedures and techniques

    International Nuclear Information System (INIS)

    Schuler, C; Butterweck, G.; Wernli, C.; Bochud, F.; Valley, J.-F.

    2007-03-01

    A standardised measurement procedure for surface contamination meters (SCM) is presented. The procedure aims at rendering surface contamination measurements to be simply and safely interpretable. Essential for the approach is the introduction and common use of the radionuclide specific quantity 'guideline value' specified in the Swiss Radiation Protection Ordinance as unit for the measurement of surface activity. The according radionuclide specific 'guideline value count rate' can be summarized as verification reference value for a group of radionuclides ('basis guideline value count rate'). The concept can be generalized for SCM of the same type or for SCM of different types using he same principle of detection. A SCM multi source calibration technique is applied for the determination of the instrument efficiency. Four different electron radiation energy regions, four different photon radiation energy regions and an alpha radiation energy region are represented by a set of calibration sources built according to ISO standard 8769-2. A guideline value count rate representing the activity per unit area of a surface contamination of one guideline value can be calculated for any radionuclide using instrument efficiency, radionuclide decay data, contamination source efficiency, guideline value averaging area (100 cm 2 ), and radionuclide specific guideline value. n this way, instrument responses for the evaluation of surface contaminations are obtained for radionuclides without available calibration sources as well as for short-Iived radionuclides, for which the continuous replacement of certified calibration sources can lead to unreasonable costs. SCM verification is based on surface emission rates of reference sources with an active area of 100 cm 2 . The verification for a given list of radionuclides is based on the radionuclide specific quantity guideline value count rate. Guideline value count rates for groups of radionuclides can be represented within the maximum

  3. Integrated knowledge base tool for acquisition and verification of NPP alarm systems

    International Nuclear Information System (INIS)

    Park, Joo Hyun; Seong, Poong Hyun

    1998-01-01

    Knowledge acquisition and knowledge base verification are important activities in developing knowledge-based systems such as alarm processing systems. In this work, we developed the integrated tool, for knowledge acquisition and verification of NPP alarm processing systems, by using G2 tool. The tool integrates document analysis method and ECPN matrix analysis method, for knowledge acquisition and knowledge verification, respectively. This tool enables knowledge engineers to perform their tasks from knowledge acquisition to knowledge verification consistently

  4. Transmutation Fuel Performance Code Thermal Model Verification

    Energy Technology Data Exchange (ETDEWEB)

    Gregory K. Miller; Pavel G. Medvedev

    2007-09-01

    FRAPCON fuel performance code is being modified to be able to model performance of the nuclear fuels of interest to the Global Nuclear Energy Partnership (GNEP). The present report documents the effort for verification of the FRAPCON thermal model. It was found that, with minor modifications, FRAPCON thermal model temperature calculation agrees with that of the commercial software ABAQUS (Version 6.4-4). This report outlines the methodology of the verification, code input, and calculation results.

  5. Verification and Validation of RADTRAN 5.5.

    Energy Technology Data Exchange (ETDEWEB)

    Osborn, Douglas.; Weiner, Ruth F.; Mills, George Scott; Hamp, Steve C.

    2005-02-01

    This document contains a description of the verification and validation process used for the RADTRAN 5.5 code. The verification and validation process ensured the proper calculational models and mathematical and numerical methods were used in the RADTRAN 5.5 code for the determination of risk and consequence assessments. The differences between RADTRAN 5 and RADTRAN 5.5 are the addition of tables, an expanded isotope library, and the additional User-Defined meteorological option for accident dispersion. 3

  6. Comparing formal verification approaches of interlocking systems

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Nguyen, Hoang Nga; Roggenbach, Markus

    2016-01-01

    these approaches. As a first step towards this, in this paper we suggest a way to compare different formal approaches for verifying designs of route-based interlocking systems and we demonstrate it on modelling and verification approaches developed within the research groups at DTU/Bremen and at Surrey......The verification of railway interlocking systems is a challenging task, and therefore several research groups have suggested to improve this task by using formal methods, but they use different modelling and verification approaches. To advance this research, there is a need to compare....../Swansea. The focus is on designs that are specified by so-called control tables. The paper can serve as a starting point for further comparative studies. The DTU/Bremen research has been funded by the RobustRailS project granted by Innovation Fund Denmark. The Surrey/Swansea research has been funded by the Safe...

  7. Implementation and verification of global optimization benchmark problems

    Directory of Open Access Journals (Sweden)

    Posypkin Mikhail

    2017-12-01

    Full Text Available The paper considers the implementation and verification of a test suite containing 150 benchmarks for global deterministic box-constrained optimization. A C++ library for describing standard mathematical expressions was developed for this purpose. The library automate the process of generating the value of a function and its’ gradient at a given point and the interval estimates of a function and its’ gradient on a given box using a single description. Based on this functionality, we have developed a collection of tests for an automatic verification of the proposed benchmarks. The verification has shown that literary sources contain mistakes in the benchmarks description. The library and the test suite are available for download and can be used freely.

  8. Integrated Java Bytecode Verification

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian; Franz, Michael

    2005-01-01

    Existing Java verifiers perform an iterative data-flow analysis to discover the unambiguous type of values stored on the stack or in registers. Our novel verification algorithm uses abstract interpretation to obtain definition/use information for each register and stack location in the program...

  9. Prospective assessment of concomitant lumbar and chronic subdural hematoma: is migration from the intracranial space involved in their manifestation?

    Science.gov (United States)

    Kokubo, Rinko; Kim, Kyongsong; Mishina, Masahiro; Isu, Toyohiko; Kobayashi, Shiro; Yoshida, Daizo; Morita, Akio

    2014-02-01

    Spinal subdural hematomas (SDHs) are rare and some are concomitant with intracranial SDH. Their pathogenesis and etiology remain to be elucidated although their migration from the intracranial space has been suggested. The authors postulated that if migration plays a major role, patients with intracranial SDH may harbor asymptomatic lumbar SDH. The authors performed a prospective study on the incidence of spinal SDH in patients with intracranial SDH to determine whether migration is a key factor in their concomitance. The authors evaluated lumbar MR images obtained in 168 patients (125 males, 43 females, mean age 75.6 years) with intracranial chronic SDH to identify cases of concomitant lumbar SDH. In all cases, the lumbar MRI studies were performed within the 1st week after surgical irrigation of the intracranial SDH. Of the 168 patients, 2 (1.2%) harbored a concomitant lumbar SDH; both had a history of trauma to both the head and the hip and/or lumbar area. One was an 83-year-old man with prostate cancer and myelodysplastic syndrome who suffered trauma to his head and lumbar area in a fall from his bed. The other was a 70-year-old man who had hit his head and lumbar area in a fall. Neither patient manifested neurological deficits and their hematomas disappeared under observation. None of the patients with concomitant lumbar SDH had sustained head trauma only, indicating that trauma to the hip or lumbar region is significantly related to the concomitance of SDH (p < 0.05). As the incidence of concomitant lumbar and intracranial chronic SDH is rare and both patients in this study had sustained a direct impact to the head and hips, the authors suggest that the major mechanism underlying their concomitant SDH was double trauma. Another possible explanation is hemorrhagic diathesis and low CSF syndrome.

  10. Radiochemical verification and validation in the environmental data collection process

    International Nuclear Information System (INIS)

    Rosano-Reece, D.; Bottrell, D.; Bath, R.J.

    1994-01-01

    A credible and cost effective environmental data collection process should produce analytical data which meets regulatory and program specific requirements. Analytical data, which support the sampling and analysis activities at hazardous waste sites, undergo verification and independent validation before the data are submitted to regulators. Understanding the difference between verification and validation and their respective roles in the sampling and analysis process is critical to the effectiveness of a program. Verification is deciding whether the measurement data obtained are what was requested. The verification process determines whether all the requirements were met. Validation is more complicated than verification. It attempts to assess the impacts on data use, especially when requirements are not met. Validation becomes part of the decision-making process. Radiochemical data consists of a sample result with an associated error. Therefore, radiochemical validation is different and more quantitative than is currently possible for the validation of hazardous chemical data. Radiochemical data include both results and uncertainty that can be statistically compared to identify significance of differences in a more technically defensible manner. Radiochemical validation makes decisions about analyte identification, detection, and uncertainty for a batch of data. The process focuses on the variability of the data in the context of the decision to be made. The objectives of this paper are to present radiochemical verification and validation for environmental data and to distinguish the differences between the two operations

  11. Automatic verification of a lip-synchronisation protocol using Uppaal

    NARCIS (Netherlands)

    Bowman, H.; Faconti, G.; Katoen, J.-P.; Latella, D.; Massink, M.

    1998-01-01

    We present the formal specification and verification of a lip-synchronisation protocol using the real-time model checker Uppaal. A number of specifications of this protocol can be found in the literature, but this is the first automatic verification. We take a published specification of the

  12. Numident Online Verification Utility (NOVU)

    Data.gov (United States)

    Social Security Administration — NOVU is a mainframe application that accesses the NUMIDENT to perform real-time SSN verifications. This program is called by other SSA online programs that serve as...

  13. Systematic study of source mask optimization and verification flows

    Science.gov (United States)

    Ben, Yu; Latypov, Azat; Chua, Gek Soon; Zou, Yi

    2012-06-01

    Source mask optimization (SMO) emerged as powerful resolution enhancement technique (RET) for advanced technology nodes. However, there is a plethora of flow and verification metrics in the field, confounding the end user of the technique. Systemic study of different flows and the possible unification thereof is missing. This contribution is intended to reveal the pros and cons of different SMO approaches and verification metrics, understand the commonality and difference, and provide a generic guideline for RET selection via SMO. The paper discusses 3 different type of variations commonly arise in SMO, namely pattern preparation & selection, availability of relevant OPC recipe for freeform source and finally the metrics used in source verification. Several pattern selection algorithms are compared and advantages of systematic pattern selection algorithms are discussed. In the absence of a full resist model for SMO, alternative SMO flow without full resist model is reviewed. Preferred verification flow with quality metrics of DOF and MEEF is examined.

  14. Organics Verification Study for Sinclair and Dyes Inlets, Washington

    Energy Technology Data Exchange (ETDEWEB)

    Kohn, Nancy P.; Brandenberger, Jill M.; Niewolny, Laurie A.; Johnston, Robert K.

    2006-09-28

    Sinclair and Dyes Inlets near Bremerton, Washington, are on the State of Washington 1998 303(d) list of impaired waters because of fecal coliform contamination in marine water, metals in sediment and fish tissue, and organics in sediment and fish tissue. Because significant cleanup and source control activities have been conducted in the inlets since the data supporting the 1998 303(d) listings were collected, two verification studies were performed to address the 303(d) segments that were listed for metal and organic contaminants in marine sediment. The Metals Verification Study (MVS) was conducted in 2003; the final report, Metals Verification Study for Sinclair and Dyes Inlets, Washington, was published in March 2004 (Kohn et al. 2004). This report describes the Organics Verification Study that was conducted in 2005. The study approach was similar to the MVS in that many surface sediment samples were screened for the major classes of organic contaminants, and then the screening results and other available data were used to select a subset of samples for quantitative chemical analysis. Because the MVS was designed to obtain representative data on concentrations of contaminants in surface sediment throughout Sinclair Inlet, Dyes Inlet, Port Orchard Passage, and Rich Passage, aliquots of the 160 MVS sediment samples were used in the analysis for the Organics Verification Study. However, unlike metals screening methods, organics screening methods are not specific to individual organic compounds, and are not available for some target organics. Therefore, only the quantitative analytical results were used in the organics verification evaluation. The results of the Organics Verification Study showed that sediment quality outside of Sinclair Inlet is unlikely to be impaired because of organic contaminants. Similar to the results for metals, in Sinclair Inlet, the distribution of residual organic contaminants is generally limited to nearshore areas already within the

  15. Verification of Space Weather Forecasts using Terrestrial Weather Approaches

    Science.gov (United States)

    Henley, E.; Murray, S.; Pope, E.; Stephenson, D.; Sharpe, M.; Bingham, S.; Jackson, D.

    2015-12-01

    The Met Office Space Weather Operations Centre (MOSWOC) provides a range of 24/7 operational space weather forecasts, alerts, and warnings, which provide valuable information on space weather that can degrade electricity grids, radio communications, and satellite electronics. Forecasts issued include arrival times of coronal mass ejections (CMEs), and probabilistic forecasts for flares, geomagnetic storm indices, and energetic particle fluxes and fluences. These forecasts are produced twice daily using a combination of output from models such as Enlil, near-real-time observations, and forecaster experience. Verification of forecasts is crucial for users, researchers, and forecasters to understand the strengths and limitations of forecasters, and to assess forecaster added value. To this end, the Met Office (in collaboration with Exeter University) has been adapting verification techniques from terrestrial weather, and has been working closely with the International Space Environment Service (ISES) to standardise verification procedures. We will present the results of part of this work, analysing forecast and observed CME arrival times, assessing skill using 2x2 contingency tables. These MOSWOC forecasts can be objectively compared to those produced by the NASA Community Coordinated Modelling Center - a useful benchmark. This approach cannot be taken for the other forecasts, as they are probabilistic and categorical (e.g., geomagnetic storm forecasts give probabilities of exceeding levels from minor to extreme). We will present appropriate verification techniques being developed to address these forecasts, such as rank probability skill score, and comparing forecasts against climatology and persistence benchmarks. As part of this, we will outline the use of discrete time Markov chains to assess and improve the performance of our geomagnetic storm forecasts. We will also discuss work to adapt a terrestrial verification visualisation system to space weather, to help

  16. Concomitant boost radiotherapy for squamous carcinoma of the tonsillar fossa

    International Nuclear Information System (INIS)

    Gwozdz, John T.; Morrison, William H.; Garden, Adam S.; Weber, Randal S.; Peters, Lester J.; Ang, K. Kian

    1997-01-01

    Purpose: To assess the efficacy of a concomitant boost fractionation schedule of radiotherapy for treating patients with squamous carcinoma of the tonsillar fossa. Patients and Methods: Between December 1983 and November 1992, 83 patients with squamous carcinoma of the tonsil were treated with concomitant boost fractionation. The distribution of American Joint Committee on Cancer T stages was TX-4, T1-5, T2-29, T3-41, T4-4; N stages were NX-1, N0-26, N1-13, N2-31, N3-12. Patients were treated with standard large fields to 54 Gy in 6 weeks. The boost treatment consisted of a second daily 1.5 Gy fraction for 10-12 fractions, usually delivered during the final phase of treatment. The tumor dose was 69-72 Gy, given over 6 weeks. Twenty-one patients, who all had N2 or N3 regional disease, underwent neck dissections, either before (13 patients) or 6 weeks after radiotherapy (8 patients); the other patients were treated with radiotherapy alone. Results: The 5-year actuarial disease-specific survival and overall survival rates were 71 and 60%, respectively. Patients with T2 and T3 primary tumors had 5-year actuarial local control rates of 96 and 78%, respectively. Patients with T3 disease who received the final-phase boost had a 5-year actuarial local control rate of 82%. Actuarial 5-year regional disease control rates were N0, 92%; N1, 76%; N2, 89%; and N3, 89%. The 21 patients who had neck dissections all had their disease regionally controlled. Patients presenting with nodal disease or after a node excision who were treated with radiation alone had a 5-year actuarial regional disease control rate of 79%. All but five patients had confluent Grade 4 mucositis during treatment. Severe late complications attributable to radiation included mandibular necrosis, in-field osteosarcoma, and chronic dysphagia for solid foods. Conclusions: High rates of local and regional disease control were achieved with the concomitant boost fractionation schedule, with few cases of severe late

  17. The role of the United Nations in the field of verification

    International Nuclear Information System (INIS)

    1991-01-01

    By resolution 43/81 B of 7 December 1988, the General Assembly requested the Secretary General to undertake, with the assistance of a group of qualified governmental experts, an in-depth study of the role of the United Nations in the field of verification. In August 1990, the Secretary-General transmitted to the General Assembly the unanimously approved report of the experts. The report is structured in six chapters and contains a bibliographic appendix on technical aspects of verification. The Introduction provides a brief historical background on the development of the question of verification in the United Nations context, culminating with the adoption by the General Assembly of resolution 43/81 B, which requested the study. Chapters II and III address the definition and functions of verification and the various approaches, methods, procedures and techniques used in the process of verification. Chapters IV and V examine the existing activities of the United Nations in the field of verification, possibilities for improvements in those activities as well as possible additional activities, while addressing the organizational, technical, legal, operational and financial implications of each of the possibilities discussed. Chapter VI presents the conclusions and recommendations of the Group

  18. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Directory of Open Access Journals (Sweden)

    Jin-Won Park

    2009-01-01

    Full Text Available As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  19. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Science.gov (United States)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  20. Renal cell carcinoma: histological classification and correlation with imaging findings

    Energy Technology Data Exchange (ETDEWEB)

    Muglia, Valdair F., E-mail: fmuglia@fmrp.usp.br [Universidade de Sao Paulo (CCIFM/FMRP/USP), Ribeirao Preto, SP (Brazil). Centro de Ciencias das Imagens e Fisica Medica. Faculdade de Medicina; Prando, Adilson [Universidade Estadual de Campinas (UNICAMP), SP (Brazil); Hospital Vera Cruz, Campinas, SP (Brazil). Dept. de Imaginologia

    2015-05-15

    Renal cell carcinoma (RCC) is the seventh most common histological type of cancer in the Western world and has shown a sustained increase in its prevalence. The histological classification of RCCs is of utmost importance, considering the significant prognostic and therapeutic implications of its histological subtypes. Imaging methods play an outstanding role in the diagnosis, staging and follow-up of RCC. Clear cell, papillary and chromophobe are the most common histological subtypes of RCC, and their preoperative radiological characterization, either followed or not by confirmatory percutaneous biopsy, may be particularly useful in cases of poor surgical condition, metastatic disease, central mass in a solitary kidney, and in patients eligible for molecular targeted therapy. New strategies recently developed for treating renal cancer, such as cryo and radiofrequency ablation, molecularly targeted therapy and active surveillance also require appropriate preoperative characterization of renal masses. Less common histological types, although sharing nonspecific imaging features, may be suspected on the basis of clinical and epidemiological data. The present study is aimed at reviewing the main clinical and imaging findings of histological RCC subtypes. (author)

  1. Hidradenocarcinoma: a histological and immunohistochemical study.

    Science.gov (United States)

    Ko, Christine J; Cochran, Alistair J; Eng, William; Binder, Scott W

    2006-11-01

    The diagnosis of hidradenocarcinoma is difficult due to a combination of factors including inconsistent nomenclature/ classification, rarity of the neoplasm, and variable morphology of cells composing the neoplasm. Immunohistochemistry has not been previously performed on a series of hidradenocarcinomas. We evaluated six cases of hidradenocarcinoma histologically and immunohistochemically using antibodies to gross cystic disease fluid protein-15 (GCDFP-15), carcino-embryonic antigen (CEA), epithelial membrane antigen (EMA), S-100 protein, keratin AE1/3, cytokeratin 5/6, p53, bcl-1, bcl-2, and Ki67. Histology suggested concurrent eccrine and apocrine differentiation of the cases. Ki67 and p53 staining was strongly positive in five of six tumors. The neoplasms stained with antibodies to CEA, S-100 protein, GCDFP-15, EMA, bcl-1, and bcl-2 in no consistent pattern. All tumors studied stained positively for keratin AE1/3 and cytokeratin 5/6. In making the diagnosis of hidradenocarcinoma, it may be unnecessary to separate hidradenocarcinoma into eccrine and apocrine categories, and although Ki67 and p53 may be helpful, histological parameters remain paramount.

  2. 45 CFR 1626.7 - Verification of eligible alien status.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Verification of eligible alien status. 1626.7... CORPORATION RESTRICTIONS ON LEGAL ASSISTANCE TO ALIENS § 1626.7 Verification of eligible alien status. (a) An alien seeking representation shall submit appropriate documents to verify eligibility, unless the only...

  3. A Quantitative Approach to the Formal Verification of Real-Time Systems.

    Science.gov (United States)

    1996-09-01

    Computer Science A Quantitative Approach to the Formal Verification of Real - Time Systems Sergio Vale Aguiar Campos September 1996 CMU-CS-96-199...ptisiic raieaiSI v Diambimos Lboiamtad _^ A Quantitative Approach to the Formal Verification of Real - Time Systems Sergio Vale Aguiar Campos...implied, of NSF, the Semiconduc- tor Research Corporation, ARPA or the U.S. government. Keywords: real - time systems , formal verification, symbolic

  4. Distorted Fingerprint Verification System

    Directory of Open Access Journals (Sweden)

    Divya KARTHIKAESHWARAN

    2011-01-01

    Full Text Available Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.

  5. Enhanced verification test suite for physics simulation codes

    Energy Technology Data Exchange (ETDEWEB)

    Kamm, James R.; Brock, Jerry S.; Brandon, Scott T.; Cotrell, David L.; Johnson, Bryan; Knupp, Patrick; Rider, William J.; Trucano, Timothy G.; Weirs, V. Gregory

    2008-09-01

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations.

  6. Vitamin D3 May Ameliorate the Ketoconazole Induced Adrenal Injury: Histological and Immunohistochemical Studies on Albino Rats

    International Nuclear Information System (INIS)

    Khalil, Mahmoud Salah

    2015-01-01

    Ketoconazole (KZ) is used widely for treating the superficial, systemic fungal activities and hyperandrogenemic states. Its uses are limited by its deleterious effect on histological structure and function of the adrenal cortex. This study investigates whether vitamin D3 supplement can ameliorate the morphological changes induced by KZ. Thirty four adult male albino rats were randomized into control group (Group I) which was subdivided into: control 1 (n=7) and control 2 (n=7): In control 1, rats were intraperitoneal (I.P) injected once with 1 ml of polyethylene glycol-400 for 15 consecutive days and control 2 rats were injected I.P with (1 μg/kg) of vitamin D3 for the same period. Group II (n=10): rats were I.P injected with KZ (10 mg/100 g of body weight) once daily for 15 days; Group III (n=10): rats were I.P concomitantly injected with KZ and vitamin D3 similar doses to animals in groups II and control 2 respectively. Blood samples were collected to determine plasma ACTH, corticosterone and aldosterone levels. The right adrenal specimens sections were stained with Haematoxylin & Eosin and Masson Trichrome for histological studies and treated with Bax, Ubiquitin and vitamin D receptors for immunohistochemical studies. KZ induced adrenal cortical morphological changes in forms of disturbed adrenocorticocyte cytological architecture, nuclear changes, and intracellular lipid accumulation. KZ also increased adrenal Bax and Ub but decreased the vitamin D receptors immunopositive staining expression, in addition to increased plasma ACTH as well as decreased corticosterone and aldosterone levels. These changes were ameliorated by supplementing with vitamin D3

  7. Test-driven verification/validation of model transformations

    Institute of Scientific and Technical Information of China (English)

    László LENGYEL; Hassan CHARAF

    2015-01-01

    Why is it important to verify/validate model transformations? The motivation is to improve the quality of the trans-formations, and therefore the quality of the generated software artifacts. Verified/validated model transformations make it possible to ensure certain properties of the generated software artifacts. In this way, verification/validation methods can guarantee different requirements stated by the actual domain against the generated/modified/optimized software products. For example, a verified/ validated model transformation can ensure the preservation of certain properties during the model-to-model transformation. This paper emphasizes the necessity of methods that make model transformation verified/validated, discusses the different scenarios of model transformation verification and validation, and introduces the principles of a novel test-driven method for verifying/ validating model transformations. We provide a solution that makes it possible to automatically generate test input models for model transformations. Furthermore, we collect and discuss the actual open issues in the field of verification/validation of model transformations.

  8. Histological Stains: A Literature Review and Case Study.

    Science.gov (United States)

    Alturkistani, Hani A; Tashkandi, Faris M; Mohammedsaleh, Zuhair M

    2015-06-25

    The history of histology indicates that there have been significant changes in the techniques used for histological staining through chemical, molecular biology assays and immunological techniques, collectively referred to as histochemistry. Early histologists used the readily available chemicals to prepare tissues for microscopic studies; these laboratory chemicals were potassium dichromate, alcohol and the mercuric chloride to harden cellular tissues. Staining techniques used were carmine, silver nitrate, Giemsa, Trichrome Stains, Gram Stain and Hematoxylin among others. The purpose of this research was to assess past and current literature reviews, as well as case studies, with the aim of informing ways in which histological stains have been improved in the modern age. Results from the literature review has indicated that there has been an improvement in histopathology and histotechnology in stains used. There has been a rising need for efficient, accurate and less complex staining procedures. Many stain procedures are still in use today, and many others have been replaced with new immunostaining, molecular, non-culture and other advanced staining techniques. Some staining methods have been abandoned because the chemicals required have been medically proven to be toxic. The case studies indicated that in modern histology a combination of different stain techniques are used to enhance the effectiveness of the staining process. Currently, improved histological stains, have been modified and combined with other stains to improve their effectiveness.

  9. Gradient pre-emphasis to counteract first-order concomitant fields on asymmetric MRI gradient systems.

    Science.gov (United States)

    Tao, Shengzhen; Weavers, Paul T; Trzasko, Joshua D; Shu, Yunhong; Huston, John; Lee, Seung-Kyun; Frigo, Louis M; Bernstein, Matt A

    2017-06-01

    To develop a gradient pre-emphasis scheme that prospectively counteracts the effects of the first-order concomitant fields for any arbitrary gradient waveform played on asymmetric gradient systems, and to demonstrate the effectiveness of this approach using a real-time implementation on a compact gradient system. After reviewing the first-order concomitant fields that are present on asymmetric gradients, we developed a generalized gradient pre-emphasis model assuming arbitrary gradient waveforms to counteract their effects. A numerically straightforward, easily implemented approximate solution to this pre-emphasis problem was derived that was compatible with the current hardware infrastructure of conventional MRI scanners for eddy current compensation. The proposed method was implemented on the gradient driver subsystem, and its real-time use was tested using a series of phantom and in vivo data acquired from two-dimensional Cartesian phase-difference, echo-planar imaging, and spiral acquisitions. The phantom and in vivo results demonstrated that unless accounted for, first-order concomitant fields introduce considerable phase estimation error into the measured data and result in images with spatially dependent blurring/distortion. The resulting artifacts were effectively prevented using the proposed gradient pre-emphasis. We have developed an efficient and effective gradient pre-emphasis framework to counteract the effects of first-order concomitant fields of asymmetric gradient systems. Magn Reson Med 77:2250-2262, 2017. © 2016 International Society for Magnetic Resonance in Medicine. © 2016 International Society for Magnetic Resonance in Medicine.

  10. Technical safety requirements control level verification

    International Nuclear Information System (INIS)

    STEWART, J.L.

    1999-01-01

    A Technical Safety Requirement (TSR) control level verification process was developed for the Tank Waste Remediation System (TWRS) TSRs at the Hanford Site in Richland, WA, at the direction of the US. Department of Energy, Richland Operations Office (RL). The objective of the effort was to develop a process to ensure that the TWRS TSR controls are designated and managed at the appropriate levels as Safety Limits (SLs), Limiting Control Settings (LCSs), Limiting Conditions for Operation (LCOs), Administrative Controls (ACs), or Design Features. The TSR control level verification process was developed and implemented by a team of contractor personnel with the participation of Fluor Daniel Hanford, Inc. (FDH), the Project Hanford Management Contract (PHMC) integrating contractor, and RL representatives. The team was composed of individuals with the following experience base: nuclear safety analysis; licensing; nuclear industry and DOE-complex TSR preparation/review experience; tank farm operations; FDH policy and compliance; and RL-TWRS oversight. Each TSR control level designation was completed utilizing TSR control logic diagrams and TSR criteria checklists based on DOE Orders, Standards, Contractor TSR policy, and other guidance. The control logic diagrams and criteria checklists were reviewed and modified by team members during team meetings. The TSR control level verification process was used to systematically evaluate 12 LCOs, 22 AC programs, and approximately 100 program key elements identified in the TWRS TSR document. The verification of each TSR control required a team consensus. Based on the results of the process, refinements were identified and the TWRS TSRs were modified as appropriate. A final report documenting key assumptions and the control level designation for each TSR control was prepared and is maintained on file for future reference. The results of the process were used as a reference in the RL review of the final TWRS TSRs and control suite. RL

  11. Verification Survey of Uranium Mine Remediation

    International Nuclear Information System (INIS)

    Ron, Stager

    2009-01-01

    The Canadian Nuclear Safety Commission (CNSC) contracted an independent verification of an intensive gamma radiation survey conducted by a mining company to demonstrate that remediation of disturbed areas was complete. This site was the first of the recent mines being decommissioned in Canada and experience gained here may be applied to other mines being decommissioned in the future. The review included examination of the site-specific basis for clean-up criteria and ALARA as required by CNSC guidance. A paper review of the company report was conducted to determine if protocols were followed and that the summarized results could be independently reproduced. An independent verification survey was conducted on parts of the site and comparisons were made between gamma radiation measurements from the verification survey and the original company survey. Some aspects of data collection using rate meters linked to GPS data loggers are discussed as are aspects for data management and analyses methods required for the large amount of data collected during these surveys. Recommendations were made for implementation of future surveys and reporting the data from those surveys in order to ensure that remediation was complete. (authors)

  12. Verification and validation of RADMODL Version 1.0

    International Nuclear Information System (INIS)

    Kimball, K.D.

    1993-03-01

    RADMODL is a system of linked computer codes designed to calculate the radiation environment following an accident in which nuclear materials are released. The RADMODL code and the corresponding Verification and Validation (V ampersand V) calculations (Appendix A), were developed for Westinghouse Savannah River Company (WSRC) by EGS Corporation (EGS). Each module of RADMODL is an independent code and was verified separately. The full system was validated by comparing the output of the various modules with the corresponding output of a previously verified version of the modules. The results of the verification and validation tests show that RADMODL correctly calculates the transport of radionuclides and radiation doses. As a result of this verification and validation effort, RADMODL Version 1.0 is certified for use in calculating the radiation environment following an accident

  13. Verification and validation of RADMODL Version 1.0

    Energy Technology Data Exchange (ETDEWEB)

    Kimball, K.D.

    1993-03-01

    RADMODL is a system of linked computer codes designed to calculate the radiation environment following an accident in which nuclear materials are released. The RADMODL code and the corresponding Verification and Validation (V&V) calculations (Appendix A), were developed for Westinghouse Savannah River Company (WSRC) by EGS Corporation (EGS). Each module of RADMODL is an independent code and was verified separately. The full system was validated by comparing the output of the various modules with the corresponding output of a previously verified version of the modules. The results of the verification and validation tests show that RADMODL correctly calculates the transport of radionuclides and radiation doses. As a result of this verification and validation effort, RADMODL Version 1.0 is certified for use in calculating the radiation environment following an accident.

  14. Climbing Bloom's Taxonomy Pyramid: Lessons from a Graduate Histology Course

    Science.gov (United States)

    Zaidi, Nikki B.; Hwang, Charles; Scott, Sara; Stallard, Stefanie; Purkiss, Joel; Hortsch, Michael

    2017-01-01

    Bloom's taxonomy was adopted to create a subject-specific scoring tool for histology multiple-choice questions (MCQs). This Bloom's Taxonomy Histology Tool (BTHT) was used to analyze teacher- and student-generated quiz and examination questions from a graduate level histology course. Multiple-choice questions using histological images were…

  15. Histologic prognosticators in feline osteosarcoma: a comparison with phenotypically similar canine osteosarcoma.

    Science.gov (United States)

    Dimopoulou, Maria; Kirpensteijn, Jolle; Moens, Hester; Kik, Marja

    2008-07-01

    To investigate the histologic characteristics of feline osteosarcoma (OS) and compare the histologic data with phenotypically comparable canine OS. The effects of histologic and clinical variables on survival statistics were evaluated. Retrospective study. Cats (n=62) and dogs (22). Medical records of 62 cats with OS were reviewed for clinically relevant data. Clinical outcome was obtained by telephone interview. Histologic characteristics of OS were classified using a standardized grading system. Histologic characteristics in 22 feline skeletal OS were compared with 22 canine skeletal OS of identical location and subtype. Prognostic variables for clinical outcome were determined using multivariate analysis. Feline OS was characterized by moderate to abundant cellular pleomorphism, low mitotic index, small to moderate amounts of matrix, high cellularity, and a moderate amount of necrosis. There was no significant difference between histologic variables in feline and canine OS. Histologic grade, surgery, and mitotic index significantly influenced clinical outcome as determined by multivariate analysis. Tumor invasion into vessels was not identified as a significant prognosticator. Feline and canine skeletal OS have similar histologic but different prognostic characteristics. Prognosis for cats with OS is related to histologic grade and mitotic index of the tumor.

  16. Online 3D EPID-based dose verification: Proof of concept

    Energy Technology Data Exchange (ETDEWEB)

    Spreeuw, Hanno; Rozendaal, Roel, E-mail: r.rozendaal@nki.nl; Olaciregui-Ruiz, Igor; González, Patrick; Mans, Anton; Mijnheer, Ben [Department of Radiation Oncology, The Netherlands Cancer Institute, Amsterdam 1066 CX (Netherlands); Herk, Marcel van [University of Manchester, Manchester Academic Health Science Centre, The Christie NHS Foundation Trust, Manchester M20 4BX (United Kingdom)

    2016-07-15

    Purpose: Delivery errors during radiotherapy may lead to medical harm and reduced life expectancy for patients. Such serious incidents can be avoided by performing dose verification online, i.e., while the patient is being irradiated, creating the possibility of halting the linac in case of a large overdosage or underdosage. The offline EPID-based 3D in vivo dosimetry system clinically employed at our institute is in principle suited for online treatment verification, provided the system is able to complete 3D dose reconstruction and verification within 420 ms, the present acquisition time of a single EPID frame. It is the aim of this study to show that our EPID-based dosimetry system can be made fast enough to achieve online 3D in vivo dose verification. Methods: The current dose verification system was sped up in two ways. First, a new software package was developed to perform all computations that are not dependent on portal image acquisition separately, thus removing the need for doing these calculations in real time. Second, the 3D dose reconstruction algorithm was sped up via a new, multithreaded implementation. Dose verification was implemented by comparing planned with reconstructed 3D dose distributions delivered to two regions in a patient: the target volume and the nontarget volume receiving at least 10 cGy. In both volumes, the mean dose is compared, while in the nontarget volume, the near-maximum dose (D2) is compared as well. The real-time dosimetry system was tested by irradiating an anthropomorphic phantom with three VMAT plans: a 6 MV head-and-neck treatment plan, a 10 MV rectum treatment plan, and a 10 MV prostate treatment plan. In all plans, two types of serious delivery errors were introduced. The functionality of automatically halting the linac was also implemented and tested. Results: The precomputation time per treatment was ∼180 s/treatment arc, depending on gantry angle resolution. The complete processing of a single portal frame

  17. Online 3D EPID-based dose verification: Proof of concept

    International Nuclear Information System (INIS)

    Spreeuw, Hanno; Rozendaal, Roel; Olaciregui-Ruiz, Igor; González, Patrick; Mans, Anton; Mijnheer, Ben; Herk, Marcel van

    2016-01-01

    Purpose: Delivery errors during radiotherapy may lead to medical harm and reduced life expectancy for patients. Such serious incidents can be avoided by performing dose verification online, i.e., while the patient is being irradiated, creating the possibility of halting the linac in case of a large overdosage or underdosage. The offline EPID-based 3D in vivo dosimetry system clinically employed at our institute is in principle suited for online treatment verification, provided the system is able to complete 3D dose reconstruction and verification within 420 ms, the present acquisition time of a single EPID frame. It is the aim of this study to show that our EPID-based dosimetry system can be made fast enough to achieve online 3D in vivo dose verification. Methods: The current dose verification system was sped up in two ways. First, a new software package was developed to perform all computations that are not dependent on portal image acquisition separately, thus removing the need for doing these calculations in real time. Second, the 3D dose reconstruction algorithm was sped up via a new, multithreaded implementation. Dose verification was implemented by comparing planned with reconstructed 3D dose distributions delivered to two regions in a patient: the target volume and the nontarget volume receiving at least 10 cGy. In both volumes, the mean dose is compared, while in the nontarget volume, the near-maximum dose (D2) is compared as well. The real-time dosimetry system was tested by irradiating an anthropomorphic phantom with three VMAT plans: a 6 MV head-and-neck treatment plan, a 10 MV rectum treatment plan, and a 10 MV prostate treatment plan. In all plans, two types of serious delivery errors were introduced. The functionality of automatically halting the linac was also implemented and tested. Results: The precomputation time per treatment was ∼180 s/treatment arc, depending on gantry angle resolution. The complete processing of a single portal frame

  18. Online 3D EPID-based dose verification: Proof of concept.

    Science.gov (United States)

    Spreeuw, Hanno; Rozendaal, Roel; Olaciregui-Ruiz, Igor; González, Patrick; Mans, Anton; Mijnheer, Ben; van Herk, Marcel

    2016-07-01

    Delivery errors during radiotherapy may lead to medical harm and reduced life expectancy for patients. Such serious incidents can be avoided by performing dose verification online, i.e., while the patient is being irradiated, creating the possibility of halting the linac in case of a large overdosage or underdosage. The offline EPID-based 3D in vivo dosimetry system clinically employed at our institute is in principle suited for online treatment verification, provided the system is able to complete 3D dose reconstruction and verification within 420 ms, the present acquisition time of a single EPID frame. It is the aim of this study to show that our EPID-based dosimetry system can be made fast enough to achieve online 3D in vivo dose verification. The current dose verification system was sped up in two ways. First, a new software package was developed to perform all computations that are not dependent on portal image acquisition separately, thus removing the need for doing these calculations in real time. Second, the 3D dose reconstruction algorithm was sped up via a new, multithreaded implementation. Dose verification was implemented by comparing planned with reconstructed 3D dose distributions delivered to two regions in a patient: the target volume and the nontarget volume receiving at least 10 cGy. In both volumes, the mean dose is compared, while in the nontarget volume, the near-maximum dose (D2) is compared as well. The real-time dosimetry system was tested by irradiating an anthropomorphic phantom with three VMAT plans: a 6 MV head-and-neck treatment plan, a 10 MV rectum treatment plan, and a 10 MV prostate treatment plan. In all plans, two types of serious delivery errors were introduced. The functionality of automatically halting the linac was also implemented and tested. The precomputation time per treatment was ∼180 s/treatment arc, depending on gantry angle resolution. The complete processing of a single portal frame, including dose verification, took

  19. Formal Verification of Real-Time System Requirements

    Directory of Open Access Journals (Sweden)

    Marcin Szpyrka

    2000-01-01

    Full Text Available The methodology of system requirements verification presented in this paper is a proposition of a practical procedure for reducing some negatives of the specification of requirements. The main problem that is considered is to create a complete description of the system requirements without any negatives. Verification of the initially defined requirements is based on the coloured Petri nets. Those nets are useful for testing some properties of system requirements such as completeness, consistency and optimality. An example ofthe litt controller is presented.

  20. Development of a histologically validated segmentation protocol for the hippocampal body.

    Science.gov (United States)

    Steve, Trevor A; Yasuda, Clarissa L; Coras, Roland; Lail, Mohjevan; Blumcke, Ingmar; Livy, Daniel J; Malykhin, Nikolai; Gross, Donald W

    2017-08-15

    Recent findings have demonstrated that hippocampal subfields can be selectively affected in different disease states, which has led to efforts to segment the human hippocampus with in vivo magnetic resonance imaging (MRI). However, no studies have examined the histological accuracy of subfield segmentation protocols. The presence of MRI-visible anatomical landmarks with known correspondence to histology represents a fundamental prerequisite for in vivo hippocampal subfield segmentation. In the present study, we aimed to: 1) develop a novel method for hippocampal body segmentation, based on two MRI-visible anatomical landmarks (stratum lacunosum moleculare [SLM] & dentate gyrus [DG]), and assess its accuracy in comparison to the gold standard direct histological measurements; 2) quantify the accuracy of two published segmentation strategies in comparison to the histological gold standard; and 3) apply the novel method to ex vivo MRI and correlate the results with histology. Ultra-high resolution ex vivo MRI was performed on six whole cadaveric hippocampal specimens, which were then divided into 22 blocks and histologically processed. The hippocampal bodies were segmented into subfields based on histological criteria and subfield boundaries and areas were directly measured. A novel method was developed using mean percentage of the total SLM distance to define subfield boundaries. Boundary distances and subfield areas on histology were then determined using the novel method and compared to the gold standard histological measurements. The novel method was then used to determine ex vivo MRI measures of subfield boundaries and areas, which were compared to histological measurements. For direct histological measurements, the mean percentages of total SLM distance were: Subiculum/CA1 = 9.7%, CA1/CA2 = 78.4%, CA2/CA3 = 97.5%. When applied to histology, the novel method provided accurate measures for CA1/CA2 (ICC = 0.93) and CA2/CA3 (ICC = 0.97) boundaries, but not for the

  1. Anatomy and Histology of the Human and Murine Prostate.

    Science.gov (United States)

    Ittmann, Michael

    2018-05-01

    The human and murine prostate glands have similar functional roles in the generation of seminal fluid to assist in reproduction. There are significant differences in the anatomy and histology of murine and human prostate and knowledge of the normal anatomy and histology of the murine prostate is essential to interpreting changes in genetically engineered mouse models. In this review, the normal anatomy and histology of both human and mouse prostate will be described. Copyright © 2018 Cold Spring Harbor Laboratory Press; all rights reserved.

  2. Finite Countermodel Based Verification for Program Transformation (A Case Study

    Directory of Open Access Journals (Sweden)

    Alexei P. Lisitsa

    2015-12-01

    Full Text Available Both automatic program verification and program transformation are based on program analysis. In the past decade a number of approaches using various automatic general-purpose program transformation techniques (partial deduction, specialization, supercompilation for verification of unreachability properties of computing systems were introduced and demonstrated. On the other hand, the semantics based unfold-fold program transformation methods pose themselves diverse kinds of reachability tasks and try to solve them, aiming at improving the semantics tree of the program being transformed. That means some general-purpose verification methods may be used for strengthening program transformation techniques. This paper considers the question how finite countermodels for safety verification method might be used in Turchin's supercompilation method. We extract a number of supercompilation sub-algorithms trying to solve reachability problems and demonstrate use of an external countermodel finder for solving some of the problems.

  3. Technical workshop on safeguards, verification technologies, and other related experience

    International Nuclear Information System (INIS)

    1998-01-01

    The aim of the Technical Workshop on safeguards was to encourage a clearer understanding of the IAEA Safeguards System, its origins and evolution and the present state of the art. Presentations held by the IAEA officials and outside experts examined as well other components of the non-proliferation regime, the current practices and procedures, and the future prospects. A series of presentations described the characteristics of the interaction between global and regional verification systems and described relevant past and present experience. Prominence given to such state of the art verification technologies as environmental sampling, satellite imaging and monitoring thorough remote and unattended techniques demonstrated, beyond any doubt, the essentially dynamic nature of verification. It is generally acknowledged that there have been major achievements in preventing spread of nuclear weapons, but no verification system can in itself prevent proliferation

  4. Technical workshop on safeguards, verification technologies, and other related experience

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-12-31

    The aim of the Technical Workshop on safeguards was to encourage a clearer understanding of the IAEA Safeguards System, its origins and evolution and the present state of the art. Presentations held by the IAEA officials and outside experts examined as well other components of the non-proliferation regime, the current practices and procedures, and the future prospects. A series of presentations described the characteristics of the interaction between global and regional verification systems and described relevant past and present experience. Prominence given to such state of the art verification technologies as environmental sampling, satellite imaging and monitoring thorough remote and unattended techniques demonstrated, beyond any doubt, the essentially dynamic nature of verification. It is generally acknowledged that there have been major achievements in preventing spread of nuclear weapons, but no verification system can in itself prevent proliferation Refs, figs, tabs

  5. Learning a Genetic Measure for Kinship Verification Using Facial Images

    Directory of Open Access Journals (Sweden)

    Lu Kou

    2015-01-01

    Full Text Available Motivated by the key observation that children generally resemble their parents more than other persons with respect to facial appearance, distance metric (similarity learning has been the dominant choice for state-of-the-art kinship verification via facial images in the wild. Most existing learning-based approaches to kinship verification, however, are focused on learning a genetic similarity measure in a batch learning manner, leading to less scalability for practical applications with ever-growing amount of data. To address this, we propose a new kinship verification approach by learning a sparse similarity measure in an online fashion. Experimental results on the kinship datasets show that our approach is highly competitive to the state-of-the-art alternatives in terms of verification accuracy, yet it is superior in terms of scalability for practical applications.

  6. The Radiation Response of Sarcomas by Histologic Subtypes: A Review With Special Emphasis Given to Results Achieved With Razoxane

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Purpose. Relatively few results are available in the literature about the radiation response of unresectable sarcomas in relation to their histology. Therefore, an attempt was made to summarize the present situation. Materials and methods. This report is based on a review of the literature and the author's own experience. Adult-type soft tissue sarcomas, chondrosarcomas, and chordomas were analyzed. Radioresponse was mainly associated with the degree of tumor shrinkage, that is, objective responses. Histopathologic responses, that is, the degree of necrosis, are only discussed in relation to radiation treatment reports of soft tissue sarcomas as a group. Results. Radiation therapy alone leads to major responses in about 50% of lipo-, fibro-, leiomyo-, or chondrosarcomas. The response rate is less than 50% in malignant fibrous histiocytomas, synovial, neurogenic, and other rare soft tissue sarcomas. The response rates may increase up to 75% through the addition of radiosensitizers such as halogenated pyrimidines or razoxane, or by the use of high-LET irradiation. Angiosarcomas become clearly more responsive if biologicals, angiomodulating, and/or tubulin affinic substances are given together with radiation therapy. Razoxane is able to increase the duration and quality of responses even in difficult-to-treat tumors like chondrosarcomas or chordomas. Conclusions. The available data demonstrate that the radioresponsiveness of sarcomas is very variable and dependent on histology, kind of radiation, and various concomitantly given drugs. The rate of complete sustained remissions by radiation therapy alone or in combination with drugs is still far from satisfactory although progress has been made through the use of sensitizing agents.

  7. Gastroesophageal reflux disease. Scintigraphic, endoscopic and histologic considerations

    Energy Technology Data Exchange (ETDEWEB)

    Kault, B.; Halvorsen, T.; Petersen, H.; Grette, K.; Myrvold, H.E.

    1986-01-01

    Radionucleotide scintigraphy and esophagoscopy with biopsy were carried out in 101 patients with symptoms strongly suggestive of gastroesophageal reflux (GER) disease. GER was visualized by scintigraphy in 86.1% of the patients. Endoscopic and histologic esophagitis were found in 68.1% and 58.4% of the patients, respectively, whereas both examinations taken together showed evidence of esophagitis in 82%. Histologic evidence of esophagitis was found in nearly all patients with severe endoscopic changes, and in 43.7% of the patients with no endoscopic abnormality. Scintigraphic reflux was demonstrated more frequently in the patients with severe endoscopic esophagitis (97.5%) than in those with no or only mild endoscopic changes (78.6%). Scintigraphic reflux was found in 91.5% and 78.5% of the patients with and without histologic evidence of esophagitis. 15 of the 18 patients (83.3%) without endoscopic and histologic abnormalities in the esophagus had scintigraphic evidence of reflux. The present study strongly supports the clinical significance of scintigraphy in GER disease and confirms that esophageal biopsy specimens increase the sensitivity of endoscopic evaluation. 31 refs.

  8. Towards Model Validation and Verification with SAT Techniques

    OpenAIRE

    Gogolla, Martin

    2010-01-01

    After sketching how system development and the UML (Unified Modeling Language) and the OCL (Object Constraint Language) are related, validation and verification with the tool USE (UML-based Specification Environment) is demonstrated. As a more efficient alternative for verification tasks, two approaches using SAT-based techniques are put forward: First, a direct encoding of UML and OCL with Boolean variables and propositional formulas, and second, an encoding employing an...

  9. Engineering a static verification tool for GPU kernels

    OpenAIRE

    Bardsley, E; Betts, A; Chong, N; Collingbourne, P; Deligiannis, P; Donaldson, AF; Ketema, J; Liew, D; Qadeer, S

    2014-01-01

    We report on practical experiences over the last 2.5 years related to the engineering of GPUVerify, a static verification tool for OpenCL and CUDA GPU kernels, plotting the progress of GPUVerify from a prototype to a fully functional and relatively efficient analysis tool. Our hope is that this experience report will serve the verification community by helping to inform future tooling efforts. ? 2014 Springer International Publishing.

  10. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses. Addendum

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards ( including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  11. Differentiated treatment of patients with acne and concomitant candida infection

    Directory of Open Access Journals (Sweden)

    Yaakubi Randa

    2016-12-01

    Full Text Available There are a lot of works, which are devoted to the study of acne, but these data are often contradictory on the issue of interrelationship and interdependence of clinical manifestations, course and some factors in the pathogenesis of acne and candida infection. Aim of the research was to study the effect of the recommended differentiated therapy on the pathogenetic disorders in patients with acne and concomitant Candida infection. Methods and results. 120 patients with acne were examined. In 100 of them concomitant skin malasseziosis was set in the form of pityriasis rosea, kerosis, comedones, folliculitis, seborrhea, multicolored zoster, with some features, as well as candidiasis. Methods of the research – bacterioscopic, bacteriological, study of skin oiliness and moisture, skin pH, the level of Ca ++, parathyroid hormone and calcitonin. In patients with acne significant shifts in the composition of water-lipid mantle, increased oiliness and decreased moisture of skin, pH changes with a shift to the alkaline side were revealed, the most pronounced – in acne patients with Candida infection. The content of Ca ++ in the organism, as well as parathyroid hormone and calcitonin was increased and also the most indicative it was in patients with acne and concomitant Candida infection. After the comparative analysis on the basis of different levels of clinical and laboratory violations two clinical-therapeutic groups were distinguished, in accordance with that the differentiated therapy offered by us was conducted. Increased oiliness and Рh of skin, decline of moisture before the treatment, especially in patients with III and IV stages of acne, complicated by Candida infection, were normalized after treatment, unlike in patients treated traditionally. Conclusion. After treatment intensity of microbal colonization and also microbal associations of skin was diminished, the level of Ca++, parathyroid hormone and calcitonin went down.

  12. Formal verification of reactor process control software using assertion checking environment

    International Nuclear Information System (INIS)

    Sharma, Babita; Balaji, Sowmya; John, Ajith K.; Bhattacharjee, A.K.; Dhodapkar, S.D.

    2005-01-01

    Assertion Checking Environment (ACE) was developed in-house for carrying out formal (rigorous/ mathematical) functional verification of embedded software written in MISRA C. MISRA C is an industrially sponsored safe sub-set of C programming language and is well accepted in the automotive and aerospace industries. ACE uses static assertion checking technique for verification of MISRA C programs. First the functional specifications of the program are derived from the specifications in the form of pre- and post-conditions for each C function. These pre- and post-conditions are then introduced as assertions (formal comments) in the program code. The annotated C code is then formally verified using ACE. In this paper we present our experience of using ACE for the formal verification of process control software of a nuclear reactor. The Software Requirements Document (SRD) contained textual specifications of the process control software. The SRD was used by the designers to draw logic diagrams which were given as input to a code generator. The verification of the generated C code was done at 2 levels viz. (i) verification against specifications derived from logic diagrams, and (ii) verification against specifications derived from SRD. In this work we checked approximately 600 functional specifications of the software having roughly 15000 lines of code. (author)

  13. Effect of Concomitant Birth Defects and Genetic Anomalies on Infant Mortality in Tetralogy of Fallot.

    Science.gov (United States)

    Jernigan, Eric G; Strassle, Paula D; Stebbins, Rebecca C; Meyer, Robert E; Nelson, Jennifer S

    2017-08-15

    A substantial proportion of infants born with tetralogy of Fallot (TOF) die in infancy. A better understanding of the heterogeneity associated with TOF, including extracardiac malformations and chromosomal anomalies is vital to stratifying risk and optimizing outcomes during infancy. Using the North Carolina Birth Defects Monitoring Program, infants diagnosed with TOF and born between 2003 and 2012 were included. Kaplan-Meier survival curves were used to estimate cumulative 1-year mortality, stratified by the presence of concomitant birth defects (BDs) and chromosomal anomalies. Multivariable logistic regression was used to estimate the direct effect of each concomitant BD, after adjusting for all others. A total of 496 infants with TOF were included, and 15% (n = 76) died. The number of concomitant BD systems was significantly associated with the risk of death at 1-year, p < 0.0001. Specifically, the risk of mortality was 8% among infants with TOF with or without additional cardiac defects, 16% among infants with TOF and 1 extracardiac BD system, 19% among infants with 2 extracardiac BD systems, and 39% among infants with ≥ 3 extracardiac BD systems. After adjustment, concomitant eye and gastrointestinal defects were significantly associated increased with 1-year mortality, odds ratio 2.83 (95% confidence interval, 1.08-7.32) and odds ratio 4.43 (95% confidence interval, 1.57, 12.45), respectively. Infants with trisomy 13 or trisomy 18 were also significantly more likely to die, p < 0.0001. Both concomitant BDs and genetic anomalies increase the risk of mortality among infants with TOF. Future studies are needed to identify the underlying genetic and socioeconomic risk factors for high-risk TOF infants. Birth Defects Research 109:1154-1165, 2017. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  14. IP cores design from specifications to production modeling, verification, optimization, and protection

    CERN Document Server

    Mohamed, Khaled Salah

    2016-01-01

    This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection. Various trade-offs in the design process are discussed, including  those associated with many of the most common memory cores, controller IPs  and system-on-chip (SoC) buses. Readers will also benefit from the author’s practical coverage of new verification methodologies. such as bug localization, UVM, and scan-chain.  A SoC case study is presented to compare traditional verification with the new verification methodologies. ·         Discusses the entire life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection; ·         Introduce a deep introduction for Verilog for both implementation and verification point of view.  ·         Demonstrates how to use IP in applications such as memory controllers and SoC buses. ·         Describes a new ver...

  15. VAMOS: The verification and monitoring options study: Current research options for in-situ monitoring and verification of contaminant remediation and containment within the vadose zone

    International Nuclear Information System (INIS)

    Betsill, J.D.; Gruebel, R.D.

    1995-09-01

    The Verification and Monitoring Options Study Project (VAMOS) was established to identify high-priority options for future vadose-zone environmental research in the areas of in-situ remediation monitoring, post-closure monitoring, and containment emplacement and verification monitoring. VAMOS examined projected needs not currently being met with applied technology in order to develop viable monitoring and verification research options. The study emphasized a compatible systems approach to reinforce the need for utilizing compatible components to provide user friendly site monitoring systems. To identify the needs and research options related to vadose-zone environmental monitoring and verification, a literature search and expert panel forums were conducted. The search included present drivers for environmental monitoring technology, technology applications, and research efforts. The forums included scientific, academic, industry, and regulatory environmental professionals as well as end users of environmental technology. The experts evaluated current and future monitoring and verification needs, methods for meeting these needs, and viable research options and directions. A variety of high-priority technology development, user facility, and technology guidance research options were developed and presented as an outcome of the literature search and expert panel forums

  16. An epidemiological study of concomitant use of Chinese medicine and antipsychotics in schizophrenic patients: implication for herb-drug interaction.

    Directory of Open Access Journals (Sweden)

    Zhang-Jin Zhang

    Full Text Available BACKGROUND: Herb-drug interactions are an important issue in drug safety and clinical practice. The aim of this epidemiological study was to characterize associations of clinical outcomes with concomitant herbal and antipsychotic use in patients with schizophrenia. METHODS AND FINDINGS: In this retrospective, cross-sectional study, 1795 patients with schizophrenia who were randomly selected from 17 psychiatric hospitals in China were interviewed face-to-face using a structured questionnaire. Association analyses were conducted to examine correlates between Chinese medicine (CM use and demographic, clinical variables, antipsychotic medication mode, and clinical outcomes. The prevalence of concomitant CM and antipsychotic treatment was 36.4% [95% confidence interval (95% CI 34.2%-38.6%]. Patients using concomitant CM had a significantly greater chance of improved outcomes than non-CM use (61.1% vs. 34.3%, OR = 3.44, 95% CI 2.80-4.24. However, a small but significant number of patients treated concomitantly with CM had a greater risk of developing worse outcomes (7.2% vs. 4.4%, OR = 2.06, 95% CI 2.06-4.83. Significant predictors for concomitant CM treatment-associated outcomes were residence in urban areas, paranoid psychosis, and exceeding 3 months of CM use. Herbal medicine regimens containing Radix Bupleuri, Fructus Gardenia, Fructus Schisandrae, Radix Rehmanniae, Akebia Caulis, and Semen Plantaginis in concomitant use with quetiapine, clozapine, and olanzepine were associated with nearly 60% of the risk of adverse outcomes. CONCLUSIONS: Concomitant herbal and antipsychotic treatment could produce either beneficial or adverse clinical effects in schizophrenic population. Potential herb-drug pharmacokinetic interactions need to be further evaluated.

  17. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    International Nuclear Information System (INIS)

    Luke, S.J.

    2011-01-01

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  18. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    Energy Technology Data Exchange (ETDEWEB)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  19. Verification of industrial x-ray machine: MINTs experience

    International Nuclear Information System (INIS)

    Aziz Amat; Saidi Rajab; Eesan Pasupathi; Saipo Bahari Abdul Ratan; Shaharudin Sayuti; Abd Nassir Ibrahim; Abd Razak Hamzah

    2005-01-01

    Radiation and electrical safety of the industrial x-ray equipment required to meet Atomic Energy Licensing Board(AELB) guidelines ( LEM/TEK/42 ) at the time of installation and subsequently a periodic verification should be ensured. The purpose of the guide is to explain the requirements employed in conducting the test on industrial x-ray apparatus and be certified in meeting with our local legislative and regulation. Verification is aimed to provide safety assurance information on electrical requirements and the minimum radiation exposure to the operator. This regulation is introduced on new models imported into the Malaysian market. Since June, 1997, Malaysian Institute for Nuclear Technology Research (MINT) has been approved by AELB to provide verification services to private company, government and corporate body throughout Malaysia. Early January 1997, AELB has made it mandatory that all x-ray equipment for industrial purpose (especially Industrial Radiography) must fulfill certain performance test based on the LEM/TEK/42 guidelines. MINT as the third party verification encourages user to improve maintenance of the equipment. MINT experiences in measuring the performance on intermittent and continuous duty rating single-phase industrial x-ray machine in the year 2004 indicated that all of irradiating apparatus tested pass the test and met the requirements of the guideline. From MINT record, 1997 to 2005 , three x-ray models did not meet the requirement and thus not allowed to be used unless the manufacturers willing to modify it to meet AELB requirement. This verification procedures on electrical and radiation safety on industrial x-ray has significantly improved the the maintenance cultures and safety awareness in the usage of x-ray apparatus in the industrial environment. (Author)

  20. Presumed Isotretinoin-Induced, Concomitant Autoimmune Thyroid Disease and Ocular Myasthenia Gravis: A Case Report

    Directory of Open Access Journals (Sweden)

    Huseyin Gursoy

    2012-11-01

    Full Text Available Introduction: There are many adverse effects that have been described for isotretinoin. To the best of our knowledge, this is the first report of a possible association of oral isotretinoin intake with autoimmune thyroiditis and ocular myasthenia gravis (OMG. Case Presentation: A 19-year-old Caucasian male, who had used oral isotretinoin for severe acne disease for the previous six months, was referred to our clinic. He had a three-week history of diplopia and variable bilateral ptosis. Physical examination showed moderate periorbital edema and limitations of up- and down-gaze in the left eye. Laboratory findings and thyroid ultrasound were consistent with autoimmune thyroiditis. Antithyroid therapy did not relieve the clinical symptoms. Concomitant OMG was suspected. Variable ptosis and a positive response to oral prednisolone of 40 mg/day and pyridostigmine of 360 mg/day supported the diagnosis of concomitant autoimmune thyroiditis and OMG. Conclusion: Autoimmune disorders may be triggered by oral isotretinoin treatment. Clinicians prescribing isotretinoin should be aware of the possible association between isotretinoin intake and concomitant autoimmune thyroiditis and OMG.

  1. Experimental preparation and verification of quantum money

    Science.gov (United States)

    Guan, Jian-Yu; Arrazola, Juan Miguel; Amiri, Ryan; Zhang, Weijun; Li, Hao; You, Lixing; Wang, Zhen; Zhang, Qiang; Pan, Jian-Wei

    2018-03-01

    A quantum money scheme enables a trusted bank to provide untrusted users with verifiable quantum banknotes that cannot be forged. In this work, we report a proof-of-principle experimental demonstration of the preparation and verification of unforgeable quantum banknotes. We employ a security analysis that takes experimental imperfections fully into account. We measure a total of 3.6 ×106 states in one verification round, limiting the forging probability to 10-7 based on the security analysis. Our results demonstrate the feasibility of preparing and verifying quantum banknotes using currently available experimental techniques.

  2. VBMC: a formal verification tool for VHDL programs

    International Nuclear Information System (INIS)

    Ajith, K.J.; Bhattacharjee, A.K.

    2014-01-01

    The design of Control and Instrumentation (C and I) systems used in safety critical applications such as nuclear power plants involves partitioning of the overall system functionality into subparts and implementing each subpart in hardware and/or software as appropriate. With increasing use of programmable devices like FPGA, the hardware subsystems are often implemented in Hardware Description Languages (HDL) like VHDL. Since the functional bugs in such hardware subsystems used in safety critical C and I systems have disastrous consequences, it is important to use rigorous reasoning to verify the functionalities of the HDL models. This paper describes an indigenously developed software tool named VBMC (VHDL Bounded Model Checker) for mathematically proving/refuting functional properties of hardware designs described in VHDL. VBMC accepts hardware design as VHDL program file, functional property in PSL, and verification bound (number of cycles of operation) as inputs. It either reports that the design satisfies the functional property for the given verification bound or generates a counter example providing the reason of violation. In case of satisfaction, the proof holds good for the verification bound. VBMC has been used for the functional verification of FPGA based intelligent I/O boards developed at Reactor Control Division, BARC. (author)

  3. VBMC: a formal verification tool for VHDL program

    International Nuclear Information System (INIS)

    Ajith, K.J.; Bhattacharjee, A.K.

    2014-08-01

    The design of Control and Instrumentation (C and I) systems used in safety critical applications such as nuclear power plants involves partitioning of the overall system functionality into sub-parts and implementing each sub-part in hardware and/or software as appropriate. With increasing use of programmable devices like FPGA, the hardware subsystems are often implemented in Hardware Description Languages (HDL) like VHDL. Since the functional bugs in such hardware subsystems used in safety critical C and I systems have serious consequences, it is important to use rigorous reasoning to verify the functionalities of the HDL models. This report describes the design of a software tool named VBMC (VHDL Bounded Model Checker). The capability of this tool is in proving/refuting functional properties of hardware designs described in VHDL. VBMC accepts design as a VHDL program file, functional property in PSL, and verification bound (number of cycles of operation) as inputs. It either reports that the design satisfies the functional property for the given verification bound or generates a counterexample providing the reason of violation. In case of satisfaction, the proof holds good for the verification bound. VBMC has been used for the functional verification of FPGA based intelligent I/O boards developed at Reactor Control Division, BARC. (author)

  4. Independent verification: operational phase liquid metal breeder reactors

    International Nuclear Information System (INIS)

    Bourne, P.B.

    1981-01-01

    The Fast Flux Test Facility (FFTF) recently achieved 100-percent power and now is in the initial stages of operation as a test reactor. An independent verification program has been established to assist in maintaining stable plant conditions, and to assure the safe operation of the reactor. Independent verification begins with the development of administrative procedures to control all other procedures and changes to the plant configurations. The technical content of the controlling procedures is subject to independent verification. The actual accomplishment of test procedures and operational maneuvers is witnessed by personnel not responsible for operating the plant. Off-normal events are analyzed, problem reports from other operating reactors are evaluated, and these results are used to improve on-line performance. Audits are used to confirm compliance with established practices and to identify areas where individual performance can be improved

  5. [Concomitant impact of organic pathology on the development of cognitive impairment in patients with attack-like paranoid schizophrenia].

    Science.gov (United States)

    Libin, L Ia; Tagil'tseva, A V; Lifanova, D E; Ganzenko, M A; Gritsevskaia, T M; Ivanov, M B

    2014-01-01

    The study included 47 patients (23 men, 24 women) with ICD-10 diagnosis of attack-like paranoid schizophrenia. Patients were divided into two groups: with- (25 patients) or without (22 patients) a concomitant organic disease. Memory, attention and thinking were assessed with psychometric tests. Inter- and intra-group differences were identified that indicated a considerable impact of a concomitant CNS organic pathology on the development of cognitive impairment in the schizophrenic process and active antipsychotic therapy. The data obtained can be used in the development of a differentiated approach to the treatment of patients with concomitant organic pathology.

  6. TWRS system drawings and field verification

    International Nuclear Information System (INIS)

    Shepard, D.G.

    1995-01-01

    The Configuration Management Program combines the TWRS Labeling and O and M drawing and drawing verification programs. The combined program will produce system drawings for systems that are normally operated or have maintenance performed on the system, label individual pieces of equipment for proper identification, even if system drawings are not warranted, and perform verification of drawings that are identified as essential in Tank Farm Essential Drawing Plans. During fiscal year 1994, work was begun to label Tank Farm components and provide user friendly system based drawings for Tank Waste Remediation System (TWRS) operations and maintenance. During the first half of fiscal 1995, the field verification program continued to convert TWRS drawings into CAD format and verify the accuracy based on visual inspections. During the remainder of fiscal year 1995 these efforts will be combined into a single program providing system based drawings and field verification of TWRS equipment and facilities. This combined program for TWRS will include all active systems for tank farms. Operations will determine the extent of drawing and labeling requirements for single shell tanks, i.e. the electrical distribution, HVAC, leak detection, and the radiation monitoring system. The tasks required to meet these objectives, include the following: identify system boundaries or scope for drawing being verified; label equipment/components in the process systems with a unique Equipment Identification Number (EIN) per the TWRS Data Standard; develop system drawings that are coordinated by ''smart'' drawing numbers and/or drawing references as identified on H-14-020000; develop a Master Equipment List (MEL) multi-user data base application which will contain key information about equipment identified in the field; and field verify and release TWRS Operation and Maintenance (O and M) drawings

  7. The effect of concomitant chemotherapy on parotid gland function following head and neck IMRT

    International Nuclear Information System (INIS)

    Miah, Aisha B.; Gulliford, Sarah L.; Bhide, Shreerang A.; Zaidi, Shane H.; Newbold, Kate L.; Harrington, Kevin J.; Nutting, Christopher M.

    2013-01-01

    Purpose: To determine whether concomitant chemotherapy increases the incidence of high grade xerostomia following parotid-sparing intensity-modulated radiotherapy (IMRT) in patients with locally advanced head and neck squamous cell cancer. Materials and methods: The incidence of high grade (⩾G2) acute (CTCAEv3.0) and late (LENTSOMA and RTOG) xerostomia was compared between patients treated with either IMRT or concomitant chemo-IMRT (c-IMRT) in 2 prospective studies. Parotid gland mean tolerance doses (D 50 ) were reported using non-linear logistic regression analysis. Results: Thirty-six patients received IMRT alone and 60 patients received c-IMRT. Patients received 65 Gy in 30 daily fractions to the primary site and involved nodal groups and 54 Gy in 30 fractions to elective nodal groups, mean doses to the parotid glands were comparable. Concomitant cisplatin 100 mg/m 2 was administered on days 1 and 29 of IMRT. The incidence of ⩾G2 subjective xerostomia was similar in both groups; acute-64.7% (IMRT) versus 60.3% (c-IMRT), p = 0.83; late-43% (IMRT) versus 34% (c-IMRT), p = 0.51. Recovery of parotid salivary flow at 1 year was higher with IMRT (64% vs 50%), but not statistically significant (p = 0.15). D 50 for absence of parotid saliva flow at 1 year was 23.2 Gy (95% CI: 17.7–28.7) for IMRT and 21.1 Gy (11.8–30.3) for c-IMRT. Conclusion: Concomitant c-IMRT does not increase the incidence of acute or late xerostomia relative to IMRT alone

  8. The effect of concomitant chemotherapy on parotid gland function following head and neck IMRT.

    Science.gov (United States)

    Miah, Aisha B; Gulliford, Sarah L; Bhide, Shreerang A; Zaidi, Shane H; Newbold, Kate L; Harrington, Kevin J; Nutting, Christopher M

    2013-03-01

    To determine whether concomitant chemotherapy increases the incidence of high grade xerostomia following parotid-sparing intensity-modulated radiotherapy (IMRT) in patients with locally advanced head and neck squamous cell cancer. The incidence of high grade (≥G2) acute (CTCAEv3.0) and late (LENTSOMA and RTOG) xerostomia was compared between patients treated with either IMRT or concomitant chemo-IMRT (c-IMRT) in 2 prospective studies. Parotid gland mean tolerance doses (D₅₀) were reported using non-linear logistic regression analysis. Thirty-six patients received IMRT alone and 60 patients received c-IMRT. Patients received 65 Gy in 30 daily fractions to the primary site and involved nodal groups and 54 Gy in 30 fractions to elective nodal groups, mean doses to the parotid glands were comparable. Concomitant cisplatin 100mg/m(2) was administered on days 1 and 29 of IMRT. The incidence of ≥G2 subjective xerostomia was similar in both groups; acute-64.7% (IMRT) versus 60.3% (c-IMRT), p=0.83; late-43% (IMRT) versus 34% (c-IMRT), p=0.51. Recovery of parotid salivary flow at 1 year was higher with IMRT (64% vs 50%), but not statistically significant (p=0.15). D₅₀ for absence of parotid saliva flow at 1 year was 23.2 Gy (95% CI: 17.7-28.7) for IMRT and 21.1 Gy (11.8-30.3) for c-IMRT. Concomitant c-IMRT does not increase the incidence of acute or late xerostomia relative to IMRT alone. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  9. CATS Deliverable 5.1 : CATS verification of test matrix and protocol

    OpenAIRE

    Uittenbogaard, J.; Camp, O.M.G.C. op den; Montfort, S. van

    2016-01-01

    This report summarizes the work conducted within work package (WP) 5 "Verification of test matrix and protocol" of the Cyclist AEB testing system (CATS) project. It describes the verification process of the draft CATS test matrix resulting from WP1 and WP2, and the feasibility of meeting requirements set by CATS consortium based on requirements in Euro NCAP AEB protocols regarding accuracy, repeatability and reproducibility using the developed test hardware. For the cases where verification t...

  10. Formal verification of industrial control systems

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Verification of critical software is a high priority but a challenging task for industrial control systems. For many kinds of problems, testing is not an efficient method. Formal methods, such as model checking appears to be an appropriate complementary method. However, it is not common to use model checking in industry yet, as this method needs typically formal methods expertise and huge computing power. In the EN-ICE-PLC section, we are working on a [methodology][1] and a tool ([PLCverif][2]) to overcome these challenges and to integrate formal verification in the development process of our PLC-based control systems. [1]: http://cern.ch/project-plc-formalmethods [2]: http://cern.ch/plcverif

  11. Focussed approach to verification under FMCT

    International Nuclear Information System (INIS)

    Bragin, V.; Carlson, J.; Bardsley, J.; Hill, J.

    1998-01-01

    FMCT will have different impacts on individual states due to the enormous variance in their nuclear fuel cycles and the associated fissile material inventories. The problem is how to negotiate a treaty that would achieve results favourable for all participants, given that interests and priorities vary so much. We believe that focussed verification, confined to safeguarding of enrichment and reprocessing facilities in NWS and TS, coupled with verification of unirradiated direct-use material produced after entry-into-force of a FMCT and supported with measures to detect possible undeclared enrichment and reprocessing activities, is technically adequate for the FMCT. Eventually this would become the appropriate model for all states party to the NPT

  12. Formal Development and Verification of a Distributed Railway Control System

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, Jan

    1999-01-01

    In this article we introduce the concept for a distributed railway control system and present the specification and verification of the main algorithm used for safe distributed control. Our design and verification approach is based on the RAISE method, starting with highly abstract algebraic...

  13. Formal Development and Verification of a Distributed Railway Control System

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, Jan

    1998-01-01

    In this article we introduce the concept for a distributed railway control system and present the specification and verification of the main algorithm used for safe distributed control. Our design and verification approach is based on the RAISE method, starting with highly abstract algebraic spec...

  14. Radioresponse of thymomas verified with histologic reponse

    Energy Technology Data Exchange (ETDEWEB)

    Ohara, Kiyoshi; Tatsuzaki, Hideo; Okumura, Toshiyuki; Itai, Yuji [Dept. of Radiology, Tsukuba Univ., Tsukuba City (Japan)]|[Inst. of Clinical Medicine, Tsukuba Univ., Tsukuba City (Japan); Fuji, Hiroshi [Dept. of Radiology, Tsukuba Univ., Tsukuba City (Japan); Sugahara, Shinji [Dept. of Radiology, Hitachi General Hospital, Hitachi City (Japan); Akaogi, Eiichi; Onizuka, Masataka; Ishikawa, Shigemi; Mitsui, Kiyofumi [Dept. of Surgery, Tsukuba Univ., Tsukuba City (Japan)]|[Inst. of Clinical Medicine, Tsukuba Univ., Tsukuba City (Japan)

    1998-12-31

    Patterns of radiologic response of 10 thymomas treated by preoperative radiotherapy (RT) (18-20 Gy/2 weeks) were determined in conjunction with histologic response. Changes in tumor volume were evaluated with CT scans obtained 5 to 36 days before and 14 to 24 days after the initiation of RT and before surgery. The extent of tumor volume reduction (TR) varied widely (40-78%), while the mean daily volume decrement expressed as a percentage of the pre-RT tumor volume correlated significantly with the pre-RT tumor volume. Histologically, the tumors, all of which were resected 17 to 33 days after RT initiation, generally consisted of predominant fibrous tissues, rare necrotic foci, and few epithelial cells. The TR did not correlate with pre-RT tumor volume, observation period, histologic subtype, or quantity of remaining epithelial cells. The TR of thymomas does not predict RT impact on tumor cells but does reflect the quantity of inherent tumor stroma. (orig.)

  15. Radioresponse of thymomas verified with histologic reponse

    International Nuclear Information System (INIS)

    Ohara, Kiyoshi; Tatsuzaki, Hideo; Okumura, Toshiyuki; Itai, Yuji; Fuji, Hiroshi; Sugahara, Shinji; Akaogi, Eiichi; Onizuka, Masataka; Ishikawa, Shigemi; Mitsui, Kiyofumi

    1998-01-01

    Patterns of radiologic response of 10 thymomas treated by preoperative radiotherapy (RT) (18-20 Gy/2 weeks) were determined in conjunction with histologic response. Changes in tumor volume were evaluated with CT scans obtained 5 to 36 days before and 14 to 24 days after the initiation of RT and before surgery. The extent of tumor volume reduction (TR) varied widely (40-78%), while the mean daily volume decrement expressed as a percentage of the pre-RT tumor volume correlated significantly with the pre-RT tumor volume. Histologically, the tumors, all of which were resected 17 to 33 days after RT initiation, generally consisted of predominant fibrous tissues, rare necrotic foci, and few epithelial cells. The TR did not correlate with pre-RT tumor volume, observation period, histologic subtype, or quantity of remaining epithelial cells. The TR of thymomas does not predict RT impact on tumor cells but does reflect the quantity of inherent tumor stroma. (orig.)

  16. Time-space modal logic for verification of bit-slice circuits

    Science.gov (United States)

    Hiraishi, Hiromi

    1996-03-01

    The major goal of this paper is to propose a new modal logic aiming at formal verification of bit-slice circuits. The new logic is called as time-space modal logic and its major feature is that it can handle two transition relations: one for time transition and the other for space transition. As for a verification algorithm, a symbolic model checking algorithm of the new logic is shown. This could be applicable to verification of bit-slice microprocessor of infinite bit width and 1D systolic array of infinite length. A simple benchmark result shows the effectiveness of the proposed approach.

  17. Verification of a Fissile Material Cut-off Treaty (FMCT): The Potential Role of the IAEA

    International Nuclear Information System (INIS)

    Chung, Jin Ho

    2016-01-01

    The objective of a future verification of a FMCT(Fissile Material Cut-off Treaty) is to deter and detect non-compliance with treaty obligations in a timely and non-discriminatory manner with regard to banning the production of fissile material for nuclear weapons or other nuclear devices. Since the International Atomic Energy Agency (IAEA) has already established the IAEA safeguards as a verification system mainly for Non -Nuclear Weapon States (NNWSs), it is expected that the IAEA's experience and expertise in this field will make a significant contribution to setting up a future treaty's verification regime. This paper is designed to explore the potential role of the IAEA in verifying the future treaty by analyzing verification abilities of the Agency in terms of treaty verification and expected challenges. Furthermore, the concept of multilateral verification that could be facilitated by the IAEA will be examined as a measure of providing a credible assurance of compliance with a future treaty. In this circumstance, it is necessary for the IAEA to be prepared for playing a leading role in FMCT verifications as a form of multilateral verification by taking advantage of its existing verification concepts, methods, and tools. Also, several challenges that the Agency faces today need to be overcome, including dealing with sensitive and proliferative information, attribution of fissile materials, lack of verification experience in military fuel cycle facilities, and different attitude and culture towards verification between NWSs and NNWSs

  18. Verification of a Fissile Material Cut-off Treaty (FMCT): The Potential Role of the IAEA

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Jin Ho [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-05-15

    The objective of a future verification of a FMCT(Fissile Material Cut-off Treaty) is to deter and detect non-compliance with treaty obligations in a timely and non-discriminatory manner with regard to banning the production of fissile material for nuclear weapons or other nuclear devices. Since the International Atomic Energy Agency (IAEA) has already established the IAEA safeguards as a verification system mainly for Non -Nuclear Weapon States (NNWSs), it is expected that the IAEA's experience and expertise in this field will make a significant contribution to setting up a future treaty's verification regime. This paper is designed to explore the potential role of the IAEA in verifying the future treaty by analyzing verification abilities of the Agency in terms of treaty verification and expected challenges. Furthermore, the concept of multilateral verification that could be facilitated by the IAEA will be examined as a measure of providing a credible assurance of compliance with a future treaty. In this circumstance, it is necessary for the IAEA to be prepared for playing a leading role in FMCT verifications as a form of multilateral verification by taking advantage of its existing verification concepts, methods, and tools. Also, several challenges that the Agency faces today need to be overcome, including dealing with sensitive and proliferative information, attribution of fissile materials, lack of verification experience in military fuel cycle facilities, and different attitude and culture towards verification between NWSs and NNWSs.

  19. Period prevalence of concomitant psychotropic medication usage among children and adolescents with attention-deficit/hyperactivity disorder during 2009.

    Science.gov (United States)

    Betts, Keith A; Sikirica, Vanja; Hodgkins, Paul; Zhou, Zhou; Xie, Jipan; DeLeon, Anthony; Erder, M Haim; Wu, Eric Q

    2014-06-01

    Stimulants are recommended as a first-line treatment for attention- deficit/hyperactivity disorder (ADHD); however, a subset of the patient population augments their stimulant treatment with other medications. The objective of this study was to estimate the 1 year period prevalence of concomitant psychotropic medication use among children and adolescents with ADHD during 2009. Patients 6-17 years of age with one or more primary ADHD diagnoses between July 1, 2008 and December 31, 2009 and one or more stimulant prescription fills during 2009 were identified from a large United States commercial claims database. Concomitant psychotropic medication use, defined as 30 days of continuous medication supply overlap between the augmenting agent and stimulant, was evaluated for 14 distinct psychotropic medication categories (6 with a United States Food and Drug Administration (FDA) approved indication for ADHD, 8 without an indication for ADHD). The 1 year period prevalence of concomitant psychotropic medication use (both overall and within each medication category) was calculated and compared between patients with and without psychiatric or neurologic comorbidities. Children (6-12 years) and adolescents (13-17 years) were evaluated separately. A total of 71,201 children and 49,959 adolescents met the inclusion criteria. The 1 year period prevalence of concomitant psychotropic medication use among children and adolescents was 20.3% and 23.4%, with 5.7% and 6.7% augmenting with two or more medication categories, respectively. The most common concomitant medication categories were selective serotonin reuptake inhibitors (SSRIs) (children: 6.2%; adolescents: 11.4%), atypical antipsychotics (5.8%; 6.8%) and clonidine immediate release (5.4%; 2.9%). Children and adolescents with psychiatric or neurologic comorbidities had higher rates of augmentation than did those without comorbidities (all p<0.001). This epidemiologic study found that the prevalence of concomitant psychotropic

  20. Racial difference in histologic subtype of renal cell carcinoma

    International Nuclear Information System (INIS)

    Olshan, Andrew F; Kuo, Tzy-Mey; Meyer, Anne-Marie; Nielsen, Matthew E; Purdue, Mark P; Rathmell, W Kimryn

    2013-01-01

    In the United States, renal cell carcinoma (RCC) has rapidly increased in incidence for over two decades. The most common histologic subtypes of RCC, clear cell, papillary, and chromophobe have distinct genetic and clinical characteristics; however, epidemiologic features of these subtypes have not been well characterized, particularly regarding any associations between race, disease subtypes, and recent incidence trends. Using data from the Surveillance, Epidemiology, and End Results (SEER) Program, we examined differences in the age-adjusted incidence rates and trends of RCC subtypes, including analysis focusing on racial differences. Incidence rates increased over time (2001–2009) for all three subtypes. However, the proportion of white cases with clear cell histology was higher than among blacks (50% vs. 31%, respectively), whereas black cases were more likely than white cases to have papillary RCC (23% vs. 9%, respectively). Moreover, papillary RCC incidence increased more rapidly for blacks than whites (P < 0.01) over this period. We also observed that increased incidence of papillary histology among blacks is not limited to the smallest size strata. We observed racial differences in proportionate incidence of RCC subtypes, which appear to be increasing over time; this novel finding motivates further etiologic, clinical, molecular, and genetic studies. Using national data, we observed a higher proportion of black renal cell carcinoma (RCC) cases with papillary histology compared to Caucasian cases. We also observed time trends in black-white incidence differences in histologic RCC subtypes, with rapid increases in the disproportionate share of black cases with papillary histology

  1. SoC Design Approach Using Convertibility Verification

    Directory of Open Access Journals (Sweden)

    Basu Samik

    2008-01-01

    Full Text Available Abstract Compositional design of systems on chip from preverified components helps to achieve shorter design cycles and time to market. However, the design process is affected by the issue of protocol mismatches, where two components fail to communicate with each other due to protocol differences. Convertibility verification, which involves the automatic generation of a converter to facilitate communication between two mismatched components, is a collection of techniques to address protocol mismatches. We present an approach to convertibility verification using module checking. We use Kripke structures to represent protocols and the temporal logic to describe desired system behavior. A tableau-based converter generation algorithm is presented which is shown to be sound and complete. We have developed a prototype implementation of the proposed algorithm and have used it to verify that it can handle many classical protocol mismatch problems along with SoC problems. The initial idea for -based convertibility verification was presented at SLA++P '07 as presented in the work by Roopak Sinha et al. 2008.

  2. Survey of Verification and Validation Techniques for Small Satellite Software Development

    Science.gov (United States)

    Jacklin, Stephen A.

    2015-01-01

    The purpose of this paper is to provide an overview of the current trends and practices in small-satellite software verification and validation. This document is not intended to promote a specific software assurance method. Rather, it seeks to present an unbiased survey of software assurance methods used to verify and validate small satellite software and to make mention of the benefits and value of each approach. These methods include simulation and testing, verification and validation with model-based design, formal methods, and fault-tolerant software design with run-time monitoring. Although the literature reveals that simulation and testing has by far the longest legacy, model-based design methods are proving to be useful for software verification and validation. Some work in formal methods, though not widely used for any satellites, may offer new ways to improve small satellite software verification and validation. These methods need to be further advanced to deal with the state explosion problem and to make them more usable by small-satellite software engineers to be regularly applied to software verification. Last, it is explained how run-time monitoring, combined with fault-tolerant software design methods, provides an important means to detect and correct software errors that escape the verification process or those errors that are produced after launch through the effects of ionizing radiation.

  3. HISTOLOGY ATLAS FOR STUDENTS MADE BY STUDENTS: OUR CHALLENGING EXPERIENCE

    OpenAIRE

    Andreas Salagean; Andreas Zoric; Erik Jan Dijkstra

    2017-01-01

    Do you remember your first histology lesson? If so, what were your first thoughts and impressions? Exactly one year ago we were struggling with the exact same problematic. Looking through the objective lens of a microscope can be very challenging in the beginning. After putting enormous effort and time into understanding basic histology, the idea arose to create something that makes histology not necessarily easier itself, but easier to understand. Fortunately our idea...

  4. Evaluation and reliability of bone histological age estimation methods

    African Journals Online (AJOL)

    Human age estimation at death plays a vital role in forensic anthropology and bioarchaeology. Researchers used morphological and histological methods to estimate human age from their skeletal remains. This paper discussed different histological methods that used human long bones and ribs to determine age ...

  5. Clinical results of a concomitant boost radiotherapy technique for muscle-invasive bladder cancer

    Energy Technology Data Exchange (ETDEWEB)

    Piet, A H.M.; Hulshof, M C.C.M.; Pieters, B R; Koning, C C.E. [Dept. of Radiation Oncology, Academic Medical Center, Univ. of Amsterdam (Netherlands); Pos, F J [Dept. of Radiation Oncology, The Netherlands Cancer Inst., Antoni van Leeuwenhoek Hospital, Amsterdam (Netherlands); Reijke, T.M. de [Dept. of Urology, Academic Medical Center, Univ. of Amsterdam (Netherlands)

    2008-06-15

    Purpose: to update the results of external radiotherapy with a focal concomitant boost technique on local control and bladder function in patients with muscle-invasive bladder cancer. Patients and methods: the authors retrospectively evaluated 92 elderly or disabled patients with localized T2-4 N0-1 M0 transitional cell carcinoma of the bladder and a median age of 79 years, not suitable for radical surgery and treated between 1994 and 2005. Treatment consisted of a dose of 40 Gy/2 Gy to the small pelvis with a daily concomitant boost of 0.75 Gy to the tumor. Total dose was 55 Gy in 4 weeks. Results: complete remission rate after evaluation by means of cystoscopy at 3 months was 78%. 3-year local control rate amounted to 56%, and 3-year overall survival to 36%. The posttreatment bladder capacity was comparable with the pretreatment capacity and was {>=} 200 ml in 81% of the cases. Mean bladder capacity did not deteriorate at longer follow-up. Conclusion: the local control rate after external beam radiotherapy in elderly patients with a focal concomitant boost for localized muscle-invasive bladder cancer was 56% at 3 years. Functional bladder outcome was good. (orig.)

  6. Clinical results of a concomitant boost radiotherapy technique for muscle-invasive bladder cancer

    International Nuclear Information System (INIS)

    Piet, A.H.M.; Hulshof, M.C.C.M.; Pieters, B.R.; Koning, C.C.E.; Pos, F.J.; Reijke, T.M. de

    2008-01-01

    Purpose: to update the results of external radiotherapy with a focal concomitant boost technique on local control and bladder function in patients with muscle-invasive bladder cancer. Patients and methods: the authors retrospectively evaluated 92 elderly or disabled patients with localized T2-4 N0-1 M0 transitional cell carcinoma of the bladder and a median age of 79 years, not suitable for radical surgery and treated between 1994 and 2005. Treatment consisted of a dose of 40 Gy/2 Gy to the small pelvis with a daily concomitant boost of 0.75 Gy to the tumor. Total dose was 55 Gy in 4 weeks. Results: complete remission rate after evaluation by means of cystoscopy at 3 months was 78%. 3-year local control rate amounted to 56%, and 3-year overall survival to 36%. The posttreatment bladder capacity was comparable with the pretreatment capacity and was ≥ 200 ml in 81% of the cases. Mean bladder capacity did not deteriorate at longer follow-up. Conclusion: the local control rate after external beam radiotherapy in elderly patients with a focal concomitant boost for localized muscle-invasive bladder cancer was 56% at 3 years. Functional bladder outcome was good. (orig.)

  7. Verification of 3-D generation code package for neutronic calculations of WWERs

    International Nuclear Information System (INIS)

    Sidorenko, V.D.; Aleshin, S.S.; Bolobov, P.A.; Bolshagin, S.N.; Lazarenko, A.P.; Markov, A.V.; Morozov, V.V.; Syslov, A.A.; Tsvetkov, V.M.

    2000-01-01

    Materials on verification of the 3 -d generation code package for WWERs neutronic calculations are presented. The package includes: - spectral code TVS-M; - 2-D fine mesh diffusion code PERMAK-A for 4- or 6-group calculation of WWER core burnup; - 3-D coarse mesh diffusion code BIPR-7A for 2-group calculations of quasi-stationary WWERs regimes. The materials include both TVS-M verification data and verification data on PERMAK-A and BIPR-7A codes using constant libraries generated with TVS-M. All materials are related to the fuel without Gd. TVS-M verification materials include results of comparison both with benchmark calculations obtained by other codes and with experiments carried out at ZR-6 critical facility. PERMAK-A verification materials contain results of comparison with TVS-M calculations and with ZR-6 experiments. BIPR-7A materials include comparison with operation data for Dukovany-2 and Loviisa-1 NPPs (WWER-440) and for Balakovo NPP Unit 4 (WWER-1000). The verification materials demonstrate rather good accuracy of calculations obtained with the use of code package of the 3 -d generation. (Authors)

  8. Using SysML for verification and validation planning on the Large Synoptic Survey Telescope (LSST)

    Science.gov (United States)

    Selvy, Brian M.; Claver, Charles; Angeli, George

    2014-08-01

    This paper provides an overview of the tool, language, and methodology used for Verification and Validation Planning on the Large Synoptic Survey Telescope (LSST) Project. LSST has implemented a Model Based Systems Engineering (MBSE) approach as a means of defining all systems engineering planning and definition activities that have historically been captured in paper documents. Specifically, LSST has adopted the Systems Modeling Language (SysML) standard and is utilizing a software tool called Enterprise Architect, developed by Sparx Systems. Much of the historical use of SysML has focused on the early phases of the project life cycle. Our approach is to extend the advantages of MBSE into later stages of the construction project. This paper details the methodology employed to use the tool to document the verification planning phases, including the extension of the language to accommodate the project's needs. The process includes defining the Verification Plan for each requirement, which in turn consists of a Verification Requirement, Success Criteria, Verification Method(s), Verification Level, and Verification Owner. Each Verification Method for each Requirement is defined as a Verification Activity and mapped into Verification Events, which are collections of activities that can be executed concurrently in an efficient and complementary way. Verification Event dependency and sequences are modeled using Activity Diagrams. The methodology employed also ties in to the Project Management Control System (PMCS), which utilizes Primavera P6 software, mapping each Verification Activity as a step in a planned activity. This approach leads to full traceability from initial Requirement to scheduled, costed, and resource loaded PMCS task-based activities, ensuring all requirements will be verified.

  9. Histology of periapical lesions obtained during apical surgery.

    Science.gov (United States)

    Schulz, Malte; von Arx, Thomas; Altermatt, Hans Jörg; Bosshardt, Dieter

    2009-05-01

    The aim of this was to evaluate the histology of periapical lesions in teeth treated with periapical surgery. After root-end resection, the root tip was removed together with the periapical pathological tissue. Histologic sectioning was performed on calcified specimens embedded in methylmethacrylate (MMA) and on demineralized specimens embedded in LR White (Fluka, Buchs, Switzerland). The samples were evaluated with light and transmission electron microscopy (TEM). The histologic findings were classified into periapical abscesses, granulomas, or cystic lesions (true or pocket cysts). The final material comprised 70% granulomas, 23% cysts and 5% abscesses, 1% scar tissues, and 1% keratocysts. Six of 125 samples could not be used. The cystic lesions could not be subdivided into pocket or true cysts. All cysts had an epithelium-lined cavity, two of them with cilia-lined epithelium. These results show the high incidence of periapical granulomas among periapical lesions obtained during apical surgery. Periapical abscesses were a rare occasion. The histologic findings from samples obtained during apical surgery may differ from findings obtained by teeth extractions. A determination between pocket and true apical cysts is hardly possible when collecting samples by apical surgery.

  10. Histologic correlation of MR signal intensity in parathyroid adenomas

    International Nuclear Information System (INIS)

    Rumancik, W.M.; Khan, A.; Mir, R.N.; Attie, J.N.; Davis, J.E.; Ashtari, M.; Herman, P.G.

    1988-01-01

    The classic MR signal intensity pattern of parathyroid adenoma (PTA) is bright enhancement on T2-weighted images. However, variations in SI pattern have been observed in clinical practice. The purpose of this report is to describe the histologic characteristics of surgically removed PTAs as correlated with their in vivo MR imaging appearance. From May 1987 to April 1988, 51 consecutive patients with primary hyperparathyroidism were evaluated with MR imaging for preoperative localization of PTA. Surgical confirmation was obtained in all patients, with histologic evaluation available in 40. MR imaging was performed on 1.0-T system (Siemens, Magnetom) using a Helmhotz surface coil positioned at the neck. Spin-echo T1-weighted and T2-weighted multisection images were evaluated retrospectively. Signal intensities of PTA, adjacent thyroid, fat, and skeletal muscle were obtained (1) from direct region of interest determinations, and (2) visually as respective relationships of PTA to thyroid, fat, and muscle. Histologic classification was graded for (1) predominant cell type (i.e., chief or oxyphil cells), (2) acinar or solid growth pattern, (3) cystic change, (4) presence or absence of residual fat, (5) cell count per high power field, (6) heterogeneous histology, (7) gland weight, and (8) giant size (≥3 cm). The relationship of MR signal intensity to histology appears multifactorial

  11. Validation and verification plan for safety and PRA codes

    International Nuclear Information System (INIS)

    Ades, M.J.; Crowe, R.D.; Toffer, H.

    1991-04-01

    This report discusses a verification and validation (V ampersand V) plan for computer codes used for safety analysis and probabilistic risk assessment calculations. The present plan fulfills the commitments by Westinghouse Savannah River Company (WSRC) to the Department of Energy Savannah River Office (DOE-SRO) to bring the essential safety analysis and probabilistic risk assessment codes in compliance with verification and validation requirements

  12. Verification of a CT scanner using a miniature step gauge

    DEFF Research Database (Denmark)

    Cantatore, Angela; Andreasen, J.L.; Carmignato, S.

    2011-01-01

    The work deals with performance verification of a CT scanner using a 42mm miniature replica step gauge developed for optical scanner verification. Errors quantification and optimization of CT system set-up in terms of resolution and measurement accuracy are fundamental for use of CT scanning...

  13. Trends in business process analysis: from verification to process mining

    NARCIS (Netherlands)

    Aalst, van der W.M.P.; Cardoso, J.; Cordeiro, J.; Filipe, J.

    2007-01-01

    Business process analysis ranges from model verification at design-time to the monitoring of processes at runtime. Much progress has been achieved in process verification. Today we are able to verify the entire reference model of SAP without any problems. Moreover, more and more processes leave

  14. DOE handbook: Integrated safety management systems (ISMS) verification. Team leader's handbook

    International Nuclear Information System (INIS)

    1999-06-01

    The primary purpose of this handbook is to provide guidance to the ISMS verification Team Leader and the verification team in conducting ISMS verifications. The handbook describes methods and approaches for the review of the ISMS documentation (Phase I) and ISMS implementation (Phase II) and provides information useful to the Team Leader in preparing the review plan, selecting and training the team, coordinating the conduct of the verification, and documenting the results. The process and techniques described are based on the results of several pilot ISMS verifications that have been conducted across the DOE complex. A secondary purpose of this handbook is to provide information useful in developing DOE personnel to conduct these reviews. Specifically, this handbook describes methods and approaches to: (1) Develop the scope of the Phase 1 and Phase 2 review processes to be consistent with the history, hazards, and complexity of the site, facility, or activity; (2) Develop procedures for the conduct of the Phase 1 review, validating that the ISMS documentation satisfies the DEAR clause as amplified in DOE Policies 450.4, 450.5, 450.6 and associated guidance and that DOE can effectively execute responsibilities as described in the Functions, Responsibilities, and Authorities Manual (FRAM); (3) Develop procedures for the conduct of the Phase 2 review, validating that the description approved by the Approval Authority, following or concurrent with the Phase 1 review, has been implemented; and (4) Describe a methodology by which the DOE ISMS verification teams will be advised, trained, and/or mentored to conduct subsequent ISMS verifications. The handbook provides proven methods and approaches for verifying that commitments related to the DEAR, the FRAM, and associated amplifying guidance are in place and implemented in nuclear and high risk facilities. This handbook also contains useful guidance to line managers when preparing for a review of ISMS for radiological

  15. Knowledge base verification based on enhanced colored petri net

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jong Hyun; Seong, Poong Hyun [Korea Advanced Institute of Science and Technology, Taejon (Korea, Republic of)

    1998-12-31

    Verification is a process aimed at demonstrating whether a system meets it`s specified requirements. As expert systems are used in various applications, the knowledge base verification of systems takes an important position. The conventional Petri net approach that has been studied recently in order to verify the knowledge base is found that it is inadequate to verify the knowledge base of large and complex system, such as alarm processing system of nuclear power plant. Thus, we propose an improved method that models the knowledge base as enhanced colored Petri net. In this study, we analyze the reachability and the error characteristics of the knowledge base and apply the method to verification of simple knowledge base. 8 refs., 4 figs. (Author)

  16. Knowledge base verification based on enhanced colored petri net

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jong Hyun; Seong, Poong Hyun [Korea Advanced Institute of Science and Technology, Taejon (Korea, Republic of)

    1997-12-31

    Verification is a process aimed at demonstrating whether a system meets it`s specified requirements. As expert systems are used in various applications, the knowledge base verification of systems takes an important position. The conventional Petri net approach that has been studied recently in order to verify the knowledge base is found that it is inadequate to verify the knowledge base of large and complex system, such as alarm processing system of nuclear power plant. Thus, we propose an improved method that models the knowledge base as enhanced colored Petri net. In this study, we analyze the reachability and the error characteristics of the knowledge base and apply the method to verification of simple knowledge base. 8 refs., 4 figs. (Author)

  17. Neighbors Based Discriminative Feature Difference Learning for Kinship Verification

    DEFF Research Database (Denmark)

    Duan, Xiaodong; Tan, Zheng-Hua

    2015-01-01

    In this paper, we present a discriminative feature difference learning method for facial image based kinship verification. To transform feature difference of an image pair to be discriminative for kinship verification, a linear transformation matrix for feature difference between an image pair...... than the commonly used feature concatenation, leading to a low complexity. Furthermore, there is no positive semi-definitive constrain on the transformation matrix while there is in metric learning methods, leading to an easy solution for the transformation matrix. Experimental results on two public...... databases show that the proposed method combined with a SVM classification method outperforms or is comparable to state-of-the-art kinship verification methods. © Springer International Publishing AG, Part of Springer Science+Business Media...

  18. Bibliography for Verification and Validation in Computational Simulation

    International Nuclear Information System (INIS)

    Oberkampf, W.L.

    1998-01-01

    A bibliography has been compiled dealing with the verification and validation of computational simulations. The references listed in this bibliography are concentrated in the field of computational fluid dynamics (CFD). However, references from the following fields are also included: operations research, heat transfer, solid dynamics, software quality assurance, software accreditation, military systems, and nuclear reactor safety. This bibliography, containing 221 references, is not meant to be comprehensive. It was compiled during the last ten years in response to the author's interest and research in the methodology for verification and validation. The emphasis in the bibliography is in the following areas: philosophy of science underpinnings, development of terminology and methodology, high accuracy solutions for CFD verification, experimental datasets for CFD validation, and the statistical quantification of model validation. This bibliography should provide a starting point for individual researchers in many fields of computational simulation in science and engineering

  19. Bibliography for Verification and Validation in Computational Simulations

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, W.L.

    1998-10-01

    A bibliography has been compiled dealing with the verification and validation of computational simulations. The references listed in this bibliography are concentrated in the field of computational fluid dynamics (CFD). However, references from the following fields are also included: operations research, heat transfer, solid dynamics, software quality assurance, software accreditation, military systems, and nuclear reactor safety. This bibliography, containing 221 references, is not meant to be comprehensive. It was compiled during the last ten years in response to the author's interest and research in the methodology for verification and validation. The emphasis in the bibliography is in the following areas: philosophy of science underpinnings, development of terminology and methodology, high accuracy solutions for CFD verification, experimental datasets for CFD validation, and the statistical quantification of model validation. This bibliography should provide a starting point for individual researchers in many fields of computational simulation in science and engineering.

  20. Pursuing shell-isolated nanoparticle-enhanced Raman spectroscopy (SHINERS) for concomitant detection of breast lesions and microcalcifications

    Science.gov (United States)

    Zheng, Chao; Shao, Wanting; Paidi, Santosh Kumar; Han, Bing; Fu, Tong; Wu, Di; Bi, Lirong; Xu, Weiqing; Fan, Zhimin; Barman, Ishan

    2015-10-01

    Although tissue staining followed by morphologic identification remains the gold standard for diagnosis of most cancers, such determinations relying solely on morphology are often hampered by inter- and intra-observer variability. Vibrational spectroscopic techniques, in contrast, offer objective markers for diagnoses and can afford disease detection prior to alterations in cellular and extracellular architecture by furnishing a rapid ``omics''-like view of the biochemical status of the probed specimen. Here, we report a classification approach to concomitantly detect microcalcification status and local pathological state in breast tissue, featuring a combination of vibrational spectroscopy that focuses on the tumor and its microenvironment, and multivariate data analysis of spectral markers reflecting molecular expression. We employ the unprecedented sensitivity and exquisite molecular specificity offered by Au@SiO2 shell-isolated nanoparticle-enhanced Raman spectroscopy (SHINERS) to probe the presence of calcified deposits and distinguish between normal breast tissues, fibroadenoma, atypical ductal hyperplasia, ductal carcinoma in situ (DCIS), and invasive ductal carcinoma (IDC). By correlating the spectra with the corresponding histologic assessment, we developed partial least squares-discriminant analysis derived decision algorithm that provides excellent diagnostic power in the fresh frozen sections (overall accuracy of 99.4% and 93.6% using SHINs for breast lesions with and without microcalcifications, respectively). The performance of this decision algorithm is competitive with or supersedes that of analogous algorithms employing spontaneous Raman spectroscopy while enabling facile detection due to the considerably higher intensity of SHINERS. Our results pave the way for rapid tissue spectral pathology measurements using SHINERS that can offer a novel stain-free route to accurate and economical diagnoses without human interpretation.Although tissue staining

  1. Is identity per se irrelevant? A contrarian view of self-verification effects

    OpenAIRE

    Gregg, Aiden P.

    2008-01-01

    Self-verification theory (SVT) posits that people who hold negative self-views, such as depressive patients, ironically strive to verify that these self-views are correct, by actively seeking out critical feedback or interaction partners who evaluate them unfavorably. Such verification strivings are allegedly directed towards maximizing subjective perceptions of prediction and control. Nonetheless, verification strivings are also alleged to stabilize maladaptive self-perceptions, and thereby ...

  2. Class 1E software verification and validation: Past, present, and future

    Energy Technology Data Exchange (ETDEWEB)

    Persons, W.L.; Lawrence, J.D.

    1993-10-01

    This paper discusses work in progress that addresses software verification and validation (V&V) as it takes place during the full software life cycle of safety-critical software. The paper begins with a brief overview of the task description and discussion of the historical evolution of software V&V. A new perspective is presented which shows the entire verification and validation process from the viewpoints of a software developer, product assurance engineer, independent V&V auditor, and government regulator. An account of the experience of the field test of the Verification Audit Plan and Report generated from the V&V Guidelines is presented along with sample checklists and lessons learned from the verification audit experience. Then, an approach to automating the V&V Guidelines is introduced. The paper concludes with a glossary and bibliography.

  3. Histologic Normalization Occurs in Ulcerative Colitis and Is Associated With Improved Clinical Outcomes.

    Science.gov (United States)

    Christensen, Britt; Hanauer, Stephen B; Erlich, Jonathan; Kassim, Olufemi; Gibson, Peter R; Turner, Jerrold R; Hart, John; Rubin, David T

    2017-10-01

    Mucosal healing, determined by histologic analysis, is a potential therapeutic target for patients with ulcerative colitis (UC). However, the histologic features of tissue normalization, as an outcome of treatment, have not been well described. We examined the prevalence and predictive values of normalization of the colonic mucosa, based on histologic analysis (histologic normalization) in patients with UC, and determined its association with risk of clinical relapse, compared with histologic disease quiescence and endoscopic mucosal healing. We performed a retrospective study of 646 patients with confirmed UC who underwent colonoscopy at a tertiary medical center from August 2005 through October 2013. We reviewed reports from pathology analyses of random mucosal biopsies from each colon segment, and categorized them into 3 groups based on histology findings: (1) normalization (completely normal mucosa with no features of chronicity present), (2) quiescence (crypt atrophy or branching without signs of active inflammation including erosions, abscesses, or focal neutrophil infiltration), or (3) active disease (epithelial infiltration by neutrophils, crypt abscesses, erosions, or ulceration). Histology findings were compared with clinical and endoscopic findings. We assessed variables associated with histology findings and, in patients in clinical remission (Simple Clinical Colitis Activity Index score ≤2 and subscore of ≤1 for stool frequency or rectal bleeding), predictive values for clinical relapse at follow-up evaluations 6 months later or more were calculated. Of the 646 patients included in the study, 60% had endoscopic mucosal healing, 40% had histologic quiescence, and 10% had histologic normalization. The level of agreement between mucosal and histologic activity was moderate (agreement for 68% of samples; κ = 0.50; P normalization (P = .002). Of 310 patients in clinical remission at initial review, 25% had a clinical relapse, after a median time

  4. Oxidized limonene and oxidized linalool - concomitant contact allergy to common fragrance terpenes.

    Science.gov (United States)

    Bråred Christensson, Johanna; Karlberg, Ann-Therese; Andersen, Klaus E; Bruze, Magnus; Johansen, Jeanne D; Garcia-Bravo, Begoña; Giménez Arnau, Ana; Goh, Chee-Leok; Nixon, Rosemary; White, Ian R

    2016-05-01

    Limonene and linalool are common fragrance terpenes. Both oxidized R-limonene and oxidized linalool have recently been patch tested in an international setting, showing contact allergy in 5.2% and 6.9% of dermatitis patients, respectively. To investigate concomitant reactions between oxidized R-limonene and oxidized linalool in consecutive dermatitis patients. Oxidized R-limonene 3.0% (containing limonene hydroperoxides 0.33%) and oxidized linalool 6% (linalool hydroperoxides 1%) in petrolatum were tested in 2900 consecutive dermatitis patients in Australia, Denmark, Singapore, Spain, Sweden, and the United Kingdom. A total of 281 patients reacted to either oxidized R-limonene or oxidized linalool. Of these, 25% had concomitant reactions to both compounds, whereas 29% reacted only to oxidized R-limonene and 46% only to oxidized linalool. Of the 152 patients reacting to oxidized R-limonene, 46% reacted to oxidized linalool, whereas 35% of the 200 patients reacting to oxidized linalool also reacted to oxidized R-limonene. The majority of the patients (75%) reacted to only one of the oxidation mixtures, thus supporting the specificity of the reactions. The concomitant reactions to the two fragrance allergens suggest multiple sensitizations, which most likely reflect the exposure to the different fragrance materials in various types of consumer products. This is in accordance with what is generally seen for patch test reactions to fragrance materials. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  5. Core power capability verification for PWR NPP

    International Nuclear Information System (INIS)

    Xian Chunyu; Liu Changwen; Zhang Hong; Liang Wei

    2002-01-01

    The Principle and methodology of pressurized water reactor nuclear power plant core power capability verification for reload are introduced. The radial and axial power distributions of normal operation (category I or condition I) and abnormal operation (category II or condition II) are simulated by using neutronics calculation code. The linear power density margin and DNBR margin for both categories, which reflect core safety, are analyzed from the point view of reactor physics and T/H, and thus category I operating domain and category II protection set point are verified. Besides, the verification results of reference NPP are also given

  6. Data Exchanges and Verifications Online (DEVO)

    Data.gov (United States)

    Social Security Administration — DEVO is the back-end application for processing SSN verifications and data exchanges. DEVO uses modern technology for parameter driven processing of both batch and...

  7. A transformation of SDL specifications : a step towards the verification

    NARCIS (Netherlands)

    Ioustinova, N.; Sidorova, N.; Bjorner, D.; Broy, M.; Zamulin, A.

    2001-01-01

    Industrial-size specifications/models (whose state space is often infinite) can not be model checked in a direct way— a verification model of a system is model checked instead. Program transformation is a way to build a finite-state verification model that can be submitted to a model checker.

  8. Design, Development, and Automated Verification of an Integrity-Protected Hypervisor

    Science.gov (United States)

    2012-07-16

    also require considerable manual effort. For example, the verification of the SEL4 operating system [45] required several man years effort. In...Winwood. seL4 : formal verification of an OS kernel. In Proc. of SOSP, 2009. [46] K. Kortchinsky. Cloudburst: A VMware guest to host escape story

  9. A Proof-checked Verification of a Real-Time Communication Protocol

    NARCIS (Netherlands)

    Polak, I.

    We present an analysis of a protocol developed by Philips to connect several components of an audio-system. The verification of the protocol is carried out using the timed I/O-automata model of Lynch and Vaandrager. The verification has been partially proof-checked with the interactive proof

  10. Modular Verification of Linked Lists with Views via Separation Logic

    DEFF Research Database (Denmark)

    Jensen, Jonas Braband; Birkedal, Lars; Sestoft, Peter

    2011-01-01

    We present a separation logic specification and verification of linked lists with views, a data structure from the C5 collection library for .NET. A view is a generalization of the well-known concept of an iterator. Linked lists with views form an interesting case study for verification since...

  11. Verification and validation in computational fluid dynamics

    Science.gov (United States)

    Oberkampf, William L.; Trucano, Timothy G.

    2002-04-01

    Verification and validation (V&V) are the primary means to assess accuracy and reliability in computational simulations. This paper presents an extensive review of the literature in V&V in computational fluid dynamics (CFD), discusses methods and procedures for assessing V&V, and develops a number of extensions to existing ideas. The review of the development of V&V terminology and methodology points out the contributions from members of the operations research, statistics, and CFD communities. Fundamental issues in V&V are addressed, such as code verification versus solution verification, model validation versus solution validation, the distinction between error and uncertainty, conceptual sources of error and uncertainty, and the relationship between validation and prediction. The fundamental strategy of verification is the identification and quantification of errors in the computational model and its solution. In verification activities, the accuracy of a computational solution is primarily measured relative to two types of highly accurate solutions: analytical solutions and highly accurate numerical solutions. Methods for determining the accuracy of numerical solutions are presented and the importance of software testing during verification activities is emphasized. The fundamental strategy of validation is to assess how accurately the computational results compare with the experimental data, with quantified error and uncertainty estimates for both. This strategy employs a hierarchical methodology that segregates and simplifies the physical and coupling phenomena involved in the complex engineering system of interest. A hypersonic cruise missile is used as an example of how this hierarchical structure is formulated. The discussion of validation assessment also encompasses a number of other important topics. A set of guidelines is proposed for designing and conducting validation experiments, supported by an explanation of how validation experiments are different

  12. Syphilitic lymphadenitis clinically and histologically mimicking lymphogranuloma venereum.

    Science.gov (United States)

    Wessels, Annesu; Bamford, Colleen; Lewis, David; Martini, Markus; Wainwright, Helen

    2016-04-19

    An inguinal lymph node was discovered incidentally during surgery for a suspected strangulated inguinal hernia. The patient had recently been treated for candidal balanoposthitis and was known to have a paraphimosis. A new foreskin ulcer was discovered when he was admitted for the hernia surgery. The lymph node histology showed stellate abscesses suggestive of lymphogranuloma venereum (LGV). Chlamydial serologic tests were negative. As the histological appearance and clinical details provided were thought to suggest LGV, tissue was also sent for a real-time quadriplex polymerase chain reaction assay. This was used to screen for Chlamydia trachomatis in conjunction with other genital ulcer-related pathogens. The assay was negative for C. trachomatis, but positive for Treponema pallidum. Further histochemical staining of the histological specimen confirmed the presence of spirochaetes.

  13. Verification of road databases using multiple road models

    Science.gov (United States)

    Ziems, Marcel; Rottensteiner, Franz; Heipke, Christian

    2017-08-01

    In this paper a new approach for automatic road database verification based on remote sensing images is presented. In contrast to existing methods, the applicability of the new approach is not restricted to specific road types, context areas or geographic regions. This is achieved by combining several state-of-the-art road detection and road verification approaches that work well under different circumstances. Each one serves as an independent module representing a unique road model and a specific processing strategy. All modules provide independent solutions for the verification problem of each road object stored in the database in form of two probability distributions, the first one for the state of a database object (correct or incorrect), and a second one for the state of the underlying road model (applicable or not applicable). In accordance with the Dempster-Shafer Theory, both distributions are mapped to a new state space comprising the classes correct, incorrect and unknown. Statistical reasoning is applied to obtain the optimal state of a road object. A comparison with state-of-the-art road detection approaches using benchmark datasets shows that in general the proposed approach provides results with larger completeness. Additional experiments reveal that based on the proposed method a highly reliable semi-automatic approach for road data base verification can be designed.

  14. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  15. Automated Verification of Virtualized Infrastructures

    DEFF Research Database (Denmark)

    Bleikertz, Sören; Gross, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    Virtualized infrastructures and clouds present new challenges for security analysis and formal verification: they are complex environments that continuously change their shape, and that give rise to non-trivial security goals such as isolation and failure resilience requirements. We present a pla...

  16. Evaluation of histologically confirmed carcinoma of the cervix in ...

    African Journals Online (AJOL)

    Data collected was analysed with SPSS version 20.0 software and presented in tables and charts. Results: Sixty two patients with histological confirmation of ... The commonest histological type of cervical cancer was squamous cell carcinoma accounting for 88.9%. Twenty (44.4%) patients were referred for radiotherapy and ...

  17. Image Processing Based Signature Verification Technique to Reduce Fraud in Financial Institutions

    Directory of Open Access Journals (Sweden)

    Hussein Walid

    2016-01-01

    Full Text Available Handwritten signature is broadly utilized as personal verification in financial institutions ensures the necessity for a robust automatic signature verification tool. This tool aims to reduce fraud in all related financial transactions’ sectors. This paper proposes an online, robust, and automatic signature verification technique using the recent advances in image processing and machine learning. Once the image of a handwritten signature for a customer is captured, several pre-processing steps are performed on it including filtration and detection of the signature edges. Afterwards, a feature extraction process is applied on the image to extract Speeded up Robust Features (SURF and Scale-Invariant Feature Transform (SIFT features. Finally, a verification process is developed and applied to compare the extracted image features with those stored in the database for the specified customer. Results indicate high accuracy, simplicity, and rapidity of the developed technique, which are the main criteria to judge a signature verification tool in banking and other financial institutions.

  18. Standard Verification System Lite (SVS Lite)

    Data.gov (United States)

    Social Security Administration — SVS Lite is a mainframe program used exclusively by the Office of Child Support Enforcement (OCSE) to perform batch SSN verifications. This process is exactly the...

  19. Towards a CPN-Based Modelling Approach for Reconciling Verification and Implementation of Protocol Models

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael

    2013-01-01

    Formal modelling of protocols is often aimed at one specific purpose such as verification or automatically generating an implementation. This leads to models that are useful for one purpose, but not for others. Being able to derive models for verification and implementation from a single model...... is beneficial both in terms of reduced total modelling effort and confidence that the verification results are valid also for the implementation model. In this paper we introduce the concept of a descriptive specification model and an approach based on refining a descriptive model to target both verification...... how this model can be refined to target both verification and implementation....

  20. Subperiosteal preparation using a new piezoelectric device: a histological examination

    Directory of Open Access Journals (Sweden)

    Stoetzer, Marcus

    2014-12-01

    Full Text Available Introduction: Subperiosteal preparation using a periosteal elevator leads to disturbances of local immunohistochemistry and periosteal histology due to a microtrauma. Usually soft-tissue damage can be considerably reduced by using piezoelectric technology. For this reason, the effects of a novel piezoelectric device on immunohistochemistry and periosteal histology were examined and compared to conventional preparation of the periosteum using a periosteal elevator.Material and methods: Lewis rats were randomly assigned to one of five groups (n=50. Subperiosteal preparation was performed using either a piezoelectric device or a periosteal elevator. Immunohistochemical and histological analyses were performed immediately after preparation as well as three and eight days postoperatively. A statistical analysis of the histological colouring was performed offline using analysis of variance (ANOVA on ranks (p<0.05. Results: At all times, immunohistochemical and histological analysis demonstrated a significantly more homogenous tissue structure in the group of rats that underwent piezosurgery than in the group of rats that underwent treatment with a periosteal elevator.Conclusion: The use of a piezoelectric device for subperiosteal preparation is associated with more harmonious immunohistochemical and histological results for the periosteum than the use of a conventional periosteal elevator. As a result, piezoelectric devices can be expected to have a positive effect primarily on soft tissue, in particular of the periosteal as well as on surrounding tissues.

  1. [Atrial fibrillation concomitant with valvular heart disease].

    Science.gov (United States)

    Ishii, Yosuke

    2013-01-01

    Patients with valvular heart disease frequently have atrial fibrillation(AF) due to elevated pressure and dilatation of the left and right atria and pulmonary veins. Guidelines for valvular heart disease and AF recommend that surgical treatment for the valvular heart disease should be performed concomitantly with AF surgery. The Full-Maze procedure has evolved into the gold standard of treatment for medically refractory AF. In addition to the pulmonary vein isolation, the right and left atrial incisions of the Full-Maze procedure are designed to block potential macroreentrant pathways. According to the mechanisms of AF with valvular heart disease, the Full-Maze procedure is more effective for the patients than the pulmonary vein isolation alone.

  2. Preliminary Validation and Verification Plan for CAREM Reactor Protection System

    International Nuclear Information System (INIS)

    Fittipaldi, Ana; Maciel Felix

    2000-01-01

    The purpose of this paper, is to present a preliminary validation and verification plan for a particular architecture proposed for the CAREM reactor protection system with software modules (computer based system).These software modules can be either own design systems or systems based in commercial modules such as programmable logic controllers (PLC) redundant of last generation.During this study, it was seen that this plan can also be used as a validation and verification plan of commercial products (COTS, commercial off the shelf) and/or smart transmitters.The software life cycle proposed and its features are presented, and also the advantages of the preliminary validation and verification plan

  3. FMEF Electrical single line diagram and panel schedule verification process

    International Nuclear Information System (INIS)

    Fong, S.K.

    1998-01-01

    Since the FMEF did not have a mission, a formal drawing verification program was not developed, however, a verification process on essential electrical single line drawings and panel schedules was established to benefit the operations lock and tag program and to enhance the electrical safety culture of the facility. The purpose of this document is to provide a basis by which future landlords and cognizant personnel can understand the degree of verification performed on the electrical single lines and panel schedules. It is the intent that this document be revised or replaced by a more formal requirements document if a mission is identified for the FMEF

  4. Verification of Java Programs using Symbolic Execution and Invariant Generation

    Science.gov (United States)

    Pasareanu, Corina; Visser, Willem

    2004-01-01

    Software verification is recognized as an important and difficult problem. We present a norel framework, based on symbolic execution, for the automated verification of software. The framework uses annotations in the form of method specifications an3 loop invariants. We present a novel iterative technique that uses invariant strengthening and approximation for discovering these loop invariants automatically. The technique handles different types of data (e.g. boolean and numeric constraints, dynamically allocated structures and arrays) and it allows for checking universally quantified formulas. Our framework is built on top of the Java PathFinder model checking toolset and it was used for the verification of several non-trivial Java programs.

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DUST SUPPRESSANT PRODUCTS: SYNTECH PRODUCTS CORPORATION'S PETROTAC

    Science.gov (United States)

    Dust suppressant products used to control particulate emissions from unpaved roads are among the technologies evaluated by the Air Pollution Control Technology (APCT) Verification Center, part of the U.S. Environmental Protection Agency's Environmental Technology Verification (ET...

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DUST SUPPRESSANT PRODUCTS: SYNTECH PRODUCTS CORPORATION'S TECHSUPPRESS

    Science.gov (United States)

    Dust suppressant products used to control particulate emissions from unpaved roads are among the technologies evaluated by the Air Pollution Control Technology (APCT) Verification Center, part of the U.S. Environmental Protection Agency's Environmental Technology Verification (ET...

  7. Parallel verification of dynamic systems with rich configurations

    OpenAIRE

    Pessoa, Eduardo José Dias

    2016-01-01

    Dissertação de mestrado em Engenharia Informática (área de especialização em Informática) Model checking is a technique used to automatically verify a model which represents the specification of some system. To ensure the correctness of the system the verification of both static and dynamic properties is often needed. The specification of a system is made through modeling languages, while the respective verification is made by its model-checker. Most modeling frameworks are not...

  8. Tree dimension in verification of constrained Horn clauses

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick; Ganty, Pierre

    2018-01-01

    In this paper, we show how the notion of tree dimension can be used in the verification of constrained Horn clauses (CHCs). The dimension of a tree is a numerical measure of its branching complexity and the concept here applies to Horn clause derivation trees. Derivation trees of dimension zero c...... algorithms using these constructions to decompose a CHC verification problem. One variation of this decomposition considers derivations of successively increasing dimension. The paper includes descriptions of implementations and experimental results....

  9. Experimental verification of layout physical verification of silicon photonics

    Science.gov (United States)

    El Shamy, Raghi S.; Swillam, Mohamed A.

    2018-02-01

    Silicon photonics have been approved as one of the best platforms for dense integration of photonic integrated circuits (PICs) due to the high refractive index contrast among its materials. Silicon on insulator (SOI) is a widespread photonics technology, which support a variety of devices for lots of applications. As the photonics market is growing, the number of components in the PICs increases which increase the need for an automated physical verification (PV) process. This PV process will assure reliable fabrication of the PICs as it will check both the manufacturability and the reliability of the circuit. However, PV process is challenging in the case of PICs as it requires running an exhaustive electromagnetic (EM) simulations. Our group have recently proposed an empirical closed form models for the directional coupler and the waveguide bends based on the SOI technology. The models have shown a very good agreement with both finite element method (FEM) and finite difference time domain (FDTD) solvers. These models save the huge time of the 3D EM simulations and can be easily included in any electronic design automation (EDA) flow as the equations parameters can be easily extracted from the layout. In this paper we present experimental verification for our previously proposed models. SOI directional couplers with different dimensions have been fabricated using electron beam lithography and measured. The results from the measurements of the fabricate devices have been compared to the derived models and show a very good agreement. Also the matching can reach 100% by calibrating certain parameter in the model.

  10. Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems

    Science.gov (United States)

    Berg, Melanie; LaBel, Kenneth A.

    2016-01-01

    We propose a method for TMR insertion verification that satisfies the process for reliable and trusted systems. If a system is expected to be protected using TMR, improper insertion can jeopardize the reliability and security of the system. Due to the complexity of the verification process, there are currently no available techniques that can provide complete and reliable confirmation of TMR insertion. This manuscript addresses the challenge of confirming that TMR has been inserted without corruption of functionality and with correct application of the expected TMR topology. The proposed verification method combines the usage of existing formal analysis tools with a novel search-detect-and-verify tool. Field programmable gate array (FPGA),Triple Modular Redundancy (TMR),Verification, Trust, Reliability,

  11. Verification and Diagnostics Framework in ATLAS Trigger/DAQ

    CERN Document Server

    Barczyk, M.; Caprini, M.; Da Silva Conceicao, J.; Dobson, M.; Flammer, J.; Jones, R.; Kazarov, A.; Kolos, S.; Liko, D.; Lucio, L.; Mapelli, L.; Soloviev, I.; Hart, R.; Amorim, A.; Klose, D.; Lima, J.; Pedro, J.; Wolters, H.; Badescu, E.; Alexandrov, I.; Kotov, V.; Mineev, M.; Ryabov, Yu.; Ryabov, Yu.

    2003-01-01

    Trigger and data acquisition (TDAQ) systems for modern HEP experiments are composed of thousands of hardware and software components depending on each other in a very complex manner. Typically, such systems are operated by non-expert shift operators, which are not aware of system functionality details. It is therefore necessary to help the operator to control the system and to minimize system down-time by providing knowledge-based facilities for automatic testing and verification of system components and also for error diagnostics and recovery. For this purpose, a verification and diagnostic framework was developed in the scope of ATLAS TDAQ. The verification functionality of the framework allows developers to configure simple low-level tests for any component in a TDAQ configuration. The test can be configured as one or more processes running on different hosts. The framework organizes tests in sequences, using knowledge about components hierarchy and dependencies, and allowing the operator to verify the fun...

  12. Functional verification of dynamically reconfigurable FPGA-based systems

    CERN Document Server

    Gong, Lingkan

    2015-01-01

    This book analyzes the challenges in verifying Dynamically Reconfigurable Systems (DRS) with respect to the user design and the physical implementation of such systems. The authors describe the use of a simulation-only layer to emulate the behavior of target FPGAs and accurately model the characteristic features of reconfiguration. Readers are enabled with this simulation-only layer to maintain verification productivity by abstracting away the physical details of the FPGA fabric.  Two implementations of the simulation-only layer are included: Extended ReChannel is a SystemC library that can be used to check DRS designs at a high level; ReSim is a library to support RTL simulation of a DRS reconfiguring both its logic and state. Through a number of case studies, the authors demonstrate how their approach integrates seamlessly with existing, mainstream DRS design flows and with well-established verification methodologies such as top-down modeling and coverage-driven verification. Provides researchers with an i...

  13. Class 1E software verification and validation: Past, present, and future

    International Nuclear Information System (INIS)

    Persons, W.L.; Lawrence, J.D.

    1993-10-01

    This paper discusses work in progress that addresses software verification and validation (V ampersand V) as it takes place during the full software life cycle of safety-critical software. The paper begins with a brief overview of the task description and discussion of the historical evolution of software V ampersand V. A new perspective is presented which shows the entire verification and validation process from the viewpoints of a software developer, product assurance engineer, independent V ampersand V auditor, and government regulator. An account of the experience of the field test of the Verification Audit Plan and Report generated from the V ampersand V Guidelines is presented along with sample checklists and lessons learned from the verification audit experience. Then, an approach to automating the V ampersand V Guidelines is introduced. The paper concludes with a glossary and bibliography

  14. Class 1E software verification and validation: Past, present, and future

    International Nuclear Information System (INIS)

    Persons, W.L.; Lawrence, J.D.

    1994-01-01

    This paper discusses work in progress that addresses software verification and validation (V ampersand V) as it takes place during the full software life cycle of safety-critical software. The paper begins with a brief overview of the task description and discussion of the historical evolution of software V ampersand V. A new perspective is presented which shows the entire verification and validation process from the viewpoints of a software developer, product assurance engineer, independent V ampersand V auditor, and government regulator. An account of the experience of the field test of the Verification Audit Plan and Report generated from the V ampersand V Guidelines is presented along with sample checklists and lessons learned from the verification audit experience. Then, an approach to automating the V ampersand V Guidelines is introduced. The paper concludes with a glossary and bibliography

  15. The Effect of Mystery Shopper Reports on Age Verification for Tobacco Purchases

    Science.gov (United States)

    KREVOR, BRAD S.; PONICKI, WILLIAM R.; GRUBE, JOEL W.; DeJONG, WILLIAM

    2011-01-01

    Mystery shops (MS) involving attempted tobacco purchases by young buyers have been employed to monitor retail stores’ performance in refusing underage sales. Anecdotal evidence suggests that MS visits with immediate feedback to store personnel can improve age verification. This study investigated the impact of monthly and twice-monthly MS reports on age verification. Forty-five Walgreens stores were each visited 20 times by mystery shoppers. The stores were randomly assigned to one of three conditions. Control group stores received no feedback, whereas two treatment groups received feedback communications every visit (twice monthly) or every second visit (monthly) after baseline. Logit regression models tested whether each treatment group improved verification rates relative to the control group. Post-baseline verification rates were higher in both treatment groups than in the control group, but only the stores receiving monthly communications had a significantly greater improvement than control group stores. Verification rates increased significantly during the study period for all three groups, with delayed improvement among control group stores. Communication between managers regarding the MS program may account for the delayed age-verification improvements observed in the control group stores. Encouraging inter-store communication might extend the benefits of MS programs beyond those stores that receive this intervention. PMID:21541874

  16. A Secure Framework for Location Verification in Pervasive Computing

    Science.gov (United States)

    Liu, Dawei; Lee, Moon-Chuen; Wu, Dan

    The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.

  17. Histological image classification using biologically interpretable shape-based features

    International Nuclear Information System (INIS)

    Kothari, Sonal; Phan, John H; Young, Andrew N; Wang, May D

    2013-01-01

    Automatic cancer diagnostic systems based on histological image classification are important for improving therapeutic decisions. Previous studies propose textural and morphological features for such systems. These features capture patterns in histological images that are useful for both cancer grading and subtyping. However, because many of these features lack a clear biological interpretation, pathologists may be reluctant to adopt these features for clinical diagnosis. We examine the utility of biologically interpretable shape-based features for classification of histological renal tumor images. Using Fourier shape descriptors, we extract shape-based features that capture the distribution of stain-enhanced cellular and tissue structures in each image and evaluate these features using a multi-class prediction model. We compare the predictive performance of the shape-based diagnostic model to that of traditional models, i.e., using textural, morphological and topological features. The shape-based model, with an average accuracy of 77%, outperforms or complements traditional models. We identify the most informative shapes for each renal tumor subtype from the top-selected features. Results suggest that these shapes are not only accurate diagnostic features, but also correlate with known biological characteristics of renal tumors. Shape-based analysis of histological renal tumor images accurately classifies disease subtypes and reveals biologically insightful discriminatory features. This method for shape-based analysis can be extended to other histological datasets to aid pathologists in diagnostic and therapeutic decisions

  18. Static Verification for Code Contracts

    Science.gov (United States)

    Fähndrich, Manuel

    The Code Contracts project [3] at Microsoft Research enables programmers on the .NET platform to author specifications in existing languages such as C# and VisualBasic. To take advantage of these specifications, we provide tools for documentation generation, runtime contract checking, and static contract verification.

  19. [Anatomical study and clinical application of a leg flap pedicle-included with cutaneous nerve and its concomitant vessels].

    Science.gov (United States)

    Liu, B; Hao, X; Goan, M

    2000-05-01

    To investigate the blood supply patterns and the clinical liability of a leg flap pedicle-included with cutaneous nerve and its concomitant vessels. Fresh cadaver legs with thirty-two in infants and two in adults were anatomically examined after the intravenous injection of the red Chlorinated Poly Vingl Choride (CPVC). Five patients with the soft tissue defects were selected for the treatment with the flap pedicle-included with the cutaneous nerve and its concomitant vessels. Four main cutaneous nerves were found in the leg after they perforated the deep fascia out. They were companioned with their concomitant vessels with different blood-supply pateeerns, which the upper part of the leg was in an axial pattern and the lower part was in a "chain-type anastomosing" pattern. Following the above-mentioned findings, five cases were successfully treated with this led flap. The leg flap should be designed along the cutaneous nerve and its concomitant vessels. When the flap is applied in the area of blood supply with "chain-type anastomosing" pattern, the deep fascia should also be included in the flap.

  20. Local anesthesia selection algorithm in patients with concomitant somatic diseases.

    Science.gov (United States)

    Anisimova, E N; Sokhov, S T; Letunova, N Y; Orekhova, I V; Gromovik, M V; Erilin, E A; Ryazantsev, N A

    2016-01-01

    The paper presents basic principles of local anesthesia selection in patients with concomitant somatic diseases. These principles are history taking; analysis of drugs interaction with local anesthetic and sedation agents; determination of the functional status of the patient; patient anxiety correction; dental care with monitoring of hemodynamics parameters. It was found that adhering to this algorithm promotes prevention of urgent conditions in patients in outpatient dentistry.

  1. Patho-morphology of bone tumors (radiology and histology)

    International Nuclear Information System (INIS)

    Meister, P.

    1982-01-01

    Using the example of osteosarcoma, the article shows some findings and phenomena which are interpreted as epiphenomena of tumours and could lead to a ''wrong-positive'' diagnosis due to the radiological findings as bone destruction is misinterpreted as tumour destruction and the reactive or degenerative mineralisation as tumour mineralisation. Histological findings are also shown, for example the differences in the tumour type and the maximal size of a bone tumour which cannot be recognized definitely by means of radiology. An important practical example of interdisciplinary cooperation is a patient with a Ewing-sarcoma: for the histological examination, a thin layer of bone tissue was chiselled off twice. Each time, only a reactive bone formation was recognized as the tumour located deeper was not detected. Here, the radiologist must know that the histological recognition of reactive bones does not exclude the Ewing sarcoma; the surgeon must know that, in accordance with the X-ray findings, deeper located tissue must be taken for histological examination and the pathologist, cooperating with the radiologist and knowing the radiological changes, must point out that reactive bone formations do not exclude a deeper-located sarcoma, especially a Ewing sarcoma, and that they can even be typical side symptoms of a Ewing sarcoma. (orig./APR) [de

  2. Technical safety requirements control level verification; TOPICAL

    International Nuclear Information System (INIS)

    STEWART, J.L.

    1999-01-01

    A Technical Safety Requirement (TSR) control level verification process was developed for the Tank Waste Remediation System (TWRS) TSRs at the Hanford Site in Richland, WA, at the direction of the US. Department of Energy, Richland Operations Office (RL). The objective of the effort was to develop a process to ensure that the TWRS TSR controls are designated and managed at the appropriate levels as Safety Limits (SLs), Limiting Control Settings (LCSs), Limiting Conditions for Operation (LCOs), Administrative Controls (ACs), or Design Features. The TSR control level verification process was developed and implemented by a team of contractor personnel with the participation of Fluor Daniel Hanford, Inc. (FDH), the Project Hanford Management Contract (PHMC) integrating contractor, and RL representatives. The team was composed of individuals with the following experience base: nuclear safety analysis; licensing; nuclear industry and DOE-complex TSR preparation/review experience; tank farm operations; FDH policy and compliance; and RL-TWRS oversight. Each TSR control level designation was completed utilizing TSR control logic diagrams and TSR criteria checklists based on DOE Orders, Standards, Contractor TSR policy, and other guidance. The control logic diagrams and criteria checklists were reviewed and modified by team members during team meetings. The TSR control level verification process was used to systematically evaluate 12 LCOs, 22 AC programs, and approximately 100 program key elements identified in the TWRS TSR document. The verification of each TSR control required a team consensus. Based on the results of the process, refinements were identified and the TWRS TSRs were modified as appropriate. A final report documenting key assumptions and the control level designation for each TSR control was prepared and is maintained on file for future reference. The results of the process were used as a reference in the RL review of the final TWRS TSRs and control suite. RL

  3. Concomitant Use of Dietary Supplements and Medicines in Patients due to Miscommunication with Physicians in Japan

    Science.gov (United States)

    Chiba, Tsuyoshi; Sato, Yoko; Suzuki, Sachina; Umegaki, Keizo

    2015-01-01

    We previously reported that some patients used dietary supplements with their medication without consulting with physicians. Dietary supplements and medicines may interact with each other when used concomitantly, resulting in health problems. An Internet survey was conducted on 2109 people who concomitantly took dietary supplements and medicines in order to address dietary supplement usage in people who regularly take medicines in Japan. A total of 1508 patients (two admitted patients and 1506 ambulatory patients) and 601 non-patients, who were not consulting with physicians, participated in this study. Purpose for dietary supplement use was different among ages. Dietary supplements were used to treat diseases in 4.0% of non-patients and 11.9% of patients, while 10.8% of patients used dietary supplements to treat the same diseases as their medication. However, 70.3% of patients did not declare dietary supplement use to their physicians or pharmacists because they considered the concomitant use of dietary supplements and medicines to be safe. A total of 8.4% of all subjects realized the potential for adverse effects associated with dietary supplements. The incidence of adverse events was higher in patients who used dietary supplements to treat their disease. Communication between patients and physicians is important for avoiding the adverse effects associated with the concomitant use of dietary supplements and medicines. PMID:25894658

  4. Concomitant Glomus Tumor with CRPS in the Hand.

    Science.gov (United States)

    Jeong, Hyeong Jun; Kim, Chan Mi; Yoon, Duck Mi; Yoon, Kyung Bong

    2013-07-01

    Glomus tumors are benign tumors that account for 1% to 5% of all soft tissue tumors of the hand and are characterized by a triad of sensitivity to cold, localized tenderness and severe paroxysmal pain. Paroxysmal pain is a symptom common not only in glomus tumors but also in CRPS, and the hand is one of the commonly affected sites in patients with both glomus tumors and CRPS. Therefore, it is not easy to clinically diagnose glomus tumors superimposed on already affected region of CRPS patients. We report a case of glomus tumor concomitantly originating with CRPS at the hand.

  5. Oxidized limonene and oxidized linalool - Concomitant contact allergy to common fragrance terpenes

    DEFF Research Database (Denmark)

    Bråred Christensson, Johanna; Karlberg, Ann Therese; Andersen, Klaus E.

    2016-01-01

    Summary Background Limonene and linalool are common fragrance terpenes. Both oxidized R-limonene and oxidized linalool have recently been patch tested in an international setting, showing contact allergy in 5.2% and 6.9% of dermatitis patients, respectively. Objective To investigate concomitant r...

  6. Experience in non-proliferation verification: The Treaty of Raratonga

    International Nuclear Information System (INIS)

    Walker, R.A.

    1998-01-01

    The verification provisions of the Treaty of Raratonga are subdivided into two categories: those performed by IAEA and those performed by other entities. A final provision of the Treaty of Raratonga is relevant to IAEA safeguards according to support of the continued effectiveness of the international non-proliferation system based on the Non-proliferation Treaty and the IAEA safeguards system. The non-IAEA verification process is described as well

  7. Base-of-tongue carcinoma: treatment results using concomitant boost radiotherapy

    International Nuclear Information System (INIS)

    Mak, Albert C.; Morrison, William H.; Garden, Adam S.; Ang, Kian K.; Goepfert, Helmuth; Peters, Lester J.

    1995-01-01

    Purpose: To evaluate the efficacy of accelerated fractionated radiotherapy using the concomitant boost schedule for patients with squamous cell carcinoma of the base of tongue. Methods and Materials: Between September 1984 and July 1992, 54 patients with squamous carcinoma of the base of tongue were treated at The University of Texas M. D. Anderson Cancer Center using the concomitant boost schedule. The distribution of T and N stages was T1-4, T2-27, T3-22, and T4-1; N0-9, N1-11, N2-24, N3-7, and NX-3. American Joint Committee on Cancer (AJCC) stage groupings were II-6, III-14, and IV-34. Before radiation, nodal excision and neck dissection were done in 5 and 10 patients, respectively; 5 patients had neck dissections after radiotherapy. Standard on and off spinal cord fields were irradiated with 1.8 Gy fractions to 54 Gy given over 6 weeks. The boost was given concomitantly during the large field treatment as a second daily (1.5 Gy) fraction, with an interfraction interval of 4-6 h. The median dose to the primary tumor was 72 Gy (range, 66-74 Gy). The median treatment duration was 42 days (range, 39-48 days). Only three patients had treatment interrupted for more than one scheduled treatment day. Results: The 5-year actuarial overall survival and disease-specific survival rates were 59 and 65%, respectively, with a median follow-up of 41 months. The 5-year actuarial locoregional control rate was 76%. The actuarial local control rates achieved with radiotherapy at 5 years for T1, T2, and T3 primary tumors were 100%, 96%, and 67%, respectively; including surgical salvage, the local control rate of T3 primary tumors was 70%. Six patients had regional failures, which in three patients occurred in conjunction with primary tumor recurrence. Twenty-six patients with regional adenopathy were treated with radiation alone to full dose and had a complete clinical response in the neck; no planned neck dissections were performed in these patients. Only 2 of these 26 patients

  8. Timed verification with µCRL

    NARCIS (Netherlands)

    Blom, S.C.C.; Ioustinova, N.; Sidorova, N.; Broy, M.; Zamulin, A.V.

    2003-01-01

    µCRL is a process algebraic language for specification and verification of distributed systems. µCRL allows to describe temporal properties of distributed systems but it has no explicit reference to time. In this work we propose a manner of introducing discrete time without extending the language.

  9. Eggspectation : organic egg verification tool

    NARCIS (Netherlands)

    Ruth, van S.M.; Hoogenboom, L.A.P.

    2011-01-01

    In 2009 RIKILT conducted a study on about 2,000 eggs to evaluate three different analytical verification methods: carotenoid profiling, fatty acid profiling and isotope ratio mass spectrometry. The eggs were collected from about 50 Dutch farms. The selection was based on the farms’ location and

  10. Diagnostic criteria for selenium toxicosis in aquatic birds: histologic lesions

    Science.gov (United States)

    Green, D.E.; Albers, P.H.

    1997-01-01

    Chronic selenium toxicosis was induced in 1-year-old male mallard ducks (Anas platyrhynchos) by feeding selenium, as seleno-DL-methionine, in amounts of 0, 10, 20, 40, and 80 parts per million (ppm) to five groups of 21 ducks each for 16 wk during March to July 1988. All mallards in the 80 ppm group, three in the 40 ppm group, and one in the 20 ppm group died. Histologic lesions in mallards that died of selenosis were hepatocellular vacuolar degeneration progressing to centrolobular and panlobular necrosis, nephrosis, apoptosis of pancreatic exocrine cells, hypermaturity and avascularity of contour feathers of the head with atrophy of feather follicles, lymphocytic necrosis and atrophy of lymphoid organs (spleen, gut-associated lymphoid tissue, and lumbar lymph nodes), and severe atrophy and degeneration of fat. Histologic lesions in surviving mallards in the 40 ppm group, which had tissue residues of selenium comparable to mallards that died, were fewer and much milder than mallards that died; lesions consisted of atrophy of lymphoid tissue, hyalinogranular swelling of hepatocytes, atrophy of seminiferous tubules, and senescence of feathers. No significant histologic lesions were detected in euthanized mallards in the 0, 10 and 20 ppm groups. Based on tissue residues and histologic findings, primarily in the liver, there was a threshold of selenium accumulation above which pathophysiologic changes were rapid and fatal. Pathognomonic histologic lesions of fatal and nonfatal selenosis were not detected. Criteria for diagnosis of fatal selenosis in aquatic birds include consistent histologic lesions in the liver, kidneys, and organs of the immune system. Although histologic changes were present in cases of chronic non-fatal selenosis, these were inconsistent. Consistent features of fatal and non-fatal chronic selenosis were marked weight loss and elevated concentrations of selenium in organs.

  11. BEval: A Plug-in to Extend Atelier B with Current Verification Technologies

    Directory of Open Access Journals (Sweden)

    Valério Medeiros Jr.

    2014-01-01

    Full Text Available This paper presents BEval, an extension of Atelier B to improve automation in the verification activities in the B method or Event-B. It combines a tool for managing and verifying software projects (Atelier B and a model checker/animator (ProB so that the verification conditions generated in the former are evaluated with the latter. In our experiments, the two main verification strategies (manual and automatic showed significant improvement as ProB's evaluator proves complementary to Atelier B built-in provers. We conducted experiments with the B model of a micro-controller instruction set; several verification conditions, that we were not able to discharge automatically or manually with AtelierB's provers, were automatically verified using BEval.

  12. Cognitive Bias in Systems Verification

    Science.gov (United States)

    Larson, Steve

    2012-01-01

    Working definition of cognitive bias: Patterns by which information is sought and interpreted that can lead to systematic errors in decisions. Cognitive bias is used in diverse fields: Economics, Politics, Intelligence, Marketing, to name a few. Attempts to ground cognitive science in physical characteristics of the cognitive apparatus exceed our knowledge. Studies based on correlations; strict cause and effect is difficult to pinpoint. Effects cited in the paper and discussed here have been replicated many times over, and appear sound. Many biases have been described, but it is still unclear whether they are all distinct. There may only be a handful of fundamental biases, which manifest in various ways. Bias can effect system verification in many ways . Overconfidence -> Questionable decisions to deploy. Availability -> Inability to conceive critical tests. Representativeness -> Overinterpretation of results. Positive Test Strategies -> Confirmation bias. Debiasing at individual level very difficult. The potential effect of bias on the verification process can be managed, but not eliminated. Worth considering at key points in the process.

  13. The joint verification experiments as a global non-proliferation exercise

    International Nuclear Information System (INIS)

    Shaner, J.W.

    1998-01-01

    This conference commemorates the 10th anniversary of the second of two Joint Verification Experiments conducted by the Soviet Union and the US. These two experiments, one at the Nevada test site in the US, and the second here at the Semipalatinsk test site were designed to test the verification of a nuclear testing treaty limiting the size underground explosions to 150 kilotons. By building trust and technical respect between the weapons scientists of the two most powerful adversaries, the Joint Verification Experiment (JVE) had the unanticipated result of initiating a suite of cooperative projects and programs aimed at reducing the Cold War threats and preventing the proliferation of weapons of mass destruction

  14. Automated Installation Verification of COMSOL via LiveLink for MATLAB

    International Nuclear Information System (INIS)

    Crowell, Michael W

    2015-01-01

    Verifying that a local software installation performs as the developer intends is a potentially time-consuming but necessary step for nuclear safety-related codes. Automating this process not only saves time, but can increase reliability and scope of verification compared to ''hand'' comparisons. While COMSOL does not include automatic installation verification as many commercial codes do, it does provide tools such as LiveLink"T"M for MATLAB® and the COMSOL API for use with Java® through which the user can automate the process. Here we present a successful automated verification example of a local COMSOL 5.0 installation for nuclear safety-related calculations at the Oak Ridge National Laboratory's High Flux Isotope Reactor (HFIR).

  15. Automated Installation Verification of COMSOL via LiveLink for MATLAB

    Energy Technology Data Exchange (ETDEWEB)

    Crowell, Michael W [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-01-01

    Verifying that a local software installation performs as the developer intends is a potentially time-consuming but necessary step for nuclear safety-related codes. Automating this process not only saves time, but can increase reliability and scope of verification compared to ‘hand’ comparisons. While COMSOL does not include automatic installation verification as many commercial codes do, it does provide tools such as LiveLink™ for MATLAB® and the COMSOL API for use with Java® through which the user can automate the process. Here we present a successful automated verification example of a local COMSOL 5.0 installation for nuclear safety-related calculations at the Oak Ridge National Laboratory’s High Flux Isotope Reactor (HFIR).

  16. SSME Alternate Turbopump Development Program: Design verification specification for high-pressure fuel turbopump

    Science.gov (United States)

    1989-01-01

    The design and verification requirements are defined which are appropriate to hardware at the detail, subassembly, component, and engine levels and to correlate these requirements to the development demonstrations which provides verification that design objectives are achieved. The high pressure fuel turbopump requirements verification matrix provides correlation between design requirements and the tests required to verify that the requirement have been met.

  17. Aspiration biopsy of testis: another method for histologic examination

    International Nuclear Information System (INIS)

    Nseyo, U.O.; Englander, L.S.; Huben, R.P.; Pontes, J.E.

    1984-01-01

    The most important method for evaluating the pathogenesis of male infertility is open testicular biopsy. Herein the authors describe a method of aspiration biopsy of testis for histologic examination. Sexually mature dogs and rats treated with chemotherapeutic agents and ionizing radiation were followed with periodic testicular aspiration biopsy during and after treatment. The histologic findings from the aspiration biopsy compare with the results of routine histologic examination in assessing spermatogenetic activity and delineating pathologic changes. The puncture in the experimental animals was performed under general anesthesia. In human patients testicular biopsy could be done under local anesthesia in an outpatient clinic. The procedure would be less painful, minimally invasive, and more cost-effective

  18. Concomitant Mediastinoscopy Increases the Risk of Postoperative Pneumonia After Pulmonary Lobectomy.

    Science.gov (United States)

    Yendamuri, Sai; Battoo, Athar; Attwood, Kris; Dhillon, Samjot Singh; Dy, Grace K; Hennon, Mark; Picone, Anthony; Nwogu, Chukwumere; Demmy, Todd; Dexter, Elisabeth

    2018-05-01

    Mediastinoscopy is considered the gold standard for preresectional staging of lung cancer. We sought to examine the effect of concomitant mediastinoscopy on postoperative pneumonia (POP) in patients undergoing lobectomy. All patients in our institutional database (2008-2015) undergoing lobectomy who did not receive neoadjuvant therapy were included in our study. The relationship between mediastinoscopy and POP was examined using univariate (Chi square) and multivariate analyses (binary logistic regression). In order to validate our institutional findings, lobectomy data in the National Surgical Quality Improvement Program (NSQIP) from 2005 to 2014 were analyzed for these associations. Of 810 patients who underwent a lobectomy at our institution, 741 (91.5%) surgeries were performed by video-assisted thoracic surgery (VATS) and 487 (60.1%) patients underwent concomitant mediastinoscopy. Univariate analysis demonstrated an association between mediastinoscopy and POP in patients undergoing VATS [odds ratio (OR) 1.80; p = 0.003], but not open lobectomy. Multivariate analysis retained mediastinoscopy as a variable, although the relationship showed only a trend (OR 1.64; p = 0.1). In the NSQIP cohort (N = 12,562), concomitant mediastinoscopy was performed in 9.0% of patients, with 44.5% of all the lobectomies performed by VATS. Mediastinoscopy was associated with POP in patients having both open (OR1.69; p < 0.001) and VATS lobectomy (OR 1.72; p = 0.002). This effect remained in multivariate analysis in both the open and VATS lobectomy groups (OR 1.46, p = 0.003; and 1.53, p = 0.02, respectively). Mediastinoscopy may be associated with an increased risk of POP after pulmonary lobectomy. This observation should be examined in other datasets as it potentially impacts preresectional staging algorithms for patients with lung cancer.

  19. SE Marine Mammal Histology/Tissue data

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Tissue samples are collected from stranded marine mammals in the Southeastern United States. These tissue samples are examined histologically and evaluated to...

  20. The concomitant apoptosis and EMT underlie the fundamental functions of TGF-β.

    Science.gov (United States)

    Song, Jianguo; Shi, Weiwei

    2018-01-01

    TGF-β's multipotent cellular effects and their relations are critical for TGF-β's pathophysiological functions. However, these effects may appear to be paradoxical in understanding TGF-β's functions. Apoptosis and epithelial-mesenchymal transition (EMT) are two fundamental events that are deeply linked to various physiological and disease-related processes. These two major cellular fates are subtly regulated and can be potently stimulated by TGF-β, which profoundly contribute to the biological roles of TGF-β. Moreover, these two events are also indirectly and directly correlated with TGF-β-mediated growth inhibition and are relevant to the current understanding of the roles of TGF-β in tumorigenesis and cancer progression. Although TGF-β-induced apoptosis and EMT can be singly independent cellular events, they can also be mutually exclusive but interrelated concomitant events in various cases. Thus, the modulation of apoptosis and EMT is essential for the seemingly paradoxical functions of TGF-β. However, the concomitant effect of TGF-β on apoptosis and EMT, the balance and regulated alterations of them are still been ignored or underestimated. This review focuses on the TGF-β-induced concomitant apoptosis and EMT. We aim to provide an insight in understanding their significance, balance, and modulation in TGF-β-mediated biological functions. © The Author 2017. Published by Oxford University Press on behalf of the Institute of Biochemistry and Cell Biology, Shanghai Institutes for Biological Sciences, Chinese Academy of Sciences. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  1. Wavelet-based verification of the quantitative precipitation forecast

    Science.gov (United States)

    Yano, Jun-Ichi; Jakubiak, Bogumil

    2016-06-01

    This paper explores the use of wavelets for spatial verification of quantitative precipitation forecasts (QPF), and especially the capacity of wavelets to provide both localization and scale information. Two 24-h forecast experiments using the two versions of the Coupled Ocean/Atmosphere Mesoscale Prediction System (COAMPS) on 22 August 2010 over Poland are used to illustrate the method. Strong spatial localizations and associated intermittency of the precipitation field make verification of QPF difficult using standard statistical methods. The wavelet becomes an attractive alternative, because it is specifically designed to extract spatially localized features. The wavelet modes are characterized by the two indices for the scale and the localization. Thus, these indices can simply be employed for characterizing the performance of QPF in scale and localization without any further elaboration or tunable parameters. Furthermore, spatially-localized features can be extracted in wavelet space in a relatively straightforward manner with only a weak dependence on a threshold. Such a feature may be considered an advantage of the wavelet-based method over more conventional "object" oriented verification methods, as the latter tend to represent strong threshold sensitivities. The present paper also points out limits of the so-called "scale separation" methods based on wavelets. Our study demonstrates how these wavelet-based QPF verifications can be performed straightforwardly. Possibilities for further developments of the wavelet-based methods, especially towards a goal of identifying a weak physical process contributing to forecast error, are also pointed out.

  2. Societal Verification: Intellectual Game or International Game-Changer

    International Nuclear Information System (INIS)

    Hartigan, Kelsey; Hinderstein, Corey

    2013-01-01

    Within the nuclear nonproliferation and arms control field, there is an increasing appreciation for the potential of open source information technologies to supplement existing verification and compliance regimes. While clearly not a substitute for on-site inspections or national technical means, it may be possible to better leverage information gleaned from commercial satellite imagery, international trade records and the vast amount of data being exchanged online and between publics (including social media) so as to develop a more comprehensive set of tools and practices for monitoring and verifying a state’s nuclear activities and helping judge compliance with international obligations. The next generation “toolkit” for monitoring and verifying items, facility operations and activities will likely include a more diverse set of analytical tools and technologies than are currently used internationally. To explore these and other issues, the Nuclear Threat Initiative has launched an effort that examines, in part, the role that emerging technologies and “citizen scientists” might play in future verification regimes. This paper will include an assessment of past proliferation and security “events” and whether emerging tools and technologies would have provided indicators concurrently or in advance of these actions. Such case studies will be instrumental in understanding the reliability of these technologies and practices and in thinking through the requirements of a 21st century verification regime. Keywords: Verification, social media, open-source information, arms control, disarmament.

  3. Histology of the first fish

    Science.gov (United States)

    Smith, M.P.; Sansom, I.J.; Repetski, J.E.

    1996-01-01

    THE first description of Anatolepis Bockelie & Fortey was from early Ordovician sediments of Ny Friesland, Spitsbergen1,2, but the genus is now known from many localities in North America and Greenland, ranging in age from the Late Cambrian period to the Early Ordovician3-6. Although initially interpreted as an agnathan fish2,3 that predated other representatives7, this has been widely disputed because the available histological data were unconvincing6,8-10 and the scales fell outside the known morphological range of other accepted early vertebrates9-11. Further doubt was cast upon the vertebrate affinity of Anatolepis when specimens from East Greenland were interpreted as the cuticular fragments of aglaspid arthropods6, although this interpretation has also been refuted12. Here we report on the morphology and histology of large collections of Anatolepis, and demonstrate the presence of dentine, a tissue unique to vertebrates, confirming that the taxon is both a vertebrate and the oldest known fish.

  4. Portable system for periodical verification of area monitors for neutrons

    International Nuclear Information System (INIS)

    Souza, Luciane de R.; Leite, Sandro Passos; Lopes, Ricardo Tadeu; Patrao, Karla C. de Souza; Fonseca, Evaldo S. da; Pereira, Walsan W.

    2009-01-01

    The Neutrons Laboratory develops a project viewing the construction of a portable test system for verification of functioning conditions of neutron area monitors. This device will allow to the users the verification of the calibration maintenance of his instruments at the use installations, avoiding the use of an inadequate equipment related to his answer to the neutron beam response

  5. Neutron spectrometric methods for core inventory verification in research reactors

    International Nuclear Information System (INIS)

    Ellinger, A.; Filges, U.; Hansen, W.; Knorr, J.; Schneider, R.

    2002-01-01

    In consequence of the Non-Proliferation Treaty safeguards, inspections are periodically made in nuclear facilities by the IAEA and the EURATOM Safeguards Directorate. The inspection methods are permanently improved. Therefore, the Core Inventory Verification method is being developed as an indirect method for the verification of the core inventory and to check the declared operation of research reactors

  6. Tree automata-based refinement with application to Horn clause verification

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick

    2015-01-01

    In this paper we apply tree-automata techniques to refinement of abstract interpretation in Horn clause verification. We go beyond previous work on refining trace abstractions; firstly we handle tree automata rather than string automata and thereby can capture traces in any Horn clause derivation...... compare the results with other state of the art Horn clause verification tools....

  7. Design of verification platform for wireless vision sensor networks

    Science.gov (United States)

    Ye, Juanjuan; Shang, Fei; Yu, Chuang

    2017-08-01

    At present, the majority of research for wireless vision sensor networks (WVSNs) still remains in the software simulation stage, and the verification platforms of WVSNs that available for use are very few. This situation seriously restricts the transformation from theory research of WVSNs to practical application. Therefore, it is necessary to study the construction of verification platform of WVSNs. This paper combines wireless transceiver module, visual information acquisition module and power acquisition module, designs a high-performance wireless vision sensor node whose core is ARM11 microprocessor and selects AODV as the routing protocol to set up a verification platform called AdvanWorks for WVSNs. Experiments show that the AdvanWorks can successfully achieve functions of image acquisition, coding, wireless transmission, and obtain the effective distance parameters between nodes, which lays a good foundation for the follow-up application of WVSNs.

  8. Darcy Tools version 3.4. Verification, validation and demonstration

    International Nuclear Information System (INIS)

    Svensson, Urban

    2010-12-01

    DarcyTools is a computer code for simulation of flow and transport in porous and/or fractured media. The fractured media in mind is a fractured rock and the porous media the soil cover on the top of the rock; it is hence groundwater flows, which is the class of flows in mind. A number of novel methods and features form the present version of DarcyTools. In the verification studies, these methods are evaluated by comparisons with analytical solutions for idealized situations. The five verification groups (see Table 3-1 below), thus reflect the scope of DarcyTools. The present report will focus on the Verification, Validation and Demonstration of DarcyTools. Two accompanying reports cover other aspects: - Concepts, Methods and Equations, /Svensson et al. 2010/ (Hereafter denoted Report 1). - User's Guide, /Svensson and Ferry 2010/ (Hereafter denoted Report 2)

  9. Darcy Tools version 3.4. Verification, validation and demonstration

    Energy Technology Data Exchange (ETDEWEB)

    Svensson, Urban (Computer-aided Fluid Engineering AB, Lyckeby (Sweden))

    2010-12-15

    DarcyTools is a computer code for simulation of flow and transport in porous and/or fractured media. The fractured media in mind is a fractured rock and the porous media the soil cover on the top of the rock; it is hence groundwater flows, which is the class of flows in mind. A number of novel methods and features form the present version of DarcyTools. In the verification studies, these methods are evaluated by comparisons with analytical solutions for idealized situations. The five verification groups (see Table 3-1 below), thus reflect the scope of DarcyTools. The present report will focus on the Verification, Validation and Demonstration of DarcyTools. Two accompanying reports cover other aspects: - Concepts, Methods and Equations, /Svensson et al. 2010/ (Hereafter denoted Report 1). - User's Guide, /Svensson and Ferry 2010/ (Hereafter denoted Report 2)

  10. 7 CFR 272.11 - Systematic Alien Verification for Entitlements (SAVE) Program.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 4 2010-01-01 2010-01-01 false Systematic Alien Verification for Entitlements (SAVE... FOR PARTICIPATING STATE AGENCIES § 272.11 Systematic Alien Verification for Entitlements (SAVE... and Naturalization Service (INS), in order to verify the validity of documents provided by aliens...

  11. 12 CFR 715.8 - Requirements for verification of accounts and passbooks.

    Science.gov (United States)

    2010-01-01

    ...' share and loan accounts; (2) Statistical method. A sampling method which provides for: (i) Random... CREDIT UNIONS SUPERVISORY COMMITTEE AUDITS AND VERIFICATIONS § 715.8 Requirements for verification of... jurisdiction in which the credit union is principally located, the auditor may choose among the sampling...

  12. Age verification cards fail to fully prevent minors from accessing tobacco products.

    Science.gov (United States)

    Kanda, Hideyuki; Osaki, Yoneatsu; Ohida, Takashi; Kaneita, Yoshitaka; Munezawa, Takeshi

    2011-03-01

    Proper age verification can prevent minors from accessing tobacco products. For this reason, electronic locking devices based on a proof-of age system utilising cards were installed in almost every tobacco vending machine across Japan and Germany to restrict sales to minors. We aimed to clarify the associations between amount smoked by high school students and the usage of age verification cards by conducting a nationwide cross-sectional survey of students in Japan. This survey was conducted in 2008. We asked high school students, aged 13-18 years, in Japan about their smoking behaviour, where they purchase cigarettes, if or if not they have used age verification cards, and if yes, how they obtained this card. As the amount smoked increased, the prevalence of purchasing cigarettes from vending machines also rose for both males and females. The percentage of those with experience of using an age verification card was also higher among those who smoked more. Somebody outside of family was the top source of obtaining cards. Surprisingly, around 5% of males and females belonging to the group with highest smoking levels applied for cards themselves. Age verification cards cannot fully prevent minors from accessing tobacco products. These findings suggest that a total ban of tobacco vending machines, not an age verification system, is needed to prevent sales to minors.

  13. Comparative histology of mouse, rat, and human pelvic ligaments.

    Science.gov (United States)

    Iwanaga, Ritsuko; Orlicky, David J; Arnett, Jameson; Guess, Marsha K; Hurt, K Joseph; Connell, Kathleen A

    2016-11-01

    The uterosacral (USL) and cardinal ligaments (CL) provide support to the uterus and pelvic organs, and the round ligaments (RL) maintain their position in the pelvis. In women with pelvic organ prolapse (POP), the connective tissue, smooth muscle, vasculature, and innervation of the pelvic support structures are altered. Rodents are commonly used animal models for POP research. However, the pelvic ligaments have not been defined in these animals. In this study, we hypothesized that the gross anatomy and histological composition of pelvic ligaments in rodents and humans are similar. We performed an extensive literature search for anatomical and histological descriptions of the pelvic support ligaments in rodents. We also performed anatomical dissections of the pelvis to define anatomical landmarks in relation to the ligaments. In addition, we identified the histological components of the pelvic ligaments and performed quantitative analysis of the smooth muscle bundles and connective tissue of the USL and RL. The anatomy of the USL, CL, and RL and their anatomical landmarks are similar in mice, rats, and humans. All species contain the same cellular components and have similar histological architecture. However, the cervical portion of the mouse USL and RL contain more smooth muscle and less connective tissue compared with rat and human ligaments. The pelvic support structures of rats and mice are anatomically and histologically similar to those of humans. We propose that both mice and rats are appropriate, cost-effective models for directed studies in POP research.

  14. A Cache System Design for CMPs with Built-In Coherence Verification

    Directory of Open Access Journals (Sweden)

    Mamata Dalui

    2016-01-01

    Full Text Available This work reports an effective design of cache system for Chip Multiprocessors (CMPs. It introduces built-in logic for verification of cache coherence in CMPs realizing directory based protocol. It is developed around the cellular automata (CA machine, invented by John von Neumann in the 1950s. A special class of CA referred to as single length cycle 2-attractor cellular automata (TACA has been planted to detect the inconsistencies in cache line states of processors’ private caches. The TACA module captures coherence status of the CMPs’ cache system and memorizes any inconsistent recording of the cache line states during the processors’ reference to a memory block. Theory has been developed to empower a TACA to analyse the cache state updates and then to settle to an attractor state indicating quick decision on a faulty recording of cache line status. The introduction of segmentation of the CMPs’ processor pool ensures a better efficiency, in determining the inconsistencies, by reducing the number of computation steps in the verification logic. The hardware requirement for the verification logic points to the fact that the overhead of proposed coherence verification module is much lesser than that of the conventional verification units and is insignificant with respect to the cost involved in CMPs’ cache system.

  15. Treatment of recurrent carcinoma of the paranasal sinuses using concomitant infusion cis-platinum and radiation therapy

    International Nuclear Information System (INIS)

    Rotman, M.; Choi, K.; Isaacson, S.; Rosenthal, J.

    1986-01-01

    Radiation with concomitant infusion chemotherapy has proved more effective in treating several epithelial malignancies than radiation alone. Hyperfractionated radiation was combined with concomitant infusion cis-platinum chemotherapy in an attempt to obtain still better control rates. This paper presents the early results of a pilot study using this combination in the treatment of advanced and recurrent carcinoma of the paranasal sinuses as well as a case that showed response of large fixed cervical nodes having metastasized from a previously treated carcinoma of the maxillary antrum

  16. A knowledge-base verification of NPP expert systems using extended Petri nets

    International Nuclear Information System (INIS)

    Kwon, Il Won; Seong, Poong Hyun

    1995-01-01

    The verification phase of knowledge base is an important part for developing reliable expert systems, especially in nuclear industry. Although several strategies or tools have been developed to perform potential error checking, they often neglect the reliability of verification methods. Because a Petri net provides a uniform mathematical formalization of knowledge base, it has been employed for knowledge base verification. In this work, we devise and suggest an automated tool, called COKEP (Checker Of Knowledge base using Extended Petri net), for detecting incorrectness, inconsistency, and incompleteness in a knowledge base. The scope of the verification problem is expanded to chained errors, unlike previous studies that assumed error incidence to be limited to rule pairs only. In addition, we consider certainty factor in checking, because most of knowledge bases have certainty factors

  17. Possible increased risk of rhabdomyolysis during concomitant use of simvastatin and gemfibrozil

    NARCIS (Netherlands)

    VanPuijenbroek, EP; DuBufVereijken, PWG; Spooren, PFMJ; VanDoormaal, JJ

    1996-01-01

    The occurrence of rhabdomyolysis is one of the rare side-effects of the cholesterol-lowering agent simvastatin. During the use of lovastatin, an agent related to simvastatin, the risk of this side-effect might be increased when cyclosporin or gemfibrozil are used concomitantly. It is possible that

  18. MR image-guided portal verification for brain treatment field

    International Nuclear Information System (INIS)

    Yin Fangfang; Gao Qinghuai; Xie Huchen; Nelson, Diana F.; Yu Yan; Kwok, W. Edmund; Totterman, Saara; Schell, Michael C.; Rubin, Philip

    1998-01-01

    Purpose: To investigate a method for the generation of digitally reconstructed radiographs directly from MR images (DRR-MRI) to guide a computerized portal verification procedure. Methods and Materials: Several major steps were developed to perform an MR image-guided portal verification procedure. Initially, a wavelet-based multiresolution adaptive thresholding method was used to segment the skin slice-by-slice in MR brain axial images. Some selected anatomical structures, such as target volume and critical organs, were then manually identified and were reassigned to relatively higher intensities. Interslice information was interpolated with a directional method to achieve comparable display resolution in three dimensions. Next, a ray-tracing method was used to generate a DRR-MRI image at the planned treatment position, and the ray tracing was simply performed on summation of voxels along the ray. The skin and its relative positions were also projected to the DRR-MRI and were used to guide the search of similar features in the portal image. A Canny edge detector was used to enhance the brain contour in both portal and simulation images. The skin in the brain portal image was then extracted using a knowledge-based searching technique. Finally, a Chamfer matching technique was used to correlate features between DRR-MRI and portal image. Results: The MR image-guided portal verification method was evaluated using a brain phantom case and a clinical patient case. Both DRR-CT and DRR-MRI were generated using CT and MR phantom images with the same beam orientation and then compared. The matching result indicated that the maximum deviation of internal structures was less than 1 mm. The segmented results for brain MR slice images indicated that a wavelet-based image segmentation technique provided a reasonable estimation for the brain skin. For the clinical patient case with a given portal field, the MR image-guided verification method provided an excellent match between

  19. Co-verification of hardware and software for ARM SoC design

    CERN Document Server

    Andrews, Jason

    2004-01-01

    Hardware/software co-verification is how to make sure that embedded system software works correctly with the hardware, and that the hardware has been properly designed to run the software successfully -before large sums are spent on prototypes or manufacturing. This is the first book to apply this verification technique to the rapidly growing field of embedded systems-on-a-chip(SoC). As traditional embedded system design evolves into single-chip design, embedded engineers must be armed with the necessary information to make educated decisions about which tools and methodology to deploy. SoC verification requires a mix of expertise from the disciplines of microprocessor and computer architecture, logic design and simulation, and C and Assembly language embedded software. Until now, the relevant information on how it all fits together has not been available. Andrews, a recognized expert, provides in-depth information about how co-verification really works, how to be successful using it, and pitfalls to avoid. H...

  20. Analyzing personalized policies for online biometric verification.

    Science.gov (United States)

    Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M

    2014-01-01

    Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India's program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India's biometric program. The mean delay is [Formula: see text] sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32-41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident.

  1. Unified and Modular Modeling and Functional Verification Framework of Real-Time Image Signal Processors

    Directory of Open Access Journals (Sweden)

    Abhishek Jain

    2016-01-01

    Full Text Available In VLSI industry, image signal processing algorithms are developed and evaluated using software models before implementation of RTL and firmware. After the finalization of the algorithm, software models are used as a golden reference model for the image signal processor (ISP RTL and firmware development. In this paper, we are describing the unified and modular modeling framework of image signal processing algorithms used for different applications such as ISP algorithms development, reference for hardware (HW implementation, reference for firmware (FW implementation, and bit-true certification. The universal verification methodology- (UVM- based functional verification framework of image signal processors using software reference models is described. Further, IP-XACT based tools for automatic generation of functional verification environment files and model map files are described. The proposed framework is developed both with host interface and with core using virtual register interface (VRI approach. This modeling and functional verification framework is used in real-time image signal processing applications including cellphone, smart cameras, and image compression. The main motivation behind this work is to propose the best efficient, reusable, and automated framework for modeling and verification of image signal processor (ISP designs. The proposed framework shows better results and significant improvement is observed in product verification time, verification cost, and quality of the designs.

  2. The fuzzy cube and causal efficacy: representation of concomitant mechanisms in stroke.

    Science.gov (United States)

    Jobe, Thomas H.; Helgason, Cathy M.

    1998-04-01

    Twentieth century medical science has embraced nineteenth century Boolean probability theory based upon two-valued Aristotelian logic. With the later addition of bit-based, von Neumann structured computational architectures, an epistemology based on randomness has led to a bivalent epidemiological methodology that dominates medical decision making. In contrast, fuzzy logic, based on twentieth century multi-valued logic, and computational structures that are content addressed and adaptively modified, has advanced a new scientific paradigm for the twenty-first century. Diseases such as stroke involve multiple concomitant causal factors that are difficult to represent using conventional statistical methods. We tested which paradigm best represented this complex multi-causal clinical phenomenon-stroke. We show that the fuzzy logic paradigm better represented clinical complexity in cerebrovascular disease than current probability theory based methodology. We believe this finding is generalizable to all of clinical science since multiple concomitant causal factors are involved in nearly all known pathological processes.

  3. Self-verification and depression among youth psychiatric inpatients.

    Science.gov (United States)

    Joiner, T E; Katz, J; Lew, A S

    1997-11-01

    According to self-verification theory (e.g., W.B. Swann, 1983), people are motivated to preserve stable self-concepts by seeking self-confirming interpersonal responses, even if the responses are negative. In the current study of 72 youth psychiatric inpatients (36 boys; 36 girls; ages 7-17, M = 13.18; SD = 2.59), the authors provide the 1st test of self-verification theory among a youth sample. Participants completed self-report questionnaires on depression, self-esteem, anxiety, negative and positive affect, and interest in negative feedback from others. The authors made chart diagnoses available, and they collected peer rejection ratings. Consistent with hypotheses, the authors found that interest in negative feedback was associated with depression, was predictive of peer rejection (but only within relatively longer peer relationships), was more highly related to cognitive than emotional aspects of depression, and was specifically associated with depression, rather than being generally associated with emotional distress. The authors discuss implications for self-verification theory and for the phenomenology of youth depression.

  4. Design and Verification of Fault-Tolerant Components

    DEFF Research Database (Denmark)

    Zhang, Miaomiao; Liu, Zhiming; Ravn, Anders Peter

    2009-01-01

    We present a systematic approach to design and verification of fault-tolerant components with real-time properties as found in embedded systems. A state machine model of the correct component is augmented with internal transitions that represent hypothesized faults. Also, constraints...... to model and check this design. Model checking uses concrete parameters, so we extend the result with parametric analysis using abstractions of the automata in a rigorous verification....... relatively detailed such that they can serve directly as blueprints for engineering, and yet be amenable to exhaustive verication. The approach is illustrated with a design of a triple modular fault-tolerant system that is a real case we received from our collaborators in the aerospace field. We use UPPAAL...

  5. CATS Deliverable 5.1 : CATS verification of test matrix and protocol

    NARCIS (Netherlands)

    Uittenbogaard, J.; Camp, O.M.G.C. op den; Montfort, S. van

    2016-01-01

    This report summarizes the work conducted within work package (WP) 5 "Verification of test matrix and protocol" of the Cyclist AEB testing system (CATS) project. It describes the verification process of the draft CATS test matrix resulting from WP1 and WP2, and the feasibility of meeting

  6. Tools and Methods for RTCP-Nets Modeling and Verification

    Directory of Open Access Journals (Sweden)

    Szpyrka Marcin

    2016-09-01

    Full Text Available RTCP-nets are high level Petri nets similar to timed colored Petri nets, but with different time model and some structural restrictions. The paper deals with practical aspects of using RTCP-nets for modeling and verification of real-time systems. It contains a survey of software tools developed to support RTCP-nets. Verification of RTCP-nets is based on coverability graphs which represent the set of reachable states in the form of directed graph. Two approaches to verification of RTCP-nets are considered in the paper. The former one is oriented towards states and is based on translation of a coverability graph into nuXmv (NuSMV finite state model. The later approach is oriented towards transitions and uses the CADP toolkit to check whether requirements given as μ-calculus formulae hold for a given coverability graph. All presented concepts are discussed using illustrative examples

  7. Outcomes of Osteochondral Allograft Transplantation With and Without Concomitant Meniscus Allograft Transplantation: A Comparative Matched Group Analysis.

    Science.gov (United States)

    Frank, Rachel M; Lee, Simon; Cotter, Eric J; Hannon, Charles P; Leroux, Timothy; Cole, Brian J

    2018-03-01

    Osteochondral allograft transplantation (OCA) is often performed with concomitant meniscus allograft transplantation (MAT) as a strategy for knee joint preservation, although to date, the effect of concomitant MAT on outcomes and failure rates after OCA has not been assessed. To determine clinical outcomes for patients undergoing OCA with MAT as compared with a matched cohort of patients undergoing isolated OCA. Control study; Level of evidence, 3. Patients who underwent OCA of the medial or lateral femoral condyle without concomitant MAT by a single surgeon were compared with a matched group of patients who underwent OCA with concomitant MAT (ipsilateral compartment). The patients were matched per age, sex, body mass index, and number of previous ipsilateral knee operations ±1. Patient-reported outcomes, complications, reoperations, and survival rates were compared between groups. One hundred patients undergoing OCA (50 isolated, 50 with MAT) with a mean ± SD follow-up of 4.9 ± 2.7 years (minimum, 2 years) were included (age, 31.7 ± 9.8 years; 52% male). Significantly more patients underwent OCA to the medial femoral condyle (n = 59) than the lateral femoral condyle (n = 41, P OCA. There were no significant differences between the groups regarding reoperation rate (n = 18 for OCA with MAT, n = 17 for OCA without MAT, P = .834), time to reoperation (2.2 ± 2.4 years for OCA with MAT, 3.4 ± 2.7 years for OCA without MAT, P = .149), or failure rates (n = 7 [14%] for OCA with MAT, n = 7 [14%] for OCA without MAT, P > .999). There were no significant differences in patient-reported clinical outcome scores between the groups at final follow-up. There was no significant difference in failure rates between patients undergoing medial femoral condyle OCA (n = 12, 15.3%) and lateral femoral condyle OCA (n = 5, 12.2%, P = .665). These results imply that with appropriate surgical indications to address meniscus deficiency in patients otherwise indicated for OCA and

  8. Demographics and Incidence of Histologically Confirmed Intracranial Tumors: A Five-year, Two-center Prospective Study

    Science.gov (United States)

    Dzhenkov, Deyan L; Kitanova, Martina; Ghenev, Peter; Tonchev, Anton B

    2017-01-01

    Introduction Intracranial tumors (ICTs) are a diverse group of malignancies that pose an immediate threat to patients' lives, no matter their local or metastatic origin, benign or malignant nature. These lesions have severe clinical courses and need to be diagnosed and treated as soon as possible, with pathological verification being the pivotal moment in the process of determining curative modalities. Aim The aim of this study was to compare the incidence of histologically confirmed ICTs in Eastern Bulgaria, based on their type (primary, metastatic, and non-volume occupying lesions (NVOL)), their respective subtypes, and incidence in a descriptive manner. Materials and Methods For a period of five full calendar years (January 1st, 2012 – December 31st, 2016), all histologically confirmed cases of intracranial tumors were prospectively collected from two individual tertiary healthcare institutions. The cases were then statistically analyzed in a descriptive manner, and incidences of primary, metastatic, and NVOL were compared with regards to their specific origins, types, and subtypes. Metastatic tumors were further segregated relative to their intracranial metastatic location. Results The total number of individual ICTs registered in the set timeframe was 822. Primary ICTs represented a total of 66.12% of the histologically confirmed cases, with the most common entries being tumors from a glial and meningeal origin, 30.90% were histologically confirmed as metastatic ICTs, from which the most common entries were of pulmonary origin, and the other 2.94% were NVOL. On behalf of their intracranial metastatic location, metastatic tumors were located predominantly in the supratentorial region, represented as a total of 87.80%, while the other 12.20% were located in the subtentorial region. Based on the descriptive analysis, the annual incidence per 100,000 capita of all ICTs is 9.12, comprised of 6.03 per 100,000 for primary ICTs, 2.82 per 100,000 for metastatic

  9. Plaque echodensity and textural features are associated with histologic carotid plaque instability.

    Science.gov (United States)

    Doonan, Robert J; Gorgui, Jessica; Veinot, Jean P; Lai, Chi; Kyriacou, Efthyvoulos; Corriveau, Marc M; Steinmetz, Oren K; Daskalopoulou, Stella S

    2016-09-01

    Carotid plaque echodensity and texture features predict cerebrovascular symptomatology. Our purpose was to determine the association of echodensity and textural features obtained from a digital image analysis (DIA) program with histologic features of plaque instability as well as to identify the specific morphologic characteristics of unstable plaques. Patients scheduled to undergo carotid endarterectomy were recruited and underwent carotid ultrasound imaging. DIA was performed to extract echodensity and textural features using Plaque Texture Analysis software (LifeQ Medical Ltd, Nicosia, Cyprus). Carotid plaque surgical specimens were obtained and analyzed histologically. Principal component analysis (PCA) was performed to reduce imaging variables. Logistic regression models were used to determine if PCA variables and individual imaging variables predicted histologic features of plaque instability. Image analysis data from 160 patients were analyzed. Individual imaging features of plaque echolucency and homogeneity were associated with a more unstable plaque phenotype on histology. These results were independent of age, sex, and degree of carotid stenosis. PCA reduced 39 individual imaging variables to five PCA variables. PCA1 and PCA2 were significantly associated with overall plaque instability on histology (both P = .02), whereas PCA3 did not achieve statistical significance (P = .07). DIA features of carotid plaques are associated with histologic plaque instability as assessed by multiple histologic features. Importantly, unstable plaques on histology appear more echolucent and homogeneous on ultrasound imaging. These results are independent of stenosis, suggesting that image analysis may have a role in refining the selection of patients who undergo carotid endarterectomy. Copyright © 2016 Society for Vascular Surgery. Published by Elsevier Inc. All rights reserved.

  10. Incidence Rate of Concomitant Systemic Diseases in the Aging Population with Postmenopausal Osteoporosis

    Directory of Open Access Journals (Sweden)

    Selçuk Sayılır

    2016-08-01

    Full Text Available Objective: To evaluate the concomitant systemic diseases with postmenopausal osteoporosis and to investigate the points to be considered in treatment approach of patients with osteoporosis. Materials and Methods: The study included 110 female patients admitted to our clinic and followed up after postmenopausal osteoporosis diagnosis. Besides the demographic data; the concomitant diseases of the patients such as hypertension, hypo-hyperthyroidism, diabetes mellitus, Alzheimer’s disease, malignancy, osteoarthritis, gastrointestinal system diseases, chronic obstructive pulmonary disease (COPD- asthma and depression were also recorded. Results: The mean age of the patients included in our study was 65.9±9.8 years. When the concomitant systemic diseases were examined; 40 patients had hypertension, 32 patients had osteoarthritis, 24 patients had gastrointestinal tract problems, 22 patients had thyroid disease, 21 patients had depression, 15 patients had hyperlipidemia, 12 patients had diabetes mellitus, 10 patients had COPD - asthma, 7 patients had cardiac diseases, 5 patients had malignancy and 2 patients had Alzheimer disease. Conclusion: Osteoporosis is a common disease in the geriatric population. As a chronic disease with an increasing incidence with aging; it can cause many health problems, prevalently pathological bone fractures, in our country and all over the world. Constitutively, prophylaxis of osteoporosis should be the first step. Because systemic diseases with increasing incidence with aging may affect the severity of osteoporosis and impair the treatment; it is important for both clinicians and the society to have sufficient information about osteoporosis.

  11. Alien Registration Number Verification via the U.S. Citizenship and Immigration Service's Systematic Alien Verification for Entitlements System

    National Research Council Canada - National Science Library

    Ainslie, Frances M; Buck, Kelly R

    2008-01-01

    The purpose of this study was to evaluate the implications of conducting high-volume automated checks of the United States Citizenship and Immigration Services Systematic Allen Verification for Entitlements System (SAVE...

  12. Sustaining a verification regime in a nuclear weapon-free world. VERTIC research report no. 4

    International Nuclear Information System (INIS)

    Moyland, S. van

    1999-01-01

    Sustaining high levels of commitment to and enthusiasm for the verification regime in a nuclear weapon-free world (NWFW) would be a considerable challenge, but the price of failure would be high. No verification system for a complete ban on a whole of weapon of mass destruction (WMD) has been in existence long enough to provide a precedent or the requisite experience. Nevertheless, lessons from the International Atomic Energy Agency's (IAEA) nuclear safeguards system are instructive. A potential problem over the long haul is the gradual erosion of the deterrent effect of verification that may result from the continual overlooking of minor instances of non-compliance. Flaws in the verification system must be identified and dealt with early lest they also corrode the system. To achieve this the verification organisation's inspectors and analytical staff will need sustained support, encouragement, resources and training. In drawing attention to weaknesses, they must be supported by management and at the political level. The leaking of sensitive information, either industrial or military, by staff of the verification regime is a potential problem. 'Managed access' techniques should be constantly examined and improved. The verification organisation and states parties will need to sustain close co-operation with the nuclear and related industries. Frequent review mechanisms must be established. States must invest time and effort to make them effective. Another potential problem is the withering of resources for sustained verification. Verification organisations tend to be pressured by states to cut or last least cap costs, even if the verification workload increases. The verification system must be effective as knowledge and experience allows. The organisation will need continuously to update its scientific methods and technology. This requires in-house resources plus external research and development (R and D). Universities, laboratories and industry need incentives to

  13. Sensor-fusion-based biometric identity verification

    International Nuclear Information System (INIS)

    Carlson, J.J.; Bouchard, A.M.; Osbourn, G.C.; Martinez, R.F.; Bartholomew, J.W.; Jordan, J.B.; Flachs, G.M.; Bao, Z.; Zhu, L.

    1998-02-01

    Future generation automated human biometric identification and verification will require multiple features/sensors together with internal and external information sources to achieve high performance, accuracy, and reliability in uncontrolled environments. The primary objective of the proposed research is to develop a theoretical and practical basis for identifying and verifying people using standoff biometric features that can be obtained with minimal inconvenience during the verification process. The basic problem involves selecting sensors and discovering features that provide sufficient information to reliably verify a person's identity under the uncertainties caused by measurement errors and tactics of uncooperative subjects. A system was developed for discovering hand, face, ear, and voice features and fusing them to verify the identity of people. The system obtains its robustness and reliability by fusing many coarse and easily measured features into a near minimal probability of error decision algorithm

  14. Symmetry mappings concomitant to particle-number-conservation-baryon-number conservation

    International Nuclear Information System (INIS)

    Davis, W.R.

    1977-01-01

    Four theorem serve to demonstrate that matter fields in space-time admit certain timelike symmetry mappings concomitant to the familiar notion of particle number conservation, which can be more fundamentally accounted for by a type of projective invariance principle. These particular symmetry mappings include a family of symmetry properties that may be admitted by Riemannian space-times. In their strongest form, the results obtained provide some insight relating to the conservation of baryon number

  15. Comparison of isolated and concomitant liver injuries: is hepatic trauma entirely responsible for the outcome?

    Science.gov (United States)

    Yazici, P; Aydin, U; Sozbilen, M

    2010-01-01

    This study was undertaken to examine both isolated and concomitant liver injuries to clarify the role of liver trauma on outcome. This retrospective study was a review of all abdominal trauma patients who presented with liver injuries, with or without concomitant injury at Ege University School of Medicine over a 3-year period. Presentation, injury grade, management, and outcomes were analyzed. Patients with isolated hepatic injury (Group A) were compared with patients who had concomitant hepatic injury (liver and spleen/small bowel) (Group B). Significance was set at 95% confidence intervals. Of 368 patients, 80 (21%) presented with liver injury. Of these, the aetiology was as follows: 53 (66.2%) blunt injury, 19 (23%) penetrating injury, and 8 (10%) gun shot trauma. There were 38 patients in Group A and 42 in Group B. Of these 42 patients, 19 were diagnosed with serious types of injury ; eight thoracic, three open long bone fracture, one intra-cardiac, one intracranial. Six additional patients were observed with injuries to large abdominal vessels. Eleven patients (28.9%) with isolated hepatic injury were managed non-operatively. Mortality, intensive care unit and hospital length of stay, and transfusion requirements were significantly higher in Group B. Only the number of transfused blood units and the grade of liver injury were found to be effective on outcome whereas stepwise regression analysis revealed that injury type (penetrating) and blood transfusion were predictive for mortality. This study highlighted that although isolated liver injury results in good outcome with non-operative management, concomitant injuries to the liver lead to a higher failure and mortality rate. However, liver injury itself is rarely responsible for death.

  16. Design and Verification of Critical Pressurised Windows for Manned Spaceflight

    Science.gov (United States)

    Lamoure, Richard; Busto, Lara; Novo, Francisco; Sinnema, Gerben; Leal, Mendes M.

    2014-06-01

    The Window Design for Manned Spaceflight (WDMS) project was tasked with establishing the state-of-art and explore possible improvements to the current structural integrity verification and fracture control methodologies for manned spacecraft windows.A critical review of the state-of-art in spacecraft window design, materials and verification practice was conducted. Shortcomings of the methodology in terms of analysis, inspection and testing were identified. Schemes for improving verification practices and reducing conservatism whilst maintaining the required safety levels were then proposed.An experimental materials characterisation programme was defined and carried out with the support of the 'Glass and Façade Technology Research Group', at the University of Cambridge. Results of the sample testing campaign were analysed, post-processed and subsequently applied to the design of a breadboard window demonstrator.Two Fused Silica glass window panes were procured and subjected to dedicated analyses, inspection and testing comprising both qualification and acceptance programmes specifically tailored to the objectives of the activity.Finally, main outcomes have been compiled into a Structural Verification Guide for Pressurised Windows in manned spacecraft, incorporating best practices and lessons learned throughout this project.

  17. Reordering Histology to Enhance Engagement

    Science.gov (United States)

    Amerongen, Helen

    2011-01-01

    In redesigning the preclinical curriculum and shifting from a discipline-based approach to an organ system-based approach, faculty at the University of Arizona College of Medicine in Tucson took the opportunity to restructure the sequence of introductory histology content to make it more engaging and relevant. In this article, the author describes…

  18. Real-time histology in liver disease using multiphoton microscopy with fluorescence lifetime imaging

    OpenAIRE

    Wang, Haolu; Liang, Xiaowen; Mohammed, Yousuf H.; Thomas, James A.; Bridle, Kim R.; Thorling, Camilla A.; Grice, Jeffrey E.; Xu, Zhi Ping; Liu, Xin; Crawford, Darrell H. G.; Roberts, Michael S.

    2015-01-01

    Conventional histology with light microscopy is essential in the diagnosis of most liver diseases. Recently, a concept of real-time histology with optical biopsy has been advocated. In this study, live mice livers (normal, with fibrosis, steatosis, hepatocellular carcinoma and ischemia-reperfusion injury) were imaged by MPM-FLIM for stain-free real-time histology. The acquired MPM-FLIM images were compared with conventional histological images. MPM-FLIM imaged subsurface cellular and subcellu...

  19. Automated Image Acquisition System for the Verification of Copper-Brass Seal Images

    International Nuclear Information System (INIS)

    Stringa, E.; Bergonzi, C.; Littmann, F.; ); Marszalek, Y.; Tempesta, S.; )

    2015-01-01

    This paper describes a system for the verification of copper-brass seals realized by JRC according to DG ENER requirements. DG ENER processes about 20,000 metal seals per year. The verification of metal seals consists in visually checking the identity of a removed seal. The identity of a copper-brass seal is defined by a random stain pattern realized by the seal producer together with random scratches engraved when the seals are initialized ('seal production'). In order to verify that the seal returned from the field is the expected one its pattern is compared with an image taken during seal production. Formerly, seal initialization and verification were very heavy tasks as seal pictures were acquired with a camera one by one both in the initialization and verification stages. During the initialization the Nuclear Safeguards technicians had to place one by one new seals under a camera and acquire the related reference images. During the verification, the technician had to take used seals and place them one by one under a camera to take new pictures. The new images were presented to the technicians without any preprocessing and the technicians had to recognize the seal. The new station described in this paper has an automated image acquisition system allowing to easily process seals in batches of 100 seals. To simplify the verification, a software automatically centres and rotates the newly acquired seal image in order to perfectly overlap with the reference image acquired during the production phase. The new system significantly speeds up seal production and helps particularly with the demanding task of seal verification. As a large part of the seals is dealt with by a joint Euratom-IAEA team, the IAEA directly profits from this development. The new tool has been in routine use since mid 2013. (author)

  20. Endometrial Histology of Depomedroxyprogesterone Acetate Users: A Pilot Study

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Objective. To obtain pilot data on the endometrial histology of Depomedroxyprogesterone acetate (Depo-Provera, DMPA users experiencing breakthrough bleeding (BTB versus users with amenorrhea. To compare the endometrial histology of patients who used DMPA continuously for 3–12 months versus those who used it for 13 months or more. Methods. Cross-sectional study. Endometrial biopsy was obtained from all consenting patients who used DMPA for at least 3 months. Patients were divided into those with BTB in the last 3 months versus those with amenorrhea for at least 3 months. Histology results and duration of therapy were compared. Results. The proportion of women with chronic endometritis, uterine polyps, atrophic, proliferative, or progesterone-dominant endometrium did not differ between those DMPA users with BTB versus those with amenorrhea. Duration of therapy did not correlate with symptoms of BTB or endometrial histology. Chronic endometritis was the most common histologic finding (10/40, 25% and occurred more often in women experiencing BTB (35% versus 15% (RR 1.62 CI 0.91–2.87. Moreover, 45% of women with BTB had received DMPA for more than 12 months. Conclusions. BTB was more common than previously reported in women using DMPA for more than 12 months. Chronic endometritis, which may indicate an underlying infectious or intracavitary anatomic etiology, has not been previously reported as a frequent finding in DMPA users, and may be related to ethnic or other sociodemographic characteristics of our patient population. Further study to elucidate the etiology of chronic endometritis in these patients is warranted.

  1. Concomitant Suppurative Parotitis and Condylar Osteomyelitis.

    Science.gov (United States)

    Vorrasi, John; Zinberg, Geoffrey

    2017-03-01

    Parotitis is a common occurrence in the immunocompromised, dehydrated, and malnourished patient as a result of dysfunctional ductal and parotid cells. Inflammation can be acute or chronic based on clinical history, and it can be suppurative based on the presence of micro or macro abscess formation within the substance of the gland. This report presents a case of concomitant condylar osteomyelitis and chronic suppurative parotitis in the setting of previous methicillin-susceptible Staphylococcus aureus foot infection. Ultimately, resection of osteomyelitis, drainage of parotid infection, and intravenous antibiotic therapy led to full resolution of the infection and symptoms. The final pathology of osteomyelitis of the temporomandibular joint and methicillin-resistant S aureus infection is an unusual consequence of chronic parotitis. The patient was restored with a total joint replacement approximately 3 months after resection with no recurrence of infection after 24 months. Copyright © 2016 American Association of Oral and Maxillofacial Surgeons. Published by Elsevier Inc. All rights reserved.

  2. Correlating students' educational background, study habits, and resource usage with learning success in medical histology.

    Science.gov (United States)

    Selvig, Daniel; Holaday, Louisa W; Purkiss, Joel; Hortsch, Michael

    2015-01-01

    Histology is a traditional core basic science component of most medical and dental education programs and presents a didactic challenge for many students. Identifying students that are likely to struggle with histology would allow for early intervention to support and encourage their learning success. To identify student characteristics that are associated with learning success in histology, three first-year medical school classes at the University of Michigan (>440 students) were surveyed about their educational background, attitudes toward learning histology, and their use of histology learning strategies and resources. These characteristics were linked with the students' quiz and examination results in histology. Students who reported previous experience in histology or pathology and hold science or biomedical science college degrees usually did well in histology. Learning success in histology was also positively associated with students' perception that histology is important for their professional career. Other positive indicators were in-person participation in teacher-guided learning experiences, specifically lecture and laboratory sessions. In contrast, students who relied on watching histology lectures by video rather than going to lectures in-person performed significantly worse. These characteristics and learning strategies of students who did well in this very visual and challenging study subject should be of help for identifying and advising students early, who might be at risk of failing a histology course or component. © 2014 American Association of Anatomists.

  3. 10 CFR 300.11 - Independent verification.

    Science.gov (United States)

    2010-01-01

    ... DEPARTMENT OF ENERGY CLIMATE CHANGE VOLUNTARY GREENHOUSE GAS REPORTING PROGRAM: GENERAL GUIDELINES § 300.11... managing an auditing or verification process, including the recruitment and allocation of other individual.... (c) Qualifications of organizations accrediting verifiers. Organizations that accredit individual...

  4. Increased signal intensity within glioblastoma resection cavities on fluid-attenuated inversion recovery imaging to detect early progressive disease in patients receiving radiotherapy with concomitant temozolomide therapy

    Energy Technology Data Exchange (ETDEWEB)

    Perry, Luke A. [Monash University, Melbourne (Australia); Korfiatis, Panagiotis; Erickson, Bradley J. [Mayo Clinic Rochester, Department of Radiology, Rochester, MN (United States); Agrawal, Jay P. [University of Massachusetts Medical School, Department of Radiology, Worcester, MA (United States)

    2018-01-15

    Our study tested the diagnostic accuracy of increased signal intensity (SI) within FLAIR MR images of resection cavities in differentiating early progressive disease (ePD) from pseudoprogression (PsP) in patients with glioblastoma treated with radiotherapy with concomitant temozolomide therapy. In this retrospective study approved by our Institutional Review Board, we evaluated the records of 122 consecutive patients with partially or totally resected glioblastoma. Region of interest (ROI) analysis assessed 33 MR examinations from 11 subjects with histologically confirmed ePD and 37 MR examinations from 14 subjects with PsP (5 histologically confirmed, 9 clinically diagnosed). After applying an N4 bias correction algorithm to remove B0 field distortion and to standardize image intensities and then normalizing the intensities based on an ROI of uninvolved white matter from the contralateral hemisphere, the mean intensities of the ROI from within the resection cavities were calculated. Measures of diagnostic performance were calculated from the receiver operating characteristic (ROC) curve using the threshold intensity that maximized differentiation. Subgroup analysis explored differences between the patients with biopsy-confirmed disease. At an optimal threshold intensity of 2.9, the area under the ROC curve (AUROC) for FLAIR to differentiate ePD from PsP was 0.79 (95% confidence interval 0.686-0.873) with a sensitivity of 0.818 and specificity of 0.694. The AUROC increased to 0.86 when only the patients with biopsy-confirmed PsP were considered. Increased SI within the resection cavity of FLAIR images is not a highly specific sign of ePD in glioblastoma patients treated with the Stupp protocol. (orig.)

  5. Preliminary report for using X-rays as verification and authentication tool

    Energy Technology Data Exchange (ETDEWEB)

    Esch, Ernst Ingo [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Desimone, David J. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Lakis, Rollin Evan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-04-06

    We examined x-rays for the use as authentication and verification tool in treaty verification. Several x-ray pictures were taken to determine the quality and feasibility of x-rays for these tasks. This document describes the capability of the used x-ray system and outlines its parameters and possible use.

  6. Secondary hypertension due to concomitant aldosterone-producing adenoma and parathyroid adenoma.

    Science.gov (United States)

    Chau, Katrina; Holmes, Daniel; Melck, Adrienne; Chan-Yan, Clifford

    2015-02-01

    There is a growing body of evidence supporting a bidirectional relationship between parathyroid hormone (PTH) and aldosterone (Aldo). We report a case of secondary hypertension due to concomitant Aldo-producing adenoma (APA) and parathyroid adenoma (PA) requiring both unilateral adrenalectomy and parathyroidectomy. © American Journal of Hypertension, Ltd 2014. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  7. Research on key technology of the verification system of steel rule based on vision measurement

    Science.gov (United States)

    Jia, Siyuan; Wang, Zhong; Liu, Changjie; Fu, Luhua; Li, Yiming; Lu, Ruijun

    2018-01-01

    The steel rule plays an important role in quantity transmission. However, the traditional verification method of steel rule based on manual operation and reading brings about low precision and low efficiency. A machine vison based verification system of steel rule is designed referring to JJG1-1999-Verificaiton Regulation of Steel Rule [1]. What differentiates this system is that it uses a new calibration method of pixel equivalent and decontaminates the surface of steel rule. Experiments show that these two methods fully meet the requirements of the verification system. Measuring results strongly prove that these methods not only meet the precision of verification regulation, but also improve the reliability and efficiency of the verification system.

  8. ECG Sensor Verification System with Mean-Interval Algorithm for Handling Sport Issue

    Directory of Open Access Journals (Sweden)

    Kuo-Kun Tseng

    2016-01-01

    Full Text Available With the development of biometric verification, we proposed a new algorithm and personal mobile sensor card system for ECG verification. The proposed new mean-interval approach can identify the user quickly with high accuracy and consumes a small amount of flash memory in the microprocessor. The new framework of the mobile card system makes ECG verification become a feasible application to overcome the issues of a centralized database. For a fair and comprehensive evaluation, the experimental results have been tested on public MIT-BIH ECG databases and our circuit system; they confirm that the proposed scheme is able to provide excellent accuracy and low complexity. Moreover, we also proposed a multiple-state solution to handle the heat rate changes of sports problem. It should be the first to address the issue of sports in ECG verification.

  9. Development of the advanced PHWR technology -Verification tests for CANDU advanced fuel-

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Jang Hwan; Suk, Hoh Chun; Jung, Moon Kee; Oh, Duk Joo; Park, Joo Hwan; Shim, Kee Sub; Jang, Suk Kyoo; Jung, Heung Joon; Park, Jin Suk; Jung, Seung Hoh; Jun, Ji Soo; Lee, Yung Wook; Jung, Chang Joon; Byun, Taek Sang; Park, Kwang Suk; Kim, Bok Deuk; Min, Kyung Hoh [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-07-01

    This is the `94 annual report of the CANDU advanced fuel verification test project. This report describes the out-of pile hydraulic tests at CANDU-hot test loop for verification of CANFLEX fuel bundle. It is also describes the reactor thermal-hydraulic analysis for thermal margin and flow stability. The contents in this report are as follows; (1) Out-of pile hydraulic tests for verification of CANFLEX fuel bundle. (a) Pressure drop tests at reactor operation condition (b) Strength test during reload at static condition (c) Impact test during reload at impact load condition (d) Endurance test for verification of fuel integrity during life time (2) Reactor thermal-hydraulic analysis with CANFLEX fuel bundle. (a) Critical channel power sensitivity analysis (b) CANDU-6 channel flow analysis (c) Flow instability analysis. 61 figs, 29 tabs, 21 refs. (Author).

  10. Development of the advanced PHWR technology -Verification tests for CANDU advanced fuel-

    International Nuclear Information System (INIS)

    Jung, Jang Hwan; Suk, Hoh Chun; Jung, Moon Kee; Oh, Duk Joo; Park, Joo Hwan; Shim, Kee Sub; Jang, Suk Kyoo; Jung, Heung Joon; Park, Jin Suk; Jung, Seung Hoh; Jun, Ji Soo; Lee, Yung Wook; Jung, Chang Joon; Byun, Taek Sang; Park, Kwang Suk; Kim, Bok Deuk; Min, Kyung Hoh

    1995-07-01

    This is the '94 annual report of the CANDU advanced fuel verification test project. This report describes the out-of pile hydraulic tests at CANDU-hot test loop for verification of CANFLEX fuel bundle. It is also describes the reactor thermal-hydraulic analysis for thermal margin and flow stability. The contents in this report are as follows; (1) Out-of pile hydraulic tests for verification of CANFLEX fuel bundle. (a) Pressure drop tests at reactor operation condition (b) Strength test during reload at static condition (c) Impact test during reload at impact load condition (d) Endurance test for verification of fuel integrity during life time (2) Reactor thermal-hydraulic analysis with CANFLEX fuel bundle. (a) Critical channel power sensitivity analysis (b) CANDU-6 channel flow analysis (c) Flow instability analysis. 61 figs, 29 tabs, 21 refs. (Author)

  11. Effect of Concomitant Pain Medications on Response to Pregabalin in Patients with Postherpetic Neuralgia or Spinal Cord Injury-Related Neuropathic Pain.

    Science.gov (United States)

    Schug, Stephan A; Parsons, Bruce; Almas, Mary; Whalen, Ed

    2017-01-01

    Patients with neuropathic pain (NeP) often receive combination therapy with multiple agents in the hopes of improving both pain and any comorbidities that may be present. While pregabalin is often recommended as a first-line treatment of NeP, few studies have examined the effects of concomitant medications on the efficacy of pregabalin. To examine the effects of concomitant medications on the efficacy and safety of pregabalin for the treatment of NeP. Data were derived from 7 randomized placebo-controlled trials of pregabalin (150, 300, 600, and flexible 150 - 600 mg/d) for the treatment of postherpetic neuralgia (PHN) and 2 randomized placebo-controlled trials for the treatment of NeP due to spinal cord injury (SCI-NeP). On each day, patients rated the severity of their pain and pain-related sleep interference (PRSI) over the previous 24 hours on a scale from 0 to 10, with higher scores indicating greater severity. Patients were also continually monitored for the occurrence of adverse events. A pooled retrospective analyses of data from randomized clinical trials. Changes from baseline in mean weekly pain and PRSI scores were compared between patients who received concomitant NeP medications and patients who did not receive concomitant NeP medications. Results of these comparisons are presented separately for the PHN (through 4, 8, and 12 weeks) and SCI-NeP (through 12 weeks) cohorts. Common adverse events are also presented for each treatment group. Pregabalin significantly improved both pain and PRSI scores relative to placebo at most dose levels and time points examined. Notably, little difference was observed in the extent of therapeutic response to pregabalin between patients who received concomitant NeP medications and patients who did not receive concomitant NeP medications. Additionally, the profile of treatment-emergent adverse events appeared to be largely unaffected by the use of concomitant NeP medications in the pooled patient population. Our analysis

  12. Partner verification: restoring shattered images of our intimates.

    Science.gov (United States)

    De La Ronde, C; Swann, W B

    1998-08-01

    When spouses received feedback that disconfirmed their impressions of their partners, they attempted to undermine that feedback during subsequent interactions with these partners. Such partner verification activities occurred whether partners construed the feedback as overly favorable or overly unfavorable. Furthermore, because spouses tended to see their partners as their partners saw themselves, their efforts to restore their impressions of partners often worked hand-in-hand with partners' efforts to verify their own views. Finally, support for self-verification theory emerged in that participants were more intimate with spouses who verified their self-views, whether their self-views happened to be positive or negative.

  13. Verification and Validation for Flight-Critical Systems (VVFCS)

    Science.gov (United States)

    Graves, Sharon S.; Jacobsen, Robert A.

    2010-01-01

    On March 31, 2009 a Request for Information (RFI) was issued by NASA s Aviation Safety Program to gather input on the subject of Verification and Validation (V & V) of Flight-Critical Systems. The responses were provided to NASA on or before April 24, 2009. The RFI asked for comments in three topic areas: Modeling and Validation of New Concepts for Vehicles and Operations; Verification of Complex Integrated and Distributed Systems; and Software Safety Assurance. There were a total of 34 responses to the RFI, representing a cross-section of academic (26%), small & large industry (47%) and government agency (27%).

  14. Inventory of present verification techniques. Viewpoint of EURATOM

    International Nuclear Information System (INIS)

    Kloeckner, W.; Eecken, D. Van der; Gmelin, W.

    1998-01-01

    Starting from the role of Euratom as an established regional safeguards system, an overview is given of verification techniques currently practised by Euratom. In the stage-light of a rapidly changing and complex international safeguards scene, Euratom considers it has an important role to play. Having in mind the possibilities created by accelerating modern technology, recommendations are given for an enhanced use of technological means in safeguards. The viewpoint of Euratom is that the majority of methodologies and techniques in place may very well be copied to or used for a cut-off verification system currently under discussion

  15. Challenges in the Verification of Reinforcement Learning Algorithms

    Science.gov (United States)

    Van Wesel, Perry; Goodloe, Alwyn E.

    2017-01-01

    Machine learning (ML) is increasingly being applied to a wide array of domains from search engines to autonomous vehicles. These algorithms, however, are notoriously complex and hard to verify. This work looks at the assumptions underlying machine learning algorithms as well as some of the challenges in trying to verify ML algorithms. Furthermore, we focus on the specific challenges of verifying reinforcement learning algorithms. These are highlighted using a specific example. Ultimately, we do not offer a solution to the complex problem of ML verification, but point out possible approaches for verification and interesting research opportunities.

  16. Automated synthesis and verification of configurable DRAM blocks for ASIC's

    Science.gov (United States)

    Pakkurti, M.; Eldin, A. G.; Kwatra, S. C.; Jamali, M.

    1993-01-01

    A highly flexible embedded DRAM compiler is developed which can generate DRAM blocks in the range of 256 bits to 256 Kbits. The compiler is capable of automatically verifying the functionality of the generated DRAM modules. The fully automated verification capability is a key feature that ensures the reliability of the generated blocks. The compiler's architecture, algorithms, verification techniques and the implementation methodology are presented.

  17. High-level verification

    CERN Document Server

    Lerner, Sorin; Kundu, Sudipta

    2011-01-01

    Given the growing size and heterogeneity of Systems on Chip (SOC), the design process from initial specification to chip fabrication has become increasingly complex. This growing complexity provides incentive for designers to use high-level languages such as C, SystemC, and SystemVerilog for system-level design. While a major goal of these high-level languages is to enable verification at a higher level of abstraction, allowing early exploration of system-level designs, the focus so far for validation purposes has been on traditional testing techniques such as random testing and scenario-based

  18. BAGHOUSE FILTRATION PRODUCTS VERIFICATION TESTING, HOW IT BENEFITS THE BOILER BAGHOUSE OPERATOR

    Science.gov (United States)

    The paper describes the Environmental Technology Verification (ETV) Program for baghouse filtration products developed by the Air Pollution Control Technology Verification Center, one of six Centers under the ETV Program, and discusses how it benefits boiler baghouse operators. A...

  19. Linear and nonlinear verification of gyrokinetic microstability codes

    Science.gov (United States)

    Bravenec, R. V.; Candy, J.; Barnes, M.; Holland, C.

    2011-12-01

    Verification of nonlinear microstability codes is a necessary step before comparisons or predictions of turbulent transport in toroidal devices can be justified. By verification we mean demonstrating that a code correctly solves the mathematical model upon which it is based. Some degree of verification can be accomplished indirectly from analytical instability threshold conditions, nonlinear saturation estimates, etc., for relatively simple plasmas. However, verification for experimentally relevant plasma conditions and physics is beyond the realm of analytical treatment and must rely on code-to-code comparisons, i.e., benchmarking. The premise is that the codes are verified for a given problem or set of parameters if they all agree within a specified tolerance. True verification requires comparisons for a number of plasma conditions, e.g., different devices, discharges, times, and radii. Running the codes and keeping track of linear and nonlinear inputs and results for all conditions could be prohibitive unless there was some degree of automation. We have written software to do just this and have formulated a metric for assessing agreement of nonlinear simulations. We present comparisons, both linear and nonlinear, between the gyrokinetic codes GYRO [J. Candy and R. E. Waltz, J. Comput. Phys. 186, 545 (2003)] and GS2 [W. Dorland, F. Jenko, M. Kotschenreuther, and B. N. Rogers, Phys. Rev. Lett. 85, 5579 (2000)]. We do so at the mid-radius for the same discharge as in earlier work [C. Holland, A. E. White, G. R. McKee, M. W. Shafer, J. Candy, R. E. Waltz, L. Schmitz, and G. R. Tynan, Phys. Plasmas 16, 052301 (2009)]. The comparisons include electromagnetic fluctuations, passing and trapped electrons, plasma shaping, one kinetic impurity, and finite Debye-length effects. Results neglecting and including electron collisions (Lorentz model) are presented. We find that the linear frequencies with or without collisions agree well between codes, as do the time averages of

  20. Z-2 Architecture Description and Requirements Verification Results

    Science.gov (United States)

    Graziosi, Dave; Jones, Bobby; Ferl, Jinny; Scarborough, Steve; Hewes, Linda; Ross, Amy; Rhodes, Richard

    2016-01-01

    The Z-2 Prototype Planetary Extravehicular Space Suit Assembly is a continuation of NASA's Z series of spacesuits. The Z-2 is another step in NASA's technology development roadmap leading to human exploration of the Martian surface. The suit was designed for maximum mobility at 8.3 psid, reduced mass, and to have high fidelity life support interfaces. As Z-2 will be man-tested at full vacuum in NASA JSC's Chamber B, it was manufactured as Class II, making it the most flight-like planetary walking suit produced to date. The Z-2 suit architecture is an evolution of previous EVA suits, namely the ISS EMU, Mark III, Rear Entry I-Suit and Z-1 spacesuits. The suit is a hybrid hard and soft multi-bearing, rear entry spacesuit. The hard upper torso (HUT) is an all-composite structure and includes a 2-bearing rolling convolute shoulder with Vernier sizing mechanism, removable suit port interface plate (SIP), elliptical hemispherical helmet and self-don/doff shoulder harness. The hatch is a hybrid aluminum and composite construction with Apollo style gas connectors, custom water pass-thru, removable hatch cage and interfaces to primary and auxiliary life support feed water bags. The suit includes Z-1 style lower arms with cam brackets for Vernier sizing and government furnished equipment (GFE) Phase VI gloves. The lower torso includes a telescopic waist sizing system, waist bearing, rolling convolute waist joint, hard brief, 2 bearing soft hip thigh, Z-1 style legs with ISS EMU style cam brackets for sizing, and conformal walking boots with ankle bearings. The Z-2 Requirements Verification Plan includes the verification of more than 200 individual requirements. The verification methods include test, analysis, inspection, demonstration or a combination of methods. Examples of unmanned requirements include suit leakage, proof pressure testing, operational life, mass, isometric man-loads, sizing adjustment ranges, internal and external interfaces such as in-suit drink bag