WorldWideScience

Sample records for integrity constraint checking

  1. Incremental Integrity Checking: Limitations and Possibilities

    DEFF Research Database (Denmark)

    Christiansen, Henning; Martinenghi, Davide

    2005-01-01

    Integrity checking is an essential means for the preservation of the intended semantics of a deductive database. Incrementality is the only feasible approach to checking and can be obtained with respect to given update patterns by exploiting query optimization techniques. By reducing the problem...... to query containment, we show that no procedure exists that always returns the best incremental test (aka simplification of integrity constraints), and this according to any reasonable criterion measuring the checking effort. In spite of this theoretical limitation, we develop an effective procedure...

  2. Advanced techniques for efficient data integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide

    Integrity constraint checking, understood as the verification of data correctness and well-formedness conditions that must be satisfied in any state of a database, is not fully supported by current database technology. In a typical scenario, a database is required to comply with given semantic...... criteria (the integrity constraints) and to maintain the compliance each time data are updated. Since the introduction of the SQL2 standard, the SQL language started supporting assertions, which allow one to define general data consistency requirements expressing arbitrarily complex “business rules...

  3. Optimal database locks for efficient integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide

    2004-01-01

    In concurrent database systems, correctness of update transactions refers to the equivalent effects of the execution schedule and some serial schedule over the same set of transactions. Integrity constraints add further semantic requirements to the correctness of the database states reached upon...... the execution of update transactions. Several methods for efficient integrity checking and enforcing exist. We show in this paper how to apply one such method to automatically extend update transactions with locks and simplified consistency tests on the locked entities. All schedules produced in this way...

  4. Constraint-based deadlock checking of high-level specifications

    DEFF Research Database (Denmark)

    Hallerstede, Stefan; Leuschel, Michael

    2011-01-01

    Establishing the absence of deadlocks is important in many applications of formal methods. The use of model checking for finding deadlocks in formal models is limited because in many industrial applications the state space is either infinite or much too large to be explored exhaustively. In this ......Establishing the absence of deadlocks is important in many applications of formal methods. The use of model checking for finding deadlocks in formal models is limited because in many industrial applications the state space is either infinite or much too large to be explored exhaustively......B's Prolog kernel, such as reification of membership and arithmetic constraints. ProB typically finds counter examples to deadlock-freedom constraints, a formula of about 900 partly nested conjunctions and disjunction among them 80 arithmetic and 150 set-theoretic predicates (in total a formula of 30 pages...

  5. Integrity Checking and Maintenance with Active Rules in XML Databases

    DEFF Research Database (Denmark)

    Christiansen, Henning; Rekouts, Maria

    2007-01-01

    While specification languages for integrity constraints for XML data have been considered in the literature, actual technologies and methodologies for checking and maintaining integrity are still in their infancy. Triggers, or active rules, which are widely used in previous technologies for the p...... updates, the method indicates trigger conditions and correctness criteria to be met by the trigger code supplied by a developer or possibly automatic methods. We show examples developed in the Sedna XML database system which provides a running implementation of XML triggers....

  6. Simplification of integrity constraints with aggregates and arithmetic built-ins

    DEFF Research Database (Denmark)

    Martinenghi, Davide

    2004-01-01

    Both aggregates and arithmetic built-ins are widely used in current database query languages: Aggregates are second-order constructs such as CNT and SUM of SQL; arithmetic built-ins include relational and other mathematical operators that apply to numbers, such as < and +. These features are also...... time, simplified versions of such integrity constraints that can be tested before the execution of any update. In this way, virtually no time is spent for optimization or rollbacks at run time. Both set and bag semantics are considered....... of interest in the context of database integrity constraints: correct and efficient integrity checking is crucial, as, without any guarantee of data consistency, the answers to queries cannot be trusted. In this paper we propose a method of practical relevance that can be used to derive, at database design...

  7. Local Model Checking of Weighted CTL with Upper-Bound Constraints

    DEFF Research Database (Denmark)

    Jensen, Jonas Finnemann; Larsen, Kim Guldstrand; Srba, Jiri

    2013-01-01

    We present a symbolic extension of dependency graphs by Liu and Smolka in order to model-check weighted Kripke structures against the logic CTL with upper-bound weight constraints. Our extension introduces a new type of edges into dependency graphs and lifts the computation of fixed-points from...

  8. A general treatment of dynamic integrity constraints

    NARCIS (Netherlands)

    de Brock, EO

    This paper introduces a general, set-theoretic model for expressing dynamic integrity constraints, i.e., integrity constraints on the state changes that are allowed in a given state space. In a managerial context, such dynamic integrity constraints can be seen as representations of "real world"

  9. Efficient Integrity Checking for Databases with Recursive Views

    DEFF Research Database (Denmark)

    Martinenghi, Davide; Christiansen, Henning

    2005-01-01

    Efficient and incremental maintenance of integrity constraints involving recursive views is a difficult issue that has received some attention in the past years, but for which no widely accepted solution exists yet. In this paper a technique is proposed for compiling such integrity constraints in...... approaches have not achieved comparable optimization with the same level of generality....

  10. On Simplification of Database Integrity Constraints

    DEFF Research Database (Denmark)

    Christiansen, Henning; Martinenghi, Davide

    2006-01-01

    Without proper simplification techniques, database integrity checking can be prohibitively time consuming. Several methods have been developed for producing simplified incremental checks for each update but none until now of sufficient quality and generality for providing a true practical impact,...

  11. Transaction management with integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide; Christiansen, Henning

    2005-01-01

    Database integrity constraints, understood as logical conditions that must hold for any database state, are not fully supported by current database technology. It is typically up to the database designer and application programmer to enforce integrity via triggers or tests at the application level....... 2.~In concurrent database systems, besides the traditional correctness criterion, the execution schedule must ensure that the different transactions can overlap in time without destroying the consistency requirements tested by other, concurrent transactions....

  12. Simplification of integrity constraints for data integration

    DEFF Research Database (Denmark)

    Christiansen, Henning; Martinenghi, Davide

    2004-01-01

    , because either the global database is known to be consistent or suitable actions have been taken to provide consistent views. The present work generalizes simplification techniques for integrity checking in traditional databases to the combined case. Knowledge of local consistency is employed, perhaps...

  13. Methodology for Check Valve Selection to Maintain the Integrity of Pipeline against the Check Valve Slam for the KIJANG Research Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Dayong; Yoon, Hyungi; Seo, Kyoungwoo; Kim, Seonhoon [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    The check valve slam results in a water hammer and unexpected system pressure rise in the pipeline. Sometimes, the pressure rise by check valve slam in the pipeline exceeds the design pressure and then it causes the rupture of pipeline. Therefore, check valve slam significantly influences on the integrity of pipe. Especially, this it is most likely to occur by check valve installed in the discharge of pump when one pump trips among the two or more running in parallel pump system. This study focuses on the check valve selection to maintain the integrity of PCS pipeline against the check valve slam. If design head for KJRR PCS pipeline is higher than the sum of static head and 11 m, any type check valves can be installed at the discharge of pump. However, if design head for KJRR PCS pipeline is lower than the sum of static head and 11 m, installation of swing and ball check on the discharge of pump must be avoid to prevent the rupture of PCS pipeline.

  14. Methodology for Check Valve Selection to Maintain the Integrity of Pipeline against the Check Valve Slam for the KIJANG Research Reactor

    International Nuclear Information System (INIS)

    Kim, Dayong; Yoon, Hyungi; Seo, Kyoungwoo; Kim, Seonhoon

    2016-01-01

    The check valve slam results in a water hammer and unexpected system pressure rise in the pipeline. Sometimes, the pressure rise by check valve slam in the pipeline exceeds the design pressure and then it causes the rupture of pipeline. Therefore, check valve slam significantly influences on the integrity of pipe. Especially, this it is most likely to occur by check valve installed in the discharge of pump when one pump trips among the two or more running in parallel pump system. This study focuses on the check valve selection to maintain the integrity of PCS pipeline against the check valve slam. If design head for KJRR PCS pipeline is higher than the sum of static head and 11 m, any type check valves can be installed at the discharge of pump. However, if design head for KJRR PCS pipeline is lower than the sum of static head and 11 m, installation of swing and ball check on the discharge of pump must be avoid to prevent the rupture of PCS pipeline

  15. ON Integrated Chance Constraints in ALM for Pension Funds

    OpenAIRE

    Youssouf A. F. Toukourou; Fran\\c{c}ois Dufresne

    2015-01-01

    We discuss the role of integrated chance constraints (ICC) as quantitative risk constraints in asset and liability management (ALM) for pension funds. We define two types of ICC: the one period integrated chance constraint (OICC) and the multiperiod integrated chance constraint (MICC). As their names suggest, the OICC covers only one period whereas several periods are taken into account with the MICC. A multistage stochastic linear programming model is therefore developed for this purpose and...

  16. Integral constraints on perturbations of Robertson-Walker cosmologies

    International Nuclear Information System (INIS)

    Ellis, G.F.R.; Jaklitsch, M.J.

    1989-01-01

    Integral constraints occur in the case of spherically symmetric inhomogeneities in Robertson-Walker universes, and (according to Traschen) in the case of general perturbations of these models. It is shown that these constraints are the same in the case of spherical symmetry, and they are interpreted as 'fitting conditions', that is, as constraints on the background Robertson-Walker model rather than on the nature of inhomogeneities. These integral constraints significantly affect the interpretation of anisotropies in the cosmic microwave background radiation. 22 refs

  17. Integrated CAE system for nuclear power plants. Development of piping design check system

    International Nuclear Information System (INIS)

    Narikawa, Noboru; Sato, Teruaki

    1994-01-01

    Toshiba Corporation has developed and operated the integrated CAE system for nuclear power plants, the core of which is the engineering data base to manage accurately and efficiently enormous amount of data on machinery, equipment and piping. As the first step of putting knowledge base system to practical use, piping design check system has been developed. By automatically checking up piping design, this system aims at the prevention of overlooking mistakes, efficient design works and the overall quality improvement of design. This system is based on the thought that it supports designers, and final decision is made by designers. This system is composed of the integrated data base, a two-dimensional CAD system and three-dimensional CAD system. The piping design check system is one of the application systems of the integrated CAE system. Object-oriented programming is the base of the piping design check system, and design knowledge and CAD data are necessary. As to the method of realizing the check system, the flow of piping design, the checkup functions, the checkup of interference and attribute base, and the integration of the system are explained. (K.I)

  18. Specifying Dynamic and Deontic Integrity Constraints

    NARCIS (Netherlands)

    Wieringa, Roelf J.; Meyer, John-Jules; Weigand, Hans

    In the dominant view of knowledge bases (KB's), a KB is a set of facts (atomic sentences) and integrity constraints (IC's). An IC is then a sentence which must at least be consistent with the other sentences in the KB, This view obliterates the distinction between, for example, the constraint that

  19. Provenance based data integrity checking and verification in cloud environments

    Science.gov (United States)

    Haq, Inam Ul; Jan, Bilal; Khan, Fakhri Alam; Ahmad, Awais

    2017-01-01

    Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-held devices into large scale processing hubs and data centers respectively. It has been proposed as an effective solution for data outsourcing and on demand computing to control the rising cost of IT setups and management in enterprises. However, with Cloud platforms user’s data is moved into remotely located storages such that users lose control over their data. This unique feature of the Cloud is facing many security and privacy challenges which need to be clearly understood and resolved. One of the important concerns that needs to be addressed is to provide the proof of data integrity, i.e., correctness of the user’s data stored in the Cloud storage. The data in Clouds is physically not accessible to the users. Therefore, a mechanism is required where users can check if the integrity of their valuable data is maintained or compromised. For this purpose some methods are proposed like mirroring, checksumming and using third party auditors amongst others. However, these methods use extra storage space by maintaining multiple copies of data or the presence of a third party verifier is required. In this paper, we address the problem of proving data integrity in Cloud computing by proposing a scheme through which users are able to check the integrity of their data stored in Clouds. In addition, users can track the violation of data integrity if occurred. For this purpose, we utilize a relatively new concept in the Cloud computing called “Data Provenance”. Our scheme is capable to reduce the need of any third party services, additional hardware support and the replication of data items on client side for integrity checking. PMID:28545151

  20. Provenance based data integrity checking and verification in cloud environments.

    Science.gov (United States)

    Imran, Muhammad; Hlavacs, Helmut; Haq, Inam Ul; Jan, Bilal; Khan, Fakhri Alam; Ahmad, Awais

    2017-01-01

    Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-held devices into large scale processing hubs and data centers respectively. It has been proposed as an effective solution for data outsourcing and on demand computing to control the rising cost of IT setups and management in enterprises. However, with Cloud platforms user's data is moved into remotely located storages such that users lose control over their data. This unique feature of the Cloud is facing many security and privacy challenges which need to be clearly understood and resolved. One of the important concerns that needs to be addressed is to provide the proof of data integrity, i.e., correctness of the user's data stored in the Cloud storage. The data in Clouds is physically not accessible to the users. Therefore, a mechanism is required where users can check if the integrity of their valuable data is maintained or compromised. For this purpose some methods are proposed like mirroring, checksumming and using third party auditors amongst others. However, these methods use extra storage space by maintaining multiple copies of data or the presence of a third party verifier is required. In this paper, we address the problem of proving data integrity in Cloud computing by proposing a scheme through which users are able to check the integrity of their data stored in Clouds. In addition, users can track the violation of data integrity if occurred. For this purpose, we utilize a relatively new concept in the Cloud computing called "Data Provenance". Our scheme is capable to reduce the need of any third party services, additional hardware support and the replication of data items on client side for integrity checking.

  1. Provenance based data integrity checking and verification in cloud environments.

    Directory of Open Access Journals (Sweden)

    Muhammad Imran

    Full Text Available Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-held devices into large scale processing hubs and data centers respectively. It has been proposed as an effective solution for data outsourcing and on demand computing to control the rising cost of IT setups and management in enterprises. However, with Cloud platforms user's data is moved into remotely located storages such that users lose control over their data. This unique feature of the Cloud is facing many security and privacy challenges which need to be clearly understood and resolved. One of the important concerns that needs to be addressed is to provide the proof of data integrity, i.e., correctness of the user's data stored in the Cloud storage. The data in Clouds is physically not accessible to the users. Therefore, a mechanism is required where users can check if the integrity of their valuable data is maintained or compromised. For this purpose some methods are proposed like mirroring, checksumming and using third party auditors amongst others. However, these methods use extra storage space by maintaining multiple copies of data or the presence of a third party verifier is required. In this paper, we address the problem of proving data integrity in Cloud computing by proposing a scheme through which users are able to check the integrity of their data stored in Clouds. In addition, users can track the violation of data integrity if occurred. For this purpose, we utilize a relatively new concept in the Cloud computing called "Data Provenance". Our scheme is capable to reduce the need of any third party services, additional hardware support and the replication of data items on client side for integrity checking.

  2. Stochastic programming problems with generalized integrated chance constraints

    Czech Academy of Sciences Publication Activity Database

    Branda, Martin

    2012-01-01

    Roč. 61, č. 8 (2012), s. 949-968 ISSN 0233-1934 R&D Projects: GA ČR GAP402/10/1610 Grant - others:SVV(CZ) 261315/2010 Institutional support: RVO:67985556 Keywords : chance constraints * integrated chance constraints * penalty functions * sample approximations * blending problem Subject RIV: BB - Applied Statistics, Operational Research Impact factor: 0.707, year: 2012 http://library.utia.cas.cz/separaty/2012/E/branda-stochastic programming problems with generalized integrated.pdf

  3. Constraint Differentiation

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Basin, David; Viganò, Luca

    2010-01-01

    We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation works by eliminating certain kinds of redundancies that arise in the search space when using constraints to represent...... results show that constraint differentiation substantially reduces search and considerably improves the performance of OFMC, enabling its application to a wider class of problems....

  4. Comment on id-based remote data integrity checking with data privacy preserving

    Science.gov (United States)

    Zhang, Jianhong; Meng, Hongxin

    2017-09-01

    Recently, an ID-based remote data integrity checking protocol with perfect data privacy preserving (IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS.2016.2615853) was proposed to achieve data privacy protection and integrity checking. Unfortunately, in this letter, we demonstrate that their protocol is insecure. An active hacker can modify the stored data without being detected by the verifier in the auditing. And we also show malicious cloud server can convince the verifier that the stored data are kept intact after the outsourced data blocks are deleted. Finally, the reasons to produce such attacks are given.

  5. Maintaining control while delegating trust: Integrity constraints in trust management

    NARCIS (Netherlands)

    Etalle, S.; Winsborough, W.H.

    2009-01-01

    We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then, we address the fact that not all participants in a

  6. Parallel handling of integrity constraints on fragmented relations

    NARCIS (Netherlands)

    Grefen, P.W.P.J.; Apers, Peter M.G.

    A short introduction to the important aspects of the PRISMA DBMS (database management system) and to the notation and terminology used is presented. It is shown how integrity constraints formulated in terms of global relations can be translated into a fragmented form. The strategy for constraint

  7. Optimizing Computation of Repairs from Active Integrity Constraints

    DEFF Research Database (Denmark)

    Cruz-Filipe, Luís

    2014-01-01

    Active integrity constraints (AICs) are a form of integrity constraints for databases that not only identify inconsistencies, but also suggest how these can be overcome. The semantics for AICs defines different types of repairs, but deciding whether an inconsistent database can be repaired...... and finding possible repairs is a NP- or Σ2p-complete problem, depending on the type of repairs one has in mind. In this paper, we introduce two different relations on AICs: an equivalence relation of independence, allowing the search to be parallelized among the equivalence classes, and a precedence relation...

  8. Bargmann Symmetry Constraint for a Family of Liouville Integrable Differential-Difference Equations

    International Nuclear Information System (INIS)

    Xu Xixiang

    2012-01-01

    A family of integrable differential-difference equations is derived from a new matrix spectral problem. The Hamiltonian forms of obtained differential-difference equations are constructed. The Liouville integrability for the obtained integrable family is proved. Then, Bargmann symmetry constraint of the obtained integrable family is presented by binary nonliearization method of Lax pairs and adjoint Lax pairs. Under this Bargmann symmetry constraints, an integrable symplectic map and a sequences of completely integrable finite-dimensional Hamiltonian systems in Liouville sense are worked out, and every integrable differential-difference equations in the obtained family is factored by the integrable symplectic map and a completely integrable finite-dimensional Hamiltonian system. (general)

  9. Integrating model checking with HiP-HOPS in model-based safety analysis

    International Nuclear Information System (INIS)

    Sharvia, Septavera; Papadopoulos, Yiannis

    2015-01-01

    The ability to perform an effective and robust safety analysis on the design of modern safety–critical systems is crucial. Model-based safety analysis (MBSA) has been introduced in recent years to support the assessment of complex system design by focusing on the system model as the central artefact, and by automating the synthesis and analysis of failure-extended models. Model checking and failure logic synthesis and analysis (FLSA) are two prominent MBSA paradigms. Extensive research has placed emphasis on the development of these techniques, but discussion on their integration remains limited. In this paper, we propose a technique in which model checking and Hierarchically Performed Hazard Origin and Propagation Studies (HiP-HOPS) – an advanced FLSA technique – can be applied synergistically with benefit for the MBSA process. The application of the technique is illustrated through an example of a brake-by-wire system. - Highlights: • We propose technique to integrate HiP-HOPS and model checking. • State machines can be systematically constructed from HiP-HOPS. • The strengths of different MBSA techniques are combined. • Demonstrated through modeling and analysis of brake-by-wire system. • Root cause analysis is automated and system dynamic behaviors analyzed and verified

  10. Integrable Hamiltonian systems and interactions through quadratic constraints

    International Nuclear Information System (INIS)

    Pohlmeyer, K.

    1975-08-01

    Osub(n)-invariant classical relativistic field theories in one time and one space dimension with interactions that are entirely due to quadratic constraints are shown to be closely related to integrable Hamiltonian systems. (orig.) [de

  11. Discrete-time rewards model-checked

    NARCIS (Netherlands)

    Larsen, K.G.; Andova, S.; Niebert, Peter; Hermanns, H.; Katoen, Joost P.

    2003-01-01

    This paper presents a model-checking approach for analyzing discrete-time Markov reward models. For this purpose, the temporal logic probabilistic CTL is extended with reward constraints. This allows to formulate complex measures – involving expected as well as accumulated rewards – in a precise and

  12. Particle acceleration inside PWN: Simulation and observational constraints with INTEGRAL

    International Nuclear Information System (INIS)

    Forot, M.

    2006-12-01

    The context of this thesis is to gain new constraints on the different particle accelerators that occur in the complex environment of neutron stars: in the pulsar magnetosphere, in the striped wind or wave outside the light cylinder, in the jets and equatorial wind, and at the wind terminal shock. An important tool to constrain both the magnetic field and primary particle energies is to image the synchrotron ageing of the population, but it requires a careful modelling of the magnetic field evolution in the wind flow. The current models and understanding of these different accelerators, the acceleration processes and open questions have been reviewed in the first part of the thesis. The instrumental part of this work involves the IBIS imager, on board the INTEGRAL satellite, that provides images with 12' resolution from 17 keV to MeV where the SPI spectrometer takes over up, to 10 MeV, but with a reduced 2 degrees resolution. A new method for using the double-layer IBIS imager as a Compton telescope with coded mask aperture. Its performance has been measured. The Compton scattering information and the achieved sensitivity also open a new window for polarimetry in gamma rays. A method has been developed to extract the linear polarization properties and to check the instrument response for fake polarimetric signals in the various backgrounds and projection effects

  13. Recent development in low-constraint fracture toughness testing for structural integrity assessment of pipelines

    Science.gov (United States)

    Kang, Jidong; Gianetto, James A.; Tyson, William R.

    2018-03-01

    Fracture toughness measurement is an integral part of structural integrity assessment of pipelines. Traditionally, a single-edge-notched bend (SE(B)) specimen with a deep crack is recommended in many existing pipeline structural integrity assessment procedures. Such a test provides high constraint and therefore conservative fracture toughness results. However, for girth welds in service, defects are usually subjected to primarily tensile loading where the constraint is usually much lower than in the three-point bend case. Moreover, there is increasing use of strain-based design of pipelines that allows applied strains above yield. Low-constraint toughness tests represent more realistic loading conditions for girth weld defects, and the corresponding increased toughness can minimize unnecessary conservatism in assessments. In this review, we present recent developments in low-constraint fracture toughness testing, specifically using single-edgenotched tension specimens, SENT or SE(T). We focus our review on the test procedure development and automation, round-robin test results and some common concerns such as the effect of crack tip, crack size monitoring techniques, and testing at low temperatures. Examples are also given of the integration of fracture toughness data from SE(T) tests into structural integrity assessment.

  14. Null Space Integration Method for Constrained Multibody Systems with No Constraint Violation

    International Nuclear Information System (INIS)

    Terze, Zdravko; Lefeber, Dirk; Muftic, Osman

    2001-01-01

    A method for integrating equations of motion of constrained multibody systems with no constraint violation is presented. A mathematical model, shaped as a differential-algebraic system of index 1, is transformed into a system of ordinary differential equations using the null-space projection method. Equations of motion are set in a non-minimal form. During integration, violations of constraints are corrected by solving constraint equations at the position and velocity level, utilizing the metric of the system's configuration space, and projective criterion to the coordinate partitioning method. The method is applied to dynamic simulation of 3D constrained biomechanical system. The simulation results are evaluated by comparing them to the values of characteristic parameters obtained by kinematics analysis of analyzed motion based unmeasured kinematics data

  15. Type checking with open type functions

    DEFF Research Database (Denmark)

    Schrijvers, Tom; Jones, Simon Peyton; Chakravarty, Manual

    2008-01-01

    We report on an extension of Haskell with open type-level functions and equality constraints that unifies earlier work on GADTs, functional dependencies, and associated types. The contribution of the paper is that we identify and characterise the key technical challenge of entailment checking; an...

  16. WE-E-BRB-10: DosCheck - an Electronic Chart Checking Tool for Dosimetrists.

    Science.gov (United States)

    Yang, D; Wu, Y; Yaddanapudi, S; Moore, K; Pierbuxg, B; Brame, S; Mutic, S

    2012-06-01

    In addition to treatment planning, dosimetrists have to prepare documentation and manually enter data in treatment management system (TMS) which did not transfer or setup automatically. The required documents and data are dependent on the disease site, treatment machine and clinical workflow. Errors and inconsistencies can cause redundant work, treatment delays and potentially treatment errors. To address these issues, an electronic checking software tool, DosCheck was clinically implemented to check the existence of necessary documentations and the integrity of manually-entered data. The purpose of this software is to reduce the frequency of human errors and to improve efficiency. DosCheck reads data and documents from 1) TMS, 2) Pinnacle TPS, and 3) DICOM plan files stored in a DICOM-RT PACS. It processes documents in Word and PDF format, treatment plan data in Pinnacle native format and DICOM format, and Mosaiq data in database records. The software cross-checks data accuracy and consistency by following rules that are pre-defined according to the clinical requirements and treatment sties. It interacts with dosimetrists and presents instantaneous results via graphical user interface. DosCheck has been implemented in C#. It performs a full check for a patient with 20 seconds. It has been clinically commissioned and is used daily by all dosimetrists at our institution. Retrospective analysis shows that DosCheck identifies 30% to 40% of previously reported dosimetrist human errors. Additional ∼30% errors are checked by other tools that could be integrated DosCheck in the near future. As an electronic data checking tool, DosCheck can obtain and process data and documents from multiple clinical computer systems in the radiation oncology department, and perform checks according to clinical rules. It is able to improve the accuracy and efficiency of clinical data and document process, and therefore to reduce any potential inconsistencies and errors. © 2012 American

  17. Users Integrity Constraints in SOLAP Systems. Application in Agroforestry

    Directory of Open Access Journals (Sweden)

    Abdallah Bensalloua Charef

    2018-06-01

    Full Text Available SpatialData Warehouse and Spatial On-Line Analytical Processing are decision support technologies which offer the spatial and multidimensional analysis of data stored in multidimensional structure. They are aimed also at supporting geographic knowledge discovery to help decision-maker in his job related to make the appropriate decision . However, if we don’t consider data quality in the spatial hypercubes and how it is explored, it may provide unreliable results. In this paper, we propose a system for the implementation of user integrity constraints in SOLAP namely “UIC-SOLAP”. It corresponds to a methodology for guaranteeing results quality in an analytical process effectuated by different users exploiting several facts tables within the same hypercube. We integrate users Integrity Constraints (IC by specifying visualization ICs according to their preferences and we define inter-facts ICs in this case. In order to validate our proposition, we propose the multidimensional modeling by UML profile to support constellation schema of a hypercube with several fact tables related to subjects of analysis in forestry management. Then, we propose implementation of some ICs related to users of such a system.

  18. An integral constraint for the evolution of the galaxy two-point correlation function

    International Nuclear Information System (INIS)

    Peebles, P.J.E.; Groth, E.J.

    1976-01-01

    Under some conditions an integral over the galaxy two-point correlation function, xi(x,t), evolves with the expansion of the universe in a simple manner easily computed from linear perturbation theory.This provides a useful constraint on the possible evolution of xi(x,t) itself. We test the integral constraint with both an analytic model and numerical N-body simulations for the evolution of irregularities in an expanding universe. Some applications are discussed. (orig.) [de

  19. A Liouville integrable hierarchy, symmetry constraint, new finite-dimensional integrable systems, involutive solution and expanding integrable models

    International Nuclear Information System (INIS)

    Sun Yepeng; Chen Dengyuan

    2006-01-01

    A new spectral problem and the associated integrable hierarchy of nonlinear evolution equations are presented in this paper. It is shown that the hierarchy is completely integrable in the Liouville sense and possesses bi-Hamiltonian structure. An explicit symmetry constraint is proposed for the Lax pairs and the adjoint Lax pairs of the hierarchy. Moreover, the corresponding Lax pairs and adjoint Lax pairs are nonlinearized into a hierarchy of commutative, new finite-dimensional completely integrable Hamiltonian systems in the Liouville sense. Further, an involutive representation of solution of each equation in the hierarchy is given. Finally, expanding integrable models of the hierarchy are constructed by using a new Loop algebra

  20. Constraint-based query distribution framework for an integrated global schema

    DEFF Research Database (Denmark)

    Malik, Ahmad Kamran; Qadir, Muhammad Abdul; Iftikhar, Nadeem

    2009-01-01

    and replicated data sources. The provided system is all XML-based which poses query in XML form, transforms, and integrates local results in an XML document. Contributions include the use of constraints in our existing global schema which help in source selection and query optimization, and a global query...

  1. An Integrated Approach of Model checking and Temporal Fault Tree for System Safety Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Kwang Yong; Seong, Poong Hyun [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2009-10-15

    Digitalization of instruments and control systems in nuclear power plants offers the potential to improve plant safety and reliability through features such as increased hardware reliability and stability, and improved failure detection capability. It however makes the systems and their safety analysis more complex. Originally, safety analysis was applied to hardware system components and formal methods mainly to software. For software-controlled or digitalized systems, it is necessary to integrate both. Fault tree analysis (FTA) which has been one of the most widely used safety analysis technique in nuclear industry suffers from several drawbacks as described in. In this work, to resolve the problems, FTA and model checking are integrated to provide formal, automated and qualitative assistance to informal and/or quantitative safety analysis. Our approach proposes to build a formal model of the system together with fault trees. We introduce several temporal gates based on timed computational tree logic (TCTL) to capture absolute time behaviors of the system and to give concrete semantics to fault tree gates to reduce errors during the analysis, and use model checking technique to automate the reasoning process of FTA.

  2. Constraint-Checking Editor for Procedure Tracking (ConCEPT), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Constructing, maintaining, and adapting operational procedures for manned space operations is a complex task, requiring the procedure author to satisfy constraints...

  3. Integrated systems optimization model for biofuel development: The influence of environmental constraints

    Science.gov (United States)

    Housh, M.; Ng, T.; Cai, X.

    2012-12-01

    The environmental impact is one of the major concerns of biofuel development. While many other studies have examined the impact of biofuel expansion on stream flow and water quality, this study examines the problem from the other side - will and how a biofuel production target be affected by given environmental constraints. For this purpose, an integrated model comprises of different sub-systems of biofuel refineries, transportation, agriculture, water resources and crops/ethanol market has been developed. The sub-systems are integrated into one large-scale model to guide the optimal development plan considering the interdependency between the subsystems. The optimal development plan includes biofuel refineries location and capacity, refinery operation, land allocation between biofuel and food crops, and the corresponding stream flow and nitrate load in the watershed. The watershed is modeled as a network flow, in which the nodes represent sub-watersheds and the arcs are defined as the linkage between the sub-watersheds. The runoff contribution of each sub-watershed is determined based on the land cover and the water uses in that sub-watershed. Thus, decisions of other sub-systems such as the land allocation in the land use sub-system and the water use in the refinery sub-system define the sources and the sinks of the network. Environmental policies will be addressed in the integrated model by imposing stream flow and nitrate load constraints. These constraints can be specified by location and time in the watershed to reflect the spatial and temporal variation of the regulations. Preliminary results show that imposing monthly water flow constraints and yearly nitrate load constraints will change the biofuel development plan dramatically. Sensitivity analysis is performed to examine how the environmental constraints and their spatial and the temporal distribution influence the overall biofuel development plan and the performance of each of the sub

  4. Uncertainty reduction of gravity and magnetic inversion through the integration of petrophysical constraints and geological data

    Science.gov (United States)

    Giraud, Jérémie; Jessell, Mark; Lindsay, Mark; Martin, Roland; Pakyuz-Charrier, Evren; Ogarko, Vitaliy

    2016-04-01

    We introduce and test a workflow that integrates petrophysical constraints and geological data in geophysical inversion to decrease the uncertainty and non-uniqueness of the results. We show that the integration of geological information and petrophysical constraints in geophysical inversion can improve inversion results in terms of both uncertainty reduction and resolution. This workflow uses statistical petrophysical properties to constrain the values retrieved by the geophysical inversion and geological prior information to decrease the effect of non-uniqueness. Surface geological data are used to generate geological models as a source of geometrical prior information. Petrophysical measurements are used to derive the statistical laws used for the petrophysical constraints. We integrate the different sources of information in a Bayesian framework, which will take into account these states of information. This permits us to quantify the posterior state of knowledge, the reduction of the uncertainty and to calculate the influence of prior information. To quantify the influence of petrophysical constraints and geological data we compare results obtained with several levels of constraints. We start by inverting data without petrophysical constraints and geological prior information. Then, we add petrophysical constraints before using geological prior information. The results of the inversion are characterized using fixed-point statistics. Various indicators such as model and data misfits, resolution matrices and statistical fit to the petrophysical data are calculated. The resolution matrices are used to plot sensitivity maps. We calculate the posterior covariance matrices to estimate the uncertainty of the model. This workflow was first tested using very simple synthetic datasets before using a subset of the Mansfield area data (Victoria, Australia). The geological model is derived from geological field data. We simulate petrophysical properties based on field

  5. An Integrated Constraint Programming Approach to Scheduling Sports Leagues with Divisional and Round-robin Tournaments

    Energy Technology Data Exchange (ETDEWEB)

    Carlsson, Mats; Johansson, Mikael; Larson, Jeffrey

    2014-01-01

    Previous approaches for scheduling a league with round-robin and divisional tournaments involved decomposing the problem into easier subproblems. This approach, used to schedule the top Swedish handball league Elitserien, reduces the problem complexity but can result in suboptimal schedules. This paper presents an integrated constraint programming model that allows to perform the scheduling in a single step. Particular attention is given to identifying implied and symmetry-breaking constraints that reduce the computational complexity significantly. The experimental evaluation of the integrated approach takes considerably less computational effort than the previous approach.

  6. Formal Constraints on Memory Management for Composite Overloaded Operations

    Directory of Open Access Journals (Sweden)

    Damian W.I. Rouson

    2006-01-01

    Full Text Available The memory management rules for abstract data type calculus presented by Rouson, Morris & Xu [15] are recast as formal statements in the Object Constraint Language (OCL and applied to the design of a thermal energy equation solver. One set of constraints eliminates memory leaks observed in composite overloaded expressions with three current Fortran 95/2003 compilers. A second set of constraints ensures economical memory recycling. The constraints are preconditions, postconditions and invariants on overloaded operators and the objects they receive and return. It is demonstrated that systematic run-time assertion checking inspired by the formal constraints facilitated the pinpointing of an exceptionally hard-to-reproduce compiler bug. It is further demonstrated that the interplay between OCL's modeling capabilities and Fortran's programming capabilities led to a conceptual breakthrough that greatly improved the readability of our code by facilitating operator overloading. The advantages and disadvantages of our memory management rules are discussed in light of other published solutions [11,19]. Finally, it is demonstrated that the run-time assertion checking has a negligible impact on performance.

  7. Statistical analysis of probabilistic models of software product lines with quantitative constraints

    DEFF Research Database (Denmark)

    Beek, M.H. ter; Legay, A.; Lluch Lafuente, Alberto

    2015-01-01

    We investigate the suitability of statistical model checking for the analysis of probabilistic models of software product lines with complex quantitative constraints and advanced feature installation options. Such models are specified in the feature-oriented language QFLan, a rich process algebra...... of certain behaviour to the expected average cost of products. This is supported by a Maude implementation of QFLan, integrated with the SMT solver Z3 and the distributed statistical model checker MultiVeStA. Our approach is illustrated with a bikes product line case study....

  8. Scram system with continuos check

    International Nuclear Information System (INIS)

    Rodriguez Sacco, Walter.

    1976-02-01

    The equipment described pretends to be a further step to the use of integrated circuits in nuclear instrumentation, considering that this type of control was traditionally carried out on the bases of electromechanical elements. A continuous self-check method has been applied in accordance with the high reliability requiered for this type of equipments. The developed equipment fulfils the condition that any deficiency in its component elements, causes an anormal self-detected operation. The equipment covers two systems: the Scram one, that includes the sequence generator-detector, the rods check and scram chain, and the Check system that uses pulses from the sequence detector. (author) [es

  9. Low level constraints on dynamic contour path integration.

    Directory of Open Access Journals (Sweden)

    Sophie Hall

    Full Text Available Contour integration is a fundamental visual process. The constraints on integrating discrete contour elements and the associated neural mechanisms have typically been investigated using static contour paths. However, in our dynamic natural environment objects and scenes vary over space and time. With the aim of investigating the parameters affecting spatiotemporal contour path integration, we measured human contrast detection performance of a briefly presented foveal target embedded in dynamic collinear stimulus sequences (comprising five short 'predictor' bars appearing consecutively towards the fovea, followed by the 'target' bar in four experiments. The data showed that participants' target detection performance was relatively unchanged when individual contour elements were separated by up to 2° spatial gap or 200 ms temporal gap. Randomising the luminance contrast or colour of the predictors, on the other hand, had similar detrimental effect on grouping dynamic contour path and subsequent target detection performance. Randomising the orientation of the predictors reduced target detection performance greater than introducing misalignment relative to the contour path. The results suggest that the visual system integrates dynamic path elements to bias target detection even when the continuity of path is disrupted in terms of spatial (2°, temporal (200 ms, colour (over 10 colours and luminance (-25% to 25% information. We discuss how the findings can be largely reconciled within the functioning of V1 horizontal connections.

  10. Capacity Model and Constraints Analysis for Integrated Remote Wireless Sensor and Satellite Network in Emergency Scenarios

    Science.gov (United States)

    Zhang, Wei; Zhang, Gengxin; Dong, Feihong; Xie, Zhidong; Bian, Dongming

    2015-01-01

    This article investigates the capacity problem of an integrated remote wireless sensor and satellite network (IWSSN) in emergency scenarios. We formulate a general model to evaluate the remote sensor and satellite network capacity. Compared to most existing works for ground networks, the proposed model is time varying and space oriented. To capture the characteristics of a practical network, we sift through major capacity-impacting constraints and analyze the influence of these constraints. Specifically, we combine the geometric satellite orbit model and satellite tool kit (STK) engineering software to quantify the trends of the capacity constraints. Our objective in analyzing these trends is to provide insights and design guidelines for optimizing the integrated remote wireless sensor and satellite network schedules. Simulation results validate the theoretical analysis of capacity trends and show the optimization opportunities of the IWSSN. PMID:26593919

  11. Capacity Model and Constraints Analysis for Integrated Remote Wireless Sensor and Satellite Network in Emergency Scenarios.

    Science.gov (United States)

    Zhang, Wei; Zhang, Gengxin; Dong, Feihong; Xie, Zhidong; Bian, Dongming

    2015-11-17

    This article investigates the capacity problem of an integrated remote wireless sensor and satellite network (IWSSN) in emergency scenarios. We formulate a general model to evaluate the remote sensor and satellite network capacity. Compared to most existing works for ground networks, the proposed model is time varying and space oriented. To capture the characteristics of a practical network, we sift through major capacity-impacting constraints and analyze the influence of these constraints. Specifically, we combine the geometric satellite orbit model and satellite tool kit (STK) engineering software to quantify the trends of the capacity constraints. Our objective in analyzing these trends is to provide insights and design guidelines for optimizing the integrated remote wireless sensor and satellite network schedules. Simulation results validate the theoretical analysis of capacity trends and show the optimization opportunities of the IWSSN.

  12. Constraint-Based Abstraction of a Model Checker for Infinite State Systems

    DEFF Research Database (Denmark)

    Banda, Gourinath; Gallagher, John Patrick

    Abstract interpretation-based model checking provides an approach to verifying properties of infinite-state systems. In practice, most previous work on abstract model checking is either restricted to verifying universal properties, or develops special techniques for temporal logics such as modal t...... to implementation of abstract model checking algorithms for abstract domains based on constraints, making use of an SMT solver....

  13. Integrating ergonomics knowledge into business-driven design projects: The shaping of resource constraints in engineering consultancy.

    Science.gov (United States)

    Hall-Andersen, Lene Bjerg; Neumann, Patrick; Broberg, Ole

    2016-10-17

    The integration of ergonomics knowledge into engineering projects leads to both healthier and more efficient workplaces. There is a lack of knowledge about integrating ergonomic knowledge into the design practice in engineering consultancies. This study explores how organizational resources can pose constraints for the integration of ergonomics knowledge into engineering design projects in a business-driven setting, and how ergonomists cope with these resource constraints. An exploratory case study in an engineering consultancy was conducted. A total of 27 participants were interviewed. Data were collected applying semi-structured interviews, observations, and documentary studies. Interviews were transcribed, coded, and categorized into themes. From the analysis five overall themes emerged as major constituents of resource constraints: 1) maximizing project revenue, 2) payment for ergonomics services, 3) value of ergonomic services, 4) role of the client, and 5) coping strategies to overcome resource constraints. We hypothesize that resource constraints were shaped due to sub-optimization of costs in design projects. The economical contribution of ergonomics measures was not evaluated in the entire life cycle of a designed workplace. Coping strategies included teaming up with engineering designers in the sales process or creating an alliance with ergonomists in the client organization.

  14. Fixed Duration Pursuit-Evasion Differential Game with Integral Constraints

    International Nuclear Information System (INIS)

    Ibragimov G I; Kuchkarov A Sh

    2013-01-01

    We investigate a pursuit-evasion differential game of countably many pursuers and one evader. Integral constraints are imposed on control functions of the players. Duration of the game is fixed and the payoff of the game is infimum of the distances between the evader and pursuers when the game is completed. Purpose of the pursuers is to minimize the payoff and that of the evader is to maximize it. Optimal strategies of the players are constructed, and the value of the game is found. It should be noted that energy resource of any pursuer may be less than that of the evader.

  15. Distortion-Free Watermarking Approach for Relational Database Integrity Checking

    Directory of Open Access Journals (Sweden)

    Lancine Camara

    2014-01-01

    Full Text Available Nowadays, internet is becoming a suitable way of accessing the databases. Such data are exposed to various types of attack with the aim to confuse the ownership proofing or the content protection. In this paper, we propose a new approach based on fragile zero watermarking for the authentication of numeric relational data. Contrary to some previous databases watermarking techniques which cause some distortions in the original database and may not preserve the data usability constraints, our approach simply seeks to generate the watermark from the original database. First, the adopted method partitions the database relation into independent square matrix groups. Then, group-based watermarks are securely generated and registered in a trusted third party. The integrity verification is performed by computing the determinant and the diagonal’s minor for each group. As a result, tampering can be localized up to attribute group level. Theoretical and experimental results demonstrate that the proposed technique is resilient against tuples insertion, tuples deletion, and attributes values modification attacks. Furthermore, comparison with recent related effort shows that our scheme performs better in detecting multifaceted attacks.

  16. Symbol recognition via statistical integration of pixel-level constraint histograms: a new descriptor.

    Science.gov (United States)

    Yang, Su

    2005-02-01

    A new descriptor for symbol recognition is proposed. 1) A histogram is constructed for every pixel to figure out the distribution of the constraints among the other pixels. 2) All the histograms are statistically integrated to form a feature vector with fixed dimension. The robustness and invariance were experimentally confirmed.

  17. Experiential knowledge of expert coaches can help identify informational constraints on performance of dynamic interceptive actions.

    Science.gov (United States)

    Greenwood, Daniel; Davids, Keith; Renshaw, Ian

    2014-01-01

    Coordination of dynamic interceptive movements is predicated on cyclical relations between an individual's actions and information sources from the performance environment. To identify dynamic informational constraints, which are interwoven with individual and task constraints, coaches' experiential knowledge provides a complementary source to support empirical understanding of performance in sport. In this study, 15 expert coaches from 3 sports (track and field, gymnastics and cricket) participated in a semi-structured interview process to identify potential informational constraints which they perceived to regulate action during run-up performance. Expert coaches' experiential knowledge revealed multiple information sources which may constrain performance adaptations in such locomotor pointing tasks. In addition to the locomotor pointing target, coaches' knowledge highlighted two other key informational constraints: vertical reference points located near the locomotor pointing target and a check mark located prior to the locomotor pointing target. This study highlights opportunities for broadening the understanding of perception and action coupling processes, and the identified information sources warrant further empirical investigation as potential constraints on athletic performance. Integration of experiential knowledge of expert coaches with theoretically driven empirical knowledge represents a promising avenue to drive future applied science research and pedagogical practice.

  18. The use of check valve performance data to support new concepts (probabilistic risk assessment, condition monitoring) for check valve program

    Energy Technology Data Exchange (ETDEWEB)

    Hart, K.A.; Gower, D.

    1996-12-01

    The concept of developing an integrated check valve database based on the Nuclear Power Reliability Data System (NPRDS) data was presented at the last Symposium. The Nuclear Industry Check Valve Group (NIC), working in cooperation with the Oak Ridge National Laboratory (ORNL), has completed an operational database of check valve performance from 1984 to the present. NIC has committed to the nuclear industry to periodically update the data and maintain this information accessible. As the new concepts of probabilistic risk analysis and condition monitoring are integrated into the American Society of Mechanical Engineers (ASME) Code, a critical element will be performance data. From check valve performance data, feasible failure modes and rates can be established. When a failure rate or frequency of failures can be established based on a significant enough population (sampling), a more solid foundation for focusing resources and determining appropriate frequencies and testing can be determined. The presentation will give the updated status of the NIC Check Valve Performance Database covering (1) methodology used to combine the original ORNL data; (2) process/controls established for continuing update and refinement of the data; (3) discussion of how this data is being utilized by (a) OM-22 for condition monitoring, and (b) risk-based inservice testing work of Westinghouse Owners` Group; and (4) results/trends of data evaluations. At the 1994 Symposium, ORNL provided an update as of 1991 to their original work of 1984 -1990 which they had performed to characterize check valve degradations and failures in the nuclear industry. These characterizations will be updated to 1995 and additional reviews provided to give insight into the current condition and trends of check valve performance.

  19. The use of check valve performance data to support new concepts (probabilistic risk assessment, condition monitoring) for check valve program

    International Nuclear Information System (INIS)

    Hart, K.A.; Gower, D.

    1996-01-01

    The concept of developing an integrated check valve database based on the Nuclear Power Reliability Data System (NPRDS) data was presented at the last Symposium. The Nuclear Industry Check Valve Group (NIC), working in cooperation with the Oak Ridge National Laboratory (ORNL), has completed an operational database of check valve performance from 1984 to the present. NIC has committed to the nuclear industry to periodically update the data and maintain this information accessible. As the new concepts of probabilistic risk analysis and condition monitoring are integrated into the American Society of Mechanical Engineers (ASME) Code, a critical element will be performance data. From check valve performance data, feasible failure modes and rates can be established. When a failure rate or frequency of failures can be established based on a significant enough population (sampling), a more solid foundation for focusing resources and determining appropriate frequencies and testing can be determined. The presentation will give the updated status of the NIC Check Valve Performance Database covering (1) methodology used to combine the original ORNL data; (2) process/controls established for continuing update and refinement of the data; (3) discussion of how this data is being utilized by (a) OM-22 for condition monitoring, and (b) risk-based inservice testing work of Westinghouse Owners' Group; and (4) results/trends of data evaluations. At the 1994 Symposium, ORNL provided an update as of 1991 to their original work of 1984 -1990 which they had performed to characterize check valve degradations and failures in the nuclear industry. These characterizations will be updated to 1995 and additional reviews provided to give insight into the current condition and trends of check valve performance

  20. Engineering Abstractions in Model Checking and Testing

    DEFF Research Database (Denmark)

    Achenbach, Michael; Ostermann, Klaus

    2009-01-01

    Abstractions are used in model checking to tackle problems like state space explosion or modeling of IO. The application of these abstractions in real software development processes, however, lacks engineering support. This is one reason why model checking is not widely used in practice yet...... and testing is still state of the art in falsification. We show how user-defined abstractions can be integrated into a Java PathFinder setting with tools like AspectJ or Javassist and discuss implications of remaining weaknesses of these tools. We believe that a principled engineering approach to designing...... and implementing abstractions will improve the applicability of model checking in practice....

  1. Technical findings and regulatory analysis for Generic Safety Issue II.E.4.3, ''Containment Integrity Check''

    International Nuclear Information System (INIS)

    Serkiz, A.W.

    1988-04-01

    This report contains the technical findings and regulatory analysis for Generic Safety Issue II.E.4.3, ''Containment Integrity Check.'' An evaluation of the containment isolation history from 1965 to 1983 reveals that (except for a small number of events) containment integrity has been maintained and that the majority of reported events have been events related to exceeding Technical Specification limits (or 0.6 of the allowable leakage level). In addition, more recent risk analyses have shown that allowable leakage rates even if increased by a factor of 10 would not significantly increase risk. Potential methods of continuous monitoring are identified and evaluated. Therefore, these technical findings and risk evaluations support closure of Generic Safety Issue II.E.4.3

  2. Improvement of seawater booster pump outlet check valve

    International Nuclear Information System (INIS)

    Li Xuning; Du Yansong; Huang Huimin

    2010-01-01

    Conventional island seawater booster pump set of QNPC 310 MWe unit are very important in the whole circulating cooling system, and the integrate function of seawater booster pump outlet check valve is the foundation of steady operation of the seawater booster pump set. The article mainly introduce that through the analyses to the reason to the problem that the seawater booster pump outlet check valve of QNPC 310 MWe unit appeared in past years by our team, and considering the influence of operation condition and circumstance, the team improve the seawater booster pump outlet check valve from swing check valve to shuttle check valve which operate more appropriately in the system. By the test of continuous practice, we make further modification to the inner structure of shuttle check valve contrapuntally, and therefore we solve the problem in seawater booster pump outlet check valve fundamentally which has troubled the security of system operation in past years, so we realize the aim of technical improvement and ensure that the system operate in safety and stability. (authors)

  3. Process for integrating surface drainage constraints on mine planning

    Energy Technology Data Exchange (ETDEWEB)

    Sawatsky, L.F; Ade, F.L.; McDonald, D.M.; Pullman, B.J. [Golder Associates Ltd., Calgary, AB (Canada)

    2009-07-01

    Surface drainage for mine closures must be considered during all phases of mine planning and design in order to minimize environmental impacts and reduce costs. This paper discussed methods of integrating mine drainage criteria and associated mine planning constraints into the mine planning process. Drainage constraints included stream diversions; fish compensation channels; collection receptacles for the re-use of process water; separation of closed circuit water from fresh water; and the provision of storage ponds. The geomorphic approach replicated the ability of natural channels to respond to local and regional changes in hydrology as well as channel disturbances from extreme flood events, sedimentation, debris, ice jams, and beaver activity. The approach was designed to enable a sustainable system and provide conveyance capacity for extreme floods without spillage to adjacent watersheds. Channel dimensions, bank and bed materials, sediment loads, bed material supplies and the hydrologic conditions of the analogue stream were considered. Hydrologic analyses were conducted to determine design flood flow. Channel routes, valley slopes, sinuosity, width, and depth were established. It was concluded that by incorporating the geomorphic technique, mine operators and designers can construct self-sustaining drainage systems that require little or no maintenance in the long-term. 7 refs.

  4. Distributed constraint satisfaction for coordinating and integrating a large-scale, heterogenous enterprise

    CERN Document Server

    Eisenberg, C

    2003-01-01

    Market forces are continuously driving public and private organisations towards higher productivity, shorter process and production times, and fewer labour hours. To cope with these changes, organisations are adopting new organisational models of coordination and cooperation that increase their flexibility, consistency, efficiency, productivity and profit margins. In this thesis an organisational model of coordination and cooperation is examined using a real life example; the technical integration of a distributed large-scale project of an international physics collaboration. The distributed resource constraint project scheduling problem is modelled and solved with the methods of distributed constraint satisfaction. A distributed local search method, the distributed breakout algorithm (DisBO), is used as the basis for the coordination scheme. The efficiency of the local search method is improved by extending it with an incremental problem solving scheme with variable ordering. The scheme is implemented as cen...

  5. A Selfish Constraint Satisfaction Genetic Algorithms for Planning a Long-Distance Transportation Network

    Science.gov (United States)

    Onoyama, Takashi; Maekawa, Takuya; Kubota, Sen; Tsuruta, Setuso; Komoda, Norihisa

    To build a cooperative logistics network covering multiple enterprises, a planning method that can build a long-distance transportation network is required. Many strict constraints are imposed on this type of problem. To solve these strict-constraint problems, a selfish constraint satisfaction genetic algorithm (GA) is proposed. In this GA, each gene of an individual satisfies only its constraint selfishly, disregarding the constraints of other genes in the same individuals. Moreover, a constraint pre-checking method is also applied to improve the GA convergence speed. The experimental result shows the proposed method can obtain an accurate solution in a practical response time.

  6. Simple Check Valves for Microfluidic Devices

    Science.gov (United States)

    Willis, Peter A.; Greer, Harold F.; Smith, J. Anthony

    2010-01-01

    A simple design concept for check valves has been adopted for microfluidic devices that consist mostly of (1) deformable fluorocarbon polymer membranes sandwiched between (2) borosilicate float glass wafers into which channels, valve seats, and holes have been etched. The first microfluidic devices in which these check valves are intended to be used are micro-capillary electrophoresis (microCE) devices undergoing development for use on Mars in detecting compounds indicative of life. In this application, it will be necessary to store some liquid samples in reservoirs in the devices for subsequent laboratory analysis, and check valves are needed to prevent cross-contamination of the samples. The simple check-valve design concept is also applicable to other microfluidic devices and to fluidic devices in general. These check valves are simplified microscopic versions of conventional rubber- flap check valves that are parts of numerous industrial and consumer products. These check valves are fabricated, not as separate components, but as integral parts of microfluidic devices. A check valve according to this concept consists of suitably shaped portions of a deformable membrane and the two glass wafers between which the membrane is sandwiched (see figure). The valve flap is formed by making an approximately semicircular cut in the membrane. The flap is centered over a hole in the lower glass wafer, through which hole the liquid in question is intended to flow upward into a wider hole, channel, or reservoir in the upper glass wafer. The radius of the cut exceeds the radius of the hole by an amount large enough to prevent settling of the flap into the hole. As in a conventional rubber-flap check valve, back pressure in the liquid pushes the flap against the valve seat (in this case, the valve seat is the adjacent surface of the lower glass wafer), thereby forming a seal that prevents backflow.

  7. CheckMATE 2: From the model to the limit

    Science.gov (United States)

    Dercks, Daniel; Desai, Nishita; Kim, Jong Soo; Rolbiecki, Krzysztof; Tattersall, Jamie; Weber, Torsten

    2017-12-01

    We present the latest developments to the CheckMATE program that allows models of new physics to be easily tested against the recent LHC data. To achieve this goal, the core of CheckMATE now contains over 60 LHC analyses of which 12 are from the 13 TeV run. The main new feature is that CheckMATE 2 now integrates the Monte Carlo event generation via MadGraph5_aMC@NLO and Pythia 8. This allows users to go directly from a SLHA file or UFO model to the result of whether a model is allowed or not. In addition, the integration of the event generation leads to a significant increase in the speed of the program. Many other improvements have also been made, including the possibility to now combine signal regions to give a total likelihood for a model.

  8. Reasoning about Strategies under Partial Observability and Fairness Constraints

    Directory of Open Access Journals (Sweden)

    Simon Busard

    2013-03-01

    Full Text Available A number of extensions exist for Alternating-time Temporal Logic; some of these mix strategies and partial observability but, to the best of our knowledge, no work provides a unified framework for strategies, partial observability and fairness constraints. In this paper we propose ATLK^F_po, a logic mixing strategies under partial observability and epistemic properties of agents in a system with fairness constraints on states, and we provide a model checking algorithm for it.

  9. PSYCHE, ENDF/B Data Consistency Check in ENDF Format

    International Nuclear Information System (INIS)

    Dunford, Charles L.

    2007-01-01

    1 - Description of program or function: PSYCHE is a program for checking the physics content of an evaluated data file. It can recognise the difference between ENDF-5 or ENDF-6 formats and performs its tests accordingly. Version 7.01 (April 2005): set success flag after return from begin, added potential scattering test formerly in Fizcon. Version 7.02 (May 2005): Fixed bug in calculation of L=2 penetrability. 2 - Method of solution: PSYCHE checks for energy conservation for emitted neutrons and photons, checks Wick's limit for elastic scattering, analyses resonance parameter statistics, calculates thermal cross sections and resonance integrals, examines continuity across resonance region boundaries and checks 'Q' values against mass tables

  10. General Principles of Integrity Checking of Digital Images and Application for Steganalysis

    Directory of Open Access Journals (Sweden)

    Kobozeva Alla A.

    2016-06-01

    Full Text Available The new common approach for integrity checking of digital images is developed. The new features of formal parameters defining image are revealed, theoretically grounded and practically tested. The characteristics of the mutual arrangement of left and right singular vectors corresponding to the largest singular value of the image’s matrix (block of matrix and the vector composed of singular numbers is obtained. Formal parameters are obtained using normal singular decomposition of matrix (block of matrix which is uniquely determined. It is shown that for most blocks of original image (no matter lossy or lossless the angle between the left (right mentioned singular vector and vector composed of singular numbers is defined by the angle between the n-optimal vector and the vector of standard basis of the range corresponding dimension. It is shown that the determined feature brakes for the mentioned formal parameters in a non-original image. This shows the integrity violation of the image, i.e. the existence of the additional information embedded using steganography algorithms. So this can be used as a basis for development of new universal steganography methods and algorithms, and one example of the realization is proposed. The efficiency of the proposed algorithm won’t depend on the details of steganography method used for embedding. All the obtained results can be easily adapted for the digital video and audio analysis.

  11. OntoCheck: verifying ontology naming conventions and metadata completeness in Protégé 4.

    Science.gov (United States)

    Schober, Daniel; Tudose, Ilinca; Svatek, Vojtech; Boeker, Martin

    2012-09-21

    Although policy providers have outlined minimal metadata guidelines and naming conventions, ontologies of today still display inter- and intra-ontology heterogeneities in class labelling schemes and metadata completeness. This fact is at least partially due to missing or inappropriate tools. Software support can ease this situation and contribute to overall ontology consistency and quality by helping to enforce such conventions. We provide a plugin for the Protégé Ontology editor to allow for easy checks on compliance towards ontology naming conventions and metadata completeness, as well as curation in case of found violations. In a requirement analysis, derived from a prior standardization approach carried out within the OBO Foundry, we investigate the needed capabilities for software tools to check, curate and maintain class naming conventions. A Protégé tab plugin was implemented accordingly using the Protégé 4.1 libraries. The plugin was tested on six different ontologies. Based on these test results, the plugin could be refined, also by the integration of new functionalities. The new Protégé plugin, OntoCheck, allows for ontology tests to be carried out on OWL ontologies. In particular the OntoCheck plugin helps to clean up an ontology with regard to lexical heterogeneity, i.e. enforcing naming conventions and metadata completeness, meeting most of the requirements outlined for such a tool. Found test violations can be corrected to foster consistency in entity naming and meta-annotation within an artefact. Once specified, check constraints like name patterns can be stored and exchanged for later re-use. Here we describe a first version of the software, illustrate its capabilities and use within running ontology development efforts and briefly outline improvements resulting from its application. Further, we discuss OntoChecks capabilities in the context of related tools and highlight potential future expansions. The OntoCheck plugin facilitates

  12. Check, check, double check: checking the autopilot causes distrust : Experimental studies on the effects of compulsive perseveration

    NARCIS (Netherlands)

    Dek, E.C.P.

    2015-01-01

    Obsessive-compulsive disorder (OCD) is characterized by persistent doubt. The majority of patients with OCD engage in repeated checking to reduce these feelings of uncertainty. However, numerous studies demonstrated that repetitive behavior ironically increases uncertainty: perseverative checking

  13. Constraints on stress-energy perturbations in general relativity

    International Nuclear Information System (INIS)

    Traschen, J.

    1985-01-01

    Conditions are found for the existence of integral constraints on stress-energy perturbations in general relativity. The integral constraints can be thought of as a general-relativistic generalization of the conservation of energy and momentum of matter perturbations in special relativity. The constraints are stated in terms of a vector field V, and the Robertson-Walker spacetimes are shown to have such constraint vectors. Although in general V is not a Killing vector, in a vacuum spacetime the constraint vectors are precisely the Killing vectors

  14. An integrable noncommutative version of the sine-Gordon system

    International Nuclear Information System (INIS)

    Grisaru, Marcus T.; Penati, Silvia

    2003-01-01

    Using the bicomplex approach we discuss an integrable noncommutative system in two-dimensional Euclidean space. It is described by an equation of motion which reduces to the ordinary sine-Gordon equation when the noncommutation parameter is removed, plus a constraint equation which is nontrivial only in the noncommutative case. The implications of this constraint, which is required by integrability but seems to reduce the space of classical solutions, remain to be understood. We show that the system has an infinite number of conserved currents and we give the general recursive relation for constructing them. For the particular cases of lower spin nontrivial currents we work out the explicit expressions and perform a direct check of their conservation. These currents reduce to the usual sine-Gordon currents in the commutative limit. We find classical 'localized' solutions to first order in the noncommutativity parameter and describe the Backlund transformations for our system. Finally, we comment on the relation of our noncommutative system to the commutative sine-Gordon system

  15. Efficient Semantics-Based Compliance Checking Using LTL Formulae and Unfolding

    Directory of Open Access Journals (Sweden)

    Liang Song

    2013-01-01

    Full Text Available Business process models are required to be in line with frequently changing regulations, policies, and environments. In the field of intelligent modeling, organisations concern automated business process compliance checking as the manual verification is a time-consuming and inefficient work. There exist two key issues for business process compliance checking. One is the definition of a business process retrieval language that can be employed to capture the compliance rules, the other concerns efficient evaluation of these rules. Traditional syntax-based retrieval approaches cannot deal with various important requirements of compliance checking in practice. Although a retrieval language that is based on semantics can overcome the drawback of syntax-based ones, it suffers from the well-known state space explosion. In this paper, we define a semantics-based process model query language through simplifying a property specification pattern system without affecting its expressiveness. We use this language to capture semantics-based compliance rules and constraints. We also propose a feasible approach in such a way that the compliance checking will not suffer from the state space explosion as much as possible. A tool is implemented to evaluate the efficiency. An experiment conducted on three model collections illustrates that our technology is very efficient.

  16. Vocalist - an international programme for the validation of constraint based methodology in structural integrity

    International Nuclear Information System (INIS)

    Lidbury, D.; Bass, R.; Gilles, Ph.; Connors, D.; Eisele, U.; Keim, E.; Keinanen, H.; Marie, St.; Nagel, G.; Taylor, N.; Wadier, Y.

    2001-01-01

    The pattern of crack-tip stresses and strains causing plastic flow and fracture in components is different to that in test specimens. This gives rise to the so-called constraint effect. Crack-tip constraint in components is generally lower than in test specimens. Effective toughness is correspondingly higher. The fracture toughness measured on test specimens is thus likely to underestimate that exhibited by cracks in components. A 36-month programme was initiated in October 2000 as part of the Fifth Framework of the European Atomic Energy Community (EURATOM), with the objective of achieving (i) an improved defect assessment methodology for predicting safety margins; (ii) improved lifetime management arguments. The programme VOCALIST (Validation of Constraint Based Methodology in Structural Integrity) is one of a 'cluster' of Fifth Framework projects in the area of Plant Life Management (Nuclear Fission). VOCALIST is also an associated project of NESC (Network for Evaluating Steel Components). The present paper describes the aims and objectives of VOCALIST, its interactions with NESC, and gives details of its various Work Packages. (authors)

  17. Vocalist - an international programme for the validation of constraint based methodology in structural integrity

    Energy Technology Data Exchange (ETDEWEB)

    Lidbury, D. [AEA Technology, Consulting (United Kingdom); Bass, R. [Oak Ridge National Lab., TN (United States); Gilles, Ph. [FRAMATOME, 92 - Paris-La-Defence (France); Connors, D. [BNFL Magnox Generation (United Kingdom); Eisele, U. [Multiphoton Absorption, MPA, Stuttgart (Germany); Keim, E. [Framatome ANP GmbH (Germany); Keinanen, H. [VTT Energy, Espoo (Finland); Marie, St. [CEA Saclay, Dept. de Mecanique et de Technologie, 91 - Gif sur Yvette (France); Nagel, G. [E.ON Kernraft (Germany); Taylor, N. [Joint Research Center, JRC-IAM (Netherlands); Wadier, Y. [Electricite de France (EDF), 93 - Saint-Denis (France). Dept. de Radioprotection

    2001-07-01

    The pattern of crack-tip stresses and strains causing plastic flow and fracture in components is different to that in test specimens. This gives rise to the so-called constraint effect. Crack-tip constraint in components is generally lower than in test specimens. Effective toughness is correspondingly higher. The fracture toughness measured on test specimens is thus likely to underestimate that exhibited by cracks in components. A 36-month programme was initiated in October 2000 as part of the Fifth Framework of the European Atomic Energy Community (EURATOM), with the objective of achieving (i) an improved defect assessment methodology for predicting safety margins; (ii) improved lifetime management arguments. The programme VOCALIST (Validation of Constraint Based Methodology in Structural Integrity) is one of a 'cluster' of Fifth Framework projects in the area of Plant Life Management (Nuclear Fission). VOCALIST is also an associated project of NESC (Network for Evaluating Steel Components). The present paper describes the aims and objectives of VOCALIST, its interactions with NESC, and gives details of its various Work Packages. (authors)

  18. Integrating software testing and run-time checking in an assertion verification framework

    OpenAIRE

    Mera, E.; López García, Pedro; Hermenegildo, Manuel V.

    2009-01-01

    We have designed and implemented a framework that unifies unit testing and run-time verification (as well as static verification and static debugging). A key contribution of our approach is that a unified assertion language is used for all of these tasks. We first propose methods for compiling runtime checks for (parts of) assertions which cannot be verified at compile-time via program transformation. This transformation allows checking preconditions and postconditions, including conditional...

  19. Transient analysis for a system with a tilted disc check valve

    International Nuclear Information System (INIS)

    Jeung, Jaesik; Lee, Kyukwang; Cho, Daegwan

    2014-01-01

    Check valves are used to prevent reverse flow conditions in a variety of systems in nuclear power plants. When a check valve is closed by a reverse flow, the transient load can jeopardize the structural integrity on the piping system and its supports. It may also damage intended function of the in-line components even though the severity of the load differs and depends strongly on types of the check valves. To incorporate the transient load in the piping system, it is very important to properly predict the system response to transients such as a check valve closure accompanied by pump trip and to evaluate the system transient. The one-dimensional transient simulation codes such as the RELAP5/MOD3.3 and TRACE were used. There has not been a single model that integrates the two codes to handle the behavior of a tilted disc check valve, which is designed to mitigate check valve slams by shorting the travel of the disc. In this paper a model is presented to predict the dynamic motion of a tilted disc check valve in the transient simulation using the RELAP5/MOD3.3 code and the model is incorporated in a system transient analysis using control variables of the code. In addition, transient analysis for Essential Service Water (ESW) system is performed using the proposed model and the associated load is evaluated for the system. (author)

  20. Stabilization Methods for the Integration of DAE in the Presence of Redundant Constraints

    International Nuclear Information System (INIS)

    Neto, Maria Augusta; Ambrosio, Jorge

    2003-01-01

    The use of multibody formulations based on Cartesian or natural coordinates lead to sets of differential-algebraic equations that have to be solved. The difficulty in providing compatible initial positions and velocities for a general spatial multibody model and the finite precision of such data result in initial errors that must be corrected during the forward dynamic solution of the system equations of motion.As the position and velocity constraint equations are not explicitly involved in the solution procedure, any integration error leads to the violation of these equations in the long run. Another problem that is very often impossible to avoid is the presence of redundant constraints.Even with no initial redundancy it is possible for some systems to achieve singular configurations in which kinematic constraints become temporarily redundant. In this work several procedures to stabilize the solution of the equations of motion and to handle redundant constraints are revisited. The Baumgarte stabilization, augmented Lagrangian and coordinate partitioning methods are discussed in terms of their efficiency and computational costs. The LU factorization with full pivoting of the Jacobian matrix directs the choice of the set of independent coordinates, required by the coordinate partitioning method.Even when no particular stabilization method is used, a Newton-Raphson iterative procedure is still required in the initial time step to correct the initial positions and velocities, thus requiring the selection of the independent coordinates. However, this initial selection does not guarantee that during the motion of the system other constraints do not become redundant. Two procedures based on the single value decomposition and Gram-Schmidt orthogonalization are revisited for the purpose. The advantages and drawbacks of the different procedures,used separately or in conjunction with each other and their computational costs are finally discussed

  1. A voice-actuated wind tunnel model leak checking system

    Science.gov (United States)

    Larson, William E.

    1989-01-01

    A computer program has been developed that improves the efficiency of wind tunnel model leak checking. The program uses a voice recognition unit to relay a technician's commands to the computer. The computer, after receiving a command, can respond to the technician via a voice response unit. Information about the model pressure orifice being checked is displayed on a gas-plasma terminal. On command, the program records up to 30 seconds of pressure data. After the recording is complete, the raw data and a straight line fit of the data are plotted on the terminal. This allows the technician to make a decision on the integrity of the orifice being checked. All results of the leak check program are stored in a database file that can be listed on the line printer for record keeping purposes or displayed on the terminal to help the technician find unchecked orifices. This program allows one technician to check a model for leaks instead of the two or three previously required.

  2. Finite-dimensional Liouville integrable Hamiltonian systems generated from Lax pairs of a bi-Hamiltonian soliton hierarchy by symmetry constraints

    Science.gov (United States)

    Manukure, Solomon

    2018-04-01

    We construct finite-dimensional Hamiltonian systems by means of symmetry constraints from the Lax pairs and adjoint Lax pairs of a bi-Hamiltonian hierarchy of soliton equations associated with the 3-dimensional special linear Lie algebra, and discuss the Liouville integrability of these systems based on the existence of sufficiently many integrals of motion.

  3. Model-checking dense-time Duration Calculus

    DEFF Research Database (Denmark)

    Fränzle, Martin

    2004-01-01

    Since the seminal work of Zhou Chaochen, M. R. Hansen, and P. Sestoft on decidability of dense-time Duration Calculus [Zhou, Hansen, Sestoft, 1993] it is well-known that decidable fragments of Duration Calculus can only be obtained through withdrawal of much of the interesting vocabulary...... of this logic. While this was formerly taken as an indication that key-press verification of implementations with respect to elaborate Duration Calculus specifications were also impossible, we show that the model property is well decidable for realistic designs which feature natural constraints...... suitably sparser model classes we obtain model-checking procedures for rich subsets of Duration Calculus. Together with undecidability results also obtained, this sheds light upon the exact borderline between decidability and undecidability of Duration Calculi and related logics....

  4. Particle acceleration inside PWN: Simulation and observational constraints with INTEGRAL; Acceleration de particules au sein des vents relativistes de pulsar: simulation et contraintes observationelles avec le satellite INTEGRAL

    Energy Technology Data Exchange (ETDEWEB)

    Forot, M

    2006-12-15

    The context of this thesis is to gain new constraints on the different particle accelerators that occur in the complex environment of neutron stars: in the pulsar magnetosphere, in the striped wind or wave outside the light cylinder, in the jets and equatorial wind, and at the wind terminal shock. An important tool to constrain both the magnetic field and primary particle energies is to image the synchrotron ageing of the population, but it requires a careful modelling of the magnetic field evolution in the wind flow. The current models and understanding of these different accelerators, the acceleration processes and open questions have been reviewed in the first part of the thesis. The instrumental part of this work involves the IBIS imager, on board the INTEGRAL satellite, that provides images with 12' resolution from 17 keV to MeV where the SPI spectrometer takes over up, to 10 MeV, but with a reduced 2 degrees resolution. A new method for using the double-layer IBIS imager as a Compton telescope with coded mask aperture. Its performance has been measured. The Compton scattering information and the achieved sensitivity also open a new window for polarimetry in gamma rays. A method has been developed to extract the linear polarization properties and to check the instrument response for fake polarimetric signals in the various backgrounds and projection effects.

  5. Particle acceleration inside PWN: Simulation and observational constraints with INTEGRAL; Acceleration de particules au sein des vents relativistes de pulsar: simulation et contraintes observationelles avec le satellite INTEGRAL

    Energy Technology Data Exchange (ETDEWEB)

    Forot, M

    2006-12-15

    The context of this thesis is to gain new constraints on the different particle accelerators that occur in the complex environment of neutron stars: in the pulsar magnetosphere, in the striped wind or wave outside the light cylinder, in the jets and equatorial wind, and at the wind terminal shock. An important tool to constrain both the magnetic field and primary particle energies is to image the synchrotron ageing of the population, but it requires a careful modelling of the magnetic field evolution in the wind flow. The current models and understanding of these different accelerators, the acceleration processes and open questions have been reviewed in the first part of the thesis. The instrumental part of this work involves the IBIS imager, on board the INTEGRAL satellite, that provides images with 12' resolution from 17 keV to MeV where the SPI spectrometer takes over up, to 10 MeV, but with a reduced 2 degrees resolution. A new method for using the double-layer IBIS imager as a Compton telescope with coded mask aperture. Its performance has been measured. The Compton scattering information and the achieved sensitivity also open a new window for polarimetry in gamma rays. A method has been developed to extract the linear polarization properties and to check the instrument response for fake polarimetric signals in the various backgrounds and projection effects.

  6. Moving energies as first integrals of nonholonomic systems with affine constraints

    Science.gov (United States)

    Fassò, Francesco; García-Naranjo, Luis C.; Sansonetto, Nicola

    2018-03-01

    In nonholonomic mechanical systems with constraints that are affine (linear nonhomogeneous) functions of the velocities, the energy is typically not a first integral. It was shown in Fassò and Sansonetto (2016 J. Nonlinear Sci. 26 519-44) that, nevertheless, there exist modifications of the energy, called there moving energies, which under suitable conditions are first integrals. The first goal of this paper is to study the properties of these functions and the conditions that lead to their conservation. In particular, we enlarge the class of moving energies considered in Fassò and Sansonetto (2016 J. Nonlinear Sci. 26 519-44). The second goal of the paper is to demonstrate the relevance of moving energies in nonholonomic mechanics. We show that certain first integrals of some well known systems (the affine Veselova and LR systems), which had been detected on a case-by-case way, are instances of moving energies. Moreover, we determine conserved moving energies for a class of affine systems on Lie groups that include the LR systems, for a heavy convex rigid body that rolls without slipping on a uniformly rotating plane, and for an n-dimensional generalization of the Chaplygin sphere problem to a uniformly rotating hyperplane.

  7. The Effects of Check-In, Check-Up, Check-Out for Students with Moderate Intellectual Disability during On- and Off-Site Vocational Training

    Science.gov (United States)

    Boden, Lauren J.; Jolivette, Kristine; Alberto, Paul A.

    2018-01-01

    Check-in/check-out is a secondary-tier intervention within the positive behavior interventions and supports framework. Check-in/check-out pairs the use of an adult mentor with a daily progress report to help students meet individualized behavioral goals. This study adds to the research base by examining the effects of check-in, check-up, check-out…

  8. Regular health checks

    DEFF Research Database (Denmark)

    Grønhøj Larsen, Christian; Jørgensen, Karsten Juhl; Gøtzsche, Peter C

    2012-01-01

    To investigate whether Danish providers of general health checks present a balanced account of possible benefits and harms on their websites and whether the health checks are evidence-based.......To investigate whether Danish providers of general health checks present a balanced account of possible benefits and harms on their websites and whether the health checks are evidence-based....

  9. From physical dose constraints to equivalent uniform dose constraints in inverse radiotherapy planning

    International Nuclear Information System (INIS)

    Thieke, Christian; Bortfeld, Thomas; Niemierko, Andrzej; Nill, Simeon

    2003-01-01

    Optimization algorithms in inverse radiotherapy planning need information about the desired dose distribution. Usually the planner defines physical dose constraints for each structure of the treatment plan, either in form of minimum and maximum doses or as dose-volume constraints. The concept of equivalent uniform dose (EUD) was designed to describe dose distributions with a higher clinical relevance. In this paper, we present a method to consider the EUD as an optimization constraint by using the method of projections onto convex sets (POCS). In each iteration of the optimization loop, for the actual dose distribution of an organ that violates an EUD constraint a new dose distribution is calculated that satisfies the EUD constraint, leading to voxel-based physical dose constraints. The new dose distribution is found by projecting the current one onto the convex set of all dose distributions fulfilling the EUD constraint. The algorithm is easy to integrate into existing inverse planning systems, and it allows the planner to choose between physical and EUD constraints separately for each structure. A clinical case of a head and neck tumor is optimized using three different sets of constraints: physical constraints for all structures, physical constraints for the target and EUD constraints for the organs at risk, and EUD constraints for all structures. The results show that the POCS method converges stable and given EUD constraints are reached closely

  10. Towards an automated checked baggage inspection system augmented with robots

    Science.gov (United States)

    DeDonato, Matthew P.; Dimitrov, Velin; Padır, Taskin

    2014-05-01

    We present a novel system for enhancing the efficiency and accuracy of checked baggage screening process at airports. The system requirements address the identification and retrieval of objects of interest that are prohibited in a checked luggage. The automated testbed is comprised of a Baxter research robot designed by Rethink Robotics for luggage and object manipulation, and a down-looking overhead RGB-D sensor for inspection and detection. We discuss an overview of current system implementations, areas of opportunity for improvements, robot system integration challenges, details of the proposed software architecture and experimental results from a case study for identifying various kinds of lighters in checked bags.

  11. Checking Java Programs

    CERN Document Server

    Darwin, Ian

    2007-01-01

    This Short Cut tells you about tools that will improve the quality of your Java code, using checking above and beyond what the standard tools do, including: Using javac options, JUnit and assertions Making your IDE work harder Checking your source code with PMD Checking your compiled code (.class files) with FindBugs Checking your program's run-time behavior with Java PathFinder

  12. Development of safety analysis and constraint detection techniques for process interaction errors

    Energy Technology Data Exchange (ETDEWEB)

    Fan, Chin-Feng, E-mail: csfanc@saturn.yzu.edu.tw [Computer Science and Engineering Dept., Yuan-Ze University, Taiwan (China); Tsai, Shang-Lin; Tseng, Wan-Hui [Computer Science and Engineering Dept., Yuan-Ze University, Taiwan (China)

    2011-02-15

    Among the new failure modes introduced by computer into safety systems, the process interaction error is the most unpredictable and complicated failure mode, which may cause disastrous consequences. This paper presents safety analysis and constraint detection techniques for process interaction errors among hardware, software, and human processes. Among interaction errors, the most dreadful ones are those that involve run-time misinterpretation from a logic process. We call them the 'semantic interaction errors'. Such abnormal interaction is not adequately emphasized in current research. In our static analysis, we provide a fault tree template focusing on semantic interaction errors by checking conflicting pre-conditions and post-conditions among interacting processes. Thus, far-fetched, but highly risky, interaction scenarios involve interpretation errors can be identified. For run-time monitoring, a range of constraint types is proposed for checking abnormal signs at run time. We extend current constraints to a broader relational level and a global level, considering process/device dependencies and physical conservation rules in order to detect process interaction errors. The proposed techniques can reduce abnormal interactions; they can also be used to assist in safety-case construction.

  13. Development of safety analysis and constraint detection techniques for process interaction errors

    International Nuclear Information System (INIS)

    Fan, Chin-Feng; Tsai, Shang-Lin; Tseng, Wan-Hui

    2011-01-01

    Among the new failure modes introduced by computer into safety systems, the process interaction error is the most unpredictable and complicated failure mode, which may cause disastrous consequences. This paper presents safety analysis and constraint detection techniques for process interaction errors among hardware, software, and human processes. Among interaction errors, the most dreadful ones are those that involve run-time misinterpretation from a logic process. We call them the 'semantic interaction errors'. Such abnormal interaction is not adequately emphasized in current research. In our static analysis, we provide a fault tree template focusing on semantic interaction errors by checking conflicting pre-conditions and post-conditions among interacting processes. Thus, far-fetched, but highly risky, interaction scenarios involve interpretation errors can be identified. For run-time monitoring, a range of constraint types is proposed for checking abnormal signs at run time. We extend current constraints to a broader relational level and a global level, considering process/device dependencies and physical conservation rules in order to detect process interaction errors. The proposed techniques can reduce abnormal interactions; they can also be used to assist in safety-case construction.

  14. A Novel Algorithm for Intrusion Detection Based on RASL Model Checking

    Directory of Open Access Journals (Sweden)

    Weijun Zhu

    2013-01-01

    Full Text Available The interval temporal logic (ITL model checking (MC technique enhances the power of intrusion detection systems (IDSs to detect concurrent attacks due to the strong expressive power of ITL. However, an ITL formula suffers from difficulty in the description of the time constraints between different actions in the same attack. To address this problem, we formalize a novel real-time interval temporal logic—real-time attack signature logic (RASL. Based on such a new logic, we put forward a RASL model checking algorithm. Furthermore, we use RASL formulas to describe attack signatures and employ discrete timed automata to create an audit log. As a result, RASL model checking algorithm can be used to automatically verify whether the automata satisfy the formulas, that is, whether the audit log coincides with the attack signatures. The simulation experiments show that the new approach effectively enhances the detection power of the MC-based intrusion detection methods for a number of telnet attacks, p-trace attacks, and the other sixteen types of attacks. And these experiments indicate that the new algorithm can find several types of real-time attacks, whereas the existing MC-based intrusion detection approaches cannot do that.

  15. Experiment for Integrating Dutch 3d Spatial Planning and Bim for Checking Building Permits

    Science.gov (United States)

    van Berlo, L.; Dijkmans, T.; Stoter, J.

    2013-09-01

    This paper presents a research project in The Netherlands in which several SMEs collaborated to create a 3D model of the National spatial planning information. This 2D information system described in the IMRO data standard holds implicit 3D information that can be used to generate an explicit 3D model. The project realized a proof of concept to generate a 3D spatial planning model. The team used the model to integrate it with several 3D Building Information Models (BIMs) described in the open data standard Industry Foundation Classes (IFC). Goal of the project was (1) to generate a 3D BIM model from spatial planning information to be used by the architect during the early design phase, and (2) allow 3D checking of building permits. The team used several technologies like CityGML, BIM clash detection and GeoBIM to explore the potential of this innovation. Within the project a showcase was created with a part of the spatial plan from the city of The Hague. Several BIM models were integrated in the 3D spatial plan of this area. A workflow has been described that demonstrates the benefits of collaboration between the spatial domain and the AEC industry in 3D. The research results in a showcase with conclusions and considerations for both national and international practice.

  16. 14 CFR 121.411 - Qualifications: Check airmen (airplane) and check airmen (simulator).

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Qualifications: Check airmen (airplane) and... § 121.411 Qualifications: Check airmen (airplane) and check airmen (simulator). (a) For the purposes of this section and § 121.413: (1) A check airman (airplane) is a person who is qualified, and permitted...

  17. Stability check source measurements with a secondary standard dosimeter in SSDL-Pakistan

    International Nuclear Information System (INIS)

    Salman, S.; Mahmoud, K.; Orfi, S.D.

    1988-01-01

    The stability check source is an integral part of a Secondary Standard Dosimetry System. The purpose of the stability check source is to confirm that the overall response of the dosimeter has not changed significantly since the instrument was calibrated. In case any change in the sensitivity of the ionization chamber or measuring assembly occurs the same is reflected in the reference check source measurements. Stability check source measurements are taken in a Primary Standard Dosimetry Laboratory (PSDL) at the time of calibration of secondary standard dosimeter and mean time (in seconds) to the reference setting of 50 scale divisions with ambient conditions of air at 20 deg. C, 101.3 kPa and 50% RH is quoted in a calibration certificate. This quoted stability check source time figure is the basis for future confirmation of overall response of the secondary standard dosimeter system. This note presents the results of stability check source measurements carried out in SSDL Pakistan over a period of five years

  18. Cycle time reduction by Html report in mask checking flow

    Science.gov (United States)

    Chen, Jian-Cheng; Lu, Min-Ying; Fang, Xiang; Shen, Ming-Feng; Ma, Shou-Yuan; Yang, Chuen-Huei; Tsai, Joe; Lee, Rachel; Deng, Erwin; Lin, Ling-Chieh; Liao, Hung-Yueh; Tsai, Jenny; Bowhill, Amanda; Vu, Hien; Russell, Gordon

    2017-07-01

    The Mask Data Correctness Check (MDCC) is a reticle-level, multi-layer DRC-like check evolved from mask rule check (MRC). The MDCC uses extended job deck (EJB) to achieve mask composition and to perform a detailed check for positioning and integrity of each component of the reticle. Different design patterns on the mask will be mapped to different layers. Therefore, users may be able to review the whole reticle and check the interactions between different designs before the final mask pattern file is available. However, many types of MDCC check results, such as errors from overlapping patterns usually have very large and complex-shaped highlighted areas covering the boundary of the design. Users have to load the result OASIS file and overlap it to the original database that was assembled in MDCC process on a layout viewer, then search for the details of the check results. We introduce a quick result-reviewing method based on an html format report generated by Calibre® RVE. In the report generation process, we analyze and extract the essential part of result OASIS file to a result database (RDB) file by standard verification rule format (SVRF) commands. Calibre® RVE automatically loads the assembled reticle pattern and generates screen shots of these check results. All the processes are automatically triggered just after the MDCC process finishes. Users just have to open the html report to get the information they need: for example, check summary, captured images of results and their coordinates.

  19. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  20. Check valve

    Science.gov (United States)

    Upton, H.A.; Garcia, P.

    1999-08-24

    A check valve for use in a GDCS of a nuclear reactor and having a motor driven disk including a rotatable armature for rotating the check valve disk over its entire range of motion is described. In one embodiment, the check valve includes a valve body having a coolant flow channel extending therethrough. The coolant flow channel includes an inlet end and an outlet end. A valve body seat is located on an inner surface of the valve body. The check valve further includes a disk assembly, sometimes referred to as the motor driven disc, having a counterweight and a disk shaped valve. The disk valve includes a disk base having a seat for seating with the valve body seat. The disk assembly further includes a first hinge pin member which extends at least partially through the disk assembly and is engaged to the disk. The disk valve is rotatable relative to the first hinge pin member. The check valve also includes a motor having a stator frame with a stator bore therein. An armature is rotatably positioned within the stator bore and the armature is coupled to the disk valve to cause the disk valve to rotate about its full range of motion. 5 figs.

  1. Check valve

    International Nuclear Information System (INIS)

    Upton, H.A.; Garcia, P.

    1999-01-01

    A check valve for use in a GDCS of a nuclear reactor and having a motor driven disk including a rotatable armature for rotating the check valve disk over its entire range of motion is described. In one embodiment, the check valve includes a valve body having a coolant flow channel extending therethrough. The coolant flow channel includes an inlet end and an outlet end. A valve body seat is located on an inner surface of the valve body. The check valve further includes a disk assembly, sometimes referred to as the motor driven disc, having a counterweight and a disk shaped valve. The disk valve includes a disk base having a seat for seating with the valve body seat. The disk assembly further includes a first hinge pin member which extends at least partially through the disk assembly and is engaged to the disk. The disk valve is rotatable relative to the first hinge pin member. The check valve also includes a motor having a stator frame with a stator bore therein. An armature is rotatably positioned within the stator bore and the armature is coupled to the disk valve to cause the disk valve to rotate about its full range of motion. 5 figs

  2. Intelligent Data Visualization for Cross-Checking Spacecraft System Diagnosis

    Science.gov (United States)

    Ong, James C.; Remolina, Emilio; Breeden, David; Stroozas, Brett A.; Mohammed, John L.

    2012-01-01

    Any reasoning system is fallible, so crew members and flight controllers must be able to cross-check automated diagnoses of spacecraft or habitat problems by considering alternate diagnoses and analyzing related evidence. Cross-checking improves diagnostic accuracy because people can apply information processing heuristics, pattern recognition techniques, and reasoning methods that the automated diagnostic system may not possess. Over time, cross-checking also enables crew members to become comfortable with how the diagnostic reasoning system performs, so the system can earn the crew s trust. We developed intelligent data visualization software that helps users cross-check automated diagnoses of system faults more effectively. The user interface displays scrollable arrays of timelines and time-series graphs, which are tightly integrated with an interactive, color-coded system schematic to show important spatial-temporal data patterns. Signal processing and rule-based diagnostic reasoning automatically identify alternate hypotheses and data patterns that support or rebut the original and alternate diagnoses. A color-coded matrix display summarizes the supporting or rebutting evidence for each diagnosis, and a drill-down capability enables crew members to quickly view graphs and timelines of the underlying data. This system demonstrates that modest amounts of diagnostic reasoning, combined with interactive, information-dense data visualizations, can accelerate system diagnosis and cross-checking.

  3. A decomposition method for network-constrained unit commitment with AC power flow constraints

    International Nuclear Information System (INIS)

    Bai, Yang; Zhong, Haiwang; Xia, Qing; Kang, Chongqing; Xie, Le

    2015-01-01

    To meet the increasingly high requirement of smart grid operations, considering AC power flow constraints in the NCUC (network-constrained unit commitment) is of great significance in terms of both security and economy. This paper proposes a decomposition method to solve NCUC with AC power flow constraints. With conic approximations of the AC power flow equations, the master problem is formulated as a MISOCP (mixed integer second-order cone programming) model. The key advantage of this model is that the active power and reactive power are co-optimised, and the transmission losses are considered. With the AC optimal power flow model, the AC feasibility of the UC result of the master problem is checked in subproblems. If infeasibility is detected, feedback constraints are generated based on the sensitivity of bus voltages to a change in the unit reactive power generation. They are then introduced into the master problem in the next iteration until all AC violations are eliminated. A 6-bus system, a modified IEEE 30-bus system and the IEEE 118-bus system are used to validate the performance of the proposed method, which provides a satisfactory solution with approximately 44-fold greater computational efficiency. - Highlights: • A decomposition method is proposed to solve the NCUC with AC power flow constraints • The master problem considers active power, reactive power and transmission losses. • OPF-based subproblems check the AC feasibility using parallel computing techniques. • An effective feedback constraint interacts between the master problem and subproblem. • Computational efficiency is significantly improved with satisfactory accuracy

  4. Analytical design of proportional-integral controllers for the optimal control of first-order processes with operational constraints

    Energy Technology Data Exchange (ETDEWEB)

    Thu, Hien Cao Thi; Lee, Moonyong [Yeungnam University, Gyeongsan (Korea, Republic of)

    2013-12-15

    A novel analytical design method of industrial proportional-integral (PI) controllers was developed for the optimal control of first-order processes with operational constraints. The control objective was to minimize a weighted sum of the controlled variable error and the rate of change in the manipulated variable under the maximum allowable limits in the controlled variable, manipulated variable and the rate of change in the manipulated variable. The constrained optimal servo control problem was converted to an unconstrained optimization to obtain an analytical tuning formula. A practical shortcut procedure for obtaining optimal PI parameters was provided based on graphical analysis of global optimality. The proposed PI controller was found to guarantee global optimum and deal explicitly with the three important operational constraints.

  5. 14 CFR 91.1089 - Qualifications: Check pilots (aircraft) and check pilots (simulator).

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Qualifications: Check pilots (aircraft) and check pilots (simulator). 91.1089 Section 91.1089 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION... RULES Fractional Ownership Operations Program Management § 91.1089 Qualifications: Check pilots...

  6. The capability and constraint model of recoverability: An integrated theory of continuity planning.

    Science.gov (United States)

    Lindstedt, David

    2017-01-01

    While there are best practices, good practices, regulations and standards for continuity planning, there is no single model to collate and sort their various recommended activities. To address this deficit, this paper presents the capability and constraint model of recoverability - a new model to provide an integrated foundation for business continuity planning. The model is non-linear in both construct and practice, thus allowing practitioners to remain adaptive in its application. The paper presents each facet of the model, outlines the model's use in both theory and practice, suggests a subsequent approach that arises from the model, and discusses some possible ramifications to the industry.

  7. Using LDPC Code Constraints to Aid Recovery of Symbol Timing

    Science.gov (United States)

    Jones, Christopher; Villasnor, John; Lee, Dong-U; Vales, Esteban

    2008-01-01

    A method of utilizing information available in the constraints imposed by a low-density parity-check (LDPC) code has been proposed as a means of aiding the recovery of symbol timing in the reception of a binary-phase-shift-keying (BPSK) signal representing such a code in the presence of noise, timing error, and/or Doppler shift between the transmitter and the receiver. This method and the receiver architecture in which it would be implemented belong to a class of timing-recovery methods and corresponding receiver architectures characterized as pilotless in that they do not require transmission and reception of pilot signals. Acquisition and tracking of a signal of the type described above have traditionally been performed upstream of, and independently of, decoding and have typically involved utilization of a phase-locked loop (PLL). However, the LDPC decoding process, which is iterative, provides information that can be fed back to the timing-recovery receiver circuits to improve performance significantly over that attainable in the absence of such feedback. Prior methods of coupling LDPC decoding with timing recovery had focused on the use of output code words produced as the iterations progress. In contrast, in the present method, one exploits the information available from the metrics computed for the constraint nodes of an LDPC code during the decoding process. In addition, the method involves the use of a waveform model that captures, better than do the waveform models of the prior methods, distortions introduced by receiver timing errors and transmitter/ receiver motions. An LDPC code is commonly represented by use of a bipartite graph containing two sets of nodes. In the graph corresponding to an (n,k) code, the n variable nodes correspond to the code word symbols and the n-k constraint nodes represent the constraints that the code places on the variable nodes in order for them to form a valid code word. The decoding procedure involves iterative computation

  8. Overview of Prevention for Water Hammer by Check Valve Action in Nuclear Reactor

    International Nuclear Information System (INIS)

    Kim, Dayong; Yoon, Hyungi; Seo, Kyoungwoo; Kim, Seonhoon

    2016-01-01

    Water hammer can cause serious damage to pumping system and unexpected system pressure rise in the pipeline. In nuclear reactor, water hammer can influence on the integrity of safety related system. Water hammer in nuclear reactor have been caused by voiding in normally water-filled lines, steam condensation line containing both steam and water, as well as by rapid check valve action. Therefore, this study focuses on the water hammer by check valve among the sources of water hammer occurrence and suggests proper methodology for check valve type selection against water hammer. This study focuses on the water hammer by check valve action among the sources of water hammer occurrence and suggests proper methodology for check valve type selection against water hammer. If the inadvertent pump trip or pipe rupture in high velocity and pressure pipe is predicted, the fast response check valve such as tiled disc, dual disc and nozzle check valve should be installed in the system. If the inadvertent pump trip or pipe rupture in very high velocity and pressure pipe and excessively large revered flow velocity are predicted, the very slowly closing check valve such as controlled closure check valve should be installed in the system

  9. Overview of Prevention for Water Hammer by Check Valve Action in Nuclear Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Dayong; Yoon, Hyungi; Seo, Kyoungwoo; Kim, Seonhoon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Water hammer can cause serious damage to pumping system and unexpected system pressure rise in the pipeline. In nuclear reactor, water hammer can influence on the integrity of safety related system. Water hammer in nuclear reactor have been caused by voiding in normally water-filled lines, steam condensation line containing both steam and water, as well as by rapid check valve action. Therefore, this study focuses on the water hammer by check valve among the sources of water hammer occurrence and suggests proper methodology for check valve type selection against water hammer. This study focuses on the water hammer by check valve action among the sources of water hammer occurrence and suggests proper methodology for check valve type selection against water hammer. If the inadvertent pump trip or pipe rupture in high velocity and pressure pipe is predicted, the fast response check valve such as tiled disc, dual disc and nozzle check valve should be installed in the system. If the inadvertent pump trip or pipe rupture in very high velocity and pressure pipe and excessively large revered flow velocity are predicted, the very slowly closing check valve such as controlled closure check valve should be installed in the system.

  10. Proposal of Constraints Analysis Method Based on Network Model for Task Planning

    Science.gov (United States)

    Tomiyama, Tomoe; Sato, Tatsuhiro; Morita, Toyohisa; Sasaki, Toshiro

    Deregulation has been accelerating several activities toward reengineering business processes, such as railway through service and modal shift in logistics. Making those activities successful, business entities have to regulate new business rules or know-how (we call them ‘constraints’). According to the new constraints, they need to manage business resources such as instruments, materials, workers and so on. In this paper, we propose a constraint analysis method to define constraints for task planning of the new business processes. To visualize each constraint's influence on planning, we propose a network model which represents allocation relations between tasks and resources. The network can also represent task ordering relations and resource grouping relations. The proposed method formalizes the way of defining constraints manually as repeatedly checking the network structure and finding conflicts between constraints. Being applied to crew scheduling problems shows that the method can adequately represent and define constraints of some task planning problems with the following fundamental features, (1) specifying work pattern to some resources, (2) restricting the number of resources for some works, (3) requiring multiple resources for some works, (4) prior allocation of some resources to some works and (5) considering the workload balance between resources.

  11. Periodic medical check-up among residents of three Nigerian South-western States

    Directory of Open Access Journals (Sweden)

    Saheed Opeyemi Usman

    2016-09-01

    Full Text Available Objectives: General medical examination is a common form of preventive medicine. Periodic medical check-up generally involves thorough history, physical examination and screening of asymptomatic persons by physicians on a regular basis as part of a routine health care process. Periodic medical check-up is considered effective in preventing illness and promoting health and reducing morbidity and mortality. This study is therefore designed to determine the knowledge, attitude and practice of periodic medical check-up among residents of Osun, Ondo and Ekiti States of Nigeria. It is also to determine the influence of educational status on its practice and compare the outcomes in the three states. Materials and Methods: The cross-sectional survey study utilizing both qualitative and quantitative method of data collection was conducted at various locations across the three states. The locations included those of public servants, private sector workers, artisans, traders, business men/women, farmers, among others. Results: 1200 consenting residents participated in the study in each of the three states. 518 (43.2% of the respondents in Ondo State are males while 682 (57.8% are females. 465 (38.8% of the respondents in Ekiti State are males while 735 (61.2% are females. 494 (41.2% of the respondents in Osun State are males while 706 (59.8% are females. The mean age in Ondo, Ekiti and Osun were 43.8 +/- 10.7 years, 44.6 +/- 11.5 years and 41.7 +/- 10.1 years respectively. 89.2%, 88.3% and 87.4% of the respondents are aware of periodic medical check-up in Ondo, Ekiti and Osun states respectively. Conclusion: There is high level of awareness of periodic medical check-up in all three states but the level of practice of routine medical check-up is low. The majority of the respondents probably don't practice it because their health insurance plan does not cover the medical check-up or due to individual/organizational financial constraints. [J Contemp Med 2016

  12. Formal verification of dynamic hybrid systems: a NuSMV-based model checking approach

    Directory of Open Access Journals (Sweden)

    Xu Zhi

    2018-01-01

    Full Text Available Software security is an important and challenging research topic in developing dynamic hybrid embedded software systems. Ensuring the correct behavior of these systems is particularly difficult due to the interactions between the continuous subsystem and the discrete subsystem. Currently available security analysis methods for system risks have been limited, as they rely on manual inspections of the individual subsystems under simplifying assumptions. To improve this situation, a new approach is proposed that is based on the symbolic model checking tool NuSMV. A dual PID system is used as an example system, for which the logical part and the computational part of the system are modeled in a unified manner. Constraints are constructed on the controlled object, and a counter-example path is ultimately generated, indicating that the hybrid system can be analyzed by the model checking tool.

  13. Adaptation to climate-induced regional water constraints in the Spanish energy sector: An integrated assessment

    International Nuclear Information System (INIS)

    Khan, Zarrar; Linares, Pedro; García-González, Javier

    2016-01-01

    The energy sector depends on water in all phases of its life-cycle, including raw material extraction, power plant cooling, irrigation of biofuel crops and directly in hydropower generation. In the coming decades, several regions of the world are expected to experience a decrease in water resource availability, in part due to climate change. The dependence of the energy sector on water resources calls for an active effort to adapt to the possible scenarios. This paper presents a novel model that addresses the direct impacts of regional and temporal water shortages on energy operation and investment decisions. The paper investigates the costs and benefits of adapting the energy sector to climate-induced water scarcity. The results show that the increase in costs for an energy plan that considers future water stress is relatively small as compared to one which ignores it. A plan which ignores water constraints, however, may lead to significant economic damages when actually exposed to water shortages. The results also highlight the value of the availability of water for the energy sector, which is significantly higher than existing prices. The paper concludes that the potential benefits to be gained by integrating energy and water models can be considerable. - Highlights: • Spatial and temporal water constraints are added to an energy planning model. • Integrated water-energy planning can lead to significant savings in future water-stressed scenarios. • Actual value of water for the energy sector may be much higher than existing prices.

  14. On the functional integration between postural and supra-postural tasks on the basis of contextual cues and task constraint.

    Science.gov (United States)

    de Lima, Andrea Cristina; de Azevedo Neto, Raymundo Machado; Teixeira, Luis Augusto

    2010-10-01

    In order to evaluate the effects of uncertainty about direction of mechanical perturbation and supra-postural task constraint on postural control, young adults had their upright stance perturbed while holding a tray in a horizontal position. Stance was perturbed by moving forward or backward a supporting platform, contrasting situations of certainty versus uncertainty of direction of displacement. Increased constraint on postural stability was imposed by a supra-postural task of equilibrating a cylinder on the tray. Performance was assessed through EMG of anterior leg muscles, angular displacement of the main joints involved in the postural reactions and displacement of the tray. Results showed that both certainty on the direction of perturbation and increased supra-postural task constraint led to decreased angular displacement of the knee and the hip. Furthermore, combination of certainty and high supra-postural task constraint produced shorter latency of muscular activation. Such postural responses were paralleled by decreased displacement of the tray. These results suggest a functional integration between the tasks, with central set priming reactive postural responses from contextual cues and increased stability demand. Copyright © 2010 Elsevier B.V. All rights reserved.

  15. Crack-tip constraint analyses and constraint-dependent LBB curves for circumferential through-wall cracked pipes

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Y.L.; Wang, G.Z., E-mail: gzwang@ecust.edu.cn; Xuan, F.Z.; Tu, S.T.

    2015-04-15

    Highlights: • Solution of constraint parameter τ* for through-wall cracked pipes has been obtained. • Constraint increases with increasing crack length and radius–thickness ratio of pipes. • Constraint-dependent LBB curve for through-wall cracked pipes has been constructed. • For increasing accuracy of LBB assessments, constraint effect should be considered. - Abstract: The leak-before-break (LBB) concept has been widely applied in the structural integrity assessments of pressured pipes in nuclear power plants. However, the crack-tip constraint effects in LBB analyses and designs cannot be incorporated. In this paper, by using three-dimensional finite element calculations, the modified load-independent T-stress constraint parameter τ* for circumferential through-wall cracked pipes with different geometries and crack sizes has been analyzed under different loading conditions, and the solutions of the crack-tip constraint parameter τ* have been obtained. Based on the τ* solutions and constraint-dependent J–R curves of a steel, the constraint-dependent LBB (leak-before-break) curves have been constructed. The results show that the constraint τ* increases with increasing crack length θ, mean radius R{sub m} and radius–thickness ratio R{sub m}/t of the pipes. In LBB analyses, the critical crack length calculated by the J–R curve of the standard high constraint specimen for pipes with shorter cracks is over-conservative, and the degree of conservatism increases with decreasing crack length θ, R{sub m} and R{sub m}/t. Therefore, the constraint-dependent LBB curves should be constructed to modify the over-conservatism and increase accuracy of LBB assessments.

  16. Hierarchical remote data possession checking method based on massive cloud files

    Directory of Open Access Journals (Sweden)

    Ma Haifeng

    2017-06-01

    Full Text Available Cloud storage service enables users to migrate their data and applications to the cloud, which saves the local data maintenance and brings great convenience to the users. But in cloud storage, the storage servers may not be fully trustworthy. How to verify the integrity of cloud data with lower overhead for users has become an increasingly concerned problem. Many remote data integrity protection methods have been proposed, but these methods authenticated cloud files one by one when verifying multiple files. Therefore, the computation and communication overhead are still high. Aiming at this problem, a hierarchical remote data possession checking (hierarchical-remote data possession checking (H-RDPC method is proposed, which can provide efficient and secure remote data integrity protection and can support dynamic data operations. This paper gives the algorithm descriptions, security, and false negative rate analysis of H-RDPC. The security analysis and experimental performance evaluation results show that the proposed H-RDPC is efficient and reliable in verifying massive cloud files, and it has 32–81% improvement in performance compared with RDPC.

  17. Towards an integrated, multiple constraint approach. Assessing the regional carbon balance

    International Nuclear Information System (INIS)

    Kruijt, B.; Dolman, A.J.; Lloyd, J.; Ehleringer, J.; Raupach, M.; Finnigan, J.

    2001-01-01

    Full carbon accounting for regions as a whole, considering all fluxes and transports, is ultimately the only real hope if we are to manage global CO2 emissions. Many methods exist to estimate parts of the carbon budget, but none is yet available to measure carbon fluxes directly at regional scales. Atmospheric Boundary-Layer budgeting methods do have this potential. In the winter of 2000, an international workshop was held in Gubbio, Italy, to discuss ways to advance from the pilot experiments that have been carried out on these methods. First, the meeting helped to advance the methodology and clarify its objectives, requirements and merits. But more importantly, the outcome of the meeting was that atmospheric budget methods should be part of an integrative approach, in which data and model results of very different kinds and from very different scales all provide constraints for estimating the net carbon exchange of a region. Several international projects are now operating to achieve this goal

  18. Misconceptions and constraints

    International Nuclear Information System (INIS)

    Whitten, M.; Mahon, R.

    2005-01-01

    In theory, the sterile insect technique (SIT) is applicable to a wide variety of invertebrate pests. However, in practice, the approach has been successfully applied to only a few major pests. Chapters in this volume address possible reasons for this discrepancy, e.g. Klassen, Lance and McInnis, and Robinson and Hendrichs. The shortfall between theory and practice is partly due to the persistence of some common misconceptions, but it is mainly due to one constraint, or a combination of constraints, that are biological, financial, social or political in nature. This chapter's goal is to dispel some major misconceptions, and view the constraints as challenges to overcome, seeing them as opportunities to exploit. Some of the common misconceptions include: (1) released insects retain residual radiation, (2) females must be monogamous, (3) released males must be fully sterile, (4) eradication is the only goal, (5) the SIT is too sophisticated for developing countries, and (6) the SIT is not a component of an area-wide integrated pest management (AW-IPM) strategy. The more obvious constraints are the perceived high costs of the SIT, and the low competitiveness of released sterile males. The perceived high up-front costs of the SIT, their visibility, and the lack of private investment (compared with alternative suppression measures) emerge as serious constraints. Failure to appreciate the true nature of genetic approaches, such as the SIT, may pose a significant constraint to the wider adoption of the SIT and other genetically-based tactics, e.g. transgenic genetically modified organisms (GMOs). Lack of support for the necessary underpinning strategic research also appears to be an important constraint. Hence the case for extensive strategic research in ecology, population dynamics, genetics, and insect behaviour and nutrition is a compelling one. Raising the competitiveness of released sterile males remains the major research objective of the SIT. (author)

  19. A Hybrid Programming Framework for Modeling and Solving Constraint Satisfaction and Optimization Problems

    OpenAIRE

    Sitek, Paweł; Wikarek, Jarosław

    2016-01-01

    This paper proposes a hybrid programming framework for modeling and solving of constraint satisfaction problems (CSPs) and constraint optimization problems (COPs). Two paradigms, CLP (constraint logic programming) and MP (mathematical programming), are integrated in the framework. The integration is supplemented with the original method of problem transformation, used in the framework as a presolving method. The transformation substantially reduces the feasible solution space. The framework a...

  20. Repeated checking causes memory distrust

    NARCIS (Netherlands)

    van den Hout, M.; Kindt, M.

    2003-01-01

    This paper attempts to explain why in obsessive-compulsive disorder (OCD) checkers distrust in memory persists despite extensive checking. It is argued that: (1) repeated checking increases familiarity with the issues checked; (2) increased familiarity promotes conceptual processing which inhibits

  1. What is a good health check? An interview study of health check providers' views and practices.

    Science.gov (United States)

    Stol, Yrrah H; Asscher, Eva C A; Schermer, Maartje H N

    2017-10-02

    Health checks identify (risk factors for) disease in people without symptoms. They may be offered by the government through population screenings and by other providers to individual users as 'personal health checks'. Health check providers' perspective of 'good' health checks may further the debate on the ethical evaluation and possible regulation of these personal health checks. In 2015, we interviewed twenty Dutch health check providers on criteria for 'good' health checks, and the role these criteria play in their practices. Providers unanimously formulate a number of minimal criteria: Checks must focus on (risk factors for) treatable/preventable disease; Tests must be reliable and clinically valid; Participation must be informed and voluntary; Checks should provide more benefits than harms; Governmental screenings should be cost-effective. Aspirational criteria mentioned were: Follow-up care should be provided; Providers should be skilled and experienced professionals that put the benefit of (potential) users first; Providers should take time and attention. Some criteria were contested: People should be free to test on any (risk factor for) disease; Health checks should only be performed in people at high risk for disease that are likely to implement health advice; Follow up care of privately funded tests should not drain on collective resources. Providers do not always fulfil their own criteria. Their reasons reveal conflicts between criteria, conflicts between criteria and other ethical values, and point to components in the (Dutch) organisation of health care that hinder an ethical provision of health checks. Moreover, providers consider informed consent a criterion that is hard to establish in practice. According to providers, personal health checks should meet the same criteria as population screenings, with the exception of cost-effectiveness. Providers do not always fulfil their own criteria. Results indicate that in thinking about the ethics of health

  2. Parallel Algorithms for Model Checking

    NARCIS (Netherlands)

    van de Pol, Jaco; Mousavi, Mohammad Reza; Sgall, Jiri

    2017-01-01

    Model checking is an automated verification procedure, which checks that a model of a system satisfies certain properties. These properties are typically expressed in some temporal logic, like LTL and CTL. Algorithms for LTL model checking (linear time logic) are based on automata theory and graph

  3. Production Team Maintenance: Systemic Constraints Impacting Implementation

    National Research Council Canada - National Science Library

    Moore, Terry

    1997-01-01

    .... Identified constraints included: integrating the PTM positioning strategy into the AMC corporate strategic planning process, manpower modeling simulator limitations, labor force authorizations and decentralization...

  4. A constraint-based bottom-up counterpart to definite clause grammars

    DEFF Research Database (Denmark)

    Christiansen, Henning

    2004-01-01

    A new grammar formalism, CHR Grammars (CHRG), is proposed that provides a constraint-solving approach to language analysis, built on top of the programming language of Constraint Handling Rules in the same way as Definite Clause Grammars (DCG) on Prolog. CHRG works bottom-up and adds the following......, integrity constraints, operators a la assumption grammars, and to incorporate other constraint solvers. (iv)~Context-sensitive rules that apply for disambiguation, coordination in natural language and tagger-like rules....

  5. Implications of water constraints for electricity capacity expansion in the United States

    Science.gov (United States)

    Liu, L.; Hejazi, M. I.; Iyer, G.; Forman, B. A.

    2017-12-01

    U.S. electricity generation is vulnerable to water supply since water is required for cooling. Constraints on the availability of water will therefore necessitate adaptive planning by the power generation sector. Hence, it is important to integrate restrictions in water availability in electricity capacity planning in order to better understand the economic viability of alternative capacity planning options. The study of the implications of water constraints for the U.S. power generation system is limited in terms of scale and robustness. We extend previous studies by including physical water constraints in a state-level model of the U.S. energy system embedded within a global integrated assessment model (GCAM-USA). We focus on the implications of such constraints for the U.S. electricity capacity expansion, integrating both supply and demand effects under a consistent framework. Constraints on the availability of water have two general effects across the U.S. First, water availability constraints increase the cost of electricity generation, resulting in reduced electrification of end-use sectors. Second, water availability constraints result in forced retirements of water-intensive technologies such as thermoelectric coal- and gas- fired technologies before the end of their natural lifetimes. The demand for electricity is then met by an increase in investments in less water-dependent technologies such as wind and solar photovoltaic. Our results show that the regional patterns of the above effects are heterogeneous across the U.S. In general, the impacts of water constraints on electricity capacity expansion are more pronounced in the West than in the East. This is largely because of lower water availability in the West compared to the East due to lower precipitation in the Western states. Constraints on the availability of water might also have important implications for U.S. electricity trade. For example, under severe constraints on the availability of water

  6. Enforcement of entailment constraints in distributed service-based business processes.

    Science.gov (United States)

    Hummer, Waldemar; Gaubatz, Patrick; Strembeck, Mark; Zdun, Uwe; Dustdar, Schahram

    2013-11-01

    A distributed business process is executed in a distributed computing environment. The service-oriented architecture (SOA) paradigm is a popular option for the integration of software services and execution of distributed business processes. Entailment constraints, such as mutual exclusion and binding constraints, are important means to control process execution. Mutually exclusive tasks result from the division of powerful rights and responsibilities to prevent fraud and abuse. In contrast, binding constraints define that a subject who performed one task must also perform the corresponding bound task(s). We aim to provide a model-driven approach for the specification and enforcement of task-based entailment constraints in distributed service-based business processes. Based on a generic metamodel, we define a domain-specific language (DSL) that maps the different modeling-level artifacts to the implementation-level. The DSL integrates elements from role-based access control (RBAC) with the tasks that are performed in a business process. Process definitions are annotated using the DSL, and our software platform uses automated model transformations to produce executable WS-BPEL specifications which enforce the entailment constraints. We evaluate the impact of constraint enforcement on runtime performance for five selected service-based processes from existing literature. Our evaluation demonstrates that the approach correctly enforces task-based entailment constraints at runtime. The performance experiments illustrate that the runtime enforcement operates with an overhead that scales well up to the order of several ten thousand logged invocations. Using our DSL annotations, the user-defined process definition remains declarative and clean of security enforcement code. Our approach decouples the concerns of (non-technical) domain experts from technical details of entailment constraint enforcement. The developed framework integrates seamlessly with WS-BPEL and the Web

  7. Check valves aging assessment

    International Nuclear Information System (INIS)

    Haynes, H.D.

    1991-01-01

    In support of the NRC Nuclear Plant Aging Research (NPAR) program, the Oak Ridge National Laboratory (ORNL) has carried out an assessment of several check value diagnostic monitoring methods, in particular, those based on measurements of acoustic emission, ultrasonics, and magnetic flux. The evaluations have focussed on the capabilities of each method to provide information useful in determining check valve aging and service wear effects, check valve failures, and undesirable operating modes. This paper describes the benefits and limitations associated with each method and includes recent laboratory and field test data, including data obtained from the vendors who recently participated in a comprehensive series of tests directed by a nuclear industry users group. In addition, as part of the ORNL Advanced Diagnostic Engineering Research and Development Center (ADEC), two novel nonintrusive monitoring methods were developed that provide several unique capabilities. These methods, based on external ac- an dc-magnetic monitoring are also described. None of the examined methods could, by themselves, monitor both the instantaneous position and motion of check valve internals and valve leakage; however, the combination of acoustic emission monitoring with one of the other methods provides the means to determine vital check valve operational information

  8. Integrated reservoir characterization: Improvement in heterogeneities stochastic modelling by integration of additional external constraints

    Energy Technology Data Exchange (ETDEWEB)

    Doligez, B.; Eschard, R. [Institut Francais du Petrole, Rueil Malmaison (France); Geffroy, F. [Centre de Geostatistique, Fontainebleau (France)] [and others

    1997-08-01

    The classical approach to construct reservoir models is to start with a fine scale geological model which is informed with petrophysical properties. Then scaling-up techniques allow to obtain a reservoir model which is compatible with the fluid flow simulators. Geostatistical modelling techniques are widely used to build the geological models before scaling-up. These methods provide equiprobable images of the area under investigation, which honor the well data, and which variability is the same than the variability computed from the data. At an appraisal phase, when few data are available, or when the wells are insufficient to describe all the heterogeneities and the behavior of the field, additional constraints are needed to obtain a more realistic geological model. For example, seismic data or stratigraphic models can provide average reservoir information with an excellent areal coverage, but with a poor vertical resolution. New advances in modelisation techniques allow now to integrate this type of additional external information in order to constrain the simulations. In particular, 2D or 3D seismic derived information grids, or sand-shale ratios maps coming from stratigraphic models can be used as external drifts to compute the geological image of the reservoir at the fine scale. Examples are presented to illustrate the use of these new tools, their impact on the final reservoir model, and their sensitivity to some key parameters.

  9. 27 CFR 70.101 - Bad checks.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Bad checks. 70.101 Section....101 Bad checks. If any check or money order in payment of any amount receivable under Title 26 of the... appropriate TTB officer that such check was tendered in good faith and that such person had reasonable cause...

  10. Check In / Check Out. The Public Space as an Internet of Things

    NARCIS (Netherlands)

    van t Hof, C.C.G.; van Est, R.; Daemen, F.

    2011-01-01

    Mobile phones, public transport smart cards, security cameras and GPS systems in our car - we are surrounded by digital devices. They track us, guide us, help us, and control us. The book Check In / Check Out. The Public Space as an Internet of Things shows us how our digital and physical worlds are

  11. Check in / check out : the public space as an internet of things

    NARCIS (Netherlands)

    Hof, van 't C.; Est, van R.; Daemen, F.

    2011-01-01

    Mobile phones, public transport smart cards, security cameras and GPS systems in our car - we are surrounded by digital devices. They track us, guide us, help us, and control us. The book Check In / Check Out. The Public Space as an Internet of Things shows us how our digital and physical worlds are

  12. Formalization of taxon-based constraints to detect inconsistencies in annotation and ontology development

    Directory of Open Access Journals (Sweden)

    Mungall Christopher J

    2010-10-01

    Full Text Available Abstract Background The Gene Ontology project supports categorization of gene products according to their location of action, the molecular functions that they carry out, and the processes that they are involved in. Although the ontologies are intentionally developed to be taxon neutral, and to cover all species, there are inherent taxon specificities in some branches. For example, the process 'lactation' is specific to mammals and the location 'mitochondrion' is specific to eukaryotes. The lack of an explicit formalization of these constraints can lead to errors and inconsistencies in automated and manual annotation. Results We have formalized the taxonomic constraints implicit in some GO classes, and specified these at various levels in the ontology. We have also developed an inference system that can be used to check for violations of these constraints in annotations. Using the constraints in conjunction with the inference system, we have detected and removed errors in annotations and improved the structure of the ontology. Conclusions Detection of inconsistencies in taxon-specificity enables gradual improvement of the ontologies, the annotations, and the formalized constraints. This is progressively improving the quality of our data. The full system is available for download, and new constraints or proposed changes to constraints can be submitted online at https://sourceforge.net/tracker/?atid=605890&group_id=36855.

  13. What is a good health check? An interview study of health check providers' views and practices

    NARCIS (Netherlands)

    Y. Stol (Yrrah); E.C.A. Asscher (Eva); M.H.N. Schermer (Maartje)

    2017-01-01

    markdownabstract__Background:__ Health checks identify (risk factors for) disease in people without symptoms. They may be offered by the government through population screenings and by other providers to individual users as 'personal health checks'. Health check providers' perspective of 'good'

  14. checkCIF/PLATON (full publication check)

    Indian Academy of Sciences (India)

    editor handling your paper, to upload your CIF via our web site. PLATON version of 05/02/2014; check.def file version of 05/02/2014. Datablock I - ellipsoid plot http://vm02b.iucr.org/cgi-bin/checkcif_hkl.pl(第 3/4 页)2014-2-12 09:09:12 ...

  15. Reexamination of cross-sections for fast neutrons by computational checking of single material integral experiments

    International Nuclear Information System (INIS)

    Schriewer, J.; Hehn, G.; Mattes, M.

    1976-06-01

    Transmission experiments for fast neutrons and pure materials offer the possibility to check the accuracy of nuclear data compilations by recalculating the measured discharge spectra. In this paper the calculations were mainly based on two Benchmark experiments with pure iron carried out at the Karlsruhe Nuclear Research Center. One of the experiments employed a 252 Cf fission source and spherically symmetric arrangement; the other was based on transmission of an iron cylinder by 14-MeV neutrons from a D+T source. The checking calculations were based on the data compilation ENDF/B-IV (occasionally also ENDF/B-III) and on the transport codes ANISN (1D) and DOT-2 (2D) with lined up ESTOQ (for calculating the first-collision source). The calculations with the Cf source showed good agreement with the results of measurement, whereas the checking of the arrangement with 14 MeV neutrons yielded a marked underestimation of the neutron flux density in the range of 2 MeV up to 14 MeV. The discussion of the results including the choice of codes was done on the basis of a literature review on the Benchmark experiments for iron with fast neutrons carried out until now. (orig.) [de

  16. [Design and implementation of data checking system for Chinese materia medica resources survey].

    Science.gov (United States)

    Wang, Hui; Zhang, Xiao-Bo; Ge, Xiao-Guang; Jin, Yan; Jing, Zhi-Xian; Qi, Yuan-Hua; Wang, Ling; Zhao, Yu-Ping; Wang, Wei; Guo, Lan-Ping; Huang, Lu-Qi

    2017-11-01

    The Chinese material medica resources (CMMR) national survey information management system has collected a large amount of data. To help dealing with data recheck, reduce the work of inside, improve the recheck of survey data from provincial and county level, National Resource Center for Chinese Materia Medical has designed a data checking system for Chinese material medica resources survey based on J2EE technology, Java language, Oracle data base in accordance with the SOA framework. It includes single data check, check score, content manage, check the survey data census data with manual checking and automatic checking about census implementation plan, key research information, general survey information, cultivation of medicinal materials information, germplasm resources information the medicine information, market research information, traditional knowledge information, specimen information of this 9 aspects 20 class 175 indicators in two aspects of the quantity and quality. The established system assists in the completion of the data consistency and accuracy, pushes the county survey team timely to complete the data entry arrangement work, so as to improve the integrity, consistency and accuracy of the survey data, and ensure effective and available data, which lay a foundation for providing accurate data support for national survey of the Chinese material medica resources (CMMR) results summary, and displaying results and sharing. Copyright© by the Chinese Pharmaceutical Association.

  17. Diagnostic framework and health check tool for engineering and technology projects

    Directory of Open Access Journals (Sweden)

    Simon P Philbin

    2014-10-01

    Full Text Available Purpose: Development of a practitioner oriented diagnostic framework and health check tool to support the robust assessment of engineering and technology projects.Design/methodology/approach: The research is based on a literature review that draws together insights on project assessment and critical success factors to establish an integrated systems view of projects. This is extended to allow a comprehensive diagnostic framework to be developed along with a high-level health check tool that can be readily deployed on projects. The utility of the diagnostic framework and health check tool are explored through three illustrative case studies, with two from Canada and one from the United Kingdom. Findings andOriginality/value: The performance of engineering and technology projects can be viewed through a systems perspective and being a function of six sub-systems that are: process, technology, resources, impact, knowledge and culture. The diagnostic framework that is developed through this research integrates these sub-systems to provide a comprehensive assessment methodology for projects, which is linked to existing best practice for project reviews, performance management and maturity models. The case studies provide managerial insights that are related to the diagnostic framework but crucially also position the approach in the context of industrial applications for construction engineering and technology management.Research limitations/implications: The case study approach includes two case studies from the construction and facilities development sector with the third case study from the research and technology sector. Further work is required to investigate the use of the diagnostic framework and health check tool in other sectors.Practical implications: The health check tool will be of practical benefit to new projects managers that require access to a robust and convenient project review methodology for assessing the status and health of a

  18. Robust and Accurate Image-Based Georeferencing Exploiting Relative Orientation Constraints

    Science.gov (United States)

    Cavegn, S.; Blaser, S.; Nebiker, S.; Haala, N.

    2018-05-01

    Urban environments with extended areas of poor GNSS coverage as well as indoor spaces that often rely on real-time SLAM algorithms for camera pose estimation require sophisticated georeferencing in order to fulfill our high requirements of a few centimeters for absolute 3D point measurement accuracies. Since we focus on image-based mobile mapping, we extended the structure-from-motion pipeline COLMAP with georeferencing capabilities by integrating exterior orientation parameters from direct sensor orientation or SLAM as well as ground control points into bundle adjustment. Furthermore, we exploit constraints for relative orientation parameters among all cameras in bundle adjustment, which leads to a significant robustness and accuracy increase especially by incorporating highly redundant multi-view image sequences. We evaluated our integrated georeferencing approach on two data sets, one captured outdoors by a vehicle-based multi-stereo mobile mapping system and the other captured indoors by a portable panoramic mobile mapping system. We obtained mean RMSE values for check point residuals between image-based georeferencing and tachymetry of 2 cm in an indoor area, and 3 cm in an urban environment where the measurement distances are a multiple compared to indoors. Moreover, in comparison to a solely image-based procedure, our integrated georeferencing approach showed a consistent accuracy increase by a factor of 2-3 at our outdoor test site. Due to pre-calibrated relative orientation parameters, images of all camera heads were oriented correctly in our challenging indoor environment. By performing self-calibration of relative orientation parameters among respective cameras of our vehicle-based mobile mapping system, remaining inaccuracies from suboptimal test field calibration were successfully compensated.

  19. ROBUST AND ACCURATE IMAGE-BASED GEOREFERENCING EXPLOITING RELATIVE ORIENTATION CONSTRAINTS

    Directory of Open Access Journals (Sweden)

    S. Cavegn

    2018-05-01

    Full Text Available Urban environments with extended areas of poor GNSS coverage as well as indoor spaces that often rely on real-time SLAM algorithms for camera pose estimation require sophisticated georeferencing in order to fulfill our high requirements of a few centimeters for absolute 3D point measurement accuracies. Since we focus on image-based mobile mapping, we extended the structure-from-motion pipeline COLMAP with georeferencing capabilities by integrating exterior orientation parameters from direct sensor orientation or SLAM as well as ground control points into bundle adjustment. Furthermore, we exploit constraints for relative orientation parameters among all cameras in bundle adjustment, which leads to a significant robustness and accuracy increase especially by incorporating highly redundant multi-view image sequences. We evaluated our integrated georeferencing approach on two data sets, one captured outdoors by a vehicle-based multi-stereo mobile mapping system and the other captured indoors by a portable panoramic mobile mapping system. We obtained mean RMSE values for check point residuals between image-based georeferencing and tachymetry of 2 cm in an indoor area, and 3 cm in an urban environment where the measurement distances are a multiple compared to indoors. Moreover, in comparison to a solely image-based procedure, our integrated georeferencing approach showed a consistent accuracy increase by a factor of 2–3 at our outdoor test site. Due to pre-calibrated relative orientation parameters, images of all camera heads were oriented correctly in our challenging indoor environment. By performing self-calibration of relative orientation parameters among respective cameras of our vehicle-based mobile mapping system, remaining inaccuracies from suboptimal test field calibration were successfully compensated.

  20. The MarCon Algorithm: A Systematic Market Approach to Distributed Constraint Problems

    National Research Council Canada - National Science Library

    Parunak, H. Van Dyke

    1998-01-01

    .... Each variable integrates this information from the constraints interested in it and provides feedback that enables the constraints to shrink their sets of assignments until they converge on a solution...

  1. Model Checking Markov Chains: Techniques and Tools

    NARCIS (Netherlands)

    Zapreev, I.S.

    2008-01-01

    This dissertation deals with four important aspects of model checking Markov chains: the development of efficient model-checking tools, the improvement of model-checking algorithms, the efficiency of the state-space reduction techniques, and the development of simulation-based model-checking

  2. Detection of Common Problems in Real-Time and Multicore Systems Using Model-Based Constraints

    Directory of Open Access Journals (Sweden)

    Raphaël Beamonte

    2016-01-01

    Full Text Available Multicore systems are complex in that multiple processes are running concurrently and can interfere with each other. Real-time systems add on top of that time constraints, making results invalid as soon as a deadline has been missed. Tracing is often the most reliable and accurate tool available to study and understand those systems. However, tracing requires that users understand the kernel events and their meaning. It is therefore not very accessible. Using modeling to generate source code or represent applications’ workflow is handy for developers and has emerged as part of the model-driven development methodology. In this paper, we propose a new approach to system analysis using model-based constraints, on top of userspace and kernel traces. We introduce the constraints representation and how traces can be used to follow the application’s workflow and check the constraints we set on the model. We then present a number of common problems that we encountered in real-time and multicore systems and describe how our model-based constraints could have helped to save time by automatically identifying the unwanted behavior.

  3. A short-term operating room surgery scheduling problem integrating multiple nurses roster constraints.

    Science.gov (United States)

    Xiang, Wei; Yin, Jiao; Lim, Gino

    2015-02-01

    Operating room (OR) surgery scheduling determines the individual surgery's operation start time and assigns the required resources to each surgery over a schedule period, considering several constraints related to a complete surgery flow and the multiple resources involved. This task plays a decisive role in providing timely treatments for the patients while balancing hospital resource utilization. The originality of the present study is to integrate the surgery scheduling problem with real-life nurse roster constraints such as their role, specialty, qualification and availability. This article proposes a mathematical model and an ant colony optimization (ACO) approach to efficiently solve such surgery scheduling problems. A modified ACO algorithm with a two-level ant graph model is developed to solve such combinatorial optimization problems because of its computational complexity. The outer ant graph represents surgeries, while the inner graph is a dynamic resource graph. Three types of pheromones, i.e. sequence-related, surgery-related, and resource-related pheromone, fitting for a two-level model are defined. The iteration-best and feasible update strategy and local pheromone update rules are adopted to emphasize the information related to the good solution in makespan, and the balanced utilization of resources as well. The performance of the proposed ACO algorithm is then evaluated using the test cases from (1) the published literature data with complete nurse roster constraints, and 2) the real data collected from a hospital in China. The scheduling results using the proposed ACO approach are compared with the test case from both the literature and the real life hospital scheduling. Comparison results with the literature shows that the proposed ACO approach has (1) an 1.5-h reduction in end time; (2) a reduction in variation of resources' working time, i.e. 25% for ORs, 50% for nurses in shift 1 and 86% for nurses in shift 2; (3) an 0.25h reduction in

  4. Embedding Temporal Constraints For Coordinated Execution in Habitat Automation

    Science.gov (United States)

    Morris, Paul; Schwabacher, Mark; Dalal, Michael; Fry, Charles

    2013-01-01

    Future NASA plans call for long-duration deep space missions with human crews. Because of light-time delay and other considerations, increased autonomy will be needed. This will necessitate integration of tools in such areas as anomaly detection, diagnosis, planning, and execution. In this paper we investigate an approach that integrates planning and execution by embedding planner-derived temporal constraints in an execution procedure. To avoid the need for propagation, we convert the temporal constraints to dispatchable form. We handle some uncertainty in the durations without it affecting the execution; larger variations may cause activities to be skipped.

  5. Model Checking Structured Infinite Markov Chains

    NARCIS (Netherlands)

    Remke, Anne Katharina Ingrid

    2008-01-01

    In the past probabilistic model checking hast mostly been restricted to finite state models. This thesis explores the possibilities of model checking with continuous stochastic logic (CSL) on infinite-state Markov chains. We present an in-depth treatment of model checking algorithms for two special

  6. Model checking software for phylogenetic trees using distribution and database methods

    Directory of Open Access Journals (Sweden)

    Requeno José Ignacio

    2013-12-01

    Full Text Available Model checking, a generic and formal paradigm stemming from computer science based on temporal logics, has been proposed for the study of biological properties that emerge from the labeling of the states defined over the phylogenetic tree. This strategy allows us to use generic software tools already present in the industry. However, the performance of traditional model checking is penalized when scaling the system for large phylogenies. To this end, two strategies are presented here. The first one consists of partitioning the phylogenetic tree into a set of subgraphs each one representing a subproblem to be verified so as to speed up the computation time and distribute the memory consumption. The second strategy is based on uncoupling the information associated to each state of the phylogenetic tree (mainly, the DNA sequence and exporting it to an external tool for the management of large information systems. The integration of all these approaches outperforms the results of monolithic model checking and helps us to execute the verification of properties in a real phylogenetic tree.

  7. A global analysis of NMR distance constraints from the PDB

    International Nuclear Information System (INIS)

    Vranken, Wim

    2007-01-01

    Information obtained from Nuclear Magnetic Resonance (NMR) experiments is encoded as a set of constraint lists when calculating three-dimensional structures for a protein. With the amount of constraint data from the world wide Protein Data Bank (wwPDB) that is now available, it is possible to do a global, large-scale analysis using only information from the constraints, without taking the coordinate information into account. This article describes such an analysis of distance constraints from NOE data based on a set of 1834 NMR PDB entries containing 1909 protein chains. In order to best represent the quality and extent of the data that is currently deposited at the wwPDB, only the original data as deposited by the authors was used, and no attempt was made to 'clean up' and further interpret this information. Because the constraint lists provide a single set of data, and not an ensemble of structural solutions, they are easier to analyse and provide a reduced form of structural information that is relevant for NMR analysis only. The online resource resulting from this analysis makes it possible to check, for example, how often a particular contact occurs when assigning NOESY spectra, or to find out whether a particular sequence fragment is likely to be difficult to assign. In this respect it formalises information that scientists with experience in spectrum analysis are aware of but cannot necessarily quantify. The analysis described here illustrates the importance of depositing constraints (and all other possible NMR derived information) along with the structure coordinates, as this type of information can greatly assist the NMR community

  8. Balancing Structural and Temporal Constraints in Multitasking Contexts

    OpenAIRE

    Salvucci, Dario D.; Kujala, Tuomo

    2016-01-01

    Recent research has shown that when people multitask, both the subtask structure and the temporal constraints of the component tasks strongly influence people’s task-switching behavior. In this paper, we propose an integrated theoretical account and associated computational model that aims to quantify how people balance structural and temporal constraints in everyday multitasking. We validate the theory using data from an empirical study in which drivers performed a vi...

  9. Including Overweight or Obese Students in Physical Education: A Social Ecological Constraint Model

    Science.gov (United States)

    Li, Weidong; Rukavina, Paul

    2012-01-01

    In this review, we propose a social ecological constraint model to study inclusion of overweight or obese students in physical education by integrating key concepts and assumptions from ecological constraint theory in motor development and social ecological models in health promotion and behavior. The social ecological constraint model proposes…

  10. Software tool for physics chart checks.

    Science.gov (United States)

    Li, H Harold; Wu, Yu; Yang, Deshan; Mutic, Sasa

    2014-01-01

    Physics chart check has long been a central quality assurance (QC) measure in radiation oncology. The purpose of this work is to describe a software tool that aims to accomplish simplification, standardization, automation, and forced functions in the process. Nationally recognized guidelines, including American College of Radiology and American Society for Radiation Oncology guidelines and technical standards, and the American Association of Physicists in Medicine Task Group reports were identified, studied, and summarized. Meanwhile, the reported events related to physics chart check service were analyzed using an event reporting and learning system. A number of shortfalls in the chart check process were identified. To address these problems, a software tool was designed and developed under Microsoft. Net in C# to hardwire as many components as possible at each stage of the process. The software consists of the following 4 independent modules: (1) chart check management; (2) pretreatment and during treatment chart check assistant; (3) posttreatment chart check assistant; and (4) quarterly peer-review management. The users were a large group of physicists in the author's radiation oncology clinic. During over 1 year of use the tool has proven very helpful in chart checking management, communication, documentation, and maintaining consistency. The software tool presented in this work aims to assist physicists at each stage of the physics chart check process. The software tool is potentially useful for any radiation oncology clinics that are either in the process of pursuing or maintaining the American College of Radiology accreditation.

  11. 25 CFR 115.704 - May we accept for deposit into a trust account retirement checks/payments or pension fund checks...

    Science.gov (United States)

    2010-04-01

    ... checks/payments or pension fund checks/payments even though those funds are not specified in § 115.702... May we accept for deposit into a trust account retirement checks/payments or pension fund checks.../payments or pension fund checks/payments or any funds from sources that are not identified in the table in...

  12. Model checking as an aid to procedure design

    International Nuclear Information System (INIS)

    Zhang, Wenhu

    2001-01-01

    The OECD Halden Reactor Project has been actively working on computer assisted operating procedures for many years. The objective of the research has been to provide computerised assistance for procedure design, verification and validation, implementation and maintenance. For the verification purpose, the application of formal methods has been considered in several reports. The recent formal verification activity conducted at the Halden Project is based on using model checking to the verification of procedures. This report presents verification approaches based on different model checking techniques and tools for the formalization and verification of operating procedures. Possible problems and relative merits of the different approaches are discussed. A case study of one of the approaches is presented to show the practical application of formal verification. Application of formal verification in the traditional procedure design process can reduce the human resources involved in reviews and simulations, and hence reduce the cost of verification and validation. A discussion of the integration of the formal verification with the traditional procedure design process is given at the end of this report. (Author)

  13. [Pre-verbality in focusing and the need for self check. An attempt at "focusing check"].

    Science.gov (United States)

    Masui, T; Ikemi, A; Murayama, S

    1983-06-01

    Though the Focusing process is not entirely non-verbal, in Focusing, careful attention is paid by the Focuser and the Listener to the pre-verbal experiential process. In other words, Focusing involves attending to the felt sense that is not easily expressed in words immediately. Hence, during the process of learning to Focus, the Focusing teacher attempts to communicate the experiences of Focusing to the student which are not easily done by words. Due to such difficulties, the Focusing student may (and quite frequently does) mistake the experiential process in Focusing with other processes. Often, the felt sense can be confused with other phenomena such as "autogenic discharge". Also the Focuser may not stay with the felt sense and drift into "free association" or frequently, certain processes in "meditation" can be confused with Focusing. Therefore, there is a need for a "check" by which the Focusing student can confirm the Focusing experience for himself. For the Focusing student, such a "check" serves not only to confirm the Focusing process, but also an aid to learning Focusing. We will report here a "Focusing Check" which we developed by translating Eugene Gendlin's "Focusing Check" and making several modifications in it so that it will be more understandable to the Japanese. Along with the "Focusing Check" we developed, the authors discuss the need for such a check.

  14. [Infection prevention check-in and infection prevention check-out to prevent nosocomial infections].

    Science.gov (United States)

    Kramer, A; Schilling, M; Heidecke, C D

    2010-02-01

    A precondition for the success of the prevention of SSI is the complete realisation of the proven anti-infective measures in form of the multi-barrier strategy or the so-called bundles. In daily practice it is important to follow the fixed instructions, i. e., to ensure a high compliance. In much the same way as an airline pilot or co-pilot must examine whether all instruments are functioning before each take-off, a comparable procedure should be developed as a pre-operative control for the observance of all -defined measures by the responsible surgeon and for the post-operative supervision by the patient. For the control of the observance of the defined pre-operative prevention measures, a check list with 12 items was developed, named the "infection prevention check-in". The check list is authorised by the responsible surgeon be-fore each operation. For the surveillance of the general hygiene in the post-operative period the "infection prevention check-out" with 14 items was developed. Thereby the patient is able to evaluate the staff's compliance with the hygienic measures at the time of dismissal. With the introduction of the check-lists a simple means is given to involve both the team of the surgeons and the ward staff, together with the patient, into the infection prophylaxis even more effectively. In order to assess the success of those measures, the influence on the rate of SSI is to be determined prospectively. Georg Thieme Verlag Stuttgart, New York.

  15. QuickChecking static analysis properties

    DEFF Research Database (Denmark)

    Midtgaard, Jan; Møller, Anders

    2017-01-01

    A static analysis can check programs for potential errors. A natural question that arises is therefore: who checks the checker? Researchers have given this question varying attention, ranging from basic testing techniques, informal monotonicity arguments, thorough pen-and-paper soundness proofs....... Moreover, we offer a number of generic, type-safe combinators to check transfer functions and operators on lattices, to help ensure that these are, eg, monotone, strict, or invariant. We substantiate our claims by quickchecking a type analysis for the Lua programming language....

  16. Neural nets for the plausibility check of measured values in the integrated measurement and information system for the surveillance of environmental radioactivity (IMIS)

    International Nuclear Information System (INIS)

    Haase, G.

    2003-01-01

    Neural nets to the plausibility check of measured values in the ''integrated measurement and information system for the surveillance of environmental radioactivity, IMIS'' is a research project supported by the Federal Minister for the Environment, Nature Conservation and Nuclear Safety. A goal of this project was the automatic recognition of implausible measured values in the data base ORACLE, which measured values from surveillance of environmental radioactivity of most diverse environmental media contained. The conversion of this project [ 1 ] was realized by institut of logic, complexity and deduction systems of the university Karlsruhe under the direction of Professor Dr. Menzel, Dr. Martin Riedmueller and Martin Lauer. (orig.)

  17. 25 CFR 11.421 - Bad checks.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Bad checks. 11.421 Section 11.421 Indians BUREAU OF... Criminal Offenses § 11.421 Bad checks. (a) A person who issues or passes a check or similar sight order for..., and the issuer failed to make good within 10 days after receiving notice of that refusal. ...

  18. QuickChecking Static Analysis Properties

    DEFF Research Database (Denmark)

    Midtgaard, Jan; Møller, Anders

    2015-01-01

    A static analysis can check programs for potential errors. A natural question that arises is therefore: who checks the checker? Researchers have given this question varying attention, ranging from basic testing techniques, informal monotonicity arguments, thorough pen-and-paper soundness proofs...... of a lattice. Moreover, we offer a number of generic, type-safe combinators to check transfer functions and operators on lattices, to help ensure that these are, e.g., monotone, strict, or invariant. We substantiate our claims by quickchecking a type analysis for the Lua programming language...

  19. Diagnostic information in compliance checking

    NARCIS (Netherlands)

    Ramezani Taghiabadi, E.; Fahland, D.; Aalst, van der W.M.P.

    2012-01-01

    Compliance checking is gaining importance as today's organizations need to show that operational processes are executed in a controlled manner while satisfying predefined (legal) requirements. Deviations may be costly and expose the organization to severe risks. Compliance checking is of growing

  20. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  1. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  2. Implementing Check in/Check out for Students with Intellectual Disability in Self-Contained Classrooms

    Science.gov (United States)

    Boden, Lauren J.; Ennis, Robin P.; Jolivette, Kristine

    2012-01-01

    Check in/check out (CICO) is a secondary-tier intervention implemented within the framework of schoolwide positive behavior interventions and supports (SWPBIS) that uses school-based contingencies to encourage positive behavior. CICO is a five-step cycle which uses daily progress report cards (DPR) to monitor progress toward schoolwide or…

  3. Biochemia Medica has started using the CrossCheck plagiarism detection software powered by iThenticate

    Science.gov (United States)

    Šupak-Smolčić, Vesna; Šimundić, Ana-Maria

    2013-01-01

    In February 2013, Biochemia Medica has joined CrossRef, which enabled us to implement CrossCheck plagiarism detection service. Therefore, all manuscript submitted to Biochemia Medica are now first assigned to Research integrity editor (RIE), before sending the manuscript for peer-review. RIE submits the text to CrossCheck analysis and is responsible for reviewing the results of the text similarity analysis. Based on the CrossCheck analysis results, RIE subsequently provides a recommendation to the Editor-in-chief (EIC) on whether the manuscript should be forwarded to peer-review, corrected for suspected parts prior to peer-review or immediately rejected. Final decision on the manuscript is, however, with the EIC. We hope that our new policy and manuscript processing algorithm will help us to further increase the overall quality of our Journal. PMID:23894858

  4. Logic-based methods for optimization combining optimization and constraint satisfaction

    CERN Document Server

    Hooker, John

    2011-01-01

    A pioneering look at the fundamental role of logic in optimization and constraint satisfaction While recent efforts to combine optimization and constraint satisfaction have received considerable attention, little has been said about using logic in optimization as the key to unifying the two fields. Logic-Based Methods for Optimization develops for the first time a comprehensive conceptual framework for integrating optimization and constraint satisfaction, then goes a step further and shows how extending logical inference to optimization allows for more powerful as well as flexible

  5. A planar PDMS micropump using in-contact minimized-leakage check valves

    International Nuclear Information System (INIS)

    Ni, Junhui; Li, Beizhi; Huang, Fengliang; Wang, Bin; Lin, Qiao

    2010-01-01

    We present a micropump with a simple planar design featuring compliant in-contact check valves in a single layer, which allows for a simple structure and easy system integration. The micropump, based on poly(dimethylsiloxane) (PDMS), primarily consists of a pneumatically driven thin membrane, a pump chamber, and two in-plane check valves. The pair of check valves is based on an in-contact flap–stopper configuration and is able to minimize leakage flow, greatly enhancing the reliability and performance of the micropump. Systematic experimental characterization of the micropump has been performed in terms of the frequency response of the pumping flow rate with respect to factors including device geometry (e.g. chamber height) and operating parameters (e.g. pneumatic driving pressure and backpressure). The results demonstrate that this micropump is capable of reliably generating a maximum flow rate of 41 µL min −1 and operating against a high backpressure of up to 25 kPa. In addition, a lumped-parameter theoretical model for the planar micropump is also developed for accurate analysis of the device behavior. These results demonstrate the capability of this micropump for diverse applications in lab-on-a-chip systems.

  6. Compositional and Quantitative Model Checking

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2010-01-01

    This paper gives a survey of a composition model checking methodology and its succesfull instantiation to the model checking of networks of finite-state, timed, hybrid and probabilistic systems with respect; to suitable quantitative versions of the modal mu-calculus [Koz82]. The method is based...

  7. Constraint Soup - Interpreting Natural Language Architectural Constraints

    NARCIS (Netherlands)

    Niemeijer, R.A.; Vries, de B.; Beetz, J.

    2010-01-01

    To facilitate mass customization in the building industry, an automated method is needed to check the validity of user-created designs. This check requires that numerous complex building codes and regulations, as well as architects’ demands are formalized and captured by non-programming domain

  8. Goat production check list

    DEFF Research Database (Denmark)

    Henriksen, Jørgen; Nielsen, Mette Benedicte Olaf; Madsen, Jørgen

    2009-01-01

    This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production.......This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production....

  9. 12 CFR Appendix A to Part 229 - Routing Number Guide to Next-Day Availability Checks and Local Checks

    Science.gov (United States)

    2010-01-01

    ... Checks and Local Checks A Appendix A to Part 229 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM AVAILABILITY OF FUNDS AND COLLECTION OF CHECKS... Association. The routing number takes two forms: a fractional form and a nine-digit form. A paying bank...

  10. Model Checking Real-Time Systems

    DEFF Research Database (Denmark)

    Bouyer, Patricia; Fahrenberg, Uli; Larsen, Kim Guldstrand

    2018-01-01

    This chapter surveys timed automata as a formalism for model checking real-time systems. We begin with introducing the model, as an extension of finite-state automata with real-valued variables for measuring time. We then present the main model-checking results in this framework, and give a hint...

  11. Can i just check...? Effects of edit check questions on measurement error and survey estimates

    NARCIS (Netherlands)

    Lugtig, Peter; Jäckle, Annette

    2014-01-01

    Household income is difficult to measure, since it requires the collection of information about all potential income sources for each member of a household.Weassess the effects of two types of edit check questions on measurement error and survey estimates: within-wave edit checks use responses to

  12. The Integration of Environmental Constraints into Tidal Array Optimisation

    Science.gov (United States)

    du Feu, Roan; de Trafford, Sebastian; Culley, Dave; Hill, Jon; Funke, Simon W.; Kramer, Stephan C.; Piggott, Matthew D.

    2015-04-01

    It has been estimated by The Carbon Trust that the marine renewable energy sector, of which tidal stream turbines are projected to play a large part, could produce 20% of the UK's present electricity requirements. This has lead to the important question of how this technology can be deployed in an economically and environmentally friendly manner. Work is currently under way to understand how the tidal turbines that constitute an array can be arranged to maximise the total power generated by that array. The work presented here continues this through the inclusion of environmental constraints. The benefits of the renewable energy sector to our environment at large are not in question. However, the question remains as to the effects this burgeoning sector will have on local environments, and how to mitigate these effects if they are detrimental. For example, the presence of tidal arrays can, through altering current velocity, drastically change the sediment transport into and out of an area along with re-suspending existing sediment. This can have the effects of scouring or submerging habitat, mobilising contaminants within the existing sediment, reducing food supply and altering the turbidity of the water. All of which greatly impact upon any fauna in the affected region. This work pays particular attention to the destruction of habitat of benthic fauna, as this is quantifiable as a direct result of change in the current speed; a primary factor in determining sediment accumulation on the sea floor. OpenTidalFarm is an open source tool that maximises the power generated by an array through repositioning the turbines within it. It currently uses a 2D shallow water model with turbines represented as bump functions of increased friction. The functional of interest, power extracted by the array, is evaluated from the flow field which is calculated at each iteration using a finite element method. A gradient-based local optimisation is then used through solving the

  13. An integrated production-inventory model for the singlevendor two-buyer problem with partial backorder, stochastic demand, and service level constraints

    Science.gov (United States)

    Arfawi Kurdhi, Nughthoh; Adi Diwiryo, Toray; Sutanto

    2016-02-01

    This paper presents an integrated single-vendor two-buyer production-inventory model with stochastic demand and service level constraints. Shortage is permitted in the model, and partial backordered partial lost sale. The lead time demand is assumed follows a normal distribution and the lead time can be reduced by adding crashing cost. The lead time and ordering cost reductions are interdependent with logaritmic function relationship. A service level constraint policy corresponding to each buyer is considered in the model in order to limit the level of inventory shortages. The purpose of this research is to minimize joint total cost inventory model by finding the optimal order quantity, safety stock, lead time, and the number of lots delivered in one production run. The optimal production-inventory policy gained by the Lagrange method is shaped to account for the service level restrictions. Finally, a numerical example and effects of the key parameters are performed to illustrate the results of the proposed model.

  14. Model-Checking Discrete Duration Calculus

    DEFF Research Database (Denmark)

    Hansen, Michael Reichhardt

    1994-01-01

    can do model-checking. The subset we consider is expressive enough to formalize the requirements to the gas burner system given by A.P. Ravn (1993); but only for a discrete time domain. Model-checking is done by reducing the correctness problem ℳ|=𝒟 to the inclusion problem of regular...

  15. Path-integral approach to the dynamics of a random chain with rigid constraints

    International Nuclear Information System (INIS)

    Ferrari, Franco; Paturej, Jaroslaw; Vilgis, Thomas A.

    2008-01-01

    In this work the dynamics of a chain consisting of a set of beads attached to the ends of segments of fixed lengths is investigated. The chain fluctuates at constant temperature in a viscous medium. For simplicity, all interactions among the beads have been switched off and the number of spatial dimensions has been limited to two. In the limit in which the chain becomes a continuous system, its behavior may be described by a path integral, in which the rigid constraints coming from the infinitesimally small segments are imposed by means of a functional δ function. In this way a model of the dynamics of the chain is obtained, which closely resembles a two-dimensional nonlinear σ model. The partition function of this generalized nonlinear σ model is computed explicitly for a ring-shaped chain in the semiclassical approximation. The behavior of the chain at both long and short scales of time and distances is investigated. The connection between the generalized nonlinear σ model presented here and the Rouse model is discussed

  16. Brain evolution and development: adaptation, allometry and constraint

    Science.gov (United States)

    Barton, Robert A.

    2016-01-01

    Phenotypic traits are products of two processes: evolution and development. But how do these processes combine to produce integrated phenotypes? Comparative studies identify consistent patterns of covariation, or allometries, between brain and body size, and between brain components, indicating the presence of significant constraints limiting independent evolution of separate parts. These constraints are poorly understood, but in principle could be either developmental or functional. The developmental constraints hypothesis suggests that individual components (brain and body size, or individual brain components) tend to evolve together because natural selection operates on relatively simple developmental mechanisms that affect the growth of all parts in a concerted manner. The functional constraints hypothesis suggests that correlated change reflects the action of selection on distributed functional systems connecting the different sub-components, predicting more complex patterns of mosaic change at the level of the functional systems and more complex genetic and developmental mechanisms. These hypotheses are not mutually exclusive but make different predictions. We review recent genetic and neurodevelopmental evidence, concluding that functional rather than developmental constraints are the main cause of the observed patterns. PMID:27629025

  17. 31 CFR 248.6 - Recovery of original check.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Recovery of original check. 248.6... § 248.6 Recovery of original check. (a) If the claimant recovers an original check after he has... or agency concerned regarding the negotiability of such original check. (b) In the event the...

  18. Systems biology of bacterial nitrogen fixation: High-throughput technology and its integrative description with constraint-based modeling

    Directory of Open Access Journals (Sweden)

    Resendis-Antonio Osbaldo

    2011-07-01

    Full Text Available Abstract Background Bacterial nitrogen fixation is the biological process by which atmospheric nitrogen is uptaken by bacteroids located in plant root nodules and converted into ammonium through the enzymatic activity of nitrogenase. In practice, this biological process serves as a natural form of fertilization and its optimization has significant implications in sustainable agricultural programs. Currently, the advent of high-throughput technology supplies with valuable data that contribute to understanding the metabolic activity during bacterial nitrogen fixation. This undertaking is not trivial, and the development of computational methods useful in accomplishing an integrative, descriptive and predictive framework is a crucial issue to decoding the principles that regulated the metabolic activity of this biological process. Results In this work we present a systems biology description of the metabolic activity in bacterial nitrogen fixation. This was accomplished by an integrative analysis involving high-throughput data and constraint-based modeling to characterize the metabolic activity in Rhizobium etli bacteroids located at the root nodules of Phaseolus vulgaris (bean plant. Proteome and transcriptome technologies led us to identify 415 proteins and 689 up-regulated genes that orchestrate this biological process. Taking into account these data, we: 1 extended the metabolic reconstruction reported for R. etli; 2 simulated the metabolic activity during symbiotic nitrogen fixation; and 3 evaluated the in silico results in terms of bacteria phenotype. Notably, constraint-based modeling simulated nitrogen fixation activity in such a way that 76.83% of the enzymes and 69.48% of the genes were experimentally justified. Finally, to further assess the predictive scope of the computational model, gene deletion analysis was carried out on nine metabolic enzymes. Our model concluded that an altered metabolic activity on these enzymes induced

  19. CMM Interim Check (U)

    Energy Technology Data Exchange (ETDEWEB)

    Montano, Joshua Daniel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-03-23

    Coordinate Measuring Machines (CMM) are widely used in industry, throughout the Nuclear Weapons Complex and at Los Alamos National Laboratory (LANL) to verify part conformance to design definition. Calibration cycles for CMMs at LANL are predominantly one year in length. Unfortunately, several nonconformance reports have been generated to document the discovery of a certified machine found out of tolerance during a calibration closeout. In an effort to reduce risk to product quality two solutions were proposed – shorten the calibration cycle which could be costly, or perform an interim check to monitor the machine’s performance between cycles. The CMM interim check discussed makes use of Renishaw’s Machine Checking Gauge. This off-the-shelf product simulates a large sphere within a CMM’s measurement volume and allows for error estimation. Data was gathered, analyzed, and simulated from seven machines in seventeen different configurations to create statistical process control run charts for on-the-floor monitoring.

  20. Constraints and spandrels of interareal connectomes

    Science.gov (United States)

    Rubinov, Mikail

    2016-12-01

    Interareal connectomes are whole-brain wiring diagrams of white-matter pathways. Recent studies have identified modules, hubs, module hierarchies and rich clubs as structural hallmarks of these wiring diagrams. An influential current theory postulates that connectome modules are adequately explained by evolutionary pressures for wiring economy, but that the other hallmarks are not explained by such pressures and are therefore less trivial. Here, we use constraint network models to test these postulates in current gold-standard vertebrate and invertebrate interareal-connectome reconstructions. We show that empirical wiring-cost constraints inadequately explain connectome module organization, and that simultaneous module and hub constraints induce the structural byproducts of hierarchies and rich clubs. These byproducts, known as spandrels in evolutionary biology, include the structural substrate of the default-mode network. Our results imply that currently standard connectome characterizations are based on circular analyses or double dipping, and we emphasize an integrative approach to future connectome analyses for avoiding such pitfalls.

  1. Environmental Reality Check.

    Science.gov (United States)

    Manicone, Santo

    2001-01-01

    Discusses the importance of educational facilities conducting "reality check" self-audits to uncover the real truth behind underlying environmental problems. An environmental compliance multimedia checklist is included. (GR)

  2. 7 CFR 1944.540 - Requesting TSA checks.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 13 2010-01-01 2009-01-01 true Requesting TSA checks. 1944.540 Section 1944.540... TSA checks. (a) The initial TSA check may cover the applicant's needs for the first calendar month. If... the next whole month. (b) The initial advance of TSA grant funds may not be requested simultaneously...

  3. Variable Step Integration Coupled with the Method of Characteristics Solution for Water-Hammer Analysis, A Case Study

    Science.gov (United States)

    Turpin, Jason B.

    2004-01-01

    One-dimensional water-hammer modeling involves the solution of two coupled non-linear hyperbolic partial differential equations (PDEs). These equations result from applying the principles of conservation of mass and momentum to flow through a pipe, and usually the assumption that the speed at which pressure waves propagate through the pipe is constant. In order to solve these equations for the interested quantities (i.e. pressures and flow rates), they must first be converted to a system of ordinary differential equations (ODEs) by either approximating the spatial derivative terms with numerical techniques or using the Method of Characteristics (MOC). The MOC approach is ideal in that no numerical approximation errors are introduced in converting the original system of PDEs into an equivalent system of ODEs. Unfortunately this resulting system of ODEs is bound by a time step constraint so that when integrating the equations the solution can only be obtained at fixed time intervals. If the fluid system to be modeled also contains dynamic components (i.e. components that are best modeled by a system of ODEs), it may be necessary to take extremely small time steps during certain points of the model simulation in order to achieve stability and/or accuracy in the solution. Coupled together, the fixed time step constraint invoked by the MOC, and the occasional need for extremely small time steps in order to obtain stability and/or accuracy, can greatly increase simulation run times. As one solution to this problem, a method for combining variable step integration (VSI) algorithms with the MOC was developed for modeling water-hammer in systems with highly dynamic components. A case study is presented in which reverse flow through a dual-flapper check valve introduces a water-hammer event. The predicted pressure responses upstream of the check-valve are compared with test data.

  4. 40 CFR 86.328-79 - Leak checks.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Leak checks. 86.328-79 Section 86.328... Gasoline-Fueled and Diesel-Fueled Heavy-Duty Engines; Gaseous Exhaust Test Procedures § 86.328-79 Leak checks. (a) Vacuum side leak check. (1) Any location within the analysis system where a vacuum leak could...

  5. Constraint processing in our extensible language for cooperative imaging system

    Science.gov (United States)

    Aoki, Minoru; Murao, Yo; Enomoto, Hajime

    1996-02-01

    The extensible WELL (Window-based elaboration language) has been developed using the concept of common platform, where both client and server can communicate with each other with support from a communication manager. This extensible language is based on an object oriented design by introducing constraint processing. Any kind of services including imaging in the extensible language is controlled by the constraints. Interactive functions between client and server are extended by introducing agent functions including a request-respond relation. Necessary service integrations are satisfied with some cooperative processes using constraints. Constraints are treated similarly to data, because the system should have flexibilities in the execution of many kinds of services. The similar control process is defined by using intentional logic. There are two kinds of constraints, temporal and modal constraints. Rendering the constraints, the predicate format as the relation between attribute values can be a warrant for entities' validity as data. As an imaging example, a processing procedure of interaction between multiple objects is shown as an image application for the extensible system. This paper describes how the procedure proceeds in the system, and that how the constraints work for generating moving pictures.

  6. Swing check valve

    International Nuclear Information System (INIS)

    Eminger, H.E.

    1977-01-01

    A swing check valve which includes a valve body having an inlet and outlet is described. A recess in the valve body designed to hold a seal ring and a check valve disc swingable between open and closed positions. The disc is supported by a high strength wire secured at one end in a support spacer pinned through bearing blocks fixed to the valve body and at its other end in a groove formed on the outer peripheral surface of the disc. The parts are designed and chosen such to provide a lightweight valve disc which is held open by minimum velocity of fluid flowing through the valve which thus reduces oscillations and accompanying wear of bearings supporting the valve operating parts. (Auth.)

  7. Wind turbine control with constraint handling: a model predictive control approach

    DEFF Research Database (Denmark)

    Henriksen, Lars Christian; Hansen, Morten Hartvig; Poulsen, Niels Kjølstad

    2012-01-01

    on model predictive control, a control method well suited for constraint handling. The performance of the presented controller during an extreme operating gust is compared to that of a proportional-integral controller with integrator anti-windup. Furthermore, the presented controller-s capability...

  8. Constraint-based scheduling applying constraint programming to scheduling problems

    CERN Document Server

    Baptiste, Philippe; Nuijten, Wim

    2001-01-01

    Constraint Programming is a problem-solving paradigm that establishes a clear distinction between two pivotal aspects of a problem: (1) a precise definition of the constraints that define the problem to be solved and (2) the algorithms and heuristics enabling the selection of decisions to solve the problem. It is because of these capabilities that Constraint Programming is increasingly being employed as a problem-solving tool to solve scheduling problems. Hence the development of Constraint-Based Scheduling as a field of study. The aim of this book is to provide an overview of the most widely used Constraint-Based Scheduling techniques. Following the principles of Constraint Programming, the book consists of three distinct parts: The first chapter introduces the basic principles of Constraint Programming and provides a model of the constraints that are the most often encountered in scheduling problems. Chapters 2, 3, 4, and 5 are focused on the propagation of resource constraints, which usually are responsibl...

  9. Plant experience with check valves in passive systems

    Energy Technology Data Exchange (ETDEWEB)

    Pahladsingh, R R [GKN Joint Nuclear Power Plant, Dodewaard (Netherlands)

    1996-12-01

    In the design of the advanced nuclear reactors there is a tendency to introduce more passive safety systems. The 25 year old design of the GKN nuclear reactor is different from the present BWR reactors because of some special features, such as the Natural Circulation - and the Passive Isolation Condenser system. When reviewing the design, one can conclude that the plant has 25 years of experience with check valves in passive systems and as passive components in systems. The result of this experience has been modeled in a plant-specific ``living PSA`` for the plant. A data-analysis has been performed on components which are related to the safety systems in the plant. As part of this study also the check valves have been taken in consideration. At GKN, the check valves have shown to be reliable components in the systems and no catastrophic failures have been experienced during the 25 years of operation. Especially the Isolation Condenser with its operation experience can contribute substantially to the insight of check valves in stand-by position at reactor pressure and operating by gravity under different pressure conditions. With the introduction of several passive systems in the SBWR-600 design, such as the Isolation Condensers, Gravity Driven Cooling, and Suppression Pool Cooling System, the issue of reliability of check valves in these systems is actual. Some critical aspects for study in connection with check valves are: What is the reliability of a check valve in a system at reactor pressure, to open on demand; what is the reliability of a check valve in a system at low pressure (gravity), to open on demand; what is the reliability of a check valve to open/close when the stand-by check wave is at zero differential pressure. The plant experience with check valves in a few essential safety systems is described and a brief introduction will be made about the application of check valves in the design of the new generation reactors is given. (author). 6 figs, 1 tab.

  10. DEPUTY: analysing architectural structures and checking style

    International Nuclear Information System (INIS)

    Gorshkov, D.; Kochelev, S.; Kotegov, S.; Pavlov, I.; Pravilnikov, V.; Wellisch, J.P.

    2001-01-01

    The DepUty (dependencies utility) can be classified as a project and process management tool. The main goal of DepUty is to assist by means of source code analysis and graphical representation using UML, in understanding dependencies of sub-systems and packages in CMS Object Oriented software, to understand architectural structure, and to schedule code release in modularised integration. It also allows a new-comer to more easily understand the global structure of CMS software, and to void circular dependencies up-front or re-factor the code, in case it was already too close to the edge of non-maintainability. The authors will discuss the various views DepUty provides to analyse package dependencies, and illustrate both the metrics and style checking facilities it provides

  11. Automatization and familiarity in repeated checking

    NARCIS (Netherlands)

    Dek, E.C.P.|info:eu-repo/dai/nl/313959552; van den Hout, M.A.|info:eu-repo/dai/nl/070445354; Giele, C.L.|info:eu-repo/dai/nl/318754460; Engelhard, I.M.|info:eu-repo/dai/nl/239681533

    2015-01-01

    Repetitive, compulsive-like checking of an object leads to reductions in memory confidence, vividness, and detail. Experimental research suggests that this is caused by increased familiarity with perceptual characteristics of the stimulus and automatization of the checking procedure (Dek, van den

  12. Building a Library for Microelectronics Verification with Topological Constraints

    Science.gov (United States)

    2017-03-01

    with topological constraints. Circuits at the second level of abstraction are selected from prior work on simulated reverse- engineered hardware...entering DoD systems. The Defense Advanced Research Project Agency (DARPA) Trusted Integrated Circuits (TRUST) [12-14] program was introduced to focus on...serious- risks-from-counterfeit-electronic-parts/ 4. “Trusted Integrated Circuits (TRUST)”. [Online]. DARPA Microsystems Technology Office. Available

  13. ENDF-UTILITY-CODES, codes to check and standardize data in the Evaluated Nuclear Data File (ENDF)

    International Nuclear Information System (INIS)

    Dunford, Charles L.

    2007-01-01

    1 - Description of program or function: The ENDF Utility Codes include 9 codes to check and standardize data in the Evaluated Nuclear Data File (ENDF). Four programs of this release, GETMAT, LISTEF, PLOTEF and SETMDC are no more maintained since release 6.13. The suite of ENDF utility codes includes: - CHECKR (version 7.01) is a program for checking that an evaluated data file conforms to the ENDF format. - FIZCON (version 7.02) is a program for checking that an evaluated data file has valid data and conforms to recommended procedures. - GETMAT (version 6.13) is designed to retrieve one or more materials from an ENDF formatted data file. The output will contain only the selected materials. - INTER (version 7.01) calculates thermal cross sections, g-factors, resonance integrals, fission spectrum averaged cross sections and 14.0 MeV (or other energy) cross sections for major reactions in an ENDF-6 or ENDF-5 format data file. - LISTEF (version 6.13) is designed to produce summary and annotated listings of a data file in either ENDF-6 or ENDF-5 format. - PLOTEF (version 6.13) is designed to produce graphical displays of a data file in either ENDF-5 or ENDF-6 format. The form of graphical output depends on the graphical devices available at the installation where this code will be used. - PSYCHE (version 7.02) is a program for checking the physics content of an evaluated data file. It can recognise the difference between ENDF-5 or ENDF-6 formats and performs its tests accordingly. - SETMDC (version 6.13) is a utility program that converts the source decks of programs to different computers (DOS, UNIX, LINUX, VMS, Windows). - STANEF (version 7.01) performs bookkeeping operations on a data file containing one or more material evaluations in ENDF format. The version 7.02 of the ENDF Utility Codes corrects all bugs reported to NNDC as of April 1, 2005 and supersedes all previous releases. Three codes CHECKR, STANEF, and INTER were actually ported from the 7.01 release

  14. Diagnostic information in temporal compliance checking

    NARCIS (Netherlands)

    Ramezani Taghiabadi, E.; Fahland, D.; Dongen, van B.F.; Aalst, van der W.M.P.

    2012-01-01

    Compliance checking is gaining importance as today’s organizations need to show that operational processes are executed in a controlled manner while satisfying prede¿ned (legal) requirements. Deviations may be costly and expose the organization to severe risks. Compliance checking is of growing

  15. 31 CFR 245.8 - Receipt or recovery of original check.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Receipt or recovery of original check... CHECKS § 245.8 Receipt or recovery of original check. (a) If the original check is received or recovered... of instructions with respect to the negotiability of such check. (b) If the original check is...

  16. Forgetting what you have checked: a link between working memory impairment and checking behaviors in obsessive-compulsive disorder.

    Science.gov (United States)

    Jaafari, N; Frasca, M; Rigalleau, F; Rachid, F; Gil, R; Olié, J-P; Guehl, D; Burbaud, P; Aouizerate, B; Rotgé, J-Y; Vibert, N

    2013-02-01

    Compulsive checking behaviors are common in obsessive-compulsive disorder (OCD). Several authors have suggested that these checking rituals could be related to memory deficits. Our aim was to test whether patients with OCD show working memory impairment in relation to their checking behavior. We evaluated the verbal and visuospatial components of patients' and controls' working memory using the reading span and backward location span tests. Checking behaviors were measured by recording participants' eye movements during an image comparison task using a non-invasive, infra-red TOBII 1750 eyetracker. Participants were seated, head-free, in a natural position in front of the eyetracker screen where the images were displayed. Patients with OCD made more gaze moves to compare images than controls. Both patients' working memory spans were reduced, and the patients' deficit in the comparison task was negatively related to their working memory spans. This work demonstrates that checking behavior in OCD is linked to a general reduction of the patients' verbal and visuospatial working memory span. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  17. Study on the unified constraint parameter for characterizing in-plane and out-of-plane constraint based on the equivalent plastic strain

    International Nuclear Information System (INIS)

    Yang Jie; Wang Guozhen; Xuan Fuzhen; Tu Shandong

    2013-01-01

    Background: Constraint can significantly alter the material's fracture toughness. Purpose: In order to increase accuracy of the structural integrity assessment. It needs to consider the effect of constraint on the fracture toughness of nuclear power materials and structures. A unified measure which can reflect both in-plane and out-of-plane constraint is needed. Methods: In this paper, the finite element numerical simulation method was used, a unified measure and characterization parameter of in-plane and out-of-plane constraint based on crack-tip equivalent plastic strain have been investigated. Results: The results show that the area surrounded by ε p isoline has a good relevance with the material's fracture toughness on different constraint conditions, so it may be a suitable parameter. Based on the area A PEEQ , a unified constraint characterization parameter √A p is defined. It was found that there exists a sole linear relation between the normalized fracture toughness J IC /J re f and √A p regardless of the in-plane, out-of-plane constraint and the selection of the p isolines. The sole J IC /J re f-√A p line exists for a certain material. For different materials, the slope of J IC /J re f-√A p reference line is different. The material whose slope is larger has a higher J IC /J re f and is more sensitive to constraint at the same magnitude of normalized unified parameter. Conclusions: The unified J IC /J re f -√A p reference line may be used to assess the safety of a cracked component with any constraint levels regardless of in-plane or out-of-plane constraint or both. (authors)

  18. Model Checking Infinite-State Markov Chains

    NARCIS (Netherlands)

    Remke, Anne Katharina Ingrid; Haverkort, Boudewijn R.H.M.; Cloth, L.

    2004-01-01

    In this paper algorithms for model checking CSL (continuous stochastic logic) against infinite-state continuous-time Markov chains of so-called quasi birth-death type are developed. In doing so we extend the applicability of CSL model checking beyond the recently proposed case for finite-state

  19. 38 CFR 21.4505 - Check delivery.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Check delivery. 21.4505...) VOCATIONAL REHABILITATION AND EDUCATION Education Loans § 21.4505 Check delivery. (a) General. Education... surviving spouse is enrolled for delivery by the educational institution. (b) Delivery and certification. (1...

  20. check cif.pdf

    Indian Academy of Sciences (India)

    AMMIN

    Calculated. Reported. Volume ... PLAT094_ALERT_2_C Ratio of Maximum / Minimum Residual Density .... 3.24 Report ... checkCIF was carefully designed to identify outliers and unusual parameters, but every test has its limitations and alerts ...

  1. 46 CFR 10.214 - Security Check.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...

  2. 7 CFR 58.243 - Checking quality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Checking quality. 58.243 Section 58.243 Agriculture... Procedures § 58.243 Checking quality. All milk, milk products and dry milk products shall be subject to inspection and analysis by the dairy plant for quality and condition throughout each processing operation...

  3. Mothers' use of and attitudes to BabyCheck.

    OpenAIRE

    Thomson, Hilary; Ross, Sue; Wilson, Philip; McConnachie, Alex; Watson, Richard

    2002-01-01

    A copy of BabyCheck was sent to 497 mothers shortly after the birth of their baby. Six months later they were sent a questionnaire asking about their use of and attitudes to, BabyCheck. Questionnaires were returned by 323 (65%) mothers; 215 (67%) of them reported reading BabyCheck, the majority found it easy to understand (74%) and agreed with the advice (67%). Eighty-four (26%) of the mothers who returned the questionnaires reported using BabyCheck when their baby was ill; of these, 71% agre...

  4. CMM Interim Check Design of Experiments (U)

    Energy Technology Data Exchange (ETDEWEB)

    Montano, Joshua Daniel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-07-29

    Coordinate Measuring Machines (CMM) are widely used in industry, throughout the Nuclear Weapons Complex and at Los Alamos National Laboratory (LANL) to verify part conformance to design definition. Calibration cycles for CMMs at LANL are predominantly one year in length and include a weekly interim check to reduce risk. The CMM interim check makes use of Renishaw’s Machine Checking Gauge which is an off-the-shelf product simulates a large sphere within a CMM’s measurement volume and allows for error estimation. As verification on the interim check process a design of experiments investigation was proposed to test a couple of key factors (location and inspector). The results from the two-factor factorial experiment proved that location influenced results more than the inspector or interaction.

  5. 7 CFR 1421.11 - Spot checks.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Spot checks. 1421.11 Section 1421.11 Agriculture... ASSISTANCE LOANS AND LOAN DEFICIENCY PAYMENTS FOR 2008 THROUGH 2012 General § 1421.11 Spot checks. (a) CCC... CCC access to the farm and storage facility as necessary to conduct collateral inspections, or “spot...

  6. 32 CFR 635.6 - Name checks.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Name checks. 635.6 Section 635.6 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Records Administration § 635.6 Name checks. (a) Information contained in military police records may be...

  7. 45 CFR 201.70 - Treatment of replacement checks.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Treatment of replacement checks. 201.70 Section... STATES FOR PUBLIC ASSISTANCE PROGRAMS Review and Audits § 201.70 Treatment of replacement checks. (a... (FFP) for replacement checks under titles I, VI-A, X, XIV, XVI (AABD) except under the circumstances...

  8. Recent improvements in check valve monitoring methods

    International Nuclear Information System (INIS)

    Haynes, H.D.

    1991-01-01

    In support of the NRC Nuclear Plant Aging Research (NPAR) program, ORNL has carried out an evaluation of three check valve monitoring methods: acoustic emission, ultrasonic inspection, and magnetic flux signature analysis (MFSA). This work has focussed on determining the capabilities of each method to provide diagnostic information useful in determining check valve aging and service wear effects (degradation) and undesirable operating modes. In addition, as part of the ORNL Advanced Diagnostic Engineering Research and Development Center (ADEC), two novel nonintrusive monitoring methods were developed (external ac- and dc-magnetic monitoring) that provide several improvements over the other methods. None of the examined methods could, by themselves, monitor the instantaneous position and motion of check valve internals and valve leakage; however, the combination of acoustic emission monitoring with one of the other methods provides the means to determine vital check valve operational information. This paper describes the benefits and limitations associated with each method and includes recent laboratory and field test data to illustrate the capabilities of these methods to detect simulated check valve degradation. 3 refs., 22 figs., 4 tabs

  9. Recent improvements in check valve monitoring methods

    International Nuclear Information System (INIS)

    Haynes, H.D.

    1990-01-01

    In support of the NRC Nuclear Plant Aging Research (NPAR) program, ORNL has carried out an evaluation of three check valve monitoring methods: acoustic emission, ultrasonic inspection, and magnetic flux signature analysis (MFSA). This work has focused on determining the capabilities of each method to provide diagnostic information useful in determining check valve aging and service wear effects (degradation) and undesirable operating modes. In addition, as part of the ORNL Advanced Diagnostic Engineering Research and Development Center (ADEC), two noval nonintrusive monitoring methods were developed (external ac- and dc-magnetic monitoring) that provide several improvements over the other methods. None of the examined methods could, by themselves, monitor the instantaneous position and motion of check valve internals and valve leakage; however, the combination of acoustic emission monitoring with one of the other methods provides the means to determine vital check valve operational information. This paper describes the benefits and limitations associated with each method and includes recent laboratory and field test data to illustrate the capabilities of these methods to detect simulated check valve degradation. 3 refs., 22 figs., 4 tabs

  10. Inter-enterprise system and application integration: a reality check

    NARCIS (Netherlands)

    Cardoso, J.; Aalst, van der W.M.P.; Bussler, C.; Sheth, A.P.; Sandkuhl, K.; Filipe, J.; Cordeiro, J.; Cardoso, J.

    2008-01-01

    This paper structures the summary of the panel held at the 9th International Conference on Enterprise Information Systems, Funchal, Madeira, 12-16 June 2007 that addressed the following question: "Are you still working on Inter-Enterprise System and Application Integration?" The panel aggregated

  11. Check valve diagnostics utilizing acoustic and magnetic technologies

    International Nuclear Information System (INIS)

    Agostinelli, A.

    1991-01-01

    The potential hazards associated with check valve failures make it necessary to detect check valve problems before they cause significant damage. In the nuclear industry, check valve failures are known to have resulted in damaging water hammer conditions, overpressurization of low pressure systems, steam binding of auxiliary feedwater pumps, and other serious component damage in power plant environments. Similar problems exist in fossil power and various process industries, but the resources dedicated to valve maintenance issues are greatly reduced. However, the trend toward plant life extension, predictive maintenance, and maximum operating efficiency will raise the general awareness of check valve maintenance in commercial (non-nuclear) applications. Although this paper includes specific references to the nuclear industry, the check valve problem conditions and diagnostic techniques apply across all power and process plant environments. The ability to accurately diagnose check valve conditions using non-intrusive, predictive maintenance testing methods allows for a more cost-efficient, productive maintenance program. One particular diagnostic system, called Quickcheck trademark, assists utilities in addressing these concerns. This article presents actual field test data and analysis that demonstrate the power of check valve diagnostics. Prior to presenting the field data, a brief overview of the system is overviewed

  12. Rigid Body Time Integration by Convected Base Vectors with Implicit Constraints

    DEFF Research Database (Denmark)

    Krenk, Steen; Nielsen, Martin Bjerre

    2013-01-01

    of the kinetic energy used in the present formulation is deliberately chosen to correspond to a rigid body rotation, and the orthonormality constraints are introduced via the equivalent Green strain components of the base vectors. The particular form of the extended inertia tensor used here implies a set...

  13. THE INFLUENCE OF CHECK DAMS ON FLUVIAL PROCESSES AND RIPARIAN VEGETATION IN MOUNTAIN REACHES OF TORRENTS

    Directory of Open Access Journals (Sweden)

    Giuseppe Bombino

    2010-09-01

    Full Text Available The complex hydrogeomorphological processes within the active channel of rivers strongly influence riparian vegetation development and organization, particularly in mountain streams where such processes can be remarkably impacted by engineering control works. In four mountain reaches of Calabrian fiumaras we analyze, through previously arranged methods (integrated by a multivariate statistic analysis, the relationships among hydrogeomorphological river characteristics and structure and the development of riparian vegetation within the active channel in transects located in proximity of check dams and in less disturbed sites. The results of this study demonstrate clear and relevant contrasts, due to the presence of check dams, in the physical and vegetation properties of upstream, downstream and intermediate sites around check dams. The multivariate statistical approach through the Principal Component Analysis (PCA highlighted evident relationships in all transects between groups of physical and vegetation properties. The regression analysis performed between the vegetation properties and the width:depth ratio or the specific discharge showed very different relationships between groups of transects, due to evident changes in channel morphology and in flow regime locally induced by check dams. Overall we have shown that check dams have far reaching effects in the extent and development of riparian vegetation of mountain torrent reaches, which extend far beyond physical adjustments to changed morphological, hydraulic and sedimentary conditions.

  14. Automation of Geometry Input for Building Code Compliance Check

    DEFF Research Database (Denmark)

    Petrova, Ekaterina Aleksandrova; Johansen, Peter Lind; Jensen, Rasmus Lund

    2017-01-01

    Documentation of compliance with the energy performance regulations at the end of the detailed design phase is mandatory for building owners in Denmark. Therefore, besides multidisciplinary input, the building design process requires various iterative analyses, so that the optimal solutions can....... That has left the industry in constant pursuit of possibilities for integration of the tool within the Building Information Modelling environment so that the potential provided by the latter can be harvested and the processed can be optimized. This paper presents a solution for automated data extraction...... from building geometry created in Autodesk Revit and its translation to input for compliance check analysis....

  15. Statistical Model Checking of Rich Models and Properties

    DEFF Research Database (Denmark)

    Poulsen, Danny Bøgsted

    in undecidability issues for the traditional model checking approaches. Statistical model checking has proven itself a valuable supplement to model checking and this thesis is concerned with extending this software validation technique to stochastic hybrid systems. The thesis consists of two parts: the first part...... motivates why existing model checking technology should be supplemented by new techniques. It also contains a brief introduction to probability theory and concepts covered by the six papers making up the second part. The first two papers are concerned with developing online monitoring techniques...... systems. The fifth paper shows how stochastic hybrid automata are useful for modelling biological systems and the final paper is concerned with showing how statistical model checking is efficiently distributed. In parallel with developing the theory contained in the papers, a substantial part of this work...

  16. UTP and Temporal Logic Model Checking

    Science.gov (United States)

    Anderson, Hugh; Ciobanu, Gabriel; Freitas, Leo

    In this paper we give an additional perspective to the formal verification of programs through temporal logic model checking, which uses Hoare and He Unifying Theories of Programming (UTP). Our perspective emphasizes the use of UTP designs, an alphabetised relational calculus expressed as a pre/post condition pair of relations, to verify state or temporal assertions about programs. The temporal model checking relation is derived from a satisfaction relation between the model and its properties. The contribution of this paper is that it shows a UTP perspective to temporal logic model checking. The approach includes the notion of efficiency found in traditional model checkers, which reduced a state explosion problem through the use of efficient data structures

  17. Constrained Optimization Based on Hybrid Evolutionary Algorithm and Adaptive Constraint-Handling Technique

    DEFF Research Database (Denmark)

    Wang, Yong; Cai, Zixing; Zhou, Yuren

    2009-01-01

    A novel approach to deal with numerical and engineering constrained optimization problems, which incorporates a hybrid evolutionary algorithm and an adaptive constraint-handling technique, is presented in this paper. The hybrid evolutionary algorithm simultaneously uses simplex crossover and two...... mutation operators to generate the offspring population. Additionally, the adaptive constraint-handling technique consists of three main situations. In detail, at each situation, one constraint-handling mechanism is designed based on current population state. Experiments on 13 benchmark test functions...... and four well-known constrained design problems verify the effectiveness and efficiency of the proposed method. The experimental results show that integrating the hybrid evolutionary algorithm with the adaptive constraint-handling technique is beneficial, and the proposed method achieves competitive...

  18. Coverage Metrics for Model Checking

    Science.gov (United States)

    Penix, John; Visser, Willem; Norvig, Peter (Technical Monitor)

    2001-01-01

    When using model checking to verify programs in practice, it is not usually possible to achieve complete coverage of the system. In this position paper we describe ongoing research within the Automated Software Engineering group at NASA Ames on the use of test coverage metrics to measure partial coverage and provide heuristic guidance for program model checking. We are specifically interested in applying and developing coverage metrics for concurrent programs that might be used to support certification of next generation avionics software.

  19. First experiences with the LHC BLM sanity checks

    Science.gov (United States)

    Emery, J.; Dehning, B.; Effinger, E.; Nordt, A.; Sapinski, M. G.; Zamantzas, C.

    2010-12-01

    The reliability concerns have driven the design of the Large Hardron Collider (LHC) Beam Loss Monitoring (BLM) system from the early stage of the studies up to the present commissioning and the latest development of diagnostic tools. To protect the system against non-conformities, new ways of automatic checking have been developed and implemented. These checks are regularly and systematically executed by the LHC operation team to ensure that the system status is after each test "as good as new". The sanity checks are part of this strategy. They are testing the electrical part of the detectors (ionisation chamber or secondary emission detector), their cable connections to the front-end electronics, further connections to the back-end electronics and their ability to request a beam abort. During the installation and in the early commissioning phase, these checks have shown their ability to find also non-conformities caused by unexpected failure event scenarios. In every day operation, a non-conformity discovered by this check inhibits any further injections into the LHC until the check confirms the absence of non-conformities.

  20. First experiences with the LHC BLM sanity checks

    International Nuclear Information System (INIS)

    Emery, J; Dehning, B; Effinger, E; Nordt, A; Sapinski, M G; Zamantzas, C

    2010-01-01

    The reliability concerns have driven the design of the Large Hardron Collider (LHC) Beam Loss Monitoring (BLM) system from the early stage of the studies up to the present commissioning and the latest development of diagnostic tools. To protect the system against non-conformities, new ways of automatic checking have been developed and implemented. These checks are regularly and systematically executed by the LHC operation team to ensure that the system status is after each test a s good as new . The sanity checks are part of this strategy. They are testing the electrical part of the detectors (ionisation chamber or secondary emission detector), their cable connections to the front-end electronics, further connections to the back-end electronics and their ability to request a beam abort. During the installation and in the early commissioning phase, these checks have shown their ability to find also non-conformities caused by unexpected failure event scenarios. In every day operation, a non-conformity discovered by this check inhibits any further injections into the LHC until the check confirms the absence of non-conformities.

  1. First experiences with the LHC BLM sanity checks

    Energy Technology Data Exchange (ETDEWEB)

    Emery, J; Dehning, B; Effinger, E; Nordt, A; Sapinski, M G; Zamantzas, C, E-mail: Jonathan.emery@cern.ch [CERN, CH-1211 Geneve 23 (Switzerland)

    2010-12-15

    The reliability concerns have driven the design of the Large Hardron Collider (LHC) Beam Loss Monitoring (BLM) system from the early stage of the studies up to the present commissioning and the latest development of diagnostic tools. To protect the system against non-conformities, new ways of automatic checking have been developed and implemented. These checks are regularly and systematically executed by the LHC operation team to ensure that the system status is after each test {sup a}s good as new{sup .} The sanity checks are part of this strategy. They are testing the electrical part of the detectors (ionisation chamber or secondary emission detector), their cable connections to the front-end electronics, further connections to the back-end electronics and their ability to request a beam abort. During the installation and in the early commissioning phase, these checks have shown their ability to find also non-conformities caused by unexpected failure event scenarios. In every day operation, a non-conformity discovered by this check inhibits any further injections into the LHC until the check confirms the absence of non-conformities.

  2. Do alcohol compliance checks decrease underage sales at neighboring establishments?

    Science.gov (United States)

    Erickson, Darin J; Smolenski, Derek J; Toomey, Traci L; Carlin, Bradley P; Wagenaar, Alexander C

    2013-11-01

    Underage alcohol compliance checks conducted by law enforcement agencies can reduce the likelihood of illegal alcohol sales at checked alcohol establishments, and theory suggests that an alcohol establishment that is checked may warn nearby establishments that compliance checks are being conducted in the area. In this study, we examined whether the effects of compliance checks diffuse to neighboring establishments. We used data from the Complying with the Minimum Drinking Age trial, which included more than 2,000 compliance checks conducted at more than 900 alcohol establishments. The primary outcome was the sale of alcohol to a pseudo-underage buyer without the need for age identification. A multilevel logistic regression was used to model the effect of a compliance check at each establishment as well as the effect of compliance checks at neighboring establishments within 500 m (stratified into four equal-radius concentric rings), after buyer, license, establishment, and community-level variables were controlled for. We observed a decrease in the likelihood of establishments selling alcohol to underage youth after they had been checked by law enforcement, but these effects quickly decayed over time. Establishments that had a close neighbor (within 125 m) checked in the past 90 days were also less likely to sell alcohol to young-appearing buyers. The spatial effect of compliance checks on other establishments decayed rapidly with increasing distance. Results confirm the hypothesis that the effects of police compliance checks do spill over to neighboring establishments. These findings have implications for the development of an optimal schedule of police compliance checks.

  3. SoS contract verification using statistical model checking

    Directory of Open Access Journals (Sweden)

    Alessandro Mignogna

    2013-11-01

    Full Text Available Exhaustive formal verification for systems of systems (SoS is impractical and cannot be applied on a large scale. In this paper we propose to use statistical model checking for efficient verification of SoS. We address three relevant aspects for systems of systems: 1 the model of the SoS, which includes stochastic aspects; 2 the formalization of the SoS requirements in the form of contracts; 3 the tool-chain to support statistical model checking for SoS. We adapt the SMC technique for application to heterogeneous SoS. We extend the UPDM/SysML specification language to express the SoS requirements that the implemented strategies over the SoS must satisfy. The requirements are specified with a new contract language specifically designed for SoS, targeting a high-level English- pattern language, but relying on an accurate semantics given by the standard temporal logics. The contracts are verified against the UPDM/SysML specification using the Statistical Model Checker (SMC PLASMA combined with the simulation engine DESYRE, which integrates heterogeneous behavioral models through the functional mock-up interface (FMI standard. The tool-chain allows computing an estimation of the satisfiability of the contracts by the SoS. The results help the system architect to trade-off different solutions to guide the evolution of the SoS.

  4. Modifier constraint in alkali borophosphate glasses using topological constraint theory

    Energy Technology Data Exchange (ETDEWEB)

    Li, Xiang [Key Laboratory for Ultrafine Materials of Ministry of Education, School of Materials Science and Engineering, East China University of Science and Technology, Shanghai 200237 (China); Zeng, Huidan, E-mail: hdzeng@ecust.edu.cn [Key Laboratory for Ultrafine Materials of Ministry of Education, School of Materials Science and Engineering, East China University of Science and Technology, Shanghai 200237 (China); Jiang, Qi [Key Laboratory for Ultrafine Materials of Ministry of Education, School of Materials Science and Engineering, East China University of Science and Technology, Shanghai 200237 (China); Zhao, Donghui [Unifrax Corporation, Niagara Falls, NY 14305 (United States); Chen, Guorong [Key Laboratory for Ultrafine Materials of Ministry of Education, School of Materials Science and Engineering, East China University of Science and Technology, Shanghai 200237 (China); Wang, Zhaofeng; Sun, Luyi [Department of Chemical & Biomolecular Engineering and Polymer Program, Institute of Materials Science, University of Connecticut, Storrs, CT 06269 (United States); Chen, Jianding [Key Laboratory for Ultrafine Materials of Ministry of Education, School of Materials Science and Engineering, East China University of Science and Technology, Shanghai 200237 (China)

    2016-12-01

    In recent years, composition-dependent properties of glasses have been successfully predicted using the topological constraint theory. The constraints of the glass network are derived from two main parts: network formers and network modifiers. The constraints of the network formers can be calculated on the basis of the topological structure of the glass. However, the latter cannot be accurately calculated in this way, because of the existing of ionic bonds. In this paper, the constraints of the modifier ions in phosphate glasses were thoroughly investigated using the topological constraint theory. The results show that the constraints of the modifier ions are gradually increased with the addition of alkali oxides. Furthermore, an improved topological constraint theory for borophosphate glasses is proposed by taking the composition-dependent constraints of the network modifiers into consideration. The proposed theory is subsequently evaluated by analyzing the composition dependence of the glass transition temperature in alkali borophosphate glasses. This method is supposed to be extended to other similar glass systems containing alkali ions.

  5. Integrity cynicism: Possibilities and Constraints of Moral Communication

    NARCIS (Netherlands)

    Bakker, de H.C.M.

    2007-01-01

    Paying thorough attention to cynical action and integrity could result in a less naive approach to ethics and moral communication. This article discusses the issues of integrity and cynicism on a theoretical and on a more practical level. The first part confronts Habermas¿s approach of communicative

  6. Checking and Balancing: Banking and Budgeting.

    Science.gov (United States)

    Thypin, Marilyn; Glasner, Lynne

    A short fictional work for limited English speakers is presented that relates a young couple's experience in learning about managing their money more carefully by budgeting and maintaining a checking account. Since the couple did not have a checking account, they had to go to their savings bank in order to pay each bill and they had to keep cash…

  7. Validating database constraints and updates using automated reasoning techniques

    NARCIS (Netherlands)

    Feenstra, Remco; Wieringa, Roelf J.

    1995-01-01

    In this paper, we propose a new approach to the validation of formal specifications of integrity constraints. The validation problem of fornmal specifications consists of assuring whether the formal specification corresponds with what the domain specialist intends. This is distinct from the

  8. Glovebox pressure relief and check valve

    Energy Technology Data Exchange (ETDEWEB)

    Blaedel, K.L.

    1986-03-17

    This device is a combined pressure relief valve and check valve providing overpressure protection and preventing back flow into an inert atmosphere enclosure. The pressure relief is embodied by a submerged vent line in a mercury reservior, the releif pressure being a function of the submerged depth. The pressure relief can be vented into an exhaust system and the relieving pressure is only slightly influenced by the varying pressure in the exhaust system. The check valve is embodied by a ball which floats on the mercury column and contacts a seat whenever vacuum exists within the glovebox enclosure. Alternatively, the check valve is embodied by a vertical column of mercury, the maximum back pressure being a function of the height of the column of mercury.

  9. Glovebox pressure relief and check valve

    International Nuclear Information System (INIS)

    Blaedel, K.L.

    1986-01-01

    This device is a combined pressure relief valve and check valve providing overpressure protection and preventing back flow into an inert atmosphere enclosure. The pressure relief is embodied by a submerged vent line in a mercury reservior, the releif pressure being a function of the submerged depth. The pressure relief can be vented into an exhaust system and the relieving pressure is only slightly influenced by the varying pressure in the exhaust system. The check valve is embodied by a ball which floats on the mercury column and contacts a seat whenever vacuum exists within the glovebox enclosure. Alternatively, the check valve is embodied by a vertical column of mercury, the maximum back pressure being a function of the height of the column of mercury

  10. Constraint propagation of C2-adjusted formulation: Another recipe for robust ADM evolution system

    International Nuclear Information System (INIS)

    Tsuchiya, Takuya; Yoneda, Gen; Shinkai, Hisa-aki

    2011-01-01

    With a purpose of constructing a robust evolution system against numerical instability for integrating the Einstein equations, we propose a new formulation by adjusting the ADM evolution equations with constraints. We apply an adjusting method proposed by Fiske (2004) which uses the norm of the constraints, C 2 . One of the advantages of this method is that the effective signature of adjusted terms (Lagrange multipliers) for constraint-damping evolution is predetermined. We demonstrate this fact by showing the eigenvalues of constraint propagation equations. We also perform numerical tests of this adjusted evolution system using polarized Gowdy-wave propagation, which show robust evolutions against the violation of the constraints than that of the standard ADM formulation.

  11. Wave functions constructed from an invariant sum over histories satisfy constraints

    International Nuclear Information System (INIS)

    Halliwell, J.J.; Hartle, J.B.

    1991-01-01

    Invariance of classical equations of motion under a group parametrized by functions of time implies constraints between canonical coordinates and momenta. In the Dirac formulation of quantum mechanics, invariance is normally imposed by demanding that physical wave functions are annihilated by the operator versions of these constraints. In the sum-over-histories quantum mechanics, however, wave functions are specified, directly, by appropriate functional integrals. It therefore becomes an interesting question whether the wave functions so specified obey the operator constraints of the Dirac theory. In this paper, we show for a wide class of theories, including gauge theories, general relativity, and first-quantized string theories, that wave functions constructed from a sum over histories are, in fact, annihilated by the constraints provided that the sum over histories is constructed in a manner which respects the invariance generated by the constraints. By this we mean a sum over histories defined with an invariant action, invariant measure, and an invariant class of paths summed over

  12. Cosmographic Constraints and Cosmic Fluids

    Directory of Open Access Journals (Sweden)

    Salvatore Capozziello

    2013-12-01

    Full Text Available The problem of reproducing dark energy effects is reviewed here with particular interest devoted to cosmography. We summarize some of the most relevant cosmological models, based on the assumption that the corresponding barotropic equations of state evolve as the universe expands, giving rise to the accelerated expansion. We describe in detail the ΛCDM (Λ-Cold Dark Matter and ωCDM models, considering also some specific examples, e.g., Chevallier–Polarsky–Linder, the Chaplygin gas and the Dvali–Gabadadze–Porrati cosmological model. Finally, we consider the cosmological consequences of f(R and f(T gravities and their impact on the framework of cosmography. Keeping these considerations in mind, we point out the model-independent procedure related to cosmography, showing how to match the series of cosmological observables to the free parameters of each model. We critically discuss the role played by cosmography, as a selection criterion to check whether a particular model passes or does not present cosmological constraints. In so doing, we find out cosmological bounds by fitting the luminosity distance expansion of the redshift, z, adopting the recent Union 2.1 dataset of supernovae, combined with the baryonic acoustic oscillation and the cosmic microwave background measurements. We perform cosmographic analyses, imposing different priors on the Hubble rate present value. In addition, we compare our results with recent PLANCK limits, showing that the ΛCDM and ωCDM models seem to be the favorite with respect to other dark energy models. However, we show that cosmographic constraints on f(R and f(T cannot discriminate between extensions of General Relativity and dark energy models, leading to a disadvantageous degeneracy problem.

  13. Repeated checking induces uncertainty about future threat

    NARCIS (Netherlands)

    Giele, C.L.|info:eu-repo/dai/nl/318754460; Engelhard, I.M.|info:eu-repo/dai/nl/239681533; van den Hout, M.A.|info:eu-repo/dai/nl/070445354; Dek, E.C.P.|info:eu-repo/dai/nl/313959552; Damstra, Marianne; Douma, Ellen

    2015-01-01

    Studies have shown that obsessive-compulsive (OC) -like repeated checking paradoxically increases memory uncertainty. This study tested if checking also induces uncertainty about future threat by impairing the distinction between danger and safety cues. Participants (n = 54) engaged in a simulated

  14. Inkjet 3D printed check microvalve

    International Nuclear Information System (INIS)

    Walczak, Rafał; Adamski, Krzysztof; Lizanets, Danylo

    2017-01-01

    3D printing enables fast and relatively easy fabrication of various microfluidic structures including microvalves. A check microvalve is the simplest valve enabling control of the fluid flow in microchannels. Proper operation of the check valve is ensured by a movable element that tightens the valve seat during backward flow and enables free flow for forward pressure. Thus, knowledge of the mechanical properties of the movable element is crucial for optimal design and operation of the valve. In this paper, we present for the first time the results of investigations on basic mechanical properties of the building material used in multijet 3D printing. Specified mechanical properties were used in the design and fabrication of two types of check microvalve—with deflecting or hinge-fixed microflap—with 200 µ m and 300 µ m thickness. Results of numerical simulation and experimental data of the microflap deflection were obtained and compared. The valves were successfully 3D printed and characterised. Opening/closing characteristics of the microvalve for forward and backward pressures were determined. Thus, proper operation of the check microvalve so developed was confirmed. (technical note)

  15. Graphical constraints: a graphical user interface for constraint problems

    OpenAIRE

    Vieira, Nelson Manuel Marques

    2015-01-01

    A constraint satisfaction problem is a classical artificial intelligence paradigm characterized by a set of variables (each variable with an associated domain of possible values), and a set of constraints that specify relations among subsets of these variables. Solutions are assignments of values to all variables that satisfy all the constraints. Many real world problems may be modelled by means of constraints. The range of problems that can use this representation is very diverse and embrace...

  16. Scheduling double round-robin tournaments with divisional play using constraint programming

    Energy Technology Data Exchange (ETDEWEB)

    Carlsson, Mats; Johansson, Mikael; Larson, Jeffrey

    2017-06-01

    We study a tournament format that extends a traditional double round-robin format with divisional single round-robin tournaments. Elitserien, the top Swedish handball league, uses such a format for its league schedule. We present a constraint programming model that characterizes the general double round-robin plus divisional single round-robin format. This integrated model allows scheduling to be performed in a single step, as opposed to common multistep approaches that decompose scheduling into smaller problems and possibly miss optimal solutions. In addition to general constraints, we introduce Elitserien-specific requirements for its tournament. These general and league-specific constraints allow us to identify implicit and symmetry-breaking properties that reduce the time to solution from hours to seconds. A scalability study of the number of teams shows that our approach is reasonably fast for even larger league sizes. The experimental evaluation of the integrated approach takes considerably less computational effort to schedule Elitserien than does the previous decomposed approach. (C) 2016 Elsevier B.V. All rights reserved

  17. Integration of sparse multi-modality representation and geometrical constraint for isointense infant brain segmentation.

    Science.gov (United States)

    Wang, Li; Shi, Feng; Li, Gang; Lin, Weili; Gilmore, John H; Shen, Dinggang

    2013-01-01

    Segmentation of infant brain MR images is challenging due to insufficient image quality, severe partial volume effect, and ongoing maturation and myelination process. During the first year of life, the signal contrast between white matter (WM) and gray matter (GM) in MR images undergoes inverse changes. In particular, the inversion of WM/GM signal contrast appears around 6-8 months of age, where brain tissues appear isointense and hence exhibit extremely low tissue contrast, posing significant challenges for automated segmentation. In this paper, we propose a novel segmentation method to address the above-mentioned challenge based on the sparse representation of the complementary tissue distribution information from T1, T2 and diffusion-weighted images. Specifically, we first derive an initial segmentation from a library of aligned multi-modality images with ground-truth segmentations by using sparse representation in a patch-based fashion. The segmentation is further refined by the integration of the geometrical constraint information. The proposed method was evaluated on 22 6-month-old training subjects using leave-one-out cross-validation, as well as 10 additional infant testing subjects, showing superior results in comparison to other state-of-the-art methods.

  18. Generalization of the event-based Carnevale-Hines integration scheme for integrate-and-fire models

    NARCIS (Netherlands)

    van Elburg, R.A.J.; van Ooyen, A.

    2009-01-01

    An event-based integration scheme for an integrate-and-fire neuron model with exponentially decaying excitatory synaptic currents and double exponential inhibitory synaptic currents has been introduced by Carnevale and Hines. However, the integration scheme imposes nonphysiological constraints on

  19. Generalization of the Event-Based Carnevale-Hines Integration Scheme for Integrate-and-Fire Models

    NARCIS (Netherlands)

    van Elburg, Ronald A. J.; van Ooyen, Arjen

    An event-based integration scheme for an integrate-and-fire neuron model with exponentially decaying excitatory synaptic currents and double exponential inhibitory synaptic currents has been introduced by Carnevale and Hines. However, the integration scheme imposes nonphysiological constraints on

  20. Rapid sampling of molecular motions with prior information constraints.

    Science.gov (United States)

    Raveh, Barak; Enosh, Angela; Schueler-Furman, Ora; Halperin, Dan

    2009-02-01

    Proteins are active, flexible machines that perform a range of different functions. Innovative experimental approaches may now provide limited partial information about conformational changes along motion pathways of proteins. There is therefore a need for computational approaches that can efficiently incorporate prior information into motion prediction schemes. In this paper, we present PathRover, a general setup designed for the integration of prior information into the motion planning algorithm of rapidly exploring random trees (RRT). Each suggested motion pathway comprises a sequence of low-energy clash-free conformations that satisfy an arbitrary number of prior information constraints. These constraints can be derived from experimental data or from expert intuition about the motion. The incorporation of prior information is very straightforward and significantly narrows down the vast search in the typically high-dimensional conformational space, leading to dramatic reduction in running time. To allow the use of state-of-the-art energy functions and conformational sampling, we have integrated this framework into Rosetta, an accurate protocol for diverse types of structural modeling. The suggested framework can serve as an effective complementary tool for molecular dynamics, Normal Mode Analysis, and other prevalent techniques for predicting motion in proteins. We applied our framework to three different model systems. We show that a limited set of experimentally motivated constraints may effectively bias the simulations toward diverse predicates in an outright fashion, from distance constraints to enforcement of loop closure. In particular, our analysis sheds light on mechanisms of protein domain swapping and on the role of different residues in the motion.

  1. Rapid sampling of molecular motions with prior information constraints.

    Directory of Open Access Journals (Sweden)

    Barak Raveh

    2009-02-01

    Full Text Available Proteins are active, flexible machines that perform a range of different functions. Innovative experimental approaches may now provide limited partial information about conformational changes along motion pathways of proteins. There is therefore a need for computational approaches that can efficiently incorporate prior information into motion prediction schemes. In this paper, we present PathRover, a general setup designed for the integration of prior information into the motion planning algorithm of rapidly exploring random trees (RRT. Each suggested motion pathway comprises a sequence of low-energy clash-free conformations that satisfy an arbitrary number of prior information constraints. These constraints can be derived from experimental data or from expert intuition about the motion. The incorporation of prior information is very straightforward and significantly narrows down the vast search in the typically high-dimensional conformational space, leading to dramatic reduction in running time. To allow the use of state-of-the-art energy functions and conformational sampling, we have integrated this framework into Rosetta, an accurate protocol for diverse types of structural modeling. The suggested framework can serve as an effective complementary tool for molecular dynamics, Normal Mode Analysis, and other prevalent techniques for predicting motion in proteins. We applied our framework to three different model systems. We show that a limited set of experimentally motivated constraints may effectively bias the simulations toward diverse predicates in an outright fashion, from distance constraints to enforcement of loop closure. In particular, our analysis sheds light on mechanisms of protein domain swapping and on the role of different residues in the motion.

  2. Systematic Review of the Check-In, Check-Out Intervention for Students at Risk for Emotional and Behavioral Disorders

    Science.gov (United States)

    Hawken, Leanne S.; Bundock, Kaitlin; Kladis, Kristin; O'Keeffe, Breda; Barret, Courtenay A.

    2014-01-01

    The purpose of this systematic literature review was to summarize outcomes of the Check-in Check-out (CICO) intervention across elementary and secondary settings. Twenty-eight studies utilizing both single subject and group (experimental and quasi-experimental) designs were included in this review. Median effect sizes across the eight group…

  3. Role of DARPP-32 and ARPP-21 in the Emergence of Temporal Constraints on Striatal Calcium and Dopamine Integration

    Science.gov (United States)

    Bhalla, Upinder S.; Hellgren Kotaleski, Jeanette

    2016-01-01

    In reward learning, the integration of NMDA-dependent calcium and dopamine by striatal projection neurons leads to potentiation of corticostriatal synapses through CaMKII/PP1 signaling. In order to elicit the CaMKII/PP1-dependent response, the calcium and dopamine inputs should arrive in temporal proximity and must follow a specific (dopamine after calcium) order. However, little is known about the cellular mechanism which enforces these temporal constraints on the signal integration. In this computational study, we propose that these temporal requirements emerge as a result of the coordinated signaling via two striatal phosphoproteins, DARPP-32 and ARPP-21. Specifically, DARPP-32-mediated signaling could implement an input-interval dependent gating function, via transient PP1 inhibition, thus enforcing the requirement for temporal proximity. Furthermore, ARPP-21 signaling could impose the additional input-order requirement of calcium and dopamine, due to its Ca2+/calmodulin sequestering property when dopamine arrives first. This highlights the possible role of phosphoproteins in the temporal aspects of striatal signal transduction. PMID:27584878

  4. Constraint treatment techniques and parallel algorithms for multibody dynamic analysis. Ph.D. Thesis

    Science.gov (United States)

    Chiou, Jin-Chern

    1990-01-01

    Computational procedures for kinematic and dynamic analysis of three-dimensional multibody dynamic (MBD) systems are developed from the differential-algebraic equations (DAE's) viewpoint. Constraint violations during the time integration process are minimized and penalty constraint stabilization techniques and partitioning schemes are developed. The governing equations of motion, a two-stage staggered explicit-implicit numerical algorithm, are treated which takes advantage of a partitioned solution procedure. A robust and parallelizable integration algorithm is developed. This algorithm uses a two-stage staggered central difference algorithm to integrate the translational coordinates and the angular velocities. The angular orientations of bodies in MBD systems are then obtained by using an implicit algorithm via the kinematic relationship between Euler parameters and angular velocities. It is shown that the combination of the present solution procedures yields a computationally more accurate solution. To speed up the computational procedures, parallel implementation of the present constraint treatment techniques, the two-stage staggered explicit-implicit numerical algorithm was efficiently carried out. The DAE's and the constraint treatment techniques were transformed into arrowhead matrices to which Schur complement form was derived. By fully exploiting the sparse matrix structural analysis techniques, a parallel preconditioned conjugate gradient numerical algorithm is used to solve the systems equations written in Schur complement form. A software testbed was designed and implemented in both sequential and parallel computers. This testbed was used to demonstrate the robustness and efficiency of the constraint treatment techniques, the accuracy of the two-stage staggered explicit-implicit numerical algorithm, and the speed up of the Schur-complement-based parallel preconditioned conjugate gradient algorithm on a parallel computer.

  5. Next-generation nozzle check valve significantly reduces operating costs

    Energy Technology Data Exchange (ETDEWEB)

    Roorda, O. [SMX International, Toronto, ON (Canada)

    2009-01-15

    Check valves perform an important function in preventing reverse flow and protecting plant and mechanical equipment. However, the variety of different types of valves and extreme differences in performance even within one type can change maintenance requirements and life cycle costs, amounting to millions of dollars over the typical 15-year design life of piping components. A next-generation non-slam nozzle check valve which prevents return flow has greatly reduced operating costs by protecting the mechanical equipment in a piping system. This article described the check valve varieties such as the swing check valve, a dual-plate check valve, and nozzle check valves. Advancements in optimized design of a non-slam nozzle check valve were also discussed, with particular reference to computer flow modelling such as computational fluid dynamics; computer stress modelling such as finite element analysis; and flow testing (using rapid prototype development and flow loop testing), both to improve dynamic performance and reduce hydraulic losses. The benefits of maximized dynamic performance and minimized pressure loss from the new designed valve were also outlined. It was concluded that this latest non-slam nozzle check valve design has potential applications in natural gas, liquefied natural gas, and oil pipelines, including subsea applications, as well as refineries, and petrochemical plants among others, and is suitable for horizontal and vertical installation. The result of this next-generation nozzle check valve design is not only superior performance, and effective protection of mechanical equipment but also minimized life cycle costs. 1 fig.

  6. Principle and opening-closing character analysis of DC check valve

    International Nuclear Information System (INIS)

    Han Xu; Zhou Yu

    2006-01-01

    When the behaviour of main pump in PWR power plant change, as a result of arresting fluid countercurrent current by check valve, water hammer phenomena met occur more or less in loop. Serious water hammer not only met brought incident of over pressure, imperil pressure boundary, but also may engender check valve lapse. DC check valve is a kind of new theory check valve, is designed to avoid serious water hammer phenomena at tradition check valve closing, the analyses and experiment indicate that DC check valve can availably solve water hammer problem in the loop, and be able to reliably prevent fluid countercurrent. (authors)

  7. LHC constraints on Yukawa unification in SO(10)

    Energy Technology Data Exchange (ETDEWEB)

    Badziak, Marcin [Cambridge Univ. (United Kingdom). Centre for Mathematical Sciences; Cambridge Univ. (United Kingdom). Cavendish Lab.; Sakurai, Kazuki [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2011-12-15

    LHC constraints on the recently proposed SUSY SO(10) GUT model with top-bottom-tau Yukawa uni cation are investigated. In this model, various phenomenological constraints are in concord with Yukawa uni cation thanks to the negative sign of {mu}, D-term splitting in the soft scalar masses and non-universal gaugino masses generated by non-zero F-term in a 24-dimensional representation of SU(5) is contained in SO(10). After discussing the impact of the CP-odd Higgs boson mass bound on this model, we provide a detailed analysis of the recent direct SUSY searches performed by ATLAS and investigate the constraints on this SO(10) model. At 95% confidence level, the lower limit on the gluino mass is found at 675 GeV. Assuming an integrated luminosity of 10 fb{sup -1}, this bound may be extended to 1.1 TeV if the right-handed down squark is lighter than about 1 TeV. (orig.)

  8. Partial-order reduction for GPU model checking

    NARCIS (Netherlands)

    Neele, T.S.; Wijs, A.J.; Bošnački, D.; van de Pol, J.C.

    2016-01-01

    Model checking using GPUs has seen increased popularity over the last years. Because GPUs have a limited amount of memory, only small to medium-sized systems can be verified. For on-the-fly explicitstate model checking, we improve memory efficiency by applying partialorder reduction. We propose

  9. 40 CFR 89.317 - NOX converter check.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false NOX converter check. 89.317 Section 89.317 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED..., the chemiluminescent oxides of nitrogen analyzer shall be checked for NO2 to NO converter efficiency...

  10. A Hybrid Programming Framework for Modeling and Solving Constraint Satisfaction and Optimization Problems

    Directory of Open Access Journals (Sweden)

    Paweł Sitek

    2016-01-01

    Full Text Available This paper proposes a hybrid programming framework for modeling and solving of constraint satisfaction problems (CSPs and constraint optimization problems (COPs. Two paradigms, CLP (constraint logic programming and MP (mathematical programming, are integrated in the framework. The integration is supplemented with the original method of problem transformation, used in the framework as a presolving method. The transformation substantially reduces the feasible solution space. The framework automatically generates CSP and COP models based on current values of data instances, questions asked by a user, and set of predicates and facts of the problem being modeled, which altogether constitute a knowledge database for the given problem. This dynamic generation of dedicated models, based on the knowledge base, together with the parameters changing externally, for example, the user’s questions, is the implementation of the autonomous search concept. The models are solved using the internal or external solvers integrated with the framework. The architecture of the framework as well as its implementation outline is also included in the paper. The effectiveness of the framework regarding the modeling and solution search is assessed through the illustrative examples relating to scheduling problems with additional constrained resources.

  11. Beyond mechanistic interaction: Value-based constraints on meaning in language

    Directory of Open Access Journals (Sweden)

    Joanna eRączaszek-Leonardi

    2015-10-01

    Full Text Available According to situated, embodied, distributed approaches to cognition, language is a crucial means for structuring social interactions. Recent approaches that emphasize the coordinative function of language treat language as a system of replicable constraints that work both on individuals and on interactions. In this paper we argue that the integration of replicable constraints approach to language with the ecological view on values allows for a deeper insight into processes of meaning creation in interaction. Such synthesis of these frameworks draws attention to important sources of structuring interactions beyond the sheer efficiency of a collective system in its current task situation. Most importantly the workings of linguistic constraints will be shown as embedded in more general fields of values, which are realized on multiple time-scales. Since the ontogenetic timescale offers a convenient window into a process of the emergence of linguistic constraints, we present illustrations of concrete mechanisms through which values may become embodied in language use in development.

  12. Beyond mechanistic interaction: value-based constraints on meaning in language.

    Science.gov (United States)

    Rączaszek-Leonardi, Joanna; Nomikou, Iris

    2015-01-01

    According to situated, embodied, and distributed approaches to cognition, language is a crucial means for structuring social interactions. Recent approaches that emphasize this coordinative function treat language as a system of replicable constraints on individual and interactive dynamics. In this paper, we argue that the integration of the replicable-constraints approach to language with the ecological view on values allows for a deeper insight into processes of meaning creation in interaction. Such a synthesis of these frameworks draws attention to important sources of structuring interactions beyond the sheer efficiency of a collective system in its current task situation. Most importantly, the workings of linguistic constraints will be shown as embedded in more general fields of values, which are realized on multiple timescales. Because the ontogenetic timescale offers a convenient window into the emergence of linguistic constraints, we present illustrations of concrete mechanisms through which values may become embodied in language use in development.

  13. Assessment of check-dam groundwater recharge with water-balance calculations

    Science.gov (United States)

    Djuma, Hakan; Bruggeman, Adriana; Camera, Corrado; Eliades, Marinos

    2017-04-01

    Studies on the enhancement of groundwater recharge by check-dams in arid and semi-arid environments mainly focus on deriving water infiltration rates from the check-dam ponding areas. This is usually achieved by applying simple water balance models, more advanced models (e.g., two dimensional groundwater models) and field tests (e.g., infiltrometer test or soil pit tests). Recharge behind the check-dam can be affected by the built-up of sediment as a result of erosion in the upstream watershed area. This natural process can increase the uncertainty in the estimates of the recharged water volume, especially for water balance calculations. Few water balance field studies of individual check-dams have been presented in the literature and none of them presented associated uncertainties of their estimates. The objectives of this study are i) to assess the effect of a check-dam on groundwater recharge from an ephemeral river; and ii) to assess annual sedimentation at the check-dam during a 4-year period. The study was conducted on a check-dam in the semi-arid island of Cyprus. Field campaigns were carried out to measure water flow, water depth and check-dam topography in order to establish check-dam water height, volume, evaporation, outflow and recharge relations. Topographic surveys were repeated at the end of consecutive hydrological years to estimate the sediment built up in the reservoir area of the check dam. Also, sediment samples were collected from the check-dam reservoir area for bulk-density analyses. To quantify the groundwater recharge, a water balance model was applied at two locations: at the check-dam and corresponding reservoir area, and at a 4-km stretch of the river bed without check-dam. Results showed that a check-dam with a storage capacity of 25,000 m3 was able to recharge to the aquifer, in four years, a total of 12 million m3 out of the 42 million m3 of measured (or modelled) streamflow. Recharge from the analyzed 4-km long river section without

  14. Constraint map for landfill site selection in Akure Metropolis ...

    African Journals Online (AJOL)

    An integration of remote sensing, soil type, geological, geoelectrical, hydrogeological and geotechnical data was carried out in a GIS environment with a view to developing a constraint map for the location of landfill (waste disposal) site(s) in Akure, Metropolis.. Geomorphological features identified from satellite images ...

  15. AUTOMATED HOTEL CHECK-IN SERTA DAMPAKNYA PADA TENAGA KERJA LOKAL

    Directory of Open Access Journals (Sweden)

    Ni Gusti Nyoman Suci Murni

    2017-10-01

    Full Text Available The tourism sector is one of the most heavily influenced sectors of information technology. Hotels that are a component of tourism cannot be separated from these influences, especially in information services, room reservations, check-in / check-out service, and other services. With the sophistication of information technology, everyone can access any information, from anywhere; at a very cheap price even every country provides free facilities for that purpose. This study uses qualitative methods where the data source obtained by looking for some libraries related to self check-in. The results show that there are some differences that applied between the check-in manual and self check-in, and the impact caused by the application of self check-in. The positive impact of self check-in are speeding up the check-in process, saving payrolls, simplifying services, simplifying reporting, and saving time. While the negative impacts such as reducing employment in developing countries, reducing social communication / human touch, reducing the understanding of cross cultural understanding, allowing the occurrence of crime (cyber crime as well as very expensive initial cost.

  16. SPEED ROLLER STAND MEASUREMENT SYSTEM CHECKING TECHNIQUE

    Directory of Open Access Journals (Sweden)

    Y. Zybtsev

    2011-01-01

    Full Text Available The study has shown that the accuracy of brakes checking by inertial stands depends upon the applied methods of measurement of braking parameters (stand slowing down, braking distance, brakes triggering time, current speed as well as the methods of metrological checking of measuring system canals.

  17. Partial-Order Reduction for GPU Model Checking

    NARCIS (Netherlands)

    Neele, T.; Wijs, A.; Bosnacki, D.; van de Pol, Jan Cornelis; Artho, C; Legay, A.; Peled, D.

    2016-01-01

    Model checking using GPUs has seen increased popularity over the last years. Because GPUs have a limited amount of memory, only small to medium-sized systems can be verified. For on-the-fly explicit-state model checking, we improve memory efficiency by applying partial-order reduction. We propose

  18. Check Verbraucherpolitik und Verbraucherbeteiligung

    DEFF Research Database (Denmark)

    Hagen, Kornelia; Micklitz, Hans-W.; Oehler, Andreas

    2013-01-01

    The paper discusses the opportunities for an empirically grounded decision support system as an instrument for independent and scientifically based consumer policy consulting. To date, consumer policy is dominated by the information paradigm and the leitbild of the rational, sovereign...... and information-seeking consumer. Yet, both everyday practice and research in behavioural economics show that this view lacks empirical ground. In fact, there are different consumer types and different forms of rationalities at work. Effective consumer policy making should be based on the empirically revealed...... an empirically based “Check Consumer Policy and Consumer Participation” as a systematic decision and evaluation tool for policy makers. This check should be independent from the government and should be grounded on an empirical view of the consumer. Consumer policy tools should be tested with real consumers...

  19. Verification of communication protocols in web services model-checking service compositions

    CERN Document Server

    Tari, Zahir; Mukherjee, Anshuman

    2014-01-01

    Gathers recent advancements in the field of self-organizing wireless sensor networks and provides readers with the essential, state-of-the-art information about sensor networking. In the near future, wireless sensor networks will become an integral part of our day-to-day life. To solve different sensor networking related issues, researchers have put a great deal of effort into coming up with innovative ideas. Verification of Communication Protocols in Web Services: Model-Checking Service Compositions gathers recent advancements in the field of self-organizing wireless sensor networks and provides readers with integral information about sensor networking. It introduces current technological trends, particularly in node organization, and provides implementation details of each networking type to help readers set up sensor networks in their related job fields. In addition, it identifies the limitations of current technologies, as well as future research directions.

  20. 40 CFR 86.327-79 - Quench checks; NOX analyzer.

    Science.gov (United States)

    2010-07-01

    ... any flow rate into the reaction chamber. This includes, but is not limited to, sample capillary, ozone... Quench checks; NOX analyzer. (a) Perform the reaction chamber quench check for each model of high vacuum reaction chamber analyzer prior to initial use. (b) Perform the reaction chamber quench check for each new...

  1. NRC valve performance test program - check valve testing

    International Nuclear Information System (INIS)

    Jeanmougin, N.M.

    1987-01-01

    The Valve Performance Test Program addresses the current requirements for testing of pressure isolation valves (PIVs) in light water reactors. Leak rate monitoring is the current method used by operating commercial power plants to survey the condition of their PIVs. ETEC testing of three check valves (4-inch, 6-inch, and 12-inch nominal diameters) indicates that leak rate testing is not a reliable method for detecting impending valve failure. Acoustic emission monitoring of check valves shows promise as a method of detecting loosened internals damage. Future efforts will focus on evaluation of acoustic emission monitoring as a technique for determining check valve condition. Three gate valves also will be tested to evaluate whether the check valve results are applicable to gate type PIVs

  2. Electrical constraints on electronic components: syntheses of the ETTC'97 and RADECS 97 congress activities

    International Nuclear Information System (INIS)

    Carel, Ch.

    1998-01-01

    The electromagnetic compatibility (EMC) of systems and their hardening against electromagnetic (IEMN, lightning, strong radio and radar fields..) and radiative environments impose severe manufacturing constraints in competition with other functional constraints, like thermal constraints and weight, and operational constraints (maintenance, availability). This paper is a summary of the main topics discussed during the ETTC and RADECS 1997 congresses. The outstanding facts concern: the non-disturbance of components (hyper-frequency EMC and high fields), the non-destruction of components (hardening against electromagnetic pulses), the civil domain, the numerical simulations, the integrity of electronic card signals, and the reliability of components. (J.S.)

  3. 12 CFR 229.36 - Presentment and issuance of checks.

    Science.gov (United States)

    2010-01-01

    ... Section 229.36 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM AVAILABILITY OF FUNDS AND COLLECTION OF CHECKS (REGULATION CC) Collection of Checks § 229... on the check, whether in magnetic ink or in fractional form; (3) At any branch or head office, if the...

  4. FIZCON, ENDF/B Cross-Sections Redundancy Check

    International Nuclear Information System (INIS)

    Dunford, Charles L.

    2007-01-01

    1 - Description of program or function: FIZCON is a program for checking that an evaluated data file has valid data and conforms to recommended procedures. Version 7.01 (April 2005): set success flag after return from beginning; fixed valid level check for an isomer; fixed subsection energy range test in ckf9; changed lower limit on potential scattering test; fixed error in j-value test when l=0 and i=0; added one more significant figure to union grid check and sum up output messages; partial fission cross sections mt=19,20,21 and 38 did not require secondary energy distributions in file 5; corrected product test for elastic scattering; moved potential scattering test to psyche. Version 7.02 (May 2005): Fixed resonance parameter sum test. 2 - Method of solution: FIZCON can recognise the difference between ENDF-6 and ENDF-5 formats and performs its tests accordingly. Some of the tests performed include: data arrays are in increasing energy order; resonance parameter widths add up to the total; Q-values are reasonable and consistent; no required sections are missing and all cover the proper energy range; secondary distributions are normalized to 1.0; energy conservation in decay spectra. Optional tests can be performed to check the redundant cross sections, and algorithms can be used to check for possible incorrect entry of data values (Deviant Point test)

  5. [Memory Checking Tests].

    Science.gov (United States)

    Hart, Joseph T.

    Two basic tests for checking memory skills are included in these appendices. The first, the General Information Test, uses the same 150 items for each of its two versions. One version is a completion-type test which measures recall by requiring the examinee to supply a specific response. The other version supplements each of the 150 items with…

  6. Check Sample Abstracts.

    Science.gov (United States)

    Alter, David; Grenache, David G; Bosler, David S; Karcher, Raymond E; Nichols, James; Rajadhyaksha, Aparna; Camelo-Piragua, Sandra; Rauch, Carol; Huddleston, Brent J; Frank, Elizabeth L; Sluss, Patrick M; Lewandrowski, Kent; Eichhorn, John H; Hall, Janet E; Rahman, Saud S; McPherson, Richard A; Kiechle, Frederick L; Hammett-Stabler, Catherine; Pierce, Kristin A; Kloehn, Erica A; Thomas, Patricia A; Walts, Ann E; Madan, Rashna; Schlesinger, Kathie; Nawgiri, Ranjana; Bhutani, Manoop; Kanber, Yonca; Abati, Andrea; Atkins, Kristen A; Farrar, Robert; Gopez, Evelyn Valencerina; Jhala, Darshana; Griffin, Sonya; Jhala, Khushboo; Jhala, Nirag; Bentz, Joel S; Emerson, Lyska; Chadwick, Barbara E; Barroeta, Julieta E; Baloch, Zubair W; Collins, Brian T; Middleton, Owen L; Davis, Gregory G; Haden-Pinneri, Kathryn; Chu, Albert Y; Keylock, Joren B; Ramoso, Robert; Thoene, Cynthia A; Stewart, Donna; Pierce, Arand; Barry, Michelle; Aljinovic, Nika; Gardner, David L; Barry, Michelle; Shields, Lisa B E; Arnold, Jack; Stewart, Donna; Martin, Erica L; Rakow, Rex J; Paddock, Christopher; Zaki, Sherif R; Prahlow, Joseph A; Stewart, Donna; Shields, Lisa B E; Rolf, Cristin M; Falzon, Andrew L; Hudacki, Rachel; Mazzella, Fermina M; Bethel, Melissa; Zarrin-Khameh, Neda; Gresik, M Vicky; Gill, Ryan; Karlon, William; Etzell, Joan; Deftos, Michael; Karlon, William J; Etzell, Joan E; Wang, Endi; Lu, Chuanyi M; Manion, Elizabeth; Rosenthal, Nancy; Wang, Endi; Lu, Chuanyi M; Tang, Patrick; Petric, Martin; Schade, Andrew E; Hall, Geraldine S; Oethinger, Margret; Hall, Geraldine; Picton, Avis R; Hoang, Linda; Imperial, Miguel Ranoa; Kibsey, Pamela; Waites, Ken; Duffy, Lynn; Hall, Geraldine S; Salangsang, Jo-Anne M; Bravo, Lulette Tricia C; Oethinger, Margaret D; Veras, Emanuela; Silva, Elvia; Vicens, Jimena; Silva, Elvio; Keylock, Joren; Hempel, James; Rushing, Elizabeth; Posligua, Lorena E; Deavers, Michael T; Nash, Jason W; Basturk, Olca; Perle, Mary Ann; Greco, Alba; Lee, Peng; Maru, Dipen; Weydert, Jamie Allen; Stevens, Todd M; Brownlee, Noel A; Kemper, April E; Williams, H James; Oliverio, Brock J; Al-Agha, Osama M; Eskue, Kyle L; Newlands, Shawn D; Eltorky, Mahmoud A; Puri, Puja K; Royer, Michael C; Rush, Walter L; Tavora, Fabio; Galvin, Jeffrey R; Franks, Teri J; Carter, James Elliot; Kahn, Andrea Graciela; Lozada Muñoz, Luis R; Houghton, Dan; Land, Kevin J; Nester, Theresa; Gildea, Jacob; Lefkowitz, Jerry; Lacount, Rachel A; Thompson, Hannis W; Refaai, Majed A; Quillen, Karen; Lopez, Ana Ortega; Goldfinger, Dennis; Muram, Talia; Thompson, Hannis

    2009-02-01

    The following abstracts are compiled from Check Sample exercises published in 2008. These peer-reviewed case studies assist laboratory professionals with continuing medical education and are developed in the areas of clinical chemistry, cytopathology, forensic pathology, hematology, microbiology, surgical pathology, and transfusion medicine. Abstracts for all exercises published in the program will appear annually in AJCP.

  7. Implementing Model-Check for Employee and Management Satisfaction

    Science.gov (United States)

    Jones, Corey; LaPha, Steven

    2013-01-01

    This presentation will discuss methods to which ModelCheck can be implemented to not only improve model quality, but also satisfy both employees and management through different sets of quality checks. This approach allows a standard set of modeling practices to be upheld throughout a company, with minimal interaction required by the end user. The presenter will demonstrate how to create multiple ModelCheck standards, preventing users from evading the system, and how it can improve the quality of drawings and models.

  8. Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment

    Directory of Open Access Journals (Sweden)

    Jian Mao

    2017-01-01

    Full Text Available With the increasing demand for ubiquitous connectivity, wireless technology has significantly improved our daily lives. Meanwhile, together with cloud-computing technology (e.g., cloud storage services and big data processing, new wireless networking technology becomes the foundation infrastructure of emerging communication networks. Particularly, cloud storage has been widely used in services, such as data outsourcing and resource sharing, among the heterogeneous wireless environments because of its convenience, low cost, and flexibility. However, users/clients lose the physical control of their data after outsourcing. Consequently, ensuring the integrity of the outsourced data becomes an important security requirement of cloud storage applications. In this paper, we present Co-Check, a collaborative multicloud data integrity audition scheme, which is based on BLS (Boneh-Lynn-Shacham signature and homomorphic tags. According to the proposed scheme, clients can audit their outsourced data in a one-round challenge-response interaction with low performance overhead. Our scheme also supports dynamic data maintenance. The theoretical analysis and experiment results illustrate that our scheme is provably secure and efficient.

  9. The criticality check and its applicability for nuclear material accounting

    International Nuclear Information System (INIS)

    Sanchez Espinoza, V.H.; Adam, E.; Knorr, J.

    1988-01-01

    Different procedures are used by the realization of nuclear material check by the IAEA. The criticality check belongs to these methods and it appropriates especially to verification of the nuclear material inventory of reactors. General aspects of the applicability of this check procedure are formulated and application criteria are deduced. By the example of solid-moderated homogeneous zero-power reactors it is demonstrated the unsecurity which is to be reckoned by applying the criticality check. Finally a possibility for the reduction of errors in core material determination by additional measuring methods without questioning the criticality check method is presented. (author)

  10. Calibration and check light source

    Energy Technology Data Exchange (ETDEWEB)

    Nejedla, B; Krotil, J

    1979-02-15

    The light source is designed for calibrating photomultipliers and checking the function of the thermoluminescent dosemeters evaluation equipment. The check light source consists of a polymer material-based (polyvinyl toluene) plastic scintillator and a 2-phenyl-5-(4-bisphenyl)-1,3,4-oxadiazol and/or paraterphenyl activator, and of emission spectrum shifters for response in the green and the blue light regions. The plastic scintillator is sealed in a case to whose bottom a radiation source is fixed, such as a /sup 90/Sr-/sup 90/Y source of an activity of 1.85x10/sup 3/s/sup -1/ to 0.74x10/sup 9/s/sup -1/.

  11. 26 CFR 301.6657-1 - Bad checks.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Bad checks. 301.6657-1 Section 301.6657-1... Additions to the Tax and Additional Amounts § 301.6657-1 Bad checks. (a) In general. Except as provided in... district director that it was tendered in good faith with reasonable cause to believe that it would be duly...

  12. Vertical pump with free floating check valve

    International Nuclear Information System (INIS)

    Lindsay, M.

    1980-01-01

    A vertical pump is described which has a bottom discharge with a free floating check valve disposed in the outlet plenum thereof. The free floating check valve comprises a spherical member with a hemispherical cage-like member attached thereto which is capable of allowing forward or reverse flow under appropriate conditions while preventing reverse flow under inappropriate conditions

  13. Consistency check of iron and sodium cross sections with integral benchmark experiments using a large amount of experimental information

    International Nuclear Information System (INIS)

    Baechle, R.-D.; Hehn, G.; Pfister, G.; Perlini, G.; Matthes, W.

    1984-01-01

    Single material benchmark experiments are designed to check neutron and gamma cross-sections of importance for deep penetration problems. At various penetration depths a large number of activation detectors and spectrometers are placed to measure the radiation field as completely as possible. The large amount of measured data in benchmark experiments can be evaluated best by the global detector concept applied to nuclear data adjustment. A new iteration procedure is presented for adjustment of a large number of multigroup cross sections, which has been implemented now in the modular adjustment code ADJUST-EUR. A theoretical test problem has been deviced to check the total program system with high precision. The method and code are going to be applied for validating the new European Data Files (JEF and EFF) in progress. (Auth.)

  14. STABILITAS CHECK DAM DI ARBORETUM DESA SUMBER BRANTAS

    Directory of Open Access Journals (Sweden)

    Endang Purwati

    2012-09-01

    Full Text Available Abstract: The stability of check-dam in arboretum of Sumber Brantas village. Sumber Brantas water sources area is arboretum territory which has to be maintained as conservation either for technical or vegetation (plants cover by sustainable development. Arboretum territory is made as asylum in irrigation system district of Brantas River. This research discusses technical conservation activity to build the check dam in conserving the area. Check dam is built dimensionally by using HEC-RAS Program to get safe and stable dimension for rolling, shifting and piping of Sf > 1.5, and based on hydrologic analysis to get maximum flood discharge of 48.01 m3second-1. Hydraulic analysis is used to get water level profile and pressure for the dam body. Stability of the structure will be controlled by construction load (weight of check dam and its fully sediment storage condition. The result of this research shows that the safe and stable dimension for check dam are as follows: 28 meter of width; 3 meter of main height; 1.5 meter of sub-height; 10 meter of stilling basin length (Main Dam–Sub Dam.

  15. Model Checking Temporal Logic Formulas Using Sticker Automata

    Science.gov (United States)

    Feng, Changwei; Wu, Huanmei

    2017-01-01

    As an important complex problem, the temporal logic model checking problem is still far from being fully resolved under the circumstance of DNA computing, especially Computation Tree Logic (CTL), Interval Temporal Logic (ITL), and Projection Temporal Logic (PTL), because there is still a lack of approaches for DNA model checking. To address this challenge, a model checking method is proposed for checking the basic formulas in the above three temporal logic types with DNA molecules. First, one-type single-stranded DNA molecules are employed to encode the Finite State Automaton (FSA) model of the given basic formula so that a sticker automaton is obtained. On the other hand, other single-stranded DNA molecules are employed to encode the given system model so that the input strings of the sticker automaton are obtained. Next, a series of biochemical reactions are conducted between the above two types of single-stranded DNA molecules. It can then be decided whether the system satisfies the formula or not. As a result, we have developed a DNA-based approach for checking all the basic formulas of CTL, ITL, and PTL. The simulated results demonstrate the effectiveness of the new method. PMID:29119114

  16. Deployment of check-in nodes in complex networks

    Science.gov (United States)

    Jiang, Zhong-Yuan; Ma, Jian-Feng

    2017-01-01

    In many real complex networks such as the city road networks and highway networks, vehicles often have to pass through some specially functioned nodes to receive check-in like services such as gas supplement at gas stations. Based on existing network structures, to guarantee every shortest path including at least a check-in node, the location selection of all check-in nodes is very essential and important to make vehicles to easily visit these check-in nodes, and it is still remains an open problem in complex network studies. In this work, we aim to find possible solutions for this problem. We first convert it into a set cover problem which is NP-complete and propose to employ the greedy algorithm to achieve an approximate result. Inspired by heuristic information of network structure, we discuss other four check-in node location deployment methods including high betweenness first (HBF), high degree first (HDF), random and low degree first (LDF). Finally, we compose extensive simulations in classical scale-free networks, random networks and real network models, and the results can well confirm the effectiveness of the greedy algorithm. This work has potential applications into many real networks.

  17. Robust Model Predictive Control Using Linear Matrix Inequalities for the Treatment of Asymmetric Output Constraints

    Directory of Open Access Journals (Sweden)

    Mariana Santos Matos Cavalca

    2012-01-01

    Full Text Available One of the main advantages of predictive control approaches is the capability of dealing explicitly with constraints on the manipulated and output variables. However, if the predictive control formulation does not consider model uncertainties, then the constraint satisfaction may be compromised. A solution for this inconvenience is to use robust model predictive control (RMPC strategies based on linear matrix inequalities (LMIs. However, LMI-based RMPC formulations typically consider only symmetric constraints. This paper proposes a method based on pseudoreferences to treat asymmetric output constraints in integrating SISO systems. Such technique guarantees robust constraint satisfaction and convergence of the state to the desired equilibrium point. A case study using numerical simulation indicates that satisfactory results can be achieved.

  18. Constraints Faced by Stakeholders under Agriculture Technology Management Agency (ATMA

    Directory of Open Access Journals (Sweden)

    J. Yoga Narasimhalu Naidu

    2017-09-01

    Full Text Available Agriculture Technology Management Agency (ATMA is a registered society in India with key stakeholders enmeshed with various agricultural activities for sustainable agricultural development in the state, with focus at district level. It is a hotbed for integrating research, extension and marketing activities and decentralizing day-to-day management of the public Agricultural Technology Development and Dissemination System. The present study was carried out in Andhra Pradesh state to explore the constraints faced by the extension functionaries at each level of decentralized management. Moreover, constraints perceived by the farmers with the support of ATMA in realizing their needs were also studied.

  19. The impact of gender on the assessment of body checking behavior.

    Science.gov (United States)

    Alfano, Lauren; Hildebrandt, Tom; Bannon, Katie; Walker, Catherine; Walton, Kate E

    2011-01-01

    Body checking includes any behavior aimed at global or specific evaluations of appearance characteristics. Men and women are believed to express these behaviors differently, possibly reflecting different socialization. However, there has been no empirical test of the impact of gender on body checking. A total of 1024 male and female college students completed two measures of body checking, the Body Checking Questionnaire and the Male Body Checking Questionnaire. Using multiple group confirmatory factor analysis, differential item functioning (DIF) was explored in a composite of these measures. Two global latent factors were identified (female and male body checking severity), and there were expected gender differences in these factors even after controlling for DIF. Ten items were found to be unbiased by gender and provide a suitable brief measure of body checking for mixed gender research. Practical applications for body checking assessment and theoretical implications are discussed. Copyright © 2010 Elsevier Ltd. All rights reserved.

  20. Compliance checking of data-aware and resource-aware compliance requirements

    NARCIS (Netherlands)

    Ramezani Taghiabadi, E.; Gromov, V.; Fahland, D.; Aalst, van der W.M.P.; Meersman, R.; Panetto, H.; Dillon, T.; Missikoff, M.; Liu, L.; Pastor, O.; Cuzzocrea, A.; Sllis, T.

    2014-01-01

    Compliance checking is gaining importance as today’s organizations need to show that their business practices are in accordance with predefined (legal) requirements. Current compliance checking techniques are mostly focused on checking the control-flow perspective of business processes. This paper

  1. Model-Based Integration and Interpretation of Data

    DEFF Research Database (Denmark)

    Petersen, Johannes

    2004-01-01

    Data integration and interpretation plays a crucial role in supervisory control. The paper defines a set of generic inference steps for the data integration and interpretation process based on a three-layer model of system representations. The three-layer model is used to clarify the combination...... of constraint and object-centered representations of the work domain throwing new light on the basic principles underlying the data integration and interpretation process of Rasmussen's abstraction hierarchy as well as other model-based approaches combining constraint and object-centered representations. Based...

  2. Constraint-based reachability

    Directory of Open Access Journals (Sweden)

    Arnaud Gotlieb

    2013-02-01

    Full Text Available Iterative imperative programs can be considered as infinite-state systems computing over possibly unbounded domains. Studying reachability in these systems is challenging as it requires to deal with an infinite number of states with standard backward or forward exploration strategies. An approach that we call Constraint-based reachability, is proposed to address reachability problems by exploring program states using a constraint model of the whole program. The keypoint of the approach is to interpret imperative constructions such as conditionals, loops, array and memory manipulations with the fundamental notion of constraint over a computational domain. By combining constraint filtering and abstraction techniques, Constraint-based reachability is able to solve reachability problems which are usually outside the scope of backward or forward exploration strategies. This paper proposes an interpretation of classical filtering consistencies used in Constraint Programming as abstract domain computations, and shows how this approach can be used to produce a constraint solver that efficiently generates solutions for reachability problems that are unsolvable by other approaches.

  3. Constraint-Muse: A Soft-Constraint Based System for Music Therapy

    Science.gov (United States)

    Hölzl, Matthias; Denker, Grit; Meier, Max; Wirsing, Martin

    Monoidal soft constraints are a versatile formalism for specifying and solving multi-criteria optimization problems with dynamically changing user preferences. We have developed a prototype tool for interactive music creation, called Constraint Muse, that uses monoidal soft constraints to ensure that a dynamically generated melody harmonizes with input from other sources. Constraint Muse provides an easy to use interface based on Nintendo Wii controllers and is intended to be used in music therapy for people with Parkinson’s disease and for children with high-functioning autism or Asperger’s syndrome.

  4. UK Department of Environment Quality Checking Laboratory

    International Nuclear Information System (INIS)

    Burgoyne, K.E.; Green, T.H.; Maxwell, D.J.; Smith, D.L.G.

    1990-01-01

    The purpose of Taywood Engineering Ltd was to develop and evaluate techniques for the non-destructive and destructive examination of both low and intermediate level radioactive waste packages. The contract also included a study on the conceptual design and cost of a permanent Waste Quality Checking facility. The June 1986 contract was completed in November 1989. A second contract was awarded in September 1989 to extend the scope to include Quality Checking of hazardous waste and to increase the throughput of low level waste. This paper highlights the techniques developed during these programmes and applied to a range of real low level waste packages. The feasibility of operating a pilot scale facility for the independent Quality Checking of LLW has been successfully demonstrated. (orig.)

  5. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  6. COMMON AGRICULTURAL POLICY FROM HEALTH CHECK DECISIONS TO THE POST-2013 REFORM

    Directory of Open Access Journals (Sweden)

    Niculescu Oana Marilena

    2011-07-01

    Full Text Available The paper proposed for being presented belongs to the field research International Affairs and European Integration. The paper entitled Common Agricultural Policy from Health Check decisions to the post-2013 reform aims to analyze the Common Agricultural Policy (CAP from the Health Check adoption in November 2008 to a new reform post-2013. The objectives of the paper are the presentation of the Health Check with its advantages and disadvantages as well as the analysis of the opportunity of a new European policy and its reforming having in view that the analysis of Health Check condition was considered a compromise. The paper is related to the internal and international research consisting in several books, studies, documents that analyze the particularities of the most debated, controversial and reformed EU policy. A personal study is represented by the first report within the PhD paper called The reform of CAP and its implications for Romanias agriculture(coordinator prof. Gheorghe Hurduzeu PhD, Academy of Economic Studies Bucharest, Faculty of International Business, research studies in the period 2009-2012. The research methodology used consists in collecting and analysis data from national and international publications, their validation, followed by a dissemination of the results in order to express a personal opinion regarding CAP and its reform. The results of the research consist in proving the opportunity of a new reform due to the fact that Health Check belongs already to the past. The paper belongs to the field research mentioned, in the attempt to prove the opportunity of building a new EU agricultural policy. The challenges CAP is facing are: food safety, environmental and climate changes, territorial balance as well as new challenges-improving sustainable management of natural resources, maintaining competitiveness in the context of globalization growth, strengthening EU cohesion in rural areas, increasing the support of CAP for

  7. Model-based control strategies for systems with constraints of the program type

    Science.gov (United States)

    Jarzębowska, Elżbieta

    2006-08-01

    The paper presents a model-based tracking control strategy for constrained mechanical systems. Constraints we consider can be material and non-material ones referred to as program constraints. The program constraint equations represent tasks put upon system motions and they can be differential equations of orders higher than one or two, and be non-integrable. The tracking control strategy relies upon two dynamic models: a reference model, which is a dynamic model of a system with arbitrary order differential constraints and a dynamic control model. The reference model serves as a motion planner, which generates inputs to the dynamic control model. It is based upon a generalized program motion equations (GPME) method. The method enables to combine material and program constraints and merge them both into the motion equations. Lagrange's equations with multipliers are the peculiar case of the GPME, since they can be applied to systems with constraints of first orders. Our tracking strategy referred to as a model reference program motion tracking control strategy enables tracking of any program motion predefined by the program constraints. It extends the "trajectory tracking" to the "program motion tracking". We also demonstrate that our tracking strategy can be extended to a hybrid program motion/force tracking.

  8. A self-checking identification formula for radiation workers in India

    International Nuclear Information System (INIS)

    Srivastava, D.N.; Srivastava, M.K.; Gohel, Chetna; Kher, R.K.; Awari, J.M.; Joshi, V.D.

    1998-01-01

    Accurate monitoring of radiation exposure of workers in any nuclear installation, institution or laboratory handling radiation sources forms an integral part of the radiation protection programme. This requires a system of unique identification of each radiation worker. When the radiation monitoring service started in India in 1953, the first identification formula of six digits was allotted to each radiation worker. This formula remained in use till 1970. With more number of institutions coming up, in the due course a second identification formula of eight digits was introduced which was in use during the period 1971-1978. For better data processing, a third identification formula of the same number of digits was introduced in 1978 with specific information about the category and location of the institution. To account for increasing number of institutions, a fourth formula consisting of 10 digits was started in 1995 which is currently in use. However, none of these formulas contained personal information about the radiation worker. Moreover, they were not self-checking type. Self-checking ability is extremely important for the preparation of a systematic data base and error free flow of information. With these considerations, a new 14 digit self-checking formula is being proposed in this report. Besides being less prone to error, it gives information in respect of date of birth, sex, institution category, location etc.. It does not suffer from the problem of millennium at the turn of century. It has enough capacity to account for a large number of institutions of different categories that might come up in future, and very large number of radiation workers in each institution. The inclusion of date of birth in a suitable format makes the capacity of the system virtually limitless and perpetual. (author)

  9. Context-aware compliance checking

    NARCIS (Netherlands)

    Werf, van der J.M.E.M.; Verbeek, H.M.W.; Aalst, van der W.M.P.; Barros, A.; Gal, A.; Kindler, E.

    2012-01-01

    Organizations face more and more the burden to show that their business is compliant with respect to many different boundaries. The activity of compliance checking is commonly referred to as auditing. As information systems supporting the organization’s business record their usage, process mining

  10. Design Principles as a Guide for Constraint Based and Dynamic Modeling: Towards an Integrative Workflow

    Directory of Open Access Journals (Sweden)

    Christiana Sehr

    2015-10-01

    Full Text Available During the last 10 years, systems biology has matured from a fuzzy concept combining omics, mathematical modeling and computers into a scientific field on its own right. In spite of its incredible potential, the multilevel complexity of its objects of study makes it very difficult to establish a reliable connection between data and models. The great number of degrees of freedom often results in situations, where many different models can explain/fit all available datasets. This has resulted in a shift of paradigm from the initially dominant, maybe naive, idea of inferring the system out of a number of datasets to the application of different techniques that reduce the degrees of freedom before any data set is analyzed. There is a wide variety of techniques available, each of them can contribute a piece of the puzzle and include different kinds of experimental information. But the challenge that remains is their meaningful integration. Here we show some theoretical results that enable some of the main modeling approaches to be applied sequentially in a complementary manner, and how this workflow can benefit from evolutionary reasoning to keep the complexity of the problem in check. As a proof of concept, we show how the synergies between these modeling techniques can provide insight into some well studied problems: Ammonia assimilation in bacteria and an unbranched linear pathway with end-product inhibition.

  11. Design Principles as a Guide for Constraint Based and Dynamic Modeling: Towards an Integrative Workflow.

    Science.gov (United States)

    Sehr, Christiana; Kremling, Andreas; Marin-Sanguino, Alberto

    2015-10-16

    During the last 10 years, systems biology has matured from a fuzzy concept combining omics, mathematical modeling and computers into a scientific field on its own right. In spite of its incredible potential, the multilevel complexity of its objects of study makes it very difficult to establish a reliable connection between data and models. The great number of degrees of freedom often results in situations, where many different models can explain/fit all available datasets. This has resulted in a shift of paradigm from the initially dominant, maybe naive, idea of inferring the system out of a number of datasets to the application of different techniques that reduce the degrees of freedom before any data set is analyzed. There is a wide variety of techniques available, each of them can contribute a piece of the puzzle and include different kinds of experimental information. But the challenge that remains is their meaningful integration. Here we show some theoretical results that enable some of the main modeling approaches to be applied sequentially in a complementary manner, and how this workflow can benefit from evolutionary reasoning to keep the complexity of the problem in check. As a proof of concept, we show how the synergies between these modeling techniques can provide insight into some well studied problems: Ammonia assimilation in bacteria and an unbranched linear pathway with end-product inhibition.

  12. Get Your Kids Moving and Check Some Chores off Your List

    Science.gov (United States)

    ... Check Recipe Certification Program Nutrition Requirements Heart-Check Professional Resources Contact the Heart-Check Certification Program Simple Cooking and Recipes Dining Out Choosing a Restaurant Deciphering ...

  13. Consistency Checking of Web Service Contracts

    DEFF Research Database (Denmark)

    Cambronero, M. Emilia; Okika, Joseph C.; Ravn, Anders Peter

    2008-01-01

    Behavioural properties are analyzed for web service contracts formulated in Business Process Execution Language (BPEL) and Choreography Description Language (CDL). The key result reported is an automated technique to check consistency between protocol aspects of the contracts. The contracts...... are abstracted to (timed) automata and from there a simulation is set up, which is checked using automated tools for analyzing networks of finite state processes. Here we use the Concurrency Work Bench. The proposed techniques are illustrated with a case study that include otherwise difficult to analyze fault...

  14. Symmetries of integrable hierarchies and matrix model constraints

    International Nuclear Information System (INIS)

    Vos, K. de

    1992-01-01

    The orbit construction associates a soliton hierarchy to every level-one vertex realization of a simply laced affine Kac-Moody algebra g. We show that the τ-function of such a hierarchy has the (truncated) Virasoro algebra as an algebra of infinitesimal symmetry transformations. To prove this we use an appropriate bilinear form of these hierarchies together with the coset construction of conformal field theory. For A 1 (1) the orbit construction gives either the Toda or the KdV hierarchy. These both occur in the one-matrix model of two-dimensional quantum gravity, before and after the double scaling limit respectively. The truncated Virasoro symmetry algebra is exactly the algebra of constraints of the one-matrix model. The partition function of the one-matrix model is therefore an invariant τ-function. We also consider the case of A 1 (1) with l>1. Surprisingly, the symmetry algebra in that case is not simply a truncated Casimir algebra. It appears that again only the Virasoro symmetry survives. We speculate on the relation with multi-matrix models. (orig.)

  15. Checking BEBC superconducting magnet

    CERN Multimedia

    CERN PhotoLab

    1974-01-01

    The superconducting coils of the magnet for the 3.7 m Big European Bubble Chamber (BEBC) had to be checked, see Annual Report 1974, p. 60. The photo shows a dismantled pancake. By December 1974 the magnet reached again the field design value of 3.5 T.

  16. Quality checking of radioactive and hazardous waste

    International Nuclear Information System (INIS)

    Billington, D.M.; Burgoyne, S.M.J.; Dale, C.J.

    1992-01-01

    This report describes the work of the HMIP Waste Quality Checking Laboratory (WQCL) for the period September 1989 -August 1991. The WQCL has conducted research and development of procedures for the receipt, sampling and analysis of low level solid radioactive waste (LLW), intermediate level radioactive waste (ILW) and hazardous chemical waste (HW). Operational facilities have been commissioned for quality checking both LLW and HW. Waste quality checking has been completed on LLW packages seized from the UK waste disposal route by HMIP Inspectors. Packages have ranged in size from the 200 litre steel drum to half-height ISO freight container. Development work was continued on methods of sample extraction and radio-chemical analysis for cement encapsulated ILW in the form of magnox, graphite and stainless steel. This work was undertaken on non-radioactive simulants. (author)

  17. Model Checking Markov Reward Models with Impulse Rewards

    NARCIS (Netherlands)

    Cloth, Lucia; Katoen, Joost-Pieter; Khattri, Maneesh; Pulungan, Reza; Bondavalli, Andrea; Haverkort, Boudewijn; Tang, Dong

    This paper considers model checking of Markov reward models (MRMs), continuous-time Markov chains with state rewards as well as impulse rewards. The reward extension of the logic CSL (Continuous Stochastic Logic) is interpreted over such MRMs, and two numerical algorithms are provided to check the

  18. Checking Consistency of Pedigree Information is NP-complete

    DEFF Research Database (Denmark)

    Aceto, Luca; Hansen, Jens A.; Ingolfsdottir, Anna

    Consistency checking is a fundamental computational problem in genetics. Given a pedigree and information on the genotypes of some of the individuals in it, the aim of consistency checking is to determine whether these data are consistent with the classic Mendelian laws of inheritance. This probl...

  19. Strategic Planning through Model Checking of ATL Formulae

    NARCIS (Netherlands)

    Jamroga, W.J.; Rutkowski, L.; Siekmann, J.; Tadeusiewicz, R.; Zadeh, L.A.

    2004-01-01

    Model checking of temporal logic has already been proposed for automatic planning. In this paper, we introduce a simple adaptation of the ATL model checking algorithm that returns a strategy to achieve given goal. We point out that the algorithm generalizes minimaxing, and that ATL models generalize

  20. A periodic review integrated inventory model with controllable safety stock and setup cost under service level constraint and distribution-free demand

    Science.gov (United States)

    Kurdhi, N. A.; Jamaluddin, A.; Jauhari, W. A.; Saputro, D. R. S.

    2017-06-01

    In this study, we consider a stochastic integrated manufacturer-retailer inventory model with service level constraint. The model analyzed in this article considers the situation in which the vendor and the buyer establish a long-term contract and strategic partnership to jointly determine the best strategy. The lead time and setup cost are assumed can be controlled by an additional crashing cost and an investment, respectively. It is assumed that shortages are allowed and partially backlogged on the buyer’s side, and that the protection interval (i.e., review period plus lead time) demand distribution is unknown but has given finite first and second moments. The objective is to apply the minmax distribution free approach to simultaneously optimize the review period, the lead time, the setup cost, the safety factor, and the number of deliveries in order to minimize the joint total expected annual cost. The service level constraint guarantees that the service level requirement can be satisfied at the worst case. By constructing Lagrange function, the analysis regarding the solution procedure is conducted, and a solution algorithm is then developed. Moreover, a numerical example and sensitivity analysis are given to illustrate the proposed model and to provide some observations and managerial implications.

  1. First experiences with the LHC BLM sanity checks

    CERN Document Server

    Emery, J; Effinger, E; Nordt, A; Sapinski, M G; Zamantzas, C

    2010-01-01

    The reliability concerns have driven the design of the Large Hardron Collider (LHC) Beam Loss Monitoring (BLM) system from the early stage of the studies up to the present commissioning and the latest development of diagnostic tools. To protect the system against non-conformities, new ways of automatic checking have been developed and implemented. These checks are regularly and systematically executed by the LHC operation team to ensure that the system status is after each test "as good as new". The sanity checks are part of this strategy. They are testing the electrical part of the detectors (ionisation chamber or secondary emission detector), their cable connections to the front-end electronics, further connections to the back-end electronics and their ability to request a beam abort. During the installation and in the early commissioning phase, these checks have shown their ability to find also non-conformities caused by unexpected failure event scenarios. In every day operation, a non-conformity discovere...

  2. Review and analysis of check valve failure data

    International Nuclear Information System (INIS)

    Todd, M.D.; Casada, D.A.

    1992-01-01

    Check valve operating problems in recent years have resulted in significant operating transients, increased cost and decreased system availability. There has been, in response, additional attention given to check valves by utilities, as well as the US Nuclear Regulatory Commission and the American Society of Mechanical Engineers Operation and Maintenance Committee. All these organizations have the fundamental goal of ensuring reliable operation of check valves. A key ingredient to an engineering-oriented reliability improvement effort is a thorough understanding of relevant historical experience. Oak Ridge National Laboratory is currently conducting a detailed review of historical failure data available through the Institute of Nuclear Power Operation's Nuclear Plant Reliability Data System. The focus of the review is on check valve failures that have involved significant degradation of the valve internal parts. A variety of parameters are being considered during the review, including size, age, system of service, method of failure discovery, the affected valve parts, attributed causes, and corrective actions

  3. Integrated system for automated financial document processing

    Science.gov (United States)

    Hassanein, Khaled S.; Wesolkowski, Slawo; Higgins, Ray; Crabtree, Ralph; Peng, Antai

    1997-02-01

    A system was developed that integrates intelligent document analysis with multiple character/numeral recognition engines in order to achieve high accuracy automated financial document processing. In this system, images are accepted in both their grayscale and binary formats. A document analysis module starts by extracting essential features from the document to help identify its type (e.g. personal check, business check, etc.). These features are also utilized to conduct a full analysis of the image to determine the location of interesting zones such as the courtesy amount and the legal amount. These fields are then made available to several recognition knowledge sources such as courtesy amount recognition engines and legal amount recognition engines through a blackboard architecture. This architecture allows all the available knowledge sources to contribute incrementally and opportunistically to the solution of the given recognition query. Performance results on a test set of machine printed business checks using the integrated system are also reported.

  4. Muscle Recruitment and Coordination following Constraint-Induced Movement Therapy with Electrical Stimulation on Children with Hemiplegic Cerebral Palsy: A Randomized Controlled Trial.

    Directory of Open Access Journals (Sweden)

    Kaishou Xu

    Full Text Available To investigate changes of muscle recruitment and coordination following constraint-induced movement therapy, constraint-induced movement therapy plus electrical stimulation, and traditional occupational therapy in treating hand dysfunction.In a randomized, single-blind, controlled trial, children with hemiplegic cerebral palsy were randomly assigned to receive constraint-induced movement therapy (n = 22, constraint-induced movement therapy plus electrical stimulation (n = 23, or traditional occupational therapy (n = 23. Three groups received a 2-week hospital-based intervention and a 6-month home-based exercise program following hospital-based intervention. Constraint-induced movement therapy involved intensive functional training of the involved hand during which the uninvolved hand was constrained. Electrical stimulation was applied on wrist extensors of the involved hand. Traditional occupational therapy involved functional unimanual and bimanual training. All children underwent clinical assessments and surface electromyography (EMG at baseline, 2 weeks, 3 and 6 months after treatment. Surface myoelectric signals were integrated EMG, root mean square and cocontraction ratio. Clinical measures were grip strength and upper extremity functional test.Constraint-induced movement therapy plus electrical stimulation group showed both a greater rate of improvement in integrated EMG of the involved wrist extensors and cocontraction ratio compared to the other two groups at 3 and 6 months, as well as improving in root mean square of the involved wrist extensors than traditional occupational therapy group (p<0.05. Positive correlations were found between both upper extremity functional test scores and integrated EMG of the involved wrist as well as grip strength and integrated EMG of the involved wrist extensors (p<0.05.Constraint-induced movement therapy plus electrical stimulation is likely to produce the best outcome in improving muscle recruitment

  5. Reduction of Constraints: Applicability of the Homogeneity Constraint for Macrobatch 3

    International Nuclear Information System (INIS)

    Peeler, D.K.

    2001-01-01

    The Product Composition Control System (PCCS) is used to determine the acceptability of each batch of Defense Waste Processing Facility (DWPF) melter feed in the Slurry Mix Evaporator (SME). This control system imposes several constraints on the composition of the contents of the SME to define acceptability. These constraints relate process or product properties to composition via prediction models. A SME batch is deemed acceptable if its sample composition measurements lead to acceptable property predictions after accounting for modeling, measurement and analytic uncertainties. The baseline document guiding the use of these data and models is ''SME Acceptability Determination for DWPF Process Control (U)'' by Brown and Postles [1996]. A minimum of three PCCS constraints support the prediction of the glass durability from a given SME batch. The Savannah River Technology Center (SRTC) is reviewing all of the PCCS constraints associated with durability. The purpose of this review is to revisit these constraints in light of the additional knowledge gained since the beginning of radioactive operations at DWPF and to identify any supplemental studies needed to amplify this knowledge so that redundant or overly conservative constraints can be eliminated or replaced by more appropriate constraints

  6. Safety and Availability Checking for User Authorization Queries in RBAC

    Directory of Open Access Journals (Sweden)

    Jian-feng Lu

    2012-09-01

    Full Text Available This paper introduces the notion of safety and availability checking for user authorization query processing, and develop a recursive algorithm use the ideas from backtracking-based search techniques to search for the optimal solution. For the availability checking, we introduce the notion of max activatable set (MAS, and show formally how MAS can be determined in a hybrid role hierarchy. For the safety checking, we give a formal definition of dynamic separation-of-duty (DSoD policies, and show how to reduce the safety checking for DSoD to a SAT instance.

  7. The Activity Check of Brachytherapy Isotope

    International Nuclear Information System (INIS)

    Kim, Gun Oh; Lee, Byung Koo; Kwon, Young Ho

    2004-01-01

    An isotope Ir-192, which is used in brachytherapy depends on import in whole quantities. There are a few ways for its activity. measurement using Welltype chamber or the way to rely on authentic decay table of manufacturer. In-air dosimetry using Farmer Chamber, etc. In this paper, let me introduce the way using Farmer chamber which is easier and simple. With the Farmer chamber and source calibration jig, take a measurement the activity of an isotope Ir-192 and compare the value with the value from decay table of manufacturer and check the activity of source. The result of measurement, compared the value from decay table, by ±2.1. (which belongs to recommendable value for AAPM ±5% as difference of error range). It is possible to use on clinical medicine. With the increase in use of brachytherapy, the increase of import is essential. And an accurate activity check of source is compulsory. For the activity check of source, it was possible to use Farmer chamber and source calibration jig without additional purchase of Well type chamber.

  8. 31 CFR 211.1 - Withholding delivery of checks.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Withholding delivery of checks. 211.1 Section 211.1 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE DELIVERY OF CHECKS AND WARRANTS TO...

  9. Multi-Valued Modal Fixed Point Logics for Model Checking

    Science.gov (United States)

    Nishizawa, Koki

    In this paper, I will show how multi-valued logics are used for model checking. Model checking is an automatic technique to analyze correctness of hardware and software systems. A model checker is based on a temporal logic or a modal fixed point logic. That is to say, a system to be checked is formalized as a Kripke model, a property to be satisfied by the system is formalized as a temporal formula or a modal formula, and the model checker checks that the Kripke model satisfies the formula. Although most existing model checkers are based on 2-valued logics, recently new attempts have been made to extend the underlying logics of model checkers to multi-valued logics. I will summarize these new results.

  10. Estimated emission reductions from California's enhanced Smog Check program.

    Science.gov (United States)

    Singer, Brett C; Wenzel, Thomas P

    2003-06-01

    The U.S. Environmental Protection Agency requires that states evaluate the effectiveness of their vehicle emissions inspection and maintenance (I/M) programs. This study demonstrates an evaluation approach that estimates mass emission reductions over time and includes the effect of I/M on vehicle deterioration. It includes a quantitative assessment of benefits from pre-inspection maintenance and repairs and accounts for the selection bias effect that occurs when intermittent high emitters are tested. We report estimates of one-cycle emission benefits of California's Enhanced Smog Check program, ca. 1999. Program benefits equivalent to metric tons per day of prevented emissions were calculated with a "bottom-up" approach that combined average per vehicle reductions in mass emission rates (g/gal) with average per vehicle activity, resolved by model year. Accelerated simulation mode test data from the statewide vehicle information database (VID) and from roadside Smog Check testing were used to determine 2-yr emission profiles of vehicles passing through Smog Check and infer emission profiles that would occur without Smog Check. The number of vehicles participating in Smog Check was also determined from the VID. We estimate that in 1999 Smog Check reduced tailpipe emissions of HC, CO, and NO(x) by 97, 1690, and 81 t/d, respectively. These correspond to 26, 34, and 14% of the HC, CO, and NO(x) that would have been emitted by vehicles in the absence of Smog Check. These estimates are highly sensitive to assumptions about vehicle deterioration in the absence of Smog Check. Considering the estimated uncertainty in these assumptions yields a range for calculated benefits: 46-128 t/d of HC, 860-2200 t/d of CO, and 60-91 t/d of NO(x). Repair of vehicles that failed an initial, official Smog Check appears to be the most important mechanism of emission reductions, but pre-inspection maintenance and repair also contributed substantially. Benefits from removal of nonpassing

  11. Delivery quality assurance with ArcCHECK

    International Nuclear Information System (INIS)

    Neilson, Christopher; Klein, Michael; Barnett, Rob; Yartsev, Slav

    2013-01-01

    Radiation therapy requires delivery quality assurance (DQA) to ensure that treatment is accurate and closely follows the plan. We report our experience with the ArcCHECK phantom and investigate its potential optimization for the DQA process. One-hundred seventy DQA plans from 84 patients were studied. Plans were classified into 2 groups: those with the target situated on the diodes of the ArcCHECK (D plans) and those with the target situated at the center (C plans). Gamma pass rates for 8 target sites were examined. The parameters used to analyze the data included 3%/3 mm with the Van Dyk percent difference criteria (VD) on, 3%/3 mm with the VD off, 2%/2 mm with the VD on, and x/3 mm with the VD on and the percentage dosimetric agreement “x” for diode plans adjusted. D plans typically displayed maximum planned dose (MPD) on the cylindrical surface containing ArcCHECK diodes than center plans, resulting in inflated gamma pass rates. When this was taken into account by adjusting the percentage dosimetric agreement, C plans outperformed D plans by an average of 3.5%. ArcCHECK can streamline the DQA process, consuming less time and resources than radiographic films. It is unnecessary to generate 2 DQA plans for each patient; a single center plan will suffice. Six of 8 target sites consistently displayed pass rates well within our acceptance criteria; the lesser performance of head and neck and spinal sites can be attributed to marginally lower doses and increased high gradient of plans

  12. Assessment of diagnostic methods for determining degradation of check valves

    International Nuclear Information System (INIS)

    Haynes, H.D.; Farmer, W.S.

    1992-01-01

    The Oak Ridge National Laboratory (ORNL) has carried out a comprehensive aging assessment of check valves in support of the Nuclear Plant Aging Research (NPAR) program. This paper provides a summary of the ORNL check valve aging assessment with emphasis on the identification, evaluation, and application of check valve monitoring methods and techniques. Several check valve monitoring methods are described and compared. These methods include: acoustic emission monitoring, ultrasonic inspection, magnetic flux signature analysis (MFSA), external magnetics. These diagnostic technologies were shown to be useful in determining check valve condition (e.g., disc position, disc motion, and seat leakage), although none of the methods was by itself, successful in monitoring all three condition indicators. The combination of acoustic emission with either ultrasonics or one of the magnetic technologies, however, yields a monitoring system that succeeds in providing the sensitivity to detect all major check valve operating conditions. Other areas covered in the paper include descriptions of relevant regulatory issues, utility group activities, and interactions ORNL has had with outside organizations for the purpose of disseminating research results

  13. Radioactive check sources for alpha and beta sensitive radiological instrumentation

    International Nuclear Information System (INIS)

    Barnett, J.M.; Kane, J.E. II.

    1994-06-01

    Since 1991, the Westinghouse Hanford Company has examined the construction and use of alpha and beta radioactive check sources for calibrating instruments and for performing response checks of instruments used for operational and environmental radiation detection. The purpose of using a radioactive check source is to characterize the response of a radiation monitoring instrument in the presence of radioactivity. To accurately calibrate the instrument and check its response, the check source used must emulate as closely as possible the actual physical and isotopic conditions being monitored. The isotope employed and the physical methods used to fabricate the check source (among other factors) determine instrument response. Although information from applicable national and international standards, journal articles, books, and government documents was considered, empirical data collected is most valuable when considering the type of source to use for a particular application. This paper presents source construction methods, use considerations, and standard recommendations. The results of a Hanford Site evaluation of several types of alpha and beta sources are also given

  14. Double checking medicines: defence against error or contributory factor?

    Science.gov (United States)

    Armitage, Gerry

    2008-08-01

    The double checking of medicines in health care is a contestable procedure. It occupies an obvious position in health care practice and is understood to be an effective defence against medication error but the process is variable and the outcomes have not been exposed to testing. This paper presents an appraisal of the process using data from part of a larger study on the contributory factors in medication errors and their reporting. Previous research studies are reviewed; data are analysed from a review of 991 drug error reports and a subsequent series of 40 in-depth interviews with health professionals in an acute hospital in northern England. The incident reports showed that errors occurred despite double checking but that action taken did not appear to investigate the checking process. Most interview participants (34) talked extensively about double checking but believed the process to be inconsistent. Four key categories were apparent: deference to authority, reduction of responsibility, automatic processing and lack of time. Solutions to the problems were also offered, which are discussed with several recommendations. Double checking medicines should be a selective and systematic procedure informed by key principles and encompassing certain behaviours. Psychological research may be instructive in reducing checking errors but the aviation industry may also have a part to play in increasing error wisdom and reducing risk.

  15. Fault Tree Analysis with Temporal Gates and Model Checking Technique for Qualitative System Safety Analysis

    International Nuclear Information System (INIS)

    Koh, Kwang Yong; Seong, Poong Hyun

    2010-01-01

    Fault tree analysis (FTA) has suffered from several drawbacks such that it uses only static gates and hence can not capture dynamic behaviors of the complex system precisely, and it is in lack of rigorous semantics, and reasoning process which is to check whether basic events really cause top events is done manually and hence very labor-intensive and time-consuming for the complex systems while it has been one of the most widely used safety analysis technique in nuclear industry. Although several attempts have been made to overcome this problem, they can not still do absolute or actual time modeling because they adapt relative time concept and can capture only sequential behaviors of the system. In this work, to resolve the problems, FTA and model checking are integrated to provide formal, automated and qualitative assistance to informal and/or quantitative safety analysis. Our approach proposes to build a formal model of the system together with fault trees. We introduce several temporal gates based on timed computational tree logic (TCTL) to capture absolute time behaviors of the system and to give concrete semantics to fault tree gates to reduce errors during the analysis, and use model checking technique to automate the reasoning process of FTA

  16. Momentum constraint relaxation

    International Nuclear Information System (INIS)

    Marronetti, Pedro

    2006-01-01

    Full relativistic simulations in three dimensions invariably develop runaway modes that grow exponentially and are accompanied by violations of the Hamiltonian and momentum constraints. Recently, we introduced a numerical method (Hamiltonian relaxation) that greatly reduces the Hamiltonian constraint violation and helps improve the quality of the numerical model. We present here a method that controls the violation of the momentum constraint. The method is based on the addition of a longitudinal component to the traceless extrinsic curvature A ij -tilde, generated by a vector potential w i , as outlined by York. The components of w i are relaxed to solve approximately the momentum constraint equations, slowly pushing the evolution towards the space of solutions of the constraint equations. We test this method with simulations of binary neutron stars in circular orbits and show that it effectively controls the growth of the aforementioned violations. We also show that a full numerical enforcement of the constraints, as opposed to the gentle correction of the momentum relaxation scheme, results in the development of instabilities that stop the runs shortly

  17. Nordic congestion's arrangement as a model for Europe? Physical constraints vs. economic incentives

    International Nuclear Information System (INIS)

    Glachant, J.-M.; Pignon, V.

    2005-01-01

    Congestion on power grids seems a physical reality, a 'hard' fact easy to check. Our paper models a different idea: congestion signal may be distorted by transmission system operators (TSOs). Indeed, congestion signals are not physical data but 'home made' conventions directly set by the TSOs in charge of the security of the system. These security norms are not stable and invariable because lines capacity limits are not constant. TSOs, therefore, define the congestion signal on a variable, complex and non-transparent constraint and may manipulate it for monetary purposes or for other personal agenda. In Nordic countries the coexistence of two congestion management methods in a 'Light Handed Regulation' framework makes this opportunistic behaviour even more likely. (author)

  18. Body Covering and Body Image: A Comparison of Veiled and Unveiled Muslim Women, Christian Women, and Atheist Women Regarding Body Checking, Body Dissatisfaction, and Eating Disorder Symptoms.

    Science.gov (United States)

    Wilhelm, Leonie; Hartmann, Andrea S; Becker, Julia C; Kişi, Melahat; Waldorf, Manuel; Vocks, Silja

    2018-02-21

    Although Islam is the fastest growing religion worldwide, only few studies have investigated body image in Muslim women, and no study has investigated body checking. Therefore, the present study examined whether body image, body checking, and disordered eating differ between veiled and unveiled Muslim women, Christian women, and atheist women. While the groups did not differ regarding body dissatisfaction, unveiled Muslim women reported more checking than veiled Muslim and Christian women, and higher bulimia scores than Christian. Thus, prevention against eating disorders should integrate all women, irrespective of religious affiliation or veiling, with a particular focus on unveiled Muslim women.

  19. Related Fact Checks: a tool for combating fake news

    OpenAIRE

    Guha, Sreya

    2017-01-01

    The emergence of "Fake News" and misinformation via online news and social media has spurred an interest in computational tools to combat this phenomenon. In this paper we present a new "Related Fact Checks" service, which can help a reader critically evaluate an article and make a judgment on its veracity by bringing up fact checks that are relevant to the article. We describe the core technical problems that need to be solved in building a "Related Fact Checks" service, and present results ...

  20. Environmental constraints and call evolution in torrent-dwelling frogs.

    Science.gov (United States)

    Goutte, Sandra; Dubois, Alain; Howard, Samuel D; Marquez, Rafael; Rowley, Jodi J L; Dehling, J Maximilian; Grandcolas, Philippe; Rongchuan, Xiong; Legendre, Frédéric

    2016-04-01

    Although acoustic signals are important for communication in many taxa, signal propagation is affected by environmental properties. Strong environmental constraints should drive call evolution, favoring signals with greater transmission distance and content integrity in a given calling habitat. Yet, few empirical studies have verified this prediction, possibly due to a shortcoming in habitat characterization, which is often too broad. Here we assess the potential impact of environmental constraints on the evolution of advertisement call in four groups of torrent-dwelling frogs in the family Ranidae. We reconstruct the evolution of calling site preferences, both broadly categorized and at a finer scale, onto a phylogenetic tree for 148 species with five markers (∼3600 bp). We test models of evolution for six call traits for 79 species with regard to the reconstructed history of calling site preferences and estimate their ancestral states. We find that in spite of existing morphological constraints, vocalizations of torrent-dwelling species are most probably constrained by the acoustic specificities of torrent habitats and particularly their high level of ambient noise. We also show that a fine-scale characterization of calling sites allows a better perception of the impact of environmental constraints on call evolution. © 2016 The Author(s). Evolution © 2016 The Society for the Study of Evolution.

  1. Check-up Measurement (update). Deliverable D5.22

    NARCIS (Netherlands)

    Holtzer, A.C.G.; Giessen, A.M.D. van der; Djurica, M.

    2015-01-01

    This deliverable D5.22 presents the GEN6 check-up measurement. It describes the most prominent outcomes of the GEN6 project up to this point in time. The check-up measurement helps to focus the monitoring towards the most relevant achievements of the project, such that an efficient and well-targeted

  2. Treasury Check Verification Query (TCVQ)

    Data.gov (United States)

    Social Security Administration — The TCVQ system determines the SSN of an individual whose check has been returned to a local field office. The FO is able to request this information via the TCVQ...

  3. A dark matter component decaying after recombination: lensing constraints with Planck data

    International Nuclear Information System (INIS)

    Chudaykin, Anton; Gorbunov, Dmitry; Tkachev, Igor

    2016-01-01

    It was recently proposed [1] that the model with a fraction of decaying cold dark matter is able to reconcile measurements in high redshift (CMB) and low redshift (probes of cluster abundance and the Hubble constant). We check this statement employing the full likelihood of CMB Planck data. We find that the lensing effect calculated from anisotropy spectra measured by Planck imposes the strong constraint on the fraction of unstable dark matter as F < 8% (2σ). However, combining the CMB data with conflicting measurements in low redshift we obtain that the model with F ≈ 2 − 5% improves the goodness-of-fit by 1.5 − 2σ depending on A_s and τ priors in comparison with the concordance ΛCDM model

  4. Constraining designs for synthesis and timing analysis a practical guide to synopsys design constraints (SDC)

    CERN Document Server

    Gangadharan, Sridhar

    2013-01-01

    This book serves as a hands-on guide to timing constraints in integrated circuit design.  Readers will learn to maximize performance of their IC designs, by specifying timing requirements correctly.  Coverage includes key aspects of the design flow impacted by timing constraints, including synthesis, static timing analysis and placement and routing.  Concepts needed for specifying timing requirements are explained in detail and then applied to specific stages in the design flow, all within the context of Synopsys Design Constraints (SDC), the industry-leading format for specifying constraints.  ·         Provides a hands-on guide to synthesis and timing analysis, using Synopsys Design Constraints (SDC), the industry-leading format for specifying constraints; ·         Includes key topics of interest to a synthesis, static timing analysis or  place and route engineer; ·         Explains which constraints command to use for ease of maintenance and reuse, given several options pos...

  5. Automated constraint checking of spacecraft command sequences

    Science.gov (United States)

    Horvath, Joan C.; Alkalaj, Leon J.; Schneider, Karl M.; Spitale, Joseph M.; Le, Dang

    1995-01-01

    Robotic spacecraft are controlled by onboard sets of commands called "sequences." Determining that sequences will have the desired effect on the spacecraft can be expensive in terms of both labor and computer coding time, with different particular costs for different types of spacecraft. Specification languages and appropriate user interface to the languages can be used to make the most effective use of engineering validation time. This paper describes one specification and verification environment ("SAVE") designed for validating that command sequences have not violated any flight rules. This SAVE system was subsequently adapted for flight use on the TOPEX/Poseidon spacecraft. The relationship of this work to rule-based artificial intelligence and to other specification techniques is discussed, as well as the issues that arise in the transfer of technology from a research prototype to a full flight system.

  6. Progress Check Module; Basic Electricity and Electronics Individualized Learning System. Progress Check Booklet.

    Science.gov (United States)

    Bureau of Naval Personnel, Washington, DC.

    The Progress Check Booklet is designed to be used by the student working in the programed course to determine if he has mastered the concepts in the course booklets on: electrical current; voltage; resistance; measuring current and voltage in series circuits; relationships of current, voltage, and resistance; parellel circuits; combination…

  7. Executable specifications for hypothesis-based reasoning with Prolog and Constraint Handling Rules

    DEFF Research Database (Denmark)

    Christiansen, Henning

    2009-01-01

    Constraint Handling Rules (CHR) is an extension to Prolog which opens up a  spectrum of hypotheses-based reasoning in logic programs without additional interpretation overhead. Abduction with integrity constraints is one example of hypotheses-based reasoning which can be implemented directly...... in Prolog and CHR with a straightforward use of available and efficiently implemented facilities The present paper clarifies the semantic foundations for this way of doing abduction in CHR and Prolog as well as other examples  of hypotheses-based reasoning that is possible, including assumptive logic...

  8. Developmental constraints revealed by co-variation within and among molar rows in two murine rodents.

    Science.gov (United States)

    Renaud, Sabrina; Pantalacci, Sophie; Quéré, Jean-Pierre; Laudet, Vincent; Auffray, Jean-Christophe

    2009-01-01

    Morphological integration corresponds to interdependency between characters that can arise from several causes. Proximal causes of integration include that different phenotypic features may share common genetic sets and/or interact during their development. Ultimate causes may be the prolonged effect of selection favoring integration of functionally interacting characters, achieved by the molding of these proximal causes. Strong and direct interactions among successive teeth of a molar row are predicted by genetic and developmental evidences. Functional constraints related to occlusion, however, should have selected more strongly for a morphological integration of occluding teeth and a corresponding evolution of the underlying developmental and genetic pathways. To investigate how these predictions match the patterns of phenotypic integration, we studied the co-variation among the six molars of the murine molar row, focusing on two populations of house mice (Mus musculus domesticus) and wood mice (Apodemus sylvaticus). The size and shape of the three upper and lower molars were quantified and compared. Our results evidenced similar patterns in both species, size being more integrated than shape among all the teeth, and both size and shape co-varying strongly between adjacent teeth, but also between occluding teeth. Strong co-variation within each molar row is in agreement with developmental models showing a cascade influence of the first molar on the subsequent molars. In contrast, the strong co-variation between molars of the occluding tooth rows confirms that functional constraints molded patterns of integration and probably the underlying developmental pathways despite the low level of direct developmental interactions occurring among molar rows. These patterns of co-variation are furthermore conserved between the house mouse and the wood mouse that diverged >10 Ma, suggesting that they may constitute long-running constraints to the diversification of the murine

  9. Automatic Verification of Transactions on an Object-Oriented Database

    NARCIS (Netherlands)

    Spelt, D.; Balsters, H.

    1998-01-01

    In the context of the object-oriented data model, a compiletime approach is given that provides for a significant reduction of the amount of run-time transaction overhead due to integrity constraint checking. The higher-order logic Isabelle theorem prover is used to automatically prove which

  10. Opportunities for and constraints to integration of health services in Poland

    Directory of Open Access Journals (Sweden)

    Alicja Sobczak

    2002-06-01

    Full Text Available At the beginning of the article the typologies, expected outcomes and forces aiming at health care integration are discussed. Integration is recognised as a multidimensional concept. The suggested typologies of integration are based on structural configurations, co-ordination mechanisms (including clinical co-ordination, and driving forces. A review of the Polish experience in integration/disintegration of health care systems is the main part of the article. Creation of integrated health care management units (ZOZs in the beginning of the 1970s serves as an example of structural vertical integration missing co-ordination mechanisms. ZOZs as huge, costly and inflexible organisations became subjects of public criticism and discredited the idea of health care integration. At the end of the 1980s and in the decade of the 1990s, management of public health care was decentralised, the majority of ZOZs dismantled, and many health care public providers got the status of independent entities. The private sector developed rapidly. Sickness funds, which in 1999 replaced the previous state system, introduced “quasi-market” conditions where health providers have to compete for contracts. Some providers developed strategies of vertical and horizontal integration to get a competitive advantage. Consolidation of private ambulatory clinics, the idea of “integrated care” as a “contracting package”, development of primary health care and ambulatory specialist clinics in hospitals are the examples of such strategies. The new health policy declared in 2002 has recognised integration as a priority. It stresses the development of payment mechanisms and information base (Register of Health Services – RUM that promote integration. The Ministry of Health is involved directly in integrated emergency system designing. It seems that after years of disintegration and deregulation the need for effective integration has become obvious.

  11. 31 CFR 10.31 - Negotiation of taxpayer checks.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Negotiation of taxpayer checks. 10.31 Section 10.31 Money and Finance: Treasury Office of the Secretary of the Treasury PRACTICE BEFORE THE INTERNAL REVENUE SERVICE Duties and Restrictions Relating to Practice Before the Internal Revenue Service § 10.31 Negotiation of taxpayer checks. ...

  12. Hamiltonian path integrals

    International Nuclear Information System (INIS)

    Prokhorov, L.V.

    1982-01-01

    The properties of path integrals associated with the allowance for nonstandard terms reflecting the operator nature of the canonical variables are considered. Rules for treating such terms (''equivalence rules'') are formulated. Problems with a boundary, the behavior of path integrals under canonical transformations, and the problem of quantization of dynamical systems with constraints are considered in the framework of the method

  13. 42 CFR 433.40 - Treatment of uncashed or cancelled (voided) Medicaid checks.

    Science.gov (United States)

    2010-10-01

    ...) Medicaid checks. 433.40 Section 433.40 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT...) Medicaid checks. (a) Purpose. This section provides the rules to ensure that States refund the Federal...— Cancelled (voided) check means a Medicaid check issued by a State or fiscal agent which prior to its being...

  14. Model Checking the Logic of Allen's Relations Meets and Started-by is P^NP-Complete

    Directory of Open Access Journals (Sweden)

    Laura Bozzelli

    2016-09-01

    Full Text Available In the plethora of fragments of Halpern and Shoham's modal logic of time intervals (HS, the logic AB of Allen's relations Meets and Started-by is at a central position. Statements that may be true at certain intervals, but at no sub-interval of them, such as accomplishments, as well as metric constraints about the length of intervals, that force, for instance, an interval to be at least (resp., at most, exactly k points long, can be expressed in AB. Moreover, over the linear order of the natural numbers N, it subsumes the (point-based logic LTL, as it can easily encode the next and until modalities. Finally, it is expressive enough to capture the ω-regular languages, that is, for each ω-regular expression R there exists an AB formula Φ such that the language defined by R coincides with the set of models of Φ over N. It has been shown that the satisfiability problem for AB over N is EXPSPACE-complete. Here we prove that, under the homogeneity assumption, its model checking problem is Δ^p_2 = P^NP-complete (for the sake of comparison, the model checking problem for full HS is EXPSPACE-hard, and the only known decision procedure is nonelementary. Moreover, we show that the modality for the Allen relation Met-by can be added to AB at no extra cost (AA'B is P^NP-complete as well.

  15. Management model of productive capacity: integrating theory of constraints and the global operational efficiency index (IROG

    Directory of Open Access Journals (Sweden)

    Diego Augusto Pacheco

    2012-08-01

    Full Text Available This paper presents a model of management capacity in productive systems integrating the concepts of the Theory of Constraints and Total Productive Maintenance (TPM. The main objective of this study is to discuss and propose a model of management capacity, able to answer the following key questions: i capacity indicators which should be considered and how to measure them to measure the productive capacity of manufacturing systems? ii what is the real productive capacity of the system analyzed under a determined relationship between capacity and demand? The discussion of the proposed model is relevant because the definition of productive capacity system enables better management of resources and capabilities, improve production scheduling on the factory floor and meeting the demands imposed by the market. This paper presents the proposition of using the Operating Income Index Global (IROG with a different approach from traditional literature dealing with the theme, presented by Nakajima (1988. The results of this paper enable to develop a model to determine the capacity of the production system and the impact on the productive capacity of the entire system, not to consider the quality conformances that occur after the bottleneck resource of the production flow.

  16. Application of risk-based methods to inservice testing of check valves

    Energy Technology Data Exchange (ETDEWEB)

    Closky, N.B.; Balkey, K.R.; McAllister, W.J. [and others

    1996-12-01

    Research efforts have been underway in the American Society of Mechanical Engineers (ASME) and industry to define appropriate methods for the application of risk-based technology in the development of inservice testing (IST) programs for pumps and valves in nuclear steam supply systems. This paper discusses a pilot application of these methods to the inservice testing of check valves in the emergency core cooling system of Georgia Power`s Vogtle nuclear power station. The results of the probabilistic safety assessment (PSA) are used to divide the check valves into risk-significant and less-risk-significant groups. This information is reviewed by a plant expert panel along with the consideration of appropriate deterministic insights to finally categorize the check valves into more safety-significant and less safety-significant component groups. All of the more safety-significant check valves are further evaluated in detail using a failure modes and causes analysis (FMCA) to assist in defining effective IST strategies. A template has been designed to evaluate how effective current and emerging tests for check valves are in detecting failures or in finding significant conditions that are precursors to failure for the likely failure causes. This information is then used to design and evaluate appropriate IST strategies that consider both the test method and frequency. A few of the less safety-significant check valves are also evaluated using this process since differences exist in check valve design, function, and operating conditions. Appropriate test strategies are selected for each check valve that has been evaluated based on safety and cost considerations. Test strategies are inferred from this information for the other check valves based on similar check valve conditions. Sensitivity studies are performed using the PSA model to arrive at an overall IST program that maintains or enhances safety at the lowest achievable cost.

  17. Remote versus face-to-face check-ups for asthma.

    Science.gov (United States)

    Kew, Kayleigh M; Cates, Christopher J

    2016-04-18

    Asthma remains a significant cause of avoidable morbidity and mortality. Regular check-ups with a healthcare professional are essential to monitor symptoms and adjust medication.Health services worldwide are considering telephone and internet technologies as a way to manage the rising number of people with asthma and other long-term health conditions. This may serve to improve health and reduce the burden on emergency and inpatient services. Remote check-ups may represent an unobtrusive and efficient way of maintaining contact with patients, but it is uncertain whether conducting check-ups in this way is effective or whether it may have unexpected negative consequences. To assess the safety and efficacy of conducting asthma check-ups remotely versus usual face-to-face consultations. We identified trials from the Cochrane Airways Review Group Specialised Register (CAGR) up to 24 November 2015. We also searched www.clinicaltrials.gov, the World Health Organization (WHO) trials portal, reference lists of other reviews and contacted trial authors for additional information. We included parallel randomised controlled trials (RCTs) of adults or children with asthma that compared remote check-ups conducted using any form of technology versus standard face-to-face consultations. We excluded studies that used automated telehealth interventions that did not include personalised contact with a health professional. We included studies reported as full-text articles, as abstracts only and unpublished data. Two review authors screened the literature search results and independently extracted risk of bias and numerical data. We resolved any disagreements by consensus, and we contacted study authors for missing information.We analysed dichotomous data as odds ratios (ORs) using study participants as the unit of analysis, and continuous data as mean differences using the random-effects models. We rated all outcomes using the Grading of Recommendations Assessment, Development and

  18. Multiple Constraints Based Robust Matching of Poor-Texture Close-Range Images for Monitoring a Simulated Landslide

    Directory of Open Access Journals (Sweden)

    Gang Qiao

    2016-05-01

    Full Text Available Landslides are one of the most destructive geo-hazards that can bring about great threats to both human lives and infrastructures. Landslide monitoring has been always a research hotspot. In particular, landslide simulation experimentation is an effective tool in landslide research to obtain critical parameters that help understand the mechanism and evaluate the triggering and controlling factors of slope failure. Compared with other traditional geotechnical monitoring approaches, the close-range photogrammetry technique shows potential in tracking and recording the 3D surface deformation and failure processes. In such cases, image matching usually plays a critical role in stereo image processing for the 3D geometric reconstruction. However, the complex imaging conditions such as rainfall, mass movement, illumination, and ponding will reduce the texture quality of the stereo images, bringing about difficulties in the image matching process and resulting in very sparse matches. To address this problem, this paper presents a multiple-constraints based robust image matching approach for poor-texture close-range images particularly useful in monitoring a simulated landslide. The Scale Invariant Feature Transform (SIFT algorithm was first applied to the stereo images for generation of scale-invariate feature points, followed by a two-step matching process: feature-based image matching and area-based image matching. In the first feature-based matching step, the triangulation process was performed based on the SIFT matches filtered by the Fundamental Matrix (FM and a robust checking procedure, to serve as the basic constraints for feature-based iterated matching of all the non-matched SIFT-derived feature points inside each triangle. In the following area-based image-matching step, the corresponding points of the non-matched features in each triangle of the master image were predicted in the homologous triangle of the searching image by using geometric

  19. Pre-Alignment Checks. Automotive Mechanics. Steering & Suspension. Instructor's Guide [and] Student Guide.

    Science.gov (United States)

    Spignesi, B.

    This instructional package, one in a series of individualized instructional units on automotive steering and suspension, consists of a student guide and an instructor guide dealing with prealignment checks. Covered in the module are the following steps in a prealignment check: checking the ride height of a vehicle, checking the ball joints and the…

  20. Is drive for muscularity related to body checking behaviors in men athletes?

    Directory of Open Access Journals (Sweden)

    Leonardo de Sousa Fortes

    Full Text Available Abstract The aim of this study was to analyze the relationship between drive for muscularity and body checking behaviors in men athletes. Two hundred and twelve Brazilian athletes over 15 years of age participated. We used the Drive for Muscularity Scale (DMS to evaluate the drive for muscularity. The Male Body Checking Questionnaire was used to assess body checking behaviors. The findings demonstrated a relationship between the "body image-oriented muscularity" subscale of the DMS and body checking behaviors (p = 0.001. The results indicated differences in body checking among athletes with high and low levels of drive for muscularity. We concluded that drive for muscularity was related to body checking behaviors in men athletes.

  1. Model Checking A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2012-01-01

    This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV) for a subset of digraphs. Modeling challenges of the protocol and the system are addressed. The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period.

  2. Assessing Personality and Mood With Adjective Check List Methodology: A Review

    Science.gov (United States)

    Craig, Robert J.

    2005-01-01

    This article addresses the benefits and problems in using adjective check list methodology to assess personality. Recent developments in this assessment method are reviewed, emphasizing seminal adjective-based personality tests (Gough's Adjective Check List), mood tests (Lubin's Depressive Adjective Test, Multiple Affect Adjective Check List),…

  3. Spot-checks to measure general hygiene practice.

    Science.gov (United States)

    Sonego, Ina L; Mosler, Hans-Joachim

    2016-01-01

    A variety of hygiene behaviors are fundamental to the prevention of diarrhea. We used spot-checks in a survey of 761 households in Burundi to examine whether something we could call general hygiene practice is responsible for more specific hygiene behaviors, ranging from handwashing to sweeping the floor. Using structural equation modeling, we showed that clusters of hygiene behavior, such as primary caregivers' cleanliness and household cleanliness, explained the spot-check findings well. Within our model, general hygiene practice as overall concept explained the more specific clusters of hygiene behavior well. Furthermore, the higher general hygiene practice, the more likely children were to be categorized healthy (r = 0.46). General hygiene practice was correlated with commitment to hygiene (r = 0.52), indicating a strong association to psychosocial determinants. The results show that different hygiene behaviors co-occur regularly. Using spot-checks, the general hygiene practice of a household can be rated quickly and easily.

  4. Model Checking Algorithms for CTMDPs

    DEFF Research Database (Denmark)

    Buchholz, Peter; Hahn, Ernst Moritz; Hermanns, Holger

    2011-01-01

    Continuous Stochastic Logic (CSL) can be interpreted over continuoustime Markov decision processes (CTMDPs) to specify quantitative properties of stochastic systems that allow some external control. Model checking CSL formulae over CTMDPs requires then the computation of optimal control strategie...

  5. Nurses' barriers to learning: an integrative review.

    Science.gov (United States)

    Santos, Marion C

    2012-07-01

    This integrative review of the literature describes nurses' barriers to learning. Five major themes emerged: time constraints, financial constraints, workplace culture, access/relevance, and competency in accessing electronic evidence-based practice literature. The nurse educator must address these barriers for the staff to achieve learning and competency.

  6. Efficient probabilistic model checking on general purpose graphic processors

    NARCIS (Netherlands)

    Bosnacki, D.; Edelkamp, S.; Sulewski, D.; Pasareanu, C.S.

    2009-01-01

    We present algorithms for parallel probabilistic model checking on general purpose graphic processing units (GPGPUs). For this purpose we exploit the fact that some of the basic algorithms for probabilistic model checking rely on matrix vector multiplication. Since this kind of linear algebraic

  7. CrossCheck plagiarism screening : Experience of the Journal of Epidemiology

    Science.gov (United States)

    Hashimoto, Katsumi

    Due to technological advances in the past two decades, researchers now have unprecedented access to a tremendous amount of useful information. However, because of the extreme pressure to publish, this abundance of information can sometimes tempt researchers to commit scientific misconduct. A serious form of such misconduct is plagiarism. Editors are always concerned about the possibility of publishing plagiarized manuscripts. The plagiarism detection tool CrossCheck allows editors to scan and analyze manuscripts effectively. The Journal of Epidemiology took part in a trial of CrossCheck, and this article discusses the concerns journal editors might have regarding the use of CrossCheck and its analysis. In addition, potential problems identified by CrossCheck, including self-plagiarism, are introduced.

  8. CAPD Software Development for Automatic Piping System Design: Checking Piping Pocket, Checking Valve Level and Flexibility

    International Nuclear Information System (INIS)

    Ari Satmoko; Edi Karyanta; Dedy Haryanto; Abdul Hafid; Sudarno; Kussigit Santosa; Pinitoyo, A.; Demon Handoyo

    2003-01-01

    One of several steps in industrial plant construction is preparing piping layout drawing. In this drawing, pipe and all other pieces such as instrumentation, equipment, structure should be modeled A software called CAPD was developed to replace and to behave as piping drafter or designer. CAPD was successfully developed by adding both subprogram CHKUPIPE and CHKMANV. The first subprogram can check and gives warning if there is piping pocket in the piping system. The second can identify valve position and then check whether valve can be handled by operator hand The main program CAPD was also successfully modified in order to be capable in limiting the maximum length of straight pipe. By limiting the length, piping flexibility can be increased. (author)

  9. Integrated Control Using the SOFFT Control Structure

    Science.gov (United States)

    Halyo, Nesim

    1996-01-01

    The need for integrated/constrained control systems has become clearer as advanced aircraft introduced new coupled subsystems such as new propulsion subsystems with thrust vectoring and new aerodynamic designs. In this study, we develop an integrated control design methodology which accomodates constraints among subsystem variables while using the Stochastic Optimal Feedforward/Feedback Control Technique (SOFFT) thus maintaining all the advantages of the SOFFT approach. The Integrated SOFFT Control methodology uses a centralized feedforward control and a constrained feedback control law. The control thus takes advantage of the known coupling among the subsystems while maintaining the identity of subsystems for validation purposes and the simplicity of the feedback law to understand the system response in complicated nonlinear scenarios. The Variable-Gain Output Feedback Control methodology (including constant gain output feedback) is extended to accommodate equality constraints. A gain computation algorithm is developed. The designer can set the cross-gains between two variables or subsystems to zero or another value and optimize the remaining gains subject to the constraint. An integrated control law is designed for a modified F-15 SMTD aircraft model with coupled airframe and propulsion subsystems using the Integrated SOFFT Control methodology to produce a set of desired flying qualities.

  10. A Method for Model Checking Feature Interactions

    DEFF Research Database (Denmark)

    Pedersen, Thomas; Le Guilly, Thibaut; Ravn, Anders Peter

    2015-01-01

    This paper presents a method to check for feature interactions in a system assembled from independently developed concurrent processes as found in many reactive systems. The method combines and refines existing definitions and adds a set of activities. The activities describe how to populate the ...... the definitions with models to ensure that all interactions are captured. The method is illustrated on a home automation example with model checking as analysis tool. In particular, the modelling formalism is timed automata and the analysis uses UPPAAL to find interactions....

  11. Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study

    DEFF Research Database (Denmark)

    Yuksel, Ender; Zhu, Huibiao; Nielson, Hanne Riis

    2012-01-01

    that require novel methods and applications. In this context, an important issue is the verification of certain quantitative properties of the system. In this paper, we consider a specific Chinese Smart Grid implementation as a case study and address the verification problem for performance and energy......Cyber-physical systems integrate information and communication technology functions to the physical elements of a system for monitoring and controlling purposes. The conversion of traditional power grid into a smart grid, a fundamental example of a cyber-physical system, raises a number of issues...... consumption. We employ stochastic model checking approach and present our modelling and analysis study using PRISM model checker....

  12. Normalization constraint for variational bounds on fluid permeability

    International Nuclear Information System (INIS)

    Berryman, J.G.; Milton, G.W.

    1985-01-01

    A careful reexamination of the formulation of Prager's original variational principle for viscous flow through porous media has uncovered a subtle error in the normalization constraint on the trial functions. Although a certain surface integral of the true pressure field over the internal surface area always vanishes for isotropic materials, the corresponding surface integral for a given trial pressure field does not necessarily vanish but has nevertheless been previously neglected in the normalization. When this error is corrected, the form of the variational estimate is actually simpler than before and furthermore the resulting bounds have been shown to improve when the constant trial functions are used in either the two-point or three-point bounds

  13. Experimental investigation of the check valve behaviour when the flow is reversing

    Directory of Open Access Journals (Sweden)

    Himr D.

    2017-01-01

    Full Text Available Check valve in a pipeline is supposed to prevent the reverse flow and to allow the flow in the positive direction. The construction of check valves follows these requirements, but the check valve must not cause pressure pulsations in transients. It means when the fluid is accelerating or decelerating. The article describes an experimental investigation of a swing check valve when the flow is changing its direction. The check valve was placed in an experimental circuit, where the pressure on the upstream and downstream side of the valve was measured and the current value of flow rate was determined. The goal was to simulate conditions in the real system, where the check valve slam had been observed.

  14. Masking potency and whiteness of noise at various noise check sizes.

    Science.gov (United States)

    Kukkonen, H; Rovamo, J; Näsänen, R

    1995-02-01

    The masking effect of spatial noise can be increased by increasing either the rms contrast or check size of noise. In this study, the authors investigated the largest noise check size that still mimics the effect of white noise in grating detection and how it depends on the bandwidth and spatial frequency of a grating. The authors measured contrast energy thresholds, E, for vertical cosine gratings at various spatial frequencies and bandwidths. Gratings were embedded in two-dimensional spatial noise. The side length of the square noise checks was varied in the experiments. The spectral density, N(0,0), of white spatial noise at zero frequency was calculated by multiplying the noise check area by the rms contrast of noise squared. The physical signal-to-noise ratio at threshold [E/N(0,0)]0.5 was initially constant but then started to decrease. The largest noise check that still produced a constant physical signal-to-noise ratio at threshold was directly proportional to the spatial frequency. When expressed as a fraction of grating cycle, the largest noise check size depended only on stimulus bandwidth. The smallest number of noise checks per grating cycle needed to mimic the effect of white noise decreased from 4.2 to 2.6 when the number of grating cycles increased from 1 to 64. Spatial noise can be regarded as white in grating detection if there are at least four square noise checks per grating cycle at all spatial frequencies.

  15. Study of check image using computed radiography

    International Nuclear Information System (INIS)

    Sato, Hiroshi

    2002-01-01

    There are two image forming methods both a check image and a portal image in the linacogram. It has been established the image forming method in the check image using computed radiography (CR). On the other hand, it is not established the image forming method in the portal image using CR yet. Usually, in the electric portal imaging device (EPID) is mainly used just before radiotherapy start. The usefulness of the portal image forming method by CR using in place of EPID is possible to confirm the precision for determining to specific position at the irradiate part and to the irradiate method for the human organs. There are some technical problems that, since in the early time, the linac graphy (LG) image have low resolution power. In order to improve to the resolution power in LG image, CR image technologies have been introduced to the check image forming method. Heavy metallic sheet (HMS) is used to the front side of CR-IP cassette, and high contactness sponge is used to the back side of the cassette. Improved contactness between HMS and imaging plate (IP) by means of the high contactness sponge contributed to improve the resolution power in the check images. A lot of paper which is connected with these information have been reported. Imaging plate ST-III should be used to maintain high sensitivity in the check film image forming method. The same image forming method in the check image established by CR has been introduced into the portal image forming method in order to improve the resolution power. However, as a result, it couldn't acquired high resolution image forming in the portal images because of the combination of ST-III and radiotherapy dose. After several trials, it has been recognized that HR-V imaging plate for mammography is the most useful application to maintain high resolution power in the portal images. Also, it is possible to modify the image quality by changing GS parameter which is one of image processing parameters in CR. Furthermore, in case

  16. Model checking biological systems described using ambient calculus

    DEFF Research Database (Denmark)

    Mardare, Radu Iulian; Priami, Corrado; Qualia, Paola

    2005-01-01

    Model checking biological systems described using ambient calculus. In Proc. of the second International Workshop on Computational Methods in Systems Biology (CMSB04), Lecture Notes in Bioinformatics 3082:85-103, Springer, 2005.......Model checking biological systems described using ambient calculus. In Proc. of the second International Workshop on Computational Methods in Systems Biology (CMSB04), Lecture Notes in Bioinformatics 3082:85-103, Springer, 2005....

  17. Model Checking the Remote Agent Planner

    Science.gov (United States)

    Khatib, Lina; Muscettola, Nicola; Havelund, Klaus; Norvig, Peter (Technical Monitor)

    2001-01-01

    This work tackles the problem of using Model Checking for the purpose of verifying the HSTS (Scheduling Testbed System) planning system. HSTS is the planner and scheduler of the remote agent autonomous control system deployed in Deep Space One (DS1). Model Checking allows for the verification of domain models as well as planning entries. We have chosen the real-time model checker UPPAAL for this work. We start by motivating our work in the introduction. Then we give a brief description of HSTS and UPPAAL. After that, we give a sketch for the mapping of HSTS models into UPPAAL and we present samples of plan model properties one may want to verify.

  18. Simple nonparametric checks for model data fit in CAT

    NARCIS (Netherlands)

    Meijer, R.R.

    2005-01-01

    In this paper, the usefulness of several nonparametric checks is discussed in a computerized adaptive testing (CAT) context. Although there is no tradition of nonparametric scalability in CAT, it can be argued that scalability checks can be useful to investigate, for example, the quality of item

  19. Dynamic State Space Partitioning for External Memory Model Checking

    DEFF Research Database (Denmark)

    Evangelista, Sami; Kristensen, Lars Michael

    2009-01-01

    We describe a dynamic partitioning scheme usable by model checking techniques that divide the state space into partitions, such as most external memory and distributed model checking algorithms. The goal of the scheme is to reduce the number of transitions that link states belonging to different...

  20. Creating Büchi automata for multi-valued model checking

    NARCIS (Netherlands)

    Vijzelaar, Stefan J.J.; Fokkink, Wan J.

    2017-01-01

    In explicit state model checking of linear temporal logic properties, a Büchi automaton encodes a temporal property. It interleaves with a Kripke model to form a state space, which is searched for counterexamples. Multi-valued model checking considers additional truth values beyond the Boolean true

  1. Acoustic emission testing of piston check valves

    International Nuclear Information System (INIS)

    Stewart, D.L.

    1994-01-01

    Based on test experience at Comanche Peak Unit 1, an acoustic emission data evaluation matrix for piston check valves has been developed. The degradations represented in this matrix were selected based on Edwards piston check valve failure data reported in the Nuclear Plant Reliability Data System. Evidence to support this matrix was collected from site test data on a variety of valve types. Although still under refinement, the matrix provides three major attributes for closure verification, which have proven useful in developing test procedures for inservice testing and preventing unnecessary disassembly

  2. Symbolic Dependency Graphs for PCTL Model-Checking

    DEFF Research Database (Denmark)

    Mariegaard, Anders; Larsen, Kim Guldstrand

    2017-01-01

    We consider the problem of model-checking a subset of probabilistic CTL, interpreted over (discrete-time) Markov reward models, allowing the specification of lower bounds on the probability of the set of paths satisfying a cost-bounded path formula. We first consider a reduction to fixed-point co......We consider the problem of model-checking a subset of probabilistic CTL, interpreted over (discrete-time) Markov reward models, allowing the specification of lower bounds on the probability of the set of paths satisfying a cost-bounded path formula. We first consider a reduction to fixed...

  3. EASY-2005: Validation and new tools for data checking

    International Nuclear Information System (INIS)

    Forrest, R.A.; Kopecky, J.

    2007-01-01

    The European Activation System (EASY) has been developed for activation calculations within the Fusion Technology programme. It comprises the EAF nuclear data libraries and the FISPACT inventory code. EASY-2005 contains about five times more neutron-induced reactions (62,637) than the previous version; due to an increase in the upper energy limit from 20 to 60 MeV. Many measurements of activation in well-defined neutron spectra have been made; these integral results are used to validate EAF. Details of the validation covering 453 reactions are given. Model calculations were used to produce the majority of the data, and the large number of reactions, and the lack of experimental data, make it necessary to develop new checking tools. Within the SAFEPAQ-II code, the new methodology of statistical analysis of cross sections (SACS) has been developed. This enables various quantities such as maximum cross section (σ max ) to be plotted as a function of asymmetry parameter (s) for each reaction type. Such plots show well-defined trends and inconsistent data for a particular reaction can readily be identified. The use of integral data and SACS for improvement are discussed, in relation to the maintenance version, EASY-2005.1 and the planned new version, EASY-2007

  4. Checking in: An Analysis of the (Lack of) Body Checking in Women's Ice Hockey

    Science.gov (United States)

    Weaving, Charlene; Roberts, Samuel

    2012-01-01

    Despite the growing popularity of women's ice hockey in North America, players continue to face limitations because of the prohibition of body checking. In this paper, we argue from a liberal feminist philosophical perspective that this prohibition reinforces existing traditional stereotypes of female athletes. Because the women's game does not…

  5. A Constraint programming-based genetic algorithm for capacity output optimization

    Directory of Open Access Journals (Sweden)

    Kate Ean Nee Goh

    2014-10-01

    Full Text Available Purpose: The manuscript presents an investigation into a constraint programming-based genetic algorithm for capacity output optimization in a back-end semiconductor manufacturing company.Design/methodology/approach: In the first stage, constraint programming defining the relationships between variables was formulated into the objective function. A genetic algorithm model was created in the second stage to optimize capacity output. Three demand scenarios were applied to test the robustness of the proposed algorithm.Findings: CPGA improved both the machine utilization and capacity output once the minimum requirements of a demand scenario were fulfilled. Capacity outputs of the three scenarios were improved by 157%, 7%, and 69%, respectively.Research limitations/implications: The work relates to aggregate planning of machine capacity in a single case study. The constraints and constructed scenarios were therefore industry-specific.Practical implications: Capacity planning in a semiconductor manufacturing facility need to consider multiple mutually influenced constraints in resource availability, process flow and product demand. The findings prove that CPGA is a practical and an efficient alternative to optimize the capacity output and to allow the company to review its capacity with quick feedback.Originality/value: The work integrates two contemporary computational methods for a real industry application conventionally reliant on human judgement.

  6. 16 CFR 240.12 - Checking customer's use of payments.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Checking customer's use of payments. 240.12 Section 240.12 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR ADVERTISING ALLOWANCES AND OTHER MERCHANDISING PAYMENTS AND SERVICES § 240.12 Checking customer's use of...

  7. Uncertainty as Knowledge: Constraints on Policy Choices Provided by Analysis of Uncertainty

    Science.gov (United States)

    Lewandowsky, S.; Risbey, J.; Smithson, M.; Newell, B. R.

    2012-12-01

    Uncertainty forms an integral part of climate science, and it is often cited in connection with arguments against mitigative action. We argue that an analysis of uncertainty must consider existing knowledge as well as uncertainty, and the two must be evaluated with respect to the outcomes and risks associated with possible policy options. Although risk judgments are inherently subjective, an analysis of the role of uncertainty within the climate system yields two constraints that are robust to a broad range of assumptions. Those constraints are that (a) greater uncertainty about the climate system is necessarily associated with greater expected damages from warming, and (b) greater uncertainty translates into a greater risk of the failure of mitigation efforts. These ordinal constraints are unaffected by subjective or cultural risk-perception factors, they are independent of the discount rate, and they are independent of the magnitude of the estimate for climate sensitivity. The constraints mean that any appeal to uncertainty must imply a stronger, rather than weaker, need to cut greenhouse gas emissions than in the absence of uncertainty.

  8. Regular Check-Ups Are Important

    Science.gov (United States)

    ... Attack Wear Red for Heart Health Tools for Pregnant Women, New Moms, Women Considering Pregnancy Be a Healthy ... your community (i.e. a faith-based setting, workplace, school, or civic group) ... screening on National Women’s Check-Up Day (the day after Mother’s Day ...

  9. Checking behavioral conformance of artifacts

    NARCIS (Netherlands)

    Fahland, D.; Leoni, de M.; Dongen, van B.F.; Aalst, van der W.M.P.

    2011-01-01

    The usefulness of process models (e.g., for analysis, improvement, or execution) strongly depends on their ability to describe reality. Conformance checking is a technique to validate how good a given process model describes recorded executions of the actual process. Recently, artifacts have been

  10. SU-D-BRD-07: Automatic Patient Data Audit and Plan Quality Check to Support ARIA and Eclipse

    Energy Technology Data Exchange (ETDEWEB)

    Li, X; Li, H; Wu, Y; Mutic, S; Yang, D [Washington University School of Medicine, St. Louis, MO (United States)

    2014-06-01

    Purpose: To ensure patient safety and treatment quality in RT departments that use Varian ARIA and Eclipse, we developed a computer software system and interface functions that allow previously developed electron chart checking (EcCk) methodologies to support these Varian systems. Methods: ARIA and Eclipse store most patient information in its MSSQL database. We studied the contents in the hundreds database tables and identified the data elements used for patient treatment management and treatment planning. Interface functions were developed in both c-sharp and MATLAB to support data access from ARIA and Eclipse servers using SQL queries. These functions and additional data processing functions allowed the existing rules and logics from EcCk to support ARIA and Eclipse. Dose and structure information are important for plan quality check, however they are not stored in the MSSQL database but as files in Varian private formats, and cannot be processed by external programs. We have therefore implemented a service program, which uses the DB Daemon and File Daemon services on ARIA server to automatically and seamlessly retrieve dose and structure data as DICOM files. This service was designed to 1) consistently monitor the data access requests from EcCk programs, 2) translate the requests for ARIA daemon services to obtain dose and structure DICOM files, and 3) monitor the process and return the obtained DICOM files back to EcCk programs for plan quality check purposes. Results: EcCk, which was previously designed to only support MOSAIQ TMS and Pinnacle TPS, can now support Varian ARIA and Eclipse. The new EcCk software has been tested and worked well in physics new start plan check, IMRT plan integrity and plan quality checks. Conclusion: Methods and computer programs have been implemented to allow EcCk to support Varian ARIA and Eclipse systems. This project was supported by a research grant from Varian Medical System.

  11. Is there a need for special preventive medical check-ups in employees exposed to experimental animal dust?

    Science.gov (United States)

    Schmid, Klaus; Jüngert, Barbara; Hager, Meta; Drexler, Hans

    2009-02-01

    Due to new legal requirements in Germany, the employer must request preventive medical check-ups for activities involving exposure to dust from experimental animals in the rooms in which the animals are kept. The objective is to report our first experiences with these medical check-ups in the context of academic research. The check-ups were carried out since November 2005 and comprised a questionnaire and a medical examination, including a pulmonary function test with whole-body plethysmography. Respiratory, nasal and ocular symptoms related to occupational exposure to animals were documented. Participation in skin prick tests (ubiquitous inhalation allergens and laboratory animal allergens), a bronchial provocation test with methacholine, and serological examinations for total IgE and specific IgE antibodies was voluntary. Data on 132 persons are presented. One hundred and six of these had already been exposed for at least 1 year. Main complaints at the workplace were sneezing and runny nose. Ocular symptoms and bronchial asthma were reported infrequently. The development of at least one of these symptoms occurred in 34% of employees with an exposure of at least 1 year. If the weekly exposure duration was at least 5 h, the proportion of employees with complaints rose to 44.9%. In employees occupationally exposed to mice and rats, work-related complaints occurred in 33.7 and 37.8%, respectively, and sensitisation rates were 12.7 and 16.3%, respectively. Employees with and without complaints differed in history of allergic symptoms, and workplace safety measures. In employees with occupational contact with laboratory animal dust, the frequency of complaints was high. The results confirm the necessity of regular medical check-ups for employees with contact with laboratory animal dust. Nevertheless, the medical check-ups must be part of a prevention strategy including education, engineering controls, administrative controls, use of personal protective equipment and

  12. SU-D-BRD-07: Automatic Patient Data Audit and Plan Quality Check to Support ARIA and Eclipse

    International Nuclear Information System (INIS)

    Li, X; Li, H; Wu, Y; Mutic, S; Yang, D

    2014-01-01

    Purpose: To ensure patient safety and treatment quality in RT departments that use Varian ARIA and Eclipse, we developed a computer software system and interface functions that allow previously developed electron chart checking (EcCk) methodologies to support these Varian systems. Methods: ARIA and Eclipse store most patient information in its MSSQL database. We studied the contents in the hundreds database tables and identified the data elements used for patient treatment management and treatment planning. Interface functions were developed in both c-sharp and MATLAB to support data access from ARIA and Eclipse servers using SQL queries. These functions and additional data processing functions allowed the existing rules and logics from EcCk to support ARIA and Eclipse. Dose and structure information are important for plan quality check, however they are not stored in the MSSQL database but as files in Varian private formats, and cannot be processed by external programs. We have therefore implemented a service program, which uses the DB Daemon and File Daemon services on ARIA server to automatically and seamlessly retrieve dose and structure data as DICOM files. This service was designed to 1) consistently monitor the data access requests from EcCk programs, 2) translate the requests for ARIA daemon services to obtain dose and structure DICOM files, and 3) monitor the process and return the obtained DICOM files back to EcCk programs for plan quality check purposes. Results: EcCk, which was previously designed to only support MOSAIQ TMS and Pinnacle TPS, can now support Varian ARIA and Eclipse. The new EcCk software has been tested and worked well in physics new start plan check, IMRT plan integrity and plan quality checks. Conclusion: Methods and computer programs have been implemented to allow EcCk to support Varian ARIA and Eclipse systems. This project was supported by a research grant from Varian Medical System

  13. Progress realized by numerized Eddy current checking-chains

    International Nuclear Information System (INIS)

    Guerin, F.; Blanchet, A.

    1985-01-01

    Until the last ten years , the tubes of the Steam Generators of the Nuclear Stations were inspected by means of Eddy Current with analogical checkings-chains. HBS Company has perfected a numerized checking-chain allowing transmission up to 300 m of the E.C. signals. In a near future, it will be then possible to do periodical inspections of Steam Generators from cabins located out of the reactor building [fr

  14. Adjustments in channel morphology due to land-use changes and check dam installation in mountain torrents of Calabria (Southern Italy)

    Science.gov (United States)

    Fortugno, Diego; Zema, Demetrio Antonio; Bombino, Giuseppe; Tamburino, Vincenzo; Quinonero Rubio, Juan Manuel; Boix-Fayos, Carolina

    2016-04-01

    In Mediterranean semi-arid conditions the geomorphic effects of land-use changes and check dam installation on active channel headwater morphology are not completely understood. In such environments, the availability of specific studies, which monitor channel adjustments as a response to reforestation and check dams over representative observation periods, could help develop new management strategies and erosion control measures. This investigation is an integrated approach assessing the adjustments of channel morphology in a typical torrent (Sant'Agata, Calabria, Southern Italy) after land-use changes (e.g. fire, reforestation, land abandonment) and check dam construction across a period of about 60 years (1955-2012). A statistical analysis of historical rainfall records, an analysis of land-use change in the catchment area and a geomorphological mapping of channel adjustments were carried out and combined with field surveys of bed surface grain-size over a 5-km reach including 14 check dams. The analysis of the historical rainfall records showed a slight decrease in the amount and erosivity of precipitation. Mapping of land-use changes highlighted a general increase of vegetal coverage on the slopes adjacent to the monitored reaches. Together with the check dam network installation, this increase could have induced a reduction in water and sediment supply. The different erosional and depositional forms and adjustments showed a general narrowing between consecutive check dams together with local modifications detected upstream (bed aggradation and cross section expansion together with low-flow realignments) and downstream (local incision) of the installed check dams. Changes in the torrent bends were also detected as a response to erosional and depositional processes with different intensities. The study highlighted: (i) the efficiency of check dams against the disrupting power of the most intense floods by stabilising the active channel; and (ii) the influence of

  15. A novel cognitive intervention for compulsive checking: Targeting maladaptive beliefs about memory.

    Science.gov (United States)

    Alcolado, Gillian M; Radomsky, Adam S

    2016-12-01

    Compulsive checking is one of the most common symptoms of obsessive-compulsive disorder (OCD). Recently it has been proposed that those who check compulsively may believe their memory is poor, rather than having an actual memory impairment. The current study sought to develop and assess a brief cognitive intervention focused on improving maladaptive beliefs about memory, as they pertain to both checking symptoms and memory performance. Participants (N = 24) with a diagnosis of OCD and clinical levels of checking symptomatology were randomly assigned either to receive two weekly 1-hour therapy sessions or to self-monitor during a similar waitlist period. Time spent checking, checking symptoms, maladaptive beliefs about memory, and visuospatial memory were assessed both pre- and post-treatment/waitlist. Results showed that compared to the waitlist condition, individuals in the treatment condition displayed significant decreases in their maladaptive beliefs about memory and checking symptoms from pre- to post-intervention. They also exhibited increased recall performance on a measure of visuospatial memory. Changes in beliefs about memory were predictors of reduced post-intervention checking, but were not predictive of increased post-intervention memory scores. The lack of long term follow-up data and use of a waitlist control leave questions about the stability and specificity of the intervention. Findings provide preliminary evidence that strategies targeting beliefs about memory may be worthy of inclusion in cognitive-behavioural approaches to treating compulsive checking. Copyright © 2015 Elsevier Ltd. All rights reserved.

  16. [Factors Associated with Stress Check Attendance: Possible Effect of Timing of Annual Health Examination].

    Science.gov (United States)

    Ishimaru, Tomohiro; Hattori, Michihiro; Nagata, Masako; Kuwahara, Keisuke; Watanabe, Seiji; Mori, Koji

    2018-01-01

    The stress check program has been part of annual employees' health screening since 2015. Employees are recommended, but not obliged, to undergo the stress check offered. This study was designed to examine the factors associated with stress check attendance. A total of 31,156 Japanese employees who underwent an annual health examination and a stress check service at an Occupational Health Service Center in 2016 participated in this study. Data from the annual health examination and stress check service included stress check attendance, date of attendance (if implemented), gender, age, workplace industry, number of employees at the workplace, and tobacco and alcohol consumption. Data were analyzed using multiple logistic regression. The mean rate of stress check attendance was 90.8%. A higher rate of stress check attendance was associated with a lower duration from the annual health examination, age ≥30 years, construction and transport industry, and 50-999 employees at the workplace. A lower rate of stress check attendance was associated with medical and welfare industry and ≥1,000 employees at the workplace. These findings provide insights into developing strategies for improving the rate of stress check attendance. In particular, stress check attendance may improve if the stress check service and annual health examination are conducted simultaneously.

  17. Development of a butterfly check valve model under natural circulation conditions

    International Nuclear Information System (INIS)

    Rao, Yuxian; Yu, Lei; Fu, Shengwei; Zhang, Fan

    2015-01-01

    Highlights: • Bases on Lim’s swing check valve model, a butterfly check valve model was developed. • The method to quantify the friction torque T F in Li’s model was corrected. • The developed model was implemented into the RELAP5 code and verified. - Abstract: A butterfly check valve is widely used to prevent a reverse flow in the pipe lines of a marine nuclear power plant. Under some conditions, the natural circulation conditions in particular, the fluid velocity through the butterfly check valve might become too low to hold the valve disk fully open, thereby the flow resistance of the butterfly check valve varies with the location of the valve disk and as a result the fluid flow is significantly affected by the dynamic motion of the valve disk. Simulation of a pipe line that includes some butterfly check valves, especially under natural circulation conditions, is thus complicated. This paper focuses on the development of a butterfly check valve model to enhance the capability of the thermal–hydraulic system code and the developed model is implemented into the RELAP5 code. Both steady-state calculations and transient calculations were carried out for the primary loop system of a marine nuclear power plant and the calculation results are compared with the experimental data for verification purpose. The simulation results show an agreement with the experimental data

  18. Schedulability of Herschel revisited using statistical model checking

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel

    2015-01-01

    -approximation technique. We can safely conclude that the system is schedulable for varying values of BCET. For the cases where deadlines are violated, we use polyhedra to try to confirm the witnesses. Our alternative method to confirm non-schedulability uses statistical model-checking (SMC) to generate counter...... and blocking times of tasks. Consequently, the method may falsely declare deadline violations that will never occur during execution. This paper is a continuation of previous work of the authors in applying extended timed automata model checking (using the tool UPPAAL) to obtain more exact schedulability...... analysis, here in the presence of non-deterministic computation times of tasks given by intervals [BCET,WCET]. Computation intervals with preemptive schedulers make the schedulability analysis of the resulting task model undecidable. Our contribution is to propose a combination of model checking techniques...

  19. Remote preenrollment checking of consent forms to reduce nonconformity.

    Science.gov (United States)

    Journot, Valérie; Pérusat-Villetorte, Sophie; Bouyssou, Caroline; Couffin-Cadiergues, Sandrine; Tall, Aminata; Chêne, Geneviève

    2013-01-01

    In biomedical research, the signed consent form must be checked for compliance with regulatory requirements. Checking usually is performed on site, most frequently after a participant's final enrollment. We piloted a procedure for remote preenrollment consent forms checking. We applied it in five trials and assessed its efficiency to reduce form nonconformity before participant enrollment. Our clinical trials unit (CTU) routinely uses a consent form with an additional copy that contains a pattern that partially masks the participant's name and signature. After completion and signatures by the participant and investigator, this masked copy is faxed to the CTU for checking. In case of detected nonconformity, the CTU suspends the participant's enrollment until the form is brought into compliance. We checked nonconformities of consent forms both remotely before enrollment and on site in five trials conducted in our CTU. We tabulated the number and nature of nonconformities by location of detection: at the CTU or on site. We used these data for a pseudo before-and-after analysis and estimated the efficiency of this remote checking procedure in terms of reduction of nonconformities before enrollment as compared to the standard on-site checking procedure. We searched for nonconformity determinants among characteristics of trials, consent forms, investigator sites, and participants through multivariate logistic regression so as to identify opportunities for improvement in our procedure. Five trials, starting sequentially but running concurrently, with remote preenrollment and on-site checking of consent forms from 415 participants screened in 2006-2009 led to 518 consent forms checked; 94 nonconformities were detected in 75 forms, 75 (80%) remotely and 19 more (20%) on site. Nonconformities infrequently concerned dates of signatures (7%) and information about participants (12%). Most nonconformities dealt with investigator information (76%), primarily contact information

  20. Spin Interactions and Cross-checks of Polarization in NH$_{3}$ Target

    CERN Document Server

    Kiselev, Yu; Doshita, N; Gautheron, F; Hess, Ch; Iwata, T; Koivuniemi, J; Kondo, K; Magnon, A; Mallot, G; Michigami, T; Meyer, W; Reicherz, G

    2008-01-01

    We study the magnetic structure of irradiated ammonia (NH$_{3}$) polarized by Dynamic Nuclear Polarization method at 0.2 K and at 2.5 T field. In this material, the electron spins, induced by ionizing radiation, couple $^{14}$N and $^{1}$H spins by the indirect spin-spin interaction. As a result, the local frequencies of $^{1}$H-spins are varied depending on $^{14}$N spin polarizations and lead to an asymmetry in the proton signal. This asymmetry allowes a good detection of $^{14}$N spins directly on the proton Larmor frequency. In the long COMPASS target at CERN, we use the cross-checks between spectral asymmetries and integral polarizations to decrease the relative error for longitudinal target polarizations up to $\\pm$2.0%.

  1. The importance of drug checking outside the context of nightlife in Slovenia.

    Science.gov (United States)

    Sande, Matej; Šabić, Simona

    2018-01-12

    The main purpose of the research was to evaluate the implementation of the drug checking service in Slovenia and to obtain the opinion of users included in harm reduction programmes for high-risk drug users and of drug users in nightlife settings on drug checking, the reasons for drug checking, and their attitude towards adulterants in the drugs that they use. The two final unrepresentative research samples included 102 respondents from harm reduction programmes and 554 respondents from the online sample. The questionnaire was designed based on analysis of the interviews conducted with professionals from the programmes, who took part in the drug checking project, and based on previous research on drug use in nightlife. The main findings related to users' opinions on the drug checking service are that users from both samples perceive drug checking as a contribution to risk reduction and that they find providing information for them about the harmful adulterants and substances that they use very important. In addition, users from both samples considered accessibility of the drug checking service as very important and would be in favour of brief counselling at the collection of the drug sample. One of the salient differences between samples was that nightlife drug users found it more important to recognise substances in the drugs that they use. Drug users from two different samples attach a relatively high importance to the drug checking service, and they consider it to be a contribution to risk reduction. As well as drug users in nightlife settings, high-risk drug users also perceive the drug checking service to be important, which is relevant in the phase of planning drug checking services outside the context of nightlife and for the act of incorporating these services into contemporary harm reduction policy.

  2. Influence of check dams on debris-flow run-out intensity

    Directory of Open Access Journals (Sweden)

    A. Remaître

    2008-12-01

    Full Text Available Debris flows are very dangerous phenomena claiming thousands of lives and millions of Euros each year over the world. Disaster mitigation includes non-structural (hazard mapping, insurance policies, active structural (drainage systems and passive structural (check dams, stilling basins countermeasures. Since over twenty years, many efforts are devoted by the scientific and engineering communities to the design of proper devices able to capture the debris-flow volume and/or break down the energy. If considerable theoretical and numerical work has been performed on the size, the shape and structure of check dams, allowing the definition of general design criteria, it is worth noting that less research has focused on the optimal location of these dams along the debris-flow pathway.

    In this paper, a methodological framework is proposed to evaluate the influence of the number and the location of the check dams on the reduction of the debris-flow intensity (in term of flow thickness, flow velocity and volume. A debris-flow model is used to simulate the run-out of the debris flow. The model uses the Janbu force diagram to resolve the force equilibrium equations; a bingham fluid rheology is introduced and represents the resistance term. The model has been calibrated on two muddy debris-flow events that occurred in 1996 and 2003 at the Faucon watershed (South French Alps.

    Influence of the check dams on the debris-flow intensity is quantified taking into account several check dams configurations (number and location as input geometrical parameters. Results indicate that debris-flow intensity is decreasing with the distance between the source area and the first check dams. The study demonstrates that a small number of check dams located near the source area may decrease substantially the debris-flow intensity on the alluvial fans.

  3. Sports science needs more interdisciplinary, constraints-led research programmes: The case of water safety in New Zealand.

    Science.gov (United States)

    Button, C; Croft, J L

    2017-12-01

    In the lead article of this special issue, Paul Glazier proposes that Newell's constraints model has the potential to contribute to a grand unified theory of sports performance in that it can help to integrate the disciplinary silos that have typically operated in isolation in sports and exercise science. With a few caveats discussed in this commentary, we agree with Glazier's proposal. However, his ideas suggest that there is a need to demonstrate explicitly how such an integration might occur within applied scientific research. To help fill this perceived 'gap' and thereby illustrate the value of adopting a constraints-led approach, we offer an example of our own interdisciplinary research programme. We believe our research on water safety is ideally suited to this task due to the diverse range of interacting constraints present and as such provides a tangible example of how this approach can unify different disciplinary perspectives examining an important aspect of sport performance. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. Automated Derivation of Complex System Constraints from User Requirements

    Science.gov (United States)

    Foshee, Mark; Murey, Kim; Marsh, Angela

    2010-01-01

    The Payload Operations Integration Center (POIC) located at the Marshall Space Flight Center has the responsibility of integrating US payload science requirements for the International Space Station (ISS). All payload operations must request ISS system resources so that the resource usage will be included in the ISS on-board execution timelines. The scheduling of resources and building of the timeline is performed using the Consolidated Planning System (CPS). The ISS resources are quite complex due to the large number of components that must be accounted for. The planners at the POIC simplify the process for Payload Developers (PD) by providing the PDs with a application that has the basic functionality PDs need as well as list of simplified resources in the User Requirements Collection (URC) application. The planners maintained a mapping of the URC resources to the CPS resources. The process of manually converting PD's science requirements from a simplified representation to a more complex CPS representation is a time-consuming and tedious process. The goal is to provide a software solution to allow the planners to build a mapping of the complex CPS constraints to the basic URC constraints and automatically convert the PD's requirements into systems requirements during export to CPS.

  5. Bin-packing problems with load balancing and stability constraints

    DEFF Research Database (Denmark)

    Trivella, Alessio; Pisinger, David

    apper in a wide range of disciplines, including transportation and logistics, computer science, engineering, economics and manufacturing. The problem is well-known to be N P-hard and difficult to solve in practice, especially when dealing with the multi-dimensional cases. Closely connected to the BPP...... realistic constraints related to e.g. load balancing, cargo stability and weight limits, in the multi-dimensional BPP. The BPP poses additional challenges compared to the CLP due to the supplementary objective of minimizing the number of bins. In particular, in section 2 we discuss how to integrate bin......-packing and load balancing of items. The problem has only been considered in the literature in simplified versions, e.g. balancing a single bin or introducing a feasible region for the barycenter. In section 3 we generalize the problem to handle cargo stability and weight constraints....

  6. Experimental check of the Gerasimov-Drell-Hearn sum rule for H1

    International Nuclear Information System (INIS)

    Dutz, H.; Drachenfels, W. von; Frommberger, F.; Hillert, W.; Klein, F.; Menze, D.; Rohlof, C.; Schoch, B.; Helbing, K.; Speckner, T.; Zeitler, G.; Anton, G.; Bock, A.; Godo, M.; Kiel, B.; Michel, T.; Naumann, J.; Krimmer, J.; Grabmayr, P.; Sauer, M.

    2004-01-01

    For the first time we checked the fundamental Gerasimov-Drell-Hearn (GDH) sum rule for the proton experimentally in the photon energy range from 0.2-2.9 GeV with the tagged photon facilities at MAMI (Mainz) and ELSA (Bonn). New data of the doubly polarized total cross section difference are presented in the energy range from 1.6 to 2.9 GeV. The contribution to the GDH integral from 0.2-2.9 GeV yields [254±5(stat)±12(syst)] μb with negative contributions in the Regge regime at photon energies above 2.1 GeV. This trend supports the validity of the GDH sum rule

  7. Efficient Multi-Valued Bounded Model Checking for LTL over Quasi-Boolean Algebras

    OpenAIRE

    Andrade, Jefferson O.; Kameyama, Yukiyoshi

    2012-01-01

    Multi-valued Model Checking extends classical, two-valued model checking to multi-valued logic such as Quasi-Boolean logic. The added expressivity is useful in dealing with such concepts as incompleteness and uncertainty in target systems, while it comes with the cost of time and space. Chechik and others proposed an efficient reduction from multi-valued model checking problems to two-valued ones, but to the authors' knowledge, no study was done for multi-valued bounded model checking. In thi...

  8. Efficient Multi-Valued Bounded Model Checking for LTL over Quasi-Boolean Algebras

    Science.gov (United States)

    Andrade, Jefferson O.; Kameyama, Yukiyoshi

    Multi-valued Model Checking extends classical, two-valued model checking to multi-valued logic such as Quasi-Boolean logic. The added expressivity is useful in dealing with such concepts as incompleteness and uncertainty in target systems, while it comes with the cost of time and space. Chechik and others proposed an efficient reduction from multi-valued model checking problems to two-valued ones, but to the authors' knowledge, no study was done for multi-valued bounded model checking. In this paper, we propose a novel, efficient algorithm for multi-valued bounded model checking. A notable feature of our algorithm is that it is not based on reduction of multi-values into two-values; instead, it generates a single formula which represents multi-valuedness by a suitable encoding, and asks a standard SAT solver to check its satisfiability. Our experimental results show a significant improvement in the number of variables and clauses and also in execution time compared with the reduction-based one.

  9. Integrating digital topology in image-processing libraries.

    Science.gov (United States)

    Lamy, Julien

    2007-01-01

    This paper describes a method to integrate digital topology informations in image-processing libraries. This additional information allows a library user to write algorithms respecting topological constraints, for example, a seed fill or a skeletonization algorithm. As digital topology is absent from most image-processing libraries, such constraints cannot be fulfilled. We describe and give code samples for all the structures necessary for this integration, and show a use case in the form of a homotopic thinning filter inside ITK. The obtained filter can be up to a hundred times as fast as ITK's thinning filter and works for any image dimension. This paper mainly deals of integration within ITK, but can be adapted with only minor modifications to other image-processing libraries.

  10. Independent checks of linear accelerators equipped with multileaf collimators

    International Nuclear Information System (INIS)

    Pavlikova, I.; Ekendahl, D.; Horakova, I.

    2005-01-01

    National Radiation Protection Institute (NRPI) provides independent checks of therapeutic equipment as a part of state supervision. In the end of 2003, the audit was broaden for linear accelerators equipped with multileaf collimators (MLC). NRPI provides TLD postal audits and on-site independent checks. This contribution describes tests for multileaf collimators and intensity modulated radiation therapy (IMRT) technique that are accomplished within the independent on-site check of linear accelerators. The character and type of tests that are necessary to pursue for multileaf collimator depends on application technique. There are three basic application of the MLC. The first we call 'static MLC' and it serves for replacing conventional blocking or for adjusting the field shape to match the beam's-eye view projection of a planning target volume during an arc rotation of the x-ray beam. This procedure is called conformal radiotherapy. The most advanced technique with MLC is intensity modulated radiation therapy. The dose can be delivered to the patient with IMRT in various different ways: dynamic MLC, segmented MLC and IMRT arc therapy. Independent audits represent an important instrument of quality assurance. Methodology for independent check of static MLC was successfully verified on two types of accelerators: Varian and Elekta. Results from pilot measurements with dynamic MLC imply that the methodology is applicable for Varian accelerators. In the future, the experience with other types of linear accelerators will contribute to renovation, modification, and broaden independent checks methodology. (authors)

  11. Constraints and Creativity in NPD - Testing the Impact of 'Late Constraints'

    DEFF Research Database (Denmark)

    Onarheim, Balder; Valgeirsdóttir, Dagný

    experiment was conducted, involving 12 teams of industrial designers from three different countries, each team working on two 30 minutes design tasks. In one condition all constraints were given at the start, and in the other one new radical constraint was added after 12 minutes. The output from all 24 tasks......The aim of the presented work is to investigate how the timing of project constraints can influence the creativity of the output in New Product Development (NPD) projects. When seeking to produce a creative output, is it beneficial to know all constraints when initiating a project...... was assessed for creativity using the Consensual Assessment Technique (CAT), and a comparative within-subjects analysis found no significant different between the two conditions. Controlling for task and assessor a small but non-significant effect was found, in favor of the ‘late constraint’ condition. Thus...

  12. Grammatical constraints on phonological encoding in speech production.

    Science.gov (United States)

    Heller, Jordana R; Goldrick, Matthew

    2014-12-01

    To better understand the influence of grammatical encoding on the retrieval and encoding of phonological word-form information during speech production, we examine how grammatical class constraints influence the activation of phonological neighbors (words phonologically related to the target--e.g., MOON, TWO for target TUNE). Specifically, we compare how neighbors that share a target's grammatical category (here, nouns) influence its planning and retrieval, assessed by picture naming latencies, and phonetic encoding, assessed by word productions in picture names, when grammatical constraints are strong (in sentence contexts) versus weak (bare naming). Within-category (noun) neighbors influenced planning time and phonetic encoding more strongly in sentence contexts. This suggests that grammatical encoding constrains phonological processing; the influence of phonological neighbors is grammatically dependent. Moreover, effects on planning times could not fully account for phonetic effects, suggesting that phonological interaction affects articulation after speech onset. These results support production theories integrating grammatical, phonological, and phonetic processes.

  13. Connectionism, parallel constraint satisfaction processes, and gestalt principles: (re) introducing cognitive dynamics to social psychology.

    Science.gov (United States)

    Read, S J; Vanman, E J; Miller, L C

    1997-01-01

    We argue that recent work in connectionist modeling, in particular the parallel constraint satisfaction processes that are central to many of these models, has great importance for understanding issues of both historical and current concern for social psychologists. We first provide a brief description of connectionist modeling, with particular emphasis on parallel constraint satisfaction processes. Second, we examine the tremendous similarities between parallel constraint satisfaction processes and the Gestalt principles that were the foundation for much of modem social psychology. We propose that parallel constraint satisfaction processes provide a computational implementation of the principles of Gestalt psychology that were central to the work of such seminal social psychologists as Asch, Festinger, Heider, and Lewin. Third, we then describe how parallel constraint satisfaction processes have been applied to three areas that were key to the beginnings of modern social psychology and remain central today: impression formation and causal reasoning, cognitive consistency (balance and cognitive dissonance), and goal-directed behavior. We conclude by discussing implications of parallel constraint satisfaction principles for a number of broader issues in social psychology, such as the dynamics of social thought and the integration of social information within the narrow time frame of social interaction.

  14. Free and constrained symplectic integrators for numerical general relativity

    International Nuclear Information System (INIS)

    Richter, Ronny; Lubich, Christian

    2008-01-01

    We consider symplectic time integrators in numerical general relativity and discuss both free and constrained evolution schemes. For free evolution of ADM-like equations we propose the use of the Stoermer-Verlet method, a standard symplectic integrator which here is explicit in the computationally expensive curvature terms. For the constrained evolution we give a formulation of the evolution equations that enforces the momentum constraints in a holonomically constrained Hamiltonian system and turns the Hamilton constraint function from a weak to a strong invariant of the system. This formulation permits the use of the constraint-preserving symplectic RATTLE integrator, a constrained version of the Stoermer-Verlet method. The behavior of the methods is illustrated on two effectively (1+1)-dimensional versions of Einstein's equations, which allow us to investigate a perturbed Minkowski problem and the Schwarzschild spacetime. We compare symplectic and non-symplectic integrators for free evolution, showing very different numerical behavior for nearly-conserved quantities in the perturbed Minkowski problem. Further we compare free and constrained evolution, demonstrating in our examples that enforcing the momentum constraints can turn an unstable free evolution into a stable constrained evolution. This is demonstrated in the stabilization of a perturbed Minkowski problem with Dirac gauge, and in the suppression of the propagation of boundary instabilities into the interior of the domain in Schwarzschild spacetime

  15. Sum rules and constraints on passive systems

    International Nuclear Information System (INIS)

    Bernland, A; Gustafsson, M; Luger, A

    2011-01-01

    A passive system is one that cannot produce energy, a property that naturally poses constraints on the system. A system in convolution form is fully described by its transfer function, and the class of Herglotz functions, holomorphic functions mapping the open upper half-plane to the closed upper half-plane, is closely related to the transfer functions of passive systems. Following a well-known representation theorem, Herglotz functions can be represented by means of positive measures on the real line. This fact is exploited in this paper in order to rigorously prove a set of integral identities for Herglotz functions that relate weighted integrals of the function to its asymptotic expansions at the origin and infinity. The integral identities are the core of a general approach introduced here to derive sum rules and physical limitations on various passive physical systems. Although similar approaches have previously been applied to a wide range of specific applications, this paper is the first to deliver a general procedure together with the necessary proofs. This procedure is described thoroughly and exemplified with examples from electromagnetic theory.

  16. Cuba: Multidimensional numerical integration library

    Science.gov (United States)

    Hahn, Thomas

    2016-08-01

    The Cuba library offers four independent routines for multidimensional numerical integration: Vegas, Suave, Divonne, and Cuhre. The four algorithms work by very different methods, and can integrate vector integrands and have very similar Fortran, C/C++, and Mathematica interfaces. Their invocation is very similar, making it easy to cross-check by substituting one method by another. For further safeguarding, the output is supplemented by a chi-square probability which quantifies the reliability of the error estimate.

  17. Magnetic Check Valve

    Science.gov (United States)

    Morris, Brian G.; Bozeman, Richard J., Jr.

    1994-01-01

    Poppet in proposed check valve restored to closed condition by magnetic attraction instead of spring force. Oscillations suppressed, with consequent reduction of wear. Stationary magnetic disk mounted just upstream of poppet, also containing magnet. Valve body nonmagnetic. Forward pressure or flow would push poppet away from stationary magnetic disk so fluid flows easily around poppet. Stop in valve body prevents poppet from being swept away. When flow stopped or started to reverse, magnetic attraction draws poppet back to disk. Poppet then engages floating O-ring, thereby closing valve and preventing reverse flow. Floating O-ring facilitates sealing at low loads.

  18. Member Checking: A Tool to Enhance Trustworthiness or Merely a Nod to Validation?

    Science.gov (United States)

    Birt, Linda; Scott, Suzanne; Cavers, Debbie; Campbell, Christine; Walter, Fiona

    2016-06-22

    The trustworthiness of results is the bedrock of high quality qualitative research. Member checking, also known as participant or respondent validation, is a technique for exploring the credibility of results. Data or results are returned to participants to check for accuracy and resonance with their experiences. Member checking is often mentioned as one in a list of validation techniques. This simplistic reporting might not acknowledge the value of using the method, nor its juxtaposition with the interpretative stance of qualitative research. In this commentary, we critique how member checking has been used in published research, before describing and evaluating an innovative in-depth member checking technique, Synthesized Member Checking. The method was used in a study with patients diagnosed with melanoma. Synthesized Member Checking addresses the co-constructed nature of knowledge by providing participants with the opportunity to engage with, and add to, interview and interpreted data, several months after their semi-structured interview. © The Author(s) 2016.

  19. Integrated Risk Management Within NASA Programs/Projects

    Science.gov (United States)

    Connley, Warren; Rad, Adrian; Botzum, Stephen

    2004-01-01

    As NASA Project Risk Management activities continue to evolve, the need to successfully integrate risk management processes across the life cycle, between functional disciplines, stakeholders, various management policies, and within cost, schedule and performance requirements/constraints become more evident and important. Today's programs and projects are complex undertakings that include a myriad of processes, tools, techniques, management arrangements and other variables all of which must function together in order to achieve mission success. The perception and impact of risk may vary significantly among stakeholders and may influence decisions that may have unintended consequences on the project during a future phase of the life cycle. In these cases, risks may be unintentionally and/or arbitrarily transferred to others without the benefit of a comprehensive systemic risk assessment. Integrating risk across people, processes, and project requirements/constraints serves to enhance decisions, strengthen communication pathways, and reinforce the ability of the project team to identify and manage risks across the broad spectrum of project management responsibilities. The ability to identify risks in all areas of project management increases the likelihood a project will identify significant issues before they become problems and allows projects to make effective and efficient use of shrinking resources. By getting a total team integrated risk effort, applying a disciplined and rigorous process, along with understanding project requirements/constraints provides the opportunity for more effective risk management. Applying an integrated approach to risk management makes it possible to do a better job at balancing safety, cost, schedule, operational performance and other elements of risk. This paper will examine how people, processes, and project requirements/constraints can be integrated across the project lifecycle for better risk management and ultimately improve the

  20. Employees are ambivalent about health checks in the occupational setting

    NARCIS (Netherlands)

    Damman, O.C.; van der Beek, A.J.; Timmermans, D.R.M.

    2015-01-01

    Background: Employees are increasingly provided with preventive health checks. However, participation rates are low and several ethical issues arise, such as a potential perceived threat to autonomy and privacy. Aims: To assess what employees think about preventive health checks in the occupational

  1. Evaluation of Dosimetry Check software for IMRT patient-specific quality assurance.

    Science.gov (United States)

    Narayanasamy, Ganesh; Zalman, Travis; Ha, Chul S; Papanikolaou, Niko; Stathakis, Sotirios

    2015-05-08

    The purpose of this study is to evaluate the use of the Dosimetry Check system for patient-specific IMRT QA. Typical QA methods measure the dose in an array dosimeter surrounded by homogenous medium for which the treatment plan has been recomputed. With the Dosimetry Check system, fluence measurements acquired on a portal dosimeter is applied to the patient's CT scans. Instead of making dose comparisons in a plane, Dosimetry Check system produces isodose lines and dose-volume histograms based on the planning CT images. By exporting the dose distribution from the treatment planning system into the Dosimetry Check system, one is able to make a direct comparison between the calculated dose and the planned dose. The versatility of the software is evaluated with respect to the two IMRT techniques - step and shoot and volumetric arc therapy. The system analyzed measurements made using EPID, PTW seven29, and IBA MatriXX, and an intercomparison study was performed. Plans from patients previously treated at our institution with treated anatomical site on brain, head & neck, liver, lung, and prostate were analyzed using Dosimetry Check system for any anatomical site dependence. We have recommendations and possible precautions that may be necessary to ensure proper QA with the Dosimetry Check system.

  2. First experiences with the LHC BLM sanity checks

    OpenAIRE

    Emery, J; Dehning, B; Effinger, E; Nordt, A; Sapinski, M G; Zamantzas, C

    2010-01-01

    The reliability concerns have driven the design of the Large Hardron Collider (LHC) Beam Loss Monitoring (BLM) system from the early stage of the studies up to the present commissioning and the latest development of diagnostic tools. To protect the system against non-conformities, new ways of automatic checking have been developed and implemented. These checks are regularly and systematically executed by the LHC operation team to ensure that the system status is after each test "as good as ne...

  3. Novel approach to assess local market power considering transmission constraints

    International Nuclear Information System (INIS)

    Li, Canbing; Xia, Qing; Kang, Chongqing; Jiang, Jianjian

    2008-01-01

    Market power (MP) assessment and mitigation affect the efficiency of the generation market. The traditional indices such as HHI and Lerner index can not express local market power, which caused by transmission constraints. Transmission constraints divide the market into some smaller parts. Some generators can abuse their MP in one part but not in the whole market. This paper describes a new approach to assess market power. The main contributions of the new method can be summarized as following. First, the concept of local market is developed, and the whole power system is divided into several local markets, as transmission congestions dividing the market. In the local markets, there are no transmission constraints so local market power does not exist. Then the local market power index (LMPI) is calculated according to market concentration, transmission constraints, and demand-supply ratio. Based on LMPI, the integrated local market power index which describes the whole picture of market can be obtained. It has been proved that the new approach can assess market power exactly, and identify the critical factor that results in market power and where generators are easy to exercise market power. The finding in this paper is helpful for market monitoring and mitigating market power. Moreover, the new index can be used to evaluate the power grid availability to generation competition and the power transmission expansion planning. (author)

  4. Grab Windows training opportunities; check CERN Windows roadmap!

    CERN Multimedia

    IT Department

    2011-01-01

    CERN Operating Systems and Information Services group (IT-OIS) actively monitors market trends to check how new software products correspond to CERN needs. In the Windows world, Windows 7 has been a big hit, with over 1500 Windows 7 PCs within less than a year since its support was introduced at CERN. No wonder: Windows XP is nearly 10 years old and is steadily approaching the end of its life-cycle. At CERN, support for Windows XP will stop at the end of December 2012. Compared to Vista, Windows 7 has the same basic hardware requirements, but offers higher performance, so the decision to upgrade is rather straightforward. CERN support for Vista will end in June 2011. In the world of Microsoft Office, version 2007 offers better integration with the central services than the older version 2003. Progressive upgrade from 2003 to 2007 is planned to finish in September 2011, but users are encouraged to pro-actively upgrade at their convenience. Please note that Office 2007 brings an important change in the area of ...

  5. SU-D-BRD-03: Improving Plan Quality with Automation of Treatment Plan Checks

    International Nuclear Information System (INIS)

    Covington, E; Younge, K; Chen, X; Lee, C; Matuszak, M; Kessler, M; Acosta, E; Orow, A; Filpansick, S; Moran, J; Keranen, W

    2015-01-01

    Purpose: To evaluate the effectiveness of an automated plan check tool to improve first-time plan quality as well as standardize and document performance of physics plan checks. Methods: The Plan Checker Tool (PCT) uses the Eclipse Scripting API to check and compare data from the treatment planning system (TPS) and treatment management system (TMS). PCT was created to improve first-time plan quality, reduce patient delays, increase efficiency of our electronic workflow, and to standardize and partially automate plan checks in the TPS. A framework was developed which can be configured with different reference values and types of checks. One example is the prescribed dose check where PCT flags the user when the planned dose and the prescribed dose disagree. PCT includes a comprehensive checklist of automated and manual checks that are documented when performed by the user. A PDF report is created and automatically uploaded into the TMS. Prior to and during PCT development, errors caught during plan checks and also patient delays were tracked in order to prioritize which checks should be automated. The most common and significant errors were determined. Results: Nineteen of 33 checklist items were automated with data extracted with the PCT. These include checks for prescription, reference point and machine scheduling errors which are three of the top six causes of patient delays related to physics and dosimetry. Since the clinical roll-out, no delays have been due to errors that are automatically flagged by the PCT. Development continues to automate the remaining checks. Conclusion: With PCT, 57% of the physics plan checklist has been partially or fully automated. Treatment delays have declined since release of the PCT for clinical use. By tracking delays and errors, we have been able to measure the effectiveness of automating checks and are using this information to prioritize future development. This project was supported in part by P01CA059827

  6. SU-D-BRD-03: Improving Plan Quality with Automation of Treatment Plan Checks

    Energy Technology Data Exchange (ETDEWEB)

    Covington, E; Younge, K; Chen, X; Lee, C; Matuszak, M; Kessler, M; Acosta, E; Orow, A; Filpansick, S; Moran, J [University of Michigan Hospital and Health System, Ann Arbor, MI (United States); Keranen, W [Varian Medical Systems, Palo Alto, CA (United States)

    2015-06-15

    Purpose: To evaluate the effectiveness of an automated plan check tool to improve first-time plan quality as well as standardize and document performance of physics plan checks. Methods: The Plan Checker Tool (PCT) uses the Eclipse Scripting API to check and compare data from the treatment planning system (TPS) and treatment management system (TMS). PCT was created to improve first-time plan quality, reduce patient delays, increase efficiency of our electronic workflow, and to standardize and partially automate plan checks in the TPS. A framework was developed which can be configured with different reference values and types of checks. One example is the prescribed dose check where PCT flags the user when the planned dose and the prescribed dose disagree. PCT includes a comprehensive checklist of automated and manual checks that are documented when performed by the user. A PDF report is created and automatically uploaded into the TMS. Prior to and during PCT development, errors caught during plan checks and also patient delays were tracked in order to prioritize which checks should be automated. The most common and significant errors were determined. Results: Nineteen of 33 checklist items were automated with data extracted with the PCT. These include checks for prescription, reference point and machine scheduling errors which are three of the top six causes of patient delays related to physics and dosimetry. Since the clinical roll-out, no delays have been due to errors that are automatically flagged by the PCT. Development continues to automate the remaining checks. Conclusion: With PCT, 57% of the physics plan checklist has been partially or fully automated. Treatment delays have declined since release of the PCT for clinical use. By tracking delays and errors, we have been able to measure the effectiveness of automating checks and are using this information to prioritize future development. This project was supported in part by P01CA059827.

  7. Integrating Water Supply Constraints into Irrigated Agricultural Simulations of California

    Science.gov (United States)

    Winter, Jonathan M.; Young, Charles A.; Mehta, Vishal K.; Ruane, Alex C.; Azarderakhsh, Marzieh; Davitt, Aaron; McDonald, Kyle; Haden, Van R.; Rosenzweig, Cynthia E.

    2017-01-01

    Simulations of irrigated croplands generally lack key interactions between water demand from plants and water supply from irrigation systems. We coupled the Water Evaluation and Planning system (WEAP) and Decision Support System for Agrotechnology Transfer (DSSAT) to link regional water supplies and management with field-level water demand and crop growth. WEAP-DSSAT was deployed and evaluated over Yolo County in California for corn, rice, and wheat. WEAP-DSSAT is able to reproduce the results of DSSAT under well-watered conditions and reasonably simulate observed mean yields, but has difficulty capturing yield interannual variability. Constraining irrigation supply to surface water alone reduces yields for all three crops during the 1987-1992 drought. Corn yields are reduced proportionally with water allocation, rice yield reductions are more binary based on sufficient water for flooding, and wheat yields are least sensitive to irrigation constraints as winter wheat is grown during the wet season.

  8. 21 CFR 1301.93 - Sources of information for employee checks.

    Science.gov (United States)

    2010-04-01

    ... OF MANUFACTURERS, DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Employee Screening-Non-Practitioners § 1301.93 Sources of information for employee checks. DEA recommends that inquiries concerning... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Sources of information for employee checks. 1301...

  9. The Family Check-Up and Service Use in High-Risk Families of Young Children: A Prevention Strategy with a Bridge to Community-Based Treatment

    NARCIS (Netherlands)

    Leijten, Patty; Shaw, Daniel S.; Gardner, Frances; Wilson, Melvin N.; Matthys, Walter; Dishion, Thomas J.

    2015-01-01

    Integration of empirically supported prevention programs into existing community services is a critical step toward effecting sustainable change for the highest-risk members in a community. We examined if the Family Check-Up—known to reduce disruptive behavior problems in young children—can provide

  10. The family check-up and service use in high-risk families of young children: a prevention strategy with a bridge to community-based treatment

    NARCIS (Netherlands)

    Leijten, P.; Shaw, D.S.; Gardner, F.; Wilson, M.N.; Matthys, W.; Dishion, T.J.

    2015-01-01

    Integration of empirically supported prevention programs into existing community services is a critical step toward effecting sustainable change for the highest-risk members in a community. We examined if the Family Check-Up—known to reduce disruptive behavior problems in young children—can provide

  11. Behavioral Consistency of C and Verilog Programs Using Bounded Model Checking

    National Research Council Canada - National Science Library

    Clarke, Edmund; Kroening, Daniel; Yorav, Karen

    2003-01-01

    .... We describe experimental results on various reactive present an algorithm that checks behavioral consistency between an ANSI-C program and a circuit given in Verilog using Bounded Model Checking...

  12. Reducing Lookups for Invariant Checking

    DEFF Research Database (Denmark)

    Thomsen, Jakob Grauenkjær; Clausen, Christian; Andersen, Kristoffer Just

    2013-01-01

    This paper helps reduce the cost of invariant checking in cases where access to data is expensive. Assume that a set of variables satisfy a given invariant and a request is received to update a subset of them. We reduce the set of variables to inspect, in order to verify that the invariant is still...

  13. Standard model effective field theory: Integrating out neutralinos and charginos in the MSSM

    Science.gov (United States)

    Han, Huayong; Huo, Ran; Jiang, Minyuan; Shu, Jing

    2018-05-01

    We apply the covariant derivative expansion method to integrate out the neutralinos and charginos in the minimal supersymmetric Standard Model. The results are presented as set of pure bosonic dimension-six operators in the Standard Model effective field theory. Nontrivial chirality dependence in fermionic covariant derivative expansion is discussed carefully. The results are checked by computing the h γ γ effective coupling and the electroweak oblique parameters using the Standard Model effective field theory with our effective operators and direct loop calculation. In global fitting, the proposed lepton collider constraint projections, special phenomenological emphasis is paid to the gaugino mass unification scenario (M2≃2 M1) and anomaly mediation scenario (M1≃3.3 M2). These results show that the precision measurement experiments in future lepton colliders will provide a very useful complementary job in probing the electroweakino sector, in particular, filling the gap of the soft lepton plus the missing ET channel search left by the traditional collider, where the neutralino as the lightest supersymmetric particle is very degenerated with the next-to-lightest chargino/neutralino.

  14. Not Just right experiences as ironic result of perseverative checking

    NARCIS (Netherlands)

    van Dis, E.A.M.; van den Hout, M.A.

    2016-01-01

    Objective: patients with obsessive-compulsive disorder (ocD) typically report to have “not just right experiences” (NJRE). up till now it is unclear which behavioral ocD features may give rise to NJREs. We used an induced checking paradigm to experimentally study whether perseverative checking

  15. Welfare Checks, Drug Consumption, and Health: Evidence from Vancouver Injection Drug Users

    Science.gov (United States)

    Riddell, Chris; Riddell, Rosemarie

    2006-01-01

    This paper investigates the link between welfare payments and drug use among injection drug users. The authors find an increase in the likelihood of an overdose in the days following check arrival, and in the probability of leaving the hospital against medical advice (AMA) on check day. Using the check arrival date as an instrument, we estimate…

  16. Magnetically operated check valve

    Science.gov (United States)

    Morris, Brian G.; Bozeman, Richard J., Jr.

    1994-06-01

    A magnetically operated check valve is disclosed. The valve is comprised of a valve body and a movable poppet disposed therein. A magnet attracts the poppet to hold the valve shut until the force of fluid flow through the valve overcomes the magnetic attraction and moves the poppet to an unseated, open position. The poppet and magnet are configured and disposed to trap a magnetically attracted particulate and prevent it from flowing to a valve seating region.

  17. Financing Constraints and Entrepreneurship

    OpenAIRE

    William R. Kerr; Ramana Nanda

    2009-01-01

    Financing constraints are one of the biggest concerns impacting potential entrepreneurs around the world. Given the important role that entrepreneurship is believed to play in the process of economic growth, alleviating financing constraints for would-be entrepreneurs is also an important goal for policymakers worldwide. We review two major streams of research examining the relevance of financing constraints for entrepreneurship. We then introduce a framework that provides a unified perspecti...

  18. A naturalistic examination of body checking and dietary restriction in women with anorexia nervosa.

    Science.gov (United States)

    Lavender, Jason M; Wonderlich, Stephen A; Crosby, Ross D; Engel, Scott G; Mitchell, James E; Crow, Scott; Peterson, Carol B; Le Grange, Daniel

    2013-08-01

    Body checking has been conceptualized as a behavioral manifestation of the core overvaluation of eating, shape, and weight concerns underlying eating disorder psychopathology. Cognitive-behavioral theories suggest that body checking behaviors may function to maintain dietary restriction. The current study examined the association between body checking frequency and dietary restriction among women with anorexia nervosa (AN) in the natural environment. Women (N = 118) with full or partial AN completed baseline clinical interviews and a two-week ecological momentary assessment protocol, during which they reported on body checking behaviors (i.e., checking whether one's thighs touch; checking joints/bones for fat) and dietary restriction (i.e., 8 waking hours without eating; consuming less than 1200 calories per day). Average daily body checking frequency was positively associated with baseline eating disorder symptoms and body mass index. Daily body checking frequency was associated with both forms of dietary restriction on the same day, as well as the following day. Results support the theorized association between body checking and overvaluation of shape and weight, and suggest that targeting such behaviors in treatment may have utility in reducing dietary restriction. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Creativity from Constraints in Engineering Design

    DEFF Research Database (Denmark)

    Onarheim, Balder

    2012-01-01

    This paper investigates the role of constraints in limiting and enhancing creativity in engineering design. Based on a review of literature relating constraints to creativity, the paper presents a longitudinal participatory study from Coloplast A/S, a major international producer of disposable...... and ownership of formal constraints played a crucial role in defining their influence on creativity – along with the tacit constraints held by the designers. The designers were found to be highly constraint focused, and four main creative strategies for constraint manipulation were observed: blackboxing...

  20. Model Checking Timed Automata with Priorities using DBM Subtraction

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Pettersson, Paul

    2006-01-01

    In this paper we describe an extension of timed automata with priorities, and efficient algorithms to compute subtraction on DBMs (difference bounded matrices), needed in symbolic model-checking of timed automata with priorities. The subtraction is one of the few operations on DBMs that result...... in a non-convex set needing sets of DBMs for representation. Our subtraction algorithms are efficient in the sense that the number of generated DBMs is significantly reduced compared to a naive algorithm. The overhead in time is compensated by the gain from reducing the number of resulting DBMs since...... this number affects the performance of symbolic model-checking. The uses of the DBM subtraction operation extend beyond timed automata with priorities. It is also useful for allowing guards on transitions with urgent actions, deadlock checking, and timed games....

  1. A review of historical check valve failure data

    International Nuclear Information System (INIS)

    Casada, D.A.; Todd, M.D.

    1992-01-01

    Check valve operating problems in recent years have resulted in significant operating transients, increased cost, and decreased system availability. In response, additional attention has been given to check valves by utilities, as well as the US Nuclear Regulatory Commission (NRC) and the American Society of Mechanical Engineers Operation and Maintenance Committee. All these organizations have the fundamental goal of ensuring reliable operation of check valves. A key ingredient of an engineering-oriented reliability improvement effort is a thorough understanding of relevant historical experience. Oak Ridge National Laboratory is currently conducting a detailed review of historical failure data available through the Institute of Nuclear Power Operation's Nuclear Plant Reliability Data System. The focus of the review is on check valve failures that have involved significant degradation of the valve internal parts. A variety of parameters are being considered during the review, including size, age, system of service, method of failure discovery, the affected valve parts, attributed causes, and corrective actions. This work is being carried out under the auspices of the NRC's Nuclear Plant Aging Research program. At this time, the study is approximately 50% complete. All failure records have been reviewed and categorized, and preliminary tabulation and correlation of data is underway. The bulk of the tabulation and correlation portion of the work is expected to be completed by the end of June 1992. A report draft is expected in the fall of 1992

  2. Statistical Model Checking for Biological Systems

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel

    2014-01-01

    Statistical Model Checking (SMC) is a highly scalable simulation-based verification approach for testing and estimating the probability that a stochastic system satisfies a given linear temporal property. The technique has been applied to (discrete and continuous time) Markov chains, stochastic...

  3. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  4. Political and judicial checks on corruption

    DEFF Research Database (Denmark)

    Alt, James E.; Lassen, David Dreyer

    2008-01-01

    This paper investigates the effects of checks and balances on corruption. Within a presidential system, effective separation of powers is achieved under a divided government, with the executive and legislative branches being controlled by different political parties. When government is unified...

  5. A Secure and Effective Anonymous Integrity Checking Protocol for Data Storage in Multicloud

    Directory of Open Access Journals (Sweden)

    Lingwei Song

    2015-01-01

    Full Text Available How to verify the integrity of outsourced data is an important problem in cloud storage. Most of previous work focuses on three aspects, which are providing data dynamics, public verifiability, and privacy against verifiers with the help of a third party auditor. In this paper, we propose an identity-based data storage and integrity verification protocol on untrusted cloud. And the proposed protocol can guarantee fair results without any third verifying auditor. The theoretical analysis and simulation results show that our protocols are secure and efficient.

  6. A multi-objective constraint-based approach for modeling genome-scale microbial ecosystems.

    Science.gov (United States)

    Budinich, Marko; Bourdon, Jérémie; Larhlimi, Abdelhalim; Eveillard, Damien

    2017-01-01

    Interplay within microbial communities impacts ecosystems on several scales, and elucidation of the consequent effects is a difficult task in ecology. In particular, the integration of genome-scale data within quantitative models of microbial ecosystems remains elusive. This study advocates the use of constraint-based modeling to build predictive models from recent high-resolution -omics datasets. Following recent studies that have demonstrated the accuracy of constraint-based models (CBMs) for simulating single-strain metabolic networks, we sought to study microbial ecosystems as a combination of single-strain metabolic networks that exchange nutrients. This study presents two multi-objective extensions of CBMs for modeling communities: multi-objective flux balance analysis (MO-FBA) and multi-objective flux variability analysis (MO-FVA). Both methods were applied to a hot spring mat model ecosystem. As a result, multiple trade-offs between nutrients and growth rates, as well as thermodynamically favorable relative abundances at community level, were emphasized. We expect this approach to be used for integrating genomic information in microbial ecosystems. Following models will provide insights about behaviors (including diversity) that take place at the ecosystem scale.

  7. PREREQUISITE PROGRAMMES IN OWN CHECKS IN STATUTORY AND VOLUNTARY LEGISLATION

    Directory of Open Access Journals (Sweden)

    E. Guidi

    2012-08-01

    Full Text Available Prerequisite Programmes approach is a requirement for implementing a correct own check plan. This new approach, born according to the European Legislation, is completely recognized by third Nation Authorities and private Inspection and Accreditation Bodies. This method is the basis to verify if an own check system is under control and to verify if corrective actions are built up to warrant hygienic production standards. The present work demonstrate that a correct own check plan is built up only by a Pre Requisites Program approach. The new UNI EN ISO 22000:2005 standard describe this concept specifying the difference between PRP and CCP.

  8. Exact Solution of a Constraint Optimization Problem for the Thermoelectric Figure of Merit

    Directory of Open Access Journals (Sweden)

    Wolfgang Seifert

    2012-03-01

    Full Text Available In the classical theory of thermoelectricity, the performance integrals for a fully self-compatible material depend on the dimensionless figure of merit zT. Usually these integrals are evaluated for constraints z = const. and zT = const., respectively. In this paper we discuss the question from a mathematical point of view whether there is an optimal temperature characteristics of the figure of merit. We solve this isoperimetric variational problem for the best envelope of a family of curves z(TT.

  9. Exact Solution of a Constraint Optimization Problem for the Thermoelectric Figure of Merit.

    Science.gov (United States)

    Seifert, Wolfgang; Pluschke, Volker

    2012-03-21

    In the classical theory of thermoelectricity, the performance integrals for a fully self-compatible material depend on the dimensionless figure of merit zT. Usually these integrals are evaluated for constraints z = const. and zT = const., respectively. In this paper we discuss the question from a mathematical point of view whether there is an optimal temperature characteristics of the figure of merit. We solve this isoperimetric variational problem for the best envelope of a family of curves z(T)T.

  10. Deepening Contractions and Collateral Constraints

    DEFF Research Database (Denmark)

    Jensen, Henrik; Ravn, Søren Hove; Santoro, Emiliano

    and occasionally non-binding credit constraints. Easier credit access increases the likelihood that constraints become slack in the face of expansionary shocks, while contractionary shocks are further amplified due to tighter constraints. As a result, busts gradually become deeper than booms. Based...

  11. Preventing the threat of credit-card fraud: Factors influencing cashiers' identification-checking behavior.

    Science.gov (United States)

    Downing, Christopher; Howard, E Henry; Goodwin, Christina; Geller, E Scott

    2016-01-01

    Two studies examined factors influencing cashiers' identification (ID)-checking behavior in order to inform the development of interventions to prevent credit-card fraud. In both studies, research assistants made credit purchases in various stores and noted the cashiers' ID-checking behavior. In the first study, the store type, whether the cashier swiped the credit/debit card, the amount of the purchase, and whether the credit/debit card was signed significantly influenced ID-checking behavior. In the second study, an A-B-A design was used to evaluate the impact of a "Check my ID" prompt placed on the credit/debit card. The prompt increased cashiers' ID-checking behavior from 5.9% at Baseline to 10.3% during the Intervention. When the prompt was removed, the cashiers' ID-checking behavior decreased to 7.2%. Implications for further intervention research to prevent credit-card fraud are discussed.

  12. Radiation systems for luggage and parcel checks

    International Nuclear Information System (INIS)

    Honomichl, V.

    1989-01-01

    The current radioscopic systems of luggage check in air traffic are based on the principle of intensifying the brightness of half-tone images on the fluorescent screen of an image intensifier, or use of very sensitive pick-up tubes with digital image processing. Computers are used for signal processing and the image is produced on a display unit. Sources of continuous or pulse X-ray radiation are used. The signals from the detector are amplified, converted and stored in a buffer and then displayed. The scanning systems use a narrow beam or, to improve rapidity and sensitivity of scanning, a sector beam of radiation. Equipment is described from Heinemann (FRG) featuring a band of 576 or 768 detectors and microprocessor controlled semiconductor tv cameras. Characteristics are also presented of equipment from Aeradio Ltd (U.K.) and Philips (FRG) companies. Attention is devoted to equipment from American Science and Engineering (U.S.) showing high quality imaging even at low radiation doses. Briefly described are portable check systems for inspection of small luggage and parcels. Characteristics are presented of systems for checking vehicles and containers in naval, air, rail and road transport. The principles and performance are described of the systems. (J.B.). 4 figs

  13. Exploring the roles of cannot-link constraint in community detection via Multi-variance Mixed Gaussian Generative Model

    Science.gov (United States)

    Ge, Meng; Jin, Di; He, Dongxiao; Fu, Huazhu; Wang, Jing; Cao, Xiaochun

    2017-01-01

    Due to the demand for performance improvement and the existence of prior information, semi-supervised community detection with pairwise constraints becomes a hot topic. Most existing methods have been successfully encoding the must-link constraints, but neglect the opposite ones, i.e., the cannot-link constraints, which can force the exclusion between nodes. In this paper, we are interested in understanding the role of cannot-link constraints and effectively encoding pairwise constraints. Towards these goals, we define an integral generative process jointly considering the network topology, must-link and cannot-link constraints. We propose to characterize this process as a Multi-variance Mixed Gaussian Generative (MMGG) Model to address diverse degrees of confidences that exist in network topology and pairwise constraints and formulate it as a weighted nonnegative matrix factorization problem. The experiments on artificial and real-world networks not only illustrate the superiority of our proposed MMGG, but also, most importantly, reveal the roles of pairwise constraints. That is, though the must-link is more important than cannot-link when either of them is available, both must-link and cannot-link are equally important when both of them are available. To the best of our knowledge, this is the first work on discovering and exploring the importance of cannot-link constraints in semi-supervised community detection. PMID:28678864

  14. Providing reliable energy in a time of constraints : a North American concern

    International Nuclear Information System (INIS)

    Egan, T.; Turk, E.

    2008-04-01

    The reliability of the North American electricity grid was discussed. Government initiatives designed to control carbon dioxide (CO 2 ) and other emissions in some regions of Canada may lead to electricity supply constraints in other regions. A lack of investment in transmission infrastructure has resulted in constraints within the North American transmission grid, and the growth of smaller projects is now raising concerns about transmission capacity. Labour supply shortages in the electricity industry are also creating concerns about the long-term security of the electricity market. Measures to address constraints must be considered in the current context of the North American electricity system. The extensive transmission interconnects and integration between the United States and Canada will provide a framework for greater trade and market opportunities between the 2 countries. Coordinated actions and increased integration will enable Canada and the United States to increase the reliability of electricity supply. However, both countries must work cooperatively to increase generation supply using both mature and emerging technologies. The cross-border transmission grid must be enhanced by increasing transmission capacity as well as by implementing new reliability rules, building new infrastructure, and ensuring infrastructure protection. Barriers to cross-border electricity trade must be identified and avoided. Demand-side and energy efficiency measures must also be implemented. It was concluded that both countries must focus on developing strategies for addressing the environmental concerns related to electricity production. 6 figs

  15. Who uses NHS health checks? Investigating the impact of ethnicity and gender and method of invitation on uptake of NHS health checks.

    Science.gov (United States)

    Cook, Erica J; Sharp, Chloe; Randhawa, Gurch; Guppy, Andy; Gangotra, Raj; Cox, Jonathon

    2016-01-20

    NHS Health Checks is a national risk assessment prevention programme for all individuals aged 40-74 that reside in England. Through the systematic assessment of an individual's ten year disease risk, this programme aims to provide early identification and subsequent management of this risk. However, there is limited evidence on how socio-demographic factors impact on uptake and what influence the invitation method has on uptake to this programme. NHS Health Check data from April 2013 to March 2014 was analysed (N = 50,485) for all 30 GP Practices in Luton, a culturally diverse town in England, UK. Data was collected for age, ethnicity, uptake (attendance and non attendance) and invitation method (letter written, verbal face-to-face, telephone). Actual usage of NHS Health Checks was determined for each ethnic group of the population and compared using Chi-square analysis. The overall uptake rate for Luton was 44 %, markedly lower that the set target of 50-75 %. The findings revealed a variation of uptake in relation to age, gender, level of deprivation. Ethnicity and gender variations were also found, with 'White British' 'Black Caribbean' and 'Indian' patients most likely to take up a NHS Health Check. However, patients from 'Any Other White Background' and 'Black African' were significantly less likely to uptake an NHS Health Check compared to all other ethnic groups. Ethnicity and gender differences were also noted in relation to invitation method. The findings revealed that different invitation methods were effective for different ethnic and gender groups. Therefore, it is suggested that established protocols of invitation are specifically designed for maximizing the response rate for each population group. Future research should now focus on uncovering the barriers to uptake in particular culturally diverse population groups to determine how public health teams can better engage with these communities.

  16. A periodic review integrated inventory model with controllable setup cost, imperfect items, and inspection errors under service level constraint

    Science.gov (United States)

    Saga, R. S.; Jauhari, W. A.; Laksono, P. W.

    2017-11-01

    This paper presents an integrated inventory model which consists of single vendor and buyer. The buyer managed its inventory periodically and orders products from the vendor to satisfy the end customer’s demand, where the annual demand and the ordering cost were in the fuzzy environment. The buyer used a service level constraint instead of the stock-out cost term, so that the stock-out level per cycle was bounded. Then, the vendor produced and delivered products to the buyer. The vendor had a choice to commit an investment to reduce the setup cost. However, the vendor’s production process was imperfect, thus the lot delivered contained some defective products. Moreover, the buyer’s inspection process was not error-free since the inspector could be mistaken in categorizing the product’s quality. The objective was to find the optimum value for the review period, the setup cost, and the number of deliveries in one production cycle which might minimize the joint total cost. Furthermore, the algorithm and numerical example were provided to illustrate the application of the model.

  17. Model Checking Feature Interactions

    DEFF Research Database (Denmark)

    Le Guilly, Thibaut; Olsen, Petur; Pedersen, Thomas

    2015-01-01

    This paper presents an offline approach to analyzing feature interactions in embedded systems. The approach consists of a systematic process to gather the necessary information about system components and their models. The model is first specified in terms of predicates, before being refined to t...... to timed automata. The consistency of the model is verified at different development stages, and the correct linkage between the predicates and their semantic model is checked. The approach is illustrated on a use case from home automation....

  18. Functional check of telescoping transfer pumps

    International Nuclear Information System (INIS)

    Sharpe, C.L.

    1994-01-01

    Activities are defined which constitute a functional check of a telescoping transfer pump (TTP). This report is written to the Procedures group of HLW and particularly applies to those TTP's which are the sole means of emergency transfer from a HLW waste tank

  19. PVeStA: A Parallel Statistical Model Checking and Quantitative Analysis Tool

    KAUST Repository

    AlTurki, Musab

    2011-01-01

    Statistical model checking is an attractive formal analysis method for probabilistic systems such as, for example, cyber-physical systems which are often probabilistic in nature. This paper is about drastically increasing the scalability of statistical model checking, and making such scalability of analysis available to tools like Maude, where probabilistic systems can be specified at a high level as probabilistic rewrite theories. It presents PVeStA, an extension and parallelization of the VeStA statistical model checking tool [10]. PVeStA supports statistical model checking of probabilistic real-time systems specified as either: (i) discrete or continuous Markov Chains; or (ii) probabilistic rewrite theories in Maude. Furthermore, the properties that it can model check can be expressed in either: (i) PCTL/CSL, or (ii) the QuaTEx quantitative temporal logic. As our experiments show, the performance gains obtained from parallelization can be very high. © 2011 Springer-Verlag.

  20. Occupational dose constraint

    International Nuclear Information System (INIS)

    Heilbron Filho, Paulo Fernando Lavalle; Xavier, Ana Maria

    2005-01-01

    The revision process of the international radiological protection regulations has resulted in the adoption of new concepts, such as practice, intervention, avoidable and restriction of dose (dose constraint). The latter deserving of special mention since it may involve reducing a priori of the dose limits established both for the public and to individuals occupationally exposed, values that can be further reduced, depending on the application of the principle of optimization. This article aims to present, with clarity, from the criteria adopted to define dose constraint values to the public, a methodology to establish the dose constraint values for occupationally exposed individuals, as well as an example of the application of this methodology to the practice of industrial radiography

  1. Checking the transverse Ward-Takahashi relation at one-loop order in four dimensions

    International Nuclear Information System (INIS)

    Pennington, M R; Williams, R

    2006-01-01

    Some time ago Takahashi derived the so-called transverse relations relating Green's functions of different orders to complement the well-known Ward-Green-Takahashi identities of gauge theories by considering wedge rather than inner products. These transverse relations have the potential to determine the full fermion-boson vertex in terms of the renormalization functions of the fermion propagator. He and Yu have given an indicative proof at one-loop level in four dimensions. However, their construct involves the fourth-rank Levi-Civita tensor defined only unambiguously in four dimensions exactly where the loop integrals diverge. Consequently, here we explicitly check the proposed transverse Ward-Takahashi relation holds at one-loop order in d-dimensions, with d = 4 + ε

  2. External post-operational checks for the LHC beam dumping system

    International Nuclear Information System (INIS)

    Magnin, N.; Baggiolini, V.; Carlier, E.; Goddard, B.; Gorbonosov, R.; Khasbulatov, D.; Uythoven, J.; Zerlauth, M.

    2012-01-01

    The LHC Beam Dumping System (LBDS) is a critical part of the LHC machine protection system. After every LHC beam dump action the various signals and transient data recordings of the beam dumping control systems and beam instrumentation measurements are automatically analysed by the external Post-Operational Checks (XPOC) system to verify the correct execution of the dump action and the integrity of the related equipment. This software system complements the LHC machine protection hardware, and has to ascertain that the beam dumping system is 'as good as new' before the start of the next operational cycle. This is the only way by which the stringent reliability requirements can be met. The XPOC system has been developed within the framework of the LHC 'Post-Mortem' system, allowing highly dependable data acquisition, data archiving, live analysis of acquired data and replay of previously recorded events. It is composed of various analysis modules, each one dedicated to the analysis of measurements coming from specific equipment. This paper describes the global architecture of the XPOC system and gives examples of the analyses performed by some of the most important analysis modules. It explains the integration of the XPOC into the LHC control infrastructure along with its integration into the decision chain to allow proceeding with beam operation. Finally, it discusses the operational experience with the XPOC system acquired during the first years of LHC operation, and illustrates examples of internal system faults or abnormal beam dump executions which it has detected. (authors)

  3. 48 CFR 22.406-7 - Compliance checking.

    Science.gov (United States)

    2010-10-01

    ... SOCIOECONOMIC PROGRAMS APPLICATION OF LABOR LAWS TO GOVERNMENT ACQUISITIONS Labor Standards for Contracts... inspections to check type of work performed, number and classification of workers, and fulfillment of posting...

  4. SOLA-LOOP analysis of a back pressure check valve

    International Nuclear Information System (INIS)

    Travis, J.R.

    1984-01-01

    The SOLA-LOOP computer code for transient, nonequilibrium, two-phase flows in networks has been coupled with a simple valve model to analyze a feedwater pipe breakage with a back-pressure check valve. Three tests from the Superheated Steam Reactor Safety Program Project (PHDR) at Kahl, West Germany, are analyzed, and the calculated transient back-pressure check valve behavior and fluid dynamics effects are found to be in excellent agreement with the experimentally measured data

  5. Development of a stainless steel check valve for cryogenic applications

    NARCIS (Netherlands)

    Veenstra, T.T.; Venhorst, G.C.F.; Venhorst, G.C.F.; Burger, Johannes Faas; Holland, Herman J.; ter Brake, Hermanus J.M.; Sirbi, A.; Rogalla, Horst

    2007-01-01

    This paper describes the development of a check valve for use in a sorption compressor that will drive a 10 mW 4.5 K Joule–Thomson cryocooler. For the check valve extremely low backflow rates are tolerable at an operating temperature of the valve of 50 K. To fulfill these requirements, the sealing

  6. Gender Check - veel kord soolisusest Ida-Euroopa kunstis / Mare Tralla

    Index Scriptorium Estoniae

    Tralla, Mare, 1967-

    2010-01-01

    Novembris 2010 Viinis toimunud konverentsist, kus analüüsiti näituse "Gender Check. Feminiinsus ja maskuliinsus Ida-Euroopa kunstis" kogemust ning sellele eelnenud ja järgnenud uurimistöö tulemusi. Esitleti artiklite kogumikku "Gender check: a reader : art and theory in Eastern Europe". "Gender Checki" projekti edasisest saatusest ja mõjust

  7. Fraud by using a check | Azarian | Journal of Fundamental and ...

    African Journals Online (AJOL)

    If someone used check as a tool to fraud and looting of property of others, should they just be subject to check law, and according to the provisions of the law are prosecuted? Are crook people the same as honorable merchants that due to some unwanted changes and fluctuations in the market and social conditions

  8. Leisure market segmentation : an integrated preferences/constraints-based approach

    NARCIS (Netherlands)

    Stemerding, M.P.; Oppewal, H.; Beckers, T.A.M.; Timmermans, H.J.P.

    1996-01-01

    Traditional segmentation schemes are often based on a grouping of consumers with similar preference functions. The research steps, ultimately leading to such segmentation schemes, are typically independent. In the present article, a new integrated approach to segmentation is introduced, which

  9. Slicing AADL specifications for model checking

    NARCIS (Netherlands)

    Odenbrett, M.R.; Nguyen, V.Y.; Noll, T.

    2010-01-01

    To combat the state-space explosion problem in model checking larger systems, abstraction techniques can be employed. Here, methods that operate on the system specification before constructing its state space are preferable to those that try to minimize the resulting transition system as they

  10. Consistency Check for the Bin Packing Constraint Revisited

    Science.gov (United States)

    Dupuis, Julien; Schaus, Pierre; Deville, Yves

    The bin packing problem (BP) consists in finding the minimum number of bins necessary to pack a set of items so that the total size of the items in each bin does not exceed the bin capacity C. The bin capacity is common for all the bins.

  11. CAREN-4, ENDF/B Utility, Discontinuity Check at Resonance Region Boundary. CHECK-4, ENDF/B Utility, Structure Consistency Check and Format Check. CRECT, ENDF/B Utility, Data Correlation and Data Update. DICT-4, ENDF/B Utility, Section Table of Contents Generator. LISTF-4, ENDF/B Utility, Data Listing. RIGEL-4, ENDF/B Utility, Data Retrieval, BCD to BIN Conversion. SUMUP-4, ENDF/B Utility, Partial Cross-Sections Sum Check Against Tot Cross-Sections

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1975-08-01

    Description of problem or function: These programs are updated versions of ENDF/B checking, retrieval, and display codes capable of processing the Version-IV data files. RIGEL4 retrieves ENDF/B data and changes mode (BCD-BIN) or arrangement. Updated version processes decay data (mf=1, mt=457) and error files. CHECK4 checks the structure, consistency, and formats of ENDF data files. Updated version recognizes newly defined mt and mf numbers, checks mt=457 and the formats of the error files, contains RSIC photon file changes. SUMUP4 checks whether partial cross sections add up to the total. Updated version flags grid points present in the partial cross section, absent in the total. LISTF4 produces interpreted listings of ENDF/B data. Updated version lists mt=457, skips over error files, contains minor corrections. PLOTF4 produces plots of ENDF/B data. Updated version plots mt=457, skips over error files, contains minor corrections. RESEND processes ENDF materials with resonance parameters into a pointwise form. Capability of processing Adler-Adler parameters added. CRECT corrects ENDF/B data files. DICT4 generates a section table of contents (dictionary) for ENDF/B materials. CAREN4 tests for discontinuities across the limits of resonance ranges of an ENDF/B material. Updated version contains minor corrections.

  12. A mathematical formulation for interface-based modular product design with geometric and weight constraints

    Science.gov (United States)

    Jung-Woon Yoo, John

    2016-06-01

    Since customer preferences change rapidly, there is a need for design processes with shorter product development cycles. Modularization plays a key role in achieving mass customization, which is crucial in today's competitive global market environments. Standardized interfaces among modularized parts have facilitated computational product design. To incorporate product size and weight constraints during computational design procedures, a mixed integer programming formulation is presented in this article. Product size and weight are two of the most important design parameters, as evidenced by recent smart-phone products. This article focuses on the integration of geometric, weight and interface constraints into the proposed mathematical formulation. The formulation generates the optimal selection of components for a target product, which satisfies geometric, weight and interface constraints. The formulation is verified through a case study and experiments are performed to demonstrate the performance of the formulation.

  13. Solar constraints

    International Nuclear Information System (INIS)

    Provost, J.

    1984-01-01

    Accurate tests of the theory of stellar structure and evolution are available from the Sun's observations. The solar constraints are reviewed, with a special attention to the recent progress in observing global solar oscillations. Each constraint is sensitive to a given region of the Sun. The present solar models (standard, low Z, mixed) are discussed with respect to neutrino flux, low and high degree five-minute oscillations and low degree internal gravity modes. It appears that actually there do not exist solar models able to fully account for all the observed quantities. (Auth.)

  14. Radiotherapy treatment checking procedures throughout Australasia: results of a survey

    International Nuclear Information System (INIS)

    Duggan, L.; Kron, T.; Howlett, S.

    1996-01-01

    In July 1995, a questionnaire was forwarded to thirty two physicists overseeing Radiation Oncology Departments and brachytherapy in hospitals throughout Australia and New Zealand. From the thirty seven hospitals reached by this survey, details were gathered on thirty hospitals, including the Newcastle In most radiotherapy centres where treatment planning is performed by radiation therapists, at least some of the treatment sheets and their calculations are double checked by radiotherapy physicists. While 23% checked the treatment sheets of all patients, in the majority of centres physicists were found to check only a minor selection, that is, less than 20% of all treatment sheets. Only in six centres physicists were not involved. 5 refs., 4 tabs., 5 figs

  15. Temporal Concurrent Constraint Programming

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Valencia Posso, Frank Dan

    2002-01-01

    The ntcc calculus is a model of non-deterministic temporal concurrent constraint programming. In this paper we study behavioral notions for this calculus. In the underlying computational model, concurrent constraint processes are executed in discrete time intervals. The behavioral notions studied...... reflect the reactive interactions between concurrent constraint processes and their environment, as well as internal interactions between individual processes. Relationships between the suggested notions are studied, and they are all proved to be decidable for a substantial fragment of the calculus...

  16. Discussion on the installation checking method of precast composite floor slab with lattice girders

    Science.gov (United States)

    Chen, Li; Jin, Xing; Wang, Yahui; Zhou, Hele; Gu, Jianing

    2018-03-01

    Based on the installation checking requirements of China’s current standards and the international norms for prefabricated structural precast components, it proposed an installation checking method for precast composite floor slab with lattice girders. By taking an equivalent composite beam consisted of a single lattice girder and the precast concrete slab as the checking object, compression instability stress of upper chords and yield stress of slab distribution reinforcement at the maximum positive moment, tensile yield stress of upper chords, slab normal section normal compression stress and shear instability stress of diagonal bars at the maximum negative moment were checked. And the bending stress and deflection of support beams, strength and compression stability bearing capacity of the vertical support, shear bearing capacity of the bolt and compression bearing capacity of steel tube wall at the bolt were checked at the same time. Every different checking object was given a specific load value and load combination. Application of installation checking method was given and testified by example.

  17. Firm Deadline Checking of Safety-Critical Java Applications with Statistical Model Checking

    DEFF Research Database (Denmark)

    Ravn, Anders P.; Thomsen, Bent; Søe Luckow, Kasper

    2017-01-01

    In cyber-physical applications many programs have hard real-time constraints that have to be stringently validated. In some applications, there are programs that have hard deadlines, which must not be violated. Other programs have soft deadlines where the value of the response decreases when...... deadlines and performance in the case of soft deadlines. The extended approach is illustrated with examples from applications....

  18. Emerging carbon constraints for corporate risk management

    International Nuclear Information System (INIS)

    Busch, Timo; Hoffmann, Volker H.

    2007-01-01

    While discussions about global sustainability challenges abound, the financial risks that they incur, albeit important, have received less attention. We suggest that corporate risk assessments should include sustainability-related aspects, especially with relation to the natural environment, and encompass the flux of critical materials within a company's value chain. Such a comprehensive risk assessment takes into account input- as well as output-related factors. With this paper, we focus on the flux of carbon and define carbon constraints that emerge due to the disposition of fossil fuels in the input dimension and due to direct and indirect climate change effects in the output dimension. We review the literature regarding the financial consequences of carbon constraints on the macroeconomic, sector, and company level. We conclude that: a) financial consequences seem to be asymmetrically distributed between and within sectors, b) the individual risk exposure of companies depends on the intensity of and dependency on carbon-based materials and energy, and c) financial markets have only started to incorporate these aspects in their valuations. This paper ends with recommendations on how to incorporate our results in an integrated carbon risk management framework. (author)

  19. National coal utilization assessment. An integrated assessment of increased coal use in the Midwest: impacts and constraints

    Energy Technology Data Exchange (ETDEWEB)

    Hoover, L. John

    1977-10-01

    This study was performed as a part of the Argonne National Laboratory Regional Studies program, which is sponsored by the Department of Energy. The purpose is to assess the impacts and consequences associated with alternative energy options on a regional basis, and to identify and analyze alternative mitigation and solution strategies for increasing the acceptability of these options. The National Coal Utilization Assessment is being conducted as a part of the Regional Studies Program. This particular study is focusing on impacts and constraints on increased coal utilization. In addition, a major focal point for the study is the identification and analysis of alternative solution strategies applicable to these constraints and problems.

  20. WCET Analysis of ARM Processors using Real-Time Model Checking

    DEFF Research Database (Denmark)

    Toft, Martin; Olesen, Mads Christian; Dalsgaard, Andreas

    2009-01-01

    This paper presents a flexible method that utilises real-time model checking to determine safe and sharp WCETs for processes running on hardware platforms featuring pipelining and caching.......This paper presents a flexible method that utilises real-time model checking to determine safe and sharp WCETs for processes running on hardware platforms featuring pipelining and caching....

  1. CMB lensing constraints on dark energy and modified gravity scenarios

    International Nuclear Information System (INIS)

    Calabrese, Erminia; Cooray, Asantha; Martinelli, Matteo; Melchiorri, Alessandro; Pagano, Luca; Slosar, Anze; Smoot, George F.

    2009-01-01

    Weak gravitational lensing leaves a characteristic imprint on the cosmic microwave background temperature and polarization angular power spectra. Here, we investigate the possible constraints on the integrated lensing potential from future cosmic microwave background angular spectra measurements expected from Planck and EPIC. We find that Planck and EPIC will constrain the amplitude of the integrated projected potential responsible for lensing at 6% and 1% level, respectively, with very little sensitivity to the shape of the lensing potential. We discuss the implications of such a measurement in constraining dark energy and modified gravity scalar-tensor theories. We then discuss the impact of a wrong assumption on the weak lensing potential amplitude on cosmological parameter inference.

  2. Theory of Constraints (TOC)

    DEFF Research Database (Denmark)

    Michelsen, Aage U.

    2004-01-01

    Tankegangen bag Theory of Constraints samt planlægningsprincippet Drum-Buffer-Rope. Endvidere skitse af The Thinking Process.......Tankegangen bag Theory of Constraints samt planlægningsprincippet Drum-Buffer-Rope. Endvidere skitse af The Thinking Process....

  3. Direct compatibility check of the CEA and Cornell electroproduction pion form factor data with e+e- ones

    International Nuclear Information System (INIS)

    Dubnicka, S.; Martinovic, L.

    1988-01-01

    Using precise experimental information on the imaginary part of the pion form factor from e + e - → π + π - up to the inelastic threshold and QCD constraints for it in the range of momenta (m π 0 +m ω ) 2 < t < infinity, was investigated by means of a dispersion integral the reliability of individual electroproduction CEA and Cornell model-dependent pion form factor data points

  4. Polarity Checks in Sectors 23 & 78

    CERN Document Server

    Calaga, R; Lamont, M; Ponce, L; Sun, Y; Tomás, R; Venturini-Delsolaro, W; Zimmermann, F

    2009-01-01

    During the first three LHC synchronization tests on August 10, August 24, and September 7, 2008, linear and higher-order polarity checks were performed with beam 1 in Sector 23 and beam 2 in Sector 78. The main principle of these checks was to launch free betatron oscillations and use the difference trajectory measurements with respect to inverted polarities of circuits under investigation. In the case of zero nominal strength for a circuit, a finite value was introduced. The magnet circuits subjected to these tests were the QT and QTL trim quadrupoles, the MQS skew quadrupoles, the SF and SD arc sextupole circuits, the MCS b3 spool pieces, the OD and OF Landau octupoles, and the MSS skew sextupoles. For some of these circuits sensitivity was enhanced by introducing large momentum offsets. To detect and remove improve spurious contributions from initially off-center orbits, four sets of trajectories were recorded, namely with and without oscillation, and with two magnet strength settings, respectively. We rep...

  5. An integrated model to measure service management and physical constraints' effect on food consumption in assisted-living facilities.

    Science.gov (United States)

    Huang, Hui-Chun; Shanklin, Carol W

    2008-05-01

    The United States is experiencing remarkable growth in the elderly population, which provides both opportunities and challenges for assisted-living facilities. The objective of this study was to explore how service management influences residents' actual food consumption in assisted-living facilities. Physical factors influencing residents' service evaluation and food consumption also were investigated. A total of 394 questionnaires were distributed to assisted-living residents in seven randomly selected facilities. The questionnaire was developed based on an in-depth literature review and pilot study. Residents' perceived quality evaluations, satisfaction, and physical constraints were measured. Residents' actual food consumption was measured using a plate waste technique. A total of 118 residents in five facilities completed both questionnaires and food consumption assessments. Descriptive, multivariate analyses and structural equation modeling techniques were employed. Service management, including food and service quality and customer satisfaction, was found to significantly influence residents' food consumption. Physical constraints associated with aging, including a decline in health status, chewing problems, sensory loss, and functional disability, also significantly influenced residents' food consumption. A significant relationship was found between physical constraints and customer satisfaction. Foodservice that provides good food and service quality increases customer satisfaction and affects residents' actual food consumption. Physical constraints also influence residents' food consumption directly, or indirectly through satisfaction. The findings suggest that food and nutrition professionals in assisted-living should consider the physical profiles of their residents to enhance residents' satisfaction and nutrient intake. Recommendations for exploring residents' perspectives are discussed.

  6. Constraint Embedding for Multibody System Dynamics

    Science.gov (United States)

    Jain, Abhinandan

    2009-01-01

    This paper describes a constraint embedding approach for the handling of local closure constraints in multibody system dynamics. The approach uses spatial operator techniques to eliminate local-loop constraints from the system and effectively convert the system into tree-topology systems. This approach allows the direct derivation of recursive O(N) techniques for solving the system dynamics and avoiding the expensive steps that would otherwise be required for handling the closedchain dynamics. The approach is very effective for systems where the constraints are confined to small-subgraphs within the system topology. The paper provides background on the spatial operator O(N) algorithms, the extensions for handling embedded constraints, and concludes with some examples of such constraints.

  7. Commentary. Integrative Modeling and the Role of Neural Constraints

    Czech Academy of Sciences Publication Activity Database

    Bantegnie, Brice

    2017-01-01

    Roč. 8, SEP 5 (2017), s. 1-2, č. článku 1531. ISSN 1664-1078 Institutional support: RVO:67985955 Keywords : mechanistic explanation * functional analysis * mechanistic integration * reverse inference * neural plasticity * neural networks Subject RIV: AA - Philosophy ; Religion Impact factor: 2.323, year: 2016

  8. Selection of new constraints

    International Nuclear Information System (INIS)

    Sugier, A.

    2003-01-01

    The selected new constraints should be consistent with the scale of concern i.e. be expressed roughly as fractions or multiples of the average annual background. They should take into account risk considerations and include the values of the currents limits, constraints and other action levels. The recommendation is to select four leading values for the new constraints: 500 mSv ( single event or in a decade) as a maximum value, 0.01 mSv/year as a minimum value; and two intermediate values: 20 mSv/year and 0.3 mSv/year. This new set of dose constraints, representing basic minimum standards of protection for the individuals taking into account the specificity of the exposure situations are thus coherent with the current values which can be found in ICRP Publications. A few warning need however to be noticed: There is no more multi sources limit set by ICRP. The coherence between the proposed value of dose constraint (20 mSv/year) and the current occupational dose limit of 20 mSv/year is valid only if the workers are exposed to one single source. When there is more than one source, it will be necessary to apportion. The value of 1000 mSv lifetimes used for relocation can be expressed into annual dose, which gives approximately 10 mSv/year and is coherent with the proposed dose constraint. (N.C.)

  9. Singular vectors and topological theories from Virasoro constraints via the Kontsevich-Miwa transform

    CERN Document Server

    Gato-Rivera, B.

    1993-01-01

    We use the Kontsevich-Miwa transform to relate the different pictures describing matter coupled to topological gravity in two dimensions: topological theories, Virasoro constraints on integrable hierarchies, and a DDK-type formalism. With the help of the Kontsevich-Miwa transform, we solve the Virasoro constraints on the KP hierarchy in terms of minimal models dressed with a (free) Liouville-like scalar. The dressing prescription originates in a topological (twisted N=2) theory. The Virasoro constraints are thus related to essentially the N=2 null state decoupling equations. The N=2 generators are constructed out of matter, the `Liouville' scalar, and $c=-2$ ghosts. By a `dual' construction involving the reparametrization $c=-26$ ghosts, the DDK dressing prescription is reproduced from the N=2 symmetry. As a by-product we thus observe that there are two ways to dress arbitrary $d\\leq1$ or $d\\geq25$ matter theory, that allow its embedding into a topological theory. By th e Kontsevich-Miwa transform, which intr...

  10. Second-Order Risk Constraints in Decision Analysis

    Directory of Open Access Journals (Sweden)

    Love Ekenberg

    2014-01-01

    Full Text Available Recently, representations and methods aimed at analysing decision problems where probabilities and values (utilities are associated with distributions over them (second-order representations have been suggested. In this paper we present an approach to how imprecise information can be modelled by means of second-order distributions and how a risk evaluation process can be elaborated by integrating procedures for numerically imprecise probabilities and utilities. We discuss some shortcomings of the use of the principle of maximising the expected utility and of utility theory in general, and offer remedies by the introduction of supplementary decision rules based on a concept of risk constraints taking advantage of second-order distributions.

  11. SU-D-BRD-01: An Automated Physics Weekly Chart Checking System Supporting ARIA

    Energy Technology Data Exchange (ETDEWEB)

    Chang, X; Yang, D [Washington University in St Louis, St Louis, MO (United States)

    2015-06-15

    Purpose: A software tool was developed in this study to perform automatic weekly physics chart check on the patient data in ARIA. The tool accesses the electronic patient data directly from ARIA server and checks the accuracy of treatment deliveries, and generates reports which summarize the delivery history and highlight the errors. Methods: The tool has four modules. 1) The database interface is designed to directly access treatment delivery data from the ARIA database before reorganizing the data into the patient chart tree (PCT). 2) PCT is a core data structure designed to store and organize the data in logical hierarchies, and to be passed among functions. 3) The treatment data check module analyzes the organized data in PCT and stores the checking results into PCT. 4) Report generation module generates reports containing the treatment delivery summary, chart checking results and plots of daily treatment setup parameters (couch table positions, shifts of image guidance). The errors that are found by the tool are highlighted with colors. Results: The weekly check tool has been implemented in MATLAB and clinically tested at two major cancer centers. Javascript, cascading style sheets (CSS) and dynamic HTML were employed to create the user-interactive reports. It takes 0.06 second to search the delivery records of one beam with PCT and compare the delivery records with beam plan. The reports, saved in the HTML files on shared network folder, can be accessed by web browser on computers and mobile devices. Conclusion: The presented weekly check tool is useful to check the electronic patient treatment data in Varian ARIA system. It could be more efficient and reliable than the manually check by physicists. The work was partially supported by a research grant from Varian Medical System.

  12. SU-D-BRD-01: An Automated Physics Weekly Chart Checking System Supporting ARIA

    International Nuclear Information System (INIS)

    Chang, X; Yang, D

    2015-01-01

    Purpose: A software tool was developed in this study to perform automatic weekly physics chart check on the patient data in ARIA. The tool accesses the electronic patient data directly from ARIA server and checks the accuracy of treatment deliveries, and generates reports which summarize the delivery history and highlight the errors. Methods: The tool has four modules. 1) The database interface is designed to directly access treatment delivery data from the ARIA database before reorganizing the data into the patient chart tree (PCT). 2) PCT is a core data structure designed to store and organize the data in logical hierarchies, and to be passed among functions. 3) The treatment data check module analyzes the organized data in PCT and stores the checking results into PCT. 4) Report generation module generates reports containing the treatment delivery summary, chart checking results and plots of daily treatment setup parameters (couch table positions, shifts of image guidance). The errors that are found by the tool are highlighted with colors. Results: The weekly check tool has been implemented in MATLAB and clinically tested at two major cancer centers. Javascript, cascading style sheets (CSS) and dynamic HTML were employed to create the user-interactive reports. It takes 0.06 second to search the delivery records of one beam with PCT and compare the delivery records with beam plan. The reports, saved in the HTML files on shared network folder, can be accessed by web browser on computers and mobile devices. Conclusion: The presented weekly check tool is useful to check the electronic patient treatment data in Varian ARIA system. It could be more efficient and reliable than the manually check by physicists. The work was partially supported by a research grant from Varian Medical System

  13. The B4 school check behaviour measures: findings from the Hawke's Bay evaluation.

    Science.gov (United States)

    Hedley, Cath; Thompson, Shona; Morris Matthews, Kay; Pentecost, Mandy; Wivell, Judy; Frost, Ariana Stockdale; Morris, Helen

    2012-11-01

    The Before (B4) School Check is a free health and development check delivered by specifically trained nurses to four year old children throughout New Zealand, aimed to identify and address any health, behavioural, social or developmental concerns that could affect a child's ability to get the most benefit from school. Reported here are the results of an evaluation of the B4 School Checks in Hawke's Bay, focusing specifically on children assessed at the 84 School Check with behaviour issues as determined by the Strengths and Difficulties Questionnaire (SDQ). Health Hawke's Bay (HHB) records were reviewed to understand the number and demographics of the children assessed with behaviour issues at the B4 School Checks up to 31 August 2011, and the interventions to which they were referred. Telephone Interviews were conducted with 36 parents/caregivers of these children to address the questions, what difference did the B4 School Check make to children assessed with behaviour issues and what aspects of the B4 School Check delivery contributed to successful outcomes for these children? Results showed that child behaviour issues in Hawke's Bay were identified in more boys than girls and concentrated in more deprived families. Māori children were represented in numbers disproportional to the regional population. The majority of referrals for child behaviour directed parents/caregivers to non-governmental organisations for family support and parenting programmes. Thematic analysis was applied to the qualitative data derived from the interviews with parents/caregivers and results indicated high levels of satisfaction with the B4 School Check for behaviour and the referred outcomes. Implications for nursing practice arise from these findings in that they identify factors which contribute to what does and does not work well for achieving successful outcomes from the B4 School Check for behaviour.

  14. checkCIF/PLATON report Datablock: Sm

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  15. checkCIF/PLATON report Datablock: neu

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  16. checkCIF/PLATON report Datablock: shelxl

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  17. checkCIF/PLATON report Datablock: 6

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  18. checkCIF/PLATON report Datablock: 2

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  19. checkCIF/PLATON report Datablock: sm

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  20. Constraints and Soliton Solutions for KdV Hierarchy and AKNS Hierarchy

    International Nuclear Information System (INIS)

    Li Nianhua; Li Yuqi

    2011-01-01

    It is well-known that the finite-gap solutions of the KdV equation can be generated by its recursion operator. We generalize the result to a special form of Lax pair, from which a method to constrain the integrable system to a lower-dimensional or fewer variable integrable system is proposed. A direct result is that the n-soliton solutions of the KdV hierarchy can be completely depicted by a series of ordinary differential equations (ODEs), which may be gotten by a simple but unfamiliar Lax pair. Furthermore the AKNS hierarchy is constrained to a series of univariate integrable hierarchies. The key is a special form of Lax pair for the AKNS hierarchy. It is proved that under the constraints all equations of the AKNS hierarchy are linearizable. (general)

  1. Independent procedure of checking dose calculations using an independent calculus algorithm

    International Nuclear Information System (INIS)

    Perez Rozos, A.; Jerez Sainz, I.; Carrasco Rodriguez, J. L.

    2006-01-01

    In radiotherapy it is recommended the use of an independent procedure of checking dose calculations, in order to verify the main treatment planning system and double check every patient dosimetry. In this work we present and automatic spreadsheet that import data from planning system using IMPAC/RTP format and verify monitor unit calculation using an independent calculus algorithm. Additionally, it perform a personalized analysis of dose volume histograms and several radiobiological parameters like TCP and NTCP. Finally, the application automatically generate a clinical dosimetry report for every patient, including treatment fields, fractionation, independent check results, dose volume analysis, and first day forms. (Author)

  2. Take the Reins on Model Quality with ModelCHECK and Gatekeeper

    Science.gov (United States)

    Jones, Corey

    2012-01-01

    Model quality and consistency has been an issue for us due to the diverse experience level and imaginative modeling techniques of our users. Fortunately, setting up ModelCHECK and Gatekeeper to enforce our best practices has helped greatly, but it wasn't easy. There were many challenges associated with setting up ModelCHECK and Gatekeeper including: limited documentation, restrictions within ModelCHECK, and resistance from end users. However, we consider ours a success story. In this presentation we will describe how we overcame these obstacles and present some of the details of how we configured them to work for us.

  3. 77 FR 38714 - Proposed Collection; Comment Request for the TE/GE Compliance Check Questionnaires

    Science.gov (United States)

    2012-06-28

    ... TE/GE Compliance Check Questionnaires AGENCY: Internal Revenue Service (IRS), Treasury. ACTION..., the IRS is soliciting comments concerning the TE/GE Compliance Check Questionnaires. DATES: Written... [email protected] . SUPPLEMENTARY INFORMATION: Title: TE/GE Compliance Check Questionnaires. OMB...

  4. Evidence for the safety assurance of the radiation associated equipments for stat-up check

    International Nuclear Information System (INIS)

    Takahashi, Yasuyuki; Igarashi, Hiroshi; Saito, Kyoko; Kawaharada, Yasuhiro; Hirano, Kunihiro; Murase, Kenya; Mochizuki, Teruhito

    2008-01-01

    Based on the new amendment of the Medical Service Law and the Pharmaceutical Affairs Law, the safety control for the medical equipments and devices was strengthened; and a radiological technologist should be stipulated as a safety control manager for the medical equipments and devices. Although it is thought that Start-up check is important for the safety assurance, the enforcement situation is not clear until now. In this report, on the occasion of the start-up of the new Law, questionnaire about the start up check (time and a check items) were investigated from 56 hospitals applying the visit interview. Modality by modality check up time was obtained from 261 institutions by the descriptive study paper type. Start-up check and arming up were applied for almost all modalities about 30 minutes before start of the clinical tests. The check up items for the medical equipments and devices depended on each hospital. Therefore, safety assurance should be established, cooperating with the medical equipment distributors, the hospital sharing the checked results for the patients' safety. (author)

  5. Differential equations and integrable models: the SU(3) case

    International Nuclear Information System (INIS)

    Dorey, Patrick; Tateo, Roberto

    2000-01-01

    We exhibit a relationship between the massless a 2 (2) integrable quantum field theory and a certain third-order ordinary differential equation, thereby extending a recent result connecting the massless sine-Gordon model to the Schroedinger equation. This forms part of a more general correspondence involving A 2 -related Bethe ansatz systems and third-order differential equations. A non-linear integral equation for the generalised spectral problem is derived, and some numerical checks are performed. Duality properties are discussed, and a simple variant of the non-linear equation is suggested as a candidate to describe the finite volume ground state energies of minimal conformal field theories perturbed by the operators phi 12 , phi 21 and phi 15 . This is checked against previous results obtained using the thermodynamic Bethe ansatz

  6. The influence of social anxiety on the body checking behaviors of female college students.

    Science.gov (United States)

    White, Emily K; Warren, Cortney S

    2014-09-01

    Social anxiety and eating pathology frequently co-occur. However, there is limited research examining the relationship between anxiety and body checking, aside from one study in which social physique anxiety partially mediated the relationship between body checking cognitions and body checking behavior (Haase, Mountford, & Waller, 2007). In an independent sample of 567 college women, we tested the fit of Haase and colleagues' foundational model but did not find evidence of mediation. Thus we tested the fit of an expanded path model that included eating pathology and clinical impairment. In the best-fitting path model (CFI=.991; RMSEA=.083) eating pathology and social physique anxiety positively predicted body checking, and body checking positively predicted clinical impairment. Therefore, women who endorse social physique anxiety may be more likely to engage in body checking behaviors and experience impaired psychosocial functioning. Published by Elsevier Ltd.

  7. Diversity and ambivalence in general practitioners' attitudes towards preventive health checks - a qualitative study

    DEFF Research Database (Denmark)

    Søndergaard, Anne; Christensen, Bo; Maindal, Helle Terkildsen

    2012-01-01

    .The purpose of our study is to describe GPs' attitudes towards and concerns about providing preventive health checks and to describe their experiences with the health checks that they provide in daily practice. METHODS: A qualitative descriptive study was conducted based on three semi-structured focus group...... practice. CONCLUSIONS: Our study revealed that health checks are performed differently. Their quality differs, and the GPs perform the health check based on their personal attitude towards this service and prevention in general. Our analysis suggests that the doctors are basically uncertain about the best...... that there was great diversity in the content. The GPs were somewhat ambivalent towards health checks. Many GPs found the service beneficial for the patients. Concurrently, they had reservations about promoting ill-health, they questioned whether the health checks were a core mission of primary care, and they were...

  8. Perencanaan Check Dam Sungai Glugu Kabupaten Grobogan, Jawa Tengah

    OpenAIRE

    Kusuma, Abhibawa Tegar; Wijayanti, Deny; Atmojo, Pranoto Sapto; Edhisono, Sutarto

    2015-01-01

    Glugu River is a tributary of the Lusi River under the authority of the Central River Region Pemali - Juana, precisely located in the administrative area of the Grobogan Regency. Location of Glugu River located upstream, gave effect to the degradation of the river channel, so as to stabilize the river flow necessary to design coservation structure on Glugu River, that is check dam.The data used for design check dam are the primary data (geotechnical, geometry Glugu River, and water when the f...

  9. Minimal Flavor Constraints for Technicolor

    DEFF Research Database (Denmark)

    Sakuma, Hidenori; Sannino, Francesco

    2010-01-01

    We analyze the constraints on the the vacuum polarization of the standard model gauge bosons from a minimal set of flavor observables valid for a general class of models of dynamical electroweak symmetry breaking. We will show that the constraints have a strong impact on the self-coupling and mas......We analyze the constraints on the the vacuum polarization of the standard model gauge bosons from a minimal set of flavor observables valid for a general class of models of dynamical electroweak symmetry breaking. We will show that the constraints have a strong impact on the self...

  10. Mitigating check valve slamming and subsequentwater hammer events for PPFS using MOC

    International Nuclear Information System (INIS)

    Tian Wenxi; Su Guanghui; Wang Gaopeng; Qiu Suizheng; Xiao Zejun

    2009-01-01

    The method of characteristic (MOC) was adopted to analyze the check valve-induced water hammer behaviors for a Parallel Pumps Feedwater System (PPFS) during the alternate startup process. The motion of check valve disc was simulated using inertial valve model. Transient parameters including the pressure oscillation, local flow velocity and slamming of the check valve disc etc. have been obtained. The results showed that severe slamming between the valve disc and valve seat occurred during the alternate startup of parallel pumps. The induced maximum pressure vibration amplitude is up to 5.0 MPa. The scheme of appending a damping torque to slow down the check valve closing speed was also performed to mitigate of water hammer. It has been numerically approved to be an effective approach. (authors)

  11. Mitigating check valve slamming and subsequentwater hammer events for PPFS using MOC

    Institute of Scientific and Technical Information of China (English)

    TIAN Wenxi; SU Guanghui; WANG Gaopeng; QIU Suizheng; XIAO Zejun

    2009-01-01

    The method of characteristic (MOC) was adopted to analyze the check valve-induced water hammer behaviors for a Parallel Pumps Feedwater System (PPFS) during the alternate startup process. The motion of check valve disc was simulated using inertial valve model. Transient parameters including the pressure oscillation, local flow velocity and slamming of the check valve disc etc. have been obtained. The results showed that severe slamming between the valve disc and valve seat occurred during the alternate startup of parallel pumps. The induced maximum pressure vibration amplitude is up to 5.0 MPa. The scheme of appending a damping torque to slow down the check valve closing speed was also performed to mitigate of water hammer. It has been numerically approved to be an effective approach.

  12. Integrating ergonomics knowledge into business-driven design projects: The shaping of resource constraints in engineering consultancy

    DEFF Research Database (Denmark)

    Hall-Andersen, Lene Bjerg; Neumann, W. Patrick; Broberg, Ole

    2016-01-01

    participants were interviewed. METHODS: Data were collected applying semi-structured interviews, observations, and documentary studies. Interviews were transcribed, coded, and categorized into themes. RESULTS: From the analysis five overall themes emerged as major constituents of resource constraints: 1...

  13. The development of fusion sensor techniques for condition monitoring of a check valve

    International Nuclear Information System (INIS)

    Seong, S.H.; Kim, J.S.; Hur, S.; Kim, J.T.; Park, W.M.; Cha, D.B.

    2004-01-01

    The failures of check valves are one of the most important problems in nuclear power plants because the reverse flows through the failed check valve impact on the healthy hydraulic loop. The present test method of finding out the mechanical failure of a check valve is very risky in the radiated environments during normal operation. In addition, the detection of failures in the overhaul period is very costly and tedious because many check valves are used in the plants and manual disassembly work is required. We have suggested the fusion sensor technology for detecting the failures of check valves through measuring and analyzing the backward leakage flow and mechanical vibration without disassembling the check valve. The fusion sensor means that more than two sensors are used in order to identify and analyze the changes of the frequency response between the failed check valve and healthy check valve. We use the accelerometer and acoustic emission sensor as an alternative to the fusion sensor methodology. We have found that the acoustic emission sensor would be capable of directly detecting a high frequency acoustic wave generated from backward leakage flow itself at a low pressure and temperature. The accelerometer for detecting the mechanical vibration induced from leakage flows would, also, be useful at a high pressure and temperature from the previous studies. The effectiveness of this system is that it is possible for predictive maintenance and information of the problem valve will be captured and it reduces the radiation exposure for the maintenance personnel during power operation as well as the maintenance period. (orig.)

  14. Role of recent research in improving check valve reliability at nuclear power plants

    International Nuclear Information System (INIS)

    Kalsi, M.S.; Horst, C.L.; Wang, J.K.; Sharma, V.

    1990-01-01

    Check valve failures at nuclear power plants in recent years have led to serious safety concerns, and caused extensive damage to other plant components which had a significant impact on plant availability. In order to understand the failure mechanism and improve the reliability of check valves, a systematic research effort was proposed by Kalsi Engineering, Inc. to U.S. Nuclear Regulatory Commission (NRC). The overall goal of the research was to develop models for predicting the performance and degradation of swing check valves in nuclear power plant systems so that appropriate preventive maintenance or design modifications can be performed to improve the reliability of check valves. Under Phase I of this research, a large matrix of tests was run with instrumented swing check valves to determine the stability of the disc under a variety of upstream flow disturbances, covering a wide range of disc stop positions and flow velocities in two different valve sizes. The goals of Phase II research were to develop predictive models which quantify the anticipated degradation of swing check valves that have flow disturbances closely upstream of the valve and are operating under flow velocities that do not result in full disc opening. This research allows the inspection/maintenance activities to be focussed on those check valves that are more likely to suffer premature degradation. The quantitative wear and fatigue prediction methodology can be used to develop a sound preventive maintenance program. The results of the research also show the improvements in check valve performance/reliability that can be achieved by certain modifications in the valve design

  15. Temporal Concurrent Constraint Programming

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Palamidessi, Catuscia; Valencia, Frank Dan

    2002-01-01

    The ntcc calculus is a model of non-deterministic temporal concurrent constraint programming. In this paper we study behavioral notions for this calculus. In the underlying computational model, concurrent constraint processes are executed in discrete time intervals. The behavioral notions studied...

  16. Constraints on the ωπ Form Factor from Analyticity and Unitarity

    Science.gov (United States)

    Ananthanarayan, B.; Caprini, Irinel; Kubis, Bastian

    Form factors are important low-energy quantities and an accurate knowledge of these sheds light on the strong interactions. A variety of methods based on general principles have been developed to use information known in different energy regimes to constrain them in regions where experimental information needs to be tested precisely. Here we review our recent work on the electromagnetic ωπ form factor in a model-independent framework known as the method of unitarity bounds, partly motivated by the discre-pancies noted recently between the theoretical calculations of the form factor based on dispersion relations and certain experimental data measured from the decay ω → π0γ*. We have applied a modified dispersive formalism, which uses as input the discontinuity of the ωπ form factor calculated by unitarity below the ωπ threshold and an integral constraint on the square of its modulus above this threshold. The latter constraint was obtained by exploiting unitarity and the positivity of the spectral function of a QCD correlator, computed on the spacelike axis by operator product expansion and perturbative QCD. An alternative constraint is obtained by using data available at higher energies for evaluating an integral of the modulus squared with a suitable weight function. From these conditions we derived upper and lower bounds on the modulus of the ωπ form factor in the region below the ωπ threshold. The results confirm the existence of a disagreement between dispersion theory and experimental data on the ωπ form factor around 0:6 GeV, including those from NA60 published in 2016.

  17. Assembly-line health check up in digitalized hospital.

    Science.gov (United States)

    Liu, Yalan; Yao, Bin; Zhang, Zigang

    2002-01-01

    The health check up flow of digital hospital can be consulted with the assembly line of industry factory. Because they have the following same features: highly specialized workstation, closeness and continuance, rhythm, balanced production, continuous production. The essential prerequisites are as the follows: The inspecting items and methods should be stable; advanced product mix and stable production design; standardized raw material, consumption, procedure, inspection method; there are lots of request for health inspection; the customers move at the least unit; the space arrangement should be reasonable; the time arrangement should be proportion. With the computer net, the digital inspection can achieves the raw material controlling accurately. The basis of check up line concerns about equipment, net and software, data collection, and personnel. The group technology is used in the health inspection flow design of the digital hospital in the field of items customers and zone redivided. The digital assembly linemic health inspect has the following stages: member registering, notice, check in, arrange order, time control, report, feedback and analysis. The assembly linemic has following advantages: increasing the productivity, the space utility, satisfaction of customer, fund returning, lowering the cost and ensuring the quality.

  18. The method of a joint intraday security check system based on cloud computing

    Science.gov (United States)

    Dong, Wei; Feng, Changyou; Zhou, Caiqi; Cai, Zhi; Dan, Xu; Dai, Sai; Zhang, Chuancheng

    2017-01-01

    The intraday security check is the core application in the dispatching control system. The existing security check calculation only uses the dispatch center’s local model and data as the functional margin. This paper introduces the design of all-grid intraday joint security check system based on cloud computing and its implementation. To reduce the effect of subarea bad data on the all-grid security check, a new power flow algorithm basing on comparison and adjustment with inter-provincial tie-line plan is presented. And the numerical example illustrated the effectiveness and feasibility of the proposed method.

  19. 47 CFR 1.1165 - Payment by cashier's check for regulatory fees.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Payment by cashier's check for regulatory fees. 1.1165 Section 1.1165 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND... regulatory fees. Payment by cashier's check may be required when a person or organization makes payment, on...

  20. Using Canonical Forms for Isomorphism Reduction in Graph-based Model Checking

    NARCIS (Netherlands)

    Kant, Gijs

    Graph isomorphism checking can be used in graph-based model checking to achieve symmetry reduction. Instead of one-to-one comparing the graph representations of states, canonical forms of state graphs can be computed. These canonical forms can be used to store and compare states. However, computing