WorldWideScience

Sample records for integrity constraint checking

  1. Incremental Integrity Checking: Limitations and Possibilities

    DEFF Research Database (Denmark)

    Christiansen, Henning; Martinenghi, Davide

    2005-01-01

    Integrity checking is an essential means for the preservation of the intended semantics of a deductive database. Incrementality is the only feasible approach to checking and can be obtained with respect to given update patterns by exploiting query optimization techniques. By reducing the problem...... to query containment, we show that no procedure exists that always returns the best incremental test (aka simplification of integrity constraints), and this according to any reasonable criterion measuring the checking effort. In spite of this theoretical limitation, we develop an effective procedure...

  2. Advanced techniques for efficient data integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide

    Integrity constraint checking, understood as the verification of data correctness and well-formedness conditions that must be satisfied in any state of a database, is not fully supported by current database technology. In a typical scenario, a database is required to comply with given semantic...... criteria (the integrity constraints) and to maintain the compliance each time data are updated. Since the introduction of the SQL2 standard, the SQL language started supporting assertions, which allow one to define general data consistency requirements expressing arbitrarily complex “business rules...

  3. Optimal database locks for efficient integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide

    2004-01-01

    In concurrent database systems, correctness of update transactions refers to the equivalent effects of the execution schedule and some serial schedule over the same set of transactions. Integrity constraints add further semantic requirements to the correctness of the database states reached upon...... the execution of update transactions. Several methods for efficient integrity checking and enforcing exist. We show in this paper how to apply one such method to automatically extend update transactions with locks and simplified consistency tests on the locked entities. All schedules produced in this way...

  4. Transaction management with integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide; Christiansen, Henning

    2005-01-01

    Database integrity constraints, understood as logical conditions that must hold for any database state, are not fully supported by current database technology. It is typically up to the database designer and application programmer to enforce integrity via triggers or tests at the application level....... 2.~In concurrent database systems, besides the traditional correctness criterion, the execution schedule must ensure that the different transactions can overlap in time without destroying the consistency requirements tested by other, concurrent transactions....

  5. Constraint-based deadlock checking of high-level specifications

    DEFF Research Database (Denmark)

    Hallerstede, Stefan; Leuschel, Michael

    2011-01-01

    Establishing the absence of deadlocks is important in many applications of formal methods. The use of model checking for finding deadlocks in formal models is limited because in many industrial applications the state space is either infinite or much too large to be explored exhaustively. In this ......Establishing the absence of deadlocks is important in many applications of formal methods. The use of model checking for finding deadlocks in formal models is limited because in many industrial applications the state space is either infinite or much too large to be explored exhaustively......B's Prolog kernel, such as reification of membership and arithmetic constraints. ProB typically finds counter examples to deadlock-freedom constraints, a formula of about 900 partly nested conjunctions and disjunction among them 80 arithmetic and 150 set-theoretic predicates (in total a formula of 30 pages...

  6. Integrity Checking and Maintenance with Active Rules in XML Databases

    DEFF Research Database (Denmark)

    Christiansen, Henning; Rekouts, Maria

    2007-01-01

    While specification languages for integrity constraints for XML data have been considered in the literature, actual technologies and methodologies for checking and maintaining integrity are still in their infancy. Triggers, or active rules, which are widely used in previous technologies for the p...... updates, the method indicates trigger conditions and correctness criteria to be met by the trigger code supplied by a developer or possibly automatic methods. We show examples developed in the Sedna XML database system which provides a running implementation of XML triggers....

  7. Simplification of integrity constraints for data integration

    DEFF Research Database (Denmark)

    Christiansen, Henning; Martinenghi, Davide

    2004-01-01

    , because either the global database is known to be consistent or suitable actions have been taken to provide consistent views. The present work generalizes simplification techniques for integrity checking in traditional databases to the combined case. Knowledge of local consistency is employed, perhaps...

  8. On Simplification of Database Integrity Constraints

    DEFF Research Database (Denmark)

    Christiansen, Henning; Martinenghi, Davide

    2006-01-01

    Without proper simplification techniques, database integrity checking can be prohibitively time consuming. Several methods have been developed for producing simplified incremental checks for each update but none until now of sufficient quality and generality for providing a true practical impact,...

  9. A general treatment of dynamic integrity constraints

    NARCIS (Netherlands)

    de Brock, EO

    This paper introduces a general, set-theoretic model for expressing dynamic integrity constraints, i.e., integrity constraints on the state changes that are allowed in a given state space. In a managerial context, such dynamic integrity constraints can be seen as representations of "real world"

  10. Efficient Integrity Checking for Databases with Recursive Views

    DEFF Research Database (Denmark)

    Martinenghi, Davide; Christiansen, Henning

    2005-01-01

    Efficient and incremental maintenance of integrity constraints involving recursive views is a difficult issue that has received some attention in the past years, but for which no widely accepted solution exists yet. In this paper a technique is proposed for compiling such integrity constraints in...... approaches have not achieved comparable optimization with the same level of generality....

  11. Local Model Checking of Weighted CTL with Upper-Bound Constraints

    DEFF Research Database (Denmark)

    Jensen, Jonas Finnemann; Larsen, Kim Guldstrand; Srba, Jiri

    2013-01-01

    We present a symbolic extension of dependency graphs by Liu and Smolka in order to model-check weighted Kripke structures against the logic CTL with upper-bound weight constraints. Our extension introduces a new type of edges into dependency graphs and lifts the computation of fixed-points from...

  12. Specifying Dynamic and Deontic Integrity Constraints

    NARCIS (Netherlands)

    Wieringa, Roelf J.; Meyer, John-Jules; Weigand, Hans

    In the dominant view of knowledge bases (KB's), a KB is a set of facts (atomic sentences) and integrity constraints (IC's). An IC is then a sentence which must at least be consistent with the other sentences in the KB, This view obliterates the distinction between, for example, the constraint that

  13. Provenance based data integrity checking and verification in cloud environments.

    Science.gov (United States)

    Imran, Muhammad; Hlavacs, Helmut; Haq, Inam Ul; Jan, Bilal; Khan, Fakhri Alam; Ahmad, Awais

    2017-01-01

    Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-held devices into large scale processing hubs and data centers respectively. It has been proposed as an effective solution for data outsourcing and on demand computing to control the rising cost of IT setups and management in enterprises. However, with Cloud platforms user's data is moved into remotely located storages such that users lose control over their data. This unique feature of the Cloud is facing many security and privacy challenges which need to be clearly understood and resolved. One of the important concerns that needs to be addressed is to provide the proof of data integrity, i.e., correctness of the user's data stored in the Cloud storage. The data in Clouds is physically not accessible to the users. Therefore, a mechanism is required where users can check if the integrity of their valuable data is maintained or compromised. For this purpose some methods are proposed like mirroring, checksumming and using third party auditors amongst others. However, these methods use extra storage space by maintaining multiple copies of data or the presence of a third party verifier is required. In this paper, we address the problem of proving data integrity in Cloud computing by proposing a scheme through which users are able to check the integrity of their data stored in Clouds. In addition, users can track the violation of data integrity if occurred. For this purpose, we utilize a relatively new concept in the Cloud computing called "Data Provenance". Our scheme is capable to reduce the need of any third party services, additional hardware support and the replication of data items on client side for integrity checking.

  14. Provenance based data integrity checking and verification in cloud environments.

    Directory of Open Access Journals (Sweden)

    Muhammad Imran

    Full Text Available Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-held devices into large scale processing hubs and data centers respectively. It has been proposed as an effective solution for data outsourcing and on demand computing to control the rising cost of IT setups and management in enterprises. However, with Cloud platforms user's data is moved into remotely located storages such that users lose control over their data. This unique feature of the Cloud is facing many security and privacy challenges which need to be clearly understood and resolved. One of the important concerns that needs to be addressed is to provide the proof of data integrity, i.e., correctness of the user's data stored in the Cloud storage. The data in Clouds is physically not accessible to the users. Therefore, a mechanism is required where users can check if the integrity of their valuable data is maintained or compromised. For this purpose some methods are proposed like mirroring, checksumming and using third party auditors amongst others. However, these methods use extra storage space by maintaining multiple copies of data or the presence of a third party verifier is required. In this paper, we address the problem of proving data integrity in Cloud computing by proposing a scheme through which users are able to check the integrity of their data stored in Clouds. In addition, users can track the violation of data integrity if occurred. For this purpose, we utilize a relatively new concept in the Cloud computing called "Data Provenance". Our scheme is capable to reduce the need of any third party services, additional hardware support and the replication of data items on client side for integrity checking.

  15. Provenance based data integrity checking and verification in cloud environments

    Science.gov (United States)

    Haq, Inam Ul; Jan, Bilal; Khan, Fakhri Alam; Ahmad, Awais

    2017-01-01

    Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-held devices into large scale processing hubs and data centers respectively. It has been proposed as an effective solution for data outsourcing and on demand computing to control the rising cost of IT setups and management in enterprises. However, with Cloud platforms user’s data is moved into remotely located storages such that users lose control over their data. This unique feature of the Cloud is facing many security and privacy challenges which need to be clearly understood and resolved. One of the important concerns that needs to be addressed is to provide the proof of data integrity, i.e., correctness of the user’s data stored in the Cloud storage. The data in Clouds is physically not accessible to the users. Therefore, a mechanism is required where users can check if the integrity of their valuable data is maintained or compromised. For this purpose some methods are proposed like mirroring, checksumming and using third party auditors amongst others. However, these methods use extra storage space by maintaining multiple copies of data or the presence of a third party verifier is required. In this paper, we address the problem of proving data integrity in Cloud computing by proposing a scheme through which users are able to check the integrity of their data stored in Clouds. In addition, users can track the violation of data integrity if occurred. For this purpose, we utilize a relatively new concept in the Cloud computing called “Data Provenance”. Our scheme is capable to reduce the need of any third party services, additional hardware support and the replication of data items on client side for integrity checking. PMID:28545151

  16. ON Integrated Chance Constraints in ALM for Pension Funds

    OpenAIRE

    Youssouf A. F. Toukourou; Fran\\c{c}ois Dufresne

    2015-01-01

    We discuss the role of integrated chance constraints (ICC) as quantitative risk constraints in asset and liability management (ALM) for pension funds. We define two types of ICC: the one period integrated chance constraint (OICC) and the multiperiod integrated chance constraint (MICC). As their names suggest, the OICC covers only one period whereas several periods are taken into account with the MICC. A multistage stochastic linear programming model is therefore developed for this purpose and...

  17. Distortion-Free Watermarking Approach for Relational Database Integrity Checking

    Directory of Open Access Journals (Sweden)

    Lancine Camara

    2014-01-01

    Full Text Available Nowadays, internet is becoming a suitable way of accessing the databases. Such data are exposed to various types of attack with the aim to confuse the ownership proofing or the content protection. In this paper, we propose a new approach based on fragile zero watermarking for the authentication of numeric relational data. Contrary to some previous databases watermarking techniques which cause some distortions in the original database and may not preserve the data usability constraints, our approach simply seeks to generate the watermark from the original database. First, the adopted method partitions the database relation into independent square matrix groups. Then, group-based watermarks are securely generated and registered in a trusted third party. The integrity verification is performed by computing the determinant and the diagonal’s minor for each group. As a result, tampering can be localized up to attribute group level. Theoretical and experimental results demonstrate that the proposed technique is resilient against tuples insertion, tuples deletion, and attributes values modification attacks. Furthermore, comparison with recent related effort shows that our scheme performs better in detecting multifaceted attacks.

  18. Constraint-Checking Editor for Procedure Tracking (ConCEPT), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Constructing, maintaining, and adapting operational procedures for manned space operations is a complex task, requiring the procedure author to satisfy constraints...

  19. Maintaining control while delegating trust: Integrity constraints in trust management

    NARCIS (Netherlands)

    Etalle, S.; Winsborough, W.H.

    2009-01-01

    We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then, we address the fact that not all participants in a

  20. Integral constraints on perturbations of Robertson-Walker cosmologies

    International Nuclear Information System (INIS)

    Ellis, G.F.R.; Jaklitsch, M.J.

    1989-01-01

    Integral constraints occur in the case of spherically symmetric inhomogeneities in Robertson-Walker universes, and (according to Traschen) in the case of general perturbations of these models. It is shown that these constraints are the same in the case of spherical symmetry, and they are interpreted as 'fitting conditions', that is, as constraints on the background Robertson-Walker model rather than on the nature of inhomogeneities. These integral constraints significantly affect the interpretation of anisotropies in the cosmic microwave background radiation. 22 refs

  1. Particle acceleration inside PWN: Simulation and observational constraints with INTEGRAL

    International Nuclear Information System (INIS)

    Forot, M.

    2006-12-01

    The context of this thesis is to gain new constraints on the different particle accelerators that occur in the complex environment of neutron stars: in the pulsar magnetosphere, in the striped wind or wave outside the light cylinder, in the jets and equatorial wind, and at the wind terminal shock. An important tool to constrain both the magnetic field and primary particle energies is to image the synchrotron ageing of the population, but it requires a careful modelling of the magnetic field evolution in the wind flow. The current models and understanding of these different accelerators, the acceleration processes and open questions have been reviewed in the first part of the thesis. The instrumental part of this work involves the IBIS imager, on board the INTEGRAL satellite, that provides images with 12' resolution from 17 keV to MeV where the SPI spectrometer takes over up, to 10 MeV, but with a reduced 2 degrees resolution. A new method for using the double-layer IBIS imager as a Compton telescope with coded mask aperture. Its performance has been measured. The Compton scattering information and the achieved sensitivity also open a new window for polarimetry in gamma rays. A method has been developed to extract the linear polarization properties and to check the instrument response for fake polarimetric signals in the various backgrounds and projection effects

  2. Parallel handling of integrity constraints on fragmented relations

    NARCIS (Netherlands)

    Grefen, P.W.P.J.; Apers, Peter M.G.

    A short introduction to the important aspects of the PRISMA DBMS (database management system) and to the notation and terminology used is presented. It is shown how integrity constraints formulated in terms of global relations can be translated into a fragmented form. The strategy for constraint

  3. Integrable Hamiltonian systems and interactions through quadratic constraints

    International Nuclear Information System (INIS)

    Pohlmeyer, K.

    1975-08-01

    Osub(n)-invariant classical relativistic field theories in one time and one space dimension with interactions that are entirely due to quadratic constraints are shown to be closely related to integrable Hamiltonian systems. (orig.) [de

  4. Inter-enterprise system and application integration: a reality check

    NARCIS (Netherlands)

    Cardoso, J.; Aalst, van der W.M.P.; Bussler, C.; Sheth, A.P.; Sandkuhl, K.; Filipe, J.; Cordeiro, J.; Cardoso, J.

    2008-01-01

    This paper structures the summary of the panel held at the 9th International Conference on Enterprise Information Systems, Funchal, Madeira, 12-16 June 2007 that addressed the following question: "Are you still working on Inter-Enterprise System and Application Integration?" The panel aggregated

  5. Simplification of integrity constraints with aggregates and arithmetic built-ins

    DEFF Research Database (Denmark)

    Martinenghi, Davide

    2004-01-01

    Both aggregates and arithmetic built-ins are widely used in current database query languages: Aggregates are second-order constructs such as CNT and SUM of SQL; arithmetic built-ins include relational and other mathematical operators that apply to numbers, such as < and +. These features are also...... time, simplified versions of such integrity constraints that can be tested before the execution of any update. In this way, virtually no time is spent for optimization or rollbacks at run time. Both set and bag semantics are considered....... of interest in the context of database integrity constraints: correct and efficient integrity checking is crucial, as, without any guarantee of data consistency, the answers to queries cannot be trusted. In this paper we propose a method of practical relevance that can be used to derive, at database design...

  6. Prototype of Automated PLC Model Checking Using Continuous Integration Tools

    CERN Document Server

    Lettrich, Michael

    2015-01-01

    To deal with the complexity of operating and supervising large scale industrial installations at CERN, often Programmable Logic Controllers (PLCs) are used. A failure in these control systems can cause a disaster in terms of economic loses, environmental damages or human losses. Therefore the requirements to software quality are very high. To provide PLC developers with a way to verify proper functionality against requirements, a Java tool named PLCverif has been developed which encapsulates and thus simplifies the use of third party model checkers. One of our goals in this project is to integrate PLCverif in development process of PLC programs. When the developer changes the program, all the requirements should be verified again, as a change on the code can produce collateral effects and violate one or more requirements. For that reason, PLCverif has been extended to work with Jenkins CI in order to trigger automatically the verication cases when the developer changes the PLC program. This prototype has been...

  7. Integrated CAE system for nuclear power plants. Development of piping design check system

    International Nuclear Information System (INIS)

    Narikawa, Noboru; Sato, Teruaki

    1994-01-01

    Toshiba Corporation has developed and operated the integrated CAE system for nuclear power plants, the core of which is the engineering data base to manage accurately and efficiently enormous amount of data on machinery, equipment and piping. As the first step of putting knowledge base system to practical use, piping design check system has been developed. By automatically checking up piping design, this system aims at the prevention of overlooking mistakes, efficient design works and the overall quality improvement of design. This system is based on the thought that it supports designers, and final decision is made by designers. This system is composed of the integrated data base, a two-dimensional CAD system and three-dimensional CAD system. The piping design check system is one of the application systems of the integrated CAE system. Object-oriented programming is the base of the piping design check system, and design knowledge and CAD data are necessary. As to the method of realizing the check system, the flow of piping design, the checkup functions, the checkup of interference and attribute base, and the integration of the system are explained. (K.I)

  8. Methodology for Check Valve Selection to Maintain the Integrity of Pipeline against the Check Valve Slam for the KIJANG Research Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Dayong; Yoon, Hyungi; Seo, Kyoungwoo; Kim, Seonhoon [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    The check valve slam results in a water hammer and unexpected system pressure rise in the pipeline. Sometimes, the pressure rise by check valve slam in the pipeline exceeds the design pressure and then it causes the rupture of pipeline. Therefore, check valve slam significantly influences on the integrity of pipe. Especially, this it is most likely to occur by check valve installed in the discharge of pump when one pump trips among the two or more running in parallel pump system. This study focuses on the check valve selection to maintain the integrity of PCS pipeline against the check valve slam. If design head for KJRR PCS pipeline is higher than the sum of static head and 11 m, any type check valves can be installed at the discharge of pump. However, if design head for KJRR PCS pipeline is lower than the sum of static head and 11 m, installation of swing and ball check on the discharge of pump must be avoid to prevent the rupture of PCS pipeline.

  9. Methodology for Check Valve Selection to Maintain the Integrity of Pipeline against the Check Valve Slam for the KIJANG Research Reactor

    International Nuclear Information System (INIS)

    Kim, Dayong; Yoon, Hyungi; Seo, Kyoungwoo; Kim, Seonhoon

    2016-01-01

    The check valve slam results in a water hammer and unexpected system pressure rise in the pipeline. Sometimes, the pressure rise by check valve slam in the pipeline exceeds the design pressure and then it causes the rupture of pipeline. Therefore, check valve slam significantly influences on the integrity of pipe. Especially, this it is most likely to occur by check valve installed in the discharge of pump when one pump trips among the two or more running in parallel pump system. This study focuses on the check valve selection to maintain the integrity of PCS pipeline against the check valve slam. If design head for KJRR PCS pipeline is higher than the sum of static head and 11 m, any type check valves can be installed at the discharge of pump. However, if design head for KJRR PCS pipeline is lower than the sum of static head and 11 m, installation of swing and ball check on the discharge of pump must be avoid to prevent the rupture of PCS pipeline

  10. Comment on id-based remote data integrity checking with data privacy preserving

    Science.gov (United States)

    Zhang, Jianhong; Meng, Hongxin

    2017-09-01

    Recently, an ID-based remote data integrity checking protocol with perfect data privacy preserving (IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS.2016.2615853) was proposed to achieve data privacy protection and integrity checking. Unfortunately, in this letter, we demonstrate that their protocol is insecure. An active hacker can modify the stored data without being detected by the verifier in the auditing. And we also show malicious cloud server can convince the verifier that the stored data are kept intact after the outsourced data blocks are deleted. Finally, the reasons to produce such attacks are given.

  11. Stochastic programming problems with generalized integrated chance constraints

    Czech Academy of Sciences Publication Activity Database

    Branda, Martin

    2012-01-01

    Roč. 61, č. 8 (2012), s. 949-968 ISSN 0233-1934 R&D Projects: GA ČR GAP402/10/1610 Grant - others:SVV(CZ) 261315/2010 Institutional support: RVO:67985556 Keywords : chance constraints * integrated chance constraints * penalty functions * sample approximations * blending problem Subject RIV: BB - Applied Statistics, Operational Research Impact factor: 0.707, year: 2012 http://library.utia.cas.cz/separaty/2012/E/branda-stochastic programming problems with generalized integrated.pdf

  12. Optimizing Computation of Repairs from Active Integrity Constraints

    DEFF Research Database (Denmark)

    Cruz-Filipe, Luís

    2014-01-01

    Active integrity constraints (AICs) are a form of integrity constraints for databases that not only identify inconsistencies, but also suggest how these can be overcome. The semantics for AICs defines different types of repairs, but deciding whether an inconsistent database can be repaired...... and finding possible repairs is a NP- or Σ2p-complete problem, depending on the type of repairs one has in mind. In this paper, we introduce two different relations on AICs: an equivalence relation of independence, allowing the search to be parallelized among the equivalence classes, and a precedence relation...

  13. Integrating model checking with HiP-HOPS in model-based safety analysis

    International Nuclear Information System (INIS)

    Sharvia, Septavera; Papadopoulos, Yiannis

    2015-01-01

    The ability to perform an effective and robust safety analysis on the design of modern safety–critical systems is crucial. Model-based safety analysis (MBSA) has been introduced in recent years to support the assessment of complex system design by focusing on the system model as the central artefact, and by automating the synthesis and analysis of failure-extended models. Model checking and failure logic synthesis and analysis (FLSA) are two prominent MBSA paradigms. Extensive research has placed emphasis on the development of these techniques, but discussion on their integration remains limited. In this paper, we propose a technique in which model checking and Hierarchically Performed Hazard Origin and Propagation Studies (HiP-HOPS) – an advanced FLSA technique – can be applied synergistically with benefit for the MBSA process. The application of the technique is illustrated through an example of a brake-by-wire system. - Highlights: • We propose technique to integrate HiP-HOPS and model checking. • State machines can be systematically constructed from HiP-HOPS. • The strengths of different MBSA techniques are combined. • Demonstrated through modeling and analysis of brake-by-wire system. • Root cause analysis is automated and system dynamic behaviors analyzed and verified

  14. Users Integrity Constraints in SOLAP Systems. Application in Agroforestry

    Directory of Open Access Journals (Sweden)

    Abdallah Bensalloua Charef

    2018-06-01

    Full Text Available SpatialData Warehouse and Spatial On-Line Analytical Processing are decision support technologies which offer the spatial and multidimensional analysis of data stored in multidimensional structure. They are aimed also at supporting geographic knowledge discovery to help decision-maker in his job related to make the appropriate decision . However, if we don’t consider data quality in the spatial hypercubes and how it is explored, it may provide unreliable results. In this paper, we propose a system for the implementation of user integrity constraints in SOLAP namely “UIC-SOLAP”. It corresponds to a methodology for guaranteeing results quality in an analytical process effectuated by different users exploiting several facts tables within the same hypercube. We integrate users Integrity Constraints (IC by specifying visualization ICs according to their preferences and we define inter-facts ICs in this case. In order to validate our proposition, we propose the multidimensional modeling by UML profile to support constellation schema of a hypercube with several fact tables related to subjects of analysis in forestry management. Then, we propose implementation of some ICs related to users of such a system.

  15. Fixed Duration Pursuit-Evasion Differential Game with Integral Constraints

    International Nuclear Information System (INIS)

    Ibragimov G I; Kuchkarov A Sh

    2013-01-01

    We investigate a pursuit-evasion differential game of countably many pursuers and one evader. Integral constraints are imposed on control functions of the players. Duration of the game is fixed and the payoff of the game is infimum of the distances between the evader and pursuers when the game is completed. Purpose of the pursuers is to minimize the payoff and that of the evader is to maximize it. Optimal strategies of the players are constructed, and the value of the game is found. It should be noted that energy resource of any pursuer may be less than that of the evader.

  16. An Integrated Approach of Model checking and Temporal Fault Tree for System Safety Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Kwang Yong; Seong, Poong Hyun [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2009-10-15

    Digitalization of instruments and control systems in nuclear power plants offers the potential to improve plant safety and reliability through features such as increased hardware reliability and stability, and improved failure detection capability. It however makes the systems and their safety analysis more complex. Originally, safety analysis was applied to hardware system components and formal methods mainly to software. For software-controlled or digitalized systems, it is necessary to integrate both. Fault tree analysis (FTA) which has been one of the most widely used safety analysis technique in nuclear industry suffers from several drawbacks as described in. In this work, to resolve the problems, FTA and model checking are integrated to provide formal, automated and qualitative assistance to informal and/or quantitative safety analysis. Our approach proposes to build a formal model of the system together with fault trees. We introduce several temporal gates based on timed computational tree logic (TCTL) to capture absolute time behaviors of the system and to give concrete semantics to fault tree gates to reduce errors during the analysis, and use model checking technique to automate the reasoning process of FTA.

  17. Low level constraints on dynamic contour path integration.

    Directory of Open Access Journals (Sweden)

    Sophie Hall

    Full Text Available Contour integration is a fundamental visual process. The constraints on integrating discrete contour elements and the associated neural mechanisms have typically been investigated using static contour paths. However, in our dynamic natural environment objects and scenes vary over space and time. With the aim of investigating the parameters affecting spatiotemporal contour path integration, we measured human contrast detection performance of a briefly presented foveal target embedded in dynamic collinear stimulus sequences (comprising five short 'predictor' bars appearing consecutively towards the fovea, followed by the 'target' bar in four experiments. The data showed that participants' target detection performance was relatively unchanged when individual contour elements were separated by up to 2° spatial gap or 200 ms temporal gap. Randomising the luminance contrast or colour of the predictors, on the other hand, had similar detrimental effect on grouping dynamic contour path and subsequent target detection performance. Randomising the orientation of the predictors reduced target detection performance greater than introducing misalignment relative to the contour path. The results suggest that the visual system integrates dynamic path elements to bias target detection even when the continuity of path is disrupted in terms of spatial (2°, temporal (200 ms, colour (over 10 colours and luminance (-25% to 25% information. We discuss how the findings can be largely reconciled within the functioning of V1 horizontal connections.

  18. Process for integrating surface drainage constraints on mine planning

    Energy Technology Data Exchange (ETDEWEB)

    Sawatsky, L.F; Ade, F.L.; McDonald, D.M.; Pullman, B.J. [Golder Associates Ltd., Calgary, AB (Canada)

    2009-07-01

    Surface drainage for mine closures must be considered during all phases of mine planning and design in order to minimize environmental impacts and reduce costs. This paper discussed methods of integrating mine drainage criteria and associated mine planning constraints into the mine planning process. Drainage constraints included stream diversions; fish compensation channels; collection receptacles for the re-use of process water; separation of closed circuit water from fresh water; and the provision of storage ponds. The geomorphic approach replicated the ability of natural channels to respond to local and regional changes in hydrology as well as channel disturbances from extreme flood events, sedimentation, debris, ice jams, and beaver activity. The approach was designed to enable a sustainable system and provide conveyance capacity for extreme floods without spillage to adjacent watersheds. Channel dimensions, bank and bed materials, sediment loads, bed material supplies and the hydrologic conditions of the analogue stream were considered. Hydrologic analyses were conducted to determine design flood flow. Channel routes, valley slopes, sinuosity, width, and depth were established. It was concluded that by incorporating the geomorphic technique, mine operators and designers can construct self-sustaining drainage systems that require little or no maintenance in the long-term. 7 refs.

  19. Experiment for Integrating Dutch 3d Spatial Planning and Bim for Checking Building Permits

    Science.gov (United States)

    van Berlo, L.; Dijkmans, T.; Stoter, J.

    2013-09-01

    This paper presents a research project in The Netherlands in which several SMEs collaborated to create a 3D model of the National spatial planning information. This 2D information system described in the IMRO data standard holds implicit 3D information that can be used to generate an explicit 3D model. The project realized a proof of concept to generate a 3D spatial planning model. The team used the model to integrate it with several 3D Building Information Models (BIMs) described in the open data standard Industry Foundation Classes (IFC). Goal of the project was (1) to generate a 3D BIM model from spatial planning information to be used by the architect during the early design phase, and (2) allow 3D checking of building permits. The team used several technologies like CityGML, BIM clash detection and GeoBIM to explore the potential of this innovation. Within the project a showcase was created with a part of the spatial plan from the city of The Hague. Several BIM models were integrated in the 3D spatial plan of this area. A workflow has been described that demonstrates the benefits of collaboration between the spatial domain and the AEC industry in 3D. The research results in a showcase with conclusions and considerations for both national and international practice.

  20. General Principles of Integrity Checking of Digital Images and Application for Steganalysis

    Directory of Open Access Journals (Sweden)

    Kobozeva Alla A.

    2016-06-01

    Full Text Available The new common approach for integrity checking of digital images is developed. The new features of formal parameters defining image are revealed, theoretically grounded and practically tested. The characteristics of the mutual arrangement of left and right singular vectors corresponding to the largest singular value of the image’s matrix (block of matrix and the vector composed of singular numbers is obtained. Formal parameters are obtained using normal singular decomposition of matrix (block of matrix which is uniquely determined. It is shown that for most blocks of original image (no matter lossy or lossless the angle between the left (right mentioned singular vector and vector composed of singular numbers is defined by the angle between the n-optimal vector and the vector of standard basis of the range corresponding dimension. It is shown that the determined feature brakes for the mentioned formal parameters in a non-original image. This shows the integrity violation of the image, i.e. the existence of the additional information embedded using steganography algorithms. So this can be used as a basis for development of new universal steganography methods and algorithms, and one example of the realization is proposed. The efficiency of the proposed algorithm won’t depend on the details of steganography method used for embedding. All the obtained results can be easily adapted for the digital video and audio analysis.

  1. Bargmann Symmetry Constraint for a Family of Liouville Integrable Differential-Difference Equations

    International Nuclear Information System (INIS)

    Xu Xixiang

    2012-01-01

    A family of integrable differential-difference equations is derived from a new matrix spectral problem. The Hamiltonian forms of obtained differential-difference equations are constructed. The Liouville integrability for the obtained integrable family is proved. Then, Bargmann symmetry constraint of the obtained integrable family is presented by binary nonliearization method of Lax pairs and adjoint Lax pairs. Under this Bargmann symmetry constraints, an integrable symplectic map and a sequences of completely integrable finite-dimensional Hamiltonian systems in Liouville sense are worked out, and every integrable differential-difference equations in the obtained family is factored by the integrable symplectic map and a completely integrable finite-dimensional Hamiltonian system. (general)

  2. A Liouville integrable hierarchy, symmetry constraint, new finite-dimensional integrable systems, involutive solution and expanding integrable models

    International Nuclear Information System (INIS)

    Sun Yepeng; Chen Dengyuan

    2006-01-01

    A new spectral problem and the associated integrable hierarchy of nonlinear evolution equations are presented in this paper. It is shown that the hierarchy is completely integrable in the Liouville sense and possesses bi-Hamiltonian structure. An explicit symmetry constraint is proposed for the Lax pairs and the adjoint Lax pairs of the hierarchy. Moreover, the corresponding Lax pairs and adjoint Lax pairs are nonlinearized into a hierarchy of commutative, new finite-dimensional completely integrable Hamiltonian systems in the Liouville sense. Further, an involutive representation of solution of each equation in the hierarchy is given. Finally, expanding integrable models of the hierarchy are constructed by using a new Loop algebra

  3. Integrating software testing and run-time checking in an assertion verification framework

    OpenAIRE

    Mera, E.; López García, Pedro; Hermenegildo, Manuel V.

    2009-01-01

    We have designed and implemented a framework that unifies unit testing and run-time verification (as well as static verification and static debugging). A key contribution of our approach is that a unified assertion language is used for all of these tasks. We first propose methods for compiling runtime checks for (parts of) assertions which cannot be verified at compile-time via program transformation. This transformation allows checking preconditions and postconditions, including conditional...

  4. Constraint Differentiation

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Basin, David; Viganò, Luca

    2010-01-01

    We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation works by eliminating certain kinds of redundancies that arise in the search space when using constraints to represent...... results show that constraint differentiation substantially reduces search and considerably improves the performance of OFMC, enabling its application to a wider class of problems....

  5. An integral constraint for the evolution of the galaxy two-point correlation function

    International Nuclear Information System (INIS)

    Peebles, P.J.E.; Groth, E.J.

    1976-01-01

    Under some conditions an integral over the galaxy two-point correlation function, xi(x,t), evolves with the expansion of the universe in a simple manner easily computed from linear perturbation theory.This provides a useful constraint on the possible evolution of xi(x,t) itself. We test the integral constraint with both an analytic model and numerical N-body simulations for the evolution of irregularities in an expanding universe. Some applications are discussed. (orig.) [de

  6. Integrity cynicism: Possibilities and Constraints of Moral Communication

    NARCIS (Netherlands)

    Bakker, de H.C.M.

    2007-01-01

    Paying thorough attention to cynical action and integrity could result in a less naive approach to ethics and moral communication. This article discusses the issues of integrity and cynicism on a theoretical and on a more practical level. The first part confronts Habermas¿s approach of communicative

  7. Reexamination of cross-sections for fast neutrons by computational checking of single material integral experiments

    International Nuclear Information System (INIS)

    Schriewer, J.; Hehn, G.; Mattes, M.

    1976-06-01

    Transmission experiments for fast neutrons and pure materials offer the possibility to check the accuracy of nuclear data compilations by recalculating the measured discharge spectra. In this paper the calculations were mainly based on two Benchmark experiments with pure iron carried out at the Karlsruhe Nuclear Research Center. One of the experiments employed a 252 Cf fission source and spherically symmetric arrangement; the other was based on transmission of an iron cylinder by 14-MeV neutrons from a D+T source. The checking calculations were based on the data compilation ENDF/B-IV (occasionally also ENDF/B-III) and on the transport codes ANISN (1D) and DOT-2 (2D) with lined up ESTOQ (for calculating the first-collision source). The calculations with the Cf source showed good agreement with the results of measurement, whereas the checking of the arrangement with 14 MeV neutrons yielded a marked underestimation of the neutron flux density in the range of 2 MeV up to 14 MeV. The discussion of the results including the choice of codes was done on the basis of a literature review on the Benchmark experiments for iron with fast neutrons carried out until now. (orig.) [de

  8. Leisure market segmentation : an integrated preferences/constraints-based approach

    NARCIS (Netherlands)

    Stemerding, M.P.; Oppewal, H.; Beckers, T.A.M.; Timmermans, H.J.P.

    1996-01-01

    Traditional segmentation schemes are often based on a grouping of consumers with similar preference functions. The research steps, ultimately leading to such segmentation schemes, are typically independent. In the present article, a new integrated approach to segmentation is introduced, which

  9. The Integration of Environmental Constraints into Tidal Array Optimisation

    Science.gov (United States)

    du Feu, Roan; de Trafford, Sebastian; Culley, Dave; Hill, Jon; Funke, Simon W.; Kramer, Stephan C.; Piggott, Matthew D.

    2015-04-01

    It has been estimated by The Carbon Trust that the marine renewable energy sector, of which tidal stream turbines are projected to play a large part, could produce 20% of the UK's present electricity requirements. This has lead to the important question of how this technology can be deployed in an economically and environmentally friendly manner. Work is currently under way to understand how the tidal turbines that constitute an array can be arranged to maximise the total power generated by that array. The work presented here continues this through the inclusion of environmental constraints. The benefits of the renewable energy sector to our environment at large are not in question. However, the question remains as to the effects this burgeoning sector will have on local environments, and how to mitigate these effects if they are detrimental. For example, the presence of tidal arrays can, through altering current velocity, drastically change the sediment transport into and out of an area along with re-suspending existing sediment. This can have the effects of scouring or submerging habitat, mobilising contaminants within the existing sediment, reducing food supply and altering the turbidity of the water. All of which greatly impact upon any fauna in the affected region. This work pays particular attention to the destruction of habitat of benthic fauna, as this is quantifiable as a direct result of change in the current speed; a primary factor in determining sediment accumulation on the sea floor. OpenTidalFarm is an open source tool that maximises the power generated by an array through repositioning the turbines within it. It currently uses a 2D shallow water model with turbines represented as bump functions of increased friction. The functional of interest, power extracted by the array, is evaluated from the flow field which is calculated at each iteration using a finite element method. A gradient-based local optimisation is then used through solving the

  10. Integrating Water Supply Constraints into Irrigated Agricultural Simulations of California

    Science.gov (United States)

    Winter, Jonathan M.; Young, Charles A.; Mehta, Vishal K.; Ruane, Alex C.; Azarderakhsh, Marzieh; Davitt, Aaron; McDonald, Kyle; Haden, Van R.; Rosenzweig, Cynthia E.

    2017-01-01

    Simulations of irrigated croplands generally lack key interactions between water demand from plants and water supply from irrigation systems. We coupled the Water Evaluation and Planning system (WEAP) and Decision Support System for Agrotechnology Transfer (DSSAT) to link regional water supplies and management with field-level water demand and crop growth. WEAP-DSSAT was deployed and evaluated over Yolo County in California for corn, rice, and wheat. WEAP-DSSAT is able to reproduce the results of DSSAT under well-watered conditions and reasonably simulate observed mean yields, but has difficulty capturing yield interannual variability. Constraining irrigation supply to surface water alone reduces yields for all three crops during the 1987-1992 drought. Corn yields are reduced proportionally with water allocation, rice yield reductions are more binary based on sufficient water for flooding, and wheat yields are least sensitive to irrigation constraints as winter wheat is grown during the wet season.

  11. Integrating CALL into an Iranian EAP Course: Constraints and Affordances

    Science.gov (United States)

    Mehran, Parisa; Alizadeh, Mehrasa

    2015-01-01

    Iranian universities have recently displayed a growing interest in integrating Computer-Assisted Language Learning (CALL) into teaching/learning English. The English for Academic Purposes (EAP) context, however, is not keeping pace with the current changes since EAP courses are strictly text-based and exam-oriented, and little research has thus…

  12. Commentary. Integrative Modeling and the Role of Neural Constraints

    Czech Academy of Sciences Publication Activity Database

    Bantegnie, Brice

    2017-01-01

    Roč. 8, SEP 5 (2017), s. 1-2, č. článku 1531. ISSN 1664-1078 Institutional support: RVO:67985955 Keywords : mechanistic explanation * functional analysis * mechanistic integration * reverse inference * neural plasticity * neural networks Subject RIV: AA - Philosophy ; Religion Impact factor: 2.323, year: 2016

  13. Symmetries of integrable hierarchies and matrix model constraints

    International Nuclear Information System (INIS)

    Vos, K. de

    1992-01-01

    The orbit construction associates a soliton hierarchy to every level-one vertex realization of a simply laced affine Kac-Moody algebra g. We show that the τ-function of such a hierarchy has the (truncated) Virasoro algebra as an algebra of infinitesimal symmetry transformations. To prove this we use an appropriate bilinear form of these hierarchies together with the coset construction of conformal field theory. For A 1 (1) the orbit construction gives either the Toda or the KdV hierarchy. These both occur in the one-matrix model of two-dimensional quantum gravity, before and after the double scaling limit respectively. The truncated Virasoro symmetry algebra is exactly the algebra of constraints of the one-matrix model. The partition function of the one-matrix model is therefore an invariant τ-function. We also consider the case of A 1 (1) with l>1. Surprisingly, the symmetry algebra in that case is not simply a truncated Casimir algebra. It appears that again only the Virasoro symmetry survives. We speculate on the relation with multi-matrix models. (orig.)

  14. Integrating bioenergy into a green economy: identifying opportunities and constraints

    CSIR Research Space (South Africa)

    Von Maltitz, Graham P

    2012-10-01

    Full Text Available .kashan.co.za] BACKGROUND Bioenergy is a renewable energy option that has the potential to contribute to a low-carbon development path and stimulate a green economy. However, since bioenergy uses land and natural resources, it is in competition with the valuable bio... an analytical framework and decision-support tools to assist in assessing, managing and monitoring the sustainability of bioenergy. IMPROVING THE SUSTAINABILITY OF BIOENERGY THROUGH INTEGRATION WITH OTHER BIO-BASED PRODUCTS Since bioenergy production...

  15. An Integrated Constraint Programming Approach to Scheduling Sports Leagues with Divisional and Round-robin Tournaments

    Energy Technology Data Exchange (ETDEWEB)

    Carlsson, Mats; Johansson, Mikael; Larson, Jeffrey

    2014-01-01

    Previous approaches for scheduling a league with round-robin and divisional tournaments involved decomposing the problem into easier subproblems. This approach, used to schedule the top Swedish handball league Elitserien, reduces the problem complexity but can result in suboptimal schedules. This paper presents an integrated constraint programming model that allows to perform the scheduling in a single step. Particular attention is given to identifying implied and symmetry-breaking constraints that reduce the computational complexity significantly. The experimental evaluation of the integrated approach takes considerably less computational effort than the previous approach.

  16. Integrated reservoir characterization: Improvement in heterogeneities stochastic modelling by integration of additional external constraints

    Energy Technology Data Exchange (ETDEWEB)

    Doligez, B.; Eschard, R. [Institut Francais du Petrole, Rueil Malmaison (France); Geffroy, F. [Centre de Geostatistique, Fontainebleau (France)] [and others

    1997-08-01

    The classical approach to construct reservoir models is to start with a fine scale geological model which is informed with petrophysical properties. Then scaling-up techniques allow to obtain a reservoir model which is compatible with the fluid flow simulators. Geostatistical modelling techniques are widely used to build the geological models before scaling-up. These methods provide equiprobable images of the area under investigation, which honor the well data, and which variability is the same than the variability computed from the data. At an appraisal phase, when few data are available, or when the wells are insufficient to describe all the heterogeneities and the behavior of the field, additional constraints are needed to obtain a more realistic geological model. For example, seismic data or stratigraphic models can provide average reservoir information with an excellent areal coverage, but with a poor vertical resolution. New advances in modelisation techniques allow now to integrate this type of additional external information in order to constrain the simulations. In particular, 2D or 3D seismic derived information grids, or sand-shale ratios maps coming from stratigraphic models can be used as external drifts to compute the geological image of the reservoir at the fine scale. Examples are presented to illustrate the use of these new tools, their impact on the final reservoir model, and their sensitivity to some key parameters.

  17. Technical findings and regulatory analysis for Generic Safety Issue II.E.4.3, ''Containment Integrity Check''

    International Nuclear Information System (INIS)

    Serkiz, A.W.

    1988-04-01

    This report contains the technical findings and regulatory analysis for Generic Safety Issue II.E.4.3, ''Containment Integrity Check.'' An evaluation of the containment isolation history from 1965 to 1983 reveals that (except for a small number of events) containment integrity has been maintained and that the majority of reported events have been events related to exceeding Technical Specification limits (or 0.6 of the allowable leakage level). In addition, more recent risk analyses have shown that allowable leakage rates even if increased by a factor of 10 would not significantly increase risk. Potential methods of continuous monitoring are identified and evaluated. Therefore, these technical findings and risk evaluations support closure of Generic Safety Issue II.E.4.3

  18. Recent development in low-constraint fracture toughness testing for structural integrity assessment of pipelines

    Science.gov (United States)

    Kang, Jidong; Gianetto, James A.; Tyson, William R.

    2018-03-01

    Fracture toughness measurement is an integral part of structural integrity assessment of pipelines. Traditionally, a single-edge-notched bend (SE(B)) specimen with a deep crack is recommended in many existing pipeline structural integrity assessment procedures. Such a test provides high constraint and therefore conservative fracture toughness results. However, for girth welds in service, defects are usually subjected to primarily tensile loading where the constraint is usually much lower than in the three-point bend case. Moreover, there is increasing use of strain-based design of pipelines that allows applied strains above yield. Low-constraint toughness tests represent more realistic loading conditions for girth weld defects, and the corresponding increased toughness can minimize unnecessary conservatism in assessments. In this review, we present recent developments in low-constraint fracture toughness testing, specifically using single-edgenotched tension specimens, SENT or SE(T). We focus our review on the test procedure development and automation, round-robin test results and some common concerns such as the effect of crack tip, crack size monitoring techniques, and testing at low temperatures. Examples are also given of the integration of fracture toughness data from SE(T) tests into structural integrity assessment.

  19. A Secure and Effective Anonymous Integrity Checking Protocol for Data Storage in Multicloud

    Directory of Open Access Journals (Sweden)

    Lingwei Song

    2015-01-01

    Full Text Available How to verify the integrity of outsourced data is an important problem in cloud storage. Most of previous work focuses on three aspects, which are providing data dynamics, public verifiability, and privacy against verifiers with the help of a third party auditor. In this paper, we propose an identity-based data storage and integrity verification protocol on untrusted cloud. And the proposed protocol can guarantee fair results without any third verifying auditor. The theoretical analysis and simulation results show that our protocols are secure and efficient.

  20. Null Space Integration Method for Constrained Multibody Systems with No Constraint Violation

    International Nuclear Information System (INIS)

    Terze, Zdravko; Lefeber, Dirk; Muftic, Osman

    2001-01-01

    A method for integrating equations of motion of constrained multibody systems with no constraint violation is presented. A mathematical model, shaped as a differential-algebraic system of index 1, is transformed into a system of ordinary differential equations using the null-space projection method. Equations of motion are set in a non-minimal form. During integration, violations of constraints are corrected by solving constraint equations at the position and velocity level, utilizing the metric of the system's configuration space, and projective criterion to the coordinate partitioning method. The method is applied to dynamic simulation of 3D constrained biomechanical system. The simulation results are evaluated by comparing them to the values of characteristic parameters obtained by kinematics analysis of analyzed motion based unmeasured kinematics data

  1. Capacity Model and Constraints Analysis for Integrated Remote Wireless Sensor and Satellite Network in Emergency Scenarios

    Science.gov (United States)

    Zhang, Wei; Zhang, Gengxin; Dong, Feihong; Xie, Zhidong; Bian, Dongming

    2015-01-01

    This article investigates the capacity problem of an integrated remote wireless sensor and satellite network (IWSSN) in emergency scenarios. We formulate a general model to evaluate the remote sensor and satellite network capacity. Compared to most existing works for ground networks, the proposed model is time varying and space oriented. To capture the characteristics of a practical network, we sift through major capacity-impacting constraints and analyze the influence of these constraints. Specifically, we combine the geometric satellite orbit model and satellite tool kit (STK) engineering software to quantify the trends of the capacity constraints. Our objective in analyzing these trends is to provide insights and design guidelines for optimizing the integrated remote wireless sensor and satellite network schedules. Simulation results validate the theoretical analysis of capacity trends and show the optimization opportunities of the IWSSN. PMID:26593919

  2. Capacity Model and Constraints Analysis for Integrated Remote Wireless Sensor and Satellite Network in Emergency Scenarios.

    Science.gov (United States)

    Zhang, Wei; Zhang, Gengxin; Dong, Feihong; Xie, Zhidong; Bian, Dongming

    2015-11-17

    This article investigates the capacity problem of an integrated remote wireless sensor and satellite network (IWSSN) in emergency scenarios. We formulate a general model to evaluate the remote sensor and satellite network capacity. Compared to most existing works for ground networks, the proposed model is time varying and space oriented. To capture the characteristics of a practical network, we sift through major capacity-impacting constraints and analyze the influence of these constraints. Specifically, we combine the geometric satellite orbit model and satellite tool kit (STK) engineering software to quantify the trends of the capacity constraints. Our objective in analyzing these trends is to provide insights and design guidelines for optimizing the integrated remote wireless sensor and satellite network schedules. Simulation results validate the theoretical analysis of capacity trends and show the optimization opportunities of the IWSSN.

  3. Constraint-based query distribution framework for an integrated global schema

    DEFF Research Database (Denmark)

    Malik, Ahmad Kamran; Qadir, Muhammad Abdul; Iftikhar, Nadeem

    2009-01-01

    and replicated data sources. The provided system is all XML-based which poses query in XML form, transforms, and integrates local results in an XML document. Contributions include the use of constraints in our existing global schema which help in source selection and query optimization, and a global query...

  4. Symbol recognition via statistical integration of pixel-level constraint histograms: a new descriptor.

    Science.gov (United States)

    Yang, Su

    2005-02-01

    A new descriptor for symbol recognition is proposed. 1) A histogram is constructed for every pixel to figure out the distribution of the constraints among the other pixels. 2) All the histograms are statistically integrated to form a feature vector with fixed dimension. The robustness and invariance were experimentally confirmed.

  5. Uncertainty reduction of gravity and magnetic inversion through the integration of petrophysical constraints and geological data

    Science.gov (United States)

    Giraud, Jérémie; Jessell, Mark; Lindsay, Mark; Martin, Roland; Pakyuz-Charrier, Evren; Ogarko, Vitaliy

    2016-04-01

    We introduce and test a workflow that integrates petrophysical constraints and geological data in geophysical inversion to decrease the uncertainty and non-uniqueness of the results. We show that the integration of geological information and petrophysical constraints in geophysical inversion can improve inversion results in terms of both uncertainty reduction and resolution. This workflow uses statistical petrophysical properties to constrain the values retrieved by the geophysical inversion and geological prior information to decrease the effect of non-uniqueness. Surface geological data are used to generate geological models as a source of geometrical prior information. Petrophysical measurements are used to derive the statistical laws used for the petrophysical constraints. We integrate the different sources of information in a Bayesian framework, which will take into account these states of information. This permits us to quantify the posterior state of knowledge, the reduction of the uncertainty and to calculate the influence of prior information. To quantify the influence of petrophysical constraints and geological data we compare results obtained with several levels of constraints. We start by inverting data without petrophysical constraints and geological prior information. Then, we add petrophysical constraints before using geological prior information. The results of the inversion are characterized using fixed-point statistics. Various indicators such as model and data misfits, resolution matrices and statistical fit to the petrophysical data are calculated. The resolution matrices are used to plot sensitivity maps. We calculate the posterior covariance matrices to estimate the uncertainty of the model. This workflow was first tested using very simple synthetic datasets before using a subset of the Mansfield area data (Victoria, Australia). The geological model is derived from geological field data. We simulate petrophysical properties based on field

  6. Integrated systems optimization model for biofuel development: The influence of environmental constraints

    Science.gov (United States)

    Housh, M.; Ng, T.; Cai, X.

    2012-12-01

    The environmental impact is one of the major concerns of biofuel development. While many other studies have examined the impact of biofuel expansion on stream flow and water quality, this study examines the problem from the other side - will and how a biofuel production target be affected by given environmental constraints. For this purpose, an integrated model comprises of different sub-systems of biofuel refineries, transportation, agriculture, water resources and crops/ethanol market has been developed. The sub-systems are integrated into one large-scale model to guide the optimal development plan considering the interdependency between the subsystems. The optimal development plan includes biofuel refineries location and capacity, refinery operation, land allocation between biofuel and food crops, and the corresponding stream flow and nitrate load in the watershed. The watershed is modeled as a network flow, in which the nodes represent sub-watersheds and the arcs are defined as the linkage between the sub-watersheds. The runoff contribution of each sub-watershed is determined based on the land cover and the water uses in that sub-watershed. Thus, decisions of other sub-systems such as the land allocation in the land use sub-system and the water use in the refinery sub-system define the sources and the sinks of the network. Environmental policies will be addressed in the integrated model by imposing stream flow and nitrate load constraints. These constraints can be specified by location and time in the watershed to reflect the spatial and temporal variation of the regulations. Preliminary results show that imposing monthly water flow constraints and yearly nitrate load constraints will change the biofuel development plan dramatically. Sensitivity analysis is performed to examine how the environmental constraints and their spatial and the temporal distribution influence the overall biofuel development plan and the performance of each of the sub

  7. Particle acceleration inside PWN: Simulation and observational constraints with INTEGRAL; Acceleration de particules au sein des vents relativistes de pulsar: simulation et contraintes observationelles avec le satellite INTEGRAL

    Energy Technology Data Exchange (ETDEWEB)

    Forot, M

    2006-12-15

    The context of this thesis is to gain new constraints on the different particle accelerators that occur in the complex environment of neutron stars: in the pulsar magnetosphere, in the striped wind or wave outside the light cylinder, in the jets and equatorial wind, and at the wind terminal shock. An important tool to constrain both the magnetic field and primary particle energies is to image the synchrotron ageing of the population, but it requires a careful modelling of the magnetic field evolution in the wind flow. The current models and understanding of these different accelerators, the acceleration processes and open questions have been reviewed in the first part of the thesis. The instrumental part of this work involves the IBIS imager, on board the INTEGRAL satellite, that provides images with 12' resolution from 17 keV to MeV where the SPI spectrometer takes over up, to 10 MeV, but with a reduced 2 degrees resolution. A new method for using the double-layer IBIS imager as a Compton telescope with coded mask aperture. Its performance has been measured. The Compton scattering information and the achieved sensitivity also open a new window for polarimetry in gamma rays. A method has been developed to extract the linear polarization properties and to check the instrument response for fake polarimetric signals in the various backgrounds and projection effects.

  8. Particle acceleration inside PWN: Simulation and observational constraints with INTEGRAL; Acceleration de particules au sein des vents relativistes de pulsar: simulation et contraintes observationelles avec le satellite INTEGRAL

    Energy Technology Data Exchange (ETDEWEB)

    Forot, M

    2006-12-15

    The context of this thesis is to gain new constraints on the different particle accelerators that occur in the complex environment of neutron stars: in the pulsar magnetosphere, in the striped wind or wave outside the light cylinder, in the jets and equatorial wind, and at the wind terminal shock. An important tool to constrain both the magnetic field and primary particle energies is to image the synchrotron ageing of the population, but it requires a careful modelling of the magnetic field evolution in the wind flow. The current models and understanding of these different accelerators, the acceleration processes and open questions have been reviewed in the first part of the thesis. The instrumental part of this work involves the IBIS imager, on board the INTEGRAL satellite, that provides images with 12' resolution from 17 keV to MeV where the SPI spectrometer takes over up, to 10 MeV, but with a reduced 2 degrees resolution. A new method for using the double-layer IBIS imager as a Compton telescope with coded mask aperture. Its performance has been measured. The Compton scattering information and the achieved sensitivity also open a new window for polarimetry in gamma rays. A method has been developed to extract the linear polarization properties and to check the instrument response for fake polarimetric signals in the various backgrounds and projection effects.

  9. Distributed constraint satisfaction for coordinating and integrating a large-scale, heterogenous enterprise

    CERN Document Server

    Eisenberg, C

    2003-01-01

    Market forces are continuously driving public and private organisations towards higher productivity, shorter process and production times, and fewer labour hours. To cope with these changes, organisations are adopting new organisational models of coordination and cooperation that increase their flexibility, consistency, efficiency, productivity and profit margins. In this thesis an organisational model of coordination and cooperation is examined using a real life example; the technical integration of a distributed large-scale project of an international physics collaboration. The distributed resource constraint project scheduling problem is modelled and solved with the methods of distributed constraint satisfaction. A distributed local search method, the distributed breakout algorithm (DisBO), is used as the basis for the coordination scheme. The efficiency of the local search method is improved by extending it with an incremental problem solving scheme with variable ordering. The scheme is implemented as cen...

  10. Stabilization Methods for the Integration of DAE in the Presence of Redundant Constraints

    International Nuclear Information System (INIS)

    Neto, Maria Augusta; Ambrosio, Jorge

    2003-01-01

    The use of multibody formulations based on Cartesian or natural coordinates lead to sets of differential-algebraic equations that have to be solved. The difficulty in providing compatible initial positions and velocities for a general spatial multibody model and the finite precision of such data result in initial errors that must be corrected during the forward dynamic solution of the system equations of motion.As the position and velocity constraint equations are not explicitly involved in the solution procedure, any integration error leads to the violation of these equations in the long run. Another problem that is very often impossible to avoid is the presence of redundant constraints.Even with no initial redundancy it is possible for some systems to achieve singular configurations in which kinematic constraints become temporarily redundant. In this work several procedures to stabilize the solution of the equations of motion and to handle redundant constraints are revisited. The Baumgarte stabilization, augmented Lagrangian and coordinate partitioning methods are discussed in terms of their efficiency and computational costs. The LU factorization with full pivoting of the Jacobian matrix directs the choice of the set of independent coordinates, required by the coordinate partitioning method.Even when no particular stabilization method is used, a Newton-Raphson iterative procedure is still required in the initial time step to correct the initial positions and velocities, thus requiring the selection of the independent coordinates. However, this initial selection does not guarantee that during the motion of the system other constraints do not become redundant. Two procedures based on the single value decomposition and Gram-Schmidt orthogonalization are revisited for the purpose. The advantages and drawbacks of the different procedures,used separately or in conjunction with each other and their computational costs are finally discussed

  11. Check valve

    Science.gov (United States)

    Upton, H.A.; Garcia, P.

    1999-08-24

    A check valve for use in a GDCS of a nuclear reactor and having a motor driven disk including a rotatable armature for rotating the check valve disk over its entire range of motion is described. In one embodiment, the check valve includes a valve body having a coolant flow channel extending therethrough. The coolant flow channel includes an inlet end and an outlet end. A valve body seat is located on an inner surface of the valve body. The check valve further includes a disk assembly, sometimes referred to as the motor driven disc, having a counterweight and a disk shaped valve. The disk valve includes a disk base having a seat for seating with the valve body seat. The disk assembly further includes a first hinge pin member which extends at least partially through the disk assembly and is engaged to the disk. The disk valve is rotatable relative to the first hinge pin member. The check valve also includes a motor having a stator frame with a stator bore therein. An armature is rotatably positioned within the stator bore and the armature is coupled to the disk valve to cause the disk valve to rotate about its full range of motion. 5 figs.

  12. Check valve

    International Nuclear Information System (INIS)

    Upton, H.A.; Garcia, P.

    1999-01-01

    A check valve for use in a GDCS of a nuclear reactor and having a motor driven disk including a rotatable armature for rotating the check valve disk over its entire range of motion is described. In one embodiment, the check valve includes a valve body having a coolant flow channel extending therethrough. The coolant flow channel includes an inlet end and an outlet end. A valve body seat is located on an inner surface of the valve body. The check valve further includes a disk assembly, sometimes referred to as the motor driven disc, having a counterweight and a disk shaped valve. The disk valve includes a disk base having a seat for seating with the valve body seat. The disk assembly further includes a first hinge pin member which extends at least partially through the disk assembly and is engaged to the disk. The disk valve is rotatable relative to the first hinge pin member. The check valve also includes a motor having a stator frame with a stator bore therein. An armature is rotatably positioned within the stator bore and the armature is coupled to the disk valve to cause the disk valve to rotate about its full range of motion. 5 figs

  13. The capability and constraint model of recoverability: An integrated theory of continuity planning.

    Science.gov (United States)

    Lindstedt, David

    2017-01-01

    While there are best practices, good practices, regulations and standards for continuity planning, there is no single model to collate and sort their various recommended activities. To address this deficit, this paper presents the capability and constraint model of recoverability - a new model to provide an integrated foundation for business continuity planning. The model is non-linear in both construct and practice, thus allowing practitioners to remain adaptive in its application. The paper presents each facet of the model, outlines the model's use in both theory and practice, suggests a subsequent approach that arises from the model, and discusses some possible ramifications to the industry.

  14. Vocalist - an international programme for the validation of constraint based methodology in structural integrity

    International Nuclear Information System (INIS)

    Lidbury, D.; Bass, R.; Gilles, Ph.; Connors, D.; Eisele, U.; Keim, E.; Keinanen, H.; Marie, St.; Nagel, G.; Taylor, N.; Wadier, Y.

    2001-01-01

    The pattern of crack-tip stresses and strains causing plastic flow and fracture in components is different to that in test specimens. This gives rise to the so-called constraint effect. Crack-tip constraint in components is generally lower than in test specimens. Effective toughness is correspondingly higher. The fracture toughness measured on test specimens is thus likely to underestimate that exhibited by cracks in components. A 36-month programme was initiated in October 2000 as part of the Fifth Framework of the European Atomic Energy Community (EURATOM), with the objective of achieving (i) an improved defect assessment methodology for predicting safety margins; (ii) improved lifetime management arguments. The programme VOCALIST (Validation of Constraint Based Methodology in Structural Integrity) is one of a 'cluster' of Fifth Framework projects in the area of Plant Life Management (Nuclear Fission). VOCALIST is also an associated project of NESC (Network for Evaluating Steel Components). The present paper describes the aims and objectives of VOCALIST, its interactions with NESC, and gives details of its various Work Packages. (authors)

  15. Vocalist - an international programme for the validation of constraint based methodology in structural integrity

    Energy Technology Data Exchange (ETDEWEB)

    Lidbury, D. [AEA Technology, Consulting (United Kingdom); Bass, R. [Oak Ridge National Lab., TN (United States); Gilles, Ph. [FRAMATOME, 92 - Paris-La-Defence (France); Connors, D. [BNFL Magnox Generation (United Kingdom); Eisele, U. [Multiphoton Absorption, MPA, Stuttgart (Germany); Keim, E. [Framatome ANP GmbH (Germany); Keinanen, H. [VTT Energy, Espoo (Finland); Marie, St. [CEA Saclay, Dept. de Mecanique et de Technologie, 91 - Gif sur Yvette (France); Nagel, G. [E.ON Kernraft (Germany); Taylor, N. [Joint Research Center, JRC-IAM (Netherlands); Wadier, Y. [Electricite de France (EDF), 93 - Saint-Denis (France). Dept. de Radioprotection

    2001-07-01

    The pattern of crack-tip stresses and strains causing plastic flow and fracture in components is different to that in test specimens. This gives rise to the so-called constraint effect. Crack-tip constraint in components is generally lower than in test specimens. Effective toughness is correspondingly higher. The fracture toughness measured on test specimens is thus likely to underestimate that exhibited by cracks in components. A 36-month programme was initiated in October 2000 as part of the Fifth Framework of the European Atomic Energy Community (EURATOM), with the objective of achieving (i) an improved defect assessment methodology for predicting safety margins; (ii) improved lifetime management arguments. The programme VOCALIST (Validation of Constraint Based Methodology in Structural Integrity) is one of a 'cluster' of Fifth Framework projects in the area of Plant Life Management (Nuclear Fission). VOCALIST is also an associated project of NESC (Network for Evaluating Steel Components). The present paper describes the aims and objectives of VOCALIST, its interactions with NESC, and gives details of its various Work Packages. (authors)

  16. Adaptation to climate-induced regional water constraints in the Spanish energy sector: An integrated assessment

    International Nuclear Information System (INIS)

    Khan, Zarrar; Linares, Pedro; García-González, Javier

    2016-01-01

    The energy sector depends on water in all phases of its life-cycle, including raw material extraction, power plant cooling, irrigation of biofuel crops and directly in hydropower generation. In the coming decades, several regions of the world are expected to experience a decrease in water resource availability, in part due to climate change. The dependence of the energy sector on water resources calls for an active effort to adapt to the possible scenarios. This paper presents a novel model that addresses the direct impacts of regional and temporal water shortages on energy operation and investment decisions. The paper investigates the costs and benefits of adapting the energy sector to climate-induced water scarcity. The results show that the increase in costs for an energy plan that considers future water stress is relatively small as compared to one which ignores it. A plan which ignores water constraints, however, may lead to significant economic damages when actually exposed to water shortages. The results also highlight the value of the availability of water for the energy sector, which is significantly higher than existing prices. The paper concludes that the potential benefits to be gained by integrating energy and water models can be considerable. - Highlights: • Spatial and temporal water constraints are added to an energy planning model. • Integrated water-energy planning can lead to significant savings in future water-stressed scenarios. • Actual value of water for the energy sector may be much higher than existing prices.

  17. Towards an integrated, multiple constraint approach. Assessing the regional carbon balance

    International Nuclear Information System (INIS)

    Kruijt, B.; Dolman, A.J.; Lloyd, J.; Ehleringer, J.; Raupach, M.; Finnigan, J.

    2001-01-01

    Full carbon accounting for regions as a whole, considering all fluxes and transports, is ultimately the only real hope if we are to manage global CO2 emissions. Many methods exist to estimate parts of the carbon budget, but none is yet available to measure carbon fluxes directly at regional scales. Atmospheric Boundary-Layer budgeting methods do have this potential. In the winter of 2000, an international workshop was held in Gubbio, Italy, to discuss ways to advance from the pilot experiments that have been carried out on these methods. First, the meeting helped to advance the methodology and clarify its objectives, requirements and merits. But more importantly, the outcome of the meeting was that atmospheric budget methods should be part of an integrative approach, in which data and model results of very different kinds and from very different scales all provide constraints for estimating the net carbon exchange of a region. Several international projects are now operating to achieve this goal

  18. Moving energies as first integrals of nonholonomic systems with affine constraints

    Science.gov (United States)

    Fassò, Francesco; García-Naranjo, Luis C.; Sansonetto, Nicola

    2018-03-01

    In nonholonomic mechanical systems with constraints that are affine (linear nonhomogeneous) functions of the velocities, the energy is typically not a first integral. It was shown in Fassò and Sansonetto (2016 J. Nonlinear Sci. 26 519-44) that, nevertheless, there exist modifications of the energy, called there moving energies, which under suitable conditions are first integrals. The first goal of this paper is to study the properties of these functions and the conditions that lead to their conservation. In particular, we enlarge the class of moving energies considered in Fassò and Sansonetto (2016 J. Nonlinear Sci. 26 519-44). The second goal of the paper is to demonstrate the relevance of moving energies in nonholonomic mechanics. We show that certain first integrals of some well known systems (the affine Veselova and LR systems), which had been detected on a case-by-case way, are instances of moving energies. Moreover, we determine conserved moving energies for a class of affine systems on Lie groups that include the LR systems, for a heavy convex rigid body that rolls without slipping on a uniformly rotating plane, and for an n-dimensional generalization of the Chaplygin sphere problem to a uniformly rotating hyperplane.

  19. Consistency check of iron and sodium cross sections with integral benchmark experiments using a large amount of experimental information

    International Nuclear Information System (INIS)

    Baechle, R.-D.; Hehn, G.; Pfister, G.; Perlini, G.; Matthes, W.

    1984-01-01

    Single material benchmark experiments are designed to check neutron and gamma cross-sections of importance for deep penetration problems. At various penetration depths a large number of activation detectors and spectrometers are placed to measure the radiation field as completely as possible. The large amount of measured data in benchmark experiments can be evaluated best by the global detector concept applied to nuclear data adjustment. A new iteration procedure is presented for adjustment of a large number of multigroup cross sections, which has been implemented now in the modular adjustment code ADJUST-EUR. A theoretical test problem has been deviced to check the total program system with high precision. The method and code are going to be applied for validating the new European Data Files (JEF and EFF) in progress. (Auth.)

  20. Design Principles as a Guide for Constraint Based and Dynamic Modeling: Towards an Integrative Workflow.

    Science.gov (United States)

    Sehr, Christiana; Kremling, Andreas; Marin-Sanguino, Alberto

    2015-10-16

    During the last 10 years, systems biology has matured from a fuzzy concept combining omics, mathematical modeling and computers into a scientific field on its own right. In spite of its incredible potential, the multilevel complexity of its objects of study makes it very difficult to establish a reliable connection between data and models. The great number of degrees of freedom often results in situations, where many different models can explain/fit all available datasets. This has resulted in a shift of paradigm from the initially dominant, maybe naive, idea of inferring the system out of a number of datasets to the application of different techniques that reduce the degrees of freedom before any data set is analyzed. There is a wide variety of techniques available, each of them can contribute a piece of the puzzle and include different kinds of experimental information. But the challenge that remains is their meaningful integration. Here we show some theoretical results that enable some of the main modeling approaches to be applied sequentially in a complementary manner, and how this workflow can benefit from evolutionary reasoning to keep the complexity of the problem in check. As a proof of concept, we show how the synergies between these modeling techniques can provide insight into some well studied problems: Ammonia assimilation in bacteria and an unbranched linear pathway with end-product inhibition.

  1. Design Principles as a Guide for Constraint Based and Dynamic Modeling: Towards an Integrative Workflow

    Directory of Open Access Journals (Sweden)

    Christiana Sehr

    2015-10-01

    Full Text Available During the last 10 years, systems biology has matured from a fuzzy concept combining omics, mathematical modeling and computers into a scientific field on its own right. In spite of its incredible potential, the multilevel complexity of its objects of study makes it very difficult to establish a reliable connection between data and models. The great number of degrees of freedom often results in situations, where many different models can explain/fit all available datasets. This has resulted in a shift of paradigm from the initially dominant, maybe naive, idea of inferring the system out of a number of datasets to the application of different techniques that reduce the degrees of freedom before any data set is analyzed. There is a wide variety of techniques available, each of them can contribute a piece of the puzzle and include different kinds of experimental information. But the challenge that remains is their meaningful integration. Here we show some theoretical results that enable some of the main modeling approaches to be applied sequentially in a complementary manner, and how this workflow can benefit from evolutionary reasoning to keep the complexity of the problem in check. As a proof of concept, we show how the synergies between these modeling techniques can provide insight into some well studied problems: Ammonia assimilation in bacteria and an unbranched linear pathway with end-product inhibition.

  2. Automated constraint checking of spacecraft command sequences

    Science.gov (United States)

    Horvath, Joan C.; Alkalaj, Leon J.; Schneider, Karl M.; Spitale, Joseph M.; Le, Dang

    1995-01-01

    Robotic spacecraft are controlled by onboard sets of commands called "sequences." Determining that sequences will have the desired effect on the spacecraft can be expensive in terms of both labor and computer coding time, with different particular costs for different types of spacecraft. Specification languages and appropriate user interface to the languages can be used to make the most effective use of engineering validation time. This paper describes one specification and verification environment ("SAVE") designed for validating that command sequences have not violated any flight rules. This SAVE system was subsequently adapted for flight use on the TOPEX/Poseidon spacecraft. The relationship of this work to rule-based artificial intelligence and to other specification techniques is discussed, as well as the issues that arise in the transfer of technology from a research prototype to a full flight system.

  3. Neural nets for the plausibility check of measured values in the integrated measurement and information system for the surveillance of environmental radioactivity (IMIS)

    International Nuclear Information System (INIS)

    Haase, G.

    2003-01-01

    Neural nets to the plausibility check of measured values in the ''integrated measurement and information system for the surveillance of environmental radioactivity, IMIS'' is a research project supported by the Federal Minister for the Environment, Nature Conservation and Nuclear Safety. A goal of this project was the automatic recognition of implausible measured values in the data base ORACLE, which measured values from surveillance of environmental radioactivity of most diverse environmental media contained. The conversion of this project [ 1 ] was realized by institut of logic, complexity and deduction systems of the university Karlsruhe under the direction of Professor Dr. Menzel, Dr. Martin Riedmueller and Martin Lauer. (orig.)

  4. A short-term operating room surgery scheduling problem integrating multiple nurses roster constraints.

    Science.gov (United States)

    Xiang, Wei; Yin, Jiao; Lim, Gino

    2015-02-01

    Operating room (OR) surgery scheduling determines the individual surgery's operation start time and assigns the required resources to each surgery over a schedule period, considering several constraints related to a complete surgery flow and the multiple resources involved. This task plays a decisive role in providing timely treatments for the patients while balancing hospital resource utilization. The originality of the present study is to integrate the surgery scheduling problem with real-life nurse roster constraints such as their role, specialty, qualification and availability. This article proposes a mathematical model and an ant colony optimization (ACO) approach to efficiently solve such surgery scheduling problems. A modified ACO algorithm with a two-level ant graph model is developed to solve such combinatorial optimization problems because of its computational complexity. The outer ant graph represents surgeries, while the inner graph is a dynamic resource graph. Three types of pheromones, i.e. sequence-related, surgery-related, and resource-related pheromone, fitting for a two-level model are defined. The iteration-best and feasible update strategy and local pheromone update rules are adopted to emphasize the information related to the good solution in makespan, and the balanced utilization of resources as well. The performance of the proposed ACO algorithm is then evaluated using the test cases from (1) the published literature data with complete nurse roster constraints, and 2) the real data collected from a hospital in China. The scheduling results using the proposed ACO approach are compared with the test case from both the literature and the real life hospital scheduling. Comparison results with the literature shows that the proposed ACO approach has (1) an 1.5-h reduction in end time; (2) a reduction in variation of resources' working time, i.e. 25% for ORs, 50% for nurses in shift 1 and 86% for nurses in shift 2; (3) an 0.25h reduction in

  5. Management model of productive capacity: integrating theory of constraints and the global operational efficiency index (IROG

    Directory of Open Access Journals (Sweden)

    Diego Augusto Pacheco

    2012-08-01

    Full Text Available This paper presents a model of management capacity in productive systems integrating the concepts of the Theory of Constraints and Total Productive Maintenance (TPM. The main objective of this study is to discuss and propose a model of management capacity, able to answer the following key questions: i capacity indicators which should be considered and how to measure them to measure the productive capacity of manufacturing systems? ii what is the real productive capacity of the system analyzed under a determined relationship between capacity and demand? The discussion of the proposed model is relevant because the definition of productive capacity system enables better management of resources and capabilities, improve production scheduling on the factory floor and meeting the demands imposed by the market. This paper presents the proposition of using the Operating Income Index Global (IROG with a different approach from traditional literature dealing with the theme, presented by Nakajima (1988. The results of this paper enable to develop a model to determine the capacity of the production system and the impact on the productive capacity of the entire system, not to consider the quality conformances that occur after the bottleneck resource of the production flow.

  6. Path-integral approach to the dynamics of a random chain with rigid constraints

    International Nuclear Information System (INIS)

    Ferrari, Franco; Paturej, Jaroslaw; Vilgis, Thomas A.

    2008-01-01

    In this work the dynamics of a chain consisting of a set of beads attached to the ends of segments of fixed lengths is investigated. The chain fluctuates at constant temperature in a viscous medium. For simplicity, all interactions among the beads have been switched off and the number of spatial dimensions has been limited to two. In the limit in which the chain becomes a continuous system, its behavior may be described by a path integral, in which the rigid constraints coming from the infinitesimally small segments are imposed by means of a functional δ function. In this way a model of the dynamics of the chain is obtained, which closely resembles a two-dimensional nonlinear σ model. The partition function of this generalized nonlinear σ model is computed explicitly for a ring-shaped chain in the semiclassical approximation. The behavior of the chain at both long and short scales of time and distances is investigated. The connection between the generalized nonlinear σ model presented here and the Rouse model is discussed

  7. Integration of sparse multi-modality representation and geometrical constraint for isointense infant brain segmentation.

    Science.gov (United States)

    Wang, Li; Shi, Feng; Li, Gang; Lin, Weili; Gilmore, John H; Shen, Dinggang

    2013-01-01

    Segmentation of infant brain MR images is challenging due to insufficient image quality, severe partial volume effect, and ongoing maturation and myelination process. During the first year of life, the signal contrast between white matter (WM) and gray matter (GM) in MR images undergoes inverse changes. In particular, the inversion of WM/GM signal contrast appears around 6-8 months of age, where brain tissues appear isointense and hence exhibit extremely low tissue contrast, posing significant challenges for automated segmentation. In this paper, we propose a novel segmentation method to address the above-mentioned challenge based on the sparse representation of the complementary tissue distribution information from T1, T2 and diffusion-weighted images. Specifically, we first derive an initial segmentation from a library of aligned multi-modality images with ground-truth segmentations by using sparse representation in a patch-based fashion. The segmentation is further refined by the integration of the geometrical constraint information. The proposed method was evaluated on 22 6-month-old training subjects using leave-one-out cross-validation, as well as 10 additional infant testing subjects, showing superior results in comparison to other state-of-the-art methods.

  8. Open Source ERP Applications: A Reality Check for Their Possible Adoption and Use in Teaching Business Process Integration

    Science.gov (United States)

    Huynh, Minh; Pinto, Ivan

    2010-01-01

    For years, there has been a need for teaching students about business process integration. The use of ERP systems has been proposed as a mechanism to meet this need. Yet, in the midst of a recent economic crisis, it is difficult to find funding for the acquisition and implementation of an ERP system for teaching purpose. While it is recognized…

  9. Scram system with continuos check

    International Nuclear Information System (INIS)

    Rodriguez Sacco, Walter.

    1976-02-01

    The equipment described pretends to be a further step to the use of integrated circuits in nuclear instrumentation, considering that this type of control was traditionally carried out on the bases of electromechanical elements. A continuous self-check method has been applied in accordance with the high reliability requiered for this type of equipments. The developed equipment fulfils the condition that any deficiency in its component elements, causes an anormal self-detected operation. The equipment covers two systems: the Scram one, that includes the sequence generator-detector, the rods check and scram chain, and the Check system that uses pulses from the sequence detector. (author) [es

  10. On the functional integration between postural and supra-postural tasks on the basis of contextual cues and task constraint.

    Science.gov (United States)

    de Lima, Andrea Cristina; de Azevedo Neto, Raymundo Machado; Teixeira, Luis Augusto

    2010-10-01

    In order to evaluate the effects of uncertainty about direction of mechanical perturbation and supra-postural task constraint on postural control, young adults had their upright stance perturbed while holding a tray in a horizontal position. Stance was perturbed by moving forward or backward a supporting platform, contrasting situations of certainty versus uncertainty of direction of displacement. Increased constraint on postural stability was imposed by a supra-postural task of equilibrating a cylinder on the tray. Performance was assessed through EMG of anterior leg muscles, angular displacement of the main joints involved in the postural reactions and displacement of the tray. Results showed that both certainty on the direction of perturbation and increased supra-postural task constraint led to decreased angular displacement of the knee and the hip. Furthermore, combination of certainty and high supra-postural task constraint produced shorter latency of muscular activation. Such postural responses were paralleled by decreased displacement of the tray. These results suggest a functional integration between the tasks, with central set priming reactive postural responses from contextual cues and increased stability demand. Copyright © 2010 Elsevier B.V. All rights reserved.

  11. Rigid Body Time Integration by Convected Base Vectors with Implicit Constraints

    DEFF Research Database (Denmark)

    Krenk, Steen; Nielsen, Martin Bjerre

    2013-01-01

    of the kinetic energy used in the present formulation is deliberately chosen to correspond to a rigid body rotation, and the orthonormality constraints are introduced via the equivalent Green strain components of the base vectors. The particular form of the extended inertia tensor used here implies a set...

  12. Analytical design of proportional-integral controllers for the optimal control of first-order processes with operational constraints

    Energy Technology Data Exchange (ETDEWEB)

    Thu, Hien Cao Thi; Lee, Moonyong [Yeungnam University, Gyeongsan (Korea, Republic of)

    2013-12-15

    A novel analytical design method of industrial proportional-integral (PI) controllers was developed for the optimal control of first-order processes with operational constraints. The control objective was to minimize a weighted sum of the controlled variable error and the rate of change in the manipulated variable under the maximum allowable limits in the controlled variable, manipulated variable and the rate of change in the manipulated variable. The constrained optimal servo control problem was converted to an unconstrained optimization to obtain an analytical tuning formula. A practical shortcut procedure for obtaining optimal PI parameters was provided based on graphical analysis of global optimality. The proposed PI controller was found to guarantee global optimum and deal explicitly with the three important operational constraints.

  13. Geometrical-integrability constraints and equations of motion in four plus extended super spaces

    International Nuclear Information System (INIS)

    Chau, L.L.

    1987-01-01

    It is pointed out that many equations of motion in physics, including gravitational and Yang-Mills equations, have a common origin: i.e. they are the results of certain geometrical integrability conditions. These integrability conditions lead to linear systems and conservation laws that are important in integrating these equations of motion

  14. Regular health checks

    DEFF Research Database (Denmark)

    Grønhøj Larsen, Christian; Jørgensen, Karsten Juhl; Gøtzsche, Peter C

    2012-01-01

    To investigate whether Danish providers of general health checks present a balanced account of possible benefits and harms on their websites and whether the health checks are evidence-based.......To investigate whether Danish providers of general health checks present a balanced account of possible benefits and harms on their websites and whether the health checks are evidence-based....

  15. Opportunities for and constraints to integration of health services in Poland

    Directory of Open Access Journals (Sweden)

    Alicja Sobczak

    2002-06-01

    Full Text Available At the beginning of the article the typologies, expected outcomes and forces aiming at health care integration are discussed. Integration is recognised as a multidimensional concept. The suggested typologies of integration are based on structural configurations, co-ordination mechanisms (including clinical co-ordination, and driving forces. A review of the Polish experience in integration/disintegration of health care systems is the main part of the article. Creation of integrated health care management units (ZOZs in the beginning of the 1970s serves as an example of structural vertical integration missing co-ordination mechanisms. ZOZs as huge, costly and inflexible organisations became subjects of public criticism and discredited the idea of health care integration. At the end of the 1980s and in the decade of the 1990s, management of public health care was decentralised, the majority of ZOZs dismantled, and many health care public providers got the status of independent entities. The private sector developed rapidly. Sickness funds, which in 1999 replaced the previous state system, introduced “quasi-market” conditions where health providers have to compete for contracts. Some providers developed strategies of vertical and horizontal integration to get a competitive advantage. Consolidation of private ambulatory clinics, the idea of “integrated care” as a “contracting package”, development of primary health care and ambulatory specialist clinics in hospitals are the examples of such strategies. The new health policy declared in 2002 has recognised integration as a priority. It stresses the development of payment mechanisms and information base (Register of Health Services – RUM that promote integration. The Ministry of Health is involved directly in integrated emergency system designing. It seems that after years of disintegration and deregulation the need for effective integration has become obvious.

  16. Finite-dimensional Liouville integrable Hamiltonian systems generated from Lax pairs of a bi-Hamiltonian soliton hierarchy by symmetry constraints

    Science.gov (United States)

    Manukure, Solomon

    2018-04-01

    We construct finite-dimensional Hamiltonian systems by means of symmetry constraints from the Lax pairs and adjoint Lax pairs of a bi-Hamiltonian hierarchy of soliton equations associated with the 3-dimensional special linear Lie algebra, and discuss the Liouville integrability of these systems based on the existence of sufficiently many integrals of motion.

  17. Checking Java Programs

    CERN Document Server

    Darwin, Ian

    2007-01-01

    This Short Cut tells you about tools that will improve the quality of your Java code, using checking above and beyond what the standard tools do, including: Using javac options, JUnit and assertions Making your IDE work harder Checking your source code with PMD Checking your compiled code (.class files) with FindBugs Checking your program's run-time behavior with Java PathFinder

  18. A conservative quaternion-based time integration algorithm for rigid body rotations with implicit constraints

    DEFF Research Database (Denmark)

    Nielsen, Martin Bjerre; Krenk, Steen

    2012-01-01

    A conservative time integration algorithm for rigid body rotations is presented in a purely algebraic form in terms of the four quaternions components and the four conjugate momentum variables via Hamilton’s equations. The introduction of an extended mass matrix leads to a symmetric set of eight...

  19. Adaptive Command Filtered Integrated Guidance and Control for Hypersonic Vehicle with Magnitude, Rate and Bandwidth Constraints

    Directory of Open Access Journals (Sweden)

    Wang Liang

    2018-01-01

    Full Text Available This paper proposes a novel integrated guidance and control (IGC method for hypersonic vehicle in terminal phase. Firstly, the system model is developed with a second order actuator dynamics. Then the back-stepping controller is designed hierarchically with command filters, where the first order command filters are implemented to construct the virtual control input with ideal states predicted by an adaptive estimator, and the nonlinear command filter is designed to produce magnitude, rate and bandwidth limited control surface deflection finally tracked by a terminal sliding mode controller with finite convergence time. Through a series of 6-DOF numerical simulations, it’s indicated that the proposed method successfully cancels out the large aerodynamics coefficient uncertainties and disturbances in hypersonic flight under limited control surface deflection. The contribution of this paper lies in the application and determination of nonlinear integrated design of guidance and control system for hypersonic vehicle.

  20. Social cost considerations and legal constraints in implementing modular integrated utility systems

    Science.gov (United States)

    Lede, N. W.; Dixon, H. W.; King, O.; Hill, D. K.

    1974-01-01

    Social costs associated with the design, demonstration, and implementation of the Modular Integrated Utility System are considered including the social climate of communities, leadership patterns, conflicts and cleavages, specific developmental values, MIUS utility goal assessment, and the suitability of certian alternative options for use in a program of implementation. General considerations are discussed in the field of socio-technological planning. These include guidelines for understanding the conflict and diversity; some relevant goal choices and ideas useful to planners of the MIUS facility.

  1. Operational constraints and hydrologic variability limit hydropower in supporting wind integration

    International Nuclear Information System (INIS)

    Fernandez, Alisha R; Blumsack, Seth A; Reed, Patrick M

    2013-01-01

    Climate change mitigation will require rapid adoption of low-carbon energy resources. The integration of large-scale wind energy in the United States (US) will require controllable assets to balance the variability of wind energy production. Previous work has identified hydropower as an advantageous asset, due to its flexibility and low-carbon emissions production. While many dams currently provide energy and environmental services in the US and globally, we find that multi-use hydropower facilities would face significant policy conflicts if asked to store and release water to accommodate wind integration. Specifically, we develop a model simulating hydroelectric operational decisions when the electric facility is able to provide wind integration services through a mechanism that we term ‘flex reserves’. We use Kerr Dam in North Carolina as a case study, simulating operations under two alternative reservoir policies, one reflecting current policies and the other regulating flow levels to promote downstream ecosystem conservation. Even under perfect information and significant pricing incentives, Kerr Dam faces operational conflicts when providing any substantial levels of flex reserves while also maintaining releases consistent with other river management requirements. These operational conflicts are severely exacerbated during periods of drought. Increase of payments for flex reserves does not resolve these operational and policy conflicts. (letter)

  2. Type checking with open type functions

    DEFF Research Database (Denmark)

    Schrijvers, Tom; Jones, Simon Peyton; Chakravarty, Manual

    2008-01-01

    We report on an extension of Haskell with open type-level functions and equality constraints that unifies earlier work on GADTs, functional dependencies, and associated types. The contribution of the paper is that we identify and characterise the key technical challenge of entailment checking; an...

  3. Discrete-time rewards model-checked

    NARCIS (Netherlands)

    Larsen, K.G.; Andova, S.; Niebert, Peter; Hermanns, H.; Katoen, Joost P.

    2003-01-01

    This paper presents a model-checking approach for analyzing discrete-time Markov reward models. For this purpose, the temporal logic probabilistic CTL is extended with reward constraints. This allows to formulate complex measures – involving expected as well as accumulated rewards – in a precise and

  4. The Relaxation of Some Classes of Variational Integrals with Pointwise Continuous-Type Gradient Constraints

    International Nuclear Information System (INIS)

    De Arcangelis, Riccardo; Zappale, Elvira

    2005-01-01

    Relaxation problems for a functional are analyzed. Identity and integral representation results are proved under continuity-type assumptions, together with the description of the common density by means of convexification arguments. Classical relaxation results are extended to the case of the continuous variable dependence, and the non-identity features described in the measurable dependence case are shown to be non-occurring. Proofs are based on the properties of certain limits of multi-functions, and on an approximation result for functions. Results in more general settings are also obtained

  5. Integrated Berth Allocation-Quay Crane Assignment Problem: Reformulations, Improved Constraints and Computational Results

    DEFF Research Database (Denmark)

    Iris, Cagatay; Røpke, Stefan; Pacino, Dario

    ,74% 63,0 X 7,97% 600* 68,0 67,9 0,19% 600 8 56,1 56,1 0,00% 51,3 X 9,42% 600* 56,1 55,8 0,59% 600* 9 75,1 75,0 0,13% 74,9 X 0,33% 600* 75,1 75,0 0,15% 600* BACAP can also be formulated as Generalized Set Partitioning Problem (GSPP). The model is an extension of the BAP formulation in [2] where we add new...... problem (BAP) and the quay crane assignment problem (QCAP). Such integrated problem is known in the literature ([1]) as the Berth Allocation and Crane Assignment Problem (BACAP). The state-of-the-art [1] models this problem using two decision variables X_ij and Y_ij, representing respectively the partial...... since start-time variables S_i are integrated into objective function. Inequality (1) is based on the following two observations. First, if vessel i berths before vessel j (X_ij=1), then the start time of vessel j (Sj) should be larger than the start time of vessel i plus its minimum expected processing...

  6. Conservative integration of rigid body motion by quaternion parameters with implicit constraints

    DEFF Research Database (Denmark)

    Nielsen, Martin Bjerre; Krenk, Steen

    2012-01-01

    An angular momentum and energy‐conserving time integration algorithm for rigid body rotation is formulated in terms of the quaternion parameters and the corresponding four‐component conjugate momentum vector via Hamilton's equations. The introduction of an extended mass matrix leads to a symmetric...... these equations via the set of momentum equations. Initially, the normalization of the quaternion array is introduced via a Lagrange multiplier. However, this Lagrange multiplier can be expressed explicitly in terms of the gradient of the external load potential, and elimination of the Lagrange multiplier from...... the final format leaves only an explicit projection applied to the external load potential gradient. An algorithm is developed by forming a finite increment of the Hamiltonian. This procedure identifies the proper selection of increments and mean values, and leads to an algorithm with conservation...

  7. Systems biology of bacterial nitrogen fixation: High-throughput technology and its integrative description with constraint-based modeling

    Directory of Open Access Journals (Sweden)

    Resendis-Antonio Osbaldo

    2011-07-01

    Full Text Available Abstract Background Bacterial nitrogen fixation is the biological process by which atmospheric nitrogen is uptaken by bacteroids located in plant root nodules and converted into ammonium through the enzymatic activity of nitrogenase. In practice, this biological process serves as a natural form of fertilization and its optimization has significant implications in sustainable agricultural programs. Currently, the advent of high-throughput technology supplies with valuable data that contribute to understanding the metabolic activity during bacterial nitrogen fixation. This undertaking is not trivial, and the development of computational methods useful in accomplishing an integrative, descriptive and predictive framework is a crucial issue to decoding the principles that regulated the metabolic activity of this biological process. Results In this work we present a systems biology description of the metabolic activity in bacterial nitrogen fixation. This was accomplished by an integrative analysis involving high-throughput data and constraint-based modeling to characterize the metabolic activity in Rhizobium etli bacteroids located at the root nodules of Phaseolus vulgaris (bean plant. Proteome and transcriptome technologies led us to identify 415 proteins and 689 up-regulated genes that orchestrate this biological process. Taking into account these data, we: 1 extended the metabolic reconstruction reported for R. etli; 2 simulated the metabolic activity during symbiotic nitrogen fixation; and 3 evaluated the in silico results in terms of bacteria phenotype. Notably, constraint-based modeling simulated nitrogen fixation activity in such a way that 76.83% of the enzymes and 69.48% of the genes were experimentally justified. Finally, to further assess the predictive scope of the computational model, gene deletion analysis was carried out on nine metabolic enzymes. Our model concluded that an altered metabolic activity on these enzymes induced

  8. Role of DARPP-32 and ARPP-21 in the Emergence of Temporal Constraints on Striatal Calcium and Dopamine Integration

    Science.gov (United States)

    Bhalla, Upinder S.; Hellgren Kotaleski, Jeanette

    2016-01-01

    In reward learning, the integration of NMDA-dependent calcium and dopamine by striatal projection neurons leads to potentiation of corticostriatal synapses through CaMKII/PP1 signaling. In order to elicit the CaMKII/PP1-dependent response, the calcium and dopamine inputs should arrive in temporal proximity and must follow a specific (dopamine after calcium) order. However, little is known about the cellular mechanism which enforces these temporal constraints on the signal integration. In this computational study, we propose that these temporal requirements emerge as a result of the coordinated signaling via two striatal phosphoproteins, DARPP-32 and ARPP-21. Specifically, DARPP-32-mediated signaling could implement an input-interval dependent gating function, via transient PP1 inhibition, thus enforcing the requirement for temporal proximity. Furthermore, ARPP-21 signaling could impose the additional input-order requirement of calcium and dopamine, due to its Ca2+/calmodulin sequestering property when dopamine arrives first. This highlights the possible role of phosphoproteins in the temporal aspects of striatal signal transduction. PMID:27584878

  9. checkCIF/PLATON (full publication check)

    Indian Academy of Sciences (India)

    editor handling your paper, to upload your CIF via our web site. PLATON version of 05/02/2014; check.def file version of 05/02/2014. Datablock I - ellipsoid plot http://vm02b.iucr.org/cgi-bin/checkcif_hkl.pl(第 3/4 页)2014-2-12 09:09:12 ...

  10. Integrating ergonomics knowledge into business-driven design projects: The shaping of resource constraints in engineering consultancy.

    Science.gov (United States)

    Hall-Andersen, Lene Bjerg; Neumann, Patrick; Broberg, Ole

    2016-10-17

    The integration of ergonomics knowledge into engineering projects leads to both healthier and more efficient workplaces. There is a lack of knowledge about integrating ergonomic knowledge into the design practice in engineering consultancies. This study explores how organizational resources can pose constraints for the integration of ergonomics knowledge into engineering design projects in a business-driven setting, and how ergonomists cope with these resource constraints. An exploratory case study in an engineering consultancy was conducted. A total of 27 participants were interviewed. Data were collected applying semi-structured interviews, observations, and documentary studies. Interviews were transcribed, coded, and categorized into themes. From the analysis five overall themes emerged as major constituents of resource constraints: 1) maximizing project revenue, 2) payment for ergonomics services, 3) value of ergonomic services, 4) role of the client, and 5) coping strategies to overcome resource constraints. We hypothesize that resource constraints were shaped due to sub-optimization of costs in design projects. The economical contribution of ergonomics measures was not evaluated in the entire life cycle of a designed workplace. Coping strategies included teaming up with engineering designers in the sales process or creating an alliance with ergonomists in the client organization.

  11. A periodic review integrated inventory model with controllable setup cost, imperfect items, and inspection errors under service level constraint

    Science.gov (United States)

    Saga, R. S.; Jauhari, W. A.; Laksono, P. W.

    2017-11-01

    This paper presents an integrated inventory model which consists of single vendor and buyer. The buyer managed its inventory periodically and orders products from the vendor to satisfy the end customer’s demand, where the annual demand and the ordering cost were in the fuzzy environment. The buyer used a service level constraint instead of the stock-out cost term, so that the stock-out level per cycle was bounded. Then, the vendor produced and delivered products to the buyer. The vendor had a choice to commit an investment to reduce the setup cost. However, the vendor’s production process was imperfect, thus the lot delivered contained some defective products. Moreover, the buyer’s inspection process was not error-free since the inspector could be mistaken in categorizing the product’s quality. The objective was to find the optimum value for the review period, the setup cost, and the number of deliveries in one production cycle which might minimize the joint total cost. Furthermore, the algorithm and numerical example were provided to illustrate the application of the model.

  12. The worth of data to reduce predictive uncertainty of an integrated catchment model by multi-constraint calibration

    Science.gov (United States)

    Koch, J.; Jensen, K. H.; Stisen, S.

    2017-12-01

    Hydrological models that integrate numerical process descriptions across compartments of the water cycle are typically required to undergo thorough model calibration in order to estimate suitable effective model parameters. In this study, we apply a spatially distributed hydrological model code which couples the saturated zone with the unsaturated zone and the energy portioning at the land surface. We conduct a comprehensive multi-constraint model calibration against nine independent observational datasets which reflect both the temporal and the spatial behavior of hydrological response of a 1000km2 large catchment in Denmark. The datasets are obtained from satellite remote sensing and in-situ measurements and cover five keystone hydrological variables: discharge, evapotranspiration, groundwater head, soil moisture and land surface temperature. Results indicate that a balanced optimization can be achieved where errors on objective functions for all nine observational datasets can be reduced simultaneously. The applied calibration framework was tailored with focus on improving the spatial pattern performance; however results suggest that the optimization is still more prone to improve the temporal dimension of model performance. This study features a post-calibration linear uncertainty analysis. This allows quantifying parameter identifiability which is the worth of a specific observational dataset to infer values to model parameters through calibration. Furthermore the ability of an observation to reduce predictive uncertainty is assessed as well. Such findings determine concrete implications on the design of model calibration frameworks and, in more general terms, the acquisition of data in hydrological observatories.

  13. Environmental Reality Check.

    Science.gov (United States)

    Manicone, Santo

    2001-01-01

    Discusses the importance of educational facilities conducting "reality check" self-audits to uncover the real truth behind underlying environmental problems. An environmental compliance multimedia checklist is included. (GR)

  14. check cif.pdf

    Indian Academy of Sciences (India)

    AMMIN

    Calculated. Reported. Volume ... PLAT094_ALERT_2_C Ratio of Maximum / Minimum Residual Density .... 3.24 Report ... checkCIF was carefully designed to identify outliers and unusual parameters, but every test has its limitations and alerts ...

  15. Goat production check list

    DEFF Research Database (Denmark)

    Henriksen, Jørgen; Nielsen, Mette Benedicte Olaf; Madsen, Jørgen

    2009-01-01

    This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production.......This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production....

  16. WE-E-BRB-10: DosCheck - an Electronic Chart Checking Tool for Dosimetrists.

    Science.gov (United States)

    Yang, D; Wu, Y; Yaddanapudi, S; Moore, K; Pierbuxg, B; Brame, S; Mutic, S

    2012-06-01

    In addition to treatment planning, dosimetrists have to prepare documentation and manually enter data in treatment management system (TMS) which did not transfer or setup automatically. The required documents and data are dependent on the disease site, treatment machine and clinical workflow. Errors and inconsistencies can cause redundant work, treatment delays and potentially treatment errors. To address these issues, an electronic checking software tool, DosCheck was clinically implemented to check the existence of necessary documentations and the integrity of manually-entered data. The purpose of this software is to reduce the frequency of human errors and to improve efficiency. DosCheck reads data and documents from 1) TMS, 2) Pinnacle TPS, and 3) DICOM plan files stored in a DICOM-RT PACS. It processes documents in Word and PDF format, treatment plan data in Pinnacle native format and DICOM format, and Mosaiq data in database records. The software cross-checks data accuracy and consistency by following rules that are pre-defined according to the clinical requirements and treatment sties. It interacts with dosimetrists and presents instantaneous results via graphical user interface. DosCheck has been implemented in C#. It performs a full check for a patient with 20 seconds. It has been clinically commissioned and is used daily by all dosimetrists at our institution. Retrospective analysis shows that DosCheck identifies 30% to 40% of previously reported dosimetrist human errors. Additional ∼30% errors are checked by other tools that could be integrated DosCheck in the near future. As an electronic data checking tool, DosCheck can obtain and process data and documents from multiple clinical computer systems in the radiation oncology department, and perform checks according to clinical rules. It is able to improve the accuracy and efficiency of clinical data and document process, and therefore to reduce any potential inconsistencies and errors. © 2012 American

  17. Engineering Abstractions in Model Checking and Testing

    DEFF Research Database (Denmark)

    Achenbach, Michael; Ostermann, Klaus

    2009-01-01

    Abstractions are used in model checking to tackle problems like state space explosion or modeling of IO. The application of these abstractions in real software development processes, however, lacks engineering support. This is one reason why model checking is not widely used in practice yet...... and testing is still state of the art in falsification. We show how user-defined abstractions can be integrated into a Java PathFinder setting with tools like AspectJ or Javassist and discuss implications of remaining weaknesses of these tools. We believe that a principled engineering approach to designing...... and implementing abstractions will improve the applicability of model checking in practice....

  18. Check valves aging assessment

    International Nuclear Information System (INIS)

    Haynes, H.D.

    1991-01-01

    In support of the NRC Nuclear Plant Aging Research (NPAR) program, the Oak Ridge National Laboratory (ORNL) has carried out an assessment of several check value diagnostic monitoring methods, in particular, those based on measurements of acoustic emission, ultrasonics, and magnetic flux. The evaluations have focussed on the capabilities of each method to provide information useful in determining check valve aging and service wear effects, check valve failures, and undesirable operating modes. This paper describes the benefits and limitations associated with each method and includes recent laboratory and field test data, including data obtained from the vendors who recently participated in a comprehensive series of tests directed by a nuclear industry users group. In addition, as part of the ORNL Advanced Diagnostic Engineering Research and Development Center (ADEC), two novel nonintrusive monitoring methods were developed that provide several unique capabilities. These methods, based on external ac- an dc-magnetic monitoring are also described. None of the examined methods could, by themselves, monitor both the instantaneous position and motion of check valve internals and valve leakage; however, the combination of acoustic emission monitoring with one of the other methods provides the means to determine vital check valve operational information

  19. Integrating ergonomics knowledge into business-driven design projects: The shaping of resource constraints in engineering consultancy

    DEFF Research Database (Denmark)

    Hall-Andersen, Lene Bjerg; Neumann, W. Patrick; Broberg, Ole

    2016-01-01

    participants were interviewed. METHODS: Data were collected applying semi-structured interviews, observations, and documentary studies. Interviews were transcribed, coded, and categorized into themes. RESULTS: From the analysis five overall themes emerged as major constituents of resource constraints: 1...

  20. CMM Interim Check (U)

    Energy Technology Data Exchange (ETDEWEB)

    Montano, Joshua Daniel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-03-23

    Coordinate Measuring Machines (CMM) are widely used in industry, throughout the Nuclear Weapons Complex and at Los Alamos National Laboratory (LANL) to verify part conformance to design definition. Calibration cycles for CMMs at LANL are predominantly one year in length. Unfortunately, several nonconformance reports have been generated to document the discovery of a certified machine found out of tolerance during a calibration closeout. In an effort to reduce risk to product quality two solutions were proposed – shorten the calibration cycle which could be costly, or perform an interim check to monitor the machine’s performance between cycles. The CMM interim check discussed makes use of Renishaw’s Machine Checking Gauge. This off-the-shelf product simulates a large sphere within a CMM’s measurement volume and allows for error estimation. Data was gathered, analyzed, and simulated from seven machines in seventeen different configurations to create statistical process control run charts for on-the-floor monitoring.

  1. Checking BEBC superconducting magnet

    CERN Multimedia

    CERN PhotoLab

    1974-01-01

    The superconducting coils of the magnet for the 3.7 m Big European Bubble Chamber (BEBC) had to be checked, see Annual Report 1974, p. 60. The photo shows a dismantled pancake. By December 1974 the magnet reached again the field design value of 3.5 T.

  2. [Memory Checking Tests].

    Science.gov (United States)

    Hart, Joseph T.

    Two basic tests for checking memory skills are included in these appendices. The first, the General Information Test, uses the same 150 items for each of its two versions. One version is a completion-type test which measures recall by requiring the examinee to supply a specific response. The other version supplements each of the 150 items with…

  3. Check Sample Abstracts.

    Science.gov (United States)

    Alter, David; Grenache, David G; Bosler, David S; Karcher, Raymond E; Nichols, James; Rajadhyaksha, Aparna; Camelo-Piragua, Sandra; Rauch, Carol; Huddleston, Brent J; Frank, Elizabeth L; Sluss, Patrick M; Lewandrowski, Kent; Eichhorn, John H; Hall, Janet E; Rahman, Saud S; McPherson, Richard A; Kiechle, Frederick L; Hammett-Stabler, Catherine; Pierce, Kristin A; Kloehn, Erica A; Thomas, Patricia A; Walts, Ann E; Madan, Rashna; Schlesinger, Kathie; Nawgiri, Ranjana; Bhutani, Manoop; Kanber, Yonca; Abati, Andrea; Atkins, Kristen A; Farrar, Robert; Gopez, Evelyn Valencerina; Jhala, Darshana; Griffin, Sonya; Jhala, Khushboo; Jhala, Nirag; Bentz, Joel S; Emerson, Lyska; Chadwick, Barbara E; Barroeta, Julieta E; Baloch, Zubair W; Collins, Brian T; Middleton, Owen L; Davis, Gregory G; Haden-Pinneri, Kathryn; Chu, Albert Y; Keylock, Joren B; Ramoso, Robert; Thoene, Cynthia A; Stewart, Donna; Pierce, Arand; Barry, Michelle; Aljinovic, Nika; Gardner, David L; Barry, Michelle; Shields, Lisa B E; Arnold, Jack; Stewart, Donna; Martin, Erica L; Rakow, Rex J; Paddock, Christopher; Zaki, Sherif R; Prahlow, Joseph A; Stewart, Donna; Shields, Lisa B E; Rolf, Cristin M; Falzon, Andrew L; Hudacki, Rachel; Mazzella, Fermina M; Bethel, Melissa; Zarrin-Khameh, Neda; Gresik, M Vicky; Gill, Ryan; Karlon, William; Etzell, Joan; Deftos, Michael; Karlon, William J; Etzell, Joan E; Wang, Endi; Lu, Chuanyi M; Manion, Elizabeth; Rosenthal, Nancy; Wang, Endi; Lu, Chuanyi M; Tang, Patrick; Petric, Martin; Schade, Andrew E; Hall, Geraldine S; Oethinger, Margret; Hall, Geraldine; Picton, Avis R; Hoang, Linda; Imperial, Miguel Ranoa; Kibsey, Pamela; Waites, Ken; Duffy, Lynn; Hall, Geraldine S; Salangsang, Jo-Anne M; Bravo, Lulette Tricia C; Oethinger, Margaret D; Veras, Emanuela; Silva, Elvia; Vicens, Jimena; Silva, Elvio; Keylock, Joren; Hempel, James; Rushing, Elizabeth; Posligua, Lorena E; Deavers, Michael T; Nash, Jason W; Basturk, Olca; Perle, Mary Ann; Greco, Alba; Lee, Peng; Maru, Dipen; Weydert, Jamie Allen; Stevens, Todd M; Brownlee, Noel A; Kemper, April E; Williams, H James; Oliverio, Brock J; Al-Agha, Osama M; Eskue, Kyle L; Newlands, Shawn D; Eltorky, Mahmoud A; Puri, Puja K; Royer, Michael C; Rush, Walter L; Tavora, Fabio; Galvin, Jeffrey R; Franks, Teri J; Carter, James Elliot; Kahn, Andrea Graciela; Lozada Muñoz, Luis R; Houghton, Dan; Land, Kevin J; Nester, Theresa; Gildea, Jacob; Lefkowitz, Jerry; Lacount, Rachel A; Thompson, Hannis W; Refaai, Majed A; Quillen, Karen; Lopez, Ana Ortega; Goldfinger, Dennis; Muram, Talia; Thompson, Hannis

    2009-02-01

    The following abstracts are compiled from Check Sample exercises published in 2008. These peer-reviewed case studies assist laboratory professionals with continuing medical education and are developed in the areas of clinical chemistry, cytopathology, forensic pathology, hematology, microbiology, surgical pathology, and transfusion medicine. Abstracts for all exercises published in the program will appear annually in AJCP.

  4. Doing more with the same: A reality-check on the ability of local government to implement Integrated Coastal Management for climate change adaptation

    CSIR Research Space (South Africa)

    Rosendo, S

    2018-01-01

    Full Text Available nations, Mozambique and South Africa. Using a mixed-methods approach (content analysis of local government planning documents and semistructured interviews with key informants), results demonstrate the level of integration of coastal management, disaster...

  5. National coal utilization assessment. An integrated assessment of increased coal use in the Midwest: impacts and constraints

    Energy Technology Data Exchange (ETDEWEB)

    Hoover, L. John

    1977-10-01

    This study was performed as a part of the Argonne National Laboratory Regional Studies program, which is sponsored by the Department of Energy. The purpose is to assess the impacts and consequences associated with alternative energy options on a regional basis, and to identify and analyze alternative mitigation and solution strategies for increasing the acceptability of these options. The National Coal Utilization Assessment is being conducted as a part of the Regional Studies Program. This particular study is focusing on impacts and constraints on increased coal utilization. In addition, a major focal point for the study is the identification and analysis of alternative solution strategies applicable to these constraints and problems.

  6. An integrated model to measure service management and physical constraints' effect on food consumption in assisted-living facilities.

    Science.gov (United States)

    Huang, Hui-Chun; Shanklin, Carol W

    2008-05-01

    The United States is experiencing remarkable growth in the elderly population, which provides both opportunities and challenges for assisted-living facilities. The objective of this study was to explore how service management influences residents' actual food consumption in assisted-living facilities. Physical factors influencing residents' service evaluation and food consumption also were investigated. A total of 394 questionnaires were distributed to assisted-living residents in seven randomly selected facilities. The questionnaire was developed based on an in-depth literature review and pilot study. Residents' perceived quality evaluations, satisfaction, and physical constraints were measured. Residents' actual food consumption was measured using a plate waste technique. A total of 118 residents in five facilities completed both questionnaires and food consumption assessments. Descriptive, multivariate analyses and structural equation modeling techniques were employed. Service management, including food and service quality and customer satisfaction, was found to significantly influence residents' food consumption. Physical constraints associated with aging, including a decline in health status, chewing problems, sensory loss, and functional disability, also significantly influenced residents' food consumption. A significant relationship was found between physical constraints and customer satisfaction. Foodservice that provides good food and service quality increases customer satisfaction and affects residents' actual food consumption. Physical constraints also influence residents' food consumption directly, or indirectly through satisfaction. The findings suggest that food and nutrition professionals in assisted-living should consider the physical profiles of their residents to enhance residents' satisfaction and nutrient intake. Recommendations for exploring residents' perspectives are discussed.

  7. Simple Check Valves for Microfluidic Devices

    Science.gov (United States)

    Willis, Peter A.; Greer, Harold F.; Smith, J. Anthony

    2010-01-01

    A simple design concept for check valves has been adopted for microfluidic devices that consist mostly of (1) deformable fluorocarbon polymer membranes sandwiched between (2) borosilicate float glass wafers into which channels, valve seats, and holes have been etched. The first microfluidic devices in which these check valves are intended to be used are micro-capillary electrophoresis (microCE) devices undergoing development for use on Mars in detecting compounds indicative of life. In this application, it will be necessary to store some liquid samples in reservoirs in the devices for subsequent laboratory analysis, and check valves are needed to prevent cross-contamination of the samples. The simple check-valve design concept is also applicable to other microfluidic devices and to fluidic devices in general. These check valves are simplified microscopic versions of conventional rubber- flap check valves that are parts of numerous industrial and consumer products. These check valves are fabricated, not as separate components, but as integral parts of microfluidic devices. A check valve according to this concept consists of suitably shaped portions of a deformable membrane and the two glass wafers between which the membrane is sandwiched (see figure). The valve flap is formed by making an approximately semicircular cut in the membrane. The flap is centered over a hole in the lower glass wafer, through which hole the liquid in question is intended to flow upward into a wider hole, channel, or reservoir in the upper glass wafer. The radius of the cut exceeds the radius of the hole by an amount large enough to prevent settling of the flap into the hole. As in a conventional rubber-flap check valve, back pressure in the liquid pushes the flap against the valve seat (in this case, the valve seat is the adjacent surface of the lower glass wafer), thereby forming a seal that prevents backflow.

  8. Swing check valve

    International Nuclear Information System (INIS)

    Eminger, H.E.

    1977-01-01

    A swing check valve which includes a valve body having an inlet and outlet is described. A recess in the valve body designed to hold a seal ring and a check valve disc swingable between open and closed positions. The disc is supported by a high strength wire secured at one end in a support spacer pinned through bearing blocks fixed to the valve body and at its other end in a groove formed on the outer peripheral surface of the disc. The parts are designed and chosen such to provide a lightweight valve disc which is held open by minimum velocity of fluid flowing through the valve which thus reduces oscillations and accompanying wear of bearings supporting the valve operating parts. (Auth.)

  9. Check Verbraucherpolitik und Verbraucherbeteiligung

    DEFF Research Database (Denmark)

    Hagen, Kornelia; Micklitz, Hans-W.; Oehler, Andreas

    2013-01-01

    The paper discusses the opportunities for an empirically grounded decision support system as an instrument for independent and scientifically based consumer policy consulting. To date, consumer policy is dominated by the information paradigm and the leitbild of the rational, sovereign...... and information-seeking consumer. Yet, both everyday practice and research in behavioural economics show that this view lacks empirical ground. In fact, there are different consumer types and different forms of rationalities at work. Effective consumer policy making should be based on the empirically revealed...... an empirically based “Check Consumer Policy and Consumer Participation” as a systematic decision and evaluation tool for policy makers. This check should be independent from the government and should be grounded on an empirical view of the consumer. Consumer policy tools should be tested with real consumers...

  10. Model Checking Feature Interactions

    DEFF Research Database (Denmark)

    Le Guilly, Thibaut; Olsen, Petur; Pedersen, Thomas

    2015-01-01

    This paper presents an offline approach to analyzing feature interactions in embedded systems. The approach consists of a systematic process to gather the necessary information about system components and their models. The model is first specified in terms of predicates, before being refined to t...... to timed automata. The consistency of the model is verified at different development stages, and the correct linkage between the predicates and their semantic model is checked. The approach is illustrated on a use case from home automation....

  11. Magnetically operated check valve

    Science.gov (United States)

    Morris, Brian G.; Bozeman, Richard J., Jr.

    1994-06-01

    A magnetically operated check valve is disclosed. The valve is comprised of a valve body and a movable poppet disposed therein. A magnet attracts the poppet to hold the valve shut until the force of fluid flow through the valve overcomes the magnetic attraction and moves the poppet to an unseated, open position. The poppet and magnet are configured and disposed to trap a magnetically attracted particulate and prevent it from flowing to a valve seating region.

  12. Consistency Check for the Bin Packing Constraint Revisited

    Science.gov (United States)

    Dupuis, Julien; Schaus, Pierre; Deville, Yves

    The bin packing problem (BP) consists in finding the minimum number of bins necessary to pack a set of items so that the total size of the items in each bin does not exceed the bin capacity C. The bin capacity is common for all the bins.

  13. Magnetic Check Valve

    Science.gov (United States)

    Morris, Brian G.; Bozeman, Richard J., Jr.

    1994-01-01

    Poppet in proposed check valve restored to closed condition by magnetic attraction instead of spring force. Oscillations suppressed, with consequent reduction of wear. Stationary magnetic disk mounted just upstream of poppet, also containing magnet. Valve body nonmagnetic. Forward pressure or flow would push poppet away from stationary magnetic disk so fluid flows easily around poppet. Stop in valve body prevents poppet from being swept away. When flow stopped or started to reverse, magnetic attraction draws poppet back to disk. Poppet then engages floating O-ring, thereby closing valve and preventing reverse flow. Floating O-ring facilitates sealing at low loads.

  14. Check, check, double check: checking the autopilot causes distrust : Experimental studies on the effects of compulsive perseveration

    NARCIS (Netherlands)

    Dek, E.C.P.

    2015-01-01

    Obsessive-compulsive disorder (OCD) is characterized by persistent doubt. The majority of patients with OCD engage in repeated checking to reduce these feelings of uncertainty. However, numerous studies demonstrated that repetitive behavior ironically increases uncertainty: perseverative checking

  15. Repeated checking causes memory distrust

    NARCIS (Netherlands)

    van den Hout, M.; Kindt, M.

    2003-01-01

    This paper attempts to explain why in obsessive-compulsive disorder (OCD) checkers distrust in memory persists despite extensive checking. It is argued that: (1) repeated checking increases familiarity with the issues checked; (2) increased familiarity promotes conceptual processing which inhibits

  16. Parallel Algorithms for Model Checking

    NARCIS (Netherlands)

    van de Pol, Jaco; Mousavi, Mohammad Reza; Sgall, Jiri

    2017-01-01

    Model checking is an automated verification procedure, which checks that a model of a system satisfies certain properties. These properties are typically expressed in some temporal logic, like LTL and CTL. Algorithms for LTL model checking (linear time logic) are based on automata theory and graph

  17. Ball check valve

    International Nuclear Information System (INIS)

    Bevilacqua, F.

    1978-01-01

    A pressurized nuclear reactor having an instrument assembly sheathed in a metallic tube which is extended vertically upward into the reactor core by traversing a metallic guide tube which is welded to the wall of the vessel is described. Sensors in each instrument assembly are connected to instruments outside the vessel to manifest the conditions within the core. Each instrument assembly probe is moved into position within a metallic guide channel. The guide channel penetrates the wall of the vessel and forms part of the barrier to the environment within the pressure vessel. Each channel includes a ball check valve which is opened by the instrument assembly probe when the probe passes through the valve. A ball valve element is moved from its seat by the probe to a position lateral of the bore of the channel and is guided to its seat along a sloped path within the valve body when the probe is removed. 5 claims, 3 figures

  18. An integrated production-inventory model for the singlevendor two-buyer problem with partial backorder, stochastic demand, and service level constraints

    Science.gov (United States)

    Arfawi Kurdhi, Nughthoh; Adi Diwiryo, Toray; Sutanto

    2016-02-01

    This paper presents an integrated single-vendor two-buyer production-inventory model with stochastic demand and service level constraints. Shortage is permitted in the model, and partial backordered partial lost sale. The lead time demand is assumed follows a normal distribution and the lead time can be reduced by adding crashing cost. The lead time and ordering cost reductions are interdependent with logaritmic function relationship. A service level constraint policy corresponding to each buyer is considered in the model in order to limit the level of inventory shortages. The purpose of this research is to minimize joint total cost inventory model by finding the optimal order quantity, safety stock, lead time, and the number of lots delivered in one production run. The optimal production-inventory policy gained by the Lagrange method is shaped to account for the service level restrictions. Finally, a numerical example and effects of the key parameters are performed to illustrate the results of the proposed model.

  19. A periodic review integrated inventory model with controllable safety stock and setup cost under service level constraint and distribution-free demand

    Science.gov (United States)

    Kurdhi, N. A.; Jamaluddin, A.; Jauhari, W. A.; Saputro, D. R. S.

    2017-06-01

    In this study, we consider a stochastic integrated manufacturer-retailer inventory model with service level constraint. The model analyzed in this article considers the situation in which the vendor and the buyer establish a long-term contract and strategic partnership to jointly determine the best strategy. The lead time and setup cost are assumed can be controlled by an additional crashing cost and an investment, respectively. It is assumed that shortages are allowed and partially backlogged on the buyer’s side, and that the protection interval (i.e., review period plus lead time) demand distribution is unknown but has given finite first and second moments. The objective is to apply the minmax distribution free approach to simultaneously optimize the review period, the lead time, the setup cost, the safety factor, and the number of deliveries in order to minimize the joint total expected annual cost. The service level constraint guarantees that the service level requirement can be satisfied at the worst case. By constructing Lagrange function, the analysis regarding the solution procedure is conducted, and a solution algorithm is then developed. Moreover, a numerical example and sensitivity analysis are given to illustrate the proposed model and to provide some observations and managerial implications.

  20. Compositional and Quantitative Model Checking

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2010-01-01

    This paper gives a survey of a composition model checking methodology and its succesfull instantiation to the model checking of networks of finite-state, timed, hybrid and probabilistic systems with respect; to suitable quantitative versions of the modal mu-calculus [Koz82]. The method is based...

  1. Diagnostic information in compliance checking

    NARCIS (Netherlands)

    Ramezani Taghiabadi, E.; Fahland, D.; Aalst, van der W.M.P.

    2012-01-01

    Compliance checking is gaining importance as today's organizations need to show that operational processes are executed in a controlled manner while satisfying predefined (legal) requirements. Deviations may be costly and expose the organization to severe risks. Compliance checking is of growing

  2. Some Behavioral and Neurobiological Constraints on Theories of Audiovisual Speech Integration: A Review and Suggestions for New Directions

    Science.gov (United States)

    Altieri, Nicholas; Pisoni, David B.; Townsend, James T.

    2012-01-01

    Summerfield (1987) proposed several accounts of audiovisual speech perception, a field of research that has burgeoned in recent years. The proposed accounts included the integration of discrete phonetic features, vectors describing the values of independent acoustical and optical parameters, the filter function of the vocal tract, and articulatory dynamics of the vocal tract. The latter two accounts assume that the representations of audiovisual speech perception are based on abstract gestures, while the former two assume that the representations consist of symbolic or featural information obtained from visual and auditory modalities. Recent converging evidence from several different disciplines reveals that the general framework of Summerfield’s feature-based theories should be expanded. An updated framework building upon the feature-based theories is presented. We propose a processing model arguing that auditory and visual brain circuits provide facilitatory information when the inputs are correctly timed, and that auditory and visual speech representations do not necessarily undergo translation into a common code during information processing. Future research on multisensory processing in speech perception should investigate the connections between auditory and visual brain regions, and utilize dynamic modeling tools to further understand the timing and information processing mechanisms involved in audiovisual speech integration. PMID:21968081

  3. Solar constraints

    International Nuclear Information System (INIS)

    Provost, J.

    1984-01-01

    Accurate tests of the theory of stellar structure and evolution are available from the Sun's observations. The solar constraints are reviewed, with a special attention to the recent progress in observing global solar oscillations. Each constraint is sensitive to a given region of the Sun. The present solar models (standard, low Z, mixed) are discussed with respect to neutrino flux, low and high degree five-minute oscillations and low degree internal gravity modes. It appears that actually there do not exist solar models able to fully account for all the observed quantities. (Auth.)

  4. Cycle time reduction by Html report in mask checking flow

    Science.gov (United States)

    Chen, Jian-Cheng; Lu, Min-Ying; Fang, Xiang; Shen, Ming-Feng; Ma, Shou-Yuan; Yang, Chuen-Huei; Tsai, Joe; Lee, Rachel; Deng, Erwin; Lin, Ling-Chieh; Liao, Hung-Yueh; Tsai, Jenny; Bowhill, Amanda; Vu, Hien; Russell, Gordon

    2017-07-01

    The Mask Data Correctness Check (MDCC) is a reticle-level, multi-layer DRC-like check evolved from mask rule check (MRC). The MDCC uses extended job deck (EJB) to achieve mask composition and to perform a detailed check for positioning and integrity of each component of the reticle. Different design patterns on the mask will be mapped to different layers. Therefore, users may be able to review the whole reticle and check the interactions between different designs before the final mask pattern file is available. However, many types of MDCC check results, such as errors from overlapping patterns usually have very large and complex-shaped highlighted areas covering the boundary of the design. Users have to load the result OASIS file and overlap it to the original database that was assembled in MDCC process on a layout viewer, then search for the details of the check results. We introduce a quick result-reviewing method based on an html format report generated by Calibre® RVE. In the report generation process, we analyze and extract the essential part of result OASIS file to a result database (RDB) file by standard verification rule format (SVRF) commands. Calibre® RVE automatically loads the assembled reticle pattern and generates screen shots of these check results. All the processes are automatically triggered just after the MDCC process finishes. Users just have to open the html report to get the information they need: for example, check summary, captured images of results and their coordinates.

  5. Integrating surface and mantle constraints for palaeo-ocean evolution: a tour of the Arctic and adjacent regions (Arne Richter Award for Outstanding Young Scientists Lecture)

    Science.gov (United States)

    Shephard, Grace E.

    2016-04-01

    Plate tectonic reconstructions heavily rely on absolute motions derived from hotspot trails or palaeomagnetic data and ocean-floor magnetic anomaies and fracture-zone geometries to constrain the detailed history of ocean basins. However, as oceanic lithosphere is progressively recycled into the mantle, kinematic data regarding the history of these now extinct-oceans is lost. In order to better understand their evolution, novel workflows, which integrate a wide range of complementary yet independent geological and geophysical datasets from both the surface and deep mantle, must be utilised. In particular, the emergence of time-dependent, semi or self-consistent geodynamic models of ever-increasing temporal and spatial resolution are revealing some critical constraints on the evolution and fate of oceanic slabs. The tectonic evolution of the circum-Arctic is no exception; since the breakup of Pangea, this enigmatic region has seen major plate reorganizations and the opening and closure of several ocean basins. At the surface, a myriad of potential kinematic scenarios including polarity, timing, geometry and location of subduction have emerged, including for systems along continental margins and intra-oceanic settings. Furthermore, recent work has reignited a debate about the origins of 'anchor' slabs, such as the Farallon and Mongol-Okhotsk slabs, which have been used to refine absolute plate motions. Moving to the mantle, seismic tomography models reveal a region peppered with inferred slabs, however assumptions about their affinities and subduction location, timing, geometry and polarity are often made in isolation. Here, by integrating regional plate reconstructions with insights from seismic tomography, satellite derived gravity gradients, slab sinking rates and geochemistry, I explore some Mesozoic examples from the palaeo-Arctic, northern Panthalassa and western margin of North America, including evidence for a discrete and previously undescribed slab under

  6. Misconceptions and constraints

    International Nuclear Information System (INIS)

    Whitten, M.; Mahon, R.

    2005-01-01

    In theory, the sterile insect technique (SIT) is applicable to a wide variety of invertebrate pests. However, in practice, the approach has been successfully applied to only a few major pests. Chapters in this volume address possible reasons for this discrepancy, e.g. Klassen, Lance and McInnis, and Robinson and Hendrichs. The shortfall between theory and practice is partly due to the persistence of some common misconceptions, but it is mainly due to one constraint, or a combination of constraints, that are biological, financial, social or political in nature. This chapter's goal is to dispel some major misconceptions, and view the constraints as challenges to overcome, seeing them as opportunities to exploit. Some of the common misconceptions include: (1) released insects retain residual radiation, (2) females must be monogamous, (3) released males must be fully sterile, (4) eradication is the only goal, (5) the SIT is too sophisticated for developing countries, and (6) the SIT is not a component of an area-wide integrated pest management (AW-IPM) strategy. The more obvious constraints are the perceived high costs of the SIT, and the low competitiveness of released sterile males. The perceived high up-front costs of the SIT, their visibility, and the lack of private investment (compared with alternative suppression measures) emerge as serious constraints. Failure to appreciate the true nature of genetic approaches, such as the SIT, may pose a significant constraint to the wider adoption of the SIT and other genetically-based tactics, e.g. transgenic genetically modified organisms (GMOs). Lack of support for the necessary underpinning strategic research also appears to be an important constraint. Hence the case for extensive strategic research in ecology, population dynamics, genetics, and insect behaviour and nutrition is a compelling one. Raising the competitiveness of released sterile males remains the major research objective of the SIT. (author)

  7. Treasury Check Verification Query (TCVQ)

    Data.gov (United States)

    Social Security Administration — The TCVQ system determines the SSN of an individual whose check has been returned to a local field office. The FO is able to request this information via the TCVQ...

  8. Model Checking Algorithms for CTMDPs

    DEFF Research Database (Denmark)

    Buchholz, Peter; Hahn, Ernst Moritz; Hermanns, Holger

    2011-01-01

    Continuous Stochastic Logic (CSL) can be interpreted over continuoustime Markov decision processes (CTMDPs) to specify quantitative properties of stochastic systems that allow some external control. Model checking CSL formulae over CTMDPs requires then the computation of optimal control strategie...

  9. Check Out These Books

    Science.gov (United States)

    Collins, Michelle (Editor); Mulenburg, Gerald

    2002-01-01

    The book entitled "Fusion Leadership: Unlocking the Subtle Forces that Change People and Organizations Richard L. Daft and Robert H. Lengel (1998) Berett-Koehler Publishers, Inc." was Reviewed by Dr. Michelle Collins, NASA Headquarters. If you've already read books on leadership and organizational change by authors such as Moshe Rubinstein and Iris Firstenberg, Peter Senge, Tom Peters, and Steven Covey, and you were thinking of rereading them, you don't have to do that now. Just read this book instead. It's a fusion of many of their same concepts presented from a different view. The book does not explore any particular subject in depth. Rather the authors "skim" many subjects and concepts, interlacing them to develop the concept of "Fusion Leadership". The fundamental concept of treating people as people rather than machines is the main theme. "Fusion Leadership" is the process of fusing people together by nurturing six "subtle" forces: mindfulness, courage, vision, heart, communication, and integrity. To do so, hierarchy is diminished and responsibility both for oneself as well as for the team is emphasized. There are a number of organizations and managers that will find such a change threatening. The concepts behind such a management style are straightforward and the benefits are intuitive once you've reflected on them; however, the obvious benefits of the behavioral change proposed in Fusion Leadership can be completely lost in a fear-based system. The concept of caring about people in one's organization was the common thread in Chris Turner's book All Hat, No Cattle (see book review, ASK 5). Much is being written about the re-humanizing of the workplace, but the basis of it is so common sense that one wonders what's taking so long for the workplace to change? Whether you're in a position to change your organization or simply your project team, you'll find the concepts in fusion leadership equally applicable.

  10. Coverage Metrics for Model Checking

    Science.gov (United States)

    Penix, John; Visser, Willem; Norvig, Peter (Technical Monitor)

    2001-01-01

    When using model checking to verify programs in practice, it is not usually possible to achieve complete coverage of the system. In this position paper we describe ongoing research within the Automated Software Engineering group at NASA Ames on the use of test coverage metrics to measure partial coverage and provide heuristic guidance for program model checking. We are specifically interested in applying and developing coverage metrics for concurrent programs that might be used to support certification of next generation avionics software.

  11. The constraints

    International Nuclear Information System (INIS)

    Jones, P.M.S.

    1987-01-01

    There are considerable incentives for the use of nuclear in preference to other sources for base load electricity generation in most of the developed world. These are economic, strategic, environmental and climatic. However, there are two potential constraints which could hinder the development of nuclear power to its full economic potential. These are public opinion and financial regulations which distort the nuclear economic advantage. The concerns of the anti-nuclear lobby are over safety, (especially following the Chernobyl accident), the management of radioactive waste, the potential effects of large scale exposure of the population to radiation and weapons proliferation. These are discussed. The financial constraint is over two factors, the availability of funds and the perception of cost, both of which are discussed. (U.K.)

  12. Production Team Maintenance: Systemic Constraints Impacting Implementation

    National Research Council Canada - National Science Library

    Moore, Terry

    1997-01-01

    .... Identified constraints included: integrating the PTM positioning strategy into the AMC corporate strategic planning process, manpower modeling simulator limitations, labor force authorizations and decentralization...

  13. Modeling of diffusive plasmas in local thermodynamic equilibrium with integral constraints: application to mercury-free high pressure discharge lamp mixtures

    Science.gov (United States)

    Janssen, J. F. J.; Suijker, J. L. G.; Peerenboom, K. S. C.; van Dijk, J.

    2017-03-01

    The mercury free lamp model previously discussed in Gnybida et al (2014 J. Phys. D: Appl. Phys. 47 125201) did not account for self-consistent diffusion and only included two molecular transitions. In this paper we apply, for the first time, a self-consistent diffusion algorithm that features (1) species/mass conservation up to machine accuracy and (2) an arbitrary mix of integral (total mass) and local (cold spot) constraints on the composition. Another advantage of this model is that the total pressure of the gas is calculated self consistently. Therefore, the usage of a predetermined pressure is no longer required. Additionally, the number of association processes has been increased from 2 to 6. The population as a function of interatomic separation determines the spectrum of the emitted continuum radiation. Previously, this population was calculated using the limit of low densities. In this work an expression is used that removes this limitation. The result of these improvements is that the agreement between the simulated and measured spectra has improved considerably.

  14. Towards an automated checked baggage inspection system augmented with robots

    Science.gov (United States)

    DeDonato, Matthew P.; Dimitrov, Velin; Padır, Taskin

    2014-05-01

    We present a novel system for enhancing the efficiency and accuracy of checked baggage screening process at airports. The system requirements address the identification and retrieval of objects of interest that are prohibited in a checked luggage. The automated testbed is comprised of a Baxter research robot designed by Rethink Robotics for luggage and object manipulation, and a down-looking overhead RGB-D sensor for inspection and detection. We discuss an overview of current system implementations, areas of opportunity for improvements, robot system integration challenges, details of the proposed software architecture and experimental results from a case study for identifying various kinds of lighters in checked bags.

  15. Checking behavioral conformance of artifacts

    NARCIS (Netherlands)

    Fahland, D.; Leoni, de M.; Dongen, van B.F.; Aalst, van der W.M.P.

    2011-01-01

    The usefulness of process models (e.g., for analysis, improvement, or execution) strongly depends on their ability to describe reality. Conformance checking is a technique to validate how good a given process model describes recorded executions of the actual process. Recently, artifacts have been

  16. Reducing Lookups for Invariant Checking

    DEFF Research Database (Denmark)

    Thomsen, Jakob Grauenkjær; Clausen, Christian; Andersen, Kristoffer Just

    2013-01-01

    This paper helps reduce the cost of invariant checking in cases where access to data is expensive. Assume that a set of variables satisfy a given invariant and a request is received to update a subset of them. We reduce the set of variables to inspect, in order to verify that the invariant is still...

  17. Context-aware compliance checking

    NARCIS (Netherlands)

    Werf, van der J.M.E.M.; Verbeek, H.M.W.; Aalst, van der W.M.P.; Barros, A.; Gal, A.; Kindler, E.

    2012-01-01

    Organizations face more and more the burden to show that their business is compliant with respect to many different boundaries. The activity of compliance checking is commonly referred to as auditing. As information systems supporting the organization’s business record their usage, process mining

  18. Improvement of seawater booster pump outlet check valve

    International Nuclear Information System (INIS)

    Li Xuning; Du Yansong; Huang Huimin

    2010-01-01

    Conventional island seawater booster pump set of QNPC 310 MWe unit are very important in the whole circulating cooling system, and the integrate function of seawater booster pump outlet check valve is the foundation of steady operation of the seawater booster pump set. The article mainly introduce that through the analyses to the reason to the problem that the seawater booster pump outlet check valve of QNPC 310 MWe unit appeared in past years by our team, and considering the influence of operation condition and circumstance, the team improve the seawater booster pump outlet check valve from swing check valve to shuttle check valve which operate more appropriately in the system. By the test of continuous practice, we make further modification to the inner structure of shuttle check valve contrapuntally, and therefore we solve the problem in seawater booster pump outlet check valve fundamentally which has troubled the security of system operation in past years, so we realize the aim of technical improvement and ensure that the system operate in safety and stability. (authors)

  19. 27 CFR 70.101 - Bad checks.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Bad checks. 70.101 Section....101 Bad checks. If any check or money order in payment of any amount receivable under Title 26 of the... appropriate TTB officer that such check was tendered in good faith and that such person had reasonable cause...

  20. Model Checking Markov Chains: Techniques and Tools

    NARCIS (Netherlands)

    Zapreev, I.S.

    2008-01-01

    This dissertation deals with four important aspects of model checking Markov chains: the development of efficient model-checking tools, the improvement of model-checking algorithms, the efficiency of the state-space reduction techniques, and the development of simulation-based model-checking

  1. PSYCHE, ENDF/B Data Consistency Check in ENDF Format

    International Nuclear Information System (INIS)

    Dunford, Charles L.

    2007-01-01

    1 - Description of program or function: PSYCHE is a program for checking the physics content of an evaluated data file. It can recognise the difference between ENDF-5 or ENDF-6 formats and performs its tests accordingly. Version 7.01 (April 2005): set success flag after return from begin, added potential scattering test formerly in Fizcon. Version 7.02 (May 2005): Fixed bug in calculation of L=2 penetrability. 2 - Method of solution: PSYCHE checks for energy conservation for emitted neutrons and photons, checks Wick's limit for elastic scattering, analyses resonance parameter statistics, calculates thermal cross sections and resonance integrals, examines continuity across resonance region boundaries and checks 'Q' values against mass tables

  2. Constraint-Based Abstraction of a Model Checker for Infinite State Systems

    DEFF Research Database (Denmark)

    Banda, Gourinath; Gallagher, John Patrick

    Abstract interpretation-based model checking provides an approach to verifying properties of infinite-state systems. In practice, most previous work on abstract model checking is either restricted to verifying universal properties, or develops special techniques for temporal logics such as modal t...... to implementation of abstract model checking algorithms for abstract domains based on constraints, making use of an SMT solver....

  3. Statistical analysis of probabilistic models of software product lines with quantitative constraints

    DEFF Research Database (Denmark)

    Beek, M.H. ter; Legay, A.; Lluch Lafuente, Alberto

    2015-01-01

    We investigate the suitability of statistical model checking for the analysis of probabilistic models of software product lines with complex quantitative constraints and advanced feature installation options. Such models are specified in the feature-oriented language QFLan, a rich process algebra...... of certain behaviour to the expected average cost of products. This is supported by a Maude implementation of QFLan, integrated with the SMT solver Z3 and the distributed statistical model checker MultiVeStA. Our approach is illustrated with a bikes product line case study....

  4. Calibration and check light source

    Energy Technology Data Exchange (ETDEWEB)

    Nejedla, B; Krotil, J

    1979-02-15

    The light source is designed for calibrating photomultipliers and checking the function of the thermoluminescent dosemeters evaluation equipment. The check light source consists of a polymer material-based (polyvinyl toluene) plastic scintillator and a 2-phenyl-5-(4-bisphenyl)-1,3,4-oxadiazol and/or paraterphenyl activator, and of emission spectrum shifters for response in the green and the blue light regions. The plastic scintillator is sealed in a case to whose bottom a radiation source is fixed, such as a /sup 90/Sr-/sup 90/Y source of an activity of 1.85x10/sup 3/s/sup -1/ to 0.74x10/sup 9/s/sup -1/.

  5. From Preventive to Permissive Checks

    DEFF Research Database (Denmark)

    Sharp, Paul Richard; Weisdorf, Jacob Louis

    The Malthusian "preventive check" mechanism has been well documented for pre-industrial England through evidence for a negativcorrelation between the marriage rate and the price of wheat. Other literature, however, speculates that the correlation was in fact positive from the early nineteenth cen...... shows that this result is not in fact inconsistent with a stylized Malthusian mechanism, and can be understood within the context of an increasing dominance of shocks to aggregate demand rather than to aggregate supply...

  6. From preventive to permissive checks

    DEFF Research Database (Denmark)

    Weisdorf, Jacob Louis; Sharp, Paul Richard

    2009-01-01

    The Malthusian "preventive check" mechanism has been well documented for pre-industrial England through evidence for a negative correlation between the marriage rate and the price of wheat. Other literature, however, speculates that the correlation was in fact positive from the early nineteenth c...... model shows that this result is not in fact inconsistent with a stylised Malthusian mechanism, and can be understood within the context of an increasing dominance of shocks to aggregate demand rather than to aggregate supply....

  7. CheckMATE 2: From the model to the limit

    Science.gov (United States)

    Dercks, Daniel; Desai, Nishita; Kim, Jong Soo; Rolbiecki, Krzysztof; Tattersall, Jamie; Weber, Torsten

    2017-12-01

    We present the latest developments to the CheckMATE program that allows models of new physics to be easily tested against the recent LHC data. To achieve this goal, the core of CheckMATE now contains over 60 LHC analyses of which 12 are from the 13 TeV run. The main new feature is that CheckMATE 2 now integrates the Monte Carlo event generation via MadGraph5_aMC@NLO and Pythia 8. This allows users to go directly from a SLHA file or UFO model to the result of whether a model is allowed or not. In addition, the integration of the event generation leads to a significant increase in the speed of the program. Many other improvements have also been made, including the possibility to now combine signal regions to give a total likelihood for a model.

  8. Experiential knowledge of expert coaches can help identify informational constraints on performance of dynamic interceptive actions.

    Science.gov (United States)

    Greenwood, Daniel; Davids, Keith; Renshaw, Ian

    2014-01-01

    Coordination of dynamic interceptive movements is predicated on cyclical relations between an individual's actions and information sources from the performance environment. To identify dynamic informational constraints, which are interwoven with individual and task constraints, coaches' experiential knowledge provides a complementary source to support empirical understanding of performance in sport. In this study, 15 expert coaches from 3 sports (track and field, gymnastics and cricket) participated in a semi-structured interview process to identify potential informational constraints which they perceived to regulate action during run-up performance. Expert coaches' experiential knowledge revealed multiple information sources which may constrain performance adaptations in such locomotor pointing tasks. In addition to the locomotor pointing target, coaches' knowledge highlighted two other key informational constraints: vertical reference points located near the locomotor pointing target and a check mark located prior to the locomotor pointing target. This study highlights opportunities for broadening the understanding of perception and action coupling processes, and the identified information sources warrant further empirical investigation as potential constraints on athletic performance. Integration of experiential knowledge of expert coaches with theoretically driven empirical knowledge represents a promising avenue to drive future applied science research and pedagogical practice.

  9. The Effects of Check-In, Check-Up, Check-Out for Students with Moderate Intellectual Disability during On- and Off-Site Vocational Training

    Science.gov (United States)

    Boden, Lauren J.; Jolivette, Kristine; Alberto, Paul A.

    2018-01-01

    Check-in/check-out is a secondary-tier intervention within the positive behavior interventions and supports framework. Check-in/check-out pairs the use of an adult mentor with a daily progress report to help students meet individualized behavioral goals. This study adds to the research base by examining the effects of check-in, check-up, check-out…

  10. DEPUTY: analysing architectural structures and checking style

    International Nuclear Information System (INIS)

    Gorshkov, D.; Kochelev, S.; Kotegov, S.; Pavlov, I.; Pravilnikov, V.; Wellisch, J.P.

    2001-01-01

    The DepUty (dependencies utility) can be classified as a project and process management tool. The main goal of DepUty is to assist by means of source code analysis and graphical representation using UML, in understanding dependencies of sub-systems and packages in CMS Object Oriented software, to understand architectural structure, and to schedule code release in modularised integration. It also allows a new-comer to more easily understand the global structure of CMS software, and to void circular dependencies up-front or re-factor the code, in case it was already too close to the edge of non-maintainability. The authors will discuss the various views DepUty provides to analyse package dependencies, and illustrate both the metrics and style checking facilities it provides

  11. OntoCheck: verifying ontology naming conventions and metadata completeness in Protégé 4.

    Science.gov (United States)

    Schober, Daniel; Tudose, Ilinca; Svatek, Vojtech; Boeker, Martin

    2012-09-21

    Although policy providers have outlined minimal metadata guidelines and naming conventions, ontologies of today still display inter- and intra-ontology heterogeneities in class labelling schemes and metadata completeness. This fact is at least partially due to missing or inappropriate tools. Software support can ease this situation and contribute to overall ontology consistency and quality by helping to enforce such conventions. We provide a plugin for the Protégé Ontology editor to allow for easy checks on compliance towards ontology naming conventions and metadata completeness, as well as curation in case of found violations. In a requirement analysis, derived from a prior standardization approach carried out within the OBO Foundry, we investigate the needed capabilities for software tools to check, curate and maintain class naming conventions. A Protégé tab plugin was implemented accordingly using the Protégé 4.1 libraries. The plugin was tested on six different ontologies. Based on these test results, the plugin could be refined, also by the integration of new functionalities. The new Protégé plugin, OntoCheck, allows for ontology tests to be carried out on OWL ontologies. In particular the OntoCheck plugin helps to clean up an ontology with regard to lexical heterogeneity, i.e. enforcing naming conventions and metadata completeness, meeting most of the requirements outlined for such a tool. Found test violations can be corrected to foster consistency in entity naming and meta-annotation within an artefact. Once specified, check constraints like name patterns can be stored and exchanged for later re-use. Here we describe a first version of the software, illustrate its capabilities and use within running ontology development efforts and briefly outline improvements resulting from its application. Further, we discuss OntoChecks capabilities in the context of related tools and highlight potential future expansions. The OntoCheck plugin facilitates

  12. Constraint Soup - Interpreting Natural Language Architectural Constraints

    NARCIS (Netherlands)

    Niemeijer, R.A.; Vries, de B.; Beetz, J.

    2010-01-01

    To facilitate mass customization in the building industry, an automated method is needed to check the validity of user-created designs. This check requires that numerous complex building codes and regulations, as well as architects’ demands are formalized and captured by non-programming domain

  13. The use of check valve performance data to support new concepts (probabilistic risk assessment, condition monitoring) for check valve program

    Energy Technology Data Exchange (ETDEWEB)

    Hart, K.A.; Gower, D.

    1996-12-01

    The concept of developing an integrated check valve database based on the Nuclear Power Reliability Data System (NPRDS) data was presented at the last Symposium. The Nuclear Industry Check Valve Group (NIC), working in cooperation with the Oak Ridge National Laboratory (ORNL), has completed an operational database of check valve performance from 1984 to the present. NIC has committed to the nuclear industry to periodically update the data and maintain this information accessible. As the new concepts of probabilistic risk analysis and condition monitoring are integrated into the American Society of Mechanical Engineers (ASME) Code, a critical element will be performance data. From check valve performance data, feasible failure modes and rates can be established. When a failure rate or frequency of failures can be established based on a significant enough population (sampling), a more solid foundation for focusing resources and determining appropriate frequencies and testing can be determined. The presentation will give the updated status of the NIC Check Valve Performance Database covering (1) methodology used to combine the original ORNL data; (2) process/controls established for continuing update and refinement of the data; (3) discussion of how this data is being utilized by (a) OM-22 for condition monitoring, and (b) risk-based inservice testing work of Westinghouse Owners` Group; and (4) results/trends of data evaluations. At the 1994 Symposium, ORNL provided an update as of 1991 to their original work of 1984 -1990 which they had performed to characterize check valve degradations and failures in the nuclear industry. These characterizations will be updated to 1995 and additional reviews provided to give insight into the current condition and trends of check valve performance.

  14. The use of check valve performance data to support new concepts (probabilistic risk assessment, condition monitoring) for check valve program

    International Nuclear Information System (INIS)

    Hart, K.A.; Gower, D.

    1996-01-01

    The concept of developing an integrated check valve database based on the Nuclear Power Reliability Data System (NPRDS) data was presented at the last Symposium. The Nuclear Industry Check Valve Group (NIC), working in cooperation with the Oak Ridge National Laboratory (ORNL), has completed an operational database of check valve performance from 1984 to the present. NIC has committed to the nuclear industry to periodically update the data and maintain this information accessible. As the new concepts of probabilistic risk analysis and condition monitoring are integrated into the American Society of Mechanical Engineers (ASME) Code, a critical element will be performance data. From check valve performance data, feasible failure modes and rates can be established. When a failure rate or frequency of failures can be established based on a significant enough population (sampling), a more solid foundation for focusing resources and determining appropriate frequencies and testing can be determined. The presentation will give the updated status of the NIC Check Valve Performance Database covering (1) methodology used to combine the original ORNL data; (2) process/controls established for continuing update and refinement of the data; (3) discussion of how this data is being utilized by (a) OM-22 for condition monitoring, and (b) risk-based inservice testing work of Westinghouse Owners' Group; and (4) results/trends of data evaluations. At the 1994 Symposium, ORNL provided an update as of 1991 to their original work of 1984 -1990 which they had performed to characterize check valve degradations and failures in the nuclear industry. These characterizations will be updated to 1995 and additional reviews provided to give insight into the current condition and trends of check valve performance

  15. 25 CFR 11.421 - Bad checks.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Bad checks. 11.421 Section 11.421 Indians BUREAU OF... Criminal Offenses § 11.421 Bad checks. (a) A person who issues or passes a check or similar sight order for..., and the issuer failed to make good within 10 days after receiving notice of that refusal. ...

  16. Model Checking Structured Infinite Markov Chains

    NARCIS (Netherlands)

    Remke, Anne Katharina Ingrid

    2008-01-01

    In the past probabilistic model checking hast mostly been restricted to finite state models. This thesis explores the possibilities of model checking with continuous stochastic logic (CSL) on infinite-state Markov chains. We present an in-depth treatment of model checking algorithms for two special

  17. From physical dose constraints to equivalent uniform dose constraints in inverse radiotherapy planning

    International Nuclear Information System (INIS)

    Thieke, Christian; Bortfeld, Thomas; Niemierko, Andrzej; Nill, Simeon

    2003-01-01

    Optimization algorithms in inverse radiotherapy planning need information about the desired dose distribution. Usually the planner defines physical dose constraints for each structure of the treatment plan, either in form of minimum and maximum doses or as dose-volume constraints. The concept of equivalent uniform dose (EUD) was designed to describe dose distributions with a higher clinical relevance. In this paper, we present a method to consider the EUD as an optimization constraint by using the method of projections onto convex sets (POCS). In each iteration of the optimization loop, for the actual dose distribution of an organ that violates an EUD constraint a new dose distribution is calculated that satisfies the EUD constraint, leading to voxel-based physical dose constraints. The new dose distribution is found by projecting the current one onto the convex set of all dose distributions fulfilling the EUD constraint. The algorithm is easy to integrate into existing inverse planning systems, and it allows the planner to choose between physical and EUD constraints separately for each structure. A clinical case of a head and neck tumor is optimized using three different sets of constraints: physical constraints for all structures, physical constraints for the target and EUD constraints for the organs at risk, and EUD constraints for all structures. The results show that the POCS method converges stable and given EUD constraints are reached closely

  18. National Coal Utilization Assessment. An integrated assessment of increased coal use in the Midwest: impacts and constraints. [14 states Midwest region

    Energy Technology Data Exchange (ETDEWEB)

    1977-10-01

    This study examines the impacts and constraints to increased coal production and use for a 14-state Midwestern region. The assessment considers technology characteristics, energy supply and demand trends, siting constraints, impacts on water availability and coal reserves, impacts on air and water quality, and ecosystems, effects of trace elements, social and economic impacts, and health risks. The significant air quality constraints to coal use are related to the short-term National Ambient Air Quality Standards, PSD standards, and exposure to sulfates. In general, cumulative water supply in the 14-state region is adequate to satisfy foreseeable energy requirements; however, on a localized basis significant water shortages may develop which could constrain a smaller portion of the energy development. Water quality impacts are primarily restricted to areas with insufficient water resources. Coal mining will continue to have significant effects on water quality in smaller streams draining the major coal regions unless strict control practices are maintained. Coal-conversion plants may cause localized water quality problems; however, the effluent characteristics of these plants are not well-known. A significant amount of the coal development is anticipated to occur in counties with high susceptibility to social and economic impacts. The timing, magnitude, and nature of these impacts could be mitigated by the development of effective management strategies.

  19. Model Checking as Static Analysis

    DEFF Research Database (Denmark)

    Zhang, Fuyuan

    fairness problems can be encoded into ALFP as well. To deal with multi-valued model checking problems, we have proposed multivalued ALFP. A Moore Family result for multi-valued ALFP is also established, which ensures the existence and uniqueness of the least model. When the truth values in multi-valued...... of states satisfying a CTL formula can be characterized as the least model of ALFP clauses specifying this CTL formula. The existence of the least model of ALFP clauses is ensured by the Moore Family property of ALFP. Then, we take fairness assumptions in CTL into consideration and have shown that CTL...... ALFP constitute a nite distributive complete lattice, multi-valued ALFP can be reduced to two-valued ALFP. This result enables to implement a solver for multi-valued ALFP by reusing existing solvers for twovalued ALFP. Our ALFP-based technique developed for the two-valued CTL naturally generalizes...

  20. 14 CFR 121.411 - Qualifications: Check airmen (airplane) and check airmen (simulator).

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Qualifications: Check airmen (airplane) and... § 121.411 Qualifications: Check airmen (airplane) and check airmen (simulator). (a) For the purposes of this section and § 121.413: (1) A check airman (airplane) is a person who is qualified, and permitted...

  1. Intelligent Data Visualization for Cross-Checking Spacecraft System Diagnosis

    Science.gov (United States)

    Ong, James C.; Remolina, Emilio; Breeden, David; Stroozas, Brett A.; Mohammed, John L.

    2012-01-01

    Any reasoning system is fallible, so crew members and flight controllers must be able to cross-check automated diagnoses of spacecraft or habitat problems by considering alternate diagnoses and analyzing related evidence. Cross-checking improves diagnostic accuracy because people can apply information processing heuristics, pattern recognition techniques, and reasoning methods that the automated diagnostic system may not possess. Over time, cross-checking also enables crew members to become comfortable with how the diagnostic reasoning system performs, so the system can earn the crew s trust. We developed intelligent data visualization software that helps users cross-check automated diagnoses of system faults more effectively. The user interface displays scrollable arrays of timelines and time-series graphs, which are tightly integrated with an interactive, color-coded system schematic to show important spatial-temporal data patterns. Signal processing and rule-based diagnostic reasoning automatically identify alternate hypotheses and data patterns that support or rebut the original and alternate diagnoses. A color-coded matrix display summarizes the supporting or rebutting evidence for each diagnosis, and a drill-down capability enables crew members to quickly view graphs and timelines of the underlying data. This system demonstrates that modest amounts of diagnostic reasoning, combined with interactive, information-dense data visualizations, can accelerate system diagnosis and cross-checking.

  2. A voice-actuated wind tunnel model leak checking system

    Science.gov (United States)

    Larson, William E.

    1989-01-01

    A computer program has been developed that improves the efficiency of wind tunnel model leak checking. The program uses a voice recognition unit to relay a technician's commands to the computer. The computer, after receiving a command, can respond to the technician via a voice response unit. Information about the model pressure orifice being checked is displayed on a gas-plasma terminal. On command, the program records up to 30 seconds of pressure data. After the recording is complete, the raw data and a straight line fit of the data are plotted on the terminal. This allows the technician to make a decision on the integrity of the orifice being checked. All results of the leak check program are stored in a database file that can be listed on the line printer for record keeping purposes or displayed on the terminal to help the technician find unchecked orifices. This program allows one technician to check a model for leaks instead of the two or three previously required.

  3. Reasoning about Strategies under Partial Observability and Fairness Constraints

    Directory of Open Access Journals (Sweden)

    Simon Busard

    2013-03-01

    Full Text Available A number of extensions exist for Alternating-time Temporal Logic; some of these mix strategies and partial observability but, to the best of our knowledge, no work provides a unified framework for strategies, partial observability and fairness constraints. In this paper we propose ATLK^F_po, a logic mixing strategies under partial observability and epistemic properties of agents in a system with fairness constraints on states, and we provide a model checking algorithm for it.

  4. A Selfish Constraint Satisfaction Genetic Algorithms for Planning a Long-Distance Transportation Network

    Science.gov (United States)

    Onoyama, Takashi; Maekawa, Takuya; Kubota, Sen; Tsuruta, Setuso; Komoda, Norihisa

    To build a cooperative logistics network covering multiple enterprises, a planning method that can build a long-distance transportation network is required. Many strict constraints are imposed on this type of problem. To solve these strict-constraint problems, a selfish constraint satisfaction genetic algorithm (GA) is proposed. In this GA, each gene of an individual satisfies only its constraint selfishly, disregarding the constraints of other genes in the same individuals. Moreover, a constraint pre-checking method is also applied to improve the GA convergence speed. The experimental result shows the proposed method can obtain an accurate solution in a practical response time.

  5. 46 CFR 10.214 - Security Check.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...

  6. 7 CFR 1421.11 - Spot checks.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Spot checks. 1421.11 Section 1421.11 Agriculture... ASSISTANCE LOANS AND LOAN DEFICIENCY PAYMENTS FOR 2008 THROUGH 2012 General § 1421.11 Spot checks. (a) CCC... CCC access to the farm and storage facility as necessary to conduct collateral inspections, or “spot...

  7. SPEED ROLLER STAND MEASUREMENT SYSTEM CHECKING TECHNIQUE

    Directory of Open Access Journals (Sweden)

    Y. Zybtsev

    2011-01-01

    Full Text Available The study has shown that the accuracy of brakes checking by inertial stands depends upon the applied methods of measurement of braking parameters (stand slowing down, braking distance, brakes triggering time, current speed as well as the methods of metrological checking of measuring system canals.

  8. Model-Checking Discrete Duration Calculus

    DEFF Research Database (Denmark)

    Hansen, Michael Reichhardt

    1994-01-01

    can do model-checking. The subset we consider is expressive enough to formalize the requirements to the gas burner system given by A.P. Ravn (1993); but only for a discrete time domain. Model-checking is done by reducing the correctness problem ℳ|=𝒟 to the inclusion problem of regular...

  9. Checking and Balancing: Banking and Budgeting.

    Science.gov (United States)

    Thypin, Marilyn; Glasner, Lynne

    A short fictional work for limited English speakers is presented that relates a young couple's experience in learning about managing their money more carefully by budgeting and maintaining a checking account. Since the couple did not have a checking account, they had to go to their savings bank in order to pay each bill and they had to keep cash…

  10. Software tool for physics chart checks.

    Science.gov (United States)

    Li, H Harold; Wu, Yu; Yang, Deshan; Mutic, Sasa

    2014-01-01

    Physics chart check has long been a central quality assurance (QC) measure in radiation oncology. The purpose of this work is to describe a software tool that aims to accomplish simplification, standardization, automation, and forced functions in the process. Nationally recognized guidelines, including American College of Radiology and American Society for Radiation Oncology guidelines and technical standards, and the American Association of Physicists in Medicine Task Group reports were identified, studied, and summarized. Meanwhile, the reported events related to physics chart check service were analyzed using an event reporting and learning system. A number of shortfalls in the chart check process were identified. To address these problems, a software tool was designed and developed under Microsoft. Net in C# to hardwire as many components as possible at each stage of the process. The software consists of the following 4 independent modules: (1) chart check management; (2) pretreatment and during treatment chart check assistant; (3) posttreatment chart check assistant; and (4) quarterly peer-review management. The users were a large group of physicists in the author's radiation oncology clinic. During over 1 year of use the tool has proven very helpful in chart checking management, communication, documentation, and maintaining consistency. The software tool presented in this work aims to assist physicists at each stage of the physics chart check process. The software tool is potentially useful for any radiation oncology clinics that are either in the process of pursuing or maintaining the American College of Radiology accreditation.

  11. Repeated checking induces uncertainty about future threat

    NARCIS (Netherlands)

    Giele, C.L.|info:eu-repo/dai/nl/318754460; Engelhard, I.M.|info:eu-repo/dai/nl/239681533; van den Hout, M.A.|info:eu-repo/dai/nl/070445354; Dek, E.C.P.|info:eu-repo/dai/nl/313959552; Damstra, Marianne; Douma, Ellen

    2015-01-01

    Studies have shown that obsessive-compulsive (OC) -like repeated checking paradoxically increases memory uncertainty. This study tested if checking also induces uncertainty about future threat by impairing the distinction between danger and safety cues. Participants (n = 54) engaged in a simulated

  12. Diagnostic information in temporal compliance checking

    NARCIS (Netherlands)

    Ramezani Taghiabadi, E.; Fahland, D.; Dongen, van B.F.; Aalst, van der W.M.P.

    2012-01-01

    Compliance checking is gaining importance as today’s organizations need to show that operational processes are executed in a controlled manner while satisfying prede¿ned (legal) requirements. Deviations may be costly and expose the organization to severe risks. Compliance checking is of growing

  13. Automatization and familiarity in repeated checking

    NARCIS (Netherlands)

    Dek, E.C.P.|info:eu-repo/dai/nl/313959552; van den Hout, M.A.|info:eu-repo/dai/nl/070445354; Giele, C.L.|info:eu-repo/dai/nl/318754460; Engelhard, I.M.|info:eu-repo/dai/nl/239681533

    2015-01-01

    Repetitive, compulsive-like checking of an object leads to reductions in memory confidence, vividness, and detail. Experimental research suggests that this is caused by increased familiarity with perceptual characteristics of the stimulus and automatization of the checking procedure (Dek, van den

  14. Model Checking Infinite-State Markov Chains

    NARCIS (Netherlands)

    Remke, Anne Katharina Ingrid; Haverkort, Boudewijn R.H.M.; Cloth, L.

    2004-01-01

    In this paper algorithms for model checking CSL (continuous stochastic logic) against infinite-state continuous-time Markov chains of so-called quasi birth-death type are developed. In doing so we extend the applicability of CSL model checking beyond the recently proposed case for finite-state

  15. Model Checking Real-Time Systems

    DEFF Research Database (Denmark)

    Bouyer, Patricia; Fahrenberg, Uli; Larsen, Kim Guldstrand

    2018-01-01

    This chapter surveys timed automata as a formalism for model checking real-time systems. We begin with introducing the model, as an extension of finite-state automata with real-valued variables for measuring time. We then present the main model-checking results in this framework, and give a hint...

  16. 32 CFR 635.6 - Name checks.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Name checks. 635.6 Section 635.6 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Records Administration § 635.6 Name checks. (a) Information contained in military police records may be...

  17. 7 CFR 58.243 - Checking quality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Checking quality. 58.243 Section 58.243 Agriculture... Procedures § 58.243 Checking quality. All milk, milk products and dry milk products shall be subject to inspection and analysis by the dairy plant for quality and condition throughout each processing operation...

  18. Vertical pump with free floating check valve

    International Nuclear Information System (INIS)

    Lindsay, M.

    1980-01-01

    A vertical pump is described which has a bottom discharge with a free floating check valve disposed in the outlet plenum thereof. The free floating check valve comprises a spherical member with a hemispherical cage-like member attached thereto which is capable of allowing forward or reverse flow under appropriate conditions while preventing reverse flow under inappropriate conditions

  19. 38 CFR 21.4505 - Check delivery.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Check delivery. 21.4505...) VOCATIONAL REHABILITATION AND EDUCATION Education Loans § 21.4505 Check delivery. (a) General. Education... surviving spouse is enrolled for delivery by the educational institution. (b) Delivery and certification. (1...

  20. Combined metals and EDTA control: An integrated and scalable lipid enhancement strategy to alleviate biomass constraints in microalgae under nitrogen limited conditions

    International Nuclear Information System (INIS)

    Singh, Poonam; Guldhe, Abhishek; Kumari, Sheena; Rawat, Ismail; Bux, Faizal

    2016-01-01

    Highlights: • A. obliquus showed highest lipid productivity amongst all seven microalgal strains. • Combined metals stress eased the constraint of low biomass under limited nitrogen. • Combined metals stress enhanced the overall lipid productivity (1.99 fold). • EDTA addition further improved the lipid productivity (2.18 fold). • This strategy showed 2.08 fold increase in lipid productivity at 3000 L cultivation. - Abstract: The commercial realization of microalgal biodiesel production necessitates substantial impulsion towards development of strategies to improve lipid yields upstream. Nitrogen stress is the most widely used lipid enhancement strategy; yet, it is associated with compromised biomass productivity. In this novel approach, combined effect of metals and EDTA on lipid productivity of Acutodesmus obliquus was investigated under nitrogen limited conditions. The effect of metal concentrations, individually and in combination, on microalgal lipids and biomass production is a scarcely exploited area. Combined metal stress alleviates the constraint of low biomass production under nitrogen limitation and improved the overall lipid productivity. Highest lipid productivity of 73.23 mg L"−"1 d"−"1 was achieved with a combination of iron 9 mg L"−"1, magnesium 100 mg L"−"1 and calcium 27 mg L"−"1 at limited nitrogen (750 mg L"−"1). This was 1.72 fold higher than nitrogen stress alone and 1.99 fold higher than BG11 medium. Iron was found to be most significantly influencing metal followed by magnesium in response surface methodology data analysis. The enhanced photosynthetic performance and chlorophyll content further confirmed the significant impact of iron and magnesium on the microalgal biomass. The addition of EDTA to the optimised metal combination further improved the lipid productivity to 80.23 mg L"−"1 d"−"1 (2.18 fold). At 3000 L open cultivation pond this strategy has resulted in an increase of 2.08 fold in lipid productivity

  1. What is a good health check? An interview study of health check providers' views and practices

    NARCIS (Netherlands)

    Y. Stol (Yrrah); E.C.A. Asscher (Eva); M.H.N. Schermer (Maartje)

    2017-01-01

    markdownabstract__Background:__ Health checks identify (risk factors for) disease in people without symptoms. They may be offered by the government through population screenings and by other providers to individual users as 'personal health checks'. Health check providers' perspective of 'good'

  2. 14 CFR 91.1089 - Qualifications: Check pilots (aircraft) and check pilots (simulator).

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Qualifications: Check pilots (aircraft) and check pilots (simulator). 91.1089 Section 91.1089 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION... RULES Fractional Ownership Operations Program Management § 91.1089 Qualifications: Check pilots...

  3. Constraints on stress-energy perturbations in general relativity

    International Nuclear Information System (INIS)

    Traschen, J.

    1985-01-01

    Conditions are found for the existence of integral constraints on stress-energy perturbations in general relativity. The integral constraints can be thought of as a general-relativistic generalization of the conservation of energy and momentum of matter perturbations in special relativity. The constraints are stated in terms of a vector field V, and the Robertson-Walker spacetimes are shown to have such constraint vectors. Although in general V is not a Killing vector, in a vacuum spacetime the constraint vectors are precisely the Killing vectors

  4. Overview of Prevention for Water Hammer by Check Valve Action in Nuclear Reactor

    International Nuclear Information System (INIS)

    Kim, Dayong; Yoon, Hyungi; Seo, Kyoungwoo; Kim, Seonhoon

    2016-01-01

    Water hammer can cause serious damage to pumping system and unexpected system pressure rise in the pipeline. In nuclear reactor, water hammer can influence on the integrity of safety related system. Water hammer in nuclear reactor have been caused by voiding in normally water-filled lines, steam condensation line containing both steam and water, as well as by rapid check valve action. Therefore, this study focuses on the water hammer by check valve among the sources of water hammer occurrence and suggests proper methodology for check valve type selection against water hammer. This study focuses on the water hammer by check valve action among the sources of water hammer occurrence and suggests proper methodology for check valve type selection against water hammer. If the inadvertent pump trip or pipe rupture in high velocity and pressure pipe is predicted, the fast response check valve such as tiled disc, dual disc and nozzle check valve should be installed in the system. If the inadvertent pump trip or pipe rupture in very high velocity and pressure pipe and excessively large revered flow velocity are predicted, the very slowly closing check valve such as controlled closure check valve should be installed in the system

  5. Overview of Prevention for Water Hammer by Check Valve Action in Nuclear Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Dayong; Yoon, Hyungi; Seo, Kyoungwoo; Kim, Seonhoon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Water hammer can cause serious damage to pumping system and unexpected system pressure rise in the pipeline. In nuclear reactor, water hammer can influence on the integrity of safety related system. Water hammer in nuclear reactor have been caused by voiding in normally water-filled lines, steam condensation line containing both steam and water, as well as by rapid check valve action. Therefore, this study focuses on the water hammer by check valve among the sources of water hammer occurrence and suggests proper methodology for check valve type selection against water hammer. This study focuses on the water hammer by check valve action among the sources of water hammer occurrence and suggests proper methodology for check valve type selection against water hammer. If the inadvertent pump trip or pipe rupture in high velocity and pressure pipe is predicted, the fast response check valve such as tiled disc, dual disc and nozzle check valve should be installed in the system. If the inadvertent pump trip or pipe rupture in very high velocity and pressure pipe and excessively large revered flow velocity are predicted, the very slowly closing check valve such as controlled closure check valve should be installed in the system.

  6. QuickChecking Static Analysis Properties

    DEFF Research Database (Denmark)

    Midtgaard, Jan; Møller, Anders

    2015-01-01

    A static analysis can check programs for potential errors. A natural question that arises is therefore: who checks the checker? Researchers have given this question varying attention, ranging from basic testing techniques, informal monotonicity arguments, thorough pen-and-paper soundness proofs...... of a lattice. Moreover, we offer a number of generic, type-safe combinators to check transfer functions and operators on lattices, to help ensure that these are, e.g., monotone, strict, or invariant. We substantiate our claims by quickchecking a type analysis for the Lua programming language...

  7. QuickChecking static analysis properties

    DEFF Research Database (Denmark)

    Midtgaard, Jan; Møller, Anders

    2017-01-01

    A static analysis can check programs for potential errors. A natural question that arises is therefore: who checks the checker? Researchers have given this question varying attention, ranging from basic testing techniques, informal monotonicity arguments, thorough pen-and-paper soundness proofs....... Moreover, we offer a number of generic, type-safe combinators to check transfer functions and operators on lattices, to help ensure that these are, eg, monotone, strict, or invariant. We substantiate our claims by quickchecking a type analysis for the Lua programming language....

  8. An integrated analysis of micro- and macro-habitat features as a tool to detect weather-driven constraints: A case study with cavity nesters.

    Directory of Open Access Journals (Sweden)

    D Campobello

    Full Text Available The effects of climate change on animal populations may be shaped by habitat characteristics at both micro- and macro-habitat level, however, empirical studies integrating these two scales of observation are lacking. As analyses of the effects of climate change commonly rely on data from a much larger scale than the microhabitat level organisms are affected at, this mismatch risks hampering progress in developing understanding of the details of the ecological and evolutionary responses of organisms and, ultimately, effective actions to preserve their populations. Cavity nesters, often with a conservation status of concern, are an ideal model because the cavity is a microenvironment potentially different from the macroenvironment but nonetheless inevitably interacting with it. The lesser kestrel (Falco naumanni is a cavity nester which was until recently classified by as Vulnerable species. Since 2004, for nine years, we collected detailed biotic and abiotic data at both micro- and macro-scales of observation in a kestrel population breeding in the Gela Plain (Italy, a Mediterranean area where high temperatures may reach lethal values for the nest content. We show that macroclimatic features needed to be integrated with both abiotic and biotic factors recorded at a microscale before reliably predicting nest temperatures. Among the nest types used by lesser kestrels, we detected a preferential occupation of the cooler nest types, roof tiles, by early breeders whereas, paradoxically, late breeders nesting with hotter temperatures occupied the overheated nest holes. Not consistent with such a suggested nest selection, the coolest nest type did not host a higher reproductive success than the overheated nests. We discussed our findings in the light of cavity temperatures and nest types deployed within conservation actions assessed by integrating selected factors at different observation scales.

  9. An integrated analysis of micro- and macro-habitat features as a tool to detect weather-driven constraints: A case study with cavity nesters.

    Science.gov (United States)

    Campobello, D; Lindström, J; Di Maggio, R; Sarà, M

    2017-01-01

    The effects of climate change on animal populations may be shaped by habitat characteristics at both micro- and macro-habitat level, however, empirical studies integrating these two scales of observation are lacking. As analyses of the effects of climate change commonly rely on data from a much larger scale than the microhabitat level organisms are affected at, this mismatch risks hampering progress in developing understanding of the details of the ecological and evolutionary responses of organisms and, ultimately, effective actions to preserve their populations. Cavity nesters, often with a conservation status of concern, are an ideal model because the cavity is a microenvironment potentially different from the macroenvironment but nonetheless inevitably interacting with it. The lesser kestrel (Falco naumanni) is a cavity nester which was until recently classified by as Vulnerable species. Since 2004, for nine years, we collected detailed biotic and abiotic data at both micro- and macro-scales of observation in a kestrel population breeding in the Gela Plain (Italy), a Mediterranean area where high temperatures may reach lethal values for the nest content. We show that macroclimatic features needed to be integrated with both abiotic and biotic factors recorded at a microscale before reliably predicting nest temperatures. Among the nest types used by lesser kestrels, we detected a preferential occupation of the cooler nest types, roof tiles, by early breeders whereas, paradoxically, late breeders nesting with hotter temperatures occupied the overheated nest holes. Not consistent with such a suggested nest selection, the coolest nest type did not host a higher reproductive success than the overheated nests. We discussed our findings in the light of cavity temperatures and nest types deployed within conservation actions assessed by integrating selected factors at different observation scales.

  10. Integration

    DEFF Research Database (Denmark)

    Emerek, Ruth

    2004-01-01

    Bidraget diskuterer de forskellige intergrationsopfattelse i Danmark - og hvad der kan forstås ved vellykket integration......Bidraget diskuterer de forskellige intergrationsopfattelse i Danmark - og hvad der kan forstås ved vellykket integration...

  11. Model-checking dense-time Duration Calculus

    DEFF Research Database (Denmark)

    Fränzle, Martin

    2004-01-01

    Since the seminal work of Zhou Chaochen, M. R. Hansen, and P. Sestoft on decidability of dense-time Duration Calculus [Zhou, Hansen, Sestoft, 1993] it is well-known that decidable fragments of Duration Calculus can only be obtained through withdrawal of much of the interesting vocabulary...... of this logic. While this was formerly taken as an indication that key-press verification of implementations with respect to elaborate Duration Calculus specifications were also impossible, we show that the model property is well decidable for realistic designs which feature natural constraints...... suitably sparser model classes we obtain model-checking procedures for rich subsets of Duration Calculus. Together with undecidability results also obtained, this sheds light upon the exact borderline between decidability and undecidability of Duration Calculi and related logics....

  12. Notification: Purchase Card and Convenience Check Audit

    Science.gov (United States)

    Project #OA-FY13-0116, April 11, 2013. The U.S. Environmental Protection Agency, Office of Inspector General, is beginning the fieldwork phase of its audit of the agency’s purchase card and convenience check programs.

  13. Classification and checking model of pedestrian crossing

    Directory of Open Access Journals (Sweden)

    Luis Delgado Méndez

    2012-11-01

    After realizing this investigation it can be confirmed that the functionality of a pedestrian crossing depends on almost a hundred parameters which must be checked or measured, in turn proving that this design and construction process is indeed complex.

  14. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  15. CMM Interim Check Design of Experiments (U)

    Energy Technology Data Exchange (ETDEWEB)

    Montano, Joshua Daniel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-07-29

    Coordinate Measuring Machines (CMM) are widely used in industry, throughout the Nuclear Weapons Complex and at Los Alamos National Laboratory (LANL) to verify part conformance to design definition. Calibration cycles for CMMs at LANL are predominantly one year in length and include a weekly interim check to reduce risk. The CMM interim check makes use of Renishaw’s Machine Checking Gauge which is an off-the-shelf product simulates a large sphere within a CMM’s measurement volume and allows for error estimation. As verification on the interim check process a design of experiments investigation was proposed to test a couple of key factors (location and inspector). The results from the two-factor factorial experiment proved that location influenced results more than the inspector or interaction.

  16. Financing Constraints and Entrepreneurship

    OpenAIRE

    William R. Kerr; Ramana Nanda

    2009-01-01

    Financing constraints are one of the biggest concerns impacting potential entrepreneurs around the world. Given the important role that entrepreneurship is believed to play in the process of economic growth, alleviating financing constraints for would-be entrepreneurs is also an important goal for policymakers worldwide. We review two major streams of research examining the relevance of financing constraints for entrepreneurship. We then introduce a framework that provides a unified perspecti...

  17. Temporal Concurrent Constraint Programming

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Valencia Posso, Frank Dan

    2002-01-01

    The ntcc calculus is a model of non-deterministic temporal concurrent constraint programming. In this paper we study behavioral notions for this calculus. In the underlying computational model, concurrent constraint processes are executed in discrete time intervals. The behavioral notions studied...... reflect the reactive interactions between concurrent constraint processes and their environment, as well as internal interactions between individual processes. Relationships between the suggested notions are studied, and they are all proved to be decidable for a substantial fragment of the calculus...

  18. Integrated batch production and maintenance scheduling for multiple items processed on a deteriorating machine to minimize total production and maintenance costs with due date constraint

    Directory of Open Access Journals (Sweden)

    Zahedi Zahedi

    2016-04-01

    Full Text Available This paper discusses an integrated model of batch production and maintenance scheduling on a deteriorating machine producing multiple items to be delivered at a common due date. The model describes the trade-off between total inventory cost and maintenance cost as the increase of production run length. The production run length is a time bucket between two consecutive preventive maintenance activities. The objective function of the model is to minimize total cost consisting of in process and completed part inventory costs, setup cost, preventive and corrective maintenance costs and rework cost. The problem is to determine the optimal production run length and to schedule the batches obtained from determining the production run length in order to minimize total cost.

  19. [Integrity].

    Science.gov (United States)

    Gómez Rodríguez, Rafael Ángel

    2014-01-01

    To say that someone possesses integrity is to claim that that person is almost predictable about responses to specific situations, that he or she can prudentially judge and to act correctly. There is a closed interrelationship between integrity and autonomy, and the autonomy rests on the deeper moral claim of all humans to integrity of the person. Integrity has two senses of significance for medical ethic: one sense refers to the integrity of the person in the bodily, psychosocial and intellectual elements; and in the second sense, the integrity is the virtue. Another facet of integrity of the person is la integrity of values we cherish and espouse. The physician must be a person of integrity if the integrity of the patient is to be safeguarded. The autonomy has reduced the violations in the past, but the character and virtues of the physician are the ultimate safeguard of autonomy of patient. A field very important in medicine is the scientific research. It is the character of the investigator that determines the moral quality of research. The problem arises when legitimate self-interests are replaced by selfish, particularly when human subjects are involved. The final safeguard of moral quality of research is the character and conscience of the investigator. Teaching must be relevant in the scientific field, but the most effective way to teach virtue ethics is through the example of the a respected scientist.

  20. Crustal-scale alpine tectonic evolution of the western Pyrenees - eastern Cantabrian Mountains (N Spain) from integration of structural data, low-T thermochronology and seismic constraint

    Science.gov (United States)

    DeFelipe, I.; Pedreira, D.; Pulgar, J. A.; Van der Beek, P.; Bernet, M.; Pik, R.

    2017-12-01

    The Pyrenean-Cantabrian Mountain belt extends in an E-W direction along the northern border of Spain and resulted from the convergence between the Iberian and European plates from the Late Cretaceous to the Miocene, in the context of the Alpine orogeny. The main aim of this work is to characterize the tectonic evolution at a crustal-scale of the transition zone from the Pyrenees to the Cantabrian Mountains, in the eastern Basque-Cantabrian Basin (BCB). We integrate structural work, thermochronology (apatite fission track and zircon (U-Th)/He) and geophysical information (shallow seismic reflection profiles, deep seismic refraction/wide-angle reflection profiles and seismicity distribution) to propose an evolutionary model since the Jurassic to the present. During the Albian, hyperextension related to the opening of the Bay of Biscay yielded to mantle unroofing to the base of the BCB. This process was favored by a detachment fault that connected the mantle in its footwall with the base of a deep basin in its hanging wall. During this process, the basin experienced HT metamorphism and fluid circulation caused the serpentinization of the upper part of the mantle. There is no evidence of seafloor mantle exhumation before the onset of the Alpine orogeny. The thermochronological study points to a N-vergent phase of contractional deformation in the late Eocene represented by the thin-skinned Leiza fault system followed in the early Oligocene by the S-vergent, thick-skinned, Ollín thrust. Exhumation rates for the late Eocene-early Oligocene are of 0.2-0.7 km/Myr. After that period, deformation continues southwards until the Miocene. The crustal-scale structure resultant of the Alpine orogeny consists of an Iberian plate that subducts below the European plate. The crust is segmented into four blocks separated by three S-vergent crustal faults inherited from the Cretaceous extensional period. The P-wave velocities in this transect show anomalous values (7.4 km/s) in the

  1. Temporal Concurrent Constraint Programming

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Palamidessi, Catuscia; Valencia, Frank Dan

    2002-01-01

    The ntcc calculus is a model of non-deterministic temporal concurrent constraint programming. In this paper we study behavioral notions for this calculus. In the underlying computational model, concurrent constraint processes are executed in discrete time intervals. The behavioral notions studied...

  2. Evaluating Distributed Timing Constraints

    DEFF Research Database (Denmark)

    Kristensen, C.H.; Drejer, N.

    1994-01-01

    In this paper we describe a solution to the problem of implementing time-optimal evaluation of timing constraints in distributed real-time systems.......In this paper we describe a solution to the problem of implementing time-optimal evaluation of timing constraints in distributed real-time systems....

  3. Theory of Constraints (TOC)

    DEFF Research Database (Denmark)

    Michelsen, Aage U.

    2004-01-01

    Tankegangen bag Theory of Constraints samt planlægningsprincippet Drum-Buffer-Rope. Endvidere skitse af The Thinking Process.......Tankegangen bag Theory of Constraints samt planlægningsprincippet Drum-Buffer-Rope. Endvidere skitse af The Thinking Process....

  4. Transient analysis for a system with a tilted disc check valve

    International Nuclear Information System (INIS)

    Jeung, Jaesik; Lee, Kyukwang; Cho, Daegwan

    2014-01-01

    Check valves are used to prevent reverse flow conditions in a variety of systems in nuclear power plants. When a check valve is closed by a reverse flow, the transient load can jeopardize the structural integrity on the piping system and its supports. It may also damage intended function of the in-line components even though the severity of the load differs and depends strongly on types of the check valves. To incorporate the transient load in the piping system, it is very important to properly predict the system response to transients such as a check valve closure accompanied by pump trip and to evaluate the system transient. The one-dimensional transient simulation codes such as the RELAP5/MOD3.3 and TRACE were used. There has not been a single model that integrates the two codes to handle the behavior of a tilted disc check valve, which is designed to mitigate check valve slams by shorting the travel of the disc. In this paper a model is presented to predict the dynamic motion of a tilted disc check valve in the transient simulation using the RELAP5/MOD3.3 code and the model is incorporated in a system transient analysis using control variables of the code. In addition, transient analysis for Essential Service Water (ESW) system is performed using the proposed model and the associated load is evaluated for the system. (author)

  5. Seismological Constraints on Geodynamics

    Science.gov (United States)

    Lomnitz, C.

    2004-12-01

    Earth is an open thermodynamic system radiating heat energy into space. A transition from geostatic earth models such as PREM to geodynamical models is needed. We discuss possible thermodynamic constraints on the variables that govern the distribution of forces and flows in the deep Earth. In this paper we assume that the temperature distribution is time-invariant, so that all flows vanish at steady state except for the heat flow Jq per unit area (Kuiken, 1994). Superscript 0 will refer to the steady state while x denotes the excited state of the system. We may write σ 0=(J{q}0ṡX{q}0)/T where Xq is the conjugate force corresponding to Jq, and σ is the rate of entropy production per unit volume. Consider now what happens after the occurrence of an earthquake at time t=0 and location (0,0,0). The earthquake introduces a stress drop Δ P(x,y,z) at all points of the system. Response flows are directed along the gradients toward the epicentral area, and the entropy production will increase with time as (Prigogine, 1947) σ x(t)=σ 0+α {1}/(t+β )+α {2}/(t+β )2+etc A seismological constraint on the parameters may be obtained from Omori's empirical relation N(t)=p/(t+q) where N(t) is the number of aftershocks at time t following the main shock. It may be assumed that p/q\\sim\\alpha_{1}/\\beta times a constant. Another useful constraint is the Mexican-hat geometry of the seismic transient as obtained e.g. from InSAR radar interferometry. For strike-slip events such as Landers the distribution of \\DeltaP is quadrantal, and an oval-shaped seismicity gap develops about the epicenter. A weak outer triggering maxiμm is found at a distance of about 17 fault lengths. Such patterns may be extracted from earthquake catalogs by statistical analysis (Lomnitz, 1996). Finally, the energy of the perturbation must be at least equal to the recovery energy. The total energy expended in an aftershock sequence can be found approximately by integrating the local contribution over

  6. The lithosphere architecture and geodynamic of the Middle and Lower Yangtze metallogenic belt in eastern China: constraints from integrated geophysical data

    Science.gov (United States)

    Lü, Qingtian; Shi, Danian; Jiang, Guoming; Dong, Shuwen

    2014-05-01

    The lithosphere structure and deep processes are keys to understanding mineral system and ore-forming processes. Lithosphere-scale process could create big footprints or signatures which can be observed by geophysics methods. SinoProbe has conducted an integrated deep exploration across middle and lower reaches of Yangtze Metallogenic Belt (YMB) in Eastern China, these included broadband seismic, reflection seismic, wide-angle reflection and magnetotellurics survey. Seismic reflection profiles and MT survey were also performed in Luzong, Tongling and Ningwu ore districts to construct 3D geological model. The resulting geophysical data provides new information which help to better understanding the lithosphere structure, geodynamic, deformation and heat and mass transportation that lead to the formation of the Metallogenic Belt. The major results are: (1) Lower velocity body at the top of upper mantle and a SE dipping high velocity body were imaged by teleseismic tomography beneath YMB; (2) Shear wave splitting results show NE parallel fast-wave polarization direction which parallel with tectonic lineament; (3) The reflection seismic data support the crustal-detachment model, the lower and upper crust was detached during contraction deformation near Tanlu fault and Ningwu volcanic basin; (4) Broadband and reflection seismic confirm the shallow Moho beneath YMB; (5) Strong correlation of lower crust reflectivity with magmatism; (6) The lower crust below Luzong Volcanics shows obvious reflective anisotropy both at the crust-mantle transition and the brittle-ductile transition in the crust. All these features suggest that introcontinental subduction, lithosphere delamination, mantle sources magmatic underplating, and MASH process are responsible for the formation of this Mesozoic metallogenic belt. Acknowledgment: We acknowledge the financial support of SinoProbe by the Ministry of Finance and Ministry of Land and Resources, P. R. China, under Grant sinoprobe-03, and

  7. Recent improvements in check valve monitoring methods

    International Nuclear Information System (INIS)

    Haynes, H.D.

    1990-01-01

    In support of the NRC Nuclear Plant Aging Research (NPAR) program, ORNL has carried out an evaluation of three check valve monitoring methods: acoustic emission, ultrasonic inspection, and magnetic flux signature analysis (MFSA). This work has focused on determining the capabilities of each method to provide diagnostic information useful in determining check valve aging and service wear effects (degradation) and undesirable operating modes. In addition, as part of the ORNL Advanced Diagnostic Engineering Research and Development Center (ADEC), two noval nonintrusive monitoring methods were developed (external ac- and dc-magnetic monitoring) that provide several improvements over the other methods. None of the examined methods could, by themselves, monitor the instantaneous position and motion of check valve internals and valve leakage; however, the combination of acoustic emission monitoring with one of the other methods provides the means to determine vital check valve operational information. This paper describes the benefits and limitations associated with each method and includes recent laboratory and field test data to illustrate the capabilities of these methods to detect simulated check valve degradation. 3 refs., 22 figs., 4 tabs

  8. Recent improvements in check valve monitoring methods

    International Nuclear Information System (INIS)

    Haynes, H.D.

    1991-01-01

    In support of the NRC Nuclear Plant Aging Research (NPAR) program, ORNL has carried out an evaluation of three check valve monitoring methods: acoustic emission, ultrasonic inspection, and magnetic flux signature analysis (MFSA). This work has focussed on determining the capabilities of each method to provide diagnostic information useful in determining check valve aging and service wear effects (degradation) and undesirable operating modes. In addition, as part of the ORNL Advanced Diagnostic Engineering Research and Development Center (ADEC), two novel nonintrusive monitoring methods were developed (external ac- and dc-magnetic monitoring) that provide several improvements over the other methods. None of the examined methods could, by themselves, monitor the instantaneous position and motion of check valve internals and valve leakage; however, the combination of acoustic emission monitoring with one of the other methods provides the means to determine vital check valve operational information. This paper describes the benefits and limitations associated with each method and includes recent laboratory and field test data to illustrate the capabilities of these methods to detect simulated check valve degradation. 3 refs., 22 figs., 4 tabs

  9. Cosmographic Constraints and Cosmic Fluids

    Directory of Open Access Journals (Sweden)

    Salvatore Capozziello

    2013-12-01

    Full Text Available The problem of reproducing dark energy effects is reviewed here with particular interest devoted to cosmography. We summarize some of the most relevant cosmological models, based on the assumption that the corresponding barotropic equations of state evolve as the universe expands, giving rise to the accelerated expansion. We describe in detail the ΛCDM (Λ-Cold Dark Matter and ωCDM models, considering also some specific examples, e.g., Chevallier–Polarsky–Linder, the Chaplygin gas and the Dvali–Gabadadze–Porrati cosmological model. Finally, we consider the cosmological consequences of f(R and f(T gravities and their impact on the framework of cosmography. Keeping these considerations in mind, we point out the model-independent procedure related to cosmography, showing how to match the series of cosmological observables to the free parameters of each model. We critically discuss the role played by cosmography, as a selection criterion to check whether a particular model passes or does not present cosmological constraints. In so doing, we find out cosmological bounds by fitting the luminosity distance expansion of the redshift, z, adopting the recent Union 2.1 dataset of supernovae, combined with the baryonic acoustic oscillation and the cosmic microwave background measurements. We perform cosmographic analyses, imposing different priors on the Hubble rate present value. In addition, we compare our results with recent PLANCK limits, showing that the ΛCDM and ωCDM models seem to be the favorite with respect to other dark energy models. However, we show that cosmographic constraints on f(R and f(T cannot discriminate between extensions of General Relativity and dark energy models, leading to a disadvantageous degeneracy problem.

  10. Automation of Geometry Input for Building Code Compliance Check

    DEFF Research Database (Denmark)

    Petrova, Ekaterina Aleksandrova; Johansen, Peter Lind; Jensen, Rasmus Lund

    2017-01-01

    Documentation of compliance with the energy performance regulations at the end of the detailed design phase is mandatory for building owners in Denmark. Therefore, besides multidisciplinary input, the building design process requires various iterative analyses, so that the optimal solutions can....... That has left the industry in constant pursuit of possibilities for integration of the tool within the Building Information Modelling environment so that the potential provided by the latter can be harvested and the processed can be optimized. This paper presents a solution for automated data extraction...... from building geometry created in Autodesk Revit and its translation to input for compliance check analysis....

  11. Constraint-based reachability

    Directory of Open Access Journals (Sweden)

    Arnaud Gotlieb

    2013-02-01

    Full Text Available Iterative imperative programs can be considered as infinite-state systems computing over possibly unbounded domains. Studying reachability in these systems is challenging as it requires to deal with an infinite number of states with standard backward or forward exploration strategies. An approach that we call Constraint-based reachability, is proposed to address reachability problems by exploring program states using a constraint model of the whole program. The keypoint of the approach is to interpret imperative constructions such as conditionals, loops, array and memory manipulations with the fundamental notion of constraint over a computational domain. By combining constraint filtering and abstraction techniques, Constraint-based reachability is able to solve reachability problems which are usually outside the scope of backward or forward exploration strategies. This paper proposes an interpretation of classical filtering consistencies used in Constraint Programming as abstract domain computations, and shows how this approach can be used to produce a constraint solver that efficiently generates solutions for reachability problems that are unsolvable by other approaches.

  12. Quality checking of radioactive and hazardous waste

    International Nuclear Information System (INIS)

    Billington, D.M.; Burgoyne, S.M.J.; Dale, C.J.

    1992-01-01

    This report describes the work of the HMIP Waste Quality Checking Laboratory (WQCL) for the period September 1989 -August 1991. The WQCL has conducted research and development of procedures for the receipt, sampling and analysis of low level solid radioactive waste (LLW), intermediate level radioactive waste (ILW) and hazardous chemical waste (HW). Operational facilities have been commissioned for quality checking both LLW and HW. Waste quality checking has been completed on LLW packages seized from the UK waste disposal route by HMIP Inspectors. Packages have ranged in size from the 200 litre steel drum to half-height ISO freight container. Development work was continued on methods of sample extraction and radio-chemical analysis for cement encapsulated ILW in the form of magnox, graphite and stainless steel. This work was undertaken on non-radioactive simulants. (author)

  13. Glovebox pressure relief and check valve

    International Nuclear Information System (INIS)

    Blaedel, K.L.

    1986-01-01

    This device is a combined pressure relief valve and check valve providing overpressure protection and preventing back flow into an inert atmosphere enclosure. The pressure relief is embodied by a submerged vent line in a mercury reservior, the releif pressure being a function of the submerged depth. The pressure relief can be vented into an exhaust system and the relieving pressure is only slightly influenced by the varying pressure in the exhaust system. The check valve is embodied by a ball which floats on the mercury column and contacts a seat whenever vacuum exists within the glovebox enclosure. Alternatively, the check valve is embodied by a vertical column of mercury, the maximum back pressure being a function of the height of the column of mercury

  14. Glovebox pressure relief and check valve

    Energy Technology Data Exchange (ETDEWEB)

    Blaedel, K.L.

    1986-03-17

    This device is a combined pressure relief valve and check valve providing overpressure protection and preventing back flow into an inert atmosphere enclosure. The pressure relief is embodied by a submerged vent line in a mercury reservior, the releif pressure being a function of the submerged depth. The pressure relief can be vented into an exhaust system and the relieving pressure is only slightly influenced by the varying pressure in the exhaust system. The check valve is embodied by a ball which floats on the mercury column and contacts a seat whenever vacuum exists within the glovebox enclosure. Alternatively, the check valve is embodied by a vertical column of mercury, the maximum back pressure being a function of the height of the column of mercury.

  15. UTP and Temporal Logic Model Checking

    Science.gov (United States)

    Anderson, Hugh; Ciobanu, Gabriel; Freitas, Leo

    In this paper we give an additional perspective to the formal verification of programs through temporal logic model checking, which uses Hoare and He Unifying Theories of Programming (UTP). Our perspective emphasizes the use of UTP designs, an alphabetised relational calculus expressed as a pre/post condition pair of relations, to verify state or temporal assertions about programs. The temporal model checking relation is derived from a satisfaction relation between the model and its properties. The contribution of this paper is that it shows a UTP perspective to temporal logic model checking. The approach includes the notion of efficiency found in traditional model checkers, which reduced a state explosion problem through the use of efficient data structures

  16. UK Department of Environment Quality Checking Laboratory

    International Nuclear Information System (INIS)

    Burgoyne, K.E.; Green, T.H.; Maxwell, D.J.; Smith, D.L.G.

    1990-01-01

    The purpose of Taywood Engineering Ltd was to develop and evaluate techniques for the non-destructive and destructive examination of both low and intermediate level radioactive waste packages. The contract also included a study on the conceptual design and cost of a permanent Waste Quality Checking facility. The June 1986 contract was completed in November 1989. A second contract was awarded in September 1989 to extend the scope to include Quality Checking of hazardous waste and to increase the throughput of low level waste. This paper highlights the techniques developed during these programmes and applied to a range of real low level waste packages. The feasibility of operating a pilot scale facility for the independent Quality Checking of LLW has been successfully demonstrated. (orig.)

  17. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  18. Consistency Checking of Web Service Contracts

    DEFF Research Database (Denmark)

    Cambronero, M. Emilia; Okika, Joseph C.; Ravn, Anders Peter

    2008-01-01

    Behavioural properties are analyzed for web service contracts formulated in Business Process Execution Language (BPEL) and Choreography Description Language (CDL). The key result reported is an automated technique to check consistency between protocol aspects of the contracts. The contracts...... are abstracted to (timed) automata and from there a simulation is set up, which is checked using automated tools for analyzing networks of finite state processes. Here we use the Concurrency Work Bench. The proposed techniques are illustrated with a case study that include otherwise difficult to analyze fault...

  19. A Method for Model Checking Feature Interactions

    DEFF Research Database (Denmark)

    Pedersen, Thomas; Le Guilly, Thibaut; Ravn, Anders Peter

    2015-01-01

    This paper presents a method to check for feature interactions in a system assembled from independently developed concurrent processes as found in many reactive systems. The method combines and refines existing definitions and adds a set of activities. The activities describe how to populate the ...... the definitions with models to ensure that all interactions are captured. The method is illustrated on a home automation example with model checking as analysis tool. In particular, the modelling formalism is timed automata and the analysis uses UPPAAL to find interactions....

  20. Acoustic emission testing of piston check valves

    International Nuclear Information System (INIS)

    Stewart, D.L.

    1994-01-01

    Based on test experience at Comanche Peak Unit 1, an acoustic emission data evaluation matrix for piston check valves has been developed. The degradations represented in this matrix were selected based on Edwards piston check valve failure data reported in the Nuclear Plant Reliability Data System. Evidence to support this matrix was collected from site test data on a variety of valve types. Although still under refinement, the matrix provides three major attributes for closure verification, which have proven useful in developing test procedures for inservice testing and preventing unnecessary disassembly

  1. Implementing Check in/Check out for Students with Intellectual Disability in Self-Contained Classrooms

    Science.gov (United States)

    Boden, Lauren J.; Ennis, Robin P.; Jolivette, Kristine

    2012-01-01

    Check in/check out (CICO) is a secondary-tier intervention implemented within the framework of schoolwide positive behavior interventions and supports (SWPBIS) that uses school-based contingencies to encourage positive behavior. CICO is a five-step cycle which uses daily progress report cards (DPR) to monitor progress toward schoolwide or…

  2. Can i just check...? Effects of edit check questions on measurement error and survey estimates

    NARCIS (Netherlands)

    Lugtig, Peter; Jäckle, Annette

    2014-01-01

    Household income is difficult to measure, since it requires the collection of information about all potential income sources for each member of a household.Weassess the effects of two types of edit check questions on measurement error and survey estimates: within-wave edit checks use responses to

  3. Check In / Check Out. The Public Space as an Internet of Things

    NARCIS (Netherlands)

    van t Hof, C.C.G.; van Est, R.; Daemen, F.

    2011-01-01

    Mobile phones, public transport smart cards, security cameras and GPS systems in our car - we are surrounded by digital devices. They track us, guide us, help us, and control us. The book Check In / Check Out. The Public Space as an Internet of Things shows us how our digital and physical worlds are

  4. Check in / check out : the public space as an internet of things

    NARCIS (Netherlands)

    Hof, van 't C.; Est, van R.; Daemen, F.

    2011-01-01

    Mobile phones, public transport smart cards, security cameras and GPS systems in our car - we are surrounded by digital devices. They track us, guide us, help us, and control us. The book Check In / Check Out. The Public Space as an Internet of Things shows us how our digital and physical worlds are

  5. What is a good health check? An interview study of health check providers' views and practices.

    Science.gov (United States)

    Stol, Yrrah H; Asscher, Eva C A; Schermer, Maartje H N

    2017-10-02

    Health checks identify (risk factors for) disease in people without symptoms. They may be offered by the government through population screenings and by other providers to individual users as 'personal health checks'. Health check providers' perspective of 'good' health checks may further the debate on the ethical evaluation and possible regulation of these personal health checks. In 2015, we interviewed twenty Dutch health check providers on criteria for 'good' health checks, and the role these criteria play in their practices. Providers unanimously formulate a number of minimal criteria: Checks must focus on (risk factors for) treatable/preventable disease; Tests must be reliable and clinically valid; Participation must be informed and voluntary; Checks should provide more benefits than harms; Governmental screenings should be cost-effective. Aspirational criteria mentioned were: Follow-up care should be provided; Providers should be skilled and experienced professionals that put the benefit of (potential) users first; Providers should take time and attention. Some criteria were contested: People should be free to test on any (risk factor for) disease; Health checks should only be performed in people at high risk for disease that are likely to implement health advice; Follow up care of privately funded tests should not drain on collective resources. Providers do not always fulfil their own criteria. Their reasons reveal conflicts between criteria, conflicts between criteria and other ethical values, and point to components in the (Dutch) organisation of health care that hinder an ethical provision of health checks. Moreover, providers consider informed consent a criterion that is hard to establish in practice. According to providers, personal health checks should meet the same criteria as population screenings, with the exception of cost-effectiveness. Providers do not always fulfil their own criteria. Results indicate that in thinking about the ethics of health

  6. Resources, constraints and capabilities

    NARCIS (Netherlands)

    Dhondt, S.; Oeij, P.R.A.; Schröder, A.

    2018-01-01

    Human and financial resources as well as organisational capabilities are needed to overcome the manifold constraints social innovators are facing. To unlock the potential of social innovation for the whole society new (social) innovation friendly environments and new governance structures

  7. Design with Nonlinear Constraints

    KAUST Repository

    Tang, Chengcheng

    2015-01-01

    . The first application is the design of meshes under both geometric and static constraints, including self-supporting polyhedral meshes that are not height fields. Then, with a formulation bridging mesh based and spline based representations, the application

  8. Dynamics and causality constraints

    International Nuclear Information System (INIS)

    Sousa, Manoelito M. de

    2001-04-01

    The physical meaning and the geometrical interpretation of causality implementation in classical field theories are discussed. Causality in field theory are kinematical constraints dynamically implemented via solutions of the field equation, but in a limit of zero-distance from the field sources part of these constraints carries a dynamical content that explains old problems of classical electrodynamics away with deep implications to the nature of physicals interactions. (author)

  9. Type checking by domain analysis in Ampersand

    NARCIS (Netherlands)

    Joosten, S.M.M.; Joosten, S.J.C.; Kahl, W.; Winter, M.; Oliveira, J.N.

    2015-01-01

    In the process of incorporating subtyping in relation algebra, an algorithm was found to derive the subtyping relation from the program to be checked. By using domain analysis rather than type inference, this algorithm offers an attractive visualization of the type derivation process. This

  10. Inkjet 3D printed check microvalve

    International Nuclear Information System (INIS)

    Walczak, Rafał; Adamski, Krzysztof; Lizanets, Danylo

    2017-01-01

    3D printing enables fast and relatively easy fabrication of various microfluidic structures including microvalves. A check microvalve is the simplest valve enabling control of the fluid flow in microchannels. Proper operation of the check valve is ensured by a movable element that tightens the valve seat during backward flow and enables free flow for forward pressure. Thus, knowledge of the mechanical properties of the movable element is crucial for optimal design and operation of the valve. In this paper, we present for the first time the results of investigations on basic mechanical properties of the building material used in multijet 3D printing. Specified mechanical properties were used in the design and fabrication of two types of check microvalve—with deflecting or hinge-fixed microflap—with 200 µ m and 300 µ m thickness. Results of numerical simulation and experimental data of the microflap deflection were obtained and compared. The valves were successfully 3D printed and characterised. Opening/closing characteristics of the microvalve for forward and backward pressures were determined. Thus, proper operation of the check microvalve so developed was confirmed. (technical note)

  11. Statistical Model Checking for Biological Systems

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel

    2014-01-01

    Statistical Model Checking (SMC) is a highly scalable simulation-based verification approach for testing and estimating the probability that a stochastic system satisfies a given linear temporal property. The technique has been applied to (discrete and continuous time) Markov chains, stochastic...

  12. Separation of Powers: Checks and Balances.

    Science.gov (United States)

    Taylor, Bonnie

    1988-01-01

    This article offers a class activity on separation of powers and checks and balances within the U.S. government. Based on Franklin Delano Roosevelt's attempt to push through legislation for the New Deal of the 1930s by "packing" the U.S. Supreme Court, the activity includes worksheets and teaching suggestions. (JDH)

  13. Political and judicial checks on corruption

    DEFF Research Database (Denmark)

    Alt, James E.; Lassen, David Dreyer

    2008-01-01

    This paper investigates the effects of checks and balances on corruption. Within a presidential system, effective separation of powers is achieved under a divided government, with the executive and legislative branches being controlled by different political parties. When government is unified...

  14. Functional check of telescoping transfer pumps

    International Nuclear Information System (INIS)

    Sharpe, C.L.

    1994-01-01

    Activities are defined which constitute a functional check of a telescoping transfer pump (TTP). This report is written to the Procedures group of HLW and particularly applies to those TTP's which are the sole means of emergency transfer from a HLW waste tank

  15. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  16. Model Checking - Automated Verification of Computational Systems

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 14; Issue 7. Model Checking - Automated Verification of Computational Systems. Madhavan Mukund. General Article Volume 14 Issue 7 July 2009 pp 667-681. Fulltext. Click here to view fulltext PDF. Permanent link:

  17. checkCIF/PLATON report Datablock: Sm

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  18. checkCIF/PLATON report Datablock: neu

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  19. checkCIF/PLATON report Datablock: shelxl

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  20. checkCIF/PLATON report Datablock: 6

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  1. checkCIF/PLATON report Datablock: 1

    Indian Academy of Sciences (India)

    (Positive) Residual Density 13.61 eA-3. PLAT201_ALERT_2_B Isotropic non-H Atoms in Main Residue(s) . ... Weight Differ by .. 4.99 Check. PLAT094_ALERT_2_C Ratio of Maximum / Minimum Residual Density . ... 9 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 20 ALERT type 2 Indicator that ...

  2. Regular Check-Ups Are Important

    Science.gov (United States)

    ... Attack Wear Red for Heart Health Tools for Pregnant Women, New Moms, Women Considering Pregnancy Be a Healthy ... your community (i.e. a faith-based setting, workplace, school, or civic group) ... screening on National Women’s Check-Up Day (the day after Mother’s Day ...

  3. checkCIF/PLATON report Datablock: 2

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  4. checkCIF/PLATON report Datablock: sm

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  5. Type Checking with XML Schema in XACT

    DEFF Research Database (Denmark)

    Kirkegaard, Christian; Møller, Anders

    to support XML Schema as type formalism. The technique is able to model advanced features, such as type derivations and overloaded local element declarations, and also datatypes of attribute values and character data. Moreover, we introduce optional type annotations to improve modularity of the type checking...

  6. checkCIF/PLATON report Datablock: I

    Indian Academy of Sciences (India)

    The relevant atom site should be identified. STRVA01_ALERT_4_C. Flack test results are ambiguous. ... 7 ALERT type 3 Indicator that the structure quality may be low. 5 ALERT type 4 Improvement, methodology, query or ... paper, to upload your CIF via our web site. PLATON version of 20/08/2014; check.def file version of ...

  7. checkCIF/PLATON report Datablock: shelxl

    Indian Academy of Sciences (India)

    6 ALERT level G = General information/check it is not something unexpected. 1 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 15 ALERT type 2 Indicator that the structure model may be wrong or deficient. 9 ALERT type 3 Indicator that the structure quality may be low. 1 ALERT type 4 Improvement, ...

  8. checkCIF/PLATON report Datablock: shelx

    Indian Academy of Sciences (India)

    7 ALERT level G = General information/check it is not something unexpected. 0 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 3 ALERT type 2 Indicator that the structure ... However, the purpose of your study may justify the reported deviations and the more serious of these should normally be ...

  9. checkCIF/PLATON report Datablock: 1

    Indian Academy of Sciences (India)

    6 ALERT level G = General information/check it is not something unexpected. 2 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 8 ALERT type 2 Indicator that the structure ... However, the purpose of your study may justify the reported deviations and the more serious of these should normally be ...

  10. checkCIF/PLATON report Datablock: 3

    Indian Academy of Sciences (India)

    5 ALERT level G = General information/check it is not something unexpected. 5 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 15 ALERT type 2 Indicator that the structure ... However, the purpose of your study may justify the reported deviations and the more serious of these should normally be ...

  11. checkCIF/PLATON report Datablock: 3

    Indian Academy of Sciences (India)

    5 ALERT level G = General information/check it is not something unexpected. 0 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 3 ALERT type 2 Indicator that the structure ... However, the purpose of your study may justify the reported deviations and the more serious of these should normally be ...

  12. checkCIF/PLATON report Datablock: shelxl

    Indian Academy of Sciences (India)

    6 ALERT level G = General information/check it is not something unexpected. 0 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 4 ALERT type 2 Indicator that the structure ... However, the purpose of your study may justify the reported deviations and the more serious of these should normally be ...

  13. Slicing AADL specifications for model checking

    NARCIS (Netherlands)

    Odenbrett, M.R.; Nguyen, V.Y.; Noll, T.

    2010-01-01

    To combat the state-space explosion problem in model checking larger systems, abstraction techniques can be employed. Here, methods that operate on the system specification before constructing its state space are preferable to those that try to minimize the resulting transition system as they

  14. Blood Pressure Matters: Keep Hypertension in Check

    Science.gov (United States)

    ... 2016 Print this issue Blood Pressure Matters Keep Hypertension in Check En español Send us your comments ... 1 in 3 adults in the U.S. has high blood pressure, but many don’t realize it. High blood ...

  15. Momentum constraint relaxation

    International Nuclear Information System (INIS)

    Marronetti, Pedro

    2006-01-01

    Full relativistic simulations in three dimensions invariably develop runaway modes that grow exponentially and are accompanied by violations of the Hamiltonian and momentum constraints. Recently, we introduced a numerical method (Hamiltonian relaxation) that greatly reduces the Hamiltonian constraint violation and helps improve the quality of the numerical model. We present here a method that controls the violation of the momentum constraint. The method is based on the addition of a longitudinal component to the traceless extrinsic curvature A ij -tilde, generated by a vector potential w i , as outlined by York. The components of w i are relaxed to solve approximately the momentum constraint equations, slowly pushing the evolution towards the space of solutions of the constraint equations. We test this method with simulations of binary neutron stars in circular orbits and show that it effectively controls the growth of the aforementioned violations. We also show that a full numerical enforcement of the constraints, as opposed to the gentle correction of the momentum relaxation scheme, results in the development of instabilities that stop the runs shortly

  16. Selection of new constraints

    International Nuclear Information System (INIS)

    Sugier, A.

    2003-01-01

    The selected new constraints should be consistent with the scale of concern i.e. be expressed roughly as fractions or multiples of the average annual background. They should take into account risk considerations and include the values of the currents limits, constraints and other action levels. The recommendation is to select four leading values for the new constraints: 500 mSv ( single event or in a decade) as a maximum value, 0.01 mSv/year as a minimum value; and two intermediate values: 20 mSv/year and 0.3 mSv/year. This new set of dose constraints, representing basic minimum standards of protection for the individuals taking into account the specificity of the exposure situations are thus coherent with the current values which can be found in ICRP Publications. A few warning need however to be noticed: There is no more multi sources limit set by ICRP. The coherence between the proposed value of dose constraint (20 mSv/year) and the current occupational dose limit of 20 mSv/year is valid only if the workers are exposed to one single source. When there is more than one source, it will be necessary to apportion. The value of 1000 mSv lifetimes used for relocation can be expressed into annual dose, which gives approximately 10 mSv/year and is coherent with the proposed dose constraint. (N.C.)

  17. Constraints of behavioural inheritance

    NARCIS (Netherlands)

    Roubtsova, E.E.; Roubtsov, S.A.; Oquendo, F.; Warboys, B.; Morrison, R.

    2004-01-01

    We present an approach to component inheritance and reuse which closes the gap between architectural design and process-oriented approaches. To apply inheritance checks in design and verification of a system, one should consider an inheritance relation as a property of the system and specify it as

  18. Integrating Relational Databases and Constraint Languages

    DEFF Research Database (Denmark)

    Hansen, Michael Reichhardt; Hansen, Bo S.; Lucas, Peter

    1989-01-01

    A new structure of application programs is suggested, which separates the algorithmic parts from factual information (data and rules). The latter is to be stored in a repository that can be shared among multiple applications. It is argued that rules stating pure relations are better suited...... for sharing among different applications than procedural or functional rules because these latter rules always determine inputs and outputs.To support such a repository, an extended relational algebra is explored. This algebra serves as the semantic model for a proposed rules language and is the basis...

  19. 31 CFR 248.6 - Recovery of original check.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Recovery of original check. 248.6... § 248.6 Recovery of original check. (a) If the claimant recovers an original check after he has... or agency concerned regarding the negotiability of such original check. (b) In the event the...

  20. Formal Constraints on Memory Management for Composite Overloaded Operations

    Directory of Open Access Journals (Sweden)

    Damian W.I. Rouson

    2006-01-01

    Full Text Available The memory management rules for abstract data type calculus presented by Rouson, Morris & Xu [15] are recast as formal statements in the Object Constraint Language (OCL and applied to the design of a thermal energy equation solver. One set of constraints eliminates memory leaks observed in composite overloaded expressions with three current Fortran 95/2003 compilers. A second set of constraints ensures economical memory recycling. The constraints are preconditions, postconditions and invariants on overloaded operators and the objects they receive and return. It is demonstrated that systematic run-time assertion checking inspired by the formal constraints facilitated the pinpointing of an exceptionally hard-to-reproduce compiler bug. It is further demonstrated that the interplay between OCL's modeling capabilities and Fortran's programming capabilities led to a conceptual breakthrough that greatly improved the readability of our code by facilitating operator overloading. The advantages and disadvantages of our memory management rules are discussed in light of other published solutions [11,19]. Finally, it is demonstrated that the run-time assertion checking has a negligible impact on performance.

  1. Study of check image using computed radiography

    International Nuclear Information System (INIS)

    Sato, Hiroshi

    2002-01-01

    There are two image forming methods both a check image and a portal image in the linacogram. It has been established the image forming method in the check image using computed radiography (CR). On the other hand, it is not established the image forming method in the portal image using CR yet. Usually, in the electric portal imaging device (EPID) is mainly used just before radiotherapy start. The usefulness of the portal image forming method by CR using in place of EPID is possible to confirm the precision for determining to specific position at the irradiate part and to the irradiate method for the human organs. There are some technical problems that, since in the early time, the linac graphy (LG) image have low resolution power. In order to improve to the resolution power in LG image, CR image technologies have been introduced to the check image forming method. Heavy metallic sheet (HMS) is used to the front side of CR-IP cassette, and high contactness sponge is used to the back side of the cassette. Improved contactness between HMS and imaging plate (IP) by means of the high contactness sponge contributed to improve the resolution power in the check images. A lot of paper which is connected with these information have been reported. Imaging plate ST-III should be used to maintain high sensitivity in the check film image forming method. The same image forming method in the check image established by CR has been introduced into the portal image forming method in order to improve the resolution power. However, as a result, it couldn't acquired high resolution image forming in the portal images because of the combination of ST-III and radiotherapy dose. After several trials, it has been recognized that HR-V imaging plate for mammography is the most useful application to maintain high resolution power in the portal images. Also, it is possible to modify the image quality by changing GS parameter which is one of image processing parameters in CR. Furthermore, in case

  2. The MarCon Algorithm: A Systematic Market Approach to Distributed Constraint Problems

    National Research Council Canada - National Science Library

    Parunak, H. Van Dyke

    1998-01-01

    .... Each variable integrates this information from the constraints interested in it and provides feedback that enables the constraints to shrink their sets of assignments until they converge on a solution...

  3. Model Checking the Remote Agent Planner

    Science.gov (United States)

    Khatib, Lina; Muscettola, Nicola; Havelund, Klaus; Norvig, Peter (Technical Monitor)

    2001-01-01

    This work tackles the problem of using Model Checking for the purpose of verifying the HSTS (Scheduling Testbed System) planning system. HSTS is the planner and scheduler of the remote agent autonomous control system deployed in Deep Space One (DS1). Model Checking allows for the verification of domain models as well as planning entries. We have chosen the real-time model checker UPPAAL for this work. We start by motivating our work in the introduction. Then we give a brief description of HSTS and UPPAAL. After that, we give a sketch for the mapping of HSTS models into UPPAAL and we present samples of plan model properties one may want to verify.

  4. Occupational dose constraint

    International Nuclear Information System (INIS)

    Heilbron Filho, Paulo Fernando Lavalle; Xavier, Ana Maria

    2005-01-01

    The revision process of the international radiological protection regulations has resulted in the adoption of new concepts, such as practice, intervention, avoidable and restriction of dose (dose constraint). The latter deserving of special mention since it may involve reducing a priori of the dose limits established both for the public and to individuals occupationally exposed, values that can be further reduced, depending on the application of the principle of optimization. This article aims to present, with clarity, from the criteria adopted to define dose constraint values to the public, a methodology to establish the dose constraint values for occupationally exposed individuals, as well as an example of the application of this methodology to the practice of industrial radiography

  5. Psychological constraints on egalitarianism

    DEFF Research Database (Denmark)

    Kasperbauer, Tyler Joshua

    2015-01-01

    processes motivating people to resist various aspects of egalitarianism. I argue for two theses, one normative and one descriptive. The normative thesis holds that egalitarians must take psychological constraints into account when constructing egalitarian ideals. I draw from non-ideal theories in political...... philosophy, which aim to construct moral goals with current social and political constraints in mind, to argue that human psychology must be part of a non-ideal theory of egalitarianism. The descriptive thesis holds that the most fundamental psychological challenge to egalitarian ideals comes from what......Debates over egalitarianism for the most part are not concerned with constraints on achieving an egalitarian society, beyond discussions of the deficiencies of egalitarian theory itself. This paper looks beyond objections to egalitarianism as such and investigates the relevant psychological...

  6. Perencanaan Check Damsungai Lebugini Kabupatenkudus, Jawa Tengah

    OpenAIRE

    Amirullah, Fikri; Nalendro, Raditya; Wahyuni, Sri Eko; Salamun, Salamun

    2014-01-01

    Lebugini River is the branch of Juanariverswhich is under the authority of the Central River Region Pemali - Juana, precisely located in the administrative area of the Kudus District. The location, which is on the upstream,causes degradation of the river channel, thus, to stabilize the river channel, the local Goverment should have a plan to build the conservation building. The dataused for the planning of check dam areprimary data (geotechnical data, the geometry of Lebugini river, and also ...

  7. Perencanaan Check Dam Sungai Dawe Kudus

    OpenAIRE

    Mustaanah, Adibatul; Pinandoyo, Nur; Sugiyanto, Sugiyanto; Wahyuni, Sri Eko

    2013-01-01

    Juana river's located in two administrative regions Kudus and Pati had superficial. This is because the slope of the river is quite gentle and the level of environmental degradation in the watershed (DAS) Juana river's have increased. Based on these conditions, it is necessary to plan the construction of sediment control (check dams) to reduce sedimentation along the river and optimize the function of the Juana river's. Planning is performed on Dawe river's ,the branch of Juana river's. From ...

  8. Implementing a Self- Checking PROFIBUS Slave

    OpenAIRE

    Krug, Margrit R.; Lubaszewski, Marcelo S.; Ferreira, Jose M.; Alves, Gustavo R.

    2000-01-01

    This work presents the study and preliminary results of the high level implementation of a self-checking Profibus slave. From an existing VHDL description of the device, a test strategy was studied and implemented, so that the whole circuit has embedded test structures capable to perform at-speed test of the slave. In this paper, we show the used test strategies and implementation results achieved from a synthesis process in a FPGA environment. info:eu-repo/semantics/publishedVersion

  9. checkCIF/PLATON report Datablock: platon

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. Structure factors have been supplied for datablock(s) platon. No syntax errors found. CIF dictionary Interpreting this report. Datablock: platon. Bond precision: C-C = 0.0033 A. Wavelength=0.71073. Cell: a=16.345(7) b=6.288(3) c=19.938(8) alpha=90 beta=96.169(7) gamma=90. Temperature:.

  10. Photogrammetric approach to automated checking of DTMs

    DEFF Research Database (Denmark)

    Potucková, Marketa

    2005-01-01

    Geometrically accurate digital terrain models (DTMs) are essential for orthoimage production and many other applications. Collecting reference data or visual inspection are reliable but time consuming and therefore expensive methods for finding errors in DTMs. In this paper, a photogrammetric...... approach to automated checking and improving of DTMs is evaluated. Corresponding points in two overlapping orthoimages are found by means of area based matching. Provided the image orientation is correct, discovered displacements correspond to DTM errors. Improvements of the method regarding its...

  11. Speed checks on the CERN site

    CERN Multimedia

    2007-01-01

    In view of the significant number of speeding incidents that have been reported, CERN will shortly start to carry out speed checks on the site. The radar used for this purpose will show drivers the speed measured. The disciplinary measures taken against those exceeding the authorised limit (generally 50 k.p.h.) will include a ban from driving on the site for a minimum of one month. Maximilian Metzger
Secretary-General

  12. Application of 125I in micropipettor check

    International Nuclear Information System (INIS)

    Qian Xiaoyu; Gao Yunchao; Yang Yadong; Lu Hankui

    2006-01-01

    Gravimetric test is one of authoritative methods for the measurement and validation of the accuracy and precision of micropipettors. The feasibility of radioactive measurement in the check of micropipettors is studied. There are no significant difference in radioactive count rates of 125 I aspirated between 2 qualified micropipettors, but significant difference are recorded between qualified and unqualified micropipettors. So 125 I radiometry agrees with gravimetric tests, and can be used as a laboratory constant test of micropipettors. (authors)

  13. Delivery quality assurance with ArcCHECK

    International Nuclear Information System (INIS)

    Neilson, Christopher; Klein, Michael; Barnett, Rob; Yartsev, Slav

    2013-01-01

    Radiation therapy requires delivery quality assurance (DQA) to ensure that treatment is accurate and closely follows the plan. We report our experience with the ArcCHECK phantom and investigate its potential optimization for the DQA process. One-hundred seventy DQA plans from 84 patients were studied. Plans were classified into 2 groups: those with the target situated on the diodes of the ArcCHECK (D plans) and those with the target situated at the center (C plans). Gamma pass rates for 8 target sites were examined. The parameters used to analyze the data included 3%/3 mm with the Van Dyk percent difference criteria (VD) on, 3%/3 mm with the VD off, 2%/2 mm with the VD on, and x/3 mm with the VD on and the percentage dosimetric agreement “x” for diode plans adjusted. D plans typically displayed maximum planned dose (MPD) on the cylindrical surface containing ArcCHECK diodes than center plans, resulting in inflated gamma pass rates. When this was taken into account by adjusting the percentage dosimetric agreement, C plans outperformed D plans by an average of 3.5%. ArcCHECK can streamline the DQA process, consuming less time and resources than radiographic films. It is unnecessary to generate 2 DQA plans for each patient; a single center plan will suffice. Six of 8 target sites consistently displayed pass rates well within our acceptance criteria; the lesser performance of head and neck and spinal sites can be attributed to marginally lower doses and increased high gradient of plans

  14. Radiation systems for luggage and parcel checks

    International Nuclear Information System (INIS)

    Honomichl, V.

    1989-01-01

    The current radioscopic systems of luggage check in air traffic are based on the principle of intensifying the brightness of half-tone images on the fluorescent screen of an image intensifier, or use of very sensitive pick-up tubes with digital image processing. Computers are used for signal processing and the image is produced on a display unit. Sources of continuous or pulse X-ray radiation are used. The signals from the detector are amplified, converted and stored in a buffer and then displayed. The scanning systems use a narrow beam or, to improve rapidity and sensitivity of scanning, a sector beam of radiation. Equipment is described from Heinemann (FRG) featuring a band of 576 or 768 detectors and microprocessor controlled semiconductor tv cameras. Characteristics are also presented of equipment from Aeradio Ltd (U.K.) and Philips (FRG) companies. Attention is devoted to equipment from American Science and Engineering (U.S.) showing high quality imaging even at low radiation doses. Briefly described are portable check systems for inspection of small luggage and parcels. Characteristics are presented of systems for checking vehicles and containers in naval, air, rail and road transport. The principles and performance are described of the systems. (J.B.). 4 figs

  15. The Activity Check of Brachytherapy Isotope

    International Nuclear Information System (INIS)

    Kim, Gun Oh; Lee, Byung Koo; Kwon, Young Ho

    2004-01-01

    An isotope Ir-192, which is used in brachytherapy depends on import in whole quantities. There are a few ways for its activity. measurement using Welltype chamber or the way to rely on authentic decay table of manufacturer. In-air dosimetry using Farmer Chamber, etc. In this paper, let me introduce the way using Farmer chamber which is easier and simple. With the Farmer chamber and source calibration jig, take a measurement the activity of an isotope Ir-192 and compare the value with the value from decay table of manufacturer and check the activity of source. The result of measurement, compared the value from decay table, by ±2.1. (which belongs to recommendable value for AAPM ±5% as difference of error range). It is possible to use on clinical medicine. With the increase in use of brachytherapy, the increase of import is essential. And an accurate activity check of source is compulsory. For the activity check of source, it was possible to use Farmer chamber and source calibration jig without additional purchase of Well type chamber.

  16. [Pre-verbality in focusing and the need for self check. An attempt at "focusing check"].

    Science.gov (United States)

    Masui, T; Ikemi, A; Murayama, S

    1983-06-01

    Though the Focusing process is not entirely non-verbal, in Focusing, careful attention is paid by the Focuser and the Listener to the pre-verbal experiential process. In other words, Focusing involves attending to the felt sense that is not easily expressed in words immediately. Hence, during the process of learning to Focus, the Focusing teacher attempts to communicate the experiences of Focusing to the student which are not easily done by words. Due to such difficulties, the Focusing student may (and quite frequently does) mistake the experiential process in Focusing with other processes. Often, the felt sense can be confused with other phenomena such as "autogenic discharge". Also the Focuser may not stay with the felt sense and drift into "free association" or frequently, certain processes in "meditation" can be confused with Focusing. Therefore, there is a need for a "check" by which the Focusing student can confirm the Focusing experience for himself. For the Focusing student, such a "check" serves not only to confirm the Focusing process, but also an aid to learning Focusing. We will report here a "Focusing Check" which we developed by translating Eugene Gendlin's "Focusing Check" and making several modifications in it so that it will be more understandable to the Japanese. Along with the "Focusing Check" we developed, the authors discuss the need for such a check.

  17. Statistical Model Checking for Product Lines

    DEFF Research Database (Denmark)

    ter Beek, Maurice H.; Legay, Axel; Lluch Lafuente, Alberto

    2016-01-01

    average cost of products (in terms of the attributes of the products’ features) and the probability of features to be (un)installed at runtime. The product lines must be modelled in QFLan, which extends the probabilistic feature-oriented language PFLan with novel quantitative constraints among features...

  18. 'Integration'

    DEFF Research Database (Denmark)

    Olwig, Karen Fog

    2011-01-01

    , while the countries have adopted disparate policies and ideologies, differences in the actual treatment and attitudes towards immigrants and refugees in everyday life are less clear, due to parallel integration programmes based on strong similarities in the welfare systems and in cultural notions...... of equality in the three societies. Finally, it shows that family relations play a central role in immigrants’ and refugees’ establishment of a new life in the receiving societies, even though the welfare society takes on many of the social and economic functions of the family....

  19. Constraint-based scheduling applying constraint programming to scheduling problems

    CERN Document Server

    Baptiste, Philippe; Nuijten, Wim

    2001-01-01

    Constraint Programming is a problem-solving paradigm that establishes a clear distinction between two pivotal aspects of a problem: (1) a precise definition of the constraints that define the problem to be solved and (2) the algorithms and heuristics enabling the selection of decisions to solve the problem. It is because of these capabilities that Constraint Programming is increasingly being employed as a problem-solving tool to solve scheduling problems. Hence the development of Constraint-Based Scheduling as a field of study. The aim of this book is to provide an overview of the most widely used Constraint-Based Scheduling techniques. Following the principles of Constraint Programming, the book consists of three distinct parts: The first chapter introduces the basic principles of Constraint Programming and provides a model of the constraints that are the most often encountered in scheduling problems. Chapters 2, 3, 4, and 5 are focused on the propagation of resource constraints, which usually are responsibl...

  20. Constraints on Dbar uplifts

    International Nuclear Information System (INIS)

    Alwis, S.P. de

    2016-01-01

    We discuss constraints on KKLT/KKLMMT and LVS scenarios that use anti-branes to get an uplift to a deSitter vacuum, coming from requiring the validity of an effective field theory description of the physics. We find these are not always satisfied or are hard to satisfy.

  1. Ecosystems emerging. 5: Constraints

    Czech Academy of Sciences Publication Activity Database

    Patten, B. C.; Straškraba, Milan; Jorgensen, S. E.

    2011-01-01

    Roč. 222, č. 16 (2011), s. 2945-2972 ISSN 0304-3800 Institutional research plan: CEZ:AV0Z50070508 Keywords : constraint * epistemic * ontic Subject RIV: EH - Ecology, Behaviour Impact factor: 2.326, year: 2011 http://www.sciencedirect.com/science/article/pii/S0304380011002274

  2. Constraints and Ambiguity

    DEFF Research Database (Denmark)

    Dove, Graham; Biskjær, Michael Mose; Lundqvist, Caroline Emilie

    2017-01-01

    groups of students building three models each. We studied groups building with traditional plastic bricks and also using a digital environment. The building tasks students undertake, and our subsequent analysis, are informed by the role constraints and ambiguity play in creative processes. Based...

  3. SoS contract verification using statistical model checking

    Directory of Open Access Journals (Sweden)

    Alessandro Mignogna

    2013-11-01

    Full Text Available Exhaustive formal verification for systems of systems (SoS is impractical and cannot be applied on a large scale. In this paper we propose to use statistical model checking for efficient verification of SoS. We address three relevant aspects for systems of systems: 1 the model of the SoS, which includes stochastic aspects; 2 the formalization of the SoS requirements in the form of contracts; 3 the tool-chain to support statistical model checking for SoS. We adapt the SMC technique for application to heterogeneous SoS. We extend the UPDM/SysML specification language to express the SoS requirements that the implemented strategies over the SoS must satisfy. The requirements are specified with a new contract language specifically designed for SoS, targeting a high-level English- pattern language, but relying on an accurate semantics given by the standard temporal logics. The contracts are verified against the UPDM/SysML specification using the Statistical Model Checker (SMC PLASMA combined with the simulation engine DESYRE, which integrates heterogeneous behavioral models through the functional mock-up interface (FMI standard. The tool-chain allows computing an estimation of the satisfiability of the contracts by the SoS. The results help the system architect to trade-off different solutions to guide the evolution of the SoS.

  4. Model checking as an aid to procedure design

    International Nuclear Information System (INIS)

    Zhang, Wenhu

    2001-01-01

    The OECD Halden Reactor Project has been actively working on computer assisted operating procedures for many years. The objective of the research has been to provide computerised assistance for procedure design, verification and validation, implementation and maintenance. For the verification purpose, the application of formal methods has been considered in several reports. The recent formal verification activity conducted at the Halden Project is based on using model checking to the verification of procedures. This report presents verification approaches based on different model checking techniques and tools for the formalization and verification of operating procedures. Possible problems and relative merits of the different approaches are discussed. A case study of one of the approaches is presented to show the practical application of formal verification. Application of formal verification in the traditional procedure design process can reduce the human resources involved in reviews and simulations, and hence reduce the cost of verification and validation. A discussion of the integration of the formal verification with the traditional procedure design process is given at the end of this report. (Author)

  5. [Design and implementation of data checking system for Chinese materia medica resources survey].

    Science.gov (United States)

    Wang, Hui; Zhang, Xiao-Bo; Ge, Xiao-Guang; Jin, Yan; Jing, Zhi-Xian; Qi, Yuan-Hua; Wang, Ling; Zhao, Yu-Ping; Wang, Wei; Guo, Lan-Ping; Huang, Lu-Qi

    2017-11-01

    The Chinese material medica resources (CMMR) national survey information management system has collected a large amount of data. To help dealing with data recheck, reduce the work of inside, improve the recheck of survey data from provincial and county level, National Resource Center for Chinese Materia Medical has designed a data checking system for Chinese material medica resources survey based on J2EE technology, Java language, Oracle data base in accordance with the SOA framework. It includes single data check, check score, content manage, check the survey data census data with manual checking and automatic checking about census implementation plan, key research information, general survey information, cultivation of medicinal materials information, germplasm resources information the medicine information, market research information, traditional knowledge information, specimen information of this 9 aspects 20 class 175 indicators in two aspects of the quantity and quality. The established system assists in the completion of the data consistency and accuracy, pushes the county survey team timely to complete the data entry arrangement work, so as to improve the integrity, consistency and accuracy of the survey data, and ensure effective and available data, which lay a foundation for providing accurate data support for national survey of the Chinese material medica resources (CMMR) results summary, and displaying results and sharing. Copyright© by the Chinese Pharmaceutical Association.

  6. Stability check source measurements with a secondary standard dosimeter in SSDL-Pakistan

    International Nuclear Information System (INIS)

    Salman, S.; Mahmoud, K.; Orfi, S.D.

    1988-01-01

    The stability check source is an integral part of a Secondary Standard Dosimetry System. The purpose of the stability check source is to confirm that the overall response of the dosimeter has not changed significantly since the instrument was calibrated. In case any change in the sensitivity of the ionization chamber or measuring assembly occurs the same is reflected in the reference check source measurements. Stability check source measurements are taken in a Primary Standard Dosimetry Laboratory (PSDL) at the time of calibration of secondary standard dosimeter and mean time (in seconds) to the reference setting of 50 scale divisions with ambient conditions of air at 20 deg. C, 101.3 kPa and 50% RH is quoted in a calibration certificate. This quoted stability check source time figure is the basis for future confirmation of overall response of the secondary standard dosimeter system. This note presents the results of stability check source measurements carried out in SSDL Pakistan over a period of five years

  7. Constraints and spandrels of interareal connectomes

    Science.gov (United States)

    Rubinov, Mikail

    2016-12-01

    Interareal connectomes are whole-brain wiring diagrams of white-matter pathways. Recent studies have identified modules, hubs, module hierarchies and rich clubs as structural hallmarks of these wiring diagrams. An influential current theory postulates that connectome modules are adequately explained by evolutionary pressures for wiring economy, but that the other hallmarks are not explained by such pressures and are therefore less trivial. Here, we use constraint network models to test these postulates in current gold-standard vertebrate and invertebrate interareal-connectome reconstructions. We show that empirical wiring-cost constraints inadequately explain connectome module organization, and that simultaneous module and hub constraints induce the structural byproducts of hierarchies and rich clubs. These byproducts, known as spandrels in evolutionary biology, include the structural substrate of the default-mode network. Our results imply that currently standard connectome characterizations are based on circular analyses or double dipping, and we emphasize an integrative approach to future connectome analyses for avoiding such pitfalls.

  8. Automata-Based CSL Model Checking

    DEFF Research Database (Denmark)

    Zhang, Lijun; Jansen, David N.; Nielson, Flemming

    2011-01-01

    For continuous-time Markov chains, the model-checking problem with respect to continuous-time stochastic logic (CSL) has been introduced and shown to be decidable by Aziz, Sanwal, Singhal and Brayton in 1996. The presented decision procedure, however, has exponential complexity. In this paper, we...... probability can then be approximated in polynomial time (using uniformization). This makes the present work the centerpiece of a broadly applicable full CSL model checker. Recently, the decision algorithm by Aziz et al. was shown to be incorrect in general. In fact, it works only for stratified CTMCs...

  9. Quantum anonymous voting with anonymity check

    International Nuclear Information System (INIS)

    Horoshko, Dmitri; Kilin, Sergei

    2011-01-01

    We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.

  10. A Framework for Online Conformance Checking

    DEFF Research Database (Denmark)

    Burattin, Andrea; Carmona, Josep

    2017-01-01

    is quantified after the completion of the process instance. In this paper we propose a framework for online conformance checking: not only do we quantify (non-)conformant behavior as the execution is running, we also restrict the computation to constant time complexity per event analyzed, thus enabling...... the online analysis of a stream of events. The framework is instantiated with ideas coming from the theory of regions, and state similarity. An implementation is available in ProM and promising results have been obtained....

  11. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  12. Efficient Semantics-Based Compliance Checking Using LTL Formulae and Unfolding

    Directory of Open Access Journals (Sweden)

    Liang Song

    2013-01-01

    Full Text Available Business process models are required to be in line with frequently changing regulations, policies, and environments. In the field of intelligent modeling, organisations concern automated business process compliance checking as the manual verification is a time-consuming and inefficient work. There exist two key issues for business process compliance checking. One is the definition of a business process retrieval language that can be employed to capture the compliance rules, the other concerns efficient evaluation of these rules. Traditional syntax-based retrieval approaches cannot deal with various important requirements of compliance checking in practice. Although a retrieval language that is based on semantics can overcome the drawback of syntax-based ones, it suffers from the well-known state space explosion. In this paper, we define a semantics-based process model query language through simplifying a property specification pattern system without affecting its expressiveness. We use this language to capture semantics-based compliance rules and constraints. We also propose a feasible approach in such a way that the compliance checking will not suffer from the state space explosion as much as possible. A tool is implemented to evaluate the efficiency. An experiment conducted on three model collections illustrates that our technology is very efficient.

  13. Formal verification of dynamic hybrid systems: a NuSMV-based model checking approach

    Directory of Open Access Journals (Sweden)

    Xu Zhi

    2018-01-01

    Full Text Available Software security is an important and challenging research topic in developing dynamic hybrid embedded software systems. Ensuring the correct behavior of these systems is particularly difficult due to the interactions between the continuous subsystem and the discrete subsystem. Currently available security analysis methods for system risks have been limited, as they rely on manual inspections of the individual subsystems under simplifying assumptions. To improve this situation, a new approach is proposed that is based on the symbolic model checking tool NuSMV. A dual PID system is used as an example system, for which the logical part and the computational part of the system are modeled in a unified manner. Constraints are constructed on the controlled object, and a counter-example path is ultimately generated, indicating that the hybrid system can be analyzed by the model checking tool.

  14. Graphical constraints: a graphical user interface for constraint problems

    OpenAIRE

    Vieira, Nelson Manuel Marques

    2015-01-01

    A constraint satisfaction problem is a classical artificial intelligence paradigm characterized by a set of variables (each variable with an associated domain of possible values), and a set of constraints that specify relations among subsets of these variables. Solutions are assignments of values to all variables that satisfy all the constraints. Many real world problems may be modelled by means of constraints. The range of problems that can use this representation is very diverse and embrace...

  15. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  16. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  17. Distance Constraint Satisfaction Problems

    Science.gov (United States)

    Bodirsky, Manuel; Dalmau, Victor; Martin, Barnaby; Pinsker, Michael

    We study the complexity of constraint satisfaction problems for templates Γ that are first-order definable in ({ Z}; {suc}), the integers with the successor relation. Assuming a widely believed conjecture from finite domain constraint satisfaction (we require the tractability conjecture by Bulatov, Jeavons and Krokhin in the special case of transitive finite templates), we provide a full classification for the case that Γ is locally finite (i.e., the Gaifman graph of Γ has finite degree). We show that one of the following is true: The structure Γ is homomorphically equivalent to a structure with a certain majority polymorphism (which we call modular median) and CSP(Γ) can be solved in polynomial time, or Γ is homomorphically equivalent to a finite transitive structure, or CSP(Γ) is NP-complete.

  18. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  19. Space shuttle prototype check valve development

    Science.gov (United States)

    Tellier, G. F.

    1976-01-01

    Contaminant-resistant seal designs and a dynamically stable prototype check valve for the orbital maneuvering and reaction control helium pressurization systems of the space shuttle were developed. Polymer and carbide seal models were designed and tested. Perfluoroelastomers compatible with N2O4 and N2H4 types were evaluated and compared with Teflon in flat and captive seal models. Low load sealing and contamination resistance tests demonstrated cutter seal superiority over polymer seals. Ceramic and carbide materials were evaluated for N2O4 service using exposure to RFNA as a worst case screen; chemically vapor deposited tungsten carbide was shown to be impervious to the acid after 6 months immersion. A unique carbide shell poppet/cutter seat check valve was designed and tested to demonstrate low cracking pressure ( 2.0 psid), dynamic stability under all test bench flow conditions, contamination resistance (0.001 inch CRES wires cut with 1.5 pound seat load) and long life of 100,000 cycles (leakage 1.0 scc/hr helium from 0.1 to 400 psig).

  20. Polarity Checks in Sectors 23 & 78

    CERN Document Server

    Calaga, R; Lamont, M; Ponce, L; Sun, Y; Tomás, R; Venturini-Delsolaro, W; Zimmermann, F

    2009-01-01

    During the first three LHC synchronization tests on August 10, August 24, and September 7, 2008, linear and higher-order polarity checks were performed with beam 1 in Sector 23 and beam 2 in Sector 78. The main principle of these checks was to launch free betatron oscillations and use the difference trajectory measurements with respect to inverted polarities of circuits under investigation. In the case of zero nominal strength for a circuit, a finite value was introduced. The magnet circuits subjected to these tests were the QT and QTL trim quadrupoles, the MQS skew quadrupoles, the SF and SD arc sextupole circuits, the MCS b3 spool pieces, the OD and OF Landau octupoles, and the MSS skew sextupoles. For some of these circuits sensitivity was enhanced by introducing large momentum offsets. To detect and remove improve spurious contributions from initially off-center orbits, four sets of trajectories were recorded, namely with and without oscillation, and with two magnet strength settings, respectively. We rep...

  1. Constraint-based scheduling

    Science.gov (United States)

    Zweben, Monte

    1993-01-01

    The GERRY scheduling system developed by NASA Ames with assistance from the Lockheed Space Operations Company, and the Lockheed Artificial Intelligence Center, uses a method called constraint-based iterative repair. Using this technique, one encodes both hard rules and preference criteria into data structures called constraints. GERRY repeatedly attempts to improve schedules by seeking repairs for violated constraints. The system provides a general scheduling framework which is being tested on two NASA applications. The larger of the two is the Space Shuttle Ground Processing problem which entails the scheduling of all the inspection, repair, and maintenance tasks required to prepare the orbiter for flight. The other application involves power allocation for the NASA Ames wind tunnels. Here the system will be used to schedule wind tunnel tests with the goal of minimizing power costs. In this paper, we describe the GERRY system and its application to the Space Shuttle problem. We also speculate as to how the system would be used for manufacturing, transportation, and military problems.

  2. 45 CFR 201.70 - Treatment of replacement checks.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Treatment of replacement checks. 201.70 Section... STATES FOR PUBLIC ASSISTANCE PROGRAMS Review and Audits § 201.70 Treatment of replacement checks. (a... (FFP) for replacement checks under titles I, VI-A, X, XIV, XVI (AABD) except under the circumstances...

  3. 40 CFR 86.327-79 - Quench checks; NOX analyzer.

    Science.gov (United States)

    2010-07-01

    ... any flow rate into the reaction chamber. This includes, but is not limited to, sample capillary, ozone... Quench checks; NOX analyzer. (a) Perform the reaction chamber quench check for each model of high vacuum reaction chamber analyzer prior to initial use. (b) Perform the reaction chamber quench check for each new...

  4. 7 CFR 1944.540 - Requesting TSA checks.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 13 2010-01-01 2009-01-01 true Requesting TSA checks. 1944.540 Section 1944.540... TSA checks. (a) The initial TSA check may cover the applicant's needs for the first calendar month. If... the next whole month. (b) The initial advance of TSA grant funds may not be requested simultaneously...

  5. 40 CFR 86.328-79 - Leak checks.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Leak checks. 86.328-79 Section 86.328... Gasoline-Fueled and Diesel-Fueled Heavy-Duty Engines; Gaseous Exhaust Test Procedures § 86.328-79 Leak checks. (a) Vacuum side leak check. (1) Any location within the analysis system where a vacuum leak could...

  6. 12 CFR 229.36 - Presentment and issuance of checks.

    Science.gov (United States)

    2010-01-01

    ... Section 229.36 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM AVAILABILITY OF FUNDS AND COLLECTION OF CHECKS (REGULATION CC) Collection of Checks § 229... on the check, whether in magnetic ink or in fractional form; (3) At any branch or head office, if the...

  7. Efficient Searching with Linear Constraints

    DEFF Research Database (Denmark)

    Agarwal, Pankaj K.; Arge, Lars Allan; Erickson, Jeff

    2000-01-01

    We show how to preprocess a set S of points in d into an external memory data structure that efficiently supports linear-constraint queries. Each query is in the form of a linear constraint xd a0+∑d−1i=1 aixi; the data structure must report all the points of S that satisfy the constraint. This pr...

  8. Deepening Contractions and Collateral Constraints

    DEFF Research Database (Denmark)

    Jensen, Henrik; Ravn, Søren Hove; Santoro, Emiliano

    and occasionally non-binding credit constraints. Easier credit access increases the likelihood that constraints become slack in the face of expansionary shocks, while contractionary shocks are further amplified due to tighter constraints. As a result, busts gradually become deeper than booms. Based...

  9. Progress Check Module; Basic Electricity and Electronics Individualized Learning System. Progress Check Booklet.

    Science.gov (United States)

    Bureau of Naval Personnel, Washington, DC.

    The Progress Check Booklet is designed to be used by the student working in the programed course to determine if he has mastered the concepts in the course booklets on: electrical current; voltage; resistance; measuring current and voltage in series circuits; relationships of current, voltage, and resistance; parellel circuits; combination…

  10. Checking in: An Analysis of the (Lack of) Body Checking in Women's Ice Hockey

    Science.gov (United States)

    Weaving, Charlene; Roberts, Samuel

    2012-01-01

    Despite the growing popularity of women's ice hockey in North America, players continue to face limitations because of the prohibition of body checking. In this paper, we argue from a liberal feminist philosophical perspective that this prohibition reinforces existing traditional stereotypes of female athletes. Because the women's game does not…

  11. Linear Parametric Model Checking of Timed Automata

    DEFF Research Database (Denmark)

    Hune, Tohmas Seidelin; Romijn, Judi; Stoelinga, Mariëlle

    2001-01-01

    We present an extension of the model checker Uppaal capable of synthesize linear parameter constraints for the correctness of parametric timed automata. The symbolic representation of the (parametric) state-space is shown to be correct. A second contribution of this paper is the identication...... of a subclass of parametric timed automata (L/U automata), for which the emptiness problem is decidable, contrary to the full class where it is know to be undecidable. Also we present a number of lemmas enabling the verication eort to be reduced for L/U automata in some cases. We illustrate our approach...

  12. Including Overweight or Obese Students in Physical Education: A Social Ecological Constraint Model

    Science.gov (United States)

    Li, Weidong; Rukavina, Paul

    2012-01-01

    In this review, we propose a social ecological constraint model to study inclusion of overweight or obese students in physical education by integrating key concepts and assumptions from ecological constraint theory in motor development and social ecological models in health promotion and behavior. The social ecological constraint model proposes…

  13. 12 CFR Appendix A to Part 229 - Routing Number Guide to Next-Day Availability Checks and Local Checks

    Science.gov (United States)

    2010-01-01

    ... Checks and Local Checks A Appendix A to Part 229 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM AVAILABILITY OF FUNDS AND COLLECTION OF CHECKS... Association. The routing number takes two forms: a fractional form and a nine-digit form. A paying bank...

  14. The Mars Science Laboratory Organic Check Material

    Science.gov (United States)

    Conrad, Pamela G.; Eigenbrode, J. E.; Mogensen, C. T.; VonderHeydt, M. O.; Glavin, D. P.; Mahaffy, P. M.; Johnson, J. A.

    2011-01-01

    The Organic Check Material (OCM) has been developed for use on the Mars Science Laboratory mission to serve as a sample standard for verification of organic cleanliness and characterization of potential sample alteration as a function of the sample acquisition and portioning process on the Curiosity rover. OCM samples will be acquired using the same procedures for drilling, portioning and delivery as are used to study martian samples with The Sample Analysis at Mars (SAM) instrument suite during MSL surface operations. Because the SAM suite is highly sensitive to organic molecules, the mission can better verify the cleanliness of Curiosity's sample acquisition hardware if a known material can be processed through SAM and compared with the results obtained from martian samples.

  15. The Mars Science Laboratory Organic Check Material

    Science.gov (United States)

    Conrad, Pamela G.; Eigenbrode, Jennifer L.; Von der Heydt, Max O.; Mogensen, Claus T.; Canham, John; Harpold, Dan N.; Johnson, Joel; Errigo, Therese; Glavin, Daniel P.; Mahaffy, Paul R.

    2012-09-01

    Mars Science Laboratory's Curiosity rover carries a set of five external verification standards in hermetically sealed containers that can be sampled as would be a Martian rock, by drilling and then portioning into the solid sample inlet of the Sample Analysis at Mars (SAM) suite. Each organic check material (OCM) canister contains a porous ceramic solid, which has been doped with a fluorinated hydrocarbon marker that can be detected by SAM. The purpose of the OCM is to serve as a verification tool for the organic cleanliness of those parts of the sample chain that cannot be cleaned other than by dilution, i.e., repeated sampling of Martian rock. SAM possesses internal calibrants for verification of both its performance and its internal cleanliness, and the OCM is not used for that purpose. Each OCM unit is designed for one use only, and the choice to do so will be made by the project science group (PSG).

  16. Model Checking JAVA Programs Using Java Pathfinder

    Science.gov (United States)

    Havelund, Klaus; Pressburger, Thomas

    2000-01-01

    This paper describes a translator called JAVA PATHFINDER from JAVA to PROMELA, the "programming language" of the SPIN model checker. The purpose is to establish a framework for verification and debugging of JAVA programs based on model checking. This work should be seen in a broader attempt to make formal methods applicable "in the loop" of programming within NASA's areas such as space, aviation, and robotics. Our main goal is to create automated formal methods such that programmers themselves can apply these in their daily work (in the loop) without the need for specialists to manually reformulate a program into a different notation in order to analyze the program. This work is a continuation of an effort to formally verify, using SPIN, a multi-threaded operating system programmed in Lisp for the Deep-Space 1 spacecraft, and of previous work in applying existing model checkers and theorem provers to real applications.

  17. The criticality check and its applicability for nuclear material accounting

    International Nuclear Information System (INIS)

    Sanchez Espinoza, V.H.; Adam, E.; Knorr, J.

    1988-01-01

    Different procedures are used by the realization of nuclear material check by the IAEA. The criticality check belongs to these methods and it appropriates especially to verification of the nuclear material inventory of reactors. General aspects of the applicability of this check procedure are formulated and application criteria are deduced. By the example of solid-moderated homogeneous zero-power reactors it is demonstrated the unsecurity which is to be reckoned by applying the criticality check. Finally a possibility for the reduction of errors in core material determination by additional measuring methods without questioning the criticality check method is presented. (author)

  18. [Infection prevention check-in and infection prevention check-out to prevent nosocomial infections].

    Science.gov (United States)

    Kramer, A; Schilling, M; Heidecke, C D

    2010-02-01

    A precondition for the success of the prevention of SSI is the complete realisation of the proven anti-infective measures in form of the multi-barrier strategy or the so-called bundles. In daily practice it is important to follow the fixed instructions, i. e., to ensure a high compliance. In much the same way as an airline pilot or co-pilot must examine whether all instruments are functioning before each take-off, a comparable procedure should be developed as a pre-operative control for the observance of all -defined measures by the responsible surgeon and for the post-operative supervision by the patient. For the control of the observance of the defined pre-operative prevention measures, a check list with 12 items was developed, named the "infection prevention check-in". The check list is authorised by the responsible surgeon be-fore each operation. For the surveillance of the general hygiene in the post-operative period the "infection prevention check-out" with 14 items was developed. Thereby the patient is able to evaluate the staff's compliance with the hygienic measures at the time of dismissal. With the introduction of the check-lists a simple means is given to involve both the team of the surgeons and the ward staff, together with the patient, into the infection prophylaxis even more effectively. In order to assess the success of those measures, the influence on the rate of SSI is to be determined prospectively. Georg Thieme Verlag Stuttgart, New York.

  19. Constraint driven schema merging

    OpenAIRE

    Li, X.

    2012-01-01

    Schema integration is the process of consolidating several source schemas to generate a unified view, called the mediated schema, so that information scattered in the sources can be served uniformly from the mediated schema. Schema integration occurs in many scenarios such as data integration, logical database design, data warehousing and schema evolution. To make the mediated schema useful for data interoperability tasks, mappings between the source schemas and the mediated schema have to be...

  20. THE INFLUENCE OF CHECK DAMS ON FLUVIAL PROCESSES AND RIPARIAN VEGETATION IN MOUNTAIN REACHES OF TORRENTS

    Directory of Open Access Journals (Sweden)

    Giuseppe Bombino

    2010-09-01

    Full Text Available The complex hydrogeomorphological processes within the active channel of rivers strongly influence riparian vegetation development and organization, particularly in mountain streams where such processes can be remarkably impacted by engineering control works. In four mountain reaches of Calabrian fiumaras we analyze, through previously arranged methods (integrated by a multivariate statistic analysis, the relationships among hydrogeomorphological river characteristics and structure and the development of riparian vegetation within the active channel in transects located in proximity of check dams and in less disturbed sites. The results of this study demonstrate clear and relevant contrasts, due to the presence of check dams, in the physical and vegetation properties of upstream, downstream and intermediate sites around check dams. The multivariate statistical approach through the Principal Component Analysis (PCA highlighted evident relationships in all transects between groups of physical and vegetation properties. The regression analysis performed between the vegetation properties and the width:depth ratio or the specific discharge showed very different relationships between groups of transects, due to evident changes in channel morphology and in flow regime locally induced by check dams. Overall we have shown that check dams have far reaching effects in the extent and development of riparian vegetation of mountain torrent reaches, which extend far beyond physical adjustments to changed morphological, hydraulic and sedimentary conditions.

  1. Design with Nonlinear Constraints

    KAUST Repository

    Tang, Chengcheng

    2015-12-10

    Most modern industrial and architectural designs need to satisfy the requirements of their targeted performance and respect the limitations of available fabrication technologies. At the same time, they should reflect the artistic considerations and personal taste of the designers, which cannot be simply formulated as optimization goals with single best solutions. This thesis aims at a general, flexible yet e cient computational framework for interactive creation, exploration and discovery of serviceable, constructible, and stylish designs. By formulating nonlinear engineering considerations as linear or quadratic expressions by introducing auxiliary variables, the constrained space could be e ciently accessed by the proposed algorithm Guided Projection, with the guidance of aesthetic formulations. The approach is introduced through applications in different scenarios, its effectiveness is demonstrated by examples that were difficult or even impossible to be computationally designed before. The first application is the design of meshes under both geometric and static constraints, including self-supporting polyhedral meshes that are not height fields. Then, with a formulation bridging mesh based and spline based representations, the application is extended to developable surfaces including origami with curved creases. Finally, general approaches to extend hard constraints and soft energies are discussed, followed by a concluding remark outlooking possible future studies.

  2. Searching for genomic constraints

    Energy Technology Data Exchange (ETDEWEB)

    Lio` , P [Cambridge, Univ. (United Kingdom). Genetics Dept.; Ruffo, S [Florence, Univ. (Italy). Fac. di Ingegneria. Dipt. di Energetica ` S. Stecco`

    1998-01-01

    The authors have analyzed general properties of very long DNA sequences belonging to simple and complex organisms, by using different correlation methods. They have distinguished those base compositional rules that concern the entire genome which they call `genomic constraints` from the rules that depend on the `external natural selection` acting on single genes, i. e. protein-centered constraints. They show that G + C content, purine / pyrimidine distributions and biological complexity of the organism are the most important factors which determine base compositional rules and genome complexity. Three main facts are here reported: bacteria with high G + C content have more restrictions on base composition than those with low G + C content; at constant G + C content more complex organisms, ranging from prokaryotes to higher eukaryotes (e.g. human) display an increase of repeats 10-20 nucleotides long, which are also partly responsible for long-range correlations; work selection of length 3 to 10 is stronger in human and in bacteria for two distinct reasons. With respect to previous studies, they have also compared the genomic sequence of the archeon Methanococcus jannaschii with those of bacteria and eukaryotes: it shows sometimes an intermediate statistical behaviour.

  3. Searching for genomic constraints

    International Nuclear Information System (INIS)

    Lio', P.; Ruffo, S.

    1998-01-01

    The authors have analyzed general properties of very long DNA sequences belonging to simple and complex organisms, by using different correlation methods. They have distinguished those base compositional rules that concern the entire genome which they call 'genomic constraints' from the rules that depend on the 'external natural selection' acting on single genes, i. e. protein-centered constraints. They show that G + C content, purine / pyrimidine distributions and biological complexity of the organism are the most important factors which determine base compositional rules and genome complexity. Three main facts are here reported: bacteria with high G + C content have more restrictions on base composition than those with low G + C content; at constant G + C content more complex organisms, ranging from prokaryotes to higher eukaryotes (e.g. human) display an increase of repeats 10-20 nucleotides long, which are also partly responsible for long-range correlations; work selection of length 3 to 10 is stronger in human and in bacteria for two distinct reasons. With respect to previous studies, they have also compared the genomic sequence of the archeon Methanococcus jannaschii with those of bacteria and eukaryotes: it shows sometimes an intermediate statistical behaviour

  4. Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment

    Directory of Open Access Journals (Sweden)

    Jian Mao

    2017-01-01

    Full Text Available With the increasing demand for ubiquitous connectivity, wireless technology has significantly improved our daily lives. Meanwhile, together with cloud-computing technology (e.g., cloud storage services and big data processing, new wireless networking technology becomes the foundation infrastructure of emerging communication networks. Particularly, cloud storage has been widely used in services, such as data outsourcing and resource sharing, among the heterogeneous wireless environments because of its convenience, low cost, and flexibility. However, users/clients lose the physical control of their data after outsourcing. Consequently, ensuring the integrity of the outsourced data becomes an important security requirement of cloud storage applications. In this paper, we present Co-Check, a collaborative multicloud data integrity audition scheme, which is based on BLS (Boneh-Lynn-Shacham signature and homomorphic tags. According to the proposed scheme, clients can audit their outsourced data in a one-round challenge-response interaction with low performance overhead. Our scheme also supports dynamic data maintenance. The theoretical analysis and experiment results illustrate that our scheme is provably secure and efficient.

  5. EASY-2005: Validation and new tools for data checking

    International Nuclear Information System (INIS)

    Forrest, R.A.; Kopecky, J.

    2007-01-01

    The European Activation System (EASY) has been developed for activation calculations within the Fusion Technology programme. It comprises the EAF nuclear data libraries and the FISPACT inventory code. EASY-2005 contains about five times more neutron-induced reactions (62,637) than the previous version; due to an increase in the upper energy limit from 20 to 60 MeV. Many measurements of activation in well-defined neutron spectra have been made; these integral results are used to validate EAF. Details of the validation covering 453 reactions are given. Model calculations were used to produce the majority of the data, and the large number of reactions, and the lack of experimental data, make it necessary to develop new checking tools. Within the SAFEPAQ-II code, the new methodology of statistical analysis of cross sections (SACS) has been developed. This enables various quantities such as maximum cross section (σ max ) to be plotted as a function of asymmetry parameter (s) for each reaction type. Such plots show well-defined trends and inconsistent data for a particular reaction can readily be identified. The use of integral data and SACS for improvement are discussed, in relation to the maintenance version, EASY-2005.1 and the planned new version, EASY-2007

  6. A constraint-based bottom-up counterpart to definite clause grammars

    DEFF Research Database (Denmark)

    Christiansen, Henning

    2004-01-01

    A new grammar formalism, CHR Grammars (CHRG), is proposed that provides a constraint-solving approach to language analysis, built on top of the programming language of Constraint Handling Rules in the same way as Definite Clause Grammars (DCG) on Prolog. CHRG works bottom-up and adds the following......, integrity constraints, operators a la assumption grammars, and to incorporate other constraint solvers. (iv)~Context-sensitive rules that apply for disambiguation, coordination in natural language and tagger-like rules....

  7. Do alcohol compliance checks decrease underage sales at neighboring establishments?

    Science.gov (United States)

    Erickson, Darin J; Smolenski, Derek J; Toomey, Traci L; Carlin, Bradley P; Wagenaar, Alexander C

    2013-11-01

    Underage alcohol compliance checks conducted by law enforcement agencies can reduce the likelihood of illegal alcohol sales at checked alcohol establishments, and theory suggests that an alcohol establishment that is checked may warn nearby establishments that compliance checks are being conducted in the area. In this study, we examined whether the effects of compliance checks diffuse to neighboring establishments. We used data from the Complying with the Minimum Drinking Age trial, which included more than 2,000 compliance checks conducted at more than 900 alcohol establishments. The primary outcome was the sale of alcohol to a pseudo-underage buyer without the need for age identification. A multilevel logistic regression was used to model the effect of a compliance check at each establishment as well as the effect of compliance checks at neighboring establishments within 500 m (stratified into four equal-radius concentric rings), after buyer, license, establishment, and community-level variables were controlled for. We observed a decrease in the likelihood of establishments selling alcohol to underage youth after they had been checked by law enforcement, but these effects quickly decayed over time. Establishments that had a close neighbor (within 125 m) checked in the past 90 days were also less likely to sell alcohol to young-appearing buyers. The spatial effect of compliance checks on other establishments decayed rapidly with increasing distance. Results confirm the hypothesis that the effects of police compliance checks do spill over to neighboring establishments. These findings have implications for the development of an optimal schedule of police compliance checks.

  8. CAPD Software Development for Automatic Piping System Design: Checking Piping Pocket, Checking Valve Level and Flexibility

    International Nuclear Information System (INIS)

    Ari Satmoko; Edi Karyanta; Dedy Haryanto; Abdul Hafid; Sudarno; Kussigit Santosa; Pinitoyo, A.; Demon Handoyo

    2003-01-01

    One of several steps in industrial plant construction is preparing piping layout drawing. In this drawing, pipe and all other pieces such as instrumentation, equipment, structure should be modeled A software called CAPD was developed to replace and to behave as piping drafter or designer. CAPD was successfully developed by adding both subprogram CHKUPIPE and CHKMANV. The first subprogram can check and gives warning if there is piping pocket in the piping system. The second can identify valve position and then check whether valve can be handled by operator hand The main program CAPD was also successfully modified in order to be capable in limiting the maximum length of straight pipe. By limiting the length, piping flexibility can be increased. (author)

  9. Crack-tip constraint analyses and constraint-dependent LBB curves for circumferential through-wall cracked pipes

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Y.L.; Wang, G.Z., E-mail: gzwang@ecust.edu.cn; Xuan, F.Z.; Tu, S.T.

    2015-04-15

    Highlights: • Solution of constraint parameter τ* for through-wall cracked pipes has been obtained. • Constraint increases with increasing crack length and radius–thickness ratio of pipes. • Constraint-dependent LBB curve for through-wall cracked pipes has been constructed. • For increasing accuracy of LBB assessments, constraint effect should be considered. - Abstract: The leak-before-break (LBB) concept has been widely applied in the structural integrity assessments of pressured pipes in nuclear power plants. However, the crack-tip constraint effects in LBB analyses and designs cannot be incorporated. In this paper, by using three-dimensional finite element calculations, the modified load-independent T-stress constraint parameter τ* for circumferential through-wall cracked pipes with different geometries and crack sizes has been analyzed under different loading conditions, and the solutions of the crack-tip constraint parameter τ* have been obtained. Based on the τ* solutions and constraint-dependent J–R curves of a steel, the constraint-dependent LBB (leak-before-break) curves have been constructed. The results show that the constraint τ* increases with increasing crack length θ, mean radius R{sub m} and radius–thickness ratio R{sub m}/t of the pipes. In LBB analyses, the critical crack length calculated by the J–R curve of the standard high constraint specimen for pipes with shorter cracks is over-conservative, and the degree of conservatism increases with decreasing crack length θ, R{sub m} and R{sub m}/t. Therefore, the constraint-dependent LBB curves should be constructed to modify the over-conservatism and increase accuracy of LBB assessments.

  10. Periodic medical check-up among residents of three Nigerian South-western States

    Directory of Open Access Journals (Sweden)

    Saheed Opeyemi Usman

    2016-09-01

    Full Text Available Objectives: General medical examination is a common form of preventive medicine. Periodic medical check-up generally involves thorough history, physical examination and screening of asymptomatic persons by physicians on a regular basis as part of a routine health care process. Periodic medical check-up is considered effective in preventing illness and promoting health and reducing morbidity and mortality. This study is therefore designed to determine the knowledge, attitude and practice of periodic medical check-up among residents of Osun, Ondo and Ekiti States of Nigeria. It is also to determine the influence of educational status on its practice and compare the outcomes in the three states. Materials and Methods: The cross-sectional survey study utilizing both qualitative and quantitative method of data collection was conducted at various locations across the three states. The locations included those of public servants, private sector workers, artisans, traders, business men/women, farmers, among others. Results: 1200 consenting residents participated in the study in each of the three states. 518 (43.2% of the respondents in Ondo State are males while 682 (57.8% are females. 465 (38.8% of the respondents in Ekiti State are males while 735 (61.2% are females. 494 (41.2% of the respondents in Osun State are males while 706 (59.8% are females. The mean age in Ondo, Ekiti and Osun were 43.8 +/- 10.7 years, 44.6 +/- 11.5 years and 41.7 +/- 10.1 years respectively. 89.2%, 88.3% and 87.4% of the respondents are aware of periodic medical check-up in Ondo, Ekiti and Osun states respectively. Conclusion: There is high level of awareness of periodic medical check-up in all three states but the level of practice of routine medical check-up is low. The majority of the respondents probably don't practice it because their health insurance plan does not cover the medical check-up or due to individual/organizational financial constraints. [J Contemp Med 2016

  11. Effective ambiguity checking in biosequence analysis

    Directory of Open Access Journals (Sweden)

    Giegerich Robert

    2005-06-01

    Full Text Available Abstract Background Ambiguity is a problem in biosequence analysis that arises in various analysis tasks solved via dynamic programming, and in particular, in the modeling of families of RNA secondary structures with stochastic context free grammars. Several types of analysis are invalidated by the presence of ambiguity. As this problem inherits undecidability (as we show here from the namely problem for context free languages, there is no complete algorithmic solution to the problem of ambiguity checking. Results We explain frequently observed sources of ambiguity, and show how to avoid them. We suggest four testing procedures that may help to detect ambiguity when present, including a just-in-time test that permits to work safely with a potentially ambiguous grammar. We introduce, for the special case of stochastic context free grammars and RNA structure modeling, an automated partial procedure for proving non-ambiguity. It is used to demonstrate non-ambiguity for several relevant grammars. Conclusion Our mechanical proof procedure and our testing methods provide a powerful arsenal of methods to ensure non-ambiguity.

  12. Personalized medicine: reality and reality checks.

    Science.gov (United States)

    Leeder, J Steven; Spielberg, Stephen P

    2009-05-01

    The evolving era of pharmacogenomics and personalized medicine is greeted with optimism by many, but this sentiment is not universally shared. The existence of diametrically opposed opinions concerning the potential benefits and obstacles facing the widespread implementation of genomic medicine should stimulate discussion and guide the design of studies to establish the value of interventions targeted at the level of individual patients. One of the more controversial aspects of personalized medicine is whether the anticipated benefits will be realized at an acceptable cost. Recently released analyses suggest that the returns on investment depend on the particular scenario and are different for different stakeholders. On the other hand, cost is only one of the challenges regarding implementation of personalized medicine. Among these are the development of universal standards for managing genomic information in electronic medical records, improvement in the collection and interpretation of clinical phenotype data, and new strategies to educate practitioners and patients/consumers. The reality is that personalized medicine is upon us; open discourse and periodic reality checks will be necessary as we confront it.

  13. Get Your Kids Moving and Check Some Chores off Your List

    Science.gov (United States)

    ... Check Recipe Certification Program Nutrition Requirements Heart-Check Professional Resources Contact the Heart-Check Certification Program Simple Cooking and Recipes Dining Out Choosing a Restaurant Deciphering ...

  14. Supergravity constraints on monojets

    International Nuclear Information System (INIS)

    Nandi, S.

    1986-01-01

    In the standard model, supplemented by N = 1 minimal supergravity, all the supersymmetric particle masses can be expressed in terms of a few unknown parameters. The resulting mass relations, and the laboratory and the cosmological bounds on these superpartner masses are used to put constraints on the supersymmetric origin of the CERN monojets. The latest MAC data at PEP excludes the scalar quarks, of masses up to 45 GeV, as the origin of these monojets. The cosmological bounds, for a stable photino, excludes the mass range necessary for the light gluino-heavy squark production interpretation. These difficulties can be avoided by going beyond the minimal supergravity theory. Irrespective of the monojets, the importance of the stable γ as the source of the cosmological dark matter is emphasized

  15. Temporal Concurrent Constraint Programming

    DEFF Research Database (Denmark)

    Valencia, Frank Dan

    Concurrent constraint programming (ccp) is a formalism for concurrency in which agents interact with one another by telling (adding) and asking (reading) information in a shared medium. Temporal ccp extends ccp by allowing agents to be constrained by time conditions. This dissertation studies...... temporal ccp by developing a process calculus called ntcc. The ntcc calculus generalizes the tcc model, the latter being a temporal ccp model for deterministic and synchronouss timed reactive systems. The calculus is built upon few basic ideas but it captures several aspects of timed systems. As tcc, ntcc...... structures, robotic devises, multi-agent systems and music applications. The calculus is provided with a denotational semantics that captures the reactive computations of processes in the presence of arbitrary environments. The denotation is proven to be fully-abstract for a substantial fragment...

  16. A Novel Algorithm for Intrusion Detection Based on RASL Model Checking

    Directory of Open Access Journals (Sweden)

    Weijun Zhu

    2013-01-01

    Full Text Available The interval temporal logic (ITL model checking (MC technique enhances the power of intrusion detection systems (IDSs to detect concurrent attacks due to the strong expressive power of ITL. However, an ITL formula suffers from difficulty in the description of the time constraints between different actions in the same attack. To address this problem, we formalize a novel real-time interval temporal logic—real-time attack signature logic (RASL. Based on such a new logic, we put forward a RASL model checking algorithm. Furthermore, we use RASL formulas to describe attack signatures and employ discrete timed automata to create an audit log. As a result, RASL model checking algorithm can be used to automatically verify whether the automata satisfy the formulas, that is, whether the audit log coincides with the attack signatures. The simulation experiments show that the new approach effectively enhances the detection power of the MC-based intrusion detection methods for a number of telnet attacks, p-trace attacks, and the other sixteen types of attacks. And these experiments indicate that the new algorithm can find several types of real-time attacks, whereas the existing MC-based intrusion detection approaches cannot do that.

  17. A Hybrid Programming Framework for Modeling and Solving Constraint Satisfaction and Optimization Problems

    OpenAIRE

    Sitek, Paweł; Wikarek, Jarosław

    2016-01-01

    This paper proposes a hybrid programming framework for modeling and solving of constraint satisfaction problems (CSPs) and constraint optimization problems (COPs). Two paradigms, CLP (constraint logic programming) and MP (mathematical programming), are integrated in the framework. The integration is supplemented with the original method of problem transformation, used in the framework as a presolving method. The transformation substantially reduces the feasible solution space. The framework a...

  18. Balancing Structural and Temporal Constraints in Multitasking Contexts

    OpenAIRE

    Salvucci, Dario D.; Kujala, Tuomo

    2016-01-01

    Recent research has shown that when people multitask, both the subtask structure and the temporal constraints of the component tasks strongly influence people’s task-switching behavior. In this paper, we propose an integrated theoretical account and associated computational model that aims to quantify how people balance structural and temporal constraints in everyday multitasking. We validate the theory using data from an empirical study in which drivers performed a vi...

  19. Related Fact Checks: a tool for combating fake news

    OpenAIRE

    Guha, Sreya

    2017-01-01

    The emergence of "Fake News" and misinformation via online news and social media has spurred an interest in computational tools to combat this phenomenon. In this paper we present a new "Related Fact Checks" service, which can help a reader critically evaluate an article and make a judgment on its veracity by bringing up fact checks that are relevant to the article. We describe the core technical problems that need to be solved in building a "Related Fact Checks" service, and present results ...

  20. Minimal Flavor Constraints for Technicolor

    DEFF Research Database (Denmark)

    Sakuma, Hidenori; Sannino, Francesco

    2010-01-01

    We analyze the constraints on the the vacuum polarization of the standard model gauge bosons from a minimal set of flavor observables valid for a general class of models of dynamical electroweak symmetry breaking. We will show that the constraints have a strong impact on the self-coupling and mas......We analyze the constraints on the the vacuum polarization of the standard model gauge bosons from a minimal set of flavor observables valid for a general class of models of dynamical electroweak symmetry breaking. We will show that the constraints have a strong impact on the self...

  1. Social Constraints on Animate Vision

    National Research Council Canada - National Science Library

    Breazeal, Cynthia; Edsinger, Aaron; Fitzpatrick, Paul; Scassellati, Brian

    2000-01-01

    .... In humanoid robotic systems, or in any animate vision system that interacts with people, social dynamics provide additional levels of constraint and provide additional opportunities for processing economy...

  2. Next-generation nozzle check valve significantly reduces operating costs

    Energy Technology Data Exchange (ETDEWEB)

    Roorda, O. [SMX International, Toronto, ON (Canada)

    2009-01-15

    Check valves perform an important function in preventing reverse flow and protecting plant and mechanical equipment. However, the variety of different types of valves and extreme differences in performance even within one type can change maintenance requirements and life cycle costs, amounting to millions of dollars over the typical 15-year design life of piping components. A next-generation non-slam nozzle check valve which prevents return flow has greatly reduced operating costs by protecting the mechanical equipment in a piping system. This article described the check valve varieties such as the swing check valve, a dual-plate check valve, and nozzle check valves. Advancements in optimized design of a non-slam nozzle check valve were also discussed, with particular reference to computer flow modelling such as computational fluid dynamics; computer stress modelling such as finite element analysis; and flow testing (using rapid prototype development and flow loop testing), both to improve dynamic performance and reduce hydraulic losses. The benefits of maximized dynamic performance and minimized pressure loss from the new designed valve were also outlined. It was concluded that this latest non-slam nozzle check valve design has potential applications in natural gas, liquefied natural gas, and oil pipelines, including subsea applications, as well as refineries, and petrochemical plants among others, and is suitable for horizontal and vertical installation. The result of this next-generation nozzle check valve design is not only superior performance, and effective protection of mechanical equipment but also minimized life cycle costs. 1 fig.

  3. Mothers' use of and attitudes to BabyCheck.

    OpenAIRE

    Thomson, Hilary; Ross, Sue; Wilson, Philip; McConnachie, Alex; Watson, Richard

    2002-01-01

    A copy of BabyCheck was sent to 497 mothers shortly after the birth of their baby. Six months later they were sent a questionnaire asking about their use of and attitudes to, BabyCheck. Questionnaires were returned by 323 (65%) mothers; 215 (67%) of them reported reading BabyCheck, the majority found it easy to understand (74%) and agreed with the advice (67%). Eighty-four (26%) of the mothers who returned the questionnaires reported using BabyCheck when their baby was ill; of these, 71% agre...

  4. Safety and Availability Checking for User Authorization Queries in RBAC

    Directory of Open Access Journals (Sweden)

    Jian-feng Lu

    2012-09-01

    Full Text Available This paper introduces the notion of safety and availability checking for user authorization query processing, and develop a recursive algorithm use the ideas from backtracking-based search techniques to search for the optimal solution. For the availability checking, we introduce the notion of max activatable set (MAS, and show formally how MAS can be determined in a hybrid role hierarchy. For the safety checking, we give a formal definition of dynamic separation-of-duty (DSoD policies, and show how to reduce the safety checking for DSoD to a SAT instance.

  5. Constraint processing in our extensible language for cooperative imaging system

    Science.gov (United States)

    Aoki, Minoru; Murao, Yo; Enomoto, Hajime

    1996-02-01

    The extensible WELL (Window-based elaboration language) has been developed using the concept of common platform, where both client and server can communicate with each other with support from a communication manager. This extensible language is based on an object oriented design by introducing constraint processing. Any kind of services including imaging in the extensible language is controlled by the constraints. Interactive functions between client and server are extended by introducing agent functions including a request-respond relation. Necessary service integrations are satisfied with some cooperative processes using constraints. Constraints are treated similarly to data, because the system should have flexibilities in the execution of many kinds of services. The similar control process is defined by using intentional logic. There are two kinds of constraints, temporal and modal constraints. Rendering the constraints, the predicate format as the relation between attribute values can be a warrant for entities' validity as data. As an imaging example, a processing procedure of interaction between multiple objects is shown as an image application for the extensible system. This paper describes how the procedure proceeds in the system, and that how the constraints work for generating moving pictures.

  6. Modifier constraint in alkali borophosphate glasses using topological constraint theory

    Energy Technology Data Exchange (ETDEWEB)

    Li, Xiang [Key Laboratory for Ultrafine Materials of Ministry of Education, School of Materials Science and Engineering, East China University of Science and Technology, Shanghai 200237 (China); Zeng, Huidan, E-mail: hdzeng@ecust.edu.cn [Key Laboratory for Ultrafine Materials of Ministry of Education, School of Materials Science and Engineering, East China University of Science and Technology, Shanghai 200237 (China); Jiang, Qi [Key Laboratory for Ultrafine Materials of Ministry of Education, School of Materials Science and Engineering, East China University of Science and Technology, Shanghai 200237 (China); Zhao, Donghui [Unifrax Corporation, Niagara Falls, NY 14305 (United States); Chen, Guorong [Key Laboratory for Ultrafine Materials of Ministry of Education, School of Materials Science and Engineering, East China University of Science and Technology, Shanghai 200237 (China); Wang, Zhaofeng; Sun, Luyi [Department of Chemical & Biomolecular Engineering and Polymer Program, Institute of Materials Science, University of Connecticut, Storrs, CT 06269 (United States); Chen, Jianding [Key Laboratory for Ultrafine Materials of Ministry of Education, School of Materials Science and Engineering, East China University of Science and Technology, Shanghai 200237 (China)

    2016-12-01

    In recent years, composition-dependent properties of glasses have been successfully predicted using the topological constraint theory. The constraints of the glass network are derived from two main parts: network formers and network modifiers. The constraints of the network formers can be calculated on the basis of the topological structure of the glass. However, the latter cannot be accurately calculated in this way, because of the existing of ionic bonds. In this paper, the constraints of the modifier ions in phosphate glasses were thoroughly investigated using the topological constraint theory. The results show that the constraints of the modifier ions are gradually increased with the addition of alkali oxides. Furthermore, an improved topological constraint theory for borophosphate glasses is proposed by taking the composition-dependent constraints of the network modifiers into consideration. The proposed theory is subsequently evaluated by analyzing the composition dependence of the glass transition temperature in alkali borophosphate glasses. This method is supposed to be extended to other similar glass systems containing alkali ions.

  7. checkCIF/PLATON report Datablock: I

    Indian Academy of Sciences (India)

    FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED ... Absorption correction given as integration ... 2 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 7 ALERT type ... problems it may be necessary to carry out additional measurements or structure refinements.

  8. 25 CFR 115.704 - May we accept for deposit into a trust account retirement checks/payments or pension fund checks...

    Science.gov (United States)

    2010-04-01

    ... checks/payments or pension fund checks/payments even though those funds are not specified in § 115.702... May we accept for deposit into a trust account retirement checks/payments or pension fund checks.../payments or pension fund checks/payments or any funds from sources that are not identified in the table in...

  9. Firm Deadline Checking of Safety-Critical Java Applications with Statistical Model Checking

    DEFF Research Database (Denmark)

    Ravn, Anders P.; Thomsen, Bent; Søe Luckow, Kasper

    2017-01-01

    In cyber-physical applications many programs have hard real-time constraints that have to be stringently validated. In some applications, there are programs that have hard deadlines, which must not be violated. Other programs have soft deadlines where the value of the response decreases when...... deadlines and performance in the case of soft deadlines. The extended approach is illustrated with examples from applications....

  10. [Airport security check of medical substances used during patient repatriation].

    Science.gov (United States)

    Felkai, Péter

    2012-09-16

    During airport security check of passenger luggage, hazardous items and substances are prohibited to be taken into the restricted safety zone of the airport and the aircraft. Among equipment of the medical staff escorting the patient, there are several devices and materials which are considered hazardous for security reasons. However, medical equipment and substances are indispensable for treating patients during the flight. The aim of the author was to present his experience obtained with the use of an instrument developed for testing liquids, aerosols and gels for security reasons. An instrument based on Raman spectroscopy was used for the identification of medical substances. The results confirmed that the instrument was able to recognize the tested medical substances. The non-destructive testing maintained sample integrity and asepsis. The data indicate that the instrument has a promising utility for the identification of medical substances. It seems important that during repatriation medical substances should be selected not only on the ground of their medical necessity, but their packaging should be also taken into consideration. It is necessary to perform more tests on different medical substances used in emergency care in order to make the database of medical substances stored in the library of instrument more complete.

  11. Grab Windows training opportunities; check CERN Windows roadmap!

    CERN Multimedia

    IT Department

    2011-01-01

    CERN Operating Systems and Information Services group (IT-OIS) actively monitors market trends to check how new software products correspond to CERN needs. In the Windows world, Windows 7 has been a big hit, with over 1500 Windows 7 PCs within less than a year since its support was introduced at CERN. No wonder: Windows XP is nearly 10 years old and is steadily approaching the end of its life-cycle. At CERN, support for Windows XP will stop at the end of December 2012. Compared to Vista, Windows 7 has the same basic hardware requirements, but offers higher performance, so the decision to upgrade is rather straightforward. CERN support for Vista will end in June 2011. In the world of Microsoft Office, version 2007 offers better integration with the central services than the older version 2003. Progressive upgrade from 2003 to 2007 is planned to finish in September 2011, but users are encouraged to pro-actively upgrade at their convenience. Please note that Office 2007 brings an important change in the area of ...

  12. Observational constraints on interstellar chemistry

    International Nuclear Information System (INIS)

    Winnewisser, G.

    1984-01-01

    The author points out presently existing observational constraints in the detection of interstellar molecular species and the limits they may cast on our knowledge of interstellar chemistry. The constraints which arise from the molecular side are summarised and some technical difficulties encountered in detecting new species are discussed. Some implications for our understanding of molecular formation processes are considered. (Auth.)

  13. Market segmentation using perceived constraints

    Science.gov (United States)

    Jinhee Jun; Gerard Kyle; Andrew Mowen

    2008-01-01

    We examined the practical utility of segmenting potential visitors to Cleveland Metroparks using their constraint profiles. Our analysis identified three segments based on their scores on the dimensions of constraints: Other priorities--visitors who scored the highest on 'other priorities' dimension; Highly Constrained--visitors who scored relatively high on...

  14. Fixed Costs and Hours Constraints

    Science.gov (United States)

    Johnson, William R.

    2011-01-01

    Hours constraints are typically identified by worker responses to questions asking whether they would prefer a job with more hours and more pay or fewer hours and less pay. Because jobs with different hours but the same rate of pay may be infeasible when there are fixed costs of employment or mandatory overtime premia, the constraint in those…

  15. An Introduction to 'Creativity Constraints'

    DEFF Research Database (Denmark)

    Onarheim, Balder; Biskjær, Michael Mose

    2013-01-01

    Constraints play a vital role as both restrainers and enablers in innovation processes by governing what the creative agent/s can and cannot do, and what the output can and cannot be. Notions of constraints are common in creativity research, but current contributions are highly dispersed due to n...

  16. Constraint Programming for Context Comprehension

    DEFF Research Database (Denmark)

    Christiansen, Henning

    2014-01-01

    A close similarity is demonstrated between context comprehension, such as discourse analysis, and constraint programming. The constraint store takes the role of a growing knowledge base learned throughout the discourse, and a suitable con- straint solver does the job of incorporating new pieces...

  17. 31 CFR 10.31 - Negotiation of taxpayer checks.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Negotiation of taxpayer checks. 10.31 Section 10.31 Money and Finance: Treasury Office of the Secretary of the Treasury PRACTICE BEFORE THE INTERNAL REVENUE SERVICE Duties and Restrictions Relating to Practice Before the Internal Revenue Service § 10.31 Negotiation of taxpayer checks. ...

  18. Simple nonparametric checks for model data fit in CAT

    NARCIS (Netherlands)

    Meijer, R.R.

    2005-01-01

    In this paper, the usefulness of several nonparametric checks is discussed in a computerized adaptive testing (CAT) context. Although there is no tradition of nonparametric scalability in CAT, it can be argued that scalability checks can be useful to investigate, for example, the quality of item

  19. 26 CFR 301.6657-1 - Bad checks.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Bad checks. 301.6657-1 Section 301.6657-1... Additions to the Tax and Additional Amounts § 301.6657-1 Bad checks. (a) In general. Except as provided in... district director that it was tendered in good faith with reasonable cause to believe that it would be duly...

  20. Employees are ambivalent about health checks in the occupational setting

    NARCIS (Netherlands)

    Damman, O.C.; van der Beek, A.J.; Timmermans, D.R.M.

    2015-01-01

    Background: Employees are increasingly provided with preventive health checks. However, participation rates are low and several ethical issues arise, such as a potential perceived threat to autonomy and privacy. Aims: To assess what employees think about preventive health checks in the occupational

  1. Not Just right experiences as ironic result of perseverative checking

    NARCIS (Netherlands)

    van Dis, E.A.M.; van den Hout, M.A.

    2016-01-01

    Objective: patients with obsessive-compulsive disorder (ocD) typically report to have “not just right experiences” (NJRE). up till now it is unclear which behavioral ocD features may give rise to NJREs. We used an induced checking paradigm to experimentally study whether perseverative checking

  2. Development of a stainless steel check valve for cryogenic applications

    NARCIS (Netherlands)

    Veenstra, T.T.; Venhorst, G.C.F.; Venhorst, G.C.F.; Burger, Johannes Faas; Holland, Herman J.; ter Brake, Hermanus J.M.; Sirbi, A.; Rogalla, Horst

    2007-01-01

    This paper describes the development of a check valve for use in a sorption compressor that will drive a 10 mW 4.5 K Joule–Thomson cryocooler. For the check valve extremely low backflow rates are tolerable at an operating temperature of the valve of 50 K. To fulfill these requirements, the sealing

  3. Check-up Measurement (update). Deliverable D5.22

    NARCIS (Netherlands)

    Holtzer, A.C.G.; Giessen, A.M.D. van der; Djurica, M.

    2015-01-01

    This deliverable D5.22 presents the GEN6 check-up measurement. It describes the most prominent outcomes of the GEN6 project up to this point in time. The check-up measurement helps to focus the monitoring towards the most relevant achievements of the project, such that an efficient and well-targeted

  4. Model Checking Markov Reward Models with Impulse Rewards

    NARCIS (Netherlands)

    Cloth, Lucia; Katoen, Joost-Pieter; Khattri, Maneesh; Pulungan, Reza; Bondavalli, Andrea; Haverkort, Boudewijn; Tang, Dong

    This paper considers model checking of Markov reward models (MRMs), continuous-time Markov chains with state rewards as well as impulse rewards. The reward extension of the logic CSL (Continuous Stochastic Logic) is interpreted over such MRMs, and two numerical algorithms are provided to check the

  5. Efficient probabilistic model checking on general purpose graphic processors

    NARCIS (Netherlands)

    Bosnacki, D.; Edelkamp, S.; Sulewski, D.; Pasareanu, C.S.

    2009-01-01

    We present algorithms for parallel probabilistic model checking on general purpose graphic processing units (GPGPUs). For this purpose we exploit the fact that some of the basic algorithms for probabilistic model checking rely on matrix vector multiplication. Since this kind of linear algebraic

  6. 16 CFR 240.12 - Checking customer's use of payments.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Checking customer's use of payments. 240.12 Section 240.12 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR ADVERTISING ALLOWANCES AND OTHER MERCHANDISING PAYMENTS AND SERVICES § 240.12 Checking customer's use of...

  7. Dynamic State Space Partitioning for External Memory Model Checking

    DEFF Research Database (Denmark)

    Evangelista, Sami; Kristensen, Lars Michael

    2009-01-01

    We describe a dynamic partitioning scheme usable by model checking techniques that divide the state space into partitions, such as most external memory and distributed model checking algorithms. The goal of the scheme is to reduce the number of transitions that link states belonging to different...

  8. 31 CFR 211.1 - Withholding delivery of checks.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Withholding delivery of checks. 211.1 Section 211.1 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE DELIVERY OF CHECKS AND WARRANTS TO...

  9. Checking Consistency of Pedigree Information is NP-complete

    DEFF Research Database (Denmark)

    Aceto, Luca; Hansen, Jens A.; Ingolfsdottir, Anna

    Consistency checking is a fundamental computational problem in genetics. Given a pedigree and information on the genotypes of some of the individuals in it, the aim of consistency checking is to determine whether these data are consistent with the classic Mendelian laws of inheritance. This probl...

  10. 40 CFR 89.317 - NOX converter check.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false NOX converter check. 89.317 Section 89.317 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED..., the chemiluminescent oxides of nitrogen analyzer shall be checked for NO2 to NO converter efficiency...

  11. Strategic Planning through Model Checking of ATL Formulae

    NARCIS (Netherlands)

    Jamroga, W.J.; Rutkowski, L.; Siekmann, J.; Tadeusiewicz, R.; Zadeh, L.A.

    2004-01-01

    Model checking of temporal logic has already been proposed for automatic planning. In this paper, we introduce a simple adaptation of the ATL model checking algorithm that returns a strategy to achieve given goal. We point out that the algorithm generalizes minimaxing, and that ATL models generalize

  12. Partial-Order Reduction for GPU Model Checking

    NARCIS (Netherlands)

    Neele, T.; Wijs, A.; Bosnacki, D.; van de Pol, Jan Cornelis; Artho, C; Legay, A.; Peled, D.

    2016-01-01

    Model checking using GPUs has seen increased popularity over the last years. Because GPUs have a limited amount of memory, only small to medium-sized systems can be verified. For on-the-fly explicit-state model checking, we improve memory efficiency by applying partial-order reduction. We propose

  13. Partial-order reduction for GPU model checking

    NARCIS (Netherlands)

    Neele, T.S.; Wijs, A.J.; Bošnački, D.; van de Pol, J.C.

    2016-01-01

    Model checking using GPUs has seen increased popularity over the last years. Because GPUs have a limited amount of memory, only small to medium-sized systems can be verified. For on-the-fly explicitstate model checking, we improve memory efficiency by applying partialorder reduction. We propose

  14. Fraud by using a check | Azarian | Journal of Fundamental and ...

    African Journals Online (AJOL)

    If someone used check as a tool to fraud and looting of property of others, should they just be subject to check law, and according to the provisions of the law are prosecuted? Are crook people the same as honorable merchants that due to some unwanted changes and fluctuations in the market and social conditions

  15. Using LDPC Code Constraints to Aid Recovery of Symbol Timing

    Science.gov (United States)

    Jones, Christopher; Villasnor, John; Lee, Dong-U; Vales, Esteban

    2008-01-01

    A method of utilizing information available in the constraints imposed by a low-density parity-check (LDPC) code has been proposed as a means of aiding the recovery of symbol timing in the reception of a binary-phase-shift-keying (BPSK) signal representing such a code in the presence of noise, timing error, and/or Doppler shift between the transmitter and the receiver. This method and the receiver architecture in which it would be implemented belong to a class of timing-recovery methods and corresponding receiver architectures characterized as pilotless in that they do not require transmission and reception of pilot signals. Acquisition and tracking of a signal of the type described above have traditionally been performed upstream of, and independently of, decoding and have typically involved utilization of a phase-locked loop (PLL). However, the LDPC decoding process, which is iterative, provides information that can be fed back to the timing-recovery receiver circuits to improve performance significantly over that attainable in the absence of such feedback. Prior methods of coupling LDPC decoding with timing recovery had focused on the use of output code words produced as the iterations progress. In contrast, in the present method, one exploits the information available from the metrics computed for the constraint nodes of an LDPC code during the decoding process. In addition, the method involves the use of a waveform model that captures, better than do the waveform models of the prior methods, distortions introduced by receiver timing errors and transmitter/ receiver motions. An LDPC code is commonly represented by use of a bipartite graph containing two sets of nodes. In the graph corresponding to an (n,k) code, the n variable nodes correspond to the code word symbols and the n-k constraint nodes represent the constraints that the code places on the variable nodes in order for them to form a valid code word. The decoding procedure involves iterative computation

  16. Statistical Model Checking of Rich Models and Properties

    DEFF Research Database (Denmark)

    Poulsen, Danny Bøgsted

    in undecidability issues for the traditional model checking approaches. Statistical model checking has proven itself a valuable supplement to model checking and this thesis is concerned with extending this software validation technique to stochastic hybrid systems. The thesis consists of two parts: the first part...... motivates why existing model checking technology should be supplemented by new techniques. It also contains a brief introduction to probability theory and concepts covered by the six papers making up the second part. The first two papers are concerned with developing online monitoring techniques...... systems. The fifth paper shows how stochastic hybrid automata are useful for modelling biological systems and the final paper is concerned with showing how statistical model checking is efficiently distributed. In parallel with developing the theory contained in the papers, a substantial part of this work...

  17. 31 CFR 245.8 - Receipt or recovery of original check.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Receipt or recovery of original check... CHECKS § 245.8 Receipt or recovery of original check. (a) If the original check is received or recovered... of instructions with respect to the negotiability of such check. (b) If the original check is...

  18. Combining Ratio Estimation for Low Density Parity Check (LDPC) Coding

    Science.gov (United States)

    Mahmoud, Saad; Hi, Jianjun

    2012-01-01

    The Low Density Parity Check (LDPC) Code decoding algorithm make use of a scaled receive signal derived from maximizing the log-likelihood ratio of the received signal. The scaling factor (often called the combining ratio) in an AWGN channel is a ratio between signal amplitude and noise variance. Accurately estimating this ratio has shown as much as 0.6 dB decoding performance gain. This presentation briefly describes three methods for estimating the combining ratio: a Pilot-Guided estimation method, a Blind estimation method, and a Simulation-Based Look-Up table. The Pilot Guided Estimation method has shown that the maximum likelihood estimates of signal amplitude is the mean inner product of the received sequence and the known sequence, the attached synchronization marker (ASM) , and signal variance is the difference of the mean of the squared received sequence and the square of the signal amplitude. This method has the advantage of simplicity at the expense of latency since several frames worth of ASMs. The Blind estimation method s maximum likelihood estimator is the average of the product of the received signal with the hyperbolic tangent of the product combining ratio and the received signal. The root of this equation can be determined by an iterative binary search between 0 and 1 after normalizing the received sequence. This method has the benefit of requiring one frame of data to estimate the combining ratio which is good for faster changing channels compared to the previous method, however it is computationally expensive. The final method uses a look-up table based on prior simulated results to determine signal amplitude and noise variance. In this method the received mean signal strength is controlled to a constant soft decision value. The magnitude of the deviation is averaged over a predetermined number of samples. This value is referenced in a look up table to determine the combining ratio that prior simulation associated with the average magnitude of

  19. Vocabulary Constraint on Texts

    Directory of Open Access Journals (Sweden)

    C. Sutarsyah

    2008-01-01

    Full Text Available This case study was carried out in the English Education Department of State University of Malang. The aim of the study was to identify and describe the vocabulary in the reading text and to seek if the text is useful for reading skill development. A descriptive qualitative design was applied to obtain the data. For this purpose, some available computer programs were used to find the description of vocabulary in the texts. It was found that the 20 texts containing 7,945 words are dominated by low frequency words which account for 16.97% of the words in the texts. The high frequency words occurring in the texts were dominated by function words. In the case of word levels, it was found that the texts have very limited number of words from GSL (General Service List of English Words (West, 1953. The proportion of the first 1,000 words of GSL only accounts for 44.6%. The data also show that the texts contain too large proportion of words which are not in the three levels (the first 2,000 and UWL. These words account for 26.44% of the running words in the texts.  It is believed that the constraints are due to the selection of the texts which are made of a series of short-unrelated texts. This kind of text is subject to the accumulation of low frequency words especially those of content words and limited of words from GSL. It could also defeat the development of students' reading skills and vocabulary enrichment.

  20. Embedding Temporal Constraints For Coordinated Execution in Habitat Automation

    Science.gov (United States)

    Morris, Paul; Schwabacher, Mark; Dalal, Michael; Fry, Charles

    2013-01-01

    Future NASA plans call for long-duration deep space missions with human crews. Because of light-time delay and other considerations, increased autonomy will be needed. This will necessitate integration of tools in such areas as anomaly detection, diagnosis, planning, and execution. In this paper we investigate an approach that integrates planning and execution by embedding planner-derived temporal constraints in an execution procedure. To avoid the need for propagation, we convert the temporal constraints to dispatchable form. We handle some uncertainty in the durations without it affecting the execution; larger variations may cause activities to be skipped.

  1. Systematic Review of the Check-In, Check-Out Intervention for Students at Risk for Emotional and Behavioral Disorders

    Science.gov (United States)

    Hawken, Leanne S.; Bundock, Kaitlin; Kladis, Kristin; O'Keeffe, Breda; Barret, Courtenay A.

    2014-01-01

    The purpose of this systematic literature review was to summarize outcomes of the Check-in Check-out (CICO) intervention across elementary and secondary settings. Twenty-eight studies utilizing both single subject and group (experimental and quasi-experimental) designs were included in this review. Median effect sizes across the eight group…

  2. A global analysis of NMR distance constraints from the PDB

    International Nuclear Information System (INIS)

    Vranken, Wim

    2007-01-01

    Information obtained from Nuclear Magnetic Resonance (NMR) experiments is encoded as a set of constraint lists when calculating three-dimensional structures for a protein. With the amount of constraint data from the world wide Protein Data Bank (wwPDB) that is now available, it is possible to do a global, large-scale analysis using only information from the constraints, without taking the coordinate information into account. This article describes such an analysis of distance constraints from NOE data based on a set of 1834 NMR PDB entries containing 1909 protein chains. In order to best represent the quality and extent of the data that is currently deposited at the wwPDB, only the original data as deposited by the authors was used, and no attempt was made to 'clean up' and further interpret this information. Because the constraint lists provide a single set of data, and not an ensemble of structural solutions, they are easier to analyse and provide a reduced form of structural information that is relevant for NMR analysis only. The online resource resulting from this analysis makes it possible to check, for example, how often a particular contact occurs when assigning NOESY spectra, or to find out whether a particular sequence fragment is likely to be difficult to assign. In this respect it formalises information that scientists with experience in spectrum analysis are aware of but cannot necessarily quantify. The analysis described here illustrates the importance of depositing constraints (and all other possible NMR derived information) along with the structure coordinates, as this type of information can greatly assist the NMR community

  3. Check valve diagnostics utilizing acoustic and magnetic technologies

    International Nuclear Information System (INIS)

    Agostinelli, A.

    1991-01-01

    The potential hazards associated with check valve failures make it necessary to detect check valve problems before they cause significant damage. In the nuclear industry, check valve failures are known to have resulted in damaging water hammer conditions, overpressurization of low pressure systems, steam binding of auxiliary feedwater pumps, and other serious component damage in power plant environments. Similar problems exist in fossil power and various process industries, but the resources dedicated to valve maintenance issues are greatly reduced. However, the trend toward plant life extension, predictive maintenance, and maximum operating efficiency will raise the general awareness of check valve maintenance in commercial (non-nuclear) applications. Although this paper includes specific references to the nuclear industry, the check valve problem conditions and diagnostic techniques apply across all power and process plant environments. The ability to accurately diagnose check valve conditions using non-intrusive, predictive maintenance testing methods allows for a more cost-efficient, productive maintenance program. One particular diagnostic system, called Quickcheck trademark, assists utilities in addressing these concerns. This article presents actual field test data and analysis that demonstrate the power of check valve diagnostics. Prior to presenting the field data, a brief overview of the system is overviewed

  4. EASY-2005: validation and new tools for data checking

    International Nuclear Information System (INIS)

    Forrest, R.; Kopecky, J.

    2006-01-01

    The European Activation System (EASY) is the tool developed for activation calculations as part of the Fusion Technology programme. It comprises the EAF nuclear data libraries and the FISPACT inventory code. The version EASY-2005, released last year contains many more neutron-induced reactions than the previous version; an increase of about a factor of five to 62,637. The reason for this was the increase in the upper energy limit from 20 to 60 MeV. A major strand of work within Europe has been the measurement of activation in a series of well-defined neutron spectra, these integral results can then be used to validate a subset of the EAF-2005 library, demonstrating that it can be relied on for activation predictions in similar spectra. A validation report has been produced covering 453 reactions; this shows the integral results and the available differential data from EXFOR for these reactions. For 202 reactions there is good agreement, indicating that the data for the reaction are adequate. In cases of disagreement the report indicates where additional measurements are required or where the library data can be improved. The majority of the data above 20 MeV were obtained from model calculations, and this is also the case for many of the reactions at all energies. Because of the large number of reactions and the lack of experimental data, there was a need to develop new tools that could help in the checking of such a large library. Within the SAFEPAQ-II code that is used for evaluation and production of the EAF libraries, the new methodology of Statistical Analysis of Cross Sections (SACS) has been developed. This enables various quantities such as maximum cross section (σ max ), energy at maximum (E max ) and width at half maximum (W 0.5 ) to be plotted as functions of atomic mass (A) and asymmetry parameter (s) for each type of reaction. Such plots show well defined trends and inconsistent data for a particular reaction can easily be identified. Using the

  5. PREREQUISITE PROGRAMMES IN OWN CHECKS IN STATUTORY AND VOLUNTARY LEGISLATION

    Directory of Open Access Journals (Sweden)

    E. Guidi

    2012-08-01

    Full Text Available Prerequisite Programmes approach is a requirement for implementing a correct own check plan. This new approach, born according to the European Legislation, is completely recognized by third Nation Authorities and private Inspection and Accreditation Bodies. This method is the basis to verify if an own check system is under control and to verify if corrective actions are built up to warrant hygienic production standards. The present work demonstrate that a correct own check plan is built up only by a Pre Requisites Program approach. The new UNI EN ISO 22000:2005 standard describe this concept specifying the difference between PRP and CCP.

  6. Implementing Model-Check for Employee and Management Satisfaction

    Science.gov (United States)

    Jones, Corey; LaPha, Steven

    2013-01-01

    This presentation will discuss methods to which ModelCheck can be implemented to not only improve model quality, but also satisfy both employees and management through different sets of quality checks. This approach allows a standard set of modeling practices to be upheld throughout a company, with minimal interaction required by the end user. The presenter will demonstrate how to create multiple ModelCheck standards, preventing users from evading the system, and how it can improve the quality of drawings and models.

  7. Plant experience with check valves in passive systems

    Energy Technology Data Exchange (ETDEWEB)

    Pahladsingh, R R [GKN Joint Nuclear Power Plant, Dodewaard (Netherlands)

    1996-12-01

    In the design of the advanced nuclear reactors there is a tendency to introduce more passive safety systems. The 25 year old design of the GKN nuclear reactor is different from the present BWR reactors because of some special features, such as the Natural Circulation - and the Passive Isolation Condenser system. When reviewing the design, one can conclude that the plant has 25 years of experience with check valves in passive systems and as passive components in systems. The result of this experience has been modeled in a plant-specific ``living PSA`` for the plant. A data-analysis has been performed on components which are related to the safety systems in the plant. As part of this study also the check valves have been taken in consideration. At GKN, the check valves have shown to be reliable components in the systems and no catastrophic failures have been experienced during the 25 years of operation. Especially the Isolation Condenser with its operation experience can contribute substantially to the insight of check valves in stand-by position at reactor pressure and operating by gravity under different pressure conditions. With the introduction of several passive systems in the SBWR-600 design, such as the Isolation Condensers, Gravity Driven Cooling, and Suppression Pool Cooling System, the issue of reliability of check valves in these systems is actual. Some critical aspects for study in connection with check valves are: What is the reliability of a check valve in a system at reactor pressure, to open on demand; what is the reliability of a check valve in a system at low pressure (gravity), to open on demand; what is the reliability of a check valve to open/close when the stand-by check wave is at zero differential pressure. The plant experience with check valves in a few essential safety systems is described and a brief introduction will be made about the application of check valves in the design of the new generation reactors is given. (author). 6 figs, 1 tab.

  8. Machine tongues. X. Constraint languages

    Energy Technology Data Exchange (ETDEWEB)

    Levitt, D.

    Constraint languages and programming environments will help the designer produce a lucid description of a problem domain, and then of particular situations and problems in it. Early versions of these languages were given descriptions of real world domain constraints, like the operation of electrical and mechanical parts. More recently, the author has automated a vocabulary for describing musical jazz phrases, using constraint language as a jazz improviser. General constraint languages will handle all of these domains. Once the model is in place, the system will connect built-in code fragments and algorithms to answer questions about situations; that is, to help solve problems. Bugs will surface not in code, but in designs themselves. 15 references.

  9. Robust and Accurate Image-Based Georeferencing Exploiting Relative Orientation Constraints

    Science.gov (United States)

    Cavegn, S.; Blaser, S.; Nebiker, S.; Haala, N.

    2018-05-01

    Urban environments with extended areas of poor GNSS coverage as well as indoor spaces that often rely on real-time SLAM algorithms for camera pose estimation require sophisticated georeferencing in order to fulfill our high requirements of a few centimeters for absolute 3D point measurement accuracies. Since we focus on image-based mobile mapping, we extended the structure-from-motion pipeline COLMAP with georeferencing capabilities by integrating exterior orientation parameters from direct sensor orientation or SLAM as well as ground control points into bundle adjustment. Furthermore, we exploit constraints for relative orientation parameters among all cameras in bundle adjustment, which leads to a significant robustness and accuracy increase especially by incorporating highly redundant multi-view image sequences. We evaluated our integrated georeferencing approach on two data sets, one captured outdoors by a vehicle-based multi-stereo mobile mapping system and the other captured indoors by a portable panoramic mobile mapping system. We obtained mean RMSE values for check point residuals between image-based georeferencing and tachymetry of 2 cm in an indoor area, and 3 cm in an urban environment where the measurement distances are a multiple compared to indoors. Moreover, in comparison to a solely image-based procedure, our integrated georeferencing approach showed a consistent accuracy increase by a factor of 2-3 at our outdoor test site. Due to pre-calibrated relative orientation parameters, images of all camera heads were oriented correctly in our challenging indoor environment. By performing self-calibration of relative orientation parameters among respective cameras of our vehicle-based mobile mapping system, remaining inaccuracies from suboptimal test field calibration were successfully compensated.

  10. ROBUST AND ACCURATE IMAGE-BASED GEOREFERENCING EXPLOITING RELATIVE ORIENTATION CONSTRAINTS

    Directory of Open Access Journals (Sweden)

    S. Cavegn

    2018-05-01

    Full Text Available Urban environments with extended areas of poor GNSS coverage as well as indoor spaces that often rely on real-time SLAM algorithms for camera pose estimation require sophisticated georeferencing in order to fulfill our high requirements of a few centimeters for absolute 3D point measurement accuracies. Since we focus on image-based mobile mapping, we extended the structure-from-motion pipeline COLMAP with georeferencing capabilities by integrating exterior orientation parameters from direct sensor orientation or SLAM as well as ground control points into bundle adjustment. Furthermore, we exploit constraints for relative orientation parameters among all cameras in bundle adjustment, which leads to a significant robustness and accuracy increase especially by incorporating highly redundant multi-view image sequences. We evaluated our integrated georeferencing approach on two data sets, one captured outdoors by a vehicle-based multi-stereo mobile mapping system and the other captured indoors by a portable panoramic mobile mapping system. We obtained mean RMSE values for check point residuals between image-based georeferencing and tachymetry of 2 cm in an indoor area, and 3 cm in an urban environment where the measurement distances are a multiple compared to indoors. Moreover, in comparison to a solely image-based procedure, our integrated georeferencing approach showed a consistent accuracy increase by a factor of 2–3 at our outdoor test site. Due to pre-calibrated relative orientation parameters, images of all camera heads were oriented correctly in our challenging indoor environment. By performing self-calibration of relative orientation parameters among respective cameras of our vehicle-based mobile mapping system, remaining inaccuracies from suboptimal test field calibration were successfully compensated.

  11. Fluid convection, constraint and causation

    Science.gov (United States)

    Bishop, Robert C.

    2012-01-01

    Complexity—nonlinear dynamics for my purposes in this essay—is rich with metaphysical and epistemological implications but is receiving sustained philosophical analysis only recently. I will explore some of the subtleties of causation and constraint in Rayleigh–Bénard convection as an example of a complex phenomenon, and extract some lessons for further philosophical reflection on top-down constraint and causation particularly with respect to causal foundationalism. PMID:23386955

  12. Exercise: When to Check with Your Doctor First

    Science.gov (United States)

    ... check with your doctor before you start to exercise. By Mayo Clinic Staff Regular exercise can help you control your weight, reduce your ... talk to your doctor before starting a new exercise routine. Although moderate physical activity such as brisk ...

  13. Additional considerations regarding the choice of measurement control check frequency

    International Nuclear Information System (INIS)

    Bruckner, L.A.

    1993-01-01

    In a previous paper, factors involved in the choice of frequency of instrument measurement control checks were presented. Unfortunately, some discussions were inadvertently omitted from the paper during the process of review, editing and printing. That material is presented here

  14. Reality Checks: The state of civil society organizations in Ethiopia ...

    African Journals Online (AJOL)

    Reality Checks: The state of civil society organizations in Ethiopia. ... limit the space for CSOs working on human rights and governance and it is legitimate and ... This paper contains contextualized arguments based on empirical data as reality ...

  15. Multi-Valued Modal Fixed Point Logics for Model Checking

    Science.gov (United States)

    Nishizawa, Koki

    In this paper, I will show how multi-valued logics are used for model checking. Model checking is an automatic technique to analyze correctness of hardware and software systems. A model checker is based on a temporal logic or a modal fixed point logic. That is to say, a system to be checked is formalized as a Kripke model, a property to be satisfied by the system is formalized as a temporal formula or a modal formula, and the model checker checks that the Kripke model satisfies the formula. Although most existing model checkers are based on 2-valued logics, recently new attempts have been made to extend the underlying logics of model checkers to multi-valued logics. I will summarize these new results.

  16. Automatic checking system of radioactivity in motor-cars 'AKKORD'

    International Nuclear Information System (INIS)

    Kuechler, L.; Seidler, M.; Zierenberg, B.

    1994-01-01

    A monitoring device has been developed for an automated checking of all vehicles leaving or entering a nuclear installation against uncontrolled lost of radioactive material. This device is an excellent tool for radioactive material flow control. (orig.) [de

  17. Review and analysis of check valve failure data

    International Nuclear Information System (INIS)

    Todd, M.D.; Casada, D.A.

    1992-01-01

    Check valve operating problems in recent years have resulted in significant operating transients, increased cost and decreased system availability. There has been, in response, additional attention given to check valves by utilities, as well as the US Nuclear Regulatory Commission and the American Society of Mechanical Engineers Operation and Maintenance Committee. All these organizations have the fundamental goal of ensuring reliable operation of check valves. A key ingredient to an engineering-oriented reliability improvement effort is a thorough understanding of relevant historical experience. Oak Ridge National Laboratory is currently conducting a detailed review of historical failure data available through the Institute of Nuclear Power Operation's Nuclear Plant Reliability Data System. The focus of the review is on check valve failures that have involved significant degradation of the valve internal parts. A variety of parameters are being considered during the review, including size, age, system of service, method of failure discovery, the affected valve parts, attributed causes, and corrective actions

  18. 48 CFR 22.406-7 - Compliance checking.

    Science.gov (United States)

    2010-10-01

    ... SOCIOECONOMIC PROGRAMS APPLICATION OF LABOR LAWS TO GOVERNMENT ACQUISITIONS Labor Standards for Contracts... inspections to check type of work performed, number and classification of workers, and fulfillment of posting...

  19. NRC valve performance test program - check valve testing

    International Nuclear Information System (INIS)

    Jeanmougin, N.M.

    1987-01-01

    The Valve Performance Test Program addresses the current requirements for testing of pressure isolation valves (PIVs) in light water reactors. Leak rate monitoring is the current method used by operating commercial power plants to survey the condition of their PIVs. ETEC testing of three check valves (4-inch, 6-inch, and 12-inch nominal diameters) indicates that leak rate testing is not a reliable method for detecting impending valve failure. Acoustic emission monitoring of check valves shows promise as a method of detecting loosened internals damage. Future efforts will focus on evaluation of acoustic emission monitoring as a technique for determining check valve condition. Three gate valves also will be tested to evaluate whether the check valve results are applicable to gate type PIVs

  20. Diagnostic framework and health check tool for engineering and technology projects

    Directory of Open Access Journals (Sweden)

    Simon P Philbin

    2014-10-01

    Full Text Available Purpose: Development of a practitioner oriented diagnostic framework and health check tool to support the robust assessment of engineering and technology projects.Design/methodology/approach: The research is based on a literature review that draws together insights on project assessment and critical success factors to establish an integrated systems view of projects. This is extended to allow a comprehensive diagnostic framework to be developed along with a high-level health check tool that can be readily deployed on projects. The utility of the diagnostic framework and health check tool are explored through three illustrative case studies, with two from Canada and one from the United Kingdom. Findings andOriginality/value: The performance of engineering and technology projects can be viewed through a systems perspective and being a function of six sub-systems that are: process, technology, resources, impact, knowledge and culture. The diagnostic framework that is developed through this research integrates these sub-systems to provide a comprehensive assessment methodology for projects, which is linked to existing best practice for project reviews, performance management and maturity models. The case studies provide managerial insights that are related to the diagnostic framework but crucially also position the approach in the context of industrial applications for construction engineering and technology management.Research limitations/implications: The case study approach includes two case studies from the construction and facilities development sector with the third case study from the research and technology sector. Further work is required to investigate the use of the diagnostic framework and health check tool in other sectors.Practical implications: The health check tool will be of practical benefit to new projects managers that require access to a robust and convenient project review methodology for assessing the status and health of a

  1. Progress realized by numerized Eddy current checking-chains

    International Nuclear Information System (INIS)

    Guerin, F.; Blanchet, A.

    1985-01-01

    Until the last ten years , the tubes of the Steam Generators of the Nuclear Stations were inspected by means of Eddy Current with analogical checkings-chains. HBS Company has perfected a numerized checking-chain allowing transmission up to 300 m of the E.C. signals. In a near future, it will be then possible to do periodical inspections of Steam Generators from cabins located out of the reactor building [fr

  2. SOLA-LOOP analysis of a back pressure check valve

    International Nuclear Information System (INIS)

    Travis, J.R.

    1984-01-01

    The SOLA-LOOP computer code for transient, nonequilibrium, two-phase flows in networks has been coupled with a simple valve model to analyze a feedwater pipe breakage with a back-pressure check valve. Three tests from the Superheated Steam Reactor Safety Program Project (PHDR) at Kahl, West Germany, are analyzed, and the calculated transient back-pressure check valve behavior and fluid dynamics effects are found to be in excellent agreement with the experimentally measured data

  3. Model checking biological systems described using ambient calculus

    DEFF Research Database (Denmark)

    Mardare, Radu Iulian; Priami, Corrado; Qualia, Paola

    2005-01-01

    Model checking biological systems described using ambient calculus. In Proc. of the second International Workshop on Computational Methods in Systems Biology (CMSB04), Lecture Notes in Bioinformatics 3082:85-103, Springer, 2005.......Model checking biological systems described using ambient calculus. In Proc. of the second International Workshop on Computational Methods in Systems Biology (CMSB04), Lecture Notes in Bioinformatics 3082:85-103, Springer, 2005....

  4. First experiences with the LHC BLM sanity checks

    OpenAIRE

    Emery, J; Dehning, B; Effinger, E; Nordt, A; Sapinski, M G; Zamantzas, C

    2010-01-01

    The reliability concerns have driven the design of the Large Hardron Collider (LHC) Beam Loss Monitoring (BLM) system from the early stage of the studies up to the present commissioning and the latest development of diagnostic tools. To protect the system against non-conformities, new ways of automatic checking have been developed and implemented. These checks are regularly and systematically executed by the LHC operation team to ensure that the system status is after each test "as good as ne...

  5. Assessment of diagnostic methods for determining degradation of check valves

    International Nuclear Information System (INIS)

    Haynes, H.D.; Farmer, W.S.

    1992-01-01

    The Oak Ridge National Laboratory (ORNL) has carried out a comprehensive aging assessment of check valves in support of the Nuclear Plant Aging Research (NPAR) program. This paper provides a summary of the ORNL check valve aging assessment with emphasis on the identification, evaluation, and application of check valve monitoring methods and techniques. Several check valve monitoring methods are described and compared. These methods include: acoustic emission monitoring, ultrasonic inspection, magnetic flux signature analysis (MFSA), external magnetics. These diagnostic technologies were shown to be useful in determining check valve condition (e.g., disc position, disc motion, and seat leakage), although none of the methods was by itself, successful in monitoring all three condition indicators. The combination of acoustic emission with either ultrasonics or one of the magnetic technologies, however, yields a monitoring system that succeeds in providing the sensitivity to detect all major check valve operating conditions. Other areas covered in the paper include descriptions of relevant regulatory issues, utility group activities, and interactions ORNL has had with outside organizations for the purpose of disseminating research results

  6. First experiences with the LHC BLM sanity checks

    Science.gov (United States)

    Emery, J.; Dehning, B.; Effinger, E.; Nordt, A.; Sapinski, M. G.; Zamantzas, C.

    2010-12-01

    The reliability concerns have driven the design of the Large Hardron Collider (LHC) Beam Loss Monitoring (BLM) system from the early stage of the studies up to the present commissioning and the latest development of diagnostic tools. To protect the system against non-conformities, new ways of automatic checking have been developed and implemented. These checks are regularly and systematically executed by the LHC operation team to ensure that the system status is after each test "as good as new". The sanity checks are part of this strategy. They are testing the electrical part of the detectors (ionisation chamber or secondary emission detector), their cable connections to the front-end electronics, further connections to the back-end electronics and their ability to request a beam abort. During the installation and in the early commissioning phase, these checks have shown their ability to find also non-conformities caused by unexpected failure event scenarios. In every day operation, a non-conformity discovered by this check inhibits any further injections into the LHC until the check confirms the absence of non-conformities.

  7. First experiences with the LHC BLM sanity checks

    International Nuclear Information System (INIS)

    Emery, J; Dehning, B; Effinger, E; Nordt, A; Sapinski, M G; Zamantzas, C

    2010-01-01

    The reliability concerns have driven the design of the Large Hardron Collider (LHC) Beam Loss Monitoring (BLM) system from the early stage of the studies up to the present commissioning and the latest development of diagnostic tools. To protect the system against non-conformities, new ways of automatic checking have been developed and implemented. These checks are regularly and systematically executed by the LHC operation team to ensure that the system status is after each test a s good as new . The sanity checks are part of this strategy. They are testing the electrical part of the detectors (ionisation chamber or secondary emission detector), their cable connections to the front-end electronics, further connections to the back-end electronics and their ability to request a beam abort. During the installation and in the early commissioning phase, these checks have shown their ability to find also non-conformities caused by unexpected failure event scenarios. In every day operation, a non-conformity discovered by this check inhibits any further injections into the LHC until the check confirms the absence of non-conformities.

  8. First experiences with the LHC BLM sanity checks

    Energy Technology Data Exchange (ETDEWEB)

    Emery, J; Dehning, B; Effinger, E; Nordt, A; Sapinski, M G; Zamantzas, C, E-mail: Jonathan.emery@cern.ch [CERN, CH-1211 Geneve 23 (Switzerland)

    2010-12-15

    The reliability concerns have driven the design of the Large Hardron Collider (LHC) Beam Loss Monitoring (BLM) system from the early stage of the studies up to the present commissioning and the latest development of diagnostic tools. To protect the system against non-conformities, new ways of automatic checking have been developed and implemented. These checks are regularly and systematically executed by the LHC operation team to ensure that the system status is after each test {sup a}s good as new{sup .} The sanity checks are part of this strategy. They are testing the electrical part of the detectors (ionisation chamber or secondary emission detector), their cable connections to the front-end electronics, further connections to the back-end electronics and their ability to request a beam abort. During the installation and in the early commissioning phase, these checks have shown their ability to find also non-conformities caused by unexpected failure event scenarios. In every day operation, a non-conformity discovered by this check inhibits any further injections into the LHC until the check confirms the absence of non-conformities.

  9. Radioactive check sources for alpha and beta sensitive radiological instrumentation

    International Nuclear Information System (INIS)

    Barnett, J.M.; Kane, J.E. II.

    1994-06-01

    Since 1991, the Westinghouse Hanford Company has examined the construction and use of alpha and beta radioactive check sources for calibrating instruments and for performing response checks of instruments used for operational and environmental radiation detection. The purpose of using a radioactive check source is to characterize the response of a radiation monitoring instrument in the presence of radioactivity. To accurately calibrate the instrument and check its response, the check source used must emulate as closely as possible the actual physical and isotopic conditions being monitored. The isotope employed and the physical methods used to fabricate the check source (among other factors) determine instrument response. Although information from applicable national and international standards, journal articles, books, and government documents was considered, empirical data collected is most valuable when considering the type of source to use for a particular application. This paper presents source construction methods, use considerations, and standard recommendations. The results of a Hanford Site evaluation of several types of alpha and beta sources are also given

  10. Double checking medicines: defence against error or contributory factor?

    Science.gov (United States)

    Armitage, Gerry

    2008-08-01

    The double checking of medicines in health care is a contestable procedure. It occupies an obvious position in health care practice and is understood to be an effective defence against medication error but the process is variable and the outcomes have not been exposed to testing. This paper presents an appraisal of the process using data from part of a larger study on the contributory factors in medication errors and their reporting. Previous research studies are reviewed; data are analysed from a review of 991 drug error reports and a subsequent series of 40 in-depth interviews with health professionals in an acute hospital in northern England. The incident reports showed that errors occurred despite double checking but that action taken did not appear to investigate the checking process. Most interview participants (34) talked extensively about double checking but believed the process to be inconsistent. Four key categories were apparent: deference to authority, reduction of responsibility, automatic processing and lack of time. Solutions to the problems were also offered, which are discussed with several recommendations. Double checking medicines should be a selective and systematic procedure informed by key principles and encompassing certain behaviours. Psychological research may be instructive in reducing checking errors but the aviation industry may also have a part to play in increasing error wisdom and reducing risk.

  11. Validating database constraints and updates using automated reasoning techniques

    NARCIS (Netherlands)

    Feenstra, Remco; Wieringa, Roelf J.

    1995-01-01

    In this paper, we propose a new approach to the validation of formal specifications of integrity constraints. The validation problem of fornmal specifications consists of assuring whether the formal specification corresponds with what the domain specialist intends. This is distinct from the

  12. Constraint map for landfill site selection in Akure Metropolis ...

    African Journals Online (AJOL)

    An integration of remote sensing, soil type, geological, geoelectrical, hydrogeological and geotechnical data was carried out in a GIS environment with a view to developing a constraint map for the location of landfill (waste disposal) site(s) in Akure, Metropolis.. Geomorphological features identified from satellite images ...

  13. Building a Library for Microelectronics Verification with Topological Constraints

    Science.gov (United States)

    2017-03-01

    with topological constraints. Circuits at the second level of abstraction are selected from prior work on simulated reverse- engineered hardware...entering DoD systems. The Defense Advanced Research Project Agency (DARPA) Trusted Integrated Circuits (TRUST) [12-14] program was introduced to focus on...serious- risks-from-counterfeit-electronic-parts/ 4. “Trusted Integrated Circuits (TRUST)”. [Online]. DARPA Microsystems Technology Office. Available

  14. Developmental constraints on behavioural flexibility.

    Science.gov (United States)

    Holekamp, Kay E; Swanson, Eli M; Van Meter, Page E

    2013-05-19

    We suggest that variation in mammalian behavioural flexibility not accounted for by current socioecological models may be explained in part by developmental constraints. From our own work, we provide examples of constraints affecting variation in behavioural flexibility, not only among individuals, but also among species and higher taxonomic units. We first implicate organizational maternal effects of androgens in shaping individual differences in aggressive behaviour emitted by female spotted hyaenas throughout the lifespan. We then compare carnivores and primates with respect to their locomotor and craniofacial adaptations. We inquire whether antagonistic selection pressures on the skull might impose differential functional constraints on evolvability of skulls and brains in these two orders, thus ultimately affecting behavioural flexibility in each group. We suggest that, even when carnivores and primates would theoretically benefit from the same adaptations with respect to behavioural flexibility, carnivores may nevertheless exhibit less behavioural flexibility than primates because of constraints imposed by past adaptations in the morphology of the limbs and skull. Phylogenetic analysis consistent with this idea suggests greater evolutionary lability in relative brain size within families of primates than carnivores. Thus, consideration of developmental constraints may help elucidate variation in mammalian behavioural flexibility.

  15. Data assimilation with inequality constraints

    Science.gov (United States)

    Thacker, W. C.

    If values of variables in a numerical model are limited to specified ranges, these restrictions should be enforced when data are assimilated. The simplest option is to assimilate without regard for constraints and then to correct any violations without worrying about additional corrections implied by correlated errors. This paper addresses the incorporation of inequality constraints into the standard variational framework of optimal interpolation with emphasis on our limited knowledge of the underlying probability distributions. Simple examples involving only two or three variables are used to illustrate graphically how active constraints can be treated as error-free data when background errors obey a truncated multi-normal distribution. Using Lagrange multipliers, the formalism is expanded to encompass the active constraints. Two algorithms are presented, both relying on a solution ignoring the inequality constraints to discover violations to be enforced. While explicitly enforcing a subset can, via correlations, correct the others, pragmatism based on our poor knowledge of the underlying probability distributions suggests the expedient of enforcing them all explicitly to avoid the computationally expensive task of determining the minimum active set. If additional violations are encountered with these solutions, the process can be repeated. Simple examples are used to illustrate the algorithms and to examine the nature of the corrections implied by correlated errors.

  16. Constraint programming and decision making

    CERN Document Server

    Kreinovich, Vladik

    2014-01-01

    In many application areas, it is necessary to make effective decisions under constraints. Several area-specific techniques are known for such decision problems; however, because these techniques are area-specific, it is not easy to apply each technique to other applications areas. Cross-fertilization between different application areas is one of the main objectives of the annual International Workshops on Constraint Programming and Decision Making. Those workshops, held in the US (El Paso, Texas), in Europe (Lyon, France), and in Asia (Novosibirsk, Russia), from 2008 to 2012, have attracted researchers and practitioners from all over the world. This volume presents extended versions of selected papers from those workshops. These papers deal with all stages of decision making under constraints: (1) formulating the problem of multi-criteria decision making in precise terms, (2) determining when the corresponding decision problem is algorithmically solvable; (3) finding the corresponding algorithms, and making...

  17. Body Covering and Body Image: A Comparison of Veiled and Unveiled Muslim Women, Christian Women, and Atheist Women Regarding Body Checking, Body Dissatisfaction, and Eating Disorder Symptoms.

    Science.gov (United States)

    Wilhelm, Leonie; Hartmann, Andrea S; Becker, Julia C; Kişi, Melahat; Waldorf, Manuel; Vocks, Silja

    2018-02-21

    Although Islam is the fastest growing religion worldwide, only few studies have investigated body image in Muslim women, and no study has investigated body checking. Therefore, the present study examined whether body image, body checking, and disordered eating differ between veiled and unveiled Muslim women, Christian women, and atheist women. While the groups did not differ regarding body dissatisfaction, unveiled Muslim women reported more checking than veiled Muslim and Christian women, and higher bulimia scores than Christian. Thus, prevention against eating disorders should integrate all women, irrespective of religious affiliation or veiling, with a particular focus on unveiled Muslim women.

  18. Biochemia Medica has started using the CrossCheck plagiarism detection software powered by iThenticate

    Science.gov (United States)

    Šupak-Smolčić, Vesna; Šimundić, Ana-Maria

    2013-01-01

    In February 2013, Biochemia Medica has joined CrossRef, which enabled us to implement CrossCheck plagiarism detection service. Therefore, all manuscript submitted to Biochemia Medica are now first assigned to Research integrity editor (RIE), before sending the manuscript for peer-review. RIE submits the text to CrossCheck analysis and is responsible for reviewing the results of the text similarity analysis. Based on the CrossCheck analysis results, RIE subsequently provides a recommendation to the Editor-in-chief (EIC) on whether the manuscript should be forwarded to peer-review, corrected for suspected parts prior to peer-review or immediately rejected. Final decision on the manuscript is, however, with the EIC. We hope that our new policy and manuscript processing algorithm will help us to further increase the overall quality of our Journal. PMID:23894858

  19. Estimated emission reductions from California's enhanced Smog Check program.

    Science.gov (United States)

    Singer, Brett C; Wenzel, Thomas P

    2003-06-01

    The U.S. Environmental Protection Agency requires that states evaluate the effectiveness of their vehicle emissions inspection and maintenance (I/M) programs. This study demonstrates an evaluation approach that estimates mass emission reductions over time and includes the effect of I/M on vehicle deterioration. It includes a quantitative assessment of benefits from pre-inspection maintenance and repairs and accounts for the selection bias effect that occurs when intermittent high emitters are tested. We report estimates of one-cycle emission benefits of California's Enhanced Smog Check program, ca. 1999. Program benefits equivalent to metric tons per day of prevented emissions were calculated with a "bottom-up" approach that combined average per vehicle reductions in mass emission rates (g/gal) with average per vehicle activity, resolved by model year. Accelerated simulation mode test data from the statewide vehicle information database (VID) and from roadside Smog Check testing were used to determine 2-yr emission profiles of vehicles passing through Smog Check and infer emission profiles that would occur without Smog Check. The number of vehicles participating in Smog Check was also determined from the VID. We estimate that in 1999 Smog Check reduced tailpipe emissions of HC, CO, and NO(x) by 97, 1690, and 81 t/d, respectively. These correspond to 26, 34, and 14% of the HC, CO, and NO(x) that would have been emitted by vehicles in the absence of Smog Check. These estimates are highly sensitive to assumptions about vehicle deterioration in the absence of Smog Check. Considering the estimated uncertainty in these assumptions yields a range for calculated benefits: 46-128 t/d of HC, 860-2200 t/d of CO, and 60-91 t/d of NO(x). Repair of vehicles that failed an initial, official Smog Check appears to be the most important mechanism of emission reductions, but pre-inspection maintenance and repair also contributed substantially. Benefits from removal of nonpassing

  20. Remote preenrollment checking of consent forms to reduce nonconformity.

    Science.gov (United States)

    Journot, Valérie; Pérusat-Villetorte, Sophie; Bouyssou, Caroline; Couffin-Cadiergues, Sandrine; Tall, Aminata; Chêne, Geneviève

    2013-01-01

    In biomedical research, the signed consent form must be checked for compliance with regulatory requirements. Checking usually is performed on site, most frequently after a participant's final enrollment. We piloted a procedure for remote preenrollment consent forms checking. We applied it in five trials and assessed its efficiency to reduce form nonconformity before participant enrollment. Our clinical trials unit (CTU) routinely uses a consent form with an additional copy that contains a pattern that partially masks the participant's name and signature. After completion and signatures by the participant and investigator, this masked copy is faxed to the CTU for checking. In case of detected nonconformity, the CTU suspends the participant's enrollment until the form is brought into compliance. We checked nonconformities of consent forms both remotely before enrollment and on site in five trials conducted in our CTU. We tabulated the number and nature of nonconformities by location of detection: at the CTU or on site. We used these data for a pseudo before-and-after analysis and estimated the efficiency of this remote checking procedure in terms of reduction of nonconformities before enrollment as compared to the standard on-site checking procedure. We searched for nonconformity determinants among characteristics of trials, consent forms, investigator sites, and participants through multivariate logistic regression so as to identify opportunities for improvement in our procedure. Five trials, starting sequentially but running concurrently, with remote preenrollment and on-site checking of consent forms from 415 participants screened in 2006-2009 led to 518 consent forms checked; 94 nonconformities were detected in 75 forms, 75 (80%) remotely and 19 more (20%) on site. Nonconformities infrequently concerned dates of signatures (7%) and information about participants (12%). Most nonconformities dealt with investigator information (76%), primarily contact information

  1. Proposal of Constraints Analysis Method Based on Network Model for Task Planning

    Science.gov (United States)

    Tomiyama, Tomoe; Sato, Tatsuhiro; Morita, Toyohisa; Sasaki, Toshiro

    Deregulation has been accelerating several activities toward reengineering business processes, such as railway through service and modal shift in logistics. Making those activities successful, business entities have to regulate new business rules or know-how (we call them ‘constraints’). According to the new constraints, they need to manage business resources such as instruments, materials, workers and so on. In this paper, we propose a constraint analysis method to define constraints for task planning of the new business processes. To visualize each constraint's influence on planning, we propose a network model which represents allocation relations between tasks and resources. The network can also represent task ordering relations and resource grouping relations. The proposed method formalizes the way of defining constraints manually as repeatedly checking the network structure and finding conflicts between constraints. Being applied to crew scheduling problems shows that the method can adequately represent and define constraints of some task planning problems with the following fundamental features, (1) specifying work pattern to some resources, (2) restricting the number of resources for some works, (3) requiring multiple resources for some works, (4) prior allocation of some resources to some works and (5) considering the workload balance between resources.

  2. Formalization of taxon-based constraints to detect inconsistencies in annotation and ontology development

    Directory of Open Access Journals (Sweden)

    Mungall Christopher J

    2010-10-01

    Full Text Available Abstract Background The Gene Ontology project supports categorization of gene products according to their location of action, the molecular functions that they carry out, and the processes that they are involved in. Although the ontologies are intentionally developed to be taxon neutral, and to cover all species, there are inherent taxon specificities in some branches. For example, the process 'lactation' is specific to mammals and the location 'mitochondrion' is specific to eukaryotes. The lack of an explicit formalization of these constraints can lead to errors and inconsistencies in automated and manual annotation. Results We have formalized the taxonomic constraints implicit in some GO classes, and specified these at various levels in the ontology. We have also developed an inference system that can be used to check for violations of these constraints in annotations. Using the constraints in conjunction with the inference system, we have detected and removed errors in annotations and improved the structure of the ontology. Conclusions Detection of inconsistencies in taxon-specificity enables gradual improvement of the ontologies, the annotations, and the formalized constraints. This is progressively improving the quality of our data. The full system is available for download, and new constraints or proposed changes to constraints can be submitted online at https://sourceforge.net/tracker/?atid=605890&group_id=36855.

  3. Independent checks of linear accelerators equipped with multileaf collimators

    International Nuclear Information System (INIS)

    Pavlikova, I.; Ekendahl, D.; Horakova, I.

    2005-01-01

    National Radiation Protection Institute (NRPI) provides independent checks of therapeutic equipment as a part of state supervision. In the end of 2003, the audit was broaden for linear accelerators equipped with multileaf collimators (MLC). NRPI provides TLD postal audits and on-site independent checks. This contribution describes tests for multileaf collimators and intensity modulated radiation therapy (IMRT) technique that are accomplished within the independent on-site check of linear accelerators. The character and type of tests that are necessary to pursue for multileaf collimator depends on application technique. There are three basic application of the MLC. The first we call 'static MLC' and it serves for replacing conventional blocking or for adjusting the field shape to match the beam's-eye view projection of a planning target volume during an arc rotation of the x-ray beam. This procedure is called conformal radiotherapy. The most advanced technique with MLC is intensity modulated radiation therapy. The dose can be delivered to the patient with IMRT in various different ways: dynamic MLC, segmented MLC and IMRT arc therapy. Independent audits represent an important instrument of quality assurance. Methodology for independent check of static MLC was successfully verified on two types of accelerators: Varian and Elekta. Results from pilot measurements with dynamic MLC imply that the methodology is applicable for Varian accelerators. In the future, the experience with other types of linear accelerators will contribute to renovation, modification, and broaden independent checks methodology. (authors)

  4. STABILITAS CHECK DAM DI ARBORETUM DESA SUMBER BRANTAS

    Directory of Open Access Journals (Sweden)

    Endang Purwati

    2012-09-01

    Full Text Available Abstract: The stability of check-dam in arboretum of Sumber Brantas village. Sumber Brantas water sources area is arboretum territory which has to be maintained as conservation either for technical or vegetation (plants cover by sustainable development. Arboretum territory is made as asylum in irrigation system district of Brantas River. This research discusses technical conservation activity to build the check dam in conserving the area. Check dam is built dimensionally by using HEC-RAS Program to get safe and stable dimension for rolling, shifting and piping of Sf > 1.5, and based on hydrologic analysis to get maximum flood discharge of 48.01 m3second-1. Hydraulic analysis is used to get water level profile and pressure for the dam body. Stability of the structure will be controlled by construction load (weight of check dam and its fully sediment storage condition. The result of this research shows that the safe and stable dimension for check dam are as follows: 28 meter of width; 3 meter of main height; 1.5 meter of sub-height; 10 meter of stilling basin length (Main Dam–Sub Dam.

  5. Model Checking Temporal Logic Formulas Using Sticker Automata

    Science.gov (United States)

    Feng, Changwei; Wu, Huanmei

    2017-01-01

    As an important complex problem, the temporal logic model checking problem is still far from being fully resolved under the circumstance of DNA computing, especially Computation Tree Logic (CTL), Interval Temporal Logic (ITL), and Projection Temporal Logic (PTL), because there is still a lack of approaches for DNA model checking. To address this challenge, a model checking method is proposed for checking the basic formulas in the above three temporal logic types with DNA molecules. First, one-type single-stranded DNA molecules are employed to encode the Finite State Automaton (FSA) model of the given basic formula so that a sticker automaton is obtained. On the other hand, other single-stranded DNA molecules are employed to encode the given system model so that the input strings of the sticker automaton are obtained. Next, a series of biochemical reactions are conducted between the above two types of single-stranded DNA molecules. It can then be decided whether the system satisfies the formula or not. As a result, we have developed a DNA-based approach for checking all the basic formulas of CTL, ITL, and PTL. The simulated results demonstrate the effectiveness of the new method. PMID:29119114

  6. Deployment of check-in nodes in complex networks

    Science.gov (United States)

    Jiang, Zhong-Yuan; Ma, Jian-Feng

    2017-01-01

    In many real complex networks such as the city road networks and highway networks, vehicles often have to pass through some specially functioned nodes to receive check-in like services such as gas supplement at gas stations. Based on existing network structures, to guarantee every shortest path including at least a check-in node, the location selection of all check-in nodes is very essential and important to make vehicles to easily visit these check-in nodes, and it is still remains an open problem in complex network studies. In this work, we aim to find possible solutions for this problem. We first convert it into a set cover problem which is NP-complete and propose to employ the greedy algorithm to achieve an approximate result. Inspired by heuristic information of network structure, we discuss other four check-in node location deployment methods including high betweenness first (HBF), high degree first (HDF), random and low degree first (LDF). Finally, we compose extensive simulations in classical scale-free networks, random networks and real network models, and the results can well confirm the effectiveness of the greedy algorithm. This work has potential applications into many real networks.

  7. FIZCON, ENDF/B Cross-Sections Redundancy Check

    International Nuclear Information System (INIS)

    Dunford, Charles L.

    2007-01-01

    1 - Description of program or function: FIZCON is a program for checking that an evaluated data file has valid data and conforms to recommended procedures. Version 7.01 (April 2005): set success flag after return from beginning; fixed valid level check for an isomer; fixed subsection energy range test in ckf9; changed lower limit on potential scattering test; fixed error in j-value test when l=0 and i=0; added one more significant figure to union grid check and sum up output messages; partial fission cross sections mt=19,20,21 and 38 did not require secondary energy distributions in file 5; corrected product test for elastic scattering; moved potential scattering test to psyche. Version 7.02 (May 2005): Fixed resonance parameter sum test. 2 - Method of solution: FIZCON can recognise the difference between ENDF-6 and ENDF-5 formats and performs its tests accordingly. Some of the tests performed include: data arrays are in increasing energy order; resonance parameter widths add up to the total; Q-values are reasonable and consistent; no required sections are missing and all cover the proper energy range; secondary distributions are normalized to 1.0; energy conservation in decay spectra. Optional tests can be performed to check the redundant cross sections, and algorithms can be used to check for possible incorrect entry of data values (Deviant Point test)

  8. Model checking software for phylogenetic trees using distribution and database methods

    Directory of Open Access Journals (Sweden)

    Requeno José Ignacio

    2013-12-01

    Full Text Available Model checking, a generic and formal paradigm stemming from computer science based on temporal logics, has been proposed for the study of biological properties that emerge from the labeling of the states defined over the phylogenetic tree. This strategy allows us to use generic software tools already present in the industry. However, the performance of traditional model checking is penalized when scaling the system for large phylogenies. To this end, two strategies are presented here. The first one consists of partitioning the phylogenetic tree into a set of subgraphs each one representing a subproblem to be verified so as to speed up the computation time and distribute the memory consumption. The second strategy is based on uncoupling the information associated to each state of the phylogenetic tree (mainly, the DNA sequence and exporting it to an external tool for the management of large information systems. The integration of all these approaches outperforms the results of monolithic model checking and helps us to execute the verification of properties in a real phylogenetic tree.

  9. A planar PDMS micropump using in-contact minimized-leakage check valves

    International Nuclear Information System (INIS)

    Ni, Junhui; Li, Beizhi; Huang, Fengliang; Wang, Bin; Lin, Qiao

    2010-01-01

    We present a micropump with a simple planar design featuring compliant in-contact check valves in a single layer, which allows for a simple structure and easy system integration. The micropump, based on poly(dimethylsiloxane) (PDMS), primarily consists of a pneumatically driven thin membrane, a pump chamber, and two in-plane check valves. The pair of check valves is based on an in-contact flap–stopper configuration and is able to minimize leakage flow, greatly enhancing the reliability and performance of the micropump. Systematic experimental characterization of the micropump has been performed in terms of the frequency response of the pumping flow rate with respect to factors including device geometry (e.g. chamber height) and operating parameters (e.g. pneumatic driving pressure and backpressure). The results demonstrate that this micropump is capable of reliably generating a maximum flow rate of 41 µL min −1 and operating against a high backpressure of up to 25 kPa. In addition, a lumped-parameter theoretical model for the planar micropump is also developed for accurate analysis of the device behavior. These results demonstrate the capability of this micropump for diverse applications in lab-on-a-chip systems.

  10. Fault Tree Analysis with Temporal Gates and Model Checking Technique for Qualitative System Safety Analysis

    International Nuclear Information System (INIS)

    Koh, Kwang Yong; Seong, Poong Hyun

    2010-01-01

    Fault tree analysis (FTA) has suffered from several drawbacks such that it uses only static gates and hence can not capture dynamic behaviors of the complex system precisely, and it is in lack of rigorous semantics, and reasoning process which is to check whether basic events really cause top events is done manually and hence very labor-intensive and time-consuming for the complex systems while it has been one of the most widely used safety analysis technique in nuclear industry. Although several attempts have been made to overcome this problem, they can not still do absolute or actual time modeling because they adapt relative time concept and can capture only sequential behaviors of the system. In this work, to resolve the problems, FTA and model checking are integrated to provide formal, automated and qualitative assistance to informal and/or quantitative safety analysis. Our approach proposes to build a formal model of the system together with fault trees. We introduce several temporal gates based on timed computational tree logic (TCTL) to capture absolute time behaviors of the system and to give concrete semantics to fault tree gates to reduce errors during the analysis, and use model checking technique to automate the reasoning process of FTA

  11. Hierarchical remote data possession checking method based on massive cloud files

    Directory of Open Access Journals (Sweden)

    Ma Haifeng

    2017-06-01

    Full Text Available Cloud storage service enables users to migrate their data and applications to the cloud, which saves the local data maintenance and brings great convenience to the users. But in cloud storage, the storage servers may not be fully trustworthy. How to verify the integrity of cloud data with lower overhead for users has become an increasingly concerned problem. Many remote data integrity protection methods have been proposed, but these methods authenticated cloud files one by one when verifying multiple files. Therefore, the computation and communication overhead are still high. Aiming at this problem, a hierarchical remote data possession checking (hierarchical-remote data possession checking (H-RDPC method is proposed, which can provide efficient and secure remote data integrity protection and can support dynamic data operations. This paper gives the algorithm descriptions, security, and false negative rate analysis of H-RDPC. The security analysis and experimental performance evaluation results show that the proposed H-RDPC is efficient and reliable in verifying massive cloud files, and it has 32–81% improvement in performance compared with RDPC.

  12. Constraints Faced by Stakeholders under Agriculture Technology Management Agency (ATMA

    Directory of Open Access Journals (Sweden)

    J. Yoga Narasimhalu Naidu

    2017-09-01

    Full Text Available Agriculture Technology Management Agency (ATMA is a registered society in India with key stakeholders enmeshed with various agricultural activities for sustainable agricultural development in the state, with focus at district level. It is a hotbed for integrating research, extension and marketing activities and decentralizing day-to-day management of the public Agricultural Technology Development and Dissemination System. The present study was carried out in Andhra Pradesh state to explore the constraints faced by the extension functionaries at each level of decentralized management. Moreover, constraints perceived by the farmers with the support of ATMA in realizing their needs were also studied.

  13. Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study

    DEFF Research Database (Denmark)

    Yuksel, Ender; Zhu, Huibiao; Nielson, Hanne Riis

    2012-01-01

    that require novel methods and applications. In this context, an important issue is the verification of certain quantitative properties of the system. In this paper, we consider a specific Chinese Smart Grid implementation as a case study and address the verification problem for performance and energy......Cyber-physical systems integrate information and communication technology functions to the physical elements of a system for monitoring and controlling purposes. The conversion of traditional power grid into a smart grid, a fundamental example of a cyber-physical system, raises a number of issues...... consumption. We employ stochastic model checking approach and present our modelling and analysis study using PRISM model checker....

  14. Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2014-01-01

    Cyber-physical systems integrate information and communication technology with the physical elements of a system, mainly for monitoring and controlling purposes. The conversion of traditional power grid into a smart grid, a fundamental example of a cyber-physical system, raises a number of issues...... that require novel methods and applications. One of the important issues in this context is the verification of certain quantitative properties of the system. In this paper, we consider a specific Chinese smart grid implementation as a case study and address the verification problem for performance and energy...... consumption.We employ stochastic model checking approach and present our modelling and analysis study using PRISM model checker....

  15. An integrable noncommutative version of the sine-Gordon system

    International Nuclear Information System (INIS)

    Grisaru, Marcus T.; Penati, Silvia

    2003-01-01

    Using the bicomplex approach we discuss an integrable noncommutative system in two-dimensional Euclidean space. It is described by an equation of motion which reduces to the ordinary sine-Gordon equation when the noncommutation parameter is removed, plus a constraint equation which is nontrivial only in the noncommutative case. The implications of this constraint, which is required by integrability but seems to reduce the space of classical solutions, remain to be understood. We show that the system has an infinite number of conserved currents and we give the general recursive relation for constructing them. For the particular cases of lower spin nontrivial currents we work out the explicit expressions and perform a direct check of their conservation. These currents reduce to the usual sine-Gordon currents in the commutative limit. We find classical 'localized' solutions to first order in the noncommutativity parameter and describe the Backlund transformations for our system. Finally, we comment on the relation of our noncommutative system to the commutative sine-Gordon system

  16. Model Checking Timed Automata with Priorities using DBM Subtraction

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Pettersson, Paul

    2006-01-01

    In this paper we describe an extension of timed automata with priorities, and efficient algorithms to compute subtraction on DBMs (difference bounded matrices), needed in symbolic model-checking of timed automata with priorities. The subtraction is one of the few operations on DBMs that result...... in a non-convex set needing sets of DBMs for representation. Our subtraction algorithms are efficient in the sense that the number of generated DBMs is significantly reduced compared to a naive algorithm. The overhead in time is compensated by the gain from reducing the number of resulting DBMs since...... this number affects the performance of symbolic model-checking. The uses of the DBM subtraction operation extend beyond timed automata with priorities. It is also useful for allowing guards on transitions with urgent actions, deadlock checking, and timed games....

  17. Schedulability of Herschel revisited using statistical model checking

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel

    2015-01-01

    -approximation technique. We can safely conclude that the system is schedulable for varying values of BCET. For the cases where deadlines are violated, we use polyhedra to try to confirm the witnesses. Our alternative method to confirm non-schedulability uses statistical model-checking (SMC) to generate counter...... and blocking times of tasks. Consequently, the method may falsely declare deadline violations that will never occur during execution. This paper is a continuation of previous work of the authors in applying extended timed automata model checking (using the tool UPPAAL) to obtain more exact schedulability...... analysis, here in the presence of non-deterministic computation times of tasks given by intervals [BCET,WCET]. Computation intervals with preemptive schedulers make the schedulability analysis of the resulting task model undecidable. Our contribution is to propose a combination of model checking techniques...

  18. Radiotherapy treatment checking procedures throughout Australasia: results of a survey

    International Nuclear Information System (INIS)

    Duggan, L.; Kron, T.; Howlett, S.

    1996-01-01

    In July 1995, a questionnaire was forwarded to thirty two physicists overseeing Radiation Oncology Departments and brachytherapy in hospitals throughout Australia and New Zealand. From the thirty seven hospitals reached by this survey, details were gathered on thirty hospitals, including the Newcastle In most radiotherapy centres where treatment planning is performed by radiation therapists, at least some of the treatment sheets and their calculations are double checked by radiotherapy physicists. While 23% checked the treatment sheets of all patients, in the majority of centres physicists were found to check only a minor selection, that is, less than 20% of all treatment sheets. Only in six centres physicists were not involved. 5 refs., 4 tabs., 5 figs

  19. Constraint elimination in dynamical systems

    Science.gov (United States)

    Singh, R. P.; Likins, P. W.

    1989-01-01

    Large space structures (LSSs) and other dynamical systems of current interest are often extremely complex assemblies of rigid and flexible bodies subjected to kinematical constraints. A formulation is presented for the governing equations of constrained multibody systems via the application of singular value decomposition (SVD). The resulting equations of motion are shown to be of minimum dimension.

  20. Constraint Programming versus Mathematical Programming

    DEFF Research Database (Denmark)

    Hansen, Jesper

    2003-01-01

    Constraint Logic Programming (CLP) is a relatively new technique from the 80's with origins in Computer Science and Artificial Intelligence. Lately, much research have been focused on ways of using CLP within the paradigm of Operations Research (OR) and vice versa. The purpose of this paper...

  1. Sterile neutrino constraints from cosmology

    DEFF Research Database (Denmark)

    Hamann, Jan; Hannestad, Steen; Raffelt, Georg G.

    2012-01-01

    The presence of light particles beyond the standard model's three neutrino species can profoundly impact the physics of decoupling and primordial nucleosynthesis. I review the observational signatures of extra light species, present constraints from recent data, and discuss the implications of po...... of possible sterile neutrinos with O(eV)-masses for cosmology....

  2. Intertemporal consumption and credit constraints

    DEFF Research Database (Denmark)

    Leth-Petersen, Søren

    2010-01-01

    There is continuing controversy over the importance of credit constraints. This paper investigates whether total household expenditure and debt is affected by an exogenous increase in access to credit provided by a credit market reform that enabled Danish house owners to use housing equity...

  3. Financial Constraints: Explaining Your Position.

    Science.gov (United States)

    Cargill, Jennifer

    1988-01-01

    Discusses the importance of educating library patrons about the library's finances and the impact of budget constraints and the escalating cost of serials on materials acquisition. Steps that can be taken in educating patrons by interpreting and publicizing financial information are suggested. (MES)

  4. Emerging carbon constraints for corporate risk management

    International Nuclear Information System (INIS)

    Busch, Timo; Hoffmann, Volker H.

    2007-01-01

    While discussions about global sustainability challenges abound, the financial risks that they incur, albeit important, have received less attention. We suggest that corporate risk assessments should include sustainability-related aspects, especially with relation to the natural environment, and encompass the flux of critical materials within a company's value chain. Such a comprehensive risk assessment takes into account input- as well as output-related factors. With this paper, we focus on the flux of carbon and define carbon constraints that emerge due to the disposition of fossil fuels in the input dimension and due to direct and indirect climate change effects in the output dimension. We review the literature regarding the financial consequences of carbon constraints on the macroeconomic, sector, and company level. We conclude that: a) financial consequences seem to be asymmetrically distributed between and within sectors, b) the individual risk exposure of companies depends on the intensity of and dependency on carbon-based materials and energy, and c) financial markets have only started to incorporate these aspects in their valuations. This paper ends with recommendations on how to incorporate our results in an integrated carbon risk management framework. (author)

  5. Electrical constraints on electronic components: syntheses of the ETTC'97 and RADECS 97 congress activities

    International Nuclear Information System (INIS)

    Carel, Ch.

    1998-01-01

    The electromagnetic compatibility (EMC) of systems and their hardening against electromagnetic (IEMN, lightning, strong radio and radar fields..) and radiative environments impose severe manufacturing constraints in competition with other functional constraints, like thermal constraints and weight, and operational constraints (maintenance, availability). This paper is a summary of the main topics discussed during the ETTC and RADECS 1997 congresses. The outstanding facts concern: the non-disturbance of components (hyper-frequency EMC and high fields), the non-destruction of components (hardening against electromagnetic pulses), the civil domain, the numerical simulations, the integrity of electronic card signals, and the reliability of components. (J.S.)

  6. Integrated management system

    International Nuclear Information System (INIS)

    Florescu, N.

    2003-01-01

    A management system is developed in order to reflect the needs of the business and to ensure that the objectives of the organization will be achieved. The process model and each individual process within the system then needs to identify the drives or requirements from external customers and stakeholders, regulations, and standards such as ISO and 50-C-Q. The processes are then developed to address these drivers. Developing the process in this way makes it fully integrated and capable of incorporating any new requirements. The International Standard (ISO 9000:2000) promotes the adoption of a process approach when developing, implementing and improving the effectiveness of a quality management system to enhance customer satisfaction by meeting customer requirements. The IAEA Code recognizes that the entire work is a process which can be planned, assessed and improved. For an organization to function effectively, numerous linked activities have to be identified and managed. By definition a process is an activity that using resources and taking into account all the constraints imposed executes the necessary operations which transform the inputs in outcomes. Running a system of processes within an organization, identification of the interaction between the processes and their management can be referred to as a 'process approach'. The advantage of such an approach is the ensuring of the ongoing control over the linkage between the individual processes composing the system as well as over their combination and interaction. Developing a management system implies: identification of the process which delivers Critical Success Factor (CSFs) of the business; identifying the support processes enabling the CSFs to be accomplished; identifying the processes that deliver the business fundamentals. An integrated management system should include all activities not only those related to Quality, Health and Safety. When developing an IMS it is necessary to identify all of the drivers

  7. Hamiltonian path integrals

    International Nuclear Information System (INIS)

    Prokhorov, L.V.

    1982-01-01

    The properties of path integrals associated with the allowance for nonstandard terms reflecting the operator nature of the canonical variables are considered. Rules for treating such terms (''equivalence rules'') are formulated. Problems with a boundary, the behavior of path integrals under canonical transformations, and the problem of quantization of dynamical systems with constraints are considered in the framework of the method

  8. Forgetting what you have checked: a link between working memory impairment and checking behaviors in obsessive-compulsive disorder.

    Science.gov (United States)

    Jaafari, N; Frasca, M; Rigalleau, F; Rachid, F; Gil, R; Olié, J-P; Guehl, D; Burbaud, P; Aouizerate, B; Rotgé, J-Y; Vibert, N

    2013-02-01

    Compulsive checking behaviors are common in obsessive-compulsive disorder (OCD). Several authors have suggested that these checking rituals could be related to memory deficits. Our aim was to test whether patients with OCD show working memory impairment in relation to their checking behavior. We evaluated the verbal and visuospatial components of patients' and controls' working memory using the reading span and backward location span tests. Checking behaviors were measured by recording participants' eye movements during an image comparison task using a non-invasive, infra-red TOBII 1750 eyetracker. Participants were seated, head-free, in a natural position in front of the eyetracker screen where the images were displayed. Patients with OCD made more gaze moves to compare images than controls. Both patients' working memory spans were reduced, and the patients' deficit in the comparison task was negatively related to their working memory spans. This work demonstrates that checking behavior in OCD is linked to a general reduction of the patients' verbal and visuospatial working memory span. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  9. Perencanaan Check Dam Sungai Glugu Kabupaten Grobogan, Jawa Tengah

    OpenAIRE

    Kusuma, Abhibawa Tegar; Wijayanti, Deny; Atmojo, Pranoto Sapto; Edhisono, Sutarto

    2015-01-01

    Glugu River is a tributary of the Lusi River under the authority of the Central River Region Pemali - Juana, precisely located in the administrative area of the Grobogan Regency. Location of Glugu River located upstream, gave effect to the degradation of the river channel, so as to stabilize the river flow necessary to design coservation structure on Glugu River, that is check dam.The data used for design check dam are the primary data (geotechnical, geometry Glugu River, and water when the f...

  10. Stochastic Local Search for Core Membership Checking in Hedonic Games

    Science.gov (United States)

    Keinänen, Helena

    Hedonic games have emerged as an important tool in economics and show promise as a useful formalism to model multi-agent coalition formation in AI as well as group formation in social networks. We consider a coNP-complete problem of core membership checking in hedonic coalition formation games. No previous algorithms to tackle the problem have been presented. In this work, we overcome this by developing two stochastic local search algorithms for core membership checking in hedonic games. We demonstrate the usefulness of the algorithms by showing experimentally that they find solutions efficiently, particularly for large agent societies.

  11. Error Checking for Chinese Query by Mining Web Log

    Directory of Open Access Journals (Sweden)

    Jianyong Duan

    2015-01-01

    Full Text Available For the search engine, error-input query is a common phenomenon. This paper uses web log as the training set for the query error checking. Through the n-gram language model that is trained by web log, the queries are analyzed and checked. Some features including query words and their number are introduced into the model. At the same time data smoothing algorithm is used to solve data sparseness problem. It will improve the overall accuracy of the n-gram model. The experimental results show that it is effective.

  12. A procedure for routine radiation protection checking of mammography equipment

    International Nuclear Information System (INIS)

    Bengtsson, L.G.; Lundehn, I.

    1980-01-01

    A procedure was developed for checking of mammography equipment used in screening for mammary cancer. The procedure will be handled by hospital physicists or x-ray inspectors and is intended to permit checking of x-ray equipment performance as well as evaluation of mean dose or eneray imparted to groups of patients. Measurement methods studied involve TLD, ionization chambers and a new plastic scintillator designed to measure energy imparted. After careful study of sizes and attenuation properties of breasts, a 50 mm polymethylmetacrylate phantom seemed the most appropriate. The choice of measuring equipment is reported as well as some preliminary results from field measurements. (author)

  13. Automation of Geometry Input for Building Code Compliance Check

    DEFF Research Database (Denmark)

    Petrova, Ekaterina Aleksandrova; Johansen, Peter Lind; Jensen, Rasmus Lund

    2017-01-01

    Documentation of compliance with the energy performance regulations at the end of the detailed design phase is mandatory for building owners in Denmark. Therefore, besides multidisciplinary input, the building design process requires various iterative analyses, so that the optimal solutions can...... be identified amongst multiple alternatives. However, meeting performance criteria is often associated with manual data inputs and retroactive modifications of the design. Due to poor interoperability between the authoring tools and the compliance check program, the processes are redundant and inefficient...... from building geometry created in Autodesk Revit and its translation to input for compliance check analysis....

  14. Symbolic Dependency Graphs for PCTL Model-Checking

    DEFF Research Database (Denmark)

    Mariegaard, Anders; Larsen, Kim Guldstrand

    2017-01-01

    We consider the problem of model-checking a subset of probabilistic CTL, interpreted over (discrete-time) Markov reward models, allowing the specification of lower bounds on the probability of the set of paths satisfying a cost-bounded path formula. We first consider a reduction to fixed-point co......We consider the problem of model-checking a subset of probabilistic CTL, interpreted over (discrete-time) Markov reward models, allowing the specification of lower bounds on the probability of the set of paths satisfying a cost-bounded path formula. We first consider a reduction to fixed...

  15. Constraint Embedding for Vehicle Suspension Dynamics

    Directory of Open Access Journals (Sweden)

    Jain Abhinandan

    2016-06-01

    Full Text Available The goal of this research is to achieve close to real-time dynamics performance for allowing auto-pilot in-the-loop testing of unmanned ground vehicles (UGV for urban as well as off-road scenarios. The overall vehicle dynamics performance is governed by the multibody dynamics model for the vehicle, the wheel/terrain interaction dynamics and the onboard control system. The topic of this paper is the development of computationally efficient and accurate dynamics model for ground vehicles with complex suspension dynamics. A challenge is that typical vehicle suspensions involve closed-chain loops which require expensive DAE integration techniques. In this paper, we illustrate the use the alternative constraint embedding technique to reduce the cost and improve the accuracy of the dynamics model for the vehicle.

  16. Regional magnetic anomaly constraints on continental rifting

    Science.gov (United States)

    Vonfrese, R. R. B.; Hinze, W. J.; Olivier, R.; Bentley, C. R.

    1985-01-01

    Radially polarized MAGSAT anomalies of North and South America, Europe, Africa, India, Australia and Antarctica demonstrate remarkably detailed correlation of regional magnetic lithospheric sources across rifted margins when plotted on a reconstruction of Pangea. These major magnetic features apparently preserve their integrity until a superimposed metamorphoric event alters the magnitude and pattern of the anomalies. The longevity of continental scale magnetic anomalies contrasts markedly with that of regional gravity anomalies which tend to reflect predominantly isostatic adjustments associated with neo-tectonism. First observed as a result of NASA's magnetic satellite programs, these anomalies provide new and fundamental constraints on the geologic evolution and dynamics of the continents and oceans. Accordingly, satellite magnetic observations provide a further tool for investigating continental drift to compliment other lines of evidence in paleoclimatology, paleontology, paleomagnetism, and studies of the radiometric ages and geometric fit of the continents.

  17. Sum rules and constraints on passive systems

    International Nuclear Information System (INIS)

    Bernland, A; Gustafsson, M; Luger, A

    2011-01-01

    A passive system is one that cannot produce energy, a property that naturally poses constraints on the system. A system in convolution form is fully described by its transfer function, and the class of Herglotz functions, holomorphic functions mapping the open upper half-plane to the closed upper half-plane, is closely related to the transfer functions of passive systems. Following a well-known representation theorem, Herglotz functions can be represented by means of positive measures on the real line. This fact is exploited in this paper in order to rigorously prove a set of integral identities for Herglotz functions that relate weighted integrals of the function to its asymptotic expansions at the origin and infinity. The integral identities are the core of a general approach introduced here to derive sum rules and physical limitations on various passive physical systems. Although similar approaches have previously been applied to a wide range of specific applications, this paper is the first to deliver a general procedure together with the necessary proofs. This procedure is described thoroughly and exemplified with examples from electromagnetic theory.

  18. Creativity from Constraints in Engineering Design

    DEFF Research Database (Denmark)

    Onarheim, Balder

    2012-01-01

    This paper investigates the role of constraints in limiting and enhancing creativity in engineering design. Based on a review of literature relating constraints to creativity, the paper presents a longitudinal participatory study from Coloplast A/S, a major international producer of disposable...... and ownership of formal constraints played a crucial role in defining their influence on creativity – along with the tacit constraints held by the designers. The designers were found to be highly constraint focused, and four main creative strategies for constraint manipulation were observed: blackboxing...

  19. 31 CFR 240.15 - Checks issued to deceased payees.

    Science.gov (United States)

    2010-07-01

    ...) Handling of checks when an executor or administrator has been appointed. (1) An executor or administrator.... securities; payments for tax refunds; and payments for goods and services. (i) An executor or administrator... the executor or administrator is indorsing. An example would be: “John Jones by Mary Jones, executor...

  20. modelling of queuing process at airport check-in system

    African Journals Online (AJOL)

    HOD

    Key words: Airport check-in system, discrete time events, analytical models, simulation model, SimEvents toolbox. 1. ..... [6] Gross, D. and Harris, C. M. Fundamentals of. Queueing ... [11] Manataki I. E. and Zogra os K. G. “A Generic. System ...

  1. Bayesian inference with information content model check for Langevin equations

    DEFF Research Database (Denmark)

    Krog, Jens F. C.; Lomholt, Michael Andersen

    2017-01-01

    The Bayesian data analysis framework has been proven to be a systematic and effective method of parameter inference and model selection for stochastic processes. In this work we introduce an information content model check which may serve as a goodness-of-fit, like the chi-square procedure...

  2. 17 CFR 230.419 - Offerings by blank check companies.

    Science.gov (United States)

    2010-04-01

    ... derivative securities relating to securities held in the escrow or trust account may be exercised or... other derivative securities issued in the initial offering are exercisable, there is a continuous... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Offerings by blank check...

  3. Financial Record Checking in Surveys: Do Prompts Improve Data Quality?

    Science.gov (United States)

    Murphy, Joe; Rosen, Jeffrey; Richards, Ashley; Riley, Sarah; Peytchev, Andy; Lindblad, Mark

    2016-01-01

    Self-reports of financial information in surveys, such as wealth, income, and assets, are particularly prone to inaccuracy. We sought to improve the quality of financial information captured in a survey conducted by phone and in person by encouraging respondents to check records when reporting on income and assets. We investigated whether…

  4. Consistency checks in beam emission modeling for neutral beam injectors

    International Nuclear Information System (INIS)

    Punyapu, Bharathi; Vattipalle, Prahlad; Sharma, Sanjeev Kumar; Baruah, Ujjwal Kumar; Crowley, Brendan

    2015-01-01

    In positive neutral beam systems, the beam parameters such as ion species fractions, power fractions and beam divergence are routinely measured using Doppler shifted beam emission spectrum. The accuracy with which these parameters are estimated depend on the accuracy of the atomic modeling involved in these estimations. In this work, an effective procedure to check the consistency of the beam emission modeling in neutral beam injectors is proposed. As a first consistency check, at a constant beam voltage and current, the intensity of the beam emission spectrum is measured by varying the pressure in the neutralizer. Then, the scaling of measured intensity of un-shifted (target) and Doppler shifted intensities (projectile) of the beam emission spectrum at these pressure values are studied. If the un-shifted component scales with pressure, then the intensity of this component will be used as a second consistency check on the beam emission modeling. As a further check, the modeled beam fractions and emission cross sections of projectile and target are used to predict the intensity of the un-shifted component and then compared with the value of measured target intensity. An agreement between the predicted and measured target intensities provide the degree of discrepancy in the beam emission modeling. In order to test this methodology, a systematic analysis of Doppler shift spectroscopy data obtained on the JET neutral beam test stand data was carried out

  5. Towards Model Checking a Spi-Calculus Dialect

    NARCIS (Netherlands)

    Gnesi, S.; Latella, D.; Lenzini, Gabriele

    We present a model checking framework for a spi-calculus dialect which uses a linear time temporal logic for expressing security properties. We have provided our spi-calculus dialect, called SPID, with a semantics based on labeled transition systems (LTS), where the intruder is modeled in the

  6. Accuracy Test of Software Architecture Compliance Checking Tools : Test Instruction

    NARCIS (Netherlands)

    Prof.dr. S. Brinkkemper; Dr. Leo Pruijt; C. Köppe; J.M.E.M. van der Werf

    2015-01-01

    Author supplied: "Abstract Software Architecture Compliance Checking (SACC) is an approach to verify conformance of implemented program code to high-level models of architectural design. Static SACC focuses on the modular software architecture and on the existence of rule violating dependencies

  7. 31 CFR 240.14 - Checks issued to incompetent payees.

    Science.gov (United States)

    2010-07-01

    ...) FISCAL SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE INDORSEMENT AND PAYMENT OF CHECKS... without submission of documentary proof of the authority of the guardian or other fiduciary, with the... the certifying agency with information as to the incompetence of the payee and documentary evidence...

  8. checkCIF/PLATON report Datablock: 1b

    Indian Academy of Sciences (India)

    checkCIF was carefully designed to identify outliers and unusual parameters, but every test has its limitations and alerts that are not important in a particular case may appear. Conversely, the absence of alerts does not guarantee there are no aspects of the results needing attention. It is up to the individual to critically assess ...

  9. A review of historical check valve failure data

    International Nuclear Information System (INIS)

    Casada, D.A.; Todd, M.D.

    1992-01-01

    Check valve operating problems in recent years have resulted in significant operating transients, increased cost, and decreased system availability. In response, additional attention has been given to check valves by utilities, as well as the US Nuclear Regulatory Commission (NRC) and the American Society of Mechanical Engineers Operation and Maintenance Committee. All these organizations have the fundamental goal of ensuring reliable operation of check valves. A key ingredient of an engineering-oriented reliability improvement effort is a thorough understanding of relevant historical experience. Oak Ridge National Laboratory is currently conducting a detailed review of historical failure data available through the Institute of Nuclear Power Operation's Nuclear Plant Reliability Data System. The focus of the review is on check valve failures that have involved significant degradation of the valve internal parts. A variety of parameters are being considered during the review, including size, age, system of service, method of failure discovery, the affected valve parts, attributed causes, and corrective actions. This work is being carried out under the auspices of the NRC's Nuclear Plant Aging Research program. At this time, the study is approximately 50% complete. All failure records have been reviewed and categorized, and preliminary tabulation and correlation of data is underway. The bulk of the tabulation and correlation portion of the work is expected to be completed by the end of June 1992. A report draft is expected in the fall of 1992

  10. Symbolic Game Semantics for Model Checking Program Families

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar

    2016-01-01

    represent program families with infinite integers as so-called (finite-state) featured symbolic automata. Specifically designed model checking algorithms are then employed to verify safety of all programs from a family at once and pinpoint those programs that are unsafe (respectively, safe). We present...... a prototype tool implementing this approach, and we illustrate it with several examples....

  11. checkCIF/PLATON report Datablock: fa083

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. Structure factors have been supplied for datablock(s) fa083. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC REFEREE. No syntax errors ...

  12. checkCIF/PLATON report Datablock: gitam035

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. Structure factors have been supplied for datablock(s) gitam035. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC REFEREE. No syntax ...

  13. checkCIF/PLATON report Datablock: rup-re

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  14. checkCIF/PLATON report Datablock: compound1

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  15. Fast flux test facility primary sodium check valve

    International Nuclear Information System (INIS)

    Rabe, G.B.; Nash, C.F.

    1975-01-01

    The design and development of a tilting-disc check valve for the primary sodium coolant loop of the Fast Flux Test Facility is described. The demanding design requirements specified for this system dictated a design with unique features. These features, along with the structural design and analysis requirements and the testing program used to develop and justify the design, are described

  16. Model checking: one can do much more than you think!

    NARCIS (Netherlands)

    Katoen, Joost P.

    2012-01-01

    Model checking is an automated verification technique that actively is applied to find bugs in hardware and software designs. Companies like IBM and Cadence developed their in-house model checkers, and acted as driving forces behind the design of the IEEE-standardized temporal logic PSL. On the

  17. Application of Model-Checking Technology to Controller Synthesis

    DEFF Research Database (Denmark)

    David, Alexandre; Grunnet, Jacob Deleuran; Jessen, Jan Jacob

    2011-01-01

    In this paper we present two frameworks that have been implemented to link traditional model-checking techniques to the domain of control. The techniques are based on solving a timed game and using the resulting solution (a strategy) as a controller. The obtained discrete controller must fit with...

  18. Mandatory Identification Bar Checks: How Bouncers Are Doing Their Job

    Science.gov (United States)

    Monk-Turner, Elizabeth; Allen, John; Casten, John; Cowling, Catherine; Gray, Charles; Guhr, David; Hoofnagle, Kara; Huffman, Jessica; Mina, Moises; Moore, Brian

    2011-01-01

    The behavior of bouncers at on site establishments that served alcohol was observed. Our aim was to better understand how bouncers went about their job when the bar had a mandatory policy to check identification of all customers. Utilizing an ethnographic decision model, we found that bouncers were significantly more likely to card customers that…

  19. Recent advances in importance sampling for statistical model checking

    NARCIS (Netherlands)

    Reijsbergen, D.P.; de Boer, Pieter-Tjerk; Scheinhardt, Willem R.W.; Haverkort, Boudewijn R.H.M.

    2013-01-01

    In the following work we present an overview of recent advances in rare event simulation for model checking made at the University of Twente. The overview is divided into the several model classes for which we propose algorithms, namely multicomponent systems, Markov chains and stochastic Petri

  20. checkCIF/PLATON report Datablock: rupret_0m

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...