WorldWideScience

Sample records for modeling information assurance

  1. Management information system model supporting the quality assurance of schools in Thailand

    Directory of Open Access Journals (Sweden)

    Daoprakai Raso

    2017-07-01

    Full Text Available Management Information Systems are very important tools for Thai Schools in supporting the quality assurance process. This research therefore aimed to develop a Management Information System (MIS model which consisted of two phases. Phase 1 was the design of MIS model used in Thai school quality assurance (QA. Phase 2 was the evaluation of the model which consisted of four parts. There were the MIS circle which consisted of 1 System Investigation, System Analysis, System Design, System Implementation and System Maintenance. 2 The Management Information System, which consisted of data collecting, data processing, information presenting, information saving, and procedure controlling. 3 The factors that support the MIS, which includes information tools and equipment used factor and the information operator’s factor, and 4 the system theory which consisted of input, process, and output. The results showed that the level of opinions in all aspects was at a “high” level.

  2. Models for Information Assurance Education and Outreach: A Report on Year 1 Implementation

    Science.gov (United States)

    Wang, Jianjun

    2013-01-01

    On September 22, 2012, NSF announced its decision to fund a three-year project, "Models for Information Assurance Education and Outreach" (MIAEO). In the first year of grant operation, MIAEO has invited 18 high school students, two K-12 teachers, and two CSUB student assistants to conduct research explorations in the fields of…

  3. Information Assurance Cyber Ecology

    National Research Council Canada - National Science Library

    Jorgensen, Jane

    2003-01-01

    .... The goals of the Cyber Ecology project were to: (1) enable and demonstrate the discovery of noel IA technologies for the detection and mitigation of damage due to cyber attack through the application of ecological models, (2...

  4. Information Assurance in Wireless Networks

    Science.gov (United States)

    Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David

    2001-09-01

    Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.

  5. Risk Information Management Resource (RIMR): modeling an approach to defending against military medical information assurance brain drain

    Science.gov (United States)

    Wright, Willie E.

    2003-05-01

    As Military Medical Information Assurance organizations face off with modern pressures to downsize and outsource, they battle with losing knowledgeable people who leave and take with them what they know. This knowledge is increasingly being recognized as an important resource and organizations are now taking steps to manage it. In addition, as the pressures for globalization (Castells, 1998) increase, collaboration and cooperation are becoming more distributed and international. Knowledge sharing in a distributed international environment is becoming an essential part of Knowledge Management. This is a major shortfall in the current approach to capturing and sharing knowledge in Military Medical Information Assurance. This paper addresses this challenge by exploring Risk Information Management Resource (RIMR) as a tool for sharing knowledge using the concept of Communities of Practice. RIMR is based no the framework of sharing and using knowledge. This concept is done through three major components - people, process and technology. The people aspect enables remote collaboration, support communities of practice, reward and recognize knowledge sharing while encouraging storytelling. The process aspect enhances knowledge capture and manages information. While the technology aspect enhance system integration and data mining, it also utilizes intelligent agents and exploits expert systems. These coupled with supporting activities of education and training, technology infrastructure and information security enables effective information assurance collaboration.

  6. Waste Management facilities cost information: System Cost Model Software Quality Assurance Plan. Revision 2

    International Nuclear Information System (INIS)

    Peterson, B.L.; Lundeen, A.S.

    1996-02-01

    In May of 1994, Lockheed Idaho Technologies Company (LITCO) in Idaho Falls, Idaho and subcontractors developed the System Cost Model (SCM) application. The SCM estimates life-cycle costs of the entire US Department of Energy (DOE) complex for designing; constructing; operating; and decommissioning treatment, storage, and disposal (TSD) facilities for mixed low-level, low-level, transuranic, and mixed transuranic waste. The SCM uses parametric cost functions to estimate life-cycle costs for various treatment, storage, and disposal modules which reflect planned and existing facilities at DOE installations. In addition, SCM can model new facilities based on capacity needs over the program life cycle. The SCM also provides transportation costs for truck and rail, which include transport of contact-handled, remote-handled, and alpha (transuranic) wastes. The user can provide input data (default data is included in the SCM) including the volume and nature of waste to be managed, the time period over which the waste is to be managed, and the configuration of the waste management complex (i.e., where each installation's generated waste will be treated, stored, and disposed). Then the SCM uses parametric cost equations to estimate the costs of pre-operations (designing), construction costs, operation management, and decommissioning these waste management facilities. For the product to be effective and useful the SCM users must have a high level of confidence in the data generated by the software model. The SCM Software Quality Assurance Plan is part of the overall SCM project management effort to ensure that the SCM is maintained as a quality product and can be relied on to produce viable planning data. This document defines tasks and deliverables to ensure continued product integrity, provide increased confidence in the accuracy of the data generated, and meet the LITCO's quality standards during the software maintenance phase. 8 refs., 1 tab

  7. Waste Management facilities cost information: System Cost Model Software Quality Assurance Plan. Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, B.L.; Lundeen, A.S.

    1996-02-01

    In May of 1994, Lockheed Idaho Technologies Company (LITCO) in Idaho Falls, Idaho and subcontractors developed the System Cost Model (SCM) application. The SCM estimates life-cycle costs of the entire US Department of Energy (DOE) complex for designing; constructing; operating; and decommissioning treatment, storage, and disposal (TSD) facilities for mixed low-level, low-level, transuranic, and mixed transuranic waste. The SCM uses parametric cost functions to estimate life-cycle costs for various treatment, storage, and disposal modules which reflect planned and existing facilities at DOE installations. In addition, SCM can model new facilities based on capacity needs over the program life cycle. The SCM also provides transportation costs for truck and rail, which include transport of contact-handled, remote-handled, and alpha (transuranic) wastes. The user can provide input data (default data is included in the SCM) including the volume and nature of waste to be managed, the time period over which the waste is to be managed, and the configuration of the waste management complex (i.e., where each installation`s generated waste will be treated, stored, and disposed). Then the SCM uses parametric cost equations to estimate the costs of pre-operations (designing), construction costs, operation management, and decommissioning these waste management facilities. For the product to be effective and useful the SCM users must have a high level of confidence in the data generated by the software model. The SCM Software Quality Assurance Plan is part of the overall SCM project management effort to ensure that the SCM is maintained as a quality product and can be relied on to produce viable planning data. This document defines tasks and deliverables to ensure continued product integrity, provide increased confidence in the accuracy of the data generated, and meet the LITCO`s quality standards during the software maintenance phase. 8 refs., 1 tab.

  8. Development of an Instructional Quality Assurance Model in Nursing Science

    Science.gov (United States)

    Ajpru, Haruthai; Pasiphol, Shotiga; Wongwanich, Suwimon

    2011-01-01

    The purpose of this study was to develop an instructional quality assurance model in nursing science. The study was divided into 3 phases; (1) to study the information for instructional quality assurance model development (2) to develop an instructional quality assurance model in nursing science and (3) to audit and the assessment of the developed…

  9. A Computational Model and Multi-Agent Simulation for Information Assurance

    Science.gov (United States)

    2002-06-01

    Podell , Information Security: an Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA, 1994. Brinkley, D. L. and Schell, R...R., “What is There to Worry About? An Introduction to the Computer Security Problem,” ed. Abrams and Jajodia and Podell , Information Security: an

  10. HOW TO INCREASE THE INFORMATION ASSURANCE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Artur Sosin

    2018-04-01

    Full Text Available The competitive world we live in today is characterized by an environment where the advancement of technology has increased the number of complex vulnerabilities and sophisticated attacks. Organizations around the globe are facing now the same challenges of implementing data protection and securing information assurance. The purpose of this paper is to prove that Information Assurance has become one of the most important tools in creating and maintaining a competitive advantage in today’s competitive and global marketplace. This paper also presents the relationship between information assurance and cybersecurity, and their connection with confidentiality, integrity, availability (CIA triad. Furthermore, assuring information and providing security is a life cycle process which needs a comprehensive understanding, skills, and experience in order to protect today’s risk management challenges. The author concludes the paper with the importance of information assurance policies which are the fundamental guidelines for protecting information assets and fulfilling information assurance objectives of an organization.

  11. A conceptual competitive intelligence quality assurance model

    Directory of Open Access Journals (Sweden)

    Tshilidzi Eric Nenzhelele

    2015-12-01

    Full Text Available Competitive Intelligence (CI improves the quality of product and service, decision-making and it improves quality of life. However, it has been established that decision makers are not happy about the quality of CI. This is because enterprises fail in quality assurance of CI. It has been concluded that most enterprises are clueless concerning CI quality assurance. Studies that previously attempted to resolve CI quality problem were limited in scope and focused too much on the quality of information than the overall CI quality. The purpose of this study is to propose a conceptual CI quality assurance model which will help in quality assurance of CI. The research was qualitative in nature and used content analysis.

  12. Information Assurance and Forensic Readiness

    Science.gov (United States)

    Pangalos, Georgios; Katos, Vasilios

    Egalitarianism and justice are amongst the core attributes of a democratic regime and should be also secured in an e-democratic setting. As such, the rise of computer related offenses pose a threat to the fundamental aspects of e-democracy and e-governance. Digital forensics are a key component for protecting and enabling the underlying (e-)democratic values and therefore forensic readiness should be considered in an e-democratic setting. This position paper commences from the observation that the density of compliance and potential litigation activities is monotonically increasing in modern organizations, as rules, legislative regulations and policies are being constantly added to the corporate environment. Forensic practices seem to be departing from the niche of law enforcement and are becoming a business function and infrastructural component, posing new challenges to the security professionals. Having no a priori knowledge on whether a security related event or corporate policy violation will lead to litigation, we advocate that computer forensics need to be applied to all investigatory, monitoring and auditing activities. This would result into an inflation of the responsibilities of the Information Security Officer. After exploring some commonalities and differences between IS audit and computer forensics, we present a list of strategic challenges the organization and, in effect, the IS security and audit practitioner will face.

  13. Information Assurance Security in the Information Environment

    CERN Document Server

    Blyth, Andrew

    2006-01-01

    Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more.

  14. INFORMATION ASSURANCE - INTELLIGENCE - INFORMATION SUPERIORITY RELATIONSHIP WITHIN NATO OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe BOARU, Ioan-Mihai ILIEŞ

    2011-01-01

    Full Text Available There is a tight relationship between information assurance, the intelligence cycle and information superiority within NATO operations. The intelligence cycle has a discrete architecture and provides on-time and relevant intelligence products to the joint force commanders and to other authorized users in a specifi c joint area of operations. The intelligence cycle must follow the evolution of the operation. A permanent intelligence estimate will be performed during the military decision making process and operations execution. Information superiority is one of the most powerful intelligence cycle achievements. and decisively infuences the success of NATO joint operations. Information superiority must be preserved and enhanced through information assurance. Information assurance is an information operation that must be planned by the military in charge of operation security or by non-military experts, executed by all personnel during the entire intelligence cycle life time and employed during the planning and execution of NATO joint operations.

  15. Information Assurance and the Information Society

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    1998-01-01

    Society is on the verge of a new era: the information age. Economical changes, a new way of looking at services and new types of conflict are forecasted. Some glimpses of these changes were noticed during the Persian Gulf War. Government decision units, organisations, society and critical industries

  16. Information Assurance and the Information Society

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    1999-01-01

    Society is on the verge of a new era: the information age. Economical changes, a new way of looking at services and new types of conflict are forecasted. Some glimpses of these changes were noticed during the Persian Gulf War. Government decision units, organisations, society and critical industries

  17. NIF Projects Controls and Information Systems Software Quality Assurance Plan

    Energy Technology Data Exchange (ETDEWEB)

    Fishler, B

    2011-03-18

    Quality achievement for the National Ignition Facility (NIF) and the National Ignition Campaign (NIC) is the responsibility of the NIF Projects line organization as described in the NIF and Photon Science Directorate Quality Assurance Plan (NIF QA Plan). This Software Quality Assurance Plan (SQAP) is subordinate to the NIF QA Plan and establishes quality assurance (QA) activities for the software subsystems within Controls and Information Systems (CIS). This SQAP implements an activity level software quality assurance plan for NIF Projects as required by the LLNL Institutional Software Quality Assurance Program (ISQAP). Planned QA activities help achieve, assess, and maintain appropriate quality of software developed and/or acquired for control systems, shot data systems, laser performance modeling systems, business applications, industrial control and safety systems, and information technology systems. The objective of this SQAP is to ensure that appropriate controls are developed and implemented for management planning, work execution, and quality assessment of the CIS organization's software activities. The CIS line organization places special QA emphasis on rigorous configuration control, change management, testing, and issue tracking to help achieve its quality goals.

  18. NIF Projects Controls and Information Systems Software Quality Assurance Plan

    International Nuclear Information System (INIS)

    Fishler, B.

    2011-01-01

    Quality achievement for the National Ignition Facility (NIF) and the National Ignition Campaign (NIC) is the responsibility of the NIF Projects line organization as described in the NIF and Photon Science Directorate Quality Assurance Plan (NIF QA Plan). This Software Quality Assurance Plan (SQAP) is subordinate to the NIF QA Plan and establishes quality assurance (QA) activities for the software subsystems within Controls and Information Systems (CIS). This SQAP implements an activity level software quality assurance plan for NIF Projects as required by the LLNL Institutional Software Quality Assurance Program (ISQAP). Planned QA activities help achieve, assess, and maintain appropriate quality of software developed and/or acquired for control systems, shot data systems, laser performance modeling systems, business applications, industrial control and safety systems, and information technology systems. The objective of this SQAP is to ensure that appropriate controls are developed and implemented for management planning, work execution, and quality assessment of the CIS organization's software activities. The CIS line organization places special QA emphasis on rigorous configuration control, change management, testing, and issue tracking to help achieve its quality goals.

  19. Information Assurance in Saudi Organizations - An Empirical Study

    Science.gov (United States)

    Nabi, Syed Irfan; Mirza, Abdulrahman A.; Alghathbar, Khaled

    This paper presents selective results of a survey conducted to find out the much needed insight into the status of information security in Saudi Arabian organizations. The purpose of this research is to give the state of information assurance in the Kingdom and to better understand the prevalent ground realities. The survey covered technical aspects of information security, risk management and information assurance management. The results provide deep insights in to the existing level of information assurance in various sectors that can be helpful in better understanding the intricate details of the prevalent information security in the Kingdom. Also, the results can be very useful for information assurance policy makers in the government as well as private sector organizations. There are few empirical studies on information assurance governance available in literature, especially about the Middle East and Saudi Arabia, therefore, the results are invaluable for information security researchers in improving the understanding of information assurance in this region and the Kingdom.

  20. Review of the National Information Assurance Partnership (NIAP)

    National Research Council Canada - National Science Library

    Larsen, Gregory N; Burton, J. K; Cohen, Patricia A; Harvey, Rick A; Meeson, Reginald N; Nash, Michael S; Nash, Sarah H; Schneider, Edward A; Simpson, William R; Stytz, Martin R; Wheeler, David A

    2006-01-01

    This study was mandated by the National Strategy to Secure Cyberspace which requires the federal government to conduct a comprehensive review of the National Information Assurance Partnership (NIAP...

  1. Can the Analytical Hierarchy Process Model Be Effectively Applied in the Prioritization of Information Assurance Defense In-Depth Measures? --A Quantitative Study

    Science.gov (United States)

    Alexander, Rodney T.

    2017-01-01

    Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection…

  2. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    Science.gov (United States)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  3. Critical Infrastructure Protection and Information Assurance (CIPIA) Fellow Program

    National Research Council Canada - National Science Library

    Chen, Peter

    2003-01-01

    LSU was one of the universities chosen to participate in the project of training new researchers to work on the Critical Infrastructure Protection and Information Assurance (CIPIA) areas. Three Ph.D...

  4. DoD Global Information Grid Mission Assurance

    National Research Council Canada - National Science Library

    Bargar, Anthony

    2008-01-01

    ... for espionage and the criminal theft of data. GIG mission assurance works to ensure the DoD is able to accomplish its critical missions when networks, services, or information are unavailable, degraded, or distrusted...

  5. Information Assurance (IA) Training and Certification

    National Research Council Canada - National Science Library

    Money, Arthur

    1998-01-01

    Recent attacks against the Department's information infrastructure have heightened awareness of the importance of training as a critical component of protecting the Department's information resources...

  6. Voice Biometrics for Information Assurance Applications

    National Research Council Canada - National Science Library

    Kang, George

    2002-01-01

    In 2002, the President of the United States established an organization within the DOD to develop and promulgate biometrics technologies to achieve security in information, information systems, weapons, and facilities...

  7. Information Assurance within the United States Air Force

    Science.gov (United States)

    Cherry, John D.

    2010-01-01

    According to the Department of Defense (DoD), a review of information assurance (IA) in the United States Air Force (USAF) in 2009, cyber security is jeopardized because of information loss. This situation has occurred in large part because of less than optimal training practices or adherence to training protocols. The purpose of this study was…

  8. INFORMATION FLOW ASSURED BY ITC CONTINUITY PLANNING

    Directory of Open Access Journals (Sweden)

    Gabriel Cozgarea

    2009-05-01

    Full Text Available Forwarding the frequent usage of complex processes and the big volume of information, it is imperative to manage the automatic circuit of the document flow in a company activity. The main advantage of such a system consist in document waiting to be proces

  9. Red Teaming of Advanced Information Assurance Concepts

    International Nuclear Information System (INIS)

    DUGGAN, RUTH A.; WOOD, BRADLEY

    1999-01-01

    Red Teaming is an advanced form of assessment that can be used to identify weaknesses in a variety of cyber systems. it is especially beneficial when the target system is still in development when designers can readily affect improvements. This paper discusses the red team analysis process and the author's experiences applying this process to five selected Information Technology Office (ITO) projects. Some detail of the overall methodology, summary results from the five projects, and lessons learned are contained within this paper

  10. Integrated Reporting and Assurance of Sustainability Information: An Experimental Study on Professional Investors’ Information Processing

    NARCIS (Netherlands)

    Reimsbach, D.; Hahn, R.; Gürtürk, A.

    2018-01-01

    Sustainability-related non-financial information is increasingly deemed value relevant. Against this background, two recent trends in non-financial reporting are frequently discussed: integrated reporting and assurance of sustainability information. Using an established framework of information

  11. Evaluating Outsourcing Information Technology and Assurance Expertise by Small Non-Profit Organizations

    Science.gov (United States)

    Guinn, Fillmore

    2013-01-01

    Small non-profit organizations outsource at least one information technology or information assurance process. Outsourcing information technology and information assurance processes has increased every year. The study was to determine the key reasons behind the choice to outsource information technology and information assurance processes. Using…

  12. Model Based Mission Assurance: Emerging Opportunities for Robotic Systems

    Science.gov (United States)

    Evans, John W.; DiVenti, Tony

    2016-01-01

    The emergence of Model Based Systems Engineering (MBSE) in a Model Based Engineering framework has created new opportunities to improve effectiveness and efficiencies across the assurance functions. The MBSE environment supports not only system architecture development, but provides for support of Systems Safety, Reliability and Risk Analysis concurrently in the same framework. Linking to detailed design will further improve assurance capabilities to support failures avoidance and mitigation in flight systems. This also is leading new assurance functions including model assurance and management of uncertainty in the modeling environment. Further, the assurance cases, a structured hierarchal argument or model, are emerging as a basis for supporting a comprehensive viewpoint in which to support Model Based Mission Assurance (MBMA).

  13. Organizing safety: conditions for successful information assurance programs.

    Science.gov (United States)

    Collmann, Jeff; Coleman, Johnathan; Sostrom, Kristen; Wright, Willie

    2004-01-01

    Organizations must continuously seek safety. When considering computerized health information systems, "safety" includes protecting the integrity, confidentiality, and availability of information assets such as patient information, key components of the technical information system, and critical personnel. "High Reliability Theory" (HRT) argues that organizations with strong leadership support, continuous training, redundant safety mechanisms, and "cultures of high reliability" can deploy and safely manage complex, risky technologies such as nuclear weapons systems or computerized health information systems. In preparation for the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the Office of the Assistant Secretary of Defense (Health Affairs), the Offices of the Surgeons General of the United States Army, Navy and Air Force, and the Telemedicine and Advanced Technology Research Center (TATRC), US Army Medical Research and Materiel Command sponsored organizational, doctrinal, and technical projects that individually and collectively promote conditions for a "culture of information assurance." These efforts include sponsoring the "P3 Working Group" (P3WG), an interdisciplinary, tri-service taskforce that reviewed all relevant Department of Defense (DoD), Miliary Health System (MHS), Army, Navy and Air Force policies for compliance with the HIPAA medical privacy and data security regulations; supporting development, training, and deployment of OCTAVE(sm), a self-directed information security risk assessment process; and sponsoring development of the Risk Information Management Resource (RIMR), a Web-enabled enterprise portal about health information assurance.

  14. [Extraction of management information from the national quality assurance program].

    Science.gov (United States)

    Stausberg, Jürgen; Bartels, Claus; Bobrowski, Christoph

    2007-07-15

    Starting with clinically motivated projects, the national quality assurance program has established a legislative obligatory framework. Annual feedback of results is an important means of quality control. The annual reports cover quality-related information with high granularity. A synopsis for corporate management is missing, however. Therefore, the results of the University Clinics in Greifswald, Germany, have been analyzed and aggregated to support hospital management. Strengths were identified by the ranking of results within the state for each quality indicator, weaknesses by the comparison with national reference values. The assessment was aggregated per clinical discipline and per category (indication, process, and outcome). A composition of quality indicators was claimed multiple times. A coherent concept is still missing. The method presented establishes a plausible summary of strengths and weaknesses of a hospital from the point of view of the national quality assurance program. Nevertheless, further adaptation of the program is needed to better assist corporate management.

  15. Using management information systems to enhance health care quality assurance.

    Science.gov (United States)

    Rosser, L H; Kleiner, B H

    1995-01-01

    Examines how computers and quality assurance are being used to improve the quality of health care delivery. Traditional quality assurance methods have been limited in their ability to effectively manage the high volume of data generated by the health care process. Computers on the other hand are able to handle large volumes of data as well as monitor patient care activities in both the acute care and ambulatory care settings. Discusses the use of computers to collect and analyse patient data so that changes and problems can be identified. In addition, computer models for reminding physicians to order appropriate preventive health measures for their patients are presented. Concludes that the use of computers to augment quality improvement is essential if the quality of patient care and health promotion are to be improved.

  16. A Rotational Blended Learning Model: Enhancement and Quality Assurance

    Science.gov (United States)

    Ghoul, Said

    2013-01-01

    Research on blended learning theory and practice is growing nowadays with a focus on the development, evaluation, and quality assurance of case studies. However, the enhancement of blended learning existing models, the specification of their online parts, and the quality assurance related specifically to them have not received enough attention.…

  17. [Role of medical information processing for quality assurance in obstetrics].

    Science.gov (United States)

    Selbmann, H K

    1983-06-01

    The paradigma of problem-orientated assuring of the professional quality of medical case is a kind of "control loop system" consisting of the following 5 steps: routine observation, identification of the problem, analysis of the problem, translation of problem solutions into daily practice and control as to whether the problem has been solved or eliminated. Medical data processing, which involves documentation, electronic data processing and statistics, can make substantial contributions especially to the steps of observation, identification of the problem, and follow-up control. Perinatal data collection, which has already been introduced in 6 Länder of the Federal Republic of Germany, has supplied ample proof of this. These operations were conducted under the heading "internal clinical assuring of quality with external aid". Those clinics who participated in this programme, were given the necessary aid in self-observation (questionnaires, clinical statistics), and they were also given comparative informative data to help them in identifying the problems (clinical profiles, etc.). It is entirely left to the responsibility of the clinics themselves--voluntary cooperation and guarantee of remaining anonymous being a matter of course -- to draw their own consequences from the collected data and to translate these into clinical everyday practice.

  18. QAM: PROPOSED MODEL FOR QUALITY ASSURANCE IN CBSS

    Directory of Open Access Journals (Sweden)

    Latika Kharb

    2015-08-01

    Full Text Available Component-based software engineering (CBSE / Component-Based Development (CBD lays emphasis on decomposition of the engineered systems into functional or logical components with well-defined interfaces used for communication across the components. Component-based software development approach is based on the idea to develop software systems by selecting appropriate off-the-shelf components and then to assemble them with a well-defined software architecture. Because the new software development paradigm is much different from the traditional approach, quality assurance for component-based software development is a new topic in the software engineering research community. Because component-based software systems are developed on an underlying process different from that of the traditional software, their quality assurance model should address both the process of components and the process of the overall system. Quality assurance for component-based software systems during the life cycle is used to analyze the components for achievement of high quality component-based software systems. Although some Quality assurance techniques and component based approach to software engineering have been studied, there is still no clear and well-defined standard or guidelines for component-based software systems. Therefore, identification of the quality assurance characteristics, quality assurance models, quality assurance tools and quality assurance metrics, are under urgent need. As a major contribution in this paper, I have proposed QAM: Quality Assurance Model for component-based software development, which covers component requirement analysis, component development, component certification, component architecture design, integration, testing, and maintenance.

  19. Development, implementation and quality assurance of biokinetic models within CONRAD

    International Nuclear Information System (INIS)

    Nosske, D.; Birchall, A.; Blanchardon, E.; Breustedt, B.; Giussani, A.; Luciani, A.; Oeh, U.; Lopez, M. A.

    2008-01-01

    The work of the Task Group 5.2 'Research Studies on Biokinetic Models' of the CONRAD project is presented. New biokinetic models have been implemented by several European institutions. Quality assurance procedures included intercomparison of the results as well as quality assurance of model formulation. Additionally, the use of the models was examined leading to proposals of tuning parameters. Stable isotope studies were evaluated with respect to their implications to the new models, and new biokinetic models were proposed on the basis of their results. Furthermore, the development of a biokinetic model describing the effects of decorporation of actinides by diethylenetriaminepentaacetic acid treatment was initiated. (authors)

  20. Effective information management and assurance for a modern organisation during a crisis.

    Science.gov (United States)

    MacLeod, Andrew

    2015-01-01

    During a crisis, organisations face a major unpredictable event with potentially negative consequences. Effective information management and assurance can assist the organisation in making sure that they have the correct information in a secure format to make decisions to recover their operations. The main elements of effective information management and assurance are confidentiality, integrity and availability, combined with non-repudiation. Should an element of effective information management or assurance be removed it can have a detrimental effect on the other elements and render the information management and assurance practices of the organisation ineffectual.

  1. Nuclear information systems: Forming the hub of quality assurance

    International Nuclear Information System (INIS)

    Shepherd, S.H.

    1990-01-01

    Data processing, storage, and transmission technology has advanced sufficiently that nuclear information system networks are developing at many nuclear power plant sites. The networks offer much promise - repetitive tasks can be eliminated, cross checks and reviews can be implemented, and the user can do a more thorough, more professional job. With the arrival of this new power to analyze, plan, communicate, and simplify work comes a duty to properly harness the power. If the power of the information age is misused, or used carelessly, much damage can be done. When it comes to nuclear applications, there are really only three significant features to an information system: quality, reliability, and security. Put simply, the user must trust the accuracy of the system or it cannot be used. A system that is not available for use on demand will not be in demand for long. Fast processors, video graphics, and laser publishing are worthless if one must back up the system with hand calculations and tedious verification of data. An effective nuclear information system has good quality practices interwoven into the hardware and software, so that the system itself can foster and promote better quality assurance

  2. Using simulation and virtual machines to identify information assurance requirements

    Science.gov (United States)

    Banks, Sheila B.; Stytz, Martin R.

    2010-04-01

    The US military is changing its philosophy, approach, and technologies used for warfare. In the process of achieving this vision for high-speed, highly mobile warfare, there are a number of issues that must be addressed and solved; issues that are not addressed by commercial systems because Department of Defense (DoD) Information Technology (IT) systems operate in an environment different from the commercial world. The differences arise from the differences in the scope and skill used in attacks upon DoD systems, the interdependencies between DoD software systems used for network centric warfare (NCW), and the need to rely upon commercial software components in virtually every DoD system. As a result, while NCW promises more effective and efficient means for employing DoD resources, it also increases the vulnerability and allure of DoD systems to cyber attack. A further challenge arises due to the rapid changes in software and information assurance (IA) requirements and technologies over the course of a project. Therefore, the four challenges that must be addressed are determining how to specify the information assurance requirements for a DoD system, minimizing changes to commercial software, incorporation of new system and IA requirements in a timely manner with minimal impact, and insuring that the interdependencies between systems do not result in cyber attack vulnerabilities. In this paper, we address all four issues. In addition to addressing the four challenges outlined above, the interdependencies and interconnections between systems indicate that the IA requirements for a system must consider two important facets of a system's IA defensive capabilities. The facets are the types of IA attacks that the system must repel and the ability of a system to insure that any IA attack that penetrates the system is contained within the system and does not spread. The IA requirements should be derived from threat assessments for the system as well as for the need to

  3. Quality Assurance Model for Digital Adult Education Materials

    Science.gov (United States)

    Dimou, Helen; Kameas, Achilles

    2016-01-01

    Purpose: This paper aims to present a model for the quality assurance of digital educational material that is appropriate for adult education. The proposed model adopts the software quality standard ISO/IEC 9126 and takes into account adult learning theories, Bloom's taxonomy of learning objectives and two instructional design models: Kolb's model…

  4. DoD Global Information Grid Mission Assurance

    National Research Council Canada - National Science Library

    Bargar, Anthony

    2008-01-01

    ...). However, the GIG was built for business efficiency instead of mission assurance against sophisticated adversaries who have demonstrated intent and proven their ability to use cyberspace as a tool...

  5. A Functional Model of Quality Assurance for Psychiatric Hospitals and Corresponding Staffing Requirements.

    Science.gov (United States)

    Kamis-Gould, Edna; And Others

    1991-01-01

    A model for quality assurance (QA) in psychiatric hospitals is described. Its functions (general QA, utilization review, clinical records, evaluation, management information systems, risk management, and infection control), subfunctions, and corresponding staffing requirements are reviewed. This model was designed to foster standardization in QA…

  6. Quality assurance of weather data for agricultural system model input

    Science.gov (United States)

    It is well known that crop production and hydrologic variation on watersheds is weather related. Rarely, however, is meteorological data quality checks reported for agricultural systems model research. We present quality assurance procedures for agricultural system model weather data input. Problems...

  7. Risk-Informed Safety Assurance and Probabilistic Assessment of Mission-Critical Software-Intensive Systems

    Science.gov (United States)

    Guarro, Sergio B.

    2010-01-01

    This report validates and documents the detailed features and practical application of the framework for software intensive digital systems risk assessment and risk-informed safety assurance presented in the NASA PRA Procedures Guide for Managers and Practitioner. This framework, called herein the "Context-based Software Risk Model" (CSRM), enables the assessment of the contribution of software and software-intensive digital systems to overall system risk, in a manner which is entirely compatible and integrated with the format of a "standard" Probabilistic Risk Assessment (PRA), as currently documented and applied for NASA missions and applications. The CSRM also provides a risk-informed path and criteria for conducting organized and systematic digital system and software testing so that, within this risk-informed paradigm, the achievement of a quantitatively defined level of safety and mission success assurance may be targeted and demonstrated. The framework is based on the concept of context-dependent software risk scenarios and on the modeling of such scenarios via the use of traditional PRA techniques - i.e., event trees and fault trees - in combination with more advanced modeling devices such as the Dynamic Flowgraph Methodology (DFM) or other dynamic logic-modeling representations. The scenarios can be synthesized and quantified in a conditional logic and probabilistic formulation. The application of the CSRM method documented in this report refers to the MiniAERCam system designed and developed by the NASA Johnson Space Center.

  8. 78 FR 41075 - Federal Housing Administration (FHA): Single Family Quality Assurance-Solicitation of Information...

    Science.gov (United States)

    2013-07-09

    ... Administration (FHA): Single Family Quality Assurance--Solicitation of Information on Quality Lending Practices... the efficiency and effectiveness of FHA's quality assurance process (QAP). The objective of FHA's QAP is to promote quality lending practices by FHA's approved lenders; practices that protect the...

  9. Cooperative Communications for Wireless Information Assurance: Secure Cooperative Communications and Testbed Development

    National Research Council Canada - National Science Library

    Li, Xiaohua

    2007-01-01

    ..., and have invented a new cooperative OFDM transmission scheme to combat transmission asynchronism. They are helpful to the development of future physical-layer wireless information assurance techniques as well as the cooperative communication techniques...

  10. Information Assurance in Networked Enterprises: MICSS Class Experiments and Industry Survey Analysis

    National Research Council Canada - National Science Library

    Ray, Parbati

    2001-01-01

    .... The surveys give an insight into how inter-networked companies use their ERP systems, whet their current policies maybe with respect to information management, and what their security and assurance problems maybe...

  11. An investigative analysis of information assurance issues associated with the GIG's P&P architecture

    Science.gov (United States)

    Farroha, B. S.; Cole, R. G.; Farroha, D. L.; DeSimone, A.

    2007-04-01

    The Global Information Grid (GIG) is a collection of systems, programs and initiatives aimed at building a secure network and set of information capabilities modeled after the Internet. The GIG is expected to facilitate DoD's transformation by allowing warfighters, policy makers and support personnel to engage in rapid decision making. The roadmap is designed to take advantage of converged services of voice, data, video, and imagery over common data links. The vision is to have commanders identify threats more effectively, make informed decisions, and respond with greater precision and lethality. The information advantage gained through the GIG and network-centric warfare (NCW) allows a warfighting force to achieve dramatically improved information positions, in the form of common operational pictures that provide the basis for shared situational awareness and knowledge, and a resulting increase in combat power. The GIG Precedence and Preemption (P&P) requirements stem from the need to utilize scarce resources at critical times in the most effective way in support of national security, the intelligence community and the war-fighter. Information Assurance (IA) enables all information and data to be available end-to-end to support any mission without delay in accordance to the sensitivity of the task. Together, P&P and IA ensure data availability integrity, authentication, confidentiality, and non-repudiation. This study addresses and analyzes the QoS and P & P requirements and architecture for the GIG. Threat scenarios are presented and used to evaluate the reference architectures. The goal of the study is to assess the Information Assurance concerns associated with implementing Precedence and Preemption within the GIG and to guarantee an acceptable minimum level of security and protection for DoD networks.

  12. Quality Assurance Based on Descriptive and Parsimonious Appearance Models

    DEFF Research Database (Denmark)

    Nielsen, Jannik Boll; Eiríksson, Eyþór Rúnar; Kristensen, Rasmus Lyngby

    2015-01-01

    In this positional paper, we discuss the potential benefits of using appearance models in additive manufacturing, metal casting, wind turbine blade production, and 3D content acquisition. Current state of the art in acquisition and rendering of appearance cannot easily be used for quality assurance...... in these areas. The common denominator is the need for descriptive and parsimonious appearance models. By ‘parsimonious’ we mean with few parameters so that a model is useful both for fast acquisition, robust fitting, and fast rendering of appearance. The word ‘descriptive’ refers to the fact that a model should...

  13. 48 CFR 239.7102-3 - Information assurance contractor training and certification.

    Science.gov (United States)

    2010-10-01

    ... ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-3 Information..., certification maintenance, and continuing education or sustainment training required for the information... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Information assurance...

  14. Incorporating Global Information Security and Assurance in I.S. Education

    Science.gov (United States)

    White, Garry L.; Hewitt, Barbara; Kruck, S. E.

    2013-01-01

    Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…

  15. Report on probabilistic safety assessment (PSA) quality assurance in utilization of risk information

    International Nuclear Information System (INIS)

    2006-12-01

    Recently in Japan, introduction of nuclear safety regulations using risk information such as probabilistic safety assessment (PSA) has been considered and utilization of risk information in the rational and practical measures on safety assurance has made a progress to start with the operation or inspection area. The report compiled results of investigation and studies of PSA quality assurance in risk-informed activities in the USA. Relevant regulatory guide and standard review plan as well as issues and recommendations were reviewed for technical adequacy and advancement of probabilistic risk assessment technology in risk-informed decision making. Useful and important information to be referred as issues in PSA quality assurance was identified. (T. Tanaka)

  16. MATHEMATICAL MODEL FOR SOFTWARE USABILITY AUTOMATED EVALUATION AND ASSURANCE

    Directory of Open Access Journals (Sweden)

    І. Гученко

    2011-04-01

    Full Text Available The subject of the research is software usability and the aim is construction of mathematicalmodel of estimation and providing of the set level of usability. Methodology of structural analysis,methods of multicriterion optimization and theory of making decision, method of convolution,scientific methods of analysis and analogies is used in the research. The result of executed work isthe model for software usability automated evaluation and assurance that allows not only toestimate the current level of usability during every iteration of agile development but also tomanage the usability of created software products. Results can be used for the construction ofautomated support systems of management the software usability.

  17. Assuring Integrity of Information Utility in Cyber-Learning Formats.

    Science.gov (United States)

    Morrison, James L.; Stein, Linda L.

    1999-01-01

    Describes a cyber-learning project for the World Wide Web developed by faculty and librarians at the University of Delaware that combined discovery learning with problem-based learning to develop critical thinking and quality management for information. Undergraduates were to find, evaluate, and use information to generate an Internet marketing…

  18. The JMCIS Information Flow Improvement (JIFI) Assurance Strategy

    National Research Council Canada - National Science Library

    Moore, Andrew

    1997-01-01

    The Joint Maritime Command Information System (JMCIS) provides a common operating environment for Naval tactical decision aids that currently operates two distinct system high enclaves, one at SECRET/GENSER and one at TOP SECRET/SCI...

  19. Assessing and Managing Risks to Information Assurance: A Methodological Approach

    National Research Council Canada - National Science Library

    Lamm, George

    2001-01-01

    .... Despite spending millions of dollars on firewalls, encryption technologies, and intrusion detection software, information infrastructure vulnerabilities and incidents continue to happen. These trends have a significant impact on military operations in the next decades.

  20. Engaging the Board: Corporate Governance and Information Assurance

    National Research Council Canada - National Science Library

    Anhal, Aarti

    2003-01-01

    .... Information and Communication Technologies (ICT) hold the potential to revitalise UK business, to spur economic growth and competitiveness, to revolutionise working practices and living environments as well as to transform government services...

  1. Information Assurance Intrusion Detection Sensor Database Design: Lessons Learned

    National Research Council Canada - National Science Library

    Spink, Brian

    2001-01-01

    ... that could lead to compromise or denial-of-service. The obvious benefits of using a relational data model and SQL to help solve this problem continue to be observed at Air Force Research Laboratory (AFRL...

  2. Integrating Safety and Mission Assurance into Systems Engineering Modeling Practices

    Science.gov (United States)

    Beckman, Sean; Darpel, Scott

    2015-01-01

    During the early development of products, flight, or experimental hardware, emphasis is often given to the identification of technical requirements, utilizing such tools as use case and activity diagrams. Designers and project teams focus on understanding physical and performance demands and challenges. It is typically only later, during the evaluation of preliminary designs that a first pass, if performed, is made to determine the process, safety, and mission quality assurance requirements. Evaluation early in the life cycle, though, can yield requirements that force a fundamental change in design. This paper discusses an alternate paradigm for using the concepts of use case or activity diagrams to identify safety hazard and mission quality assurance risks and concerns using the same systems engineering modeling tools being used to identify technical requirements. It contains two examples of how this process might be used in the development of a space flight experiment, and the design of a Human Powered Pizza Delivery Vehicle, along with the potential benefits to decrease development time, and provide stronger budget estimates.

  3. Information Assurance Technical Framework (IATF). Release 3.1

    Science.gov (United States)

    2002-09-01

    mission or business security needs, coordinates the system boundaries, and ensures that the security risks are acceptable. The information systems...Security Requirements � Ensure that the selected solution set meets the mission or business security needs. � Coordinate the system boundaries...The CISO recommendations for BISOs will be approved by (Division Executive e.g.). BISOs shall prepare business security policies consistent with

  4. 77 FR 14955 - DoD Information Assurance Scholarship Program (IASP)

    Science.gov (United States)

    2012-03-14

    ... point of contact at each CAE, responsible for publicizing the DoD IASP to potential recruitment students... college or university to NSA. Centers of Academic Excellence in Information Assurance Education and... proposal, and all colleges and universities subsequently receiving grants must provide documentation on how...

  5. Software quality assurance and information management, October 1986 to October 1992

    International Nuclear Information System (INIS)

    Hill, I.E.

    1993-01-01

    This report describes the work carried out by Cedar Design Systems Limited under contract PECD 7/9/384. The brief for the contract was initially to provide advice on Software Quality Assurance (SQA) as part of the CEC PACOMA project. This was later extended to include further SQA and information management tasks specific to the HMIP Radioactive Waste Disposal Assessments Research Programme. (Author)

  6. Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies

    Science.gov (United States)

    Yuan, Xiaohong; Williams, Kenneth; Yu, Huiming; Rorrer, Audrey; Chu, Bei-Tseng; Yang, Li; Winters, Kathy; Kizza, Joseph

    2017-01-01

    Though many Information Assurance (IA) educators agree that hands-on exercises and case studies improve student learning, hands-on exercises and case studies are not widely adopted due to the time needed to develop them and integrate them into curricula. Under the support of the National Science Foundation (NSF) Scholarship for Service program, we…

  7. Analysis of data as information: quality assurance approach.

    Science.gov (United States)

    Ivankovic, D; Kern, J; Bartolic, A; Vuletic, S

    1993-01-01

    Describes a prototype module for data analysis of the healthcare delivery system. It consists of three main parts: data/variable selection; algorithms for the analysis of quantitative and qualitative changes in the system; and interpretation and explanation of the results. Such a module designed for primary health care has been installed on a PC in the health manager's office. Data enter the information system through the standard DBMS procedures, followed by calculating a number of different indicators and the time series, as the ordered sequences of indicators, according to demands of the manager. The last procedure is "the change analysis" with estimation of unexpected differences between and within some units, e.g. health-care teams, as well as some unexpected variabilities and trends. As an example, presents and discusses the diagnostic pattern of neurotic cases, referral patterns and preventive behaviour of GP's teams as well.

  8. UK surveillance: provision of quality assured information from combined datasets.

    Science.gov (United States)

    Paiba, G A; Roberts, S R; Houston, C W; Williams, E C; Smith, L H; Gibbens, J C; Holdship, S; Lysons, R

    2007-09-14

    Surveillance information is most useful when provided within a risk framework, which is achieved by presenting results against an appropriate denominator. Often the datasets are captured separately and for different purposes, and will have inherent errors and biases that can be further confounded by the act of merging. The United Kingdom Rapid Analysis and Detection of Animal-related Risks (RADAR) system contains data from several sources and provides both data extracts for research purposes and reports for wider stakeholders. Considerable efforts are made to optimise the data in RADAR during the Extraction, Transformation and Loading (ETL) process. Despite efforts to ensure data quality, the final dataset inevitably contains some data errors and biases, most of which cannot be rectified during subsequent analysis. So, in order for users to establish the 'fitness for purpose' of data merged from more than one data source, Quality Statements are produced as defined within the overarching surveillance Quality Framework. These documents detail identified data errors and biases following ETL and report construction as well as relevant aspects of the datasets from which the data originated. This paper illustrates these issues using RADAR datasets, and describes how they can be minimised.

  9. Governance and Public Sector Transformation in South Africa: Reporting and Providing Assurance on Service Delivery Information

    OpenAIRE

    Mariaan Roos

    2012-01-01

    Reporting on performance was legislatively established in South Africa in terms of the Public Finance Management Act, Act 1 of 1999, section 40 (3)(a). The auditing of the reported information was legislated in the Public Audit Act, Act 25 of 2004, section 20(2) (c). The objectives of the article are firstly to provide an overview of the development and application of the reporting and secondly providing assurance on service delivery information and thirdly to reflect on challenges to the imp...

  10. Model Based Mission Assurance in a Model Based Systems Engineering (MBSE) Framework: State-of-the-Art Assessment

    Science.gov (United States)

    Cornford, Steven L.; Feather, Martin S.

    2016-01-01

    This report explores the current state of the art of Safety and Mission Assurance (S&MA) in projects that have shifted towards Model Based Systems Engineering (MBSE). Its goal is to provide insight into how NASA's Office of Safety and Mission Assurance (OSMA) should respond to this shift. In MBSE, systems engineering information is organized and represented in models: rigorous computer-based representations, which collectively make many activities easier to perform, less error prone, and scalable. S&MA practices must shift accordingly. The "Objective Structure Hierarchies" recently developed by OSMA provide the framework for understanding this shift. Although the objectives themselves will remain constant, S&MA practices (activities, processes, tools) to achieve them are subject to change. This report presents insights derived from literature studies and interviews. The literature studies gleaned assurance implications from reports of space-related applications of MBSE. The interviews with knowledgeable S&MA and MBSE personnel discovered concerns and ideas for how assurance may adapt. Preliminary findings and observations are presented on the state of practice of S&MA with respect to MBSE, how it is already changing, and how it is likely to change further. Finally, recommendations are provided on how to foster the evolution of S&MA to best fit with MBSE.

  11. Guidance for implementing an environmental, safety, and health-assurance program. Volume 15. A model plan for line organization environmental, safety, and health-assurance programs

    Energy Technology Data Exchange (ETDEWEB)

    Ellingson, A.C.; Trauth, C.A. Jr.

    1982-01-01

    This is 1 of 15 documents designed to illustrate how an Environmental, Safety and Health (ES and H) Assurance Program may be implemented. The generic definition of ES and H Assurance Programs is given in a companion document entitled An Environmental, Safety and Health Assurance Program Standard. This particular document presents a model operational-level ES and H Assurance Program that may be used as a guide by an operational-level organization in developing its own plan. The model presented here reflects the guidance given in the total series of 15 documents.

  12. Audit of the informed consent process as a part of a clinical research quality assurance program.

    Science.gov (United States)

    Lad, Pramod M; Dahl, Rebecca

    2014-06-01

    Audits of the informed consent process are a key element of a clinical research quality assurance program. A systematic approach to such audits has not been described in the literature. In this paper we describe two components of the audit. The first is the audit of the informed consent document to verify adherence with federal regulations. The second component is comprised of the audit of the informed consent conference, with emphasis on a real time review of the appropriate communication of the key elements of the informed consent. Quality measures may include preparation of an informed consent history log, notes to accompany the informed consent, the use of an informed consent feedback tool, and the use of institutional surveys to assess comprehension of the informed consent process.

  13. Gulf of Mexico dissolved oxygen model (GoMDOM) research and quality assurance project plan

    Science.gov (United States)

    An integrated high resolution mathematical modeling framework is being developed that will link hydrodynamic, atmospheric, and water quality models for the northern Gulf of Mexico. This Research and Quality Assurance Project Plan primarily focuses on the deterministic Gulf of Me...

  14. A Model for Information

    Directory of Open Access Journals (Sweden)

    Paul Walton

    2014-09-01

    Full Text Available This paper uses an approach drawn from the ideas of computer systems modelling to produce a model for information itself. The model integrates evolutionary, static and dynamic views of information and highlights the relationship between symbolic content and the physical world. The model includes what information technology practitioners call “non-functional” attributes, which, for information, include information quality and information friction. The concepts developed in the model enable a richer understanding of Floridi’s questions “what is information?” and “the informational circle: how can information be assessed?” (which he numbers P1 and P12.

  15. Using RUFDATA to guide a logic model for a quality assurance process in an undergraduate university program.

    Science.gov (United States)

    Sherman, Paul David

    2016-04-01

    This article presents a framework to identify key mechanisms for developing a logic model blueprint that can be used for an impending comprehensive evaluation of an undergraduate degree program in a Canadian university. The evaluation is a requirement of a comprehensive quality assurance process mandated by the university. A modified RUFDATA (Saunders, 2000) evaluation model is applied as an initiating framework to assist in decision making to provide a guide for conceptualizing a logic model for the quality assurance process. This article will show how an educational evaluation is strengthened by employing a RUFDATA reflective process in exploring key elements of the evaluation process, and then translating this information into a logic model format that could serve to offer a more focussed pathway for the quality assurance activities. Using preliminary program evaluation data from two key stakeholders of the undergraduate program as well as an audit of the curriculum's course syllabi, a case is made for, (1) the importance of inclusivity of key stakeholders participation in the design of the evaluation process to enrich the authenticity and accuracy of program participants' feedback, and (2) the diversification of data collection methods to ensure that stakeholders' narrative feedback is given ample exposure. It is suggested that the modified RUFDATA/logic model framework be applied to all academic programs at the university undergoing the quality assurance process at the same time so that economies of scale may be realized. Copyright © 2015 Elsevier Ltd. All rights reserved.

  16. Information Assurance for Enterprise Resource Planning Systems: Risk Considerations in Public Sector Organizations

    International Nuclear Information System (INIS)

    Naeem, S.; Islam, M.H.

    2016-01-01

    ERP (Enterprise Resource Planning) systems reveal and pose non-typical risks due to its dependencies of interlinked business operations and process reengineering. Understanding of such type of risks is significant conducting and planning assurance involvement of the reliability of these complicated computer systems. Specially, in case of distributed environment where data reside at multiple sites and risks are of unique nature. Until now, there are brief pragmatic grounds on this public sector ERP issue. To analyze this subject, a partially organized consultation study was carried out with 15 skilled information systems auditors who are specialists in evaluating ERP systems risks. This methodology permitted to get more elaborated information about stakeholder's opinions and customer experiences. In addition, interviewees mentioned a numerous basic execution troubles (e.g. inadequately skilled human resource and insufficient process reengineering attempts) that lead into enhanced hazards. It was also reported by the interviewees that currently risks vary across vendors and across applications. Eventually, in offering assurance with ERP systems participants irresistibly stresses examining the process instead of system end product. (author)

  17. The evolving story of information assurance at the DoD.

    Energy Technology Data Exchange (ETDEWEB)

    Campbell, Philip LaRoche

    2007-01-01

    This document is a review of five documents on information assurance from the Department of Defense (DoD), namely 5200.40, 8510.1-M, 8500.1, 8500.2, and an ''interim'' document on DIACAP [9]. The five documents divide into three sets: (1) 5200.40 & 8510.1-M, (2) 8500.1 & 8500.2, and (3) the interim DIACAP document. The first two sets describe the certification and accreditation process known as ''DITSCAP''; the last two sets describe the certification and accreditation process known as ''DIACAP'' (the second set applies to both processes). Each set of documents describes (1) a process, (2) a systems classification, and (3) a measurement standard. Appendices in this report (a) list the Phases, Activities, and Tasks of DITSCAP, (b) note the discrepancies between 5200.40 and 8510.1-M concerning DITSCAP Tasks and the System Security Authorization Agreement (SSAA), (c) analyze the DIACAP constraints on role fusion and on reporting, (d) map terms shared across the documents, and (e) review three additional documents on information assurance, namely DCID 6/3, NIST 800-37, and COBIT{reg_sign}.

  18. Information Assurance for Enterprise Resource Planning Systems: Risk Considerations in Public Sector Organizations

    Directory of Open Access Journals (Sweden)

    SHAHZAD NAEEM

    2016-10-01

    Full Text Available ERP (Enterprise Resource Planning systems reveal and pose non-typical risks due to its dependencies of interlinked business operations and process reengineering. Understanding of such type of risks is significant conducting and planning assurance involvement of the reliability of these complicated computer systems. Specially, in case of distributed environment where data reside at multiple sites and risks are of unique nature. Until now, there are brief pragmatic grounds on this public sector ERP issue. To analyze this subject, a partially organized consultation study was carried out with 15 skilled information systems auditors who are specialists in evaluating ERP systems risks. This methodology permitted to get more elaborated information about stakeholder?s opinions and customer experiences. In addition, interviewees mentioned a numerous basic execution troubles (e.g. inadequately skilled human resource and insufficient process reengineering attempts that lead into enhanced hazards. It was also reported by the interviewees that currently risks vary across vendors and across applications. Eventually, in offering assurance with ERP systems participants irresistibly stresses examining the process instead of system end product.

  19. A Model for Quality Assurance on Acquisition and Registration, Processing, and Dissemination of Theses and Dissertations Systems

    Directory of Open Access Journals (Sweden)

    Mohammad Javad Ershadi

    2017-06-01

    Full Text Available Developments of recent decades shows that for reducing the financial and opportunities costs as well as increasing productivity, it is necessary to improve the quality of components and systems in organization. Information systems based on these rules should be considered and for improving their productivity, user’s satisfaction and effectiveness it is necessary to quality aspects of these systems are considered too. In this research a quality assurance system is developed to all parts of an information system from data gathering, data entry to indexing and dissemination of information for assuring of quality are included. This model based on continual improvement approach of Deming cycle will change all of its systems and processes so that each development in the system with considering current standards and quality guidelines are done

  20. Governance and Public Sector Transformation in South Africa: Reporting and Providing Assurance on Service Delivery Information

    Directory of Open Access Journals (Sweden)

    Mariaan Roos

    2012-12-01

    Full Text Available Reporting on performance was legislatively established in South Africa in terms of the Public Finance Management Act, Act 1 of 1999, section 40 (3(a. The auditing of the reported information was legislated in the Public Audit Act, Act 25 of 2004, section 20(2 (c. The objectives of the article are firstly to provide an overview of the development and application of the reporting and secondly providing assurance on service delivery information and thirdly to reflect on challenges to the implementation thereof in South Africa. The aim through deploying these set objectives is to formulate possible future considerations for improved governance. As central part of the methodology, review of literature on reporting and audit of non-financialwas conducted. The research included scrutiny of the different philosophies and approaches adopted by different countries to the reporting and providing assurance on service delivery information. In this respect, the research reflects a comparative element. In South Africa the Auditor-General adopted a phasing-in approach. The development of the audit approach and audit procedures has reached a stable stage, nine years after the initial process started. The audit of performance information now forms an integral part of the regularity audit process. The analysis of audit findings of the period under study indicates a considerable improvement once initiated, but stagnation persists in subsequent years. Numerous challenges remain around the application of performance reporting in South Africa including non-compliance, the lack of sufficient and appropriate audit evidence, inconsistencies between the various strategic documents and the need to improve the usefulness of performance information. In conclusion the article proposes some steps to address the challenges.

  1. Quality assurance program for environmental assessment of Savannah River Plant waste sites: Environmental information document

    International Nuclear Information System (INIS)

    Looney, B.B.; King, C.M.; Stephenson, D.E.

    1987-03-01

    Forty-eight locations were identified that received a variety of radioactive and nonradioactive constituents during the past 35 years including surface impoundments and shallow land burial facilities. Detailed environmental assessments of existing waste disposal areas, as well as new waste disposal techniques and disposition of tritiated water, were completed to air in an evaluation of the low level, mixed and hazardous waste management activities. These assessments result in estimation of risk, or residual risk, posed by each disposal area to various receptors as a function of waste management alternative. For example, at existing waste sites, the closure actions evaluated were waste removal and closure, no waste removal and closure, and no action; several pathways/receptors were considered, including groundwater to river, groundwater to well, atmospheric transport, occupational exposure, direct exposure, and contamination followed by ingestion of crops and meat. Modeling of chemical transport in a variety of media was an integral part of the assessment process. The quality of the models used and the application of these models were assured by an explicit quality assurance program

  2. Quality assurance of metabolomics.

    Science.gov (United States)

    Bouhifd, Mounir; Beger, Richard; Flynn, Thomas; Guo, Lining; Harris, Georgina; Hogberg, Helena; Kaddurah-Daouk, Rima; Kamp, Hennicke; Kleensang, Andre; Maertens, Alexandra; Odwin-DaCosta, Shelly; Pamies, David; Robertson, Donald; Smirnova, Lena; Sun, Jinchun; Zhao, Liang; Hartung, Thomas

    2015-01-01

    Metabolomics promises a holistic phenotypic characterization of biological responses to toxicants. This technology is based on advanced chemical analytical tools with reasonable throughput, including mass-spectroscopy and NMR. Quality assurance, however - from experimental design, sample preparation, metabolite identification, to bioinformatics data-mining - is urgently needed to assure both quality of metabolomics data and reproducibility of biological models. In contrast to microarray-based transcriptomics, where consensus on quality assurance and reporting standards has been fostered over the last two decades, quality assurance of metabolomics is only now emerging. Regulatory use in safety sciences, and even proper scientific use of these technologies, demand quality assurance. In an effort to promote this discussion, an expert workshop discussed the quality assurance needs of metabolomics. The goals for this workshop were 1) to consider the challenges associated with metabolomics as an emerging science, with an emphasis on its application in toxicology and 2) to identify the key issues to be addressed in order to establish and implement quality assurance procedures in metabolomics-based toxicology. Consensus has still to be achieved regarding best practices to make sure sound, useful, and relevant information is derived from these new tools.

  3. Comparing Information Assurance Awareness Training for End-Users: A Content Analysis Examination of Air Force and Defense Information Systems Agency User Training Modules

    National Research Council Canada - National Science Library

    Fruge, John W

    2008-01-01

    Today, the threats to information security and assurance are great. While there are many avenues for IT professionals to safeguard against these threats, many times these defenses prove useless against typical system users...

  4. Engineering Information Security The Application of Systems Engineering Concepts to Achieve Information Assurance

    CERN Document Server

    Jacobs, Stuart

    2011-01-01

    Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal,

  5. Information Assurance and Information Technology: Training, Certification, and Personnel Management in the Department of Defense

    National Research Council Canada - National Science Library

    1999-01-01

    The DoD's warfighting Capability and the security of its information infrastructure are at great risk from attacks by foreign intelligence organizations, cyber-terrorists, and the incompetencies of some of its own users...

  6. Development of Knowledge Management Model for Developing the Internal Quality Assurance in Educational Opportunity Expansion Schools

    Science.gov (United States)

    Pradabpech, Pipat; Chantarasombat, Chalard; Sriampai, Anan

    2015-01-01

    This research for: 1) to study the current situation and problem in KM, 2) to develop the KM Model, and 3) to evaluate the finding usage of the KM Model for developing the Internal Quality Assurance of Educational Opportunity Expansion Schools. There were 3 Phases of research implementation. Phase 1: the current situation and problem in KM, was…

  7. Data Migration Strategy and Information Assurance for the Business Enterprise Information Services

    Science.gov (United States)

    2009-07-30

    direct questions to me at (703) 601-5868 (DSN 329-5868). t ~a/J1~ Patricia A. Marsh, CPA Assistant Inspector General Defense Business Operations ...incrcment. Additionally, a Managemen t Control Matrix has been ~ubmillcd tor the BEIS FllrTlily o( System!! on an annual basis 6ince 2006. POg< l of4...including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215

  8. Critical Thinking Skills of Students through Mathematics Learning with ASSURE Model Assisted by Software Autograph

    Science.gov (United States)

    Kristianti, Y.; Prabawanto, S.; Suhendra, S.

    2017-09-01

    This study aims to examine the ability of critical thinking and students who attain learning mathematics with learning model ASSURE assisted Autograph software. The design of this study was experimental group with pre-test and post-test control group. The experimental group obtained a mathematics learning with ASSURE-assisted model Autograph software and the control group acquired the mathematics learning with the conventional model. The data are obtained from the research results through critical thinking skills tests. This research was conducted at junior high school level with research population in one of junior high school student in Subang Regency of Lesson Year 2016/2017 and research sample of class VIII student in one of junior high school in Subang Regency for 2 classes. Analysis of research data is administered quantitatively. Quantitative data analysis was performed on the normalized gain level between the two sample groups using a one-way anova test. The results show that mathematics learning with ASSURE assisted model Autograph software can improve the critical thinking ability of junior high school students. Mathematical learning using ASSURE-assisted model Autograph software is significantly better in improving the critical thinking skills of junior high school students compared with conventional models.

  9. Assuring consumer information and protection in the solar market: need, status, strategy

    Energy Technology Data Exchange (ETDEWEB)

    1981-10-01

    In this report the Consumer Energy Council has examined a number of basic issues affecting consumer assurance in the solar market. A general framework has been established to specify the role of consumer assurance as it relates both to government activity and a new consumer product industry. The available empirical evidence has been reviewed to identify the actual needs for consumer assurance in the solar market. By synthesizing the work of the SOLCAN Planning Project participants we have identified both the general thrust of existing consumer assurance mechanisms in the states and the direction that efforts to improve and expand those mechanisms are likely to take. Finally, several brief recommendations for combining the pieces of consumer assurance into an effective overall framework have been put forward.

  10. An Exploration of Professional Culture Differentials and Their Potential Impact on the Information Assurance Component of Optical Transmission Networks Design

    Science.gov (United States)

    Cuthrell, Michael Gerard

    2011-01-01

    Optical transmission networks are an integral component of the critical infrastructures for many nations. Many people believe that optical transmission networks are impenetrable. In actuality, these networks possess weaknesses that can be exploited to bring about harm. An emerging Information Assurance (IA) industry has as its goals: to…

  11. Metamodel comparison and model comparison for safety assurance

    NARCIS (Netherlands)

    Luo, Y.; Engelen, L.J.P.; Brand, van den M.G.J.; Bondavelli, A.; Ceccarelli, A.; Ortmeier, F.

    2014-01-01

    In safety-critical domains, conceptual models are created in the form of metamodels using different concepts from possibly overlapping domains. Comparison between those conceptual models can facilitate the reuse of models from one domain to another. This paper describes the mappings detected when

  12. Quality Assurance in E-Learning: PDPP Evaluation Model and Its Application

    Science.gov (United States)

    Zhang, Weiyuan; Cheng, Y. L.

    2012-01-01

    E-learning has become an increasingly important teaching and learning mode in educational institutions and corporate training. The evaluation of e-learning, however, is essential for the quality assurance of e-learning courses. This paper constructs a four-phase evaluation model for e-learning courses, which includes planning, development,…

  13. Recognition and categorization considerations for information assurance requirements development and speficication

    Science.gov (United States)

    Stytz, Martin R.; May, Michael; Banks, Sheila B.

    2009-04-01

    Department of Defense (DoD) Information Technology (IT) systems operate in an environment different from the commercial world, the differences arise from the differences in the types of attacks, the interdependencies between DoD software systems, and the reliance upon commercial software to provide basic capabilities. The challenge that we face is determining how to specify the information assurance requirements for a system without requiring changes to the commercial software and in light of the interdependencies between systems. As a result of the interdependencies and interconnections between systems introduced by the global information grid (GIG), an assessment of the IA requirements for a system must consider three facets of a system's IA capabilities: 1) the IA vulnerabilities of the system, 2) the ability of a system to repel IA attacks, and 3) the ability of a system to insure that any IA attack that penetrates the system is contained within the system and does not spread. Each facet should be assessed independently and the requirements should be derived independently from the assessments. In addition to the desired IA technology capabilities of the system, a complete assessment of the system's overall IA security technology readiness level cannot be accomplished without an assessment of the capabilities required of the system for its capability to recover from and remediate IA vulnerabilities and compromises. To allow us to accomplish these three formidable tasks, we propose a general system architecture designed to separate the system's IA capabilities from its other capability requirements; thereby allowing the IA capabilities to be developed and assessed separately from the other system capabilities. The architecture also enables independent requirements specification, implementation, assessment, measurement, and improvement of a system's IA capabilities without requiring modification of the underlying application software.

  14. Building information modelling (BIM)

    CSIR Research Space (South Africa)

    Conradie, Dirk CU

    2009-02-01

    Full Text Available The concept of a Building Information Model (BIM) also known as a Building Product Model (BPM) is nothing new. A short article on BIM will never cover the entire filed, because it is a particularly complex filed that is recently beginning to receive...

  15. Rapid Mission Assurance Assessment via Sociotechnical Modeling and Simulation

    Science.gov (United States)

    2015-05-01

    their abstractions and omissions of details, are repeated within the computer security world in the egg -defense model (aka the M&M model)—a hard shell...McPherson & Smith-Lovin, 1987) and revisited by those authors in (M. McPherson, Lovin, & Cook , 2001) among many others. The third interaction pattern is...Face-to-Face Groups. American Sociological Review, 52, 370-379. McPherson, M., Lovin, L., & Cook , J. (2001). Birds of a Feather: Homophily in Social

  16. Modeling E-learning quality assurance benchmarking in higher education

    NARCIS (Netherlands)

    Alsaif, Fatimah; Clementking, Arockisamy

    2014-01-01

    Online education programs have been growing rapidly. While it is somehow difficult to specifically quantify quality, many recommendations have been suggested to specify and demonstrate quality of online education touching on common areas of program enhancement and administration. To design a model

  17. Assuring benefits from advanced mathematical modeling of fossil power stations

    International Nuclear Information System (INIS)

    Divakaruni, S.M.; Hottenstine, R.D.

    1990-01-01

    Although the capability to model power plants and power plant control systems has progressed rapidly during the last two decades, the quality of control found in the best controlled stations of the 1960's and 1970's has not been improved to any great extent as a result of the improved hardware and the systems presently being installed. This paper presents a review of the probable reasons for the limited success in transferring good dynamic modeling technology into useful benefits for the power industry. The authors suggest that a major reason for this lack of success is a lack of understanding of the needs and the present capabilities of the power industry by the modeling community. They establish a state-of-the-art power plant control to assist investigators in directing their efforts toward true needs and to assist them in judging the potential for improvement through their efforts to utilize improved dynamic analysis methods. The United States has already initiated an effort to improve the transfer of technology into beneficial use in the utility industry and it is suggested that the methods they have developed can be used for improvement on an international scale

  18. Implementing two nurse practitioner models of service at an Australian male prison: A quality assurance study.

    Science.gov (United States)

    Wong, Ides; Wright, Eryn; Santomauro, Damian; How, Raquel; Leary, Christopher; Harris, Meredith

    2018-01-01

    To examine the quality and safety of nurse practitioner services of two newly implemented nurse practitioner models of care at a correctional facility. Nurse practitioners could help to meet the physical and mental health needs of Australia's growing prison population; however, the nurse practitioner role has not previously been evaluated in this context. A quality assurance study conducted in an Australian prison where a primary health nurse practitioner and a mental health nurse practitioner were incorporated into an existing primary healthcare service. The study was guided by Donabedian's structure, processes and outcomes framework. Routinely collected information included surveys of staff attitudes to the implementation of the nurse practitioner models (n = 21 staff), consultation records describing clinical processes and time use (n = 289 consultations), and a patient satisfaction survey (n = 29 patients). Data were analysed descriptively and compared to external benchmarks where available. Over the two-month period, the nurse practitioners provided 289 consultations to 208 prisoners. The presenting problems treated indicated that most referrals were appropriate. A significant proportion of consultations involved medication review and management. Both nurse practitioners spent more than half of their time on individual patient-related care. Overall, multidisciplinary team staff agreed that the nurse practitioner services were necessary, safe, met patient need and reduced treatment delays. Findings suggest that the implementation of nurse practitioners into Australian correctional facilities is acceptable and feasible and has the potential to improve prisoners' access to health services. Structural factors (e.g., room availability and limited access to prisoners) may have reduced the efficiency of the nurse practitioners' clinical processes and service implementation. Results suggest that nurse practitioner models can be successfully integrated into a

  19. MENINGKATKAN KUALITAS PROSES PEMBELAJARAN DAN KEMAMPUAN MENULIS CERITA DENGAN MODEL ASSURE

    Directory of Open Access Journals (Sweden)

    Winda Ayu Cahya Fitriani

    2016-11-01

    Full Text Available This research aims to improve learning quality and ability for writing story in Muhammadiyah 11 Surakarta Elementary School by applying ASSURE model. The method uses classrom research, which was carried on for five months. The subject of this research fifth grade elementary school in Muhamadiyah 11 Surakarta, which consists of 31 students. The teacher and the student is the source of the data. The techniques used for collecting data are observation, interview, angket, and test. Data source and triangulation uses to ensure the validity. Analyzing data comparative descriptive analysis techniques is used. The result of the research proves learning process cycles I in story writing achieve 60% better than pra research, which achieve less 35%. In cycles II learning process increase get 80%. This research conclute that implementing the learning model of ASSURE is capable of increasing the quality of learning process and students ability for writing story in Muhamadiyah 11 Surakarta fifth grade elementary school.

  20. Force Displacement Model of Compliant Mechanisms Using Assur Sub-Chains

    DEFF Research Database (Denmark)

    Durango, Sebastian; Correa, Jorge; Aristizabal, Mauricio

    2011-01-01

    of ordinary mechanisms, (ii) to solve the equilibrium problem by means of a static analysis and (iii) to model the flexures behavior through a deflection analysis. The novel contribution of this article relies on the fact that a division strategy of the CM into Assur sub-chains is implemented, so that any CM...... subjected to such disaggregation can be accurately modeled. For this purpose a mathematical model for the leaf-spring flexure type is presented and used through this paper. However, any other flexure model can be used instead. To support the technique, a three Degree-Of-Freedom (3-DOF) flexurebased parallel...

  1. ASPECTS REGARDING THE ROLE OF INFORMATION TECHNOLOGIES IN THE ASSURANCE OF SUPPLY CHAIN MANAGEMENT PERFORMANCE

    Directory of Open Access Journals (Sweden)

    Ilies Radu Ovidiu

    2013-07-01

    information technology such as Internet and ERP systems. Internet offers important opportunities to all partners from the supply chain to get information about consumption tendencies and changes in consumption request, virtual information about a product and the clients’ requests regarding the logistic services. As for ERP systems, it can be said that they mostly influence the designing of business processes, in order to assure coherence between them and the effective integration of different firm components. Even though the internal integration is an important aspect, an approach to management at the supply chain level, in an efficient and effective way, cannot be done without external integration with suppliers and clients. That is why we consider that companies belonging to the business field must focus on structuring key processes, to collaborate with their clients and suppliers and to integrate their internal systems, with the aim to support business operations.

  2. Information model of economy

    Directory of Open Access Journals (Sweden)

    N.S.Gonchar

    2006-01-01

    Full Text Available A new stochastic model of economy is developed that takes into account the choice of consumers are the dependent random fields. Axioms of such a model are formulated. The existence of random fields of consumer's choice and decision making by firms are proved. New notions of conditionally independent random fields and random fields of evaluation of information by consumers are introduced. Using the above mentioned random fields the random fields of consumer choice and decision making by firms are constructed. The theory of economic equilibrium is developed.

  3. TU-G-BRD-02: Automated Systematic Quality Assurance Program for Radiation Oncology Information System Upgrades

    International Nuclear Information System (INIS)

    Zhang, B; Yi, B; Eley, J; Mutaf, Y; Rahman, S; D’Souza, W

    2015-01-01

    Purpose: To: (1) describe an independent, automated, systematic software-based protocol for verifying clinical data accuracy/integrity for mitigation of data corruption/loss risks following radiation oncology information system (ROIS) upgrades; and (2) report on application of this approach in an academic/community practice environment. Methods: We propose a robust approach to perform quality assurance on the ROIS after an upgrade, targeting four data sources: (1) ROIS relational database; (2) ROIS DICOM interface; (3) ROIS treatment machine data configuration; and (4) ROIS-generated clinical reports. We investigated the database schema for differences between pre-/post-upgrade states. Paired DICOM data streams for the same object (such as RT-Plan/Treatment Record) were compared between pre-/post-upgrade states for data corruption. We examined machine configuration and related commissioning data files for changes and corruption. ROIS-generated treatment appointment and treatment parameter reports were compared to ensure patient encounter and treatment plan accuracy. This protocol was supplemented by an end-to-end clinical workflow test to verify essential ROI functionality and integrity of components interfaced during patient care chain of activities. We describe the implementation of this protocol during a Varian ARIA system upgrade at our clinic. Results: We verified 1,638 data tables with 2.4 billion data records. For 222 under-treatment patients, 605 DICOM RT plans and 13,480 DICOM treatment records retrieved from the ROIS DICOM interface were compared, with no differences in fractions, doses delivered, or treatment parameters. We identified 82 new data tables and 78 amended/deleted tables consistent with the upgrade. Reports for 5,073 patient encounters over a 2-week horizon were compared and were identical to those before the upgrade. Content in 12,237 xml machine files was compared, with no differences identified. Conclusion: An independent QA

  4. TU-G-BRD-02: Automated Systematic Quality Assurance Program for Radiation Oncology Information System Upgrades

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, B; Yi, B; Eley, J; Mutaf, Y; Rahman, S; D’Souza, W [University of Maryland School of Medicine, Baltimore, MD (United States)

    2015-06-15

    Purpose: To: (1) describe an independent, automated, systematic software-based protocol for verifying clinical data accuracy/integrity for mitigation of data corruption/loss risks following radiation oncology information system (ROIS) upgrades; and (2) report on application of this approach in an academic/community practice environment. Methods: We propose a robust approach to perform quality assurance on the ROIS after an upgrade, targeting four data sources: (1) ROIS relational database; (2) ROIS DICOM interface; (3) ROIS treatment machine data configuration; and (4) ROIS-generated clinical reports. We investigated the database schema for differences between pre-/post-upgrade states. Paired DICOM data streams for the same object (such as RT-Plan/Treatment Record) were compared between pre-/post-upgrade states for data corruption. We examined machine configuration and related commissioning data files for changes and corruption. ROIS-generated treatment appointment and treatment parameter reports were compared to ensure patient encounter and treatment plan accuracy. This protocol was supplemented by an end-to-end clinical workflow test to verify essential ROI functionality and integrity of components interfaced during patient care chain of activities. We describe the implementation of this protocol during a Varian ARIA system upgrade at our clinic. Results: We verified 1,638 data tables with 2.4 billion data records. For 222 under-treatment patients, 605 DICOM RT plans and 13,480 DICOM treatment records retrieved from the ROIS DICOM interface were compared, with no differences in fractions, doses delivered, or treatment parameters. We identified 82 new data tables and 78 amended/deleted tables consistent with the upgrade. Reports for 5,073 patient encounters over a 2-week horizon were compared and were identical to those before the upgrade. Content in 12,237 xml machine files was compared, with no differences identified. Conclusion: An independent QA

  5. Multinational Quality Assurance

    Science.gov (United States)

    Kinser, Kevin

    2011-01-01

    Multinational colleges and universities pose numerous challenges to the traditional models of quality assurance that are designed to validate domestic higher education. When institutions cross international borders, at least two quality assurance protocols are involved. To guard against fraud and abuse, quality assurance in the host country is…

  6. Quality assurance

    International Nuclear Information System (INIS)

    Hiller, G.H.

    1979-01-01

    This compendium intends to give fast bibliographic information and to fill the visible gap between documentation and general bibliographic information. The reader is given an outline of quality assurance and some examples of techniques from the relevant literature. The practical engineer, who is always short of time, is thus offered a quick survey and a fast deepening of his understanding by means of literature dealing specifically with his unresolved problems. The mansucript has been kept in tis original form in order to speed up tis publication. The RKW technical department limited itself to checking its contents and the adherence to the established information goals. (orig.) 891 RW/orig. 892 MB [de

  7. An Informational Analysis and Communications Squadron Survey of Cyberspace Mission Assurance

    Science.gov (United States)

    2010-06-01

    such things as fraud, 11 business ethics, financial reporting, internal controls, and enterprise risk management . COSO is an organization...recognized world-wide and is highly respected. In 1992, COSO published a framework for risk management . It reopened the framework for modification to...The enterprise risk management facet of the COSO framework is pertinent to the cyber mission assurance discussion. COSO recognized the importance

  8. Quality Assurance in E-Learning: PDPP Evaluation Model and its Application

    Directory of Open Access Journals (Sweden)

    Weiyuan Zhang

    2012-06-01

    Full Text Available E-learning has become an increasingly important teaching and learning mode in educational institutions and corporate training. The evaluation of e-learning, however, is essential for the quality assurance of e-learning courses. This paper constructs a four-phase evaluation model for e-learning courses, which includes planning, development, process, and product evaluation, called the PDPP evaluation model. Planning evaluation includes market demand, feasibility, target student group, course objectives, and finance. Development evaluation includes instructional design, course material design, course Web site design, flexibility, student-student interaction, teacher/tutor support, technical support, and assessment. Process evaluation includes technical support, Web site utilization, learning interaction, learning evaluation, learning support, and flexibility. Product evaluation includes student satisfaction, teaching effectiveness, learning effectiveness, and sustainability. Using the PDPP model as a research framework, a purely e-learning course on Research Methods in Distance Education, developed by the School of Professional and Continuing Education at the University of Hong Kong (HKU SPACE and jointly offered with the School of Distance Learning for Medical Education of Peking University (SDLME, PKU, was used as a case study. Sixty students from mainland China, Hong Kong, Macau, and Malaysia were recruited for this course. According to summative evaluation through a student e-learning experience survey, the majority of students were very satisfied/satisfied on all e-learning dimensions of this course. The majority of students thought that the learning effectiveness of this course was equivalent, even better, than face-to-face learning because of cross-border collaborative learning, student-centred learning, sufficient learning support, and learning flexibility. This study shows that a high quality of teaching and learning might be assured by

  9. Japanese Quality Assurance System Regarding the Provision of Material Accounting Reports and the Safeguards Relevant Information to the IAEA

    International Nuclear Information System (INIS)

    Goto, Y.; Namekawa, M.; Kumekawa, H.; Usui, A.; Sano, K.

    2015-01-01

    The provision of the safeguards relevant reports and information in accordance with the comprehensive safeguards agreement (CSA) and the additional protocol (AP) is the basis for the IAEA safeguards. The government of Japan (Japan Safeguards Office, JSGO) has believed that the correct reports contribute to effective and efficient safeguards therefore the domestic quality assurance system for the reporting to the IAEA was already established at the time of the accession of the CSA in 1977. It consists of Code 10 interpretation (including the seminars for operators in Japan), SSAC's checks for syntax error, code and internal consistency (computer based consistency check between facilities) and the discussion with the IAEA on the facilities' measurement system for bulk-handling facilities, which contributes to the more accurate reports from operators. This spirit has been maintained for the entry into force of the AP. For example, questions and amplification from the IAEA will be taken into account the review of the AP declaration before sending to the IAEA and the open source information such as news article and scientific literature in Japanese is collected and translated into English, and the translated information is provided to the IAEA as the supplementary information, which may contribute to broadening the IAEA information source and to their comprehensive evaluation. The other safeguards relevant information, such as the mail-box information for SNRI at LEU fuel fabrication plants, is also checked by the JSGO's QC software before posting. The software was developed by JSGO and it checks data format, batch IDs, birth/death date, shipper/receiver information and material description code. This paper explains the history of the development of the Japanese quality assurance system regarding the reports and the safeguards relevant information to the IAEA. (author)

  10. Model reliability and software quality assurance in simulation of nuclear fuel waste management systems

    International Nuclear Information System (INIS)

    Oeren, T.I.; Elzas, M.S.; Sheng, G.; Wageningen Agricultural Univ., Netherlands; McMaster Univ., Hamilton, Ontario)

    1985-01-01

    As is the case with all scientific simulation studies, computerized simulation of nuclear fuel waste management systems can introduce and hide various types of errors. Frameworks to clarify issues of model reliability and software quality assurance are offered. Potential problems with reference to the main areas of concern for reliability and quality are discussed; e.g., experimental issues, decomposition, scope, fidelity, verification, requirements, testing, correctness, robustness are treated with reference to the experience gained in the past. A list comprising over 80 most common computerization errors is provided. Software tools and techniques used to detect and to correct computerization errors are discussed

  11. Model for Electromagnetic Information Leakage

    OpenAIRE

    Mao Jian; Li Yongmei; Zhang Jiemin; Liu Jinming

    2013-01-01

    Electromagnetic leakage will happen in working information equipments; it could lead to information leakage. In order to discover the nature of information in electromagnetic leakage, this paper combined electromagnetic theory with information theory as an innovative research method. It outlines a systematic model of electromagnetic information leakage, which theoretically describes the process of information leakage, intercept and reproduction based on electromagnetic radiation, and ana...

  12. Authentication Assurance Levels

    International Nuclear Information System (INIS)

    Kouzes, Richard T.; Cash, James R.; Devaney, David M.; Geelhood, Bruce D.; Hansen, Randy R.; Melton, Ronald B.; Pitts, W. Karl

    2002-01-01

    This Common Criteria approach has been applied to create a definition of Authentication Assurance Levels that can quantify the level of assurance reached for a system subject to a set of authentication procedures. The arms-control authentication application of the Common Criteria expands on more typical information security evaluations in that it must contend with information barriers and preclude sophisticated intentional subversion attempts.

  13. An anaesthesia information management system as a tool for a quality assurance program: 10years of experience.

    Science.gov (United States)

    Motamed, Cyrus; Bourgain, Jean Louis

    2016-06-01

    Anaesthesia Information Management Systems (AIMS) generate large amounts of data, which might be useful for quality assurance programs. This study was designed to highlight the multiple contributions of our AIMS system in extracting quality indicators over a period of 10years. The study was conducted from 2002 to 2011. Two methods were used to extract anaesthesia indicators: the manual extraction of individual files for monitoring neuromuscular relaxation and structured query language (SQL) extraction for other indicators which were postoperative nausea and vomiting (PONV), pain, sedation scores, pain-related medications, scores and postoperative hypothermia. For each indicator, a program of information/meetings and adaptation/suggestions for operating room and PACU personnel was initiated to improve quality assurance, while data were extracted each year. The study included 77,573 patients. The mean overall completeness of data for the initial years ranged from 55 to 85% and was indicator-dependent, which then improved to 95% completeness for the last 5years. The incidence of neuromuscular monitoring was initially 67% and then increased to 95% (Psystem permitted the follow-up of certain indicators through manual sampling and many more via SQL extraction in a sustained and non-time-consuming way across years. However, it requires competent and especially dedicated resources to handle the database. Copyright © 2016 Société française d'anesthésie et de réanimation (Sfar). Published by Elsevier Masson SAS. All rights reserved.

  14. Information Retrieval Models

    NARCIS (Netherlands)

    Hiemstra, Djoerd; Göker, Ayse; Davies, John

    2009-01-01

    Many applications that handle information on the internet would be completely inadequate without the support of information retrieval technology. How would we find information on the world wide web if there were no web search engines? How would we manage our email without spam filtering? Much of the

  15. Monitoring Quality Across Home Visiting Models: A Field Test of Michigan's Home Visiting Quality Assurance System.

    Science.gov (United States)

    Heany, Julia; Torres, Jennifer; Zagar, Cynthia; Kostelec, Tiffany

    2018-06-05

    Introduction In order to achieve the positive outcomes with parents and children demonstrated by many home visiting models, home visiting services must be well implemented. The Michigan Home Visiting Initiative developed a tool and procedure for monitoring implementation quality across models referred to as Michigan's Home Visiting Quality Assurance System (MHVQAS). This study field tested the MHVQAS. This article focuses on one of the study's evaluation questions: Can the MHVQAS be applied across models? Methods Eight local implementing agencies (LIAs) from four home visiting models (Healthy Families America, Early Head Start-Home Based, Parents as Teachers, Maternal Infant Health Program) and five reviewers participated in the study by completing site visits, tracking their time and costs, and completing surveys about the process. LIAs also submitted their most recent review by their model developer. The researchers conducted participant observation of the review process. Results Ratings on the MHVQAS were not significantly different between models. There were some differences in interrater reliability and perceived reliability between models. There were no significant differences between models in perceived validity, satisfaction with the review process, or cost to participate. Observational data suggested that cross-model applicability could be improved by assisting sites in relating the requirements of the tool to the specifics of their model. Discussion The MHVQAS shows promise as a tool and process to monitor implementation quality of home visiting services across models. The results of the study will be used to make improvements before the MHVQAS is used in practice.

  16. Quality assurance of in-situ measurements of land surface albedo: A model-based approach

    Science.gov (United States)

    Adams, Jennifer; Gobron, Nadine; Widlowski, Jean-Luc; Mio, Corrado

    2016-04-01

    This paper presents the development of a model-based framework for assessing the quality of in-situ measurements of albedo used to validate land surface albedo products. Using a 3D Monte Carlo Ray Tracing (MCRT) radiative transfer model, a quality assurance framework is built based on simulated field measurements of albedo within complex 3D canopies and under various illumination scenarios. This method provides an unbiased approach in assessing the quality of field measurements, and is also able to trace the contributions of two main sources of uncertainty in field-measurements of albedo; those resulting from 1) the field measurement protocol, such as height or placement of field measurement within the canopy, and 2) intrinsic factors of the 3D canopy under specific illumination characteristics considered, such as the canopy structure and landscape heterogeneity, tree heights, ecosystem type and season.

  17. An Introduction to the Deputy Assistant Secretary of Defense for Information and Identity Assurance

    National Research Council Canada - National Science Library

    Lentz, Robert

    2008-01-01

    ...) is information dependent and relies on trusted information to function effectively. The DoD faces daily attacks on its networks and systems, ranging from curious kids to much more advanced, organized campaigns. The DASD(IIA...

  18. Multidimensional Models of Information Need

    OpenAIRE

    Yun-jie (Calvin) Xu; Kai Huang (Joseph) Tan

    2009-01-01

    User studies in information science have recognised relevance as a multidimensional construct. An implication of multidimensional relevance is that a user's information need should be modeled by multiple data structures to represent different relevance dimensions. While the extant literature has attempted to model multiple dimensions of a user's information need, the fundamental assumption that a multidimensional model is better than a uni-dimensional model has not been addressed. This study ...

  19. Quality assurance

    International Nuclear Information System (INIS)

    Kunich, M.P.; Vieth, D.L.

    1989-01-01

    This paper provides a point/counterpoint view of a quality assurance director and a project manager. It presents numerous aspects of quality assurance requirements along with analyses as to the value of each

  20. A simple parametric model observer for quality assurance in computer tomography

    Science.gov (United States)

    Anton, M.; Khanin, A.; Kretz, T.; Reginatto, M.; Elster, C.

    2018-04-01

    Model observers are mathematical classifiers that are used for the quality assessment of imaging systems such as computer tomography. The quality of the imaging system is quantified by means of the performance of a selected model observer. For binary classification tasks, the performance of the model observer is defined by the area under its ROC curve (AUC). Typically, the AUC is estimated by applying the model observer to a large set of training and test data. However, the recording of these large data sets is not always practical for routine quality assurance. In this paper we propose as an alternative a parametric model observer that is based on a simple phantom, and we provide a Bayesian estimation of its AUC. It is shown that a limited number of repeatedly recorded images (10–15) is already sufficient to obtain results suitable for the quality assessment of an imaging system. A MATLAB® function is provided for the calculation of the results. The performance of the proposed model observer is compared to that of the established channelized Hotelling observer and the nonprewhitening matched filter for simulated images as well as for images obtained from a low-contrast phantom on an x-ray tomography scanner. The results suggest that the proposed parametric model observer, along with its Bayesian treatment, can provide an efficient, practical alternative for the quality assessment of CT imaging systems.

  1. The Development of Evaluation Model for Internal Quality Assurance System of Dramatic Arts College of Bunditpattanasilpa Institute

    Science.gov (United States)

    Sinthukhot, Kittisak; Srihamongkol, Yannapat; Luanganggoon, Nuchwana; Suwannoi, Paisan

    2013-01-01

    The research purpose was to develop an evaluation model for the internal quality assurance system of the dramatic arts College of Bunditpattanasilpa Institute. The Research and Development method was used as research methodology which was divided into three phases; "developing the model and its guideline", "trying out the actual…

  2. SOFTWARE QUALITY ASSURANCE FOR EMERGENCY RESPONSE CONSEQUENCE ASSESSMENT MODELS AT DOE'S SAVANNAH RIVER SITE

    International Nuclear Information System (INIS)

    Hunter, C

    2007-01-01

    The Savannah River National Laboratory's (SRNL) Atmospheric Technologies Group develops, maintains, and operates computer-based software applications for use in emergency response consequence assessment at DOE's Savannah River Site. These applications range from straightforward, stand-alone Gaussian dispersion models run with simple meteorological input to complex computational software systems with supporting scripts that simulate highly dynamic atmospheric processes. A software quality assurance program has been developed to ensure appropriate lifecycle management of these software applications. This program was designed to meet fully the overall structure and intent of SRNL's institutional software QA programs, yet remain sufficiently practical to achieve the necessary level of control in a cost-effective manner. A general overview of this program is described

  3. Clinical pharmacology quality assurance program: models for longitudinal analysis of antiretroviral proficiency testing for international laboratories.

    Science.gov (United States)

    DiFrancesco, Robin; Rosenkranz, Susan L; Taylor, Charlene R; Pande, Poonam G; Siminski, Suzanne M; Jenny, Richard W; Morse, Gene D

    2013-10-01

    Among National Institutes of Health HIV Research Networks conducting multicenter trials, samples from protocols that span several years are analyzed at multiple clinical pharmacology laboratories (CPLs) for multiple antiretrovirals. Drug assay data are, in turn, entered into study-specific data sets that are used for pharmacokinetic analyses, merged to conduct cross-protocol pharmacokinetic analysis, and integrated with pharmacogenomics research to investigate pharmacokinetic-pharmacogenetic associations. The CPLs participate in a semiannual proficiency testing (PT) program implemented by the Clinical Pharmacology Quality Assurance program. Using results from multiple PT rounds, longitudinal analyses of recovery are reflective of accuracy and precision within/across laboratories. The objectives of this longitudinal analysis of PT across multiple CPLs were to develop and test statistical models that longitudinally: (1) assess the precision and accuracy of concentrations reported by individual CPLs and (2) determine factors associated with round-specific and long-term assay accuracy, precision, and bias using a new regression model. A measure of absolute recovery is explored as a simultaneous measure of accuracy and precision. Overall, the analysis outcomes assured 97% accuracy (±20% of the final target concentration of all (21) drug concentration results reported for clinical trial samples by multiple CPLs). Using the Clinical Laboratory Improvement Act acceptance of meeting criteria for ≥2/3 consecutive rounds, all 10 laboratories that participated in 3 or more rounds per analyte maintained Clinical Laboratory Improvement Act proficiency. Significant associations were present between magnitude of error and CPL (Kruskal-Wallis P Kruskal-Wallis P < 0.001).

  4. Information Assurance Technologies for the Global Command and Control System (GCCS) Leading Edge Services (LES)

    National Research Council Canada - National Science Library

    O'Brien, Richard

    2001-01-01

    ... (LES) program was sponsored by DARPA's Information Systems Office. This report describes the different technology areas the program encompassed, summarized the major achievements of the program, and documents lessons learned and open issues...

  5. Federal Plan for Cyber Security and Information Assurance Research and Development

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — Powerful personal computers, high-bandwidth and wireless networking technologies, and the widespread use of the Internet have transformed stand-alone computing...

  6. Statistical Modeling for Quality Assurance of Human Papillomavirus DNA Batch Testing.

    Science.gov (United States)

    Beylerian, Emily N; Slavkovsky, Rose C; Holme, Francesca M; Jeronimo, Jose A

    2018-03-22

    Our objective was to simulate the distribution of human papillomavirus (HPV) DNA test results from a 96-well microplate assay to identify results that may be consistent with well-to-well contamination, enabling programs to apply specific quality assurance parameters. For this modeling study, we designed an algorithm that generated the analysis population of 900,000 to simulate the results of 10,000 microplate assays, assuming discrete HPV prevalences of 12%, 13%, 14%, 15%, and 16%. Using binomial draws, the algorithm created a vector of results for each prevalence and reassembled them into 96-well matrices for results distribution analysis of the number of positive cells and number and size of cell clusters (≥2 positive cells horizontally or vertically adjacent) per matrix. For simulation conditions of 12% and 16% HPV prevalence, 95% of the matrices displayed the following characteristics: 5 to 17 and 8 to 22 total positive cells, 0 to 4 and 0 to 5 positive cell clusters, and largest cluster sizes of up to 5 and up to 6 positive cells, respectively. Our results suggest that screening programs in regions with an oncogenic HPV prevalence of 12% to 16% can expect 5 to 22 positive results per microplate in approximately 95% of assays and 0 to 5 positive results clusters with no cluster larger than 6 positive results. Results consistently outside of these ranges deviate from what is statistically expected and could be the result of well-to-well contamination. Our results provide guidance that laboratories can use to identify microplates suspicious for well-to-well contamination, enabling improved quality assurance.This is an open-access article distributed under the terms of the Creative Commons Attribution-Non Commercial-No Derivatives License 4.0 (CCBY-NC-ND), where it is permissible to download and share the work provided it is properly cited. The work cannot be changed in any way or used commercially without permission from the journal.

  7. STEPP: A Grounded Model to Assure the Quality of Instructional Activities in e-Learning Environments

    Directory of Open Access Journals (Sweden)

    Hamdy AHMED ABDELAZIZ

    2013-07-01

    Full Text Available The present theoretical paper aims to develop a grounded model for designing instructional activities appropriate to e-learning and online learning environments. The suggested model is guided by learning principles of cognitivism, constructivism, and connectivism learning principles to help online learners constructing meaningful experiences and moving from knowledge acquisition to knowledge creation process. The proposed model consists of five dynamic and grounded domains that assure the quality of designing and using e-learning activities: Ø Social Domain; Ø Technological Domain; Ø Epistemological Domain; Ø Psychological domain; and Ø Pedagogical Domain. Each of these domains needs four types of presences to reflect the design and the application process of e-learning activities. These four presences are: Ø cognitive presence, Ø human presence, Ø psychological presence and Ø mental presence. Applying the proposed model (STEPP throughout all online and adaptive e-learning environments may improve the process of designing and developing e-learning activities to be used as mindtools for current and future learners.

  8. Information systems for administration, clinical documentation and quality assurance in an Austrian disease management programme.

    Science.gov (United States)

    Beck, Peter; Truskaller, Thomas; Rakovac, Ivo; Bruner, Fritz; Zanettin, Dominik; Pieber, Thomas R

    2009-01-01

    5.9% of the Austrian population is affected by diabetes mellitus. Disease Management is a structured treatment approach that is suitable for application to the diabetes mellitus area and often is supported by information technology. This article describes the information systems developed and implemented in the Austrian disease management programme for type 2 diabetes. Several workflows for administration as well as for clinical documentation have been implemented utilizing the Austrian e-Health infrastructure. De-identified clinical data is available for creating feedback reports for providers and programme evaluation.

  9. Conceptual models of information processing

    Science.gov (United States)

    Stewart, L. J.

    1983-01-01

    The conceptual information processing issues are examined. Human information processing is defined as an active cognitive process that is analogous to a system. It is the flow and transformation of information within a human. The human is viewed as an active information seeker who is constantly receiving, processing, and acting upon the surrounding environmental stimuli. Human information processing models are conceptual representations of cognitive behaviors. Models of information processing are useful in representing the different theoretical positions and in attempting to define the limits and capabilities of human memory. It is concluded that an understanding of conceptual human information processing models and their applications to systems design leads to a better human factors approach.

  10. 77 FR 67366 - Federal Acquisition Regulation; Information Collection; Quality Assurance Requirements

    Science.gov (United States)

    2012-11-09

    .... Glover, Sr., Procurement Analyst, Contract Policy Division, GSA (202) 501-1448 or email [email protected] . SUPPLEMENTARY INFORMATION: A. Purpose Supplies and services acquired under Government contracts..., acceptance, warranty, and other measures associated with quality requirements. Standard clauses related to...

  11. Textual information access statistical models

    CERN Document Server

    Gaussier, Eric

    2013-01-01

    This book presents statistical models that have recently been developed within several research communities to access information contained in text collections. The problems considered are linked to applications aiming at facilitating information access:- information extraction and retrieval;- text classification and clustering;- opinion mining;- comprehension aids (automatic summarization, machine translation, visualization).In order to give the reader as complete a description as possible, the focus is placed on the probability models used in the applications

  12. El Aseguramiento de los Informes de Sostenibilidad: Diferencias Sustanciales con la Auditoría de Cuentas (Sustainability Reports Assurance: Substantial Differences with Financial Auditing

    Directory of Open Access Journals (Sweden)

    Amaia Zubiaurre

    2015-12-01

    Full Text Available Besides the growing interest of companies to communicate their commitment to sustainability, assurance of the information disclosed has increased, due to the interest of the stakeholders to know their reliability. Initially, we will explain the concept and benefits of sustainability reporting assurance. Subsequently, we will focus on the differences between the financial audit and sustainability reports assurance and the description of the main international report assurance statements. Finally, we will explain the main criticisms of assurance and some proposals for improvement. Junto al creciente interés de las empresas por comunicar su compromiso con la sostenibilidad, ha aumentado el aseguramiento de la información revelada, debido al interés de los grupos de interés por conocer su fiabilidad. Inicialmente, explicaremos el concepto y las ventajas del aseguramiento de los informes de sostenibilidad. Posteriormente, nos centraremos en las diferencias existentes entre la auditoría de cuentas y el aseguramiento de memorias de sostenibilidad y en la descripción de los principales estándares internacionales en materia de aseguramiento. Finalmente, expondremos las principales críticas al aseguramiento y algunas propuestas de mejora. DOWNLOAD THIS PAPER FROM SSRN: http://ssrn.com/abstract=2690158

  13. Information Assurance as a System of Systems in the Submarine Force

    Science.gov (United States)

    2013-09-01

    Shell SSL Secure Socket Layer SSN Submerged Ship Nuclear STDA Submarine Tactical Display Auxiliary SUBLAN Submarine Local Area Network...Internet Protocol TLS T Transport Layer Security TS-SCI Top Secret-Special Compartment Information TYCOM Type Commander USB Universal...administrators or users. Layer 4 and 5: This is the layer that deals with providing a protected connection via a Secure Socket Layer ( SSL ) and Transport Layer

  14. Modelling Choice of Information Sources

    Directory of Open Access Journals (Sweden)

    Agha Faisal Habib Pathan

    2013-04-01

    Full Text Available This paper addresses the significance of traveller information sources including mono-modal and multimodal websites for travel decisions. The research follows a decision paradigm developed earlier, involving an information acquisition process for travel choices, and identifies the abstract characteristics of new information sources that deserve further investigation (e.g. by incorporating these in models and studying their significance in model estimation. A Stated Preference experiment is developed and the utility functions are formulated by expanding the travellers' choice set to include different combinations of sources of information. In order to study the underlying choice mechanisms, the resulting variables are examined in models based on different behavioural strategies, including utility maximisation and minimising the regret associated with the foregone alternatives. This research confirmed that RRM (Random Regret Minimisation Theory can fruitfully be used and can provide important insights for behavioural studies. The study also analyses the properties of travel planning websites and establishes a link between travel choices and the content, provenance, design, presence of advertisements, and presentation of information. The results indicate that travellers give particular credence to governmentowned sources and put more importance on their own previous experiences than on any other single source of information. Information from multimodal websites is more influential than that on train-only websites. This in turn is more influential than information from friends, while information from coachonly websites is the least influential. A website with less search time, specific information on users' own criteria, and real time information is regarded as most attractive

  15. Spatio-Temporal Nonlinear Filtering With Applications to Information Assurance and Counter Terrorism

    Science.gov (United States)

    2011-11-14

    George E. Tita . Geographical influences of an emerging network of gang rivalries, Physica A: Statistical Mechanics and its Applications, (10 2011...Short, P. J. Brantingham, A. L. Bertozzi, G. E. Tita . From the Cover: Dissipation and displacement of hotspots in reaction-diffusion models of crime...Mathematics, UCLA 8. George Tita (Collaborator), Professor of Criminology, Law, and Society, UCLA 9. Martin Short, CAM Assistant Professor in

  16. Quality assurance of human error modelling in a major probabilistic risk assessment programme

    International Nuclear Information System (INIS)

    Rycraft, H.S.

    1990-01-01

    A method of incorporating the consideration of operator error within a major PRA exercise is described along with the quality assurance procedures employed to ensure a quality product. The exercise was undertaken at the Sellafield Reprocessing Plant. (author)

  17. INFORMATION MODEL OF SOCIAL TRANSFORMATIONS

    Directory of Open Access Journals (Sweden)

    Мария Васильевна Комова

    2013-09-01

    Full Text Available The social transformation is considered as a process of qualitative changes of the society, creating a new level of organization in all areas of life, in different social formations, societies of different types of development. The purpose of the study is to create a universal model for studying social transformations based on their understanding as the consequence of the information exchange processes in the society. After defining the conceptual model of the study, the author uses the following methods: the descriptive method, analysis, synthesis, comparison.Information, objectively existing in all elements and systems of the material world, is an integral attribute of the society transformation as well. The information model of social transformations is based on the definition of the society transformation as the change in the information that functions in the society’s information space. The study of social transformations is the study of information flows circulating in the society and being characterized by different spatial, temporal, and structural states. Social transformations are a highly integrated system of social processes and phenomena, the nature, course and consequences of which are affected by the factors representing the whole complex of material objects. The integrated information model of social transformations foresees the interaction of the following components: social memory, information space, and the social ideal. To determine the dynamics and intensity of social transformations the author uses the notions of "information threshold of social transformations" and "information pressure".Thus, the universal nature of information leads to considering social transformations as a system of information exchange processes. Social transformations can be extended to any episteme actualized by social needs. The establishment of an information threshold allows to simulate the course of social development, to predict the

  18. Guidance for implementing an environmental, safety and health assurance program. Volume 2. A model plan for environmental, safety and health staff audits and appraisals

    International Nuclear Information System (INIS)

    Ellingson, A.C.

    1980-09-01

    This is 1 of 15 documents designed to illustrate how an Environmental, Safety and Health (ES and H) Assurance Program may be implemented. The generic definition of ES and H Assurance Programs is given in a companion document entitled An Environmental, Safety and Health Assurance Program Standard. This document is concerned with ES and H audit and appraisal activities of an ES and H Staff Organization as they might be performed in an institution whose ES and H program is based upon the ES and H Assurance Program Standard. An annotated model plan for ES and H Staff audits and appraisals is presented and discussed

  19. A decision model for financial assurance instruments in the upstream petroleum sector

    International Nuclear Information System (INIS)

    Ferreira, Doneivan; Suslick, Saul; Farley, Joshua; Costanza, Robert; Krivov, Sergey

    2004-01-01

    The main objective of this paper is to deepen the discussion regarding the application of financial assurance instruments, bonds, in the upstream oil sector. This paper will also attempt to explain the current choice of instruments within the sector. The concepts of environmental damages and internalization of environmental and regulatory costs will be briefly explored. Bonding mechanisms are presently being adopted by several governments with the objective of guaranteeing the availability of funds for end-of-leasing operations. Regulators are mainly concerned with the prospect of inheriting liabilities from lessees. Several forms of bonding instruments currently available were identified and a new instrument classification was proposed. Ten commonly used instruments were selected and analyzed under the perspective of both regulators and industry (surety, paid-in and periodic-payment collateral accounts, letters of credit, self-guarantees, investment grade securities, real estate collaterals, insurance policies, pools, and special funds). A multiattribute value function model was then proposed to examine current instrument preferences. Preliminary simulations confirm the current scenario where regulators are likely to require surety bonds, letters of credit, and periodic payment collateral account tools

  20. Quality assurance

    International Nuclear Information System (INIS)

    Cante; Feger; Genevray; Hennion; Moneyron; Monneyron; Normand; Rastoin; Silberstein; Vaujour.

    1976-01-01

    The general principles of quality assurance and their applications within the French industrial and commercial regulations are presented. The conditions for the practical application of quality assurance to the different stages of the life of a nuclear power station (design, development, operation) are considered and a special mention is made of nuclear fuels and liquid sodium cooled reactors [fr

  1. A preliminary study into performing routine tube output and automatic exposure control quality assurance using radiology information system data

    International Nuclear Information System (INIS)

    Charnock, P.; Jones, R.; Fazakerley, J.; Wilde, R.; Dunn, A. F.

    2011-01-01

    Data are currently being collected from hospital radiology information systems in the North West of the UK for the purposes of both clinical audit and patient dose audit. Could these data also be used to satisfy quality assurance (QA) requirements according to UK guidance? From 2008 to 2009, 731 653 records were submitted from 8 hospitals from the North West England. For automatic exposure control QA, the protocol from Inst. of Physics and Engineering in Medicine (IPEM) report 91 recommends that milli amperes per second can be monitored for repeatability and reproducibility using a suitable phantom, at 70-81 kV. Abdomen AP and chest PA examinations were analysed to find the most common kilo voltage used with these records then used to plot average monthly milli amperes per second with time. IPEM report 91 also recommends that a range of commonly used clinical settings is used to check output reproducibility and repeatability. For each tube, the dose area product values were plotted over time for two most common exposure factor sets. Results show that it is possible to do performance checks of AEC systems; however more work is required to be able to monitor tube output performance. Procedurally, the management system requires work and the benefits to the workflow would need to be demonstrated. (authors)

  2. An Analysis of Department of Defense Instruction 8500.2 'Information Assurance (IA) Implementation.'

    Energy Technology Data Exchange (ETDEWEB)

    Campbell, Philip LaRoche

    2012-01-01

    The Department of Defense (DoD) provides its standard for information assurance in its Instruction 8500.2, dated February 6, 2003. This Instruction lists 157 'IA Controls' for nine 'baseline IA levels.' Aside from distinguishing IA Controls that call for elevated levels of 'robustness' and grouping the IA Controls into eight 'subject areas' 8500.2 does not examine the nature of this set of controls, determining, for example, which controls do not vary in robustness, how this set of controls compares with other such sets, or even which controls are required for all nine baseline IA levels. This report analyzes (1) the IA Controls, (2) the subject areas, and (3) the Baseline IA levels. For example, this report notes that there are only 109 core IA Controls (which this report refers to as 'ICGs'), that 43 of these core IA Controls apply without variation to all nine baseline IA levels and that an additional 31 apply with variations. This report maps the IA Controls of 8500.2 to the controls in NIST 800-53 and ITGI's CoBIT. The result of this analysis and mapping, as shown in this report, serves as a companion to 8500.2. (An electronic spreadsheet accompanies this report.)

  3. Regional technical cooperation model project, IAEA - RER/2/2004 ''quality control and quality assurance for nuclear analytical techniques'

    International Nuclear Information System (INIS)

    Arikan, P.

    2002-01-01

    An analytical laboratory should produce high quality analytical data through the use of analytical measurements that is accurate, reliable and adequate for the intended purpose. This objective can be accomplished in a cost-effective manner under a planned and documented quality system of activities. It is well-known that serious deficiencies can occur in laboratory operations when insufficient attention is given to the quality of the work. It requires not only a thorough knowledge of the laboratory's purpose and operation, but also the dedication of the management and operating staff to standards of excellence. Laboratories employing nuclear and nuclear-related analytical techniques are sometimes confronted with performance problems which prevent them from becoming accepted and respected by clients, such as industry, government and regulatory bodies, and from being eligible for contracts. The International Standard ISO 17025 has been produced as the result of extensive experience in the implementation of ISO/IEC Guide 25:1990 and EN 45001:1989, which replaces both of them now. It contains all of the requirements that testing and calibration laboratories must meet if they wish to demonstrate that they operate a quality system that is technically competent, and are able to generate technically valid results. The use of ISO 17025 should facilitate cooperation between laboratories and other bodies to assist in the exchange of information and experience, and in the harmonization of standards and procedures. IAEA model project RER/2/004 entitled 'Quality Assurance/Quality Control in Nuclear Analytical Techniques' was initiated in 1999 as a Regional TC project in East European countries to assist Member State laboratories in the region to install a complete quality system according to the ISO/IEC 17025 standard. 12 laboratories from 11 countries plus the Agency's Laboratories in Seibersdorf have been selected as participants to undergo exercises and training with the

  4. Software quality assurance handbook

    Energy Technology Data Exchange (ETDEWEB)

    1990-09-01

    There are two important reasons for Software Quality Assurance (SQA) at Allied-Signal Inc., Kansas City Division (KCD): First, the benefits from SQA make good business sense. Second, the Department of Energy has requested SQA. This handbook is one of the first steps in a plant-wide implementation of Software Quality Assurance at KCD. The handbook has two main purposes. The first is to provide information that you will need to perform software quality assurance activities. The second is to provide a common thread to unify the approach to SQA at KCD. 2 figs.

  5. Compass model-based quality assurance for stereotactic VMAT treatment plans.

    Science.gov (United States)

    Valve, Assi; Keyriläinen, Jani; Kulmala, Jarmo

    2017-12-01

    To use Compass as a model-based quality assurance (QA) tool for stereotactic body radiation therapy (SBRT) and stereotactic radiation therapy (SRT) volumetric modulated arc therapy (VMAT) treatment plans calculated with Eclipse treatment planning system (TPS). Twenty clinical stereotactic VMAT SBRT and SRT treatment plans were blindly selected for evaluation. Those plans included four different treatment sites: prostate, brain, lung and body. The plans were evaluated against dose-volume histogram (DVH) parameters and 2D and 3D gamma analysis. The dose calculated with Eclipse treatment planning system (TPS) was compared to Compass calculated dose (CCD) and Compass reconstructed dose (CRD). The maximum differences in mean dose of planning target volume (PTV) were 2.7 ± 1.0% between AAA and Acuros XB calculation algorithm TPS dose, -7.6 ± 3.5% between Eclipse TPS dose and CCD dose and -5.9 ± 3.7% between Eclipse TPS dose and CRD dose for both Eclipse calculation algorithms, respectively. 2D gamma analysis was not able to identify all the cases that 3D gamma analysis specified for further verification. Compass is suitable for QA of SBRT and SRT treatment plans. However, the QA process should include wide set of DVH-based dose parameters and 3D gamma analysis should be the preferred method when performing clinical patient QA. The results suggest that the Compass should not be used for smaller field sizes than 3 × 3 cm 2 or the beam model should be adjusted separately for both small (FS ≤ 3 cm) and large (FS > 3 cm) field sizes. Copyright © 2017 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  6. Executive Information Systems' Multidimensional Models

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available Executive Information Systems are design to improve the quality of strategic level of management in organization through a new type of technology and several techniques for extracting, transforming, processing, integrating and presenting data in such a way that the organizational knowledge filters can easily associate with this data and turn it into information for the organization. These technologies are known as Business Intelligence Tools. But in order to build analytic reports for Executive Information Systems (EIS in an organization we need to design a multidimensional model based on the business model from the organization. This paper presents some multidimensional models that can be used in EIS development and propose a new model that is suitable for strategic business requests.

  7. Quality assurance

    International Nuclear Information System (INIS)

    1996-01-01

    The main efforts of Nuclear Regulatory Authority of the Slovak Republic (NRA SR) was focused on support of quality assurance programmes development at responsible organizations Bohunice V-1 and V-v and Mochovce NPPs and their inspection. Development of the level two documentation of a partial quality assurance programme for NPP operation continued at Mochovce NPP. Most of documentation has been submitted to NRA SR for comments and approval. NRA SR invited a mission of French experts to Mochovce NPP to review preparation and performance of internal audits that would be beneficial for improvement in this kind activities at the NPP. Bohunice NPP continued in development of a partial quality assurance programme for operation. The Quality Assurance Programme submitted to NRA SR for approval. Based on a request of Bohunice NPPs, NRA SR consulted the draft quality assurance programme developed by Siemens for stage of the 'Basic Design' of V-1 NPP upgrading. The programme had not been submitted for approval to NRA SR prior to completion of works by Siemens. Based on an internal audit that had been performed, corrective measures were proposed to meet requirements on review and approval of suppliers quality assurance programmes. Requirements related to the quality assurance at nuclear installations were prepared to be incorporated into principles of a act on peaceful use of nuclear power in Slovak Republic

  8. UST Financial Assurance Information

    Data.gov (United States)

    U.S. Environmental Protection Agency — Subtitle I of the Resource Conservation and Recovery Act, as amended by the Hazardous Waste Disposal Act of 1984, brought underground storage tanks (USTs) under...

  9. DOE financial assurance presentation

    International Nuclear Information System (INIS)

    Huck, R.

    1990-01-01

    The presentation topic is California's approach to license application review in meeting financial assurances for the proposed Ward Valley site. The purpose of the presentation is to provide information on specific financial assurance provisions contained in 10 CFR Part 61 and how California intends to satisfy those requirements. Also, as rate setter, California intends to demonstrate how it will assure allowable costs to the rate base though a financial prudency review. The key provisions of financial assurance are: 10 CFR Section 61.61 - This provision requires an applicant to demonstrate its ability to finance licensed activities; 10 CFR Section 61.62 - This provision requires an applicant to provide assurance that sufficient funds will be available for site closure and stabilization; and 10 CFR Section 61.63 - This provision requires an applicant to provide 'a copy of a binding arrangement, such as a lease, between the applicant and the disposal site owner, so that sufficient funds will be available to cover the costs of the institutional control period.' To assist California in its determination of financial assurance compliance to be demonstrated by the applicant for Part 61 requirements, is NUREG guidance document 1199 'Standard Format and Content of a License Application for a Low-Level Radioactive Waste (LLRW) Disposal Facility.' The detailed financial assurance provisions of NUREG 1199 are then embodied in NUREG 1200, 'Standard Review Plant for the Review of a License Application for a LLRW Disposal Facility.'

  10. Information Systems Outsourcing Relationship Model

    Directory of Open Access Journals (Sweden)

    Richard Flemming

    2007-09-01

    Full Text Available Increasing attention is being paid to what determines the success of an information systems outsourcing arrangement. The current research aims to provide an improved understanding of the factors influencing the outcome of an information systems outsourcing relationship and to provide a preliminary validation of an extended outsourcing relationship model by interviews with information systems outsourcing professionals in both the client and vendor of a major Australian outsourcing relationship. It also investigates whether the client and the vendor perceive the relationship differently and if so, how they perceive it differently and whether the two perspectives are interrelated.

  11. Quality assurance

    OpenAIRE

    Cauchi, Maurice A.M.

    1993-01-01

    The concept of quality assurance refers more specifically to the process of objectifying and clearly enunciating goals, and providing means of assessing the outcomes. In this article the author mentions four fundamental elements of quality assurance which should be applied in the medical profession in Malta. These elements should relate to professional performance, resource utilisation, risk management and patient satisfaction. The aim of the medical professionals in Malta is to provide the b...

  12. Solving multi-customer FPR model with quality assurance and discontinuous deliveries using a two-phase algebraic approach.

    Science.gov (United States)

    Chiu, Yuan-Shyi Peter; Chou, Chung-Li; Chang, Huei-Hsin; Chiu, Singa Wang

    2016-01-01

    A multi-customer finite production rate (FPR) model with quality assurance and discontinuous delivery policy was investigated in a recent paper (Chiu et al. in J Appl Res Technol 12(1):5-13, 2014) using differential calculus approach. This study employs mathematical modeling along with a two-phase algebraic method to resolve such a specific multi-customer FPR model. As a result, the optimal replenishment lot size and number of shipments can be derived without using the differential calculus. Such a straightforward method may assist practitioners who with insufficient knowledge of calculus in learning and managing the real multi-customer FPR systems more effectively.

  13. Modeling Human Information Acquisition Strategies

    NARCIS (Netherlands)

    Heuvelink, Annerieke; Klein, Michel C. A.; van Lambalgen, Rianne; Taatgen, Niels A.; Rijn, Hedderik van

    2009-01-01

    The focus of this paper is the development of a computational model for intelligent agents that decides on whether to acquire required information by retrieving it from memory or by interacting with the world. First, we present a task for which such decisions have to be made. Next, we discuss an

  14. Model for deployment of a Quality Assurance System in the nuclear fuel cycle facilities using Project Management techniques

    Energy Technology Data Exchange (ETDEWEB)

    Lage, Ricardo F.; Ribeiro, Saulo F.Q., E-mail: rflage@gmail.com, E-mail: quintao.saulo@gmail.com [Industrias Nucleares do Brasil (INB), Rio de Janeiro, RJ (Brazil)

    2015-07-01

    The Nuclear Safety is the main goal in any nuclear facility. In this sense the Norm CNEN-NN-1.16 classifies the quality assurance issue as a management system to be deployed and implemented by the organization to achieving security goals. Quality Assurance is a set of systematic and planned actions necessary to provide adequate confidence ensuring that a structure, system, component or installation will work satisfactorily in s. Hence, the Quality Assurance System (QAS) is a complete and comprehensive methodology, going far beyond a management plan quality from the perspective of project management. The fundamental of QAS requirements is all activities that influence the quality, involving organizational, human resources, procurement, nuclear safety, projects, procedures and communication. Coordination of all these elements requires a great effort by the team responsible because it usually involves different areas and different levels of hierarchy within the organization. The objectives and desired benefits should be well set for everyone to understand what it means to be achieved and how to achieve. The support of senior management is critical at this stage, providing guidelines and resources necessary to get the job elapse clearly and efficiently, on time, cost and certain scope. The methodology of project management processes can be applied to facilitate and expedite the implementation of this system. Many of the principles of the QAS are correlated with knowledge areas of project management. The proposed model for implementation of a QAS in the nuclear fuel cycle facilities considered the best project management practices according to the Project Management Book of Knowledge (PMBOK - 5th edition) of the Project Management Institute (PMI). This knowledge is considered very good practices around the world. Since the model was defined, the deployment process becomes more practical and efficient, providing reduction in deployment time, better management of human

  15. Model for deployment of a Quality Assurance System in the nuclear fuel cycle facilities using Project Management techniques

    International Nuclear Information System (INIS)

    Lage, Ricardo F.; Ribeiro, Saulo F.Q.

    2015-01-01

    The Nuclear Safety is the main goal in any nuclear facility. In this sense the Norm CNEN-NN-1.16 classifies the quality assurance issue as a management system to be deployed and implemented by the organization to achieving security goals. Quality Assurance is a set of systematic and planned actions necessary to provide adequate confidence ensuring that a structure, system, component or installation will work satisfactorily in s. Hence, the Quality Assurance System (QAS) is a complete and comprehensive methodology, going far beyond a management plan quality from the perspective of project management. The fundamental of QAS requirements is all activities that influence the quality, involving organizational, human resources, procurement, nuclear safety, projects, procedures and communication. Coordination of all these elements requires a great effort by the team responsible because it usually involves different areas and different levels of hierarchy within the organization. The objectives and desired benefits should be well set for everyone to understand what it means to be achieved and how to achieve. The support of senior management is critical at this stage, providing guidelines and resources necessary to get the job elapse clearly and efficiently, on time, cost and certain scope. The methodology of project management processes can be applied to facilitate and expedite the implementation of this system. Many of the principles of the QAS are correlated with knowledge areas of project management. The proposed model for implementation of a QAS in the nuclear fuel cycle facilities considered the best project management practices according to the Project Management Book of Knowledge (PMBOK - 5th edition) of the Project Management Institute (PMI). This knowledge is considered very good practices around the world. Since the model was defined, the deployment process becomes more practical and efficient, providing reduction in deployment time, better management of human

  16. Financial assurances

    International Nuclear Information System (INIS)

    Paton, R.F.

    1990-01-01

    US Ecology is a full service waste management company. The company operates two of the nation's three existing low-level radioactive waste (LLRW) disposal facilities and has prepared and submitted license applications for two new LLRW disposal facilities in California and Nebraska. The issue of financial assurances is an important aspect of site development and operation. Proper financial assurances help to insure that uninterrupted operation, closure and monitoring of a facility will be maintained throughout the project's life. Unfortunately, this aspect of licensing is not like others where you can gauge acceptance by examining approved computer codes, site performance standards or applying specific technical formulas. There is not a standard financial assurance plan. Each site should develop its requirements based upon the conditions of the site, type of design, existing state or federal controls, and realistic assessments of future financial needs. Financial assurances at U.S. Ecology's existing sites in Richland, Washington, and Beatty, Nevada, have been in place for several years and are accomplished in a variety of ways by the use of corporate guarantees, corporate capital funds, third party liability insurance, and post closure/long-term care funds. In addressing financial assurances, one can divide the issue into three areas: Site development/operations, third party damages, and long-term care/cleanup

  17. Building Information Modeling Comprehensive Overview

    Directory of Open Access Journals (Sweden)

    Sergey Kalinichuk

    2015-07-01

    Full Text Available The article is addressed to provide a comprehensive review on recently accelerated development of the Information Technology within project market such as industrial, engineering, procurement and construction. Author’s aim is to cover the last decades of the growth of the Information and Communication Technology in construction industry in particular Building Information Modeling and testifies that the problem of a choice of the effective project realization method not only has not lost its urgency, but has also transformed into one of the major condition of the intensive technology development. All of it has created a great impulse on shortening the project duration and has led to the development of various schedule compression techniques what becomes a focus of modern construction.

  18. A new quality assurance package for hospital palliative care teams: the Trent Hospice Audit Group model.

    Science.gov (United States)

    Hunt, J; Keeley, V L; Cobb, M; Ahmedzai, S H

    2004-07-19

    Cancer patients in hospitals are increasingly cared for jointly by palliative care teams, as well as oncologists and surgeons. There has been a considerable growth in the number and range of hospital palliative care teams (HPCTs) in the United Kingdom. HPCTs can include specialist doctors and nurses, social workers, chaplains, allied health professionals and pharmacists. Some teams work closely with existing cancer multidisciplinary teams (MDTs) while others are less well integrated. Quality assurance and clinical governance requirements have an impact on the monitoring of such teams, but so far there is no standardised way of measuring the amount and quality of HPCTs' workload. Trent Hospice Audit Group (THAG) is a multiprofessional research group, which has been developing standards and audit tools for palliative care since the 1990s. These follow a format of structure-process-outcome for standards and measures. We describe a collaborative programme of work with HPCTs that has led to a new set of standards and audit tools. Nine HPCTs participated in three rounds of consultation, piloting and modification of standard statements and tools. The final pack of HPCT quality assurance tools covers: policies and documentation; medical notes review; questionnaires for ward-based staff. The tools measure the HPCT workload and casemix; the views of ward-based staff on the supportive role of the HPCT and the effectiveness of HPCT education programmes, particularly in changing practice. The THAG HPCT quality assurance pack is now available for use in cancer peer review.

  19. Study on quality assurance for high-level radioactive waste disposal project (2). Quality assurance system for the site characterization phase in the Yucca Mountain Project

    International Nuclear Information System (INIS)

    Takada, Susumu

    2006-01-01

    The objective of this report is to assist related organizations in the development of quality assurance systems for a high-level radioactive waste disposal system. This report presents detail information with which related organizations can begin the development of quality assurance systems at an initial phase of repository development for a high-level radioactive waste disposal program, including data qualification, model validation, systems and facilities for quality assurance (e.g., technical data management system, sample management facility, etc.), and QA program applicability (items and activities). These descriptions are based on information in QA program for the Yucca Mountain Project (YMP), such as the U.S. Department of Energy (DOE) Quality Assurance Requirements and Description (QARD), DOE/RW-0333P, quality implementing procedures, and reports implemented by the procedures. Additionally, this report includes some brief recommendations for developing of quality assurance systems, such as establishment of quality assurance requirements, measures for establishment of QA system. (author)

  20. Quality assurance

    Energy Technology Data Exchange (ETDEWEB)

    Gillespie, B.M.; Gleckler, B.P.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the quality assurance and quality control practices of Hanford Site environmental monitoring and surveillance programs. Samples are analyzed according to documented standard analytical procedures. This section discusses specific measures taken to ensure quality in project management, sample collection, and analytical results.

  1. Quality assurance

    International Nuclear Information System (INIS)

    Gillespie, B.M.; Gleckler, B.P.

    1995-01-01

    This section of the 1994 Hanford Site Environmental Report summarizes the quality assurance and quality control practices of Hanford Site environmental monitoring and surveillance programs. Samples are analyzed according to documented standard analytical procedures. This section discusses specific measures taken to ensure quality in project management, sample collection, and analytical results

  2. State-based modeling of continuous human-integrated systems: An application to air traffic separation assurance

    International Nuclear Information System (INIS)

    Landry, Steven J.; Lagu, Amit; Kinnari, Jouko

    2010-01-01

    A method for modeling the safety of human-integrated systems that have continuous dynamics is introduced. The method is intended to supplement more detailed reliability-based methods. Assumptions for the model are defined such that the model is demonstrably complete, enabling it to yield a set of key agent characteristics. These key characteristics identify a sufficient set of characteristics that can be used to establish the safety of particular system configurations. The method is applied for the analysis of the safety of strategic and tactical separation assurance algorithms for the next generation air transportation system. It is shown that the key characteristics for this problem include the ability of agents (human or automated) to identify configurations that can enable intense transitions from a safe to unsafe state. However, the most technologically advanced algorithm for separation assurance does not currently attempt to identify such configurations. It is also discussed how, although the model is in a form that lends itself to quantitative evaluations, such evaluations are complicated by the difficulty of accurately quantifying human error probabilities.

  3. Information risk and security modeling

    Science.gov (United States)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  4. Quality assurance manual: Volume 2, Appendices

    International Nuclear Information System (INIS)

    Oijala, J.E.

    1988-06-01

    This paper contains quality assurance information on departments of the Stanford Linear Accelerator Center. Particular quality assurance policies and standards discussed are on: Mechanical Systems; Klystron and Microwave Department; Electronics Department; Plant Engineering; Accelerator Department; Purchasing; and Experimental Facilities Department

  5. Software Quality Assurance Audits Guidebooks

    Science.gov (United States)

    1990-01-01

    The growth in cost and importance of software to NASA has caused NASA to address the improvement of software development across the agency. One of the products of this program is a series of guidebooks that define a NASA concept of the assurance processes that are used in software development. The Software Assurance Guidebook, NASA-GB-A201, issued in September, 1989, provides an overall picture of the NASA concepts and practices in software assurance. Second level guidebooks focus on specific activities that fall within the software assurance discipline, and provide more detailed information for the manager and/or practitioner. This is the second level Software Quality Assurance Audits Guidebook that describes software quality assurance audits in a way that is compatible with practices at NASA Centers.

  6. Possibilities for Using TAM and Technology Frames Models to Assess the Acceptance of New Technologies in the Chilean Higher Education Quality Assurance

    Directory of Open Access Journals (Sweden)

    Luis González-Bravo

    2015-05-01

    Full Text Available This essay reviews the importance of assessing the degree of acceptance of new technologies in the Chilean higher education institutions, as an input for managing quality assurance. Technology Acceptance and Technology Frames models are described, emphasizing their benefits in this field. Understanding and facilitating the process of new technologies acceptance in the organizations, by identifying those elements which hinder it, allows improving the implementation of quality assurance mechanisms in order to make the educational process more efficient and effective.

  7. Printed Circuit Board Quality Assurance

    Science.gov (United States)

    Sood, Bhanu

    2016-01-01

    PCB Assurance Summary: PCB assurance actives are informed by risk in context of the Project. Lessons are being applied across Projects for continuous improvements. Newer component technologies, smaller/high pitch devices: tighter and more demanding PCB designs: Identifying new research areas. New materials, designs, structures and test methods.

  8. Nuclear fuel quality assurance

    International Nuclear Information System (INIS)

    1976-01-01

    Full text: Quality assurance is used extensively in the design, construction and operation of nuclear power plants. This methodology is applied to all activities affecting the quality of a nuclear power plant in order to obtain confidence that an item or a facility will perform satisfactorily in service. Although the achievement of quality is the responsibility of all parties participating in a nuclear power project, establishment and implementation of the quality assurance programme for the whole plant is a main responsibility of the plant owner. For the plant owner, the main concern is to achieve control over the quality of purchased products or services through contractual arrangements with the vendors. In the case of purchase of nuclear fuel, the application of quality assurance might be faced with several difficulties because of the lack of standardization in nuclear fuel and the proprietary information of the fuel manufacturers on fuel design specifications and fuel manufacturing procedures. The problems of quality assurance for purchase of nuclear fuel were discussed in detail during the seminar. Due to the lack of generally acceptable standards, the successful application of the quality assurance concept to the procurement of fuel depends on how much information can be provided by the fuel manufacturer to the utility which is purchasing fuel, and in what form and how early this information can be provided. The extent of information transfer is basically set out in the individual vendor-utility contracts, with some indirect influence from the requirements of regulatory bodies. Any conflict that exists appears to come from utilities which desire more extensive control over the product they are buying. There is a reluctance on the part of vendors to permit close insight of the purchasers into their design and manufacturing procedures, but there nevertheless seems to be an increasing trend towards release of more information to the purchasers. It appears that

  9. Quality assurance of radiopharmaceuticals

    International Nuclear Information System (INIS)

    Frier, M.; Hesslewood, S.R.

    1980-01-01

    A practical guide has been composed for all persons involved in the preparation and use of radiopharmaceuticals on methods used in quality assurance and their applications. These methods include the calibration of ionization chamber assay calibrators, the determination of radionuclide purity, radiochemical purity and chemical purity, particle size analysis and the measurement of pH. Quality assurance procedures are described for products not described in Compendial Monographs, or where the monograph exists, additional useful information is provided; such radiopharmaceuticals include technetium, indium-labelled and iodine-labelled products. (U.K.)

  10. Spiral model pilot project information model

    Science.gov (United States)

    1991-01-01

    The objective was an evaluation of the Spiral Model (SM) development approach to allow NASA Marshall to develop an experience base of that software management methodology. A discussion is presented of the Information Model (IM) that was used as part of the SM methodology. A key concept of the SM is the establishment of an IM to be used by management to track the progress of a project. The IM is the set of metrics that is to be measured and reported throughout the life of the project. These metrics measure both the product and the process to ensure the quality of the final delivery item and to ensure the project met programmatic guidelines. The beauty of the SM, along with the IM, is the ability to measure not only the correctness of the specification and implementation of the requirements but to also obtain a measure of customer satisfaction.

  11. Quality assurance handbook for measurement laboratories

    International Nuclear Information System (INIS)

    Delvin, W.L.

    1984-10-01

    This handbook provides guidance in the application of quality assurance to measurement activities. It is intended to help those persons making measurements in applying quality assurance to their work activities by showing how laboratory practices and quality assurance requirements are integrated to provide control within those activities. The use of the guidance found in this handbook should help provide consistency in the interpretation of quality assurance requirements across all types of measurement laboratories. This handbook also can assist quality assurance personnel in understanding the relationships between laboratory practices and quality assurance requirements. The handbook is composed of three chapters and several appendices. Basic guidance is provided by the three chapters. In Chapter 1, the role of quality assurance in obtaining quality data and the importance of such data are discussed. Chapter 2 presents the elements of laboratory quality assurance in terms of practices that can be used in controlling work activities to assure the acquisition of quality data. Chapter 3 discusses the implementation of laboratory quality assurance. The appendices provide supplemental information to give the users a better understanding of the following: what is quality assurance; why quality assurance is required; where quality assurance requirements come from; how those requirements are interpreted for application to laboratory operations; how the elements of laboratory quality assurance relate to various laboratory activities; and how a quality assurance program can be developed

  12. SGHWR - quality assurance documentation

    International Nuclear Information System (INIS)

    Garrard, R.S.; Caulfield, J.

    1976-01-01

    The quality assurance program for a modern power station such as an SGHWR type reactor plant must include a record of quality achievement. The case history record which is evidence of the actual quality of the plant and is a data bank of design, manufacture, and results of inspections and tests, is described. Documentation distribution, which keeps all key areas informed of plant item quality status, and the retrieval and storage of information, are briefly discussed. (U.K.)

  13. Software quality assurance

    CERN Document Server

    Laporte, Claude Y

    2018-01-01

    This book introduces Software Quality Assurance (SQA) and provides an overview of standards used to implement SQA. It defines ways to assess the effectiveness of how one approaches software quality across key industry sectors such as telecommunications, transport, defense, and aerospace. * Includes supplementary website with an instructor's guide and solutions * Applies IEEE software standards as well as the Capability Maturity Model Integration for Development (CMMI) * Illustrates the application of software quality assurance practices through the use of practical examples, quotes from experts, and tips from the authors

  14. Benchmarking Software Assurance Implementation

    Science.gov (United States)

    2011-05-18

    product The chicken#. (a.k.a. Process Focused Assessment ) – Management Systems ( ISO 9001, ISO 27001 , ISO 2000) – Capability Maturity Models (CMMI...Assurance PRM, RMM, Assurance for CMMI)) – Lifecycle Processes ( ISO /IEEE 15288, ISO /IEEE 12207) – COBIT, ITIL, MS SDL, OSAMM, BSIMM 5 The egg...a.k.a Product Focused Assessments) – SCAP - NIST-SCAP – ISO /OMG W3C – KDM, BPMN, RIF, XMI, RDF – OWASP Top 10 – SANS TOP 25 – Secure Code Check Lists

  15. A data management approach to quality assurance using colorectal carcinoma reports from two institutions as a model.

    Science.gov (United States)

    Sorge, John P; Harmon, C Reid; Sherman, Susan M; Baillie, E Eugene

    2005-07-01

    We used data management software to compare pathology report data concerning regional lymph node sampling for colorectal carcinoma from 2 institutions using different dissection methods. Data were retrieved from 2 disparate anatomic pathology information systems for all cases of colorectal carcinoma in 2003 involving the ascending and descending colon. Initial sorting of the data included overall lymph node recovery to assess differences between the dissection methods at the 2 institutions. Additional segregation of the data was used to challenge the application's capability of accurately addressing the complexity of the process. This software approach can be used to evaluate data from disparate computer systems, and we demonstrate how an automated function can enable institutions to compare internal pathologic assessment processes and the results of those comparisons. The use of this process has future implications for pathology quality assurance in other areas.

  16. Parsimonious Language Models for Information Retrieval

    NARCIS (Netherlands)

    Hiemstra, Djoerd; Robertson, Stephen; Zaragoza, Hugo

    We systematically investigate a new approach to estimating the parameters of language models for information retrieval, called parsimonious language models. Parsimonious language models explicitly address the relation between levels of language models that are typically used for smoothing. As such,

  17. 7 CFR 652.7 - Quality assurance.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Quality assurance. 652.7 Section 652.7 Agriculture... assurance. (a) NRCS will review, in consultation with the Farm Service Agency, as appropriate, the quality... information obtained through its quality assurance process, documentation submitted by the technical service...

  18. Refreshing Information Literacy: Learning from Recent British Information Literacy Models

    Science.gov (United States)

    Martin, Justine

    2013-01-01

    Models play an important role in helping practitioners implement and promote information literacy. Over time models can lose relevance with the advances in technology, society, and learning theory. Practitioners and scholars often call for adaptations or transformations of these frameworks to articulate the learning needs in information literacy…

  19. Function Model for Community Health Service Information

    Science.gov (United States)

    Yang, Peng; Pan, Feng; Liu, Danhong; Xu, Yongyong

    In order to construct a function model of community health service (CHS) information for development of CHS information management system, Integration Definition for Function Modeling (IDEF0), an IEEE standard which is extended from Structured Analysis and Design(SADT) and now is a widely used function modeling method, was used to classifying its information from top to bottom. The contents of every level of the model were described and coded. Then function model for CHS information, which includes 4 super-classes, 15 classes and 28 sub-classed of business function, 43 business processes and 168 business activities, was established. This model can facilitate information management system development and workflow refinement.

  20. Item Information in the Rasch Model

    NARCIS (Netherlands)

    Engelen, Ron J.H.; van der Linden, Willem J.; Oosterloo, Sebe J.

    1988-01-01

    Fisher's information measure for the item difficulty parameter in the Rasch model and its marginal and conditional formulations are investigated. It is shown that expected item information in the unconditional model equals information in the marginal model, provided the assumption of sampling

  1. Model Information Exchange System (MIXS).

    Science.gov (United States)

    2013-08-01

    Many travel demand forecast models operate at state, regional, and local levels. While they share the same physical network in overlapping geographic areas, they use different and uncoordinated modeling networks. This creates difficulties for models ...

  2. Improving of Quality Control and Quality Assurance in 14C and 3H Laboratory; Participation in the IAEA Model Project

    International Nuclear Information System (INIS)

    Obelic, B.

    2001-01-01

    Full text: Users of laboratory's analytical results are increasingly requiring demonstrable proofs of the reliability and credibility of the results using internationally accepted standards, because the economic, ecological, medical and legal decisions based on laboratory results need to be accepted nationally and internationally. Credibility, respect and opportunities of the laboratories are improved when objective evidence on the reliability and quality of the results can be given. This is achieved through inculcation of a quality culture through definition of well-defined procedures and controls and operational checks characteristic of quality assurance and quality control (Q A/QC). IAEA launched in 1999 a two-and-a-half year model project entitled Quality Control and Quality Assurance of Nuclear Analytical Techniques with participation of laboratories using alpha, beta and/or gamma spectrometry from CEE and NIS countries. The project started to introduce and implement QA principles in accordance with the ISO-17025 guide, leading eventually to a level at which the QA system is self-sustainable and might be appropriate for formal accreditation or certification by respective national authorities. Activities within the project consist of semi-annual reports, two training workshops, two inspection visits of the laboratories by IAEA experts and proficiency tests. The following topics were considered: organisation requirements, acceptance criteria and non-conformance management of QC, internal and external method validation, statistical analyses and uncertainty evaluation, standard operation procedures and quality manual documentation. 14 C and 3 H Laboratory of the Rudjer Boskovic Institute has been one of ten laboratories participating in the Project. In the Laboratory all the procedures required in the quality control were included implicitly, while during the Model Project much effort has been devoted to elaboration of explicit documentation. Since the beginning

  3. [Integrated quality assurance].

    Science.gov (United States)

    Bögel, K; Stöhr, K

    1994-07-01

    The definition of terms and connotation of "Quality", "Quality Assurance" and "Integration" lead to an analysis and understanding of inhibiting and fostering factors of the "Health Triad" of people, animals and environment. Although "Quality" is largely or ultimately determined by the consumer, there are considerable differences as this term is applied by (a) the individual consumer, (b) the dynamic producer defending or gaining markets, (c) those engaged in traditional product manufacturing, or (d) governments setting (minimum) requirements for the sake of free trade. "Quality Assurance" offers cooperation of partners all along the food chain from "pasture to table". The managerial process turned into a continuum of responsibility and agreement on processes and product characteristics. This overcomes the disadvantages of strategies stressing distinct defense barriers. In practice this philosophy of a predominant role of defence barriers proved largely partnership destructive, in that it permitted to shift responsibilities for failures and to claim administrative competence according to momentary situations and interests. "Integrated Quality Assurance" means mutual agreement of two or more partners along the food chain (e. g. feed producers, farmers, animal health industry, veterinarians and food processors) on product characteristics and production methods. It involves essential system elements including facilities, materials, manpower, information, transport, management etc. Different principles and procedures of quality assurance have been introduced in practice, including agriculture and food processing. These different approaches are not mutually exclusive but largely of complementary nature.(ABSTRACT TRUNCATED AT 250 WORDS)

  4. Construction sequence scale model: an aid to productivity and quality assurance

    International Nuclear Information System (INIS)

    Clothier, W.A. Sr.

    1978-01-01

    The natural tendencies of an engineering scale model to promote a high level of quality by error prevention during design and construction stages of a project are studied. A brief section on the basic history of engineering modeling is used to describe TVA's usage of the model. The basic design model is explored in an overview touching the highlights of that form of modeling. A detailed look at the construction sequence model, a relatively new form of model, is presented to demonstrate quality and productivity awareness

  5. Directory of Energy Information Administration Models 1994

    International Nuclear Information System (INIS)

    1994-07-01

    This directory revises and updates the 1993 directory and includes 15 models of the National Energy Modeling System (NEMS). Three other new models in use by the Energy Information Administration (EIA) have also been included: the Motor Gasoline Market Model (MGMM), Distillate Market Model (DMM), and the Propane Market Model (PPMM). This directory contains descriptions about each model, including title, acronym, purpose, followed by more detailed information on characteristics, uses and requirements. Sources for additional information are identified. Included in this directory are 37 EIA models active as of February 1, 1994

  6. Directory of Energy Information Administration Models 1994

    Energy Technology Data Exchange (ETDEWEB)

    1994-07-01

    This directory revises and updates the 1993 directory and includes 15 models of the National Energy Modeling System (NEMS). Three other new models in use by the Energy Information Administration (EIA) have also been included: the Motor Gasoline Market Model (MGMM), Distillate Market Model (DMM), and the Propane Market Model (PPMM). This directory contains descriptions about each model, including title, acronym, purpose, followed by more detailed information on characteristics, uses and requirements. Sources for additional information are identified. Included in this directory are 37 EIA models active as of February 1, 1994.

  7. Information modelling and knowledge bases XXV

    CERN Document Server

    Tokuda, T; Jaakkola, H; Yoshida, N

    2014-01-01

    Because of our ever increasing use of and reliance on technology and information systems, information modelling and knowledge bases continue to be important topics in those academic communities concerned with data handling and computer science. As the information itself becomes more complex, so do the levels of abstraction and the databases themselves. This book is part of the series Information Modelling and Knowledge Bases, which concentrates on a variety of themes in the important domains of conceptual modeling, design and specification of information systems, multimedia information modelin

  8. COMPLEMENTARITY OF HISTORIC BUILDING INFORMATION MODELLING AND GEOGRAPHIC INFORMATION SYSTEMS

    Directory of Open Access Journals (Sweden)

    X. Yang

    2016-06-01

    Full Text Available In this paper, we discuss the potential of integrating both semantically rich models from Building Information Modelling (BIM and Geographical Information Systems (GIS to build the detailed 3D historic model. BIM contributes to the creation of a digital representation having all physical and functional building characteristics in several dimensions, as e.g. XYZ (3D, time and non-architectural information that are necessary for construction and management of buildings. GIS has potential in handling and managing spatial data especially exploring spatial relationships and is widely used in urban modelling. However, when considering heritage modelling, the specificity of irregular historical components makes it problematic to create the enriched model according to its complex architectural elements obtained from point clouds. Therefore, some open issues limiting the historic building 3D modelling will be discussed in this paper: how to deal with the complex elements composing historic buildings in BIM and GIS environment, how to build the enriched historic model, and why to construct different levels of details? By solving these problems, conceptualization, documentation and analysis of enriched Historic Building Information Modelling are developed and compared to traditional 3D models aimed primarily for visualization.

  9. A proposed general model of information behaviour.

    Directory of Open Access Journals (Sweden)

    2003-01-01

    Full Text Available Presents a critical description of Wilson's (1996 global model of information behaviour and proposes major modification on the basis of research into information behaviour of managers, conducted in Poland. The theoretical analysis and research results suggest that Wilson's model has certain imperfections, both in its conceptual content, and in graphical presentation. The model, for example, cannot be used to describe managers' information behaviour, since managers basically are not the end users of external from organization or computerized information services, and they acquire information mainly through various intermediaries. Therefore, the model cannot be considered as a general model, applicable to every category of information users. The proposed new model encompasses the main concepts of Wilson's model, such as: person-in-context, three categories of intervening variables (individual, social and environmental, activating mechanisms, cyclic character of information behaviours, and the adoption of a multidisciplinary approach to explain them. However, the new model introduces several changes. They include: 1. identification of 'context' with the intervening variables; 2. immersion of the chain of information behaviour in the 'context', to indicate that the context variables influence behaviour at all stages of the process (identification of needs, looking for information, processing and using it; 3. stress is put on the fact that the activating mechanisms also can occur at all stages of the information acquisition process; 4. introduction of two basic strategies of looking for information: personally and/or using various intermediaries.

  10. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-11-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  11. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  12. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... the UAB-SCIMS More The UAB-SCIMS Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network as a resource to promote knowledge in the ...

  13. How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains

    Science.gov (United States)

    Perry, William G.

    2006-04-01

    One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.

  14. A Software Hub for High Assurance Model-Driven Development and Analysis

    Science.gov (United States)

    2007-01-23

    verification of UML models in TLPVS. In Thomas Baar, Alfred Strohmeier, Ana Moreira, and Stephen J. Mellor, editors, UML 2004 - The Unified Modeling...volume 3785 of Lecture Notes in Computer Science, pages 52–65, Manchester, UK, Nov 2005. Springer. [GH04] Günter Graw and Peter Herrmann. Transformation

  15. Inexperienced clinicians can extract pathoanatomic information from MRI narrative reports with high reproducability for use in research/quality assurance

    DEFF Research Database (Denmark)

    Kent, Peter; Briggs, Andrew M; Albert, Hanne Birgit

    2011-01-01

    Background Although reproducibility in reading MRI images amongst radiologists and clinicians has been studied previously, no studies have examined the reproducibility of inexperienced clinicians in extracting pathoanatomic information from magnetic resonance imaging (MRI) narrative reports and t...

  16. Topic Models in Information Retrieval

    Science.gov (United States)

    2007-08-01

    Information Processing Systems, Cambridge, MA, MIT Press, 2004. Brown, P.F., Della Pietra, V.J., deSouza, P.V., Lai, J.C. and Mercer, R.L., Class-based...2003. http://www.wkap.nl/prod/b/1-4020-1216-0. Croft, W.B., Lucia , T.J., Cringean, J., and Willett, P., Retrieving Documents By Plausible Inference

  17. Quality assurance criteria for Waste Isolation Pilot Plant performance assessment modeling

    International Nuclear Information System (INIS)

    1995-07-01

    The US Department of Energy (DOE) is developing the Waste Isolation Pilot Plant (WIPP) as a deep geologic repository for transuranic (TRU) and TRU-mixed wastes generated by DOE Defense Program activities. Regulatory agencies, including the Environmental Protection Agency (EPA) and New Mexico Environment Department, will be forced to rely upon system modeling to determine the potential compliance of the WIPP facility with federal regulations. Specifically, long-term modeling efforts are focused on compliance with 40 CFR Part 268, ''Land Disposal Restrictions,'' and 40 CFR Part 191, ''Environmental Radiation Protection Standards for Management and Disposal of Spent Nuclear Fuel, High-Level, and Transuranic Radioactive Wastes.'' DOE plans to use the similar conceptual models and numerical codes to demonstrate compliance under both of these regulations. Sandia National Laboratories (SNL) has been developing a system model that will be used to demonstrate potential waste migration from the WIPP facility. Because the geologic system underlying the WIPP site is not completely understood, the software code to model the system must be developed to exacting standards for its predictions to be reliable and defensible. This is a complex model that consists of many submodules used to describe various migration pathways and processes that affect potential waste migration

  18. Quality Assurance in the Presence of Variability

    Science.gov (United States)

    Lauenroth, Kim; Metzger, Andreas; Pohl, Klaus

    Software Product Line Engineering (SPLE) is a reuse-driven development paradigm that has been applied successfully in information system engineering and other domains. Quality assurance of the reusable artifacts of the product line (e.g. requirements, design, and code artifacts) is essential for successful product line engineering. As those artifacts are reused in several products, a defect in a reusable artifact can affect several products of the product line. A central challenge for quality assurance in product line engineering is how to consider product line variability. Since the reusable artifacts contain variability, quality assurance techniques from single-system engineering cannot directly be applied to those artifacts. Therefore, different strategies and techniques have been developed for quality assurance in the presence of variability. In this chapter, we describe those strategies and discuss in more detail one of those strategies, the so called comprehensive strategy. The comprehensive strategy aims at checking the quality of all possible products of the product line and thus offers the highest benefits, since it is able to uncover defects in all possible products of the product line. However, the central challenge for applying the comprehensive strategy is the complexity that results from the product line variability and the large number of potential products of a product line. In this chapter, we present one concrete technique that we have developed to implement the comprehensive strategy that addresses this challenge. The technique is based on model checking technology and allows for a comprehensive verification of domain artifacts against temporal logic properties.

  19. INFORMATION MODEL OF A GENERAL PRACTITIONER

    Directory of Open Access Journals (Sweden)

    S. M. Zlepko

    2016-06-01

    Full Text Available In the paper the authors developed information model family doctor shows its innovation and functionality. The proposed model meets the requirements of the current job description and criteria World Organization of Family Doctors.

  20. ONLINE MODEL OF EDUCATION QUALITY ASSURANCE EQUASP IMPLEMENTATION: EXPERIENCE OF VYATKA STATE UNIVERSITY

    Directory of Open Access Journals (Sweden)

    Valentin Pugach

    2015-10-01

    Full Text Available The article is devoted to the problem of assessing the quality of higher education. In the Russian Federation recently quality assessment of educational services provided by state-accredited universities is carried out by the state represented by the Ministry of education and science. State universities have simulated internal systemseducation quality assessment in accordance with the methodology proposed by the Ministry of education and science. Currently more attention is paid to the independent assessment of education quality which is the basis of professional public accreditation. The project "EQUASP" financed within the framework of the TEMPUS programme is directed to the problem of implementing the methodology of the online model of independent higher education quality assessment in the practice of Russian universities. The proposed model for assessing the quality of education is based on usage of 5 standards. The authors have done a comparative analysis of the model of higher education quality assessment existing in Vyatka State University and the model of education quality assessing offered by European universities-participants of the project EQUASP. The authors have presented the main results of investigation of this problem and some suggestions for improving the model of education quality assessment used by Vyatka State University.

  1. Construction of a business model to assure financial sustainability of biobanks.

    Science.gov (United States)

    Warth, Rainer; Perren, Aurel

    2014-12-01

    Biobank-suisse (BBS) is a collaborative network of biobanks in Switzerland. Since 2005, the network has worked with biobank managers towards a Swiss biobanking platform that harmonizes structures and procedures. The work with biobank managers has shown that long-term, sustainable financing is difficult to obtain. In this report, three typical biobank business models are identified and their characteristics analyzed. Five forces analysis was used to understand the competitive environment of biobanks. Data provided by OECD was used for financial estimations. The model was constructed using the business model canvas tool. The business models identified feature financing influenced by the economic situation and the research budgets in a given country. Overall, the competitive environment for biobanks is positive. The bargaining power with the buyer is negative since price setting and demand prediction is difficult. In Switzerland, the healthcare industry collects approximately 5600 U.S. dollars per person and year. If each Swiss citizen paid 0.1% (or 5 U.S. dollars) of this amount to Swiss biobanks, 45 million U.S. dollars could be collected. This compares to the approximately 10 million U.S. dollars made available for cohort studies, longitudinal studies, and pathology biobanks through science funding. With the same approach, Germany, the United States, Canada, France, and the United Kingdom could collect 361, 2634, 154, 264, and 221 million U.S. dollars, respectively. In Switzerland and in other countries, an annual fee less than 5 U.S. dollars per person is sufficient to provide biobanks with sustainable financing. This inspired us to construct a business model that not only includes the academic and industrial research sectors as customer segment, but also includes the population. The revenues would be collected as fees by the healthcare system. In Italy and Germany, a small share of healthcare spending is already used to finance selected clinical trials. The legal

  2. Organization-based Model-driven Development of High-assurance Multiagent Systems

    Science.gov (United States)

    2009-02-27

    State University. aT3 was developed in Java and built on top of the Eclipse6 platform and the Eclipse Process Framework7 ( EPF ). The goal of aT3 is to...organization. Role http://macr.cis.ksu.edu/ http://www.eclipse.org/ http://www.eclipse.org/ epf / 57 Models are static models that may include goals...and customizing processes for multi-agent system development. APE is an Eclipse-based8 plug-in which uses EPF to facilitate the management of tailored

  3. A modeling approach to support safety assurance in the automotive domain

    NARCIS (Netherlands)

    Luo, Y.; Brand, van den M.G.J.; Engelen, L.J.P.; Klabbers, M.D.; Selvaraj, H.; Zydek, D.; Chmaj, G.

    2015-01-01

    As safety standards are widely used in safety-critical domains, such as ISO 26262 in the automotive domain, the use of safety cases to demonstrate product safety is stimulated. It is crucial to ensure that a safety case is both correct and clear. To support this, we proposed to make use of modeling

  4. The Feasibility of Quality Function Deployment (QFD) as an Assessment and Quality Assurance Model

    Science.gov (United States)

    Matorera, D.; Fraser, W. J.

    2016-01-01

    Business schools are globally often seen as structured, purpose-driven, multi-sector and multi-perspective organisations. This article is based on the response of a graduate school to an innovative industrial Quality Function Deployment-based model (QFD), which was to be adopted initially in a Master's degree programme for quality assurance…

  5. A Study to Determine the Optimal Feasible Model for the Quality Assurance/Risk Management Program at Naval Hospital, Bethesda

    Science.gov (United States)

    1984-05-04

    Assurance. Within the last half of this century and especially since the advent of Medicare and Medicaid, a number of forces and trends have been...force in the quality assurance movement. They have been especially concerned about costs, allegations of excessive utilization of services and...ell as teintra- S;L.%.4ce accivities. At least a portion of continuing educacion of irsezvice tra~nn :)u~ e the result of probleI ident ificati on

  6. Compilation of information on melter modeling

    International Nuclear Information System (INIS)

    Eyler, L.L.

    1996-03-01

    The objective of the task described in this report is to compile information on modeling capabilities for the High-Temperature Melter and the Cold Crucible Melter and issue a modeling capabilities letter report summarizing existing modeling capabilities. The report is to include strategy recommendations for future modeling efforts to support the High Level Waste (BLW) melter development

  7. Codifying Information Assurance Controls for Department of Defense (DoD) Supervisory Control and Data Acquisition (SCADA) Systems

    Science.gov (United States)

    2010-03-01

    this thesis would have never been possible. I would also like to thank my wife and children for their inspiration, motivation and encouragement... Telecommuting and Broadband Communications, August 2002. •SP 800-47, Security Guide for Interconnecting Information Technology Systems, September 2002

  8. Auditors’ Perceptions of Reasonable Assurance the Effectiveness of the Audit Risk Model. Case from Iran

    OpenAIRE

    Hashem Valipour; Javad Moradi; Hajar Moazaminezhad

    2012-01-01

    Despite the definition of the concept of logical confidence in auditing standards, the results from some studies conducted indicate a meaningful difference between perceptions this basic concept, by different auditors (Law, 2008, 180). The results from some researches also indicate that auditors’ perceptions about the effectiveness of the audit risk model vary (which is based on auditing general principles on the basis of risk) (Arense, 2006, 148). In so doing, aiming at studying the proof fo...

  9. Information-Processing Models and Curriculum Design

    Science.gov (United States)

    Calfee, Robert C.

    1970-01-01

    "This paper consists of three sections--(a) the relation of theoretical analyses of learning to curriculum design, (b) the role of information-processing models in analyses of learning processes, and (c) selected examples of the application of information-processing models to curriculum design problems." (Author)

  10. Conceptual Modeling of Time-Varying Information

    DEFF Research Database (Denmark)

    Gregersen, Heidi; Jensen, Christian S.

    2004-01-01

    A wide range of database applications manage information that varies over time. Many of the underlying database schemas of these were designed using the Entity-Relationship (ER) model. In the research community as well as in industry, it is common knowledge that the temporal aspects of the mini......-world are important, but difficult to capture using the ER model. Several enhancements to the ER model have been proposed in an attempt to support the modeling of temporal aspects of information. Common to the existing temporally extended ER models, few or no specific requirements to the models were given...

  11. Directory of Energy Information Administration models 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-07-01

    This directory revises and updates the Directory of Energy Information Administration Models 1995, DOE/EIA-0293(95), Energy Information Administration (EIA), U.S. Department of Energy, July 1995. Four models have been deleted in this directory as they are no longer being used: (1) Market Penetration Model for Ground-Water Heat Pump Systems (MPGWHP); (2) Market Penetration Model for Residential Rooftop PV Systems (MPRESPV-PC); (3) Market Penetration Model for Active and Passive Solar Technologies (MPSOLARPC); and (4) Revenue Requirements Modeling System (RRMS).

  12. Quality Assurance - Construction

    DEFF Research Database (Denmark)

    Gaarslev, Axel

    1996-01-01

    Gives contains three main chapters:1. Quality Assurance initiated by external demands2. Quality Assurance initiated by internal company goals3. Innovation strategies......Gives contains three main chapters:1. Quality Assurance initiated by external demands2. Quality Assurance initiated by internal company goals3. Innovation strategies...

  13. An information maximization model of eye movements

    Science.gov (United States)

    Renninger, Laura Walker; Coughlan, James; Verghese, Preeti; Malik, Jitendra

    2005-01-01

    We propose a sequential information maximization model as a general strategy for programming eye movements. The model reconstructs high-resolution visual information from a sequence of fixations, taking into account the fall-off in resolution from the fovea to the periphery. From this framework we get a simple rule for predicting fixation sequences: after each fixation, fixate next at the location that minimizes uncertainty (maximizes information) about the stimulus. By comparing our model performance to human eye movement data and to predictions from a saliency and random model, we demonstrate that our model is best at predicting fixation locations. Modeling additional biological constraints will improve the prediction of fixation sequences. Our results suggest that information maximization is a useful principle for programming eye movements.

  14. Tools for evaluating Veterinary Services: an external auditing model for the quality assurance process.

    Science.gov (United States)

    Melo, E Correa

    2003-08-01

    The author describes the reasons why evaluation processes should be applied to the Veterinary Services of Member Countries, either for trade in animals and animal products and by-products between two countries, or for establishing essential measures to improve the Veterinary Service concerned. The author also describes the basic elements involved in conducting an evaluation process, including the instruments for doing so. These basic elements centre on the following:--designing a model, or desirable image, against which a comparison can be made--establishing a list of processes to be analysed and defining the qualitative and quantitative mechanisms for this analysis--establishing a multidisciplinary evaluation team and developing a process for standardising the evaluation criteria.

  15. Quality assurance target for community-based breast cancer screening in China: a model simulation.

    Science.gov (United States)

    Yang, Lan; Wang, Jing; Cheng, Juan; Wang, Yuan; Lu, Wenli

    2018-03-07

    We aimed to clarify the feasibility of a community-based screening strategy for breast cancer in Tianjin, China; to identify the factors that most significantly influenced its feasibility; and to identify the reference range for quality control. A state-transition Markov model simulated a hypothetical cohort of 100,000 healthy women, the start aged was set at 35 years and the time horizon was set to 50 years. The primary outcome for the model was the incremental cost-utility ratio (ICUR), defined as the program's cost per quality-adjusted life year (QALY) gained. Three screening strategies providing by community health service for women aged 35 to 69 years was compared regarding to different intervals. The probability of the ICUR being below 20 272USD (i.e., triple the annual gross domestic product [3 GDPs]) per QALY saved was 100% for annual screening strategy and screening every three years. Only when the attendance rate was > 50%, the probability for annual screening would be cost effective > 95%. The probability for the annual screening strategy being cost effective could reach to 95% for a willingness-to-pay (WTP) of 2 GDPs when the compliance rate for transfer was > 80%. When 10% stage I tumors were detected by screening, the probability of the annual screening strategy being cost effective would be up to 95% for a WTP > 3 GDPs. Annual community-based breast cancer screening was cost effective for a WTP of 3 GDP based on the incidence of breast cancer in Tianjin, China. Measures are needed to ensure performance indicators to a desirable level for the cost-effectiveness of breast cancer screening.

  16. Evaluation of plan quality assurance models for prostate cancer patients based on fully automatically generated Pareto-optimal treatment plans.

    Science.gov (United States)

    Wang, Yibing; Breedveld, Sebastiaan; Heijmen, Ben; Petit, Steven F

    2016-06-07

    IMRT planning with commercial Treatment Planning Systems (TPSs) is a trial-and-error process. Consequently, the quality of treatment plans may not be consistent among patients, planners and institutions. Recently, different plan quality assurance (QA) models have been proposed, that could flag and guide improvement of suboptimal treatment plans. However, the performance of these models was validated using plans that were created using the conventional trail-and-error treatment planning process. Consequently, it is challenging to assess and compare quantitatively the accuracy of different treatment planning QA models. Therefore, we created a golden standard dataset of consistently planned Pareto-optimal IMRT plans for 115 prostate patients. Next, the dataset was used to assess the performance of a treatment planning QA model that uses the overlap volume histogram (OVH). 115 prostate IMRT plans were fully automatically planned using our in-house developed TPS Erasmus-iCycle. An existing OVH model was trained on the plans of 58 of the patients. Next it was applied to predict DVHs of the rectum, bladder and anus of the remaining 57 patients. The predictions were compared with the achieved values of the golden standard plans for the rectum D mean, V 65, and V 75, and D mean of the anus and the bladder. For the rectum, the prediction errors (predicted-achieved) were only  -0.2  ±  0.9 Gy (mean  ±  1 SD) for D mean,-1.0  ±  1.6% for V 65, and  -0.4  ±  1.1% for V 75. For D mean of the anus and the bladder, the prediction error was 0.1  ±  1.6 Gy and 4.8  ±  4.1 Gy, respectively. Increasing the training cohort to 114 patients only led to minor improvements. A dataset of consistently planned Pareto-optimal prostate IMRT plans was generated. This dataset can be used to train new, and validate and compare existing treatment planning QA models, and has been made publicly available. The OVH model was highly accurate

  17. Introduction to quality assurance

    International Nuclear Information System (INIS)

    Kaden, W.

    1980-01-01

    In today's interpretation 'quality assurance' means 'good management'. Quality assurance has to cover all phases of a work, but all quality assurance measures must be adapted to the relevance and complexity of the actual task. Examples are given for the preparation of quality classes, the organization of quality assurance during design and manufacturing and for auditing. Finally, efficiency and limits of quality assurance systems are described. (orig.)

  18. Directory of energy information administration models 1995

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-07-13

    This updated directory has been published annually; after this issue, it will be published only biennially. The Disruption Impact Simulator Model in use by EIA is included. Model descriptions have been updated according to revised documentation approved during the past year. This directory contains descriptions about each model, including title, acronym, purpose, followed by more detailed information on characteristics, uses, and requirements. Sources for additional information are identified. Included are 37 EIA models active as of February 1, 1995. The first group is the National Energy Modeling System (NEMS) models. The second group is all other EIA models that are not part of NEMS. Appendix A identifies major EIA modeling systems and the models within these systems. Appendix B is a summary of the `Annual Energy Outlook` Forecasting System.

  19. Directory of Energy Information Administration Models 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-07-06

    This directory contains descriptions about each model, including the title, acronym, purpose, followed by more detailed information on characteristics, uses, and requirements. Sources for additional information are identified. Included in this directory are 35 EIA models active as of May 1, 1993. Models that run on personal computers are identified by ``PC`` as part of the acronym. EIA is developing new models, a National Energy Modeling System (NEMS), and is making changes to existing models to include new technologies, environmental issues, conservation, and renewables, as well as extend forecast horizon. Other parts of the Department are involved in this modeling effort. A fully operational model is planned which will integrate completed segments of NEMS for its first official application--preparation of EIA`s Annual Energy Outlook 1994. Abstracts for the new models will be included in next year`s version of this directory.

  20. Information-Theoretic Perspectives on Geophysical Models

    Science.gov (United States)

    Nearing, Grey

    2016-04-01

    To test any hypothesis about any dynamic system, it is necessary to build a model that places that hypothesis into the context of everything else that we know about the system: initial and boundary conditions and interactions between various governing processes (Hempel and Oppenheim, 1948, Cartwright, 1983). No hypothesis can be tested in isolation, and no hypothesis can be tested without a model (for a geoscience-related discussion see Clark et al., 2011). Science is (currently) fundamentally reductionist in the sense that we seek some small set of governing principles that can explain all phenomena in the universe, and such laws are ontological in the sense that they describe the object under investigation (Davies, 1990 gives several competing perspectives on this claim). However, since we cannot build perfect models of complex systems, any model that does not also contain an epistemological component (i.e., a statement, like a probability distribution, that refers directly to the quality of of the information from the model) is falsified immediately (in the sense of Popper, 2002) given only a small number of observations. Models necessarily contain both ontological and epistemological components, and what this means is that the purpose of any robust scientific method is to measure the amount and quality of information provided by models. I believe that any viable philosophy of science must be reducible to this statement. The first step toward a unified theory of scientific models (and therefore a complete philosophy of science) is a quantitative language that applies to both ontological and epistemological questions. Information theory is one such language: Cox' (1946) theorem (see Van Horn, 2003) tells us that probability theory is the (only) calculus that is consistent with Classical Logic (Jaynes, 2003; chapter 1), and information theory is simply the integration of convex transforms of probability ratios (integration reduces density functions to scalar

  1. THE MODEL OF INTERACTION BETWEEN INSURANCE INTERMEDIARIES AND INSURANCE COMPANIES IN THE ASSURANCE OF SUSTAINABLE DEVELOPMENT OF THE INSURANCE MARKET

    Directory of Open Access Journals (Sweden)

    Nataliia Kudriavska

    2017-11-01

    Full Text Available The purpose of this paper is the investigation of the model of interaction between insurance intermediaries and insurance companies in the assurance of sustainable development of the insurance market. The methodology is based on the new studies and books. It is underlined the importance of potency and effectiveness of this model, its influence on the insurance market stability. It is analysed the European experience and specific of Ukrainian insurance market. The main ways for improving its model and ways of its practical realization are characterized. Results. The problems that exist in the broker market in general are connected with an ineffective state policy. In particular, we can say about the absence of many laws, acts, resolutions, which explain what a broker have to do in case of different problems with insurance companies, another brokers and clients. At the same time, the problem of distrust to national brokers exists. It provokes a decline of the demand for their services and so on. However, it is possible to solve these problems. Practical implications. For this, it is necessary to do some acts. The first one is to implement resolutions that regulate relationships between insurance brokers and insurance companies, clearly regulate the model of its interaction. This model affects the stability of the insurance market in general. The second is to find methods of solving problems of the increase in insurance culture of the population (for example, by the way of advertisement. The third one is to solve problems connected with the appearance of foreign brokers in the insurance market of Ukraine. Actually, the Ukrainian market of insurance brokers is not developed enough. That is why it needs big changes and reforms. Value/originality. Among alternatives of the strategic development of insurance, the method of quick liberalization and gradual development is distinguished. According to the liberal way, it is possible to transfer to the

  2. A Model for an Electronic Information Marketplace

    Directory of Open Access Journals (Sweden)

    Wei Ge

    2005-11-01

    Full Text Available As the information content on the Internet increases, the task of locating desired information and assessing its quality becomes increasingly difficult. This development causes users to be more willing to pay for information that is focused on specific issues, verifiable, and available upon request. Thus, the nature of the Internet opens up the opportunity for information trading. In this context, the Internet cannot only be used to close the transaction, but also to deliver the product - desired information - to the user. Early attempts to implement such business models have fallen short of expectations. In this paper, we discuss the limitations of such practices and present a modified business model for information trading, which uses a reverse auction approach together with a multiple-buyer price discovery process

  3. Information in general medical practices: the information processing model.

    Science.gov (United States)

    Crowe, Sarah; Tully, Mary P; Cantrill, Judith A

    2010-04-01

    The need for effective communication and handling of secondary care information in general practices is paramount. To explore practice processes on receiving secondary care correspondence in a way that integrates the information needs and perceptions of practice staff both clinical and administrative. Qualitative study using semi-structured interviews with a wide range of practice staff (n = 36) in nine practices in the Northwest of England. Analysis was based on the framework approach using N-Vivo software and involved transcription, familiarization, coding, charting, mapping and interpretation. The 'information processing model' was developed to describe the six stages involved in practice processing of secondary care information. These included the amendment or updating of practice records whilst simultaneously or separately actioning secondary care recommendations, using either a 'one-step' or 'two-step' approach, respectively. Many factors were found to influence each stage and impact on the continuum of patient care. The primary purpose of processing secondary care information is to support patient care; this study raises the profile of information flow and usage within practices as an issue requiring further consideration.

  4. Geospatial Information System Capability Maturity Models

    Science.gov (United States)

    2017-06-01

    To explore how State departments of transportation (DOTs) evaluate geospatial tool applications and services within their own agencies, particularly their experiences using capability maturity models (CMMs) such as the Urban and Regional Information ...

  5. Software Quality Assurance Plan for GoldSim Models Supporting the Area 3 and Area 5 Radioactive Waste Management Site Performance Assessment Program

    International Nuclear Information System (INIS)

    Gregory J. Shott, Vefa Yucel

    2007-01-01

    This Software Quality Assurance Plan (SQAP) applies to the development and maintenance of GoldSim models supporting the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) performance assessments (PAs) and composite analyses (CAs). Two PA models have been approved by the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) as of November 2006 for the PA maintenance work undertaken by National Security Technologies, LLC (NSTec). NNSA/NSO asked NSTec to assume the custodianship of the models for future development and maintenance. The models were initially developed by Neptune and Company (N and C)

  6. Software Quality Assurance Plan for GoldSim Models Supporting the Area 3 and Area 5 Radioactive Waste Management Sites Performance Assessment Program

    Energy Technology Data Exchange (ETDEWEB)

    Gregory J. Shott, Vefa Yucel

    2007-01-03

    This Software Quality Assurance Plan (SQAP) applies to the development and maintenance of GoldSim models supporting the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) performance assessments (PAs) and composite analyses (CAs). Two PA models have been approved by the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) as of November 2006 for the PA maintenance work undertaken by National Security Technologies, LLC (NSTec). NNSA/NSO asked NSTec to assume the custodianship of the models for future development and maintenance. The models were initially developed by Neptune and Company (N&C).

  7. THE INFORMATION MODEL «SOCIAL EXPLOSION»

    Directory of Open Access Journals (Sweden)

    Alexander Chernyavskiy

    2012-01-01

    Full Text Available Article is dedicated to examination and analysis of the construction of the information model «social explosion», which corresponds to the newest «colored» revolutions. The analysis of model makes it possible to see effective approaches to the initiation of this explosion and by the use of contemporary information communications as honeycomb connection and the mobile Internet

  8. Software Assurance Competency Model

    Science.gov (United States)

    2013-03-01

    COTS) software , and software as a service ( SaaS ). L2: Define and analyze risks in the acquisition of contracted software , COTS software , and SaaS ...2010a]: Application of technologies and processes to achieve a required level of confidence that software systems and services function in the...

  9. Millennial Students' Mental Models of Information Retrieval

    Science.gov (United States)

    Holman, Lucy

    2009-01-01

    This qualitative study examines first-year college students' online search habits in order to identify patterns in millennials' mental models of information retrieval. The study employed a combination of modified contextual inquiry and concept mapping methodologies to elicit students' mental models. The researcher confirmed previously observed…

  10. Enterprise Modelling for an Educational Information Infrastructure

    NARCIS (Netherlands)

    Widya, I.A.; Michiels, E.F.; Volman, C.J.A.M.; Pokraev, S.; de Diana, I.P.F.; Filipe, J.; Sharp, B.; Miranda, P.

    2001-01-01

    This paper reports the modelling exercise of an educational information infrastructure that aims to support the organisation of teaching and learning activities suitable for a wide range of didactic policies. The modelling trajectory focuses on capturing invariant structures of relations between

  11. Multi-dimensional indoor location information model

    NARCIS (Netherlands)

    Xiong, Q.; Zhu, Q.; Zlatanova, S.; Huang, L.; Zhou, Y.; Du, Z.

    2013-01-01

    Aiming at the increasing requirements of seamless indoor and outdoor navigation and location service, a Chinese standard of Multidimensional Indoor Location Information Model is being developed, which defines ontology of indoor location. The model is complementary to 3D concepts like CityGML and

  12. BIM. Building Information Model. Special issue; BIM. Building Information Model. Themanummer

    Energy Technology Data Exchange (ETDEWEB)

    Van Gelder, A.L.A. [Arta and Consultancy, Lage Zwaluwe (Netherlands); Van den Eijnden, P.A.A. [Stichting Marktwerking Installatietechniek, Zoetermeer (Netherlands); Veerman, J.; Mackaij, J.; Borst, E. [Royal Haskoning DHV, Nijmegen (Netherlands); Kruijsse, P.M.D. [Wolter en Dros, Amersfoort (Netherlands); Buma, W. [Merlijn Media, Waddinxveen (Netherlands); Bomhof, F.; Willems, P.H.; Boehms, M. [TNO, Delft (Netherlands); Hofman, M.; Verkerk, M. [ISSO, Rotterdam (Netherlands); Bodeving, M. [VIAC Installatie Adviseurs, Houten (Netherlands); Van Ravenswaaij, J.; Van Hoven, H. [BAM Techniek, Bunnik (Netherlands); Boeije, I.; Schalk, E. [Stabiplan, Bodegraven (Netherlands)

    2012-11-15

    A series of 14 articles illustrates the various aspects of the Building Information Model (BIM). The essence of BIM is to capture information about the building process and the building product. [Dutch] In 14 artikelen worden diverse aspecten m.b.t. het Building Information Model (BIM) belicht. De essentie van BIM is het vastleggen van informatie over het bouwproces en het bouwproduct.

  13. Information Literacy for Health Professionals: Teaching Essential Information Skills with the Big6 Information Literacy Model

    Science.gov (United States)

    Santana Arroyo, Sonia

    2013-01-01

    Health professionals frequently do not possess the necessary information-seeking abilities to conduct an effective search in databases and Internet sources. Reference librarians may teach health professionals these information and technology skills through the Big6 information literacy model (Big6). This article aims to address this issue. It also…

  14. Information technology and innovative drainage management practices for selenium load reduction from irrigated agriculture to provide stakeholder assurances and meet contaminant mass loading policy objectives

    Energy Technology Data Exchange (ETDEWEB)

    Quinn, N.W.T.

    2009-10-15

    Many perceive the implementation of environmental regulatory policy, especially concerning non-point source pollution from irrigated agriculture, as being less efficient in the United States than in many other countries. This is partly a result of the stakeholder involvement process but is also a reflection of the inability to make effective use of Environmental Decision Support Systems (EDSS) to facilitate technical information exchange with stakeholders and to provide a forum for innovative ideas for controlling non-point source pollutant loading. This paper describes one of the success stories where a standardized Environmental Protection Agency (EPA) methodology was modified to better suit regulation of a trace element in agricultural subsurface drainage and information technology was developed to help guide stakeholders, provide assurances to the public and encourage innovation while improving compliance with State water quality objectives. The geographic focus of the paper is the western San Joaquin Valley where, in 1985, evapoconcentration of selenium in agricultural subsurface drainage water, diverted into large ponds within a federal wildlife refuge, caused teratogenecity in waterfowl embryos and in other sensitive wildlife species. The fallout from this environmental disaster was a concerted attempt by State and Federal water agencies to regulate non-point source loads of the trace element selenium. The complexity of selenium hydrogeochemistry, the difficulty and expense of selenium concentration monitoring and political discord between agricultural and environmental interests created challenges to the regulation process. Innovative policy and institutional constructs, supported by environmental monitoring and the web-based data management and dissemination systems, provided essential decision support, created opportunities for adaptive management and ultimately contributed to project success. The paper provides a retrospective on the contentious planning

  15. Quality Assurance Tracking System - R7 (QATS-R7)

    Data.gov (United States)

    U.S. Environmental Protection Agency — This is metadata documentation for the Quality Assurance Tracking System - R7, an EPA Region 7 resource that tracks information on quality assurance reviews. Also...

  16. Information retrieval models foundations and relationships

    CERN Document Server

    Roelleke, Thomas

    2013-01-01

    Information Retrieval (IR) models are a core component of IR research and IR systems. The past decade brought a consolidation of the family of IR models, which by 2000 consisted of relatively isolated views on TF-IDF (Term-Frequency times Inverse-Document-Frequency) as the weighting scheme in the vector-space model (VSM), the probabilistic relevance framework (PRF), the binary independence retrieval (BIR) model, BM25 (Best-Match Version 25, the main instantiation of the PRF/BIR), and language modelling (LM). Also, the early 2000s saw the arrival of divergence from randomness (DFR).Regarding in

  17. Quality assurance manual: Volume 2, Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Oijala, J.E.

    1988-06-01

    This paper contains quality assurance information on departments of the Stanford Linear Accelerator Center. Particular quality assurance policies and standards discussed are on: Mechanical Systems; Klystron and Microwave Department; Electronics Department; Plant Engineering; Accelerator Department; Purchasing; and Experimental Facilities Department. (LSP)

  18. Tool Use Within NASA Software Quality Assurance

    Science.gov (United States)

    Shigeta, Denise; Port, Dan; Nikora, Allen P.; Wilf, Joel

    2013-01-01

    As space mission software systems become larger and more complex, it is increasingly important for the software assurance effort to have the ability to effectively assess both the artifacts produced during software system development and the development process itself. Conceptually, assurance is a straightforward idea - it is the result of activities carried out by an organization independent of the software developers to better inform project management of potential technical and programmatic risks, and thus increase management's confidence in the decisions they ultimately make. In practice, effective assurance for large, complex systems often entails assessing large, complex software artifacts (e.g., requirements specifications, architectural descriptions) as well as substantial amounts of unstructured information (e.g., anomaly reports resulting from testing activities during development). In such an environment, assurance engineers can benefit greatly from appropriate tool support. In order to do so, an assurance organization will need accurate and timely information on the tool support available for various types of assurance activities. In this paper, we investigate the current use of tool support for assurance organizations within NASA, and describe on-going work at JPL for providing assurance organizations with the information about tools they need to use them effectively.

  19. Training, Quality Assurance Factors, and Tools Investigation: a Work Report and Suggestions on Software Quality Assurance

    Science.gov (United States)

    Lee, Pen-Nan

    1991-01-01

    Previously, several research tasks have been conducted, some observations were obtained, and several possible suggestions have been contemplated involving software quality assurance engineering at NASA Johnson. These research tasks are briefly described. Also, a brief discussion is given on the role of software quality assurance in software engineering along with some observations and suggestions. A brief discussion on a training program for software quality assurance engineers is provided. A list of assurance factors as well as quality factors are also included. Finally, a process model which can be used for searching and collecting software quality assurance tools is presented.

  20. Computer software quality assurance

    International Nuclear Information System (INIS)

    Ives, K.A.

    1986-06-01

    The author defines some criteria for the evaluation of software quality assurance elements for applicability to the regulation of the nuclear industry. The author then analyses a number of software quality assurance (SQA) standards. The major extracted SQA elements are then discussed, and finally specific software quality assurance recommendations are made for the nuclear industry

  1. Data Quality Assurance Governance

    OpenAIRE

    Montserrat Gonzalez; Stephanie Suhr

    2016-01-01

    This deliverable describes the ELIXIR-EXCELERATE Quality Management Strategy, addressing EXCELERATE Ethics requirement no. 5 on Data Quality Assurance Governance. The strategy describes the essential procedures and practices within ELIXIR-EXCELERATE concerning planning of quality management, performing quality assurance and controlling quality. It also depicts the overall organisation of ELIXIR with emphasis on authority and specific responsibilities related to quality assurance.

  2. Quality assurance in medical laboratories

    International Nuclear Information System (INIS)

    Boroviczeny, K.G. von; Merten, R.; Merten, U.P.

    1987-01-01

    The book presents a comprehensive and specified survey of the quality assurance measures and methods applied in medical laboratories in the pre-analytical phase and in the analytical and post-analytical phases. It also gives information on computer-aided procedures, cost-benefit analyses in this field, and on official requirements and standards in the fields of clinical chemistry, hematology, immunology and microbiology, and equipment testing and inspection. One chapter of the book particularly deals with quality assurance for radioimmunological in-vitro analyses. With 112 figs., 337 tabs [de

  3. Information model of the 'Ukryttya' object

    International Nuclear Information System (INIS)

    Batij, E.V.; Ermolenko, A.A.; Kotlyarov, V.T.

    2008-01-01

    There were described the building principles and content of the 'Ukryttya' object information model that has been developed at the Institute for Safety Problems of NPP. Using the client/server architecture in this system (the simultaneous access of the many users), Autodesk Map Guide and ASP.NET technologies allowed avoiding the typical defects of the 'stand-alone desktop' information systems (that aimed for a single user)

  4. Technical Note: Validation of halo modeling for proton pencil beam spot scanning using a quality assurance test pattern

    Energy Technology Data Exchange (ETDEWEB)

    Lin, Liyong, E-mail: linl@uphs.upenn.edu; Huang, Sheng; Kang, Minglei; Solberg, Timothy D.; McDonough, James E.; Ainsley, Christopher G. [Department of Radiation Oncology, University of Pennsylvania, 3400 Civic Center Boulevard, Philadelphia, Pennsylvania 19104 (United States)

    2015-09-15

    Purpose: The purpose of this paper is to demonstrate the utility of a comprehensive test pattern in validating calculation models that include the halo component (low-dose tails) of proton pencil beam scanning (PBS) spots. Such a pattern has been used previously for quality assurance purposes to assess spot shape, position, and dose. Methods: In this study, a scintillation detector was used to measure the test pattern in air at isocenter for two proton beam energies (115 and 225 MeV) of two IBA universal nozzles (UN #1 and UN #2). Planar measurements were compared with calculated dose distributions based on the weighted superposition of location-independent (UN #1) or location-dependent (UN #2) spot profiles, previously measured using a pair-magnification method and between two nozzles. Results: Including the halo component below 1% of the central dose is shown to improve the gamma-map comparison between calculation and measurement from 94.9% to 98.4% using 2 mm/2% criteria for the 115 MeV proton beam of UN #1. In contrast, including the halo component below 1% of the central dose does not improve the gamma agreement for the 115 MeV proton beam of UN #2, due to the cutoff of the halo component at off-axis locations. When location-dependent spot profiles are used for calculation instead of spot profiles at central axis, the gamma agreement is improved from 98.0% to 99.5% using 2 mm/2% criteria. The two nozzles clearly have different characteristics, as a direct comparison of measured data shows a passing rate of 89.7% for the 115 MeV proton beam. At 225 MeV, the corresponding gamma comparisons agree better between measurement and calculation, and between measurements in the two nozzles. Conclusions: In addition to confirming the primary component of individual PBS spot profiles, a comprehensive test pattern is useful for the validation of the halo component at off-axis locations, especially for low energy protons.

  5. Concepts of nuclear quality assurance

    International Nuclear Information System (INIS)

    Randers, G.; Morris, P.A.; Pomeroy, D.

    1976-01-01

    While the safety record of the nuclear industry continues to be excellent, the forced outage rates for recent years continue to be 15% or more. Quality assurance, therefore, needs to be applied not only to nuclear safety matters, but to the goals of increased productivity and reduced construction and operating costs. Broadening the application of the general concept of quality assurance in this way leads to the introduction of reliability technology. The total activity might better be called reliability assurance. That effective quality assurance systems do pay off is described by examples from the utility industry, from a manufacturer of instruments and systems and from the experience of Westinghouse Electric Company's manufacturing divisions. The special situation of applying quality assurance to nuclear fuel is discussed. Problems include the lack of a fully developed regulatory policy in this area, incomplete understanding of the mechanism for pellet-clad interaction failures, incomplete access to manufacturers design and process information, inability to make desirable changes on a timely basis and inadequate feedback of irradiation experience. (author)

  6. Mathematical models of information and stochastic systems

    CERN Document Server

    Kornreich, Philipp

    2008-01-01

    From ancient soothsayers and astrologists to today's pollsters and economists, probability theory has long been used to predict the future on the basis of past and present knowledge. Mathematical Models of Information and Stochastic Systems shows that the amount of knowledge about a system plays an important role in the mathematical models used to foretell the future of the system. It explains how this known quantity of information is used to derive a system's probabilistic properties. After an introduction, the book presents several basic principles that are employed in the remainder of the t

  7. The Esri 3D city information model

    International Nuclear Information System (INIS)

    Reitz, T; Schubiger-Banz, S

    2014-01-01

    With residential and commercial space becoming increasingly scarce, cities are going vertical. Managing the urban environments in 3D is an increasingly important and complex undertaking. To help solving this problem, Esri has released the ArcGIS for 3D Cities solution. The ArcGIS for 3D Cities solution provides the information model, tools and apps for creating, analyzing and maintaining a 3D city using the ArcGIS platform. This paper presents an overview of the 3D City Information Model and some sample use cases

  8. Regulatory inspection of the implementation of quality assurance programmes

    International Nuclear Information System (INIS)

    1989-01-01

    This Manual provides guidance to Member States in the organization and performance of their regulatory inspection functions regarding the implementation of nuclear power plant quality assurance programmes. It addresses the interface between, and is consistent with, the IAEA Nuclear Safety Standards (NUSS programme) documents on quality assurance and governmental organization. The Manual offers a practical model and examples for performing regulatory inspections to ensure that the quality assurance programme is operating satisfactorily in the siting, design, manufacturing, construction, commissioning, operation and decommissioning of nuclear power plants. The primary objective is to confirm that the licensee has the capability to manage and control the effective performance of all quality assurance responsibilities during all phases of a nuclear power project. The guidance provided through this Manual for proper establishment and execution of the regulatory inspections helps to enforce the effective implementation of the quality assurance programme as a management control system that the nuclear industry should establish and use in attaining the safety and reliability objectives for nuclear installations. This enforcement action by national regulatory bodies and the emphasis on the purposes and advantages of quality assurance as an important management tool integrated within the total project task have been recommended by the IAEA International Nuclear Safety Advisory Group (INSAG). The primary intended users of this Manual are the management personnel and high level staff from regulatory bodies but it will also be helpful to management personnel from nuclear utilities and vendors. They all are inevitable partners in a nuclear power project and this document offers all of them valuable information on the better accomplishment of quality assurance activities to ensure the common objective of safe and reliable nuclear power production

  9. Health equity monitoring for healthcare quality assurance.

    Science.gov (United States)

    Cookson, R; Asaria, M; Ali, S; Shaw, R; Doran, T; Goldblatt, P

    2018-02-01

    Population-wide health equity monitoring remains isolated from mainstream healthcare quality assurance. As a result, healthcare organizations remain ill-informed about the health equity impacts of their decisions - despite becoming increasingly well-informed about quality of care for the average patient. We present a new and improved analytical approach to integrating health equity into mainstream healthcare quality assurance, illustrate how this approach has been applied in the English National Health Service, and discuss how it could be applied in other countries. We illustrate the approach using a key quality indicator that is widely used to assess how well healthcare is co-ordinated between primary, community and acute settings: emergency inpatient hospital admissions for ambulatory care sensitive chronic conditions ("potentially avoidable emergency admissions", for short). Whole-population data for 2015 on potentially avoidable emergency admissions in England were linked with neighborhood deprivation indices. Inequality within the populations served by 209 clinical commissioning groups (CCGs: care purchasing organizations with mean population 272,000) was compared against two benchmarks - national inequality and inequality within ten similar populations - using neighborhood-level models to simulate the gap in indirectly standardized admissions between most and least deprived neighborhoods. The modelled inequality gap for England was 927 potentially avoidable emergency admissions per 100,000 people, implying 263,894 excess hospitalizations associated with inequality. Against this national benchmark, 17% of CCGs had significantly worse-than-benchmark equity, and 23% significantly better. The corresponding figures were 11% and 12% respectively against the similar populations benchmark. Deprivation-related inequality in potentially avoidable emergency admissions varies substantially between English CCGs serving similar populations, beyond expected statistical

  10. Data Model Management for Space Information Systems

    Science.gov (United States)

    Hughes, J. Steven; Crichton, Daniel J.; Ramirez, Paul; Mattmann, chris

    2006-01-01

    The Reference Architecture for Space Information Management (RASIM) suggests the separation of the data model from software components to promote the development of flexible information management systems. RASIM allows the data model to evolve independently from the software components and results in a robust implementation that remains viable as the domain changes. However, the development and management of data models within RASIM are difficult and time consuming tasks involving the choice of a notation, the capture of the model, its validation for consistency, and the export of the model for implementation. Current limitations to this approach include the lack of ability to capture comprehensive domain knowledge, the loss of significant modeling information during implementation, the lack of model visualization and documentation capabilities, and exports being limited to one or two schema types. The advent of the Semantic Web and its demand for sophisticated data models has addressed this situation by providing a new level of data model management in the form of ontology tools. In this paper we describe the use of a representative ontology tool to capture and manage a data model for a space information system. The resulting ontology is implementation independent. Novel on-line visualization and documentation capabilities are available automatically, and the ability to export to various schemas can be added through tool plug-ins. In addition, the ingestion of data instances into the ontology allows validation of the ontology and results in a domain knowledge base. Semantic browsers are easily configured for the knowledge base. For example the export of the knowledge base to RDF/XML and RDFS/XML and the use of open source metadata browsers provide ready-made user interfaces that support both text- and facet-based search. This paper will present the Planetary Data System (PDS) data model as a use case and describe the import of the data model into an ontology tool

  11. Study on geo-information modelling

    Czech Academy of Sciences Publication Activity Database

    Klimešová, Dana

    2006-01-01

    Roč. 5, č. 5 (2006), s. 1108-1113 ISSN 1109-2777 Institutional research plan: CEZ:AV0Z10750506 Keywords : control GIS * geo-information modelling * uncertainty * spatial temporal approach Web Services Subject RIV: BC - Control Systems Theory

  12. Modelling Dynamic Forgetting in Distributed Information Systems

    NARCIS (Netherlands)

    N.F. Höning (Nicolas); M.C. Schut

    2010-01-01

    htmlabstractWe describe and model a new aspect in the design of distributed information systems. We build upon a previously described problem on the microlevel, which asks how quickly agents should discount (forget) their experience: If they cherish their memories, they can build their reports on

  13. The application of quality assurance

    International Nuclear Information System (INIS)

    Lovatt, G.B.

    1988-01-01

    The paper concerns the application of quality assurance to structures, systems and components for the design, construction and operation of nuclear power plant and fuel reprocessing plant. A description is given of:- the requirements for quality assurance, the establishment of quality assurance arrangements, quality assurance documents structure, and quality assurance manuals and programmes. Quality assurance procedures and auditing are also discussed. (U.K.)

  14. Quality assurance of nuclear energy

    International Nuclear Information System (INIS)

    1994-12-01

    It consists of 14 chapters, which are outline of quality assurance of nuclear energy, standard of quality assurance, business quality assurance, design quality assurance, purchase quality assurance, production quality assurance, a test warranty operation warranty, maintenance warranty, manufacture of nuclear power fuel warranty, computer software warranty, research and development warranty and quality audit.

  15. Asset Condition, Information Systems and Decision Models

    CERN Document Server

    Willett, Roger; Brown, Kerry; Mathew, Joseph

    2012-01-01

    Asset Condition, Information Systems and Decision Models, is the second volume of the Engineering Asset Management Review Series. The manuscripts provide examples of implementations of asset information systems as well as some practical applications of condition data for diagnostics and prognostics. The increasing trend is towards prognostics rather than diagnostics, hence the need for assessment and decision models that promote the conversion of condition data into prognostic information to improve life-cycle planning for engineered assets. The research papers included here serve to support the on-going development of Condition Monitoring standards. This volume comprises selected papers from the 1st, 2nd, and 3rd World Congresses on Engineering Asset Management, which were convened under the auspices of ISEAM in collaboration with a number of organisations, including CIEAM Australia, Asset Management Council Australia, BINDT UK, and Chinese Academy of Sciences, Beijing University of Chemical Technology, Chin...

  16. Modeling decisions information fusion and aggregation operators

    CERN Document Server

    Torra, Vicenc

    2007-01-01

    Information fusion techniques and aggregation operators produce the most comprehensive, specific datum about an entity using data supplied from different sources, thus enabling us to reduce noise, increase accuracy, summarize and extract information, and make decisions. These techniques are applied in fields such as economics, biology and education, while in computer science they are particularly used in fields such as knowledge-based systems, robotics, and data mining. This book covers the underlying science and application issues related to aggregation operators, focusing on tools used in practical applications that involve numerical information. Starting with detailed introductions to information fusion and integration, measurement and probability theory, fuzzy sets, and functional equations, the authors then cover the following topics in detail: synthesis of judgements, fuzzy measures, weighted means and fuzzy integrals, indices and evaluation methods, model selection, and parameter extraction. The method...

  17. The Belgian commitment to pharmaceutical quality: a model policy to improve quality assurance of medicines available through humanitarian and development programs.

    Science.gov (United States)

    Ravinetto, Raffaella; Roosen, Tim; Dujardin, Catherine

    2018-01-01

    Today, a combination of globalization of pharmaceutical production, lack of regulatory harmonization, and weakness of Medicines Regulatory Authorities, creates the "perfect conditions" for poor-quality medicine to circulate in the global market and to penetrate the less-regulated countries. Medicines regulation is the responsibility of the national regulatory authorities in the recipient country, but in the poorer countries, in practice, the responsibility of supply of quality-assured medicines is often taken by Non-Governmental Organizations and other implementers. But with some notable exceptions, many donors lack a pharmaceutical procurement policy with adequate quality requirements; and many implementers lack the skills and expertise needed to orient themselves in the complex web of global pharmaceutical supply. Thus, patients served by humanitarian or development programs may remain exposed to the risk of poor-quality medicines. When public money is used to purchase medicines for medical programs to be carried out overseas, adequate policies should be in place to assure that the same quality requirements are set that would be required for medicines marketed in the "donor" country. We will describe here a policy recently adopted in Belgium, i.e. the "Commitment to Quality Assurance for Pharmaceutical Products", signed in October 2017 by the Vice Prime Minister and Minister for Development Cooperation and 19 Belgian implementing agencies. By signing the new policy, the counterparts committed to ensure quality of medicines in the programs funded by Belgium's Official Development Assistance, and to build quality-assurance capacity in the recipient countries. Implementers are requested to integrate in their financing applications a section for pharmaceutical quality assurance, with a justified budget. They are also invited to consider how costs could be rationalized and mutualized by aligning the strengths of the various implementers. This model policy has the

  18. [Quality assurance in human genetic testing].

    Science.gov (United States)

    Stuhrmann-Spangenberg, Manfred

    2015-02-01

    Advances in technical developments of genetic diagnostics for more than 50 years, as well as the fact that human genetic testing is usually performed only once in a lifetime, with additional impact for blood relatives, are determining the extraordinary importance of quality assurance in human genetic testing. Abidance of laws, directives, and guidelines plays a major role. This article aims to present the major laws, directives, and guidelines with respect to quality assurance of human genetic testing, paying careful attention to internal and external quality assurance. The information on quality assurance of human genetic testing was obtained through a web-based search of the web pages that are referred to in this article. Further information was retrieved from publications in the German Society of Human Genetics and through a PubMed-search using term quality + assurance + genetic + diagnostics. The most important laws, directives, and guidelines for quality assurance of human genetic testing are the gene diagnostics law (GenDG), the directive of the Federal Medical Council for quality control of clinical laboratory analysis (RiliBÄK), and the S2K guideline for human genetic diagnostics and counselling. In addition, voluntary accreditation under DIN EN ISO 15189:2013 offers a most recommended contribution towards quality assurance of human genetic testing. Legal restraints on quality assurance of human genetic testing as mentioned in § 5 GenDG are fulfilled once RiliBÄK requirements are followed.

  19. High assurance SPIRAL

    Science.gov (United States)

    Franchetti, Franz; Sandryhaila, Aliaksei; Johnson, Jeremy R.

    2014-06-01

    In this paper we introduce High Assurance SPIRAL to solve the last mile problem for the synthesis of high assurance implementations of controllers for vehicular systems that are executed in today's and future embedded and high performance embedded system processors. High Assurance SPIRAL is a scalable methodology to translate a high level specification of a high assurance controller into a highly resource-efficient, platform-adapted, verified control software implementation for a given platform in a language like C or C++. High Assurance SPIRAL proves that the implementation is equivalent to the specification written in the control engineer's domain language. Our approach scales to problems involving floating-point calculations and provides highly optimized synthesized code. It is possible to estimate the available headroom to enable assurance/performance trade-offs under real-time constraints, and enables the synthesis of multiple implementation variants to make attacks harder. At the core of High Assurance SPIRAL is the Hybrid Control Operator Language (HCOL) that leverages advanced mathematical constructs expressing the controller specification to provide high quality translation capabilities. Combined with a verified/certified compiler, High Assurance SPIRAL provides a comprehensive complete solution to the efficient synthesis of verifiable high assurance controllers. We demonstrate High Assurance SPIRALs capability by co-synthesizing proofs and implementations for attack detection and sensor spoofing algorithms and deploy the code as ROS nodes on the Landshark unmanned ground vehicle and on a Synthetic Car in a real-time simulator.

  20. Quality Assurance in Higher Education: Proposals for Consultation.

    Science.gov (United States)

    Higher Education Funding Council for England, Bristol.

    This document sets out for consultation proposals for a revised method for quality assurance of teaching and learning in higher education. The proposals cover: (1) the objectives and principles of quality assurance; (2) an approach to quality assurance based on external audit principles; (3) the collection and publication of information; (4)…

  1. Quality Assurance Project Plan Development Tool

    Science.gov (United States)

    This tool contains information designed to assist in developing a Quality Assurance (QA) Project Plan that meets EPA requirements for projects that involve surface or groundwater monitoring and/or the collection and analysis of water samples.

  2. Information as a Measure of Model Skill

    Science.gov (United States)

    Roulston, M. S.; Smith, L. A.

    2002-12-01

    Physicist Paul Davies has suggested that rather than the quest for laws that approximate ever more closely to "truth", science should be regarded as the quest for compressibility. The goodness of a model can be judged by the degree to which it allows us to compress data describing the real world. The "logarithmic scoring rule" is a method for evaluating probabilistic predictions of reality that turns this philosophical position into a practical means of model evaluation. This scoring rule measures the information deficit or "ignorance" of someone in possession of the prediction. A more applied viewpoint is that the goodness of a model is determined by its value to a user who must make decisions based upon its predictions. Any form of decision making under uncertainty can be reduced to a gambling scenario. Kelly showed that the value of a probabilistic prediction to a gambler pursuing the maximum return on their bets depends on their "ignorance", as determined from the logarithmic scoring rule, thus demonstrating a one-to-one correspondence between data compression and gambling returns. Thus information theory provides a way to think about model evaluation, that is both philosophically satisfying and practically oriented. P.C.W. Davies, in "Complexity, Entropy and the Physics of Information", Proceedings of the Santa Fe Institute, Addison-Wesley 1990 J. Kelly, Bell Sys. Tech. Journal, 35, 916-926, 1956.

  3. [Quality assurance in colorectal cancer in Europe AD 2011].

    Science.gov (United States)

    Mroczkowski, P; Hac, S; Lippert, H; Kube, R

    2013-12-01

    Malignant tumours are the second largest cause of death in Europe. Colorectal cancer takes second place within this group and is responsible for every eighth tumour-related death. Surgical quality assurance requires a prospective observational study, any different type of study is not possible. A complete recording of all treated patients is a prerequisite for quality assurance. Currently, there are quality assurance programmes in Sweden, Norway, Denmark, Great Britain, Spain, Belgium, the Netherlands as well as the multinational study for patients from Germany, Poland and Italy. These projects deliver comprehensive information regarding the treatment of colorectal cancer. However, this information is deeply rooted in the organisation of the health-care system in the given country and is not easily transferable into international settings. Also, an interpretation of the collected data is often possible only within the given health-care system. First, unified initial diagnostics is a prerequisite for quality assurance -  for the local extent and exclusion / confirmation of distant metastases. Until these criteria are unified, any comparison is limited, including a comparison of survival. Second, quality-of-life is not recorded in any of the current projects. Third, the main focus of a quality assurance project must be on therapy-dependent factors. The most sensible method of quality control remains within the connection of preoperative diagnostics (estimate of a best-case scenario), the surgical technique (the actual result) and a standardised pathological examination (evaluation of the actual result). These parameters can be recorded and compared within a quality assurance project regardless of the limitations of the national health-care systems. There is no alternative to a unified diagnostics model and unified histopathological evaluation, a complete picture of treatment quality is also not possible without systematic analysis of the quality of life.

  4. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  5. Revitalizing quality assurance

    International Nuclear Information System (INIS)

    Hawkins, F.C.

    1998-01-01

    The image of someone inspecting or auditing often comes to mind when people hear the term quality assurance. Although partially correct, this image is not the complete picture. The person doing the inspecting or auditing is probably part of a traditional quality assurance organization, but that organization is only one aspect of a properly conceived and effectively implemented quality assurance system whose goal is improved facility safety and reliability. This paper introduces the underlying philosophies and basic concepts of the International Atomic Energy Agency's new quality assurance initiative that began in 1991 as part of a broad Agency-wide program to enhance nuclear safety. The first product of that initiative was publication in 1996 of a new Quality Assurance Code 50-C/SG-Q and fourteen related Safety Guides. This new suite of documents provide the technical and philosophical foundation upon which Member States can base their quality assurance programs. (author)

  6. Using Interaction Scenarios to Model Information Systems

    DEFF Research Database (Denmark)

    Bækgaard, Lars; Bøgh Andersen, Peter

    The purpose of this paper is to define and discuss a set of interaction primitives that can be used to model the dynamics of socio-technical activity systems, including information systems, in a way that emphasizes structural aspects of the interaction that occurs in such systems. The primitives...... a number of case studies that indicate that interaction primitives can be useful modeling tools for supplementing conventional flow-oriented modeling of business processes....... are based on a unifying, conceptual definition of the disparate interaction types - a robust model of the types. The primitives can be combined and may thus represent mediated interaction. We present a set of visualizations that can be used to define multiple related interactions and we present and discuss...

  7. Fisher information framework for time series modeling

    Science.gov (United States)

    Venkatesan, R. C.; Plastino, A.

    2017-08-01

    A robust prediction model invoking the Takens embedding theorem, whose working hypothesis is obtained via an inference procedure based on the minimum Fisher information principle, is presented. The coefficients of the ansatz, central to the working hypothesis satisfy a time independent Schrödinger-like equation in a vector setting. The inference of (i) the probability density function of the coefficients of the working hypothesis and (ii) the establishing of constraint driven pseudo-inverse condition for the modeling phase of the prediction scheme, is made, for the case of normal distributions, with the aid of the quantum mechanical virial theorem. The well-known reciprocity relations and the associated Legendre transform structure for the Fisher information measure (FIM, hereafter)-based model in a vector setting (with least square constraints) are self-consistently derived. These relations are demonstrated to yield an intriguing form of the FIM for the modeling phase, which defines the working hypothesis, solely in terms of the observed data. Cases for prediction employing time series' obtained from the: (i) the Mackey-Glass delay-differential equation, (ii) one ECG signal from the MIT-Beth Israel Deaconess Hospital (MIT-BIH) cardiac arrhythmia database, and (iii) one ECG signal from the Creighton University ventricular tachyarrhythmia database. The ECG samples were obtained from the Physionet online repository. These examples demonstrate the efficiency of the prediction model. Numerical examples for exemplary cases are provided.

  8. Acceptance model of a Hospital Information System.

    Science.gov (United States)

    Handayani, P W; Hidayanto, A N; Pinem, A A; Hapsari, I C; Sandhyaduhita, P I; Budi, I

    2017-03-01

    The purpose of this study is to develop a model of Hospital Information System (HIS) user acceptance focusing on human, technological, and organizational characteristics for supporting government eHealth programs. This model was then tested to see which hospital type in Indonesia would benefit from the model to resolve problems related to HIS user acceptance. This study used qualitative and quantitative approaches with case studies at four privately owned hospitals and three government-owned hospitals, which are general hospitals in Indonesia. The respondents involved in this study are low-level and mid-level hospital management officers, doctors, nurses, and administrative staff who work at medical record, inpatient, outpatient, emergency, pharmacy, and information technology units. Data was processed using Structural Equation Modeling (SEM) and AMOS 21.0. The study concludes that non-technological factors, such as human characteristics (i.e. compatibility, information security expectancy, and self-efficacy), and organizational characteristics (i.e. management support, facilitating conditions, and user involvement) which have level of significance of p<0.05, significantly influenced users' opinions of both the ease of use and the benefits of the HIS. This study found that different factors may affect the acceptance of each user in each type of hospital regarding the use of HIS. Finally, this model is best suited for government-owned hospitals. Based on the results of this study, hospital management and IT developers should have more understanding on the non-technological factors to better plan for HIS implementation. Support from management is critical to the sustainability of HIS implementation to ensure HIS is easy to use and provides benefits to the users as well as hospitals. Finally, this study could assist hospital management and IT developers, as well as researchers, to understand the obstacles faced by hospitals in implementing HIS. Copyright © 2016

  9. Development of a flattening filter free multiple source model for use as an independent, Monte Carlo, dose calculation, quality assurance tool for clinical trials.

    Science.gov (United States)

    Faught, Austin M; Davidson, Scott E; Popple, Richard; Kry, Stephen F; Etzel, Carol; Ibbott, Geoffrey S; Followill, David S

    2017-09-01

    The Imaging and Radiation Oncology Core-Houston (IROC-H) Quality Assurance Center (formerly the Radiological Physics Center) has reported varying levels of compliance from their anthropomorphic phantom auditing program. IROC-H studies have suggested that one source of disagreement between institution submitted calculated doses and measurement is the accuracy of the institution's treatment planning system dose calculations and heterogeneity corrections used. In order to audit this step of the radiation therapy treatment process, an independent dose calculation tool is needed. Monte Carlo multiple source models for Varian flattening filter free (FFF) 6 MV and FFF 10 MV therapeutic x-ray beams were commissioned based on central axis depth dose data from a 10 × 10 cm 2 field size and dose profiles for a 40 × 40 cm 2 field size. The models were validated against open-field measurements in a water tank for field sizes ranging from 3 × 3 cm 2 to 40 × 40 cm 2 . The models were then benchmarked against IROC-H's anthropomorphic head and neck phantom and lung phantom measurements. Validation results, assessed with a ±2%/2 mm gamma criterion, showed average agreement of 99.9% and 99.0% for central axis depth dose data for FFF 6 MV and FFF 10 MV models, respectively. Dose profile agreement using the same evaluation technique averaged 97.8% and 97.9% for the respective models. Phantom benchmarking comparisons were evaluated with a ±3%/2 mm gamma criterion, and agreement averaged 90.1% and 90.8% for the respective models. Multiple source models for Varian FFF 6 MV and FFF 10 MV beams have been developed, validated, and benchmarked for inclusion in an independent dose calculation quality assurance tool for use in clinical trial audits. © 2017 American Association of Physicists in Medicine.

  10. INFORMATIONAL MODEL OF MENTAL ROTATION OF FIGURES

    Directory of Open Access Journals (Sweden)

    V. A. Lyakhovetskiy

    2016-01-01

    Full Text Available Subject of Study.The subject of research is the information structure of objects internal representations and operations over them, used by man to solve the problem of mental rotation of figures. To analyze this informational structure we considered not only classical dependencies of the correct answers on the angle of rotation, but also the other dependencies obtained recently in cognitive psychology. Method.The language of technical computing Matlab R2010b was used for developing information model of the mental rotation of figures. Such model parameters as the number of bits in the internal representation, an error probability in a single bit, discrete rotation angle, comparison threshold, and the degree of difference during rotation can be changed. Main Results.The model reproduces qualitatively such psychological dependencies as the linear increase of time of correct answers and the number of errors on the angle of rotation for identical figures, "flat" dependence of the time of correct answers and the number of errors on the angle of rotation for mirror-like figures. The simulation results suggest that mental rotation is an iterative process of finding a match between the two figures, each step of which can lead to a significant distortion of the internal representation of the stored objects. Matching is carried out within the internal representations that have no high invariance to rotation angle. Practical Significance.The results may be useful for understanding the role of learning (including the learning with a teacher in the development of effective information representation and operations on them in artificial intelligence systems.

  11. Microbial Performance of Food Safety Control and Assurance Activities in a Fresh Produce Processing Sector Measured Using a Microbial Assessment Scheme and Statistical Modeling

    DEFF Research Database (Denmark)

    Njage, Patrick Murigu Kamau; Sawe, Chemutai Tonui; Onyango, Cecilia Moraa

    2017-01-01

    assessment scheme and statistical modeling were used to systematically assess the microbial performance of core control and assurance activities in five Kenyan fresh produce processing and export companies. Generalized linear mixed models and correlated random-effects joint models for multivariate clustered...... the maximum safety level for environmental samples. Escherichia coli was detected in five of the six CSLs, including the final product. Among the processing-environment samples, the hand or glove swabs of personnel revealed a higher level of predicted contamination with E. coli, and 80% of the factories were...... of contamination with coliforms in water at the inlet than in the final rinse water. Four (80%) of the five assessed processors had poor to unacceptable counts of Enterobacteriaceae on processing surfaces. Personnel-, equipment-, and product-related hygiene measures to improve the performance of preventive...

  12. Quality assurance in radiodiagnosis

    International Nuclear Information System (INIS)

    Ghilardi Netto, T.; Sao Paulo Univ., Ribeirao Preto

    1983-01-01

    The following topics are dealt with: 1) the importance of the application of a quality assurance program in radiodiagnosis, with its main consequences : improvement of imaging quality, reduction of the patient expossure rate, cost reduction and 2) how to introduce the quality assurance control in the radiodiagnostic area. (M.A.) [pt

  13. Quality assurance program

    International Nuclear Information System (INIS)

    Brooks, G.L.

    The concept of levels of quality assurance as applied to CANDU-type nuclear power plant components, i.e. maintaining an appropriate cost/benefit ratio, is introduced. The design process itself has quality assurance features by virtue of multi-level review. (E.C.B.)

  14. Enhanced Publications: Data Models and Information Systems

    Directory of Open Access Journals (Sweden)

    Alessia Bardi

    2014-04-01

    Full Text Available “Enhanced publications” are commonly intended as digital publications that consist of a mandatory narrative part (the description of the research conducted plus related “parts”, such as datasets, other publications, images, tables, workflows, devices. The state-of-the-art on information systems for enhanced publications has today reached the point where some kind of common understanding is required, in order to provide the methodology and language for scientists to compare, analyse, or simply discuss the multitude of solutions in the field. In this paper, we thoroughly examined the literature with a two-fold aim: firstly, introducing the terminology required to describe and compare structural and semantic features of existing enhanced publication data models; secondly, proposing a classification of enhanced publication information systems based on their main functional goals.

  15. Modelling the Replication Management in Information Systems

    Directory of Open Access Journals (Sweden)

    Cezar TOADER

    2017-01-01

    Full Text Available In the modern economy, the benefits of Web services are significant because they facilitates the activities automation in the framework of Internet distributed businesses as well as the cooperation between organizations through interconnection process running in the computer systems. This paper presents the development stages of a model for a reliable information system. This paper describes the communication between the processes within the distributed system, based on the message exchange, and also presents the problem of distributed agreement among processes. A list of objectives for the fault-tolerant systems is defined and a framework model for distributed systems is proposed. This framework makes distinction between management operations and execution operations. The proposed model promotes the use of a central process especially designed for the coordination and control of other application processes. The execution phases and the protocols for the management and the execution components are presented. This model of a reliable system could be a foundation for an entire class of distributed systems models based on the management of replication process.

  16. Laboratory quality assurance

    International Nuclear Information System (INIS)

    Delvin, W.L.

    1977-01-01

    The elements (principles) of quality assurance can be applied to the operation of the analytical chemistry laboratory to provide an effective tool for indicating the competence of the laboratory and for helping to upgrade competence if necessary. When used, those elements establish the planned and systematic actions necessary to provide adequate confidence in each analytical result reported by the laboratory (the definition of laboratory quality assurance). The elements, as used at the Hanford Engineering Development Laboratory (HEDL), are discussed and they are qualification of analysts, written methods, sample receiving and storage, quality control, audit, and documentation. To establish a laboratory quality assurance program, a laboratory QA program plan is prepared to specify how the elements are to be implemented into laboratory operation. Benefits that can be obtained from using laboratory quality assurance are given. Experience at HEDL has shown that laboratory quality assurance is not a burden, but it is a useful and valuable tool for the analytical chemistry laboratory

  17. A review of building information modelling

    Science.gov (United States)

    Wang, Wen; Han, Rui

    2018-05-01

    Building Information Modelling (BIM) is widely seen as a catalyst for innovation and productivity. It is becoming standard for new construction and is the most significant technology changing how we design, build, use and manage the building. It is a dominant technological trend in the software industry and although the theoretical groundwork was laid in the previous century, it is a popular topic in academic research. BIM is discussed in this study, which results can provide better and more comprehensive choices for building owners, designers, and developers in future.

  18. Building information modelling (BIM: now and beyond

    Directory of Open Access Journals (Sweden)

    Salman Azhar

    2015-10-01

    Full Text Available Building Information Modeling (BIM, also called n-D Modeling or Virtual Prototyping Technology, is a revolutionary development that is quickly reshaping the Architecture-Engineering-Construction (AEC industry. BIM is both a technology and a process. The technology component of BIM helps project stakeholders to visualize what is to be built in a simulated environment to identify any potential design, construction or operational issues. The process component enables close collaboration and encourages integration of the roles of all stakeholders on a project. The paper presents an overview of BIM with focus on its core concepts, applications in the project life cycle and benefits for project stakeholders with the help of case studies. The paper also elaborates risks and barriers to BIM implementation and future trends.

  19. Building information modelling (BIM: now and beyond

    Directory of Open Access Journals (Sweden)

    Salman Azhar

    2012-12-01

    Full Text Available Building Information Modeling (BIM, also called n-D Modeling or Virtual Prototyping Technology, is a revolutionary development that is quickly reshaping the Architecture-Engineering-Construction (AEC industry. BIM is both a technology and a process. The technology component of BIM helps project stakeholders to visualize what is to be built in a simulated environment to identify any potential design, construction or operational issues. The process component enables close collaboration and encourages integration of the roles of all stakeholders on a project. The paper presents an overview of BIM with focus on its core concepts, applications in the project life cycle and benefits for project stakeholders with the help of case studies. The paper also elaborates risks and barriers to BIM implementation and future trends.

  20. An information theory-based approach to modeling the information processing of NPP operators

    International Nuclear Information System (INIS)

    Kim, Jong Hyun; Seong, Poong Hyun

    2002-01-01

    This paper proposes a quantitative approach to modeling the information processing of NPP operators. The aim of this work is to derive the amount of the information processed during a certain control task. The focus will be on i) developing a model for information processing of NPP operators and ii) quantifying the model. To resolve the problems of the previous approaches based on the information theory, i.e. the problems of single channel approaches, we primarily develop the information processing model having multiple stages, which contains information flows. Then the uncertainty of the information is quantified using the Conant's model, a kind of information theory

  1. Multiscale information modelling for heart morphogenesis

    Energy Technology Data Exchange (ETDEWEB)

    Abdulla, T; Imms, R; Summers, R [Department of Electronic and Electrical Engineering, Loughborough University, Loughborough (United Kingdom); Schleich, J M, E-mail: T.Abdulla@lboro.ac.u [LTSI Signal and Image Processing Laboratory, University of Rennes 1, Rennes (France)

    2010-07-01

    Science is made feasible by the adoption of common systems of units. As research has become more data intensive, especially in the biomedical domain, it requires the adoption of a common system of information models, to make explicit the relationship between one set of data and another, regardless of format. This is being realised through the OBO Foundry to develop a suite of reference ontologies, and NCBO Bioportal to provide services to integrate biomedical resources and functionality to visualise and create mappings between ontology terms. Biomedical experts tend to be focused at one level of spatial scale, be it biochemistry, cell biology, or anatomy. Likewise, the ontologies they use tend to be focused at a particular level of scale. There is increasing interest in a multiscale systems approach, which attempts to integrate between different levels of scale to gain understanding of emergent effects. This is a return to physiological medicine with a computational emphasis, exemplified by the worldwide Physiome initiative, and the European Union funded Network of Excellence in the Virtual Physiological Human. However, little work has been done on how information modelling itself may be tailored to a multiscale systems approach. We demonstrate how this can be done for the complex process of heart morphogenesis, which requires multiscale understanding in both time and spatial domains. Such an effort enables the integration of multiscale metrology.

  2. Multiscale information modelling for heart morphogenesis

    International Nuclear Information System (INIS)

    Abdulla, T; Imms, R; Summers, R; Schleich, J M

    2010-01-01

    Science is made feasible by the adoption of common systems of units. As research has become more data intensive, especially in the biomedical domain, it requires the adoption of a common system of information models, to make explicit the relationship between one set of data and another, regardless of format. This is being realised through the OBO Foundry to develop a suite of reference ontologies, and NCBO Bioportal to provide services to integrate biomedical resources and functionality to visualise and create mappings between ontology terms. Biomedical experts tend to be focused at one level of spatial scale, be it biochemistry, cell biology, or anatomy. Likewise, the ontologies they use tend to be focused at a particular level of scale. There is increasing interest in a multiscale systems approach, which attempts to integrate between different levels of scale to gain understanding of emergent effects. This is a return to physiological medicine with a computational emphasis, exemplified by the worldwide Physiome initiative, and the European Union funded Network of Excellence in the Virtual Physiological Human. However, little work has been done on how information modelling itself may be tailored to a multiscale systems approach. We demonstrate how this can be done for the complex process of heart morphogenesis, which requires multiscale understanding in both time and spatial domains. Such an effort enables the integration of multiscale metrology.

  3. Validity of information security policy models

    Directory of Open Access Journals (Sweden)

    Joshua Onome Imoniana

    Full Text Available Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.

  4. Quality assurance programme for isotope diagnostic laboratories

    International Nuclear Information System (INIS)

    Krasznai, Istvan

    1987-01-01

    Quality assurance systems are suggested to be introduced in laboratories, in accordance with the recommendations of IAEA and WHO, taking local circumstances into consideration. It is emphasized that a quantitative enhancement of work must not endanger its quality; diagnostic information must be undistorted, reproducible, and gathered with the minimum of radiation burden. National authorities are requested to strengthen their supervision. Recommendations for quality assurance methods are given for medical isotope diagnostic laboratories. (author)

  5. Building information models for astronomy projects

    Science.gov (United States)

    Ariño, Javier; Murga, Gaizka; Campo, Ramón; Eletxigerra, Iñigo; Ampuero, Pedro

    2012-09-01

    A Building Information Model is a digital representation of physical and functional characteristics of a building. BIMs represent the geometrical characteristics of the Building, but also properties like bills of quantities, definition of COTS components, status of material in the different stages of the project, project economic data, etc. The BIM methodology, which is well established in the Architecture Engineering and Construction (AEC) domain for conventional buildings, has been brought one step forward in its application for Astronomical/Scientific facilities. In these facilities steel/concrete structures have high dynamic and seismic requirements, M&E installations are complex and there is a large amount of special equipment and mechanisms involved as a fundamental part of the facility. The detail design definition is typically implemented by different design teams in specialized design software packages. In order to allow the coordinated work of different engineering teams, the overall model, and its associated engineering database, is progressively integrated using a coordination and roaming software which can be used before starting construction phase for checking interferences, planning the construction sequence, studying maintenance operation, reporting to the project office, etc. This integrated design & construction approach will allow to efficiently plan construction sequence (4D). This is a powerful tool to study and analyze in detail alternative construction sequences and ideally coordinate the work of different construction teams. In addition engineering, construction and operational database can be linked to the virtual model (6D), what gives to the end users a invaluable tool for the lifecycle management, as all the facility information can be easily accessed, added or replaced. This paper presents the BIM methodology as implemented by IDOM with the E-ELT and ATST Enclosures as application examples.

  6. Design and Establishment of Quality Model of Fundamental Geographic Information Database

    Science.gov (United States)

    Ma, W.; Zhang, J.; Zhao, Y.; Zhang, P.; Dang, Y.; Zhao, T.

    2018-04-01

    In order to make the quality evaluation for the Fundamental Geographic Information Databases(FGIDB) more comprehensive, objective and accurate, this paper studies and establishes a quality model of FGIDB, which formed by the standardization of database construction and quality control, the conformity of data set quality and the functionality of database management system, and also designs the overall principles, contents and methods of the quality evaluation for FGIDB, providing the basis and reference for carry out quality control and quality evaluation for FGIDB. This paper designs the quality elements, evaluation items and properties of the Fundamental Geographic Information Database gradually based on the quality model framework. Connected organically, these quality elements and evaluation items constitute the quality model of the Fundamental Geographic Information Database. This model is the foundation for the quality demand stipulation and quality evaluation of the Fundamental Geographic Information Database, and is of great significance on the quality assurance in the design and development stage, the demand formulation in the testing evaluation stage, and the standard system construction for quality evaluation technology of the Fundamental Geographic Information Database.

  7. The effect of clustering on lot quality assurance sampling: a probabilistic model to calculate sample sizes for quality assessments.

    Science.gov (United States)

    Hedt-Gauthier, Bethany L; Mitsunaga, Tisha; Hund, Lauren; Olives, Casey; Pagano, Marcello

    2013-10-26

    Traditional Lot Quality Assurance Sampling (LQAS) designs assume observations are collected using simple random sampling. Alternatively, randomly sampling clusters of observations and then individuals within clusters reduces costs but decreases the precision of the classifications. In this paper, we develop a general framework for designing the cluster(C)-LQAS system and illustrate the method with the design of data quality assessments for the community health worker program in Rwanda. To determine sample size and decision rules for C-LQAS, we use the beta-binomial distribution to account for inflated risk of errors introduced by sampling clusters at the first stage. We present general theory and code for sample size calculations.The C-LQAS sample sizes provided in this paper constrain misclassification risks below user-specified limits. Multiple C-LQAS systems meet the specified risk requirements, but numerous considerations, including per-cluster versus per-individual sampling costs, help identify optimal systems for distinct applications. We show the utility of C-LQAS for data quality assessments, but the method generalizes to numerous applications. This paper provides the necessary technical detail and supplemental code to support the design of C-LQAS for specific programs.

  8. PENGARUH MODEL PEMBELAJARAN ASSURANCE, RELEVANCE, INTEREST, ASSESSMENT, SATISFACTION DENGAN STRATEGI ACTIVE LEARNING TIPE INDEX CARD MATCH TERHADAP KEMAMPUAN PEMECAHAN MASALAH MATEMATIK SISWA SMA

    Directory of Open Access Journals (Sweden)

    Frasticha Frasticha

    2016-08-01

    Full Text Available Pemecahan masalah merupakan kegiatan matematika yang sulit baik dalam mempelajari maupun mengajarkannya, sehingga diperlukan adanya suatu model pembelajaran yang dapat memberikan pengaruh positif terhadap kemampuan pemecahan masalah siswa. Salah satu model pembelajaran yang dapat digunakan yaitu model pembelajaran ARIAS dengan strategi active learning tipe ICM. Penelitian ini bertujuan untuk mengetahui: (1 model pembelajaran ARIAS dengan strategi active learning tipe ICM berpengaruh terhadap kemampuan pemecahan masalah matematik siswa SMA; (2 Sikap siswa terhadap pembelajaran matematika menggunakan model pembelajaran ARIAS dengan strategi active learning tipe ICM. Subjek penelitian ini adalah siswa kelas XI IPA 1 dengan jumlah 38 siswa sebagai kelas kontrol dan XI IPA 2 dengan jumlah 39 siswa sebagai kelas eksperimen di SMAN 19 Kabupaten Tangerang pada tahun ajaran 2015-2016. Metode penelitian yang digunakan adalah metode penelitian eksperimen dengan adalah desain kuasi eksperimen dengan bentuk Nonequivalent Control Group serta Cluster Sampling sebagai teknik pengambilan sampel. Analisis data dalam penelitian ini menggunakan SPSS Statistics Version 22. Hasil penelitian :(1 model pembelajaran ARIAS dengan strategi active learning tipe ICM berpengaruh terhadap kemampuan pemecahan masalah matematik siswa SMA dan memberikan pengaruh yang positif; (2 sikap siswa positif terhadap model pembelajaran ARIAS dengan strategi active learning tipe ICM. Kata Kunci: Assurance Relevance Interest Assessment Satisfaction, Index Card Match, Kemampuan Pemecahan Masalah

  9. Quality assurance for hammer forgings

    International Nuclear Information System (INIS)

    Potthast, E.

    1984-01-01

    The quality assurance program introduced by Arbed Saarstahl and laid down in a quality assurance manual is described. A particular attention is attached thereby both to quality practice proper and to a reliable flow of information amongst all the persons involved. The production and test sequence schedules of the hammer forging plant are illustrated by the example of a forged valve housing for nuclear power plants. These schedules specify not only the forging process in the individual production stages but also the workpiece contour after each working operation, the heat treatment, the furnace charging, and the inspection of finished parts. The formalization of the tests is designed both to promote the customer's trust towards the supplier and to prevent the formal operations involved from hindering further technical development. (orig.) [de

  10. Quality management and quality assurance

    International Nuclear Information System (INIS)

    Pieroni, N.

    1991-01-01

    The main common difficulties are presented found in the implementation of effective Quality Management and Quality Assurance Programmes, based on the recommendations of the IAEA International Nuclear Safety Advisory Group, the information collected by the IAEA experts participating in its meetings, and the results of the IAEA Operational Safety Review Team missions. The difficulties were identified in several areas. The most relevant root causes can be characterized as lack of understanding of quality principles and difficulty in implementation by the responsible management. The IAEA programme is described attempting to provide advice and support in the implementation of an effective quality programme through a number of activities including: preparation of practical guidelines, training programmes for management personnel, assistance in building up qualified manpower, and promoting the quest for excellence through the exchange of experience in the implementation of effective Quality Management and Quality Assurance Programmes in nuclear power plants with good performance records. (Z.S.)

  11. Design-reliability assurance program application to ACP600

    International Nuclear Information System (INIS)

    Zhichao, Huang; Bo, Zhao

    2012-01-01

    ACP600 is a newly nuclear power plant technology made by CNNC in China and it is based on the Generation III NPPs design experience and general safety goals. The ACP600 Design Reliability Assurance Program (D-RAP) is implemented as an integral part of the ACP600 design process. A RAP is a formal management system which assures the collection of important characteristic information about plant performance throughout each phase of its life and directs the use of this information in the implementation of analytical and management process which are specifically designed to meet two specific objects: confirm the plant goals and cost effective improvements. In general, typical reliability assurance program have 4 broad functional elements: 1) Goals and performance criteria; 2) Management system and implementing procedures; 3) Analytical tools and investigative methods; and 4) Information management. In this paper we will use the D-RAP technical and Risk-Informed requirements, and establish the RAM and PSA model to optimize the ACP600 design. Compared with previous design process, the D-RAP is more competent for the higher design targets and requirements, enjoying more creativity through an easier implementation of technical breakthroughs. By using D-RAP, the plants goals, system goals, performance criteria and safety criteria can be easier to realize, and the design can be optimized and more rational

  12. A quantitative approach to modeling the information processing of NPP operators under input information overload

    International Nuclear Information System (INIS)

    Kim, Jong Hyun; Seong, Poong Hyun

    2002-01-01

    This paper proposes a quantitative approach to modeling the information processing of NPP operators. The aim of this work is to derive the amount of the information processed during a certain control task under input information overload. We primarily develop the information processing model having multiple stages, which contains information flow. Then the uncertainty of the information is quantified using the Conant's model, a kind of information theory. We also investigate the applicability of this approach to quantifying the information reduction of operators under the input information overload

  13. Public health component in building information modeling

    Science.gov (United States)

    Trufanov, A. I.; Rossodivita, A.; Tikhomirov, A. A.; Berestneva, O. G.; Marukhina, O. V.

    2018-05-01

    A building information modelling (BIM) conception has established itself as an effective and practical approach to plan, design, construct, and manage buildings and infrastructure. Analysis of the governance literature has shown that the BIM-developed tools do not take fully into account the growing demands from ecology and health fields. In this connection, it is possible to offer an optimal way of adapting such tools to the necessary consideration of the sanitary and hygienic specifications of materials used in construction industry. It is proposed to do it through the introduction of assessments that meet the requirements of national sanitary standards. This approach was demonstrated in the case study of Revit® program.

  14. The study on the quality assurance of performance assessment for the disposal system

    International Nuclear Information System (INIS)

    Fusaeda, Shigeki; Yanagisawa, Ichiro; Katsurai, Kiyomichi; Ueda, Noriaki; Takeishi, Masayuki; Ida, Toshio; Imamura, Naoko

    1999-02-01

    The purpose of performance assessment of the geological disposal system in the second progress report is to quantitatively evaluate the performance in the near-field. For this purpose, validation of performance models and quality assurance of data used in the performance assessment are important technical subjects. To achieve the subjects, the quality of the procedure of analysis work and data acquisition work must be assured in addition to the quality assurance of data, models and analysis codes. In addition, to assure results of the performance assessment by integrating these qualities is an important matter. The following studies have been performed in order to improve the computer environment for controlling the quality information relating to the performance assessment, and to develop the integrated quality assurance system which can give reliability of the results of the performance assessment in the second progress report. (1) The study of quality assurance framework. In order to assure reliability of MESHNOTE3, we have carried out validation analysis based on experimental data and insite data. And we have revised the quality assurance manual in order to be applicable to preparing documents. We have carried out validation analysis/planning based on the experimental data which is acquired from 'Measurement of Apparent Diffusion Coefficient of 99 Tc in Compacted Bentonite with Fe powder', and confirmed validity of MESHNOTE3. We have added a postscript on the management of analysis documents to the quality assurance manual. (2) The development of the quality assurance computer system. In order to improve reliability of the analysis results and to efficiently use the quality assurance program, the quality assurance computer system on the basis of analysis management system CAPASA has been improved as follows. Database for radionuclide transport calculations that can control geometry of engineered barriers, data relating to glass dissolution and dose rate

  15. Guidance for implementing an environmental, safety, and health assurance program. Volume 10. Model guidlines for line organization environmental, safety and health audits and appraisals

    International Nuclear Information System (INIS)

    Ellingson, A.C.

    1981-10-01

    This is 1 of 15 documents designed to illustrate how an Environmental, Safety and Health (ES and H) Assurance Program may be implemented. The generic definition of ES and H Assurance Programs is given in a companion document entitled An Environmental, Safety and Health Assurance Program Standard. The Standard specifies that the operational level of an institution must have an internal assurance function, and this document provides guidance for the audit/appraisal portion of the operational level's ES and H program. The appendixes include an ES and H audit checklist, a sample element rating guide, and a sample audit plan for working level line organization internal audits

  16. Quality assurance and management

    International Nuclear Information System (INIS)

    Newcomb, W.E.

    1989-01-01

    This paper traces the evolution of the quality assurance program of an office of waste management development (OWTD). The program's needs and commitment are examined. The author reports on the role of program and technical managers in such a program

  17. RAVEN Quality Assurance Activities

    Energy Technology Data Exchange (ETDEWEB)

    Cogliati, Joshua Joseph [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-09-01

    This report discusses the quality assurance activities needed to raise the Quality Level of Risk Analysis in a Virtual Environment (RAVEN) from Quality Level 3 to Quality Level 2. This report also describes the general RAVEN quality assurance activities. For improving the quality, reviews of code changes have been instituted, more parts of testing have been automated, and improved packaging has been created. For upgrading the quality level, requirements have been created and the workflow has been improved.

  18. Quality assurance in radiotherapy

    International Nuclear Information System (INIS)

    Groth, S.; Meghzifene, A.; Tatsuzaki, H.; Levin, V.; Izewska, J.

    2001-01-01

    Quality assurance in the management of a patient receiving radiation therapy and the role of the radiation oncologist and medical physicist in this process is described. The constraints on available personnel are recognised and the need for further education resources and IAEA activities in education for both groups described. IAEA activities in the clinical and dosimetric aspects and the resultant publications and education have contributed to a culture of quality assurance. (author)

  19. Quality assurance in NDT

    International Nuclear Information System (INIS)

    Krishnamoorthy, K.

    2010-01-01

    The importance of Nondestructive Testing (NDT) as a Quality Control/Quality Assurance tool in the industrial domain cannot be over-emphasized. With the rapid advancement in research and technology, the NDT field is becoming larger and more sophisticated day by day. Innovative research in materials science and digital technology is paving the way for more and more new methods in NDT technology. Although the NDT technology has improved over the years, the basic 'human factor' underlying the success of the NDT field remains the same. There are two major factors that influence the 'Quality Assurance in NDT'. First, knowledgeable and skilled NDT Operators are the most important factor in assuring the reliable test results. Second, the Management oversight of the NDT operations plays a major role in assuring the overall quality of NDT. Management responsibilities include the implementation of a Quality Management System (QMS) that focuses on the NDT operations and apply all the elements of Quality Assurance relevant to NDT. Whether the NDT operations are performed in-house or by a contractor, periodic Management Self-assessments should include the following question: How can the Management assess and improve the 'Quality Assurance in NDT'? This paper attempts to answer the above question. Some practical examples are provided to illustrate the potential quality incidents that could lead to costly failures, and the role of NDT Operator and the Management in preventing such quality incidents. Also, some guidelines are provided on how the Management can apply the elements of Quality Assurance to NDT in order to assess and improve the 'Quality Assurance in NDT'. (author)

  20. CRISP. Information Security Models and Their Economics

    International Nuclear Information System (INIS)

    Gustavsson, R.; Mellstrand, P.; Tornqvist, B.

    2005-03-01

    The deliverable D1.6 includes background material and specifications of a CRISP Framework on protection of information assets related to power net management and management of business operations related to energy services. During the project it was discovered by the CRISP consortium that the original description of WP 1.6 was not adequate for the project as such. The main insight was that the original emphasis on cost-benefit analysis of security protection measures was to early to address in the project. This issue is of course crucial in itself but requires new models of consequence analysis that still remains to be developed, especially for the new business models we are investigated in the CRISP project. The updated and approved version of the WP1.6 description, together with the also updated WP2.4 focus on Dependable ICT support of Power Grid Operations constitutes an integrated approach towards dependable and secure future utilities and their business processes. This document (D1.6) is a background to deliverable D2.4. Together they provide a dependability and security framework to the three CRISP experiments in WP3

  1. Modeling the reemergence of information diffusion in social network

    Science.gov (United States)

    Yang, Dingda; Liao, Xiangwen; Shen, Huawei; Cheng, Xueqi; Chen, Guolong

    2018-01-01

    Information diffusion in networks is an important research topic in various fields. Existing studies either focus on modeling the process of information diffusion, e.g., independent cascade model and linear threshold model, or investigate information diffusion in networks with certain structural characteristics such as scale-free networks and small world networks. However, there are still several phenomena that have not been captured by existing information diffusion models. One of the prominent phenomena is the reemergence of information diffusion, i.e., a piece of information reemerges after the completion of its initial diffusion process. In this paper, we propose an optimized information diffusion model by introducing a new informed state into traditional susceptible-infected-removed model. We verify the proposed model via simulations in real-world social networks, and the results indicate that the model can reproduce the reemergence of information during the diffusion process.

  2. Evaluation of financial assurance alternatives of licensees

    Energy Technology Data Exchange (ETDEWEB)

    Douglas, J N

    1995-09-01

    The Uranium and Thorium Mining Regulations of the Atomic Energy Control Act require that applicants/licensees indicate to the AECB what financial assurance plans they have made to fund the decommissioning plan they propose to put in place. We have determined through our own business knowledge from other projects, as well as information provided by contacts in the banking, accounting, legal, investment and insurance communities, what financial assurance plans might be available. We have tabulated these alternatives, included explanations of how each might be implemented, and recorded advantages and disadvantages of each alternative to both the AECB and the applicant/licensee. In addition we have ranked the alternatives in order of most suitable to least suitable, from the AECB`s perspective. Although these financial assurance mechanisms have been tabulated with a view to decommissioning of a uranium mine, they could be used in other licence or business arrangements that require financial assurance. (author). 3 tabs., 1 fig.

  3. Evaluation of financial assurance alternatives of licensees

    International Nuclear Information System (INIS)

    Douglas, J.N.

    1995-09-01

    The Uranium and Thorium Mining Regulations of the Atomic Energy Control Act require that applicants/licensees indicate to the AECB what financial assurance plans they have made to fund the decommissioning plan they propose to put in place. We have determined through our own business knowledge from other projects, as well as information provided by contacts in the banking, accounting, legal, investment and insurance communities, what financial assurance plans might be available. We have tabulated these alternatives, included explanations of how each might be implemented, and recorded advantages and disadvantages of each alternative to both the AECB and the applicant/licensee. In addition we have ranked the alternatives in order of most suitable to least suitable, from the AECB's perspective. Although these financial assurance mechanisms have been tabulated with a view to decommissioning of a uranium mine, they could be used in other licence or business arrangements that require financial assurance. (author). 3 tabs., 1 fig

  4. Evaluation of clinical information modeling tools.

    Science.gov (United States)

    Moreno-Conde, Alberto; Austin, Tony; Moreno-Conde, Jesús; Parra-Calderón, Carlos L; Kalra, Dipak

    2016-11-01

    Clinical information models are formal specifications for representing the structure and semantics of the clinical content within electronic health record systems. This research aims to define, test, and validate evaluation metrics for software tools designed to support the processes associated with the definition, management, and implementation of these models. The proposed framework builds on previous research that focused on obtaining agreement on the essential requirements in this area. A set of 50 conformance criteria were defined based on the 20 functional requirements agreed by that consensus and applied to evaluate the currently available tools. Of the 11 initiative developing tools for clinical information modeling identified, 9 were evaluated according to their performance on the evaluation metrics. Results show that functionalities related to management of data types, specifications, metadata, and terminology or ontology bindings have a good level of adoption. Improvements can be made in other areas focused on information modeling and associated processes. Other criteria related to displaying semantic relationships between concepts and communication with terminology servers had low levels of adoption. The proposed evaluation metrics were successfully tested and validated against a representative sample of existing tools. The results identify the need to improve tool support for information modeling and software development processes, especially in those areas related to governance, clinician involvement, and optimizing the technical validation of testing processes. This research confirmed the potential of these evaluation metrics to support decision makers in identifying the most appropriate tool for their organization. Los Modelos de Información Clínica son especificaciones para representar la estructura y características semánticas del contenido clínico en los sistemas de Historia Clínica Electrónica. Esta investigación define, prueba y valida

  5. Utilization of building information modeling in infrastructure’s design and construction

    Science.gov (United States)

    Zak, Josef; Macadam, Helen

    2017-09-01

    Building Information Modeling (BIM) is a concept that has gained its place in the design, construction and maintenance of buildings in Czech Republic during recent years. This paper deals with description of usage, applications and potential benefits and disadvantages connected with implementation of BIM principles in the preparation and construction of infrastructure projects. Part of the paper describes the status of BIM implementation in Czech Republic, and there is a review of several virtual design and construction practices in Czech Republic. Examples of best practice are presented from current infrastructure projects. The paper further summarizes experiences with new technologies gained from the application of BIM related workflows. The focus is on the BIM model utilization for the machine control systems on site, quality assurance, quality management and construction management.

  6. Quality assurance and organizational effectiveness in hospitals.

    OpenAIRE

    Hetherington, R W

    1982-01-01

    The purpose of this paper is to explore some aspects of a general theoretical model within which research on the organizational impacts of quality assurance programs in hospitals may be examined. Quality assurance is conceptualized as an organizational control mechanism, operating primarily through increased formalization of structures and specification of procedures. Organizational effectiveness is discussed from the perspective of the problem-solving theory of organizations, wherein effecti...

  7. Contexts for concepts: Information modeling for semantic interoperability

    NARCIS (Netherlands)

    Oude Luttighuis, P.H.W.M.; Stap, R.E.; Quartel, D.

    2011-01-01

    Conceptual information modeling is a well-established practice, aimed at preparing the implementation of information systems, the specification of electronic message formats, and the design of information processes. Today's ever more connected world however poses new challenges for conceptual

  8. Semantic World Modelling and Data Management in a 4d Forest Simulation and Information System

    Science.gov (United States)

    Roßmann, J.; Hoppen, M.; Bücken, A.

    2013-08-01

    Various types of 3D simulation applications benefit from realistic forest models. They range from flight simulators for entertainment to harvester simulators for training and tree growth simulations for research and planning. Our 4D forest simulation and information system integrates the necessary methods for data extraction, modelling and management. Using modern methods of semantic world modelling, tree data can efficiently be extracted from remote sensing data. The derived forest models contain position, height, crown volume, type and diameter of each tree. This data is modelled using GML-based data models to assure compatibility and exchangeability. A flexible approach for database synchronization is used to manage the data and provide caching, persistence, a central communication hub for change distribution, and a versioning mechanism. Combining various simulation techniques and data versioning, the 4D forest simulation and information system can provide applications with "both directions" of the fourth dimension. Our paper outlines the current state, new developments, and integration of tree extraction, data modelling, and data management. It also shows several applications realized with the system.

  9. SatisFactory Common Information Data Exchange Model

    OpenAIRE

    CERTH

    2016-01-01

    This deliverable defines the Common Information Data Exchange Model (CIDEM). The aim of CIDEM is to provide a model of information elements (e.g. concepts, even, relations, interfaces) used for information exchange between components as well as for modelling work performed by other tasks (e.g. knowledge models to support human resources optimization). The CIDEM definition is considered as a shared vocabulary that enables to address the information needs for the SatisFactory framework components.

  10. Information aspects of type IX cosmological models

    International Nuclear Information System (INIS)

    Francisco, G.

    1987-01-01

    A study of amounts of information necessary to localize the trajectory of a dynamical system known as the Mixmaster universe, is presented. The main result is that less information is necessary near the cosmological singularity of the system than far away. This conclusion is obtained by evolving probability distributions towards the singularity and comparying the associated information functions. Qualitative methods of dynamical systems theory present a phenomenon that might be related to this loss of information. (author) [pt

  11. Quality Assurance in Higher Education in Zimbabwe

    Science.gov (United States)

    Garwe, Evelyn Chiyevo

    2014-01-01

    The purpose of this paper is to furnish local and global stakeholders with detailed information regarding the development and current status of quality assurance in the Zimbabwean higher education sector. The study used document analysis, observation and interviews with key informants as sources of data. This paper addresses the dearth of…

  12. The Nature of Information Science: Changing Models

    Science.gov (United States)

    Robinson, Lyn; Karamuftuoglu, Murat

    2010-01-01

    Introduction: This paper considers the nature of information science as a discipline and profession. Method: It is based on conceptual analysis of the information science literature, and consideration of philosophical perspectives, particularly those of Kuhn and Peirce. Results: It is argued that information science may be understood as a field of…

  13. A descriptive model of information problem solving while using internet

    NARCIS (Netherlands)

    Brand-Gruwel, Saskia; Wopereis, Iwan; Walraven, Amber

    2009-01-01

    This paper presents the IPS-I-model: a model that describes the process of information problem solving (IPS) in which the Internet (I) is used to search information. The IPS-I-model is based on three studies, in which students in secondary and (post) higher education were asked to solve information

  14. Information sharing systems and teamwork between sub-teams: a mathematical modeling perspective

    Science.gov (United States)

    Tohidi, Hamid; Namdari, Alireza; Keyser, Thomas K.; Drzymalski, Julie

    2017-12-01

    Teamwork contributes to a considerable improvement in quality and quantity of the ultimate outcome. Collaboration and alliance between team members bring a substantial progress for any business. However, it is imperative to acquire an appropriate team since many factors must be considered in this regard. Team size may represent the effectiveness of a team and it is of paramount importance to determine what the ideal team size exactly should be. In addition, information technology increasingly plays a differentiating role in productivity and adopting appropriate information sharing systems may contribute to improvement in efficiency especially in competitive markets when there are numerous producers that compete with each other. The significance of transmitting information to individuals is inevitable to assure an improvement in team performance. In this paper, a model of teamwork and its organizational structure are presented. Furthermore, a mathematical model is proposed in order to characterize a group of sub-teams according to two criteria: team size and information technology. The effect of information technology on performance of team and sub-teams as well as optimum size of those team and sub-teams from a productivity perspective are studied. Moreover, a quantitative sensitivity analysis is presented in order to analyze the interaction between these two factors through a sharing system.

  15. The Effects of a Computer-Assisted Teaching Material, Designed According to the ASSURE Instructional Design and the ARCS Model of Motivation, on Students' Achievement Levels in a Mathematics Lesson and Their Resulting Attitudes

    Science.gov (United States)

    Karakis, Hilal; Karamete, Aysen; Okçu, Aydin

    2016-01-01

    This study examined the effects that computer-assisted instruction had on students' attitudes toward a mathematics lesson and toward learning mathematics with computer-assisted instruction. The computer software we used was based on the ASSURE Instructional Systems Design and the ARCS Model of Motivation, and the software was designed to teach…

  16. Online Cancer Information Seeking: Applying and Extending the Comprehensive Model of Information Seeking.

    Science.gov (United States)

    Van Stee, Stephanie K; Yang, Qinghua

    2017-10-30

    This study applied the comprehensive model of information seeking (CMIS) to online cancer information and extended the model by incorporating an exogenous variable: interest in online health information exchange with health providers. A nationally representative sample from the Health Information National Trends Survey 4 Cycle 4 was analyzed to examine the extended CMIS in predicting online cancer information seeking. Findings from a structural equation model supported most of the hypotheses derived from the CMIS, as well as the extension of the model related to interest in online health information exchange. In particular, socioeconomic status, beliefs, and interest in online health information exchange predicted utility. Utility, in turn, predicted online cancer information seeking, as did information-carrier characteristics. An unexpected but important finding from the study was the significant, direct relationship between cancer worry and online cancer information seeking. Theoretical and practical implications are discussed.

  17. Agent oriented modeling of business information systems

    OpenAIRE

    Vymetal, Dominik

    2009-01-01

    Enterprise modeling is an abstract definition of processes running in enterprise using process, value, data and resource models. There are two perspectives of business modeling: process perspective and value chain perspective. Both have some advantages and disadvantages. This paper proposes a combination of both perspectives into one generic model. The model takes also social part or the enterprise system into consideration and pays attention to disturbances influencing the enterprise system....

  18. Building Program Models Incrementally from Informal Descriptions.

    Science.gov (United States)

    1979-10-01

    specified at each step. Since the user controls the interaction, the user may determine the order in which information flows into PMB. Information is received...until only ten years ago the term aautomatic programming" referred to the development of the assemblers, macro expanders, and compilers for these

  19. Animal models for information processing during sleep

    NARCIS (Netherlands)

    Coenen, A.M.L.; Drinkenburg, W.H.I.M.

    2002-01-01

    Information provided by external stimuli does reach the brain during sleep, although the amount of information is reduced during sleep compared to wakefulness. The process controlling this reduction is called `sensory' gating and evidence exists that the underlying neurophysiological processes take

  20. Radiation shielding quality assurance

    Science.gov (United States)

    Um, Dallsun

    For the radiation shielding quality assurance, the validity and reliability of the neutron transport code MCNP, which is now one of the most widely used radiation shielding analysis codes, were checked with lot of benchmark experiments. And also as a practical example, follows were performed in this thesis. One integral neutron transport experiment to measure the effect of neutron streaming in iron and void was performed with Dog-Legged Void Assembly in Knolls Atomic Power Laboratory in 1991. Neutron flux was measured six different places with the methane detectors and a BF-3 detector. The main purpose of the measurements was to provide benchmark against which various neutron transport calculation tools could be compared. Those data were used in verification of Monte Carlo Neutron & Photon Transport Code, MCNP, with the modeling for that. Experimental results and calculation results were compared in both ways, as the total integrated value of neutron fluxes along neutron energy range from 10 KeV to 2 MeV and as the neutron spectrum along with neutron energy range. Both results are well matched with the statistical error +/-20%. MCNP results were also compared with those of TORT, a three dimensional discrete ordinates code which was developed by Oak Ridge National Laboratory. MCNP results are superior to the TORT results at all detector places except one. This means that MCNP is proved as a very powerful tool for the analysis of neutron transport through iron & air and further it could be used as a powerful tool for the radiation shielding analysis. For one application of the analysis of variance (ANOVA) to neutron and gamma transport problems, uncertainties for the calculated values of critical K were evaluated as in the ANOVA on statistical data.

  1. System Dynamics Modeling for Supply Chain Information Sharing

    Science.gov (United States)

    Feng, Yang

    In this paper, we try to use the method of system dynamics to model supply chain information sharing. Firstly, we determine the model boundaries, establish system dynamics model of supply chain before information sharing, analyze the model's simulation results under different changed parameters and suggest improvement proposal. Then, we establish system dynamics model of supply chain information sharing and make comparison and analysis on the two model's simulation results, to show the importance of information sharing in supply chain management. We wish that all these simulations would provide scientific supports for enterprise decision-making.

  2. Propagating semantic information in biochemical network models

    Directory of Open Access Journals (Sweden)

    Schulz Marvin

    2012-01-01

    Full Text Available Abstract Background To enable automatic searches, alignments, and model combination, the elements of systems biology models need to be compared and matched across models. Elements can be identified by machine-readable biological annotations, but assigning such annotations and matching non-annotated elements is tedious work and calls for automation. Results A new method called "semantic propagation" allows the comparison of model elements based not only on their own annotations, but also on annotations of surrounding elements in the network. One may either propagate feature vectors, describing the annotations of individual elements, or quantitative similarities between elements from different models. Based on semantic propagation, we align partially annotated models and find annotations for non-annotated model elements. Conclusions Semantic propagation and model alignment are included in the open-source library semanticSBML, available on sourceforge. Online services for model alignment and for annotation prediction can be used at http://www.semanticsbml.org.

  3. Thermodynamics of information processing based on enzyme kinetics: An exactly solvable model of an information pump.

    Science.gov (United States)

    Cao, Yuansheng; Gong, Zongping; Quan, H T

    2015-06-01

    Motivated by the recent proposed models of the information engine [Proc. Natl. Acad. Sci. USA 109, 11641 (2012)] and the information refrigerator [Phys. Rev. Lett. 111, 030602 (2013)], we propose a minimal model of the information pump and the information eraser based on enzyme kinetics. This device can either pump molecules against the chemical potential gradient by consuming the information to be encoded in the bit stream or (partially) erase the information initially encoded in the bit stream by consuming the Gibbs free energy. The dynamics of this model is solved exactly, and the "phase diagram" of the operation regimes is determined. The efficiency and the power of the information machine is analyzed. The validity of the second law of thermodynamics within our model is clarified. Our model offers a simple paradigm for the investigating of the thermodynamics of information processing involving the chemical potential in small systems.

  4. Thermodynamics of information processing based on enzyme kinetics: An exactly solvable model of an information pump

    Science.gov (United States)

    Cao, Yuansheng; Gong, Zongping; Quan, H. T.

    2015-06-01

    Motivated by the recent proposed models of the information engine [Proc. Natl. Acad. Sci. USA 109, 11641 (2012), 10.1073/pnas.1204263109] and the information refrigerator [Phys. Rev. Lett. 111, 030602 (2013), 10.1103/PhysRevLett.111.030602], we propose a minimal model of the information pump and the information eraser based on enzyme kinetics. This device can either pump molecules against the chemical potential gradient by consuming the information to be encoded in the bit stream or (partially) erase the information initially encoded in the bit stream by consuming the Gibbs free energy. The dynamics of this model is solved exactly, and the "phase diagram" of the operation regimes is determined. The efficiency and the power of the information machine is analyzed. The validity of the second law of thermodynamics within our model is clarified. Our model offers a simple paradigm for the investigating of the thermodynamics of information processing involving the chemical potential in small systems.

  5. Quality assurance of sterilized products: verification of a model relating frequency of contaminated items and increasing radiation dose

    International Nuclear Information System (INIS)

    Khan, A.A.; Tallentire, A.; Dwyer, J.

    1977-01-01

    Values of the γ-radiation resistance parameters (k and n of the 'multi-hit' expression) for Bacillus pumilus E601 spores and Serratia marcescens cells have been determined and the constancy of values for a given test condition demonstrated. These organisms, differing by a factor of about 50 in k value, have been included in a laboratory test system for use in verification of a model describing the dependence of the proportion of contaminated items in a population of items on radiation dose. The proportions of contaminated units of the test system at various γ-radiation doses have been measured for different initial numbers and types of organisms present in units either singly or together. Using the model, the probabilities of contaminated units for corresponding sets of conditions have been evaluated together with associated variances. Measured proportions and predicted probabilities agree well, showing that the model holds in a laboratory contrived situation. (author)

  6. Information dissemination model for social media with constant updates

    Science.gov (United States)

    Zhu, Hui; Wu, Heng; Cao, Jin; Fu, Gang; Li, Hui

    2018-07-01

    With the development of social media tools and the pervasiveness of smart terminals, social media has become a significant source of information for many individuals. However, false information can spread rapidly, which may result in negative social impacts and serious economic losses. Thus, reducing the unfavorable effects of false information has become an urgent challenge. In this paper, a new competitive model called DMCU is proposed to describe the dissemination of information with constant updates in social media. In the model, we focus on the competitive relationship between the original false information and updated information, and then propose the priority of related information. To more effectively evaluate the effectiveness of the proposed model, data sets containing actual social media activity are utilized in experiments. Simulation results demonstrate that the DMCU model can precisely describe the process of information dissemination with constant updates, and that it can be used to forecast information dissemination trends on social media.

  7. Language Models With Meta-information

    NARCIS (Netherlands)

    Shi, Y.

    2014-01-01

    Language modeling plays a critical role in natural language processing and understanding. Starting from a general structure, language models are able to learn natural language patterns from rich input data. However, the state-of-the-art language models only take advantage of words themselves, which

  8. Moltke as a Model for Information Warfare

    National Research Council Canada - National Science Library

    Gallagher, Daniel P

    1998-01-01

    ... with late 20th century Information Warfare (IW). Clausewitz, with his emphasis on concentrating forces for a decisive battle, or Sun Tzu, with his focus on an indirect approach and subduing the enemy without battle, might appear to be more...

  9. Physical models of biological information and adaptation.

    Science.gov (United States)

    Stuart, C I

    1985-04-07

    The bio-informational equivalence asserts that biological processes reduce to processes of information transfer. In this paper, that equivalence is treated as a metaphor with deeply anthropomorphic content of a sort that resists constitutive-analytical definition, including formulation within mathematical theories of information. It is argued that continuance of the metaphor, as a quasi-theoretical perspective in biology, must entail a methodological dislocation between biological and physical science. It is proposed that a general class of functions, drawn from classical physics, can serve to eliminate the anthropomorphism. Further considerations indicate that the concept of biological adaptation is central to the general applicability of the informational idea in biology; a non-anthropomorphic treatment of adaptive phenomena is suggested in terms of variational principles.

  10. Model of intelligent information searching system

    International Nuclear Information System (INIS)

    Yastrebkov, D.I.

    2004-01-01

    A brief description of the technique to search for electronic documents in large archives as well as drawbacks is presented. A solution close to intelligent information searching systems is proposed. (author)

  11. A Dynamic Model of Information and Entropy

    Directory of Open Access Journals (Sweden)

    Stuart D. Walker

    2010-01-01

    Full Text Available We discuss the possibility of a relativistic relationship between information and entropy, closely analogous to the classical Maxwell electro-magnetic wave equations. Inherent to the analysis is the description of information as residing in points of non-analyticity; yet ultimately also exhibiting a distributed characteristic: additionally analogous, therefore, to the wave-particle duality of light. At cosmological scales our vector differential equations predict conservation of information in black holes, whereas regular- and Z-DNA molecules correspond to helical solutions at microscopic levels. We further propose that regular- and Z-DNA are equivalent to the alternative words chosen from an alphabet to maintain the equilibrium of an information transmission system.

  12. Medicine in Ancient Assur

    DEFF Research Database (Denmark)

    Arbøll, Troels Pank

    This dissertation is a microhistorical study of a single individual named Kiṣir-Aššur who practiced medicine in the ancient city of Assur (modern northern Iraq) in the 7th century BCE. The study provides the first detailed analysis of one healer’s education and practice in ancient Mesopotamia...

  13. Quality assurance. 6. ed.

    International Nuclear Information System (INIS)

    Masing, W.

    1979-01-01

    Brief introduction to the quality sector. After some explanations of the terms of quality, feature, and defect, the article discusses the planning of quality and testing, industrial metrology, the test risk, quality assurance, quality enhancement, quality cost, and organisational problems. (RW) [de

  14. Quality Assurance Program Description

    Energy Technology Data Exchange (ETDEWEB)

    Halford, Vaughn Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ryder, Ann Marie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-07-01

    Effective May 1, 2017, led by a new executive leadership team, Sandia began operating within a new organizational structure. National Technology and Engineering Solutions of Sandia (Sandia’s) Quality Assurance Program (QAP) was established to assign responsibilities and authorities, define workflow policies and requirements, and provide for the performance and assessment of work.

  15. Providing Continuous Assurance

    NARCIS (Netherlands)

    Kocken, Jonne; Hulstijn, Joris

    2017-01-01

    It has been claimed that continuous assurance can be attained by combining continuous monitoring by management, with continuous auditing of data streams and the effectiveness of internal controls by an external auditor. However, we find that in existing literature the final step to continuous

  16. Chapter 8: Quality assurance

    International Nuclear Information System (INIS)

    2001-01-01

    The main efforts of Nuclear Regulatory Authority of the Slovak Republic (UJD) have been focused on inspection of quality assurance programmes of Slovak Power Stations, plc. and its daughter companies at Bohunice and Mochovce. Two quality assurance inspections in the area of periodical in service inspections (V-2 units) and tests of selected equipment (NPP V-2 units) and operation control (V-1 units) has been performed at NPPs Bohunice. One violation of decree on quality assurance of selected equipment has been found in the area of documentation archiving. The inspection concerning the implementation of quality assurance programme for operation of NPP Mochovce in the area of operation control has been performed focused on safety aspects of operation, operational procedures, control of operational events and feedback from operational experience. The results of this inspection were positive. Inspection of implementation of quality assurance programme for operation of radioactive waste repository (RU RAW) at the Mochovce location has been performed focused on receiving of containers, with radioactive wastes, containers handling, radiation monitoring, activities of documentation control and radiation protection at the repository site. No serious deficiencies have been found out. Also one inspection of experimental nuclear installations of VUJE Trnava at Jaslovske Bohunice site has been performed focused on procurement control, quality audits, documentation and quality records control when performing activities at experimental nuclear installations. The activity on development of internal quality assurance system continued. The implementation of this system will assure quality and effective fulfilment enlarged tasks of UJD with limited resources for its activity. The analyses of possible use of existing internal administrative control documentation as a basis for future quality system procedures was performed in co-operation with an external specialised organisation. The

  17. Homeland Security and Information Control: A Model of Asymmetric Information Flows.

    Science.gov (United States)

    Maxwell, Terrence A.

    2003-01-01

    Summarizes some of the activities the United States government has undertaken to control the dissemination of information since 2001. It also explores, through a conceptual model of information flows, potential impacts and discontinuities between policy purposes and outcomes. (AEF)

  18. Creating Quality Assurance and International Transparency for Quality Assurance Agencies

    DEFF Research Database (Denmark)

    Kristoffersen, Dorte; Lindeberg, Tobias

    2004-01-01

    The paper presents the experiences gained in the pilot project on mutual recognition conducted by the quality assurance agencies in the Nordic countries and the future perspective for international quality assurance of national quality assurance agencies. The background of the project was the nee...

  19. Quality assurance for health and environmental chemistry: 1989

    International Nuclear Information System (INIS)

    Gautier, M.A.; Gladney, E.S.; Koski, N.L.; Jones, E.A.; Phillips, M.B.; O'Malley, B.T.

    1990-12-01

    This report documents the continuing quality assurance efforts of the Health and Environmental Chemistry Group (HSE-9) at the Los Alamos National Laboratory. The philosophy, methodology, computing resources, and laboratory information management system used by the quality assurance program to encompass the diversity of analytical chemistry practiced in the group are described. Included in the report are all quality assurance reference materials used, along with their certified or consensus concentrations, and all analytical chemistry quality assurance measurements made by HSE-9 during 1989. 38 refs., 8 figs., 3 tabs

  20. Information, complexity and efficiency: The automobile model

    Energy Technology Data Exchange (ETDEWEB)

    Allenby, B. [Lucent Technologies (United States)]|[Lawrence Livermore National Lab., CA (United States)

    1996-08-08

    The new, rapidly evolving field of industrial ecology - the objective, multidisciplinary study of industrial and economic systems and their linkages with fundamental natural systems - provides strong ground for believing that a more environmentally and economically efficient economy will be more information intensive and complex. Information and intellectual capital will be substituted for the more traditional inputs of materials and energy in producing a desirable, yet sustainable, quality of life. While at this point this remains a strong hypothesis, the evolution of the automobile industry can be used to illustrate how such substitution may, in fact, already be occurring in an environmentally and economically critical sector.

  1. Topic modelling in the information warfare domain

    CSIR Research Space (South Africa)

    De Waal, A

    2013-11-01

    Full Text Available for interesting and relevant topics. The objectives of this paper is to describe topic modelling, put it in context as a useful IW technique and illustrate its use with two examples. They discuss several applications of topic modelling in the safety and security...

  2. Quality assurance and evidence in career guidance in Europe

    DEFF Research Database (Denmark)

    Plant, Peter

    2011-01-01

    Quality assurance and evidence in career guidance in Europe is based on a particular, positivtic model. Other approaches are largely neglected.......Quality assurance and evidence in career guidance in Europe is based on a particular, positivtic model. Other approaches are largely neglected....

  3. BYU Food Quality Assurance Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Quality Assurance Lab is located in the Eyring Science Center in the department of Nutrition, Dietetics, and Food Science. The Quality Assurance Lab has about 10...

  4. Model driven geo-information systems development

    NARCIS (Netherlands)

    Morales Guarin, J.M.; Ferreira Pires, Luis; van Sinderen, Marten J.; Williams, A.D.

    Continuous change of user requirements has become a constant for geo-information systems. Designing systems that can adapt to such changes requires an appropriate design methodology that supports abstraction, modularity and other mechanisms to capture the essence of the system and help controlling

  5. Geographical information modelling for land resource survey

    NARCIS (Netherlands)

    Bruin, de S.

    2000-01-01

    The increasing popularity of geographical information systems (GIS) has at least three major implications for land resources survey. Firstly, GIS allows alternative and richer representation of spatial phenomena than is possible with the traditional paper map. Secondly, digital technology has

  6. Models of organisation and information system design | Mohamed ...

    African Journals Online (AJOL)

    We devote this paper to the models of organisation, and see which is best suited to provide a basis for information processing and transmission. In this respect we shall be dealing with four models of organisation, namely: the classical mode, the behavioural model, the systems model and the cybernetic model of ...

  7. Software quality assurance plan for PORFLOW-3D

    International Nuclear Information System (INIS)

    Maheras, S.J.

    1993-03-01

    This plan describes the steps taken by the Idaho National Engineering Laboratory Subsurface and Environmental Modeling Unit personnel to implement software quality assurance procedures for the PORFLOW-3D computer code. PORFLOW-3D was used to conduct radiological performance assessments at the Savannah River Site. software quality assurance procedures for PORFLOW-3D include software acquisition, installation, testing, operation, maintenance, and retirement. Configuration control and quality assurance procedures are also included or referenced in this plan

  8. Illinois' Forests, 2005: Statistics, Methods, and Quality Assurance

    Science.gov (United States)

    Susan J. Crocker; Charles J. Barnett; Mark A. Hatfield

    2013-01-01

    The first full annual inventory of Illinois' forests was completed in 2005. This report contains 1) descriptive information on methods, statistics, and quality assurance of data collection, 2) a glossary of terms, 3) tables that summarize quality assurance, and 4) a core set of tabular estimates for a variety of forest resources. A detailed analysis of inventory...

  9. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  10. A model-driven approach to information security compliance

    Science.gov (United States)

    Correia, Anacleto; Gonçalves, António; Teodoro, M. Filomena

    2017-06-01

    The availability, integrity and confidentiality of information are fundamental to the long-term survival of any organization. Information security is a complex issue that must be holistically approached, combining assets that support corporate systems, in an extended network of business partners, vendors, customers and other stakeholders. This paper addresses the conception and implementation of information security systems, conform the ISO/IEC 27000 set of standards, using the model-driven approach. The process begins with the conception of a domain level model (computation independent model) based on information security vocabulary present in the ISO/IEC 27001 standard. Based on this model, after embedding in the model mandatory rules for attaining ISO/IEC 27001 conformance, a platform independent model is derived. Finally, a platform specific model serves the base for testing the compliance of information security systems with the ISO/IEC 27000 set of standards.

  11. Explaining the Impfact of Cloud Assurance Seals on Customers’ Perceived Privacy

    OpenAIRE

    Lang, Michael; Wiesche, Manuel; Krcmar, Helmut

    2018-01-01

    Privacy concerns inhabit professional cloud adoption. Assurance seals resulting from a third-party cer-tification are frequently used from cloud service provider to provide privacy assurance for their cus-tomers. However, empirical findings on the effectiveness of assurance seals focusing on “who” issues those, even if customers also require the information why the assurance seal is valid and reliable. To fill this gap, we build on information integration theory and investigate the impact of ...

  12. Creating Quality Assurance and International Transparency for Quality Assurance Agencies

    DEFF Research Database (Denmark)

    Kristoffersen, Dorte; Lindeberg, Tobias

    2004-01-01

    , on the one hand, to advance internationalisation of quality assurance of higher education, and on the other hand, allow for the differences in the national approaches to quality assurance. The paper will focus on two issues: first, the strength and weaknesses of the method employed and of the use of the ENQA......The paper presents the experiences gained in the pilot project on mutual recognition conducted by the quality assurance agencies in the Nordic countries and the future perspective for international quality assurance of national quality assurance agencies. The background of the project was the need...

  13. Global Information Enterprise (GIE) Modeling and Simulation (GIESIM)

    National Research Council Canada - National Science Library

    Bell, Paul

    2005-01-01

    ... AND S) toolkits into the Global Information Enterprise (GIE) Modeling and Simulation (GIESim) framework to create effective user analysis of candidate communications architectures and technologies...

  14. Metrology's role in quality assurance

    International Nuclear Information System (INIS)

    Zeederberg, L.B.

    1982-01-01

    Metrology, the science of measurement, is playing an increasing role in modern industry as part of an on-going quality assurance programme. At Escom, quality assurance was critical during the construction of the Koeberg nuclear facility, and also a function in controlling services provided by Escom. This article deals with the role metrology plays in quality assurance

  15. Accurate model of photon beams as a tool for commissioning and quality assurance of treatment planning calculations

    International Nuclear Information System (INIS)

    Linares Rosales, Haydee M.; Lara Mas, Elier; Alfonso Laguardia, Rodolfo

    2015-01-01

    Simulation of a linear accelerator (linac) head requires determining the parameters that characterize the primary electron beam striking on the target which is a step that plays a vital role in the accuracy of Monte Carlo calculations. In this work, the commissioning of photon beams (6 MV and 15 MV) of an Elekta Precise accelerator, using the Monte Carlo code EGSnrc, was performed. The influence of the primary electron beam characteristics on the absorbed dose distribution for two photon qualities was studied. Using different combinations of mean energy and radial FWHM of the primary electron beam, deposited doses were calculated in a water phantom, for different field sizes. Based on the deposited dose in the phantom, depth dose curves and lateral dose profiles were constructed and compared with experimental values measured in an arrangement similar to the simulation. Taking into account the main differences between calculations and measurements, an acceptability criteria based on confidence limits was implemented. As expected, the lateral dose profiles for small field sizes were strongly influenced by the radial distribution (FWHM). The combinations of energy/FWHM that best reproduced the experimental results were used to generate the phase spaces, in order to obtain a model with the motorized wedge included and to calculate output factors. A good agreement was obtained between simulations and measurements for a wide range of fi eld sizes, being all the results found within the range of tolerance. (author)

  16. The Significance of Quality Assurance within Model Intercomparison Projects at the World Data Centre for Climate (WDCC)

    Science.gov (United States)

    Toussaint, F.; Hoeck, H.; Stockhause, M.; Lautenschlager, M.

    2014-12-01

    The classical goals of a quality assessment system in the data life cycle are (1) to encourage data creators to improve their quality assessment procedures to reach the next quality level and (2) enable data consumers to decide, whether a dataset has a quality that is sufficient for usage in the target application, i.e. to appraise the data usability for their own purpose.As the data volumes of projects and the interdisciplinarity of data usage grow, the need for homogeneous structure and standardised notation of data and metadata increases. This third aspect is especially valid for the data repositories, as they manage data through machine agents. So checks for homogeneity and consistency in early parts of the workflow become essential to cope with today's data volumes.Selected parts of the workflow in the model intercomparison project CMIP5 and the archival of the data for the interdiscipliary user community of the IPCC-DDC AR5 and the associated quality checks are reviewed. We compare data and metadata checks and relate different types of checks to their positions in the data life cycle.The project's data citation approach is included in the discussion, with focus on temporal aspects of the time necessary to comply with the project's requirements for formal data citations and the demand for the availability of such data citations.In order to make different quality assessments of projects comparable, WDCC developed a generic Quality Assessment System. Based on the self-assessment approach of a maturity matrix, an objective and uniform quality level system for all data at WDCC is derived which consists of five maturity quality levels.

  17. Information Theoretic Tools for Parameter Fitting in Coarse Grained Models

    KAUST Repository

    Kalligiannaki, Evangelia; Harmandaris, Vagelis; Katsoulakis, Markos A.; Plechac, Petr

    2015-01-01

    We study the application of information theoretic tools for model reduction in the case of systems driven by stochastic dynamics out of equilibrium. The model/dimension reduction is considered by proposing parametrized coarse grained dynamics

  18. Building a world class information security governance model

    CSIR Research Space (South Africa)

    Lessing, M

    2008-05-01

    Full Text Available practice documents. The resulting model covers all the relevant aspects on strategic, management and technical level when implemented altogether. This model includes the related aspects of Corporate Governance, Information Technology Governance...

  19. Grid Technology and Quality Assurance

    International Nuclear Information System (INIS)

    Rippa, A.; Manieri, A.; Begin, M.E.; Di Meglio, A.

    2007-01-01

    Grid is one of the potential architectures of the coming years to support both the research and the commercial environment. Quality assurance techniques need both to adapt to these new architectures and exploit them to improve its effectiveness. Software quality is a key issue in the Digital Era: Industries as well as Public Administrations devote time to check and verify the quality of ICT products and services supplied. The definition of automatic measurement of quality metrics is a key point for implementing effective QA methods. In this paper we propose a quality certification model, named Grid-based Quality Certification Model (GQCM), that uses automatically calculable metrics to asses the quality of software applications; this model has been developed within the ETICS SSA4 activities and exploit grid technology for full automation of metrics calculation. It is however designed to be generic enough such that it can be implemented using any automatic build and test tool. (Author)

  20. Quality assurance in microbiology

    OpenAIRE

    Arora D

    2004-01-01

    Quality assurance (QA) is the total process whereby the quality of laboratory reports can be guaranteed. The term quality control covers that part of QA, which primarily concerns the control of errors in the performance of tests and verification of test results. All materials, equipment and procedures must be adequately controlled. Culture media must be tested for sterility and performance. Each laboratory must have standard operating procedures (SOPs). QA of pre-analytical, analytical and po...

  1. Introduction to quality assurance

    International Nuclear Information System (INIS)

    Raisic, N.

    1980-01-01

    Safety requirements set forth in the regulatory requirement, codes, standards as well as other requirements for various aspects of nuclear power plant design and operation are strictly implemented through QA activities. The overall QA aim is to assure that the plant is soundly and correctly designed and that it is built, tested and operated in accordance with stringent quality standards and conservative engineering practices. In this way a high degree of freedom from faults and errors can be achieved. (orig.)

  2. Quality assurance in radiotherapy

    International Nuclear Information System (INIS)

    2003-03-01

    Good radiotherapy results and safety of treatment require the radiation to be optimally applied to a specified target area and the correct dose. According to international recommendations, the average uncertainty in therapeutic dose should not exceed 5%. The need for high precision in therapeutic dose requires quality assurance covering the entire radiotherapy process. Besides the physical and technical characteristics of the therapy equipment, quality assurance must include all radiotherapy equipment and procedures that are significant for the correct magnitude and precision of application of the therapeutic dose. The duties and responsibilities pertaining to various stages of treatment must also be precisely defined. These requirements may be best implemented through a quality system. The general requirements for supervision and quality assurance of medical radiation apparatus are prescribed in section 40 of the Radiation Act (592/1991, amendment 1142/1998) and in sections 18 and 32 of the Decree of the Ministry of Social Affairs and Health on the medical use of radiation (423/2000). Guide ST 2.2 imposes requirements on structural radiation shielding of radiotherapy equipment and the premises in which it is used, and on warning and safety arrangements. Guide ST 1.1 sets out the general safety principles for radiation practices and regulatory control procedure for the use of radiation. Guide ST 1.6 provides general requirements for operational measures in the use of radiation. This Guide sets out the duties of responsible parties (the party running a radiation practice) in respect of arranging and maintaining radiotherapy quality assurance. The principles set out in this Guide and Guide ST 6.3 may be applied to radionuclide therapy

  3. High-Assurance Spiral

    Science.gov (United States)

    2017-11-01

    HIGH-ASSURANCE SPIRAL CARNEGIE MELLON UNIVERSITY NOVEMBER 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED STINFO...MU 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15217 8. PERFORMING ORGANIZATION...Approved for Public Release; Distribution Unlimited. Carnegie Mellon Carnegie Mellon HA SPIRAL Code Synthesis KeYmaera X Hybrid Theorem Prover

  4. Software Quality Assurance Metrics

    Science.gov (United States)

    McRae, Kalindra A.

    2004-01-01

    Software Quality Assurance (SQA) is a planned and systematic set of activities that ensures conformance of software life cycle processes and products conform to requirements, standards and procedures. In software development, software quality means meeting requirements and a degree of excellence and refinement of a project or product. Software Quality is a set of attributes of a software product by which its quality is described and evaluated. The set of attributes includes functionality, reliability, usability, efficiency, maintainability, and portability. Software Metrics help us understand the technical process that is used to develop a product. The process is measured to improve it and the product is measured to increase quality throughout the life cycle of software. Software Metrics are measurements of the quality of software. Software is measured to indicate the quality of the product, to assess the productivity of the people who produce the product, to assess the benefits derived from new software engineering methods and tools, to form a baseline for estimation, and to help justify requests for new tools or additional training. Any part of the software development can be measured. If Software Metrics are implemented in software development, it can save time, money, and allow the organization to identify the caused of defects which have the greatest effect on software development. The summer of 2004, I worked with Cynthia Calhoun and Frank Robinson in the Software Assurance/Risk Management department. My task was to research and collect, compile, and analyze SQA Metrics that have been used in other projects that are not currently being used by the SA team and report them to the Software Assurance team to see if any metrics can be implemented in their software assurance life cycle process.

  5. Assuring Software Reliability

    Science.gov (United States)

    2014-08-01

    technologies and processes to achieve a required level of confidence that software systems and services function in the intended manner. 1.3 Security Example...that took three high-voltage lines out of service and a software fail- ure (a race condition3) that disabled the computing service that notified the... service had failed. Instead of analyzing the details of the alarm server failure, the reviewers asked why the following software assurance claim had

  6. Power transformers quality assurance

    CERN Document Server

    Dasgupta, Indrajit

    2009-01-01

    About the Book: With the view to attain higher reliability in power system operation, the quality assurance in the field of distribution and power transformers has claimed growing attention. Besides new developments in the material technology and manufacturing processes of transformers, regular diagnostic testing and maintenance of any engineering product may be ascertained by ensuring: right selection of materials and components and their quality checks. application of correct manufacturing processes any systems engineering. the user`s awareness towards preventive maintenance. The

  7. How Qualitative Methods Can be Used to Inform Model Development.

    Science.gov (United States)

    Husbands, Samantha; Jowett, Susan; Barton, Pelham; Coast, Joanna

    2017-06-01

    Decision-analytic models play a key role in informing healthcare resource allocation decisions. However, there are ongoing concerns with the credibility of models. Modelling methods guidance can encourage good practice within model development, but its value is dependent on its ability to address the areas that modellers find most challenging. Further, it is important that modelling methods and related guidance are continually updated in light of any new approaches that could potentially enhance model credibility. The objective of this article was to highlight the ways in which qualitative methods have been used and recommended to inform decision-analytic model development and enhance modelling practices. With reference to the literature, the article discusses two key ways in which qualitative methods can be, and have been, applied. The first approach involves using qualitative methods to understand and inform general and future processes of model development, and the second, using qualitative techniques to directly inform the development of individual models. The literature suggests that qualitative methods can improve the validity and credibility of modelling processes by providing a means to understand existing modelling approaches that identifies where problems are occurring and further guidance is needed. It can also be applied within model development to facilitate the input of experts to structural development. We recommend that current and future model development would benefit from the greater integration of qualitative methods, specifically by studying 'real' modelling processes, and by developing recommendations around how qualitative methods can be adopted within everyday modelling practice.

  8. Measurement quality assurance

    International Nuclear Information System (INIS)

    Eisenhower, E.H.

    1988-01-01

    The quality of a radiation protection program can be no better than the quality of the measurements made to support it. In many cases, that quality is unknown and is merely implied on the basis of a calibration of a measuring instrument. If that calibration is inappropriate or is performed improperly, the measurement result will be inaccurate and misleading. Assurance of measurement quality can be achieved if appropriate procedures are followed, including periodic quality control actions that demonstrate adequate performance. Several national measurement quality assurance (MQA) programs are operational or under development in specific areas. They employ secondary standards laboratories that provide a high-quality link between the National Bureau of Standards and measurements made at the field use level. The procedures followed by these secondary laboratories to achieve MQA will be described, as well as plans for similar future programs. A growing general national interest in quality assurance, combined with strong specific motivations for MQA in the area of ionizing radiation, will provide continued demand for appropriate national programs. Such programs must, however, employ procedures that are cost effective and must be developed with participation by all affected parties

  9. Helical Tomotherapy Quality Assurance

    International Nuclear Information System (INIS)

    Balog, John; Soisson, Emilie

    2008-01-01

    Helical tomotherapy uses a dynamic delivery in which the gantry, treatment couch, and multileaf collimator leaves are all in motion during treatment. This results in highly conformal radiotherapy, but the complexity of the delivery is partially hidden from the end-user because of the extensive integration and automation of the tomotherapy control systems. This presents a challenge to the medical physicist who is expected to be both a system user and an expert, capable of verifying relevant aspects of treatment delivery. A related issue is that a clinical tomotherapy planning system arrives at a customer's site already commissioned by the manufacturer, not by the clinical physicist. The clinical physicist and the manufacturer's representative verify the commissioning at the customer site before acceptance. Theoretically, treatment could begin immediately after acceptance. However, the clinical physicist is responsible for the safe and proper use of the machine. In addition, the therapists and radiation oncologists need to understand the important machine characteristics before treatment can proceed. Typically, treatment begins about 2 weeks after acceptance. This report presents an overview of the tomotherapy system. Helical tomotherapy has unique dosimetry characteristics, and some of those features are emphasized. The integrated treatment planning, delivery, and patient-plan quality assurance process is described. A quality assurance protocol is proposed, with an emphasis on what a clinical medical physicist could and should check. Additionally, aspects of a tomotherapy quality assurance program that could be checked automatically and remotely because of its inherent imaging system and integrated database are discussed

  10. Specified assurance level sampling procedure

    International Nuclear Information System (INIS)

    Willner, O.

    1980-11-01

    In the nuclear industry design specifications for certain quality characteristics require that the final product be inspected by a sampling plan which can demonstrate product conformance to stated assurance levels. The Specified Assurance Level (SAL) Sampling Procedure has been developed to permit the direct selection of attribute sampling plans which can meet commonly used assurance levels. The SAL procedure contains sampling plans which yield the minimum sample size at stated assurance levels. The SAL procedure also provides sampling plans with acceptance numbers ranging from 0 to 10, thus, making available to the user a wide choice of plans all designed to comply with a stated assurance level

  11. Automating linear accelerator quality assurance.

    Science.gov (United States)

    Eckhause, Tobias; Al-Hallaq, Hania; Ritter, Timothy; DeMarco, John; Farrey, Karl; Pawlicki, Todd; Kim, Gwe-Ya; Popple, Richard; Sharma, Vijeshwar; Perez, Mario; Park, SungYong; Booth, Jeremy T; Thorwarth, Ryan; Moran, Jean M

    2015-10-01

    The purpose of this study was 2-fold. One purpose was to develop an automated, streamlined quality assurance (QA) program for use by multiple centers. The second purpose was to evaluate machine performance over time for multiple centers using linear accelerator (Linac) log files and electronic portal images. The authors sought to evaluate variations in Linac performance to establish as a reference for other centers. The authors developed analytical software tools for a QA program using both log files and electronic portal imaging device (EPID) measurements. The first tool is a general analysis tool which can read and visually represent data in the log file. This tool, which can be used to automatically analyze patient treatment or QA log files, examines the files for Linac deviations which exceed thresholds. The second set of tools consists of a test suite of QA fields, a standard phantom, and software to collect information from the log files on deviations from the expected values. The test suite was designed to focus on the mechanical tests of the Linac to include jaw, MLC, and collimator positions during static, IMRT, and volumetric modulated arc therapy delivery. A consortium of eight institutions delivered the test suite at monthly or weekly intervals on each Linac using a standard phantom. The behavior of various components was analyzed for eight TrueBeam Linacs. For the EPID and trajectory log file analysis, all observed deviations which exceeded established thresholds for Linac behavior resulted in a beam hold off. In the absence of an interlock-triggering event, the maximum observed log file deviations between the expected and actual component positions (such as MLC leaves) varied from less than 1% to 26% of published tolerance thresholds. The maximum and standard deviations of the variations due to gantry sag, collimator angle, jaw position, and MLC positions are presented. Gantry sag among Linacs was 0.336 ± 0.072 mm. The standard deviation in MLC

  12. Risk Monitoring through Traceability Information Model

    OpenAIRE

    Juan P. Zamora; Wilson Adarme; Laura Palacios

    2012-01-01

    This paper shows a traceability framework for supply risk monitoring, beginning with the identification, analysis, and evaluation of the supply chain risk and focusing on the supply operations of the Health Care Institutions with oncology services in Bogota, Colombia. It includes a brief presentation of the state of the art of the Supply Chain Risk Management and traceability systems in logistics operations, and it concludes with the methodology to integrate the SCRM model with the traceabili...

  13. Sustainability Product Properties in Building Information Models

    Science.gov (United States)

    2012-09-01

    preferred car- pool parking spots, preferred low-emitting/fuel-efficient vehicle parking spots, bike racks and telecommuting as options to promote good...most part, these have not been in a computable form. Fallon then stressed the importance of a common conceptual framework, using the IFC model...organizations would be formed with the help of Mr. Kalin. He stressed the goal of the project was to create templates that would be free to use

  14. Translating building information modeling to building energy modeling using model view definition.

    Science.gov (United States)

    Jeong, WoonSeong; Kim, Jong Bum; Clayton, Mark J; Haberl, Jeff S; Yan, Wei

    2014-01-01

    This paper presents a new approach to translate between Building Information Modeling (BIM) and Building Energy Modeling (BEM) that uses Modelica, an object-oriented declarative, equation-based simulation environment. The approach (BIM2BEM) has been developed using a data modeling method to enable seamless model translations of building geometry, materials, and topology. Using data modeling, we created a Model View Definition (MVD) consisting of a process model and a class diagram. The process model demonstrates object-mapping between BIM and Modelica-based BEM (ModelicaBEM) and facilitates the definition of required information during model translations. The class diagram represents the information and object relationships to produce a class package intermediate between the BIM and BEM. The implementation of the intermediate class package enables system interface (Revit2Modelica) development for automatic BIM data translation into ModelicaBEM. In order to demonstrate and validate our approach, simulation result comparisons have been conducted via three test cases using (1) the BIM-based Modelica models generated from Revit2Modelica and (2) BEM models manually created using LBNL Modelica Buildings library. Our implementation shows that BIM2BEM (1) enables BIM models to be translated into ModelicaBEM models, (2) enables system interface development based on the MVD for thermal simulation, and (3) facilitates the reuse of original BIM data into building energy simulation without an import/export process.

  15. Translating Building Information Modeling to Building Energy Modeling Using Model View Definition

    Directory of Open Access Journals (Sweden)

    WoonSeong Jeong

    2014-01-01

    Full Text Available This paper presents a new approach to translate between Building Information Modeling (BIM and Building Energy Modeling (BEM that uses Modelica, an object-oriented declarative, equation-based simulation environment. The approach (BIM2BEM has been developed using a data modeling method to enable seamless model translations of building geometry, materials, and topology. Using data modeling, we created a Model View Definition (MVD consisting of a process model and a class diagram. The process model demonstrates object-mapping between BIM and Modelica-based BEM (ModelicaBEM and facilitates the definition of required information during model translations. The class diagram represents the information and object relationships to produce a class package intermediate between the BIM and BEM. The implementation of the intermediate class package enables system interface (Revit2Modelica development for automatic BIM data translation into ModelicaBEM. In order to demonstrate and validate our approach, simulation result comparisons have been conducted via three test cases using (1 the BIM-based Modelica models generated from Revit2Modelica and (2 BEM models manually created using LBNL Modelica Buildings library. Our implementation shows that BIM2BEM (1 enables BIM models to be translated into ModelicaBEM models, (2 enables system interface development based on the MVD for thermal simulation, and (3 facilitates the reuse of original BIM data into building energy simulation without an import/export process.

  16. Display of the information model accounting system

    Directory of Open Access Journals (Sweden)

    Matija Varga

    2011-12-01

    Full Text Available This paper presents the accounting information system in public companies, business technology matrix and data flow diagram. The paper describes the purpose and goals of the accounting process, matrix sub-process and data class. Data flow in the accounting process and the so-called general ledger module are described in detail. Activities of the financial statements and determining the financial statements of the companies are mentioned as well. It is stated how the general ledger module should function and what characteristics it must have. Line graphs will depict indicators of the company’s business success, indebtedness and company’s efficiency coefficients based on financial balance reports, and profit and loss report.

  17. Quality assurance for geologic investigations

    International Nuclear Information System (INIS)

    Delvin, W.L.; Gustafson, L.D.

    1983-01-01

    A quality assurance handbook was written to provide guidance in the application of quality assurance to geologic work activities associated with the National Waste Terminal Storage (NWTS) Program. It is intended to help geoscientists and NWTS program managers in applying quality assurance to their work activities and projects by showing how technical and quality assurance practices are integrated to provide control within those activities and projects. The use of the guidance found in this handbook should help provide consistency in the interpretation of quality assurance requirements across the various geologic activities wihtin the NWTS Program. This handbook also can assist quality assurance personnel in understanding the relationships between technical and quality assurance practices. This paper describes the handbook

  18. Quality assurance for geologic investigations

    International Nuclear Information System (INIS)

    Delvin, W.L.; Gustafson, L.D.

    1983-01-01

    A quality assurance handbook was written to provide guidance in the application of quality assurance to geologic work activities associated with the National Waste Terminal Storage (NWTS) Program. It is intended to help geoscientists and NWTS program managers in applying quality assurance to their work activitie and projects by showing how technical and quality assurance practices are integrated to provide control within those activities and projects. The use of the guidance found in this handbook should help provide consistency in the interpretation of quality assurance requirements across the various geologic activities within the NWTS Program. This handbook also can assist quality assurance personnel in understanding the relationships between technical and quality assurance practices. This paper describes the handbook

  19. Towards dynamic reference information models: Readiness for ICT mass customisation

    NARCIS (Netherlands)

    Verdouw, C.N.; Beulens, A.J.M.; Trienekens, J.H.; Verwaart, D.

    2010-01-01

    Current dynamic demand-driven networks make great demands on, in particular, the interoperability and agility of information systems. This paper investigates how reference information models can be used to meet these demands by enhancing ICT mass customisation. It was found that reference models for

  20. Model selection and inference a practical information-theoretic approach

    CERN Document Server

    Burnham, Kenneth P

    1998-01-01

    This book is unique in that it covers the philosophy of model-based data analysis and an omnibus strategy for the analysis of empirical data The book introduces information theoretic approaches and focuses critical attention on a priori modeling and the selection of a good approximating model that best represents the inference supported by the data Kullback-Leibler information represents a fundamental quantity in science and is Hirotugu Akaike's basis for model selection The maximized log-likelihood function can be bias-corrected to provide an estimate of expected, relative Kullback-Leibler information This leads to Akaike's Information Criterion (AIC) and various extensions and these are relatively simple and easy to use in practice, but little taught in statistics classes and far less understood in the applied sciences than should be the case The information theoretic approaches provide a unified and rigorous theory, an extension of likelihood theory, an important application of information theory, and are ...

  1. 222-S Laboratory Quality Assurance Plan. Revision 1

    International Nuclear Information System (INIS)

    Meznarich, H.K.

    1995-01-01

    This Quality Assurance Plan provides,quality assurance (QA) guidance, regulatory QA requirements (e.g., 10 CFR 830.120), and quality control (QC) specifications for analytical service. This document follows the U.S Department of Energy (DOE) issued Hanford Analytical Services Quality Assurance Plan (HASQAP). In addition, this document meets the objectives of the Quality Assurance Program provided in the WHC-CM-4-2, Section 2.1. Quality assurance elements required in the Guidelines and Specifications for Preparing Quality Assurance Program Plans (QAMS-004) and Interim Guidelines and Specifications for Preparing Quality Assurance Project Plans (QAMS-005) from the US Environmental Protection Agency (EPA) are covered throughout this document. A quality assurance index is provided in the Appendix A. This document also provides and/or identifies the procedural information that governs laboratory operations. The personnel of the 222-S Laboratory and the Standards Laboratory including managers, analysts, QA/QC staff, auditors, and support staff shall use this document as guidance and instructions for their operational and quality assurance activities. Other organizations that conduct activities described in this document for the 222-S Laboratory shall follow this QA/QC document

  2. The quality assurance liaison: Combined technical and quality assurance support

    International Nuclear Information System (INIS)

    Bolivar, S.L.; Day, J.L.

    1993-01-01

    This paper describes the role of the quality assurance liaison, the responsibilities of this position, and the evolutionary changes in duties over the last six years. The role of the quality assurance liaison has had a very positive impact on the Los Alamos Yucca Mountain Site Characterization (YW) quality assurance program. Having both technical and quality assurance expertise, the quality assurance liaisons are able to facilitate communications with scientists on quality assurance issues and requirements, thereby generating greater productivity in scientific investigations. The quality assurance liaisons help ensure that the scientific community knows and implements existing requirements, is aware of new or changing regulations, and is able to conduct scientific work within Project requirements. The influence of the role of the quality assurance liaison can be measured by an overall improvement in attitude of the staff regarding quality assurance requirements and improved job performance, as well as a decrease in deficiencies identified during both internal and external audits and surveillances. This has resulted in a more effective implementation of quality assurance requirements

  3. Building Information Modeling for Managing Design and Construction

    DEFF Research Database (Denmark)

    Berard, Ole Bengt

    outcome of construction work. Even though contractors regularly encounter design information problems, these issues are accepted as a condition of doing business and better design information has yet to be defined. Building information modeling has the inherent promise of improving the quality of design...... information for work tasks. * Amount of Information – the number of documents and files, and other media, should be appropriate for the scope. The criteria were identified by empirical studies and theory on information quality in the architectural, engineering and construction (AEC) industry and other fields......Contractors planning and executing construction work encounter many kinds of problems with design information, such as uncoordinated drawings and specification, missing relevant information, and late delivery of design information. Research has shown that missing design information and unintended...

  4. The Effects of a Computer-Assisted Teaching Material, Designed According to the ASSURE Instructional Design and the ARCS Model of Motivation, on Students’ Achievement Levels in a Mathematics Lesson and Their Resulting Attitudes

    OpenAIRE

    Hilal Karakış; Ayşen Karamete; Aydın Okçu

    2016-01-01

    This study examined the effects that computer-assisted instruction had on students’ attitudes toward a mathematics lesson and toward learning mathematics with computer-assisted instruction. The computer software we used was based on the ASSURE Instructional Systems Design and the ARCS Model of Motivation, and the software was designed to teach fractions to fourth-grade students. The skill levels of these students were gauged before and after receiving the computer-assisted instruction. We str...

  5. Evaluation Model of Tea Industry Information Service Quality

    OpenAIRE

    Shi , Xiaohui; Chen , Tian’en

    2015-01-01

    International audience; According to characteristics of tea industry information service, this paper have built service quality evaluation index system for tea industry information service quality, R-cluster analysis and multiple regression have been comprehensively used to contribute evaluation model with a high practice and credibility. Proved by the experiment, the evaluation model of information service quality has a good precision, which has guidance significance to a certain extent to e...

  6. A generalized model via random walks for information filtering

    International Nuclear Information System (INIS)

    Ren, Zhuo-Ming; Kong, Yixiu; Shang, Ming-Sheng; Zhang, Yi-Cheng

    2016-01-01

    There could exist a simple general mechanism lurking beneath collaborative filtering and interdisciplinary physics approaches which have been successfully applied to online E-commerce platforms. Motivated by this idea, we propose a generalized model employing the dynamics of the random walk in the bipartite networks. Taking into account the degree information, the proposed generalized model could deduce the collaborative filtering, interdisciplinary physics approaches and even the enormous expansion of them. Furthermore, we analyze the generalized model with single and hybrid of degree information on the process of random walk in bipartite networks, and propose a possible strategy by using the hybrid degree information for different popular objects to toward promising precision of the recommendation. - Highlights: • We propose a generalized recommendation model employing the random walk dynamics. • The proposed model with single and hybrid of degree information is analyzed. • A strategy with the hybrid degree information improves precision of recommendation.

  7. A generalized model via random walks for information filtering

    Energy Technology Data Exchange (ETDEWEB)

    Ren, Zhuo-Ming, E-mail: zhuomingren@gmail.com [Department of Physics, University of Fribourg, Chemin du Musée 3, CH-1700, Fribourg (Switzerland); Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences, ChongQing, 400714 (China); Kong, Yixiu [Department of Physics, University of Fribourg, Chemin du Musée 3, CH-1700, Fribourg (Switzerland); Shang, Ming-Sheng, E-mail: msshang@cigit.ac.cn [Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences, ChongQing, 400714 (China); Zhang, Yi-Cheng [Department of Physics, University of Fribourg, Chemin du Musée 3, CH-1700, Fribourg (Switzerland)

    2016-08-06

    There could exist a simple general mechanism lurking beneath collaborative filtering and interdisciplinary physics approaches which have been successfully applied to online E-commerce platforms. Motivated by this idea, we propose a generalized model employing the dynamics of the random walk in the bipartite networks. Taking into account the degree information, the proposed generalized model could deduce the collaborative filtering, interdisciplinary physics approaches and even the enormous expansion of them. Furthermore, we analyze the generalized model with single and hybrid of degree information on the process of random walk in bipartite networks, and propose a possible strategy by using the hybrid degree information for different popular objects to toward promising precision of the recommendation. - Highlights: • We propose a generalized recommendation model employing the random walk dynamics. • The proposed model with single and hybrid of degree information is analyzed. • A strategy with the hybrid degree information improves precision of recommendation.

  8. Levy Random Bridges and the Modelling of Financial Information

    OpenAIRE

    Hoyle, Edward; Hughston, Lane P.; Macrina, Andrea

    2009-01-01

    The information-based asset-pricing framework of Brody, Hughston and Macrina (BHM) is extended to include a wider class of models for market information. In the BHM framework, each asset is associated with a collection of random cash flows. The price of the asset is the sum of the discounted conditional expectations of the cash flows. The conditional expectations are taken with respect to a filtration generated by a set of "information processes". The information processes carry imperfect inf...

  9. MAGIC: Model and Graphic Information Converter

    Science.gov (United States)

    Herbert, W. C.

    2009-01-01

    MAGIC is a software tool capable of converting highly detailed 3D models from an open, standard format, VRML 2.0/97, into the proprietary DTS file format used by the Torque Game Engine from GarageGames. MAGIC is used to convert 3D simulations from authoritative sources into the data needed to run the simulations in NASA's Distributed Observer Network. The Distributed Observer Network (DON) is a simulation presentation tool built by NASA to facilitate the simulation sharing requirements of the Data Presentation and Visualization effort within the Constellation Program. DON is built on top of the Torque Game Engine (TGE) and has chosen TGE's Dynamix Three Space (DTS) file format to represent 3D objects within simulations.

  10. Building Information Modelling in Denmark and Iceland

    DEFF Research Database (Denmark)

    Jensen, Per Anker; Jóhannesson, Elvar Ingi

    2013-01-01

    with BIM is studied. Based on findings from both parts, ideas and recommendations are put forward for the Icelandic building industry about feasible ways of implementing BIM. Findings – Among the results are that the use of BIM is very limited in the Icelandic companies compared to the other Nordic...... for making standards and guidelines related to BIM. Public building clients are also encouraged to consider initiating projects based on making simple building models of existing buildings in order to introduce the BIM technology to the industry. Icelandic companies are recommended to start implementing BIM...... countries. Research limitations/implications – The research is limited to the Nordic countries in Europe, but many recommendations could be relevant to other countries. Practical implications – It is recommended to the Icelandic building authorities to get into cooperation with their Nordic counterparts...

  11. Assuring quality in high-consequence engineering

    Energy Technology Data Exchange (ETDEWEB)

    Hoover, Marcey L.; Kolb, Rachel R.

    2014-03-01

    In high-consequence engineering organizations, such as Sandia, quality assurance may be heavily dependent on staff competency. Competency-dependent quality assurance models are at risk when the environment changes, as it has with increasing attrition rates, budget and schedule cuts, and competing program priorities. Risks in Sandia's competency-dependent culture can be mitigated through changes to hiring, training, and customer engagement approaches to manage people, partners, and products. Sandia's technical quality engineering organization has been able to mitigate corporate-level risks by driving changes that benefit all departments, and in doing so has assured Sandia's commitment to excellence in high-consequence engineering and national service.

  12. Quality Assurance in Higher Education: A Review of Literature

    Science.gov (United States)

    Ryan, Tricia

    2015-01-01

    This paper examines the literature surrounding quality assurance in global higher education. It provides an overview of accreditation as a mechanism to ensure quality in higher education, examines models of QA, and explores the concept of quality (including definitions of quality and quality assurance). In addition, this paper provides a review of…

  13. THE MODEL FOR RISK ASSESSMENT ERP-SYSTEMS INFORMATION SECURITY

    Directory of Open Access Journals (Sweden)

    V. S. Oladko

    2016-12-01

    Full Text Available The article deals with the problem assessment of information security risks in the ERP-system. ERP-system functions and architecture are studied. The model malicious impacts on levels of ERP-system architecture are composed. Model-based risk assessment, which is the quantitative and qualitative approach to risk assessment, built on the partial unification 3 methods for studying the risks of information security - security models with full overlapping technique CRAMM and FRAP techniques developed.

  14. Quality Assurance in University Guidance Services

    Science.gov (United States)

    Simon, Alexandra

    2014-01-01

    In Europe there is no common quality assurance framework for the delivery of guidance in higher education. Using a case study approach in four university career guidance services in England, France and Spain, this article aims to study how quality is implemented in university career guidance services in terms of strategy, standards and models,…

  15. Nursing Quality Assurance: The Wisconsin System

    Science.gov (United States)

    Hover, Julie; Zimmer, Marie J.

    1978-01-01

    Evaluation model guidelines for hospital departments of nursing to use in their nursing quality assurance programs are presented as developed in Wisconsin. Four essential components of the Wisconsin outcome evaluation system are criteria, assessment, standards, and improvement of care. Sample tests and charts are included in the article. (MF)

  16. MCNP trademark Software Quality Assurance plan

    International Nuclear Information System (INIS)

    Abhold, H.M.; Hendricks, J.S.

    1996-04-01

    MCNP is a computer code that models the interaction of radiation with matter. MCNP is developed and maintained by the Transport Methods Group (XTM) of the Los Alamos National Laboratory (LANL). This plan describes the Software Quality Assurance (SQA) program applied to the code. The SQA program is consistent with the requirements of IEEE-730.1 and the guiding principles of ISO 900

  17. Quality Assurance in Distance and Open Learning

    Science.gov (United States)

    Mahafzah, Mohammed Hasan

    2012-01-01

    E-learning has become an increasingly important teaching and learning mode in educational institutions and corporate training. The evaluation of E-learning, however, is essential for the quality assurance of E-learning courses. This paper constructs a three-phase evaluation model for E-learning courses, which includes development, process, and…

  18. Opinion of gastroenterologists towards quality assurance in endoscopy.

    Science.gov (United States)

    de Jonge, Vincent; Kuipers, Ernst J; van Leerdam, Monique E

    2011-03-01

    Quality assurance has become an important issue. Many societies are adopting quality assurance programs in order to monitor and improve quality of care. To assess the opinion of gastroenterologists towards quality assurance on the endoscopy department. A survey was sent to all gastroenterologists (n=319) in the Netherlands. It assessed their opinion on a quality assurance program for endoscopy units, including its design, logistics, and content. 200 gastroenterologists (63%) completed the questionnaire. 95% had a positive opinion towards quality assurance and 67% supposed an increase in quality. 28% assumed a negative impact on the time available for patient contact by introducing a quality assurance program and 35% that the capacity would decrease. A negative attitude towards disclosure of results to insurance companies (23%) and media (53%) was reported. Female gastroenterologists were less positive to share the results with other stakeholders (pquality measurements were assessment of complications (97%), standardised reporting (96%), and adequate patient information (95%). Gastroenterologists have a positive attitude towards quality assurance. However, concerns do exist about time investment and disclosure of results to others. Information provision and procedure characteristics were considered the most important aspects of quality assurance. Copyright © 2010 Editrice Gastroenterologica Italiana S.r.l. Published by Elsevier Ltd. All rights reserved.

  19. Agricultural information dissemination using ICTs: A review and analysis of information dissemination models in China

    Directory of Open Access Journals (Sweden)

    Yun Zhang

    2016-03-01

    Full Text Available Over the last three decades, China’s agriculture sector has been transformed from the traditional to modern practice through the effective deployment of Information and Communication Technologies (ICTs. Information processing and dissemination have played a critical role in this transformation process. Many studies in relation to agriculture information services have been conducted in China, but few of them have attempted to provide a comprehensive review and analysis of different information dissemination models and their applications. This paper aims to review and identify the ICT based information dissemination models in China and to share the knowledge and experience in applying emerging ICTs in disseminating agriculture information to farmers and farm communities to improve productivity and economic, social and environmental sustainability. The paper reviews and analyzes the development stages of China’s agricultural information dissemination systems and different mechanisms for agricultural information service development and operations. Seven ICT-based information dissemination models are identified and discussed. Success cases are presented. The findings provide a useful direction for researchers and practitioners in developing future ICT based information dissemination systems. It is hoped that this paper will also help other developing countries to learn from China’s experience and best practice in their endeavor of applying emerging ICTs in agriculture information dissemination and knowledge transfer.

  20. An information spreading model based on online social networks

    Science.gov (United States)

    Wang, Tao; He, Juanjuan; Wang, Xiaoxia

    2018-01-01

    Online social platforms are very popular in recent years. In addition to spreading information, users could review or collect information on online social platforms. According to the information spreading rules of online social network, a new information spreading model, namely IRCSS model, is proposed in this paper. It includes sharing mechanism, reviewing mechanism, collecting mechanism and stifling mechanism. Mean-field equations are derived to describe the dynamics of the IRCSS model. Moreover, the steady states of reviewers, collectors and stiflers and the effects of parameters on the peak values of reviewers, collectors and sharers are analyzed. Finally, numerical simulations are performed on different networks. Results show that collecting mechanism and reviewing mechanism, as well as the connectivity of the network, make information travel wider and faster, and compared to WS network and ER network, the speed of reviewing, sharing and collecting information is fastest on BA network.

  1. A simplified computational memory model from information processing

    Science.gov (United States)

    Zhang, Lanhua; Zhang, Dongsheng; Deng, Yuqin; Ding, Xiaoqian; Wang, Yan; Tang, Yiyuan; Sun, Baoliang

    2016-01-01

    This paper is intended to propose a computational model for memory from the view of information processing. The model, called simplified memory information retrieval network (SMIRN), is a bi-modular hierarchical functional memory network by abstracting memory function and simulating memory information processing. At first meta-memory is defined to express the neuron or brain cortices based on the biology and graph theories, and we develop an intra-modular network with the modeling algorithm by mapping the node and edge, and then the bi-modular network is delineated with intra-modular and inter-modular. At last a polynomial retrieval algorithm is introduced. In this paper we simulate the memory phenomena and functions of memorization and strengthening by information processing algorithms. The theoretical analysis and the simulation results show that the model is in accordance with the memory phenomena from information processing view. PMID:27876847

  2. A simplified computational memory model from information processing.

    Science.gov (United States)

    Zhang, Lanhua; Zhang, Dongsheng; Deng, Yuqin; Ding, Xiaoqian; Wang, Yan; Tang, Yiyuan; Sun, Baoliang

    2016-11-23

    This paper is intended to propose a computational model for memory from the view of information processing. The model, called simplified memory information retrieval network (SMIRN), is a bi-modular hierarchical functional memory network by abstracting memory function and simulating memory information processing. At first meta-memory is defined to express the neuron or brain cortices based on the biology and graph theories, and we develop an intra-modular network with the modeling algorithm by mapping the node and edge, and then the bi-modular network is delineated with intra-modular and inter-modular. At last a polynomial retrieval algorithm is introduced. In this paper we simulate the memory phenomena and functions of memorization and strengthening by information processing algorithms. The theoretical analysis and the simulation results show that the model is in accordance with the memory phenomena from information processing view.

  3. User-Oriented and Cognitive Models of Information Retrieval

    DEFF Research Database (Denmark)

    Skov, Mette; Järvelin, Kalervo; Ingwersen, Peter

    2018-01-01

    The domain of user-oriented and cognitive information retrieval (IR) is first discussed, followed by a discussion on the dimensions and types of models one may build for the domain. The focus of the present entry is on the models of user-oriented and cognitive IR, not on their empirical...... applications. Several models with different emphases on user-oriented and cognitive IR are presented—ranging from overall approaches and relevance models to procedural models, cognitive models, and task-based models. The present entry does not discuss empirical findings based on the models....

  4. Hyperthermia quality assurance

    International Nuclear Information System (INIS)

    Shrivastava, P.N.; Paliwal, B.R.

    1984-01-01

    Hyperthermia Physics Center (HPC) operating under contract with the National Cancer Institute is developing a Quality Assurance program for local and regional hyperthermia. The major clinical problem in hyperthermia treatments is that they are extremely difficult to plan, execute, monitor and reproduce. A scientific basis for treatment planning can be established only after ensuring that the performance of heat generating and temperature monitoring systems are reliable. The HPC is presently concentrating on providing uniform NBS traceable calibration of thermometers and evaluation of reproducibility for power generator operation, applicator performance, phanta compositions, system calibrations and personnel shielding. The organizational plan together with recommended evaluation measurements, procedures and criteria are presented

  5. How much quality assurance?

    International Nuclear Information System (INIS)

    Beatty, R.A.; Talboy, J.H.

    1988-01-01

    This paper describes the approach used at Argonne National Laboratory to apply the techniques of quality assurance to research and development activities. The discussion includes the approach, the reasons that it is gaining acceptance, and its wide applicability. This approach is founded on the lessons learned in management of quality at Argonne National Laboratory over a period of more than 15 years. The discussion is confined to the practices at the Illinois site of the Laboratory where more than 3000 researchers and support personnel conduct basic and technology-directed research

  6. Quality assurance services

    International Nuclear Information System (INIS)

    For over 20 years the quality assurance services at the Springfields Laboratories have been concerned with manufacturing both simple and complex engineering products to the highest standard. The scientists working there have considerable expertise in the practical application of quality control and the development and design of inspection and non-destructive testing equipment. The folder contains six sheets or leaflets illustrating the work and equipment. The subjects are the mechanical standards laboratory, non-destructive testing, the digitising table, the peripheral camera, automated measurement, data handling and presentation, and the computer controlled three axis co-ordinate measuring machine. (U.K.)

  7. Reactor system safety assurance

    International Nuclear Information System (INIS)

    Mattson, R.J.

    1984-01-01

    The philosophy of reactor safety is that design should follow established and conservative engineering practices, there should be safety margins in all modes of plant operation, special systems should be provided for accidents, and safety systems should have redundant components. This philosophy provides ''defense in depth.'' Additionally, the safety of nuclear power plants relies on ''safety systems'' to assure acceptable response to design basis events. Operating experience has shown the need to study plant response to more frequent upset conditions and to account for the influence of operators and non-safety systems on overall performance. Defense in depth is being supplemented by risk and reliability assessment

  8. Quality assurance program

    International Nuclear Information System (INIS)

    1977-07-01

    This topical report describes the Gibbs and Hill Quality Assurance Program and sets forth the methods to be followed in controlling quality-related activities performed by Gibbs and Hill and its contractors. The program is based on company experience in nuclear power and related work, and defines a system found effective in providing independent control of quality-related functions and documentation. The scope of the report covers activities involving nuclear safety-related structures, systems, and components covered by Gibbs and Hill' contractual obligation to the Utility Owner for each project

  9. BWR internals life assurance

    International Nuclear Information System (INIS)

    Herrera, M.L.; Stancavage, P.P.

    1988-01-01

    Boiling water reactor (BWR) internal components play an important role in power plant life extension. Many important internals were not designed for easy removal and changes in material properties and local environmental effects due to high radiation makes stress corrosion cracking more likely and more difficult to correct. Over the past several years, operating experience has shown that inspection, monitoring and refurbishment can be accomplished for internal structures with existing technology. In addition, mitigation techniques which address the causes of degradation are available to assure that life extension targets can be met. This paper describes the many considerations and aspects when evaluating life extension for reactor vessel internals

  10. High resolution reservoir geological modelling using outcrop information

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Changmin; Lin Kexiang; Liu Huaibo [Jianghan Petroleum Institute, Hubei (China)] [and others

    1997-08-01

    This is China`s first case study of high resolution reservoir geological modelling using outcrop information. The key of the modelling process is to build a prototype model and using the model as a geological knowledge bank. Outcrop information used in geological modelling including seven aspects: (1) Determining the reservoir framework pattern by sedimentary depositional system and facies analysis; (2) Horizontal correlation based on the lower and higher stand duration of the paleo-lake level; (3) Determining the model`s direction based on the paleocurrent statistics; (4) Estimating the sandbody communication by photomosaic and profiles; (6) Estimating reservoir properties distribution within sandbody by lithofacies analysis; and (7) Building the reservoir model in sandbody scale by architectural element analysis and 3-D sampling. A high resolution reservoir geological model of Youshashan oil field has been built by using this method.

  11. SU-F-T-276: Source Modeling and VMAT Quality Assurance Referring to the TrueBeam Representative Beam Data for Eclipse

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Q [Beijing Hospital, Beijing (China)

    2016-06-15

    Purpose: To study quality assurance (QA) of volumetric modulated arc therapy (VMAT) after the 6MV and 10MV photon beam source modeling, referring to the Varian TrueBeam representative beam data for Eclipse. Methods: The source model needs specific measured beam data, such as PDDs and profiles, diagonal profile, output factors (OFs), and MLC transmission factor (TF) and dosimetric leaf gap (DLG), et al. We downloaded the representative data from myVarian website, which includes TrueBeam 4MV-15MV photon beam data and 6MeV-22MeV electron beam data in w2CAD file format for use with Eclipse and in Excel spreadsheet format for use in data comparison. The beam data in W2CAD format can be imported into the Eclipse system and calibrated for use, as appropriate. We used PTW MP3 water tank to measure the beam data in some typical field sizes, and compared the measured data with the representative data. We found that the PDDs, profiles and OFs are similar. However according to some papers and our measurements, we decided that our MLC TF and DLG are 1.58 and 1.33 (6MV), 1.79 and 1.57 (10MV), respectively. After we had configured the anisotropic analytical algorithm (AAA) with the representative data in Eclipse, we also have done dosimetric verification for 88 VMAT plans. Results: The end-to-end test procedures of VMAT were performed for 6MV and 10MV energy modes. The NE Farmer ion chamber mean measurements showed 1.2% (6MV, 38 cases) and 1.2% (10MV, 50 cases) between measurement and calculation; the Sun Nuclear ArcCheck mean measurements demonstrated gamma pass rates are as followings: 98.9%, 93.2%, 61.0% for 6MV, and 98.9%, 91.9%, 59.5% for 10MV, using 3%/3mm, 2%/2mm, 1%/1mm, 10% threshold criteria, respectively. Conclusion: The representative data is applicable to our TrueBeam for the VMAT plan, though our MLC factors are a little different, and its patientspecific QA is good.

  12. Building Information Model: advantages, tools and adoption efficiency

    Science.gov (United States)

    Abakumov, R. G.; Naumov, A. E.

    2018-03-01

    The paper expands definition and essence of Building Information Modeling. It describes content and effects from application of Information Modeling at different stages of a real property item. Analysis of long-term and short-term advantages is given. The authors included an analytical review of Revit software package in comparison with Autodesk with respect to: features, advantages and disadvantages, cost and pay cutoff. A prognostic calculation is given for efficiency of adoption of the Building Information Modeling technology, with examples of its successful adoption in Russia and worldwide.

  13. End-to-end Information Flow Security Model for Software-Defined Networks

    Directory of Open Access Journals (Sweden)

    D. Ju. Chaly

    2015-01-01

    Full Text Available Software-defined networks (SDN are a novel paradigm of networking which became an enabler technology for many modern applications such as network virtualization, policy-based access control and many others. Software can provide flexibility and fast-paced innovations in the networking; however, it has a complex nature. In this connection there is an increasing necessity of means for assuring its correctness and security. Abstract models for SDN can tackle these challenges. This paper addresses to confidentiality and some integrity properties of SDNs. These are critical properties for multi-tenant SDN environments, since the network management software must ensure that no confidential data of one tenant are leaked to other tenants in spite of using the same physical infrastructure. We define a notion of end-to-end security in context of software-defined networks and propose a semantic model where the reasoning is possible about confidentiality, and we can check that confidential information flows do not interfere with non-confidential ones. We show that the model can be extended in order to reason about networks with secure and insecure links which can arise, for example, in wireless environments.The article is published in the authors’ wording.

  14. Quality assurance records system

    International Nuclear Information System (INIS)

    1979-01-01

    This Safety Guide was prepared as part of the Agency's programme, referred to as the NUSS programme, for establishing Codes of Practice and Safety Guides relating to nuclear power plants. It supplements the IAEA Code of Practice on Quality Assurance for Safety in Nuclear Power Plants (IAEA Safety Series No.50-C-QA), which requires that for each nuclear power plant a system for the generation, identification, collection, indexing, filing, storing, maintenance and disposition of quality assurance records shall be established and executed in accordance with written procedures and instructions. The purpose of this Safety Guide is to provide assistance in the establishment and operation of such a system. An orderly established and maintained records system is considered to be part of the means of providing a basis for an appropriate level of confidence that the activities which affect the quality of a nuclear power plant have been performed in accordance with the specific requirements and that the required quality has been achieved and is maintained

  15. Quality assurance and reliability

    International Nuclear Information System (INIS)

    Normand, J.; Charon, M.

    1975-01-01

    Concern for obtaining high-quality products which will function properly when required to do so is nothing new - it is one manifestation of a conscientious attitude to work. However, the complexity and cost of equipment and the consequences of even temporary immobilization are such that it has become necessary to make special arrangements for obtaining high-quality products and examining what one has obtained. Each unit within an enterprise must examine its own work or arrange for it to be examined; a unit whose specific task is quality assurance is responsible for overall checking, but does not relieve other units of their responsibility. Quality assurance is a form of mutual assistance within an enterprise, designed to remove the causes of faults as far as possible. It begins very early in a project and continues through the ordering stage, construction, start-up trials and operation. Quality and hence reliability are the direct result of what is done at all stages of a project. They depend on constant attention to detail, for even a minor piece of poor workmanship can, in the case of an essential item of equipment, give rise to serious operational difficulties

  16. Quality-Assurance Program Plan

    International Nuclear Information System (INIS)

    Kettell, R.A.

    1981-05-01

    This Quality Assurance Program Plan (QAPP) is provided to describe the Quality Assurance Program which is applied to the waste management activities conducted by AESD-Nevada Operations at the E-MAD Facility located in Area 25 of the Nevada Test Site. The AESD-Nevada Operations QAPP provides the necessary systematic and administrative controls to assure activities that affect quality, safety, reliability, and maintainability during design, procurement, fabrication, inspection, shipments, tests, and storage are conducted in accordance with established requirements

  17. Informing groundwater models with near-surface geophysical data

    DEFF Research Database (Denmark)

    Herckenrath, Daan

    Over the past decade geophysical methods have gained an increased popularity due to their ability to map hydrologic properties. Such data sets can provide valuable information to improve hydrologic models. Instead of using the measured geophysical and hydrologic data simultaneously in one inversion...... approach, many of the previous studies apply a Sequential Hydrogeophysical Inversion (SHI) in which inverted geophysical models provide information for hydrologic models. In order to fully exploit the information contained in geophysical datasets for hydrological purposes, a coupled hydrogeophysical...... inversion was introduced (CHI), in which a hydrologic model is part of the geophysical inversion. Current CHI-research has been focussing on the translation of simulated state variables of hydrologic models to geophysical model parameters. We refer to this methodology as CHI-S (State). In this thesis a new...

  18. Quality assurance of fuel elements

    International Nuclear Information System (INIS)

    Hoerber, J.

    1980-01-01

    The quality assurance activities for reactor fuel elements are based on a quality assurance system which implies the requirements resulting from the specifications, regulations of the authorities, national standards and international rules and regulations. The quality assurance related to production of reactor fuel will be shown for PWR fuel elements in all typical fabrication steps as conversion into UO 2 -powder, pelletizing, rodmanufacture and assembling. A wide range of destructive and nondestructive techniques is applied. Quality assurance is not only verified by testing techniques but also by process monitoring by means of parameter control in production and testing procedures. (RW)

  19. Approaching the Affective Factors of Information Seeking: The Viewpoint of the Information Search Process Model

    Science.gov (United States)

    Savolainen, Reijo

    2015-01-01

    Introduction: The article contributes to the conceptual studies of affective factors in information seeking by examining Kuhlthau's information search process model. Method: This random-digit dial telephone survey of 253 people (75% female) living in a rural, medically under-serviced area of Ontario, Canada, follows-up a previous interview study…

  20. Research on new information service model of the contemporary library

    International Nuclear Information System (INIS)

    Xin Pingping; Lu Yan

    2010-01-01

    According to the development of the internet and multimedia technology, the information service models in the contemporary library become both of the traditional and digital information service. The libraries in each country do their best to make the voluminous information and the complex technology be High-integrated in the background management, and also make the front interface be more and more convenient to the users. The essential characteristics of the information service of the contemporary library are all-in-one and humanness. In this article, we will describe several new hot information service models of the contemporary library in detail, such as individualized service, reference service, reference service and strategic information service. (authors)

  1. Lecturing and Loving It: Applying the Information-Processing Model.

    Science.gov (United States)

    Parker, Jonathan K.

    1993-01-01

    Discusses the benefits of lecturing, when done properly, in high schools. Describes the positive attributes of effective lecturers. Provides a human information-processing model applicable to the task of lecturing to students. (HB)

  2. A Participatory Model for Multi-Document Health Information Summarisation

    Directory of Open Access Journals (Sweden)

    Dinithi Nallaperuma

    2017-03-01

    Full Text Available Increasing availability and access to health information has been a paradigm shift in healthcare provision as it empowers both patients and practitioners alike. Besides awareness, significant time savings and process efficiencies can be achieved through effective summarisation of healthcare information. Relevance and accuracy are key concerns when generating summaries for such documents. Despite advances in automated summarisation approaches, the role of participation has not been explored. In this paper, we propose a new model for multi-document health information summarisation that takes into account the role of participation. The updated IS user participation theory was extended to explicate these roles. The proposed model integrates both extractive and abstractive summarisation processes with continuous participatory inputs to each phase. The model was implemented as a client-server application and evaluated by both domain experts and health information consumers. Results from the evaluation phase indicates the model is successful in generating relevant and accurate summaries for diverse audiences.

  3. Fisher information and quantum potential well model for finance

    Energy Technology Data Exchange (ETDEWEB)

    Nastasiuk, V.A., E-mail: nasa@i.ua

    2015-09-25

    The probability distribution function (PDF) for prices on financial markets is derived by extremization of Fisher information. It is shown how on that basis the quantum-like description for financial markets arises and different financial market models are mapped by quantum mechanical ones. - Highlights: • The financial Schrödinger equation is derived using the principle of minimum Fisher information. • Statistical models for price variation are mapped by the quantum models of coupled particle. • The model of quantum particle in parabolic potential well corresponds to Efficient market.

  4. Fisher information and quantum potential well model for finance

    International Nuclear Information System (INIS)

    Nastasiuk, V.A.

    2015-01-01

    The probability distribution function (PDF) for prices on financial markets is derived by extremization of Fisher information. It is shown how on that basis the quantum-like description for financial markets arises and different financial market models are mapped by quantum mechanical ones. - Highlights: • The financial Schrödinger equation is derived using the principle of minimum Fisher information. • Statistical models for price variation are mapped by the quantum models of coupled particle. • The model of quantum particle in parabolic potential well corresponds to Efficient market

  5. A model for information retrieval driven by conceptual spaces

    OpenAIRE

    Tanase, D.

    2015-01-01

    A retrieval model describes the transformation of a query into a set of documents. The question is: what drives this transformation? For semantic information retrieval type of models this transformation is driven by the content and structure of the semantic models. In this case, Knowledge Organization Systems (KOSs) are the semantic models that encode the meaning employed for monolingual and cross-language retrieval. The focus of this research is the relationship between these meanings’ repre...

  6. Generalisation of geographic information cartographic modelling and applications

    CERN Document Server

    Mackaness, William A; Sarjakoski, L Tiina

    2011-01-01

    Theoretical and Applied Solutions in Multi Scale MappingUsers have come to expect instant access to up-to-date geographical information, with global coverage--presented at widely varying levels of detail, as digital and paper products; customisable data that can readily combined with other geographic information. These requirements present an immense challenge to those supporting the delivery of such services (National Mapping Agencies (NMA), Government Departments, and private business. Generalisation of Geographic Information: Cartographic Modelling and Applications provides detailed review

  7. A hierarchical modeling of information seeking behavior of school ...

    African Journals Online (AJOL)

    The aim of this study was to investigate the information seeking behavior of school teachers in the public primary schools of rural areas of Nigeria and to draw up a model of their information-seeking behavior. A Cross-sectional survey design research was employed to carry out the research. Findings showed that the ...

  8. An information model of a centralized admission campaign in ...

    African Journals Online (AJOL)

    The aim of the work is to structure individual application environments of the information model of a centralized admission campaign in higher education institutions in Russia by modifying the corresponding structure of the Federal information system supporting state final examination and admission procedures. , The ...

  9. Proposing a Metaliteracy Model to Redefine Information Literacy

    Science.gov (United States)

    Jacobson, Trudi E.; Mackey, Thomas P.

    2013-01-01

    Metaliteracy is envisioned as a comprehensive model for information literacy to advance critical thinking and reflection in social media, open learning settings, and online communities. At this critical time in higher education, an expansion of the original definition of information literacy is required to include the interactive production and…

  10. Modelling of information processes management of educational complex

    Directory of Open Access Journals (Sweden)

    Оксана Николаевна Ромашкова

    2014-12-01

    Full Text Available This work concerns information model of the educational complex which includes several schools. A classification of educational complexes formed in Moscow is given. There are also a consideration of the existing organizational structure of the educational complex and a suggestion of matrix management structure. Basic management information processes of the educational complex were conceptualized.

  11. Conceptual Modeling of Events as Information Objects and Change Agents

    DEFF Research Database (Denmark)

    Bækgaard, Lars

    as a totality of an information object and a change agent. When an event is modeled as an information object it is comparable to an entity that exists only at a specific point in time. It has attributes and can be used for querying and specification of constraints. When an event is modeled as a change agent...... it is comparable to an executable transaction schema. Finally, we briefly compare our approach to object-oriented approaches based on encapsulated objects....

  12. The case of sustainability assurance: constructing a new assurance service

    NARCIS (Netherlands)

    O'Dwyer, B.

    2011-01-01

    This paper presents an in-depth longitudinal case study examining the processes through which practitioners in two Big 4 professional services firms have attempted to construct sustainability assurance (independent assurance on sustainability reports). Power’s (1996, 1997, 1999, 2003) theorization

  13. Modeling Interoperable Information Systems with 3LGM² and IHE.

    Science.gov (United States)

    Stäubert, S; Schaaf, M; Jahn, F; Brandner, R; Winter, A

    2015-01-01

    Strategic planning of information systems (IS) in healthcare requires descriptions of the current and the future IS state. Enterprise architecture planning (EAP) tools like the 3LGM² tool help to build up and to analyze IS models. A model of the planned architecture can be derived from an analysis of current state IS models. Building an interoperable IS, i. e. an IS consisting of interoperable components, can be considered a relevant strategic information management goal for many IS in healthcare. Integrating the healthcare enterprise (IHE) is an initiative which targets interoperability by using established standards. To link IHE concepts to 3LGM² concepts within the 3LGM² tool. To describe how an information manager can be supported in handling the complex IHE world and planning interoperable IS using 3LGM² models. To describe how developers or maintainers of IHE profiles can be supported by the representation of IHE concepts in 3LGM². Conceptualization and concept mapping methods are used to assign IHE concepts such as domains, integration profiles actors and transactions to the concepts of the three-layer graph-based meta-model (3LGM²). IHE concepts were successfully linked to 3LGM² concepts. An IHE-master-model, i. e. an abstract model for IHE concepts, was modeled with the help of 3LGM² tool. Two IHE domains were modeled in detail (ITI, QRPH). We describe two use cases for the representation of IHE concepts and IHE domains as 3LGM² models. Information managers can use the IHE-master-model as reference model for modeling interoperable IS based on IHE profiles during EAP activities. IHE developers are supported in analyzing consistency of IHE concepts with the help of the IHE-master-model and functions of the 3LGM² tool The complex relations between IHE concepts can be modeled by using the EAP method 3LGM². 3LGM² tool offers visualization and analysis features which are now available for the IHE-master-model. Thus information managers and IHE

  14. A Process Model for Goal-Based Information Retrieval

    Directory of Open Access Journals (Sweden)

    Harvey Hyman

    2014-12-01

    Full Text Available In this paper we examine the domain of information search and propose a "goal-based" approach to study search strategy. We describe "goal-based information search" using a framework of Knowledge Discovery. We identify two Information Retrieval (IR goals using the constructs of Knowledge Acquisition (KA and Knowledge Explanation (KE. We classify these constructs into two specific information problems: An exploration-exploitation problem and an implicit-explicit problem. Our proposed framework is an extension of prior work in this domain, applying an IR Process Model originally developed for Legal-IR and adapted to Medical-IR. The approach in this paper is guided by the recent ACM-SIG Medical Information Retrieval (MedIR Workshop definition: "methodologies and technologies that seek to improve access to medical information archives via a process of information retrieval."

  15. How informative are slip models for aftershock forecasting?

    Science.gov (United States)

    Bach, Christoph; Hainzl, Sebastian

    2013-04-01

    Coulomb stress changes (ΔCFS) have been recognized as a major trigger mechanism for earthquakes, in particular aftershock distributions and the spatial patterns of ΔCFS are often found to be correlated. However, the Coulomb stress calculations are based on slip inversions and the receiver fault mechanisms which both contain large uncertainties. In particular, slip inversions are usually non-unique and often differ strongly for the same earthquakes. Here we want to address the information content of those inversions with respect to aftershock forecasting. Therefore we compare the slip models to randomized fractal slip models which are only constrained by fault information and moment magnitude. The uncertainty of the aftershock mechanisms is considered by using many receiver fault orientations, and by calculating ΔCFS at several depth layers. The stress change is then converted into an aftershock probability map utilizing a clock advance model. To estimate the information content of the slip models, we use an Epidemic Type Aftershock Sequence (ETAS) model approach introduced by Bach and Hainzl (2012), where the spatial probability density of direct aftershocks is related to the ΔCFS calculations. Besides the directly triggered aftershocks, this approach also takes secondary aftershock triggering into account. We quantify our results by calculating the information gain of the randomized slip models relative to the corresponding published slip model. As case studies, we investigate the aftershock sequences of several well-known main shocks such as 1992 Landers, 1999 Hector Mine, 2004 Parkfield, 2002 Denali. First results show a huge difference in the information content of slip models. For some of the cases up to 90% of the random slip models are found to perform better than the originally published model, for some other cases only few random models are found performing better than the published slip model.

  16. Data retrieval systems and models of information situations

    International Nuclear Information System (INIS)

    Jankowski, L.

    1984-01-01

    Demands placed on data retrieval systems and their basic parameters are given. According to the stage of development of data collection and processing, data retrieval systems may be divided into systems for the simple recording and provision of data, systems for recording and providing data with integrated statistical functions, and logical information systems. The structure is characterized of the said information systems as are methods of processing and representation of facts. The notion is defined of ''artificial intelligence'' in the development of logical information systems. The structure of representing knowledge in diverse forms of the model is decisive in logical information systems related to nuclear research. The main model elements are the characteristics of data, forms of representation and program. In dependence on the structure of data, the structure of the preparatory and transformation algorithms and on the aim of the system it is possible to classify data retrieval systems related to nuclear research and technology into five logical information models: linear, identification, advisory, theory-experiment models and problem solving models. The characteristics are given of the said models and examples of data retrieval systems for the individual models. (E.S.)

  17. FESA Quality Assurance

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    FESA is a framework used by 100+ developers at CERN to design and implement the real-time software used to control the accelerators. Each new version must be tested and qualified to ensure that no backward compatibility issues have been introduced and that there is no major bug which might prevent accelerator operations. Our quality assurance approach is based on code review and a two-level testing process. The first level is made of unit-test (Python unittest & Google tests for C++). The second level consists of integration tests running on an isolated test environment. We also use a continuous integration service (Bamboo) to ensure the tests are executed periodically and the bugs caught early. In the presentation, we will explain the reasons why we took this approach, the results and some thoughts on the pros and cons.

  18. Subsurface quality assurance practices

    International Nuclear Information System (INIS)

    1987-08-01

    This report addresses only the concept of applying Nuclear Quality Assurance (NQA) practices to repository shaft and subsurface design and construction; how NQA will be applied; and the level of detail required in the documentation for construction of a shaft and subsurface repository in contrast to the level of detail required in the documentation for construction of a traditional mine. This study determined that NQA practices are viable, attainable, as well as required. The study identified the appropriate NQA criteria and the repository's major structures, systems, items, and activities to which the criteria are applicable. A QA plan, for design and construction, and a list of documentation, for construction, are presented. 7 refs., 1 fig., 18 tabs

  19. Concrete quality assurance

    Energy Technology Data Exchange (ETDEWEB)

    Holz, N. [Harza Engineering Company, Chicago, IL (United States)

    2000-08-01

    This short article reports on progress at the world's largest civil construction project, namely China's Three Gorges hydro project. Work goes on around the clock to put in place nearly 28 M m{sup 3} of concrete. At every stage of the work there is strong emphasis on quality assurance (QA) and concrete is no exception. The US company Harza Engineering has been providing QA since the mid-1980s and concrete QA has been based on international standards. Harza personnel work in the field with supervisors developing educational tools for supervising concrete construction and quality, as well as providing training courses in concrete technology. Some details on flood control, capacity, water quality and environmental aspects are given..

  20. Construction quality assurance report

    International Nuclear Information System (INIS)

    Roscha, V.

    1994-01-01

    This report provides a summary of the construction quality assurance (CQA) observation and test results, including: The results of the geosynthetic and soil materials conformance testing. The observation and testing results associates with the installation of the soil liners. The observation and testing results associated with the installation of the HDPE geomembrane liner systems. The observation and testing results associated with the installation of the leachate collection and removal systems. The observation and testing results associated with the installation of the working surfaces. The observation and testing results associated with in-plant manufacturing process. Summary of submittal reviews by Golder Construction Services, Inc. The submittal and certification of the piping material specifications. The observation and verification associated of the Acceptance Test Procedure results of the operational equipment functions. Summary of the ECNs which are incorporated into the project

  1. Modeling the Informal Economy in Mexico. A Structural Equation Approach

    OpenAIRE

    Brambila Macias, Jose

    2008-01-01

    This paper uses annual data for the period 1970-2006 in order to estimate and investigate the evolution of the Mexican informal economy. In order to do so, we model the informal economy as a latent variable and try to explain it through relationships between possible cause and indicator variables using structural equation modeling (SEM). Our results indicate that the Mexican informal sector at the beginning of the 1970’s initially accounted for 40 percent of GDP while slightly decreasing to s...

  2. Information behavior versus communication: application models in multidisciplinary settings

    Directory of Open Access Journals (Sweden)

    Cecília Morena Maria da Silva

    2015-05-01

    Full Text Available This paper deals with the information behavior as support for models of communication design in the areas of Information Science, Library and Music. The communication models proposition is based on models of Tubbs and Moss (2003, Garvey and Griffith (1972, adapted by Hurd (1996 and Wilson (1999. Therefore, the questions arose: (i what are the informational skills required of librarians who act as mediators in scholarly communication process and informational user behavior in the educational environment?; (ii what are the needs of music related researchers and as produce, seek, use and access the scientific knowledge of your area?; and (iii as the contexts involved in scientific collaboration processes influence in the scientific production of information science field in Brazil? The article includes a literature review on the information behavior and its insertion in scientific communication considering the influence of context and/or situation of the objects involved in motivating issues. The hypothesis is that the user information behavior in different contexts and situations influence the definition of a scientific communication model. Finally, it is concluded that the same concept or a set of concepts can be used in different perspectives, reaching up, thus, different results.

  3. Organizational information assets classification model and security architecture methodology

    Directory of Open Access Journals (Sweden)

    Mostafa Tamtaji

    2015-12-01

    Full Text Available Today's, Organizations are exposed with huge and diversity of information and information assets that are produced in different systems shuch as KMS, financial and accounting systems, official and industrial automation sysytems and so on and protection of these information is necessary. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released.several benefits of this model cuses that organization has a great trend to implementing Cloud computing. Maintaining and management of information security is the main challenges in developing and accepting of this model. In this paper, at first, according to "design science research methodology" and compatible with "design process at information systems research", a complete categorization of organizational assets, including 355 different types of information assets in 7 groups and 3 level, is presented to managers be able to plan corresponding security controls according to importance of each groups. Then, for directing of organization to architect it’s information security in cloud computing environment, appropriate methodology is presented. Presented cloud computing security architecture , resulted proposed methodology, and presented classification model according to Delphi method and expers comments discussed and verified.

  4. Formal approach to modeling of modern Information Systems

    Directory of Open Access Journals (Sweden)

    Bálint Molnár

    2016-01-01

    Full Text Available Most recently, the concept of business documents has started to play double role. On one hand, a business document (word processing text or calculation sheet can be used as specification tool, on the other hand the business document is an immanent constituent of business processes, thereby essential component of business Information Systems. The recent tendency is that the majority of documents and their contents within business Information Systems remain in semi-structured format and a lesser part of documents is transformed into schemas of structured databases. In order to keep the emerging situation in hand, we suggest the creation (1 a theoretical framework for modeling business Information Systems; (2 and a design method for practical application based on the theoretical model that provides the structuring principles. The modeling approach that focuses on documents and their interrelationships with business processes assists in perceiving the activities of modern Information Systems.

  5. An information search model for online social Networks - MOBIRSE

    Directory of Open Access Journals (Sweden)

    Miguel Angel Niño Zambrano

    2015-09-01

    Full Text Available Online Social Networks (OSNs have been gaining great importance among Internet users in recent years.  These are sites where it is possible to meet people, publish, and share content in a way that is both easy and free of charge. As a result, the volume of information contained in these websites has grown exponentially, and web search has consequently become an important tool for users to easily find information relevant to their social networking objectives. Making use of ontologies and user profiles can make these searches more effective. This article presents a model for Information Retrieval in OSNs (MOBIRSE based on user profile and ontologies which aims to improve the relevance of retrieved information on these websites. The social network Facebook was chosen for a case study and as the instance for the proposed model. The model was validated using measures such as At-k Precision and Kappa statistics, to assess its efficiency.

  6. Information matrix estimation procedures for cognitive diagnostic models.

    Science.gov (United States)

    Liu, Yanlou; Xin, Tao; Andersson, Björn; Tian, Wei

    2018-03-06

    Two new methods to estimate the asymptotic covariance matrix for marginal maximum likelihood estimation of cognitive diagnosis models (CDMs), the inverse of the observed information matrix and the sandwich-type estimator, are introduced. Unlike several previous covariance matrix estimators, the new methods take into account both the item and structural parameters. The relationships between the observed information matrix, the empirical cross-product information matrix, the sandwich-type covariance matrix and the two approaches proposed by de la Torre (2009, J. Educ. Behav. Stat., 34, 115) are discussed. Simulation results show that, for a correctly specified CDM and Q-matrix or with a slightly misspecified probability model, the observed information matrix and the sandwich-type covariance matrix exhibit good performance with respect to providing consistent standard errors of item parameter estimates. However, with substantial model misspecification only the sandwich-type covariance matrix exhibits robust performance. © 2018 The British Psychological Society.

  7. Improving Quality Assurance with CDIO Self-Evaluation: Experiences From a Nordic Project

    DEFF Research Database (Denmark)

    Kontio, Juha; Roslöf, Janne; Edström, Kristina

    2012-01-01

    The main goal of the Nordic project Quality Assurance in Higher Education was to develop and implement a self-evaluation model in the participating Higher Education Institutes (HEIs) to support their quality assurance work and continuous curriculum development. Furthermore, the project aimed...... programme and new ideas and support for quality assurance work in other higher education institutes have been produced....

  8. Bayesian inference with information content model check for Langevin equations

    DEFF Research Database (Denmark)

    Krog, Jens F. C.; Lomholt, Michael Andersen

    2017-01-01

    The Bayesian data analysis framework has been proven to be a systematic and effective method of parameter inference and model selection for stochastic processes. In this work we introduce an information content model check which may serve as a goodness-of-fit, like the chi-square procedure...

  9. On the Enterprise Modelling of an Educational Information Infrastructure

    NARCIS (Netherlands)

    Widya, I.A.; Volman, C.J.A.M.; Pokraev, S.; de Diana, I.P.F.; Michiels, E.F.; Filipe, Joaquim; Sharp, Bernadette; Miranda, Paula

    2002-01-01

    This paper reports the modelling exercise of an educational information infrastructure that aims to support the organisation of teaching and learning activities suitable for a wide range of didactic policies. The modelling trajectory focuses on capturing invariant structures of relations between

  10. Changing Models for Researching Pedagogy with Information and Communications Technologies

    Science.gov (United States)

    Webb, M.

    2013-01-01

    This paper examines changing models of pedagogy by drawing on recent research with teachers and their students as well as theoretical developments. In relation to a participatory view of learning, the paper reviews existing pedagogical models that take little account of the use of information and communications technologies as well as those that…

  11. Microsoft Repository Version 2 and the Open Information Model.

    Science.gov (United States)

    Bernstein, Philip A.; Bergstraesser, Thomas; Carlson, Jason; Pal, Shankar; Sanders, Paul; Shutt, David

    1999-01-01

    Describes the programming interface and implementation of the repository engine and the Open Information Model for Microsoft Repository, an object-oriented meta-data management facility that ships in Microsoft Visual Studio and Microsoft SQL Server. Discusses Microsoft's component object model, object manipulation, queries, and information…

  12. Recent Trends in Quality Assurance

    Science.gov (United States)

    Amaral, Alberto; Rosa, Maria Joao

    2010-01-01

    In this paper we present a brief description of the evolution of quality assurance in Europe, paying particular attention to its relationship to the rising loss of trust in higher education institutions. We finalise by analysing the role of the European Commission in the setting up of new quality assurance mechanisms that tend to promote…

  13. Quality assurance of operating instructions

    International Nuclear Information System (INIS)

    Asmuss, G.

    1992-01-01

    It is pointed out that the quality assurance at nuclear power stations must be supported by national and international regulations. Quality assurance is explained using the example of the design of a pressurised water reactor. The operating and emergency manuals are discussed and examples for their structure put forward. The significance of updating is emphasised. 15 figs., 19 refs

  14. Project Specific Quality Assurance Plan

    International Nuclear Information System (INIS)

    Pedersen, K.S.

    1995-01-01

    This Quality Assurance Project Plan (QAPP) identifies the Westinghouse Hanford Co. (WHC) Quality Assurance (QA) program requirements for all contractors involved in the planning and execution of the design, construction, testing and inspection of the 200 Area Effluent BAT/AKART Implementation, Project W-291

  15. R D software quality assurance

    Energy Technology Data Exchange (ETDEWEB)

    Hood, F.C.

    1991-10-01

    Research software quality assurance (QA) requirements must be adequate to strengthen development or modification objectives, but flexible enough not to restrict creativity. Application guidelines are needed for the different kinds of research and development (R D) software activities to assure project objectives are achieved.

  16. Towards improvement in quality assurance

    International Nuclear Information System (INIS)

    1987-03-01

    This first document in the series of the International Nuclear Safety Advisory Group (INSAG) Technical Notes is a general guideline for the establishment of effective quality assurance procedures at nuclear facilities. It sets out primary requirements such as quality objectives, methods for measuring the effectiveness of the quality assurance programme, priority of activities in relation to importance of safety of items, motivation of personnel

  17. Information-based models for finance and insurance

    Science.gov (United States)

    Hoyle, Edward

    2010-10-01

    In financial markets, the information that traders have about an asset is reflected in its price. The arrival of new information then leads to price changes. The `information-based framework' of Brody, Hughston and Macrina (BHM) isolates the emergence of information, and examines its role as a driver of price dynamics. This approach has led to the development of new models that capture a broad range of price behaviour. This thesis extends the work of BHM by introducing a wider class of processes for the generation of the market filtration. In the BHM framework, each asset is associated with a collection of random cash flows. The asset price is the sum of the discounted expectations of the cash flows. Expectations are taken with respect (i) an appropriate measure, and (ii) the filtration generated by a set of so-called information processes that carry noisy or imperfect market information about the cash flows. To model the flow of information, we introduce a class of processes termed Lévy random bridges (LRBs), generalising the Brownian and gamma information processes of BHM. Conditioned on its terminal value, an LRB is identical in law to a Lévy bridge. We consider in detail the case where the asset generates a single cash flow X_T at a fixed date T. The flow of information about X_T is modelled by an LRB with random terminal value X_T. An explicit expression for the price process is found by working out the discounted conditional expectation of X_T with respect to the natural filtration of the LRB. New models are constructed using information processes related to the Poisson process, the Cauchy process, the stable-1/2 subordinator, the variance-gamma process, and the normal inverse-Gaussian process. These are applied to the valuation of credit-risky bonds, vanilla and exotic options, and non-life insurance liabilities.

  18. Auditory information coding by modeled cochlear nucleus neurons.

    Science.gov (United States)

    Wang, Huan; Isik, Michael; Borst, Alexander; Hemmert, Werner

    2011-06-01

    In this paper we use information theory to quantify the information in the output spike trains of modeled cochlear nucleus globular bushy cells (GBCs). GBCs are part of the sound localization pathway. They are known for their precise temporal processing, and they code amplitude modulations with high fidelity. Here we investigated the information transmission for a natural sound, a recorded vowel. We conclude that the maximum information transmission rate for a single neuron was close to 1,050 bits/s, which corresponds to a value of approximately 5.8 bits per spike. For quasi-periodic signals like voiced speech, the transmitted information saturated as word duration increased. In general, approximately 80% of the available information from the spike trains was transmitted within about 20 ms. Transmitted information for speech signals concentrated around formant frequency regions. The efficiency of neural coding was above 60% up to the highest temporal resolution we investigated (20 μs). The increase in transmitted information to that precision indicates that these neurons are able to code information with extremely high fidelity, which is required for sound localization. On the other hand, only 20% of the information was captured when the temporal resolution was reduced to 4 ms. As the temporal resolution of most speech recognition systems is limited to less than 10 ms, this massive information loss might be one of the reasons which are responsible for the lack of noise robustness of these systems.

  19. Implications of Information Theory for Computational Modeling of Schizophrenia.

    Science.gov (United States)

    Silverstein, Steven M; Wibral, Michael; Phillips, William A

    2017-10-01

    Information theory provides a formal framework within which information processing and its disorders can be described. However, information theory has rarely been applied to modeling aspects of the cognitive neuroscience of schizophrenia. The goal of this article is to highlight the benefits of an approach based on information theory, including its recent extensions, for understanding several disrupted neural goal functions as well as related cognitive and symptomatic phenomena in schizophrenia. We begin by demonstrating that foundational concepts from information theory-such as Shannon information, entropy, data compression, block coding, and strategies to increase the signal-to-noise ratio-can be used to provide novel understandings of cognitive impairments in schizophrenia and metrics to evaluate their integrity. We then describe more recent developments in information theory, including the concepts of infomax, coherent infomax, and coding with synergy, to demonstrate how these can be used to develop computational models of schizophrenia-related failures in the tuning of sensory neurons, gain control, perceptual organization, thought organization, selective attention, context processing, predictive coding, and cognitive control. Throughout, we demonstrate how disordered mechanisms may explain both perceptual/cognitive changes and symptom emergence in schizophrenia. Finally, we demonstrate that there is consistency between some information-theoretic concepts and recent discoveries in neurobiology, especially involving the existence of distinct sites for the accumulation of driving input and contextual information prior to their interaction. This convergence can be used to guide future theory, experiment, and treatment development.

  20. A Product Development Decision Model for Cockpit Weather Information Systems

    Science.gov (United States)

    Sireli, Yesim; Kauffmann, Paul; Gupta, Surabhi; Kachroo, Pushkin

    2003-01-01

    There is a significant market demand for advanced cockpit weather information products. However, it is unclear how to identify the most promising technological options that provide the desired mix of consumer requirements by employing feasible technical systems at a price that achieves market success. This study develops a unique product development decision model that employs Quality Function Deployment (QFD) and Kano's model of consumer choice. This model is specifically designed for exploration and resolution of this and similar information technology related product development problems.

  1. A Product Development Decision Model for Cockpit Weather Information System

    Science.gov (United States)

    Sireli, Yesim; Kauffmann, Paul; Gupta, Surabhi; Kachroo, Pushkin; Johnson, Edward J., Jr. (Technical Monitor)

    2003-01-01

    There is a significant market demand for advanced cockpit weather information products. However, it is unclear how to identify the most promising technological options that provide the desired mix of consumer requirements by employing feasible technical systems at a price that achieves market success. This study develops a unique product development decision model that employs Quality Function Deployment (QFD) and Kano's model of consumer choice. This model is specifically designed for exploration and resolution of this and similar information technology related product development problems.

  2. Towards GLUE2 evolution of the computing element information model

    CERN Document Server

    Andreozzi, S; Field, L; Kónya, B

    2008-01-01

    A key advantage of Grid systems is the ability to share heterogeneous resources and services between traditional administrative and organizational domains. This ability enables virtual pools of resources to be created and assigned to groups of users. Resource awareness, the capability of users or user agents to have knowledge about the existence and state of resources, is required in order utilize the resource. This awareness requires a description of the services and resources typically defined via a community-agreed information model. One of the most popular information models, used by a number of Grid infrastructures, is the GLUE Schema, which provides a common language for describing Grid resources. Other approaches exist, however they follow different modeling strategies. The presence of different flavors of information models for Grid resources is a barrier for enabling inter-Grid interoperability. In order to solve this problem, the GLUE Working Group in the context of the Open Grid Forum was started. ...

  3. Technical Reference Suite Addressing Challenges of Providing Assurance for Fault Management Architectural Design

    Science.gov (United States)

    Fitz, Rhonda; Whitman, Gerek

    2016-01-01

    Research into complexities of software systems Fault Management (FM) and how architectural design decisions affect safety, preservation of assets, and maintenance of desired system functionality has coalesced into a technical reference (TR) suite that advances the provision of safety and mission assurance. The NASA Independent Verification and Validation (IV&V) Program, with Software Assurance Research Program support, extracted FM architectures across the IV&V portfolio to evaluate robustness, assess visibility for validation and test, and define software assurance methods applied to the architectures and designs. This investigation spanned IV&V projects with seven different primary developers, a wide range of sizes and complexities, and encompassed Deep Space Robotic, Human Spaceflight, and Earth Orbiter mission FM architectures. The initiative continues with an expansion of the TR suite to include Launch Vehicles, adding the benefit of investigating differences intrinsic to model-based FM architectures and insight into complexities of FM within an Agile software development environment, in order to improve awareness of how nontraditional processes affect FM architectural design and system health management. The identification of particular FM architectures, visibility, and associated IV&V techniques provides a TR suite that enables greater assurance that critical software systems will adequately protect against faults and respond to adverse conditions. Additionally, the role FM has with regard to strengthened security requirements, with potential to advance overall asset protection of flight software systems, is being addressed with the development of an adverse conditions database encompassing flight software vulnerabilities. Capitalizing on the established framework, this TR suite provides assurance capability for a variety of FM architectures and varied development approaches. Research results are being disseminated across NASA, other agencies, and the

  4. Metrics for building performance assurance

    Energy Technology Data Exchange (ETDEWEB)

    Koles, G.; Hitchcock, R.; Sherman, M.

    1996-07-01

    This report documents part of the work performed in phase I of a Laboratory Directors Research and Development (LDRD) funded project entitled Building Performance Assurances (BPA). The focus of the BPA effort is to transform the way buildings are built and operated in order to improve building performance by facilitating or providing tools, infrastructure, and information. The efforts described herein focus on the development of metrics with which to evaluate building performance and for which information and optimization tools need to be developed. The classes of building performance metrics reviewed are (1) Building Services (2) First Costs, (3) Operating Costs, (4) Maintenance Costs, and (5) Energy and Environmental Factors. The first category defines the direct benefits associated with buildings; the next three are different kinds of costs associated with providing those benefits; the last category includes concerns that are broader than direct costs and benefits to the building owner and building occupants. The level of detail of the various issues reflect the current state of knowledge in those scientific areas and the ability of the to determine that state of knowledge, rather than directly reflecting the importance of these issues; it intentionally does not specifically focus on energy issues. The report describes work in progress and is intended as a resource and can be used to indicate the areas needing more investigation. Other reports on BPA activities are also available.

  5. Quality assurance, information tracking, and consumer labeling

    International Nuclear Information System (INIS)

    Caswell, Julie A. . E-mail caswell@resecon.umass.edu

    2006-01-01

    Reducing marine-based public health risk requires strict control of several attributes of seafood products, often including location and conditions of catch or aquaculture, processing, and handling throughout the supply chain. Buyers likely will also be interested in other attributes of these products such as eco-friendliness or taste. Development of markets for improved safety, as well as for other quality attributes, requires an effective certification and tracking of these attributes as well as their communication to buyers. Several challenges must be met if labeling, particularly consumer labeling, is to support the development of markets for improved seafood safety

  6. Effective information assurance with risk management

    OpenAIRE

    Dimopoulos, Vassileios Andreas

    2007-01-01

    Today's businesses base their operation on their IT infrastructure, which consequently demands that it should be protected accordingly. Nevertheless, surveys tend to indicate that the number of IT security incidents is increasing, resulting in significant losses for the organisations concerned. Leading in poor security practices, and therefore frequent victims of related security incidents, are Small and Medium Enterprises (SMEs). Even though there are a number of solutions, ra...

  7. Voice Biometrics for Information Assurance Applications

    National Research Council Canada - National Science Library

    Kang, George

    2002-01-01

    .... The ultimate goal of voice biometrics is to enable the use of voice as a password. Voice biometrics are "man-in-the-loop" systems in which system performance is significantly dependent on human performance...

  8. Automating linear accelerator quality assurance

    International Nuclear Information System (INIS)

    Eckhause, Tobias; Thorwarth, Ryan; Moran, Jean M.; Al-Hallaq, Hania; Farrey, Karl; Ritter, Timothy; DeMarco, John; Pawlicki, Todd; Kim, Gwe-Ya; Popple, Richard; Sharma, Vijeshwar; Park, SungYong; Perez, Mario; Booth, Jeremy T.

    2015-01-01

    Purpose: The purpose of this study was 2-fold. One purpose was to develop an automated, streamlined quality assurance (QA) program for use by multiple centers. The second purpose was to evaluate machine performance over time for multiple centers using linear accelerator (Linac) log files and electronic portal images. The authors sought to evaluate variations in Linac performance to establish as a reference for other centers. Methods: The authors developed analytical software tools for a QA program using both log files and electronic portal imaging device (EPID) measurements. The first tool is a general analysis tool which can read and visually represent data in the log file. This tool, which can be used to automatically analyze patient treatment or QA log files, examines the files for Linac deviations which exceed thresholds. The second set of tools consists of a test suite of QA fields, a standard phantom, and software to collect information from the log files on deviations from the expected values. The test suite was designed to focus on the mechanical tests of the Linac to include jaw, MLC, and collimator positions during static, IMRT, and volumetric modulated arc therapy delivery. A consortium of eight institutions delivered the test suite at monthly or weekly intervals on each Linac using a standard phantom. The behavior of various components was analyzed for eight TrueBeam Linacs. Results: For the EPID and trajectory log file analysis, all observed deviations which exceeded established thresholds for Linac behavior resulted in a beam hold off. In the absence of an interlock-triggering event, the maximum observed log file deviations between the expected and actual component positions (such as MLC leaves) varied from less than 1% to 26% of published tolerance thresholds. The maximum and standard deviations of the variations due to gantry sag, collimator angle, jaw position, and MLC positions are presented. Gantry sag among Linacs was 0.336 ± 0.072 mm. The

  9. Automating linear accelerator quality assurance

    Energy Technology Data Exchange (ETDEWEB)

    Eckhause, Tobias; Thorwarth, Ryan; Moran, Jean M., E-mail: jmmoran@med.umich.edu [Department of Radiation Oncology, University of Michigan, Ann Arbor, Michigan 48109-5010 (United States); Al-Hallaq, Hania; Farrey, Karl [Department of Radiation Oncology and Cellular Oncology, The University of Chicago, Chicago, Illinois 60637 (United States); Ritter, Timothy [Ann Arbor VA Medical Center, Ann Arbor, Michigan 48109 (United States); DeMarco, John [Department of Radiation Oncology, Cedars-Sinai Medical Center, Los Angeles, California, 90048 (United States); Pawlicki, Todd; Kim, Gwe-Ya [UCSD Medical Center, La Jolla, California 92093 (United States); Popple, Richard [Department of Radiation Oncology, University of Alabama Birmingham, Birmingham, Alabama 35249 (United States); Sharma, Vijeshwar; Park, SungYong [Karmanos Cancer Institute, McLaren-Flint, Flint, Michigan 48532 (United States); Perez, Mario; Booth, Jeremy T. [Royal North Shore Hospital, Sydney, NSW 2065 (Australia)

    2015-10-15

    Purpose: The purpose of this study was 2-fold. One purpose was to develop an automated, streamlined quality assurance (QA) program for use by multiple centers. The second purpose was to evaluate machine performance over time for multiple centers using linear accelerator (Linac) log files and electronic portal images. The authors sought to evaluate variations in Linac performance to establish as a reference for other centers. Methods: The authors developed analytical software tools for a QA program using both log files and electronic portal imaging device (EPID) measurements. The first tool is a general analysis tool which can read and visually represent data in the log file. This tool, which can be used to automatically analyze patient treatment or QA log files, examines the files for Linac deviations which exceed thresholds. The second set of tools consists of a test suite of QA fields, a standard phantom, and software to collect information from the log files on deviations from the expected values. The test suite was designed to focus on the mechanical tests of the Linac to include jaw, MLC, and collimator positions during static, IMRT, and volumetric modulated arc therapy delivery. A consortium of eight institutions delivered the test suite at monthly or weekly intervals on each Linac using a standard phantom. The behavior of various components was analyzed for eight TrueBeam Linacs. Results: For the EPID and trajectory log file analysis, all observed deviations which exceeded established thresholds for Linac behavior resulted in a beam hold off. In the absence of an interlock-triggering event, the maximum observed log file deviations between the expected and actual component positions (such as MLC leaves) varied from less than 1% to 26% of published tolerance thresholds. The maximum and standard deviations of the variations due to gantry sag, collimator angle, jaw position, and MLC positions are presented. Gantry sag among Linacs was 0.336 ± 0.072 mm. The

  10. Organization model and formalized description of nuclear enterprise information system

    International Nuclear Information System (INIS)

    Yuan Feng; Song Yafeng; Li Xudong

    2012-01-01

    Organization model is one of the most important models of Nuclear Enterprise Information System (NEIS). Scientific and reasonable organization model is the prerequisite that NEIS has robustness and extendibility, and is also the foundation of the integration of heterogeneous system. Firstly, the paper describes the conceptual model of the NEIS on ontology chart, which provides a consistent semantic framework of organization. Then it discusses the relations between the concepts in detail. Finally, it gives the formalized description of the organization model of NEIS based on six-tuple array. (authors)

  11. Quality assurance feedback as a nursing management strategy.

    Science.gov (United States)

    Brannon, D; Bucher, J A

    1989-01-01

    Quality assurance and effective nurse management can be viewed as intersecting goals. Objective feedback derived from quality assurance data is a potentially powerful means of enhancing nurses' performance and job satisfaction. The use of automated information systems to provide such direct feedback offers the additional advantage of recognizing nurses as self-monitoring, self-correcting professionals. The need, opportunity, and challenge involved in meshing quality assurance with human resource management through computer-generated feedback are discussed in the context of the home health care setting.

  12. Quality Assurance Programme for Computed Tomography: Diagnostic and Therapy Applications

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-08-15

    This publication presents a harmonized approach to quality assurance in the field of computed tomography applied to both diagnostics and therapy. It gives a careful analysis of the principles and specific instructions that can be used for a quality assurance programme for optimal performance and reduced patient dose in diagnostic radiology. In some cases, radiotherapy programmes are making a transition from 2-D to 3-D radiotherapy, a complex process which critically depends on accurate treatment planning. In this respect, the authors also provide detailed information about the elements needed for quality assurance testing, including those relating to accurate patient characterization as needed for radiotherapy treatment planning.

  13. A Model-Driven Development Method for Management Information Systems

    Science.gov (United States)

    Mizuno, Tomoki; Matsumoto, Keinosuke; Mori, Naoki

    Traditionally, a Management Information System (MIS) has been developed without using formal methods. By the informal methods, the MIS is developed on its lifecycle without having any models. It causes many problems such as lack of the reliability of system design specifications. In order to overcome these problems, a model theory approach was proposed. The approach is based on an idea that a system can be modeled by automata and set theory. However, it is very difficult to generate automata of the system to be developed right from the start. On the other hand, there is a model-driven development method that can flexibly correspond to changes of business logics or implementing technologies. In the model-driven development, a system is modeled using a modeling language such as UML. This paper proposes a new development method for management information systems applying the model-driven development method to a component of the model theory approach. The experiment has shown that a reduced amount of efforts is more than 30% of all the efforts.

  14. Technology and Tool Development to Support Safety and Mission Assurance

    Science.gov (United States)

    Denney, Ewen; Pai, Ganesh

    2017-01-01

    The Assurance Case approach is being adopted in a number of safety-mission-critical application domains in the U.S., e.g., medical devices, defense aviation, automotive systems, and, lately, civil aviation. This paradigm refocuses traditional, process-based approaches to assurance on demonstrating explicitly stated assurance goals, emphasizing the use of structured rationale, and concrete product-based evidence as the means for providing justified confidence that systems and software are fit for purpose in safely achieving mission objectives. NASA has also been embracing assurance cases through the concepts of Risk Informed Safety Cases (RISCs), as documented in the NASA System Safety Handbook, and Objective Hierarchies (OHs) as put forth by the Agency's Office of Safety and Mission Assurance (OSMA). This talk will give an overview of the work being performed by the SGT team located at NASA Ames Research Center, in developing technologies and tools to engineer and apply assurance cases in customer projects pertaining to aviation safety. We elaborate how our Assurance Case Automation Toolset (AdvoCATE) has not only extended the state-of-the-art in assurance case research, but also demonstrated its practical utility. We have successfully developed safety assurance cases for a number of Unmanned Aircraft Systems (UAS) operations, which underwent, and passed, scrutiny both by the aviation regulator, i.e., the FAA, as well as the applicable NASA boards for airworthiness and flight safety, flight readiness, and mission readiness. We discuss our efforts in expanding AdvoCATE capabilities to support RISCs and OHs under a project recently funded by OSMA under its Software Assurance Research Program. Finally, we speculate on the applicability of our innovations beyond aviation safety to such endeavors as robotic, and human spaceflight.

  15. A non-linear model of information seeking behaviour

    Directory of Open Access Journals (Sweden)

    Allen E. Foster

    2005-01-01

    Full Text Available The results of a qualitative, naturalistic, study of information seeking behaviour are reported in this paper. The study applied the methods recommended by Lincoln and Guba for maximising credibility, transferability, dependability, and confirmability in data collection and analysis. Sampling combined purposive and snowball methods, and led to a final sample of 45 inter-disciplinary researchers from the University of Sheffield. In-depth semi-structured interviews were used to elicit detailed examples of information seeking. Coding of interview transcripts took place in multiple iterations over time and used Atlas-ti software to support the process. The results of the study are represented in a non-linear Model of Information Seeking Behaviour. The model describes three core processes (Opening, Orientation, and Consolidation and three levels of contextual interaction (Internal Context, External Context, and Cognitive Approach, each composed of several individual activities and attributes. The interactivity and shifts described by the model show information seeking to be non-linear, dynamic, holistic, and flowing. The paper concludes by describing the whole model of behaviours as analogous to an artist's palette, in which activities remain available throughout information seeking. A summary of key implications of the model and directions for further research are included.

  16. Process and building information modelling in the construction industry by using information delivery manuals and model view definitions

    DEFF Research Database (Denmark)

    Karlshøj, Jan

    2012-01-01

    The construction industry is gradually increasing its use of structured information and building information modelling.To date, the industry has suffered from the disadvantages of a project-based organizational structure and ad hoc solutions. Furthermore, it is not used to formalizing the flow...... of information and specifying exactly which objects and properties are needed for each process and which information is produced by the processes. The present study is based on reviewing the existing methodology of Information Delivery Manuals (IDM) from Buildingsmart, which also is also an ISO standard 29481...... Part 1; and the Model View Definition (MVD) methodology developed by Buildingsmart and BLIS. The research also includes a review of concrete IDM development projects that have been developed over the last five years. Although the study has identified interest in the IDM methodology in a number...

  17. A Compositional Relevance Model for Adaptive Information Retrieval

    Science.gov (United States)

    Mathe, Nathalie; Chen, James; Lu, Henry, Jr. (Technical Monitor)

    1994-01-01

    There is a growing need for rapid and effective access to information in large electronic documentation systems. Access can be facilitated if information relevant in the current problem solving context can be automatically supplied to the user. This includes information relevant to particular user profiles, tasks being performed, and problems being solved. However most of this knowledge on contextual relevance is not found within the contents of documents, and current hypermedia tools do not provide any easy mechanism to let users add this knowledge to their documents. We propose a compositional relevance network to automatically acquire the context in which previous information was found relevant. The model records information on the relevance of references based on user feedback for specific queries and contexts. It also generalizes such information to derive relevant references for similar queries and contexts. This model lets users filter information by context of relevance, build personalized views of documents over time, and share their views with other users. It also applies to any type of multimedia information. Compared to other approaches, it is less costly and doesn't require any a priori statistical computation, nor an extended training period. It is currently being implemented into the Computer Integrated Documentation system which enables integration of various technical documents in a hypertext framework.

  18. Semantic Information Modeling for Emerging Applications in Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Qunzhi; Natarajan, Sreedhar; Simmhan, Yogesh; Prasanna, Viktor

    2012-04-16

    Smart Grid modernizes power grid by integrating digital and information technologies. Millions of smart meters, intelligent appliances and communication infrastructures are under deployment allowing advanced IT applications to be developed to secure and manage power grid operations. Demand response (DR) is one such emerging application to optimize electricity demand by curtailing/shifting power load when peak load occurs. Existing DR approaches are mostly based on static plans such as pricing policies and load shedding schedules. However, improvements to power management applications rely on data emanating from existing and new information sources with the growth of Smart Grid information space. In particular, dynamic DR algorithms depend on information from smart meters that report interval-based power consumption measurement, HVAC systems that monitor buildings heat and humidity, and even weather forecast services. In order for emerging Smart Grid applications to take advantage of the diverse data influx, extensible information integration is required. In this paper, we develop an integrated Smart Grid information model using Semantic Web techniques and present case studies of using semantic information for dynamic DR. We show the semantic model facilitates information integration and knowledge representation for developing the next generation Smart Grid applications.

  19. Quality assurance when documenting chemical hazards to health and environment

    International Nuclear Information System (INIS)

    Guttormsen, R.; Modahl, S.I.; Tufto, P.A.; Buset, H.

    1991-01-01

    In a joint project between The Norwegian Petroleum Directorate (NPD), the State Pollution Control Agency (SFT) and Conoco Norway Inc. (CNI) we have evaluated the use of quality assurance principles in connection with development and distribution of information about chemicals. Assuring quality of the documentation is first of all depending on: the work in international organizations; the content of national and international guidelines and criteria documents; the use of product registers; activities in manufacturers' organizations; the role of importers and agents. These are aspects which have been evaluated. Recommendations are given in this paper concerning: definition of responsibilities in regulations, standards and guidelines; feedback of experience and coordination through international work; application of quality assurance principles in the use of information technology in international organizations and in manufacturers' organizations; use of quality assurance principles in validation of data

  20. Methods of Software Quality Assurance under a Nuclear Quality Assurance Program

    International Nuclear Information System (INIS)

    Kim, Jang Yeol; Lee, Young Jun; Cha, Kyung Ho; Cheon, Se Woo; Lee, Jang Soo; Kwon, Kee Choon

    2005-01-01

    This paper addresses a substantial implementation of a software quality assurance under a nuclear quality assurance program. The relationship of the responsibility between a top-level nuclear quality assurance program such as ASME/NQA-1 and its lower level software quality assurance is described. Software quality assurance activities and software quality assurance procedures during the software development life cycle are also described

  1. Sensitivity Analysis for Urban Drainage Modeling Using Mutual Information

    Directory of Open Access Journals (Sweden)

    Chuanqi Li

    2014-11-01

    Full Text Available The intention of this paper is to evaluate the sensitivity of the Storm Water Management Model (SWMM output to its input parameters. A global parameter sensitivity analysis is conducted in order to determine which parameters mostly affect the model simulation results. Two different methods of sensitivity analysis are applied in this study. The first one is the partial rank correlation coefficient (PRCC which measures nonlinear but monotonic relationships between model inputs and outputs. The second one is based on the mutual information which provides a general measure of the strength of the non-monotonic association between two variables. Both methods are based on the Latin Hypercube Sampling (LHS of the parameter space, and thus the same datasets can be used to obtain both measures of sensitivity. The utility of the PRCC and the mutual information analysis methods are illustrated by analyzing a complex SWMM model. The sensitivity analysis revealed that only a few key input variables are contributing significantly to the model outputs; PRCCs and mutual information are calculated and used to determine and rank the importance of these key parameters. This study shows that the partial rank correlation coefficient and mutual information analysis can be considered effective methods for assessing the sensitivity of the SWMM model to the uncertainty in its input parameters.

  2. An information propagation model considering incomplete reading behavior in microblog

    Science.gov (United States)

    Su, Qiang; Huang, Jiajia; Zhao, Xiande

    2015-02-01

    Microblog is one of the most popular communication channels on the Internet, and has already become the third largest source of news and public opinions in China. Although researchers have studied the information propagation in microblog using the epidemic models, previous studies have not considered the incomplete reading behavior among microblog users. Therefore, the model cannot fit the real situations well. In this paper, we proposed an improved model entitled Microblog-Susceptible-Infected-Removed (Mb-SIR) for information propagation by explicitly considering the user's incomplete reading behavior. We also tested the effectiveness of the model using real data from Sina Microblog. We demonstrate that the new proposed model is more accurate in describing the information propagation in microblog. In addition, we also investigate the effects of the critical model parameters, e.g., reading rate, spreading rate, and removed rate through numerical simulations. The simulation results show that, compared with other parameters, reading rate plays the most influential role in the information propagation performance in microblog.

  3. Evaluating procedural modelling for 3D models of informal settlements in urban design activities

    Directory of Open Access Journals (Sweden)

    Victoria Rautenbach

    2015-11-01

    Full Text Available Three-dimensional (3D modelling and visualisation is one of the fastest growing application fields in geographic information science. 3D city models are being researched extensively for a variety of purposes and in various domains, including urban design, disaster management, education and computer gaming. These models typically depict urban business districts (downtown or suburban residential areas. Despite informal settlements being a prevailing feature of many cities in developing countries, 3D models of informal settlements are virtually non-existent. 3D models of informal settlements could be useful in various ways, e.g. to gather information about the current environment in the informal settlements, to design upgrades, to communicate these and to educate inhabitants about environmental challenges. In this article, we described the development of a 3D model of the Slovo Park informal settlement in the City of Johannesburg Metropolitan Municipality, South Africa. Instead of using time-consuming traditional manual methods, we followed the procedural modelling technique. Visualisation characteristics of 3D models of informal settlements were described and the importance of each characteristic in urban design activities for informal settlement upgrades was assessed. Next, the visualisation characteristics of the Slovo Park model were evaluated. The results of the evaluation showed that the 3D model produced by the procedural modelling technique is suitable for urban design activities in informal settlements. The visualisation characteristics and their assessment are also useful as guidelines for developing 3D models of informal settlements. In future, we plan to empirically test the use of such 3D models in urban design projects in informal settlements.

  4. GRAMMAR RULE BASED INFORMATION RETRIEVAL MODEL FOR BIG DATA

    Directory of Open Access Journals (Sweden)

    T. Nadana Ravishankar

    2015-07-01

    Full Text Available Though Information Retrieval (IR in big data has been an active field of research for past few years; the popularity of the native languages presents a unique challenge in big data information retrieval systems. There is a need to retrieve information which is present in English and display it in the native language for users. This aim of cross language information retrieval is complicated by unique features of the native languages such as: morphology, compound word formations, word spelling variations, ambiguity, word synonym, other language influence and etc. To overcome some of these issues, the native language is modeled using a grammar rule based approach in this work. The advantage of this approach is that the native language is modeled and its unique features are encoded using a set of inference rules. This rule base coupled with the customized ontological system shows considerable potential and is found to show better precision and recall.

  5. Safety Case Development as an Information Modelling Problem

    Science.gov (United States)

    Lewis, Robert

    This paper considers the benefits from applying information modelling as the basis for creating an electronically-based safety case. It highlights the current difficulties of developing and managing large document-based safety cases for complex systems such as those found in Air Traffic Control systems. After a review of current tools and related literature on this subject, the paper proceeds to examine the many relationships between entities that can exist within a large safety case. The paper considers the benefits to both safety case writers and readers from the future development of an ideal safety case tool that is able to exploit these information models. The paper also introduces the idea that the safety case has formal relationships between entities that directly support the safety case argument using a methodology such as GSN, and informal relationships that provide links to direct and backing evidence and to supporting information.

  6. Models, Metaphors and Symbols for Information and Knowledge Systems

    Directory of Open Access Journals (Sweden)

    David Williams

    2014-01-01

    Full Text Available A literature search indicates that Data, Information and Knowledge continue to be placed into a hierarchical construct where it is considered that information is more valuable than data and that information can be processed into becoming precious knowledge. Wisdom continues to be added to the model to further confuse the issue. This model constrains our ability to think more logically about how and why we develop knowledge management systems to support and enhance knowledge- intensive processes, tasks or projects. This paper seeks to summarise development of the Data-Information-Knowledge-Wisdom hierarchy, explore the extensive criticism of it and present a more logical (and accurate construct for the elements of intellectual capital when developing and managing Knowledge Management Systems.

  7. Informed Principal Model and Contract in Supply Chain with Demand Disruption Asymmetric Information

    Directory of Open Access Journals (Sweden)

    Huan Zhang

    2016-01-01

    Full Text Available Because of the frequency and disastrous influence, the supply chain disruption has caused extensive concern both in the industry and in the academia. In a supply chain with one manufacturer and one retailer, the demand of the retailer is uncertain and meanwhile may suffer disruption with a probability. Taking the demand disruption probability as the retailer’s asymmetric information, an informed principal model with the retailer as the principal is explored to make the contract. The retailer can show its information to the manufacturer through the contract. It is found out that the high-risk retailer intends to pretend to be the low-risk one. So the separating contract is given through the low-information-intensity allocation, in which the order quantity and the transferring payment for the low-risk retailer distort upwards, but those of high-risk retailer do not distort. In order to reduce the signaling cost which the low-risk retailer pays, the interim efficient model is introduced, which ends up with the order quantity and transferring payment distorting upwards again but less than before. In the numerical examples, with two different mutation probabilities, the informed principal contracts show the application of the informed principal model in the supply chain with demand disruption.

  8. MATHEMATICAL MODEL FOR CALCULATION OF INFORMATION RISKS FOR INFORMATION AND LOGISTICS SYSTEM

    Directory of Open Access Journals (Sweden)

    A. G. Korobeynikov

    2015-05-01

    Full Text Available Subject of research. The paper deals with mathematical model for assessment calculation of information risks arising during transporting and distribution of material resources in the conditions of uncertainty. Meanwhile information risks imply the danger of origin of losses or damage as a result of application of information technologies by the company. Method. The solution is based on ideology of the transport task solution in stochastic statement with mobilization of mathematical modeling theory methods, the theory of graphs, probability theory, Markov chains. Creation of mathematical model is performed through the several stages. At the initial stage, capacity on different sites depending on time is calculated, on the basis of information received from information and logistic system, the weight matrix is formed and the digraph is under construction. Then there is a search of the minimum route which covers all specified vertexes by means of Dejkstra algorithm. At the second stage, systems of differential Kolmogorov equations are formed using information about the calculated route. The received decisions show probabilities of resources location in concrete vertex depending on time. At the third stage, general probability of the whole route passing depending on time is calculated on the basis of multiplication theorem of probabilities. Information risk, as time function, is defined by multiplication of the greatest possible damage by the general probability of the whole route passing. In this case information risk is measured in units of damage which corresponds to that monetary unit which the information and logistic system operates with. Main results. Operability of the presented mathematical model is shown on a concrete example of transportation of material resources where places of shipment and delivery, routes and their capacity, the greatest possible damage and admissible risk are specified. The calculations presented on a diagram showed

  9. Introduction of Building Information Modeling (BIM) Technologies in Construction

    Science.gov (United States)

    Milyutina, M. A.

    2018-05-01

    The issues of introduction of building information modeling (BIM) in construction industry are considered in this work. The advantages of this approach and perspectives of the transition to new design technologies, construction process management, and operation in the near future are stated. The importance of development of pilot projects that should identify the ways and means of verification of the regulatory and technical base, as well as economic indicators in the transition to Building Information Technologies in the construction, is noted.

  10. Semantic reasoning with XML-based biomedical information models.

    Science.gov (United States)

    O'Connor, Martin J; Das, Amar

    2010-01-01

    The Extensible Markup Language (XML) is increasingly being used for biomedical data exchange. The parallel growth in the use of ontologies in biomedicine presents opportunities for combining the two technologies to leverage the semantic reasoning services provided by ontology-based tools. There are currently no standardized approaches for taking XML-encoded biomedical information models and representing and reasoning with them using ontologies. To address this shortcoming, we have developed a workflow and a suite of tools for transforming XML-based information models into domain ontologies encoded using OWL. In this study, we applied semantics reasoning methods to these ontologies to automatically generate domain-level inferences. We successfully used these methods to develop semantic reasoning methods for information models in the HIV and radiological image domains.

  11. A generalized model via random walks for information filtering

    Science.gov (United States)

    Ren, Zhuo-Ming; Kong, Yixiu; Shang, Ming-Sheng; Zhang, Yi-Cheng

    2016-08-01

    There could exist a simple general mechanism lurking beneath collaborative filtering and interdisciplinary physics approaches which have been successfully applied to online E-commerce platforms. Motivated by this idea, we propose a generalized model employing the dynamics of the random walk in the bipartite networks. Taking into account the degree information, the proposed generalized model could deduce the collaborative filtering, interdisciplinary physics approaches and even the enormous expansion of them. Furthermore, we analyze the generalized model with single and hybrid of degree information on the process of random walk in bipartite networks, and propose a possible strategy by using the hybrid degree information for different popular objects to toward promising precision of the recommendation.

  12. Traffic congestion forecasting model for the INFORM System. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Azarm, A.; Mughabghab, S.; Stock, D.

    1995-05-01

    This report describes a computerized traffic forecasting model, developed by Brookhaven National Laboratory (BNL) for a portion of the Long Island INFORM Traffic Corridor. The model has gone through a testing phase, and currently is able to make accurate traffic predictions up to one hour forward in time. The model will eventually take on-line traffic data from the INFORM system roadway sensors and make projections as to future traffic patterns, thus allowing operators at the New York State Department of Transportation (D.O.T.) INFORM Traffic Management Center to more optimally manage traffic. It can also form the basis of a travel information system. The BNL computer model developed for this project is called ATOP for Advanced Traffic Occupancy Prediction. The various modules of the ATOP computer code are currently written in Fortran and run on PC computers (pentium machine) faster than real time for the section of the INFORM corridor under study. The following summarizes the various routines currently contained in the ATOP code: Statistical forecasting of traffic flow and occupancy using historical data for similar days and time (long term knowledge), and the recent information from the past hour (short term knowledge). Estimation of the empirical relationships between traffic flow and occupancy using long and short term information. Mechanistic interpolation using macroscopic traffic models and based on the traffic flow and occupancy forecasted (item-1), and the empirical relationships (item-2) for the specific highway configuration at the time of simulation (construction, lane closure, etc.). Statistical routine for detection and classification of anomalies and their impact on the highway capacity which are fed back to previous items.

  13. A framework for institutionalizing quality assurance.

    Science.gov (United States)

    Silimperi, Diana R; Franco, Lynne Miller; Veldhuyzen van Zanten, Tisna; MacAulay, Catherine

    2002-12-01

    To develop a framework to support the institutionalization of quality assurance (QA). The framework for institutionalizing QA consists of a model of eight essential elements and a 'roadmap' for the process of institutionalization. The essential elements are the building blocks required for implementing and sustaining QA activities. Core QA activities include defining, measuring and improving quality. The essential elements are grouped under three categories: the internal enabling environment (internal to the organization or system), organizing for quality, and support functions. The enabling environment contains the essential elements of leadership, policy, core values, and resources. Organizing for quality includes the structure for implementing QA. Three essential elements are primarily support functions: capacity building, communication and information, and rewarding quality. The model can be applied at the level of an organization or a system. The paper also describes the process of institutionalizing QA, starting from a state of preawareness, passing through four phases (awareness, experiential, expansion, and consolidation), and culminating in a state of maturity. The process is not linear; an organization may regress, vacillate between phases, or even remain stagnant. Some phases (e.g. awareness and experiential) may occur simultaneously. The framework has been introduced in nearly a dozen countries in Latin America and Africa. The conceptual model has been used to support strategic planning and directing Ministry of Health work plans, and also as a resource for determining the elements necessary to strengthen and sustain QA. The next step will be the development and evaluation of an assessment tool to monitor developmental progress in the institutionalization of QA.

  14. Quality assurance during site construction

    International Nuclear Information System (INIS)

    Dommke, J.; Jurgutat, H.

    1980-01-01

    During the time of planing and construction of a nuclear power plant, the following proceeding is approved: - the deliverer of a nuclear power plant provides the reports fixing the quality assurance program, it means that he is responsible to write the safety analysis report, the specifications for the erection of the components, the working manuals and specifications for testing (eg nondestr. testing) - the manufacturing of components or systems will be controlled by an own independent quality assurance group, provided that this group was checked by the quality assurance group of the applicant - the TUeV with its independent assessors will fix the requirements relating to quality assurance in its assessment. On this basis the examination of the applicants specifications, working manuals, testing specifications will be done. The efficiency of quality assurance at the manufacturer and at the applicant will be checked by the TUeV specialists by considering specifications of modifications, repairs or tolerances. A mean point of the quality assurance in Germany is the dynamic adjustment, of an action on the latest state of engineering or science. If there exists a change of rules or guidelines, the quality assurance requirements have to be fit on this state in so far as it is feasible from the technical point of view. (orig./RW)

  15. Information Governance: A Model for Security in Medical Practice

    Directory of Open Access Journals (Sweden)

    Patricia A.H. Williams

    2007-03-01

    Full Text Available Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security.  In the medical arena this information is primarily sensitive patient-based information. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. Consequently, information security governance will be a key issue for medical practice in the future. Information security governance is a relatively new term and there is little existing research into how to meet governance requirements. The limited research that exists describes information security governance frameworks at a strategic level. However, since medical practice is already lagging in the implementation of appropriate security, such definition may not be practical although it is obviously desirable. This paper describes an on-going action research project undertaken in the area of medical information security, and presents a tactical approach model aimed at addressing information security governance and the protection of medical data. 

  16. Tracers and traceability: implementing the cirrus parameterisation from LACM in the TOMCAT/SLIMCAT chemistry transport model as an example of the application of quality assurance to legacy models

    Directory of Open Access Journals (Sweden)

    A. M. Horseman

    2010-03-01

    Full Text Available A new modelling tool for the investigation of large-scale behaviour of cirrus clouds has been developed. This combines two existing models, the TOMCAT/SLIMCAT chemistry transport model (nupdate library version 0.80, script mpc346_l and cirrus parameterisation of Ren and MacKenzie (LACM implementation not versioned. The development process employed a subset of best-practice software engineering and quality assurance processes, selected to be viable for small-scale projects whilst maintaining the same traceability objectives. The application of the software engineering and quality control processes during the development has been shown to be not a great overhead, and their use has been of benefit to the developers as well as the end users of the results. We provide a step-by-step guide to the implementation of traceability tailored to the production of geo-scientific research software, as distinct from commercial and operational software. Our recommendations include: maintaining a living "requirements list"; explicit consideration of unit, integration and acceptance testing; and automated revision/configuration control, including control of analysis tool scripts and programs.

    Initial testing of the resulting model against satellite and in-situ measurements has been promising. The model produces representative results for both spatial distribution of the frequency of occurrence of cirrus ice, and the drying of air as it moves across the tropical tropopause. The model is now ready for more rigorous quantitative testing, but will require the addition of a vertical wind velocity downscaling scheme to better represent extra-tropical continental cirrus.

  17. Information Models of Acupuncture Analgesia and Meridian Channels

    Directory of Open Access Journals (Sweden)

    Chang Hua Zou

    2010-12-01

    Full Text Available Acupuncture and meridian channels have been major components of Chinese and Eastern Asian medicine—especially for analgesia—for over 2000 years. In recent decades, electroacupuncture (EA analgesia has been applied clinically and experimentally. However, there were controversial results between different treatment frequencies, or between the active and the placebo treatments; and the mechanisms of the treatments and the related meridian channels are still unknown. In this study, we propose a new term of infophysics therapy and develop information models of acupuncture (or EA analgesia and meridian channels, to understand the mechanisms and to explain the controversial results, based on Western theories of information, trigonometry and Fourier series, and physics, as well as published biomedical data. We are trying to build a bridge between Chinese medicine and Western medicine by investigating the Eastern acupuncture analgesia and meridian channels with Western sciences; we model the meridians as a physiological system that is mostly constructed with interstices in or between other physiological systems; we consider frequencies, amplitudes and wave numbers of electric field intensity (EFI as information data. Our modeling results demonstrate that information regulated with acupuncture (or EA is different from pain information, we provide answers to explain the controversial published results, and suggest that mechanisms of acupuncture (or EA analgesia could be mostly involved in information regulation of frequencies and amplitudes of EFI as well as neuronal transmitters such as endorphins.

  18. Ballistic quality assurance

    International Nuclear Information System (INIS)

    Cassol, E.; Bonnet, J.; Porcheron, D.; Mazeron, J.J.; Peiffert, D.; Alapetite, C.

    2012-01-01

    This review describes the ballistic quality assurance for stereotactic intracranial irradiation treatments delivered with Gamma Knife R either dedicated or adapted medical linear accelerators. Specific and periodic controls should be performed in order to check the mechanical stability for both irradiation and collimation systems. If this step remains under the responsibility of the medical physicist, it should be done in agreement with the manufacturer's technical support. At this time, there are no recent published guidelines. With technological developments, both frequency and accuracy should be assessed in each institution according to the treatment mode: single versus hypo-fractionated dose, circular collimator versus micro-multi-leaf collimators. In addition, 'end-to-end' techniques are mandatory to find the origin of potential discrepancies and to estimate the global ballistic accuracy of the delivered treatment. Indeed, they include frames, non-invasive immobilization devices, localizers, multimodal imaging for delineation and in-room positioning imaging systems. The final precision that could be reasonably achieved is more or less 1 mm. (authors)

  19. Quality assurance and accreditation.

    Science.gov (United States)

    1997-01-01

    In 1996, the Joint Commission International (JCI), which is a partnership between the Joint Commission on Accreditation of Healthcare Organizations and Quality Healthcare Resources, Inc., became one of the contractors of the Quality Assurance Project (QAP). JCI recognizes the link between accreditation and quality, and uses a collaborative approach to help a country develop national quality standards that will improve patient care, satisfy patient-centered objectives, and serve the interest of all affected parties. The implementation of good standards provides support for the good performance of professionals, introduces new ideas for improvement, enhances the quality of patient care, reduces costs, increases efficiency, strengthens public confidence, improves management, and enhances the involvement of the medical staff. Such good standards are objective and measurable; achievable with current resources; adaptable to different institutions and cultures; and demonstrate autonomy, flexibility, and creativity. The QAP offers the opportunity to approach accreditation through research efforts, training programs, and regulatory processes. QAP work in the area of accreditation has been targeted for Zambia, where the goal is to provide equal access to cost-effective, quality health care; Jordan, where a consensus process for the development of standards, guidelines, and policies has been initiated; and Ecuador, where JCI has been asked to help plan an approach to the evaluation and monitoring of the health care delivery system.

  20. CONCEPTUAL MODEL OF INFORMATION SYSTEM OF THE AGRICULTURAL ENTERPRISES

    Directory of Open Access Journals (Sweden)

    Uladzimir Buts

    2017-02-01

    Full Text Available Abstract. Research subject represented by the theoretical and practical issues use of information resources in the agricultural business. Research aim is to formation of a conceptual model of information system of agricultural enterprises according to the requirements of sustainable development. Research methods. The work is prepared on basis of several scientific methods and approaches including monographic, analytical, computational and constructive methods of mathematical and structural logic simulation of information systems. Research results. Based on the assessment of the results of research information systems in agribusiness, as reflected in the theoretical review, the author designed principles of the information system for the agricultural enterprise for sustainable development of agribusiness. Sphere of application of the research results. State and regional authorities of economic regulation. Agricultural enterprises and farmers.