WorldWideScience

Sample records for product verification strategy

  1. A pilot scale demonstration of the DWPF process control and product verification strategy

    International Nuclear Information System (INIS)

    Hutson, N.D.; Jantzen, C.M.; Beam, D.C.

    1992-01-01

    The Defense Waste Processing Facility (DWPF) has been designed and constructed to immobilize Savannah River Site high level liquid waste within a durable borosilicate glass matrix for permanent storage. The DWPF will be operated to produce a glass product which must meet a number of product property constraints which are dependent upon the final product composition. During actual operations, the DWPF will control the properties of the glass product by the controlled blending of the waste streams with a glass-forming frit to produce the final melter feed slurry. The DWPF will verify control of the glass product through analysis of vitrified samples of slurry material. In order to demonstrate the DWPF process control and product verification strategy, a pilot-scale vitrification research facility was operated in three discrete batches using simulated DWPF waste streams. All of the DWPF process control methodologies were followed and the glass produce from each experiment was leached according to the Product Consistency Test. Results of the campaign are summarized

  2. A pilot scale demonstration of the DWPF process control and product verification strategy

    International Nuclear Information System (INIS)

    Hutson, N.D.; Jantzen, C.M.; Beam, D.C.

    1992-01-01

    The Defense Waste Processing Facility (DWPF) has been designed and constructed to immobilize Savannah River Site high level liquid waste within a durable borosilicate glass matrix for permanent storage. The DWPF will be operated to produce a glass product which must meet a number of product property constraints which are dependent upon the final product composition. During actual operations, the DWPF will control the properties of the glass product by the controlled blending of the waste streams with a glass-forming frit to produce the final melter feed slurry. The DWPF will verify control of the glass product through analysis of vitrified samples of slurry material. In order to demonstrate the DWPF process control and product verification strategy, a pilot-scale vitrification research facility was operated in three discrete batches using simulated DWPF waste streams. All of the DWPF process control methodologies were followed and the glass product from each experiment was leached according to the Product Consistency Test. In this paper results of the campaign are summarized

  3. The virtual product-process design laboratory to manage the complexity in the verification of formulated products

    DEFF Research Database (Denmark)

    Conte, Elisa; Gani, Rafiqul; Malik, Tahir I.

    2011-01-01

    -Process Design laboratory (virtual PPD-lab) software is based on this decomposition strategy for the design of formulated liquid products. When the needed models are available in the software, the solution of formulation design/verification problems is straightforward, while when models are not available...... mixtures need to be predicted. This complexity has to be managed through decomposition of the problem into sub-problems. Each sub-problem is solved and analyzed and, from the knowledge gained, an overall evaluation of the complex chemical system representing the product is made. The virtual Product...... in the software library, they need to be developed and/or implemented. The potential of the virtual PPD-lab in managing the complexity in the verification of formulated products, after the needed models have been developed and implemented, is highlighted in this paper through a case study from industry dealing...

  4. Verification of product design using regulation knowledge base and Web services

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ik June [KAERI, Daejeon (Korea, Republic of); Lee, Jae Chul; Mun Du Hwan [Kyungpook National University, Daegu (Korea, Republic of); Kim, Byung Chul [Dong-A University, Busan (Korea, Republic of); Hwang, Jin Sang [PartDB Co., Ltd., Daejeom (Korea, Republic of); Lim, Chae Ho [Korea Institute of Industrial Technology, Incheon (Korea, Republic of)

    2015-11-15

    Since product regulations contain important rules or codes that manufacturers must follow, automatic verification of product design with the regulations related to a product is necessary. For this, this study presents a new method for the verification of product design using regulation knowledge base and Web services. Regulation knowledge base consisting of product ontology and rules was built with a hybrid technique combining ontology and programming languages. Web service for design verification was developed ensuring the flexible extension of knowledge base. By virtue of two technical features, design verification is served to various products while the change of system architecture is minimized.

  5. Verification of product design using regulation knowledge base and Web services

    International Nuclear Information System (INIS)

    Kim, Ik June; Lee, Jae Chul; Mun Du Hwan; Kim, Byung Chul; Hwang, Jin Sang; Lim, Chae Ho

    2015-01-01

    Since product regulations contain important rules or codes that manufacturers must follow, automatic verification of product design with the regulations related to a product is necessary. For this, this study presents a new method for the verification of product design using regulation knowledge base and Web services. Regulation knowledge base consisting of product ontology and rules was built with a hybrid technique combining ontology and programming languages. Web service for design verification was developed ensuring the flexible extension of knowledge base. By virtue of two technical features, design verification is served to various products while the change of system architecture is minimized.

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DUST SUPPRESSANT PRODUCTS: SYNTECH PRODUCTS CORPORATION'S PETROTAC

    Science.gov (United States)

    Dust suppressant products used to control particulate emissions from unpaved roads are among the technologies evaluated by the Air Pollution Control Technology (APCT) Verification Center, part of the U.S. Environmental Protection Agency's Environmental Technology Verification (ET...

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DUST SUPPRESSANT PRODUCTS: SYNTECH PRODUCTS CORPORATION'S TECHSUPPRESS

    Science.gov (United States)

    Dust suppressant products used to control particulate emissions from unpaved roads are among the technologies evaluated by the Air Pollution Control Technology (APCT) Verification Center, part of the U.S. Environmental Protection Agency's Environmental Technology Verification (ET...

  8. Regional MLEM reconstruction strategy for PET-based treatment verification in ion beam radiotherapy

    International Nuclear Information System (INIS)

    Gianoli, Chiara; Riboldi, Marco; Fattori, Giovanni; Baselli, Giuseppe; Baroni, Guido; Bauer, Julia; Debus, Jürgen; Parodi, Katia; De Bernardi, Elisabetta

    2014-01-01

    In ion beam radiotherapy, PET-based treatment verification provides a consistency check of the delivered treatment with respect to a simulation based on the treatment planning. In this work the region-based MLEM reconstruction algorithm is proposed as a new evaluation strategy in PET-based treatment verification. The comparative evaluation is based on reconstructed PET images in selected regions, which are automatically identified on the expected PET images according to homogeneity in activity values. The strategy was tested on numerical and physical phantoms, simulating mismatches between the planned and measured β + activity distributions. The region-based MLEM reconstruction was demonstrated to be robust against noise and the sensitivity of the strategy results were comparable to three voxel units, corresponding to 6 mm in numerical phantoms. The robustness of the region-based MLEM evaluation outperformed the voxel-based strategies. The potential of the proposed strategy was also retrospectively assessed on patient data and further clinical validation is envisioned. (paper)

  9. IP cores design from specifications to production modeling, verification, optimization, and protection

    CERN Document Server

    Mohamed, Khaled Salah

    2016-01-01

    This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection. Various trade-offs in the design process are discussed, including  those associated with many of the most common memory cores, controller IPs  and system-on-chip (SoC) buses. Readers will also benefit from the author’s practical coverage of new verification methodologies. such as bug localization, UVM, and scan-chain.  A SoC case study is presented to compare traditional verification with the new verification methodologies. ·         Discusses the entire life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection; ·         Introduce a deep introduction for Verilog for both implementation and verification point of view.  ·         Demonstrates how to use IP in applications such as memory controllers and SoC buses. ·         Describes a new ver...

  10. Research on verification and validation strategy of detonation fluid dynamics code of LAD2D

    Science.gov (United States)

    Wang, R. L.; Liang, X.; Liu, X. Z.

    2017-07-01

    The verification and validation (V&V) is an important approach in the software quality assurance of code in complex engineering application. Reasonable and efficient V&V strategy can achieve twice the result with half the effort. This article introduces the software-Lagrangian adaptive hydrodynamics code in 2D space (LAD2D), which is self-developed software in detonation CFD with plastic-elastic structure. The V&V strategy of this detonation CFD code is presented based on the foundation of V&V methodology for scientific software. The basic framework of the module verification and the function validation is proposed, composing the detonation fluid dynamics model V&V strategy of LAD2D.

  11. BAGHOUSE FILTRATION PRODUCTS VERIFICATION TESTING, HOW IT BENEFITS THE BOILER BAGHOUSE OPERATOR

    Science.gov (United States)

    The paper describes the Environmental Technology Verification (ETV) Program for baghouse filtration products developed by the Air Pollution Control Technology Verification Center, one of six Centers under the ETV Program, and discusses how it benefits boiler baghouse operators. A...

  12. International comparison of product certification and verification methods for appliances

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Nan [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Romankiewicz, John [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Zheng, Nina [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-06-01

    Enforcement of appliance standards and consumer trust in appliance labeling are important foundations of growing a more energy efficient economy. Product certification and verification increase compliance rates which in turn increase both energy savings and consumer trust. This paper will serve two purposes: 1) to review international practices for product certification and verification as they relate to the enforcement of standards and labeling programs in the U.S., E.U., Australia, Japan, Canada, and China; and 2) to make recommendations for China to implement improved certification processes related to their mandatory standards and labeling program such as to increase compliance rates and energy savings potential.

  13. International Comparison of Product Certification and Verification Methods for Appliances

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Nan [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Romankiewicz, John [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Zheng, Nina [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-06-01

    Enforcement of appliance standards and consumer trust in appliance labeling are important foundations of growing a more energy efficient economy. Product certification and verification increase compliance rates which in turn increase both energy savings and consumer trust. This paper will serve two purposes: 1) to review international practices for product certification and verification as they relate to the enforcement of standards and labeling programs in the U.S., E.U., Australia, Japan, Canada, and China; and 2) to make recommendations for China to implement improved certification processes related to their mandatory standards and labeling program such as to increase compliance rates and energy savings potential.

  14. Multi-resistance strategy for viral diseases and short hairpin RNA verification method in pigs

    Directory of Open Access Journals (Sweden)

    Jong-nam Oh

    2018-04-01

    Full Text Available Objective Foot and mouth disease (FMD and porcine reproductive and respiratory syndrome (PRRS are major diseases that interrupt porcine production. Because they are viral diseases, vaccinations are of only limited effectiveness in preventing outbreaks. To establish an alternative multi-resistant strategy against FMD virus (FMDV and PRRS virus (PRRSV, the present study introduced two genetic modification techniques to porcine cells. Methods First, cluster of differentiation 163 (CD163, the PRRSV viral receptor, was edited with the clustered regularly interspaced short palindromic repeats-CRISPR-associated protein 9 technique. The CD163 gene sequences of edited cells and control cells differed. Second, short hairpin RNA (shRNAs were integrated into the cells. The shRNAs, targeting the 3D gene of FMDV and the open reading frame 7 (ORF7 gene of PRRSV, were transferred into fibroblasts. We also developed an in vitro shRNA verification method with a target gene expression vector. Results shRNA activity was confirmed in vitro with vectors that expressed the 3D and ORF7 genes in the cells. Cells containing shRNAs showed lower transcript levels than cells with only the expression vectors. The shRNAs were integrated into CD163-edited cells to combine the two techniques, and the viral genes were suppressed in these cells. Conclusion We established a multi-resistant strategy against viral diseases and an in vitro shRNA verification method.

  15. Methodology and applicability of a safety and demonstration concept for a HAW final repository on clays. Safety concept and verification strategy

    International Nuclear Information System (INIS)

    Ruebel, Andre; Meleshyn, Artur

    2014-08-01

    The report describes the site independent frame for a safety concept and verification strategy for a final repository for heat generating wastes in clay rock. In the safety concept planning specifications and technical measures are summarized that are supposed to allow a safe inclusion of radionuclides in the host rock. The verification strategy defines the systematic procedures for the development of fundamentals and scenarios as basis for the demonstration of the safety case and to allow the prognosis of appropriateness. The report includes the boundary conditions, the safety concept for the post-closure phase and the verification strategy for the post-closure phase.

  16. Age verification cards fail to fully prevent minors from accessing tobacco products.

    Science.gov (United States)

    Kanda, Hideyuki; Osaki, Yoneatsu; Ohida, Takashi; Kaneita, Yoshitaka; Munezawa, Takeshi

    2011-03-01

    Proper age verification can prevent minors from accessing tobacco products. For this reason, electronic locking devices based on a proof-of age system utilising cards were installed in almost every tobacco vending machine across Japan and Germany to restrict sales to minors. We aimed to clarify the associations between amount smoked by high school students and the usage of age verification cards by conducting a nationwide cross-sectional survey of students in Japan. This survey was conducted in 2008. We asked high school students, aged 13-18 years, in Japan about their smoking behaviour, where they purchase cigarettes, if or if not they have used age verification cards, and if yes, how they obtained this card. As the amount smoked increased, the prevalence of purchasing cigarettes from vending machines also rose for both males and females. The percentage of those with experience of using an age verification card was also higher among those who smoked more. Somebody outside of family was the top source of obtaining cards. Surprisingly, around 5% of males and females belonging to the group with highest smoking levels applied for cards themselves. Age verification cards cannot fully prevent minors from accessing tobacco products. These findings suggest that a total ban of tobacco vending machines, not an age verification system, is needed to prevent sales to minors.

  17. Developing a NASA strategy for the verification of large space telescope observatories

    Science.gov (United States)

    Crooke, Julie A.; Gunderson, Johanna A.; Hagopian, John G.; Levine, Marie

    2006-06-01

    In July 2005, the Office of Program Analysis and Evaluation (PA&E) at NASA Headquarters was directed to develop a strategy for verification of the performance of large space telescope observatories, which occurs predominantly in a thermal vacuum test facility. A mission model of the expected astronomical observatory missions over the next 20 years was identified along with performance, facility and resource requirements. Ground testing versus alternatives was analyzed to determine the pros, cons and break points in the verification process. Existing facilities and their capabilities were examined across NASA, industry and other government agencies as well as the future demand for these facilities across NASA's Mission Directorates. Options were developed to meet the full suite of mission verification requirements, and performance, cost, risk and other analyses were performed. Findings and recommendations from the study were presented to the NASA Administrator and the NASA Strategic Management Council (SMC) in February 2006. This paper details the analysis, results, and findings from this study.

  18. Software verification for nuclear industry

    International Nuclear Information System (INIS)

    Wilburn, N.P.

    1985-08-01

    Why verification of software products throughout the software life cycle is necessary is considered. Concepts of verification, software verification planning, and some verification methodologies for products generated throughout the software life cycle are then discussed

  19. Verification of product quality from process control

    International Nuclear Information System (INIS)

    Drobot, A.; Bunnell, L.R.; Freeborn, W.P.; Macedo, P.B.; Mellinger, G.B.; Pegg, I.L.; Piepel, G.F.; Reimus, M.A.H.; Routt, K.R.; Saad, E.

    1989-01-01

    Process models were developed to characterize the waste vitrification at West Valley, in terms of process operating constraints and glass compositions achievable. The need for verification of compliance with the proposed Waste Acceptance Preliminary Specification criteria led to development of product models, the most critical one being a glass durability model. Both process and product models were used in developing a target composition for the waste glass. This target composition designed to ensure that glasses made to this target will be of acceptable durability after all process variations have been accounted for. 4 refs., 11 figs., 5 tabs

  20. Status and verification strategy for ITER neutronics

    Energy Technology Data Exchange (ETDEWEB)

    Loughlin, Michael, E-mail: michael.loughlin@iter.org [ITER Organization, Route de Vinon sur Verdon, 13115 Saint Paul Lez Durance (France); Angelone, Maurizio [Associazione EURATOM-ENEA Sulla Fusione, Via E. Fermi 45, I-00044 Frascati, Roma (Italy); Batistoni, Paola [Associazione EURATOM-ENEA Sulla Fusione, Via E. Fermi 45, I-00044 Frascati, Roma (Italy); JET-EFDA, Culham Science Centre, Abingdon OX14 3DB (United Kingdom); Bertalot, Luciano [ITER Organization, Route de Vinon sur Verdon, 13115 Saint Paul Lez Durance (France); Eskhult, Jonas [Studsvik Nuclear AB, SE-611 Nyköping (Sweden); Konno, Chikara [Japan Atomic Energy Agency Tokai-mura, Naka-gun, Ibaraki-ken 319-1195 (Japan); Pampin, Raul [F4E Fusion for Energy, Josep Pla 2, Torres Diagonal Litoral B3, Barcelona 08019 (Spain); Polevoi, Alexei; Polunovskiy, Eduard [ITER Organization, Route de Vinon sur Verdon, 13115 Saint Paul Lez Durance (France)

    2014-10-15

    The paper summarizes the current status of neutronics at ITER and a first set of proposals for experimental programmes to be conducted in the early operational life-time of ITER are described for the more crucial areas. These include a TF coils heating benchmark, a streaming benchmark and streaming measurements by activation on ITER itself. Also on ITER the measurement of activated water from triton burn-up should be planned and performed. This will require the measurement of triton burn-up in DD phase. Measurements of neutron flux in the tokamak building during DD operations should also be carried out. The use of JET for verification of shut down dose rate estimates is desirable. Other facilities to examine the production and behaviour of activated corrosion products and the shielding properties of concretes to high energy (6 MeV) gamma-rays are recommended.

  1. Verification and validation of the decision analysis model for assessment of TWRS waste treatment strategies

    International Nuclear Information System (INIS)

    Awadalla, N.G.; Eaton, S.C.F.

    1996-01-01

    This document is the verification and validation final report for the Decision Analysis Model for Assessment of Tank Waste Remediation System Waste Treatment Strategies. This model is also known as the INSIGHT Model

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, BAGHOUSE FILTRATION PRODUCTS, TETRATEC PTFE PRODUCTS, TETRATEX 6212 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size of those particles equal to and smalle...

  3. ASAMPSA-E guidance for level 2 PSA Volume 3. Verification and improvement of SAM strategies with L2 PSA

    International Nuclear Information System (INIS)

    Rahni, N.; Raimond, E.; Jan, P.; Lopez, J.; Loeffler, H.; Mildenberger, O.; Kubicek, J.; Vitazkova, J.; Ivanov, I.; Groudev, P.; Lajtha, G.; Serrano, C.; Zhabin, O.; Prosek, Andrej; Dirksen, G.; Yu, S.; Oury, L.; Hultqvist, G.

    2016-01-01

    For each NPP, severe accident management (SAM) strategies shall make use of components or systems and human resources to limit as far as possible the consequences of any severe accident on-site and off-site. L2 PSA is one of the tools that can be used to verify and improve these strategies. The present report (deliverable D40.5 of the project ASAMPSA-E) provides an opportunity for a comparison of objectives in the different countries in terms of SAM strategies verification and improvement. The report summarizes also experience of each partner (including potential deficiencies) involved in this activity, in order to derive some good practices and required progress, addressing: - SAM modeling in L2 PSA, - Positive and negative aspects in current SAM practices, - Discussion on possible criteria related to L2 PSA for verification and improvement: risk reduction (in relation with WP30 activities on risk metrics), reduction of uncertainties on the severe accident progression paths until NPP stabilization, reduction of human failure conditional probabilities (depending on the SAM strategy, the environmental conditions...), - Review with a perspective of verification and improvement of the main SAM strategies (corium cooling, RCS depressurization, control of flammable gases, reactivity control, containment function, containment pressure control, limitation of radioactive releases,...), - SAM strategies to be considered in the context of an extended L2 PSA (as far possible, depending on existing experience), taking into account all operating modes, accidents also occurring in the SFPs and long term and multi-unit accidents. The deliverable D40.5 is developed from the partners' experience. Many of the topics described here are beyond the common practices of L2 PSA applications: in some countries, L2 PSA application is limited to the calculations of frequencies of release categories with no formal requirement for SAM verification and improvement. (authors)

  4. Study of Measurement Strategies of Geometric Deviation of the Position of the Threaded Holes

    Science.gov (United States)

    Drbul, Mário; Martikan, Pavol; Sajgalik, Michal; Czan, Andrej; Broncek, Jozef; Babik, Ondrej

    2017-12-01

    Verification of product and quality control is an integral part of current production process. In terms of functional requirements and product interoperability, it is necessary to analyze their dimensional and also geometric specifications. Threaded holes are verified elements too, which are a substantial part of detachable screw connections and have a broad presence in engineering products. This paper deals with on the analysing of measurement strategies of verification geometric deviation of the position of the threaded holes, which are the indirect method of measuring threaded pins when applying different measurement strategies which can affect the result of the verification of the product..

  5. Monitoring tobacco brand websites to understand marketing strategies aimed at tobacco product users and potential users.

    Science.gov (United States)

    Escobedo, Patricia; Cruz, Tess Boley; Tsai, Kai-Ya; Allem, Jon-Patrick; Soto, Daniel W; Kirkpatrick, Matthew G; Pattarroyo, Monica; Unger, Jennifer B

    2017-09-11

    Limited information exists about strategies and methods used on brand marketing websites to transmit pro-tobacco messages to tobacco users and potential users. This study compared age verification methods, themes, interactive activities and links to social media across tobacco brand websites. This study examined 12 tobacco brand websites representing four tobacco product categories: cigarettes, cigar/cigarillos, smokeless tobacco, and e-cigarettes. Website content was analyzed by tobacco product category and data from all website visits (n = 699) were analyzed. Adult smokers (n=32) coded websites during a one-year period, indicating whether or not they observed any of 53 marketing themes, seven interactive activities, or five external links to social media sites. Most (58%) websites required online registration before entering, however e-cigarette websites used click-through age verification. Compared to cigarette sites, cigar/cigarillo sites were more likely to feature themes related to "party" lifestyle, and e-cigarette websites were much more likely to feature themes related to harm reduction. Cigarette sites featured greater levels of interactive content compared to other tobacco products. Compared to cigarette sites, cigar/cigarillo sites were more likely to feature activities related to events and music. Compared to cigarette sites, both cigar and e-cigarette sites were more likely to direct visitors to external social media sites. Marketing methods and strategies normalize tobacco use by providing website visitors with positive themes combined with interactive content, and is an area of future research. Moreover, all tobacco products under federal regulatory authority should be required to use more stringent age verification gates. Findings indicate the Food and Drug Administration (FDA) should require brand websites of all tobacco products under its regulatory authority use more stringent age verification gates by requiring all visitors be at least 18 years

  6. Fault-specific verification (FSV) - An alternative VV ampersand T strategy for high reliability nuclear software systems

    International Nuclear Information System (INIS)

    Miller, L.A.

    1994-01-01

    The author puts forth an argument that digital instrumentation and control systems can be safely applied in the nuclear industry, but it will require changes to the way software for such systems is developed and tested. He argues for a fault-specific verification procedure to be applied to software development. This plan includes enumerating and classifying all software faults at all levels of the product development, over the whole development process. While collecting this data, develop and validate different methods for software verification, validation and testing, and apply them against all the detected faults. Force all of this development toward an automated product for doing this testing. Continue to develop, expand, test, and share these testing methods across a wide array of software products

  7. FMCT verification: Case studies

    International Nuclear Information System (INIS)

    Hui Zhang

    2001-01-01

    Full text: How to manage the trade-off between the need for transparency and the concern about the disclosure of sensitive information would be a key issue during the negotiations of FMCT verification provision. This paper will explore the general concerns on FMCT verification; and demonstrate what verification measures might be applied to those reprocessing and enrichment plants. A primary goal of an FMCT will be to have the five declared nuclear weapon states and the three that operate unsafeguarded nuclear facilities become parties. One focus in negotiating the FMCT will be verification. Appropriate verification measures should be applied in each case. Most importantly, FMCT verification would focus, in the first instance, on these states' fissile material production facilities. After the FMCT enters into force, all these facilities should be declared. Some would continue operating to produce civil nuclear power or to produce fissile material for non- explosive military uses. The verification measures necessary for these operating facilities would be essentially IAEA safeguards, as currently being applied to non-nuclear weapon states under the NPT. However, some production facilities would be declared and shut down. Thus, one important task of the FMCT verifications will be to confirm the status of these closed facilities. As case studies, this paper will focus on the verification of those shutdown facilities. The FMCT verification system for former military facilities would have to differ in some ways from traditional IAEA safeguards. For example, there could be concerns about the potential loss of sensitive information at these facilities or at collocated facilities. Eventually, some safeguards measures such as environmental sampling might be seen as too intrusive. Thus, effective but less intrusive verification measures may be needed. Some sensitive nuclear facilities would be subject for the first time to international inspections, which could raise concerns

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - TETRATEC PTFE TECHNOLOGIES TETRATEX 8005

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  9. Mapping {sup 15}O Production Rate for Proton Therapy Verification

    Energy Technology Data Exchange (ETDEWEB)

    Grogg, Kira; Alpert, Nathaniel M.; Zhu, Xuping [Center for Advanced Radiological Sciences, Nuclear Medicine and Molecular Imaging, Radiology Department, Massachusetts General Hospital, Boston, Massachusetts (United States); Min, Chul Hee [Department of Radiological Science, College of Health Science, Yonsei University, Wonju, Kangwon (Korea, Republic of); Testa, Mauro; Winey, Brian [Department of Radiation Oncology, Massachusetts General Hospital and Harvard Medical School, Boston, Massachusetts (United States); Normandin, Marc D. [Center for Advanced Radiological Sciences, Nuclear Medicine and Molecular Imaging, Radiology Department, Massachusetts General Hospital, Boston, Massachusetts (United States); Shih, Helen A.; Paganetti, Harald; Bortfeld, Thomas [Department of Radiation Oncology, Massachusetts General Hospital and Harvard Medical School, Boston, Massachusetts (United States); El Fakhri, Georges, E-mail: elfakhri@pet.mgh.harvard.edu [Center for Advanced Radiological Sciences, Nuclear Medicine and Molecular Imaging, Radiology Department, Massachusetts General Hospital, Boston, Massachusetts (United States)

    2015-06-01

    Purpose: This work was a proof-of-principle study for the evaluation of oxygen-15 ({sup 15}O) production as an imaging target through the use of positron emission tomography (PET), to improve verification of proton treatment plans and to study the effects of perfusion. Methods and Materials: Dynamic PET measurements of irradiation-produced isotopes were made for a phantom and rabbit thigh muscles. The rabbit muscle was irradiated and imaged under both live and dead conditions. A differential equation was fitted to phantom and in vivo data, yielding estimates of {sup 15}O production and clearance rates, which were compared to live versus dead rates for the rabbit and to Monte Carlo predictions. Results: PET clearance rates agreed with decay constants of the dominant radionuclide species in 3 different phantom materials. In 2 oxygen-rich materials, the ratio of {sup 15}O production rates agreed with the expected ratio. In the dead rabbit thighs, the dynamic PET concentration histories were accurately described using {sup 15}O decay constant, whereas the live thigh activity decayed faster. Most importantly, the {sup 15}O production rates agreed within 2% (P>.5) between conditions. Conclusions: We developed a new method for quantitative measurement of {sup 15}O production and clearance rates in the period immediately following proton therapy. Measurements in the phantom and rabbits were well described in terms of {sup 15}O production and clearance rates, plus a correction for other isotopes. These proof-of-principle results support the feasibility of detailed verification of proton therapy treatment delivery. In addition, {sup 15}O clearance rates may be useful in monitoring permeability changes due to therapy.

  10. Advanced verification topics

    CERN Document Server

    Bhattacharya, Bishnupriya; Hall, Gary; Heaton, Nick; Kashai, Yaron; Khan Neyaz; Kirshenbaum, Zeev; Shneydor, Efrat

    2011-01-01

    The Accellera Universal Verification Methodology (UVM) standard is architected to scale, but verification is growing and in more than just the digital design dimension. It is growing in the SoC dimension to include low-power and mixed-signal and the system integration dimension to include multi-language support and acceleration. These items and others all contribute to the quality of the SOC so the Metric-Driven Verification (MDV) methodology is needed to unify it all into a coherent verification plan. This book is for verification engineers and managers familiar with the UVM and the benefits it brings to digital verification but who also need to tackle specialized tasks. It is also written for the SoC project manager that is tasked with building an efficient worldwide team. While the task continues to become more complex, Advanced Verification Topics describes methodologies outside of the Accellera UVM standard, but that build on it, to provide a way for SoC teams to stay productive and profitable.

  11. Concepts for inventory verification in critical facilities

    International Nuclear Information System (INIS)

    Cobb, D.D.; Sapir, J.L.; Kern, E.A.; Dietz, R.J.

    1978-12-01

    Materials measurement and inventory verification concepts for safeguarding large critical facilities are presented. Inspection strategies and methods for applying international safeguards to such facilities are proposed. The conceptual approach to routine inventory verification includes frequent visits to the facility by one inspector, and the use of seals and nondestructive assay (NDA) measurements to verify the portion of the inventory maintained in vault storage. Periodic verification of the reactor inventory is accomplished by sampling and NDA measurement of in-core fuel elements combined with measurements of integral reactivity and related reactor parameters that are sensitive to the total fissile inventory. A combination of statistical sampling and NDA verification with measurements of reactor parameters is more effective than either technique used by itself. Special procedures for assessment and verification for abnormal safeguards conditions are also considered. When the inspection strategies and inventory verification methods are combined with strict containment and surveillance methods, they provide a high degree of assurance that any clandestine attempt to divert a significant quantity of fissile material from a critical facility inventory will be detected. Field testing of specific hardware systems and procedures to determine their sensitivity, reliability, and operational acceptability is recommended. 50 figures, 21 tables

  12. Improved verification methods for safeguards verifications at enrichment plants

    International Nuclear Information System (INIS)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D.

    2009-01-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF 6 cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  13. Improved verification methods for safeguards verifications at enrichment plants

    Energy Technology Data Exchange (ETDEWEB)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D. [Department of Safeguards, International Atomic Energy Agency, Wagramer Strasse 5, A1400 Vienna (Austria)

    2009-07-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF{sub 6} cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  14. Verification and validation in computational fluid dynamics

    Science.gov (United States)

    Oberkampf, William L.; Trucano, Timothy G.

    2002-04-01

    Verification and validation (V&V) are the primary means to assess accuracy and reliability in computational simulations. This paper presents an extensive review of the literature in V&V in computational fluid dynamics (CFD), discusses methods and procedures for assessing V&V, and develops a number of extensions to existing ideas. The review of the development of V&V terminology and methodology points out the contributions from members of the operations research, statistics, and CFD communities. Fundamental issues in V&V are addressed, such as code verification versus solution verification, model validation versus solution validation, the distinction between error and uncertainty, conceptual sources of error and uncertainty, and the relationship between validation and prediction. The fundamental strategy of verification is the identification and quantification of errors in the computational model and its solution. In verification activities, the accuracy of a computational solution is primarily measured relative to two types of highly accurate solutions: analytical solutions and highly accurate numerical solutions. Methods for determining the accuracy of numerical solutions are presented and the importance of software testing during verification activities is emphasized. The fundamental strategy of validation is to assess how accurately the computational results compare with the experimental data, with quantified error and uncertainty estimates for both. This strategy employs a hierarchical methodology that segregates and simplifies the physical and coupling phenomena involved in the complex engineering system of interest. A hypersonic cruise missile is used as an example of how this hierarchical structure is formulated. The discussion of validation assessment also encompasses a number of other important topics. A set of guidelines is proposed for designing and conducting validation experiments, supported by an explanation of how validation experiments are different

  15. Nuclear test ban verification

    International Nuclear Information System (INIS)

    Chun, Kin-Yip

    1991-07-01

    This report describes verification and its rationale, the basic tasks of seismic verification, the physical basis for earthquake/explosion source discrimination and explosion yield determination, the technical problems pertaining to seismic monitoring of underground nuclear tests, the basic problem-solving strategy deployed by the forensic seismology resarch team at the University of Toronto, and the scientific significance of the team's research. The research carried out at the Univeristy of Toronto has two components: teleseismic verification using P wave recordings from the Yellowknife Seismic Array (YKA), and regional (close-in) verification using high-frequency L g and P n recordings from the Eastern Canada Telemetered Network. Major differences have been found in P was attenuation among the propagation paths connecting the YKA listening post with seven active nuclear explosion testing areas in the world. Significant revisions have been made to previously published P wave attenuation results, leading to more interpretable nuclear explosion source functions. (11 refs., 12 figs.)

  16. STRATEGIES FOR INCREASING PRODUCTIVITY IN PRODUCTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Diego Pacheco

    2014-05-01

    Full Text Available The main objective of this article is to point a set of practical strategies that can be adopted to increase the capacity of constraints resources on production systems, when the constraint is inside the factory and not is in the market. To serve this purpose will be presented strategies based on best practices of the Theory of Constraints, Lean Manufacturing and Total Productive Maintenance. This article also presents the mains tools for the deployment of these methodologies. The survey results have provided an objective set of practical strategy that can be used to increase the capacity and productivity of production systems according to the needs of each manufacturing system.

  17. Production controls (PC) and technical verification testing (TVT). A methodology for the control and tracking of LILW waste package conditioning

    International Nuclear Information System (INIS)

    Leon, A.M.; Nieto, J.L.L.; Garrido, J.G.

    2003-01-01

    As part of its low and intermediate level radioactive waste (LILW) characterisation and acceptance activities, ENRESA has set up a quality control programme that covers the different phases of radioactive waste package production and implies different levels of tracking in generation, assessment of activity and control of the documentation associated therewith. Furthermore, ENRESA has made available the mechanisms required for verification, depending on the results of periodic sampling, of the quality of the end product delivered by the waste producers. Both processes are included within the framework of two programmes of complementary activities: production controls (PC) and technical verification testing (TVT). (orig.)

  18. Green product innovation strategy

    NARCIS (Netherlands)

    Driessen, P.H.

    2005-01-01

    Over the last decades, companies have started to incorporate green issues in product innovation strategies. This dissertation studies green product innovation strategy, its antecedents and its outcomes. A three-stage approach is followed. In the first stage, the topic is explored and a preliminary

  19. A Practitioners Perspective on Verification

    Science.gov (United States)

    Steenburgh, R. A.

    2017-12-01

    NOAAs Space Weather Prediction Center offers a wide range of products and services to meet the needs of an equally wide range of customers. A robust verification program is essential to the informed use of model guidance and other tools by both forecasters and end users alike. In this talk, we present current SWPC practices and results, and examine emerging requirements and potential approaches to satisfy them. We explore the varying verification needs of forecasters and end users, as well as the role of subjective and objective verification. Finally, we describe a vehicle used in the meteorological community to unify approaches to model verification and facilitate intercomparison.

  20. INF and IAEA: A comparative analysis of verification strategy

    International Nuclear Information System (INIS)

    Scheinman, L.; Kratzer, M.

    1992-07-01

    This is the final report of a study on the relevance and possible lessons of Intermediate Range Nuclear Force (INF) verification to the International Atomic Energy Agency (IAEA) international safeguards activities

  1. Nuclear disarmament verification

    International Nuclear Information System (INIS)

    DeVolpi, A.

    1993-01-01

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification

  2. A Roadmap for the Implementation of Continued Process Verification.

    Science.gov (United States)

    Boyer, Marcus; Gampfer, Joerg; Zamamiri, Abdel; Payne, Robin

    2016-01-01

    In 2014, the members of the BioPhorum Operations Group (BPOG) produced a 100-page continued process verification case study, entitled "Continued Process Verification: An Industry Position Paper with Example Protocol". This case study captures the thought processes involved in creating a continued process verification plan for a new product in response to the U.S. Food and Drug Administration's guidance on the subject introduced in 2011. In so doing, it provided the specific example of a plan developed for a new molecular antibody product based on the "A MAb Case Study" that preceded it in 2009.This document provides a roadmap that draws on the content of the continued process verification case study to provide a step-by-step guide in a more accessible form, with reference to a process map of the product life cycle. It could be used as a basis for continued process verification implementation in a number of different scenarios: For a single product and process;For a single site;To assist in the sharing of data monitoring responsibilities among sites;To assist in establishing data monitoring agreements between a customer company and a contract manufacturing organization. The U.S. Food and Drug Administration issued guidance on the management of manufacturing processes designed to improve quality and control of drug products. This involved increased focus on regular monitoring of manufacturing processes, reporting of the results, and the taking of opportunities to improve. The guidance and practice associated with it is known as continued process verification This paper summarizes good practice in responding to continued process verification guidance, gathered from subject matter experts in the biopharmaceutical industry. © PDA, Inc. 2016.

  3. Verification of RESRAD-build computer code, version 3.1

    International Nuclear Information System (INIS)

    2003-01-01

    RESRAD-BUILD is a computer model for analyzing the radiological doses resulting from the remediation and occupancy of buildings contaminated with radioactive material. It is part of a family of codes that includes RESRAD, RESRAD-CHEM, RESRAD-RECYCLE, RESRAD-BASELINE, and RESRAD-ECORISK. The RESRAD-BUILD models were developed and codified by Argonne National Laboratory (ANL); version 1.5 of the code and the user's manual were publicly released in 1994. The original version of the code was written for the Microsoft DOS operating system. However, subsequent versions of the code were written for the Microsoft Windows operating system. The purpose of the present verification task (which includes validation as defined in the standard) is to provide an independent review of the latest version of RESRAD-BUILD under the guidance provided by ANSI/ANS-10.4 for verification and validation of existing computer programs. This approach consists of a posteriori V and V review which takes advantage of available program development products as well as user experience. The purpose, as specified in ANSI/ANS-10.4, is to determine whether the program produces valid responses when used to analyze problems within a specific domain of applications, and to document the level of verification. The culmination of these efforts is the production of this formal Verification Report. The first step in performing the verification of an existing program was the preparation of a Verification Review Plan. The review plan consisted of identifying: Reason(s) why a posteriori verification is to be performed; Scope and objectives for the level of verification selected; Development products to be used for the review; Availability and use of user experience; and Actions to be taken to supplement missing or unavailable development products. The purpose, scope and objectives for the level of verification selected are described in this section of the Verification Report. The development products that were used

  4. Lightweight Methods for Effective Verification of Software Product Lines with Off-the-Shelf Tools

    DEFF Research Database (Denmark)

    Iosif-Lazar, Alexandru Florin

    Certification is the process of assessing the quality of a product and whether it meets a set of requirements and adheres to functional and safety standards. I is often legally required to provide guarantee for human safety and to make the product available on the market. The certification process...... relies on objective evidence of quality, which is produced by using qualified and state-of-the-art tools and verification and validation techniques. Software product line (SPL) engineering distributes costs among similar products that are developed simultaneously. However, SPL certification faces major...... SPL reengineering projects that involve complex source code transformations. To facilitate product (re)certification, the transformation must preserve certain qualitative properties such as code structure and semantics—a difficult task due to the complexity of the transformation and because certain...

  5. Formulation of a Production Strategy for a Software Product Line

    Science.gov (United States)

    2009-08-01

    Strategy 9 5.1 Identifying the Critical Factors 9 5.1.1 Market Analysis 10 5.1.2 Building a Business Case 10 5.1.3 Scoping 10 5.1.4 Technology...ability to deliver new products quickly (i.e., its time to market ). The production strategy for a software product line is the high-level description of... strategy . The critical factors mentioned above refer to both market conditions that affect an organ- ization and how an organization’s products can

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT. STORMWATER SOURCE AREA TREATMENT DEVICE. THE TERRE HILL CONCRETE PRODUCTS TERRE KLEEN™ 09

    Science.gov (United States)

    Verification testing of the Terre Hill Concrete Products Terre Kleen™ 09 was conducted on a 1.27 acre portion of the City of Harrisburg, Pennsylvania Department of Public Works facility. The Terre Kleen™ devices combines primary and secondary chambers, baffles, a screen, and incl...

  7. On the nature of the new product strategy

    DEFF Research Database (Denmark)

    Larsson, Flemming

    2006-01-01

    The aim of this paper is to explore the concept of a new product strategy and its relation to portfolio management for product development. Based on a literature review this research adheres to one perception of the new product strategy proposed by literature complemented with a component adressing...... the risk-dimension. Next, it is suggested that the new product strategy is embedded in the product development strategy. Subsequently, it is advocated that companies try to achieve a base for realizing integration, synchronization and strategic alignment by means of a new product strategy. These three...... themes are explicated in a model, which also indicates the relation between the new product strategy and the product development process. Finally, implications for management practice are devised....

  8. The MODUS Approach to Formal Verification

    Directory of Open Access Journals (Sweden)

    Brewka Lukasz

    2014-03-01

    Full Text Available Background: Software reliability is of great importance for the development of embedded systems that are often used in applications that have requirements for safety. Since the life cycle of embedded products is becoming shorter, productivity and quality simultaneously required and closely in the process of providing competitive products Objectives: In relation to this, MODUS (Method and supporting toolset advancing embedded systems quality project aims to provide small and medium-sized businesses ways to improve their position in the embedded market through a pragmatic and viable solution Methods/Approach: This paper will describe the MODUS project with focus on the technical methodologies that can assist formal verification and formal model checking. Results: Based on automated analysis of the characteristics of the system and by controlling the choice of the existing opensource model verification engines, model verification producing inputs to be fed into these engines. Conclusions: The MODUS approach is aligned with present market needs; the familiarity with tools, the ease of use and compatibility/interoperability remain among the most important criteria when selecting the development environment for a project

  9. Monitoring and verification R and D

    International Nuclear Information System (INIS)

    Pilat, Joseph F.; Budlong-Sylvester, Kory W.; Fearey, Bryan L.

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R and D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R and D required to address these gaps and other monitoring and verification challenges.

  10. Automated System Calibration and Verification of the Position Measurements for the Los Alamos Isotope Production Facility and the Switchyard Kicker Facilities

    Science.gov (United States)

    Barr, D.; Gilpatrick, J. D.; Martinez, D.; Shurter, R. B.

    2004-11-01

    The Los Alamos Neutron Science Center (LANSCE) facility at Los Alamos National Laboratory has constructed both an Isotope Production Facility (IPF) and a Switchyard Kicker (XDK) as additions to the H+ and H- accelerator. These additions contain eleven Beam Position Monitors (BPMs) that measure the beam's position throughout the transport. The analog electronics within each processing module determines the beam position using the log-ratio technique. For system reliability, calibrations compensate for various temperature drifts and other imperfections in the processing electronics components. Additionally, verifications are periodically implemented by a PC running a National Instruments LabVIEW virtual instrument (VI) to verify continued system and cable integrity. The VI communicates with the processor cards via a PCI/MXI-3 VXI-crate communication module. Previously, accelerator operators performed BPM system calibrations typically once per day while beam was explicitly turned off. One of this new measurement system's unique achievements is its automated calibration and verification capability. Taking advantage of the pulsed nature of the LANSCE-facility beams, the integrated electronics hardware and VI perform calibration and verification operations between beam pulses without interrupting production beam delivery. The design, construction, and performance results of the automated calibration and verification portion of this position measurement system will be the topic of this paper.

  11. PRICING STRATEGY FOR DIGITAL PRODUCTS

    Directory of Open Access Journals (Sweden)

    MARIA MAGDALENA CRIVEANU

    2018-02-01

    Full Text Available The current society imposes an alert pace on companies that need to adapt to change, become more flexible and adopt new strategies to maintain market share. Digital marketing is a useful tool for promoting products, as customers can access a range of product information at any time and from anywhere. At the same time, another advantage on the part of companies is the lower promotion costs as compared to traditional promotional methods, as well as the establishment of a connection and a communication bridge with each client. The most important component in the process of purchasing a product is inevitably the price. It communicates a series of information about the product and the customer so that the price can be an important element of persuasion in relation to other marketing strategies. Most of the time, the smallest price is the most important factor in making a decision about buying a product, and digital marketing offers the posibility to compare prices. In this sense, digital marketing can provide both an advantage and a disadvantage for traders, as the small price may invalidate other marketing strategies or product features. In this sense, pricing is a challenge for marketing departments because the pricing strategy is deferring from the sterile formula of pricing which meant covering costs and making profit. This paper aims to analyze the extent to which price is an important element in purchasing a product, as well as highlighting a variety of methods and techniques used in pricing. Quantitative research is based on a questionnaire applied to 100 respondents in order to identify the correct pricing strategy. Research results communicate an important message to merchants who have to adjust the price of each buyer individually, so that the buyer profile is particularly important in setting the price.

  12. Corporate Leverage and Product Differentiation Strategy

    OpenAIRE

    Arping, Stefan; Lóránth, Gyöngyi

    2002-01-01

    This article develops a model of the interplay between corporate leverage and product differentiation strategy. Leverage improves managerial discipline, but it can also raise customer concerns about a vendor's long-term viability. We argue that customer concerns about firm viability will be particularly pronounced when products are highly differentiated from competitors' products. In this context, optimal product differentiation strategies solve a trade-off between softening price competition...

  13. Strategies of Production Control as Tools of Efficient Management of Production Enterprises

    Science.gov (United States)

    Budynek, Mateusz; Celińska, Elżbieta; Dybikowska, Adrianna; Kozak, Monika; Ratajczak, Joanna; Urban, Jagoda; Materne, Karolina

    2016-03-01

    The paper discusses the problem of principle methods of production control as a strategy supporting the production system and stimulating efficient solutions in respect management in production enterprises. The article describes MRP, ERP, JIT, KANBAN and TOC methods and focuses on their main goals, principles of functioning as well as benefits resulting from their application. The methods represent two diverse strategies of production control, i.e. pull and push strategies. Push strategies are used when the plans apply to the first and principle part of production and are based on the demand forecasts. Pull strategies are used when all planning decisions apply to the final stage and depend on the actual demand or orders from customers.

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION: TEST/QA PLAN FOR THE VERIFICATION TESTING OF SELECTIVE CATALYTIC REDUCTION CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    Science.gov (United States)

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  15. STRATEGIES OF PRODUCTION CONTROL AS TOOLS OF EFFICIENT MANAGEMENT OF PRODUCTION ENTERPRISES

    Directory of Open Access Journals (Sweden)

    Mateusz BUDYNEK

    2016-01-01

    Full Text Available The paper discusses the problem of principle methods of production control as a strategy supporting the production system and stimulating efficient solutions in respect management in production enterprises. The article describes MRP, ERP, JIT, KANBAN and TOC methods and focuses on their main goals, principles of functioning as well as benefits re-sulting from their application. The methods represent two diverse strategies of production control, i.e. pull and push strategies. Push strategies are used when the plans apply to the first and principle part of production and are based on the demand forecasts. Pull strategies are used when all planning decisions apply to the final stage and depend on the actual demand or orders from customers.

  16. Experimental workflow for developing a feed forward strategy to control biomass growth and exploit maximum specific methane productivity of Methanothermobacter marburgensis in a biological methane production process (BMPP

    Directory of Open Access Journals (Sweden)

    Alexander Krajete

    2016-08-01

    Full Text Available Recently, interests for new biofuel generations allowing conversion of gaseous substrate(s to gaseous product(s arose for power to gas and waste to value applications. An example is biological methane production process (BMPP with Methanothermobacter marburgensis. The latter, can convert carbon dioxide (CO2 and hydrogen (H2, having different origins and purities, to methane (CH4, water and biomass. However, these gas converting bioprocesses are tendentiously gas limited processes and the specific methane productivity per biomass amount (qCH4 tends to be low. Therefore, this contribution proposes a workflow for the development of a feed forward strategy to control biomass, growth (rx and qCH4 in a continuous gas limited BMPP. The proposed workflow starts with a design of experiment (DoE to optimize media composition and search for a liquid based limitation to control selectively growth. From the DoE it came out that controlling biomass growth was possible independently of the dilution and gassing rate applied while not affecting methane evolution rates (MERs. This was done by shifting the process from a natural gas limited state to a controlled liquid limited growth. The latter allowed exploiting the maximum biocatalytic activity for methane formation of Methanothermobacter marburgensis. An increase of qCH4 from 42 to 129 mmolCH4 g−1 h−1 was achieved by applying a liquid limitation compare with the reference state. Finally, a verification experiment was done to verify the feeding strategy transferability to a different process configuration. This evidenced the ratio of the fed KH2PO4 to rx (R(FKH2PO4/rx has an appropriate parameter for scaling feeds in a continuous gas limited BMPP. In the verification experiment CH4 was produced in a single bioreactor step at a methane evolution rate (MER of   132 mmolCH4*L−1*h−1 at a CH4 purity of 93 [Vol.%].

  17. Strategy for verification and demonstration of the sealing process for canisters for spent fuel

    Energy Technology Data Exchange (ETDEWEB)

    Mueller, Christina [Bundesanstalt fuer Materialforschung und -pruefung (BAM), Berlin (Germany); Oeberg, Tomas [Tomas Oeberg Konsult AB, Lyckeby (Sweden)

    2004-08-01

    Electron beam welding and friction stir welding are the two processes now being considered for sealing copper canisters with Sweden's radioactive waste. This report outlines a strategy for verification and demonstration of the encapsulation process which here is considered to consist of the sealing of the canister by welding followed by quality control of the weld by non-destructive testing. Statistical methodology provides a firm basis for modern quality technology and design of experiments has been successful part of it. Factorial and fractional factorial designs can be used to evaluate main process factors and their interactions. Response surface methodology with multilevel designs enables further optimisation. Empirical polynomial models can through Taylor series expansions approximate the true underlying relationships sufficiently well. The fitting of response measurements is based on ordinary least squares regression or generalised linear methods. Unusual events, like failures in the lid welds, are best described with extreme value statistics and the extreme value paradigm give a rationale for extrapolation. Models based on block maxima (the generalised extreme value distribution) and peaks over threshold (the generalised Pareto distribution) are considered. Experiences from other fields of the materials sciences suggest that both of these approaches are useful. The initial verification experiments of the two welding technologies considered are suggested to proceed by experimental plans that can be accomplished with only four complete lid welds each. Similar experimental arrangements can be used to evaluate process 'robustness' and optimisation of the process window. Two series of twenty demonstration trials each, mimicking assembly-line production, are suggested as a final evaluation before the selection of welding technology. This demonstration is also expected to provide a data base suitable for a baseline estimate of future performance

  18. Strategy for verification and demonstration of the sealing process for canisters for spent fuel

    International Nuclear Information System (INIS)

    Mueller, Christina; Oeberg, Tomas

    2004-08-01

    Electron beam welding and friction stir welding are the two processes now being considered for sealing copper canisters with Sweden's radioactive waste. This report outlines a strategy for verification and demonstration of the encapsulation process which here is considered to consist of the sealing of the canister by welding followed by quality control of the weld by non-destructive testing. Statistical methodology provides a firm basis for modern quality technology and design of experiments has been successful part of it. Factorial and fractional factorial designs can be used to evaluate main process factors and their interactions. Response surface methodology with multilevel designs enables further optimisation. Empirical polynomial models can through Taylor series expansions approximate the true underlying relationships sufficiently well. The fitting of response measurements is based on ordinary least squares regression or generalised linear methods. Unusual events, like failures in the lid welds, are best described with extreme value statistics and the extreme value paradigm give a rationale for extrapolation. Models based on block maxima (the generalised extreme value distribution) and peaks over threshold (the generalised Pareto distribution) are considered. Experiences from other fields of the materials sciences suggest that both of these approaches are useful. The initial verification experiments of the two welding technologies considered are suggested to proceed by experimental plans that can be accomplished with only four complete lid welds each. Similar experimental arrangements can be used to evaluate process 'robustness' and optimisation of the process window. Two series of twenty demonstration trials each, mimicking assembly-line production, are suggested as a final evaluation before the selection of welding technology. This demonstration is also expected to provide a data base suitable for a baseline estimate of future performance. This estimate can

  19. Strategy for verification and demonstration of the sealing process for canisters for spent fuel

    Energy Technology Data Exchange (ETDEWEB)

    Mueller, Christina [Bundesanstalt fuer Materialforschung und -pruefung (BAM), Berlin (Germany); Oeberg, Tomas [Tomas Oeberg Konsult AB, Lyckeby (Sweden)

    2004-08-01

    Electron beam welding and friction stir welding are the two processes now being considered for sealing copper canisters with Sweden's radioactive waste. This report outlines a strategy for verification and demonstration of the encapsulation process which here is considered to consist of the sealing of the canister by welding followed by quality control of the weld by non-destructive testing. Statistical methodology provides a firm basis for modern quality technology and design of experiments has been successful part of it. Factorial and fractional factorial designs can be used to evaluate main process factors and their interactions. Response surface methodology with multilevel designs enables further optimisation. Empirical polynomial models can through Taylor series expansions approximate the true underlying relationships sufficiently well. The fitting of response measurements is based on ordinary least squares regression or generalised linear methods. Unusual events, like failures in the lid welds, are best described with extreme value statistics and the extreme value paradigm give a rationale for extrapolation. Models based on block maxima (the generalised extreme value distribution) and peaks over threshold (the generalised Pareto distribution) are considered. Experiences from other fields of the materials sciences suggest that both of these approaches are useful. The initial verification experiments of the two welding technologies considered are suggested to proceed by experimental plans that can be accomplished with only four complete lid welds each. Similar experimental arrangements can be used to evaluate process 'robustness' and optimisation of the process window. Two series of twenty demonstration trials each, mimicking assembly-line production, are suggested as a final evaluation before the selection of welding technology. This demonstration is also expected to provide a data base suitable for a baseline estimate of future performance. This estimate can

  20. Verification in Referral-Based Crowdsourcing

    Science.gov (United States)

    Naroditskiy, Victor; Rahwan, Iyad; Cebrian, Manuel; Jennings, Nicholas R.

    2012-01-01

    Online social networks offer unprecedented potential for rallying a large number of people to accomplish a given task. Here we focus on information gathering tasks where rare information is sought through “referral-based crowdsourcing”: the information request is propagated recursively through invitations among members of a social network. Whereas previous work analyzed incentives for the referral process in a setting with only correct reports, misreporting is known to be both pervasive in crowdsourcing applications, and difficult/costly to filter out. A motivating example for our work is the DARPA Red Balloon Challenge where the level of misreporting was very high. In order to undertake a formal study of verification, we introduce a model where agents can exert costly effort to perform verification and false reports can be penalized. This is the first model of verification and it provides many directions for future research, which we point out. Our main theoretical result is the compensation scheme that minimizes the cost of retrieving the correct answer. Notably, this optimal compensation scheme coincides with the winning strategy of the Red Balloon Challenge. PMID:23071530

  1. Verification of safety critical software

    International Nuclear Information System (INIS)

    Son, Ki Chang; Chun, Chong Son; Lee, Byeong Joo; Lee, Soon Sung; Lee, Byung Chai

    1996-01-01

    To assure quality of safety critical software, software should be developed in accordance with software development procedures and rigorous software verification and validation should be performed. Software verification is the formal act of reviewing, testing of checking, and documenting whether software components comply with the specified requirements for a particular stage of the development phase[1]. New software verification methodology was developed and was applied to the Shutdown System No. 1 and 2 (SDS1,2) for Wolsung 2,3 and 4 nuclear power plants by Korea Atomic Energy Research Institute(KAERI) and Atomic Energy of Canada Limited(AECL) in order to satisfy new regulation requirements of Atomic Energy Control Boars(AECB). Software verification methodology applied to SDS1 for Wolsung 2,3 and 4 project will be described in this paper. Some errors were found by this methodology during the software development for SDS1 and were corrected by software designer. Outputs from Wolsung 2,3 and 4 project have demonstrated that the use of this methodology results in a high quality, cost-effective product. 15 refs., 6 figs. (author)

  2. Product development capability and marketing strategy for new durable products

    OpenAIRE

    Banerjee, Sumitro; Soberman, David A.

    2013-01-01

    Our objective is to understand how a firm’s product development capability (PDC) affects the launch strategy for a durable product that is sequentially improved over time in a market where consumers have heterogeneous valuations for quality. We show that the launch strategy of firms is affected by the degree to which consumers think ahead. However, only the strategy of firms with high PDC is affected by the observability of quality. When consumers are myopic and quality is observable, both hi...

  3. Production of plastic scintillation survey meter for clearance verification measurement

    International Nuclear Information System (INIS)

    Tachibana, Mitsuo; Shiraishi, Kunio; Ishigami, Tsutomu; Tomii, Hiroyuki

    2008-03-01

    In the Nuclear Science Research Institute, the decommissioning of various nuclear facilities is carried out according to the plan for meeting the midterm goal of the Japan Atomic Energy Agency (JAEA). An increase in the clearance verification measurement of concrete on buildings and the radiation measurement for releasing controlled areas will be expected along with the dismantlement of nuclear facilities in the future. The radiation measurement for releasing controlled areas has been carried out in small-scale nuclear facilities including the JPDR (Japan Power Demonstration Reactor). However, the radiation measurement with an existing measuring device was difficult in effects of radiation from radioactive materials that remains in buried piping. On the other hand, there is no experience that the clearance verification measurement is executed in the JAEA. The generation of a large amount of clearance object will be expected along with the decommissioning of the nuclear facilities in the future. The plastic scintillation survey meter (hereafter, 'PL measuring device') was produced to apply to the clearance verification measurement and the radiation measurement for releasing controlled areas. The basic characteristic test and the actual test were confirmed using the PL measuring device. As a result of these tests, it was found that the evaluation value of radioactivity with the PL measuring device was accuracy equal with the existing measuring device. The PL measuring device has feature of the existing measuring device with a light weight and easy operability. The PL measuring device can correct the gamma ray too. The PL measuring device is effective to the clearance verification measurement of concrete on buildings and the radiation measurement for releasing controlled areas. (author)

  4. Specification and Verification of Distributed Embedded Systems: A Traffic Intersection Product Family

    Directory of Open Access Journals (Sweden)

    José Meseguer

    2010-09-01

    Full Text Available Distributed embedded systems (DESs are no longer the exception; they are the rule in many application areas such as avionics, the automotive industry, traffic systems, sensor networks, and medical devices. Formal DES specification and verification is challenging due to state space explosion and the need to support real-time features. This paper reports on an extensive industry-based case study involving a DES product family for a pedestrian and car 4-way traffic intersection in which autonomous devices communicate by asynchronous message passing without a centralized controller. All the safety requirements and a liveness requirement informally specified in the requirements document have been formally verified using Real-Time Maude and its model checking features.

  5. Computerized information system for inventory-taking and verification at a nuclear fuel fabrication plant with closed production lines

    International Nuclear Information System (INIS)

    Bahm, W.; Brueckner, C.; Hartmann, G.

    1976-01-01

    By means of a model the use of electronic data processing is studied for preparing inventory listings and for inventory verification in a fabrication plant for Pu-U mixed-oxide fuel pins. It is postulated that interruptions in operation should be avoided as much as possible. Closed-Line production is assumed so that access to nuclear material calls for special withdrawal via locks. The production line is subdivided into sections with measuring points placed in between to record the nuclear material flow. The measured results are fed to a central data acquisition and reporting system capable of calculating on-line from these results the book inventories present in the individual sections. Inventory-taking and verification are carried out simultaneously in the sections of the production line using the EDP system. The production is not interrupted for this purpose. The production stream is tagged prior to reaching a section to be measured and is subsequently measured when entering the respective section until the tag has reached the end of the section. The measurement can be verified by inspectors. Movements of nuclear materials in and from other plant areas such as the storage area are likewise fed into the central data processing system so that inventory lists can be recalled at any moment. By this means the inventory can be taken quickly and at any time. The inventory is verified in the conventional way. (author)

  6. A verification strategy for web services composition using enhanced stacked automata model.

    Science.gov (United States)

    Nagamouttou, Danapaquiame; Egambaram, Ilavarasan; Krishnan, Muthumanickam; Narasingam, Poonkuzhali

    2015-01-01

    Currently, Service-Oriented Architecture (SOA) is becoming the most popular software architecture of contemporary enterprise applications, and one crucial technique of its implementation is web services. Individual service offered by some service providers may symbolize limited business functionality; however, by composing individual services from different service providers, a composite service describing the intact business process of an enterprise can be made. Many new standards have been defined to decipher web service composition problem namely Business Process Execution Language (BPEL). BPEL provides an initial work for forming an Extended Markup Language (XML) specification language for defining and implementing business practice workflows for web services. The problems with most realistic approaches to service composition are the verification of composed web services. It has to depend on formal verification method to ensure the correctness of composed services. A few research works has been carried out in the literature survey for verification of web services for deterministic system. Moreover the existing models did not address the verification properties like dead transition, deadlock, reachability and safetyness. In this paper, a new model to verify the composed web services using Enhanced Stacked Automata Model (ESAM) has been proposed. The correctness properties of the non-deterministic system have been evaluated based on the properties like dead transition, deadlock, safetyness, liveness and reachability. Initially web services are composed using Business Process Execution Language for Web Service (BPEL4WS) and it is converted into ESAM (combination of Muller Automata (MA) and Push Down Automata (PDA)) and it is transformed into Promela language, an input language for Simple ProMeLa Interpreter (SPIN) tool. The model is verified using SPIN tool and the results revealed better recital in terms of finding dead transition and deadlock in contrast to the

  7. Nature-Inspired Design : Strategies for Sustainable Product Development

    NARCIS (Netherlands)

    De Pauw, I.C.

    2015-01-01

    Product designers can apply different strategies, methods, and tools for sustainable product development. Nature-Inspired Design Strategies (NIDS) offer designers a distinct class of strategies that use ‘nature’ as a guiding source of knowledge and inspiration for addressing sustainability.

  8. CASL Verification and Validation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Mousseau, Vincent Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dinh, Nam [North Carolina State Univ., Raleigh, NC (United States)

    2016-06-30

    This report documents the Consortium for Advanced Simulation of LWRs (CASL) verification and validation plan. The document builds upon input from CASL subject matter experts, most notably the CASL Challenge Problem Product Integrators, CASL Focus Area leaders, and CASL code development and assessment teams. This document will be a living document that will track progress on CASL to do verification and validation for both the CASL codes (including MPACT, CTF, BISON, MAMBA) and for the CASL challenge problems (CIPS, PCI, DNB). The CASL codes and the CASL challenge problems are at differing levels of maturity with respect to validation and verification. The gap analysis will summarize additional work that needs to be done. Additional VVUQ work will be done as resources permit. This report is prepared for the Department of Energy’s (DOE’s) CASL program in support of milestone CASL.P13.02.

  9. Approach to IAEA material-balance verification at the Portsmouth Gas Centrifuge Enrichment Plant

    International Nuclear Information System (INIS)

    Gordon, D.M.; Sanborn, J.B.; Younkin, J.M.; DeVito, V.J.

    1983-01-01

    This paper describes a potential approach by which the International Atomic Energy Agency (IAEA) might verify the nuclear-material balance at the Portsmouth Gas Centrifuge Enrichment Plant (GCEP). The strategy makes use of the attributes and variables measurement verification approach, whereby the IAEA would perform independent measurements on a randomly selected subset of the items comprising the U-235 flows and inventories at the plant. In addition, the MUF-D statistic is used as the test statistic for the detection of diversion. The paper includes descriptions of the potential verification activities, as well as calculations of: (1) attributes and variables sample sizes for the various strata, (2) standard deviations of the relevant test statistics, and (3) the detection sensitivity which the IAEA might achieve by this verification strategy at GCEP

  10. Environmental Technology Verification: Baghouse Filtration Products--TDC Filter Manufacturing, Inc., SB025 Filtration Media

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. ETV seeks to ach...

  11. Land surface Verification Toolkit (LVT)

    Science.gov (United States)

    Kumar, Sujay V.

    2017-01-01

    LVT is a framework developed to provide an automated, consolidated environment for systematic land surface model evaluation Includes support for a range of in-situ, remote-sensing and other model and reanalysis products. Supports the analysis of outputs from various LIS subsystems, including LIS-DA, LIS-OPT, LIS-UE. Note: The Land Information System Verification Toolkit (LVT) is a NASA software tool designed to enable the evaluation, analysis and comparison of outputs generated by the Land Information System (LIS). The LVT software is released under the terms and conditions of the NASA Open Source Agreement (NOSA) Version 1.1 or later. Land Information System Verification Toolkit (LVT) NOSA.

  12. Characteristics of Strategies in Product/Service-System Development

    DEFF Research Database (Denmark)

    Tan, Adrian; McAloone, Timothy Charles

    2006-01-01

    The underlying principle in Product/Service-Systems (PSS) strategy is to shift from business based on the value of the transfer of product ownership and responsibility, to business based on the value of utility of the product and services. This paper identifies characteristics of various strategi...

  13. Automated Image Acquisition System for the Verification of Copper-Brass Seal Images

    International Nuclear Information System (INIS)

    Stringa, E.; Bergonzi, C.; Littmann, F.; ); Marszalek, Y.; Tempesta, S.; )

    2015-01-01

    This paper describes a system for the verification of copper-brass seals realized by JRC according to DG ENER requirements. DG ENER processes about 20,000 metal seals per year. The verification of metal seals consists in visually checking the identity of a removed seal. The identity of a copper-brass seal is defined by a random stain pattern realized by the seal producer together with random scratches engraved when the seals are initialized ('seal production'). In order to verify that the seal returned from the field is the expected one its pattern is compared with an image taken during seal production. Formerly, seal initialization and verification were very heavy tasks as seal pictures were acquired with a camera one by one both in the initialization and verification stages. During the initialization the Nuclear Safeguards technicians had to place one by one new seals under a camera and acquire the related reference images. During the verification, the technician had to take used seals and place them one by one under a camera to take new pictures. The new images were presented to the technicians without any preprocessing and the technicians had to recognize the seal. The new station described in this paper has an automated image acquisition system allowing to easily process seals in batches of 100 seals. To simplify the verification, a software automatically centres and rotates the newly acquired seal image in order to perfectly overlap with the reference image acquired during the production phase. The new system significantly speeds up seal production and helps particularly with the demanding task of seal verification. As a large part of the seals is dealt with by a joint Euratom-IAEA team, the IAEA directly profits from this development. The new tool has been in routine use since mid 2013. (author)

  14. Price strategies for sustainable food products

    NARCIS (Netherlands)

    Ingenbleek, P.T.M.

    2015-01-01

    Purpose – Sustainable products often suffer a competitive disadvantage compared with mainstream products because they must cover ecological and social costs that their competitors leave to future generations. The purpose of this paper is to identify price strategies for sustainable products that

  15. Product Architecture Modularity Strategies

    DEFF Research Database (Denmark)

    Mikkola, Juliana Hsuan

    2003-01-01

    The focus of this paper is to integrate various perspectives on product architecture modularity into a general framework, and also to propose a way to measure the degree of modularization embedded in product architectures. Various trade-offs between modular and integral product architectures...... and how components and interfaces influence the degree of modularization are considered. In order to gain a better understanding of product architecture modularity as a strategy, a theoretical framework and propositions are drawn from various academic literature sources. Based on the literature review......, the following key elements of product architecture are identified: components (standard and new-to-the-firm), interfaces (standardization and specification), degree of coupling, and substitutability. A mathematical function, termed modularization function, is introduced to measure the degree of modularization...

  16. Analyzing personalized policies for online biometric verification.

    Science.gov (United States)

    Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M

    2014-01-01

    Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India's program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India's biometric program. The mean delay is [Formula: see text] sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32-41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident.

  17. BEval: A Plug-in to Extend Atelier B with Current Verification Technologies

    Directory of Open Access Journals (Sweden)

    Valério Medeiros Jr.

    2014-01-01

    Full Text Available This paper presents BEval, an extension of Atelier B to improve automation in the verification activities in the B method or Event-B. It combines a tool for managing and verifying software projects (Atelier B and a model checker/animator (ProB so that the verification conditions generated in the former are evaluated with the latter. In our experiments, the two main verification strategies (manual and automatic showed significant improvement as ProB's evaluator proves complementary to Atelier B built-in provers. We conducted experiments with the B model of a micro-controller instruction set; several verification conditions, that we were not able to discharge automatically or manually with AtelierB's provers, were automatically verified using BEval.

  18. Design verification for large reprocessing plants (Proposed procedures)

    International Nuclear Information System (INIS)

    Rolandi, G.

    1988-07-01

    In the 1990s, four large commercial reprocessing plants will progressively come into operation: If an effective and efficient safeguards system is to be applied to these large and complex plants, several important factors have to be considered. One of these factors, addressed in the present report, concerns plant design verification. Design verification provides an overall assurance on plant measurement data. To this end design verification, although limited to the safeguards aspects of the plant, must be a systematic activity, which starts during the design phase, continues during the construction phase and is particularly performed during the various steps of the plant's commissioning phase. The detailed procedures for design information verification on commercial reprocessing plants must be defined within the frame of the general provisions set forth in INFCIRC/153 for any type of safeguards related activities and specifically for design verification. The present report is intended as a preliminary contribution on a purely technical level, and focusses on the problems within the Agency. For the purpose of the present study the most complex case was assumed: i.e. a safeguards system based on conventional materials accountancy, accompanied both by special input and output verification and by some form of near-real-time accountancy involving in-process inventory taking, based on authenticated operator's measurement data. C/S measures are also foreseen, where necessary to supplement the accountancy data. A complete ''design verification'' strategy comprehends: informing the Agency of any changes in the plant system which are defined as ''safeguards relevant''; ''reverifying by the Agency upon receiving notice from the Operator on any changes, on ''design information''. 13 refs

  19. Cleaning and Cleanliness Verification Techniques for Mars Returned Sample Handling

    Science.gov (United States)

    Mickelson, E. T.; Lindstrom, D. J.; Allton, J. H.; Hittle, J. D.

    2002-01-01

    Precision cleaning and cleanliness verification techniques are examined as a subset of a comprehensive contamination control strategy for a Mars sample return mission. Additional information is contained in the original extended abstract.

  20. New Product Development and Business Strategy of Research and Development

    International Nuclear Information System (INIS)

    Lee, Sun Cheol

    1998-05-01

    The contents of this book are new product development strategy of the top business, commercialization and new product development, development case analysis and framework of new product development, investigation strategy for idea of new product development, case analysis of research as development and goal of new product development, case analysis and planning and management for new product development, innovative item development and technical management against confusion, the map for determination procedure of development, strategy of market and goods and development strategy cases in leading company.

  1. Investigating product development strategy in beverage industry using factor analysis

    Directory of Open Access Journals (Sweden)

    Naser Azad

    2013-03-01

    Full Text Available Selecting a product development strategy that is associated with the company's current service or product innovation, based on customers’ needs and changing environment, plays an important role in increasing demand, increasing market share, increasing sales and profits. Therefore, it is important to extract effective variables associated with product development to improve performance measurement of firms. This paper investigates important factors influencing product development strategies using factor analysis. The proposed model of this paper investigates 36 factors and, using factor analysis, we extract six most influential factors including information sharing, intelligence information, exposure strategy, differentiation, research and development strategy and market survey. The first strategy, partnership, includes five sub-factor including product development partnership, partnership with foreign firms, customers’ perception from competitors’ products, Customer involvement in product development, inter-agency coordination, customer-oriented approach to innovation and transmission of product development change where inter-agency coordination has been considered the most important factor. Internal strengths are the most influential factors impacting the second strategy, intelligence information. The third factor, introducing strategy, introducing strategy, includes four sub criteria and consumer buying behavior is the most influencing factor. Differentiation is the next important factor with five components where knowledge and expertise in product innovation is the most important one. Research and development strategy with four sub-criteria where reducing product development cycle plays the most influential factor and finally, market survey strategy is the last important factor with three factors and finding new market plays the most important role.

  2. Self-Verification of Ability through Biased Performance Memory.

    Science.gov (United States)

    Karabenick, Stuart A.; LeBlanc, Daniel

    Evidence points to a pervasive tendency for persons to behave to maintain their existing cognitive structures. One strategy by which this self-verification is made more probable involves information processing. Through attention, encoding and retrieval, and the interpretation of events, persons process information so that self-confirmatory…

  3. Disarmament Verification - the OPCW Experience

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  4. Verification of Chemical Weapons Destruction

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  5. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Directory of Open Access Journals (Sweden)

    Jin-Won Park

    2009-01-01

    Full Text Available As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  6. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Science.gov (United States)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  7. Employer Health and Productivity Roadmap™ strategy.

    Science.gov (United States)

    Parkinson, Michael D

    2013-12-01

    The National Institute for Occupational Safety and Health Total Worker Health™ Program defines essential elements of an integrated health protection and health promotion model to improve the health, safety, and performance of employers and employees. The lack of a clear strategy to address the core drivers of poor health, excessive medical costs, and lost productivity has deterred a comprehensive, integrated, and proactive approach to meet these challenges. The Employer Health and Productivity Roadmap™, comprising six interrelated and integrated core elements, creates a framework of shared accountability for both employers and their health and productivity partners to implement and monitor actionable measures that improve health, maximize productivity, and reduce excessive costs. The strategy is most effective when linked to a financially incentivized health management program or consumer-directed health plan insurance benefit design.

  8. Verification of Ganoderma (lingzhi) commercial products by Fourier Transform infrared spectroscopy and two-dimensional IR correlation spectroscopy

    Science.gov (United States)

    Choong, Yew-Keong; Sun, Su-Qin; Zhou, Qun; Lan, Jin; Lee, Han-Lim; Chen, Xiang-Dong

    2014-07-01

    Ganoderma commercial products are typically based on two sources, raw material (powder form and/or spores) and extract (water and/or solvent). This study compared three types of Ganoderma commercial products using 1 Dimensional Fourier Transform infrared and second derivative spectroscopy. The analyzed spectra of Ganoderma raw material products were compared with spectra of cultivated Ganoderma raw material powder from different mushroom farms in Malaysia. The Ganoderma extract product was also compared with three types of cultivated Ganoderma extracts. Other medicinal Ganoderma contents in commercial extract product that included glucan and triterpenoid were analyzed by using FTIR and 2DIR. The results showed that water extract of cultivated Ganoderma possessed comparable spectra with that of Ganoderma product water extract. By comparing the content of Ganoderma commercial products using FTIR and 2DIR, product content profiles could be detected. In addition, the geographical origin of the Ganoderma products could be verified by comparing their spectra with Ganoderma products from known areas. This study demonstrated the possibility of developing verification tool to validate the purity of commercial medicinal herbal and mushroom products.

  9. Success rates for product development strategies in new drug development.

    Science.gov (United States)

    Dahlin, E; Nelson, G M; Haynes, M; Sargeant, F

    2016-04-01

    While research has examined the likelihood that drugs progress across phases of clinical trials, no research to date has examined the types of product development strategies that are the most likely to be successful in clinical trials. This research seeks to identify the strategies that are most likely to reach the market-those generated using a novel product development strategy or strategies that combine a company's expertise with both drugs and indications, which we call combined experience strategies. We evaluate the success of product development strategies in the drug development process for a sample of 2562 clinical trials completed by 406 US pharmaceutical companies. To identify product development strategies, we coded each clinical trial according to whether it consisted of an indication or a drug that was new to the firm. Accordingly, a clinical trial that consists of both an indication and a drug that were both new to the firm represents a novel product development strategy; indication experience is a product development strategy that consists of an indication that a firm had tested previously in a clinical trial, but with a drug that was new to the firm; drug experience is a product development strategy that consists of a drug that the firm had prior experience testing in clinical trials, but with an indication that was new to the firm; combined experience consists of both a drug and an indication that the firm had experience testing in clinical trials. Success rates for product development strategies across clinical phases were calculated for the clinical trials in our sample. Combined experience strategies had the highest success rate. More than three and a half percent (0·036) of the trials that combined experience with drugs and indications eventually reached the market. The next most successful strategy is drug experience (0·025) with novel strategies trailing closely (0·024). Indication experience strategies are the least successful (0·008

  10. RELAP-7 Software Verification and Validation Plan - Requirements Traceability Matrix (RTM) Part 2: Code Assessment Strategy, Procedure, and RTM Update

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Jun Soo [Idaho National Lab. (INL), Idaho Falls, ID (United States); Choi, Yong Joon [Idaho National Lab. (INL), Idaho Falls, ID (United States); Smith, Curtis Lee [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-09-01

    This document addresses two subjects involved with the RELAP-7 Software Verification and Validation Plan (SVVP): (i) the principles and plan to assure the independence of RELAP-7 assessment through the code development process, and (ii) the work performed to establish the RELAP-7 assessment plan, i.e., the assessment strategy, literature review, and identification of RELAP-7 requirements. Then, the Requirements Traceability Matrices (RTMs) proposed in previous document (INL-EXT-15-36684) are updated. These RTMs provide an efficient way to evaluate the RELAP-7 development status as well as the maturity of RELAP-7 assessment through the development process.

  11. Compliance uncertainty of diameter characteristic in the next-generation geometrical product specifications and verification

    International Nuclear Information System (INIS)

    Lu, W L; Jiang, X; Liu, X J; Xu, Z G

    2008-01-01

    Compliance uncertainty is one of the most important elements in the next-generation geometrical product specifications and verification (GPS). It consists of specification uncertainty, method uncertainty and implementation uncertainty, which are three of the four fundamental uncertainties in the next-generation GPS. This paper analyzes the key factors that influence compliance uncertainty and then proposes a procedure to manage the compliance uncertainty. A general model on evaluation of compliance uncertainty has been devised and a specific formula for diameter characteristic has been derived based on this general model. The case study was conducted and it revealed that the completeness of currently dominant diameter characteristic specification needs to be improved

  12. A knowledge-base verification of NPP expert systems using extended Petri nets

    International Nuclear Information System (INIS)

    Kwon, Il Won; Seong, Poong Hyun

    1995-01-01

    The verification phase of knowledge base is an important part for developing reliable expert systems, especially in nuclear industry. Although several strategies or tools have been developed to perform potential error checking, they often neglect the reliability of verification methods. Because a Petri net provides a uniform mathematical formalization of knowledge base, it has been employed for knowledge base verification. In this work, we devise and suggest an automated tool, called COKEP (Checker Of Knowledge base using Extended Petri net), for detecting incorrectness, inconsistency, and incompleteness in a knowledge base. The scope of the verification problem is expanded to chained errors, unlike previous studies that assumed error incidence to be limited to rule pairs only. In addition, we consider certainty factor in checking, because most of knowledge bases have certainty factors

  13. Nuclear Data Verification and Standardization

    Energy Technology Data Exchange (ETDEWEB)

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  14. Environmental Technology Verification Report - Electric Power and Heat Production Using Renewable Biogas at Patterson Farms

    Science.gov (United States)

    The U.S. EPA operates the Environmental Technology Verification program to facilitate the deployment of innovative technologies through performance verification and information dissemination. A technology area of interest is distributed electrical power generation, particularly w...

  15. Time management strategies for research productivity.

    Science.gov (United States)

    Chase, Jo-Ana D; Topp, Robert; Smith, Carol E; Cohen, Marlene Z; Fahrenwald, Nancy; Zerwic, Julie J; Benefield, Lazelle E; Anderson, Cindy M; Conn, Vicki S

    2013-02-01

    Researchers function in a complex environment and carry multiple role responsibilities. This environment is prone to various distractions that can derail productivity and decrease efficiency. Effective time management allows researchers to maintain focus on their work, contributing to research productivity. Thus, improving time management skills is essential to developing and sustaining a successful program of research. This article presents time management strategies addressing behaviors surrounding time assessment, planning, and monitoring. Herein, the Western Journal of Nursing Research editorial board recommends strategies to enhance time management, including setting realistic goals, prioritizing, and optimizing planning. Involving a team, problem-solving barriers, and early management of potential distractions can facilitate maintaining focus on a research program. Continually evaluating the effectiveness of time management strategies allows researchers to identify areas of improvement and recognize progress.

  16. Challenges for effective WMD verification

    International Nuclear Information System (INIS)

    Andemicael, B.

    2006-01-01

    Effective verification is crucial to the fulfillment of the objectives of any disarmament treaty, not least as regards the proliferation of weapons of mass destruction (WMD). The effectiveness of the verification package depends on a number of factors, some inherent in the agreed structure and others related to the type of responses demanded by emerging challenges. The verification systems of three global agencies-the IAEA, the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO, currently the Preparatory Commission), and the Organization for the Prohibition of Chemical Weapons (OPCW)-share similarities in their broad objectives of confidence-building and deterrence by assuring members that rigorous verification would deter or otherwise detect non-compliance. Yet they are up against various constraints and other issues, both internal and external to the treaty regime. These constraints pose major challenges to the effectiveness and reliability of the verification operations. In the nuclear field, the IAEA safeguards process was the first to evolve incrementally from modest Statute beginnings to a robust verification system under the global Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The nuclear non-proliferation regime is now being supplemented by a technology-intensive verification system of the nuclear test-ban treaty (CTBT), a product of over three decades of negotiation. However, there still remain fundamental gaps and loopholes in the regime as a whole, which tend to diminish the combined effectiveness of the IAEA and the CTBT verification capabilities. He three major problems are (a) the lack of universality of membership, essentially because of the absence of three nuclear weapon-capable States-India, Pakistan and Israel-from both the NPT and the CTBT, (b) the changes in US disarmament policy, especially in the nuclear field, and (c) the failure of the Conference on Disarmament to conclude a fissile material cut-off treaty. The world is

  17. VERIFICATION OF THE FOOD SAFETY MANAGEMENT SYSTEM IN DEEP FROZEN FOOD PRODUCTION PLANT

    Directory of Open Access Journals (Sweden)

    Peter Zajác

    2010-07-01

    Full Text Available In work is presented verification of food safety management system of deep frozen food. Main emphasis is on creating set of verification questions within articles of standard STN EN ISO 22000:2006 and on searching of effectiveness in food safety management system. Information were acquired from scientific literature sources and they pointed out importance of implementation and upkeep of effective food safety management system. doi:10.5219/28

  18. Cognitive Bias in Systems Verification

    Science.gov (United States)

    Larson, Steve

    2012-01-01

    Working definition of cognitive bias: Patterns by which information is sought and interpreted that can lead to systematic errors in decisions. Cognitive bias is used in diverse fields: Economics, Politics, Intelligence, Marketing, to name a few. Attempts to ground cognitive science in physical characteristics of the cognitive apparatus exceed our knowledge. Studies based on correlations; strict cause and effect is difficult to pinpoint. Effects cited in the paper and discussed here have been replicated many times over, and appear sound. Many biases have been described, but it is still unclear whether they are all distinct. There may only be a handful of fundamental biases, which manifest in various ways. Bias can effect system verification in many ways . Overconfidence -> Questionable decisions to deploy. Availability -> Inability to conceive critical tests. Representativeness -> Overinterpretation of results. Positive Test Strategies -> Confirmation bias. Debiasing at individual level very difficult. The potential effect of bias on the verification process can be managed, but not eliminated. Worth considering at key points in the process.

  19. Spent Nuclear Fuel (SNF) Project Design Verification and Validation Process

    International Nuclear Information System (INIS)

    OLGUIN, L.J.

    2000-01-01

    This document provides a description of design verification and validation activities implemented by the Spent Nuclear Fuel (SNF) Project. During the execution of early design verification, a management assessment (Bergman, 1999) and external assessments on configuration management (Augustenburg, 1999) and testing (Loscoe, 2000) were conducted and identified potential uncertainties in the verification process. This led the SNF Chief Engineer to implement corrective actions to improve process and design products. This included Design Verification Reports (DVRs) for each subproject, validation assessments for testing, and verification of the safety function of systems and components identified in the Safety Equipment List to ensure that the design outputs were compliant with the SNF Technical Requirements. Although some activities are still in progress, the results of the DVR and associated validation assessments indicate that Project requirements for design verification are being effectively implemented. These results have been documented in subproject-specific technical documents (Table 2). Identified punch-list items are being dispositioned by the Project. As these remaining items are closed, the technical reports (Table 2) will be revised and reissued to document the results of this work

  20. Service-oriented product development strategies

    DEFF Research Database (Denmark)

    Tan, Adrian Ronald

    Manufacturing companies have traditionally focused their efforts on designing, developing and producing physical products for the market. Today, global competition, outsourcing and legislation commend that companies take greater responsibility of their products. This is driving some manufacturers...... to shift their business strategies from selling products (e.g. photocopying machines) to the provision of services (e.g. document services). Instead of the product itself, the activity and knowledge associated with the use of the product is perceived to be of more value to customers. In the research...... community, service-oriented approaches that embrace this change of business focus from individual products to total integrated customer solutions are termed Product/Service-Systems (PSS). The research in this thesis addresses the systematic design and development of PSS solutions in manufacturing firms...

  1. Hierarchical Representation Learning for Kinship Verification.

    Science.gov (United States)

    Kohli, Naman; Vatsa, Mayank; Singh, Richa; Noore, Afzel; Majumdar, Angshul

    2017-01-01

    Kinship verification has a number of applications such as organizing large collections of images and recognizing resemblances among humans. In this paper, first, a human study is conducted to understand the capabilities of human mind and to identify the discriminatory areas of a face that facilitate kinship-cues. The visual stimuli presented to the participants determine their ability to recognize kin relationship using the whole face as well as specific facial regions. The effect of participant gender and age and kin-relation pair of the stimulus is analyzed using quantitative measures such as accuracy, discriminability index d' , and perceptual information entropy. Utilizing the information obtained from the human study, a hierarchical kinship verification via representation learning (KVRL) framework is utilized to learn the representation of different face regions in an unsupervised manner. We propose a novel approach for feature representation termed as filtered contractive deep belief networks (fcDBN). The proposed feature representation encodes relational information present in images using filters and contractive regularization penalty. A compact representation of facial images of kin is extracted as an output from the learned model and a multi-layer neural network is utilized to verify the kin accurately. A new WVU kinship database is created, which consists of multiple images per subject to facilitate kinship verification. The results show that the proposed deep learning framework (KVRL-fcDBN) yields the state-of-the-art kinship verification accuracy on the WVU kinship database and on four existing benchmark data sets. Furthermore, kinship information is used as a soft biometric modality to boost the performance of face verification via product of likelihood ratio and support vector machine based approaches. Using the proposed KVRL-fcDBN framework, an improvement of over 20% is observed in the performance of face verification.

  2. 9 CFR 417.8 - Agency verification.

    Science.gov (United States)

    2010-01-01

    ....8 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE... ANALYSIS AND CRITICAL CONTROL POINT (HACCP) SYSTEMS § 417.8 Agency verification. FSIS will verify the... plan or system; (f) Direct observation or measurement at a CCP; (g) Sample collection and analysis to...

  3. Independent Verification Survey Report For Zone 1 Of The East Tennessee Technology Park In Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    King, David A.

    2012-01-01

    Oak Ridge Associated Universities (ORAU) conducted in-process inspections and independent verification (IV) surveys in support of DOE's remedial efforts in Zone 1 of East Tennessee Technology Park (ETTP) in Oak Ridge, Tennessee. Inspections concluded that the remediation contractor's soil removal and survey objectives were satisfied and the dynamic verification strategy (DVS) was implemented as designed. Independent verification (IV) activities included gamma walkover surveys and soil sample collection/analysis over multiple exposure units (EUs)

  4. Time Optimal Reachability Analysis Using Swarm Verification

    DEFF Research Database (Denmark)

    Zhang, Zhengkui; Nielsen, Brian; Larsen, Kim Guldstrand

    2016-01-01

    Time optimal reachability analysis employs model-checking to compute goal states that can be reached from an initial state with a minimal accumulated time duration. The model-checker may produce a corresponding diagnostic trace which can be interpreted as a feasible schedule for many scheduling...... and planning problems, response time optimization etc. We propose swarm verification to accelerate time optimal reachability using the real-time model-checker Uppaal. In swarm verification, a large number of model checker instances execute in parallel on a computer cluster using different, typically randomized...... search strategies. We develop four swarm algorithms and evaluate them with four models in terms scalability, and time- and memory consumption. Three of these cooperate by exchanging costs of intermediate solutions to prune the search using a branch-and-bound approach. Our results show that swarm...

  5. Multilateral disarmament verification

    International Nuclear Information System (INIS)

    Persbo, A.

    2013-01-01

    Non-governmental organisations, such as VERTIC (Verification Research, Training and Information Centre), can play an important role in the promotion of multilateral verification. Parties involved in negotiating nuclear arms accords are for the most part keen that such agreements include suitable and robust provisions for monitoring and verification. Generally progress in multilateral arms control verification is often painstakingly slow, but from time to time 'windows of opportunity' - that is, moments where ideas, technical feasibility and political interests are aligned at both domestic and international levels - may occur and we have to be ready, so the preparatory work is very important. In the context of nuclear disarmament, verification (whether bilateral or multilateral) entails an array of challenges, hurdles and potential pitfalls relating to national security, health, safety and even non-proliferation, so preparatory work is complex and time-greedy. A UK-Norway Initiative was established in order to investigate the role that a non-nuclear-weapon state such as Norway could potentially play in the field of nuclear arms control verification. (A.C.)

  6. On Adaptive Extended Different Life Cycle of Product Design Strategy

    Science.gov (United States)

    Wenwen, Jiang; Zhibin, Xie

    The article uses research ways of following the whole lifespan of product and enterprise's development course to research strategy of company's product design and development. It announces enterprises of different nature, enterprises at different developing stage will adopt different mode strategy. It also announces close causality between development course of company and central technology and product. The result indicated in different developing stages such as company development period, crisis predicament period, lasting steadies period, improving by payback period, issues steadies secondary period, declining go and live period, enterprise should pursue different mode product tactics of research and development such as shrinking strategy, consolidating strategy, innovation keeping forging ahead strategy. Enterprise should break regular management mode to introduce different research and development mode to promote enterprise's competitiveness effectively.

  7. Verification of Spent Fuel Transfers in Germany — Linking Strategy, Implementation and People

    International Nuclear Information System (INIS)

    Tsvetkov, I.; Araujo, J.; Morris, G.; Vukadin, Z.; Wishard, B.; Kahnmeyer, W.; ); Trautwein, W.

    2015-01-01

    Following the decision of the German Government to completely phase out nuclear energy by 2022, the Agency is facing an increasing number of spent fuel (SF) transfers from nuclear power plants (NPP) to dry SF storage facilities. Verification of these transfers in the period 2015-2016 would have required about 1000 additional calendar-days in the field by inspectors. To meet the verification requirements with the available resources, the Agency together with the European Commission (EC) designed an innovative approach. The approach is making full use of safeguards cooperation with the EC and Germany's NPP operators to reduce the inspector's efforts, while fully adhering to the Agency's safeguards policy and requirements. The approach includes verification for partial defect test using digital Cerenkov viewing device (DCVD) of all SF assemblies in a reactor pond(s) before and after a SF loading campaign; during the SF loading campaign all SF in pond(s) is maintained under continuous surveillance, while the containment measures on SF casks, i.e., fibre-optic and electronic seals, and corresponding fibre-optic cables, are applied by the NPP operator in accordance with the agreed procedure. While the above approach allows for substantial reduction of the Agency inspector presence during the SF cask loading campaign, it can only be implemented when good cooperation exists between the Agency, the facility operator, and, as in the case of Germany, the regional safeguards authority. (author)

  8. Verification of the thermal design of electronic equipment

    Energy Technology Data Exchange (ETDEWEB)

    Hienonen, R.; Karjalainen, M.; Lankinen, R. [VTT Automation, Espoo (Finland). ProTechno

    1997-12-31

    The project `Verification of the thermal design of electronic equipment` studied the methodology to be followed in the verification of thermal design of electronic equipment. This project forms part of the `Cool Electronics` research programme funded by TEKES, the Finnish Technology Development Centre. This project was carried out jointly by VTT Automation, Lappeenranta University of Technology, Nokia Research Center and ABB Industry Oy VSD-Technology. The thermal design of electronic equipment has a significant impact on the cost, reliability, tolerance to different environments, selection of components and materials, and ergonomics of the product. This report describes the method for verification of thermal design. It assesses the goals set for thermal design, environmental requirements, technical implementation of the design, thermal simulation and modelling, and design qualification testing and the measurements needed. The verification method covers all packaging levels of electronic equipment from the system level to the electronic component level. The method described in this report can be used as part of the quality system of a corporation. The report includes information about the measurement and test methods needed in the verification process. Some measurement methods for the temperature, flow and pressure of air are described. (orig.) Published in Finnish VTT Julkaisuja 824. 22 refs.

  9. Impact of nutritional strategies on water productivity indicators for pigs

    Directory of Open Access Journals (Sweden)

    Julio Cesar Pascale Palhares

    2013-12-01

    Full Text Available The productivity of water is a poorly considered indicator in animal agriculture. This is because water is a resource still believed by persons in the production network to be abundant and of good quality. The aim of this study was to evaluate the impact of nutritional strategies in water productivity indicators for growing and slaughtering pigs. Five strategies were evaluated: control diet (T1, with a reduction in the level of crude protein (T2, phytase (T3, organic minerals (T4 and the three nutritional strategies combined (T5. The water productivity indicator is defined as the quantity of product by water used. The following indicators were calculated: total weight (kg L-1, cold carcass (kg L-1 lean carcass (L kg-1, and nutrition (kcal L-1. T5 showed the best productivities for each liter of water used. The total weight productivity in this treatment was 3.0 kg L-1, while in T1 was 2.5 kg L-1. T3 had the lowest productivities. The nutritional water productivities were 2,512, 2,763, 2,657, 2,814, and 3,039 kcal L-1, respectively for T1, T2, T3, T4, and T5. Nutritional strategies reduce the use of drinking water and therefore improve water productivities. The best productivities were observed when combining the strategies.

  10. Preliminary Validation and Verification Plan for CAREM Reactor Protection System

    International Nuclear Information System (INIS)

    Fittipaldi, Ana; Maciel Felix

    2000-01-01

    The purpose of this paper, is to present a preliminary validation and verification plan for a particular architecture proposed for the CAREM reactor protection system with software modules (computer based system).These software modules can be either own design systems or systems based in commercial modules such as programmable logic controllers (PLC) redundant of last generation.During this study, it was seen that this plan can also be used as a validation and verification plan of commercial products (COTS, commercial off the shelf) and/or smart transmitters.The software life cycle proposed and its features are presented, and also the advantages of the preliminary validation and verification plan

  11. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  12. The design of verification regimes

    International Nuclear Information System (INIS)

    Gallagher, N.W.

    1991-01-01

    Verification of a nuclear agreement requires more than knowledge of relevant technologies and institutional arrangements. It also demands thorough understanding of the nature of verification and the politics of verification design. Arms control efforts have been stymied in the past because key players agreed to verification in principle, only to disagree radically over verification in practice. In this chapter, it is shown that the success and stability of arms control endeavors can be undermined by verification designs which promote unilateral rather than cooperative approaches to security, and which may reduce, rather than enhance, the security of both sides. Drawing on logical analysis and practical lessons from previous superpower verification experience, this chapter summarizes the logic and politics of verification and suggests implications for South Asia. The discussion begins by determining what properties all forms of verification have in common, regardless of the participants or the substance and form of their agreement. Viewing verification as the political process of making decisions regarding the occurrence of cooperation points to four critical components: (1) determination of principles, (2) information gathering, (3) analysis and (4) projection. It is shown that verification arrangements differ primarily in regards to how effectively and by whom these four stages are carried out

  13. Verification of road databases using multiple road models

    Science.gov (United States)

    Ziems, Marcel; Rottensteiner, Franz; Heipke, Christian

    2017-08-01

    In this paper a new approach for automatic road database verification based on remote sensing images is presented. In contrast to existing methods, the applicability of the new approach is not restricted to specific road types, context areas or geographic regions. This is achieved by combining several state-of-the-art road detection and road verification approaches that work well under different circumstances. Each one serves as an independent module representing a unique road model and a specific processing strategy. All modules provide independent solutions for the verification problem of each road object stored in the database in form of two probability distributions, the first one for the state of a database object (correct or incorrect), and a second one for the state of the underlying road model (applicable or not applicable). In accordance with the Dempster-Shafer Theory, both distributions are mapped to a new state space comprising the classes correct, incorrect and unknown. Statistical reasoning is applied to obtain the optimal state of a road object. A comparison with state-of-the-art road detection approaches using benchmark datasets shows that in general the proposed approach provides results with larger completeness. Additional experiments reveal that based on the proposed method a highly reliable semi-automatic approach for road data base verification can be designed.

  14. Test-driven verification/validation of model transformations

    Institute of Scientific and Technical Information of China (English)

    László LENGYEL; Hassan CHARAF

    2015-01-01

    Why is it important to verify/validate model transformations? The motivation is to improve the quality of the trans-formations, and therefore the quality of the generated software artifacts. Verified/validated model transformations make it possible to ensure certain properties of the generated software artifacts. In this way, verification/validation methods can guarantee different requirements stated by the actual domain against the generated/modified/optimized software products. For example, a verified/ validated model transformation can ensure the preservation of certain properties during the model-to-model transformation. This paper emphasizes the necessity of methods that make model transformation verified/validated, discusses the different scenarios of model transformation verification and validation, and introduces the principles of a novel test-driven method for verifying/ validating model transformations. We provide a solution that makes it possible to automatically generate test input models for model transformations. Furthermore, we collect and discuss the actual open issues in the field of verification/validation of model transformations.

  15. Advanced Technologies for Design Information Verification

    International Nuclear Information System (INIS)

    Watkins, Michael L.; Sheen, David M.; Rose, Joseph L.; Cumblidge, Stephen E.

    2009-01-01

    This paper discusses several technologies that have the potential to enhance facilities design verification. These approaches have shown promise in addressing the challenges associated with the verification of sub-component geometry and material composition for structures that are not directly accessible for physical inspection. A simple example is a pipe that extends into or through a wall or foundation. Both advanced electromagnetic and acoustic modalities will be discussed. These include advanced radar imaging, transient thermographic imaging, and guided acoustic wave imaging. Examples of current applications are provided. The basic principles and mechanisms of these inspection techniques are presented along with the salient practical features, advantages, and disadvantages of each technique. Other important considerations, such as component geometries, materials, and degree of access are also treated. The importance of, and strategies for, developing valid inspection models are also discussed. Beyond these basic technology adaptation and evaluation issues, important user interface considerations are outlined, along with approaches to quantify the overall performance reliability of the various inspection methods.

  16. Fed-Batch Feeding Strategies for Enzymatic Biodiesel Production

    DEFF Research Database (Denmark)

    Price, Jason Anthony; Nordblad, Mathias; Woodley, John

    2014-01-01

    of the differences in the interfacial and bulk concentrations of the enzyme. The model is then used to evaluate various feeding strategies to improve the enzymatic biodiesel production. The feeding strategies investigated, gave insight into how the methanol should be fed to potentially mitigate enzyme deactivation...... while improving the biodiesel yield. The best experimental results gave a yield of 703 .76 g FAME L-1 and a reactor productivity of 28.12 g FAME L-1 h-1. In comparison, to reach the same yield, the optimised two step feeding strategy took 6.25 hours less, which equates to an increase the reactor...

  17. Physics Verification Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-12

    The purpose of the verification project is to establish, through rigorous convergence analysis, that each ASC computational physics code correctly implements a set of physics models and algorithms (code verification); Evaluate and analyze the uncertainties of code outputs associated with the choice of temporal and spatial discretization (solution or calculation verification); and Develop and maintain the capability to expand and update these analyses on demand. This presentation describes project milestones.

  18. Class 1E software verification and validation: Past, present, and future

    Energy Technology Data Exchange (ETDEWEB)

    Persons, W.L.; Lawrence, J.D.

    1993-10-01

    This paper discusses work in progress that addresses software verification and validation (V&V) as it takes place during the full software life cycle of safety-critical software. The paper begins with a brief overview of the task description and discussion of the historical evolution of software V&V. A new perspective is presented which shows the entire verification and validation process from the viewpoints of a software developer, product assurance engineer, independent V&V auditor, and government regulator. An account of the experience of the field test of the Verification Audit Plan and Report generated from the V&V Guidelines is presented along with sample checklists and lessons learned from the verification audit experience. Then, an approach to automating the V&V Guidelines is introduced. The paper concludes with a glossary and bibliography.

  19. Guidelines for Sandia ASCI Verification and Validation Plans - Content and Format: Version 1.0

    Energy Technology Data Exchange (ETDEWEB)

    TRUCANO,TIMOTHY G.; MOYA,JAIME L.

    1999-12-01

    This report summarizes general guidelines for the development of Verification and Validation (V and V) plans for ASCI code projects at Sandia National Laboratories. The main content categories recommended by these guidelines for explicit treatment in Sandia V and V plans are (1) stockpile drivers influencing the code development project (2) the key phenomena to be modeled by the individual code; (3) software verification strategy and test plan; and (4) code validation strategy and test plans. The authors of this document anticipate that the needed content of the V and V plans for the Sandia ASCI codes will evolve as time passes. These needs will be reflected by future versions of this document.

  20. Health information technology vendor selection strategies and total factor productivity.

    Science.gov (United States)

    Ford, Eric W; Huerta, Timothy R; Menachemi, Nir; Thompson, Mark A; Yu, Feliciano

    2013-01-01

    The aim of this study was to compare health information technology (HIT) adoption strategies' relative performance on hospital-level productivity measures. The American Hospital Association's Annual Survey and Healthcare Information and Management Systems Society Analytics for fiscal years 2002 through 2007 were used for this study. A two-stage approach is employed. First, a Malmquist model is specified to calculate hospital-level productivity measures. A logistic regression model is then estimated to compare the three HIT adoption strategies' relative performance on the newly constructed productivity measures. The HIT vendor selection strategy impacts the amount of technological change required of an organization but does not appear to have either a positive or adverse impact on technical efficiency or total factor productivity. The higher levels in technological change experienced by hospitals using the best of breed and best of suite HIT vendor selection strategies may have a more direct impact on the organization early on in the process. However, these gains did not appear to translate into either increased technical efficiency or total factor productivity during the period studied. Over a longer period, one HIT vendor selection strategy may yet prove to be more effective at improving efficiency and productivity.

  1. Formal verification an essential toolkit for modern VLSI design

    CERN Document Server

    Seligman, Erik; Kumar, M V Achutha Kiran

    2015-01-01

    Formal Verification: An Essential Toolkit for Modern VLSI Design presents practical approaches for design and validation, with hands-on advice for working engineers integrating these techniques into their work. Building on a basic knowledge of System Verilog, this book demystifies FV and presents the practical applications that are bringing it into mainstream design and validation processes at Intel and other companies. The text prepares readers to effectively introduce FV in their organization and deploy FV techniques to increase design and validation productivity. Presents formal verific

  2. Verification of a level-3 diesel emissions control strategy for transport refrigeration units

    Science.gov (United States)

    Shewalla, Umesh

    Transport Refrigeration Units (TRUs) are refrigeration systems used to control the environment of temperature sensitive products while they are being transported from one place to another in trucks, trailers or shipping containers. The TRUs typically use an internal combustion engine to power the compressor of the refrigeration unit. In the United States TRUs are most commonly powered by diesel engines which vary from 9 to 40 horsepower. TRUs are capable of both heating and cooling. The TRU engines are relatively small, inexpensive and do not use emissions reduction techniques such as exhaust gas recirculation (EGR). A significant number of these engines operate in highly populated areas like distribution centers, truck stops, and other facilities which make them one of the potential causes for health risks to the people who live and work nearby. Diesel particulate matter (PM) is known for its adverse effects on both human beings and the environment. Considering these effects, regulatory bodies have imposed limitations on the PM emissions from a TRU engine. The objective of this study was to measure and analyze the regulated emissions from a TRU engine under both engine out and particulate filter system out conditions during pre-durability (when the filter system was new) and post-durability test (after the filter system was subjected to 1000 hours in-field trial). The verification program was performed by the Center for Alternative Fuel, Engines and Emissions (CAFEE) at West Virginia University (WVU). In this program, a catalyzed silicon carbide (SiC) diesel particulate filter (DPF) was evaluated and verified as a Level-3 Verified Diesel Emissions Control Strategy (VDECS) (. 85% PM reduction) under California Air Resources Board (CARB) regulations 2702 [1]. The emissions result showed that the filter system reduced diesel PM by a percentage of 96 +/- 1 over ISO 8178-C1 [2] cycle and 92 +/- 5 over EPA TRU [3] cycle, qualifying as a Level 3 VDECS. The percentage

  3. Total productivity; strategy report in 2003

    International Nuclear Information System (INIS)

    2004-01-01

    This book gives KMA message, the actual conditions and results of manufacturing competitiveness and maintenance management in 2003, a good illustration of success strategies and best practice report. It has column, special edition and success strategy. Also it presents chage of manufacturing processes and customized production, new paradime 'preservation business management' acording to informationization. And it covers secore energy policy fit for world trend and high grade suggestion of correct objective.

  4. 9 CFR 417.4 - Validation, Verification, Reassessment.

    Science.gov (United States)

    2010-01-01

    .... 417.4 Section 417.4 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF... not have a HACCP plan because a hazard analysis has revealed no food safety hazards that are... ACT HAZARD ANALYSIS AND CRITICAL CONTROL POINT (HACCP) SYSTEMS § 417.4 Validation, Verification...

  5. Verification of data files of TREF-computer program; TREF-ohjelmiston ohjaustiedostojen soveltuvuustutkimus

    Energy Technology Data Exchange (ETDEWEB)

    Ruottu, S.; Halme, A.; Ruottu, A. [Einco Oy, Karhula (Finland)

    1996-12-01

    Originally the aim of Y43 project was to verify TREF data files for several different processes. However, it appeared that deficient or missing coordination between experimental and theoretical works made meaningful verifications impossible in some cases. Therefore verification calculations were focused on catalytic cracking reactor which was developed by Neste. The studied reactor consisted of prefluidisation and reaction zones. Verification calculations concentrated mainly on physical phenomena like vaporization near oil injection zone. The main steps of the cracking process can be described as follows oil (liquid) -> oil (gas) -> oil (catal) -> product (catal) + char (catal) -> product (gas). Catalytic nature of cracking reaction was accounted by defining the cracking pseudoreaction into catalyst phase. This simplified reaction model was valid only for vaporization zone. Applied fluid dynamic theory was based on the results of EINCO`s earlier LIEKKI-projects. (author)

  6. Verification of the waste flow follow-up and product-control system AVK and proposals for improvements in accordance with the guideline of the Federal Ministry of the Environment

    International Nuclear Information System (INIS)

    Zech, J.; Wimmer, J.

    1995-01-01

    The results of a verification of the waste flow follow-up and product-control system (AVK) are summarized. This verification was based on AVK version 2.20 with the MOPRO (product control module) version 2.30 and the ELA (underground-storage-at-Morsleben module) version 1.0. The basics of the most important evaluation criteria are to be found in the underground storage specifications for the ''Konrad'' and Morsleben stores and in the waste guideline of the federal ministry of the environment. Moreover, the draft ordinance on nuclear residual products and waste (AtRAV) was taken into account.- The documentation system AVK actually reflects the demands of the BMU guideline. Moreover, the AVK, and especially the modules for the determination of radioactivity, fulfill important tasks within the framework of product control. With a view to the observation of the waste guideline of the federal ministry of the environment, the study leads to some recommendations and improvement proposals, of which an outline is given. (orig./HP) [de

  7. Class 1E software verification and validation: Past, present, and future

    International Nuclear Information System (INIS)

    Persons, W.L.; Lawrence, J.D.

    1993-10-01

    This paper discusses work in progress that addresses software verification and validation (V ampersand V) as it takes place during the full software life cycle of safety-critical software. The paper begins with a brief overview of the task description and discussion of the historical evolution of software V ampersand V. A new perspective is presented which shows the entire verification and validation process from the viewpoints of a software developer, product assurance engineer, independent V ampersand V auditor, and government regulator. An account of the experience of the field test of the Verification Audit Plan and Report generated from the V ampersand V Guidelines is presented along with sample checklists and lessons learned from the verification audit experience. Then, an approach to automating the V ampersand V Guidelines is introduced. The paper concludes with a glossary and bibliography

  8. Class 1E software verification and validation: Past, present, and future

    International Nuclear Information System (INIS)

    Persons, W.L.; Lawrence, J.D.

    1994-01-01

    This paper discusses work in progress that addresses software verification and validation (V ampersand V) as it takes place during the full software life cycle of safety-critical software. The paper begins with a brief overview of the task description and discussion of the historical evolution of software V ampersand V. A new perspective is presented which shows the entire verification and validation process from the viewpoints of a software developer, product assurance engineer, independent V ampersand V auditor, and government regulator. An account of the experience of the field test of the Verification Audit Plan and Report generated from the V ampersand V Guidelines is presented along with sample checklists and lessons learned from the verification audit experience. Then, an approach to automating the V ampersand V Guidelines is introduced. The paper concludes with a glossary and bibliography

  9. Verification and validation of computer based systems for PFBR

    International Nuclear Information System (INIS)

    Thirugnanamurthy, D.

    2017-01-01

    Verification and Validation (V and V) process is essential to build quality into system. Verification is the process of evaluating a system to determine whether the products of each development phase satisfies the requirements imposed by the previous phase. Validation is the process of evaluating a system at the end of the development process to ensure compliance with the functional, performance and interface requirements. This presentation elaborates the V and V process followed, documents submission requirements in each stage, V and V activities, check list used for reviews in each stage and reports

  10. Production-logistic system in the aspect of strategies for production planning and control and for logistic customer service

    Directory of Open Access Journals (Sweden)

    Łukasz Hadaś

    2014-09-01

    Full Text Available Background: The authors made multi-dimensional review of production and logistic strategies in order to prove their coherence in shaping internal and external supply chain. The paper is concluded with definition of production-logistic system as an object of modeling in transformation of business systems of manufacturing companies. Material and methods: The paper is based on analysis of state of the art presented in the literature on the subject of production and logistics strategies. Publications of key importance were selected to identify genesis and basic assumptions of strategies and their functioning. Comparative synthesis of logistic and production strategies identified is developed with respect to authors' experience in application of predefined tools and methods characteristic for strategies identified. Results: The result of the work conducted is consolidation of production and logistic strategies according to multi-variant customer service and original definition of production and logistic system. Conclusions: Production system and logistic system can and should be treated as equal elements in context of material flows management in internal and external supply chains. Such approach enables modeling of both systems as coherent elements realizing selected strategy of customer service.     

  11. Inspector measurement verification activities

    International Nuclear Information System (INIS)

    George, R.S.; Crouch, R.

    e most difficult and complex activity facing a safeguards inspector involves the verification of measurements and the performance of the measurement system. Remeasurement is the key to measurement verification activities. Remeasurerements using the facility's measurement system provide the bulk of the data needed for determining the performance of the measurement system. Remeasurements by reference laboratories are also important for evaluation of the measurement system and determination of systematic errors. The use of these measurement verification activities in conjunction with accepted inventory verification practices provides a better basis for accepting or rejecting an inventory. (U.S.)

  12. Verification and disarmament

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H. [IAEA, Vienna (Austria)

    1998-07-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed.

  13. Verification and disarmament

    International Nuclear Information System (INIS)

    Blix, H.

    1998-01-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed

  14. Game-based verification and synthesis

    DEFF Research Database (Denmark)

    Vester, Steen

    and the environment behaves. Synthesis of strategies in games can thus be used for automatic generation of correct-by-construction programs from specifications. We consider verification and synthesis problems for several well-known game-based models. This includes both model-checking problems and satisfiability...... can be extended to solve finitely-branching turn-based games more efficiently. Further, the novel concept of winning cores in parity games is introduced. We use this to develop a new polynomial-time under-approximation algorithm for solving parity games. Experimental results show that this algorithm...... corresponds directly to a program for the corresponding entity of the system. A strategy for a player which ensures that the player wins no matter how the other players behave then corresponds to a program ensuring that the specification of the entity is satisfied no matter how the other entities...

  15. METHODOLOGICAL INSTRUMENTS FOR FORMING THE MARKETING STRATEGY OF AGRICULTURAL PRODUCTION ECOLOGIZATION

    Directory of Open Access Journals (Sweden)

    Mariya Bagorka

    2017-09-01

    Full Text Available The purpose of the article is the investigation of the nature, objectives, and strategic categories of ecologization marketing strategy, development of algorithm of this strategy and determination of environmental, economic, and ecological instruments of implementation of this strategy in the agricultural sector. Methodology. The basis of the formation of a marketing strategy for the ecologization of agrarian production is the systematic approach, which is based on the existence of implementation mechanisms that ensure system consistency, its purposefulness; interdependence; and complexity of its elements, which determines the integrity of the system; all tasks that execute individual elements of the system are interconnected; system elements and their associated actions have a certain subordination that builds a hierarchy; the system changes under the influence of specific factors, which determines its dynamism; the ability of the system to adapt to the variability of the external environment, while not losing its own individuality. Methods for strategic analysis of macro- and micro-environment factors were used to form the marketing strategy of ecologization. This process involves an analytical evaluation of the parameters of the external and internal environment with the help of general scientific and applied methods of strategic analysis. Results. The article explored the ecologization strategy, presented its objectives in the field of agriculture, the basic categories of strategic directions and implementation of ecologization marketing strategies. An algorithm of environmental marketing strategies in agricultural production is developed, environmental, economic and environmental and economic tools to implement them are determined. Practical implications. It is determined that marketing strategy of ecologization of agrarian production is a strategy of innovative development that can solve problems of economic growth, an increase of

  16. Effective sourcing strategies for perishable product supply chains

    NARCIS (Netherlands)

    Rijpkema, W.A.; Rossi, R.; Vorst, van der J.G.A.J.

    2014-01-01

    Purpose – The purpose of this paper is to assess whether an existing sourcing strategy can effectively supply products of appropriate quality with acceptable levels of product waste if applied to an international perishable product supply chain. The authors also analyse whether the effectiveness of

  17. Verification of warnings at the Meteorological and Hydrological Service of Croatia

    Science.gov (United States)

    Kalin, Lovro

    2017-04-01

    The role of national meteorological services is increasingly related to warnings. This is particularly stressed due to more frequent extreme events and severe weather. At the Meteorological and Hydrological Service of Croatia various warnings products are introduced, from Civil protection service and MeteoAlarm to different specialized products, such as heat spells, cold spells, forest fire warnings, etc. Verification of warnings is a relatively new field, with spurious methods and diverse data. Still, various results of warnings will be presented in this paper, mostly through contingency tables and related verification scores. These results provide an insight to the forecast system, it's properties and give a good feed-back to the forecasters.

  18. Strategies for Optimizing Algal Biology for Enhanced Biomass Production

    International Nuclear Information System (INIS)

    Barry, Amanda N.; Starkenburg, Shawn R.; Sayre, Richard T.

    2015-01-01

    One of the most environmentally sustainable ways to produce high-energy density (oils) feed stocks for the production of liquid transportation fuels is from biomass. Photosynthetic carbon capture combined with biomass combustion (point source) and subsequent carbon capture and sequestration has also been proposed in the intergovernmental panel on climate change report as one of the most effective and economical strategies to remediate atmospheric greenhouse gases. To maximize photosynthetic carbon capture efficiency and energy-return-on-investment, we must develop biomass production systems that achieve the greatest yields with the lowest inputs. Numerous studies have demonstrated that microalgae have among the greatest potentials for biomass production. This is in part due to the fact that all alga cells are photoautotrophic, they have active carbon concentrating mechanisms to increase photosynthetic productivity, and all the biomass is harvestable unlike plants. All photosynthetic organisms, however, convert only a fraction of the solar energy they capture into chemical energy (reduced carbon or biomass). To increase aerial carbon capture rates and biomass productivity, it will be necessary to identify the most robust algal strains and increase their biomass production efficiency often by genetic manipulation. We review recent large-scale efforts to identify the best biomass producing strains and metabolic engineering strategies to improve aerial productivity. These strategies include optimization of photosynthetic light-harvesting antenna size to increase energy capture and conversion efficiency and the potential development of advanced molecular breeding techniques. To date, these strategies have resulted in up to twofold increases in biomass productivity.

  19. Strategies for Optimizing Algal Biology for Enhanced Biomass Production

    Energy Technology Data Exchange (ETDEWEB)

    Barry, Amanda N.; Starkenburg, Shawn R.; Sayre, Richard T., E-mail: rsayre@newmexicoconsortium.org [Los Alamos National Laboratory, New Mexico Consortium, Los Alamos, NM (United States)

    2015-02-02

    One of the most environmentally sustainable ways to produce high-energy density (oils) feed stocks for the production of liquid transportation fuels is from biomass. Photosynthetic carbon capture combined with biomass combustion (point source) and subsequent carbon capture and sequestration has also been proposed in the intergovernmental panel on climate change report as one of the most effective and economical strategies to remediate atmospheric greenhouse gases. To maximize photosynthetic carbon capture efficiency and energy-return-on-investment, we must develop biomass production systems that achieve the greatest yields with the lowest inputs. Numerous studies have demonstrated that microalgae have among the greatest potentials for biomass production. This is in part due to the fact that all alga cells are photoautotrophic, they have active carbon concentrating mechanisms to increase photosynthetic productivity, and all the biomass is harvestable unlike plants. All photosynthetic organisms, however, convert only a fraction of the solar energy they capture into chemical energy (reduced carbon or biomass). To increase aerial carbon capture rates and biomass productivity, it will be necessary to identify the most robust algal strains and increase their biomass production efficiency often by genetic manipulation. We review recent large-scale efforts to identify the best biomass producing strains and metabolic engineering strategies to improve aerial productivity. These strategies include optimization of photosynthetic light-harvesting antenna size to increase energy capture and conversion efficiency and the potential development of advanced molecular breeding techniques. To date, these strategies have resulted in up to twofold increases in biomass productivity.

  20. Verification and Performance Evaluation of Timed Game Strategies

    DEFF Research Database (Denmark)

    David, Alexandre; Fang, Huixing; Larsen, Kim Guldstrand

    2014-01-01

    Control synthesis techniques, based on timed games, derive strategies to ensure a given control objective, e.g., time-bounded reachability. Model checking verifies correctness properties of systems. Statistical model checking can be used to analyse performance aspects of systems, e.g., energy...... consumption. In this work, we propose to combine these three techniques. In particular, given a strategy synthesized for a timed game and a given control objective, we want to make a deeper examination of the consequences of adopting this strategy. Firstly, we want to apply model checking to the timed game...... under the synthesized strategy in order to verify additional correctness properties. Secondly, we want to apply statistical model checking to evaluate various performance aspects of the synthesized strategy. For this, the underlying timed game is extended with relevant price and stochastic information...

  1. Configuring Product Modularity and Service Modularity for Mass Customization Strategies

    DEFF Research Database (Denmark)

    Bask, Anu; Hsuan, Juliana; Rajahonka, Mervi

    , and how such configurations become the foundations for mass customization strategies. As a result we identify critical characteristics that are relevant for both product and services, and suggest a conceptual framework consisting of twelve dynamic mass customization strategies with paired product...

  2. Functional verification of dynamically reconfigurable FPGA-based systems

    CERN Document Server

    Gong, Lingkan

    2015-01-01

    This book analyzes the challenges in verifying Dynamically Reconfigurable Systems (DRS) with respect to the user design and the physical implementation of such systems. The authors describe the use of a simulation-only layer to emulate the behavior of target FPGAs and accurately model the characteristic features of reconfiguration. Readers are enabled with this simulation-only layer to maintain verification productivity by abstracting away the physical details of the FPGA fabric.  Two implementations of the simulation-only layer are included: Extended ReChannel is a SystemC library that can be used to check DRS designs at a high level; ReSim is a library to support RTL simulation of a DRS reconfiguring both its logic and state. Through a number of case studies, the authors demonstrate how their approach integrates seamlessly with existing, mainstream DRS design flows and with well-established verification methodologies such as top-down modeling and coverage-driven verification. Provides researchers with an i...

  3. HDL to verification logic translator

    Science.gov (United States)

    Gambles, J. W.; Windley, P. J.

    1992-01-01

    The increasingly higher number of transistors possible in VLSI circuits compounds the difficulty in insuring correct designs. As the number of possible test cases required to exhaustively simulate a circuit design explodes, a better method is required to confirm the absence of design faults. Formal verification methods provide a way to prove, using logic, that a circuit structure correctly implements its specification. Before verification is accepted by VLSI design engineers, the stand alone verification tools that are in use in the research community must be integrated with the CAD tools used by the designers. One problem facing the acceptance of formal verification into circuit design methodology is that the structural circuit descriptions used by the designers are not appropriate for verification work and those required for verification lack some of the features needed for design. We offer a solution to this dilemma: an automatic translation from the designers' HDL models into definitions for the higher-ordered logic (HOL) verification system. The translated definitions become the low level basis of circuit verification which in turn increases the designer's confidence in the correctness of higher level behavioral models.

  4. Bundling Products and Services Through Modularization Strategies

    DEFF Research Database (Denmark)

    Bask, Anu; Hsuan, Juliana; Rajahonka, Mervi

    2012-01-01

    Modularity has been recognized as a powerful tool in improving the efficiency and management of product design and manufacturing. However, the integrated view on covering both, product and service modularity for product-service systems (PSS), is under researched. Therefore, in this paper our...... objective is to contribute to the PSS modularity. Thus, we describe configurations of PSSs and the bundling of products and services through modularization strategies. So far there have not been tools to analyze and determine the correct combinations of degrees of product and service modularities....

  5. GRIMHX verification and validation action matrix summary

    International Nuclear Information System (INIS)

    Trumble, E.F.

    1991-12-01

    WSRC-RP-90-026, Certification Plan for Reactor Analysis Computer Codes, describes a series of action items to be completed for certification of reactor analysis computer codes used in Technical Specifications development and for other safety and production support calculations. Validation and verification of the code is an integral part of this process. This document identifies the work performed and documentation generated to satisfy these action items for the Reactor Physics computer code GRIMHX. Each action item is discussed with the justification for its completion. Specific details of the work performed are not included in this document but are found in the references. The publication of this document signals the validation and verification effort for the GRIMHX code is completed

  6. Branding Strategies for High Technology Products: The Effects of Consumer and Product Innovativeness

    NARCIS (Netherlands)

    Truong, Y.; van Klink, R.; Simmons, G.; Grinstein, A.; Palmer, M.

    2017-01-01

    Choice of an appropriate branding strategy is a critical determinant of new product success. Prior work on fast-moving-consumer-goods (FMCG) prescribes that new products carry new (vs. existing) brand names to appeal to earlier adopters - a critical target for new products. However, such a

  7. International Diversification, Product Strategy, And Firm Value:Evidence From Korea

    OpenAIRE

    Donseung Choi; Eunho Cho

    2014-01-01

    Existing studies showed inconsistent results for the relationship between international diversification (ID) and firm value. Thus, we primarily examine whether each MNCs product strategy moderates the relationship between ID and firm value. The results show that MNCs product strategy moderates the relationship between ID and firm value as measured by Tobins Q. Specifically, a positive relationship exists between ID and firm value in the firm group pursuing a cost leadership strategy, whereas ...

  8. Innovative pretreatment strategies for biogas production.

    Science.gov (United States)

    Patinvoh, Regina J; Osadolor, Osagie A; Chandolias, Konstantinos; Sárvári Horváth, Ilona; Taherzadeh, Mohammad J

    2017-01-01

    Biogas or biomethane is traditionally produced via anaerobic digestion, or recently by thermochemical or a combination of thermochemical and biological processes via syngas (CO and H 2 ) fermentation. However, many of the feedstocks have recalcitrant structure and are difficult to digest (e.g., lignocelluloses or keratins), or they have toxic compounds (such as fruit flavors or high ammonia content), or not digestible at all (e.g., plastics). To overcome these challenges, innovative strategies for enhanced and economically favorable biogas production were proposed in this review. The strategies considered are commonly known physical pretreatment, rapid decompression, autohydrolysis, acid- or alkali pretreatments, solvents (e.g. for lignin or cellulose) pretreatments or leaching, supercritical, oxidative or biological pretreatments, as well as combined gasification and fermentation, integrated biogas production and pretreatment, innovative biogas digester design, co-digestion, and bio-augmentation. Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. Ten Niche Strategies To Commercialize New High-Tech Products

    NARCIS (Netherlands)

    Ortt, J.R.; Langley, D.J.; Pals, N.

    2013-01-01

    There are serious gaps in the scientific literature relating to niche strategies as a means for commercializing new high-tech products. In particular, there is no clarity about what types of niche strategies can be distinguished, or how a niche strategy can be selected to suit a certain ituation. In

  10. Enrichment Assay Methods Development for the Integrated Cylinder Verification System

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Leon E.; Misner, Alex C.; Hatchell, Brian K.; Curtis, Michael M.

    2009-10-22

    International Atomic Energy Agency (IAEA) inspectors currently perform periodic inspections at uranium enrichment plants to verify UF6 cylinder enrichment declarations. Measurements are typically performed with handheld high-resolution sensors on a sampling of cylinders taken to be representative of the facility's entire product-cylinder inventory. Pacific Northwest National Laboratory (PNNL) is developing a concept to automate the verification of enrichment plant cylinders to enable 100 percent product-cylinder verification and potentially, mass-balance calculations on the facility as a whole (by also measuring feed and tails cylinders). The Integrated Cylinder Verification System (ICVS) could be located at key measurement points to positively identify each cylinder, measure its mass and enrichment, store the collected data in a secure database, and maintain continuity of knowledge on measured cylinders until IAEA inspector arrival. The three main objectives of this FY09 project are summarized here and described in more detail in the report: (1) Develop a preliminary design for a prototype NDA system, (2) Refine PNNL's MCNP models of the NDA system, and (3) Procure and test key pulse-processing components. Progress against these tasks to date, and next steps, are discussed.

  11. Enrichment Assay Methods Development for the Integrated Cylinder Verification System

    International Nuclear Information System (INIS)

    Smith, Leon E.; Misner, Alex C.; Hatchell, Brian K.; Curtis, Michael M.

    2009-01-01

    International Atomic Energy Agency (IAEA) inspectors currently perform periodic inspections at uranium enrichment plants to verify UF6 cylinder enrichment declarations. Measurements are typically performed with handheld high-resolution sensors on a sampling of cylinders taken to be representative of the facility's entire product-cylinder inventory. Pacific Northwest National Laboratory (PNNL) is developing a concept to automate the verification of enrichment plant cylinders to enable 100 percent product-cylinder verification and potentially, mass-balance calculations on the facility as a whole (by also measuring feed and tails cylinders). The Integrated Cylinder Verification System (ICVS) could be located at key measurement points to positively identify each cylinder, measure its mass and enrichment, store the collected data in a secure database, and maintain continuity of knowledge on measured cylinders until IAEA inspector arrival. The three main objectives of this FY09 project are summarized here and described in more detail in the report: (1) Develop a preliminary design for a prototype NDA system, (2) Refine PNNL's MCNP models of the NDA system, and (3) Procure and test key pulse-processing components. Progress against these tasks to date, and next steps, are discussed.

  12. Beyond products: services-based strategy.

    Science.gov (United States)

    Quinn, J B; Doorley, T L; Paquette, P C

    1990-01-01

    Services technologies are changing the way companies in every industry--manufacturers and service providers alike--compete. Vertical integration, physical facilities, even a seemingly superior product can no longer assure a competitive edge. Instead, sustainable advantage is more and more likely to come from developing superior capabilities in a few core service skills--and out-sourcing as much of the rest as possible. Within companies, technology is increasing the leverage of service activities: today, more value added comes from design innovations, product image, or other attributes that services create than from the production process. New technologies also let independent enterprises provide world-class services at lower costs than customers could achieve if they performed the activities themselves. These changes have far-reaching implications for how managers structure their organizations and define strategic focus. Companies like Apple, Honda, and Merck show that a less integrated but more focused organization is key to competitive success. They build their strategies around a few highly developed capabilities. And they outsource as many of the other activities in their value chain as possible. To help managers develop an activity-focused strategy, the authors offer a new way to approach competitive analyses, guidelines for determining which activities to outsource and which to retain, and an overview of the risks and rewards of strategic outsourcing. Throughout, they draw on the findings of their three-year study of the major impacts technology has had in the service sector.

  13. Likelihood-ratio-based biometric verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    2002-01-01

    This paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that for single-user verification the likelihood ratio is optimal.

  14. Likelihood Ratio-Based Biometric Verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    The paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that, for single-user verification, the likelihood ratio is optimal.

  15. A saddle-point for data verification and materials accountancy to control nuclear material

    International Nuclear Information System (INIS)

    Beedgen, R.

    1983-01-01

    Materials accountancy is one of the main elements in international safeguards to determine whether or not nuclear material has been diverted in nuclear plants. The inspector makes independent measurements to verify the plant-operator's data before closing the materials balance with the operator's data. All inspection statements are in principle probability statements because of random errors in measuring the material and verification on a random sampling basis. Statistical test procedures help the inspector to decide under this uncertainty. In this paper a statistical test procedure representing a saddle-point is presented that leads to the highest guaranteed detection probability taking all concealing strategies into account. There are arguments favoring a separate statistical evaluation of data verification and materials accountancy. Following these considerations, a bivariate test procedure is explained that evaluates verification and accountancy separately. (orig.) [de

  16. Integrated design strategy for product life-cycle management

    Science.gov (United States)

    Johnson, G. Patrick

    2001-02-01

    Two major trends suggest new considerations for environmentally conscious manufacturing (ECM) -- the continuation of dematerialization and the growing trend toward goods becoming services. A diversity of existing research could be integrated around those trends in ways that can enhance ECM. Major research-based achievements in information, computation, and communications systems, sophisticated and inexpensive sensing capabilities, highly automated and precise manufacturing technologies, and new materials continue to drive the phenomenon of dematerialization - the reduction of the material and energy content of per capita GDP. Knowledge is also growing about the sociology, economics, mathematics, management and organization of complex socio-economic systems. And that has driven a trend towards goods evolving into services. But even with these significant trends, the value of material, energy, information and human resources incorporated into the manufacture, use and disposal of modern products and services often far exceeds the benefits realized. Multi-disciplinary research integrating these drivers with advances in ECM concepts could be the basis for a new strategy of production. It is argued that a strategy of integrating information resources with physical and human resources over product life cycles, together with considering products as streams of service over time, could lead to significant economic payoff. That strategy leads to an overall design concept to minimize costs of all resources over the product life cycle to more fully capture benefits of all resources incorporated into modern products. It is possible by including life cycle monitoring, periodic component replacement, re-manufacture, salvage and human factor skill enhancement into initial design.

  17. A strategy for integrated low-input potato production

    NARCIS (Netherlands)

    Vereijken, P.H.; Loon, van C.D.

    1991-01-01

    Current systems of potato growing use large amounts of pesticides and fertilizers; these inputs are costly and cause environmental problems. In this paper a strategy for integrated low-input potato production is developed with the aim of reducing costs, improving product quality and reducing

  18. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  19. Product Innovation Strategies on Emerging Markets: Bringing Theory and Practice Together

    Directory of Open Access Journals (Sweden)

    Alina Irina POPESCU

    2013-12-01

    Full Text Available Emerging economies present the largest growth in the world, and thus tremendous growth opportunities. Developing products for emerging markets proves to be a difficult task requiring a fundamental shift in thinking, and the present paper aims at investigating the product innovation strategies available on emerging markets, theoretically and practically through examples and a case-study of the Romanian tablet market. At the beginning, the theoretical framework is described through the most relevant contributions to the field of product innovation. Some conceptual clarifications are provided, in the context of a widespread usage of terms in various fields of science. The second part of the paper attempts to define the ‘emerging markets’ and to find distinctive their characteristics, attempt hampered by their great diversity and complexity. The third part provides empirical support for the product innovation strategies used by local tablet producers in Romania. Findings show local tablet producers used the frugal innovation strategy in the first years of operations. Afterwards, the increasingly competitive market and the gradual sophistication of consumers made a shift in strategy, to new product development and innovation strategy, in the context of keeping the low-cost positioning of the locally produced tablets.

  20. 78 FR 28812 - Energy Efficiency Program for Industrial Equipment: Petition of UL Verification Services Inc. for...

    Science.gov (United States)

    2013-05-16

    ... are engineers. UL today is comprised of five businesses, Product Safety, Verification Services, Life..., Director--Global Technical Research, UL Verification Services. Subscribed and sworn to before me this 20... (431.447(c)(4)) General Personnel Overview UL is a global independent safety science company with more...

  1. Verification of a Fissile Material Cut-off Treaty (FMCT): The Potential Role of the IAEA

    International Nuclear Information System (INIS)

    Chung, Jin Ho

    2016-01-01

    The objective of a future verification of a FMCT(Fissile Material Cut-off Treaty) is to deter and detect non-compliance with treaty obligations in a timely and non-discriminatory manner with regard to banning the production of fissile material for nuclear weapons or other nuclear devices. Since the International Atomic Energy Agency (IAEA) has already established the IAEA safeguards as a verification system mainly for Non -Nuclear Weapon States (NNWSs), it is expected that the IAEA's experience and expertise in this field will make a significant contribution to setting up a future treaty's verification regime. This paper is designed to explore the potential role of the IAEA in verifying the future treaty by analyzing verification abilities of the Agency in terms of treaty verification and expected challenges. Furthermore, the concept of multilateral verification that could be facilitated by the IAEA will be examined as a measure of providing a credible assurance of compliance with a future treaty. In this circumstance, it is necessary for the IAEA to be prepared for playing a leading role in FMCT verifications as a form of multilateral verification by taking advantage of its existing verification concepts, methods, and tools. Also, several challenges that the Agency faces today need to be overcome, including dealing with sensitive and proliferative information, attribution of fissile materials, lack of verification experience in military fuel cycle facilities, and different attitude and culture towards verification between NWSs and NNWSs

  2. Verification of a Fissile Material Cut-off Treaty (FMCT): The Potential Role of the IAEA

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Jin Ho [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-05-15

    The objective of a future verification of a FMCT(Fissile Material Cut-off Treaty) is to deter and detect non-compliance with treaty obligations in a timely and non-discriminatory manner with regard to banning the production of fissile material for nuclear weapons or other nuclear devices. Since the International Atomic Energy Agency (IAEA) has already established the IAEA safeguards as a verification system mainly for Non -Nuclear Weapon States (NNWSs), it is expected that the IAEA's experience and expertise in this field will make a significant contribution to setting up a future treaty's verification regime. This paper is designed to explore the potential role of the IAEA in verifying the future treaty by analyzing verification abilities of the Agency in terms of treaty verification and expected challenges. Furthermore, the concept of multilateral verification that could be facilitated by the IAEA will be examined as a measure of providing a credible assurance of compliance with a future treaty. In this circumstance, it is necessary for the IAEA to be prepared for playing a leading role in FMCT verifications as a form of multilateral verification by taking advantage of its existing verification concepts, methods, and tools. Also, several challenges that the Agency faces today need to be overcome, including dealing with sensitive and proliferative information, attribution of fissile materials, lack of verification experience in military fuel cycle facilities, and different attitude and culture towards verification between NWSs and NNWSs.

  3. Dynamic Investment Strategies and Leadership in Product Innovation

    NARCIS (Netherlands)

    Dawid, H.; Keoula, M.Y.; Kopel, M.; Kort, Peter

    2017-01-01

    We employ a dynamic market model with endogenous creation of submarkets to study the optimal product innovation strategies of incumbent firms. Firms invest in production capacity and R&D knowledge stock, where the latter determines the hazard rate of innovation. We find that under Markov Perfect

  4. Verification of Simulation Tools

    International Nuclear Information System (INIS)

    Richard, Thierry

    2015-01-01

    Before qualifying a simulation tool, the requirements shall first be clearly identified, i.e.: - What type of study needs to be carried out? - What phenomena need to be modeled? This phase involves writing a precise technical specification. Once the requirements are defined, the most adapted product shall be selected from the various software options available on the market. Before using a particular version of a simulation tool to support the demonstration of nuclear safety studies, the following requirements shall be met. - An auditable quality assurance process complying with development international standards shall be developed and maintained, - A process of verification and validation (V and V) shall be implemented. This approach requires: writing a report and/or executive summary of the V and V activities, defining a validated domain (domain in which the difference between the results of the tools and those of another qualified reference is considered satisfactory for its intended use). - Sufficient documentation shall be available, - A detailed and formal description of the product (software version number, user configuration, other settings and parameters) in the targeted computing environment shall be available. - Source codes corresponding to the software shall be archived appropriately. When these requirements are fulfilled, the version of the simulation tool shall be considered qualified for a defined domain of validity, in a given computing environment. The functional verification shall ensure that: - the computer architecture of the tool does not include errors, - the numerical solver correctly represents the physical mathematical model, - equations are solved correctly. The functional verification can be demonstrated through certification or report of Quality Assurance. The functional validation shall allow the user to ensure that the equations correctly represent the physical phenomena in the perimeter of intended use. The functional validation can

  5. Can self-verification strivings fully transcend the self-other barrier? Seeking verification of ingroup identities.

    Science.gov (United States)

    Gómez, Angel; Seyle, D Conor; Huici, Carmen; Swann, William B

    2009-12-01

    Recent research has demonstrated self-verification strivings in groups, such that people strive to verify collective identities, which are personal self-views (e.g., "sensitive") associated with group membership (e.g., "women"). Such demonstrations stop short of showing that the desire for self-verification can fully transcend the self-other barrier, as in people working to verify ingroup identities (e.g., "Americans are loud") even when such identities are not self-descriptive ("I am quiet and unassuming"). Five studies focus on such ingroup verification strivings. Results indicate that people prefer to interact with individuals who verify their ingroup identities over those who enhance these identities (Experiments 1-5). Strivings for ingroup identity verification were independent of the extent to which the identities were self-descriptive but were stronger among participants who were highly invested in their ingroup identities, as reflected in high certainty of these identities (Experiments 1-4) and high identification with the group (Experiments 1-5). In addition, whereas past demonstrations of self-verification strivings have been limited to efforts to verify the content of identities (Experiments 1 to 3), the findings also show that they strive to verify the valence of their identities (i.e., the extent to which the identities are valued; Experiments 4 and 5). Self-verification strivings, rather than self-enhancement strivings, appeared to motivate participants' strivings for ingroup identity verification. Links to collective self-verification strivings and social identity theory are discussed.

  6. Summary of strategies for planning Productivity Improvement and Quality Enhancement (PIQE)

    Science.gov (United States)

    1986-01-01

    The Summary of NASA Strategies for Productivity Improvement and Quality Enhancement respond to NASA's eighth top goal: Establish NASA as a leader in the development and application of advanced technology and management practices which contribute to significant increases in both Agency and national productivity. The Strategies provide the framework for development of the agency-wide Productivity Improvement and Quality Enhancement (PIQE) Plans.

  7. 75 FR 38765 - Domestic Origin Verification System Questionnaire and Regulations Governing Inspection and...

    Science.gov (United States)

    2010-07-06

    ..., facility assessment services, certifications of quantity and quality, import product inspections, and... control number. These include export certification, inspection of section 8e import products, and...] Domestic Origin Verification System Questionnaire and Regulations Governing Inspection and Certification of...

  8. Marketing Animal-Friendly Products: Addressing the Consumer Social Dilemma with Reinforcement Positioning Strategies

    Science.gov (United States)

    Ingenbleek, Paul T.M.; van Trijp, Hans C.M.; van der Veen, Gerrita

    2017-01-01

    Simple Summary Modern production systems aimed at improving animal welfare are more costly than traditional systems. Animal-friendly products are therefore typically more expensive than mainstream products, which presents one of the main barriers to consumer animal-friendly product choice. To overcome this barrier, marketing strategies that associate animal welfare with different types of value, such as taste, healthiness or good feeling, may be useful. This article presents a theoretical framework with marketing strategies using various types of value, suitable for animal-friendly products to encourage consumers to buy animal-friendly instead of mainstream products. We also explain why some consumers, such as those with a rational or an intuitive thinking style, may be more sensitive to some strategies over others, giving directions to marketing managers on how to approach different types of consumers. Because the credibility of animal welfare claims is a critical issue in marketing animal-friendly products, we address this issue as well. Specifically, we propose that, to gain consumer trust, companies selling animal-friendly products need to take into account the impact of their overall strategy on the effectiveness of marketing strategies for individual products and that they may need to collaborate with relevant stakeholders, such as media or animal-interest organizations. Abstract This article presents a conceptual framework that aims to encourage consumer animal-friendly product choice by introducing positioning strategies for animal-friendly products. These strategies reinforce the animal welfare with different types of consumption values and can therefore reduce consumers’ social dilemma, which is a major barrier to animal-friendly consumer choices. The article suggests how animal-friendly products can use various types of consumption values (functional, sensory, emotional, social, epistemic and situational) to create an attractive position relative to

  9. Strategy to increase Barangan Banana production in Kabupaten Deli Serdang

    Science.gov (United States)

    Adhany, I.; Chalil, D.; Ginting, R.

    2018-02-01

    This study was conducted to analyze internal and external factors in increasing Barangan Banana production in Kabupaten Deli Serdang. Samples were determined by snowball sampling technique and purposive sampling method. Using SWOT analysis method, this study found that there were 6 internal strategic factors and 9 external strategic factors. Among that strategic factors, support for production facilities appears as the most important internal strategic factor, while the demand for Barangan Banana. as the most important external strategic factor. Based on the importance and existing condition of these strategic factors, using support for production facilities and realization of supporting facilities with farming experience are the strategies covering strength-opportunity (SO), organizing mentoring to meet the demand for Barangan Banana are the strategies covering weakness-opportunity (WO), making use of funding support and subsidies to widen the land, using tissue culture seeds and facilities and infrastructures are the strategies covering strength-threat (ST), increas the funding support to widen the land, the use of tissue culture seeds and facilities and infrastructures are the strategies covering weakness-threat (WT) are discussed and proposed to increase Barangan Banana productivity in Kabupaten Deli Serdang.

  10. Utterance Verification for Text-Dependent Speaker Recognition

    DEFF Research Database (Denmark)

    Kinnunen, Tomi; Sahidullah, Md; Kukanov, Ivan

    2016-01-01

    Text-dependent automatic speaker verification naturally calls for the simultaneous verification of speaker identity and spoken content. These two tasks can be achieved with automatic speaker verification (ASV) and utterance verification (UV) technologies. While both have been addressed previously...

  11. Calibration and verification of surface contamination meters --- Procedures and techniques

    International Nuclear Information System (INIS)

    Schuler, C; Butterweck, G.; Wernli, C.; Bochud, F.; Valley, J.-F.

    2007-03-01

    permissible errors of verification of ± 50% by an average basis guideline value count rate as verification reference. The SCM calibration and verification procedures are illustrated by means of calibration and verification of 17 different products of SCM sensitive for α, β/γ, or α/β/γ radiation. In addition, realistic verification scenarios demonstrate the SCM verification procedure. (author)

  12. Unified and Modular Modeling and Functional Verification Framework of Real-Time Image Signal Processors

    Directory of Open Access Journals (Sweden)

    Abhishek Jain

    2016-01-01

    Full Text Available In VLSI industry, image signal processing algorithms are developed and evaluated using software models before implementation of RTL and firmware. After the finalization of the algorithm, software models are used as a golden reference model for the image signal processor (ISP RTL and firmware development. In this paper, we are describing the unified and modular modeling framework of image signal processing algorithms used for different applications such as ISP algorithms development, reference for hardware (HW implementation, reference for firmware (FW implementation, and bit-true certification. The universal verification methodology- (UVM- based functional verification framework of image signal processors using software reference models is described. Further, IP-XACT based tools for automatic generation of functional verification environment files and model map files are described. The proposed framework is developed both with host interface and with core using virtual register interface (VRI approach. This modeling and functional verification framework is used in real-time image signal processing applications including cellphone, smart cameras, and image compression. The main motivation behind this work is to propose the best efficient, reusable, and automated framework for modeling and verification of image signal processor (ISP designs. The proposed framework shows better results and significant improvement is observed in product verification time, verification cost, and quality of the designs.

  13. Technology Licensing Strategy for Network Product in a Service Industry

    Directory of Open Access Journals (Sweden)

    Xianpei Hong

    2015-01-01

    Full Text Available Technology licensing has gained significant attention in literature and practice as a rapid and effective way to improve firm’s capability of technology innovation. In this paper, we investigate a duopolistic service provider competition market, where service providers develop and sell a kind of network product. In this setting, we analyze the innovating service provider’s four licensing strategies: no licensing, fixed fee licensing, royalty licensing, and two-part tariff licensing. The literature suggests that when the network products can be completely substituted, two-part tariff licensing is the optimal strategy of the innovating service provider. We find that when the network products cannot be completely substituted, two-part tariff licensing is not always optimal. The degree of the product differentiation, the intensity of the network effects, and the R&D cost of the potential licensee play a key role in determining the innovating service provider’s optimal licensing strategies.

  14. Strategies of Market Development of for Healthy Food Products in Hamadan

    Directory of Open Access Journals (Sweden)

    vahid Azizi

    2014-03-01

    Full Text Available This study was conducted at the aim of determining development strategies for marketing healthy food products. The study data was collected by conducting field survey and compeleting a questionnaire. Using simple random sampling, about 400 Hamedan citizens were selected in 2013. The data analysis was conducted by ordinal Logit model with method of maximum Likelihood. According to the results, 32 percent of people do not tend to shopping healthy food products, 34.3 percent of people ignored shopping of healthy food products, 33.8 percent of them tend to shopping of healthy food products. The results of estimating the ordinal Logit model presented that strategies such as cognition indicators, environment lover, Advertising and Information, Education, Supportive and monitoring facilities, structural and Service facilities and economic indicator should be considered as marketing strategies to develop healthy food products. In order to develop the healthy food market, the long term programs in the three sectors of products, consumption and marketing should be considered from specific purposes.

  15. Economic trade-offs amongst production diversification strategies in Brazilian coffee cooperatives

    Directory of Open Access Journals (Sweden)

    Fellipe Silva Martins

    2014-01-01

    Full Text Available Brazilian agricultural cooperatives have seen an unprecedented growth in production in the last decade which has led to several different product diversification strategies. Almost all studies in Brazil focus on the financial outcome of these strategies but few empirical studies have addressed them properly. Even fewer researches have dealt with the causes and possible strategies for the diversification of such cooperatives and their impact on their strategic planning. Hence, this paper aims at comprehending the different strategies in operations management for production diversification in coffee-producing cooperatives in south-eastern Brazil. This was done through a multi-case analysis comprising 6 coffee-producing cooperatives. The research analysed both verbal (through interviews and non-verbal (multi-criteria decision analysis responses to the causes of their diversification behaviours. It was possible to find out that most of the cooperatives’ rationale for diversifying is their pre-emptive response to financial crisis followed by increasing the number of associates as a strategy to overcome this economic struggle.

  16. A method of knowledge base verification for nuclear power plant expert systems using extended Petri Nets

    International Nuclear Information System (INIS)

    Kwon, I. W.; Seong, P. H.

    1996-01-01

    The adoption of expert systems mainly as operator supporting systems is becoming increasingly popular as the control algorithms of system become more and more sophisticated and complicated. The verification phase of knowledge base is an important part for developing reliable expert systems, especially in nuclear industry. Although several strategies or tools have been developed to perform potential error checking, they often neglect the reliability of verification methods. Because a Petri net provides a uniform mathematical formalization of knowledge base, it has been employed for knowledge base verification. In this work, we devise and suggest an automated tool, called COKEP(Checker of Knowledge base using Extended Petri net), for detecting incorrectness, inconsistency, and incompleteness in a knowledge base. The scope of the verification problem is expended to chained errors, unlike previous studies that assume error incidence to be limited to rule pairs only. In addition, we consider certainty factor in checking, because most of knowledge bases have certainly factors. 8 refs,. 2 figs,. 4 tabs. (author)

  17. The Effects of Cost Leadership Strategy and Product Differentiation Strategy on the Performance of Firms

    OpenAIRE

    Hashem Valipour; Hamid Birjandi; Samira Honarbakhsh

    2012-01-01

    This study empirically investigates the effects of business strategies on the relationship between financial leverage and the performance of firms. The research data is collected from 45 firms in the Tehran Security Exchange (TSE) during 2003-2010.The statistical technique is used to examine the assumption of multiple regressions. To test the assumptions, firms were divided into 2 groups: firms with cost leadership strategy and firms with product differentiation strategy. The results indicate...

  18. Product Portfolio Management: An Important Business Strategy

    Directory of Open Access Journals (Sweden)

    Doorasamy Mishelle

    2015-06-01

    Full Text Available The aim of this article is to provide reader with a comprehensive insight on the theories, empirical findings and models of Product Portfolio Management (PPM during new product development. This article will allow for an in-depth theoretical approach on PPM and demonstrate to managers the importance of adopting PPM as business strategy during decision making. The objective of this paper is to present a literature review of models, theories, approaches and findings on the relationship between Product Portfolio Management and new product development. Relevant statistical trends, historical developments, published opinion of major writers in this field will be presented to provide concrete evidence of the problem being discussed.

  19. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  20. Verification tests for CANDU advanced fuel

    International Nuclear Information System (INIS)

    Chung, Chang Hwan; Chang, S.K.; Hong, S.D.

    1997-07-01

    For the development of a CANDU advanced fuel, the CANFLEX-NU fuel bundles were tested under reactor operating conditions at the CANDU-Hot test loop. This report describes test results and test methods in the performance verification tests for the CANFLEX-NU bundle design. The main items described in the report are as follows. - Fuel bundle cross-flow test - Endurance fretting/vibration test - Freon CHF test - Production of technical document. (author). 25 refs., 45 tabs., 46 figs

  1. Quantum money with classical verification

    Energy Technology Data Exchange (ETDEWEB)

    Gavinsky, Dmitry [NEC Laboratories America, Princeton, NJ (United States)

    2014-12-04

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  2. Quantum money with classical verification

    International Nuclear Information System (INIS)

    Gavinsky, Dmitry

    2014-01-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it

  3. ETV REPORT AND VERIFICATION STATEMENT - KASELCO POSI-FLO ELECTROCOAGULATION TREATMENT SYSTEM

    Science.gov (United States)

    The Kaselco Electrocoagulation Treatment System (Kaselco system) in combination with an ion exchange polishing system was tested, under actual production conditions, processing metal finishing wastewater at Gull Industries in Houston, Texas. The verification test evaluated the a...

  4. A classification of strategies for the development of product configurators

    DEFF Research Database (Denmark)

    Haug, Anders; Hvam, Lars; Mortensen, Niels Henrik

    2009-01-01

    the right strategy. However, the literature does not discuss different strategic alternatives in a detailed manner, but only provides generalised recommendations of single strategies. To deal with this issue, this paper defines three main and four additional strategies for the development of product...... configurators. The strategies are defined based on literature, seven named case studies, and other case experiences of the authors. The paper deduces the advantages and disadvantages of the individual strategies, and gives a general recommendation of which type of strategy to pursue in different types...

  5. Particularities of Verification Processes for Distributed Informatics Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2013-01-01

    Full Text Available This paper presents distributed informatics applications and characteristics of their development cycle. It defines the concept of verification and there are identified the differences from software testing. Particularities of the software testing and software verification processes are described. The verification steps and necessary conditions are presented and there are established influence factors of quality verification. Software optimality verification is analyzed and some metrics are defined for the verification process.

  6. Shield verification and validation action matrix summary

    International Nuclear Information System (INIS)

    Boman, C.

    1992-02-01

    WSRC-RP-90-26, Certification Plan for Reactor Analysis Computer Codes, describes a series of action items to be completed for certification of reactor analysis computer codes used in Technical Specifications development and for other safety and production support calculations. Validation and verification are integral part of the certification process. This document identifies the work performed and documentation generated to satisfy these action items for the SHIELD, SHLDED, GEDIT, GENPRT, FIPROD, FPCALC, and PROCES modules of the SHIELD system, it is not certification of the complete SHIELD system. Complete certification will follow at a later date. Each action item is discussed with the justification for its completion. Specific details of the work performed are not included in this document but can be found in the references. The validation and verification effort for the SHIELD, SHLDED, GEDIT, GENPRT, FIPROD, FPCALC, and PROCES modules of the SHIELD system computer code is completed

  7. Platform strategy for complex products and systems

    NARCIS (Netherlands)

    Alblas, A.A.

    2011-01-01

    The thesis of Alex Alblas presents a design reuse strategy for firms producing complex products and systems (CoPS). Examples of CoPS include industrial machinery, oil-rigs, electrical power distribution systems, integrated mail processing systems and printing press machinery. CoPS firms are

  8. Conditions and strategies for integrating ergonomics into product development

    DEFF Research Database (Denmark)

    Broberg, Ole

    1996-01-01

    Ergonomics considerations at the stage of product development in industry is a major strategy for prevention of work-related injuries and illnesses among employees at the time of manufacture of new products. This study elucidates some important conditions and possibilities for integrating...... such considerations during the product development process. Special attention is paid to the role of design and production engineers. Based on different understandings of the product development process four approaches to integration of ergonomics are outlined....

  9. Verification of FPGA-based NPP I and C systems. General approach and techniques

    International Nuclear Information System (INIS)

    Andrashov, Anton; Kharchenko, Vyacheslav; Sklyar, Volodymir; Reva, Lubov; Siora, Alexander

    2011-01-01

    This paper presents a general approach and techniques for design and verification of Field Programmable Gates Arrays (FPGA)-based Instrumentation and Control (I and C) systems for Nuclear Power Plants (NPP). Appropriate regulatory documents used for I and C systems design, development, verification and validation (V and V) are discussed considering the latest international standards and guidelines. Typical development and V and V processes of FPGA electronic design for FPGA-based NPP I and C systems are presented. Some safety-related features of implementation process are discussed. Corresponding development artifacts, related to design and implementation activities are outlined. An approach to test-based verification of FPGA electronic design algorithms, used in FPGA-based reactor trip systems is proposed. The results of application of test-based techniques for assessment of FPGA electronic design algorithms for reactor trip system (RTS) produced by Research and Production Corporation (RPC) 'Radiy' are presented. Some principles of invariant-oriented verification for FPGA-based safety-critical systems are outlined. (author)

  10. A study on a systematic approach of verification and validation of a computerized procedure system: ImPRO

    International Nuclear Information System (INIS)

    Qin, Wei; Seong, Poong Hyun

    2003-01-01

    Paper Based Procedure (PBP) and Computerized Procedure System (CPS) are studied to demonstrate that it is necessary to develop CPS in NPP I and C system. Computerized procedure system is actually a software system. All the desired and undesired properties of a software system can be described and evaluated as software qualities. Generally, software qualities can be categorized into product quality and process quality. In order to achieve product quality, the process quality of a software system should also be considered and achieved. Characteristics of CPS will be described to analyse the product and process of an example CPS: ImPRO. At the same time, several main product and process issues will be analysed from Verification and Validation (V and V) point of view. It is concluded and suggested that V and V activities can also be regarded as software development process, this point of view then is applied to the V and V activities of ImPRO as a systematic approach of V and V of ImPRO. To support and realize this approach, suitable testing technologies and testing strategies are suggested

  11. Increasing loyalty to breastfeeding: investigating a product development strategy.

    Science.gov (United States)

    Parkinson, Joy; Russell-Bennett, Rebekah; Previte, Josephine

    2012-01-01

    This article demonstrates how social marketing insights were used to influence women's loyalty to breastfeeding. The article reports on a social marketing campaign undertaken by the Australian Breastfeeding Association and a government health department, which used a product development strategy in order to increase breastfeeding loyalty. Seeking new approaches to support breastfeeding behaviors is critical and timely, because while initiation rates of breastfeeding are high in developed countries such as the United Kingdom, Australia, Canada, and the United States, duration rates are significantly lower. Results indicate that a product- focused strategy influences pregnant women's loyalty to exclusively breastfeeding.

  12. Marketing Animal-Friendly Products: Addressing the Consumer Social Dilemma with Reinforcement Positioning Strategies.

    Science.gov (United States)

    van Riemsdijk, Lenka; Ingenbleek, Paul T M; van Trijp, Hans C M; van der Veen, Gerrita

    2017-12-14

    This article presents a conceptual framework that aims to encourage consumer animal-friendly product choice by introducing positioning strategies for animal-friendly products. These strategies reinforce the animal welfare with different types of consumption values and can therefore reduce consumers' social dilemma, which is a major barrier to animal-friendly consumer choices. The article suggests how animal-friendly products can use various types of consumption values (functional, sensory, emotional, social, epistemic and situational) to create an attractive position relative to their competitors. It also explains why some consumer segments, such as those with a specific thinking style, may experience a stronger effect of some strategies, giving directions on how to approach different types of consumers. Finally, building on research asserting that animal welfare is a credence product attribute, the article proposes moderating effects of two factors that help consumers to evaluate the credibility of animal welfare claims, namely corporate social responsibility strategy and the role of stakeholders. Here it concludes that companies selling animal-friendly products need to be aware of the impact of their overall strategy on the effectiveness of positioning strategies for individual products and that, to gain consumer trust, they may need to collaborate with relevant stakeholders, such as media or animal-interest organizations.

  13. Marketing Animal-Friendly Products: Addressing the Consumer Social Dilemma with Reinforcement Positioning Strategies

    Directory of Open Access Journals (Sweden)

    Lenka van Riemsdijk

    2017-12-01

    Full Text Available This article presents a conceptual framework that aims to encourage consumer animal-friendly product choice by introducing positioning strategies for animal-friendly products. These strategies reinforce the animal welfare with different types of consumption values and can therefore reduce consumers’ social dilemma, which is a major barrier to animal-friendly consumer choices. The article suggests how animal-friendly products can use various types of consumption values (functional, sensory, emotional, social, epistemic and situational to create an attractive position relative to their competitors. It also explains why some consumer segments, such as those with a specific thinking style, may experience a stronger effect of some strategies, giving directions on how to approach different types of consumers. Finally, building on research asserting that animal welfare is a credence product attribute, the article proposes moderating effects of two factors that help consumers to evaluate the credibility of animal welfare claims, namely corporate social responsibility strategy and the role of stakeholders. Here it concludes that companies selling animal-friendly products need to be aware of the impact of their overall strategy on the effectiveness of positioning strategies for individual products and that, to gain consumer trust, they may need to collaborate with relevant stakeholders, such as media or animal-interest organizations.

  14. Exploring new strategies for cellulosic biofuels production

    Science.gov (United States)

    Paul Langan; S. Gnankaran; Kirk D. Rector; Norma Pawley; David T. Fox; Dae Won Cho; Kenneth E. Hammel

    2011-01-01

    A research program has been initiated to formulate new strategies for efficient low-cost lignocellulosic biomass processing technologies for the production of biofuels. This article reviews results from initial research into lignocellulosic biomass structure, recalcitrance, and pretreatment. In addition to contributing towards a comprehensive understanding of...

  15. Java bytecode verification via static single assignment form

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian W.; Franz, Michael

    2008-01-01

    Java Virtual Machines (JVMs) traditionally perform bytecode verification by way of an iterative data-flow analysis. Bytecode verification is necessary to ensure type safety because temporary variables in the JVM are not statically typed. We present an alternative verification mechanism that trans......Java Virtual Machines (JVMs) traditionally perform bytecode verification by way of an iterative data-flow analysis. Bytecode verification is necessary to ensure type safety because temporary variables in the JVM are not statically typed. We present an alternative verification mechanism...

  16. Survey and assessment of conventional software verification and validation techniques

    International Nuclear Information System (INIS)

    Miller, L.A.; Groundwater, E.; Mirsky, S.M.

    1993-02-01

    Reliable software is required for nuclear power plant applications. Verification and validation (V ampersand V) techniques may be applied during software development to help eliminate errors that can inhibit the proper operation of digital systems and that may cause safety problems. EPRI and the NRC are cosponsoring this investigation to determine the best strategies for V ampersand V of expert system software. The strategy used for a particular system will depend on the complexity of the software and the level of integrity required. This report covers the first task in the investigation of reviewing methods for V ampersand V of conventional software systems and evaluating them for use with expert systems

  17. An international cooperative verification agenda for arms reduction

    International Nuclear Information System (INIS)

    Hinderstein, C.

    2013-01-01

    The biggest challenge to the overall verification and monitoring agenda for future arms reductions may be that posed by uncertainties regarding the quantities of existing stocks of fissile material and nuclear weapons. We must develop strategies to reduce the residual uncertainties regarding completeness of initial declarations as all declared weapons-related inventories go to zero. Establishing this confidence in countries' initial baseline declarations will likely be a key point in all states' decisions to move to very low numbers, much less zero. The author reviews the questions and challenges that need to be addressed if there is to be significant progress in negotiating and implementing a verifiable fissile material cutoff treaty (FMCT) and a policy of nuclear weapon dismantling. In support of greater security as the world works towards the elimination of nuclear weapons, individual States could begin immediately by increasing the transparency of their nuclear activities. The International Verification Project is designed to bring experts from a wide array of related backgrounds together to build capacity for verification internationally in support of arms control goals (and in support of the larger objective of a world without nuclear weapons), build confidence between nuclear and non-nuclear-weapon states, promote freer flow of information among governments and between governments and non-governmental organizations (NGOs) and solve technical problems that could be barriers to progress. The paper is followed by the slides of the presentation. (A.C.)

  18. TARDEC FIXED HEEL POINT (FHP): DRIVER CAD ACCOMMODATION MODEL VERIFICATION REPORT

    Science.gov (United States)

    2017-11-09

    Public Release Disclaimer: Reference herein to any specific commercial company, product , process, or service by trade name, trademark, manufacturer , or...not actively engaged HSI until MSB or the Engineering Manufacturing and Development (EMD) Phase, resulting in significant design and cost changes...and shall not be used for advertising or product endorsement purposes. TARDEC Fixed Heel Point (FHP): Driver CAD Accommodation Model Verification

  19. Production of sugar and alcohol: financial and operational strategies

    Directory of Open Access Journals (Sweden)

    Celma de Oliveira Ribeiro

    2014-12-01

    Full Text Available This article proposes the construction of an optimization model to define the product portfolio of a sugarcane mill, taking into account operational and financial aspects. It is considered that the revenue earned by a producer comes from the sale of sugar and alcohol in the physical market and the results obtained through hedging in the derivatives market of sugar. Employing CVaR (Conditional Value-at-Risk, as the risk measure, the model allows the construction of an efficient frontier and, according to the producer's risk tolerance, defines the optimal strategy of production (production mix and activity in the derivatives market (hedge ratio. Through the model the article also seeks to analyze the advantage of using the options market in the construction of financial hedging strategies in agricultural commodities markets.

  20. Formal verification of algorithms for critical systems

    Science.gov (United States)

    Rushby, John M.; Von Henke, Friedrich

    1993-01-01

    We describe our experience with formal, machine-checked verification of algorithms for critical applications, concentrating on a Byzantine fault-tolerant algorithm for synchronizing the clocks in the replicated computers of a digital flight control system. First, we explain the problems encountered in unsynchronized systems and the necessity, and criticality, of fault-tolerant synchronization. We give an overview of one such algorithm, and of the arguments for its correctness. Next, we describe a verification of the algorithm that we performed using our EHDM system for formal specification and verification. We indicate the errors we found in the published analysis of the algorithm, and other benefits that we derived from the verification. Based on our experience, we derive some key requirements for a formal specification and verification system adequate to the task of verifying algorithms of the type considered. Finally, we summarize our conclusions regarding the benefits of formal verification in this domain, and the capabilities required of verification systems in order to realize those benefits.

  1. A Syntactic-Semantic Approach to Incremental Verification

    OpenAIRE

    Bianculli, Domenico; Filieri, Antonio; Ghezzi, Carlo; Mandrioli, Dino

    2013-01-01

    Software verification of evolving systems is challenging mainstream methodologies and tools. Formal verification techniques often conflict with the time constraints imposed by change management practices for evolving systems. Since changes in these systems are often local to restricted parts, an incremental verification approach could be beneficial. This paper introduces SiDECAR, a general framework for the definition of verification procedures, which are made incremental by the framework...

  2. Fostering group identification and creativity in diverse groups: the role of individuation and self-verification.

    Science.gov (United States)

    Swann, William B; Kwan, Virginia S Y; Polzer, Jeffrey T; Milton, Laurie P

    2003-11-01

    A longitudinal study examined the interplay of identity negotiation processes and diversity in small groups of master's of business administration (MBA) students. When perceivers formed relatively positive impressions of other group members, higher diversity predicted more individuation of targets. When perceivers formed relatively neutral impressions of other group members, however, higher diversity predicted less individuation of targets. Individuation at the outset of the semester predicted self-verification effects several weeks later, and self-verification, in turn, predicted group identification and creative task performance. The authors conclude that contrary to self-categorization theory, fostering individuation and self-verification in diverse groups may maximize group identification and productivity.

  3. Verification and validation benchmarks.

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of

  4. Verification of Ceramic Structures

    Science.gov (United States)

    Behar-Lafenetre, Stephanie; Cornillon, Laurence; Rancurel, Michael; De Graaf, Dennis; Hartmann, Peter; Coe, Graham; Laine, Benoit

    2012-07-01

    In the framework of the “Mechanical Design and Verification Methodologies for Ceramic Structures” contract [1] awarded by ESA, Thales Alenia Space has investigated literature and practices in affiliated industries to propose a methodological guideline for verification of ceramic spacecraft and instrument structures. It has been written in order to be applicable to most types of ceramic or glass-ceramic materials - typically Cesic®, HBCesic®, Silicon Nitride, Silicon Carbide and ZERODUR®. The proposed guideline describes the activities to be performed at material level in order to cover all the specific aspects of ceramics (Weibull distribution, brittle behaviour, sub-critical crack growth). Elementary tests and their post-processing methods are described, and recommendations for optimization of the test plan are given in order to have a consistent database. The application of this method is shown on an example in a dedicated article [7]. Then the verification activities to be performed at system level are described. This includes classical verification activities based on relevant standard (ECSS Verification [4]), plus specific analytical, testing and inspection features. The analysis methodology takes into account the specific behaviour of ceramic materials, especially the statistical distribution of failures (Weibull) and the method to transfer it from elementary data to a full-scale structure. The demonstration of the efficiency of this method is described in a dedicated article [8]. The verification is completed by classical full-scale testing activities. Indications about proof testing, case of use and implementation are given and specific inspection and protection measures are described. These additional activities are necessary to ensure the required reliability. The aim of the guideline is to describe how to reach the same reliability level as for structures made of more classical materials (metals, composites).

  5. Test/QA Plan For Verification Of Anaerobic Digester For Energy Production And Pollution Prevention

    Science.gov (United States)

    The ETV-ESTE Program conducts third-party verification testing of commercially available technologies that improve the environmental conditions in the U.S. A stakeholder committee of buyers and users of such technologies guided the development of this test on anaerobic digesters...

  6. Engineering strategy of yeast metabolism for higher alcohol production

    Directory of Open Access Journals (Sweden)

    Shimizu Hiroshi

    2011-09-01

    Full Text Available Abstract Background While Saccharomyces cerevisiae is a promising host for cost-effective biorefinary processes due to its tolerance to various stresses during fermentation, the metabolically engineered S. cerevisiae strains exhibited rather limited production of higher alcohols than that of Escherichia coli. Since the structure of the central metabolism of S. cerevisiae is distinct from that of E. coli, there might be a problem in the structure of the central metabolism of S. cerevisiae. In this study, the potential production of higher alcohols by S. cerevisiae is compared to that of E. coli by employing metabolic simulation techniques. Based on the simulation results, novel metabolic engineering strategies for improving higher alcohol production by S. cerevisiae were investigated by in silico modifications of the metabolic models of S. cerevisiae. Results The metabolic simulations confirmed that the high production of butanols and propanols by the metabolically engineered E. coli strains is derived from the flexible behavior of their central metabolism. Reducing this flexibility by gene deletion is an effective strategy to restrict the metabolic states for producing target alcohols. In contrast, the lower yield using S. cerevisiae originates from the structurally limited flexibility of its central metabolism in which gene deletions severely reduced cell growth. Conclusions The metabolic simulation demonstrated that the poor productivity of S. cerevisiae was improved by the introduction of E. coli genes to compensate the structural difference. This suggested that gene supplementation is a promising strategy for the metabolic engineering of S. cerevisiae to produce higher alcohols which should be the next challenge for the synthetic bioengineering of S. cerevisiae for the efficient production of higher alcohols.

  7. Is flow verification necessary

    International Nuclear Information System (INIS)

    Beetle, T.M.

    1986-01-01

    Safeguards test statistics are used in an attempt to detect diversion of special nuclear material. Under assumptions concerning possible manipulation (falsification) of safeguards accounting data, the effects on the statistics due to diversion and data manipulation are described algebraically. A comprehensive set of statistics that is capable of detecting any diversion of material is defined in terms of the algebraic properties of the effects. When the assumptions exclude collusion between persons in two material balance areas, then three sets of accounting statistics are shown to be comprehensive. Two of the sets contain widely known accountancy statistics. One of them does not require physical flow verification - comparisons of operator and inspector data for receipts and shipments. The third set contains a single statistic which does not require physical flow verification. In addition to not requiring technically difficult and expensive flow verification, this single statistic has several advantages over other comprehensive sets of statistics. This algebraic approach as an alternative to flow verification for safeguards accountancy is discussed in this paper

  8. DIMENSIONAL VERIFICATION AND QUALITY CONTROL OF IMPLANTS PRODUCED BY ADDITIVE MANUFACTURING

    Directory of Open Access Journals (Sweden)

    Teodor Toth

    2015-07-01

    Full Text Available Purpose: Development of computer technology and alternative manufacturing methods in form of additive manufacturing leads to the manufacture of products with complex shapes. In the field of medicine they include, inter alia, custom-made implants manufactured for a particular patient, such as cranial implants, maxillofacial implants, etc. With regard to the fact that such implants are inserted into a patient’s body, it is necessary to perform the verification, including the shape and dimensional verification. The article deals with the application of the industrial computer tomography within the process of inspection and verification of selected custom-made implant types.Methodology/Approach: The Department of Biomedical Engineering and Measurement performs the verification of medicinal products manufactured by the additive manufacturing technologies from the Ti-6Al-4V (Grade 5 titanium alloy, using the coordinate measuring machine Carl Zeiss Contura G2 and the industrial computed tomography machine Carl Zeiss Metrotom 1500. These equipment fulfil the requirements for the identification and evaluation of dimensions of both, the external and the internal structures. Findings: The article presents the possibilities of the computed tomography utilisation in the inspection of individual implant manufacture using the additive manufacturing technologies. The results indicate that with the adjustment of appropriate input parameters (alignment, this technology is appropriate for the analysis of shape deviations, when compared with the CAD model.Research Limitation/implication: With the increasing distance of measured object from X-ray source, the machine’s resolution function decreases. Decreasing of resolution has a minor impact on the measured dimensions (relatively high tolerances, but has a significant impact on the evaluation of porosity and inclusions. Originality/Value of paper: Currently, the verification of a manufactured implant  can be

  9. Procedure generation and verification

    International Nuclear Information System (INIS)

    Sheely, W.F.

    1986-01-01

    The Department of Energy has used Artificial Intelligence of ''AI'' concepts to develop two powerful new computer-based techniques to enhance safety in nuclear applications. The Procedure Generation System, and the Procedure Verification System, can be adapted to other commercial applications, such as a manufacturing plant. The Procedure Generation System can create a procedure to deal with the off-normal condition. The operator can then take correct actions on the system in minimal time. The Verification System evaluates the logic of the Procedure Generator's conclusions. This evaluation uses logic techniques totally independent of the Procedure Generator. The rapid, accurate generation and verification of corrective procedures can greatly reduce the human error, possible in a complex (stressful/high stress) situation

  10. Product Platform Performance

    DEFF Research Database (Denmark)

    Munk, Lone

    The aim of this research is to improve understanding of platform-based product development by studying platform performance in relation to internal effects in companies. Platform-based product development makes it possible to deliver product variety and at the same time reduce the needed resources...... engaging in platform-based product development. Similarly platform assessment criteria lack empirical verification regarding relevance and sufficiency. The thesis focuses on • the process of identifying and estimating internal effects, • verification of performance of product platforms, (i...... experienced representatives from the different life systems phase systems of the platform products. The effects are estimated and modeled within different scenarios, taking into account financial and real option aspects. The model illustrates and supports estimation and quantification of internal platform...

  11. A Scalable Approach for Hardware Semiformal Verification

    OpenAIRE

    Grimm, Tomas; Lettnin, Djones; Hübner, Michael

    2018-01-01

    The current verification flow of complex systems uses different engines synergistically: virtual prototyping, formal verification, simulation, emulation and FPGA prototyping. However, none is able to verify a complete architecture. Furthermore, hybrid approaches aiming at complete verification use techniques that lower the overall complexity by increasing the abstraction level. This work focuses on the verification of complex systems at the RT level to handle the hardware peculiarities. Our r...

  12. High cell density strategy for poly(3-hydroxybutyrate production by Cupriavidus necator

    Directory of Open Access Journals (Sweden)

    J. L. Ienczak

    2011-12-01

    Full Text Available Poly(3-hydroxybutyrate (P(3HB is a carbon and intracellular storage source for different microorganisms and its production can achieve high productivities by means of high cell density cultures. The aim of this study was to propose a high cell density strategy for P(3HB production by Cupriavidus necator. The exponential growth phase demands an accurate control of the oxygen transfer system in the bioreactor, due to maximum specific growth rate (µXr, and, consequently, a maximum specific oxygen uptake rate (QO2, in addition to significant residual biomass (Xr growth in high cell density cultures. In this context, this work investigated the strategy for obtaining high cell density, with the inclusion of a linear growth phase for P(3HB production by C. necator in a fed-batch culture. The linear growth phase was included between the exponential growth phase and the P(3HB production phase as a strategy to reduce the specific growth rate (µXr and specific oxygen uptake rate (QO2, with constant residual biomass growth rate (d(V.Xr/dt = k = constant and linear increase of biomass. Three strategies of culture were performed. The results showed that a high residual biomass concentration (30 gXr.L-1 can be reached by the inclusion of the linear growth strategy and specific growth rates (µXr between 0.08 and 0.05 h-1, at the beginning of the production phase, are necessary to attain a high P(3HB productivity.

  13. Production-logistic system in the aspect of strategies for production planning and control and for logistic customer service

    OpenAIRE

    Łukasz Hadaś; Agnieszka Stachowiak; Piotr Cyplik

    2014-01-01

    Background: The authors made multi-dimensional review of production and logistic strategies in order to prove their coherence in shaping internal and external supply chain. The paper is concluded with definition of production-logistic system as an object of modeling in transformation of business systems of manufacturing companies. Material and methods: The paper is based on analysis of state of the art presented in the literature on the subject of production and logistics strategies. Publ...

  14. Strategy of Trade-Reliable Featured Product Supporting Regional Innovation Systems

    Science.gov (United States)

    Riskiawan, H. Y.; Purnomo, B. H.; Abdurahman, A.; Hariono, B.; Puspitasari, T. D.

    2018-01-01

    Pacitan, Ponorogo, and Magetan had planned the development of featured products as contained in the Medium Term Development Plan (MTDP) until 2020. The focus of development is almost similar to featured products derived from agribusiness, food processing, handycrafts, and tourism. The geographical proximity results characteristics of natural resources and social culture have similarities, including the type of featured products, constraints, problems, and opportunities for development. Given the characteristics and the support system of some featured products contained in these three regions have a lot in common and their functional interactions involving actors from across the region, it is necessary to develop cross-jurisdictional policy. The resulting strategy should be able to support the development of Regional Innovation System (RIS). The purpose of this research is 1) Determining featured product cross-regional between Pacitan regency; Ponorogo and Magetan districts in support of RIS development; and 2) Designing a featured product development strategy using supply chain management in order to drive the local economy. Based on the results of research conducted, featured products across the region that have potentiality to be developed are: processed products of “janggelan” leather products, and woven bamboo.

  15. Understanding International Product Strategy in Multinational Corporations through New Product Development Approaches and Evolution

    OpenAIRE

    Liu, Yang; Shi, Yongjiang

    2017-01-01

    International product strategy regarding global standardisation and local adaptation is one of the challenges faced by multinational corporations (MNCs). Studies in this area have tested the antecedents and consequences of standardisation/adaptation, but lack a new product development (NPD) perspective. In this study, we explore how product standardisation/adaptation is determined in the NPD context. Through a qualitative case study of four MNCs, we found three NPD approaches: multi-local, ad...

  16. Development of Genetic Markers for Triploid Verification of the Pacific Oyster,

    Directory of Open Access Journals (Sweden)

    Jung-Ha Kang

    2013-07-01

    Full Text Available The triploid Pacific oyster, which is produced by mating tetraploid and diploid oysters, is favored by the aquaculture industry because of its better flavor and firmer texture, particularly during the summer. However, tetraploid oyster production is not feasible in all oysters; the development of tetraploid oysters is ongoing in some oyster species. Thus, a method for ploidy verification is necessary for this endeavor, in addition to ploidy verification in aquaculture farms and in the natural environment. In this study, a method for ploidy verification of triploid and diploid oysters was developed using multiplex polymerase chain reaction (PCR panels containing primers for molecular microsatellite markers. Two microsatellite multiplex PCR panels consisting of three markers each were developed using previously developed microsatellite markers that were optimized for performance. Both panels were able to verify the ploidy levels of 30 triploid oysters with 100% accuracy, illustrating the utility of microsatellite markers as a tool for verifying the ploidy of individual oysters.

  17. Survey on Offline Finger Print Verification System

    NARCIS (Netherlands)

    Suman, R.; Kaur, R.

    2012-01-01

    The fingerprint verification, means where "verification" implies a user matching a fingerprint against a single fingerprint associated with the identity that the user claims. Biometrics can be classified into two types Behavioral (signature verification, keystroke dynamics, etc.) And Physiological

  18. 19 CFR 10.550 - Verification and justification of claim for preferential treatment.

    Science.gov (United States)

    2010-04-01

    ... may agree. (b) Applicable accounting principles. When conducting a verification of origin to which Generally Accepted Accounting Principles may be relevant, CBP will apply and accept the Generally Accepted Accounting Principles applicable in the country of production. ...

  19. Formal Development and Verification of Railway Control Systems - In the context of ERTMS/ETCS Level 2

    DEFF Research Database (Denmark)

    Vu, Linh Hong

    This dissertation presents a holistic, formal method for efficient modelling and verification of safety-critical railway control systems that have product line characteristics, i.e., each individual system is constructed by instantiating common generic applications with concrete configuration dat...... standardized railway control systems ERTMS/ETCS Level 2. Experiments showed that the method can be used for specification, verification and validation of systems of industrial size....

  20. In-core Instrument Subcritical Verification (INCISV) - Core Design Verification Method - 358

    International Nuclear Information System (INIS)

    Prible, M.C.; Heibel, M.D.; Conner, S.L.; Sebastiani, P.J.; Kistler, D.P.

    2010-01-01

    According to the standard on reload startup physics testing, ANSI/ANS 19.6.1, a plant must verify that the constructed core behaves sufficiently close to the designed core to confirm that the various safety analyses bound the actual behavior of the plant. A large portion of this verification must occur before the reactor operates at power. The INCISV Core Design Verification Method uses the unique characteristics of a Westinghouse Electric Company fixed in-core self powered detector design to perform core design verification after a core reload before power operation. A Vanadium self powered detector that spans the length of the active fuel region is capable of confirming the required core characteristics prior to power ascension; reactivity balance, shutdown margin, temperature coefficient and power distribution. Using a detector element that spans the length of the active fuel region inside the core provides a signal of total integrated flux. Measuring the integrated flux distributions and changes at various rodded conditions and plant temperatures, and comparing them to predicted flux levels, validates all core necessary core design characteristics. INCISV eliminates the dependence on various corrections and assumptions between the ex-core detectors and the core for traditional physics testing programs. This program also eliminates the need for special rod maneuvers which are infrequently performed by plant operators during typical core design verification testing and allows for safer startup activities. (authors)

  1. National Strategy for Modernizing the Regulatory System for Biotechnology Products

    Science.gov (United States)

    This National Strategy for Modernizing the Regulatory System for Biotechnology Products sets forth a vision for ensuring that the federal regulatory system is prepared to efficiently assess the risks, if any, of the future products of biotechnology.

  2. Correctness-by-construction and post-hoc verification : a marriage of convenience?

    NARCIS (Netherlands)

    Watson, B.W.; Kourie, D.G.; Schaefer, I.; Cleophas, L.G.W.A.; Margaria, T.; Steffen, B.

    2016-01-01

    Correctness-by-construction (CbC), traditionally based on weakest precondition semantics, and post-hoc verification (PhV) aspire to ensure functional correctness. We argue for a lightweight approach to CbC where lack of formal rigour increases productivity. In order to mitigate the risk of

  3. Strategies for cost-effective and enhanced production of bacterial cellulose.

    Science.gov (United States)

    Islam, Mazhar Ul; Ullah, Muhammad Wajid; Khan, Shaukat; Shah, Nasrullah; Park, Joong Kon

    2017-09-01

    Bacterial cellulose (BC) has received substantial attention because of its high purity, mechanical strength, crystallinity, liquid-absorbing capabilities, biocompatibility, and biodegradability etc. These properties allow BC to be used in various fields, especially in industries producing medical, electronic, and food products etc. A major discrepancy associated with BC is its high production cost, usually much higher than the plant cellulose. To address this limitations, researchers have developed several strategies for enhanced production of BC including the designing of advanced reactors and utilization of various carbon sources. Another promising approach is the production of BC from waste materials such as food, industrial, agricultural, and brewery wastes etc. which not only reduces the overall BC production cost but is also environment-friendly. Besides, exploration of novel and efficient BC producing microbial strains provides impressive boost to the BC production processes. To this end, development of genetically engineered microbial strains has proven useful for enhanced BC production. In this review, we have summarized major efforts to enhance BC production in order to make it a cost-effective biopolymer. This review can be of interest to researchers investigating strategies for enhanced BC production, as well as companies exploring pilot projects to scale up BC production for industrial applications. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. Approaches for Generating and Evaluating Product Positioning Strategy

    OpenAIRE

    Oghojafor Ben Akpoyomare; Ladipo Patrick Kunle Adeosun; Rahim Ajao Ganiyu

    2013-01-01

    Product positioning has been an important part of marketing since companies began to recognize the relevance of having control over their image. It is also a way of influencing consumer perception and purchase decisions as well as to satisfy corporate sales objectives. Developing an appropriate ¡®product positioning strategy¡¯ is usually influenced by such factors as the competitive marketplace, specific corporate goals, and organizational strengths. Once established, it has typically become ...

  5. Fingerprint verification prediction model in hand dermatitis.

    Science.gov (United States)

    Lee, Chew K; Chang, Choong C; Johor, Asmah; Othman, Puwira; Baba, Roshidah

    2015-07-01

    Hand dermatitis associated fingerprint changes is a significant problem and affects fingerprint verification processes. This study was done to develop a clinically useful prediction model for fingerprint verification in patients with hand dermatitis. A case-control study involving 100 patients with hand dermatitis. All patients verified their thumbprints against their identity card. Registered fingerprints were randomized into a model derivation and model validation group. Predictive model was derived using multiple logistic regression. Validation was done using the goodness-of-fit test. The fingerprint verification prediction model consists of a major criterion (fingerprint dystrophy area of ≥ 25%) and two minor criteria (long horizontal lines and long vertical lines). The presence of the major criterion predicts it will almost always fail verification, while presence of both minor criteria and presence of one minor criterion predict high and low risk of fingerprint verification failure, respectively. When none of the criteria are met, the fingerprint almost always passes the verification. The area under the receiver operating characteristic curve was 0.937, and the goodness-of-fit test showed agreement between the observed and expected number (P = 0.26). The derived fingerprint verification failure prediction model is validated and highly discriminatory in predicting risk of fingerprint verification in patients with hand dermatitis. © 2014 The International Society of Dermatology.

  6. Strategies for Lipid Production Improvement in Microalgae as a Biodiesel Feedstock

    Directory of Open Access Journals (Sweden)

    L. D. Zhu

    2016-01-01

    Full Text Available In response to the energy crisis, global warming, and climate changes, microalgae have received a great deal of attention as a biofuel feedstock. Due to a high lipid content in microalgal cells, microalgae present as a promising alternative source for the production of biodiesel. Environmental and culturing condition variations can alter lipid production as well as chemical compositions of microalgae. Therefore, application of the strategies to activate lipid accumulation opens the door for lipid overproduction in microalgae. Until now, many original studies regarding the approaches for enhanced microalgal lipid production have been reported in an effort to push forward the production of microalgal biodiesel. However, the current literature demonstrates fragmented information available regarding the strategies for lipid production improvement. From the systematic point of view, the review highlights the main approaches for microalgal lipid accumulation induction to expedite the application of microalgal biodiesel as an alternative to fossil diesel for sustainable environment. Of the several strategies discussed, the one that is most commonly applied is the design of nutrient (e.g., nitrogen, phosphorus, and sulfur starvation or limitation. Other viable approaches such as light intensity, temperature, carbon dioxide, salinity stress, and metal influence can also achieve enhanced microalgal lipid production.

  7. Agreements on climatic protection - the verification problem. IKARUS. Instrumente fuer Klimagas-Reduktionsstrategien. Final report. Subproject 9: International Greenhouse Gas Verification

    Energy Technology Data Exchange (ETDEWEB)

    Fischer, W.; Hoffmann, H.J.; Katscher, W.; Kotte, U.; Lauppe, W.D.; Stein, G.

    1995-12-31

    The sustained reduction of climate gas emissions associated with the generation, conversion and utilization of energy is clearly becoming an ever more important task in energy and environmental policy. Different strategies are conceivable in order to fulfil this mission. The aim of the IKARUS Project (Instrumente fuer Klimagas-Reduktionsstrategien - Instruments for Greenhouse Gas Reduction Strategies) was to provide a set of tools with which strategies can be developed and reconstructed (making conceptual use of the various technologies) and also tested with respect to their internal consistency and examined with regard to their economic impacts. Corresponding to the great complexity of the task in hand and the technological range of energy applications, the set of instruments is very extensive. It consists of two parts: a data base with a comprehensive data collection and several computer models of various types.The ``Verification`` project was integrated into IKARUS as a link between the national project and the international environment, enabling the examination of technologies and methods for verifying the compliance of statesparty to the Framwork Convention on Climate Change (FCCC).(orig/KW)

  8. Business Model Innovation Portfolio Strategy for Growth Under Product-Market Configurations

    OpenAIRE

    Bert Verhoeven; Lester W. Johnson

    2017-01-01

    Purpose: The research links three concepts: product market growth strategy, the magnitude of innovation and Business Model Innovation, merging them together into a dynamic Business Model Innovation strategy framework. Design/Methodology/Approach: The paper is conceptual and exploratory in nature and builds on existing literature and the author’s experience with developing business models. Findings: The BMI strategy framework can help managers establish a BMI portfolio strategy followi...

  9. 78 FR 5409 - Ongoing Equivalence Verifications of Foreign Food Regulatory Systems

    Science.gov (United States)

    2013-01-25

    ... of data shared. Finally, with respect to POE re-inspections, NACMPI recommended the targeting of high-risk product and high-risk imports for sampling and other verification activities during reinspection... authority; the availability of contingency plans in the country for containing and mitigating the effects of...

  10. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  11. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William L.; Trucano, Timothy G.

    2008-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  12. Research on V and V strategy of reactor physics code of COSINE

    International Nuclear Information System (INIS)

    Liu Zhanquan; Chen Yixue; Yang Chao; Dang Halei

    2013-01-01

    Verification and validation (V and V) is very important for the software quality assurance. Reasonable and efficient V and V strategy can achieve twice the result with half the effort. Core and system integrated engine for design and analysis (COSINE) software package contains three reactor physics codes, the lattice code (LATC), the core simulator (CORE) and the kinetics code (KIND), which is called the reactor physics subsystem. The V and V strategy for the physics subsystem was researched based on the foundation of scientific software's V and V method. The module based verification method and the function based validation method were proposed, composing the physical subsystem V and V strategy of COSINE software package. (authors)

  13. Quantitative analysis of patient-specific dosimetric IMRT verification

    International Nuclear Information System (INIS)

    Budgell, G J; Perrin, B A; Mott, J H L; Fairfoul, J; Mackay, R I

    2005-01-01

    Patient-specific dosimetric verification methods for IMRT treatments are variable, time-consuming and frequently qualitative, preventing evidence-based reduction in the amount of verification performed. This paper addresses some of these issues by applying a quantitative analysis parameter to the dosimetric verification procedure. Film measurements in different planes were acquired for a series of ten IMRT prostate patients, analysed using the quantitative parameter, and compared to determine the most suitable verification plane. Film and ion chamber verification results for 61 patients were analysed to determine long-term accuracy, reproducibility and stability of the planning and delivery system. The reproducibility of the measurement and analysis system was also studied. The results show that verification results are strongly dependent on the plane chosen, with the coronal plane particularly insensitive to delivery error. Unexpectedly, no correlation could be found between the levels of error in different verification planes. Longer term verification results showed consistent patterns which suggest that the amount of patient-specific verification can be safely reduced, provided proper caution is exercised: an evidence-based model for such reduction is proposed. It is concluded that dose/distance to agreement (e.g., 3%/3 mm) should be used as a criterion of acceptability. Quantitative parameters calculated for a given criterion of acceptability should be adopted in conjunction with displays that show where discrepancies occur. Planning and delivery systems which cannot meet the required standards of accuracy, reproducibility and stability to reduce verification will not be accepted by the radiotherapy community

  14. 19 CFR 10.616 - Verification and justification of claim for preferential tariff treatment.

    Science.gov (United States)

    2010-04-01

    .... (b) Applicable accounting principles. When conducting a verification of origin to which Generally Accepted Accounting Principles may be relevant, CBP will apply and accept the Generally Accepted Accounting Principles applicable in the country of production. ...

  15. Smart consumer products with a pathfinder product development strategy

    Science.gov (United States)

    Robertson, Alec

    1994-09-01

    It is generally acknowledged that technologies diffuse through industry and that the rate of diffusion varies both within different industries and according to the circumstances. Innovation is a process involving risk, especially during the adoption and adaptation of a powerful new technology. Central to a consumer products success using new technology is the quality of their designs and the nature of their forms. Form is of prime importance in influencing the purchasing decisions of consumers and it is also influential in determining the relationships between people in its use environment. The acceptance of a new product into the world is often unduly ad hoc. Many failures are created for each success and there are few guidelines to assist the formulation of a strategy for creating an appropriate form. It is suggested below that success of consumer products incorporating 'smart structures' may be determined not only by the function of products and systems, but also by the form they take. The definition of a desirable product form depends entirely on the point of view taken: technological, commercial, ecological, cultural, and social. However any design using new will incorporate the old and the new. The probability of acceptance of a new product is enhanced by maintaining a fine balance between imaginative and creative form and that with which people are familiar and prefer: a new design may be rejected if it is too novel and unfamiliar, or too traditional. The acceptance of a new product and its subsequent development depends on the success designers and engineers have when dealing with the initial forms, particularly using new technology such as 'smart structures'.

  16. Supply chain implications of sustainable design strategies for electronics products

    OpenAIRE

    De Coster, R; Bateman, RJ; Plant, AVC

    2012-01-01

    Increasing legislative and consumer pressures on manufacturers to improve sustainability necessitates that manufacturers consider the overall life cycle and not be scope restricted in creating products. Product strategies to improve sustainability have design implications as many of the decisions made during the design stage will then determine the environmental performance of the final product. Coordination across the supply chain is potentially beneficial as products with improved energy ef...

  17. Verification of different forecasts of Hungarian Meteorological Service

    Science.gov (United States)

    Feher, B.

    2009-09-01

    In this paper I show the results of the forecasts made by the Hungarian Meteorological Service. I focus on the general short- and medium-range forecasts, which contains cloudiness, precipitation, wind speed and temperature for six regions of Hungary. I would like to show the results of some special forecasts as well, such as precipitation predictions which are made for the catchment area of Danube and Tisza rivers, and daily mean temperature predictions used by Hungarian energy companies. The product received by the user is made by the general forecaster, but these predictions are based on the ALADIN and ECMWF outputs. Because of these, the product of the forecaster and the models were also verified. Method like this is able to show us, which weather elements are more difficult to forecast or which regions have higher errors. During the verification procedure the basic errors (mean error, mean absolute error) are calculated. Precipitation amount is classified into five categories, and scores like POD, TS, PC,…etc. were defined by contingency table determined by these categories. The procedure runs fully automatically, all the things forecasters have to do is to print the daily result each morning. Beside the daily result, verification is also made for longer periods like week, month or year. Analyzing the results of longer periods we can say that the best predictions are made for the first few days, and precipitation forecasts are less good for mountainous areas, even, the scores of the forecasters sometimes are higher than the errors of the models. Since forecaster receive results next day, it can helps him/her to reduce mistakes and learn the weakness of the models. This paper contains the verification scores, their trends, the method by which these scores are calculated, and some case studies on worse forecasts.

  18. Post-silicon and runtime verification for modern processors

    CERN Document Server

    Wagner, Ilya

    2010-01-01

    The purpose of this book is to survey the state of the art and evolving directions in post-silicon and runtime verification. The authors start by giving an overview of the state of the art in verification, particularly current post-silicon methodologies in use in the industry, both for the domain of processor pipeline design and for memory subsystems. They then dive into the presentation of several new post-silicon verification solutions aimed at boosting the verification coverage of modern processors, dedicating several chapters to this topic. The presentation of runtime verification solution

  19. USING DEMATEL-ANP INTEGRATED APPROACH FOR DECIDING PRODUCTION STRATEGY FOR A PRODUCTION LINE

    Directory of Open Access Journals (Sweden)

    Sinan APAK

    2017-09-01

    Full Text Available Production planning includes push, pull and hybrid production systems that production firms determine their production strategies according to many variables before starting production. The administration of this process requires experience and time. The intensity of rivalry makes this kind of decision processes important, because no firm has the luxury to waste time and to make a wrong decision. In order to solve this problem, research proposes to use integrated decision-making trial and evaluation laboratory (DEMATEL and analytic network process (ANP together which are methods of multi-criteria decision-making models. The process being used to establish which options are found to be most acceptable for operations managers has been demonstrated how applicable it is by using the generated model in automotive industry.

  20. H–J–B Equations of Optimal Consumption-Investment and Verification Theorems

    Energy Technology Data Exchange (ETDEWEB)

    Nagai, Hideo, E-mail: nagaih@kansai-u.ac.jp [Kansai University, Department of Mathematics, Faculty of Engineering Science (Japan)

    2015-04-15

    We consider a consumption-investment problem on infinite time horizon maximizing discounted expected HARA utility for a general incomplete market model. Based on dynamic programming approach we derive the relevant H–J–B equation and study the existence and uniqueness of the solution to the nonlinear partial differential equation. By using the smooth solution we construct the optimal consumption rate and portfolio strategy and then prove the verification theorems under certain general settings.

  1. H–J–B Equations of Optimal Consumption-Investment and Verification Theorems

    International Nuclear Information System (INIS)

    Nagai, Hideo

    2015-01-01

    We consider a consumption-investment problem on infinite time horizon maximizing discounted expected HARA utility for a general incomplete market model. Based on dynamic programming approach we derive the relevant H–J–B equation and study the existence and uniqueness of the solution to the nonlinear partial differential equation. By using the smooth solution we construct the optimal consumption rate and portfolio strategy and then prove the verification theorems under certain general settings

  2. Strategies for designing novel functional meat products.

    Science.gov (United States)

    Arihara, Keizo

    2006-09-01

    In recent years, much attention has been paid to physiological functions of foods due to increasing concerns for health. Although there has been limited information of physiological functions of meat until recently, several attractive meat-based bioactive compounds, such as carnosine, anserine, l-carnitine, conjugated linoleic acid, have been studied. Emphasizing these activities is one possible approach for improving the health image of meat and developing functional meat products. This article provides potential benefits of representative meat-based bioactive compounds on human health and an overview of meat-based functional products. Strategies for designing novel functional meat products utilizing bioactive peptides and/or probiotic bacteria, is also discussed. This article focuses particularly on the possibility of meat protein-derived bioactive peptides, such as antihypertensive peptides. There are still some hurdles in developing and marketing novel functional meat products since such products are unconventional and consumers in many countries recognize meat and meat products to be bad for health. Along with accumulation of scientific data, there is an urgent need to inform consumers of the exact functional value of meat and meat products including novel functional foods.

  3. Marketing strategy and product performance: a study of selected ...

    African Journals Online (AJOL)

    Marketing strategy and product performance: a study of selected firms in Nigeria. ... Ethiopian Journal of Environmental Studies and Management ... This paper therefore recommends that business organisations should accord necessary ...

  4. Verification and the safeguards legacy

    International Nuclear Information System (INIS)

    Perricos, Demetrius

    2001-01-01

    A number of inspection or monitoring systems throughout the world over the last decades have been structured drawing upon the IAEA experience of setting up and operating its safeguards system. The first global verification system was born with the creation of the IAEA safeguards system, about 35 years ago. With the conclusion of the NPT in 1968, inspections were to be performed under safeguards agreements, concluded directly between the IAEA and non-nuclear weapon states parties to the Treaty. The IAEA developed the safeguards system within the limitations reflected in the Blue Book (INFCIRC 153), such as limitations of routine access by the inspectors to 'strategic points', including 'key measurement points', and the focusing of verification on declared nuclear material in declared installations. The system, based as it was on nuclear material accountancy. It was expected to detect a diversion of nuclear material with a high probability and within a given time and therefore determine also that there had been no diversion of nuclear material from peaceful purposes. The most vital element of any verification system is the inspector. Technology can assist but cannot replace the inspector in the field. Their experience, knowledge, intuition and initiative are invaluable factors contributing to the success of any inspection regime. The IAEA inspectors are however not part of an international police force that will intervene to prevent a violation taking place. To be credible they should be technically qualified with substantial experience in industry or in research and development before they are recruited. An extensive training program has to make sure that the inspectors retain their professional capabilities and that it provides them with new skills. Over the years, the inspectors and through them the safeguards verification system gained experience in: organization and management of large teams; examination of records and evaluation of material balances

  5. Translating Activity Diagram from Duration Calculus for Modeling of Real-Time Systems and its Formal Verification using UPPAAL and DiVinE

    Directory of Open Access Journals (Sweden)

    Muhammad Abdul Basit Ur Rehman

    2016-01-01

    Full Text Available The RTS (Real-Time Systems are widely used in industry, home appliances, life saving systems, aircrafts, and automatic weapons. These systems need more accuracy, safety, and reliability. An accurate graphical modeling and verification of such systems is really challenging. The formal methods made it possible to model such systems with more accuracy. In this paper, we envision a strategy to overcome the inadequacy of SysML (System Modeling Language for modeling and verification of RTS, and illustrate the framework by applying it on a case study of fuel filling machine. We have defined DC (Duration Calculus implementaion based formal semantics to specify the functionality of RTS. The activity diagram in then generated from these semantics. Finally, the graphical model is verified using UPPAAL and DiVinE model checkers for validation of timed and untimed properties with accelerated verification speed. Our results suggest the use of methodology for modeling and verification of large scale real-time systems with reduced verification cost.

  6. Translating activity diagram from duration calculus for modeling of real-time systems and its formal verification using UPPAAL and DiVinE

    International Nuclear Information System (INIS)

    Rahim, M.A.B.U.; Arif, F.

    2016-01-01

    The RTS (Real-Time Systems) are widely used in industry, home appliances, life saving systems, aircrafts, and automatic weapons. These systems need more accuracy, safety, and reliability. An accurate graphical modeling and verification of such systems is really challenging. The formal methods made it possible to model such systems with more accuracy. In this paper, we envision a strategy to overcome the inadequacy of SysML (System Modeling Language) for modeling and verification of RTS, and illustrate the framework by applying it on a case study of fuel filling machine. We have defined DC (Duration Calculus) implementation based formal semantics to specify the functionality of RTS. The activity diagram in then generated from these semantics. Finally, the graphical model is verified using UPPAAL and DiVinE model checkers for validation of timed and untimed properties with accelerated verification speed. Our results suggest the use of methodology for modeling and verification of large scale real-time systems with reduced verification cost. (author)

  7. Health and productivity as a business strategy: a multiemployer study.

    Science.gov (United States)

    Loeppke, Ronald; Taitel, Michael; Haufle, Vince; Parry, Thomas; Kessler, Ronald C; Jinnett, Kimberly

    2009-04-01

    To explore methodological refinements in measuring health-related lost productivity and to assess the business implications of a full-cost approach to managing health. Health-related lost productivity was measured among 10 employers with a total of 51,648 employee respondents using the Health and Work Performance Questionnaire combined with 1,134,281 medical and pharmacy claims. Regression analyses were used to estimate the associations of health conditions with absenteeism and presenteeism using a range of models. Health-related productivity costs are significantly greater than medical and pharmacy costs alone (on average 2.3 to 1). Chronic conditions such as depression/anxiety, obesity, arthritis, and back/neck pain are especially important causes of productivity loss. Comorbidities have significant non-additive effects on both absenteeism and presenteeism. Executives/Managers experience as much or more monetized productivity loss from depression and back pain as Laborers/Operators. Testimonials are reported from participating companies on how the study helped shape their corporate health strategies. A strong link exists between health and productivity. Integrating productivity data with health data can help employers develop effective workplace health human capital investment strategies. More research is needed to understand the impacts of comorbidity and to evaluate the cost effectiveness of health and productivity interventions from an employer perspective.

  8. Data storage accounting and verification at LHC experiments

    Energy Technology Data Exchange (ETDEWEB)

    Huang, C. H. [Fermilab; Lanciotti, E. [CERN; Magini, N. [CERN; Ratnikova, N. [Moscow, ITEP; Sanchez-Hernandez, A. [CINVESTAV, IPN; Serfon, C. [Munich U.; Wildish, T. [Princeton U.; Zhang, X. [Beijing, Inst. High Energy Phys.

    2012-01-01

    All major experiments at the Large Hadron Collider (LHC) need to measure real storage usage at the Grid sites. This information is equally important for resource management, planning, and operations. To verify the consistency of central catalogs, experiments are asking sites to provide a full list of the files they have on storage, including size, checksum, and other file attributes. Such storage dumps, provided at regular intervals, give a realistic view of the storage resource usage by the experiments. Regular monitoring of the space usage and data verification serve as additional internal checks of the system integrity and performance. Both the importance and the complexity of these tasks increase with the constant growth of the total data volumes during the active data taking period at the LHC. The use of common solutions helps to reduce the maintenance costs, both at the large Tier1 facilities supporting multiple virtual organizations and at the small sites that often lack manpower. We discuss requirements and solutions to the common tasks of data storage accounting and verification, and present experiment-specific strategies and implementations used within the LHC experiments according to their computing models.

  9. 19 CFR 10.470 - Verification and justification of claim for preferential treatment.

    Science.gov (United States)

    2010-04-01

    ... accounting and financial records, information relating to the place of production, the number and...) Applicable accounting principles. When conducting a verification of origin to which Generally Accepted Accounting Principles may be relevant, CBP will apply and accept the Generally Accepted Accounting Principles...

  10. Monitoring/Verification Using DMS: TATP Example

    International Nuclear Information System (INIS)

    Kevin Kyle; Stephan Weeks

    2008-01-01

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a 'smart dust' sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. GC is the leading analytical method for the separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15-300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements

  11. Validation of optimization strategies using the linear structured production chains

    Science.gov (United States)

    Kusiak, Jan; Morkisz, Paweł; Oprocha, Piotr; Pietrucha, Wojciech; Sztangret, Łukasz

    2017-06-01

    Different optimization strategies applied to sequence of several stages of production chains were validated in this paper. Two benchmark problems described by ordinary differential equations (ODEs) were considered. A water tank and a passive CR-RC filter were used as the exemplary objects described by the first and the second order differential equations, respectively. Considered in the work optimization problems serve as the validators of strategies elaborated by the Authors. However, the main goal of research is selection of the best strategy for optimization of two real metallurgical processes which will be investigated in an on-going projects. The first problem will be the oxidizing roasting process of zinc sulphide concentrate where the sulphur from the input concentrate should be eliminated and the minimal concentration of sulphide sulphur in the roasted products has to be achieved. Second problem will be the lead refining process consisting of three stages: roasting to the oxide, oxide reduction to metal and the oxidizing refining. Strategies, which appear the most effective in considered benchmark problems will be candidates for optimization of the mentioned above industrial processes.

  12. RESRAD-BUILD verification

    International Nuclear Information System (INIS)

    Kamboj, S.; Yu, C.; Biwer, B. M.; Klett, T.

    2002-01-01

    The results generated by the RESRAD-BUILD code (version 3.0) were verified with hand or spreadsheet calculations using equations given in the RESRAD-BUILD manual for different pathways. For verification purposes, different radionuclides--H-3, C-14, Na-22, Al-26, Cl-36, Mn-54, Co-60, Au-195, Ra-226, Ra-228, Th-228, and U-238--were chosen to test all pathways and models. Tritium, Ra-226, and Th-228 were chosen because of the special tritium and radon models in the RESRAD-BUILD code. Other radionuclides were selected to represent a spectrum of radiation types and energies. Verification of the RESRAD-BUILD code was conducted with an initial check of all the input parameters for correctness against their original source documents. Verification of the calculations was performed external to the RESRAD-BUILD code with Microsoft Excel to verify all the major portions of the code. In some cases, RESRAD-BUILD results were compared with those of external codes, such as MCNP (Monte Carlo N-particle) and RESRAD. The verification was conducted on a step-by-step basis and used different test cases as templates. The following types of calculations were investigated: (1) source injection rate, (2) air concentration in the room, (3) air particulate deposition, (4) radon pathway model, (5) tritium model for volume source, (6) external exposure model, (7) different pathway doses, and (8) time dependence of dose. Some minor errors were identified in version 3.0; these errors have been corrected in later versions of the code. Some possible improvements in the code were also identified

  13. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    International Nuclear Information System (INIS)

    PICKETT, W.W.

    2000-01-01

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. Because this sub-project is still in the construction/start-up phase, all verification activities have not yet been performed (e.g., canister cover cap and welding fixture system verification, MCO Internal Gas Sampling equipment verification, and As-built verification.). The verification activities identified in this report that still are to be performed will be added to the start-up punchlist and tracked to closure

  14. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    Energy Technology Data Exchange (ETDEWEB)

    PICKETT, W.W.

    2000-09-22

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. Because this sub-project is still in the construction/start-up phase, all verification activities have not yet been performed (e.g., canister cover cap and welding fixture system verification, MCO Internal Gas Sampling equipment verification, and As-built verification.). The verification activities identified in this report that still are to be performed will be added to the start-up punchlist and tracked to closure.

  15. Internet-based dimensional verification system for reverse engineering processes

    International Nuclear Information System (INIS)

    Song, In Ho; Kim, Kyung Don; Chung, Sung Chong

    2008-01-01

    This paper proposes a design methodology for a Web-based collaborative system applicable to reverse engineering processes in a distributed environment. By using the developed system, design reviewers of new products are able to confirm geometric shapes, inspect dimensional information of products through measured point data, and exchange views with other design reviewers on the Web. In addition, it is applicable to verifying accuracy of production processes by manufacturing engineers. Functional requirements for designing this Web-based dimensional verification system are described in this paper. ActiveX-server architecture and OpenGL plug-in methods using ActiveX controls realize the proposed system. In the developed system, visualization and dimensional inspection of the measured point data are done directly on the Web: conversion of the point data into a CAD file or a VRML form is unnecessary. Dimensional verification results and design modification ideas are uploaded to markups and/or XML files during collaboration processes. Collaborators review the markup results created by others to produce a good design result on the Web. The use of XML files allows information sharing on the Web to be independent of the platform of the developed system. It is possible to diversify the information sharing capability among design collaborators. Validity and effectiveness of the developed system has been confirmed by case studies

  16. Internet-based dimensional verification system for reverse engineering processes

    Energy Technology Data Exchange (ETDEWEB)

    Song, In Ho [Ajou University, Suwon (Korea, Republic of); Kim, Kyung Don [Small Business Corporation, Suwon (Korea, Republic of); Chung, Sung Chong [Hanyang University, Seoul (Korea, Republic of)

    2008-07-15

    This paper proposes a design methodology for a Web-based collaborative system applicable to reverse engineering processes in a distributed environment. By using the developed system, design reviewers of new products are able to confirm geometric shapes, inspect dimensional information of products through measured point data, and exchange views with other design reviewers on the Web. In addition, it is applicable to verifying accuracy of production processes by manufacturing engineers. Functional requirements for designing this Web-based dimensional verification system are described in this paper. ActiveX-server architecture and OpenGL plug-in methods using ActiveX controls realize the proposed system. In the developed system, visualization and dimensional inspection of the measured point data are done directly on the Web: conversion of the point data into a CAD file or a VRML form is unnecessary. Dimensional verification results and design modification ideas are uploaded to markups and/or XML files during collaboration processes. Collaborators review the markup results created by others to produce a good design result on the Web. The use of XML files allows information sharing on the Web to be independent of the platform of the developed system. It is possible to diversify the information sharing capability among design collaborators. Validity and effectiveness of the developed system has been confirmed by case studies

  17. Issues to be considered on obtaining plant models for formal verification purposes

    Science.gov (United States)

    Pacheco, R.; Gonzalez, L.; Intriago, M.; Machado, J.; Prisacaru, G.; Olaru, D.

    2016-08-01

    The development of dependable software for mechatronic systems can be a very complex and hard task. For facilitating the obtaining of dependable software for industrial controllers, some powerful software tools and analysis techniques can be used. Mainly, when using simulation and formal verification analysis techniques, it is necessary to develop plant models, in order to describe the plant behavior of those systems. However, developing a plant model implies that designer takes his (or her) decisions concerning granularity and level of abstraction of models; approach to consider for modeling (global or modular); and definition of strategies for simulation and formal verification tasks. This paper intends to highlight some aspects that can be considered for taking into account those decisions. For this purpose, it is presented a case study and there are illustrated and discussed very important aspects concerning above exposed issues.

  18. Radioisotope Production Plan and Strategy of Kijang Research Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Kye Hong; Lee, Jun Sig [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2015-05-15

    This reactor will be located at Kijang, Busan, Korea and be dedicated to produce mainly medical radioisotopes. Tc-99m is very important isotope for diagnosis and more than 80% of radiation diagnostic procedures in nuclear medicine depend on this isotope. There were, however, several times of insecure production of Mo-99 due to the shutdown of major production reactors worldwide. OECD/NEA is leading member countries to resolve the shortage of this isotope and trying to secure the international market of Mo-99. The radioisotope plan and strategy of Kijang Research Reactor (KJRR) should be carefully established to fit not only the domestic but also international demand on Mo-99. The implementation strategy of 6 principles of HLG-MR should be established that is appropriate to national environments. Ministry of Science, ICT and Future Planning and Ministry of Health and welfare should cooperate well to organize the national radioisotope supply structure, to set up the reasonable and competitive pricing of radioisotopes, and to cope with the international supply strategy.

  19. Spent fuel verification options for final repository safeguards in Finland. A study on verification methods, their feasibility and safety aspects

    International Nuclear Information System (INIS)

    Hautamaeki, J.; Tiitta, A.

    2000-12-01

    The verification possibilities of the spent fuel assemblies from the Olkiluoto and Loviisa NPPs and the fuel rods from the research reactor of VTT are contemplated in this report. The spent fuel assemblies have to be verified at the partial defect level before the final disposal into the geologic repository. The rods from the research reactor may be verified at the gross defect level. Developing a measurement system for partial defect verification is a complicated and time-consuming task. The Passive High Energy Gamma Emission Tomography and the Fork Detector combined with Gamma Spectrometry are the most potential measurement principles to be developed for this purpose. The whole verification process has to be planned to be as slick as possible. An early start in the planning of the verification and developing the measurement devices is important in order to enable a smooth integration of the verification measurements into the conditioning and disposal process. The IAEA and Euratom have not yet concluded the safeguards criteria for the final disposal. E.g. criteria connected to the selection of the best place to perform the verification. Measurements have not yet been concluded. Options for the verification places have been considered in this report. One option for a verification measurement place is the intermediate storage. The other option is the encapsulation plant. Crucial viewpoints are such as which one offers the best practical possibilities to perform the measurements effectively and which would be the better place in the safeguards point of view. Verification measurements may be needed both in the intermediate storages and in the encapsulation plant. In this report also the integrity of the fuel assemblies after wet intermediate storage period is assessed, because the assemblies have to stand the handling operations of the verification measurements. (orig.)

  20. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  1. A Scala DSL for RETE-Based Runtime Verification

    Science.gov (United States)

    Havelund, Klaus

    2013-01-01

    Runtime verification (RV) consists in part of checking execution traces against formalized specifications. Several systems have emerged, most of which support specification notations based on state machines, regular expressions, temporal logic, or grammars. The field of Artificial Intelligence (AI) has for an even longer period of time studied rule-based production systems, which at a closer look appear to be relevant for RV, although seemingly focused on slightly different application domains, such as for example business processes and expert systems. The core algorithm in many of these systems is the Rete algorithm. We have implemented a Rete-based runtime verification system, named LogFire (originally intended for offline log analysis but also applicable to online analysis), as an internal DSL in the Scala programming language, using Scala's support for defining DSLs. This combination appears attractive from a practical point of view. Our contribution is in part conceptual in arguing that such rule-based frameworks originating from AI may be suited for RV.

  2. Strategies of performance self-monitoring in automotive production.

    Science.gov (United States)

    Faye, Hélène; Falzon, Pierre

    2009-09-01

    Production in the automotive industry, based on assembly line work, is now characterized by lean manufacturing and customization. This results in greater flexibility and increased quality demands, including worker performance self-monitoring. The objectives of this study are to refine the concept of performance self-monitoring and to characterize the strategies developed by operators to achieve it. Data were collected based on the method of individual auto-confrontation, consisting of two steps: eleven assembly-line operators of a French automotive company were individually observed and video-taped while they were working; an interview then allowed each operator to discuss his/her activity based on the video-tape. This study expands the concept of performance self-monitoring by highlighting three types of strategies directly oriented toward quality: prevention, feedback control and control action strategies.

  3. Office of River Protection Integrated Safety Management System Phase 1 Verification Corrective Action Plan

    International Nuclear Information System (INIS)

    CLARK, D.L.

    1999-01-01

    The purpose of this Corrective Action Plan is to demonstrate the OW planned and/or completed actions to implement ISMS as well as prepare for the RPP ISMS Phase II Verification scheduled for August, 1999. This Plan collates implied or explicit ORP actions identified in several key ISMS documents and aligns those actions and responsibilities perceived necessary to appropriately disposition all ISM Phase II preparation activities specific to the ORP. The objective will be to complete or disposition the corrective actions prior to the commencement of the ISMS Phase II Verification. Improvement products/tasks not slated for completion prior to the RPP Phase II verification will be incorporated as corrective actions into the Strategic System Execution Plan (SSEP) Gap Analysis. Many of the business and management systems that were reviewed in the ISMS Phase I verification are being modified to support the ORP transition and are being assessed through the SSEP. The actions and processes identified in the SSEP will support the development of the ORP and continued ISMS implementation as committed to be complete by end of FY-2000

  4. Static and Dynamic Verification of Critical Software for Space Applications

    Science.gov (United States)

    Moreira, F.; Maia, R.; Costa, D.; Duro, N.; Rodríguez-Dapena, P.; Hjortnaes, K.

    Space technology is no longer used only for much specialised research activities or for sophisticated manned space missions. Modern society relies more and more on space technology and applications for every day activities. Worldwide telecommunications, Earth observation, navigation and remote sensing are only a few examples of space applications on which we rely daily. The European driven global navigation system Galileo and its associated applications, e.g. air traffic management, vessel and car navigation, will significantly expand the already stringent safety requirements for space based applications Apart from their usefulness and practical applications, every single piece of onboard software deployed into the space represents an enormous investment. With a long lifetime operation and being extremely difficult to maintain and upgrade, at least when comparing with "mainstream" software development, the importance of ensuring their correctness before deployment is immense. Verification &Validation techniques and technologies have a key role in ensuring that the onboard software is correct and error free, or at least free from errors that can potentially lead to catastrophic failures. Many RAMS techniques including both static criticality analysis and dynamic verification techniques have been used as a means to verify and validate critical software and to ensure its correctness. But, traditionally, these have been isolated applied. One of the main reasons is the immaturity of this field in what concerns to its application to the increasing software product(s) within space systems. This paper presents an innovative way of combining both static and dynamic techniques exploiting their synergy and complementarity for software fault removal. The methodology proposed is based on the combination of Software FMEA and FTA with Fault-injection techniques. The case study herein described is implemented with support from two tools: The SoftCare tool for the SFMEA and SFTA

  5. Formal Verification of Digital Protection Logic and Automatic Testing Software

    Energy Technology Data Exchange (ETDEWEB)

    Cha, S. D.; Ha, J. S.; Seo, J. S. [KAIST, Daejeon (Korea, Republic of)

    2008-06-15

    - Technical aspect {center_dot} It is intended that digital I and C software have safety and reliability. Project results help the software to acquire license. Software verification technique, which results in this project, can be to use for digital NPP(Nuclear power plant) in the future. {center_dot} This research introduces many meaningful results of verification on digital protection logic and suggests I and C software testing strategy. These results apply to verify nuclear fusion device, accelerator, nuclear waste management and nuclear medical device that require dependable software and high-reliable controller. Moreover, These can be used for military, medical or aerospace-related software. - Economical and industrial aspect {center_dot} Since safety of digital I and C software is highly import, It is essential for the software to be verified. But verification and licence acquisition related to digital I and C software face high cost. This project gives economic profit to domestic economy by using introduced verification and testing technique instead of foreign technique. {center_dot} The operation rate of NPP will rise, when NPP safety critical software is verified with intellectual V and V tool. It is expected that these software substitute safety-critical software that wholly depend on foreign. Consequently, the result of this project has high commercial value and the recognition of the software development works will be able to be spread to the industrial circles. - Social and cultural aspect People expect that nuclear power generation contributes to relieving environmental problems because that does not emit more harmful air pollution source than other power generations. To give more trust and expectation about nuclear power generation to our society, we should make people to believe that NPP is highly safe system. In that point of view, we can present high-reliable I and C proofed by intellectual V and V technique as evidence

  6. On-power verification of the dynamic response of self-powered in-core detectors

    International Nuclear Information System (INIS)

    Serdula, K.; Beaudet, M.

    1996-01-01

    Self-powered in-core detectors are used for on-line safety and regulation purposes in CANDU reactors. Such applications require use of detectors whose response is primarily prompt to changes in flux. In-service verification of the detectors' response is required to ensure significant degradation in performance has not occurred during long-term operation. Changes in the detector characteristics occur due to nuclear interactions and failures. Present verification requires significant station resources and disrupts power production. Use of the 'noise' in the detector signal is being investigated as an alternative to assess the dynamic response of the detectors during long-term operation. Measurements of reference 'signatures' were obtained from replacement shutdown system detectors. Results show 'noise' measurements are a promising alternative to the current verification method. Identification of changes in the detector response function assist in accurate diagnosis and prognosis of changes in detector signals due to process changes. (author)

  7. Product development, strategy, product innovation performance, and the mediating role of knowledge utilization : evidence from subsidiares in China

    NARCIS (Netherlands)

    Zhang, Junfeng; Benedetto, Di A.C.; Hoenig, S.

    2009-01-01

    This study examines the interplay of product development strategy, knowledge utilization, and product innovation performance in the context of Chinese subsidiaries of multinational companies. When firms strive to develop highly innovative products (breakthrough focus), the amount of resources

  8. Pricing and Timing Strategies for New Product Using Agent-Based Simulation of Behavioural Consumers

    OpenAIRE

    Keeheon Lee; Hoyeop Lee; Chang Ouk Kim

    2014-01-01

    In this study, we are interested in the problem of determining the pricing and timing strategies of a new product by developing an agent-based product diffusion simulation. In the proposed simulation model, agents imitate behavioural consumers, who are reference dependent and risk averse in the evaluation of new products and whose interactions create word-of-mouth regarding new products. Pricing and timing strategies involve the timing of a new product release, the timing of providing a disco...

  9. Differentiated Brand Marketing Strategy for China’s Conventional Aquatic Products

    Institute of Scientific and Technical Information of China (English)

    Hua; LIANG; Zhongming; SHEN

    2015-01-01

    The volume of production and marketing of China’s conventional aquatic products is increasing. Compared with price of livestock and poultry products,price of conventional aquatic products is relatively low. Differentiated brand marketing for China’s conventional aquatic products is a key approach for increasing market demand for conventional aquatic products and increasing value of conventional aquatic products. The differentiated brand marketing is an inevitable trend of market development and also a powerful arm for market competition. China’s conventional aquatic products can take differentiated brand marketing strategies such as brand orientation,brand concept,brand culture,and place name brand,to better keep market competitive edge and increase economic benefits.

  10. Future of monitoring and verification

    International Nuclear Information System (INIS)

    Wagenmakers, H.

    1991-01-01

    The organized verification entrusted to IAEA for the implementation of the NPT, of the Treaty of Tlatelolco and of the Treaty of Rarotonga, reaches reasonable standards. The current dispute with the Democratic People's Republic of Korea about the conclusion of a safeguards agreement with IAEA, by its exceptional nature, underscores rather than undermines the positive judgement to be passed on IAEA's overall performance. The additional task given to the Director General of IAEA under Security Council resolution 687 (1991) regarding Iraq's nuclear-weapons-usable material is particularly challenging. For the purposes of this paper, verification is defined as the process for establishing whether the States parties are complying with an agreement. In the final stage verification may lead into consideration of how to respond to non-compliance. Monitoring is perceived as the first level in the verification system. It is one generic form of collecting information on objects, activities or events and it involves a variety of instruments ranging from communications satellites to television cameras or human inspectors. Monitoring may also be used as a confidence-building measure

  11. Independent Verification and Validation Of SAPHIRE 8 Software Requirements Project Number: N6423 U.S. Nuclear Regulatory Commission

    Energy Technology Data Exchange (ETDEWEB)

    Kent Norris

    2009-09-01

    The purpose of the Independent Verification and Validation (IV&V) role in the evaluation of the SAPHIRE requirements definition is to assess the activities that results in the specification, documentation, and review of the requirements that the software product must satisfy, including functionality, performance, design constraints, attributes and external interfaces. The IV&V team began this endeavor after the software engineering and software development of SAPHIRE had already been in production. IV&V reviewed the requirements specified in the NRC Form 189s to verify these requirements were included in SAPHIRE’s Software Verification and Validation Plan (SVVP).

  12. Verification and Examination Management of Complex Systems

    Directory of Open Access Journals (Sweden)

    Stian Ruud

    2014-10-01

    Full Text Available As ship systems become more complex, with an increasing number of safety-critical functions, many interconnected subsystems, tight integration to other systems, and a large amount of potential failure modes, several industry parties have identified the need for improved methods for managing the verification and examination efforts of such complex systems. Such needs are even more prominent now that the marine and offshore industries are targeting more activities and operations in the Arctic environment. In this paper, a set of requirements and a method for verification and examination management are proposed for allocating examination efforts to selected subsystems. The method is based on a definition of a verification risk function for a given system topology and given requirements. The marginal verification risks for the subsystems may then be evaluated, so that examination efforts for the subsystem can be allocated. Two cases of requirements and systems are used to demonstrate the proposed method. The method establishes a systematic relationship between the verification loss, the logic system topology, verification method performance, examination stop criterion, the required examination effort, and a proposed sequence of examinations to reach the examination stop criterion.

  13. Sustainable Product Strategy in Apparel Industry with Consumer Behavior Consideration

    OpenAIRE

    Liu Yang; Shaozeng Dong

    2017-01-01

    The article attempts to analyze sustainable product strategy in apparel industry specifically addressing a firm that is considering launching a sustainable product partly made from recycled materials. There are two types of consumers under consideration, environmentally conscious and regular consumers, as they have different perceived values for the sustainable products. The article provides an analytical model aimed to identify conditions under which a firm could benefit from adopting sustai...

  14. Exploratory study on the effect of discount pricing strategies for new product introduction

    Science.gov (United States)

    Mat Zaib, Nurul Afiqah; Bazin, Nor Erne Nazira; Mustaffa, Noorfa Haszlinna

    2013-04-01

    Rapid introduction of new product into the market has resulted in growing competition between retailers. Nowadays, retailers compete with one another in order to increase revenue and to maintain their position in the marketplace. This situation has forced the retailers to enhance their strategic management as well as creating competitive advantages. Generally, this situation can be observed in highly demanded product such as fashion goods and high technology electronic devices (smart phone, notebook). The consequence from the intense competition and new product introduction is difficulties in retailers pricing management. Retailers are now facing with complexity in making decisions on suitable pricing strategies and discount level for new product in association with the product life cycle. Thus, this research aims to investigate the suitable discount pricing strategies that can be integrated in every phase of product life cycle. This paper presents relationships between the discount pricing and the stages in the product life cycle in the form of conceptual diagram and mathematical expression. A system dynamic approach is used for developing the conceptual diagram and formulating the mathematical expression for the discount pricing strategies to visualize the relationship between discount pricing and product life cycle.

  15. COMPETITIVE STRATEGY OF A FOREIGN MULTINATIONAL IN BRAZILIAN POULTRY PRODUCTION

    Directory of Open Access Journals (Sweden)

    Denise Barros de Azevedo

    2012-05-01

    Full Text Available This paper addresses the question of the strategies involved in the import process of cages for laying hens, directed at the multinational enterprise distribution center. Identifies the reasons why a multinational company invests in Brazil, specifically in the city of Araraquara, São Paulo, where it is implementing a distribution center (DC. Developing the study of the strategies involved in the process, according to the main issue of the work, it took place through the exploratory analysis of the current logistics process of the Company, identifying the strategies adopted and the advantages of the new process. In order to achieve the objectives, the study is based on the theoretical study of Porter's five competitive forces, SWOT analysis, generic strategies adopted to achieve return on investment and, based on issues such as import , logistics, warehousing and distribution center. The survey shows that deployment of the DC, the strategy involves the insertion in the national market, specifically in São Paulo that is the biggest market of laying hens in the country to gain competitive advantage, and the multinational also adopts the strategy generic differentiation, with regard to technology and product quality. Despite the high costs of construction and maintenance of the DC, they represent a barrier to market entry, have no financial risk for the multinational enterprise, since this deployment will also increase the demand for the product, allowing the return on invested capital.

  16. Essays on Product Strategies through Consideration of Individual Distributions

    OpenAIRE

    Perry, Hagit

    2016-01-01

    Marketing literature and practitioners are in agreement that it is essential for brands in competitive markets to identify segments that should be targeted and to build rational product strategies that target these segments. It is essential because most markets include consumers with heterogeneous preferences and precise segmentation and targeting creates product differentiation, which prevents direct competition and allow the market to reach an optimal profit optimization equilibrium. In thi...

  17. Verification steps for the CMS event-builder software

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    The CMS event-builder software is used to assemble event fragments into complete events at 100 kHz. The data originates at the detector front-end electronics, passes through several computers and is transported from the underground to the high-level trigger farm on the surface. I will present the testing and verifications steps a new software version has to pass before it is deployed in production. I will discuss the current practice and possible improvements.

  18. The influence of business strategy on new product activity: the role of market orientation

    NARCIS (Netherlands)

    Frambach, R.T.; Prabhu, Jaideep; Verhallen, T.M.M.

    2003-01-01

    In this paper, we propose that business strategy influences new product activity both directly and indirectly via its influence on market orientation. Accordingly, we develop a framework linking firms' relative emphasis on cost leadership, product differentiation and focus strategies to firms'

  19. Innovative Strategic Leader Transforming From a Low-Cost Strategy to Product Differentiation Strategy

    Directory of Open Access Journals (Sweden)

    Ray R Gehani

    2013-05-01

    Full Text Available After the 2008 economic slowdown, and with increasing assault from enterprises from emerging economies, many innovative strategic leaders of multinational enterprises are forced to radically transform their enterprises. They often choose to change from low-cost strategy to innovation-driven product differentiation strategy. In this study, we use a multi-level Grounded Theory Methodology (GTM and agency theory to empirically illustrate such a strategic transformation at a large composite fabric and accessories enterprise. Lessons are drawn from the impact of strategic transformation at multiple levels: strategic leader level, tactical-team manager level, operational follower level, and stakeholder level. Implications for practitioners and researchers are provided by way of mindful leader orientation and value-based innovation.

  20. A system for deduction-based formal verification of workflow-oriented software models

    Directory of Open Access Journals (Sweden)

    Klimek Radosław

    2014-12-01

    Full Text Available The work concerns formal verification of workflow-oriented software models using the deductive approach. The formal correctness of a model’s behaviour is considered. Manually building logical specifications, which are regarded as a set of temporal logic formulas, seems to be a significant obstacle for an inexperienced user when applying the deductive approach. A system, along with its architecture, for deduction-based verification of workflow-oriented models is proposed. The process inference is based on the semantic tableaux method, which has some advantages when compared with traditional deduction strategies. The algorithm for automatic generation of logical specifications is proposed. The generation procedure is based on predefined workflow patterns for BPMN, which is a standard and dominant notation for the modeling of business processes. The main idea behind the approach is to consider patterns, defined in terms of temporal logic, as a kind of (logical primitives which enable the transformation of models to temporal logic formulas constituting a logical specification. Automation of the generation process is crucial for bridging the gap between the intuitiveness of deductive reasoning and the difficulty of its practical application when logical specifications are built manually. This approach has gone some way towards supporting, hopefully enhancing, our understanding of deduction-based formal verification of workflow-oriented models.

  1. Supply strategy configuration in fragmented production systems: An empirical study

    Directory of Open Access Journals (Sweden)

    Claudia Chackelson

    2013-07-01

    Full Text Available Purpose: Companies survive in saturated markets trying to be more productive and more efficient. In this context, it becomes critical for companies to manage the entire supply network to optimize overall performance.  Hence, the supply strategy plays an important role because it influences the way in which production and logistics network has to be configured and managed. This paper explores the benefits obtained configuring different supply strategies adapted to customer needs.Design/methodology/approach: For this purpose a case research from a Tier 2 point of view of the supply chain has been conducted. Findings and Originality/value: The case research demonstrates that a higher service level, less holding costs and increase turnovers can be obtained implementing the adequate supply strategy. Originality/value: There is a scarcity of research specifically focused on applied Supply Chain Principles within network configuration processes. Moreover, there are few empirical studies of global Tier 2 with multiple decoupling points into its supply chain network.

  2. Exploring optimal fertigation strategies for orange production, using soil-crop modelling

    NARCIS (Netherlands)

    Qin, Wei; Heinen, Marius; Assinck, Falentijn B.T.; Oenema, Oene

    2016-01-01

    Water and nitrogen (N) are two key limiting factors in orange (Citrus sinensis) production. The amount and the timing of water and N application are critical, but optimal strategies have not yet been well established. This study presents an analysis of 47 fertigation strategies examined by a

  3. Effect of Appropriate Marketing Mix Strategies on Iranian Protein Products Export Performance

    OpenAIRE

    Hossein Rezaie Dolatabadi; Mohammad Hossein Forghani; Seyed Mehdi Tabatabaee; Fatemeh Faghani

    2013-01-01

    The purpose of the present paper is to examine effect of effect of appropriate marketing mix strategies on Iranian protein products export performance. 4P (Price, Product, Place, Promotion) were selected as marketing strategies. The data used to test the hypotheses were collected through an online standard questionnaire. The respondents were asked to rate on the scale between strongly agree and strongly Disagree. Reliability of questionnaire was measured using Cronbach Coefficient Alpha. The ...

  4. Food and beverage product reformulation as a corporate political strategy.

    Science.gov (United States)

    Scott, C; Hawkins, B; Knai, C

    2017-01-01

    Product reformulation- the process of altering a food or beverage product's recipe or composition to improve the product's health profile - is a prominent response to the obesity and noncommunicable disease epidemics in the U.S. To date, reformulation in the U.S. has been largely voluntary and initiated by actors within the food and beverage industry. Similar voluntary efforts by the tobacco and alcohol industry have been considered to be a mechanism of corporate political strategy to shape public health policies and decisions to suit commercial needs. We propose a taxonomy of food and beverage industry corporate political strategies that builds on the existing literature. We then analyzed the industry's responses to a 2014 U.S. government consultation on product reformulation, run as part of the process to define the 2015 Dietary Guidelines for Americans. We qualitatively coded the industry's responses for predominant narratives and framings around reformulation using a purposely-designed coding framework, and compared the results to the taxonomy. The food and beverage industry in the United States used a highly similar narrative around voluntary product reformulation in their consultation responses: that reformulation is "part of the solution" to obesity and NCDs, even though their products or industry are not large contributors to the problem, and that progress has been made despite reformulation posing significant technical challenges. This narrative and the frames used in the submissions illustrate the four categories of the taxonomy: participation in the policy process, influencing the framing of the nutrition policy debate, creating partnerships, and influencing the interpretation of evidence. These strategic uses of reformulation align with previous research on food and beverage corporate political strategy. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. 49 CFR Appendix D to Part 236 - Independent Review of Verification and Validation

    Science.gov (United States)

    2010-10-01

    ... standards. (f) The reviewer shall analyze all Fault Tree Analyses (FTA), Failure Mode and Effects... for each product vulnerability cited by the reviewer; (4) Identification of any documentation or... not properly followed; (6) Identification of the software verification and validation procedures, as...

  6. VEG-01: Veggie Hardware Verification Testing

    Science.gov (United States)

    Massa, Gioia; Newsham, Gary; Hummerick, Mary; Morrow, Robert; Wheeler, Raymond

    2013-01-01

    The Veggie plant/vegetable production system is scheduled to fly on ISS at the end of2013. Since much of the technology associated with Veggie has not been previously tested in microgravity, a hardware validation flight was initiated. This test will allow data to be collected about Veggie hardware functionality on ISS, allow crew interactions to be vetted for future improvements, validate the ability of the hardware to grow and sustain plants, and collect data that will be helpful to future Veggie investigators as they develop their payloads. Additionally, food safety data on the lettuce plants grown will be collected to help support the development of a pathway for the crew to safely consume produce grown on orbit. Significant background research has been performed on the Veggie plant growth system, with early tests focusing on the development of the rooting pillow concept, and the selection of fertilizer, rooting medium and plant species. More recent testing has been conducted to integrate the pillow concept into the Veggie hardware and to ensure that adequate water is provided throughout the growth cycle. Seed sanitation protocols have been established for flight, and hardware sanitation between experiments has been studied. Methods for shipping and storage of rooting pillows and the development of crew procedures and crew training videos for plant activities on-orbit have been established. Science verification testing was conducted and lettuce plants were successfully grown in prototype Veggie hardware, microbial samples were taken, plant were harvested, frozen, stored and later analyzed for microbial growth, nutrients, and A TP levels. An additional verification test, prior to the final payload verification testing, is desired to demonstrate similar growth in the flight hardware and also to test a second set of pillows containing zinnia seeds. Issues with root mat water supply are being resolved, with final testing and flight scheduled for later in 2013.

  7. Design and production of activimeters verification sealed radioactive sources

    International Nuclear Information System (INIS)

    Serra, R.; Hernandez Rivero, A. T.; Oropesa, P.; Rapado, M.; Falcon, L.

    2006-01-01

    Measurement in a radionuclide calibrator (activimeter) of the doses to be administered to a patient for diagnosis or radiotherapeutic treatment is an essential element in Nuclear Medicine practice. To assure that patient will receive the optimal doses that guarantee the necessary quality of the image to be studied or optimum radiotherapeutic effect, the activity determination should fulfil established accuracy requirements. To this aim, the overall uncertainty in activity determination must not surpass a preestablished limit of about 10 % for the expanded uncertainty of the activity value (with a coverage factor k = 3). To have suitable equipment, periodically calibrated for specialized and authorized specialists and frequently verified in inter calibration periods to guarantee detection of any malfunctioning, are essential requirements to assure the compliance with the prescribed regulations and limiting values. This paper describes the design and production of two models of 137 Cs activimeters verification sealed radioactive sources elaborated with this aim at the Radionuclide Metrology Department of the Isotope Centre of Cuba. Taking into account the international experience in this field was defined 3 -10 MBq as convenient activity range, the 137 Cs as a suitable radionuclide, and a classification ISO/99/C22212 (ISO 2919:1999) for the sealed sources to be obtained. In designed and produced models the activity is bonded in a hydrogel copolymer obtained by gamma irradiation, in a 60 Co irradiator, of a mixture of a 137 Cs aqueous solution with an approximate activity of 5 MBq with two proper monomers (acrylamide and methacrylic acid). The density of obtained copolymer is similar to that of the radioactive solutions employed in nuclear medicine departments for diagnosis and therapy. The obtained sources have appropriate physical stability for a temperature range between 40 o C below zero and 80 o C, as well as for defined activity range. The stability of the

  8. Face Verification for Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.

    2009-01-01

    In this thesis, we presented a detailed study of the face verification problem on the mobile device, covering every component of the system. The study includes face detection, registration, normalization, and verification. Furthermore, the information fusion problem is studied to verify face

  9. Gender Verification of Female Olympic Athletes.

    Science.gov (United States)

    Dickinson, Barry D.; Genel, Myron; Robinowitz, Carolyn B.; Turner, Patricia L.; Woods, Gary L.

    2002-01-01

    Gender verification of female athletes has long been criticized by geneticists, endocrinologists, and others in the medical community. Recently, the International Olympic Committee's Athletic Commission called for discontinuation of mandatory laboratory-based gender verification of female athletes. This article discusses normal sexual…

  10. Radioactive demonstration of DWPF product control strategy

    International Nuclear Information System (INIS)

    Andrews, M.K.; Bibler, N.E.

    1992-01-01

    The effectiveness of the product and process control strategies that will be utilized by the Defense Waste Processing Facility (DWPF) was demonstrated during a campaign in the Shielded Cells Facility (SCF) of the Savannah River Technology Center (SRTC). The remotely operated process included the preparation of the melter feed, vitrification in a slurry-fed 1/100th scale melter and analysis of the glass product both for its composition and durability. The campaign processed approximately 10 kg (on a dry basis) of radioactive sludge from Tank 51. This sludge is representative of the first batch of sludge that will be sent to the DWPF for immobilization into borosilicate glass. Additions to the sludge were made based on calculations using the Product Composition Control System (PCCS). Analysis of the glass produced during the campaign showed that a durable glass was produced with a composition similar to that predicted using the PCCS

  11. Expert system verification and validation survey. Delivery 3: Recommendations

    Science.gov (United States)

    1990-01-01

    The purpose is to determine the state-of-the-practice in Verification and Validation (V and V) of Expert Systems (ESs) on current NASA and Industry applications. This is the first task of a series which has the ultimate purpose of ensuring that adequate ES V and V tools and techniques are available for Space Station Knowledge Based Systems development. The strategy for determining the state-of-the-practice is to check how well each of the known ES V and V issues are being addressed and to what extent they have impacted the development of ESs.

  12. MANAGING RISK BY COORDINATING INVESTMENT, MARKETING, AND PRODUCTION STRATEGIES

    OpenAIRE

    Johnson, Donald A.; Boehlje, Michael

    1983-01-01

    This study of the farm firm integrates long run investment and financial decisions, and short-run production and marketing decisions into a single decision framework that includes both time and risk. The results suggest that the use of various strategies for managing market risks allow the entrepreneur to accept mores risk in investing and producing; and that an integrated analysis of production, marketing and investment-financing alternatives is essential to make accurate recommendations abo...

  13. Pricing Policy and Strategies for Consumer High-Tech Products

    Directory of Open Access Journals (Sweden)

    Dovleac, L.

    2014-06-01

    Full Text Available This paper highlights the complex process of price setting for consumer high-tech products. These prices are highly influenced by some external factors from the economic and social environment. The main objective of this paper is to establish the most effective pricing policies and strategies used by high-tech companies of various sizes. Decisions about price fixing for consumer high-technology products are largely influenced by consumer behaviour, too.

  14. Responses of herbage and browse production to six range management strategies.

    Science.gov (United States)

    H. Reed Sanderson; Thomas M. Quigley; Arthur R. Tiedemann

    1990-01-01

    From 1977 through 1986, herbage and browse production was sampled on 619 sites representing 10 ecosystems and 51 resource units on the Oregon Range Evaluation study area. We determined the effects of six range management strategies and cultural treatments on combined herbage and browse production. Mean herbage and browse production on the forest ecosystems was 145...

  15. Office of River Protection Integrated Safety Management System Phase 1 Verification Corrective Action Plan; FINAL

    International Nuclear Information System (INIS)

    CLARK, D.L.

    1999-01-01

    The purpose of this Corrective Action Plan is to demonstrate the OW planned and/or completed actions to implement ISMS as well as prepare for the RPP ISMS Phase II Verification scheduled for August, 1999. This Plan collates implied or explicit ORP actions identified in several key ISMS documents and aligns those actions and responsibilities perceived necessary to appropriately disposition all ISM Phase II preparation activities specific to the ORP. The objective will be to complete or disposition the corrective actions prior to the commencement of the ISMS Phase II Verification. Improvement products/tasks not slated for completion prior to the RPP Phase II verification will be incorporated as corrective actions into the Strategic System Execution Plan (SSEP) Gap Analysis. Many of the business and management systems that were reviewed in the ISMS Phase I verification are being modified to support the ORP transition and are being assessed through the SSEP. The actions and processes identified in the SSEP will support the development of the ORP and continued ISMS implementation as committed to be complete by end of FY-2000

  16. Reactor physics verification of the MCNP6 unstructured mesh capability

    International Nuclear Information System (INIS)

    Burke, T. P.; Kiedrowski, B. C.; Martz, R. L.; Martin, W. R.

    2013-01-01

    The Monte Carlo software package MCNP6 has the ability to transport particles on unstructured meshes generated from the Computed-Aided Engineering software Abaqus. Verification is performed using benchmarks with features relevant to reactor physics - Big Ten and the C5G7 computational benchmark. Various meshing strategies are tested and results are compared to reference solutions. Computational performance results are also given. The conclusions show MCNP6 is capable of producing accurate calculations for reactor physics geometries and the computational requirements for small lattice benchmarks are reasonable on modern computing platforms. (authors)

  17. Reactor physics verification of the MCNP6 unstructured mesh capability

    Energy Technology Data Exchange (ETDEWEB)

    Burke, T. P. [Department of Nuclear Engineering and Radiological Sciences, University of Michigan, 2355 Bonisteel Boulevard, Ann Arbor, MI 48109 (United States); Kiedrowski, B. C.; Martz, R. L. [X-Computational Physics Division, Monte Carlo Codes Group, Los Alamos National Laboratory, P.O. Box 1663, Los Alamos, NM 87545 (United States); Martin, W. R. [Department of Nuclear Engineering and Radiological Sciences, University of Michigan, 2355 Bonisteel Boulevard, Ann Arbor, MI 48109 (United States)

    2013-07-01

    The Monte Carlo software package MCNP6 has the ability to transport particles on unstructured meshes generated from the Computed-Aided Engineering software Abaqus. Verification is performed using benchmarks with features relevant to reactor physics - Big Ten and the C5G7 computational benchmark. Various meshing strategies are tested and results are compared to reference solutions. Computational performance results are also given. The conclusions show MCNP6 is capable of producing accurate calculations for reactor physics geometries and the computational requirements for small lattice benchmarks are reasonable on modern computing platforms. (authors)

  18. Reload core safety verification

    International Nuclear Information System (INIS)

    Svetlik, M.; Minarcin, M.

    2003-01-01

    This paper presents a brief look at the process of reload core safety evaluation and verification in Slovak Republic. It gives an overview of experimental verification of selected nuclear parameters in the course of physics testing during reactor start-up. The comparison of IAEA recommendations and testing procedures at Slovak and European nuclear power plants of similar design is included. An introduction of two level criteria for evaluation of tests represents an effort to formulate the relation between safety evaluation and measured values (Authors)

  19. Environmental Sustainability Analysis and Nutritional Strategies of Animal Production in China.

    Science.gov (United States)

    Tan, Bie; Yin, Yulong

    2017-02-08

    Animal production in China has achieved considerable progress and contributes to 46% of the total agriculture output value of the country. However, this fast expansion of animal production has led to environmental pollution. In this article, we review the status of soil, water, and air pollution associated with animal production in China and analyze the main sources of the pollutants. The government has promulgated regulations and standards, and effective models and technologies have been developed to control pollution during the last 10 years. Because nutrition and feed strategies represent the most effective method of controlling environmental pollution at the source, this review focuses on nutritional technologies, including accurate feed formulation, rational use of additives, and proper processing of feeds. The advances of modern biotechnology and big data systems also provide more modern approaches to decreasing wastage release. These nutritional strategies are expected to promote sustainable development of animal production.

  20. Validation of Embedded System Verification Models

    NARCIS (Netherlands)

    Marincic, J.; Mader, Angelika H.; Wieringa, Roelf J.

    The result of a model-based requirements verification shows that the model of a system satisfies (or not) formalised system requirements. The verification result is correct only if the model represents the system adequately. No matter what modelling technique we use, what precedes the model

  1. On Verification Modelling of Embedded Systems

    NARCIS (Netherlands)

    Brinksma, Hendrik; Mader, Angelika H.

    Computer-aided verification of embedded systems hinges on the availability of good verification models of the systems at hand. Such models must be much simpler than full design models or specifications to be of practical value, because of the unavoidable combinatorial complexities in the

  2. Compositional verification of real-time systems using Ecdar

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel

    2012-01-01

    We present a specification theory for timed systems implemented in the Ecdar tool. We illustrate the operations of the specification theory on a running example, showing the models and verification checks. To demonstrate the power of the compositional verification, we perform an in depth case study...... of a leader election protocol; Modeling it in Ecdar as Timed input/output automata Specifications and performing both monolithic and compositional verification of two interesting properties on it. We compare the execution time of the compositional to the classical verification showing a huge difference...

  3. Food and beverage product reformulation as a corporate political strategy.

    OpenAIRE

    Scott, C; Hawkins, B; Knai, C

    2016-01-01

    : Product reformulation- the process of altering a food or beverage product's recipe or composition to improve the product's health profile - is a prominent response to the obesity and noncommunicable disease epidemics in the U.S. To date, reformulation in the U.S. has been largely voluntary and initiated by actors within the food and beverage industry. Similar voluntary efforts by the tobacco and alcohol industry have been considered to be a mechanism of corporate political strategy to shape...

  4. NbTi Strands Verification for ITER PF CICC Process Qualification of CNDA

    Science.gov (United States)

    Liu, F.; Liu, H.; Liu, S.; Liu, B.; Lei, L.; Wu, Y.

    2014-05-01

    China is in charge of most of Poloidal Field (PF) conductors production for the International Thermonuclear Experimental Reactor (ITER). The execution for PF conductors shall be in three main phases. According to ITER Procurement Arrangement (PA), the Domestic Agency (DA) shall be required to verify the room and low temperature acceptance tests carried out by the strand suppliers. As the reference laboratory of Chinese DA (CNDA), the superconducting strands test laboratory of Institute of Plasma Physics, Chinese Academy of Sciences (ASIPP) was undertaking the task of strands verification for ITER conductors. The verification test includes: diameter, Nickel plating thickness, copper-to-non-copper volume ratio, twist pitch direction and length, standard critical current (IC) and resistive transition index (n), residual resistance ration (RRR), and hysteresis loss. 48 NbTi strands with 7 billets were supplied for the PF Cable-In-Conduit Conductor (CICC) process qualification. In total, 54 samples were measured. The verification level for PF CICC process qualification was 100%. The test method, facility and results of each item are described in detail in this publication.

  5. A Model for Collaborative Runtime Verification

    NARCIS (Netherlands)

    Testerink, Bas; Bulling, Nils; Dastani, Mehdi

    2015-01-01

    Runtime verification concerns checking whether a system execution satisfies a given property. In this paper we propose a model for collaborative runtime verification where a network of local monitors collaborates in order to verify properties of the system. A local monitor has only a local view on

  6. Computational metabolic engineering strategies for growth-coupled biofuel production by Synechocystis

    Directory of Open Access Journals (Sweden)

    Kiyan Shabestary

    2016-12-01

    Full Text Available Chemical and fuel production by photosynthetic cyanobacteria is a promising technology but to date has not reached competitive rates and titers. Genome-scale metabolic modeling can reveal limitations in cyanobacteria metabolism and guide genetic engineering strategies to increase chemical production. Here, we used constraint-based modeling and optimization algorithms on a genome-scale model of Synechocystis PCC6803 to find ways to improve productivity of fermentative, fatty-acid, and terpene-derived fuels. OptGene and MOMA were used to find heuristics for knockout strategies that could increase biofuel productivity. OptKnock was used to find a set of knockouts that led to coupling between biofuel and growth. Our results show that high productivity of fermentation or reversed beta-oxidation derived alcohols such as 1-butanol requires elimination of NADH sinks, while terpenes and fatty-acid based fuels require creating imbalances in intracellular ATP and NADPH production and consumption. The FBA-predicted productivities of these fuels are at least 10-fold higher than those reported so far in the literature. We also discuss the physiological and practical feasibility of implementing these knockouts. This work gives insight into how cyanobacteria could be engineered to reach competitive biofuel productivities. Keywords: Cyanobacteria, Modeling, Flux balance analysis, Biofuel, MOMA, OptFlux, OptKnock

  7. HDM/PASCAL Verification System User's Manual

    Science.gov (United States)

    Hare, D.

    1983-01-01

    The HDM/Pascal verification system is a tool for proving the correctness of programs written in PASCAL and specified in the Hierarchical Development Methodology (HDM). This document assumes an understanding of PASCAL, HDM, program verification, and the STP system. The steps toward verification which this tool provides are parsing programs and specifications, checking the static semantics, and generating verification conditions. Some support functions are provided such as maintaining a data base, status management, and editing. The system runs under the TOPS-20 and TENEX operating systems and is written in INTERLISP. However, no knowledge is assumed of these operating systems or of INTERLISP. The system requires three executable files, HDMVCG, PARSE, and STP. Optionally, the editor EMACS should be on the system in order for the editor to work. The file HDMVCG is invoked to run the system. The files PARSE and STP are used as lower forks to perform the functions of parsing and proving.

  8. Self-verification and contextualized self-views.

    Science.gov (United States)

    Chen, Serena; English, Tammy; Peng, Kaiping

    2006-07-01

    Whereas most self-verification research has focused on people's desire to verify their global self-conceptions, the present studies examined self-verification with regard to contextualized selfviews-views of the self in particular situations and relationships. It was hypothesized that individuals whose core self-conceptions include contextualized self-views should seek to verify these self-views. In Study 1, the more individuals defined the self in dialectical terms, the more their judgments were biased in favor of verifying over nonverifying feedback about a negative, situation-specific self-view. In Study 2, consistent with research on gender differences in the importance of relationships to the self-concept, women but not men showed a similar bias toward feedback about a negative, relationship-specific self-view, a pattern not seen for global self-views. Together, the results support the notion that self-verification occurs for core self-conceptions, whatever form(s) they may take. Individual differences in self-verification and the nature of selfhood and authenticity are discussed.

  9. On the numerical verification of industrial codes

    International Nuclear Information System (INIS)

    Montan, Sethy Akpemado

    2013-01-01

    Numerical verification of industrial codes, such as those developed at EDF R and D, is required to estimate the precision and the quality of computed results, even more for code running in HPC environments where millions of instructions are performed each second. These programs usually use external libraries (MPI, BLACS, BLAS, LAPACK). In this context, it is required to have a tool as non intrusive as possible to avoid rewriting the original code. In this regard, the CADNA library, which implements the Discrete Stochastic Arithmetic, appears to be one of a promising approach for industrial applications. In the first part of this work, we are interested in an efficient implementation of the BLAS routine DGEMM (General Matrix Multiply) implementing Discrete Stochastic Arithmetic. The implementation of a basic algorithm for matrix product using stochastic types leads to an overhead greater than 1000 for a matrix of 1024 * 1024 compared to the standard version and commercial versions of xGEMM. Here, we detail different solutions to reduce this overhead and the results we have obtained. A new routine Dgemm- CADNA have been designed. This routine has allowed to reduce the overhead from 1100 to 35 compare to optimized BLAS implementations (GotoBLAS). Then, we focus on the numerical verification of Telemac-2D computed results. Performing a numerical validation with the CADNA library shows that more than 30% of the numerical instabilities occurring during an execution come from the dot product function. A more accurate implementation of the dot product with compensated algorithms is presented in this work. We show that implementing these kinds of algorithms, in order to improve the accuracy of computed results does not alter the code performance. (author)

  10. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SWINE WASTE ELECTRIC POWER AND HEAT PRODUCTION--MARTIN MACHINERY INTERNAL COMBUSTION ENGINE

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system designed by Martin Machinery was evaluated. This paper provides test result...

  11. Sustainable Product Strategy in Apparel Industry with Consumer Behavior Consideration

    Directory of Open Access Journals (Sweden)

    Liu Yang

    2017-05-01

    Full Text Available The article attempts to analyze sustainable product strategy in apparel industry specifically addressing a firm that is considering launching a sustainable product partly made from recycled materials. There are two types of consumers under consideration, environmentally conscious and regular consumers, as they have different perceived values for the sustainable products. The article provides an analytical model aimed to identify conditions under which a firm could benefit from adopting sustainable product strategy. The level of sustainability is determined by the trade-off between profitability and costs occurred and if more consumers value sustainable products, the firm will increase its sustainable level and get a higher profit. This is because of a combination effect of an increasing marginal profit and demand expansion. Moreover, the model has been further extended to address a situation where the firm could manage consumer segmentation. Depending on parameter settings, the firm may target different consumer segments and there is always a threshold of cost for managing consumer segments. When converting regular consumers to be environmentally conscious is not costly, the firm will convert all consumers to be environmentally conscious with great efforts; otherwise, the firm will convert part of consumers to be environmentally conscious.

  12. AN EXPLORATORY STUDY OF MANUFACTURING STRATEGY OF PACKAGING PRODUCT-MANUFACTURING COMPANIES IN INDIA

    Directory of Open Access Journals (Sweden)

    Pradip P. Patil

    2012-09-01

    Full Text Available This paper presents finding of a survey on manufacturing strategy implementation (MSI adopted by the Indian packaging product manufacturing companies (IPPMC. Though the companies differ in terms of prod uct types (shape, method, content and material of packaging, conversion system, sales volume and sophistication of machinery used, they share common purpose that are used for packaging the product s . With growth in demand for consumer products, packaging f orms basis of differentiating products from competitors. The survey shows emphasis on implementation of manufacturing strategy, key decision areas, identifies competitive priorities, order winners. To get insight, three companies are selected for detailed case studies.

  13. SU-E-T-762: Toward Volume-Based Independent Dose Verification as Secondary Check

    International Nuclear Information System (INIS)

    Tachibana, H; Tachibana, R

    2015-01-01

    Purpose: Lung SBRT plan has been shifted to volume prescription technique. However, point dose agreement is still verified using independent dose verification at the secondary check. The volume dose verification is more affected by inhomogeneous correction rather than point dose verification currently used as the check. A feasibility study for volume dose verification was conducted in lung SBRT plan. Methods: Six SBRT plans were collected in our institute. Two dose distributions with / without inhomogeneous correction were generated using Adaptive Convolve (AC) in Pinnacle3. Simple MU Analysis (SMU, Triangle Product, Ishikawa, JP) was used as the independent dose verification software program, in which a modified Clarkson-based algorithm was implemented and radiological path length was computed using CT images independently to the treatment planning system. The agreement in point dose and mean dose between the AC with / without the correction and the SMU were assessed. Results: In the point dose evaluation for the center of the GTV, the difference shows the systematic shift (4.5% ± 1.9 %) in comparison of the AC with the inhomogeneous correction, on the other hands, there was good agreement of 0.2 ± 0.9% between the SMU and the AC without the correction. In the volume evaluation, there were significant differences in mean dose for not only PTV (14.2 ± 5.1 %) but also GTV (8.0 ± 5.1 %) compared to the AC with the correction. Without the correction, the SMU showed good agreement for GTV (1.5 ± 0.9%) as well as PTV (0.9% ± 1.0%). Conclusion: The volume evaluation for secondary check may be possible in homogenous region. However, the volume including the inhomogeneous media would make larger discrepancy. Dose calculation algorithm for independent verification needs to be modified to take into account the inhomogeneous correction

  14. The role of off-line and online strategies for successful product positioning

    OpenAIRE

    Yaneva D. E.; Zlateva D. A.

    2015-01-01

    The study of the article is done on off-line and online strategies that companies use for their successful positioning. The goal is to establish the role and the significance of the strategies for successful product positioning in off-line and online environment.

  15. A Verification Logic for GOAL Agents

    Science.gov (United States)

    Hindriks, K. V.

    Although there has been a growing body of literature on verification of agents programs, it has been difficult to design a verification logic for agent programs that fully characterizes such programs and to connect agent programs to agent theory. The challenge is to define an agent programming language that defines a computational framework but also allows for a logical characterization useful for verification. The agent programming language GOAL has been originally designed to connect agent programming to agent theory and we present additional results here that GOAL agents can be fully represented by a logical theory. GOAL agents can thus be said to execute the corresponding logical theory.

  16. Secure optical verification using dual phase-only correlation

    International Nuclear Information System (INIS)

    Liu, Wei; Liu, Shutian; Zhang, Yan; Xie, Zhenwei; Liu, Zhengjun

    2015-01-01

    We introduce a security-enhanced optical verification system using dual phase-only correlation based on a novel correlation algorithm. By employing a nonlinear encoding, the inherent locks of the verification system are obtained in real-valued random distributions, and the identity keys assigned to authorized users are designed as pure phases. The verification process is implemented in two-step correlation, so only authorized identity keys can output the discriminate auto-correlation and cross-correlation signals that satisfy the reset threshold values. Compared with the traditional phase-only-correlation-based verification systems, a higher security level against counterfeiting and collisions are obtained, which is demonstrated by cryptanalysis using known attacks, such as the known-plaintext attack and the chosen-plaintext attack. Optical experiments as well as necessary numerical simulations are carried out to support the proposed verification method. (paper)

  17. TET-1- A German Microsatellite for Technology On -Orbit Verification

    Science.gov (United States)

    Föckersperger, S.; Lattner, K.; Kaiser, C.; Eckert, S.; Bärwald, W.; Ritzmann, S.; Mühlbauer, P.; Turk, M.; Willemsen, P.

    2008-08-01

    Due to the high safety standards in the space industry every new product must go through a verification process before qualifying for operation in a space system. Within the verification process the payload undergoes a series of tests which prove that it is in accordance with mission requirements in terms of function, reliability and safety. Important verification components are the qualification for use on the ground as well as the On-Orbit Verification (OOV), i.e. proof that the product is suitable for use under virtual space conditions (on-orbit). Here it is demonstrated that the product functions under conditions which cannot or can only be partially simulated on the ground. The OOV-Program of the DLR serves to bridge the gap between the product tested and qualified on the ground and the utilization of the product in space. Due to regular and short-term availability of flight opportunities industry and research facilities can verify their latest products under space conditions and demonstrate their reliability and marketability. The Technologie-Erprobungs-Tr&äger TET (Technology Experiments Carrier) comprises the core elements of the OOV Program. A programmatic requirement of the OOV Program is that a satellite bus already verified in orbit be used in the first segment of the program. An analysis of suitable satellite buses showed that a realization of the TET satellite bus based on the BIRD satellite bus fulfilled the programmatic requirements best. Kayser-Threde was selected by DLR as Prime Contractor to perform the project together with its major subcontractors Astro- und Feinwerktechnik, Berlin for the platform development and DLR-GSOC for the ground segment development. TET is now designed to be a modular and flexible micro-satellite for any orbit between 450 and 850 km altitude and inclination between 53° and SSO. With an overall mass of 120 kg TET is able to accommodate experiments of up to 50 kg. A multipurpose payload supply systemThere is

  18. Verification of DRAGON: the NXT tracking module

    International Nuclear Information System (INIS)

    Zkiek, A.; Marleau, G.

    2007-01-01

    The version of DRAGON-IST that has been verified for the calculation of the incremental cross sections associated with CANDU reactivity devices is version 3.04Bb that was released in 2001. Since then, various improvements were implemented in the code including the NXT: module that can track assemblies of clusters in 2-D and 3-D geometries. Here we will discuss the verification plan for the NXT: module of DRAGON, illustrate the verification procedure we selected and present our verification results. (author)

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SWINE WASTE ELECTRIC POWER AND HEAT PRODUCTION--CAPSTONE 30KW MICROTURBINE SYSTEM

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system was evaluated based on the Capstone 30kW Microturbine developed by Cain Ind...

  20. Technical challenges for dismantlement verification

    International Nuclear Information System (INIS)

    Olinger, C.T.; Stanbro, W.D.; Johnston, R.G.; Nakhleh, C.W.; Dreicer, J.S.

    1997-01-01

    In preparation for future nuclear arms reduction treaties, including any potential successor treaties to START I and II, the authors have been examining possible methods for bilateral warhead dismantlement verification. Warhead dismantlement verification raises significant challenges in the political, legal, and technical arenas. This discussion will focus on the technical issues raised by warhead arms controls. Technical complications arise from several sources. These will be discussed under the headings of warhead authentication, chain-of-custody, dismantlement verification, non-nuclear component tracking, component monitoring, and irreversibility. The authors will discuss possible technical options to address these challenges as applied to a generic dismantlement and disposition process, in the process identifying limitations and vulnerabilities. They expect that these considerations will play a large role in any future arms reduction effort and, therefore, should be addressed in a timely fashion

  1. Safety Verification for Probabilistic Hybrid Systems

    DEFF Research Database (Denmark)

    Zhang, Lijun; She, Zhikun; Ratschan, Stefan

    2010-01-01

    The interplay of random phenomena and continuous real-time control deserves increased attention for instance in wireless sensing and control applications. Safety verification for such systems thus needs to consider probabilistic variations of systems with hybrid dynamics. In safety verification o...... on a number of case studies, tackled using a prototypical implementation....

  2. 9 CFR 381.94 - Contamination with Microorganisms; process control verification criteria and testing; pathogen...

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Contamination with Microorganisms... § 381.94 Contamination with Microorganisms; process control verification criteria and testing; pathogen... maintaining process controls sufficient to prevent fecal contamination. FSIS shall take further action as...

  3. The Effects of Advertising Strategies on Consumer Trust: A Case of Skin Care Products in Taiwan

    OpenAIRE

    Velly Anatasia; Sunitarya Sunitarya; Vinda Adriana

    2016-01-01

    The main aim of this study was to develop advertising strategies in order to increase consumer trust. Four advertising elements, celebrity endorsement, branding, product attribute, and third party certification, were investigated in this study. Data were collected to answer two research questions: (1) To investigate the advertising strategies of skin care products leading to consumer trust, (2) To know the effects of advertising strategies in skin care products on consumer trust. A 5-point Li...

  4. SSN Verification Service

    Data.gov (United States)

    Social Security Administration — The SSN Verification Service is used by Java applications to execute the GUVERF02 service using the WebSphere/CICS Interface. It accepts several input data fields...

  5. Enhanced Verification Test Suite for Physics Simulation Codes

    Energy Technology Data Exchange (ETDEWEB)

    Kamm, J R; Brock, J S; Brandon, S T; Cotrell, D L; Johnson, B; Knupp, P; Rider, W; Trucano, T; Weirs, V G

    2008-10-10

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations. The key points of this document are: (1) Verification deals with mathematical correctness of the numerical algorithms in a code, while validation deals with physical correctness of a simulation in a regime of interest. This document is about verification. (2) The current seven-problem Tri-Laboratory Verification Test Suite, which has been used for approximately five years at the DOE WP laboratories, is limited. (3) Both the methodology for and technology used in verification analysis have evolved and been improved since the original test suite was proposed. (4) The proposed test problems are in three basic areas: (a) Hydrodynamics; (b) Transport processes; and (c) Dynamic strength-of-materials. (5) For several of the proposed problems we provide a 'strong sense verification benchmark', consisting of (i) a clear mathematical statement of the problem with sufficient information to run a computer simulation, (ii) an explanation of how the code result and benchmark solution are to be evaluated, and (iii) a description of the acceptance criterion for simulation code results. (6) It is proposed that the set of verification test problems with which any particular code be evaluated include some of the problems described in this document. Analysis of the proposed verification test problems constitutes part of a necessary--but not sufficient--step that builds confidence in physics and engineering simulation codes. More complicated test cases, including physics models of

  6. Verification of tritium production evaluation procedure using Monte Carlo code MCNP for in-pile test of fusion blanket with JMTR

    International Nuclear Information System (INIS)

    Nagao, Y.; Nakamichi, K.; Tsuchiya, M.; Ishitsuka, E.; Kawamura, H.

    2000-01-01

    To evaluate exactly the total amount of tritium production in tritium breeding materials during in-pile test with JMTR, the 'tritium monitor' has been produced and evaluation of total tritium generation was done by using 'tritium monitor' in preliminary in-pile mock-up, and verification of procedure concerning tritium production evaluation was conducted by using Monte Carlo code MCNP and nuclear cross section library of FSXLIBJ3R2. Li-Al alloy (Li 3.4 wt.%, 95.5% enrichment of 6 Li) was selected as tritium monitor material for the evaluation on the total amount of tritium production in high 6 Li enriched materials. From the results of preliminary experiment, calculated amounts of total tritium production at each 'tritium monitor', which was installed in the preliminary in-pile mock-up, were about 50-290% higher than the measured values. Concerning tritium measurement, increase of measurement error in tritium leak form measuring system to measure small amount of tritium (0.2-0.7 mCi in tritium monitor) was found in the results of present experiment. The tendency for overestimation of calculated thermal neutron flux in the range of 1-6x10 13 n cm -2 per s was found in JMTR and the reason may be due to the beryllium cross section data base in JENDL3.2

  7. Verification of tritium production evaluation procedure using Monte Carlo code MCNP for in-pile test of fusion blanket with JMTR

    Energy Technology Data Exchange (ETDEWEB)

    Nagao, Y. E-mail: nagao@jmtr.oarai.jaeri.go.jp; Nakamichi, K.; Tsuchiya, M.; Ishitsuka, E.; Kawamura, H

    2000-11-01

    To evaluate exactly the total amount of tritium production in tritium breeding materials during in-pile test with JMTR, the 'tritium monitor' has been produced and evaluation of total tritium generation was done by using 'tritium monitor' in preliminary in-pile mock-up, and verification of procedure concerning tritium production evaluation was conducted by using Monte Carlo code MCNP and nuclear cross section library of FSXLIBJ3R2. Li-Al alloy (Li 3.4 wt.%, 95.5% enrichment of {sup 6}Li) was selected as tritium monitor material for the evaluation on the total amount of tritium production in high {sup 6}Li enriched materials. From the results of preliminary experiment, calculated amounts of total tritium production at each 'tritium monitor', which was installed in the preliminary in-pile mock-up, were about 50-290% higher than the measured values. Concerning tritium measurement, increase of measurement error in tritium leak form measuring system to measure small amount of tritium (0.2-0.7 mCi in tritium monitor) was found in the results of present experiment. The tendency for overestimation of calculated thermal neutron flux in the range of 1-6x10{sup 13} n cm{sup -2} per s was found in JMTR and the reason may be due to the beryllium cross section data base in JENDL3.2.

  8. Lessons Learned From Microkernel Verification — Specification is the New Bottleneck

    Directory of Open Access Journals (Sweden)

    Thorsten Bormer

    2012-11-01

    Full Text Available Software verification tools have become a lot more powerful in recent years. Even verification of large, complex systems is feasible, as demonstrated in the L4.verified and Verisoft XT projects. Still, functional verification of large software systems is rare – for reasons beyond the large scale of verification effort needed due to the size alone. In this paper we report on lessons learned for verification of large software systems based on the experience gained in microkernel verification in the Verisoft XT project. We discuss a number of issues that impede widespread introduction of formal verification in the software life-cycle process.

  9. Advancing Disarmament Verification Tools: A Task for Europe?

    International Nuclear Information System (INIS)

    Göttsche, Malte; Kütt, Moritz; Neuneck, Götz; Niemeyer, Irmgard

    2015-01-01

    A number of scientific-technical activities have been carried out to establish more robust and irreversible disarmament verification schemes. Regardless of the actual path towards deeper reductions in nuclear arsenals or their total elimination in the future, disarmament verification will require new verification procedures and techniques. This paper discusses the information that would be required as a basis for building confidence in disarmament, how it could be principally verified and the role Europe could play. Various ongoing activities are presented that could be brought together to produce a more intensified research and development environment in Europe. The paper argues that if ‘effective multilateralism’ is the main goal of the European Union’s (EU) disarmament policy, EU efforts should be combined and strengthened to create a coordinated multilateral disarmament verification capacity in the EU and other European countries. The paper concludes with several recommendations that would have a significant impact on future developments. Among other things, the paper proposes a one-year review process that should include all relevant European actors. In the long run, an EU Centre for Disarmament Verification could be envisaged to optimize verification needs, technologies and procedures.

  10. The verification of DRAGON: progress and lessons learned

    International Nuclear Information System (INIS)

    Marleau, G.

    2002-01-01

    The general requirements for the verification of the legacy code DRAGON are somewhat different from those used for new codes. For example, the absence of a design manual for DRAGON makes it difficult to confirm that the each part of the code performs as required since these requirements are not explicitly spelled out for most of the DRAGON modules. In fact, this conformance of the code can only be assessed, in most cases, by making sure that the contents of the DRAGON data structures, which correspond to the output generated by a module of the code, contains the adequate information. It is also possible in some cases to use the self-verification options in DRAGON to perform additional verification or to evaluate, using an independent software, the performance of specific functions in the code. Here, we will describe the global verification process that was considered in order to bring DRAGON to an industry standard tool-set (IST) status. We will also discuss some of the lessons we learned in performing this verification and present some of the modification to DRAGON that were implemented as a consequence of this verification. (author)

  11. Simulation Environment Based on the Universal Verification Methodology

    CERN Document Server

    AUTHOR|(SzGeCERN)697338

    2017-01-01

    Universal Verification Methodology (UVM) is a standardized approach of verifying integrated circuit designs, targeting a Coverage-Driven Verification (CDV). It combines automatic test generation, self-checking testbenches, and coverage metrics to indicate progress in the design verification. The flow of the CDV differs from the traditional directed-testing approach. With the CDV, a testbench developer, by setting the verification goals, starts with an structured plan. Those goals are targeted further by a developed testbench, which generates legal stimuli and sends them to a device under test (DUT). The progress is measured by coverage monitors added to the simulation environment. In this way, the non-exercised functionality can be identified. Moreover, the additional scoreboards indicate undesired DUT behaviour. Such verification environments were developed for three recent ASIC and FPGA projects which have successfully implemented the new work-flow: (1) the CLICpix2 65 nm CMOS hybrid pixel readout ASIC desi...

  12. IDENTIFYING PRODUCT AND PRICE STRATEGIES FOR DESIGNING TRANSACTIONAL BANKING PACKAGES ADDRESSED TO SMES (CONSIDERATIONS

    Directory of Open Access Journals (Sweden)

    Giuca Simona-Mihaela

    2014-07-01

    Full Text Available The current paper has the aim to provide guidelines for designing efficient product and price strategies, through proposed business cases which could be used especially for banking products addressed to SMEs. While identifying the optimal product and price strategy and designing the product catalogue structure, the marketing specialist should definitely consider existing portfolio behaviour and estimate the growing potential (if possible, overall portfolio, with focus on accurately defining the additional impact of the newly proposed product/ products. A business case contains estimations for results to be generated by products to be launched or optimized. This paper presents complex schemes for business case scenarios for migration of existing portfolio to the new products, but also considers new clients acquisition based on important features of the products. The pricing strategy is not a simple task to manage. Especially when speaking about transactional packages (for which the price is lower than separate services included, some segments or clusters may generate loss to the bank if they already used the services at a higher price than the one of the package. Therefore, the decision of setting up specific prices needs to be based on an accurate and complex analysis, as presented in current paper. The assumptions used in a business case need to be relevant for the entire process of designing and launching a product, therefore they can always be adjusted for better calculation of the impact. No matter if the assumptions and prices remain as in the initial proposal or not, the steps to be followed are the same. Segmentation also plays an important role in designing the product strategy, since the target for a product or product catalogue can be represented by a segment, a sub segment or a cluster of many segments. Not always the initial segmentation represents the clustering for the product strategy. Sometimes, behaviour of existing clients

  13. Accelerating functional verification of an integrated circuit

    Science.gov (United States)

    Deindl, Michael; Ruedinger, Jeffrey Joseph; Zoellin, Christian G.

    2015-10-27

    Illustrative embodiments include a method, system, and computer program product for accelerating functional verification in simulation testing of an integrated circuit (IC). Using a processor and a memory, a serial operation is replaced with a direct register access operation, wherein the serial operation is configured to perform bit shifting operation using a register in a simulation of the IC. The serial operation is blocked from manipulating the register in the simulation of the IC. Using the register in the simulation of the IC, the direct register access operation is performed in place of the serial operation.

  14. A lignocellulosic ethanol strategy via nonenzymatic sugar production: process synthesis and analysis.

    Science.gov (United States)

    Han, Jeehoon; Luterbacher, Jeremy S; Alonso, David Martin; Dumesic, James A; Maravelias, Christos T

    2015-04-01

    The work develops a strategy for the production of ethanol from lignocellulosic biomass. In this strategy, the cellulose and hemicellulose fractions are simultaneously converted to sugars using a γ-valerolactone (GVL) solvent containing a dilute acid catalyst. To effectively recover GVL for reuse as solvent and biomass-derived lignin for heat and power generation, separation subsystems, including a novel CO2-based extraction for the separation of sugars from GVL, lignin and humins have been designed. The sugars are co-fermented by yeast to produce ethanol. Furthermore, heat integration to reduce utility requirements is performed. It is shown that this strategy leads to high ethanol yields and the total energy requirements could be satisfied by burning the lignin. The integrated strategy using corn stover feedstock leads to a minimum selling price of $5 per gallon of gasoline equivalent, which suggests that it is a promising alternative to current biofuels production approaches. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Self-verification motives at the collective level of self-definition.

    Science.gov (United States)

    Chen, Serena; Chen, Karen Y; Shaw, Lindsay

    2004-01-01

    Three studies examined self-verification motives in relation to collective aspects of the self. Several moderators of collective self-verification were also examined--namely, the certainty with which collective self-views are held, the nature of one's ties to a source of self-verification, the salience of the collective self, and the importance of group identification. Evidence for collective self-verification emerged across all studies, particularly when collective self-views were held with high certainty (Studies 1 and 2), perceivers were somehow tied to the source of self-verification (Study 1), the collective self was salient (Study 2), and group identification was important (Study 3). To the authors' knowledge, these studies are the first to examine self-verification at the collective level of self-definition. The parallel and distinct ways in which self-verification processes may operate at different levels of self-definition are discussed.

  16. 24 CFR 5.512 - Verification of eligible immigration status.

    Science.gov (United States)

    2010-04-01

    ... immigration status. 5.512 Section 5.512 Housing and Urban Development Office of the Secretary, Department of... Noncitizens § 5.512 Verification of eligible immigration status. (a) General. Except as described in paragraph...) Primary verification—(1) Automated verification system. Primary verification of the immigration status of...

  17. Verification of RADTRAN

    International Nuclear Information System (INIS)

    Kanipe, F.L.; Neuhauser, K.S.

    1995-01-01

    This document presents details of the verification process of the RADTRAN computer code which was established for the calculation of risk estimates for radioactive materials transportation by highway, rail, air, and waterborne modes

  18. Model-Based Nutrient Feeding Strategies for the Increased Production of Polyhydroxybutyrate (PHB) by Alcaligenes latus.

    Science.gov (United States)

    Gahlawat, Geeta; Srivastava, Ashok K

    2017-10-01

    Polyhydroxyalkanoates (PHAs) are biodegradable polymers which are considered as an effective alternative for conventional plastics due to their mechanical properties similar to the latter. However, the widespread use of these polymers is still hampered due to their higher cost of production as compared to plastics. The production cost could be overcome by obtaining high yields and productivity. The goal of the present research was to enhance the yield of polyhydroxybutyrate (PHB) with the help of two simple fed-batch cultivation strategies. In the present study, average batch kinetic and substrate limitation/inhibition study data of Alcaligenes latus was used for the development of PHB model which was then adopted for designing various off-line nutrient feeding strategies to enhance PHB accumulation. The predictive ability of the model was validated by experimental implementation of two fed-batch strategies. One such dynamic strategy of fed-batch cultivation under pseudo-steady state with respect to nitrogen and simultaneous carbon feeding strategy resulted in significantly high biomass and PHB concentration of 39.17 g/L and 29.64 g/L, respectively. This feeding strategy demonstrated a high PHB productivity and PHB content of 0.6 g/L h and 75%, respectively, which were remarkably high in comparison to batch cultivation. The mathematical model can also be employed for designing various other nutrient feeding strategies.

  19. Modeling and Analysis of the Obstacle-Avoidance Strategies for a Mobile Robot in a Dynamic Environment

    Directory of Open Access Journals (Sweden)

    Rui Wang

    2015-01-01

    Full Text Available Obstacle avoidance is a key performance of mobile robots. However, its experimental verification is rather difficult, due to the probabilistic behaviors of both the robots and the obstacles. This paper presents the Markov Decision Process based probabilistic formal models for three obstacle-avoidance strategies of a mobile robot in an uncertain dynamic environment. The models are employed to make analyses in PRISM, and the correctness of the analysis results is verified by MATLAB simulations. Finally, the minimum time and the energy consumption are determined by further analyses in PRISM, which prove to be useful in finding the optimal strategy. The present work provides a foundation for the probabilistic formal verification of more complicated obstacle-avoidance strategies.

  20. Environmental assessment of different strategies for production of stabilized yeast

    OpenAIRE

    Monclus, Vincent; Pénicaud, Caroline; Perret, Bruno; Fonseca, Fernanda

    2016-01-01

    Yeast are widely used for producing fermented (bread, beer...) and health benefit (probiotics) products. The production of stable and active yeast involves fermentation, concentration, protection, drying (stabilization) and storage. During the stabilization and storage steps, the cells face numerous stress which may deteriorate functional properties and cause cell death. Different strategies can be used to preserve cell survival, such as changing growth medium for fermentation or adapting pro...

  1. The monitoring and verification of nuclear weapons

    International Nuclear Information System (INIS)

    Garwin, Richard L.

    2014-01-01

    This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers

  2. DarcyTools, Version 2.1. Verification and validation

    International Nuclear Information System (INIS)

    Svensson, Urban

    2004-03-01

    DarcyTools is a computer code for simulation of flow and transport in porous and/or fractured media. The fractured media in mind is a fractured rock and the porous media the soil cover on the top of the rock; it is hence groundwater flows, which is the class of flows in mind. A number of novel methods and features form the present version of DarcyTools. In the verification studies, these methods are evaluated by comparisons with analytical solutions for idealized situations. The five verification groups, thus reflect the main areas of recent developments. The present report will focus on the Verification and Validation of DarcyTools. Two accompanying reports cover other aspects: - Concepts, Methods, Equations and Demo Simulations. - User's Guide. The objective of this report is to compile all verification and validation studies that have been carried out so far. After some brief introductory sections, all cases will be reported in Appendix A (verification cases) and Appendix B (validation cases)

  3. Verification and quality control of routine hematology analyzers.

    Science.gov (United States)

    Vis, J Y; Huisman, A

    2016-05-01

    Verification of hematology analyzers (automated blood cell counters) is mandatory before new hematology analyzers may be used in routine clinical care. The verification process consists of several items which comprise among others: precision, accuracy, comparability, carryover, background and linearity throughout the expected range of results. Yet, which standard should be met or which verification limit be used is at the discretion of the laboratory specialist. This paper offers practical guidance on verification and quality control of automated hematology analyzers and provides an expert opinion on the performance standard that should be met by the contemporary generation of hematology analyzers. Therefore (i) the state-of-the-art performance of hematology analyzers for complete blood count parameters is summarized, (ii) considerations, challenges, and pitfalls concerning the development of a verification plan are discussed, (iii) guidance is given regarding the establishment of reference intervals, and (iv) different methods on quality control of hematology analyzers are reviewed. © 2016 John Wiley & Sons Ltd.

  4. DarcyTools, Version 2.1. Verification and validation

    Energy Technology Data Exchange (ETDEWEB)

    Svensson, Urban [Computer-aided Fluid Engineering AB, Norrkoeping (Sweden)

    2004-03-01

    DarcyTools is a computer code for simulation of flow and transport in porous and/or fractured media. The fractured media in mind is a fractured rock and the porous media the soil cover on the top of the rock; it is hence groundwater flows, which is the class of flows in mind. A number of novel methods and features form the present version of DarcyTools. In the verification studies, these methods are evaluated by comparisons with analytical solutions for idealized situations. The five verification groups, thus reflect the main areas of recent developments. The present report will focus on the Verification and Validation of DarcyTools. Two accompanying reports cover other aspects: - Concepts, Methods, Equations and Demo Simulations. - User's Guide. The objective of this report is to compile all verification and validation studies that have been carried out so far. After some brief introductory sections, all cases will be reported in Appendix A (verification cases) and Appendix B (validation cases)

  5. Verification-Based Interval-Passing Algorithm for Compressed Sensing

    OpenAIRE

    Wu, Xiaofu; Yang, Zhen

    2013-01-01

    We propose a verification-based Interval-Passing (IP) algorithm for iteratively reconstruction of nonnegative sparse signals using parity check matrices of low-density parity check (LDPC) codes as measurement matrices. The proposed algorithm can be considered as an improved IP algorithm by further incorporation of the mechanism of verification algorithm. It is proved that the proposed algorithm performs always better than either the IP algorithm or the verification algorithm. Simulation resul...

  6. Multi-canister overpack project - verification and validation, MCNP 4A

    International Nuclear Information System (INIS)

    Goldmann, L.H.

    1997-01-01

    This supporting document contains the software verification and validation (V and V) package used for Phase 2 design of the Spent Nuclear Fuel Multi-Canister Overpack. V and V packages for both ANSYS and MCNP are included. Description of Verification Run(s): This software requires that it be compiled specifically for the machine it is to be used on. Therefore to facilitate ease in the verification process the software automatically runs 25 sample problems to ensure proper installation and compilation. Once the runs are completed the software checks for verification by performing a file comparison on the new output file and the old output file. Any differences between any of the files will cause a verification error. Due to the manner in which the verification is completed a verification error does not necessarily indicate a problem. This indicates that a closer look at the output files is needed to determine the cause of the error

  7. Strategy for cleaner production in microbrewery

    International Nuclear Information System (INIS)

    Yang, Y.-G.; Li, W.-M.

    2002-01-01

    'Full text:' There are over 600 breweries in China with nearly the same production processes. Many of them are microbrewery with the capacity of less than 1 million barrels a year. Breweries are characterized by high resource consumption and discharge of large volumes of wastewater, gas emission and solid waste, such as spent grains, coal residue and broken bottles. Long-shi Brewery Inc. is a microbrewery located on the countryside, 200 km east of Beijing, and it is the main sources of pollution in the local community. Wastewater is one of the most important parts of water pollution. In order to reduce pollution and increase economic benefit, several strategies have been taken at the distillery to reduce pollution. For example, some of the cooling water was recycled; coal slag was used to produce bricks or road filling; waste gases were purified before emission; and some of the CO2 produced from fermentation were recycled to produce liquid CO2. More works will be carried out to treat the wastewater from washing operation. After all these strategies, the environmental and economic situation of the company will be greatly improved. (author)

  8. Strategy for cleaner production in microbrewery

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Y.-G.; Li, W.-M. [Qinhuangdao Long-shi Brewery Inc. (China)

    2002-06-15

    'Full text:' There are over 600 breweries in China with nearly the same production processes. Many of them are microbrewery with the capacity of less than 1 million barrels a year. Breweries are characterized by high resource consumption and discharge of large volumes of wastewater, gas emission and solid waste, such as spent grains, coal residue and broken bottles. Long-shi Brewery Inc. is a microbrewery located on the countryside, 200 km east of Beijing, and it is the main sources of pollution in the local community. Wastewater is one of the most important parts of water pollution. In order to reduce pollution and increase economic benefit, several strategies have been taken at the distillery to reduce pollution. For example, some of the cooling water was recycled; coal slag was used to produce bricks or road filling; waste gases were purified before emission; and some of the CO2 produced from fermentation were recycled to produce liquid CO2. More works will be carried out to treat the wastewater from washing operation. After all these strategies, the environmental and economic situation of the company will be greatly improved. (author)

  9. Verification of MCNP6.2 for Nuclear Criticality Safety Applications

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Forrest B. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rising, Michael Evan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Alwin, Jennifer Louise [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-10

    Several suites of verification/validation benchmark problems were run in early 2017 to verify that the new production release of MCNP6.2 performs correctly for nuclear criticality safety applications (NCS). MCNP6.2 results for several NCS validation suites were compared to the results from MCNP6.1 [1] and MCNP6.1.1 [2]. MCNP6.1 is the production version of MCNP® released in 2013, and MCNP6.1.1 is the update released in 2014. MCNP6.2 includes all of the standard features for NCS calculations that have been available for the past 15 years, along with new features for sensitivity-uncertainty based methods for NCS validation [3]. Results from the benchmark suites were compared with results from previous verification testing [4-8]. Criticality safety analysts should consider testing MCNP6.2 on their particular problems and validation suites. No further development of MCNP5 is planned. MCNP6.1 is now 4 years old, and MCNP6.1.1 is now 3 years old. In general, released versions of MCNP are supported only for about 5 years, due to resource limitations. All future MCNP improvements, bug fixes, user support, and new capabilities are targeted only to MCNP6.2 and beyond.

  10. Knowledge-based verification of clinical guidelines by detection of anomalies.

    Science.gov (United States)

    Duftschmid, G; Miksch, S

    2001-04-01

    As shown in numerous studies, a significant part of published clinical guidelines is tainted with different types of semantical errors that interfere with their practical application. The adaptation of generic guidelines, necessitated by circumstances such as resource limitations within the applying organization or unexpected events arising in the course of patient care, further promotes the introduction of defects. Still, most current approaches for the automation of clinical guidelines are lacking mechanisms, which check the overall correctness of their output. In the domain of software engineering in general and in the domain of knowledge-based systems (KBS) in particular, a common strategy to examine a system for potential defects consists in its verification. The focus of this work is to present an approach, which helps to ensure the semantical correctness of clinical guidelines in a three-step process. We use a particular guideline specification language called Asbru to demonstrate our verification mechanism. A scenario-based evaluation of our method is provided based on a guideline for the artificial ventilation of newborn infants. The described approach is kept sufficiently general in order to allow its application to several other guideline representation formats.

  11. Key Nuclear Verification Priorities: Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  12. Key Nuclear Verification Priorities - Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  13. IMPACT OF MARKETING STRATEGIES ON SACHET PRODUCTS IN BANGLADESH

    Directory of Open Access Journals (Sweden)

    Hossain Shahid SHOHROWARDHY

    2015-06-01

    Full Text Available A product is anything that can be accessible to the market for satisfaction. The basic objective of marketing is maximum satisfaction since satisfaction of consumer and business performance is positively related to each other. For satisfaction, product is diversified in different categories i.e. generic product, product type product, substitute product and product line etc. Sachet product is one of the expansions of product line. The term ‘Sachet’ is originated from the French word which means “mini”. In Bangladesh, sachet product has a strong market share. Thus, this study attempts to determine the exiting share of sachet product and measure the impact of marketing strategies on sachet product in Bangladesh. This study uses the selective 22 dimensions to favor the sachet product on the basis of 4Ps (Product, Price, Place and Promotion. To accomplish the study, 125 samples have been taken from selective markets in Cosmopolitan city, Chittagong. The study found that sachet product has strong market position comparative with other categories of products, where promotional effect is the dominant factor who played the vital role to sustain the sachet product in Bangladesh. The results of this study will be constructive for executives and policy-makers of business organization who works with fast moving consumer good (FMCG items effectively in Bangladesh.

  14. THE INFLUENCE OF A MATHEMATICAL MODEL IN PRODUCTION STRATEGY: CONCEPTUAL DEVELOPMENT AND EMPIRICAL TEST

    Directory of Open Access Journals (Sweden)

    Paulo Cesar Chagas Rodrigues

    2012-07-01

    Full Text Available Acquire and produce what is strictly necessary are the goals of the organizations, since they aim companies more competitive and thereby reducing production costs. The research method is applied in nature, with a qualitative and quantitative approach, in which the objective of the research will be: exploratory and descriptive, with technical procedures, divided into: bibliographic, documentary, survey and concluding with a case study. On this assumption the main objective of this research is to develop and analyze a mathematical model that minimizes costs and maximizes the postponement of stocks in a company in the pulp, paper and paper products. Having been found only four papers, two articles and two theses that deal with the issue of demand management, supply chain and inventory postponement. These studies address the issue by modeling the productive time of the supply chain. For production segments this research may enable development of management practices demand and production strategy, allowing cost reductions and productivity gains possible. With the development of the mathematical model could ever analyze the behavior of demand and its influence on the productive strategy, strategy formulation regarding the purchase of raw materials and finished product storage in the last four years the company's results for the proposed model.

  15. Why Leading Consumer Product Companies Develop Proactive Chemical Management Strategies

    Science.gov (United States)

    Scruggs, Caroline E.; Van Buren, Harry J.

    2014-01-01

    Scholars have studied the various pressures that companies face related to socially responsible behavior when stakeholders know the particular social issues under consideration. Many have examined social responsibility in the context of environmental responsibility and the general approaches companies take regarding environmental management. The issue of currently unregulated, but potentially hazardous, chemicals in consumer products is not well understood by the general public, but a number of proactive consumer product companies have voluntarily adopted strategies to minimize use of such chemicals. These companies are exceeding regulatory requirements by restricting from their products chemicals that could harm human or environmental health, despite the fact that these actions are costly. They do not usually advertise the details of their strategies to end consumers. This article uses interviews with senior environmental directors of 20 multinational consumer product companies to investigate why these companies engage in voluntary chemicals management. The authors conclude that the most significant reasons are to achieve a competitive advantage and stay ahead of regulations, manage relationships and maintain legitimacy with stakeholders, and put managerial values into practice. Many of the characteristics related to the case of chemicals management are extendable to other areas of stakeholder management in which risks to stakeholders are either unknown or poorly understood. PMID:27471326

  16. Why Leading Consumer Product Companies Develop Proactive Chemical Management Strategies.

    Science.gov (United States)

    Scruggs, Caroline E; Van Buren, Harry J

    2016-05-01

    Scholars have studied the various pressures that companies face related to socially responsible behavior when stakeholders know the particular social issues under consideration. Many have examined social responsibility in the context of environmental responsibility and the general approaches companies take regarding environmental management. The issue of currently unregulated, but potentially hazardous, chemicals in consumer products is not well understood by the general public, but a number of proactive consumer product companies have voluntarily adopted strategies to minimize use of such chemicals. These companies are exceeding regulatory requirements by restricting from their products chemicals that could harm human or environmental health, despite the fact that these actions are costly. They do not usually advertise the details of their strategies to end consumers. This article uses interviews with senior environmental directors of 20 multinational consumer product companies to investigate why these companies engage in voluntary chemicals management. The authors conclude that the most significant reasons are to achieve a competitive advantage and stay ahead of regulations, manage relationships and maintain legitimacy with stakeholders, and put managerial values into practice. Many of the characteristics related to the case of chemicals management are extendable to other areas of stakeholder management in which risks to stakeholders are either unknown or poorly understood.

  17. On the organisation of program verification competitions

    NARCIS (Netherlands)

    Huisman, Marieke; Klebanov, Vladimir; Monahan, Rosemary; Klebanov, Vladimir; Beckert, Bernhard; Biere, Armin; Sutcliffe, Geoff

    In this paper, we discuss the challenges that have to be addressed when organising program verification competitions. Our focus is on competitions for verification systems where the participants both formalise an informally stated requirement and (typically) provide some guidance for the tool to

  18. Design verification enhancement of field programmable gate array-based safety-critical I&C system of nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Ahmed, Ibrahim [Department of Nuclear Engineering, Kyung Hee University, 1732 Deogyeong-daero, Giheung-gu, Yongin-si, Gyeonggi-do 17104 (Korea, Republic of); Jung, Jaecheon, E-mail: jcjung@kings.ac.kr [Department of Nuclear Power Plant Engineering, KEPCO International Nuclear Graduate School, 658-91 Haemaji-ro, Seosang-myeon, Ulju-gun, Ulsan 45014 (Korea, Republic of); Heo, Gyunyoung [Department of Nuclear Engineering, Kyung Hee University, 1732 Deogyeong-daero, Giheung-gu, Yongin-si, Gyeonggi-do 17104 (Korea, Republic of)

    2017-06-15

    Highlights: • An enhanced, systematic and integrated design verification approach is proposed for V&V of FPGA-based I&C system of NPP. • RPS bistable fixed setpoint trip algorithm is designed, analyzed, verified and discussed using the proposed approaches. • The application of integrated verification approach simultaneously verified the entire design modules. • The applicability of the proposed V&V facilitated the design verification processes. - Abstract: Safety-critical instrumentation and control (I&C) system in nuclear power plant (NPP) implemented on programmable logic controllers (PLCs) plays a vital role in safe operation of the plant. The challenges such as fast obsolescence, the vulnerability to cyber-attack, and other related issues of software systems have currently led to the consideration of field programmable gate arrays (FPGAs) as an alternative to PLCs because of their advantages and hardware related benefits. However, safety analysis for FPGA-based I&C systems, and verification and validation (V&V) assessments still remain important issues to be resolved, which are now become a global research point of interests. In this work, we proposed a systematic design and verification strategies from start to ready-to-use in form of model-based approaches for FPGA-based reactor protection system (RPS) that can lead to the enhancement of the design verification and validation processes. The proposed methodology stages are requirement analysis, enhanced functional flow block diagram (EFFBD) models, finite state machine with data path (FSMD) models, hardware description language (HDL) code development, and design verifications. The design verification stage includes unit test – Very high speed integrated circuit Hardware Description Language (VHDL) test and modified condition decision coverage (MC/DC) test, module test – MATLAB/Simulink Co-simulation test, and integration test – FPGA hardware test beds. To prove the adequacy of the proposed

  19. Design verification enhancement of field programmable gate array-based safety-critical I&C system of nuclear power plant

    International Nuclear Information System (INIS)

    Ahmed, Ibrahim; Jung, Jaecheon; Heo, Gyunyoung

    2017-01-01

    Highlights: • An enhanced, systematic and integrated design verification approach is proposed for V&V of FPGA-based I&C system of NPP. • RPS bistable fixed setpoint trip algorithm is designed, analyzed, verified and discussed using the proposed approaches. • The application of integrated verification approach simultaneously verified the entire design modules. • The applicability of the proposed V&V facilitated the design verification processes. - Abstract: Safety-critical instrumentation and control (I&C) system in nuclear power plant (NPP) implemented on programmable logic controllers (PLCs) plays a vital role in safe operation of the plant. The challenges such as fast obsolescence, the vulnerability to cyber-attack, and other related issues of software systems have currently led to the consideration of field programmable gate arrays (FPGAs) as an alternative to PLCs because of their advantages and hardware related benefits. However, safety analysis for FPGA-based I&C systems, and verification and validation (V&V) assessments still remain important issues to be resolved, which are now become a global research point of interests. In this work, we proposed a systematic design and verification strategies from start to ready-to-use in form of model-based approaches for FPGA-based reactor protection system (RPS) that can lead to the enhancement of the design verification and validation processes. The proposed methodology stages are requirement analysis, enhanced functional flow block diagram (EFFBD) models, finite state machine with data path (FSMD) models, hardware description language (HDL) code development, and design verifications. The design verification stage includes unit test – Very high speed integrated circuit Hardware Description Language (VHDL) test and modified condition decision coverage (MC/DC) test, module test – MATLAB/Simulink Co-simulation test, and integration test – FPGA hardware test beds. To prove the adequacy of the proposed

  20. SoS contract verification using statistical model checking

    Directory of Open Access Journals (Sweden)

    Alessandro Mignogna

    2013-11-01

    Full Text Available Exhaustive formal verification for systems of systems (SoS is impractical and cannot be applied on a large scale. In this paper we propose to use statistical model checking for efficient verification of SoS. We address three relevant aspects for systems of systems: 1 the model of the SoS, which includes stochastic aspects; 2 the formalization of the SoS requirements in the form of contracts; 3 the tool-chain to support statistical model checking for SoS. We adapt the SMC technique for application to heterogeneous SoS. We extend the UPDM/SysML specification language to express the SoS requirements that the implemented strategies over the SoS must satisfy. The requirements are specified with a new contract language specifically designed for SoS, targeting a high-level English- pattern language, but relying on an accurate semantics given by the standard temporal logics. The contracts are verified against the UPDM/SysML specification using the Statistical Model Checker (SMC PLASMA combined with the simulation engine DESYRE, which integrates heterogeneous behavioral models through the functional mock-up interface (FMI standard. The tool-chain allows computing an estimation of the satisfiability of the contracts by the SoS. The results help the system architect to trade-off different solutions to guide the evolution of the SoS.

  1. Calibration of laboratory equipment and its intermediate verification

    International Nuclear Information System (INIS)

    Remedi, Jorge O.

    2011-01-01

    When a laboratory wants to prove that he has technical competence to carry out tests or calibrations must demonstrate that it has complied with certain requirements that establish , among others, the mandatory : calibrate or verify equipment before putting it into service in order to ensure that it meets to the specifications of laboratory equipment to keep records evidencing the checks that equipment complies with the specification ; perform intermediate checks for maintain confidence in the calibration status of the equipment , ensure that the operation is checked and calibration status of equipment when the equipment goes outside the direct control of the laboratory , before be returned to service, establish a program and procedure for the calibration of equipment; show how determined the calibration periods of their equipment as well as evidence that intermediate checks are suitable for the calibration periods. However, some confusion is observed as to the meaning of the terms 'calibration' and 'verification' of a computer. This paper analyzes applicable documentation and suggests that the differences are generated in part by translations and by characterization concepts upon its usage, that is, if it is legal metrology or assessment conformity. Therefore, this study aims to characterize both concepts , fundamentals to zoom distinguish , outline appropriate strategies for calibration and verification activities to ensure the compliance with regulatory requirements [es

  2. Simulation environment based on the Universal Verification Methodology

    International Nuclear Information System (INIS)

    Fiergolski, A.

    2017-01-01

    Universal Verification Methodology (UVM) is a standardized approach of verifying integrated circuit designs, targeting a Coverage-Driven Verification (CDV). It combines automatic test generation, self-checking testbenches, and coverage metrics to indicate progress in the design verification. The flow of the CDV differs from the traditional directed-testing approach. With the CDV, a testbench developer, by setting the verification goals, starts with an structured plan. Those goals are targeted further by a developed testbench, which generates legal stimuli and sends them to a device under test (DUT). The progress is measured by coverage monitors added to the simulation environment. In this way, the non-exercised functionality can be identified. Moreover, the additional scoreboards indicate undesired DUT behaviour. Such verification environments were developed for three recent ASIC and FPGA projects which have successfully implemented the new work-flow: (1) the CLICpix2 65 nm CMOS hybrid pixel readout ASIC design; (2) the C3PD 180 nm HV-CMOS active sensor ASIC design; (3) the FPGA-based DAQ system of the CLICpix chip. This paper, based on the experience from the above projects, introduces briefly UVM and presents a set of tips and advices applicable at different stages of the verification process-cycle.

  3. HTGR analytical methods and design verification

    International Nuclear Information System (INIS)

    Neylan, A.J.; Northup, T.E.

    1982-05-01

    Analytical methods for the high-temperature gas-cooled reactor (HTGR) include development, update, verification, documentation, and maintenance of all computer codes for HTGR design and analysis. This paper presents selected nuclear, structural mechanics, seismic, and systems analytical methods related to the HTGR core. This paper also reviews design verification tests in the reactor core, reactor internals, steam generator, and thermal barrier

  4. IMRT plan verification in radiotherapy

    International Nuclear Information System (INIS)

    Vlk, P.

    2006-01-01

    This article describes the procedure for verification of IMRT (Intensity modulated radiation therapy) plan, which is used in the Oncological Institute of St. Elisabeth in Bratislava. It contains basic description of IMRT technology and developing a deployment plan for IMRT planning system CORVUS 6.0, the device Mimic (Multilammelar intensity modulated collimator) and the overall process of verifying the schedule created. The aim of verification is particularly good control of the functions of MIMIC and evaluate the overall reliability of IMRT planning. (author)

  5. Automatic Verification of Timing Constraints for Safety Critical Space Systems

    Science.gov (United States)

    Fernandez, Javier; Parra, Pablo; Sanchez Prieto, Sebastian; Polo, Oscar; Bernat, Guillem

    2015-09-01

    In this paper is presented an automatic process of verification. We focus in the verification of scheduling analysis parameter. This proposal is part of process based on Model Driven Engineering to automate a Verification and Validation process of the software on board of satellites. This process is implemented in a software control unit of the energy particle detector which is payload of Solar Orbiter mission. From the design model is generated a scheduling analysis model and its verification model. The verification as defined as constraints in way of Finite Timed Automatas. When the system is deployed on target the verification evidence is extracted as instrumented points. The constraints are fed with the evidence, if any of the constraints is not satisfied for the on target evidence the scheduling analysis is not valid.

  6. CRM strategy in the case of Colombian companies of bio-products

    International Nuclear Information System (INIS)

    Rojas Lopez, Miguel David; Vera, Madalyd; Arias, Maria Isabel

    2012-01-01

    The agricultural sector in Colombia and in the world presents growth rates, indicating potential customers for the use of inputs in production. The use of these products is increasingly constrained by environmental factors and health factors; thus, the market for bio-products for agricultural uses growth considerably, but far from achieving the sales of agro-chemical products. In Colombia, there are medium and small companies engaged in the development and production of technologies that compete with large corporations, for a market accustomed to use chemical products from traditional brands. The implementation of solid strategies for managing the customer relationships (CRM) will be an alternative to increase market share.

  7. Sample representativeness verification of the FADN CZ farm business sample

    Directory of Open Access Journals (Sweden)

    Marie Prášilová

    2011-01-01

    Full Text Available Sample representativeness verification is one of the key stages of statistical work. After having joined the European Union the Czech Republic joined also the Farm Accountancy Data Network system of the Union. This is a sample of bodies and companies doing business in agriculture. Detailed production and economic data on the results of farming business are collected from that sample annually and results for the entire population of the country´s farms are then estimated and assessed. It is important hence, that the sample be representative. Representativeness is to be assessed as to the number of farms included in the survey and also as to the degree of accordance of the measures and indices as related to the population. The paper deals with the special statistical techniques and methods of the FADN CZ sample representativeness verification including the necessary sample size statement procedure. The Czech farm population data have been obtained from the Czech Statistical Office data bank.

  8. Evaluation of implanted gold seeds for breast radiotherapy planning and on treatment verification: A feasibility study on behalf of the IMPORT trialists

    International Nuclear Information System (INIS)

    Coles, Charlotte E.; Harris, Emma J.; Donovan, Ellen M.; Bliss, Peter; Evans, Philip M.; Fairfoul, Jamie; Mackenzie, Christine; Rawlings, Christine; Syndikus, Isabel; Twyman, Nicola; Vasconcelos, Joana; Vowler, Sarah L.; Wilkinson, Jenny S.; Wilks, Robin; Wishart, Gordon C.; Yarnold, John

    2011-01-01

    Background and purpose: We describe a feasibility study testing the use of gold seeds for the identification of post-operative tumour bed after breast conservation surgery (BCS). Materials and Methods: Fifty-three patients undergoing BCS for invasive cancer were recruited. Successful use was defined as all six seeds correctly positioned around the tumour bed during BCS, unique identification of all implanted seeds on CT planning scan and ≥3 seeds uniquely identified at verification to give couch displacement co-ordinates in 10/15 fractions. Planning target volume (PTV) margin size for four correction strategies were calculated from these data. Variability in tumour bed contouring was investigated with five radiation oncologists outlining five CT datasets. Results: Success in inserting gold seeds, identifying them at CT planning and using them for on-treatment verification was recorded in 45/51 (88%), 37/38 (97%) and 42/43 (98%) of patients, respectively. The clinicians unfamiliar with CT breast planning consistently contoured larger volumes than those already trained. Margin size ranged from 10.1 to 1.4 mm depending on correction strategy. Conclusion: It is feasible to implant tumour bed gold seeds during BCS. Whilst taking longer to insert than surgical clips, they have the advantage of visibility for outlining and verification regardless of the ionising radiation beam quality. Appropriate correction strategies enable margins of the order of 5 mm as required by the IMPORT trials however, tackling clinician variability in contouring is important.

  9. Fuzzy Verification of Lower Dimensional Information in a Numerical Simulation of Sea Ice

    Science.gov (United States)

    Sulsky, D.; Levy, G.

    2010-12-01

    Ideally, a verification and validation scheme should be able to evaluate and incorporate lower dimensional features (e.g., discontinuities) contained within a bulk simulation even when not directly observed or represented by model variables. Nonetheless, lower dimensional features are often ignored. Conversely, models that resolve such features and the associated physics well, yet imprecisely are penalized by traditional validation schemes. This can lead to (perceived or real) poor model performance and predictability and can become deleterious in model improvements when observations are sparse, fuzzy, or irregular. We present novel algorithms and a general framework for using information from available satellite data through fuzzy verification that efficiently and effectively remedy the known problems mentioned above. As a proof of concept, we use a sea-ice model with remotely sensed observations of leads in a one-step initialization cycle. Using the new scheme in a sixteen day simulation experiment introduces model skill (against persistence) several days earlier than in the control run, improves the overall model skill and delays its drop off at later stages of the simulation. Although sea-ice models are currently a weak link in climate models, the appropriate choice of data to use, and the fuzzy verification and evaluation of a system’s skill in reproducing lower dimensional features are important beyond the initial application to sea ice. Our strategy and framework for fuzzy verification, selective use of information, and feature extraction could be extended globally and to other disciplines. It can be incorporated in and complement existing verification and validation schemes, increasing their computational efficiency and the information they use. It can be used for model development and improvements, upscaling/downscaling models, and for modeling processes not directly represented by model variables or direct observations. Finally, if successful, it can

  10. Radioactive demonstration of DWPF product control strategy

    International Nuclear Information System (INIS)

    Andrews, M.K.; Bibler, N.E.

    1994-01-01

    The Defense Waste Processing Facility at the Savannah River Site (SRS) will vitrify high-level nuclear waste into borosilicate glass. The waste will be mixed with properly formulated glass-making frit and fed to a melter at 1150 degrees C. Process reliability and product quality are ensured by proper control of the melter feed composition. The effectiveness of the product and process control strategies that will be utilized by the Defense Waste Processing Facility (DWPF) was demonstrated during a campaign in the Shielded Cells Facility of the Savannah River Technology Center (SRTC). The remotely operated process included the preparation of the melter feed, vitrification in a slurry-fed 1/100th scale melter an analysis of the glass product both for its composition an durability. The campaign processed approximately 10 kg (on a dry basis) of radioactive sludge from Tank 51. This sludge is representative of the first batch of sludge that will be sent to the DWPF for immobilization into borosilicate glass. Additions to the sludge were made based on calculations using the Product Composition Control System (PCCS). Analysis of the glass produced during the campaign showed that a durable glass was produced with a composition very close to that predicted using the PCCS. 10 refs., 4 tabs

  11. A framework for nuclear agreement and verification

    International Nuclear Information System (INIS)

    Ali, A.

    1991-01-01

    This chapter assesses the prospects for a nuclear agreement between India and Pakistan. The chapter opens with a review of past and present political environments of the two countries. The discussion proceeds to describe the linkage of global arms control agreements, prospects for verification of a Comprehensive Test Ban Treaty, the role of nuclear power in any agreements, the intrusiveness of verification, and possible post-proliferation agreements. Various monitoring and verification technologies are described (mainly satellite oriented). The chapter concludes with an analysis of the likelihood of persuading India and Pakistan to agree to a nonproliferation arrangement

  12. Verification of Many-Qubit States

    Directory of Open Access Journals (Sweden)

    Yuki Takeuchi

    2018-06-01

    Full Text Available Verification is a task to check whether a given quantum state is close to an ideal state or not. In this paper, we show that a variety of many-qubit quantum states can be verified with only sequential single-qubit measurements of Pauli operators. First, we introduce a protocol for verifying ground states of Hamiltonians. We next explain how to verify quantum states generated by a certain class of quantum circuits. We finally propose an adaptive test of stabilizers that enables the verification of all polynomial-time-generated hypergraph states, which include output states of the Bremner-Montanaro-Shepherd-type instantaneous quantum polynomial time (IQP circuits. Importantly, we do not make any assumption that the identically and independently distributed copies of the same states are given: Our protocols work even if some highly complicated entanglement is created among copies in any artificial way. As applications, we consider the verification of the quantum computational supremacy demonstration with IQP models, and verifiable blind quantum computing.

  13. Improved vanillin production in baker's yeast through in silico design.

    Science.gov (United States)

    Brochado, Ana Rita; Matos, Claudia; Møller, Birger L; Hansen, Jørgen; Mortensen, Uffe H; Patil, Kiran Raosaheb

    2010-11-08

    Vanillin is one of the most widely used flavouring agents, originally obtained from cured seed pods of the vanilla orchid Vanilla planifolia. Currently vanillin is mostly produced via chemical synthesis. A de novo synthetic pathway for heterologous vanillin production from glucose has recently been implemented in baker's yeast, Saccharamyces cerevisiae. In this study we aimed at engineering this vanillin cell factory towards improved productivity and thereby at developing an attractive alternative to chemical synthesis. Expression of a glycosyltransferase from Arabidopsis thaliana in the vanillin producing S. cerevisiae strain served to decrease product toxicity. An in silico metabolic engineering strategy of this vanillin glucoside producing strain was designed using a set of stoichiometric modelling tools applied to the yeast genome-scale metabolic network. Two targets (PDC1 and GDH1) were selected for experimental verification resulting in four engineered strains. Three of the mutants showed up to 1.5 fold higher vanillin β-D-glucoside yield in batch mode, while continuous culture of the Δpdc1 mutant showed a 2-fold productivity improvement. This mutant presented a 5-fold improvement in free vanillin production compared to the previous work on de novo vanillin biosynthesis in baker's yeast. Use of constraints corresponding to different physiological states was found to greatly influence the target predictions given minimization of metabolic adjustment (MOMA) as biological objective function. In vivo verification of the targets, selected based on their predicted metabolic adjustment, successfully led to overproducing strains. Overall, we propose and demonstrate a framework for in silico design and target selection for improving microbial cell factories.

  14. Formulation of price strategies in the software sector: outsourcing of development and maintenance software product case

    Directory of Open Access Journals (Sweden)

    Antonio Cezar Bornia

    2008-07-01

    Full Text Available The main goal of this article is to discuss the formulation of price strategies in the software sector. In the intention of reaching the proposed goal, strategies models of prices are introduced along with the procedure to the formulation of price strategies, composed by five stages: external and internal analyses, consolidation, positioning, price strategy formalization and market attendance. As for the methodology, the study is classified as qualitative, exploratory, descriptive, documental, of field and case study, according to the approach of Vergara (1998. In the case study, the model to the formulation of price strategies is applied in a company’s software sector, being analyzed the outsourcing of development and maintenance software product. As main contributions, it is highlighted the price procedure application that emphasizes strategic price logic and prices strategies formulations, with base in the analysis of five main factors: quality, comparison with the competition, company life cycle, product life cycle and characteristics of the segment-objective. Based on the analyzed factors, a possible strategy to be adopted considering the characteristics of the product and the company is the price strategy and superior value. Key-words: Pricing Strategies. Price Formulation. Software Enterprises.

  15. Formal Verification -26 ...

    Indian Academy of Sciences (India)

    by testing of the components and successful testing leads to the software being ... Formal verification is based on formal methods which are mathematically based ..... scenario under which a similar error could occur. There are various other ...

  16. Operations Strategy Development in Project-based Production – a building contractor implements Lean

    DEFF Research Database (Denmark)

    Koch, Christian; Friis, Ole Uhrskov

    2015-01-01

    Purpose: To study how operations strategy innovation occurs in project-based production and organisation. Design/methodology/approach: A longitudinal case study encompassing the processes at the company headquarters and in two projects using Lean. Findings: The operations strategy development com...

  17. Verification of wet blasting decontamination technology

    International Nuclear Information System (INIS)

    Matsubara, Sachito; Murayama, Kazunari; Yoshida, Hirohisa; Igei, Shigemitsu; Izumida, Tatsuo

    2013-01-01

    Macoho Co., Ltd. participated in the projects of 'Decontamination Verification Test FY 2011 by the Ministry of the Environment' and 'Decontamination Verification Test FY 2011 by the Cabinet Office.' And we tested verification to use a wet blasting technology for decontamination of rubble and roads contaminated by the accident of Fukushima Daiichi Nuclear Power Plant of the Tokyo Electric Power Company. As a results of the verification test, the wet blasting decontamination technology showed that a decontamination rate became 60-80% for concrete paving, interlocking, dense-grated asphalt pavement when applied to the decontamination of the road. When it was applied to rubble decontamination, a decontamination rate was 50-60% for gravel and approximately 90% for concrete and wood. It was thought that Cs-134 and Cs-137 attached to the fine sludge scraped off from a decontamination object and the sludge was found to be separated from abrasives by wet cyclene classification: the activity concentration of the abrasives is 1/30 or less than the sludge. The result shows that the abrasives can be reused without problems when the wet blasting decontamination technology is used. (author)

  18. Near-surface monitoring strategies for geologic carbon dioxide storage verification

    Energy Technology Data Exchange (ETDEWEB)

    Oldenburg, Curtis M.; Lewicki, Jennifer L.; Hepple, Robert P.

    2003-10-31

    Geologic carbon sequestration is the capture of anthropogenic carbon dioxide (CO{sub 2}) and its storage in deep geologic formations. Geologic CO{sub 2} storage verification will be needed to ensure that CO{sub 2} is not leaking from the intended storage formation and seeping out of the ground. Because the ultimate failure of geologic CO{sub 2} storage occurs when CO{sub 2} seeps out of the ground into the atmospheric surface layer, and because elevated concentrations of CO{sub 2} near the ground surface can cause health, safety, and environmental risks, monitoring will need to be carried out in the near-surface environment. The detection of a CO{sub 2} leakage or seepage signal (LOSS) in the near-surface environment is challenging because there are large natural variations in CO{sub 2} concentrations and fluxes arising from soil, plant, and subsurface processes. The term leakage refers to CO{sub 2} migration away from the intended storage site, while seepage is defined as CO{sub 2} passing from one medium to another, for example across the ground surface. The flow and transport of CO{sub 2} at high concentrations in the near-surface environment will be controlled by its high density, low viscosity, and high solubility in water relative to air. Numerical simulations of leakage and seepage show that CO{sub 2} concentrations can reach very high levels in the shallow subsurface even for relatively modest CO{sub 2} leakage fluxes. However, once CO{sub 2} seeps out of the ground into the atmospheric surface layer, surface winds are effective at dispersing CO{sub 2} seepage. In natural ecological systems with no CO{sub 2} LOSS, near-surface CO{sub 2} fluxes and concentrations are controlled by CO{sub 2} uptake by photosynthesis, and production by root respiration, organic carbon biodegradation in soil, deep outgassing of CO{sub 2}, and by exchange of CO{sub 2} with the atmosphere. Existing technologies available for monitoring CO{sub 2} in the near-surface environment

  19. A study of quality management strategy for reused products

    International Nuclear Information System (INIS)

    Lo, Hui-Chiung; Yu, Rouh-Yun

    2013-01-01

    To ensure the sustainability, industries have to move forward to product recovery strategies. Reuse is one of the most efficient strategies as it preserves natural resources while maintaining the functional properties of the product. To alleviate the concerns over the quality at the end of first life, laws are enacted to protect the consumers through mandatory warranty requirements. Offering warranty results in additional costs, this cost might be reduced through upgrade that improves the reliability of the item. Considering the age at the end of first life as stochastic, this paper proposes a profit model, relevant costs like upgrade and the minimal repair during the warranty period are included. Optimal upgrade level and warranty length are jointly derived so that the expected profit per used item for the producer can be maximized. Algorithm to search for the optimal solution is developed for a special case. Numerical examples are utilized to demonstrate the feasibility of the proposed approach and the sensitivity analyses regarding the important parameters that might impact the profit

  20. K Basins Field Verification Program

    International Nuclear Information System (INIS)

    Booth, H.W.

    1994-01-01

    The Field Verification Program establishes a uniform and systematic process to ensure that technical information depicted on selected engineering drawings accurately reflects the actual existing physical configuration. This document defines the Field Verification Program necessary to perform the field walkdown and inspection process that identifies the physical configuration of the systems required to support the mission objectives of K Basins. This program is intended to provide an accurate accounting of the actual field configuration by documenting the as-found information on a controlled drawing

  1. Engineering drawing field verification program. Revision 3

    International Nuclear Information System (INIS)

    Ulk, P.F.

    1994-01-01

    Safe, efficient operation of waste tank farm facilities is dependent in part upon the availability of accurate, up-to-date plant drawings. Accurate plant drawings are also required in support of facility upgrades and future engineering remediation projects. This supporting document establishes the procedure for performing a visual field verification of engineering drawings, the degree of visual observation being performed and documenting the results. A copy of the drawing attesting to the degree of visual observation will be paginated into the released Engineering Change Notice (ECN) documenting the field verification for future retrieval and reference. All waste tank farm essential and support drawings within the scope of this program will be converted from manual to computer aided drafting (CAD) drawings. A permanent reference to the field verification status will be placed along the right border of the CAD-converted drawing, referencing the revision level, at which the visual verification was performed and documented

  2. Verification of Open Interactive Markov Chains

    OpenAIRE

    Brazdil, Tomas; Hermanns, Holger; Krcal, Jan; Kretinsky, Jan; Rehak, Vojtech

    2012-01-01

    Interactive Markov chains (IMC) are compositional behavioral models extending both labeled transition systems and continuous-time Markov chains. IMC pair modeling convenience - owed to compositionality properties - with effective verification algorithms and tools - owed to Markov properties. Thus far however, IMC verification did not consider compositionality properties, but considered closed systems. This paper discusses the evaluation of IMC in an open and thus compositional interpretation....

  3. Earth Science Enterprise Scientific Data Purchase Project: Verification and Validation

    Science.gov (United States)

    Jenner, Jeff; Policelli, Fritz; Fletcher, Rosea; Holecamp, Kara; Owen, Carolyn; Nicholson, Lamar; Dartez, Deanna

    2000-01-01

    This paper presents viewgraphs on the Earth Science Enterprise Scientific Data Purchase Project's verification,and validation process. The topics include: 1) What is Verification and Validation? 2) Why Verification and Validation? 3) Background; 4) ESE Data Purchas Validation Process; 5) Data Validation System and Ingest Queue; 6) Shipment Verification; 7) Tracking and Metrics; 8) Validation of Contract Specifications; 9) Earth Watch Data Validation; 10) Validation of Vertical Accuracy; and 11) Results of Vertical Accuracy Assessment.

  4. Decision method for optimal selection of warehouse material handling strategies by production companies

    Science.gov (United States)

    Dobos, P.; Tamás, P.; Illés, B.

    2016-11-01

    Adequate establishment and operation of warehouse logistics determines the companies’ competitiveness significantly because it effects greatly the quality and the selling price of the goods that the production companies produce. In order to implement and manage an adequate warehouse system, adequate warehouse position, stock management model, warehouse technology, motivated work force committed to process improvement and material handling strategy are necessary. In practical life, companies have paid small attantion to select the warehouse strategy properly. Although it has a major influence on the production in the case of material warehouse and on smooth costumer service in the case of finished goods warehouse because this can happen with a huge loss in material handling. Due to the dynamically changing production structure, frequent reorganization of warehouse activities is needed, on what the majority of the companies react basically with no reactions. This work presents a simulation test system frames for eligible warehouse material handling strategy selection and also the decision method for selection.

  5. Strategies for Increasing Tomato Production In Nigeria: A Case ...

    African Journals Online (AJOL)

    The study was carried out in Kabba-Bunu Local Government Area (LGA) of Kogi State, Nigeria in the year 2013 to assess the farmers' perception on the strategies for increasing tomato production in the LGA; an area that has potential to produce tomato on commercial level. The objectives of the study were to identify the ...

  6. Consumer product branding strategy and the marketing of physicians' services.

    Science.gov (United States)

    Friedrich, H; Witt, J

    1995-01-01

    Hospitals have traditionally maintained physician referral programs as a means of attracting physicians to their network of affiliated providers. The advent of managed care and impending healthcare reform has altered the relationship of hospitals and physicians. An exploratory study of marketing approaches used by twelve healthcare organizations representing twenty-five hospitals in a large city was conducted. Strategies encountered in the study ranged from practice acquisition to practice promotion. This study suggests that healthcare providers might adopt consumer product branding strategies to secure market-share, build brand equity, and improve profitability.

  7. Space Weather Models and Their Validation and Verification at the CCMC

    Science.gov (United States)

    Hesse, Michael

    2010-01-01

    The Community Coordinated l\\lodeling Center (CCMC) is a US multi-agency activity with a dual mission. With equal emphasis, CCMC strives to provide science support to the international space research community through the execution of advanced space plasma simulations, and it endeavors to support the space weather needs of the CS and partners. Space weather support involves a broad spectrum, from designing robust forecasting systems and transitioning them to forecasters, to providing space weather updates and forecasts to NASA's robotic mission operators. All of these activities have to rely on validation and verification of models and their products, so users and forecasters have the means to assign confidence levels to the space weather information. In this presentation, we provide an overview of space weather models resident at CCMC, as well as of validation and verification activities undertaken at CCMC or through the use of CCMC services.

  8. Material integrity verification radar

    International Nuclear Information System (INIS)

    Koppenjan, S.K.

    1999-01-01

    The International Atomic Energy Agency (IAEA) has the need for verification of 'as-built' spent fuel-dry storage containers and other concrete structures. The IAEA has tasked the Special Technologies Laboratory (STL) to fabricate, test, and deploy a stepped-frequency Material Integrity Verification Radar (MIVR) system to nondestructively verify the internal construction of these containers. The MIVR system is based on previously deployed high-frequency, ground penetrating radar (GPR) systems that have been developed by STL for the U.S. Department of Energy (DOE). Whereas GPR technology utilizes microwave radio frequency energy to create subsurface images, MTVR is a variation for which the medium is concrete instead of soil. The purpose is to nondestructively verify the placement of concrete-reinforcing materials, pipes, inner liners, and other attributes of the internal construction. The MIVR system underwent an initial field test on CANDU reactor spent fuel storage canisters at Atomic Energy of Canada Limited (AECL), Chalk River Laboratories, Ontario, Canada, in October 1995. A second field test at the Embalse Nuclear Power Plant in Embalse, Argentina, was completed in May 1996. The DOE GPR also was demonstrated at the site. Data collection and analysis were performed for the Argentine National Board of Nuclear Regulation (ENREN). IAEA and the Brazilian-Argentine Agency for the Control and Accounting of Nuclear Material (ABACC) personnel were present as observers during the test. Reinforcing materials were evident in the color, two-dimensional images produced by the MIVR system. A continuous pattern of reinforcing bars was evident and accurate estimates on the spacing, depth, and size were made. The potential uses for safeguard applications were jointly discussed. The MIVR system, as successfully demonstrated in the two field tests, can be used as a design verification tool for IAEA safeguards. A deployment of MIVR for Design Information Questionnaire (DIQ

  9. Feasibility of biochemical verification in a web-based smoking cessation study.

    Science.gov (United States)

    Cha, Sarah; Ganz, Ollie; Cohn, Amy M; Ehlke, Sarah J; Graham, Amanda L

    2017-10-01

    Cogent arguments have been made against the need for biochemical verification in population-based studies with low-demand characteristics. Despite this fact, studies involving digital interventions (low-demand) are often required in peer review to report biochemically verified abstinence. To address this discrepancy, we examined the feasibility and costs of biochemical verification in a web-based study conducted with a national sample. Participants were 600U.S. adult current smokers who registered on a web-based smoking cessation program and completed surveys at baseline and 3months. Saliva sampling kits were sent to participants who reported 7-day abstinence at 3months, and analyzed for cotinine. The response rate at 3-months was 41.2% (n=247): 93 participants reported 7-day abstinence (38%) and were mailed a saliva kit (71% returned). The discordance rate was 36.4%. Participants with discordant responses were more likely to report 3-month use of nicotine replacement therapy or e-cigarettes than those with concordant responses (79.2% vs. 45.2%, p=0.007). The total cost of saliva sampling was $8280 ($125/sample). Biochemical verification was both time- and cost-intensive, and yielded a relatively small number of samples due to low response rates and use of other nicotine products during the follow-up period. There was a high rate of discordance of self-reported abstinence and saliva testing. Costs for data collection may be prohibitive for studies with large sample sizes or limited budgets. Our findings echo previous statements that biochemical verification is not necessary in population-based studies, and add evidence specific to technology-based studies. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Designing the Social Context for Easier Verification, Validation, and Uncertainty Quantification of Earth Science Data

    Science.gov (United States)

    Barkstrom, B. R.; Loeb, N. G.; Wielicki, B. A.

    2017-12-01

    Verification, Validation, and Uncertainty Quantification (VVUQ) are key actions that support conclusions based on Earth science data. Communities of data producers and users must undertake VVUQ when they create and use their data. The strategies [S] and tools [T] suggested below come from successful use on two large NASA projects. The first was the Earth Radiation Budget Experiment (ERBE). The second is the investigation of Clouds and the Earth's Radiant Energy System (CERES). [S] 1. Partition the production system into subsystems that deal with data transformations confined to limited space and time scales. Simplify the subsystems to minimize the number of data transformations in each subsystem. [S] 2. Derive algorithms from the fundamental physics and chemistry governing the parameters in each subsystem including those for instrument calibration. [S] 3. Use preliminary uncertainty estimates to detect unexpected discrepancies. Removing these requires diagnostic work as well as development and testing of fixes. [S] 4. Make sure there are adequate resources to support multiple end-to-end reprocessing of all data products. [T] 1. Create file identifiers that accommodate temporal and spatial sequences of data files and subsystem version changes. [T] 2. Create libraries of parameters used in common by different subsystems to reduce errors due to inconsistent values. [T] 3. Maintain a list of action items to record progress on resolving discrepancies. [T] 4. Plan on VVUQ activities that use independent data sources and peer review before distributing and archiving data. The goal of VVUQ is to provide a transparent link between the data and the physics and chemistry governing the measured quantities. The VVUQ effort also involves specialized domain experience and nomenclature. It often requires as much effort as the original system development. ERBE and CERES demonstrated that these strategies and tools can reduce the cost of VVUQ for Earth science data products.

  11. Specification and Automated Verification of Real-Time Behaviour

    DEFF Research Database (Denmark)

    Kristensen, C.H.; Andersen, J.H.; Skou, A.

    1995-01-01

    In this paper we sketch a method for specification and automatic verification of real-time software properties.......In this paper we sketch a method for specification and automatic verification of real-time software properties....

  12. Specification and Automated Verification of Real-Time Behaviour

    DEFF Research Database (Denmark)

    Andersen, J.H.; Kristensen, C.H.; Skou, A.

    1996-01-01

    In this paper we sketch a method for specification and automatic verification of real-time software properties.......In this paper we sketch a method for specification and automatic verification of real-time software properties....

  13. Enhancement of the use of digital mock-ups in the verification and validation process for ITER remote handling systems

    Energy Technology Data Exchange (ETDEWEB)

    Sibois, R., E-mail: romain.sibois@vtt.fi [VTT Technical Research Centre of Finland, P.O. Box 1300, 33101 Tampere (Finland); Salminen, K.; Siuko, M. [VTT Technical Research Centre of Finland, P.O. Box 1300, 33101 Tampere (Finland); Mattila, J. [Tampere University of Technology, Korkeakoulunkatu 6, 33720 Tampere (Finland); Määttä, T. [VTT Technical Research Centre of Finland, P.O. Box 1300, 33101 Tampere (Finland)

    2013-10-15

    Highlights: • Verification and validation process for ITER remote handling system. • Verification and validation framework for complex engineering systems. • Verification and validation roadmap for digital modelling phase. • Importance of the product life-cycle management in the verification and validation framework. -- Abstract: The paper is part of the EFDA's programme of European Goal Oriented Training programme on remote handling (RH) “GOT-RH”. The programme aims to train engineers for activities supporting the ITER project and the long-term fusion programme. This paper is written based on the results of a project “verification and validation (V and V) of ITER RH system using digital mock-ups (DMUs)”. The purpose of this project is to study efficient approach of using DMU for the V and V of the ITER RH system design utilizing a system engineering (SE) framework. This paper reviews the definitions of DMU and virtual prototype and overviews the current trends of using virtual prototyping in the industry during the early design phase. Based on the survey of best industrial practices, this paper proposes ways to improve the V and V process for ITER RH system utilizing DMUs.

  14. Over-the-Counter and Out-of-Control: Legal Strategies to Protect Youths From Abusing Products for Weight Control

    Science.gov (United States)

    Taylor, Lisa M.; Austin, S. Bryn

    2013-01-01

    Abuse of widely available, over-the-counter drugs and supplements such as laxatives and diet pills for weight control by youths is well documented in the epidemiological literature. Many such products are not medically recommended for healthy weight control or are especially susceptible to abuse, and their misuse can result in serious health consequences. We analyzed the government’s role in regulating these products to protect public health. We examined federal and state regulatory authority, and referred to international examples to inform our analysis. Several legal interventions are indicated to protect youths, including increased warnings and restrictions on access through behind-the-counter placement or age verification. We suggest future directions for governments internationally to address this pervasive public health problem. PMID:23237149

  15. Formal Verification of Continuous Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer

    2012-01-01

    and the verification procedures should be algorithmically synthesizable. Autonomous control plays an important role in many safety-critical systems. This implies that a malfunction in the control system can have catastrophic consequences, e.g., in space applications where a design flaw can result in large economic...... losses. Furthermore, a malfunction in the control system of a surgical robot may cause death of patients. The previous examples involve complex systems that are required to operate according to complex specifications. The systems cannot be formally verified by modern verification techniques, due...

  16. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  17. Runtime Verification Through Forward Chaining

    Directory of Open Access Journals (Sweden)

    Alan Perotti

    2014-12-01

    Full Text Available In this paper we present a novel rule-based approach for Runtime Verification of FLTL properties over finite but expanding traces. Our system exploits Horn clauses in implication form and relies on a forward chaining-based monitoring algorithm. This approach avoids the branching structure and exponential complexity typical of tableaux-based formulations, creating monitors with a single state and a fixed number of rules. This allows for a fast and scalable tool for Runtime Verification: we present the technical details together with a working implementation.

  18. SIMULATION OF STRATEGY DEVELOPMENT PRODUCTION IN DEFENSE-INDUSTRIAL COMPLEX1

    Directory of Open Access Journals (Sweden)

    Alexandr M. Batkovsky

    2014-01-01

    Full Text Available The article describes the methodological frameworkand tools for manag-ing the strategic development ofproduction created by the defense-industrial complexof Russia. A model of the development strategy ofproducing the products is worked out, the backgroundand stability of the simulation results are analyzed.

  19. Implementing a Brand Strategy for a New Product: Releasing a New Product in a Multinational Company

    OpenAIRE

    Alexandra ION

    2011-01-01

    The present paper focuses on the issue of using marketing intruments (like innovation, creativity, revitalization) in multinational companies like Coca Cola. The research is about identifying the right options and marketing strategies, for implementing a new and healthy product on the market, and studying the consumer behavior, regarding the subject. In conclusion, this product could be a chance for this company to improve image and to take benefit by increasing the number of consumers.

  20. Current status of verification practices in clinical biochemistry in Spain.

    Science.gov (United States)

    Gómez-Rioja, Rubén; Alvarez, Virtudes; Ventura, Montserrat; Alsina, M Jesús; Barba, Núria; Cortés, Mariano; Llopis, María Antonia; Martínez, Cecilia; Ibarz, Mercè

    2013-09-01

    Verification uses logical algorithms to detect potential errors before laboratory results are released to the clinician. Even though verification is one of the main processes in all laboratories, there is a lack of standardization mainly in the algorithms used and the criteria and verification limits applied. A survey in clinical laboratories in Spain was conducted in order to assess the verification process, particularly the use of autoverification. Questionnaires were sent to the laboratories involved in the External Quality Assurance Program organized by the Spanish Society of Clinical Biochemistry and Molecular Pathology. Seven common biochemical parameters were included (glucose, cholesterol, triglycerides, creatinine, potassium, calcium, and alanine aminotransferase). Completed questionnaires were received from 85 laboratories. Nearly all the laboratories reported using the following seven verification criteria: internal quality control, instrument warnings, sample deterioration, reference limits, clinical data, concordance between parameters, and verification of results. The use of all verification criteria varied according to the type of verification (automatic, technical, or medical). Verification limits for these parameters are similar to biological reference ranges. Delta Check was used in 24% of laboratories. Most laboratories (64%) reported using autoverification systems. Autoverification use was related to laboratory size, ownership, and type of laboratory information system, but amount of use (percentage of test autoverified) was not related to laboratory size. A total of 36% of Spanish laboratories do not use autoverification, despite the general implementation of laboratory information systems, most of them, with autoverification ability. Criteria and rules for seven routine biochemical tests were obtained.

  1. Comparison of mixotrophic to cyclic autotrophic/heterotrophic growth strategies to optimize productivity of Chlorella sorokiniana

    DEFF Research Database (Denmark)

    van Wagenen, Jonathan Myerson; De Francisci, Davide; Angelidaki, Irini

    2015-01-01

    In addition to providing cheap or free mineral nutrients, wastewaters may contain organic carbon compounds that could increase productivity of algal cultures. This study defined a strategy for the addition of organic carbon to photobioreactors in order to improve their productivity compared...... for acetate addition. Acetate was added during the light period for the mixotrophic strategy and during the dark one for the cyclic autotrophic/heterotrophic strategy. Autotrophic productivity of up to 0.99 g L−1 day−1 was obtained using the optimal tested dilution rate of 0.031 h−1. The highest mixotrophic...... productivity was 1.04 g L−1 day−1. When a constant dilution rate was applied throughout the day, cyclic heterotrophy/autotrophy (1.2 g L−1 day−1) showed higher productivity than during mixotrophic growth, while using only half as much acetate. By diluting and adding acetate only during the eight dark hours...

  2. Complementary technologies for verification of excess plutonium

    International Nuclear Information System (INIS)

    Langner, D.G.; Nicholas, N.J.; Ensslin, N.; Fearey, B.L.; Mitchell, D.J.; Marlow, K.W.; Luke, S.J.; Gosnell, T.B.

    1998-01-01

    Three complementary measurement technologies have been identified as candidates for use in the verification of excess plutonium of weapons origin. These technologies: high-resolution gamma-ray spectroscopy, neutron multiplicity counting, and low-resolution gamma-ray spectroscopy, are mature, robust technologies. The high-resolution gamma-ray system, Pu-600, uses the 630--670 keV region of the emitted gamma-ray spectrum to determine the ratio of 240 Pu to 239 Pu. It is useful in verifying the presence of plutonium and the presence of weapons-grade plutonium. Neutron multiplicity counting is well suited for verifying that the plutonium is of a safeguardable quantity and is weapons-quality material, as opposed to residue or waste. In addition, multiplicity counting can independently verify the presence of plutonium by virtue of a measured neutron self-multiplication and can detect the presence of non-plutonium neutron sources. The low-resolution gamma-ray spectroscopic technique is a template method that can provide continuity of knowledge that an item that enters the a verification regime remains under the regime. In the initial verification of an item, multiple regions of the measured low-resolution spectrum form a unique, gamma-radiation-based template for the item that can be used for comparison in subsequent verifications. In this paper the authors discuss these technologies as they relate to the different attributes that could be used in a verification regime

  3. Reducing pollution at five critical points of shale gas production: Strategies and institutional responses

    International Nuclear Information System (INIS)

    Centner, Terence J.

    2016-01-01

    While the public and governments debate the advisability of engaging in shale gas production, the United States has proceeded to develop its resources with an accompanying remarkable increase in natural gas production. The development of shale gas has not been without problems, and some countries have decided that shale gas production should not proceed until more is known about the accompanying health issues and environmental damages. From experiences in the United States, careful consideration of five critical points relating to shale gas production can form the basis for developing strategies for reducing discharges of pollutants: (1) casing and cementing, (2) handling wastewater, (3) venting and flaring, (4) equipment with air emissions, and (5) seismic events. For each strategy, institutional responses to markedly reduce the risks of harm to people and the environment are identified. These responses offer state and local governments ideas for enabling shale gas resources to be developed without sacrificing public health and environmental quality. - Highlights: •Shale gas development involves releases of unnecessary pollutants. •Major sources of unnecessary pollutants can be identified. •For major pollutant sources, strategies can be developed to reduce releases of contaminants. •Alternative strategies can offer firms and governments ways to reduce pollutant releases.

  4. A Synthesized Framework for Formal Verification of Computing Systems

    Directory of Open Access Journals (Sweden)

    Nikola Bogunovic

    2003-12-01

    Full Text Available Design process of computing systems gradually evolved to a level that encompasses formal verification techniques. However, the integration of formal verification techniques into a methodical design procedure has many inherent miscomprehensions and problems. The paper explicates the discrepancy between the real system implementation and the abstracted model that is actually used in the formal verification procedure. Particular attention is paid to the seamless integration of all phases of the verification procedure that encompasses definition of the specification language and denotation and execution of conformance relation between the abstracted model and its intended behavior. The concealed obstacles are exposed, computationally expensive steps identified and possible improvements proposed.

  5. The alignment of product strategy to supply chain practices of craft businesses in Gauteng Province, South Africa

    Directory of Open Access Journals (Sweden)

    Craig Voortman

    2014-11-01

    Full Text Available External factors such as blurring market boundaries, escalating customer diversity and increasing global competitive threats have forced businesses to build strategies around key products and formulate market-driven strategies that are integrated with relationship and supply chain strategies to deliver superior customer value. Indeed, in the modern era of supply chain management, organisations are getting more integrated with their suppliers and customers as a way to manage the total supply chain. The purpose of this research was to determine if product strategies and supply chain practices of small craft business are aligned. Personal in-depth interviews were conducted with nine craft businesses operating in Gauteng Province, South Africa. The findings revealed that craft businesses struggle to match their product strategies with their supply chain strategies. Craft businesses also exhibited some inbound supply chain weaknesses.

  6. Independent verification in operations at nuclear power plants

    International Nuclear Information System (INIS)

    Donderi, D.C.; Smiley, A.; Ostry, D.J.; Moray, N.P.

    1995-09-01

    A critical review of approaches to independent verification in operations used in nuclear power plant quality assurance programs in other countries, was conducted for this study. This report identifies the uses of independent verification and provides an assessment of the effectiveness of the various approaches. The findings indicate that at Canadian nuclear power plants as much, if not more, independent verification is performed than at power plants in the other countries included in the study. Additional requirements in this area are not proposed for Canadian stations. (author)

  7. Waterpipe industry products and marketing strategies: analysis of an industry trade exhibition.

    Science.gov (United States)

    Jawad, Mohammed; Nakkash, Rima T; Hawkins, Ben; Akl, Elie A

    2015-12-01

    Understanding product development and marketing strategies of transnational tobacco companies (TTCs) has been of vital importance in developing an effective tobacco control policy. However, comparatively little is known of the waterpipe tobacco industry, which TTCs have recently entered. This study aimed to gain an understanding of waterpipe tobacco products and marketing strategies by visiting a waterpipe trade exhibition. In April 2014, the first author attended an international waterpipe trade exhibition, recording descriptions of products and collecting all available marketing items. We described the purpose and function of all products, and performed a thematic analysis of messages in marketing material. We classified waterpipe products into four categories and noted product variation within categories. Electronic waterpipe products (which mimic electronic cigarettes) rarely appeared on waterpipe tobacco marketing material, but were displayed just as widely. Claims of reduced harm, safety and quality were paramount on marketing materials, regardless of whether they were promoting consumption products (tobacco, tobacco substitutes), electronic waterpipes or accessories. Waterpipe products are diverse in nature and are marketed as healthy and safe products. Furthermore, the development of electronic waterpipe products appears to be closely connected with the electronic cigarette industry, rather than the waterpipe tobacco manufacturers. Tobacco control policy must evolve to take account of the vast and expanding array of waterpipe products, and potentially also charcoal products developed for waterpipe smokers. We recommend that tobacco substitutes be classified as tobacco products. Continued surveillance of the waterpipe industry is warranted. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  8. Natural gas production verification tests

    International Nuclear Information System (INIS)

    1992-02-01

    This Environmental Assessment (EA) has been prepared by the Department of Energy (DOE) in compliance with the requirements of the National Environmental Policy Act of 1969. The Department of Energy (DOE) proposes to fund, through a contract with Petroleum Consulting Services, Inc. of Canton, Ohio, the testing of the effectiveness of a non-water based hydraulic fracturing treatment to increase gas recovery from low-pressure, tight, fractured Devonian Shale formations. Although Devonian Shales are found in the Appalachian, Michigan, and Illinois Basins, testing will be done only in the dominant, historical five state area of established production. The objective of this proposed project is to assess the benefits of liquid carbon dioxide (CO 2 )/sand stimulations in the Devonian Shale. In addition, this project would evaluate the potential nondamaging (to the formation) properties of this unique fracturing treatment relative to the clogging or chocking of pores and fractures that act as gas flow paths to the wellbore in the target gas-producing zones of the formation. This liquid CO 2 /sand fracturing process is water-free and is expected to facilitate gas well cleanup, reduce the time required for post-stimulation cleanup, and result in improved production levels in a much shorter time than is currently experienced

  9. Robustness analysis of pull strategies in multi-product systems

    Directory of Open Access Journals (Sweden)

    Chukwunonyelum Emmanuel Onyeocha

    2015-09-01

    Full Text Available Purpose: This paper examines the behaviour of shared and dedicated Kanban allocation policies of Hybrid Kanban-CONWIP and Basestock-Kanban-CONWIP control strategies in multi-product systems; with considerations to robustness of optimal solutions to environmental and system variabilities. Design/methodology/approach: Discrete event simulation and evolutionary multi-objective optimisation approach were utilised to develop Pareto-frontier or sets of non-dominated optimal solutions and for selection of an appropriate decision set for the control parameters in the shared Kanban allocation policy (S-KAP and dedicated Kanban allocation policy (D-KAP. Simulation experiments were carried out via ExtendSim simulation application software. The outcomes of PCS+KAP performances were compared via all pairwise comparison and Nelson’s screening and selection procedure for superior PCS+KAP under negligible environmental and system stability. To determine superior PCS+KAP under systems’ and environmental variability, the optimal solutions were tested for robustness using Latin hypercube sampling technique and stochastic dominance test. Findings: The outcome of this study shows that under uncontrollable environmental variability, dedicated Kanban allocation policy outperformed shared Kanban allocation policy in serial manufacturing system with negligible and in complex assembly line with setup times. Moreover, the BK-CONWIP is shown as superior strategy to HK-CONWIP. Research limitations/implications: Future research should be conducted to verify the level of flexibility of BK-CONWIP with respect to product mix and product demand volume variations in a complex multi-product system Practical implications: The outcomes of this work are applicable to multi-product manufacturing industries with significant setup times and systems with negligible setup times. The multi-objective optimisation provides decision support for selection of control-parameters such that

  10. OpenMP 4.5 Validation and Verification Suite

    Energy Technology Data Exchange (ETDEWEB)

    2017-12-15

    OpenMP, a directive-based programming API, introduce directives for accelerator devices that programmers are starting to use more frequently in production codes. To make sure OpenMP directives work correctly across architectures, it is critical to have a mechanism that tests for an implementation's conformance to the OpenMP standard. This testing process can uncover ambiguities in the OpenMP specification, which helps compiler developers and users make a better use of the standard. We fill this gap through our validation and verification test suite that focuses on the offload directives available in OpenMP 4.5.

  11. Movement as Spatial Practices and Economic Strategies in Cheese Production at Family Farms in Bohinj

    Directory of Open Access Journals (Sweden)

    Jaka Repič

    2014-07-01

    Full Text Available The article explores dairy and cheese production at family farms in Bohinj, their economical and organisational strategies (variations between family and cooperative organisation of farming and the connection of cheese production with different modes of spatial movement. In the past decade, several family farms have started producing cheese and milk products, which is an economic activity closely linked to traditional forms of cooperatives, and pasture rights of agricultural societies. These farms have revitalised traditional forms of cheese production and established new economic strategies, especially through the plurality of their activities – work outside of the farm, tourism, marketing of their products, etc. The article first presents a development of cheese production in Bohinj, changes in family and cooperative farming and explores movement and the meshwork of paths, tracks, roads and places that are fundamental to cheese economy. Further, the article connects different movements, e.g. daily pastures close to the villages, transhumance in mountain pasturelands, selling products in markets, etc. Modes of movement (walk, cattle herding, driving to markets are basic practices behind economic strategies of dairy and cheese farms, as well as organisations and use of space, in particular mountain paths and pasturelands.

  12. Business strategies, profitability and efficiency of production

    Directory of Open Access Journals (Sweden)

    S. Alarcón

    2013-02-01

    Full Text Available The strategy choices of market-oriented companies are a topic now under wide investigation in the analysis of business performance antecedents. The purpose of this study is to examine the outcomes of the combination of three different organizational strategies (market orientation, innovativeness and entrepreneurial orientation on business performance indicators. Models using profitability and efficiency indicators are proposed with the specific aim of obtaining a deeper analysis of the relative roles played by each. The empirical work takes place in the agro-food industry in the Ebro Valley, one of Spain’s most competitive regions. The estimates from profitability quantile and truncated regressions of the efficiency scores reveal that market orientation has a positive effect on economic and productivity performance. The impact of pro-active, innovation-seeking, and risk-averse entrepreneurship is nevertheless more debatable, despite some influence of these entrepreneurial styles on observed performance values. This enables conclusions regarding the possibility of combining a market-oriented business culture with innovation and entrepreneurial activity with a view to obtaining business performance gains.

  13. TPM- A KEY STRATEGY FOR PRODUCTIVITY IMPROVEMENT

    Directory of Open Access Journals (Sweden)

    J.S. DUREJA

    2011-02-01

    Full Text Available During high growth era companies are making technical progress in automation and centralization of the plants, which needs large amount of manual work to maintain the automation systems. The strategy of maintaining the equipment of a plant is crucial for the effectiveness of manufacturing. Total productive maintenance (TPM is a maintenance program, which involves concepts for maintaining plant and equipments effectively. In this paper detailed implementation of TPM in the cold rolling plant is discussed. Results achieved are quite encouraging in terms of motivated employees, improvement in overall equipment effectiveness (OEE and reduction in no. of accidents on shop floor.

  14. Concepts of Model Verification and Validation

    International Nuclear Information System (INIS)

    Thacker, B.H.; Doebling, S.W.; Hemez, F.M.; Anderson, M.C.; Pepin, J.E.; Rodriguez, E.A.

    2004-01-01

    Model verification and validation (VandV) is an enabling methodology for the development of computational models that can be used to make engineering predictions with quantified confidence. Model VandV procedures are needed by government and industry to reduce the time, cost, and risk associated with full-scale testing of products, materials, and weapon systems. Quantifying the confidence and predictive accuracy of model calculations provides the decision-maker with the information necessary for making high-consequence decisions. The development of guidelines and procedures for conducting a model VandV program are currently being defined by a broad spectrum of researchers. This report reviews the concepts involved in such a program. Model VandV is a current topic of great interest to both government and industry. In response to a ban on the production of new strategic weapons and nuclear testing, the Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship Program (SSP). An objective of the SSP is to maintain a high level of confidence in the safety, reliability, and performance of the existing nuclear weapons stockpile in the absence of nuclear testing. This objective has challenged the national laboratories to develop high-confidence tools and methods that can be used to provide credible models needed for stockpile certification via numerical simulation. There has been a significant increase in activity recently to define VandV methods and procedures. The U.S. Department of Defense (DoD) Modeling and Simulation Office (DMSO) is working to develop fundamental concepts and terminology for VandV applied to high-level systems such as ballistic missile defense and battle management simulations. The American Society of Mechanical Engineers (ASME) has recently formed a Standards Committee for the development of VandV procedures for computational solid mechanics models. The Defense Nuclear Facilities Safety Board (DNFSB) has been a proponent of model

  15. Verification and quality control of routine hematology analyzers

    NARCIS (Netherlands)

    Vis, J Y; Huisman, A

    2016-01-01

    Verification of hematology analyzers (automated blood cell counters) is mandatory before new hematology analyzers may be used in routine clinical care. The verification process consists of several items which comprise among others: precision, accuracy, comparability, carryover, background and

  16. Solid waste operations complex engineering verification program plan

    International Nuclear Information System (INIS)

    Bergeson, C.L.

    1994-01-01

    This plan supersedes, but does not replace, the previous Waste Receiving and Processing/Solid Waste Engineering Development Program Plan. In doing this, it does not repeat the basic definitions of the various types or classes of development activities nor provide the rigorous written description of each facility and assign the equipment to development classes. The methodology described in the previous document is still valid and was used to determine the types of verification efforts required. This Engineering Verification Program Plan will be updated on a yearly basis. This EVPP provides programmatic definition of all engineering verification activities for the following SWOC projects: (1) Project W-026 - Waste Receiving and Processing Facility Module 1; (2) Project W-100 - Waste Receiving and Processing Facility Module 2A; (3) Project W-112 - Phase V Storage Facility; and (4) Project W-113 - Solid Waste Retrieval. No engineering verification activities are defined for Project W-112 as no verification work was identified. The Acceptance Test Procedures/Operational Test Procedures will be part of each project's Title III operation test efforts. The ATPs/OTPs are not covered by this EVPP

  17. Numerical Verification Of Equilibrium Chemistry

    International Nuclear Information System (INIS)

    Piro, Markus; Lewis, Brent; Thompson, William T.; Simunovic, Srdjan; Besmann, Theodore M.

    2010-01-01

    A numerical tool is in an advanced state of development to compute the equilibrium compositions of phases and their proportions in multi-component systems of importance to the nuclear industry. The resulting software is being conceived for direct integration into large multi-physics fuel performance codes, particularly for providing boundary conditions in heat and mass transport modules. However, any numerical errors produced in equilibrium chemistry computations will be propagated in subsequent heat and mass transport calculations, thus falsely predicting nuclear fuel behaviour. The necessity for a reliable method to numerically verify chemical equilibrium computations is emphasized by the requirement to handle the very large number of elements necessary to capture the entire fission product inventory. A simple, reliable and comprehensive numerical verification method is presented which can be invoked by any equilibrium chemistry solver for quality assurance purposes.

  18. 21 CFR 21.44 - Verification of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Verification of identity. 21.44 Section 21.44 Food... Verification of identity. (a) An individual seeking access to records in a Privacy Act Record System may be... identity. The identification required shall be suitable considering the nature of the records sought. No...

  19. Verification of Conditions for use of Combustion Products‘ Heat

    Directory of Open Access Journals (Sweden)

    Kažimírová Viera

    2015-06-01

    Full Text Available Presented contribution deals with the verification of conditions for use of combustion products‘ heat, generated by combustion of wood in a fireplace used in a household. It is necessary to know the temperature behaviour of the fireplace to determine the adequacy of the technical solution for using combustion products‘ heat. The combustion products‘ temperature at the upper part of the chimney is 80-120 °C. The dew point value was established to be below 51 °C. The average observed value of combustion product velocity is 1.6 m s-1. The volume flow rate of combustion products is 12 m3 h-1. Measured values allow for effective solution of the use of combustion products‘ heat.

  20. The psychological effects of empowerment strategies on consumers' product demand

    DEFF Research Database (Denmark)

    Fuchs, Christoph; Prandelli, Emanuela; Schreier, Martin

    2010-01-01

    . In such scenarios, it is no longer the company but its customers who decide democratically which products should be produced. This article discusses the first set of empirical studies which highlight the important psychological consequences of this power shift. The results indicate that customers who are empowered...... of psychological ownership of the products selected. The studies also identify two boundary conditions for this "empowerment - product demand" effect: It diminishes if the outcome of the joint decision-making process does not reflect consumers' preferences and if consumers do not feel that they have the relevant......Companies have recently begun to use the Internet in order to integrate their customers more actively into various phases of the new product development (NPD) process. One such strategy involves empowering customers to cooperate in selecting the product concepts to be marketed by the firm...

  1. On the Dividend Strategies with Non-Exponential Discounting

    OpenAIRE

    Zhao, Qian; Wei, Jiaqin; Wang, Rongming

    2013-01-01

    In this paper, we study the dividend strategies for a shareholder with non-constant discount rate in a diffusion risk model. We assume that the dividends can only be paid at a bounded rate and restrict ourselves to the Markov strategies. This is a time inconsistent control problem. The extended HJB equation is given and the verification theorem is proved for a general discount function. Considering the pseudo-exponential discount functions (Type I and Type II), we get the equilibrium dividend...

  2. A methodology for the rigorous verification of plasma simulation codes

    Science.gov (United States)

    Riva, Fabio

    2016-10-01

    The methodology used to assess the reliability of numerical simulation codes constitutes the Verification and Validation (V&V) procedure. V&V is composed by two separate tasks: the verification, which is a mathematical issue targeted to assess that the physical model is correctly solved, and the validation, which determines the consistency of the code results, and therefore of the physical model, with experimental data. In the present talk we focus our attention on the verification, which in turn is composed by the code verification, targeted to assess that a physical model is correctly implemented in a simulation code, and the solution verification, that quantifies the numerical error affecting a simulation. Bridging the gap between plasma physics and other scientific domains, we introduced for the first time in our domain a rigorous methodology for the code verification, based on the method of manufactured solutions, as well as a solution verification based on the Richardson extrapolation. This methodology was applied to GBS, a three-dimensional fluid code based on a finite difference scheme, used to investigate the plasma turbulence in basic plasma physics experiments and in the tokamak scrape-off layer. Overcoming the difficulty of dealing with a numerical method intrinsically affected by statistical noise, we have now generalized the rigorous verification methodology to simulation codes based on the particle-in-cell algorithm, which are employed to solve Vlasov equation in the investigation of a number of plasma physics phenomena.

  3. Product design and business model strategies for a circular economy

    NARCIS (Netherlands)

    Bocken, N.M.P.; de Pauw, I.C.; Bakker, C.A.; van der Grinten, B.

    The transition within business from a linear to a circular economy brings with it a range of practical challenges for companies. The following question is addressed: What are the product design and business model strategies for
    companies that want to move to a circular economy model? This paper

  4. Co-feeding strategy to enhance phytase production in Pichia pastoris

    African Journals Online (AJOL)

    The experimental designs, the methanol/L-alanine co-feeding strategy and optimization of phytase production by P. pastoris supported by the optimum levels of variables and lower temperature expression produced high level of phytase activity which could be scaled up to produce phytase for food additives at industrial ...

  5. A comparison of HK-CONWIP and BK-CONWIP control strategies in a multi-product manufacturing system

    Directory of Open Access Journals (Sweden)

    Chukwunonyelum Emmanuel Onyeocha

    2015-12-01

    Full Text Available This paper evaluates the performance of the Hybrid Kanban Constant Work-In-Process control strategy and Basestock Kanban Constant Work-In-Process control strategy operating Shared Kanban Allocation Policy (S-KAP and Dedicated Kanban Allocation Policy (D-KAP in a multi-product serial flow line. We explored the effect of an increase of product types on the WIP inventory in the system. A simulation-based optimisation technique was used in determining the optimal settings for the strategies. The strategies were compared via pairwise comparison technique and Nelson’s ranking and selection procedure. S-KAP responds quicker to demand than D-KAP. BK-CONWIP outperforms HK-CONWIP in a serial manufacturing system. It was shown that an increase in the number of product-type increases the number of PAC and WIP inventory.

  6. Efficient and Secure Fingerprint Verification for Embedded Devices

    Directory of Open Access Journals (Sweden)

    Sakiyama Kazuo

    2006-01-01

    Full Text Available This paper describes a secure and memory-efficient embedded fingerprint verification system. It shows how a fingerprint verification module originally developed to run on a workstation can be transformed and optimized in a systematic way to run real-time on an embedded device with limited memory and computation power. A complete fingerprint recognition module is a complex application that requires in the order of 1000 M unoptimized floating-point instruction cycles. The goal is to run both the minutiae extraction and the matching engines on a small embedded processor, in our case a 50 MHz LEON-2 softcore. It does require optimization and acceleration techniques at each design step. In order to speed up the fingerprint signal processing phase, we propose acceleration techniques at the algorithm level, at the software level to reduce the execution cycle number, and at the hardware level to distribute the system work load. Thirdly, a memory trace map-based memory reduction strategy is used for lowering the system memory requirement. Lastly, at the hardware level, it requires the development of specialized coprocessors. As results of these optimizations, we achieve a 65% reduction on the execution time and a 67% reduction on the memory storage requirement for the minutiae extraction process, compared against the reference implementation. The complete operation, that is, fingerprint capture, feature extraction, and matching, can be done in real-time of less than 4 seconds

  7. Verification and Performance Analysis for Embedded Systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2009-01-01

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems.......This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems....

  8. Inspection and verification of waste packages for near surface disposal

    International Nuclear Information System (INIS)

    2000-01-01

    Extensive experience has been gained with various disposal options for low and intermediate level waste at or near surface disposal facilities. Near surface disposal is based on proven and well demonstrated technologies. To ensure the safety of near surface disposal facilities when available technologies are applied, it is necessary to control and assure the quality of the repository system's performance, which includes waste packages, engineered features and natural barriers, as well as siting, design, construction, operation, closure and institutional controls. Recognizing the importance of repository performance, the IAEA is producing a set of technical publications on quality assurance and quality control (QA/QC) for waste disposal to provide Member States with technical guidance and current information. These publications cover issues on the application of QA/QC programmes to waste disposal, long term record management, and specific QA/QC aspects of waste packaging, repository design and R and D. Waste package QA/QC is especially important because the package is the primary barrier to radionuclide release from a disposal facility. Waste packaging also involves interface issues between the waste generator and the disposal facility operator. Waste should be packaged by generators to meet waste acceptance requirements set for a repository or disposal system. However, it is essential that the disposal facility operator ensure that waste packages conform with disposal facility acceptance requirements. Demonstration of conformance with disposal facility acceptance requirements can be achieved through the systematic inspection and verification of waste packages at both the waste generator's site and at the disposal facility, based on a waste package QA/QC programme established by the waste generator and approved by the disposal operator. However, strategies, approaches and the scope of inspection and verification will be somewhat different from country to country

  9. Customer driven marketing strategy of LIC international in Bahrain: a product specific study

    OpenAIRE

    Pillai, Rajasekharan; Rao, M S; Thampy, Jaik; Peter, Jerrin

    2011-01-01

    Abstract Marketing of service product requires a slightly different strategy owing to the idiosyncratic nature of service items. The present study explores the customer oriented marketing strategy of LIC International in the Kingdom of Bahrain. The approach of the study was exploratory and personal interview was conducted to contribute major input source to the research. The company has been following a different marketing strategy in the study area different from the conventional approach in...

  10. Tolerance Verification of Micro and Nano Structures on Polycarbonate Substrates

    DEFF Research Database (Denmark)

    Gasparin, Stefania; Tosello, Guido; Hansen, Hans Nørgaard

    2010-01-01

    Micro and nano structures are an increasing challenge in terms of tolerance verification and process quality control: smaller dimensions led to a smaller tolerance zone to be evaluated. This paper focuses on the verification of CD, DVD and HD-DVD nanoscale features. CD tolerance features are defi......Micro and nano structures are an increasing challenge in terms of tolerance verification and process quality control: smaller dimensions led to a smaller tolerance zone to be evaluated. This paper focuses on the verification of CD, DVD and HD-DVD nanoscale features. CD tolerance features...

  11. Learning strategies in the planning and evaluation phase of image production

    International Nuclear Information System (INIS)

    Larsson, W.; Aspelin, P.; Lundberg, N.

    2013-01-01

    This paper identifies, describes and analyses radiographers' learning strategies in practice. These strategies are particularly important in the light of the great changes in radiology departments and the role of radiographers during the past two decades. With increased responsibility for quality assurance and diagnostic work, radiographers need to develop specific skills over time, which requires learning strategies in practice. The aim of this study is to identify, describe and analyze the learning strategies of novice and experienced radiographers in the planning and evaluation phase of image production. This study found that novice radiographers; use memorization combined with logical reasoning, apply focused observation, selective reading and information-seeking, communicate through: active and attentive listening, asking questions, receiving feedback, discussing problems and speak out loud. Experienced radiographers; use memorization in combination with logical reasoning and predicting, observe discriminating, read selectively, validate information and perform information-seeking. They communicate through: listening analyzing and demanding way, answering questions and providing feed-back and discussing problems. This study concludes that the difference between the learning strategies of novice and experienced radiographers is in the way they apply the strategies rather than the strategies themselves

  12. An introduction to capital markets products, strategies, participants

    CERN Document Server

    Chisholm, Andrew M

    2002-01-01

    This comprehensive resource provides a complete introduction to global capital markets by explaining key instruments used in markets and their practical applications. An Introduction to Capital Marketsassumes no starting knowledge of the subject and begins with a general overview of the structure of the capital markets industry. Readers will quickly learn about swaps applications, options trading strategies, and much more. This introduction to financial markets offer valuable insights for anyone interested in the theory, practice, products, and applications within this field.

  13. Standard Verification System (SVS)

    Data.gov (United States)

    Social Security Administration — SVS is a mainframe program that accesses the NUMIDENT to perform SSN verifications. This program is called by SSA Internal applications to verify SSNs. There is also...

  14. Packaged low-level waste verification system

    International Nuclear Information System (INIS)

    Tuite, K.T.; Winberg, M.; Flores, A.Y.; Killian, E.W.; McIsaac, C.V.

    1996-01-01

    Currently, states and low-level radioactive waste (LLW) disposal site operators have no method of independently verifying the radionuclide content of packaged LLW that arrive at disposal sites for disposal. At this time, disposal sites rely on LLW generator shipping manifests and accompanying records to insure that LLW received meets the waste acceptance criteria. An independent verification system would provide a method of checking generator LLW characterization methods and help ensure that LLW disposed of at disposal facilities meets requirements. The Mobile Low-Level Waste Verification System (MLLWVS) provides the equipment, software, and methods to enable the independent verification of LLW shipping records to insure that disposal site waste acceptance criteria are being met. The MLLWVS system was developed under a cost share subcontract between WMG, Inc., and Lockheed Martin Idaho Technologies through the Department of Energy's National Low-Level Waste Management Program at the Idaho National Engineering Laboratory (INEL)

  15. Development of an inpatient operational pharmacy productivity model.

    Science.gov (United States)

    Naseman, Ryan W; Lopez, Ben R; Forrey, Ryan A; Weber, Robert J; Kipp, Kris M

    2015-02-01

    An innovative model for measuring the operational productivity of medication order management in inpatient settings is described. Order verification within a computerized prescriber order-entry system was chosen as the pharmacy workload driver. To account for inherent variability in the tasks involved in processing different types of orders, pharmaceutical products were grouped by class, and each class was assigned a time standard, or "medication complexity weight" reflecting the intensity of pharmacist and technician activities (verification of drug indication, verification of appropriate dosing, adverse-event prevention and monitoring, medication preparation, product checking, product delivery, returns processing, nurse/provider education, and problem-order resolution). The resulting "weighted verifications" (WV) model allows productivity monitoring by job function (pharmacist versus technician) to guide hiring and staffing decisions. A 9-month historical sample of verified medication orders was analyzed using the WV model, and the calculations were compared with values derived from two established models—one based on the Case Mix Index (CMI) and the other based on the proprietary Pharmacy Intensity Score (PIS). Evaluation of Pearson correlation coefficients indicated that values calculated using the WV model were highly correlated with those derived from the CMI-and PIS-based models (r = 0.845 and 0.886, respectively). Relative to the comparator models, the WV model offered the advantage of less period-to-period variability. The WV model yielded productivity data that correlated closely with values calculated using two validated workload management models. The model may be used as an alternative measure of pharmacy operational productivity. Copyright © 2015 by the American Society of Health-System Pharmacists, Inc. All rights reserved.

  16. Verification and synthesis of optimal decision strategies for complex systems

    International Nuclear Information System (INIS)

    Summers, S. J.

    2013-01-01

    Complex systems make a habit of disagreeing with the mathematical models strategically designed to capture their behavior. A recursive process ensues where data is used to gain insight into the disagreement. A simple model may give way to a model with hybrid dynamics. A deterministic model may give way to a model with stochastic dynamics. In many cases, the modeling framework that sufficiently characterises the system is both hybrid and stochastic; these systems are referred to as stochastic hybrid systems. This dissertation considers the stochastic hybrid system framework for modeling complex systems and provides mathematical methods for analysing, and synthesizing decision laws for, such systems. We first propose a stochastic reach-avoid problem for discrete time stochastic hybrid systems. In particular, we present a dynamic programming based solution to a probabilistic reach-avoid problem for a controlled discrete time stochastic hybrid system. We address two distinct interpretations of the reach-avoid problem via stochastic optimal control. In the first case, a sum-multiplicative cost function is introduced along with a corresponding dynamic recursion that quantifies the probability of hitting a target set at some point during a finite time horizon, while avoiding an unsafe set at all preceding time steps. In the second case, we introduce a multiplicative cost function and a dynamic recursion that quantifies the probability of hitting a target set at the terminal time, while avoiding an unsafe set at all preceding time steps. In each case, optimal reach-avoid control policies are derived as the solution to an optimal control problem via dynamic programming. We next introduce an extension of the reach-avoid problem where we consider the verification of discrete time stochastic hybrid systems when there exists uncertainty in the reachability specifications themselves. A sum multiplicative cost function is introduced along with a corresponding dynamic recursion

  17. Verification and synthesis of optimal decision strategies for complex systems

    Energy Technology Data Exchange (ETDEWEB)

    Summers, S. J.

    2013-07-01

    Complex systems make a habit of disagreeing with the mathematical models strategically designed to capture their behavior. A recursive process ensues where data is used to gain insight into the disagreement. A simple model may give way to a model with hybrid dynamics. A deterministic model may give way to a model with stochastic dynamics. In many cases, the modeling framework that sufficiently characterises the system is both hybrid and stochastic; these systems are referred to as stochastic hybrid systems. This dissertation considers the stochastic hybrid system framework for modeling complex systems and provides mathematical methods for analysing, and synthesizing decision laws for, such systems. We first propose a stochastic reach-avoid problem for discrete time stochastic hybrid systems. In particular, we present a dynamic programming based solution to a probabilistic reach-avoid problem for a controlled discrete time stochastic hybrid system. We address two distinct interpretations of the reach-avoid problem via stochastic optimal control. In the first case, a sum-multiplicative cost function is introduced along with a corresponding dynamic recursion that quantifies the probability of hitting a target set at some point during a finite time horizon, while avoiding an unsafe set at all preceding time steps. In the second case, we introduce a multiplicative cost function and a dynamic recursion that quantifies the probability of hitting a target set at the terminal time, while avoiding an unsafe set at all preceding time steps. In each case, optimal reach-avoid control policies are derived as the solution to an optimal control problem via dynamic programming. We next introduce an extension of the reach-avoid problem where we consider the verification of discrete time stochastic hybrid systems when there exists uncertainty in the reachability specifications themselves. A sum multiplicative cost function is introduced along with a corresponding dynamic recursion

  18. Design and verification of bituminous mixtures with the increased content of reclaimed asphalt pavement

    Science.gov (United States)

    Bańkowski, Wojciech; Król, Jan; Gałązka, Karol; Liphardt, Adam; Horodecka, Renata

    2018-05-01

    Recycling of bituminous pavements is an issue increasingly being discussed in Poland. The analysis of domestic and foreign experience indicates a need to develop this technology in our country, in particular the hot feeding and production technologies. Various steps are being taken in this direction, including research projects. One of them is the InnGA project entitled: “Reclaimed asphalt pavement: Innovative technology of bituminous mixtures using material from reclaimed asphalt pavement”. The paper presents the results of research involving the design of bituminous mixtures in accordance with the required properties and in excess of the content of reclaimed asphalt permitted by the technical guidelines. It presents selected bituminous mixtures with the content of RAP of up to 50% and the results of tests from verification of industrial production of those mixtures. The article discusses the details of the design process of mixtures with a high content of reclaimed asphalt, the carried out production tests and discusses the results of tests under the verification of industrial production. Testing included basic tests according to the Polish technical requirements of WT- 2 and the extended functional testing. The conducted tests and analyses helped to determine the usefulness of the developed bituminous mixtures for use in experimental sections and confirmed the possibility of using an increased amount of reclaimed asphalt up to 50% in mixtures intended for construction of national roads.

  19. Value creation strategies in credence food productions. The case of organic farming in Italy

    NARCIS (Netherlands)

    Pascucci, S.; Capitanio, F.; Giudice, Del T.

    2010-01-01

    In this paper we analyse different strategies used by Italian organic farmers to create value from credence food production. More specifically, we consider the following strategies: participation in policy support programmes (i.e. rural development measures and agro-environmental schemes), direct

  20. Improved vanillin production in baker's yeast through in silico design

    Science.gov (United States)

    2010-01-01

    Background Vanillin is one of the most widely used flavouring agents, originally obtained from cured seed pods of the vanilla orchid Vanilla planifolia. Currently vanillin is mostly produced via chemical synthesis. A de novo synthetic pathway for heterologous vanillin production from glucose has recently been implemented in baker's yeast, Saccharamyces cerevisiae. In this study we aimed at engineering this vanillin cell factory towards improved productivity and thereby at developing an attractive alternative to chemical synthesis. Results Expression of a glycosyltransferase from Arabidopsis thaliana in the vanillin producing S. cerevisiae strain served to decrease product toxicity. An in silico metabolic engineering strategy of this vanillin glucoside producing strain was designed using a set of stoichiometric modelling tools applied to the yeast genome-scale metabolic network. Two targets (PDC1 and GDH1) were selected for experimental verification resulting in four engineered strains. Three of the mutants showed up to 1.5 fold higher vanillin β-D-glucoside yield in batch mode, while continuous culture of the Δpdc1 mutant showed a 2-fold productivity improvement. This mutant presented a 5-fold improvement in free vanillin production compared to the previous work on de novo vanillin biosynthesis in baker's yeast. Conclusion Use of constraints corresponding to different physiological states was found to greatly influence the target predictions given minimization of metabolic adjustment (MOMA) as biological objective function. In vivo verification of the targets, selected based on their predicted metabolic adjustment, successfully led to overproducing strains. Overall, we propose and demonstrate a framework for in silico design and target selection for improving microbial cell factories. PMID:21059201

  1. Improved vanillin production in baker's yeast through in silico design

    Directory of Open Access Journals (Sweden)

    Hansen Jørgen

    2010-11-01

    Full Text Available Abstract Background Vanillin is one of the most widely used flavouring agents, originally obtained from cured seed pods of the vanilla orchid Vanilla planifolia. Currently vanillin is mostly produced via chemical synthesis. A de novo synthetic pathway for heterologous vanillin production from glucose has recently been implemented in baker's yeast, Saccharamyces cerevisiae. In this study we aimed at engineering this vanillin cell factory towards improved productivity and thereby at developing an attractive alternative to chemical synthesis. Results Expression of a glycosyltransferase from Arabidopsis thaliana in the vanillin producing S. cerevisiae strain served to decrease product toxicity. An in silico metabolic engineering strategy of this vanillin glucoside producing strain was designed using a set of stoichiometric modelling tools applied to the yeast genome-scale metabolic network. Two targets (PDC1 and GDH1 were selected for experimental verification resulting in four engineered strains. Three of the mutants showed up to 1.5 fold higher vanillin β-D-glucoside yield in batch mode, while continuous culture of the Δpdc1 mutant showed a 2-fold productivity improvement. This mutant presented a 5-fold improvement in free vanillin production compared to the previous work on de novo vanillin biosynthesis in baker's yeast. Conclusion Use of constraints corresponding to different physiological states was found to greatly influence the target predictions given minimization of metabolic adjustment (MOMA as biological objective function. In vivo verification of the targets, selected based on their predicted metabolic adjustment, successfully led to overproducing strains. Overall, we propose and demonstrate a framework for in silico design and target selection for improving microbial cell factories.

  2. As-Built Verification Plan Spent Nuclear Fuel Canister Storage Building MCO Handling Machine

    International Nuclear Information System (INIS)

    SWENSON, C.E.

    2000-01-01

    This as-built verification plan outlines the methodology and responsibilities that will be implemented during the as-built field verification activity for the Canister Storage Building (CSB) MCO HANDLING MACHINE (MHM). This as-built verification plan covers THE ELECTRICAL PORTION of the CONSTRUCTION PERFORMED BY POWER CITY UNDER CONTRACT TO MOWAT. The as-built verifications will be performed in accordance Administrative Procedure AP 6-012-00, Spent Nuclear Fuel Project As-Built Verification Plan Development Process, revision I. The results of the verification walkdown will be documented in a verification walkdown completion package, approved by the Design Authority (DA), and maintained in the CSB project files

  3. 37 CFR 262.7 - Verification of royalty payments.

    Science.gov (United States)

    2010-07-01

    ... Designated Agent have agreed as to proper verification methods. (b) Frequency of verification. A Copyright Owner or a Performer may conduct a single audit of the Designated Agent upon reasonable notice and... COPYRIGHT ARBITRATION ROYALTY PANEL RULES AND PROCEDURES RATES AND TERMS FOR CERTAIN ELIGIBLE...

  4. 40 CFR 1065.675 - CLD quench verification calculations.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false CLD quench verification calculations... POLLUTION CONTROLS ENGINE-TESTING PROCEDURES Calculations and Data Requirements § 1065.675 CLD quench verification calculations. Perform CLD quench-check calculations as follows: (a) Perform a CLD analyzer quench...

  5. Strategies for fuel cell product development. Developing fuel cell products in the technology supply chain

    International Nuclear Information System (INIS)

    Hellman, H.L.

    2004-01-01

    Due to the high cost of research and development and the broad spectrum of knowledge and competences required to develop fuel cell products, many product-developing firms outsource fuel cell technology, either partly or completely. This article addresses the inter-firm process of fuel cell product development from an Industrial Design Engineering perspective. The fuel cell product development can currently be characterised by a high degree of economic and technical uncertainty. Regarding the technology uncertainty: product-developing firms are more often then not unfamiliar with fuel cell technology technology. Yet there is a high interface complexity between the technology supplied and the product in which it is to be incorporated. In this paper the information exchange in three current fuel cell product development projects is analysed to determine the information required by a product designer to develop a fuel cell product. Technology transfer literature suggests that transfer effectiveness is greatest when the type of technology (technology uncertainty) and the type of relationship between the technology supplier and the recipient are carefully matched. In this line of thinking this paper proposes that the information required by a designer, determined by the design strategy and product/system volume, should be met by an appropriate level of communication interactivity with a technology specialist. (author)

  6. Consumer Intervention Mapping—A Tool for Designing Future Product Strategies within Circular Product Service Systems

    Directory of Open Access Journals (Sweden)

    Matt Sinclair

    2018-06-01

    Full Text Available Re-distributed manufacturing presents a number of opportunities and challenges for New Product Development in a future Circular Economy. It has been argued that small-scale, flexible and localised production systems will reduce resource consumption, lower transport emissions and extend product lifetimes. At the same time smart products within the Internet of Things will gather and report data on user behaviour and product status. Many sustainable design tools have previously been developed but few are able to imagine and develop visions of how future sustainable product service systems might be manifested. This paper introduces the concept of Consumer Intervention Mapping as a tool for creating future product strategies. The tool visualises the points within a product’s lifecycle where stakeholders are able to intervene in the product’s expected journey. This perspective enables the rapid construction of scenarios that explore and describe future circular product service systems. Validation of the tool in three workshops is described and the outcomes are presented. Consumer Intervention Mapping is successful in creating scenarios that describe existing product service systems and new product concepts adapted to a Circular Economy paradigm. Further work is required to refine the tool’s performance in more focused and reflective design exercises.

  7. Development and implementation strategy for the of product configuration systems in engineer-to-order companies

    DEFF Research Database (Denmark)

    Kristjansdottir, Katrin; Shafiee, Sara; Hvam, Lars

    2016-01-01

    This paper will address how to develop a strategy when developing and implementing product configuration systems (PCSs) in engineer-to-order (ETO) companies. PCSs are often gradually implemented especially where there are complex products and processes in order to break down the overall project...... and reduce risk. This highlights the importance of having an overall strategy to guide the long-term development and implementation of PCSs In this paper, guideline for making the strategy are provided and supplemented with examples based on a case study. The guideline includes the main objectives...... for the development and implementation process, PCSs to be used to support the sales and /or the engineering processes, more uniform IT support for making product configurations, combining output from different PCSs and finally integrations that includes both internal and external IT systems. Based...

  8. Analysis and Transformation Tools for Constrained Horn Clause Verification

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick

    2014-01-01

    Several techniques and tools have been developed for verification of properties expressed as Horn clauses with constraints over a background theory (CHC). Current CHC verification tools implement intricate algorithms and are often limited to certain subclasses of CHC problems. Our aim in this work...... is to investigate the use of a combination of off-the-shelf techniques from the literature in analysis and transformation of Constraint Logic Programs (CLPs) to solve challenging CHC verification problems. We find that many problems can be solved using a combination of tools based on well-known techniques from...... abstract interpretation, semantics-preserving transformations, program specialisation and query-answer transformations. This gives insights into the design of automatic, more general CHC verification tools based on a library of components....

  9. Strategies of bringing drug product marketing applications to meet current regulatory standards.

    Science.gov (United States)

    Wu, Yan; Freed, Anita; Lavrich, David; Raghavachari, Ramesh; Huynh-Ba, Kim; Shah, Ketan; Alasandro, Mark

    2015-08-01

    In the past decade, many guidance documents have been issued through collaboration of global organizations and regulatory authorities. Most of these are applicable to new products, but there is a risk that currently marketed products will not meet the new compliance standards during audits and inspections while companies continue to make changes through the product life cycle for continuous improvement or market demands. This discussion presents different strategies to bringing drug product marketing applications to meet current and emerging standards. It also discusses stability and method designs to meet process validation and global development efforts.

  10. Simulation-based design process for the verification of ITER remote handling systems

    International Nuclear Information System (INIS)

    Sibois, Romain; Määttä, Timo; Siuko, Mikko; Mattila, Jouni

    2014-01-01

    Highlights: •Verification and validation process for ITER remote handling system. •Simulation-based design process for early verification of ITER RH systems. •Design process centralized around simulation lifecycle management system. •Verification and validation roadmap for digital modelling phase. -- Abstract: The work behind this paper takes place in the EFDA's European Goal Oriented Training programme on Remote Handling (RH) “GOT-RH”. The programme aims to train engineers for activities supporting the ITER project and the long-term fusion programme. One of the projects of this programme focuses on the verification and validation (V and V) of ITER RH system requirements using digital mock-ups (DMU). The purpose of this project is to study and develop efficient approach of using DMUs in the V and V process of ITER RH system design utilizing a System Engineering (SE) framework. Complex engineering systems such as ITER facilities lead to substantial rise of cost while manufacturing the full-scale prototype. In the V and V process for ITER RH equipment, physical tests are a requirement to ensure the compliance of the system according to the required operation. Therefore it is essential to virtually verify the developed system before starting the prototype manufacturing phase. This paper gives an overview of the current trends in using digital mock-up within product design processes. It suggests a simulation-based process design centralized around a simulation lifecycle management system. The purpose of this paper is to describe possible improvements in the formalization of the ITER RH design process and V and V processes, in order to increase their cost efficiency and reliability

  11. Formal Verification Method for Configuration of Integrated Modular Avionics System Using MARTE

    Directory of Open Access Journals (Sweden)

    Lisong Wang

    2018-01-01

    Full Text Available The configuration information of Integrated Modular Avionics (IMA system includes almost all details of whole system architecture, which is used to configure the hardware interfaces, operating system, and interactions among applications to make an IMA system work correctly and reliably. It is very important to ensure the correctness and integrity of the configuration in the IMA system design phase. In this paper, we focus on modelling and verification of configuration information of IMA/ARINC653 system based on MARTE (Modelling and Analysis for Real-time and Embedded Systems. Firstly, we define semantic mapping from key concepts of configuration (such as modules, partitions, memory, process, and communications to components of MARTE element and propose a method for model transformation between XML-formatted configuration information and MARTE models. Then we present a formal verification framework for ARINC653 system configuration based on theorem proof techniques, including construction of corresponding REAL theorems according to the semantics of those key components of configuration information and formal verification of theorems for the properties of IMA, such as time constraints, spatial isolation, and health monitoring. After that, a special issue of schedulability analysis of ARINC653 system is studied. We design a hierarchical scheduling strategy with consideration of characters of the ARINC653 system, and a scheduling analyzer MAST-2 is used to implement hierarchical schedule analysis. Lastly, we design a prototype tool, called Configuration Checker for ARINC653 (CC653, and two case studies show that the methods proposed in this paper are feasible and efficient.

  12. Methods of Software Verification

    Directory of Open Access Journals (Sweden)

    R. E. Gurin

    2015-01-01

    Full Text Available This article is devoted to the problem of software verification (SW. Methods of software verification designed to check the software for compliance with the stated requirements such as correctness, system security and system adaptability to small changes in the environment, portability and compatibility, etc. These are various methods both by the operation process and by the way of achieving result. The article describes the static and dynamic methods of software verification and paid attention to the method of symbolic execution. In its review of static analysis are discussed and described the deductive method, and methods for testing the model. A relevant issue of the pros and cons of a particular method is emphasized. The article considers classification of test techniques for each method. In this paper we present and analyze the characteristics and mechanisms of the static analysis of dependencies, as well as their views, which can reduce the number of false positives in situations where the current state of the program combines two or more states obtained both in different paths of execution and in working with multiple object values. Dependences connect various types of software objects: single variables, the elements of composite variables (structure fields, array elements, the size of the heap areas, the length of lines, the number of initialized array elements in the verification code using static methods. The article pays attention to the identification of dependencies within the framework of the abstract interpretation, as well as gives an overview and analysis of the inference tools.Methods of dynamic analysis such as testing, monitoring and profiling are presented and analyzed. Also some kinds of tools are considered which can be applied to the software when using the methods of dynamic analysis. Based on the work a conclusion is drawn, which describes the most relevant problems of analysis techniques, methods of their solutions and

  13. Verification and Validation in Systems Engineering

    CERN Document Server

    Debbabi, Mourad; Jarraya, Yosr; Soeanu, Andrei; Alawneh, Luay

    2010-01-01

    "Verification and validation" represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle. Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic verification and validation of systems engineering design models expressed in standardized modeling languages. Their presentation includes a bird's eye view of the most prominent modeling languages for software and systems engineering, namely the Unified Model

  14. 37 CFR 260.6 - Verification of royalty payments.

    Science.gov (United States)

    2010-07-01

    ... verification of the payment of royalty fees to those parties entitled to receive such fees, according to terms... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Verification of royalty... COPYRIGHT ARBITRATION ROYALTY PANEL RULES AND PROCEDURES RATES AND TERMS FOR PREEXISTING SUBSCRIPTION...

  15. The Effects of Advertising Strategies on Consumer Trust: A Case of Skin Care Products in Taiwan

    Directory of Open Access Journals (Sweden)

    Velly Anatasia

    2016-09-01

    Full Text Available The main aim of this study was to develop advertising strategies in order to increase consumer trust. Four advertising elements: celebrity endorsement, branding, product attribute, and third party certification were investigated. Data were collected to answer two research questions: (1 To investigate the advertising strategies of skin care products leading to consumer trust, (2 To know the effects of advertising strategies in skin care products on consumer trust. A 5-point Likert scale survey was distributed to the female population in Taipei area. Via online and personal approaches, 266 questionnaires were returned. Targeting on 18-30 years old female skin care product users who stay in Taipei area more than six months, 240 qualified questionnaires were analyzed. The four independent variables are found having a significant relationship with trust in skin care advertising, in which branding has the greatest influence on increasing consumer trust. The control variable which is financial status is not found having statistically significant effect on consumer trust. To conclude, this study is dedicated to the communities in order to optimize their marketing strategies.

  16. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    Energy Technology Data Exchange (ETDEWEB)

    BAZINET, G.D.

    2001-05-15

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. Revision 1 documented verification actions that were pending at the time the initial report was prepared. Verification activities for the installed and operational SSCs have been completed. Verification of future additions to the CSB related to the canister cover cap and welding fixture system and MCO Internal Gas Sampling equipment will be completed as appropriate for those components. The open items related to verification of those requirements are noted in section 3

  17. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    Energy Technology Data Exchange (ETDEWEB)

    BAZINET, G.D.

    2000-11-03

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. The purpose of this revision is to document completion of verification actions that were pending at the time the initial report was prepared. Verification activities for the installed and operational SSCs have been completed. Verification of future additions to the CSB related to the canister cover cap and welding fixture system and MCO Internal Gas Sampling equipment will be completed as appropriate for those components. The open items related to verification of those

  18. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    International Nuclear Information System (INIS)

    BAZINET, G.D.

    2001-01-01

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. Revision 1 documented verification actions that were pending at the time the initial report was prepared. Verification activities for the installed and operational SSCs have been completed. Verification of future additions to the CSB related to the canister cover cap and welding fixture system and MCO Internal Gas Sampling equipment will be completed as appropriate for those components. The open items related to verification of those requirements are noted in section 3.1.5 and will be

  19. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    International Nuclear Information System (INIS)

    BAZINET, G.D.

    2000-01-01

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. The purpose of this revision is to document completion of verification actions that were pending at the time the initial report was prepared. Verification activities for the installed and operational SSCs have been completed. Verification of future additions to the CSB related to the canister cover cap and welding fixture system and MCO Internal Gas Sampling equipment will be completed as appropriate for those components. The open items related to verification of those requirements are noted

  20. The End-To-End Safety Verification Process Implemented to Ensure Safe Operations of the Columbus Research Module

    Science.gov (United States)

    Arndt, J.; Kreimer, J.

    2010-09-01

    The European Space Laboratory COLUMBUS was launched in February 2008 with NASA Space Shuttle Atlantis. Since successful docking and activation this manned laboratory forms part of the International Space Station(ISS). Depending on the objectives of the Mission Increments the on-orbit configuration of the COLUMBUS Module varies with each increment. This paper describes the end-to-end verification which has been implemented to ensure safe operations under the condition of a changing on-orbit configuration. That verification process has to cover not only the configuration changes as foreseen by the Mission Increment planning but also those configuration changes on short notice which become necessary due to near real-time requests initiated by crew or Flight Control, and changes - most challenging since unpredictable - due to on-orbit anomalies. Subject of the safety verification is on one hand the on orbit configuration itself including the hardware and software products, on the other hand the related Ground facilities needed for commanding of and communication to the on-orbit System. But also the operational products, e.g. the procedures prepared for crew and ground control in accordance to increment planning, are subject of the overall safety verification. In order to analyse the on-orbit configuration for potential hazards and to verify the implementation of the related Safety required hazard controls, a hierarchical approach is applied. The key element of the analytical safety integration of the whole COLUMBUS Payload Complement including hardware owned by International Partners is the Integrated Experiment Hazard Assessment(IEHA). The IEHA especially identifies those hazardous scenarios which could potentially arise through physical and operational interaction of experiments. A major challenge is the implementation of a Safety process which owns quite some rigidity in order to provide reliable verification of on-board Safety and which likewise provides enough

  1. Strategies for academic leadership towards increasing productivity in higher education institutions; business education case

    Directory of Open Access Journals (Sweden)

    Iordache-Platis Magdalena

    2017-07-01

    Full Text Available Higher education institutions face a lot of challenges in the contemporary context. Labour market is s strict evaluator of the graduates’ competences and skills and thus, of the study programmes. An attractive university is a university with a large demand for studies, with many partners and projects, with a high visibility at national and international level, with a considerable research production. At present, the lack of resources characterizes the difficult situation for decision making process which is a real challenge for the academic leadership. On one hand, the competiton requires the need of continuous development and of differentiation strategy while on the other hand, insufficient financial, human, material, informational resources, including time as a specific restriction generate huge opportunities and threats for institutions. Possibilities of being efficient are to be explored. The aim of this paper is to explore possible strategies to increase productivity in higher education institutions. Main objectives of the study are the following: a. to define productivity in higher education institutions, on the basis of the academics’ perceptions, as well as of students’ perceptions; b. to provide a diagnosis of the current state of the prductivity in higher education institutions; c. to contribute to new clarifications on leadership strategies for increasing productivity in higher education institutions. Based on the literature review, the paper reveal proper answers to questions, such as: what is productivity, how is it measured, what is its impact, which are the increasing possibilities in business context. The study methodology is also based on a questionnaire dedicated to the two groups of respondents – academics and students. Their perceptions are then compared in order to reveal the common view. Main output of the research include: a. A new conceptual clarification for the productivity in higher education institutions; b. A

  2. Photochemical production of ozone and control strategy for Southern Taiwan

    Science.gov (United States)

    Shiu, Chein-Jung; Liu, Shaw Chen; Chang, Chih-Chung; Chen, Jen-Ping; Chou, Charles C. K.; Lin, Chuan-Yao; Young, Chea-Yuan

    An observation-based method (OBM) is developed to evaluate the ozone (O 3) production efficiency (O 3 molecules produced per NO x molecule consumed) and O 3 production rate ( P(O 3)) during a field campaign in southern Taiwan. The method can also provide an estimate of the concentration of OH. A key step in the method is to use observed concentrations of two aromatic hydrocarbons, namely ethylbenzene and m, p-xylene, to estimate the degree of photochemical processing and amounts of photochemically consumed NO x and NMHCs by OH. In addition, total oxidant (O 3+NO 2) instead of O 3 itself turns out to be very useful for representing ozone production in the OBM approach. The average O 3 production efficiency during the field campaign in Fall (2003) is found to be about 10.2±3.9. The relationship of P(O 3) with NO x is examined and compared with a one-dimensional (1D) photochemical model. Values of P(O 3) derived from the OBM are slightly lower than those calculated in the 1D model. However, OH concentrations estimated by the OBM are about a factor of 2 lower than the 1D model. Fresh emissions, which affect the degree of photochemical processing appear to be a major cause of the underestimate. We have developed a three-dimensional (3D) OBM O 3 production diagram that resembles the EKMA ozone isopleth diagram to study the relationship of the total oxidant versus O 3 precursors. The 3D OBM O 3 production diagram suggests that reducing emissions of NMHCs are more effective in controlling O 3 than reducing NO x. However, significant uncertainties remain in the OBM, and considerable more work is required to minimize these uncertainties before a definitive control strategy can be reached. The observation-based approach provides a good alternative to measuring peroxy radicals for evaluating the production of O 3 and formulating O 3 control strategy in urban and suburban environments.

  3. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  4. Synthetic Strategies toward Natural Products Containing Contiguous Stereogenic Quaternary Carbon Atoms.

    Science.gov (United States)

    Büschleb, Martin; Dorich, Stéphane; Hanessian, Stephen; Tao, Daniel; Schenthal, Kyle B; Overman, Larry E

    2016-03-18

    Strategies for the total synthesis of complex natural products that contain two or more contiguous stereogenic quaternary carbon atoms in their intricate structures are reviewed with 12 representative examples. Emphasis has been put on methods to create quaternary carbon stereocenters, including syntheses of the same natural product by different groups, thereby showcasing the diversity of thought and individual creativity. A compendium of selected natural products containing two or more contiguous stereogenic quaternary carbon atoms and key reactions in their total or partial syntheses is provided in the Supporting Information. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. 78 FR 27882 - VA Veteran-Owned Small Business (VOSB) Verification Guidelines

    Science.gov (United States)

    2013-05-13

    ... Verification Self-Assessment Tool that walks the veteran through the regulation and how it applies to the...) Verification Guidelines AGENCY: Department of Veterans Affairs. ACTION: Advanced notice of proposed rulemaking... regulations governing the Department of Veterans Affairs (VA) Veteran-Owned Small Business (VOSB) Verification...

  6. Verification and validation for waste disposal models

    International Nuclear Information System (INIS)

    1987-07-01

    A set of evaluation criteria has been developed to assess the suitability of current verification and validation techniques for waste disposal methods. A survey of current practices and techniques was undertaken and evaluated using these criteria with the items most relevant to waste disposal models being identified. Recommendations regarding the most suitable verification and validation practices for nuclear waste disposal modelling software have been made

  7. Strategi Public Relations Hotel dalam Membentuk Citra Objek Wisata

    Directory of Open Access Journals (Sweden)

    Poppy Ruliana

    2015-01-01

    Full Text Available The purpose of this study is to determine the communication strategy of marketing through public relations approach between hotel and community. The model used in this study is a Public Relations strategy planning model of Cutlip, Center & Broom (2009. Method used in this research is descriptive qualitative approach. Data were collected by doing participatory observation, in-depth interviews, documentary studies and triangulation. Data wrere analyzed through the stages of data reduction, data presentation, conclusion and verification. Result shows that the PR strategy planning model proposed by Cutlip, Center & Broom can support this research.

  8. Development of a positioning strategy for a product to the millennials using the social media

    OpenAIRE

    Shetty, Sachidanand

    2018-01-01

    The aim of the diploma paper is to develop a positioning strategy for a product to the millennials using the social media. The diploma paper consists of three main parts. The first part is dedicated to the theoretical analysis which focusses on the concepts of positioning strategy, Factors which can influence a positioning strategy, development of a positioning strategy in the context of Social media and theoretical frameworks which can help in developing a positioning strategy. The second...

  9. Property-driven functional verification technique for high-speed vision system-on-chip processor

    Science.gov (United States)

    Nshunguyimfura, Victor; Yang, Jie; Liu, Liyuan; Wu, Nanjian

    2017-04-01

    The implementation of functional verification in a fast, reliable, and effective manner is a challenging task in a vision chip verification process. The main reason for this challenge is the stepwise nature of existing functional verification techniques. This vision chip verification complexity is also related to the fact that in most vision chip design cycles, extensive efforts are focused on how to optimize chip metrics such as performance, power, and area. Design functional verification is not explicitly considered at an earlier stage at which the most sound decisions are made. In this paper, we propose a semi-automatic property-driven verification technique. The implementation of all verification components is based on design properties. We introduce a low-dimension property space between the specification space and the implementation space. The aim of this technique is to speed up the verification process for high-performance parallel processing vision chips. Our experimentation results show that the proposed technique can effectively improve the verification effort up to 20% for the complex vision chip design while reducing the simulation and debugging overheads.

  10. A strategy for automatically generating programs in the lucid programming language

    Science.gov (United States)

    Johnson, Sally C.

    1987-01-01

    A strategy for automatically generating and verifying simple computer programs is described. The programs are specified by a precondition and a postcondition in predicate calculus. The programs generated are in the Lucid programming language, a high-level, data-flow language known for its attractive mathematical properties and ease of program verification. The Lucid programming is described, and the automatic program generation strategy is described and applied to several example problems.

  11. Design verification methodology for a solenoid valve for industrial applications

    International Nuclear Information System (INIS)

    Park, Chang Dae; Lim, Byung Ju; Chun, Kyung Yul

    2015-01-01

    Solenoid operated valves (SOV) are widely used in many applications due to their fast dynamic responses, cost effectiveness, and less contamination sensitive characteristics. In this paper, we tried to provide a convenient method of design verification of SOV to design engineers who depend on their experiences and experiment during design and development process of SOV. First, we summarize a detailed procedure for designing SOVs for industrial applications. All of the design constraints are defined in the first step of the design, and then the detail design procedure is presented based on design experiences as well as various physical and electromagnetic relationships. Secondly, we have suggested a verification method of this design using theoretical relationships, which enables optimal design of SOV from a point of view of safety factor of design attraction force. Lastly, experimental performance tests using several prototypes manufactured based on this design method show that the suggested design verification methodology is appropriate for designing new models of solenoids. We believe that this verification process is novel logic and useful to save time and expenses during development of SOV because verification tests with manufactured specimen may be substituted partly by this verification methodology.

  12. Potential of biogenic hydrogen production for hydrogen driven remediation strategies in marine environments.

    Science.gov (United States)

    Hosseinkhani, Baharak; Hennebel, Tom; Boon, Nico

    2014-09-25

    Fermentative production of bio-hydrogen (bio-H2) from organic residues has emerged as a promising alternative for providing the required electron source for hydrogen driven remediation strategies. Unlike the widely used production of H2 by bacteria in fresh water systems, few reports are available regarding the generation of biogenic H2 and optimisation processes in marine systems. The present research aims to optimise the capability of an indigenous marine bacterium for the production of bio-H2 in marine environments and subsequently develop this process for hydrogen driven remediation strategies. Fermentative conversion of organics in marine media to H2 using a marine isolate, Pseudoalteromonas sp. BH11, was determined. A Taguchi design of experimental methodology was employed to evaluate the optimal nutritional composition in batch tests to improve bio-H2 yields. Further optimisation experiments showed that alginate-immobilised bacterial cells were able to produce bio-H2 at the same rate as suspended cells over a period of several weeks. Finally, bio-H2 was used as electron donor to successfully dehalogenate trichloroethylene (TCE) using biogenic palladium nanoparticles as a catalyst. Fermentative production of bio-H2 can be a promising technique for concomitant generation of an electron source for hydrogen driven remediation strategies and treatment of organic residue in marine ecosystems. Copyright © 2014 Elsevier B.V. All rights reserved.

  13. Verification test report on a solar heating and hot water system

    Science.gov (United States)

    1978-01-01

    Information is provided on the development, qualification and acceptance verification of commercial solar heating and hot water systems and components. The verification includes the performances, the efficiences and the various methods used, such as similarity, analysis, inspection, test, etc., that are applicable to satisfying the verification requirements.

  14. Temporal Specification and Verification of Real-Time Systems.

    Science.gov (United States)

    1991-08-30

    of concrete real - time systems can be modeled adequately. Specification: We present two conservative extensions of temporal logic that allow for the...logic. We present both model-checking algorithms for the automatic verification of finite-state real - time systems and proof methods for the deductive verification of real - time systems .

  15. A verification regime for the spatial discretization of the SN transport equations

    Energy Technology Data Exchange (ETDEWEB)

    Schunert, S.; Azmy, Y. [North Carolina State Univ., Dept. of Nuclear Engineering, 2500 Stinson Drive, Raleigh, NC 27695 (United States)

    2012-07-01

    The order-of-accuracy test in conjunction with the method of manufactured solutions is the current state of the art in computer code verification. In this work we investigate the application of a verification procedure including the order-of-accuracy test on a generic SN transport solver that implements the AHOTN spatial discretization. Different types of semantic errors, e.g. removal of a line of code or changing a single character, are introduced randomly into the previously verified S{sub N} code and the proposed verification procedure is used to identify the coding mistakes (if possible) and classify them. Itemized by error type we record the stage of the verification procedure where the error is detected and report the frequency with which the errors are correctly identified at various stages of the verification. Errors that remain undetected by the verification procedure are further scrutinized to determine the reason why the introduced coding mistake eluded the verification procedure. The result of this work is that the verification procedure based on an order-of-accuracy test finds almost all detectable coding mistakes but rarely, 1.44% of the time, and under certain circumstances can fail. (authors)

  16. PROCESS OF INNOVATION IN PRODUCT LIFECYCLE MANAGEMENT BUSINESS STRATEGY

    OpenAIRE

    VALENTINA GECEVSKA; FRANC CUS; RADMIL POLENAKOVIC; PAOLO CHABERT

    2011-01-01

    This article proposes a scenario of Product Lifecycle Management (PLM), as a innovative business strategy based on the analysis of business drivers, industry requirements, limit of current solution, and recent state-of-the-art review in the domain related to PLM. Potential industrial impact of the developed PLM technology solutions is analyzed. It is hoped that the proposed PLM technology solutions will form the frontier basis for further research, development, and application of PLM systems ...

  17. Accident management strategy in Sweden - implementation and verification

    International Nuclear Information System (INIS)

    Loewenhielm, Gustaf; Engqvist, Alf; Espefaelt, Ralf

    1994-01-01

    A comprehensive program for severe accident mitigation was completed in Sweden by the end of 1988. As described in this paper, this program included plant modifications such as the introduction of filtered containment venting, and an accident management system comprising emergency operating strategies and procedures, training and emergency drills. The accident management system at Vattenfall has been further developed since 1988 and some results and experience from this development are reported in this paper. The main aspects covered concern the emergency organization and the supporting tools developed for use by the emergency response teams, the radiological implications such as accessibility to various locations and the long-term aspects of accident management. ((orig.))

  18. Performing Verification and Validation in Reuse-Based Software Engineering

    Science.gov (United States)

    Addy, Edward A.

    1999-01-01

    The implementation of reuse-based software engineering not only introduces new activities to the software development process, such as domain analysis and domain modeling, it also impacts other aspects of software engineering. Other areas of software engineering that are affected include Configuration Management, Testing, Quality Control, and Verification and Validation (V&V). Activities in each of these areas must be adapted to address the entire domain or product line rather than a specific application system. This paper discusses changes and enhancements to the V&V process, in order to adapt V&V to reuse-based software engineering.

  19. Environmental technology verification methods

    CSIR Research Space (South Africa)

    Szewczuk, S

    2016-03-01

    Full Text Available Environmental Technology Verification (ETV) is a tool that has been developed in the United States of America, Europe and many other countries around the world to help innovative environmental technologies reach the market. Claims about...

  20. Verification and Optimization of a PLC Control Schedule

    NARCIS (Netherlands)

    Brinksma, Hendrik; Mader, Angelika H.; Havelund, K.; Penix, J.; Visser, W.

    We report on the use of the SPIN model checker for both the verification of a process control program and the derivation of optimal control schedules. This work was carried out as part of a case study for the EC VHS project (Verification of Hybrid Systems), in which the program for a Programmable

  1. OPEC's production under fluctuating oil prices. Further test of the target revenue theory

    International Nuclear Information System (INIS)

    Ramcharran, H.

    2001-01-01

    Oil production cutbacks in recent years by OPEC members to stabilize price and to increase revenues warrant further empirical verification of the target revenue theory (TRT). We estimate a modified version of Griffin (1985) target revenue model using data from 1973 to 2000. The sample period, unlike previous investigations, includes phases of both price increase (1970s) and price decrease (1980s-1990s), thus providing a better framework for examining production behavior. The results, like the earlier study, are not supportive of the strict version of the TRT, however, evidence (negative and significant elasticity of supply) of the partial version are substantiated. Further empirical estimates do not support the competitive pricing model, hypothesizing a positive elasticity of supply. OPEC's loss of market share and the drop in the share of oil-based energy should signal an adjustment in pricing and production strategies

  2. Compressive sensing using optimized sensing matrix for face verification

    Science.gov (United States)

    Oey, Endra; Jeffry; Wongso, Kelvin; Tommy

    2017-12-01

    Biometric appears as one of the solutions which is capable in solving problems that occurred in the usage of password in terms of data access, for example there is possibility in forgetting password and hard to recall various different passwords. With biometrics, physical characteristics of a person can be captured and used in the identification process. In this research, facial biometric is used in the verification process to determine whether the user has the authority to access the data or not. Facial biometric is chosen as its low cost implementation and generate quite accurate result for user identification. Face verification system which is adopted in this research is Compressive Sensing (CS) technique, in which aims to reduce dimension size as well as encrypt data in form of facial test image where the image is represented in sparse signals. Encrypted data can be reconstructed using Sparse Coding algorithm. Two types of Sparse Coding namely Orthogonal Matching Pursuit (OMP) and Iteratively Reweighted Least Squares -ℓp (IRLS-ℓp) will be used for comparison face verification system research. Reconstruction results of sparse signals are then used to find Euclidean norm with the sparse signal of user that has been previously saved in system to determine the validity of the facial test image. Results of system accuracy obtained in this research are 99% in IRLS with time response of face verification for 4.917 seconds and 96.33% in OMP with time response of face verification for 0.4046 seconds with non-optimized sensing matrix, while 99% in IRLS with time response of face verification for 13.4791 seconds and 98.33% for OMP with time response of face verification for 3.1571 seconds with optimized sensing matrix.

  3. 340 and 310 drawing field verification

    International Nuclear Information System (INIS)

    Langdon, J.

    1996-01-01

    The purpose of the drawing field verification work plan is to provide reliable drawings for the 310 Treated Effluent Disposal Facility (TEDF) and 340 Waste Handling Facility (340 Facility). The initial scope of this work plan is to provide field verified and updated versions of all the 340 Facility essential drawings. This plan can also be used for field verification of any other drawings that the facility management directs to be so updated. Any drawings revised by this work plan will be issued in an AutoCAD format

  4. Verification of Scientific Simulations via Hypothesis-Driven Comparative and Quantitative Visualization

    Energy Technology Data Exchange (ETDEWEB)

    Ahrens, James P [ORNL; Heitmann, Katrin [ORNL; Petersen, Mark R [ORNL; Woodring, Jonathan [Los Alamos National Laboratory (LANL); Williams, Sean [Los Alamos National Laboratory (LANL); Fasel, Patricia [Los Alamos National Laboratory (LANL); Ahrens, Christine [Los Alamos National Laboratory (LANL); Hsu, Chung-Hsing [ORNL; Geveci, Berk [ORNL

    2010-11-01

    This article presents a visualization-assisted process that verifies scientific-simulation codes. Code verification is necessary because scientists require accurate predictions to interpret data confidently. This verification process integrates iterative hypothesis verification with comparative, feature, and quantitative visualization. Following this process can help identify differences in cosmological and oceanographic simulations.

  5. A strategy for vitrification product assurance and control with X-ray fluorescence spectrometry (PACX)

    International Nuclear Information System (INIS)

    Resce, J.L.

    1995-01-01

    A product control strategy is proposed for the vitrification of low-level and/or mixed waste. This strategy is called Product Assurance and Control with X-ray fluorescence spectrometry (PACX). The strategy utilizes sequential wavelength dispersive x-ray fluorescence spectrometry and standardless fundamental parameters calculations to analyze both the melter feed and the glassy products. The melter feed is sampled prior to addition to the melt tank and then melted and cast into samples which should closely resemble the product from the vitrification process itself. The resulting sample disks are then analyzed by x-ray fluorescence spectrometry. All elements with atomic numbers down to sodium can be determined directly and then either boron or lithium can be determined by difference from the mass balance. The XRF intensities are converted into oxide compositions with the use of a novel standardless fundamental parameters program. Previous work has shown that there is an excellent correlation between the XRF results and the results from conventional wet chemical analyses, but the XRF results can be obtained within two to three hours of sampling. If compositional control limits for durability are available, the product acceptability can be determined prior to the batch being introduced into the melter. The durability could also be estimated from a model, if available, which predicts product durability from composition. If the predicted durability is estimated to be too low, the model can then be used to determine additives which will raise the durability of the final product to within acceptable limits. The additives can then be incorporated into the batch prior to addition into the melter. A similar XRF analysis can be carried out on the glass product from the melter which can then be used to predict and thus assure product acceptance

  6. Raising the Bar on External Research Funding: Infrastructure and Strategies for Enhancing Faculty Productivity

    Science.gov (United States)

    Chval, Kathryn B.; Nossaman, Larry D.

    2014-01-01

    Administrators seek faculty who have the expertise to secure external funding to support their research agenda. Administrators also seek strategies to support and enhance faculty productivity across different ranks. In this manuscript, we describe the infrastructure we established and strategies we implemented to enhance the research enterprise at…

  7. Effect of methanol feeding strategies on production and yield of recombinant mouse endostatin from Pichia pastoris.

    Science.gov (United States)

    Trinh, L B; Phue, J N; Shiloach, Joseph

    2003-05-20

    Pichia pastoris, a methylotrophic yeast, is an efficient producer of recombinant proteins in which the heterologous gene is under the control of the methanol-induced AOX1 promoter. Hence, the accepted production procedure has two phases: In the first phase, the yeast utilizes glycerol and biomass is accumulated; in the second phase, the yeast utilizes methanol which is used both as an inducer for the expression of the recombinant protein and as a carbon source. Since the yeast is sensitive to methanol concentration, the methanol is supplied gradually to the growing culture. Three methanol addition strategies were evaluated for the purpose of optimizing recombinant endostatin production. Two strategies were based on the yeast metabolism; one responding to the methanol consumption using a methanol sensor, and the other responding to the oxygen consumption. In these two strategies, the methanol supply is unlimited. The third strategy was based on a predetermined exponential feeding rate, controling the growth rate at 0.02 h(-1), in this strategy the methanol supply is limited. Throughout the induction phase glycerol, in addition to methanol, was continuously added at a rate of 1 g L h(-1). Total endostatin production was similar in all three strategies, (400 mg was obtained from 3 L initial volume), but the amount of methanol added and the biomass produced were lower in the predetermined rate method. This caused the specific production of endostatin per biomass and per methanol to be 2 times higher in the predetermined rate than in the other two methods, making the growth control strategy not only more efficient but also more convenient for downstream processing. Copyright 2003 Wiley Periodicals, Inc. Biotechnol Bioeng 82: 438-444, 2003.

  8. Formal verification of Simulink/Stateflow diagrams a deductive approach

    CERN Document Server

    Zhan, Naijun; Zhao, Hengjun

    2017-01-01

    This book presents a state-of-the-art technique for formal verification of continuous-time Simulink/Stateflow diagrams, featuring an expressive hybrid system modelling language, a powerful specification logic and deduction-based verification approach, and some impressive, realistic case studies. Readers will learn the HCSP/HHL-based deductive method and the use of corresponding tools for formal verification of Simulink/Stateflow diagrams. They will also gain some basic ideas about fundamental elements of formal methods such as formal syntax and semantics, and especially the common techniques applied in formal modelling and verification of hybrid systems. By investigating the successful case studies, readers will realize how to apply the pure theory and techniques to real applications, and hopefully will be inspired to start to use the proposed approach, or even develop their own formal methods in their future work.

  9. TEST/QA PLAN FOR THE VERIFICATION TESTING OF ALTERNATIVES OR REFORMULATED LIQUID FUELS, FUEL ADDITIVES, FUEL EMULSONS, AND LUBRICANTS FOR HIGHWAY AND NONROAD USE HEAVY DUTY DIESEL ENGINES AND LIGHT DUTY GASOLINE ENGINES AND VEHICLES

    Science.gov (United States)

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  10. Ontology Matching with Semantic Verification.

    Science.gov (United States)

    Jean-Mary, Yves R; Shironoshita, E Patrick; Kabuka, Mansur R

    2009-09-01

    ASMOV (Automated Semantic Matching of Ontologies with Verification) is a novel algorithm that uses lexical and structural characteristics of two ontologies to iteratively calculate a similarity measure between them, derives an alignment, and then verifies it to ensure that it does not contain semantic inconsistencies. In this paper, we describe the ASMOV algorithm, and then present experimental results that measure its accuracy using the OAEI 2008 tests, and that evaluate its use with two different thesauri: WordNet, and the Unified Medical Language System (UMLS). These results show the increased accuracy obtained by combining lexical, structural and extensional matchers with semantic verification, and demonstrate the advantage of using a domain-specific thesaurus for the alignment of specialized ontologies.

  11. Interpolant tree automata and their application in Horn clause verification

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick

    2016-01-01

    This paper investigates the combination of abstract interpretation over the domain of convex polyhedra with interpolant tree automata, in an abstraction-refinement scheme for Horn clause verification. These techniques have been previously applied separately, but are combined in a new way in this ......This paper investigates the combination of abstract interpretation over the domain of convex polyhedra with interpolant tree automata, in an abstraction-refinement scheme for Horn clause verification. These techniques have been previously applied separately, but are combined in a new way...... clause verification problems indicates that the combination of interpolant tree automaton with abstract interpretation gives some increase in the power of the verification tool, while sometimes incurring a performance overhead....

  12. Synergies across verification regimes: Nuclear safeguards and chemical weapons convention compliance

    International Nuclear Information System (INIS)

    Kadner, Steven P.; Turpen, Elizabeth

    2001-01-01

    In the implementation of all arms control agreements, accurate verification is essential. In setting a course for verifying compliance with a given treaty - whether the NPT or the CWC, one must make a technical comparison of existing information-gathering capabilities against the constraints in an agreement. Then it must be decided whether this level of verifiability is good enough. Generally, the policy standard of 'effective verification' includes the ability to detect significant violations, with high confidence, in sufficient time to respond effectively with policy adjustments or other responses, as needed. It is at this juncture where verification approaches have traditionally diverged. Nuclear safeguards requirements have taken one path while chemical verification methods have pursued another. However, recent technological advances have brought a number of changes affecting verification, and lately their pace has been accelerating. First, all verification regimes have more and better information as a result of new kinds of sensors, imagery, and other technologies. Second, the verification provisions in agreements have also advanced, to include on-site inspections, portal monitoring, data exchanges, and a variety of transparency, confidence-building, and other cooperative measures, Together these developments translate into a technological overlap of certain institutional verification measures such as the NPT's safeguards requirements and the IAEA and the CWC's verification visions and the OPCW. Hence, a priority of international treaty-implementing organizations is exploring the development of a synergistic and coordinated approach to WMD policy making that takes into account existing inter-linkages between nuclear, chemical, and biological weapons issues. Specific areas of coordination include harmonizing information systems and information exchanges and the shared application of scientific mechanisms, as well as collaboration on technological developments

  13. Heavy water physical verification in power plants

    International Nuclear Information System (INIS)

    Morsy, S.; Schuricht, V.; Beetle, T.; Szabo, E.

    1986-01-01

    This paper is a report on the Agency experience in verifying heavy water inventories in power plants. The safeguards objectives and goals for such activities are defined in the paper. The heavy water is stratified according to the flow within the power plant, including upgraders. A safeguards scheme based on a combination of records auditing, comparing records and reports, and physical verification has been developed. This scheme has elevated the status of heavy water safeguards to a level comparable to nuclear material safeguards in bulk facilities. It leads to attribute and variable verification of the heavy water inventory in the different system components and in the store. The verification methods include volume and weight determination, sampling and analysis, non-destructive assay (NDA), and criticality check. The analysis of the different measurement methods and their limits of accuracy are discussed in the paper

  14. SU-E-T-490: Independent Three-Dimensional (3D) Dose Verification of VMAT/SBRT Using EPID and Cloud Computing

    Energy Technology Data Exchange (ETDEWEB)

    Ding, A; Han, B; Bush, K; Wang, L; Xing, L [Stanford University School of Medicine, Stanford, CA (United States)

    2015-06-15

    Purpose: Dosimetric verification of VMAT/SBRT is currently performed on one or two planes in a phantom with either film or array detectors. A robust and easy-to-use 3D dosimetric tool has been sought since the advent of conformal radiation therapy. Here we present such a strategy for independent 3D VMAT/SBRT plan verification system by a combined use of EPID and cloud-based Monte Carlo (MC) dose calculation. Methods: The 3D dosimetric verification proceeds in two steps. First, the plan was delivered with a high resolution portable EPID mounted on the gantry, and the EPID-captured gantry-angle-resolved VMAT/SBRT field images were converted into fluence by using the EPID pixel response function derived from MC simulations. The fluence was resampled and used as the input for an in-house developed Amazon cloud-based MC software to reconstruct the 3D dose distribution. The accuracy of the developed 3D dosimetric tool was assessed using a Delta4 phantom with various field sizes (square, circular, rectangular, and irregular MLC fields) and different patient cases. The method was applied to validate VMAT/SBRT plans using WFF and FFF photon beams (Varian TrueBeam STX). Results: It was found that the proposed method yielded results consistent with the Delta4 measurements. For points on the two detector planes, a good agreement within 1.5% were found for all the testing fields. Patient VMAT/SBRT plan studies revealed similar level of accuracy: an average γ-index passing rate of 99.2± 0.6% (3mm/3%), 97.4± 2.4% (2mm/2%), and 72.6± 8.4 % ( 1mm/1%). Conclusion: A valuable 3D dosimetric verification strategy has been developed for VMAT/SBRT plan validation. The technique provides a viable solution for a number of intractable dosimetry problems, such as small fields and plans with high dose gradient.

  15. SU-E-T-490: Independent Three-Dimensional (3D) Dose Verification of VMAT/SBRT Using EPID and Cloud Computing

    International Nuclear Information System (INIS)

    Ding, A; Han, B; Bush, K; Wang, L; Xing, L

    2015-01-01

    Purpose: Dosimetric verification of VMAT/SBRT is currently performed on one or two planes in a phantom with either film or array detectors. A robust and easy-to-use 3D dosimetric tool has been sought since the advent of conformal radiation therapy. Here we present such a strategy for independent 3D VMAT/SBRT plan verification system by a combined use of EPID and cloud-based Monte Carlo (MC) dose calculation. Methods: The 3D dosimetric verification proceeds in two steps. First, the plan was delivered with a high resolution portable EPID mounted on the gantry, and the EPID-captured gantry-angle-resolved VMAT/SBRT field images were converted into fluence by using the EPID pixel response function derived from MC simulations. The fluence was resampled and used as the input for an in-house developed Amazon cloud-based MC software to reconstruct the 3D dose distribution. The accuracy of the developed 3D dosimetric tool was assessed using a Delta4 phantom with various field sizes (square, circular, rectangular, and irregular MLC fields) and different patient cases. The method was applied to validate VMAT/SBRT plans using WFF and FFF photon beams (Varian TrueBeam STX). Results: It was found that the proposed method yielded results consistent with the Delta4 measurements. For points on the two detector planes, a good agreement within 1.5% were found for all the testing fields. Patient VMAT/SBRT plan studies revealed similar level of accuracy: an average γ-index passing rate of 99.2± 0.6% (3mm/3%), 97.4± 2.4% (2mm/2%), and 72.6± 8.4 % ( 1mm/1%). Conclusion: A valuable 3D dosimetric verification strategy has been developed for VMAT/SBRT plan validation. The technique provides a viable solution for a number of intractable dosimetry problems, such as small fields and plans with high dose gradient

  16. A Correctness Verification Technique for Commercial FPGA Synthesis Tools

    International Nuclear Information System (INIS)

    Kim, Eui Sub; Yoo, Jun Beom; Choi, Jong Gyun; Kim, Jang Yeol; Lee, Jang Soo

    2014-01-01

    Once the FPGA (Filed-Programmable Gate Array) designers designs Verilog programs, the commercial synthesis tools automatically translate the Verilog programs into EDIF programs so that the designers can have largely focused on HDL designs for correctness of functionality. Nuclear regulation authorities, however, require more considerate demonstration of the correctness and safety of mechanical synthesis processes of FPGA synthesis tools, even if the FPGA industry have acknowledged them empirically as correct and safe processes and tools. In order to assure of the safety, the industry standards for the safety of electronic/electrical devices, such as IEC 61508 and IEC 60880, recommend using the formal verification technique. There are several formal verification tools (i.e., 'FormalPro' 'Conformal' 'Formality' and so on) to verify the correctness of translation from Verilog into EDIF programs, but it is too expensive to use and hard to apply them to the works of 3rd-party developers. This paper proposes a formal verification technique which can contribute to the correctness demonstration in part. It formally checks the behavioral equivalence between Verilog and subsequently synthesized Net list with the VIS verification system. A Net list is an intermediate output of FPGA synthesis process, and EDIF is used as a standard format of Net lists. If the formal verification succeeds, then we can assure that the synthesis process from Verilog into Net list worked correctly at least for the Verilog used. In order to support the formal verification, we developed the mechanical translator 'EDIFtoBLIFMV,' which translates EDIF into BLIF-MV as an input front-end of VIS system, while preserving their behavior equivalence.. We performed the case study with an example of a preliminary version of RPS in a Korean nuclear power plant in order to provide the efficiency of the proposed formal verification technique and implemented translator. It

  17. A Correctness Verification Technique for Commercial FPGA Synthesis Tools

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Eui Sub; Yoo, Jun Beom [Konkuk University, Seoul (Korea, Republic of); Choi, Jong Gyun; Kim, Jang Yeol; Lee, Jang Soo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-10-15

    Once the FPGA (Filed-Programmable Gate Array) designers designs Verilog programs, the commercial synthesis tools automatically translate the Verilog programs into EDIF programs so that the designers can have largely focused on HDL designs for correctness of functionality. Nuclear regulation authorities, however, require more considerate demonstration of the correctness and safety of mechanical synthesis processes of FPGA synthesis tools, even if the FPGA industry have acknowledged them empirically as correct and safe processes and tools. In order to assure of the safety, the industry standards for the safety of electronic/electrical devices, such as IEC 61508 and IEC 60880, recommend using the formal verification technique. There are several formal verification tools (i.e., 'FormalPro' 'Conformal' 'Formality' and so on) to verify the correctness of translation from Verilog into EDIF programs, but it is too expensive to use and hard to apply them to the works of 3rd-party developers. This paper proposes a formal verification technique which can contribute to the correctness demonstration in part. It formally checks the behavioral equivalence between Verilog and subsequently synthesized Net list with the VIS verification system. A Net list is an intermediate output of FPGA synthesis process, and EDIF is used as a standard format of Net lists. If the formal verification succeeds, then we can assure that the synthesis process from Verilog into Net list worked correctly at least for the Verilog used. In order to support the formal verification, we developed the mechanical translator 'EDIFtoBLIFMV,' which translates EDIF into BLIF-MV as an input front-end of VIS system, while preserving their behavior equivalence.. We performed the case study with an example of a preliminary version of RPS in a Korean nuclear power plant in order to provide the efficiency of the proposed formal verification technique and implemented translator. It

  18. Fodder shrubs and fatty acids: strategies to reduce enteric methane production in cattle.

    Directory of Open Access Journals (Sweden)

    Juan Leonardo Cardona-Iglesias

    2016-12-01

    Full Text Available The aim of this study was to analyze the use of fodder shrubs and polyunsaturated fatty acids as a nutritional strategy to mitigate enteric methane production in cattle. Special emphasis was made on the use of Tithonia diversifolia (Hemsl. A. Gray (Mexican sun ower, as a species with antimethanogenic potential. Bibliographic information for this review was obtained between July and September 2015 by using key words. Methane is a powerful greenhouse gas (GHG, the increase of its atmospheric concentration is caused mainly by emissions from agriculture and industry, but it is also estimated that a proportion of methane is emitted by ruminants as a product of enteric and anaerobic fermentation of diet. This causes an environmental and productive problem in livestock production systems worldwide. Although there is controversy about the real contribution of methane by ruminants and its impact on environmental issues, the amount of emissions should try to be reduced.This document emphasizes the search for nutritional strategies such as supplementation with forage shrubs and sources of polyunsaturated fatty acids, which have shown potential to maintain animal production ef ciency and decrease enteric methane synthesis.

  19. Logic verification system for power plant sequence diagrams

    International Nuclear Information System (INIS)

    Fukuda, Mitsuko; Yamada, Naoyuki; Teshima, Toshiaki; Kan, Ken-ichi; Utsunomiya, Mitsugu.

    1994-01-01

    A logic verification system for sequence diagrams of power plants has been developed. The system's main function is to verify correctness of the logic realized by sequence diagrams for power plant control systems. The verification is based on a symbolic comparison of the logic of the sequence diagrams with the logic of the corresponding IBDs (interlock Block Diagrams) in combination with reference to design knowledge. The developed system points out the sub-circuit which is responsible for any existing mismatches between the IBD logic and the logic realized by the sequence diagrams. Applications to the verification of actual sequence diagrams of power plants confirmed that the developed system is practical and effective. (author)

  20. Formal verification of complex properties on PLC programs

    CERN Document Server

    Darvas, D; Voros, A; Bartha, T; Blanco Vinuela, E; Gonzalez Suarez, V M

    2014-01-01

    Formal verification has become a recommended practice in the safety-critical application areas. However, due to the complexity of practical control and safety systems, the state space explosion often prevents the use of formal analysis. In this paper we extend our former verification methodology with effective property preserving reduction techniques. For this purpose we developed general rule-based reductions and a customized version of the Cone of Influence (COI) reduction. Using these methods, the verification of complex requirements formalised with temporal logics (e.g. CTL, LTL) can be orders of magnitude faster. We use the NuSMV model checker on a real-life PLC program from CERN to demonstrate the performance of our reduction techniques.