WorldWideScience

Sample records for selection installation verification

  1. Automated Installation Verification of COMSOL via LiveLink for MATLAB

    International Nuclear Information System (INIS)

    Crowell, Michael W

    2015-01-01

    Verifying that a local software installation performs as the developer intends is a potentially time-consuming but necessary step for nuclear safety-related codes. Automating this process not only saves time, but can increase reliability and scope of verification compared to ''hand'' comparisons. While COMSOL does not include automatic installation verification as many commercial codes do, it does provide tools such as LiveLink"T"M for MATLAB® and the COMSOL API for use with Java® through which the user can automate the process. Here we present a successful automated verification example of a local COMSOL 5.0 installation for nuclear safety-related calculations at the Oak Ridge National Laboratory's High Flux Isotope Reactor (HFIR).

  2. Automated Installation Verification of COMSOL via LiveLink for MATLAB

    Energy Technology Data Exchange (ETDEWEB)

    Crowell, Michael W [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-01-01

    Verifying that a local software installation performs as the developer intends is a potentially time-consuming but necessary step for nuclear safety-related codes. Automating this process not only saves time, but can increase reliability and scope of verification compared to ‘hand’ comparisons. While COMSOL does not include automatic installation verification as many commercial codes do, it does provide tools such as LiveLink™ for MATLAB® and the COMSOL API for use with Java® through which the user can automate the process. Here we present a successful automated verification example of a local COMSOL 5.0 installation for nuclear safety-related calculations at the Oak Ridge National Laboratory’s High Flux Isotope Reactor (HFIR).

  3. 16th edition IEE wiring regulations design and verification of electrical installations

    CERN Document Server

    Scaddan, Brian

    1995-01-01

    This book builds on the basic knowledge and techniques covered in 16th Edition IEE Wiring Regulations Explained and Illustrated, providing the information and revision materials needed for the City & Guilds 2400 (Design, Erection and Verification ofElectrical Installations) exam. All Qualifying Managers will be required to gain this qualification, and Brian Scaddan's book is the ideal text for all students undertaking C&G 2400 courses.

  4. Installation with magnetic suspension of test bodies for measurement of small forces. Verification of equivalence of inertial and gravitational mass

    International Nuclear Information System (INIS)

    Kalebin, S.M.

    1988-01-01

    Torsion installation with magnetic suspension of test bodies for detection of small forces is considered. Installation application for verification of equivalence of inertial and gravitational mass in the case of test body incidence on the Earth (Etvesh experiment) and in the case of their incidene on the Sun (Dicke experiment) is discussed. The total mass of test bodies, produced in the form of cylinders with 3 cm radius, equals 50 kg (one lead body and one copper body); beam radius of test bodies equals 3 cm (the cylinders are tight against one another); ferrite cylinder with 3 cm radius and 10 cm height is used for their suspension in magnetic field. Effect of thermal noise and electromagnetic force disturbances on measurement results is considered. Conducted calculations show that suggested installation enables to improve the accuracy of verifying mentioned equivalence at least by one order and upwards. This suggests that such installation is a matter of interest for experiments on small force detection

  5. A New Integrated Threshold Selection Methodology for Spatial Forecast Verification of Extreme Events

    Science.gov (United States)

    Kholodovsky, V.

    2017-12-01

    Extreme weather and climate events such as heavy precipitation, heat waves and strong winds can cause extensive damage to the society in terms of human lives and financial losses. As climate changes, it is important to understand how extreme weather events may change as a result. Climate and statistical models are often independently used to model those phenomena. To better assess performance of the climate models, a variety of spatial forecast verification methods have been developed. However, spatial verification metrics that are widely used in comparing mean states, in most cases, do not have an adequate theoretical justification to benchmark extreme weather events. We proposed a new integrated threshold selection methodology for spatial forecast verification of extreme events that couples existing pattern recognition indices with high threshold choices. This integrated approach has three main steps: 1) dimension reduction; 2) geometric domain mapping; and 3) thresholds clustering. We apply this approach to an observed precipitation dataset over CONUS. The results are evaluated by displaying threshold distribution seasonally, monthly and annually. The method offers user the flexibility of selecting a high threshold that is linked to desired geometrical properties. The proposed high threshold methodology could either complement existing spatial verification methods, where threshold selection is arbitrary, or be directly applicable in extreme value theory.

  6. RETRAN-02 installation and verification for the CRAY computer

    International Nuclear Information System (INIS)

    1990-03-01

    The RETRAN-02 transient thermal-hydraulic analysis program developed by the Electric Power Research Institute (EPRI) has been selected as a tool for use in assessing the operation and safety of the SP-100 space reactor system being developed at Los Alamos National Laboratory (LANL). The released versions of RETRAN-02 are not operational on CRAY computer systems which are the primary mainframes in use at LANL requiring that the code be converted to the CRAY system. This document describes the code conversion, installation, and validation of the RETRAN-02/MOD004 code on the LANL CRAY computer system

  7. 24 CFR 3286.207 - Process for obtaining installation license.

    Science.gov (United States)

    2010-04-01

    ... installation license must submit verification of the experience required in § 3286.205(a). This verification may be in the form of statements by past or present employers or a self-certification that the applicant meets those experience requirements, but HUD may contact the applicant for additional verification...

  8. Selection and verification of safety parameters in safety parameter display system for nuclear power plants

    International Nuclear Information System (INIS)

    Zhang Yuangfang

    1992-02-01

    The method and results for safety parameter selection and its verification in safety parameter display system of nuclear power plants are introduced. According to safety analysis, the overall safety is divided into six critical safety functions, and a certain amount of safety parameters which can represent the integrity degree of each function and the causes of change are strictly selected. The verification of safety parameter selection is carried out from the view of applying the plant emergency procedures and in the accident man oeuvres on a full scale nuclear power plant simulator

  9. Transparencies used in describing the CTBT verification regime and its four monitoring technologies

    International Nuclear Information System (INIS)

    Basham, P.

    1999-01-01

    This presentation includes description of the CTBT verification regime and its four monitoring technologies, (namely, seismic monitoring, hydro acoustic monitoring, infrasound monitoring and radionuclides monitoring) CTBT global verification system, sequence of steps needed for installing an international monitoring system station which includes: site survey, site preparation and construction, equipment procurement and installation, final tests and certification

  10. Verification Techniques for Parameter Selection and Bayesian Model Calibration Presented for an HIV Model

    Science.gov (United States)

    Wentworth, Mami Tonoe

    Uncertainty quantification plays an important role when making predictive estimates of model responses. In this context, uncertainty quantification is defined as quantifying and reducing uncertainties, and the objective is to quantify uncertainties in parameter, model and measurements, and propagate the uncertainties through the model, so that one can make a predictive estimate with quantified uncertainties. Two of the aspects of uncertainty quantification that must be performed prior to propagating uncertainties are model calibration and parameter selection. There are several efficient techniques for these processes; however, the accuracy of these methods are often not verified. This is the motivation for our work, and in this dissertation, we present and illustrate verification frameworks for model calibration and parameter selection in the context of biological and physical models. First, HIV models, developed and improved by [2, 3, 8], describe the viral infection dynamics of an HIV disease. These are also used to make predictive estimates of viral loads and T-cell counts and to construct an optimal control for drug therapy. Estimating input parameters is an essential step prior to uncertainty quantification. However, not all the parameters are identifiable, implying that they cannot be uniquely determined by the observations. These unidentifiable parameters can be partially removed by performing parameter selection, a process in which parameters that have minimal impacts on the model response are determined. We provide verification techniques for Bayesian model calibration and parameter selection for an HIV model. As an example of a physical model, we employ a heat model with experimental measurements presented in [10]. A steady-state heat model represents a prototypical behavior for heat conduction and diffusion process involved in a thermal-hydraulic model, which is a part of nuclear reactor models. We employ this simple heat model to illustrate verification

  11. Portable system for periodical verification of area monitors for neutrons

    International Nuclear Information System (INIS)

    Souza, Luciane de R.; Leite, Sandro Passos; Lopes, Ricardo Tadeu; Patrao, Karla C. de Souza; Fonseca, Evaldo S. da; Pereira, Walsan W.

    2009-01-01

    The Neutrons Laboratory develops a project viewing the construction of a portable test system for verification of functioning conditions of neutron area monitors. This device will allow to the users the verification of the calibration maintenance of his instruments at the use installations, avoiding the use of an inadequate equipment related to his answer to the neutron beam response

  12. Independent verification of the delivered dose in High-Dose Rate (HDR) brachytherapy

    International Nuclear Information System (INIS)

    Portillo, P.; Feld, D.; Kessler, J.

    2009-01-01

    An important aspect of a Quality Assurance program in Clinical Dosimetry is an independent verification of the dosimetric calculation done by the Treatment Planning System for each radiation treatment. The present paper is aimed at creating a spreadsheet for the verification of the dose recorded at a point of an implant with radioactive sources and HDR in gynecological injuries. An 192 Ir source automatic differed loading equipment, GammaMedplus model, Varian Medical System with HDR installed at the Angel H. Roffo Oncology Institute has been used. The planning system implemented for getting the dose distribution is the BraquiVision. The sources coordinates as well as those of the calculation point (Rectum) are entered into the Excel-devised verification program by assuming the existence of a point source in each one of the applicators' positions. Such calculation point has been selected as the rectum is an organ at risk, therefore determining the treatment planning. The dose verification is performed at points standing at a sources distance having at least twice the active length of such sources, so they may be regarded as point sources. Most of the sources used in HDR brachytherapy with 192 Ir have a 5 mm active length for all equipment brands. Consequently, the dose verification distance must be at least of 10 mm. (author)

  13. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS FROM SELECTIVE CATALYTIC REDUCTIONS CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    Science.gov (United States)

    The protocol describes the Environmental Technology Verification (ETV) Program's considerations and requirements for verification of emissions reduction provided by selective catalytic reduction (SCR) technologies. The basis of the ETV will be comparison of the emissions and perf...

  14. FY 1998 report on the results of the New Sunshine Project - Development of the commercialization technology of the photovoltaic power system. Verification study of the photovoltaic power system - Research on engineering methods for cost effective PV installation; 1998 nendo taiyoko hatsuden system jitsuyoka gijutsu kaihatsu seika hokokusho. Taiyoko hatsuden system no jissho kenkyu (tashu secchi koho no kenkyu kaihatsu)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    For the purpose of promoting installations of PV system and making use of the unused space for which a rise in the PV demand equal to that in houses, building roofs, etc. is expected, examination/research for much newer forms of land installation are proceeded with, and evaluation/verification of reliability/durability are conducted of new installation processes using thin film solar cells, adhesives, etc. In this fiscal year, study of the development/verification of low cost floating pedestal was promoted, and at the same time, examinational study of forms of land installation was made. As to the development of low cost floating pedestal, the module type flexible floating pedestal was developed as a small prototype pedestal and tested for installation in a pool. Survey was also carried out of geometry, mooring systems, materials, design conditions, and existing instances of different floats, and measures were studied for the effective use of the floating system. In relation to reliability and durability evaluation of the new installation process, the verification operation of evaluation facilities for various installation processes was continued, and the power generation capacity was made clear in special forms of installation such as installations on vertical/horizontal surfaces. And the study was made of the large area frameless structure, building use double glass structure, and durability of the adhesive/adhesive tape process of thin film solar cells. (NEDO)

  15. Multi-canister overpack project - verification and validation, MCNP 4A

    International Nuclear Information System (INIS)

    Goldmann, L.H.

    1997-01-01

    This supporting document contains the software verification and validation (V and V) package used for Phase 2 design of the Spent Nuclear Fuel Multi-Canister Overpack. V and V packages for both ANSYS and MCNP are included. Description of Verification Run(s): This software requires that it be compiled specifically for the machine it is to be used on. Therefore to facilitate ease in the verification process the software automatically runs 25 sample problems to ensure proper installation and compilation. Once the runs are completed the software checks for verification by performing a file comparison on the new output file and the old output file. Any differences between any of the files will cause a verification error. Due to the manner in which the verification is completed a verification error does not necessarily indicate a problem. This indicates that a closer look at the output files is needed to determine the cause of the error

  16. Diel habitat selection of largemouth bass following woody structure installation in Table Rock Lake, Missouri

    Science.gov (United States)

    Harris, J.M.; Paukert, Craig P.; Bush, S.C.; Allen, M.J.; Siepker, Michael

    2018-01-01

    Largemouth bass Micropterus salmoides (Lacepède) use of installed habitat structure was evaluated in a large Midwestern USA reservoir to determine whether or not these structures were used in similar proportion to natural habitats. Seventy largemouth bass (>380 mm total length) were surgically implanted with radio transmitters and a subset was relocated monthly during day and night for one year. The top habitat selection models (based on Akaike's information criterion) suggest largemouth bass select 2–4 m depths during night and 4–7 m during day, whereas littoral structure selection was similar across diel periods. Largemouth bass selected boat docks at twice the rate of other structures. Installed woody structure was selected at similar rates to naturally occurring complex woody structure, whereas both were selected at a higher rate than simple woody structure. The results suggest the addition of woody structure may concentrate largemouth bass and mitigate the loss of woody habitat in a large reservoir.

  17. Agricultural biogas. Intermediate assessment - Biogas Mission. The Energivie Program - Projects of development of farm-based methanization. Site selection, Visits of installations, Consultation of installers

    International Nuclear Information System (INIS)

    Maurer, Michel

    2005-06-01

    A first document presents Alsace pilot projects: technical and economic recalls, site pre-selection, project leader, description of the mobilisation of lipid co-substrates (interest of fats, modalities), regulatory context (for biogas production, electric energy supply and digestate use). It also presents installer companies which have been consulted for these projects. Another document proposes technical and economical analyses of proposals made by installers, and an analysis of deadlocking points for these pilot projects. Technical, economic, and environmental elements, as well as those dealing with installation management, costs and construction delays to be provided by the consulted company are indicated and commented

  18. The effect of the variable frequency drive of the CNC roll grinding machine on the operation of other devices in low-voltage electrical installation

    Directory of Open Access Journals (Sweden)

    Simić Ninoslav

    2016-01-01

    Full Text Available This paper presents one of the observations that have been collected during the years of testing of electrical installations. A typical case from industrial plant in which are installed loads with variable frequency regulation is analyzed. We propose a simple way by measuring the frequency of the voltage in the objects, to establish the existence of possible irregularities in the operation of the individual units and analyze the influence of the current and voltage signal shape of one load to the work of other loads in the plant. The need for verification of electrical installations immediately upon receipt and installation of electrical equipment is emphasized and the use of the latest standards in the design and selection of equipment, in order to avoid unplanned expenses is recommended.

  19. Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection

    OpenAIRE

    Ma, Zhongmin

    2014-01-01

    The open source structure of Android applications introduces security vulnerabilities that can be readily exploited by third-party applications. We address certain vulnerabilities at both installation and runtime using machine learning. Effective classification techniques with neural networks can be used to verify the application categories on installation. We devise a novel application category verification methodology that involves machine learning the application permissions...

  20. Quality assurance in nuclear installations

    International Nuclear Information System (INIS)

    Torres M, Nelson.

    1985-08-01

    It has been proven that the bad quality of products, equipment, installations, and services is not due to the lack of tests, experiments and verifications. The main causes are associated with insufficient organization of the activities that have influence on the quality. The garantee of quality is conceptualized as an appropriate instrument composed of normalized criteria initially in advanced technologies. Such as nuclear science and aerospace technology. However, with the appropriate modifications it can be applied to conventional technologies

  1. Installation of spectrally selective imaging system in RF negative ion source

    International Nuclear Information System (INIS)

    Ikeda, K.; Kisaki, M.; Nagaoka, K.; Nakano, H.; Osakabe, M.; Tsumori, K.; Kaneko, O.; Takeiri, Y.; Wünderlich, D.; Fantz, U.; Heinemann, B.; Geng, S.

    2016-01-01

    A spectrally selective imaging system has been installed in the RF negative ion source in the International Thermonuclear Experimental Reactor-relevant negative ion beam test facility ELISE (Extraction from a Large Ion Source Experiment) to investigate distribution of hydrogen Balmer-α emission (H α ) close to the production surface of hydrogen negative ion. We selected a GigE vision camera coupled with an optical band-path filter, which can be controlled remotely using high speed network connection. A distribution of H α emission near the bias plate has been clearly observed. The same time trend on H α intensities measured by the imaging diagnostic and the optical emission spectroscopy is confirmed

  2. 40 CFR 1065.370 - CLD CO2 and H2O quench verification.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false CLD CO2 and H2O quench verification....370 CLD CO2 and H2O quench verification. (a) Scope and frequency. If you use a CLD analyzer to measure NOX, verify the amount of H2O and CO2 quench after installing the CLD analyzer and after major...

  3. SORO post-simulations of Bruce A Unit 4 in-core flux detector verification tests

    Energy Technology Data Exchange (ETDEWEB)

    Braverman, E.; Nainer, O. [Bruce Power, Nuclear Safety Analysis and Support Dept., Toronto, Ontario (Canada)]. E-mail: Evgeny.Braverman@brucepower.com; Ovidiu.Nainer@brucepower.com

    2004-07-01

    During the plant equipment assessment prior to requesting approval for restart of Bruce A Units 3 and 4 it was determined that all in-core flux detectors needed to be replaced. Flux detector verification tests were performed to confirm that the newly installed detectors had been positioned according to design specifications and that their response closely follows the calculated flux shape changes caused by selected reactivity mechanism movements. By comparing the measured and post-simulated RRS and NOP detector responses to various perturbations, it was confirmed that the new detectors are wired and positioned correctly. (author)

  4. Perspex in the verification routines for accelerator beam

    International Nuclear Information System (INIS)

    Paredes G, L.; Genis S, R.

    1998-01-01

    It is analyzed the use of a perspex solid phantom, adequately referred to a water phantom, as an auxiliary alternative for the daily stability verification routines or constance of radiation beam, as an option in the case of radiotherapy installations with high charge of accelerator working and with basic dosimetry equipment. (Author)

  5. DOE-EPRI distributed wind Turbine Verification Program (TVP III)

    Energy Technology Data Exchange (ETDEWEB)

    McGowin, C.; DeMeo, E. [Electric Power Research Institute, Palo Alto, CA (United States); Calvert, S. [Dept. of Energy, Washington, DC (United States)] [and others

    1997-12-31

    In 1992, the Electric Power Research Institute (EPRI) and the U.S. Department of Energy (DOE) initiated the Utility Wind Turbine Verification Program (TVP). The goal of the program is to evaluate prototype advanced wind turbines at several sites developed by U.S. electric utility companies. Two six MW wind projects have been installed under the TVP program by Central and South West Services in Fort Davis, Texas and Green Mountain Power Corporation in Searsburg, Vermont. In early 1997, DOE and EPRI selected five more utility projects to evaluate distributed wind generation using smaller {open_quotes}clusters{close_quotes} of wind turbines connected directly to the electricity distribution system. This paper presents an overview of the objectives, scope, and status of the EPRI-DOE TVP program and the existing and planned TVP projects.

  6. Verification of failover effects from distributed control system communication networks in digitalized nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Min, Moon Gi; Lee, Jae Ki; Lee, Kwang Hyun; Lee, Dong Il; Lim, Hee Taek [Korea Hydro and Nuclear Power Co., Ltd, Daejeon (Korea, Republic of)

    2017-08-15

    Distributed Control System (DCS) communication networks, which use Fast Ethernet with redundant networks for the transmission of information, have been installed in digitalized nuclear power plants. Normally, failover tests are performed to verify the reliability of redundant networks during design and manufacturing phases; however, systematic integrity tests of DCS networks cannot be fully performed during these phases because all relevant equipment is not installed completely during these two phases. In additions, practical verification tests are insufficient, and there is a need to test the actual failover function of DCS redundant networks in the target environment. The purpose of this study is to verify that the failover functions works correctly in certain abnormal conditions during installation and commissioning phase and identify the influence of network failover on the entire DCS. To quantify the effects of network failover in the DCS, the packets (Protocol Data Units) must be collected and resource usage of the system has to be monitored and analyzed. This study introduces the use of a new methodology for verification of DCS network failover during the installation and commissioning phases. This study is expected to provide insight into verification methodology and the failover effects from DCS redundant networks. It also provides test results of network performance from DCS network failover in digitalized domestic nuclear power plants (NPPs)

  7. Systematic study of source mask optimization and verification flows

    Science.gov (United States)

    Ben, Yu; Latypov, Azat; Chua, Gek Soon; Zou, Yi

    2012-06-01

    Source mask optimization (SMO) emerged as powerful resolution enhancement technique (RET) for advanced technology nodes. However, there is a plethora of flow and verification metrics in the field, confounding the end user of the technique. Systemic study of different flows and the possible unification thereof is missing. This contribution is intended to reveal the pros and cons of different SMO approaches and verification metrics, understand the commonality and difference, and provide a generic guideline for RET selection via SMO. The paper discusses 3 different type of variations commonly arise in SMO, namely pattern preparation & selection, availability of relevant OPC recipe for freeform source and finally the metrics used in source verification. Several pattern selection algorithms are compared and advantages of systematic pattern selection algorithms are discussed. In the absence of a full resist model for SMO, alternative SMO flow without full resist model is reviewed. Preferred verification flow with quality metrics of DOF and MEEF is examined.

  8. Proper Installation of Replacement Windows | Efficient Windows

    Science.gov (United States)

    Collaborative Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring

  9. Selected Examples of LDRD Projects Supporting Test Ban Treaty Verification and Nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Al-Ayat, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Walter, W. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-02-23

    The Laboratory Directed Research and Development (LDRD) Program at the DOE National Laboratories was established to ensure the scientific and technical vitality of these institutions and to enhance the their ability to respond to evolving missions and anticipate national needs. LDRD allows the Laboratory directors to invest a percentage of their total annual budget in cutting-edge research and development projects within their mission areas. We highlight a selected set of LDRD-funded projects, in chronological order, that have helped provide capabilities, people and infrastructure that contributed greatly to our ability to respond to technical challenges in support of test ban treaty verification and nonproliferation.

  10. The use of the hybrid K-edge densitometer for routine analysis of safeguards verification samples of reprocessing input liquor

    International Nuclear Information System (INIS)

    Ottmar, H.; Eberle, H.

    1991-01-01

    Following successful tests of a hybrid K-edge instrument at TUI Karlsruhe and the routine use of a K-edge densitometer for safeguards verification at the same laboratory, the Euratom Safeguards Directorate of the Commission of the European Communities decided to install the first such instrument into a large industrial reprocessing plant for the routine verification of samples taken from the input accountancy tanks. This paper reports on the installation, calibration, sample handling procedure and the performance of this instrument after one year of routine operation

  11. Safety of nuclear installations

    International Nuclear Information System (INIS)

    1991-01-01

    In accordance with the Nuclear Energy Act, a Licence may only be issued if the precautions required by the state of the art have been taken to prevent damage resulting from the construction and operation of the installation. The maximum admissible body doses in the area around the installation which must be observed in planning constructional and other technical protective measures to counter accidents in or at a nuclear power station (accident planning values, are established). According to the Radiological Protection Ordinance the Licensing Authority can consider these precautions to have been taken if, in designing the installation against accidents, the applicant has assumed the accidents which, according to the Safety Criteria and Guidelines for Nuclear Power Stations published in the Federal Register by the Federal Minister of the Interior after hearing the competent senior state authorities, must determine the design of a nuclear power station. On the basis of previous experience from safety analysis, assessment and operation of nuclear power stations, the accident guidelines published here define which accidents are determinative for the safety-related design of PWR power stations and what verification -particularly with regard to compliance with the accident planning values of the Radiological Protection Ordinance -must be provided by the applicant. (author)

  12. Feasibility study on the transient fuel test loop installation

    International Nuclear Information System (INIS)

    Kim, J. Y.; Lee, C. Y.

    1997-02-01

    The design and installation of the irradiation test facility for verification test of the fuel performance are very important in connection with maximization of the utilization of HANARO. The objective of this study is to investigate and analyze the test capsules and loops in research reactors of the other countries and to design preliminarily the eligible transient fuel test facility to be installed in HANARO. The principle subjects of this study are to analyze the contents, kinds and scopes of the irradiation test facilities for nuclear technology development. The guidances for the basic and detail design of the transient fuel test facility in the future are presented. The investigation and analysis of various kinds of test facilities that are now in operation at the research reactors of nuclear advanced countries are carried out. Based on the design data of HANARO the design materials for an eligible transient fuel test facility comprises two pacts : namely, in pile test fuel in reactor core site, and out of pile system regulates the experimental conditions in the in pile test section. Especially for power ramping and cycling selection of the eligible power variation equipment in HANARO is carried out. (author). 13 refs., 4 tabs., 46 figs

  13. Formal Verification of Computerized Procedure with Colored Petri Nets

    International Nuclear Information System (INIS)

    Kim, Yun Goo; Shin, Yeong Cheol

    2008-01-01

    Computerized Procedure System (CPS) supports nuclear power plant operators in performing operating procedures which are instructions to guide in monitoring, decision making and controlling nuclear power plants. Computerized Procedure (CP) should be loaded to CPS. Due to its execution characteristic, computerized procedure acts like a software in CPS. For example, procedure flows are determined by operator evaluation and computerized procedure logic which are pre-defined. So the verification of Computerized Procedure logic and execution flow is needed before computerized procedures are installed in the system. Formal verification methods are proposed and the modeling of operating procedures with Coloured Petri Nets(CP-nets) is presented

  14. Radiators in hydronic heating installations structure, selection and thermal characteristics

    CERN Document Server

    Muniak, Damian Piotr

    2017-01-01

    This book addresses key design and computational issues related to radiators in hydronic heating installations. A historical outline is included to highlight the evolution of radiators and heating technologies. Further, the book includes a chapter on thermal comfort, which is the decisive factor in selecting the ideal heating system and radiator type. The majority of the book is devoted to an extensive discussion of the types and kinds of radiators currently in use, and to identifying the reasons for the remarkable diversity of design solutions. The differences between the solutions are also addressed, both in terms of the effects of operation and of the thermal comfort that needs to be ensured. The book then compares the advantages and disadvantages of each solution, as well as its potential applications. A detailed discussion, supported by an extensive theoretical and mathematical analysis, is presented of the computational relations that are used in selecting the radiator type. The dynamics of radiator hea...

  15. MFTF sensor verification computer program

    International Nuclear Information System (INIS)

    Chow, H.K.

    1984-01-01

    The design, requirements document and implementation of the MFE Sensor Verification System were accomplished by the Measurement Engineering Section (MES), a group which provides instrumentation for the MFTF magnet diagnostics. The sensors, installed on and around the magnets and solenoids, housed in a vacuum chamber, will supply information about the temperature, strain, pressure, liquid helium level and magnet voltage to the facility operator for evaluation. As the sensors are installed, records must be maintained as to their initial resistance values. Also, as the work progresses, monthly checks will be made to insure continued sensor health. Finally, after the MFTF-B demonstration, yearly checks will be performed as well as checks of sensors as problem develops. The software to acquire and store the data was written by Harry Chow, Computations Department. The acquired data will be transferred to the MFE data base computer system

  16. Reload core safety verification

    International Nuclear Information System (INIS)

    Svetlik, M.; Minarcin, M.

    2003-01-01

    This paper presents a brief look at the process of reload core safety evaluation and verification in Slovak Republic. It gives an overview of experimental verification of selected nuclear parameters in the course of physics testing during reactor start-up. The comparison of IAEA recommendations and testing procedures at Slovak and European nuclear power plants of similar design is included. An introduction of two level criteria for evaluation of tests represents an effort to formulate the relation between safety evaluation and measured values (Authors)

  17. Safety of nuclear installations in Slovakia

    International Nuclear Information System (INIS)

    1998-01-01

    In this part next aspects are described: (1) Site selection (Legislation related to site selection; Meeting criteria at Bohunice and Mochovce sites; International agreements); (2) Design preparation and construction (Designing and construction-relevant legislation; Nuclear installation project preparation of nuclear installation at Mochovce site); (3) Operation (Operator licensing procedure; Operation limits and conditions; Maintenance testing and control documentation for management and operation; Technical support of operation; Analysis of events at nuclear installations and Radioactive waste production); (4) Planned safety upgrading activities at nuclear installations

  18. HTGR analytical methods and design verification

    International Nuclear Information System (INIS)

    Neylan, A.J.; Northup, T.E.

    1982-05-01

    Analytical methods for the high-temperature gas-cooled reactor (HTGR) include development, update, verification, documentation, and maintenance of all computer codes for HTGR design and analysis. This paper presents selected nuclear, structural mechanics, seismic, and systems analytical methods related to the HTGR core. This paper also reviews design verification tests in the reactor core, reactor internals, steam generator, and thermal barrier

  19. Sealing of process valves for the HEU downblending verification experiment at Portsmouth

    International Nuclear Information System (INIS)

    Baldwin, G.T.; Bartberger, J.C.; Jenkins, C.D.; Perlinski, A.W.; Schoeneman, J.L.; Gordon, D.M.; Whiting, N.E.; Bonner, T.N.; Castle, J.M.

    1998-01-01

    At the Portsmouth Gaseous Diffusion Plant in Piketon, Ohio, USA, excess inventory of highly-enriched uranium (HEU) from US defense programs is being diluted to low-enriched uranium (LEU) for commercial use. The conversion is subject to a Verification Experiment overseen by the International Atomic Energy Agency (IAEA). The Verification Experiment is making use of monitoring technologies developed and installed by several DOE laboratories. One of the measures is a system for sealing valves in the process piping, which secures the path followed by uranium hexafluoride gas (UF 6 ) from cylinders at the feed stations to the blend point, where the HEU is diluted with LEU. The Authenticated Item Monitoring System (AIMS) was the alternative proposed by Sandia National Laboratories that was selected by the IAEA. Approximately 30 valves were sealed by the IAEA using AIMS fiber-optic seals (AFOS). The seals employ single-core plastic fiber rated to 125 C to withstand the high-temperature conditions of the heated piping enclosures at Portsmouth. Each AFOS broadcasts authenticated seal status and state-of-health messages via a tamper-protected radio-frequency transmitter mounted outside of the heated enclosure. The messages are received by two collection stations, operated redundantly

  20. Proper Installation of New Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  1. Verification of DRAGON: the NXT tracking module

    International Nuclear Information System (INIS)

    Zkiek, A.; Marleau, G.

    2007-01-01

    The version of DRAGON-IST that has been verified for the calculation of the incremental cross sections associated with CANDU reactivity devices is version 3.04Bb that was released in 2001. Since then, various improvements were implemented in the code including the NXT: module that can track assemblies of clusters in 2-D and 3-D geometries. Here we will discuss the verification plan for the NXT: module of DRAGON, illustrate the verification procedure we selected and present our verification results. (author)

  2. Helium transfer line installation details.

    CERN Multimedia

    G. Perinic

    2007-01-01

    A particularity of the 32 m long four in one helium transfer line in between the cold box in USC55 and the cavern UX5 is the fact that the transfer line passes through a hole in the crane rail support beam. In order to ensure the alignment of the suspension rail in the interconnecting tunnel with the hole in the rail support as well as the connection points at both ends required precise measurements of the given geometries as well as the installation of a temporary target for the verification of the theoretical predictions.

  3. K Basins Field Verification Program

    International Nuclear Information System (INIS)

    Booth, H.W.

    1994-01-01

    The Field Verification Program establishes a uniform and systematic process to ensure that technical information depicted on selected engineering drawings accurately reflects the actual existing physical configuration. This document defines the Field Verification Program necessary to perform the field walkdown and inspection process that identifies the physical configuration of the systems required to support the mission objectives of K Basins. This program is intended to provide an accurate accounting of the actual field configuration by documenting the as-found information on a controlled drawing

  4. Software safety analysis practice in installation phase

    Energy Technology Data Exchange (ETDEWEB)

    Huang, H. W.; Chen, M. H.; Shyu, S. S., E-mail: hwhwang@iner.gov.t [Institute of Nuclear Energy Research, No. 1000 Wenhua Road, Chiaan Village, Longtan Township, 32546 Taoyuan County, Taiwan (China)

    2010-10-15

    This work performed a software safety analysis in the installation phase of the Lung men nuclear power plant in Taiwan, under the cooperation of Institute of Nuclear Energy Research and Tpc. The US Nuclear Regulatory Commission requests licensee to perform software safety analysis and software verification and validation in each phase of software development life cycle with Branch Technical Position 7-14. In this work, 37 safety grade digital instrumentation and control systems were analyzed by failure mode and effects analysis, which is suggested by IEEE standard 7-4.3.2-2003. During the installation phase, skew tests for safety grade network and point to point tests were performed. The failure mode and effects analysis showed all the single failure modes can be resolved by the redundant means. Most of the common mode failures can be resolved by operator manual actions. (Author)

  5. Software safety analysis practice in installation phase

    International Nuclear Information System (INIS)

    Huang, H. W.; Chen, M. H.; Shyu, S. S.

    2010-10-01

    This work performed a software safety analysis in the installation phase of the Lung men nuclear power plant in Taiwan, under the cooperation of Institute of Nuclear Energy Research and Tpc. The US Nuclear Regulatory Commission requests licensee to perform software safety analysis and software verification and validation in each phase of software development life cycle with Branch Technical Position 7-14. In this work, 37 safety grade digital instrumentation and control systems were analyzed by failure mode and effects analysis, which is suggested by IEEE standard 7-4.3.2-2003. During the installation phase, skew tests for safety grade network and point to point tests were performed. The failure mode and effects analysis showed all the single failure modes can be resolved by the redundant means. Most of the common mode failures can be resolved by operator manual actions. (Author)

  6. A safeguards verification technique for solution homogeneity and volume measurements in process tanks

    International Nuclear Information System (INIS)

    Suda, S.; Franssen, F.

    1987-01-01

    A safeguards verification technique is being developed for determining whether process-liquid homogeneity has been achieved in process tanks and for authenticating volume-measurement algorithms involving temperature corrections. It is proposed that, in new designs for bulk-handling plants employing automated process lines, bubbler probes and thermocouples be installed at several heights in key accountability tanks. High-accuracy measurements of density using an electromanometer can now be made which match or even exceed analytical-laboratory accuracies. Together with regional determination of tank temperatures, these measurements provide density, liquid-column weight and temperature gradients over the fill range of the tank that can be used to ascertain when the tank solution has reached equilibrium. Temperature-correction algorithms can be authenticated by comparing the volumes obtained from the several bubbler-probe liquid-height measurements, each based on different amounts of liquid above and below the probe. The verification technique is based on the automated electromanometer system developed by Brookhaven National Laboratory (BNL). The IAEA has recently approved the purchase of a stainless-steel tank equipped with multiple bubbler and thermocouple probes for installation in its Bulk Calibration Laboratory at IAEA Headquarters, Vienna. The verification technique is scheduled for preliminary trials in late 1987

  7. A Value Focused Thinking Model for the Development and Selection of Electrical Energy Source Alternatives at Military Installations

    National Research Council Canada - National Science Library

    Schanding, Gregory

    2004-01-01

    .... This thesis presents a Value Focused Thinking approach to the development of a decision analysis model to assist a decision maker at a military installation in the generation and selection of back...

  8. Typical design/qualification acceptance criteria for newly installed pipelines and equipment components of VVER-type NPPs

    International Nuclear Information System (INIS)

    Masopust, R.

    2003-01-01

    This paper describes in general the typical design/qualification acceptance criteria and seismic acceptance criteria in particular that are applicable for important to safety newly installed pipelines and equipment components of VVER-type already existing NPPs, specifically during the design verification phase of this newly installed equipment. These criteria are currently used for VVER 440-213 and VVER 1000 NPPs in Czech Republic and in Slovakia. The similar criteria are also used in Hungary. (author)

  9. Portable system for periodical verification of area monitors for neutrons; Sistema portatil para verificacao periodica de monitores de area para neutrons

    Energy Technology Data Exchange (ETDEWEB)

    Souza, Luciane de R.; Leite, Sandro Passos; Lopes, Ricardo Tadeu, E-mail: rluciane@ird.gov.b [Coordenacao dos Programas de Pos-Graduacao de Engenharia (PEN/COPPE/UFRJ), RJ (Brazil). Programa de Energia Nuclear; Patrao, Karla C. de Souza; Fonseca, Evaldo S. da; Pereira, Walsan W., E-mail: karla@ird.gov.b [Instituto de Radioprotecao e Dosimetria (IRD/CNEN-RJ), Rio de Janeiro, RJ (Brazil). Lab. Nacional de Metrologia das Radiacoes Ionizantes (LNMRI). Lab. de Neutrons

    2009-07-01

    The Neutrons Laboratory develops a project viewing the construction of a portable test system for verification of functioning conditions of neutron area monitors. This device will allow to the users the verification of the calibration maintenance of his instruments at the use installations, avoiding the use of an inadequate equipment related to his answer to the neutron beam response

  10. ENVIRONMENTAL TECHNOLOGY VERIFICATION: TEST/QA PLAN FOR THE VERIFICATION TESTING OF SELECTIVE CATALYTIC REDUCTION CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    Science.gov (United States)

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  11. Software safety analysis application in installation phase

    International Nuclear Information System (INIS)

    Huang, H. W.; Yih, S.; Wang, L. H.; Liao, B. C.; Lin, J. M.; Kao, T. M.

    2010-01-01

    This work performed a software safety analysis (SSA) in the installation phase of the Lungmen nuclear power plant (LMNPP) in Taiwan, under the cooperation of INER and TPC. The US Nuclear Regulatory Commission (USNRC) requests licensee to perform software safety analysis (SSA) and software verification and validation (SV and V) in each phase of software development life cycle with Branch Technical Position (BTP) 7-14. In this work, 37 safety grade digital instrumentation and control (I and C) systems were analyzed by Failure Mode and Effects Analysis (FMEA), which is suggested by IEEE Standard 7-4.3.2-2003. During the installation phase, skew tests for safety grade network and point to point tests were performed. The FMEA showed all the single failure modes can be resolved by the redundant means. Most of the common mode failures can be resolved by operator manual actions. (authors)

  12. Verification and Examination Management of Complex Systems

    Directory of Open Access Journals (Sweden)

    Stian Ruud

    2014-10-01

    Full Text Available As ship systems become more complex, with an increasing number of safety-critical functions, many interconnected subsystems, tight integration to other systems, and a large amount of potential failure modes, several industry parties have identified the need for improved methods for managing the verification and examination efforts of such complex systems. Such needs are even more prominent now that the marine and offshore industries are targeting more activities and operations in the Arctic environment. In this paper, a set of requirements and a method for verification and examination management are proposed for allocating examination efforts to selected subsystems. The method is based on a definition of a verification risk function for a given system topology and given requirements. The marginal verification risks for the subsystems may then be evaluated, so that examination efforts for the subsystem can be allocated. Two cases of requirements and systems are used to demonstrate the proposed method. The method establishes a systematic relationship between the verification loss, the logic system topology, verification method performance, examination stop criterion, the required examination effort, and a proposed sequence of examinations to reach the examination stop criterion.

  13. Age verification cards fail to fully prevent minors from accessing tobacco products.

    Science.gov (United States)

    Kanda, Hideyuki; Osaki, Yoneatsu; Ohida, Takashi; Kaneita, Yoshitaka; Munezawa, Takeshi

    2011-03-01

    Proper age verification can prevent minors from accessing tobacco products. For this reason, electronic locking devices based on a proof-of age system utilising cards were installed in almost every tobacco vending machine across Japan and Germany to restrict sales to minors. We aimed to clarify the associations between amount smoked by high school students and the usage of age verification cards by conducting a nationwide cross-sectional survey of students in Japan. This survey was conducted in 2008. We asked high school students, aged 13-18 years, in Japan about their smoking behaviour, where they purchase cigarettes, if or if not they have used age verification cards, and if yes, how they obtained this card. As the amount smoked increased, the prevalence of purchasing cigarettes from vending machines also rose for both males and females. The percentage of those with experience of using an age verification card was also higher among those who smoked more. Somebody outside of family was the top source of obtaining cards. Surprisingly, around 5% of males and females belonging to the group with highest smoking levels applied for cards themselves. Age verification cards cannot fully prevent minors from accessing tobacco products. These findings suggest that a total ban of tobacco vending machines, not an age verification system, is needed to prevent sales to minors.

  14. Analysis of heat source selection for residential buildings in rural areas

    Directory of Open Access Journals (Sweden)

    Szul Tomasz

    2018-01-01

    Full Text Available The research aiming to check whether the output of currently installed boilers matches the use requirements together with estimation of their energy efficiency was carried out on a group of 84 single-family residential buildings located in rural areas. Heating and hot water energy needs were calculated for each building in order to determine the use requirements. This enabled verification whether the currently installed boilers match the actual use requirements in the buildings. Based on the calculations it was determined that the designed average boiler output in the group of buildings subject to analysis is 15.7 kW, whereas the mean rated output capacity of boilers installed therein is 25.4 kW. On average, the output capacity of the installed boilers exceeds the use requirements for the buildings by 60%. To calculate the energy efficiency of boilers, the mean annual boiler output capacity use coefficient was determined. For boilers selected on the basis of standard calculations, the mean coefficient is 0.47. For boilers currently in use it is 0.31, less than the above figure. The above calculations show that if boilers were correctly selected in compliance to the building needs, then the average estimated seasonal efficiency of 65% would be feasible. However, in the current state the achievable efficiency is approx. 55%.

  15. THE INFLUENCE OF THE INSTALLATION METHOD ON THE SELECTED PROPERTIES OF BIODEGRADABLE GEOTEXTILES USED IN ENVIRONMENTAL ENGINEERING

    Directory of Open Access Journals (Sweden)

    Joanna Beata Grzybowska-Pietras

    2017-06-01

    Full Text Available In the engineering constructions there are used biodegradable geotextiles, that are performing primarily a function of surface anti-erosion protection. Their biodegradability supports the development of vegetation, and protects the surface of the slope from the moment of installation in the ground. In order to achieve this functionality there are used mainly biononwovens and woven fabrics made of natiral fibers. In the paper there are presented results of studies on the effect of the instalation of the biononwoven (Maliwatt type with grass seeds applied in real conditions at a specified time (from November to June, on the selected physical, mechanical and hydraulic properties , and the development of vegetation (grasses. The experiment adopted two versions of instalation of nonwovens. In the first case geotextile was mounted directly on the ground, in the second additionally have been covered with a layer of native soil.

  16. Verification of industrial x-ray machine: MINTs experience

    International Nuclear Information System (INIS)

    Aziz Amat; Saidi Rajab; Eesan Pasupathi; Saipo Bahari Abdul Ratan; Shaharudin Sayuti; Abd Nassir Ibrahim; Abd Razak Hamzah

    2005-01-01

    Radiation and electrical safety of the industrial x-ray equipment required to meet Atomic Energy Licensing Board(AELB) guidelines ( LEM/TEK/42 ) at the time of installation and subsequently a periodic verification should be ensured. The purpose of the guide is to explain the requirements employed in conducting the test on industrial x-ray apparatus and be certified in meeting with our local legislative and regulation. Verification is aimed to provide safety assurance information on electrical requirements and the minimum radiation exposure to the operator. This regulation is introduced on new models imported into the Malaysian market. Since June, 1997, Malaysian Institute for Nuclear Technology Research (MINT) has been approved by AELB to provide verification services to private company, government and corporate body throughout Malaysia. Early January 1997, AELB has made it mandatory that all x-ray equipment for industrial purpose (especially Industrial Radiography) must fulfill certain performance test based on the LEM/TEK/42 guidelines. MINT as the third party verification encourages user to improve maintenance of the equipment. MINT experiences in measuring the performance on intermittent and continuous duty rating single-phase industrial x-ray machine in the year 2004 indicated that all of irradiating apparatus tested pass the test and met the requirements of the guideline. From MINT record, 1997 to 2005 , three x-ray models did not meet the requirement and thus not allowed to be used unless the manufacturers willing to modify it to meet AELB requirement. This verification procedures on electrical and radiation safety on industrial x-ray has significantly improved the the maintenance cultures and safety awareness in the usage of x-ray apparatus in the industrial environment. (Author)

  17. Field Test and Performance Verification: Integrated Active Desiccant Rooftop Hybrid System Installed in a School - Final Report: Phase 4A

    Energy Technology Data Exchange (ETDEWEB)

    Fischer, J

    2005-12-21

    This report summarizes the results of a field verification pilot site investigation that involved the installation of a hybrid integrated active desiccant/vapor-compression rooftop heating, ventilation, and air-conditioning (HVAC) unit at an elementary school in the Atlanta Georgia area. For years, the school had experienced serious humidity and indoor air quality (IAQ) problems that had resulted in occupant complaints and microbial (mold) remediation. The outdoor air louvers of the original HVAC units had been closed in an attempt to improve humidity control within the space. The existing vapor compression variable air volume system was replaced by the integrated active desiccant rooftop (IADR) system that was described in detail in an Oak Ridge National Laboratory (ORNL) report published in 2004 (Fischer and Sand 2004). The IADR system and all space conditions have been monitored remotely for more than a year. The hybrid system was able to maintain both the space temperature and humidity as desired while delivering the outdoor air ventilation rate required by American Society of Heating, Refrigerating and Air-Conditioning Engineers Standard 62. The performance level of the IADR unit and the overall system energy efficiency was measured and found to be very high. A comprehensive IAQ investigation was completed by the Georgia Tech Research Institute before and after the system retrofit. Before-and-after data resulting from this investigation confirmed a significant improvement in IAQ, humidity control, and occupant comfort. These observations were reported by building occupants and are echoed in a letter to ORNL from the school district energy manager. The IADR system was easily retrofitted in place of the original rooftop system using a custom curb adapter. All work was completed in-house by the school's maintenance staff over one weekend. A subsequent cost analysis completed for the school district by the design engineer of record concluded that the IADR

  18. RESRAD-BUILD verification

    International Nuclear Information System (INIS)

    Kamboj, S.; Yu, C.; Biwer, B. M.; Klett, T.

    2002-01-01

    The results generated by the RESRAD-BUILD code (version 3.0) were verified with hand or spreadsheet calculations using equations given in the RESRAD-BUILD manual for different pathways. For verification purposes, different radionuclides--H-3, C-14, Na-22, Al-26, Cl-36, Mn-54, Co-60, Au-195, Ra-226, Ra-228, Th-228, and U-238--were chosen to test all pathways and models. Tritium, Ra-226, and Th-228 were chosen because of the special tritium and radon models in the RESRAD-BUILD code. Other radionuclides were selected to represent a spectrum of radiation types and energies. Verification of the RESRAD-BUILD code was conducted with an initial check of all the input parameters for correctness against their original source documents. Verification of the calculations was performed external to the RESRAD-BUILD code with Microsoft Excel to verify all the major portions of the code. In some cases, RESRAD-BUILD results were compared with those of external codes, such as MCNP (Monte Carlo N-particle) and RESRAD. The verification was conducted on a step-by-step basis and used different test cases as templates. The following types of calculations were investigated: (1) source injection rate, (2) air concentration in the room, (3) air particulate deposition, (4) radon pathway model, (5) tritium model for volume source, (6) external exposure model, (7) different pathway doses, and (8) time dependence of dose. Some minor errors were identified in version 3.0; these errors have been corrected in later versions of the code. Some possible improvements in the code were also identified

  19. Experience with HEPA filters at United States nuclear installations

    International Nuclear Information System (INIS)

    Bellamy, R.R.

    1977-01-01

    Part 50 of Title 10 of the United States Code of Federal Regulations requires that a number of atmosphere cleanup systems be included in the design of commercial nuclear power plants to be licensed in the United States. These filtering systems are to contain high efficiency particulate air (HEPA) filters for removal of radioactive particulate matter generated during normal and accident conditions. Recommendations for the design, testing and maintenance of the filtering systems and HEPA filter components are contained in a number of United States Nuclear Regulatory Commission documents and industry standards. This paper will discuss this published guidance available to designers of filtering systems and the plant operators of U.S. commercial nuclear power plants. The paper will also present a survey of published reports of experience with HEPA filters, failures and possible causes for the failures, and other abnormal occurrences pertaining to HEPA filters installed in U.S. nuclear power installations. A discussion will be included of U.S. practices for qualification of HEPA filters before installation, and verification of continued performance capability at scheduled intervals during operation

  20. Eggspectation : organic egg verification tool

    NARCIS (Netherlands)

    Ruth, van S.M.; Hoogenboom, L.A.P.

    2011-01-01

    In 2009 RIKILT conducted a study on about 2,000 eggs to evaluate three different analytical verification methods: carotenoid profiling, fatty acid profiling and isotope ratio mass spectrometry. The eggs were collected from about 50 Dutch farms. The selection was based on the farms’ location and

  1. Demographic characteristics of nuclear installations sites

    International Nuclear Information System (INIS)

    Doumenc, A.; Faure, J.

    1988-01-01

    The selection of a nuclear installations sites can not be conceived without a deep analysis of demographic context. This analysis permits to define the critical populations around the installation and is an essential element of emergency plans. 1 tab., 2 refs. (F.M.)

  2. Monitoring/Verification Using DMS: TATP Example

    International Nuclear Information System (INIS)

    Kevin Kyle; Stephan Weeks

    2008-01-01

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a 'smart dust' sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. GC is the leading analytical method for the separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15-300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements

  3. Spent fuel verification options for final repository safeguards in Finland. A study on verification methods, their feasibility and safety aspects

    International Nuclear Information System (INIS)

    Hautamaeki, J.; Tiitta, A.

    2000-12-01

    The verification possibilities of the spent fuel assemblies from the Olkiluoto and Loviisa NPPs and the fuel rods from the research reactor of VTT are contemplated in this report. The spent fuel assemblies have to be verified at the partial defect level before the final disposal into the geologic repository. The rods from the research reactor may be verified at the gross defect level. Developing a measurement system for partial defect verification is a complicated and time-consuming task. The Passive High Energy Gamma Emission Tomography and the Fork Detector combined with Gamma Spectrometry are the most potential measurement principles to be developed for this purpose. The whole verification process has to be planned to be as slick as possible. An early start in the planning of the verification and developing the measurement devices is important in order to enable a smooth integration of the verification measurements into the conditioning and disposal process. The IAEA and Euratom have not yet concluded the safeguards criteria for the final disposal. E.g. criteria connected to the selection of the best place to perform the verification. Measurements have not yet been concluded. Options for the verification places have been considered in this report. One option for a verification measurement place is the intermediate storage. The other option is the encapsulation plant. Crucial viewpoints are such as which one offers the best practical possibilities to perform the measurements effectively and which would be the better place in the safeguards point of view. Verification measurements may be needed both in the intermediate storages and in the encapsulation plant. In this report also the integrity of the fuel assemblies after wet intermediate storage period is assessed, because the assemblies have to stand the handling operations of the verification measurements. (orig.)

  4. Simulation and verification of transient events in large wind power installations

    Energy Technology Data Exchange (ETDEWEB)

    Soerensen, P.; Hansen, A.D.; Christensen, P.; Meritz, M.; Bech, J.; Bak-Jensen, B.; Nielsen, H.

    2003-10-01

    Models for wind power installations excited by transient events have been developed and verified. A number of cases have been investigated, including comparisons of simulations of a three-phase short circuit, validation with measurements of tripping of single wind turbine, islanding of a group of two wind turbines, and voltage steps caused by tripping of wind turbines and by manual transformer tap-changing. A Benchmark model is also presented, enabling the reader to test own simulation results against results obtained with models developed in EMTDC and DIgSILENT. (au)

  5. First ALICE detectors installed!

    CERN Multimedia

    2006-01-01

    Detectors to track down penetrating muon particles are the first to be placed in their final position in the ALICE cavern. The Alice muon spectrometer: in the foreground the trigger chamber is positioned in front of the muon wall, with the dipole magnet in the background. After the impressive transport of its dipole magnet, ALICE has begun to fill the spectrometer with detectors. In mid-July, the ALICE muon spectrometer team achieved important milestones with the installation of the trigger and the tracking chambers of the muon spectrometer. They are the first detectors to be installed in their final position in the cavern. All of the eight half planes of the RPCs (resistive plate chambers) have been installed in their final position behind the muon filter. The role of the trigger detector is to select events containing a muon pair coming, for instance, from the decay of J/ or Y resonances. The selection is made on the transverse momentum of the two individual muons. The internal parts of the RPCs, made o...

  6. Safety code 19: recommended safety procedures for the selection, installation and use of x-ray diffraction equipment

    International Nuclear Information System (INIS)

    1984-01-01

    This document is one of a series of Safety Codes prepared by the Radiation Protection Bureau to set out requirements for the safe use of radiation emitting devices. The equipment and installation guidelines and safety procedures detailed in this Code are primarily for the instruction and guidance of persons employed in Federal Public Service Departments and Agencies, as well as those coming under the jurisdiction of the Canada Labour Code. This Safety Code is also intended to assist other users of X-ray diffraction equipment to select safe equipment and to install and use it so that the radiation hazard to the operator and other persons in its vicinity is negligible. It should be noted that facilities under provincial jurisdiction may be subject to requirements specified under provincial statutes. This Code supersedes Safety Code RPD-SC-7, entitled 'Requirements For Non-Medical X-Ray Equipment, Use and Installation', insofar as X-ray diffraction equipment is concerned, and it is intended to complement X-ray equipment design, construction and performance standards promulgated under the Radiation Emitting Devices Act

  7. Verification of RESRAD-build computer code, version 3.1

    International Nuclear Information System (INIS)

    2003-01-01

    RESRAD-BUILD is a computer model for analyzing the radiological doses resulting from the remediation and occupancy of buildings contaminated with radioactive material. It is part of a family of codes that includes RESRAD, RESRAD-CHEM, RESRAD-RECYCLE, RESRAD-BASELINE, and RESRAD-ECORISK. The RESRAD-BUILD models were developed and codified by Argonne National Laboratory (ANL); version 1.5 of the code and the user's manual were publicly released in 1994. The original version of the code was written for the Microsoft DOS operating system. However, subsequent versions of the code were written for the Microsoft Windows operating system. The purpose of the present verification task (which includes validation as defined in the standard) is to provide an independent review of the latest version of RESRAD-BUILD under the guidance provided by ANSI/ANS-10.4 for verification and validation of existing computer programs. This approach consists of a posteriori V and V review which takes advantage of available program development products as well as user experience. The purpose, as specified in ANSI/ANS-10.4, is to determine whether the program produces valid responses when used to analyze problems within a specific domain of applications, and to document the level of verification. The culmination of these efforts is the production of this formal Verification Report. The first step in performing the verification of an existing program was the preparation of a Verification Review Plan. The review plan consisted of identifying: Reason(s) why a posteriori verification is to be performed; Scope and objectives for the level of verification selected; Development products to be used for the review; Availability and use of user experience; and Actions to be taken to supplement missing or unavailable development products. The purpose, scope and objectives for the level of verification selected are described in this section of the Verification Report. The development products that were used

  8. Hawk-I - First results from science verification

    NARCIS (Netherlands)

    Kissler-Patig, M.; Larsen, S.S.|info:eu-repo/dai/nl/304833347; Wehner, E.M.|info:eu-repo/dai/nl/314114688

    2008-01-01

    The VLT wide-field near-infrared imager HAWK-I was commissioned in 2007 and Science Verification (SV) programmes were conducted in August 2007. A selection of results from among the twelve Science Verfication proposals are summarised.

  9. Impact of size and distribution of installed PV power in E-W direction on the level in which selected consumers’ energy needs were met

    OpenAIRE

    Necka Krzysztof; Latala Hubert; Kurpaska Sławomir; Knaga Jarosław; Karbowniczakʼ Anna

    2018-01-01

    The aim of the study was to analyse the energy needs of selected consumers and to select the PV installed capacity in the east and west panels orientation (E-W). The analysis was carried out for two variants. The first concerned the impact of the installation power of a PV source on the contracted power in its symmetric east and west position. The second variant was the result of previous observations and studies of the authors of this paper. Thus, in this variant, the unbalanced power of PV ...

  10. An ontology based trust verification of software license agreement

    Science.gov (United States)

    Lu, Wenhuan; Li, Xiaoqing; Gan, Zengqin; Wei, Jianguo

    2017-08-01

    When we install software or download software, there will show up so big mass document to state the rights and obligations, for which lots of person are not patient to read it or understand it. That would may make users feel distrust for the software. In this paper, we propose an ontology based verification for Software License Agreement. First of all, this work proposed an ontology model for domain of Software License Agreement. The domain ontology is constructed by proposed methodology according to copyright laws and 30 software license agreements. The License Ontology can act as a part of generalized copyright law knowledge model, and also can work as visualization of software licenses. Based on this proposed ontology, a software license oriented text summarization approach is proposed which performances showing that it can improve the accuracy of software licenses summarizing. Based on the summarization, the underline purpose of the software license can be explicitly explored for trust verification.

  11. MODELS CONCERNING PREVENTIVE VERIFICATION OF TECHNICAL EQUIPMENT

    Directory of Open Access Journals (Sweden)

    CÂRLAN M.

    2016-12-01

    Full Text Available The paper presents three operative models whose purpose is to improve the practice of preventive maintenance to a wide range of technical installations. Although the calculation criteria are different, the goal is the same: to determine the optimum time between two consecutive preventive interventions. The optimum criteria of these models are: - the maximum share of technical entity operating probabilities, in the case of the Ackoff - Sasieni [1] method; -the optimum time interval for preventive verification depending on the preventive-corrective maintenance costs imposed by the deciding factor, for the AsturioBaldin [2] model; - the minimum number of renewals – preventive and/or corrective maintenance operations [3

  12. CIT photoheliograph functional verification unit test program

    Science.gov (United States)

    1973-01-01

    Tests of the 2/3-meter photoheliograph functional verification unit FVU were performed with the FVU installed in its Big Bear Solar Observatory vacuum chamber. Interferometric tests were run both in Newtonian (f/3.85) and Gregorian (f/50) configurations. Tests were run in both configurations with optical axis horizontal, vertical, and at 45 deg to attempt to determine any gravity effects on the system. Gravity effects, if present, were masked by scatter in the data associated with the system wavefront error of 0.16 lambda rms ( = 6328A) apparently due to problems in the primary mirror. Tests showed that the redesigned secondary mirror assembly works well.

  13. Verification and the safeguards legacy

    International Nuclear Information System (INIS)

    Perricos, Demetrius

    2001-01-01

    A number of inspection or monitoring systems throughout the world over the last decades have been structured drawing upon the IAEA experience of setting up and operating its safeguards system. The first global verification system was born with the creation of the IAEA safeguards system, about 35 years ago. With the conclusion of the NPT in 1968, inspections were to be performed under safeguards agreements, concluded directly between the IAEA and non-nuclear weapon states parties to the Treaty. The IAEA developed the safeguards system within the limitations reflected in the Blue Book (INFCIRC 153), such as limitations of routine access by the inspectors to 'strategic points', including 'key measurement points', and the focusing of verification on declared nuclear material in declared installations. The system, based as it was on nuclear material accountancy. It was expected to detect a diversion of nuclear material with a high probability and within a given time and therefore determine also that there had been no diversion of nuclear material from peaceful purposes. The most vital element of any verification system is the inspector. Technology can assist but cannot replace the inspector in the field. Their experience, knowledge, intuition and initiative are invaluable factors contributing to the success of any inspection regime. The IAEA inspectors are however not part of an international police force that will intervene to prevent a violation taking place. To be credible they should be technically qualified with substantial experience in industry or in research and development before they are recruited. An extensive training program has to make sure that the inspectors retain their professional capabilities and that it provides them with new skills. Over the years, the inspectors and through them the safeguards verification system gained experience in: organization and management of large teams; examination of records and evaluation of material balances

  14. Transforming PLC Programs into Formal Models for Verification Purposes

    CERN Document Server

    Darvas, D; Blanco, E

    2013-01-01

    Most of CERN’s industrial installations rely on PLC-based (Programmable Logic Controller) control systems developed using the UNICOS framework. This framework contains common, reusable program modules and their correctness is a high priority. Testing is already applied to find errors, but this method has limitations. In this work an approach is proposed to transform automatically PLC programs into formal models, with the goal of applying formal verification to ensure their correctness. We target model checking which is a precise, mathematical-based method to check formalized requirements automatically against the system.

  15. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    Energy Technology Data Exchange (ETDEWEB)

    BAZINET, G.D.

    2001-05-15

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. Revision 1 documented verification actions that were pending at the time the initial report was prepared. Verification activities for the installed and operational SSCs have been completed. Verification of future additions to the CSB related to the canister cover cap and welding fixture system and MCO Internal Gas Sampling equipment will be completed as appropriate for those components. The open items related to verification of those requirements are noted in section 3

  16. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    Energy Technology Data Exchange (ETDEWEB)

    BAZINET, G.D.

    2000-11-03

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. The purpose of this revision is to document completion of verification actions that were pending at the time the initial report was prepared. Verification activities for the installed and operational SSCs have been completed. Verification of future additions to the CSB related to the canister cover cap and welding fixture system and MCO Internal Gas Sampling equipment will be completed as appropriate for those components. The open items related to verification of those

  17. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    International Nuclear Information System (INIS)

    BAZINET, G.D.

    2001-01-01

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. Revision 1 documented verification actions that were pending at the time the initial report was prepared. Verification activities for the installed and operational SSCs have been completed. Verification of future additions to the CSB related to the canister cover cap and welding fixture system and MCO Internal Gas Sampling equipment will be completed as appropriate for those components. The open items related to verification of those requirements are noted in section 3.1.5 and will be

  18. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    International Nuclear Information System (INIS)

    BAZINET, G.D.

    2000-01-01

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. The purpose of this revision is to document completion of verification actions that were pending at the time the initial report was prepared. Verification activities for the installed and operational SSCs have been completed. Verification of future additions to the CSB related to the canister cover cap and welding fixture system and MCO Internal Gas Sampling equipment will be completed as appropriate for those components. The open items related to verification of those requirements are noted

  19. Canberra Alpha Sentry Installation Functional Design Criteria (FDC)

    International Nuclear Information System (INIS)

    WHITE, W.F.

    1999-01-01

    This document provides the functional design criteria for the installation of the Canberra Alpha Sentry System at selected locations within the Plutonium Finishing Plant (PFP). The equipment being installed is identified by part number in Section 3 and the locations are given in Section 5. The design, procurement and installation are assigned to Fluor Federal Services

  20. DESIGN VERIFICATION REPORT SPENT NUCLEAR FUEL (SNF) PROJECT CANISTER STORAGE BUILDING (CSB)

    International Nuclear Information System (INIS)

    BAZINET, G.D.

    2003-01-01

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. Revision 1 documented verification actions that were pending at the time the initial report was prepared. Revision 3 of this document incorporates MCO Cover Cap Assembly welding verification activities. Verification activities for the installed and operational SSCs have been completed

  1. Advanced verification topics

    CERN Document Server

    Bhattacharya, Bishnupriya; Hall, Gary; Heaton, Nick; Kashai, Yaron; Khan Neyaz; Kirshenbaum, Zeev; Shneydor, Efrat

    2011-01-01

    The Accellera Universal Verification Methodology (UVM) standard is architected to scale, but verification is growing and in more than just the digital design dimension. It is growing in the SoC dimension to include low-power and mixed-signal and the system integration dimension to include multi-language support and acceleration. These items and others all contribute to the quality of the SOC so the Metric-Driven Verification (MDV) methodology is needed to unify it all into a coherent verification plan. This book is for verification engineers and managers familiar with the UVM and the benefits it brings to digital verification but who also need to tackle specialized tasks. It is also written for the SoC project manager that is tasked with building an efficient worldwide team. While the task continues to become more complex, Advanced Verification Topics describes methodologies outside of the Accellera UVM standard, but that build on it, to provide a way for SoC teams to stay productive and profitable.

  2. Verification of criticality safety in on-site spent fuel storage systems

    International Nuclear Information System (INIS)

    Rasmussen, R.W.

    1989-01-01

    On February 15, 1984, Duke Power Company received approval for a two-region, burnup credit, spent fuel storage rack design at both Units 1 and 2 of the McGuire Nuclear Station. Duke also hopes to obtain approval by January of 1990 for a dry spent fuel storage system at the Oconee Nuclear Station, which will incorporate the use of burnup credit in the criticality analysis governing the design of the individual storage units. While experiences in burnup verification for criticality safety for their dry storage system at Oconee are in the future, the methods proposed for burnup verification will be similar to those currently used at the McGuire Nuclear Station in the two-region storage racks installed in both pools. In conclusion, the primary benefit of the McGuire rerack effort has obviously been the amount of storage expansion it provided. A total increase of about 2,000 storage cells was realized, 1,000 of which were the result of pursuing the two-region rather than the conventional poison rack design. Less impacting, but equally as important, however, has been the experience gained during the planning, installation, and operation of these storage racks. This experience should prove useful for future rerack efforts likely to occur at Duke's Catawba Nuclear Station as well as for the current dry storage effort underway for the Oconee Nuclear Station

  3. Joint verification project on environmentally friendly coal utilization systems. Joint verification project on the water-saving coal preparation system; Kankyo chowagata sekitan riyo system kyodo jissho jigyo. Shosuigata sentan system kyodo jissho jigyo

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-09-01

    In this verification project, clean technology which should be spread in China was verified and the base structure for its spread was prepared for the purpose of controlling emissions of environmental pollutants associated with the coal utilization in China and of contributing to secure energy acquisition of Japan. As joint verification projects, a general rehabilitation type coal preparation system was installed in the Wangfenggang coal preparation plant, and a central control coal preparation system was installed in the Qingtan coal preparation plant. In the former, a system is verified in which optimum operation, water-saving, high quality, and heightening of efficiency can be obtained by introducing two computing systems for operation control and quality control, various measuring instruments, and analyzers to coal preparation plants where analog operation is conducted helped by Russia and Porland and have problems about quality control. In the latter, a central control system achieving water saving is verified by introducing rapid ash meters, scales, desitometers and computers to coal preparation plants having zigzag or heavy-fluid cyclon and connecting various kinds of information through network. For fiscal 1994, investigation and study were conducted. 51 figs., 9 tabs.

  4. Verification of the thermal design of electronic equipment

    Energy Technology Data Exchange (ETDEWEB)

    Hienonen, R.; Karjalainen, M.; Lankinen, R. [VTT Automation, Espoo (Finland). ProTechno

    1997-12-31

    The project `Verification of the thermal design of electronic equipment` studied the methodology to be followed in the verification of thermal design of electronic equipment. This project forms part of the `Cool Electronics` research programme funded by TEKES, the Finnish Technology Development Centre. This project was carried out jointly by VTT Automation, Lappeenranta University of Technology, Nokia Research Center and ABB Industry Oy VSD-Technology. The thermal design of electronic equipment has a significant impact on the cost, reliability, tolerance to different environments, selection of components and materials, and ergonomics of the product. This report describes the method for verification of thermal design. It assesses the goals set for thermal design, environmental requirements, technical implementation of the design, thermal simulation and modelling, and design qualification testing and the measurements needed. The verification method covers all packaging levels of electronic equipment from the system level to the electronic component level. The method described in this report can be used as part of the quality system of a corporation. The report includes information about the measurement and test methods needed in the verification process. Some measurement methods for the temperature, flow and pressure of air are described. (orig.) Published in Finnish VTT Julkaisuja 824. 22 refs.

  5. An Unattended Verification Station for UF6 Cylinders: Development Status

    International Nuclear Information System (INIS)

    Smith, E.; McDonald, B.; Miller, K.; Garner, J.; March-Leuba, J.; Poland, R.

    2015-01-01

    In recent years, the International Atomic Energy Agency (IAEA) has pursued innovative techniques and an integrated suite of safeguards measures to address the verification challenges posed by advanced centrifuge technologies and the growth in separative work unit capacity at modern centrifuge enrichment plants. These measures would include permanently installed, unattended instruments capable of performing the routine and repetitive measurements previously performed by inspectors. Among the unattended instruments currently being explored by the IAEA is an Unattended Cylinder Verification Stations (UCVS) that could provide independent verification of the declared relative enrichment, U-235 mass and total uranium mass of all declared cylinders moving through the plant, as well as the application and verification of a ''Non-destructive Assay Fingerprint'' to preserve verification knowledge on the contents of each cylinder throughout its life in the facility. As IAEA's vision for a UCVS has evolved, Pacific Northwest National Laboratory (PNNL) and Los Alamos National Laboratory have been developing and testing candidate non-destructive assay (NDA) methods for inclusion in a UCVS. Modeling and multiple field campaigns have indicated that these methods are capable of assaying relative cylinder enrichment with a precision comparable to or substantially better than today's high-resolution handheld devices, without the need for manual wall-thickness corrections. In addition, the methods interrogate the full volume of the cylinder, thereby offering the IAEA a new capability to assay the absolute U-235 mass in the cylinder, and much-improved sensitivity to substituted or removed material. Building on this prior work, and under the auspices of the United States Support Programme to the IAEA, a UCVS field prototype is being developed and tested. This paper provides an overview of: a) hardware and software design of the prototypes, b) preparation

  6. The MODUS Approach to Formal Verification

    Directory of Open Access Journals (Sweden)

    Brewka Lukasz

    2014-03-01

    Full Text Available Background: Software reliability is of great importance for the development of embedded systems that are often used in applications that have requirements for safety. Since the life cycle of embedded products is becoming shorter, productivity and quality simultaneously required and closely in the process of providing competitive products Objectives: In relation to this, MODUS (Method and supporting toolset advancing embedded systems quality project aims to provide small and medium-sized businesses ways to improve their position in the embedded market through a pragmatic and viable solution Methods/Approach: This paper will describe the MODUS project with focus on the technical methodologies that can assist formal verification and formal model checking. Results: Based on automated analysis of the characteristics of the system and by controlling the choice of the existing opensource model verification engines, model verification producing inputs to be fed into these engines. Conclusions: The MODUS approach is aligned with present market needs; the familiarity with tools, the ease of use and compatibility/interoperability remain among the most important criteria when selecting the development environment for a project

  7. Swimming bath pumps. Ranges of application, selection, installation, energy efficiency; Schwimmbadpumpen. Einsatzbereiche, Auswahl, Aufbau, Energieeffizienz

    Energy Technology Data Exchange (ETDEWEB)

    Korupp, Sascha

    2012-07-01

    The booklet under consideration reports on pumps being used in swimming baths. The range of application of the individual sorts of pump is described. The knowledge on the selection of suitable pumps is given. Subsequently, the design of a pump with the main components, the installation of a pump as well as the most important issues and difficulties of the pump material are illustrated. The total costs of a pump within its life cycle are determined. These life cycle costs can be reduced by propulsion components increasing the energy efficiency such as frequency converter, motors with permanent magnets or heat exchanger motors.

  8. 7 CFR 245.6a - Verification requirements.

    Science.gov (United States)

    2010-01-01

    ... by FNS, FNS may substitute alternatives for the sample size and sample selection criteria in... Agriculture Regulations of the Department of Agriculture (Continued) FOOD AND NUTRITION SERVICE, DEPARTMENT OF... lieu of income information and that may be used for direct verification purposes: (i) The Food Stamp...

  9. DESIGN VERIFICATION REPORT SPENT NUCLEAR FUEL (SNF) PROJECT CANISTER STORAGE BUILDING (CSB)

    Energy Technology Data Exchange (ETDEWEB)

    BAZINET, G.D.

    2003-02-12

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. The original version of this document was prepared by Vista Engineering for the SNF Project. Revision 1 documented verification actions that were pending at the time the initial report was prepared. Revision 3 of this document incorporates MCO Cover Cap Assembly welding verification activities. Verification activities for the installed and operational SSCs have been completed.

  10. Metering and energy audit : the key to success; Mesurage et verification energetique : la cle du succes

    Energy Technology Data Exchange (ETDEWEB)

    Milot, J. [Econoler, Quebec, PQ (Canada)

    2010-01-01

    The most widely used measurement and verification (M and V) procedure for energy performance contracting (EPC) projects is the International Performance Measurement and Verification Protocol (IPMVP). This article discussed the IPMVP as a tool for measuring the success of energy efficiency projects. The IPMVP provides an overview of current best practice techniques available for verifying results of energy efficiency, water efficiency and renewable energy projects in commercial and industrial facilities. Facility operators can use the IPMVP to evaluate and improve facility performance. Energy conservation measures (ECMs) covered in the protocol include fuel saving measures, water efficiency measures, load shifting and energy reductions through installation or retrofit of equipment, or modification of operating procedures. 2 figs.

  11. Impact of size and distribution of installed PV power in E-W direction on the level in which selected consumers’ energy needs were met

    Directory of Open Access Journals (Sweden)

    Necka Krzysztof

    2018-01-01

    Full Text Available The aim of the study was to analyse the energy needs of selected consumers and to select the PV installed capacity in the east and west panels orientation (E-W. The analysis was carried out for two variants. The first concerned the impact of the installation power of a PV source on the contracted power in its symmetric east and west position. The second variant was the result of previous observations and studies of the authors of this paper. Thus, in this variant, the unbalanced power of PV E-W in relation to the S azimuth has been analyzed, taking into account the characteristics of the recipients' needs and the variation of the PV power installed. The analyses show that an increase in meeting the energy demand for two of the tested plants at symmetrical power distribution to the east and west occurred only when the installed power was increased to the level of approx. 1.4-1.6 of the contracted power. However, the power distribution in the E-W direction has a very strong effect on the energy amount that is generated in the power plant and cannot be used due to the lack of demand in the plant.

  12. Application of plutonium inventory measurement system (PIMS) and temporary canister verification system (TCVS) at RRP

    International Nuclear Information System (INIS)

    Noguchi, Yoshihiko; Nakamura, Hironobu; Adachi, Hideto; Iwamoto, Tomonori

    2004-01-01

    In U-Pu co-denitration area at Rokkasho Reprocessing Plant (RRP), Plutonium Inventory Measurement System (PIMS) and Temporary Canister Verification System (TCVS) are installed to provide efficient and effective safeguards. PIMS measures Pu quantity inside pipes and vessels installed in glove boxes by total neutron counting method. PIMS consists of total 142 neutron detector attached on the wall and top of glove boxes and neutron count rates of each detectors are related to each other to calculate Pu quantity of each process areas. In this moment, inactive calibration using Cf-source was completed. On the other hand, TCVS measures Pu quantity of canisters inside temporary storage by coincidence counting method and it will be installed before the active test. These systems have monitoring function as additional measures. This paper describes specification, performance and measurement principles of PIMS and TCVS. (author)

  13. Analysis of passive autocatalytic recombiners installation in Cofrentes NPP

    International Nuclear Information System (INIS)

    Del Carmen Molina, Cesar Serrano; Jimenez, Gonzalo

    2014-01-01

    The analysis of Passive Autocatalytic Recombiners (PAR) installation in Cofrentes NPP is a regulatory requirement from the stress tests carried out due to the Fukushima accident. The analysis has been developed by IIC with the support of UPM-ETSII, and defines the PARs configuration to be installed into the containment/drywell to minimize the risks derived from hydrogen generation during a severe accident. The analysis has been developed in three stages: - Generation and release of hydrogen in containment/drywell: The mass and energy sources releases are analysed with MAAP4.0.7 code and covers all phases of the severe accident in-vessel and ex-vessel. Probabilistic and deterministic criteria were used to select the accident sequences. Model sensitivities analyses were included maximizing the global hydrogen releases as well as the peak values. - Distribution of hydrogen in containment/drywell: Hydrogen and other gases distribution is developed with GOTHIC 8.0 code using a 3D detailed model. Long term simulation necessities were taken into account during model adjustment. Model verification was carried out by comparing the results with several experimental data and simulations with other thermohydraulic codes, both covering the range of simulation. The model considers mass and energy discharges in the suppression pool as well as and in the containment atmosphere and takes into account heat transfer and condensation process. In addition, the influence of containment systems activation has been evaluated. - PAR sizing and locating: The location and size analysis of PAR considers the hydrogen depletion rates and operating conditions of different equipment. Furthermore, a post processing treatment has been developed to deeply analyse all parameters involved in the combustion phenomena and thus identify the risks zones. The study takes into account different distribution options regarding cost and operational criteria. Walk-downs were carried out for a realistic

  14. Verification of absorbed dose calculation with XIO Radiotherapy Treatment Planning System

    International Nuclear Information System (INIS)

    Bokulic, T.; Budanec, M.; Frobe, A.; Gregov, M.; Kusic, Z.; Mlinaric, M.; Mrcela, I.

    2013-01-01

    Modern radiotherapy relies on computerized treatment planning systems (TPS) for absorbed dose calculation. Most TPS require a detailed model of a given machine and therapy beams. International Atomic Energy Agency (IAEA) recommends acceptance testing for the TPS (IAEA-TECDOC-1540). In this study we present customization of those tests for measurements with the purpose of verification of beam models intended for clinical use in our department. Elekta Synergy S linear accelerator installation and data acquisition for Elekta CMS XiO 4.62 TPS was finished in 2011. After the completion of beam modelling in TPS, tests were conducted in accordance with the IAEA protocol for TPS dose calculation verification. The deviations between the measured and calculated dose were recorded for 854 points and 11 groups of tests in a homogenous phantom. Most of the deviations were within tolerance. Similar to previously published results, results for irregular L shaped field and asymmetric wedged fields were out of tolerance for certain groups of points.(author)

  15. A rule-based verification and control framework in ATLAS Trigger-DAQ

    CERN Document Server

    Kazarov, A; Lehmann-Miotto, G; Sloper, J E; Ryabov, Yu; Computing In High Energy and Nuclear Physics

    2007-01-01

    In order to meet the requirements of ATLAS data taking, the ATLAS Trigger-DAQ system is composed of O(1000) of applications running on more than 2600 computers in a network. With such system size, s/w and h/w failures are quite often. To minimize system downtime, the Trigger-DAQ control system shall include advanced verification and diagnostics facilities. The operator should use tests and expertise of the TDAQ and detectors developers in order to diagnose and recover from errors, if possible automatically. The TDAQ control system is built as a distributed tree of controllers, where behavior of each controller is defined in a rule-based language allowing easy customization. The control system also includes verification framework which allow users to develop and configure tests for any component in the system with different levels of complexity. It can be used as a stand-alone test facility for a small detector installation, as part of the general TDAQ initialization procedure, and for diagnosing the problems ...

  16. Multilateral disarmament verification

    International Nuclear Information System (INIS)

    Persbo, A.

    2013-01-01

    Non-governmental organisations, such as VERTIC (Verification Research, Training and Information Centre), can play an important role in the promotion of multilateral verification. Parties involved in negotiating nuclear arms accords are for the most part keen that such agreements include suitable and robust provisions for monitoring and verification. Generally progress in multilateral arms control verification is often painstakingly slow, but from time to time 'windows of opportunity' - that is, moments where ideas, technical feasibility and political interests are aligned at both domestic and international levels - may occur and we have to be ready, so the preparatory work is very important. In the context of nuclear disarmament, verification (whether bilateral or multilateral) entails an array of challenges, hurdles and potential pitfalls relating to national security, health, safety and even non-proliferation, so preparatory work is complex and time-greedy. A UK-Norway Initiative was established in order to investigate the role that a non-nuclear-weapon state such as Norway could potentially play in the field of nuclear arms control verification. (A.C.)

  17. Performance Verification for Safety Injection Tank with Fluidic Device

    International Nuclear Information System (INIS)

    Yune, Seok Jeong; Kim, Da Yong

    2014-01-01

    In LBLOCA, the SITs of a conventional nuclear power plant deliver excessive cooling water to the reactor vessel causing the water to flow into the containment atmosphere. In an effort to make it more efficient, Fluidic Device (FD) is installed inside a SIT of Advanced Power Reactor 1400 (APR 1400). FD, a complete passive controller which doesn't require actuating power, controls injection flow rates which are susceptible to a change in the flow resistance inside a vortex chamber of FD. When SIT Emergency Core Cooling (ECC) water level is above the top of the stand pipe, the water enters the vortex chamber through both the top of the stand pipe and the control ports resulting in injection of the water at a large flow rate. When the water level drops below the top of the stand pipe, the water only enters the vortex chamber through the control ports resulting in vortex formation in the vortex chamber and a relatively small flow injection. Performance verification of SIT shall be carried out because SITs play an integral role to mitigate accidents. In this paper, the performance verification method of SIT with FD is presented. In this paper, the equations for calculation of flow resistance coefficient (K) are induced to evaluate on-site performance of APR 1400 SIT with FD. Then, the equations are applied to the performance verification of SIT with FD and good results are obtained

  18. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  19. Design of verification platform for wireless vision sensor networks

    Science.gov (United States)

    Ye, Juanjuan; Shang, Fei; Yu, Chuang

    2017-08-01

    At present, the majority of research for wireless vision sensor networks (WVSNs) still remains in the software simulation stage, and the verification platforms of WVSNs that available for use are very few. This situation seriously restricts the transformation from theory research of WVSNs to practical application. Therefore, it is necessary to study the construction of verification platform of WVSNs. This paper combines wireless transceiver module, visual information acquisition module and power acquisition module, designs a high-performance wireless vision sensor node whose core is ARM11 microprocessor and selects AODV as the routing protocol to set up a verification platform called AdvanWorks for WVSNs. Experiments show that the AdvanWorks can successfully achieve functions of image acquisition, coding, wireless transmission, and obtain the effective distance parameters between nodes, which lays a good foundation for the follow-up application of WVSNs.

  20. Verification test of control rod system for HTR-10

    International Nuclear Information System (INIS)

    Zhou Huizhong; Diao Xingzhong; Huang Zhiyong; Cao Li; Yang Nianzu

    2002-01-01

    There are 10 sets of control rods and driving devices in 10 MW High Temperature Gas-cooled Test Reactor (HTR-10). The control rod system is the controlling and shutdown system of HTR-10, which is designed for reactor criticality, operation, and shutdown. In order to guarantee technical feasibility, a series of verification tests were performed, including room temperature test, thermal test, test after control rod system installed in HTR-10, and test of control rod system before HTR-10 first criticality. All the tests data showed that driving devices working well, control rods running smoothly up and down, random position settling well, and exactly position indicating

  1. Software verification for nuclear industry

    International Nuclear Information System (INIS)

    Wilburn, N.P.

    1985-08-01

    Why verification of software products throughout the software life cycle is necessary is considered. Concepts of verification, software verification planning, and some verification methodologies for products generated throughout the software life cycle are then discussed

  2. The design of verification regimes

    International Nuclear Information System (INIS)

    Gallagher, N.W.

    1991-01-01

    Verification of a nuclear agreement requires more than knowledge of relevant technologies and institutional arrangements. It also demands thorough understanding of the nature of verification and the politics of verification design. Arms control efforts have been stymied in the past because key players agreed to verification in principle, only to disagree radically over verification in practice. In this chapter, it is shown that the success and stability of arms control endeavors can be undermined by verification designs which promote unilateral rather than cooperative approaches to security, and which may reduce, rather than enhance, the security of both sides. Drawing on logical analysis and practical lessons from previous superpower verification experience, this chapter summarizes the logic and politics of verification and suggests implications for South Asia. The discussion begins by determining what properties all forms of verification have in common, regardless of the participants or the substance and form of their agreement. Viewing verification as the political process of making decisions regarding the occurrence of cooperation points to four critical components: (1) determination of principles, (2) information gathering, (3) analysis and (4) projection. It is shown that verification arrangements differ primarily in regards to how effectively and by whom these four stages are carried out

  3. Verification of classified fissile material using unclassified attributes

    International Nuclear Information System (INIS)

    Nicholas, N.J.; Fearey, B.L.; Puckett, J.M.; Tape, J.W.

    1998-01-01

    This paper reports on the most recent efforts of US technical experts to explore verification by IAEA of unclassified attributes of classified excess fissile material. Two propositions are discussed: (1) that multiple unclassified attributes could be declared by the host nation and then verified (and reverified) by the IAEA in order to provide confidence in that declaration of a classified (or unclassified) inventory while protecting classified or sensitive information; and (2) that attributes could be measured, remeasured, or monitored to provide continuity of knowledge in a nonintrusive and unclassified manner. They believe attributes should relate to characteristics of excess weapons materials and should be verifiable and authenticatable with methods usable by IAEA inspectors. Further, attributes (along with the methods to measure them) must not reveal any classified information. The approach that the authors have taken is as follows: (1) assume certain attributes of classified excess material, (2) identify passive signatures, (3) determine range of applicable measurement physics, (4) develop a set of criteria to assess and select measurement technologies, (5) select existing instrumentation for proof-of-principle measurements and demonstration, and (6) develop and design information barriers to protect classified information. While the attribute verification concepts and measurements discussed in this paper appear promising, neither the attribute verification approach nor the measurement technologies have been fully developed, tested, and evaluated

  4. LLNL`s partnership with selected US mines, for CTBT verification: A pictorial and some reflections

    Energy Technology Data Exchange (ETDEWEB)

    Heuze, F.E.

    1996-01-01

    The verification of an upcoming Comprehensive Test Ban Treaty (CTBT) will involve seismic monitoring and will provide for on-site inspections which may include drilling. Because of the fact that mining operations can send out strong seismic signals, many mining districts in the US and abroad may come under special scrutiny. The seismic signals can be generated by the use of large quantities of conventional explosives, by the collapse of underground workings, or by sudden energy release in the ground such as in rock bursts and coal bumps. These mining activities may be the cause of false alarms, but may also offer opportunities for evasive nuclear testing. So in preparing for future verification of a CTBT it becomes important to address the mining-related questions. For the United States, these are questions to be answered with respect to foreign mines. But there is a good amount of commonality in mining methods worldwide. Studies conducted at US mine sites can provide good analogs of activities that may be carried out for overseas CTBT verification, save for the expected logistical impediments.

  5. Improved verification methods for safeguards verifications at enrichment plants

    International Nuclear Information System (INIS)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D.

    2009-01-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF 6 cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  6. Improved verification methods for safeguards verifications at enrichment plants

    Energy Technology Data Exchange (ETDEWEB)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D. [Department of Safeguards, International Atomic Energy Agency, Wagramer Strasse 5, A1400 Vienna (Austria)

    2009-07-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF{sub 6} cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  7. Verification and validation interim report for portable 1,000 CFM exhauster skids POR-007/Skid E and POR-008/Skid F

    International Nuclear Information System (INIS)

    Nelson, O.D.

    1998-01-01

    This Verification and Validation (V/V) interim report summarizes to date the results of the V/V tasks performed in each of the following life cycle phases: concept, requirements, design, implementation, test, installation and checkout, and operation and maintenance. At the end of the installation and checkout phase, the V/V final report will be issued. This interim report contains or references the following for each phase: Description of V/V tasks performed; Summary of task results; Summary of anomalies and resolution; Assessment of system quality; Recommendations

  8. Physics Verification Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-12

    The purpose of the verification project is to establish, through rigorous convergence analysis, that each ASC computational physics code correctly implements a set of physics models and algorithms (code verification); Evaluate and analyze the uncertainties of code outputs associated with the choice of temporal and spatial discretization (solution or calculation verification); and Develop and maintain the capability to expand and update these analyses on demand. This presentation describes project milestones.

  9. Sensor-fusion-based biometric identity verification

    International Nuclear Information System (INIS)

    Carlson, J.J.; Bouchard, A.M.; Osbourn, G.C.; Martinez, R.F.; Bartholomew, J.W.; Jordan, J.B.; Flachs, G.M.; Bao, Z.; Zhu, L.

    1998-02-01

    Future generation automated human biometric identification and verification will require multiple features/sensors together with internal and external information sources to achieve high performance, accuracy, and reliability in uncontrolled environments. The primary objective of the proposed research is to develop a theoretical and practical basis for identifying and verifying people using standoff biometric features that can be obtained with minimal inconvenience during the verification process. The basic problem involves selecting sensors and discovering features that provide sufficient information to reliably verify a person's identity under the uncertainties caused by measurement errors and tactics of uncooperative subjects. A system was developed for discovering hand, face, ear, and voice features and fusing them to verify the identity of people. The system obtains its robustness and reliability by fusing many coarse and easily measured features into a near minimal probability of error decision algorithm

  10. Applicability of federal and state environmental requirements to selected DOE field installations and recommendations for development of generic compliance guidance. Final report

    International Nuclear Information System (INIS)

    1982-01-01

    This final report identifies and describes federal and state environmental requirements applicable to selected Department of Energy (DOE) nuclear field installations, establishes priorities for the requirements, determines the need for development of additional compliance guidance, and recommends development of compliance guidance for specific priority requirements. Compliance guidance developed as part of the study is summarized. The applicability of environmental requirements to 12 DOE field installations was reviewed. Five installations were examined under Task 4. They are: Nevada Test Site; Lawrence Berkeley Laboratory; Paducah Gaseous Diffusion Plant; Oak Ridge Y-12 Plant; and Los Alamos Scientific Laboratory. Seven other installations were reviewed under Task 2 and included: Idaho National Engineering Laboratory; Hanford; Savannah River Plant; Oak Ridge Gaseous Diffusion Plant; Pantex Plant; Rocky Flats Plant; and Lawrence Livermore Laboratory. This report combines results of the two tasks. The objective of the study was to identify the set of environmental requirements which are applicable to DOE field installations, track changes in the requirements, and prepare compliance guidance for important requirements and important regulatory developments as necessary. A cumulative calendar update for July 1982 represents the current status of applicable requirements. Environmental profiles of each facility, along with ambient monitoring results, are presented. Applicable federal requirements are identified. The specific applicability of federal and state requirements is detailed for each installation. Compliance guidance available from various agencies is described. Each requirement described is ranked by priority, and recommendations are made for development of additional guidance

  11. Perspex in the verification routines for accelerator beam; El Perspex en las rutinas de verificacion del haz en un acelerador

    Energy Technology Data Exchange (ETDEWEB)

    Paredes G, L.; Genis S, R. [Instituto Nacional de Investigaciones Nucleares, Apdo. Postal 18-1027, 11801 Mexico D.F. (Mexico)

    1998-12-31

    It is analyzed the use of a perspex solid phantom, adequately referred to a water phantom, as an auxiliary alternative for the daily stability verification routines or constance of radiation beam, as an option in the case of radiotherapy installations with high charge of accelerator working and with basic dosimetry equipment. (Author)

  12. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    International Nuclear Information System (INIS)

    PICKETT, W.W.

    2000-01-01

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. Because this sub-project is still in the construction/start-up phase, all verification activities have not yet been performed (e.g., canister cover cap and welding fixture system verification, MCO Internal Gas Sampling equipment verification, and As-built verification.). The verification activities identified in this report that still are to be performed will be added to the start-up punchlist and tracked to closure

  13. Design Verification Report Spent Nuclear Fuel (SNF) Project Canister Storage Building (CSB)

    Energy Technology Data Exchange (ETDEWEB)

    PICKETT, W.W.

    2000-09-22

    The Sub-project W379, ''Spent Nuclear Fuel Canister Storage Building (CSB),'' was established as part of the Spent Nuclear Fuel (SNF) Project. The primary mission of the CSB is to safely store spent nuclear fuel removed from the K Basins in dry storage until such time that it can be transferred to the national geological repository at Yucca Mountain Nevada. This sub-project was initiated in late 1994 by a series of studies and conceptual designs. These studies determined that the partially constructed storage building, originally built as part of the Hanford Waste Vitrification Plant (HWVP) Project, could be redesigned to safely store the spent nuclear fuel. The scope of the CSB facility initially included a receiving station, a hot conditioning system, a storage vault, and a Multi-Canister Overpack (MCO) Handling Machine (MHM). Because of evolution of the project technical strategy, the hot conditioning system was deleted from the scope and MCO welding and sampling stations were added in its place. This report outlines the methods, procedures, and outputs developed by Project W379 to verify that the provided Structures, Systems, and Components (SSCs): satisfy the design requirements and acceptance criteria; perform their intended function; ensure that failure modes and hazards have been addressed in the design; and ensure that the SSCs as installed will not adversely impact other SSCs. Because this sub-project is still in the construction/start-up phase, all verification activities have not yet been performed (e.g., canister cover cap and welding fixture system verification, MCO Internal Gas Sampling equipment verification, and As-built verification.). The verification activities identified in this report that still are to be performed will be added to the start-up punchlist and tracked to closure.

  14. Evaluation Of RSG-GAS Power Installed After 12 Years

    International Nuclear Information System (INIS)

    Mrsahala, Yan Bony

    2001-01-01

    The total power installed in RSG-GAS electric system less then 3 x 2500 KVA. Some of powers installed included are the never used loads, so the operationally total load installed that regularly operational and incidental are amount about 3700 KVA. In this condition, the capacity of power transformer installed 3 x 2500 KVA becomes larger. The influences of the numinous power are electric bill payment by RSG-GAS. The reduces power installed may be done as well as remember that some of the load not be operation so that the power consume for that facility could be cut off. The evaluation and calculation result gives some alternatively can be selected to minimize the electric bill payment

  15. Analysis of heat source selection for residential buildings in rural areas

    OpenAIRE

    Szul Tomasz

    2018-01-01

    The research aiming to check whether the output of currently installed boilers matches the use requirements together with estimation of their energy efficiency was carried out on a group of 84 single-family residential buildings located in rural areas. Heating and hot water energy needs were calculated for each building in order to determine the use requirements. This enabled verification whether the currently installed boilers match the actual use requirements in the buildings. Based on the ...

  16. FEFTRA {sup TM} verification. Update 2013

    Energy Technology Data Exchange (ETDEWEB)

    Loefman, J. [VTT Technical Research Centre of Finland, Espoo (Finland); Meszaros, F. [The Relief Lab., Harskut, (Hungary)

    2013-12-15

    FEFTRA is a finite element program package developed at VTT for the analyses of groundwater flow in Posiva's site evaluation programme that seeks a final repository for spent nuclear fuel in Finland. The code is capable of modelling steady-state or transient groundwater flow, solute transport and heat transfer as coupled or separate phenomena. Being a typical research tool used only by its developers, the FEFTRA code lacked long of a competent testing system and precise documentation of the verification of the code. In 2006 a project was launched, in which the objective was to reorganise all the material related to the existing verification cases and place them into the FEFTRA program path under the version-control system. The work also included development of a new testing system, which automatically calculates the selected cases, checks the new results against the old approved results and constructs a summary of the test run. All the existing cases were gathered together, checked and added into the new testing system. The documentation of each case was rewritten with the LATEX document preparation system and added into the testing system in a way that the whole test documentation (this report) could easily be generated in a postscript or pdf-format. The current report is the updated version of the verification report published in 2007. At the moment the report includes mainly the cases related to the testing of the primary result quantities (i.e. hydraulic head, pressure, salinity concentration, temperature). The selected cases, however, represent typical hydrological applications, in which the program package has been and will be employed in the Posiva's site evaluation programme, i.e. the simulations of groundwater flow, solute transport and heat transfer as separate or coupled phenomena. The comparison of the FEFTRA results to the analytical, semianalytical and/or other numerical solutions proves the capability of FEFTRA to simulate such problems

  17. Annual report 1 January - 31 December 1978 computer installation

    International Nuclear Information System (INIS)

    1979-05-01

    The computer installation of Risoe National Laboratory functions as an internal service bureau. The staff is concentrated around operating the computer and providing expertise in the fields of numerical mathematics, statistics, operation research, systems software, and software engineering. Selected parts of the activities at the Computer Installation are described. (B.P.)

  18. FMCT verification: Case studies

    International Nuclear Information System (INIS)

    Hui Zhang

    2001-01-01

    Full text: How to manage the trade-off between the need for transparency and the concern about the disclosure of sensitive information would be a key issue during the negotiations of FMCT verification provision. This paper will explore the general concerns on FMCT verification; and demonstrate what verification measures might be applied to those reprocessing and enrichment plants. A primary goal of an FMCT will be to have the five declared nuclear weapon states and the three that operate unsafeguarded nuclear facilities become parties. One focus in negotiating the FMCT will be verification. Appropriate verification measures should be applied in each case. Most importantly, FMCT verification would focus, in the first instance, on these states' fissile material production facilities. After the FMCT enters into force, all these facilities should be declared. Some would continue operating to produce civil nuclear power or to produce fissile material for non- explosive military uses. The verification measures necessary for these operating facilities would be essentially IAEA safeguards, as currently being applied to non-nuclear weapon states under the NPT. However, some production facilities would be declared and shut down. Thus, one important task of the FMCT verifications will be to confirm the status of these closed facilities. As case studies, this paper will focus on the verification of those shutdown facilities. The FMCT verification system for former military facilities would have to differ in some ways from traditional IAEA safeguards. For example, there could be concerns about the potential loss of sensitive information at these facilities or at collocated facilities. Eventually, some safeguards measures such as environmental sampling might be seen as too intrusive. Thus, effective but less intrusive verification measures may be needed. Some sensitive nuclear facilities would be subject for the first time to international inspections, which could raise concerns

  19. Inspector measurement verification activities

    International Nuclear Information System (INIS)

    George, R.S.; Crouch, R.

    e most difficult and complex activity facing a safeguards inspector involves the verification of measurements and the performance of the measurement system. Remeasurement is the key to measurement verification activities. Remeasurerements using the facility's measurement system provide the bulk of the data needed for determining the performance of the measurement system. Remeasurements by reference laboratories are also important for evaluation of the measurement system and determination of systematic errors. The use of these measurement verification activities in conjunction with accepted inventory verification practices provides a better basis for accepting or rejecting an inventory. (U.S.)

  20. Verification and disarmament

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H. [IAEA, Vienna (Austria)

    1998-07-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed.

  1. Verification and disarmament

    International Nuclear Information System (INIS)

    Blix, H.

    1998-01-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed

  2. Information handbook on independent spent fuel storage installations

    International Nuclear Information System (INIS)

    Raddatz, M.G.; Waters, M.D.

    1996-12-01

    In this information handbook, the staff of the U.S. Nuclear Regulatory Commission describes (1) background information regarding the licensing and history of independent spent fuel storage installations (ISFSIs), (2) a discussion of the licensing process, (3) a description of all currently approved or certified models of dry cask storage systems (DCSSs), and (4) a description of sites currently storing spent fuel in an ISFSI. Storage of spent fuel at ISFSIs must be in accordance with the provisions of 10 CFR Part 72. The staff has provided this handbook for information purposes only. The accuracy of any information herein is not guaranteed. For verification or for more details, the reader should refer to the respective docket files for each DCSS and ISFSI site. The information in this handbook is current as of September 1, 1996

  3. System for verification in situ of current transformers in high voltage substations; Sistema para verificacao in situ de transformadores de corrente em substacoes de alta tensao

    Energy Technology Data Exchange (ETDEWEB)

    Mendonca, Pedro Henrique; Costa, Marcelo M. da; Dahlke, Diogo B.; Ikeda, Minoru [LACTEC - Instituto de Tecnologia para o Desenvolvimento, Curitiba, PR (Brazil)], Emails: pedro.henrique@lactec.org.br, arinos@lactec.org.br, diogo@lactec.org.br, minoru@lactec.org.br, Celso.melo@copel.com; Carvalho, Joao Claudio D. de [ELETRONORTE, Belem, PR (Brazil)], E-mail: marcelo.melo@eln.gov.br; Teixeira Junior, Jose Arinos [ELETROSUL, Florianopolis, SC (Brazil)], E-mail: jclaudio@eletrosul.gov.br; Melo, Celso F. [Companhia Paranaense de Energia (COPEL), Curitiba, PR (Brazil)], E-mail: Celso.melo@copel.com

    2009-07-01

    This work presents an alternative proposal to the execute the calibration of conventional current transformer at the field, using a verification system composed by a optical current transformer as a reference standard, able to installation in extra high voltage bars.

  4. Dose delivery verification and accuracy assessment of stereotaxy in stereotactic radiotherapy and radiosurgery

    International Nuclear Information System (INIS)

    Pelagade, S.M.; Bopche, T.T.; Namitha, K.; Munshi, M.; Bhola, S.; Sharma, H.; Patel, B.K.; Vyas, R.K.

    2008-01-01

    The outcome of stereotactic radiotherapy (SRT) and stereotactic radiosurgery (SRS) in both benign and malignant tumors within the cranial region highly depends on precision in dosimetry, dose delivery and the accuracy assessment of stereotaxy associated with the unit. The frames BRW (Brown-Roberts-Wells) and GTC (Gill- Thomas-Cosman) can facilitate accurate patient positioning as well as precise targeting of tumours. The implementation of this technique may result in a significant benefit as compared to conventional therapy. As the target localization accuracy is improved, the demand for treatment planning accuracy of a TPS is also increased. The accuracy of stereotactic X Knife treatment planning system has two components to verify: (i) the dose delivery verification and the accuracy assessment of stereotaxy; (ii) to ensure that the Cartesian coordinate system associated is well established within the TPS for accurate determination of a target position. Both dose delivery verification and target positional accuracy affect dose delivery accuracy to a defined target. Hence there is a need to verify these two components in quality assurance protocol. The main intention of this paper is to present our dose delivery verification procedure using cylindrical wax phantom and accuracy assessment (target position) of stereotaxy using Geometric Phantom on Elekta's Precise linear accelerator for stereotactic installation

  5. National Study of Word Processing Installations in Selected Business Organizations. A Report on the National Word Processing Research Study of Delta Pi Epsilon.

    Science.gov (United States)

    Scriven, Jolene D.; And Others

    A study was conducted (1) to determine current practices in word processing installations in selected organizations throughout the United States, and (2) to ascertain anticipated future developments in word processing as well as to provide recommendations for educational institutions that prepare workers for business offices. Seven interview…

  6. HDL to verification logic translator

    Science.gov (United States)

    Gambles, J. W.; Windley, P. J.

    1992-01-01

    The increasingly higher number of transistors possible in VLSI circuits compounds the difficulty in insuring correct designs. As the number of possible test cases required to exhaustively simulate a circuit design explodes, a better method is required to confirm the absence of design faults. Formal verification methods provide a way to prove, using logic, that a circuit structure correctly implements its specification. Before verification is accepted by VLSI design engineers, the stand alone verification tools that are in use in the research community must be integrated with the CAD tools used by the designers. One problem facing the acceptance of formal verification into circuit design methodology is that the structural circuit descriptions used by the designers are not appropriate for verification work and those required for verification lack some of the features needed for design. We offer a solution to this dilemma: an automatic translation from the designers' HDL models into definitions for the higher-ordered logic (HOL) verification system. The translated definitions become the low level basis of circuit verification which in turn increases the designer's confidence in the correctness of higher level behavioral models.

  7. Installation, care, and maintenance of wood shake and shingle siding

    Science.gov (United States)

    Jack Dwyer; Tony Bonura; Arnie Nebelsick; Sam Williams; Christopher G. Hunt

    2011-01-01

    This article gives general guidelines for selection, installation, finishing, and maintenance of wood shakes and shingles. The authors gathered information from a variety of sources: research publications on wood finishing, technical data sheets from paint manufacturers, installation instructions for shake and shingle siding, and interviews with experts having...

  8. Study on the role of the United Nations in the field of verification

    International Nuclear Information System (INIS)

    1991-01-01

    The present report has been prepared pursuant to General Assembly resolution 43/81 B. The Group of Governmental Experts, while taking fully into account the mandate of the resolution, that is, to prepare a study that addresses the role of the United Nations in the field of verification of arms limitation and disarmament, has also taken into consideration approaches, methods, procedures and techniques relating to other arrangements in the area of international peace and security which might otherwise be useful to the process of verification of arms limitation and disarmament agreements. A selected bibliography on technical aspects of verification is given. However, materials published in languages other than English are not adequately reflected. Refs

  9. Planning and acceptance testing of MV therapy installations

    International Nuclear Information System (INIS)

    Almond, Peter R.; Horton, John L.

    1995-01-01

    Purpose: This course is designed for practitioners and beginners in brachytherapy. The aim is to review biological principles equipment are aware of all aspects involved. The object is to cover in a broad overview the considerations that go into selecting, installing, testing and accepting megavoltage therapy equipment and to provide a resource for more detailed information. Planning and acceptance testing of a megavoltage therapy installation is a major undertaking for any size group, institution or department. It can take approximately two years from the time a decision is made to get a machine to where the first patient is treated. Because the equipment and site preparation are expensive, and most of the machines are complex and can be supplied by several different manufacturers, it is imperative that a great deal of thought and care go into the decision: the aim being that the specifications of the machine that is installed meet the immediate need of the department and the needs for the projected lifetime of the equipment. A general survey of the types of equipment available will be presented. This will concentrate on general purpose linear accelerators, although Cobalt 60 machines, microtrons and special purpose machines (intra-operative equipment) will also be covered. General descriptions of the machines along with typical specifications will be given. Selecting the best machine to meet specific needs can be quite complex and criteria for making the selection are presented in a series of twelve steps. site selection and room design, including the console area, are also critical. The general principles for shielding calculations will be provided. Critical to any installation is the acceptance testing of the equipment including material and radiation oncology performance tests. These tests will be outlined. A reading list of suitable references describing in detail many of the aspects of this course will be provided

  10. Evaluation of Installation Time for SMASHmount by SMASHsolar

    Energy Technology Data Exchange (ETDEWEB)

    2017-04-05

    The Department of Energy SunShot Incubator program provides early-stage assistance to help startup companies cross technological barriers to commercialization while encouraging private sector investment. The SunShot Incubator program aims to shorten the time it takes for a young business or company to develop an innovative product concept and make it commercially available, which includes product prototyping, deployment, and, potentially, manufacturing. SMASHsolar was selected as an Incubator awardee to develop a simple, snap-together, module-integrated photovoltaic (PV) mounting system in attempts to dramatically reduce the time, effort and skill needed to install rooftop solar. In support of this award, the National Renewable Energy Laboratory worked with SMASHsolar to develop a procedure for evaluating the installation time required for the SMASHmount system vs. widely-available rail systems. Amongst several installations, NREL measured the following installation times, subject to the qualifications and conditions described later in this report. NREL found that the SMASHsolar SMASHmount system was installed between 15% and 37% faster than tested competing systems after one or two installations of the system.

  11. Organics Verification Study for Sinclair and Dyes Inlets, Washington

    Energy Technology Data Exchange (ETDEWEB)

    Kohn, Nancy P.; Brandenberger, Jill M.; Niewolny, Laurie A.; Johnston, Robert K.

    2006-09-28

    Sinclair and Dyes Inlets near Bremerton, Washington, are on the State of Washington 1998 303(d) list of impaired waters because of fecal coliform contamination in marine water, metals in sediment and fish tissue, and organics in sediment and fish tissue. Because significant cleanup and source control activities have been conducted in the inlets since the data supporting the 1998 303(d) listings were collected, two verification studies were performed to address the 303(d) segments that were listed for metal and organic contaminants in marine sediment. The Metals Verification Study (MVS) was conducted in 2003; the final report, Metals Verification Study for Sinclair and Dyes Inlets, Washington, was published in March 2004 (Kohn et al. 2004). This report describes the Organics Verification Study that was conducted in 2005. The study approach was similar to the MVS in that many surface sediment samples were screened for the major classes of organic contaminants, and then the screening results and other available data were used to select a subset of samples for quantitative chemical analysis. Because the MVS was designed to obtain representative data on concentrations of contaminants in surface sediment throughout Sinclair Inlet, Dyes Inlet, Port Orchard Passage, and Rich Passage, aliquots of the 160 MVS sediment samples were used in the analysis for the Organics Verification Study. However, unlike metals screening methods, organics screening methods are not specific to individual organic compounds, and are not available for some target organics. Therefore, only the quantitative analytical results were used in the organics verification evaluation. The results of the Organics Verification Study showed that sediment quality outside of Sinclair Inlet is unlikely to be impaired because of organic contaminants. Similar to the results for metals, in Sinclair Inlet, the distribution of residual organic contaminants is generally limited to nearshore areas already within the

  12. Random selection of items. Selection of n1 samples among N items composing a stratum

    International Nuclear Information System (INIS)

    Jaech, J.L.; Lemaire, R.J.

    1987-02-01

    STR-224 provides generalized procedures to determine required sample sizes, for instance in the course of a Physical Inventory Verification at Bulk Handling Facilities. The present report describes procedures to generate random numbers and select groups of items to be verified in a given stratum through each of the measurement methods involved in the verification. (author). 3 refs

  13. Installation, care, and maintenance of wood shake and shingle roofs

    Science.gov (United States)

    Tony Bonura; Jack Dwyer; Arnie Nebelsick; Brent Stuart; R. Sam Williams; Christopher Hunt

    2011-01-01

    This article gives general guidelines for selection, installation, finishing, and maintenance of wood shake and shingle roofs. The authors have gathered information from a variety of sources: research publications on wood finishing, technical data sheets from paint manufacturers, installation instructions for shake and shingle roofs, and interviews with experts having...

  14. Likelihood-ratio-based biometric verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    2002-01-01

    This paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that for single-user verification the likelihood ratio is optimal.

  15. Likelihood Ratio-Based Biometric Verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    The paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that, for single-user verification, the likelihood ratio is optimal.

  16. Feedback Seeking in Early Adolescence: Self-Enhancement or Self-Verification?

    Science.gov (United States)

    Rosen, Lisa H; Principe, Connor P; Langlois, Judith H

    2013-02-13

    The authors examined whether early adolescents ( N = 90) solicit self-enhancing feedback (i.e., positive feedback) or self-verifying feedback (i.e., feedback congruent with self-views, even when these views are negative). Sixth, seventh, and eighth graders first completed a self-perception measure and then selected whether to receive positive or negative feedback from an unknown peer in different domains of self. Results were consistent with self-verification theory; adolescents who perceived themselves as having both strengths and weaknesses were more likely to seek negative feedback regarding a self-perceived weakness compared to a self-perceived strength. The authors found similar support for self-verification processes when they considered the entire sample regardless of perceived strengths and weaknesses; hierarchical linear modeling (HLM) examined the predictive power of ratings of self-perceived ability, certainty, and importance on feedback seeking for all participants and provided additional evidence of self-verification strivings in adolescence.

  17. Radiation protection. Radionucleides gauges. Gauges designed for permanent installation

    International Nuclear Information System (INIS)

    1987-06-01

    This norm sets construction and performance characteristics to be satisfied by these gages, together with satisfying to current regulations. It shows test methods which allow verification of the device relevance to the defined obligations: dose equivalent rate evaluation, temperature variation testing, endurance and behavior-in-fire tests. A gage classification is given in relation to the included elements and their performance. The standard precises, for users as well as for manufacters, the indications to be put on the emitting block. With respect to the standard NF M 60-552 of August 1975, following modifications were brought: addition of fixed indications to be put on the emitting block, together with documents joined to every radio-nuclide gage; addition of schemas and tables showing the installation conditions for measurement of dose equivalent rates [fr

  18. Radiation safety system (RSS) backbones: Design, engineering, fabrication and installation

    International Nuclear Information System (INIS)

    Wilmarth, J.E.; Sturrock, J.C.; Gallegos, F.R.

    1998-01-01

    The Radiation Safety System (RSS) Backbones are part of an electrical/electronic/mechanical system insuring safe access and exclusion of personnel to areas at the Los Alamos Neutron Science Center (LANSCE) accelerator. The RSS Backbones control the safety fusible beam plugs which terminate transmission of accelerated ion beams in response to predefined conditions. Any beam or access fault of the backbone inputs will cause insertion of the beam plugs in the low energy beam transport. The Backbones serve the function of tying the beam plugs to the access control systems, beam spill monitoring systems and current-level limiting systems. In some ways the Backbones may be thought of as a spinal column with beam plugs at the head and nerve centers along the spinal column. The two Linac Backbone segments and experimental area segments form a continuous cable plant over 3,500 feet from beam plugs to the tip on the longest tail. The Backbones were installed in compliance with current safety standards, such as installation of the two segments in separate conduits or tray. Monitoring for ground-faults and input wiring verification was an added enhancement to the system. The system has the capability to be tested remotely

  19. Calibration and verification of models of organic carbon removal kinetics in Aerated Submerged Fixed-Bed Biofilm Reactors (ASFBBR): a case study of wastewater from an oil-refinery.

    Science.gov (United States)

    Trojanowicz, Karol; Wójcik, Włodzimierz

    2011-01-01

    The article presents a case-study on the calibration and verification of mathematical models of organic carbon removal kinetics in biofilm. The chosen Harremöes and Wanner & Reichert models were calibrated with a set of model parameters obtained both during dedicated studies conducted at pilot- and lab-scales for petrochemical wastewater conditions and from the literature. Next, the models were successfully verified through studies carried out utilizing a pilot ASFBBR type bioreactor installed in an oil-refinery wastewater treatment plant. During verification the pilot biofilm reactor worked under varying surface organic loading rates (SOL), dissolved oxygen concentrations and temperatures. The verification proved that the models can be applied in practice to petrochemical wastewater treatment engineering for e.g. biofilm bioreactor dimensioning.

  20. Fuzzy Verification of Lower Dimensional Information in a Numerical Simulation of Sea Ice

    Science.gov (United States)

    Sulsky, D.; Levy, G.

    2010-12-01

    Ideally, a verification and validation scheme should be able to evaluate and incorporate lower dimensional features (e.g., discontinuities) contained within a bulk simulation even when not directly observed or represented by model variables. Nonetheless, lower dimensional features are often ignored. Conversely, models that resolve such features and the associated physics well, yet imprecisely are penalized by traditional validation schemes. This can lead to (perceived or real) poor model performance and predictability and can become deleterious in model improvements when observations are sparse, fuzzy, or irregular. We present novel algorithms and a general framework for using information from available satellite data through fuzzy verification that efficiently and effectively remedy the known problems mentioned above. As a proof of concept, we use a sea-ice model with remotely sensed observations of leads in a one-step initialization cycle. Using the new scheme in a sixteen day simulation experiment introduces model skill (against persistence) several days earlier than in the control run, improves the overall model skill and delays its drop off at later stages of the simulation. Although sea-ice models are currently a weak link in climate models, the appropriate choice of data to use, and the fuzzy verification and evaluation of a system’s skill in reproducing lower dimensional features are important beyond the initial application to sea ice. Our strategy and framework for fuzzy verification, selective use of information, and feature extraction could be extended globally and to other disciplines. It can be incorporated in and complement existing verification and validation schemes, increasing their computational efficiency and the information they use. It can be used for model development and improvements, upscaling/downscaling models, and for modeling processes not directly represented by model variables or direct observations. Finally, if successful, it can

  1. Methodology and Toolset for Model Verification, Hardware/Software co-simulation, Performance Optimisation and Customisable Source-code generation

    DEFF Research Database (Denmark)

    Berger, Michael Stübert; Soler, José; Yu, Hao

    2013-01-01

    The MODUS project aims to provide a pragmatic and viable solution that will allow SMEs to substantially improve their positioning in the embedded-systems development market. The MODUS tool will provide a model verification and Hardware/Software co-simulation tool (TRIAL) and a performance...... optimisation and customisable source-code generation tool (TUNE). The concept is depicted in automated modelling and optimisation of embedded-systems development. The tool will enable model verification by guiding the selection of existing open-source model verification engines, based on the automated analysis...

  2. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  3. Defense Infrastructure: DOD Efforts to Prevent and Mitigate Encroachment at Its Installations

    Science.gov (United States)

    2016-11-01

    installation size and projected population growth . What GAO Recommends GAO is not making recommendations in this report. DOD provided technical...Projected Population Growth at 33 Selected Installations (2015 to 2020) 32 Table 4: Summary of Benefits Reported by Readiness and Environmental...installation of interest because of the existence of or potential for future incompatible land use, and (4) projected population growth in adjacent

  4. Implementation of the Fissile Mass Flow Monitor Source Verification and Confirmation

    Energy Technology Data Exchange (ETDEWEB)

    Uckan, Taner [ORNL; March-Leuba, Jose A [ORNL; Powell, Danny H [ORNL; Nelson, Dennis [Sandia National Laboratories (SNL); Radev, Radoslav [Lawrence Livermore National Laboratory (LLNL)

    2007-12-01

    This report presents the verification procedure for neutron sources installed in U.S. Department of Energy equipment used to measure fissile material flow. The Fissile Mass Flow Monitor (FMFM) equipment determines the {sup 235}U fissile mass flow of UF{sub 6} gas streams by using {sup 252}Cf neutron sources for fission activation of the UF{sub 6} gas and by measuring the fission products in the flow. The {sup 252}Cf sources in each FMFM are typically replaced every 2 to 3 years due to their relatively short half-life ({approx} 2.65 years). During installation of the new FMFM sources, the source identity and neutronic characteristics provided by the manufacturer are verified with the following equipment: (1) a remote-control video television (RCTV) camera monitoring system is used to confirm the source identity, and (2) a neutron detection system (NDS) is used for source-strength confirmation. Use of the RCTV and NDS permits remote monitoring of the source replacement process and eliminates unnecessary radiation exposure. The RCTV, NDS, and the confirmation process are described in detail in this report.

  5. Implementation of the Fissile Mass Flow Monitor Source Verification and Confirmation

    International Nuclear Information System (INIS)

    Uckan, Taner; March-Leuba, Jose A.; Powell, Danny H.; Nelson, Dennis; Radev, Radoslav

    2007-01-01

    This report presents the verification procedure for neutron sources installed in U.S. Department of Energy equipment used to measure fissile material flow. The Fissile Mass Flow Monitor (FMFM) equipment determines the 235 U fissile mass flow of UF 6 gas streams by using 252 Cf neutron sources for fission activation of the UF 6 gas and by measuring the fission products in the flow. The 252 Cf sources in each FMFM are typically replaced every 2 to 3 years due to their relatively short half-life (∼ 2.65 years). During installation of the new FMFM sources, the source identity and neutronic characteristics provided by the manufacturer are verified with the following equipment: (1) a remote-control video television (RCTV) camera monitoring system is used to confirm the source identity, and (2) a neutron detection system (NDS) is used for source-strength confirmation. Use of the RCTV and NDS permits remote monitoring of the source replacement process and eliminates unnecessary radiation exposure. The RCTV, NDS, and the confirmation process are described in detail in this report.

  6. Technical safety requirements control level verification

    International Nuclear Information System (INIS)

    STEWART, J.L.

    1999-01-01

    concluded that the TSR control level verification process is clear and logically based upon DOE Order 5480.22, Technical Safety Requirements, and other TSR control selection guidelines. The process provides a documented, traceable basis for TSR level decisions and is a valid reference for preparation of new TSRs

  7. Nuclear power plant C and I design verification by simulation

    International Nuclear Information System (INIS)

    Storm, Joachim; Yu, Kim; Lee, D.Y

    2003-01-01

    An important part of the Advanced Boiling Water Reactor (ABWR) in the Taiwan NPP Lungmen Units no.1 and no.2 is the Full Scope Simulator (FSS). The simulator was to be built according to design data and therefore, apart from the training aspect, a major part of the development is to apply a simulation based test bed for the verification, validation and improvement of plant design in the control and instrumentation (C and I) areas of unit control room equipment, operator Man Machine Interface (MMI), process computer functions and plant procedures. Furthermore the Full Scope Simulator will be used after that to allow proper training of the plant operators two years before Unit no.1 fuel load. The article describes scope, methods and results of the advanced verification and validation process and highlights the advantages of test bed simulation for real power plant design and implementation. Subsequent application of advanced simulation software tools like instrumentation and control translators, graphical model builders, process models, graphical on-line test tools and screen based or projected soft panels, allowed a team to fulfil the task of C and I verification in time before the implementation of the Distributed Control and Information System (DCIS) started. An additional area of activity was the Human Factors Engineering (HFE) for the operator MMI. Due to the fact that the ABWR design incorporates a display-based operation with most of the plant components, a dedicated verification and validation process is required by NUREG-0711. In order to support this activity an engineering test system had been installed for all the necessary HFE investigations. All detected improvements had been properly documented and used to update the plant design documentation by a defined process. The Full Scope Simulator (FSS) with hard panels and stimulated digital control and information system are in the final acceptance test process with the end customer, Taiwan Power Company

  8. The KNICS approach for verification and validation of safety software

    International Nuclear Information System (INIS)

    Cha, Kyung Ho; Sohn, Han Seong; Lee, Jang Soo; Kim, Jang Yeol; Cheon, Se Woo; Lee, Young Joon; Hwang, In Koo; Kwon, Kee Choon

    2003-01-01

    This paper presents verification and validation (VV) to be approached for safety software of POSAFE-Q Programmable Logic Controller (PLC) prototype and Plant Protection System (PPS) prototype, which consists of Reactor Protection System (RPS) and Engineered Safety Features-Component Control System (ESF-CCS) in development of Korea Nuclear Instrumentation and Control System (KNICS). The SVV criteria and requirements are selected from IEEE Std. 7-4.3.2, IEEE Std. 1012, IEEE Std. 1028 and BTP-14, and they have been considered for acceptance framework to be provided within SVV procedures. SVV techniques, including Review and Inspection (R and I), Formal Verification and Theorem Proving, and Automated Testing, are applied for safety software and automated SVV tools supports SVV tasks. Software Inspection Support and Requirement Traceability (SIS-RT) supports R and I and traceability analysis, a New Symbolic Model Verifier (NuSMV), Statemate MAGNUM (STM) ModelCertifier, and Prototype Verification System (PVS) are used for formal verification, and McCabe and Cantata++ are utilized for static and dynamic software testing. In addition, dedication of Commercial-Off-The-Shelf (COTS) software and firmware, Software Safety Analysis (SSA) and evaluation of Software Configuration Management (SCM) are being performed for the PPS prototype in the software requirements phase

  9. Can self-verification strivings fully transcend the self-other barrier? Seeking verification of ingroup identities.

    Science.gov (United States)

    Gómez, Angel; Seyle, D Conor; Huici, Carmen; Swann, William B

    2009-12-01

    Recent research has demonstrated self-verification strivings in groups, such that people strive to verify collective identities, which are personal self-views (e.g., "sensitive") associated with group membership (e.g., "women"). Such demonstrations stop short of showing that the desire for self-verification can fully transcend the self-other barrier, as in people working to verify ingroup identities (e.g., "Americans are loud") even when such identities are not self-descriptive ("I am quiet and unassuming"). Five studies focus on such ingroup verification strivings. Results indicate that people prefer to interact with individuals who verify their ingroup identities over those who enhance these identities (Experiments 1-5). Strivings for ingroup identity verification were independent of the extent to which the identities were self-descriptive but were stronger among participants who were highly invested in their ingroup identities, as reflected in high certainty of these identities (Experiments 1-4) and high identification with the group (Experiments 1-5). In addition, whereas past demonstrations of self-verification strivings have been limited to efforts to verify the content of identities (Experiments 1 to 3), the findings also show that they strive to verify the valence of their identities (i.e., the extent to which the identities are valued; Experiments 4 and 5). Self-verification strivings, rather than self-enhancement strivings, appeared to motivate participants' strivings for ingroup identity verification. Links to collective self-verification strivings and social identity theory are discussed.

  10. Modeling the dynamics of internal flooding - verification analysis

    International Nuclear Information System (INIS)

    Filipov, K.

    2011-01-01

    The results from conducted software WATERFOW's verification analysis, developed for the purposes of reactor building internal flooding analysis have been presented. For the purpose of benchmarking the integrated code MELCOR is selected. Considering the complex structure of reactor building, the sample tests were used to cover the characteristic points of the internal flooding analysis. The inapplicability of MELCOR to the internal flooding study has been proved

  11. Door Hardware and Installations; Carpentry: 901894.

    Science.gov (United States)

    Dade County Public Schools, Miami, FL.

    The curriculum guide outlines a course designed to provide instruction in the selection, preparation, and installation of hardware for door assemblies. The course is divided into five blocks of instruction (introduction to doors and hardware, door hardware, exterior doors and jambs, interior doors and jambs, and a quinmester post-test) totaling…

  12. DOE handbook: Integrated safety management systems (ISMS) verification. Team leader's handbook

    International Nuclear Information System (INIS)

    1999-06-01

    The primary purpose of this handbook is to provide guidance to the ISMS verification Team Leader and the verification team in conducting ISMS verifications. The handbook describes methods and approaches for the review of the ISMS documentation (Phase I) and ISMS implementation (Phase II) and provides information useful to the Team Leader in preparing the review plan, selecting and training the team, coordinating the conduct of the verification, and documenting the results. The process and techniques described are based on the results of several pilot ISMS verifications that have been conducted across the DOE complex. A secondary purpose of this handbook is to provide information useful in developing DOE personnel to conduct these reviews. Specifically, this handbook describes methods and approaches to: (1) Develop the scope of the Phase 1 and Phase 2 review processes to be consistent with the history, hazards, and complexity of the site, facility, or activity; (2) Develop procedures for the conduct of the Phase 1 review, validating that the ISMS documentation satisfies the DEAR clause as amplified in DOE Policies 450.4, 450.5, 450.6 and associated guidance and that DOE can effectively execute responsibilities as described in the Functions, Responsibilities, and Authorities Manual (FRAM); (3) Develop procedures for the conduct of the Phase 2 review, validating that the description approved by the Approval Authority, following or concurrent with the Phase 1 review, has been implemented; and (4) Describe a methodology by which the DOE ISMS verification teams will be advised, trained, and/or mentored to conduct subsequent ISMS verifications. The handbook provides proven methods and approaches for verifying that commitments related to the DEAR, the FRAM, and associated amplifying guidance are in place and implemented in nuclear and high risk facilities. This handbook also contains useful guidance to line managers when preparing for a review of ISMS for radiological

  13. Utterance Verification for Text-Dependent Speaker Recognition

    DEFF Research Database (Denmark)

    Kinnunen, Tomi; Sahidullah, Md; Kukanov, Ivan

    2016-01-01

    Text-dependent automatic speaker verification naturally calls for the simultaneous verification of speaker identity and spoken content. These two tasks can be achieved with automatic speaker verification (ASV) and utterance verification (UV) technologies. While both have been addressed previously...

  14. Initial Verification and Validation Assessment for VERA

    Energy Technology Data Exchange (ETDEWEB)

    Dinh, Nam [North Carolina State Univ., Raleigh, NC (United States); Athe, Paridhi [North Carolina State Univ., Raleigh, NC (United States); Jones, Christopher [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hetzler, Adam [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sieger, Matt [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-04-01

    The Virtual Environment for Reactor Applications (VERA) code suite is assessed in terms of capability and credibility against the Consortium for Advanced Simulation of Light Water Reactors (CASL) Verification and Validation Plan (presented herein) in the context of three selected challenge problems: CRUD-Induced Power Shift (CIPS), Departure from Nucleate Boiling (DNB), and Pellet-Clad Interaction (PCI). Capability refers to evidence of required functionality for capturing phenomena of interest while capability refers to the evidence that provides confidence in the calculated results. For this assessment, each challenge problem defines a set of phenomenological requirements against which the VERA software is assessed. This approach, in turn, enables the focused assessment of only those capabilities relevant to the challenge problem. The evaluation of VERA against the challenge problem requirements represents a capability assessment. The mechanism for assessment is the Sandia-developed Predictive Capability Maturity Model (PCMM) that, for this assessment, evaluates VERA on 8 major criteria: (1) Representation and Geometric Fidelity, (2) Physics and Material Model Fidelity, (3) Software Quality Assurance and Engineering, (4) Code Verification, (5) Solution Verification, (6) Separate Effects Model Validation, (7) Integral Effects Model Validation, and (8) Uncertainty Quantification. For each attribute, a maturity score from zero to three is assigned in the context of each challenge problem. The evaluation of these eight elements constitutes the credibility assessment for VERA.

  15. Approach to IAEA material-balance verification at the Portsmouth Gas Centrifuge Enrichment Plant

    International Nuclear Information System (INIS)

    Gordon, D.M.; Sanborn, J.B.; Younkin, J.M.; DeVito, V.J.

    1983-01-01

    This paper describes a potential approach by which the International Atomic Energy Agency (IAEA) might verify the nuclear-material balance at the Portsmouth Gas Centrifuge Enrichment Plant (GCEP). The strategy makes use of the attributes and variables measurement verification approach, whereby the IAEA would perform independent measurements on a randomly selected subset of the items comprising the U-235 flows and inventories at the plant. In addition, the MUF-D statistic is used as the test statistic for the detection of diversion. The paper includes descriptions of the potential verification activities, as well as calculations of: (1) attributes and variables sample sizes for the various strata, (2) standard deviations of the relevant test statistics, and (3) the detection sensitivity which the IAEA might achieve by this verification strategy at GCEP

  16. Piezometer installation and monitoring procedure: Revision 1

    International Nuclear Information System (INIS)

    1987-04-01

    The Deaf Smith County (Texas) site has been selected by the US Department of Energy as one of three candidate sites for characterization to determine its suitability as a geologic repository for high-level nuclear waste. The installation and monitoring of piezometers has been identified as one of the tasks required during the development of an underground Exploratory Shaft Facility to satisfy specific information needs through a program of in situ testing, instrumentation and monitoring. The scope of piezometer installation and monitoring encompasses the installation of fluid pressure measuring equipment and the subsequent collection, presentation and interpretation of piezometric data from strata surrounding the Exploratory Shaft Facility (ESF) prior to, during and following construction of the ESF, and as part of geohydrologic testing within the ESF. This procedure describes the required instrumentation, equipment, and sequence of activities for piezometer installation in the ESF. The procedure also includes details on the data recording and presentation requirements, personnel responsibilities, test management and quality assurance. 16 refs., 12 figs., 2 tabs

  17. A Practitioners Perspective on Verification

    Science.gov (United States)

    Steenburgh, R. A.

    2017-12-01

    NOAAs Space Weather Prediction Center offers a wide range of products and services to meet the needs of an equally wide range of customers. A robust verification program is essential to the informed use of model guidance and other tools by both forecasters and end users alike. In this talk, we present current SWPC practices and results, and examine emerging requirements and potential approaches to satisfy them. We explore the varying verification needs of forecasters and end users, as well as the role of subjective and objective verification. Finally, we describe a vehicle used in the meteorological community to unify approaches to model verification and facilitate intercomparison.

  18. VERIFICATION OF THE SENTINEL-4 FOCAL PLANE SUBSYSTEM

    Directory of Open Access Journals (Sweden)

    C. Williges

    2017-05-01

    Full Text Available The Sentinel-4 payload is a multi-spectral camera system which is designed to monitor atmospheric conditions over Europe. The German Aerospace Center (DLR in Berlin, Germany conducted the verification campaign of the Focal Plane Subsystem (FPS on behalf of Airbus Defense and Space GmbH, Ottobrunn, Germany. The FPS consists, inter alia, of two Focal Plane Assemblies (FPAs, one for the UV-VIS spectral range (305 nm … 500 nm, the second for NIR (750 nm … 775 nm. In this publication, we will present in detail the opto-mechanical laboratory set-up of the verification campaign of the Sentinel-4 Qualification Model (QM which will also be used for the upcoming Flight Model (FM verification. The test campaign consists mainly of radiometric tests performed with an integrating sphere as homogenous light source. The FPAs have mainly to be operated at 215 K ± 5 K, making it necessary to exploit a thermal vacuum chamber (TVC for the test accomplishment. This publication focuses on the challenge to remotely illuminate both Sentinel-4 detectors as well as a reference detector homogeneously over a distance of approximately 1 m from outside the TVC. Furthermore selected test analyses and results will be presented, showing that the Sentinel-4 FPS meets specifications.

  19. Verification of the Sentinel-4 focal plane subsystem

    Science.gov (United States)

    Williges, Christian; Uhlig, Mathias; Hilbert, Stefan; Rossmann, Hannes; Buchwinkler, Kevin; Babben, Steffen; Sebastian, Ilse; Hohn, Rüdiger; Reulke, Ralf

    2017-09-01

    The Sentinel-4 payload is a multi-spectral camera system, designed to monitor atmospheric conditions over Europe from a geostationary orbit. The German Aerospace Center, DLR Berlin, conducted the verification campaign of the Focal Plane Subsystem (FPS) during the second half of 2016. The FPS consists, of two Focal Plane Assemblies (FPAs), two Front End Electronics (FEEs), one Front End Support Electronic (FSE) and one Instrument Control Unit (ICU). The FPAs are designed for two spectral ranges: UV-VIS (305 nm - 500 nm) and NIR (750 nm - 775 nm). In this publication, we will present in detail the set-up of the verification campaign of the Sentinel-4 Qualification Model (QM). This set up will also be used for the upcoming Flight Model (FM) verification, planned for early 2018. The FPAs have to be operated at 215 K +/- 5 K, making it necessary to exploit a thermal vacuum chamber (TVC) for the test accomplishment. The test campaign consists mainly of radiometric tests. This publication focuses on the challenge to remotely illuminate both Sentinel-4 detectors as well as a reference detector homogeneously over a distance of approximately 1 m from outside the TVC. Selected test analyses and results will be presented.

  20. Dimensional verification and location of the reactive static compensator in 220 kV; Verificacion del dimensionamiento y ubicacion del compensador estatico de reactivos en 220 kV

    Energy Technology Data Exchange (ETDEWEB)

    Fernandez Krekeler, Ubaldo [Administracion Nacional de Electricidad (ANDE), Asuncion (Paraguay)]. E-mail: ufernandez@ieee.org; Cardozo Sanchez, Freddy [Mirant Americas (United States)

    2001-07-01

    This work presents a determination verification of the compensation range and the location of reactive static compensator (RSC) in 220 kV. The verification is accomplished by analyses of the RSC effects in relation to the losses, loading and system voltage stability. The needed compensation range is investigated in full details, whereas that the required conversion level is directly related to this range. It is concluded that the RSC installation, foreseen for 2002, might be postponed for 2005/10 still without reinforcements in 500 kV. The Limpio substation seems to be the more suitable location in relation to the most analysed cases.

  1. Numerical climate modeling and verification of selected areas for heat waves of Pakistan using ensemble prediction system

    International Nuclear Information System (INIS)

    Amna, S; Samreen, N; Khalid, B; Shamim, A

    2013-01-01

    Depending upon the topography, there is an extreme variation in the temperature of Pakistan. Heat waves are the Weather-related events, having significant impact on the humans, including all socioeconomic activities and health issues as well which changes according to the climatic conditions of the area. The forecasting climate is of prime importance for being aware of future climatic changes, in order to mitigate them. The study used the Ensemble Prediction System (EPS) for the purpose of modeling seasonal weather hind-cast of three selected areas i.e., Islamabad, Jhelum and Muzaffarabad. This research was purposely carried out in order to suggest the most suitable climate model for Pakistan. Real time and simulated data of five General Circulation Models i.e., ECMWF, ERA-40, MPI, Meteo France and UKMO for selected areas was acquired from Pakistan Meteorological Department. Data incorporated constituted the statistical temperature records of 32 years for the months of June, July and August. This study was based on EPS to calculate probabilistic forecasts produced by single ensembles. Verification was done out to assess the quality of the forecast t by using standard probabilistic measures of Brier Score, Brier Skill Score, Cross Validation and Relative Operating Characteristic curve. The results showed ECMWF the most suitable model for Islamabad and Jhelum; and Meteo France for Muzaffarabad. Other models have significant results by omitting particular initial conditions.

  2. Nuclear disarmament verification

    International Nuclear Information System (INIS)

    DeVolpi, A.

    1993-01-01

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification

  3. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  4. Quantum money with classical verification

    Energy Technology Data Exchange (ETDEWEB)

    Gavinsky, Dmitry [NEC Laboratories America, Princeton, NJ (United States)

    2014-12-04

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  5. Quantum money with classical verification

    International Nuclear Information System (INIS)

    Gavinsky, Dmitry

    2014-01-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it

  6. Selection Process for New Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  7. Selection Process for Replacement Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  8. Demonstrate Energy Component of the Installation Master Plan Using Net Zero Installation Virtual Testbed

    Science.gov (United States)

    2015-09-01

    compliant GIS, usually obtained from the installation itself. NZP also includes an appropriate weather file for the location selected, using the closest...such as solar photovoltaics, solar-thermal, wind energy, biomass (wood chips, etc.), biogas , or synthetic gas need to be considered as part of the mix...have better information. In some cases, such as photovoltaics, users can obtain data from an online system and enter it into NZP. In this case, users

  9. Particularities of Verification Processes for Distributed Informatics Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2013-01-01

    Full Text Available This paper presents distributed informatics applications and characteristics of their development cycle. It defines the concept of verification and there are identified the differences from software testing. Particularities of the software testing and software verification processes are described. The verification steps and necessary conditions are presented and there are established influence factors of quality verification. Software optimality verification is analyzed and some metrics are defined for the verification process.

  10. Nuclear test ban verification

    International Nuclear Information System (INIS)

    Chun, Kin-Yip

    1991-07-01

    This report describes verification and its rationale, the basic tasks of seismic verification, the physical basis for earthquake/explosion source discrimination and explosion yield determination, the technical problems pertaining to seismic monitoring of underground nuclear tests, the basic problem-solving strategy deployed by the forensic seismology resarch team at the University of Toronto, and the scientific significance of the team's research. The research carried out at the Univeristy of Toronto has two components: teleseismic verification using P wave recordings from the Yellowknife Seismic Array (YKA), and regional (close-in) verification using high-frequency L g and P n recordings from the Eastern Canada Telemetered Network. Major differences have been found in P was attenuation among the propagation paths connecting the YKA listening post with seven active nuclear explosion testing areas in the world. Significant revisions have been made to previously published P wave attenuation results, leading to more interpretable nuclear explosion source functions. (11 refs., 12 figs.)

  11. Environmental Technology Verification: Supplement to Test/QA Plan for Biological and Aerosol Testing of General Ventilation Air Cleaners; Bioaerosol Inactivation Efficiency by HVAC In-Duct Ultraviolet Light Air Cleaners

    Science.gov (United States)

    The Air Pollution Control Technology Verification Center has selected general ventilation air cleaners as a technology area. The Generic Verification Protocol for Biological and Aerosol Testing of General Ventilation Air Cleaners is on the Environmental Technology Verification we...

  12. EURATOM safeguards efforts in the development of spent fuel verification methods by non-destructive assay

    Energy Technology Data Exchange (ETDEWEB)

    Matloch, L.; Vaccaro, S.; Couland, M.; De Baere, P.; Schwalbach, P. [Euratom, Communaute europeenne de l' energie atomique - CEEA (European Commission (EC))

    2015-07-01

    The back end of the nuclear fuel cycle continues to develop. The European Commission, particularly the Nuclear Safeguards Directorate of the Directorate General for Energy, implements Euratom safeguards and needs to adapt to this situation. The verification methods for spent nuclear fuel, which EURATOM inspectors can use, require continuous improvement. Whereas the Euratom on-site laboratories provide accurate verification results for fuel undergoing reprocessing, the situation is different for spent fuel which is destined for final storage. In particular, new needs arise from the increasing number of cask loadings for interim dry storage and the advanced plans for the construction of encapsulation plants and geological repositories. Various scenarios present verification challenges. In this context, EURATOM Safeguards, often in cooperation with other stakeholders, is committed to further improvement of NDA methods for spent fuel verification. In this effort EURATOM plays various roles, ranging from definition of inspection needs to direct participation in development of measurement systems, including support of research in the framework of international agreements and via the EC Support Program to the IAEA. This paper presents recent progress in selected NDA methods. These methods have been conceived to satisfy different spent fuel verification needs, ranging from attribute testing to pin-level partial defect verification. (authors)

  13. redMaGiC: selecting luminous red galaxies from the DES Science Verification data

    Energy Technology Data Exchange (ETDEWEB)

    Rozo, E. [Univ. of Arizona, Tucson, AZ (United States). et al.

    2016-05-30

    We introduce redMaGiC, an automated algorithm for selecting Luminous Red Galaxies (LRGs). The algorithm was developed to minimize photometric redshift uncertainties in photometric large-scale structure studies. redMaGiC achieves this by self-training the color-cuts necessary to produce a luminosity-thresholded LRG sam- ple of constant comoving density. Additionally, we demonstrate that redMaGiC photo-zs are very nearly as accurate as the best machine-learning based methods, yet they require minimal spectroscopic training, do not suffer from extrapolation biases, and are very nearly Gaussian. We apply our algorithm to Dark Energy Survey (DES) Science Verification (SV) data to produce a redMaGiC catalog sampling the redshift range z ϵ [0.2,0.8]. Our fiducial sample has a comoving space density of 10-3 (h-1Mpc)-3, and a median photo-z bias (zspec zphoto) and scatter (σz=(1 + z)) of 0.005 and 0.017 respectively.The corresponding 5σ outlier fraction is 1.4%. We also test our algorithm with Sloan Digital Sky Survey (SDSS) Data Release 8 (DR8) and Stripe 82 data, and discuss how spectroscopic training can be used to control photo-z biases at the 0.1% level.

  14. Field test for treatment verification of an in-situ enhanced bioremediation study

    International Nuclear Information System (INIS)

    Taur, C.K.; Chang, S.C.

    1995-01-01

    Due to a leakage from a 12-inch pressurized diesel steel pipe four years ago, an area of approximately 30,000 square meters was contaminated. A pilot study applying the technology of in-situ enhanced bioremediation was conducted. In the study, a field test kit and on-site monitoring equipment were applied for site characterization and treatment verification. Physically, the enhanced bioremediation study consisted of an air extraction and air supply system, and a nutrition supply network. Certain consistent sampling methodology was employed. Progress was verified by daily monitoring and monthly verification. The objective of this study was to evaluate the capabilities of indigenous microorganisms to biodegrade the petroleum hydrocarbons with provision of oxygen and nutrients. Nine extraction wells and eight air sparging wells were installed. The air sparging wells injected the air into geoformation and the extraction wells provided the underground air circulation. The soil samples were obtained monthly for treatment verification by a Minuteman drilling machine with 2.5-foot-long hollow-stem augers. The samples were analyzed on site for TPH-diesel concentration by a field test kit manufactured by HNU-Hanby, Houston, Texas. The analytical results from the field test kit were compared with the results from an environmental laboratory. The TVPH concentrations of the air extracted from the vadose zone by a vacuum blower and the extraction wells were routinely monitored by a Foxboro FID and Cosmos XP-311A combustible air detector. The daily monitoring of TVPH concentrations provided the reliable data for assessing the remedial progress

  15. Installations of SNCR on bark-fired boilers

    International Nuclear Information System (INIS)

    Hjalmarsson, A.K.; Hedin, K.; Andersson, Lars

    1997-01-01

    Experience has been collected from the twelve bark-fired boilers in Sweden with selective non catalytic reduction (SNCR) installations to reduce emissions of nitrogen oxides. Most of the boilers have slope grates, but there are also two boilers with cyclone ovens and two fluidized bed boilers. In addition to oil there are also possibilities to burn other fuel types in most boilers, such as sludge from different parts of the pulp and paper mills, saw dust and wood chips. The SNCR installations seems in general to be of simple design. In most installations the injection nozzles are located in existing holes in the boiler walls. The availability is reported to be good from several of the SNCR installations. There has been tube leakage in several boilers. The urea system has resulted in corrosion and in clogging of one oil burner. This incident has resulted in a decision not to use SNCR system with the present design of the system. The fuel has also caused operational problems with the SNCR system in several of the installations due to variations in the moisture content and often high moisture content in bark and sludge, causing temperature variations. The availability is presented to be high for the SNCR system at several of the plants, in two of them about 90 %. The results in NO x reduction vary between the installations depending on boiler, fuel and operation. The emissions are between 45 and 100 mg NO 2 /MJ fuel input and the NO x reduction rates are in most installations between 30 and 40 %, the lowest 20 and the highest 70 %. 13 figs, 3 tabs

  16. Technical safety requirements control level verification; TOPICAL

    International Nuclear Information System (INIS)

    STEWART, J.L.

    1999-01-01

    concluded that the TSR control level verification process is clear and logically based upon DOE Order 5480.22, Technical Safety Requirements, and other TSR control selection guidelines. The process provides a documented, traceable basis for TSR level decisions and is a valid reference for preparation of new TSRs

  17. A Particle System for Safety Verification of Free Flight in Air Traffic

    NARCIS (Netherlands)

    Blom, H.A.P.; Krystul, J.; Bakker, G.J.

    2006-01-01

    Under free flight, an aircrew has both the freedom to select their trajectory and the responsibility of resolving conflicts with other aircraft. The general belief is that free flight can be made safe under low traffic conditions. Increasing traffic, however, raises safety verification issues. This

  18. Results of verification and investigation of wind velocity field forecast. Verification of wind velocity field forecast model

    International Nuclear Information System (INIS)

    Ogawa, Takeshi; Kayano, Mitsunaga; Kikuchi, Hideo; Abe, Takeo; Saga, Kyoji

    1995-01-01

    In Environmental Radioactivity Research Institute, the verification and investigation of the wind velocity field forecast model 'EXPRESS-1' have been carried out since 1991. In fiscal year 1994, as the general analysis, the validity of weather observation data, the local features of wind field, and the validity of the positions of monitoring stations were investigated. The EXPRESS which adopted 500 m mesh so far was improved to 250 m mesh, and the heightening of forecast accuracy was examined, and the comparison with another wind velocity field forecast model 'SPEEDI' was carried out. As the results, there are the places where the correlation with other points of measurement is high and low, and it was found that for the forecast of wind velocity field, by excluding the data of the points with low correlation or installing simplified observation stations to take their data in, the forecast accuracy is improved. The outline of the investigation, the general analysis of weather observation data and the improvements of wind velocity field forecast model and forecast accuracy are reported. (K.I.)

  19. Java bytecode verification via static single assignment form

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian W.; Franz, Michael

    2008-01-01

    Java Virtual Machines (JVMs) traditionally perform bytecode verification by way of an iterative data-flow analysis. Bytecode verification is necessary to ensure type safety because temporary variables in the JVM are not statically typed. We present an alternative verification mechanism that trans......Java Virtual Machines (JVMs) traditionally perform bytecode verification by way of an iterative data-flow analysis. Bytecode verification is necessary to ensure type safety because temporary variables in the JVM are not statically typed. We present an alternative verification mechanism...

  20. Weak lensing magnification in the Dark Energy Survey Science Verification data

    Science.gov (United States)

    Garcia-Fernandez, M.; Sanchez, E.; Sevilla-Noarbe, I.; Suchyta, E.; Huff, E. M.; Gaztanaga, E.; Aleksić, J.; Ponce, R.; Castander, F. J.; Hoyle, B.; Abbott, T. M. C.; Abdalla, F. B.; Allam, S.; Annis, J.; Benoit-Lévy, A.; Bernstein, G. M.; Bertin, E.; Brooks, D.; Buckley-Geer, E.; Burke, D. L.; Carnero Rosell, A.; Carrasco Kind, M.; Carretero, J.; Crocce, M.; Cunha, C. E.; D'Andrea, C. B.; da Costa, L. N.; DePoy, D. L.; Desai, S.; Diehl, H. T.; Eifler, T. F.; Evrard, A. E.; Fernandez, E.; Flaugher, B.; Fosalba, P.; Frieman, J.; García-Bellido, J.; Gerdes, D. W.; Giannantonio, T.; Gruen, D.; Gruendl, R. A.; Gschwend, J.; Gutierrez, G.; James, D. J.; Jarvis, M.; Kirk, D.; Krause, E.; Kuehn, K.; Kuropatkin, N.; Lahav, O.; Lima, M.; MacCrann, N.; Maia, M. A. G.; March, M.; Marshall, J. L.; Melchior, P.; Miquel, R.; Mohr, J. J.; Plazas, A. A.; Romer, A. K.; Roodman, A.; Rykoff, E. S.; Scarpine, V.; Schubnell, M.; Smith, R. C.; Soares-Santos, M.; Sobreira, F.; Tarle, G.; Thomas, D.; Walker, A. R.; Wester, W.; DES Collaboration

    2018-05-01

    In this paper, the effect of weak lensing magnification on galaxy number counts is studied by cross-correlating the positions of two galaxy samples, separated by redshift, using the Dark Energy Survey Science Verification data set. This analysis is carried out for galaxies that are selected only by its photometric redshift. An extensive analysis of the systematic effects, using new methods based on simulations is performed, including a Monte Carlo sampling of the selection function of the survey.

  1. Formal verification of algorithms for critical systems

    Science.gov (United States)

    Rushby, John M.; Von Henke, Friedrich

    1993-01-01

    We describe our experience with formal, machine-checked verification of algorithms for critical applications, concentrating on a Byzantine fault-tolerant algorithm for synchronizing the clocks in the replicated computers of a digital flight control system. First, we explain the problems encountered in unsynchronized systems and the necessity, and criticality, of fault-tolerant synchronization. We give an overview of one such algorithm, and of the arguments for its correctness. Next, we describe a verification of the algorithm that we performed using our EHDM system for formal specification and verification. We indicate the errors we found in the published analysis of the algorithm, and other benefits that we derived from the verification. Based on our experience, we derive some key requirements for a formal specification and verification system adequate to the task of verifying algorithms of the type considered. Finally, we summarize our conclusions regarding the benefits of formal verification in this domain, and the capabilities required of verification systems in order to realize those benefits.

  2. Challenges for effective WMD verification

    International Nuclear Information System (INIS)

    Andemicael, B.

    2006-01-01

    Effective verification is crucial to the fulfillment of the objectives of any disarmament treaty, not least as regards the proliferation of weapons of mass destruction (WMD). The effectiveness of the verification package depends on a number of factors, some inherent in the agreed structure and others related to the type of responses demanded by emerging challenges. The verification systems of three global agencies-the IAEA, the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO, currently the Preparatory Commission), and the Organization for the Prohibition of Chemical Weapons (OPCW)-share similarities in their broad objectives of confidence-building and deterrence by assuring members that rigorous verification would deter or otherwise detect non-compliance. Yet they are up against various constraints and other issues, both internal and external to the treaty regime. These constraints pose major challenges to the effectiveness and reliability of the verification operations. In the nuclear field, the IAEA safeguards process was the first to evolve incrementally from modest Statute beginnings to a robust verification system under the global Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The nuclear non-proliferation regime is now being supplemented by a technology-intensive verification system of the nuclear test-ban treaty (CTBT), a product of over three decades of negotiation. However, there still remain fundamental gaps and loopholes in the regime as a whole, which tend to diminish the combined effectiveness of the IAEA and the CTBT verification capabilities. He three major problems are (a) the lack of universality of membership, essentially because of the absence of three nuclear weapon-capable States-India, Pakistan and Israel-from both the NPT and the CTBT, (b) the changes in US disarmament policy, especially in the nuclear field, and (c) the failure of the Conference on Disarmament to conclude a fissile material cut-off treaty. The world is

  3. Evaluation of Aqua-Ammonia Chiller Technologies and Field Site Installation

    Energy Technology Data Exchange (ETDEWEB)

    Zaltash, Abdolreza [ORNL

    2007-09-01

    The Naval Facilities Engineering Service Center (NFESC) has sponsored Oak Ridge National Laboratory (ORNL) to review, select, and evaluate advanced, gas-fired, 5-ton, aqua-ammonia, chiller technologies. The selection criteria was that units have COP values of 0.67 or better at Air-conditioning and Refrigeration Institute (ARI) 95 F outdoor rating conditions, an active refrigerant flow control, and a variable-speed condenser fan. These features are expected to allow these units to operate at higher ambient temperatures (up to the maximum operating temperature of 110 F) with minimal degradation in performance. ORNL evaluated three potential manufacturers of advanced, gas-fired, 5-ton, aqua-ammonia chillers-Robur, Ambian, and Cooling Technologies. Unfortunately, Robur did not meet the COP requirements and Cooling Technologies could not deliver a unit to be tested at the U.S. Department of Energy (DOE)-ORNL environmental chamber testing facility for thermally activated heat pumps. This eliminated these two technologies from further consideration, leaving only the Ambian chillers for evaluation. Two Ambian chillers were evaluated at the DOE-ORNL test facility. Overall these chillers operated well over a wide range of ambient conditions with minimal degradation in performance due to several control strategies used such as a variable speed condenser fan, a modulating burner, and active refrigerant flow control. These Ambian pre-commercial units were selected for installation and field testing at three federal facilities. NFESC worked with ORNL to assist with the site selection for installation and evaluation of these chillers. Two sites (ORNL and Naval Surface Warfare Center [NSWC] Corona) had a single chiller unit installed; and at one site (Naval Amphibious Base [NAB] Little Creek), two 5-ton chillers linked together were installed to provide 10 tons of cooling. A chiller link controller developed under this project was evaluated in the field test at Little Creek.

  4. Installation of wireless LAN system into the SuperKEKB accelerator tunnel

    International Nuclear Information System (INIS)

    Iwasaki, Masako; Satoh, Masanori

    2014-01-01

    We have installed a wireless LAN system of the accelerator control network into the accelerator tunnel for SuperKEKB, which is the upgrade plan of the KEKB B-factory project. The wireless LAN system is used for the construction and maintenance of the accelerator components. The leaky coaxial cable (LCX) antennas are installed into the arc sections of SuperKEKB tunnel, and the collinear antennas are installed into the straight sections and the injector Linac. We have selected the LCX and collinear antennas with good radiation hardness of more than 1 MGy. After the installation, we evaluated the wireless LAN system and obtained the good network speed performance in the whole tunnel area. (author)

  5. Automated eddy-current installation AVD-01 for detecting flaws in fuel element cans

    International Nuclear Information System (INIS)

    Varvaritsa, V.P.; Martishchenko, L.G.; Popov, V.K.; Romanov, M.L.; Shlepnev, I.O.; Shmatok, V.P.

    1986-01-01

    This paper describes an automated installation for eddy-current flaw detection in thin-walled pipes with small diameter; its unified transport system makes it possible to use the installation in inspection lines and production lines of fuel elements. The article describes the structural diagrams of the installation and presents the results of investigations connected with the selection for establishing the optimum regimes and sensitivity of feedthrough transducers with focusing screens

  6. A Syntactic-Semantic Approach to Incremental Verification

    OpenAIRE

    Bianculli, Domenico; Filieri, Antonio; Ghezzi, Carlo; Mandrioli, Dino

    2013-01-01

    Software verification of evolving systems is challenging mainstream methodologies and tools. Formal verification techniques often conflict with the time constraints imposed by change management practices for evolving systems. Since changes in these systems are often local to restricted parts, an incremental verification approach could be beneficial. This paper introduces SiDECAR, a general framework for the definition of verification procedures, which are made incremental by the framework...

  7. Verification made under the terms of article 35 of the Euratom treaty. The region of Barsebaeck, Sweden

    Energy Technology Data Exchange (ETDEWEB)

    Janssens, A.; Herzeele, M.; Hall, I.; Markkanen, M. [European Commission (Luxembourg). Directorate-General XI Environment, Nuclear Safety and Civil Protection

    1998-05-01

    The verifications at Barsebaeck pertained both to the monitoring of liquid and airborne effluents and to the monitoring of levels of radioactivity in the environment in the vicinity of the plant. The team verified the operation and efficiency of the monitoring installations. It was noted that the statutory programme for environmental sample-taking did not entirely match the actual programme. The verification team took the view that there were good reasons for not requiring certain samples to be taken, but felt that the statutory programme should have been updated accordingly. Procedures and documentation at BKAB were found to be in good order. The team felt there was still room for improvement at the bottom line of the QA structure also with regard to the formal allocation of responsibilities for monitoring and reporting. It was also noted that the collection and measurement of environmental samples is entrusted to contractors which are not subject to the plant`s QA programme. The verification team concludes that the objectives of the review have been met and that it has been able to verify the satisfactory and efficient operation of the facilities for continuous monitoring of the level of radioactivity in the air, water and soil in the area around the Barsebaeck nuclear plant 30 refs, 4 figs, 4 tabs

  8. Verification made under the terms of article 35 of the Euratom treaty. The region of Barsebaeck, Sweden

    International Nuclear Information System (INIS)

    Janssens, A.; Herzeele, M.; Hall, I.; Markkanen, M.

    1998-05-01

    The verifications at Barsebaeck pertained both to the monitoring of liquid and airborne effluents and to the monitoring of levels of radioactivity in the environment in the vicinity of the plant. The team verified the operation and efficiency of the monitoring installations. It was noted that the statutory programme for environmental sample-taking did not entirely match the actual programme. The verification team took the view that there were good reasons for not requiring certain samples to be taken, but felt that the statutory programme should have been updated accordingly. Procedures and documentation at BKAB were found to be in good order. The team felt there was still room for improvement at the bottom line of the QA structure also with regard to the formal allocation of responsibilities for monitoring and reporting. It was also noted that the collection and measurement of environmental samples is entrusted to contractors which are not subject to the plant's QA programme. The verification team concludes that the objectives of the review have been met and that it has been able to verify the satisfactory and efficient operation of the facilities for continuous monitoring of the level of radioactivity in the air, water and soil in the area around the Barsebaeck nuclear plant

  9. Verification and validation benchmarks.

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of

  10. Verification of Ceramic Structures

    Science.gov (United States)

    Behar-Lafenetre, Stephanie; Cornillon, Laurence; Rancurel, Michael; De Graaf, Dennis; Hartmann, Peter; Coe, Graham; Laine, Benoit

    2012-07-01

    In the framework of the “Mechanical Design and Verification Methodologies for Ceramic Structures” contract [1] awarded by ESA, Thales Alenia Space has investigated literature and practices in affiliated industries to propose a methodological guideline for verification of ceramic spacecraft and instrument structures. It has been written in order to be applicable to most types of ceramic or glass-ceramic materials - typically Cesic®, HBCesic®, Silicon Nitride, Silicon Carbide and ZERODUR®. The proposed guideline describes the activities to be performed at material level in order to cover all the specific aspects of ceramics (Weibull distribution, brittle behaviour, sub-critical crack growth). Elementary tests and their post-processing methods are described, and recommendations for optimization of the test plan are given in order to have a consistent database. The application of this method is shown on an example in a dedicated article [7]. Then the verification activities to be performed at system level are described. This includes classical verification activities based on relevant standard (ECSS Verification [4]), plus specific analytical, testing and inspection features. The analysis methodology takes into account the specific behaviour of ceramic materials, especially the statistical distribution of failures (Weibull) and the method to transfer it from elementary data to a full-scale structure. The demonstration of the efficiency of this method is described in a dedicated article [8]. The verification is completed by classical full-scale testing activities. Indications about proof testing, case of use and implementation are given and specific inspection and protection measures are described. These additional activities are necessary to ensure the required reliability. The aim of the guideline is to describe how to reach the same reliability level as for structures made of more classical materials (metals, composites).

  11. Is flow verification necessary

    International Nuclear Information System (INIS)

    Beetle, T.M.

    1986-01-01

    Safeguards test statistics are used in an attempt to detect diversion of special nuclear material. Under assumptions concerning possible manipulation (falsification) of safeguards accounting data, the effects on the statistics due to diversion and data manipulation are described algebraically. A comprehensive set of statistics that is capable of detecting any diversion of material is defined in terms of the algebraic properties of the effects. When the assumptions exclude collusion between persons in two material balance areas, then three sets of accounting statistics are shown to be comprehensive. Two of the sets contain widely known accountancy statistics. One of them does not require physical flow verification - comparisons of operator and inspector data for receipts and shipments. The third set contains a single statistic which does not require physical flow verification. In addition to not requiring technically difficult and expensive flow verification, this single statistic has several advantages over other comprehensive sets of statistics. This algebraic approach as an alternative to flow verification for safeguards accountancy is discussed in this paper

  12. Procedure generation and verification

    International Nuclear Information System (INIS)

    Sheely, W.F.

    1986-01-01

    The Department of Energy has used Artificial Intelligence of ''AI'' concepts to develop two powerful new computer-based techniques to enhance safety in nuclear applications. The Procedure Generation System, and the Procedure Verification System, can be adapted to other commercial applications, such as a manufacturing plant. The Procedure Generation System can create a procedure to deal with the off-normal condition. The operator can then take correct actions on the system in minimal time. The Verification System evaluates the logic of the Procedure Generator's conclusions. This evaluation uses logic techniques totally independent of the Procedure Generator. The rapid, accurate generation and verification of corrective procedures can greatly reduce the human error, possible in a complex (stressful/high stress) situation

  13. A Scalable Approach for Hardware Semiformal Verification

    OpenAIRE

    Grimm, Tomas; Lettnin, Djones; Hübner, Michael

    2018-01-01

    The current verification flow of complex systems uses different engines synergistically: virtual prototyping, formal verification, simulation, emulation and FPGA prototyping. However, none is able to verify a complete architecture. Furthermore, hybrid approaches aiming at complete verification use techniques that lower the overall complexity by increasing the abstraction level. This work focuses on the verification of complex systems at the RT level to handle the hardware peculiarities. Our r...

  14. Current Status of Aerosol Generation and Measurement Facilities for the Verification Test of Containment Filtered Venting System in KAERI

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Sung Il; An, Sang Mo; Ha, Kwang Soon; Kim, Hwan Yeol [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    In this study, the design of aerosol generation and measurement systems are explained and present circumstances are also described. In addition, the aerosol test plan is shown. Containment Filtered Venting System (FCVS) is one of the safety features to reduce the amount of released fission product into the environment by depressurizing the containment. Since Chernobyl accident, the regulatory agency in several countries in Europe such as France, Germany, Sweden, etc. have been demanded the installation of the CFVS. Moreover, the feasibility study on the CFVS was also performed in U.S. After the Fukushima accident, there is a need to improve a containment venting or installation of depressurizing facility in Korea. As a part of a Ministry of Trade, Industry and Energy (MOTIE) project, KAERI has been conducted the integrated performance verification test of CFVS. As a part of the test, aerosol generation system and measurement systems were designed to simulate the fission products behavior. To perform the integrated verification test of CFVS, aerosol generation and measurement system was designed and manufactured. The component operating condition is determined to consider the severe accident condition. The test will be performed in normal conditions at first, and will be conducted under severe condition, high pressure and high temperature. Undesirable difficulties which disturb the elaborate test are expected, such as thermophoresis on the pipe, vapor condensation on aerosol, etc.

  15. Volcanic Hazards in Site Evaluation for Nuclear Installations

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-10-15

    This publication provides comprehensive and updated guidance for site evaluation in relation to volcanic hazards. It includes recommendations on assessing the volcanic hazards at a nuclear installation site, in order to identify and characterize, in a comprehensive manner, all potentially hazardous phenomena that may be associated with future volcanic events. It describes how some of these volcanic phenomena may affect the acceptability of the selected site, resulting in exclusion of a site or determining the corresponding design basis parameters for the installation. This Safety Guide is applicable to both existing and new sites, and a graded approach is recommended to cater for all types of nuclear installations. Contents: 1. Introduction; 2. Overview of volcanic hazard assessment; 3. General recommendations; 4. Necessary information and investigations (database); 5. Screening of volcanic hazards; 6. Site specific volcanic hazard assessment; 7. Nuclear installations other than nuclear power plants; 8. Monitoring and preparation for response; 9. Management system for volcanic hazard assessment; Annex I: Volcanic hazard scenarios; Annex II: Worldwide sources of information.

  16. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  17. Specification and Verification of Hybrid System

    International Nuclear Information System (INIS)

    Widjaja, Belawati H.

    1997-01-01

    Hybrid systems are reactive systems which intermix between two components, discrete components and continuous components. The continuous components are usually called plants, subject to disturbances which cause the state variables of the systems changing continuously by physical laws and/or by the control laws. The discrete components can be digital computers, sensor and actuators controlled by programs. These programs are designed to select, control and supervise the behavior of the continuous components. Specification and verification of hybrid systems has recently become an active area of research in both computer science and control engineering, many papers concerning hybrid system have been published. This paper gives a design methodology for hybrid systems as an example to the specification and verification of hybrid systems. The design methodology is based on the cooperation between two disciplines, control engineering and computer science. The methodology brings into the design of control loops and decision loops. The external behavior of control loops are specified in a notation which is understandable by the two disciplines. The design of control loops which employed theory of differential equation is done by control engineers, and its correctness is also guaranteed analytically or experimentally by control engineers. The decision loops are designed in computing science based on the specifications of control loops. The verification of systems requirements can be done by computing scientists using a formal reasoning mechanism. For illustrating the proposed design, a problem of balancing an inverted pendulum which is a popular experiment device in control theory is considered, and the Mean Value Calculus is chosen as a formal notation for specifying the control loops and designing the decision loops

  18. Installing Omeka

    Directory of Open Access Journals (Sweden)

    Jonathan Reeve

    2016-07-01

    Full Text Available Omeka.net is a useful service for Omeka beginners, but there are a few reasons why you might want to install your own copy of Omeka. Reasons include: * Upgrades. By installing Omeka yourself, you can use the latest versions of Omeka as soon as they’re released, without having to wait for Omeka.net to upgrade their system. * Plugins and themes. You can install any plugin or theme you want, without being restricted to those provided by Omeka.net. * Customizations. You can buy a custom domain name, and customize your code to achieve your desired functionality. * Control. You have control over your own backups, and you can update the server yourself so that its security is always up-to-date. * Price. There are many low-cost Virtual Private Servers (VPSs now, some of which cost only $5 per month. * Storage. Many shared hosting providers now offer unlimited storage. This is useful if you have a large media library. In this tutorial, we’ll be entering a few commands on the command line. This tutorial assumes no prior knowledge of the command line, but if you want a concise primer, consult the Programming Historian introduction to BASH. There are other ways of installing Omeka, of course, some using exclusively GUI tools. Some hosting providers even offer “one-click installs” via their control panels. Many of those methods, however, will install older versions of Omeka which are then harder to upgrade and maintain. The method outlined below may not be the easiest way to install Omeka, but it will give you some good practice with using the command line, which is a skill that will be useful if you want to manually upgrade your install, or manually install other web frameworks. (For example, this installation method is very similar to WordPress’s “Five-Minute Install”. There are four steps to this process, and it should take about an hour.

  19. Installation in Outdoor Advertising Designs: Engagement with ...

    African Journals Online (AJOL)

    The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader). If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

  20. On the concept of virtual current as a means to enhance verification of electromagnetic flowmeters

    International Nuclear Information System (INIS)

    Baker, Roger C

    2011-01-01

    Electromagnetic flowmeters are becoming increasingly widely used in the water industry and other industries which handle electrically conducting liquids. When installed they are often difficult to remove for calibration without disturbing the liquid flow. Interest has therefore increased in the possibility of in situ calibration. The result has been the development of verification which attempts to approach calibration. However, while it checks on magnetic field and amplification circuits, it does not check adequately on the internals of the flowmeter pipe. This paper considers the use of the virtual voltage, a key element of the weight function theory of the flowmeter, to identify changes which have occurred in the flow tube and its liner. These could include a deformed insulating liner to the flow tube, or a deposit in the tube resulting from solids in the flow. The equation for virtual voltage is solved using a finite difference approach and the results are checked using a tank to simulate the flow tube, and tests on a flow rig. The concept is shown to be promising as a means of approaching verification of calibration

  1. Survey on Offline Finger Print Verification System

    NARCIS (Netherlands)

    Suman, R.; Kaur, R.

    2012-01-01

    The fingerprint verification, means where "verification" implies a user matching a fingerprint against a single fingerprint associated with the identity that the user claims. Biometrics can be classified into two types Behavioral (signature verification, keystroke dynamics, etc.) And Physiological

  2. In-core Instrument Subcritical Verification (INCISV) - Core Design Verification Method - 358

    International Nuclear Information System (INIS)

    Prible, M.C.; Heibel, M.D.; Conner, S.L.; Sebastiani, P.J.; Kistler, D.P.

    2010-01-01

    According to the standard on reload startup physics testing, ANSI/ANS 19.6.1, a plant must verify that the constructed core behaves sufficiently close to the designed core to confirm that the various safety analyses bound the actual behavior of the plant. A large portion of this verification must occur before the reactor operates at power. The INCISV Core Design Verification Method uses the unique characteristics of a Westinghouse Electric Company fixed in-core self powered detector design to perform core design verification after a core reload before power operation. A Vanadium self powered detector that spans the length of the active fuel region is capable of confirming the required core characteristics prior to power ascension; reactivity balance, shutdown margin, temperature coefficient and power distribution. Using a detector element that spans the length of the active fuel region inside the core provides a signal of total integrated flux. Measuring the integrated flux distributions and changes at various rodded conditions and plant temperatures, and comparing them to predicted flux levels, validates all core necessary core design characteristics. INCISV eliminates the dependence on various corrections and assumptions between the ex-core detectors and the core for traditional physics testing programs. This program also eliminates the need for special rod maneuvers which are infrequently performed by plant operators during typical core design verification testing and allows for safer startup activities. (authors)

  3. Online Signature Verification: To What Extent Should a Classifier be Trusted in?

    Directory of Open Access Journals (Sweden)

    Marianela Parodi

    2017-08-01

    Full Text Available To select the best features to model the signatures is one of the major challenges in the field of online signature verification. To combine different feature sets, selected by different criteria, is a useful technique to address this problem. In this line, the analysis of different features and their discriminative power has been researchers’ main concern, paying less attention to the way in which the different kind of features are combined. Moreover, the fact that conflicting results may appear when several classifiers are being used, has rarely been taken into account. In this paper, a score level fusion scheme is proposed to combine three different and meaningful feature sets, viz., an automatically selected feature set, a feature set relevant to Forensic Handwriting Experts (FHEs, and a global feature set. The score level fusion is performed within the framework of the Belief Function Theory (BFT, in order to address the problem of the conflicting results appearing when multiple classifiers are being used. Two different models, namely, the Denoeux and the Appriou models, are used to embed the problem within this framework, where the fusion is performed resorting to two well-known combination rules, namely, the Dempster-Shafer (DS and the Proportional Conflict Redistribution (PCR5 one. In order to analyze the robustness of the proposed score level fusion approach, the combination is performed for the same verification system using two different classification techniques, namely, Ramdon Forests (RF and Support Vector Machines (SVM. Experimental results, on a publicly available database, show that the proposed score level fusion approach allows the system to have a very good trade-off between verification results and reliability.

  4. Finite Element Verification of Non-Homogeneous Strain and Stress Fields during Composite Material Testing

    DEFF Research Database (Denmark)

    Mikkelsen, Lars Pilgaard

    2015-01-01

    Uni-directional glass fiber reinforced polymers play a central role in the task increasing the length of wind turbines blades and thereby lowering the cost of energy from wind turbine installations. During this, optimizing the mechanical performance regarding material stiffness, compression...... strength and fatigue performance is essential. Nevertheless, testing composites includes some challenges regarding stiffness determination using conventional strain gauges and achieving correct material failure unaffected by the gripping region during fatigue testing. Challenges, which in the present study......, has been addressed using the finite element method. During this, a verification of experimental observations, a deeper understanding on the test coupon loading and thereby improved test methods has been achieved....

  5. Installation report - Lidar

    DEFF Research Database (Denmark)

    Georgieva Yankova, Ginka; Villanueva, Héctor

    The report describes the installation, configuration and data transfer for the ground-based lidar. The unit is provided by a customer but is installed and operated by DTU while in this project.......The report describes the installation, configuration and data transfer for the ground-based lidar. The unit is provided by a customer but is installed and operated by DTU while in this project....

  6. Fingerprint verification prediction model in hand dermatitis.

    Science.gov (United States)

    Lee, Chew K; Chang, Choong C; Johor, Asmah; Othman, Puwira; Baba, Roshidah

    2015-07-01

    Hand dermatitis associated fingerprint changes is a significant problem and affects fingerprint verification processes. This study was done to develop a clinically useful prediction model for fingerprint verification in patients with hand dermatitis. A case-control study involving 100 patients with hand dermatitis. All patients verified their thumbprints against their identity card. Registered fingerprints were randomized into a model derivation and model validation group. Predictive model was derived using multiple logistic regression. Validation was done using the goodness-of-fit test. The fingerprint verification prediction model consists of a major criterion (fingerprint dystrophy area of ≥ 25%) and two minor criteria (long horizontal lines and long vertical lines). The presence of the major criterion predicts it will almost always fail verification, while presence of both minor criteria and presence of one minor criterion predict high and low risk of fingerprint verification failure, respectively. When none of the criteria are met, the fingerprint almost always passes the verification. The area under the receiver operating characteristic curve was 0.937, and the goodness-of-fit test showed agreement between the observed and expected number (P = 0.26). The derived fingerprint verification failure prediction model is validated and highly discriminatory in predicting risk of fingerprint verification in patients with hand dermatitis. © 2014 The International Society of Dermatology.

  7. Discussion on verification criterion and method of human factors engineering for nuclear power plant controller

    International Nuclear Information System (INIS)

    Yang Hualong; Liu Yanzi; Jia Ming; Huang Weijun

    2014-01-01

    In order to prevent or reduce human error and ensure the safe operation of nuclear power plants, control device should be verified from the perspective of human factors engineering (HFE). The domestic and international human factors engineering guidelines about nuclear power plant controller were considered, the verification criterion and method of human factors engineering for nuclear power plant controller were discussed and the application examples were provided for reference in this paper. The results show that the appropriate verification criterion and method should be selected to ensure the objectivity and accuracy of the conclusion. (authors)

  8. Verification of RESRAD-RDD. (Version 2.01)

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Jing-Jy [Argonne National Lab. (ANL), Argonne, IL (United States); Flood, Paul E. [Argonne National Lab. (ANL), Argonne, IL (United States); LePoire, David [Argonne National Lab. (ANL), Argonne, IL (United States); Kamboj, Sunita [Argonne National Lab. (ANL), Argonne, IL (United States); Yu, Charley [Argonne National Lab. (ANL), Argonne, IL (United States)

    2015-09-01

    In this report, the results generated by RESRAD-RDD version 2.01 are compared with those produced by RESRAD-RDD version 1.7 for different scenarios with different sets of input parameters. RESRAD-RDD version 1.7 is spreadsheet-driven, performing calculations with Microsoft Excel spreadsheets. RESRAD-RDD version 2.01 revamped version 1.7 by using command-driven programs designed with Visual Basic.NET to direct calculations with data saved in Microsoft Access database, and re-facing the graphical user interface (GUI) to provide more flexibility and choices in guideline derivation. Because version 1.7 and version 2.01 perform the same calculations, the comparison of their results serves as verification of both versions. The verification covered calculation results for 11 radionuclides included in both versions: Am-241, Cf-252, Cm-244, Co-60, Cs-137, Ir-192, Po-210, Pu-238, Pu-239, Ra-226, and Sr-90. At first, all nuclidespecific data used in both versions were compared to ensure that they are identical. Then generic operational guidelines and measurement-based radiation doses or stay times associated with a specific operational guideline group were calculated with both versions using different sets of input parameters, and the results obtained with the same set of input parameters were compared. A total of 12 sets of input parameters were used for the verification, and the comparison was performed for each operational guideline group, from A to G, sequentially. The verification shows that RESRAD-RDD version 1.7 and RESRAD-RDD version 2.01 generate almost identical results; the slight differences could be attributed to differences in numerical precision with Microsoft Excel and Visual Basic.NET. RESRAD-RDD version 2.01 allows the selection of different units for use in reporting calculation results. The results of SI units were obtained and compared with the base results (in traditional units) used for comparison with version 1.7. The comparison shows that RESRAD

  9. Process and device for automatically surveying complex installations

    International Nuclear Information System (INIS)

    Pekrul, P.J.; Thiele, A.W.

    1976-01-01

    A description is given of a process for automatically analysing separate signal processing channels in real time, one channel per signal, in a facility with significant background noise in signals varying in time and coming from transducers at selected points for the continuous monitoring of the operating conditions of the various components of the installation. The signals are intended to determine potential breakdowns, determine conclusions as to the severity of these potential breakdowns and indicate to an operator the measures to be taken in consequence. The feature of this process is that it comprises the automatic and successive selection of each channel for the purpose of spectral analysis, the automatic processing of the signal of each selected channel to show energy spectrum density data at pre-determined frequencies, the automatic comparison of the energy spectrum density data of each channel with pre-determined sets of limits varying with the frequency, and the automatic indication to the operator of the condition of the various components of the installation associated to each channel and the measures to be taken depending on the set of limits [fr

  10. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  11. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William L.; Trucano, Timothy G.

    2008-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  12. Guide to verification and validation of the SCALE-4 radiation shielding software

    Energy Technology Data Exchange (ETDEWEB)

    Broadhead, B.L.; Emmett, M.B.; Tang, J.S.

    1996-12-01

    Whenever a decision is made to newly install the SCALE radiation shielding software on a computer system, the user should run a set of verification and validation (V&V) test cases to demonstrate that the software is properly installed and functioning correctly. This report is intended to serve as a guide for this V&V in that it specifies test cases to run and gives expected results. The report describes the V&V that has been performed for the radiation shielding software in a version of SCALE-4. This report provides documentation of sample problems which are recommended for use in the V&V of the SCALE-4 system for all releases. The results reported in this document are from the SCALE-4.2P version which was run on an IBM RS/6000 work-station. These results verify that the SCALE-4 radiation shielding software has been correctly installed and is functioning properly. A set of problems for use by other shielding codes (e.g., MCNP, TWOTRAN, MORSE) performing similar V&V are discussed. A validation has been performed for XSDRNPM and MORSE-SGC6 utilizing SASI and SAS4 shielding sequences and the SCALE 27-18 group (27N-18COUPLE) cross-section library for typical nuclear reactor spent fuel sources and a variety of transport package geometries. The experimental models used for the validation were taken from two previous applications of the SASI and SAS4 methods.

  13. Guide to verification and validation of the SCALE-4 radiation shielding software

    International Nuclear Information System (INIS)

    Broadhead, B.L.; Emmett, M.B.; Tang, J.S.

    1996-12-01

    Whenever a decision is made to newly install the SCALE radiation shielding software on a computer system, the user should run a set of verification and validation (V ampersand V) test cases to demonstrate that the software is properly installed and functioning correctly. This report is intended to serve as a guide for this V ampersand V in that it specifies test cases to run and gives expected results. The report describes the V ampersand V that has been performed for the radiation shielding software in a version of SCALE-4. This report provides documentation of sample problems which are recommended for use in the V ampersand V of the SCALE-4 system for all releases. The results reported in this document are from the SCALE-4.2P version which was run on an IBM RS/6000 work-station. These results verify that the SCALE-4 radiation shielding software has been correctly installed and is functioning properly. A set of problems for use by other shielding codes (e.g., MCNP, TWOTRAN, MORSE) performing similar V ampersand V are discussed. A validation has been performed for XSDRNPM and MORSE-SGC6 utilizing SASI and SAS4 shielding sequences and the SCALE 27-18 group (27N-18COUPLE) cross-section library for typical nuclear reactor spent fuel sources and a variety of transport package geometries. The experimental models used for the validation were taken from two previous applications of the SASI and SAS4 methods

  14. Quantitative analysis of patient-specific dosimetric IMRT verification

    International Nuclear Information System (INIS)

    Budgell, G J; Perrin, B A; Mott, J H L; Fairfoul, J; Mackay, R I

    2005-01-01

    Patient-specific dosimetric verification methods for IMRT treatments are variable, time-consuming and frequently qualitative, preventing evidence-based reduction in the amount of verification performed. This paper addresses some of these issues by applying a quantitative analysis parameter to the dosimetric verification procedure. Film measurements in different planes were acquired for a series of ten IMRT prostate patients, analysed using the quantitative parameter, and compared to determine the most suitable verification plane. Film and ion chamber verification results for 61 patients were analysed to determine long-term accuracy, reproducibility and stability of the planning and delivery system. The reproducibility of the measurement and analysis system was also studied. The results show that verification results are strongly dependent on the plane chosen, with the coronal plane particularly insensitive to delivery error. Unexpectedly, no correlation could be found between the levels of error in different verification planes. Longer term verification results showed consistent patterns which suggest that the amount of patient-specific verification can be safely reduced, provided proper caution is exercised: an evidence-based model for such reduction is proposed. It is concluded that dose/distance to agreement (e.g., 3%/3 mm) should be used as a criterion of acceptability. Quantitative parameters calculated for a given criterion of acceptability should be adopted in conjunction with displays that show where discrepancies occur. Planning and delivery systems which cannot meet the required standards of accuracy, reproducibility and stability to reduce verification will not be accepted by the radiotherapy community

  15. Content analysis of age verification, purchase and delivery methods of internet e-cigarette vendors, 2013 and 2014.

    Science.gov (United States)

    Williams, Rebecca S; Derrick, Jason; Liebman, Aliza Kate; LaFleur, Kevin; Ribisl, Kurt M

    2018-05-01

    Identify the population of internet e-cigarette vendors (IEVs) and conduct content analyses of their age verification, purchase and delivery methods in 2013 and 2014. We used multiple sources to identify IEV websites, primarily complex search algorithms scanning more than 180 million websites. In 2013, we manually screened 32 446 websites, identifying 980 IEVs, selecting the 281 most popular for content analysis. This methodology yielded 31 239 websites for screening in 2014, identifying 3096 IEVs, with 283 selected for content analysis. The proportion of vendors that sold online-only, with no retail store, dropped significantly from 2013 (74.7%) to 2014 (64.3%) (ponline age verification services (7.1% in 2013 and 8.5% in 2014), driving licences (1.8% in 2013 and 7.4% in 2014, ponline e-cigarette sales are needed, including strict age and identity verification requirements. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  16. Annotated Directory of Threatened and Endangered Wildlife on Selected U.S. Army Installations East of the Mississippi River

    Science.gov (United States)

    1991-05-01

    species was historically collected from the Illinois River, in waters around the installation. Higgins eye, Lampsilis higginsi (SE): Historically...triquetra (SE): Found in the Mississippi River, this species may occur in waters around the installation. Higgins eye, Lampsilis higginsi (FE, SE): Found in...tributaries of the Tennessee river, it may still be present in waters around the installation. 131 Cumberland monkeyface, Quadrula intermedia (FE, SE

  17. Post-silicon and runtime verification for modern processors

    CERN Document Server

    Wagner, Ilya

    2010-01-01

    The purpose of this book is to survey the state of the art and evolving directions in post-silicon and runtime verification. The authors start by giving an overview of the state of the art in verification, particularly current post-silicon methodologies in use in the industry, both for the domain of processor pipeline design and for memory subsystems. They then dive into the presentation of several new post-silicon verification solutions aimed at boosting the verification coverage of modern processors, dedicating several chapters to this topic. The presentation of runtime verification solution

  18. MR image-guided portal verification for brain treatment field

    International Nuclear Information System (INIS)

    Yin Fangfang; Gao Qinghuai; Xie Huchen; Nelson, Diana F.; Yu Yan; Kwok, W. Edmund; Totterman, Saara; Schell, Michael C.; Rubin, Philip

    1998-01-01

    Purpose: To investigate a method for the generation of digitally reconstructed radiographs directly from MR images (DRR-MRI) to guide a computerized portal verification procedure. Methods and Materials: Several major steps were developed to perform an MR image-guided portal verification procedure. Initially, a wavelet-based multiresolution adaptive thresholding method was used to segment the skin slice-by-slice in MR brain axial images. Some selected anatomical structures, such as target volume and critical organs, were then manually identified and were reassigned to relatively higher intensities. Interslice information was interpolated with a directional method to achieve comparable display resolution in three dimensions. Next, a ray-tracing method was used to generate a DRR-MRI image at the planned treatment position, and the ray tracing was simply performed on summation of voxels along the ray. The skin and its relative positions were also projected to the DRR-MRI and were used to guide the search of similar features in the portal image. A Canny edge detector was used to enhance the brain contour in both portal and simulation images. The skin in the brain portal image was then extracted using a knowledge-based searching technique. Finally, a Chamfer matching technique was used to correlate features between DRR-MRI and portal image. Results: The MR image-guided portal verification method was evaluated using a brain phantom case and a clinical patient case. Both DRR-CT and DRR-MRI were generated using CT and MR phantom images with the same beam orientation and then compared. The matching result indicated that the maximum deviation of internal structures was less than 1 mm. The segmented results for brain MR slice images indicated that a wavelet-based image segmentation technique provided a reasonable estimation for the brain skin. For the clinical patient case with a given portal field, the MR image-guided verification method provided an excellent match between

  19. Treasure Transformers: Novel Interpretative Installations for the National Palace Museum

    Science.gov (United States)

    Hsieh, Chun-Ko; Liu, I.-Ling; Lin, Quo-Ping; Chan, Li-Wen; Hsiao, Chuan-Heng; Hung, Yi-Ping

    Museums have missions to increase accessibility and share cultural assets to the public. The National Palace Museum intends to be a pioneer of utilizing novel interpretative installations to reach more diverse and potential audiences, and Human-Computer Interaction (HCI) technology has been selected as the new interpretative approach. The pilot project in partnership with the National Taiwan University has successfully completed four interactive installations. To consider the different nature of collections, the four systems designed against different interpretation strategies are uPoster, i-m-Top, Magic Crystal Ball and Virtual Panel. To assess the feasibility of the project, the interactive installations were exhibited at the Taipei World Trade Center in 2008. The purpose of this paper is to present the development of the "Treasure Transformers" exhibition, design principles, and effectiveness of installations from the evaluation. It is our ambition that the contributions will propose innovative media approaches in museum settings.

  20. VEG-01: Veggie Hardware Verification Testing

    Science.gov (United States)

    Massa, Gioia; Newsham, Gary; Hummerick, Mary; Morrow, Robert; Wheeler, Raymond

    2013-01-01

    The Veggie plant/vegetable production system is scheduled to fly on ISS at the end of2013. Since much of the technology associated with Veggie has not been previously tested in microgravity, a hardware validation flight was initiated. This test will allow data to be collected about Veggie hardware functionality on ISS, allow crew interactions to be vetted for future improvements, validate the ability of the hardware to grow and sustain plants, and collect data that will be helpful to future Veggie investigators as they develop their payloads. Additionally, food safety data on the lettuce plants grown will be collected to help support the development of a pathway for the crew to safely consume produce grown on orbit. Significant background research has been performed on the Veggie plant growth system, with early tests focusing on the development of the rooting pillow concept, and the selection of fertilizer, rooting medium and plant species. More recent testing has been conducted to integrate the pillow concept into the Veggie hardware and to ensure that adequate water is provided throughout the growth cycle. Seed sanitation protocols have been established for flight, and hardware sanitation between experiments has been studied. Methods for shipping and storage of rooting pillows and the development of crew procedures and crew training videos for plant activities on-orbit have been established. Science verification testing was conducted and lettuce plants were successfully grown in prototype Veggie hardware, microbial samples were taken, plant were harvested, frozen, stored and later analyzed for microbial growth, nutrients, and A TP levels. An additional verification test, prior to the final payload verification testing, is desired to demonstrate similar growth in the flight hardware and also to test a second set of pillows containing zinnia seeds. Issues with root mat water supply are being resolved, with final testing and flight scheduled for later in 2013.

  1. Act of 20 July 1978 establishing provisions enabling the International Atomic Energy Agency to undertake inspections and verifications on the Belgian territory in execution of the International Agreement of 5 April 1973 made in implementation of paragraph 1 and 4 of Article III of the Treaty of 1 July 1968 on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1978-01-01

    The purpose of this Act is to authorise representatives of the International Atomic Energy Agency to carry out inspections and verifications in installations in Belgium where source materials and special fissionable materials are produced, stored or used. These inspections are organised in the frame of the Agreement on verification of safeguards concluded between that Agency and Euratom. (NEA) [fr

  2. Offshore wind transport and installation vessel

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    The initial objective of the project was to complete a feasibility study to determine the viability of an innovative transportation vessel to be deployed in the installation of offshore wind farms. This included the feasibility of providing a stable-working platform that can be used in harsh offshore environments. A study of current installation contractors and their installation equipment was used to provide a preliminary specification for the installation vessel. A typical barge was selected and a number of hydrodynamic analyses were carried out in order to establish it's on course and operational stability. The analysis proved the stability of the vessel during operation was critical and that in order to utilise the crane's full potential a stabilisation system must be employed. The main aim of the work to date was to establish whether it was feasible to use a stabilisation system on the installation vessel. The spud leg FEED study established that it was feasible to use spud legs to stabilise the vessel. In order to achieve the degree of stability required it is necessary to lift the vessel completely out of the water. This was not the original aim of the study but due to the external loads on the hull it was the only viable option. Lifting the vessel out of the water results in the legs and leg casings becoming very large. This has a number of consequences for the final design. Due to large loads on the legs spud cans must be used to avoid bottom penetration, the spud cans increase the draft of the vessel by 2m. The large loads require larger winches and more reeving to be used, this results in larger pumps and motors, all of which have to be housed. The stabilisation system has been proved to be feasible for a large installation vessel, the cost and physical size are however more excessive than first anticipated. (Author)

  3. Verification of Simulation Tools

    International Nuclear Information System (INIS)

    Richard, Thierry

    2015-01-01

    Before qualifying a simulation tool, the requirements shall first be clearly identified, i.e.: - What type of study needs to be carried out? - What phenomena need to be modeled? This phase involves writing a precise technical specification. Once the requirements are defined, the most adapted product shall be selected from the various software options available on the market. Before using a particular version of a simulation tool to support the demonstration of nuclear safety studies, the following requirements shall be met. - An auditable quality assurance process complying with development international standards shall be developed and maintained, - A process of verification and validation (V and V) shall be implemented. This approach requires: writing a report and/or executive summary of the V and V activities, defining a validated domain (domain in which the difference between the results of the tools and those of another qualified reference is considered satisfactory for its intended use). - Sufficient documentation shall be available, - A detailed and formal description of the product (software version number, user configuration, other settings and parameters) in the targeted computing environment shall be available. - Source codes corresponding to the software shall be archived appropriately. When these requirements are fulfilled, the version of the simulation tool shall be considered qualified for a defined domain of validity, in a given computing environment. The functional verification shall ensure that: - the computer architecture of the tool does not include errors, - the numerical solver correctly represents the physical mathematical model, - equations are solved correctly. The functional verification can be demonstrated through certification or report of Quality Assurance. The functional validation shall allow the user to ensure that the equations correctly represent the physical phenomena in the perimeter of intended use. The functional validation can

  4. Recommended safety procedures for the selection, installation and use of baggage inspection x-ray equipment

    International Nuclear Information System (INIS)

    1978-05-01

    Good X-ray equipment alone will not preclude unnecessary exposure to x-radiation. The equipment must be installed, maintained and used by adequately trained personnel, with due regard for the inherent hazards of such equipment and an appreciation of the need to observe proper operational procedures. It is the intent of this Code to define equipment specifications and conditions of installation and use for baggage inspection X-ray equipment, such that the hazard to operating personnel and the general public from such devices remains negligibly small. (auth)

  5. Verification and validation of COBRA-SFS transient analysis capability

    International Nuclear Information System (INIS)

    Rector, D.R.; Michener, T.E.; Cuta, J.M.

    1998-05-01

    This report provides documentation of the verification and validation testing of the transient capability in the COBRA-SFS code, and is organized into three main sections. The primary documentation of the code was published in September 1995, with the release of COBRA-SFS, Cycle 2. The validation and verification supporting the release and licensing of COBRA-SFS was based solely on steady-state applications, even though the appropriate transient terms have been included in the conservation equations from the first cycle. Section 2.0, COBRA-SFS Code Description, presents a capsule description of the code, and a summary of the conservation equations solved to obtain the flow and temperature fields within a cask or assembly model. This section repeats in abbreviated form the code description presented in the primary documentation (Michener et al. 1995), and is meant to serve as a quick reference, rather than independent documentation of all code features and capabilities. Section 3.0, Transient Capability Verification, presents a set of comparisons between code calculations and analytical solutions for selected heat transfer and fluid flow problems. Section 4.0, Transient Capability Validation, presents comparisons between code calculations and experimental data obtained in spent fuel storage cask tests. Based on the comparisons presented in Sections 2.0 and 3.0, conclusions and recommendations for application of COBRA-SFS to transient analysis are presented in Section 5.0

  6. LHC installation planning

    CERN Document Server

    Weisz, S

    2005-01-01

    installation of the general services, the installation of the cryogenic line (QRL), the installation of the machine elements and the hardware commissioning. While the installation of the general services is now almost finished (see presentation by Katy Foraz and Serge Grillot), several problems and delays with the QRL made it unavoidable to revise the installation strategy and to schedule a number tasks in parallel. A new compressed installation planning has been issued, that fulfils the strategic objectives and allows starting new activities with minimal delays in sectors 7-8 and 8-1. However, the shortcuts that are introduced increase the level of risk that we will have to face and the coordination of such a large and complex variety of simultaneous activities makes the project even more challenging. The document will describe how the input from the different equipment groups is taken into account by the master schedule planning team with respect to equipment availability and production as well as logistics...

  7. Risks due to industrial activities and to transports around nuclear installations sites

    International Nuclear Information System (INIS)

    Doumenc, A.; Faure, J.

    1988-01-01

    In order to verify that the human activities around a site under consideration are not incompatible with the installation conception, they should be analyzed before the definitive site selection, then watched over and if necessary limited during the installation construction and operation. Taking account of the aggression sources diversity, there is to consider different distances according to the risks. 6 tabs., 5 refs. (F.M.)

  8. The Upgraded Plasma Focus Installation > - The Installation >

    International Nuclear Information System (INIS)

    Krokhin, O.N.; Nikulin, V.Ya.; Babenko, B.A.; Gorbunov, D.N.; Gurei, A.E.; Kalachev, N.V.; Kozlova, T.A.; Malafeev, Yu.S.; Polukhin, S.N.; Sychev, A.A.; Tikhomirov, A.A.; Tsybenko, S.P.; Volobuev, I.V.

    1999-01-01

    The paper presents the upgraded plasma focus installation > - the installation > and some preliminary experimental results. The total energy stored in capacity bank is now 400 kJ, current - 5 MA with the rise time 3.5 μs. The investigation is targeted on the study of near electrode processes and its influence on plasma dynamics in a special operating regime of Filippov type PF - Hard X-ray regime. (author)

  9. High-Resolution Fast-Neutron Spectrometry for Arms Control and Treaty Verification

    Energy Technology Data Exchange (ETDEWEB)

    David L. Chichester; James T. Johnson; Edward H. Seabury

    2012-07-01

    Many nondestructive nuclear analysis techniques have been developed to support the measurement needs of arms control and treaty verification, including gross photon and neutron counting, low- and high-resolution gamma spectrometry, time-correlated neutron measurements, and photon and neutron imaging. One notable measurement technique that has not been extensively studied to date for these applications is high-resolution fast-neutron spectrometry (HRFNS). Applied for arms control and treaty verification, HRFNS has the potential to serve as a complimentary measurement approach to these other techniques by providing a means to either qualitatively or quantitatively determine the composition and thickness of non-nuclear materials surrounding neutron-emitting materials. The technique uses the normally-occurring neutrons present in arms control and treaty verification objects of interest as an internal source of neutrons for performing active-interrogation transmission measurements. Most low-Z nuclei of interest for arms control and treaty verification, including 9Be, 12C, 14N, and 16O, possess fast-neutron resonance features in their absorption cross sections in the 0.5- to 5-MeV energy range. Measuring the selective removal of source neutrons over this energy range, assuming for example a fission-spectrum starting distribution, may be used to estimate the stoichiometric composition of intervening materials between the neutron source and detector. At a simpler level, determination of the emitted fast-neutron spectrum may be used for fingerprinting 'known' assemblies for later use in template-matching tests. As with photon spectrometry, automated analysis of fast-neutron spectra may be performed to support decision making and reporting systems protected behind information barriers. This paper will report recent work at Idaho National Laboratory to explore the feasibility of using HRFNS for arms control and treaty verification applications, including simulations

  10. A multi-professional software tool for radiation therapy treatment verification

    International Nuclear Information System (INIS)

    Fox, Tim; Brooks, Ken; Davis, Larry

    1996-01-01

    Purpose: Verification of patient setup is important in conformal therapy because it provides a means of quality assurance for treatment delivery. Electronic portal imaging systems have led to software tools for performing digital comparison and verification of patient setup. However, these software tools are typically designed from a radiation oncologist's perspective even though treatment verification is a team effort involving oncologists, physicists, and therapists. A new software tool, Treatment Verification Tool (TVT), has been developed as an interactive, multi-professional application for reviewing and verifying treatment plan setup using conventional personal computers. This study will describe our approach to electronic treatment verification and demonstrate the features of TVT. Methods and Materials: TVT is an object-oriented software tool written in C++ using the PC-based Windows NT environment. The software utilizes the selection of a patient's images from a database. The software is also developed as a single window interface to reduce the amount of windows presented to the user. However, the user can select from four different possible views of the patient data. One of the views is side-by-side comparison of portal images (on-line portal images or digitized port film) with a prescription image (digitized simulator film or digitally reconstructed radiograph), and another view is a textual summary of the grades of each portal image. The grades of a portal image are assigned by a radiation oncologist using an evaluation method, and the physicists and therapists may only review these results. All users of TVT can perform image enhancement processes, measure distances, and perform semi-automated registration methods. An electronic dialogue can be established through a set of annotations and notes among the radiation oncologists and the technical staff. Results: Features of TVT include: 1) side-by-side comparison of portal images and a prescription image; 2

  11. Technical Note: Range verification system using edge detection method for a scintillator and a CCD camera system

    Energy Technology Data Exchange (ETDEWEB)

    Saotome, Naoya, E-mail: naosao@nirs.go.jp; Furukawa, Takuji; Hara, Yousuke; Mizushima, Kota; Tansho, Ryohei; Saraya, Yuichi; Shirai, Toshiyuki; Noda, Koji [Department of Research Center for Charged Particle Therapy, National Institute of Radiological Sciences, 4-9-1 Anagawa, Inage-ku, Chiba 263-8555 (Japan)

    2016-04-15

    Purpose: Three-dimensional irradiation with a scanned carbon-ion beam has been performed from 2011 at the authors’ facility. The authors have developed the rotating-gantry equipped with the scanning irradiation system. The number of combinations of beam properties to measure for the commissioning is more than 7200, i.e., 201 energy steps, 3 intensities, and 12 gantry angles. To compress the commissioning time, quick and simple range verification system is required. In this work, the authors develop a quick range verification system using scintillator and charge-coupled device (CCD) camera and estimate the accuracy of the range verification. Methods: A cylindrical plastic scintillator block and a CCD camera were installed on the black box. The optical spatial resolution of the system is 0.2 mm/pixel. The camera control system was connected and communicates with the measurement system that is part of the scanning system. The range was determined by image processing. Reference range for each energy beam was determined by a difference of Gaussian (DOG) method and the 80% of distal dose of the depth-dose distribution that were measured by a large parallel-plate ionization chamber. The authors compared a threshold method and a DOG method. Results: The authors found that the edge detection method (i.e., the DOG method) is best for the range detection. The accuracy of range detection using this system is within 0.2 mm, and the reproducibility of the same energy measurement is within 0.1 mm without setup error. Conclusions: The results of this study demonstrate that the authors’ range check system is capable of quick and easy range verification with sufficient accuracy.

  12. Technical Note: Range verification system using edge detection method for a scintillator and a CCD camera system

    International Nuclear Information System (INIS)

    Saotome, Naoya; Furukawa, Takuji; Hara, Yousuke; Mizushima, Kota; Tansho, Ryohei; Saraya, Yuichi; Shirai, Toshiyuki; Noda, Koji

    2016-01-01

    Purpose: Three-dimensional irradiation with a scanned carbon-ion beam has been performed from 2011 at the authors’ facility. The authors have developed the rotating-gantry equipped with the scanning irradiation system. The number of combinations of beam properties to measure for the commissioning is more than 7200, i.e., 201 energy steps, 3 intensities, and 12 gantry angles. To compress the commissioning time, quick and simple range verification system is required. In this work, the authors develop a quick range verification system using scintillator and charge-coupled device (CCD) camera and estimate the accuracy of the range verification. Methods: A cylindrical plastic scintillator block and a CCD camera were installed on the black box. The optical spatial resolution of the system is 0.2 mm/pixel. The camera control system was connected and communicates with the measurement system that is part of the scanning system. The range was determined by image processing. Reference range for each energy beam was determined by a difference of Gaussian (DOG) method and the 80% of distal dose of the depth-dose distribution that were measured by a large parallel-plate ionization chamber. The authors compared a threshold method and a DOG method. Results: The authors found that the edge detection method (i.e., the DOG method) is best for the range detection. The accuracy of range detection using this system is within 0.2 mm, and the reproducibility of the same energy measurement is within 0.1 mm without setup error. Conclusions: The results of this study demonstrate that the authors’ range check system is capable of quick and easy range verification with sufficient accuracy.

  13. Environmental settings for selected U.S. Department of Energy installations - support information for the Programmatic Environmental Impact Statement

    International Nuclear Information System (INIS)

    Holdren, G.R.; Glantz, C.S.; Berg, L.K.; Delinger, K.; Goodwin, S.M.; Rustad, J.R.; Schalla, R.; Schramke, J.A.

    1994-12-01

    This report contains the environmental setting information developed for 20 U.S. Department of Energy (DOE) installations in support of the DOE's Programmatic Environmental Impact Study (PEIS). The objective of the PEIS is to provide the public with information about the types of radiological and hazardous wastes and environmental contamination problems associated with major DOE facilities across the country, and to assess the relative risks that these wastes pose to the public, onsite workers, and the environment. Environmental setting information consists of the site-specific data required to model (using the Multimedia Environmental Pollutant Assessment System) the atmospheric, groundwater, and surface water transport of contaminants within and near the boundaries of the installations. The environmental settings data describes the climate, atmospheric dispersion, hydrogeology, and surface water characteristics of the installations. The number of discrete environmental settings established for each installation was governed by two competing requirements: (1) the risks posed by contaminants released from numerous waste sites were to be modeled as accurately as possible, and (2) the modeling required for numerous release sites and a large number of contaminants had to be completed within the limits imposed by the PEIS schedule. The final product is the result of attempts to balance these competing concerns in a way that minimizes the number of settings per installation in order to meet the project schedule while at the same time providing adequate, if sometimes highly simplified, representations of the different areas within an installation. Environmental settings were developed in conjunction with installation experts in the fields of meteorology, geology, hydrology, and geochemistry. When possible, local experts participated in the initial development, fine tuning, and final review of the PEIS environmental settings

  14. Verification of safety critical software

    International Nuclear Information System (INIS)

    Son, Ki Chang; Chun, Chong Son; Lee, Byeong Joo; Lee, Soon Sung; Lee, Byung Chai

    1996-01-01

    To assure quality of safety critical software, software should be developed in accordance with software development procedures and rigorous software verification and validation should be performed. Software verification is the formal act of reviewing, testing of checking, and documenting whether software components comply with the specified requirements for a particular stage of the development phase[1]. New software verification methodology was developed and was applied to the Shutdown System No. 1 and 2 (SDS1,2) for Wolsung 2,3 and 4 nuclear power plants by Korea Atomic Energy Research Institute(KAERI) and Atomic Energy of Canada Limited(AECL) in order to satisfy new regulation requirements of Atomic Energy Control Boars(AECB). Software verification methodology applied to SDS1 for Wolsung 2,3 and 4 project will be described in this paper. Some errors were found by this methodology during the software development for SDS1 and were corrected by software designer. Outputs from Wolsung 2,3 and 4 project have demonstrated that the use of this methodology results in a high quality, cost-effective product. 15 refs., 6 figs. (author)

  15. Future of monitoring and verification

    International Nuclear Information System (INIS)

    Wagenmakers, H.

    1991-01-01

    The organized verification entrusted to IAEA for the implementation of the NPT, of the Treaty of Tlatelolco and of the Treaty of Rarotonga, reaches reasonable standards. The current dispute with the Democratic People's Republic of Korea about the conclusion of a safeguards agreement with IAEA, by its exceptional nature, underscores rather than undermines the positive judgement to be passed on IAEA's overall performance. The additional task given to the Director General of IAEA under Security Council resolution 687 (1991) regarding Iraq's nuclear-weapons-usable material is particularly challenging. For the purposes of this paper, verification is defined as the process for establishing whether the States parties are complying with an agreement. In the final stage verification may lead into consideration of how to respond to non-compliance. Monitoring is perceived as the first level in the verification system. It is one generic form of collecting information on objects, activities or events and it involves a variety of instruments ranging from communications satellites to television cameras or human inspectors. Monitoring may also be used as a confidence-building measure

  16. Concepts for inventory verification in critical facilities

    International Nuclear Information System (INIS)

    Cobb, D.D.; Sapir, J.L.; Kern, E.A.; Dietz, R.J.

    1978-12-01

    Materials measurement and inventory verification concepts for safeguarding large critical facilities are presented. Inspection strategies and methods for applying international safeguards to such facilities are proposed. The conceptual approach to routine inventory verification includes frequent visits to the facility by one inspector, and the use of seals and nondestructive assay (NDA) measurements to verify the portion of the inventory maintained in vault storage. Periodic verification of the reactor inventory is accomplished by sampling and NDA measurement of in-core fuel elements combined with measurements of integral reactivity and related reactor parameters that are sensitive to the total fissile inventory. A combination of statistical sampling and NDA verification with measurements of reactor parameters is more effective than either technique used by itself. Special procedures for assessment and verification for abnormal safeguards conditions are also considered. When the inspection strategies and inventory verification methods are combined with strict containment and surveillance methods, they provide a high degree of assurance that any clandestine attempt to divert a significant quantity of fissile material from a critical facility inventory will be detected. Field testing of specific hardware systems and procedures to determine their sensitivity, reliability, and operational acceptability is recommended. 50 figures, 21 tables

  17. Monitoring and verification R and D

    International Nuclear Information System (INIS)

    Pilat, Joseph F.; Budlong-Sylvester, Kory W.; Fearey, Bryan L.

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R and D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R and D required to address these gaps and other monitoring and verification challenges.

  18. SU-F-T-440: The Feasibility Research of Checking Cervical Cancer IMRT Pre- Treatment Dose Verification by Automated Treatment Planning Verification System

    Energy Technology Data Exchange (ETDEWEB)

    Liu, X; Yin, Y; Lin, X [Shandong Cancer Hospital and Institute, China, Jinan, Shandong (China)

    2016-06-15

    Purpose: To assess the preliminary feasibility of automated treatment planning verification system in cervical cancer IMRT pre-treatment dose verification. Methods: The study selected randomly clinical IMRT treatment planning data for twenty patients with cervical cancer, all IMRT plans were divided into 7 fields to meet the dosimetric goals using a commercial treatment planning system(PianncleVersion 9.2and the EclipseVersion 13.5). The plans were exported to the Mobius 3D (M3D)server percentage differences of volume of a region of interest (ROI) and dose calculation of target region and organ at risk were evaluated, in order to validate the accuracy automated treatment planning verification system. Results: The difference of volume for Pinnacle to M3D was less than results for Eclipse to M3D in ROI, the biggest difference was 0.22± 0.69%, 3.5±1.89% for Pinnacle and Eclipse respectively. M3D showed slightly better agreement in dose of target and organ at risk compared with TPS. But after recalculating plans by M3D, dose difference for Pinnacle was less than Eclipse on average, results were within 3%. Conclusion: The method of utilizing the automated treatment planning system to validate the accuracy of plans is convenientbut the scope of differences still need more clinical patient cases to determine. At present, it should be used as a secondary check tool to improve safety in the clinical treatment planning.

  19. Summary Report of National Study of Word Processing Installations in Selected Business Organizations. A Summary of a Report on the National Word Processing Research Study of Delta Pi Epsilon.

    Science.gov (United States)

    Scriven, Jolene D.; And Others

    A study sought to determine current practices in word processing installations located in selected organizations throughout the United States. A related problem was to ascertain anticipated future developments in word processing to provide information for educational institutions preparing workers for the business office. Six interview instruments…

  20. Automated Generation of Formal Models from ST Control Programs for Verification Purposes

    CERN Document Server

    Fernandez Adiego, B; Tournier, J-C; Blanco Vinuela, E; Blech, J-O; Gonzalez Suarez, V

    2014-01-01

    In large industrial control systems such as the ones installed at CERN, one of the main issues is the ability to verify the correct behaviour of the Programmable Logic Controller (PLC) programs. While manual and automated testing can achieve good results, some obvious problems remain unsolved such as the difficulty to check safety or liveness properties. This paper proposes a general methodology and a tool to verify PLC programs by automatically generating formal models for different model checkers out of ST code. The proposed methodology defines an automata-based formalism used as intermediate model (IM) to transform PLC programs written in ST language into different formal models for verification purposes. A tool based on Xtext has been implemented that automatically generates models for the NuSMV and UPPAAL model checkers and the BIP framework.

  1. Standard Measurement & Verification Plan for Lighting Equipment Retrofit or Replacement Projects

    Energy Technology Data Exchange (ETDEWEB)

    Richman, Eric E.

    2009-11-04

    This document provides a framework for a standard Measurement and Verification (M&V) plan for lighting projects. It was developed to support cost-effective retrofits (partial and complete replacements) of lighting systems and is intended to provide a foundation for an M&V plan for a lighting retrofit utilizing a "best practice" approach, and to provide guidance to site owners, contractors, and other involved organizations on what is essential for a robust M&V plan for lighting projects. This document provides examples of appropriate elements of an M&V plan, including the calculation of expected energy savings. The standard M&V plan, as provided, also allows for consistent comparison with other similar lighting projects. Although intended for lighting retrofit applications, M&V plans developed per this framework document may also be used for other non-lighting technology retrofits and new installations.

  2. Incorporating Pass-Phrase Dependent Background Models for Text-Dependent Speaker verification

    DEFF Research Database (Denmark)

    Sarkar, Achintya Kumar; Tan, Zheng-Hua

    2018-01-01

    -dependent. We show that the proposed method significantly reduces the error rates of text-dependent speaker verification for the non-target types: target-wrong and impostor-wrong while it maintains comparable TD-SV performance when impostors speak a correct utterance with respect to the conventional system......In this paper, we propose pass-phrase dependent background models (PBMs) for text-dependent (TD) speaker verification (SV) to integrate the pass-phrase identification process into the conventional TD-SV system, where a PBM is derived from a text-independent background model through adaptation using...... the utterances of a particular pass-phrase. During training, pass-phrase specific target speaker models are derived from the particular PBM using the training data for the respective target model. While testing, the best PBM is first selected for the test utterance in the maximum likelihood (ML) sense...

  3. Feedback Seeking in Early Adolescence: Self-Enhancement or Self-Verification?

    OpenAIRE

    Rosen, Lisa H.; Principe, Connor P.; Langlois, Judith H.

    2012-01-01

    The authors examined whether early adolescents (N = 90) solicit self-enhancing feedback (i.e., positive feedback) or self-verifying feedback (i.e., feedback congruent with self-views, even when these views are negative). Sixth, seventh, and eighth graders first completed a self-perception measure and then selected whether to receive positive or negative feedback from an unknown peer in different domains of self. Results were consistent with self-verification theory; adolescents who perceived ...

  4. Field installed brazed thermocouple feedthroughs for high vacuum experiments

    International Nuclear Information System (INIS)

    Anderson, P.; Messick, C.

    1983-01-01

    In order to reduce the occurrence of vacuum leaks and to increase the availability of the DIII vacuum vessel for experimental operation, effort was applied to developing a vacuum-tight brazed feedthrough system for sheathed thermocouples, stainless steel sheathed conductor cables and tubes for cooling fluids. This brazed technique is a replacement for elastomer ''O'' ring sealed feedthroughs that have proven vulnerable to leaks caused by thermal cycling, etc. To date, about 200 feedthroughs have been used. Up to 91 were grouped on a single conflat flange mounted in a bulkhead connector configuration which facilitates installation and removal. Investigation was required to select a suitable braze alloy, flux and installation procedure. Braze alloy selection was challenging since the alloy was required to have: 1) Melting temperature in excess of the 250 0 C (482 0 F) bakeout temperature. 2) No high vapor pressure elements. 3) Good wetting properties when used in air with acceptable flux. 4) Good wettability to 300 series stainless steel and inconel

  5. As Built Verification Plan for Cask Transportation Facility Modifications (CTFM) - Project A.5 and A.6

    International Nuclear Information System (INIS)

    LANE, K.I.

    2000-01-01

    This document establishes an As-built Verification Plan (AVP) for implementing requirements in PHMC Engineering Requirements HNF-PRO-1819, Rev. 4, Sections 2.8.3.d and 2.10.8 and Spent Nuclear Fuels (SNF) Project Administrative Procedure EN-6-012-01. This AVP defines and implements approved processes to document the physical configuration of the project scope installed within the facility and identify discrepancies between the associated project engineering drawings and the field configuration, and the component index (CI) database as defined in AP EN 6-005-02. This AVP defines requirements for project activities verifying conformance of structures, systems, and components (SSCs) to project specified requirements

  6. Face Verification for Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.

    2009-01-01

    In this thesis, we presented a detailed study of the face verification problem on the mobile device, covering every component of the system. The study includes face detection, registration, normalization, and verification. Furthermore, the information fusion problem is studied to verify face

  7. Gender Verification of Female Olympic Athletes.

    Science.gov (United States)

    Dickinson, Barry D.; Genel, Myron; Robinowitz, Carolyn B.; Turner, Patricia L.; Woods, Gary L.

    2002-01-01

    Gender verification of female athletes has long been criticized by geneticists, endocrinologists, and others in the medical community. Recently, the International Olympic Committee's Athletic Commission called for discontinuation of mandatory laboratory-based gender verification of female athletes. This article discusses normal sexual…

  8. Suggestions for locations for the surface installations required for deep-lying repositories; standortareale fuer die oberflaechenanlage von tiefenlagern -- vorschlaege zur diskussion

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-01-15

    This booklet issued by the Swiss National Cooperative for the Disposal of Radioactive Waste NAGRA takes a look at the various factors involved in the selection of locations for surface installations that are required for the operation of deep-lying nuclear waste repositories. The method chosen for the selection of possible locations for surface installations is explained and the necessity for such installations is discussed. The requirements placed on such a location are discussed and the various locations chosen for further consideration are noted. The evaluation phases involved in the selection of sites are described. The proposed surface installations are noted and the proposed structures for both repository types - for highly radioactive wastes and for low and medium active wastes - are described.

  9. Validation of Embedded System Verification Models

    NARCIS (Netherlands)

    Marincic, J.; Mader, Angelika H.; Wieringa, Roelf J.

    The result of a model-based requirements verification shows that the model of a system satisfies (or not) formalised system requirements. The verification result is correct only if the model represents the system adequately. No matter what modelling technique we use, what precedes the model

  10. On Verification Modelling of Embedded Systems

    NARCIS (Netherlands)

    Brinksma, Hendrik; Mader, Angelika H.

    Computer-aided verification of embedded systems hinges on the availability of good verification models of the systems at hand. Such models must be much simpler than full design models or specifications to be of practical value, because of the unavoidable combinatorial complexities in the

  11. The latest electrical installation (I)

    International Nuclear Information System (INIS)

    Won, Jong Su

    1976-04-01

    This book deals with the latest electrical installation. The contents of this book are construction electrical installation, regulations related electrical installation, foundation and principle of wiring, main line feeder, lighting installation, power of wiring, main line feeder, lighting installation, power installation, method to read structure drawing for electrical construct drawing electric lamp wiring diagram, working drawing, material and tools and method of construction of electrical installation on types of wiring construction, metallic conduit, rigid poly-vinyl conduit wiring, bus duct work, cable work and insulation out of metal lathed.

  12. Structural considerations for solar installers : an approach for small, simplified solar installations or retrofits.

    Energy Technology Data Exchange (ETDEWEB)

    Richards, Elizabeth H.; Schindel, Kay (City of Madison, WI); Bosiljevac, Tom; Dwyer, Stephen F.; Lindau, William (Lindau Companies, Inc., Hudson, WI); Harper, Alan (City of Madison, WI)

    2011-12-01

    Structural Considerations for Solar Installers provides a comprehensive outline of structural considerations associated with simplified solar installations and recommends a set of best practices installers can follow when assessing such considerations. Information in the manual comes from engineering and solar experts as well as case studies. The objectives of the manual are to ensure safety and structural durability for rooftop solar installations and to potentially accelerate the permitting process by identifying and remedying structural issues prior to installation. The purpose of this document is to provide tools and guidelines for installers to help ensure that residential photovoltaic (PV) power systems are properly specified and installed with respect to the continuing structural integrity of the building.

  13. Compositional verification of real-time systems using Ecdar

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel

    2012-01-01

    We present a specification theory for timed systems implemented in the Ecdar tool. We illustrate the operations of the specification theory on a running example, showing the models and verification checks. To demonstrate the power of the compositional verification, we perform an in depth case study...... of a leader election protocol; Modeling it in Ecdar as Timed input/output automata Specifications and performing both monolithic and compositional verification of two interesting properties on it. We compare the execution time of the compositional to the classical verification showing a huge difference...

  14. Renewable Energy Assessment Methodology for Japanese OCONUS Army Installations

    Energy Technology Data Exchange (ETDEWEB)

    Solana, Amy E.; Horner, Jacob A.; Russo, Bryan J.; Gorrissen, Willy J.; Kora, Angela R.; Weimar, Mark R.; Hand, James R.; Orrell, Alice C.; Williamson, Jennifer L.

    2010-08-30

    Since 2005, Pacific Northwest National Laboratory (PNNL) has been asked by Installation Management Command (IMCOM) to conduct strategic assessments at selected US Army installations of the potential use of renewable energy resources, including solar, wind, geothermal, biomass, waste, and ground source heat pumps (GSHPs). IMCOM has the same economic, security, and legal drivers to develop alternative, renewable energy resources overseas as it has for installations located in the US. The approach for continental US (CONUS) studies has been to use known, US-based renewable resource characterizations and information sources coupled with local, site-specific sources and interviews. However, the extent to which this sort of data might be available for outside the continental US (OCONUS) sites was unknown. An assessment at Camp Zama, Japan was completed as a trial to test the applicability of the CONUS methodology at OCONUS installations. It was found that, with some help from Camp Zama personnel in translating and locating a few Japanese sources, there was relatively little difficulty in finding sources that should provide a solid basis for conducting an assessment of comparable depth to those conducted for US installations. Project implementation will likely be more of a challenge, but the feasibility analysis will be able to use the same basic steps, with some adjusted inputs, as PNNL’s established renewable resource assessment methodology.

  15. Disarmament Verification - the OPCW Experience

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  16. Verification of Chemical Weapons Destruction

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  17. A Model for Collaborative Runtime Verification

    NARCIS (Netherlands)

    Testerink, Bas; Bulling, Nils; Dastani, Mehdi

    2015-01-01

    Runtime verification concerns checking whether a system execution satisfies a given property. In this paper we propose a model for collaborative runtime verification where a network of local monitors collaborates in order to verify properties of the system. A local monitor has only a local view on

  18. HDM/PASCAL Verification System User's Manual

    Science.gov (United States)

    Hare, D.

    1983-01-01

    The HDM/Pascal verification system is a tool for proving the correctness of programs written in PASCAL and specified in the Hierarchical Development Methodology (HDM). This document assumes an understanding of PASCAL, HDM, program verification, and the STP system. The steps toward verification which this tool provides are parsing programs and specifications, checking the static semantics, and generating verification conditions. Some support functions are provided such as maintaining a data base, status management, and editing. The system runs under the TOPS-20 and TENEX operating systems and is written in INTERLISP. However, no knowledge is assumed of these operating systems or of INTERLISP. The system requires three executable files, HDMVCG, PARSE, and STP. Optionally, the editor EMACS should be on the system in order for the editor to work. The file HDMVCG is invoked to run the system. The files PARSE and STP are used as lower forks to perform the functions of parsing and proving.

  19. Self-verification and contextualized self-views.

    Science.gov (United States)

    Chen, Serena; English, Tammy; Peng, Kaiping

    2006-07-01

    Whereas most self-verification research has focused on people's desire to verify their global self-conceptions, the present studies examined self-verification with regard to contextualized selfviews-views of the self in particular situations and relationships. It was hypothesized that individuals whose core self-conceptions include contextualized self-views should seek to verify these self-views. In Study 1, the more individuals defined the self in dialectical terms, the more their judgments were biased in favor of verifying over nonverifying feedback about a negative, situation-specific self-view. In Study 2, consistent with research on gender differences in the importance of relationships to the self-concept, women but not men showed a similar bias toward feedback about a negative, relationship-specific self-view, a pattern not seen for global self-views. Together, the results support the notion that self-verification occurs for core self-conceptions, whatever form(s) they may take. Individual differences in self-verification and the nature of selfhood and authenticity are discussed.

  20. Optimal location selection for the installation of urban green roofs considering honeybee habitats along with socio-economic and environmental effects.

    Science.gov (United States)

    Gwak, Jae Ha; Lee, Bo Kyeong; Lee, Won Kyung; Sohn, So Young

    2017-03-15

    This study proposes a new framework for the selection of optimal locations for green roofs to achieve a sustainable urban ecosystem. The proposed framework selects building sites that can maximize the benefits of green roofs, based not only on the socio-economic and environmental benefits to urban residents, but also on the provision of urban foraging sites for honeybees. The framework comprises three steps. First, building candidates for green roofs are selected considering the building type. Second, the selected building candidates are ranked in terms of their expected socio-economic and environmental effects. The benefits of green roofs are improved energy efficiency and air quality, reduction of urban flood risk and infrastructure improvement costs, reuse of storm water, and creation of space for education and leisure. Furthermore, the estimated cost of installing green roofs is also considered. We employ spatial data to determine the expected effects of green roofs on each building unit, because the benefits and costs may vary depending on the location of the building. This is due to the heterogeneous spatial conditions. In the third step, the final building sites are proposed by solving the maximal covering location problem (MCLP) to determine the optimal locations for green roofs as urban honeybee foraging sites. As an illustrative example, we apply the proposed framework in Seoul, Korea. This new framework is expected to contribute to sustainable urban ecosystems. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Engineering within the assembly, verification, and integration (AIV) process in ALMA

    Science.gov (United States)

    Lopez, Bernhard; McMullin, Joseph P.; Whyborn, Nicholas D.; Duvall, Eugene

    2010-07-01

    The Atacama Large Millimeter/submillimeter Array (ALMA) is a joint project between astronomical organizations in Europe, North America, and East Asia, in collaboration with the Republic of Chile. ALMA will consist of at least 54 twelve-meter antennas and 12 seven-meter antennas operating as an interferometer in the millimeter and sub-millimeter wavelength range. It will be located at an altitude above 5000m in the Chilean Atacama desert. As part of the ALMA construction phase the Assembly, Verification and Integration (AIV) team receives antennas and instrumentation from Integrated Product Teams (IPTs), verifies that the sub-systems perform as expected, performs the assembly and integration of the scientific instrumentation and verifies that functional and performance requirements are met. This paper aims to describe those aspects related to the AIV Engineering team, its role within the 4-station AIV process, the different phases the group underwent, lessons learned and potential space for improvement. AIV Engineering initially focused on the preparation of the necessary site infrastructure for AIV activities, on the purchase of tools and equipment and on the first ALMA system installations. With the first antennas arriving on site the team started to gather experience with AIV Station 1 beacon holography measurements for the assessment of the overall antenna surface quality, and with optical pointing to confirm the antenna pointing and tracking capabilities. With the arrival of the first receiver AIV Station 2 was developed which focuses on the installation of electrical and cryogenic systems and incrementally establishes the full connectivity of the antenna as an observing platform. Further antenna deliveries then allowed to refine the related procedures, develop staff expertise and to transition towards a more routine production process. Stations 3 and 4 deal with verification of the antenna with integrated electronics by the AIV Science Team and is not covered

  2. A Verification Logic for GOAL Agents

    Science.gov (United States)

    Hindriks, K. V.

    Although there has been a growing body of literature on verification of agents programs, it has been difficult to design a verification logic for agent programs that fully characterizes such programs and to connect agent programs to agent theory. The challenge is to define an agent programming language that defines a computational framework but also allows for a logical characterization useful for verification. The agent programming language GOAL has been originally designed to connect agent programming to agent theory and we present additional results here that GOAL agents can be fully represented by a logical theory. GOAL agents can thus be said to execute the corresponding logical theory.

  3. Role of experiments in soil-structure interaction methodology verification

    International Nuclear Information System (INIS)

    Srinivasan, M.G.; Kot, C.A.; Hsieh, B.J.

    1986-01-01

    Different kinds of experimental data may be useful for partial or full verification of SSI analysis methods. The great bulk of existing data comes from earthquake records and dynamic testing of as-built structures. However, much of this data may not be suitable for the present purpose as the measurement locations were not selected with the verification of SSI analysis in mind and hence are too few in number or inappropriate in character. Data from scale model testing that include the soil in the model - both in-situ and laboratory - are relatively scarce. If the difficulty in satisfying the requirements of similitude laws on the one hand and simulating realistic soil behavior on the other can be resolved, scale model testing may generate very useful data for relatively low cost. The current NRC sponsored programs are expected to generate data very useful for verifying analysis methods for SSI. A systematic effort to inventory, evaluate and classify existing data is first necessary. This effort would probably show that more data is needed for the better understanding of SSI aspects such as spatial variation of ground motion and the related issue of foundation input motion, and soil stiffness. Collection of response data from in-structure and free field (surface and downhole) through instrumentation of selected as-built structures in seismically active regions may be the most efficient way to obtain the needed data. Augmentation of this data from properly designed scale model tests should also be considered

  4. Secure optical verification using dual phase-only correlation

    International Nuclear Information System (INIS)

    Liu, Wei; Liu, Shutian; Zhang, Yan; Xie, Zhenwei; Liu, Zhengjun

    2015-01-01

    We introduce a security-enhanced optical verification system using dual phase-only correlation based on a novel correlation algorithm. By employing a nonlinear encoding, the inherent locks of the verification system are obtained in real-valued random distributions, and the identity keys assigned to authorized users are designed as pure phases. The verification process is implemented in two-step correlation, so only authorized identity keys can output the discriminate auto-correlation and cross-correlation signals that satisfy the reset threshold values. Compared with the traditional phase-only-correlation-based verification systems, a higher security level against counterfeiting and collisions are obtained, which is demonstrated by cryptanalysis using known attacks, such as the known-plaintext attack and the chosen-plaintext attack. Optical experiments as well as necessary numerical simulations are carried out to support the proposed verification method. (paper)

  5. Capping off installation

    CERN Multimedia

    2006-01-01

    Installation of the cathode strip chambers for the muon system on the CMS positive endcap has been completed. Technicians install one of the last muon system cathode strip chambers on the CMS positive endcap. Like successfully putting together the pieces of a giant puzzle, installation of the muon system cathode strip chambers on one of the CMS endcaps has been completed. Total installation of the cathode strip chambers (CSC) is now 91 percent complete; only one ring of chambers needs to be mounted on the remaining endcap to finish installation of the entire system. To guarantee a good fit for the 468 total endcap muon system CSCs, physicists and engineers from the collaboration spent about 10 years carefully planning the design. The endcap muon system's cables, boxes, pipes and other parts were designed and integrated using a 3D computerized model. 'It took a long time to do all the computer modelling, but in the long run it saved us an enormous amount of time because it meant that everything fit together,...

  6. A Low Cost Shading Analyzer and Site Evaluator Design to Determine Solar Power System Installation Area

    Directory of Open Access Journals (Sweden)

    Selami Kesler

    2015-01-01

    Full Text Available Shading analyzer systems are necessary for selecting the most suitable installation site to sustain enough solar power. Afterwards, changes in solar data throughout the year must be evaluated along with the identification of obstructions surrounding the installation site in order to analyze shading effects on productivity of the solar power system. In this study, the shading analysis tools are introduced briefly, and a new and different device is developed and explained to analyze shading effect of the environmental obstruction on the site on which the solar power system will be established. Thus, exposure duration of the PV panels to the sunlight can be measured effectively. The device is explained with an application on the installation area selected as a pilot site, Denizli, in Turkey.

  7. Verification testing of the PKI collector at Sandia National Laboratories, Albuquerque, New Mexico

    Science.gov (United States)

    Hauger, J. S.; Pond, S. L.

    1982-07-01

    Verification testing of a solar collector was undertaken prior to its operation as part of an industrial process heat plant at Capitol Concrete Products in Topeka, Kansas. Testing was performed at a control plant installed at Sandia National Laboratory, Albuquerque, New Mexico (SNLA). Early results show that plant performance is even better than anticipated and far in excess of test criteria. Overall plant efficiencies of 65 to 80 percent were typical during hours of good insolation. A number of flaws and imperfections were detected during operability testing, the most important being a problem in elevation drive alignment due to a manufacturing error. All problems were corrected as they occurred and the plant, with over 40 hours of operation, is currently continuing operability testing in a wholly-automatic mode.

  8. TFTR Inner Support Structure final assembly and installation

    International Nuclear Information System (INIS)

    Rocco, R.E.; Brown, G.; Carglia, G.; Heitzenroeder, P.; Koenig, F.; Mookerjee, S.; Raugh, J.

    1983-01-01

    The Inner Support Structure (ISS) of the TFTR provides a specific level of restraint to the net centering force and overturning moment produced by the Toroidal Field (TF) coils and to the vertical forces produced by the Inner Poloidal Field (PF) coils. This is accomplished consistent with the need for four radial dielectric breaks running the entire length of the ISS to prevent eddy current loops. A brief description of the major components, method of manufacture and material selection of the ISS and PF coils is presented. Particular attention is given to the integration of the PF coils and the ISS components into the total assembly and the installation of strain gauges and crack monitors on the ISS. The requirements of no gaps at the interfaces of the ISS teeth at all three horizontal planes is discussed. The problem encountered with achieving the no gap requirement and the successful resolution of this problem, including its impact on installation of the ISS, is also discussed. The installation of the ISS, including setting in position, preloading with TF coil clips, and final tensioning of the tension bars is discussed. A brief description of the lower and upper lead stem splicing operation is presented. Subsequent to the final assembly, electrical tests were performed prior to and after installation on the TFTR machine. An overview of the tests and their results is presented

  9. DIMENSIONAL VERIFICATION AND QUALITY CONTROL OF IMPLANTS PRODUCED BY ADDITIVE MANUFACTURING

    Directory of Open Access Journals (Sweden)

    Teodor Toth

    2015-07-01

    Full Text Available Purpose: Development of computer technology and alternative manufacturing methods in form of additive manufacturing leads to the manufacture of products with complex shapes. In the field of medicine they include, inter alia, custom-made implants manufactured for a particular patient, such as cranial implants, maxillofacial implants, etc. With regard to the fact that such implants are inserted into a patient’s body, it is necessary to perform the verification, including the shape and dimensional verification. The article deals with the application of the industrial computer tomography within the process of inspection and verification of selected custom-made implant types.Methodology/Approach: The Department of Biomedical Engineering and Measurement performs the verification of medicinal products manufactured by the additive manufacturing technologies from the Ti-6Al-4V (Grade 5 titanium alloy, using the coordinate measuring machine Carl Zeiss Contura G2 and the industrial computed tomography machine Carl Zeiss Metrotom 1500. These equipment fulfil the requirements for the identification and evaluation of dimensions of both, the external and the internal structures. Findings: The article presents the possibilities of the computed tomography utilisation in the inspection of individual implant manufacture using the additive manufacturing technologies. The results indicate that with the adjustment of appropriate input parameters (alignment, this technology is appropriate for the analysis of shape deviations, when compared with the CAD model.Research Limitation/implication: With the increasing distance of measured object from X-ray source, the machine’s resolution function decreases. Decreasing of resolution has a minor impact on the measured dimensions (relatively high tolerances, but has a significant impact on the evaluation of porosity and inclusions. Originality/Value of paper: Currently, the verification of a manufactured implant  can be

  10. SU-G-BRB-15: Verifications of Absolute and Relative Dosimetry of a Novel Stereotactic Breast Device: GammaPodTM

    Energy Technology Data Exchange (ETDEWEB)

    Becker, S; Mossahebi, S; Yi, B; Prado, K; Mutaf, Y [University of Maryland School Of Medicine (United States); Niu, Y [Xcision Medical Systems, Rockville, MD (United States); Yu, C [University of Maryland School Of Medicine (United States); Xcision Medical Systems, Rockville, MD (United States)

    2016-06-15

    Purpose: A dedicated stereotactic breast radiotherapy device, GammaPod, was developed to treat early stage breast cancer. The first clinical unit was installed and commissioned at University of Maryland. We report our methodology of absolute dosimetry in multiple calibration conditions and dosimetric verifications of treatment plans produced by the system. Methods: GammaPod unit is comprised of a rotating hemi-spherical source carrier containing 36 Co-60 sources and a concentric tungsten collimator providing beams of 15 and 25 mm. Absolute dose calibration formalism was developed with modifications to AAPM protocols for unique geometry and different calibration medium (acrylic, polyethylene or liquid water). Breast cup-size specific and collimator output factors were measured and verified with respect to Monte-Carlo simulations for single isocenter plans. Multiple isocenter plans were generated for various target size, location and cup-sizes in phantoms and 20 breast cancer patients images. Stereotactic mini-farmer chamber, OSL and TLD detectors as well as radio-chromic films were used for dosimetric measurements. Results: At the time of calibration (1/14/2016), absolute dose rate of the GammaPod was established to be 2.10 Gy/min in acrylic for 25 mm for sources installed in March 2011. Output factor for 15 mm collimator was measured to be 0.950. Absolute dose calibration was independently verified by IROC-Houston with a TLD/Institution ratio of 0.99. Cup size specific output measurements in liquid water for single isocenter were found to be within 3.0% of MC simulations. Point-dose measurements of multiple isocenter treatment plans were found to be within −1.0 ± 1.2 % of treatment planning system while 2-dimensional gamma analysis yielded a pass rate of 97.9 ± 2.2 % using gamma criteria of 3% and 2mm. Conclusion: The first GammaPod treatment unit for breast stereotactic radiotherapy was successfully installed, calibrated and commissioned for patient treatments

  11. Installation, tests and start up of the Tandetron positive ions accelerator

    International Nuclear Information System (INIS)

    Valdovinos A, M.A.; Hernandez M, V.

    2000-01-01

    The National Institute of Nuclear Research acquired a Positive ions accelerator type Tandetron 2MV of the Dutch Company High Voltage Engineering, Europe B.V. (H.V.E.E.) which was installed in the building named Irradiator Nave which is occupied by the Gamma irradiator and the Pelletron accelerator. Starting from the accelerator selection it was defined the conditions required for the operation of this as well as: electric feeding, water quality and quantity, air compressed, temperature, humidity, etc.; as well as the necessary modifications of the installation area. (Author)

  12. Technical challenges for dismantlement verification

    International Nuclear Information System (INIS)

    Olinger, C.T.; Stanbro, W.D.; Johnston, R.G.; Nakhleh, C.W.; Dreicer, J.S.

    1997-01-01

    In preparation for future nuclear arms reduction treaties, including any potential successor treaties to START I and II, the authors have been examining possible methods for bilateral warhead dismantlement verification. Warhead dismantlement verification raises significant challenges in the political, legal, and technical arenas. This discussion will focus on the technical issues raised by warhead arms controls. Technical complications arise from several sources. These will be discussed under the headings of warhead authentication, chain-of-custody, dismantlement verification, non-nuclear component tracking, component monitoring, and irreversibility. The authors will discuss possible technical options to address these challenges as applied to a generic dismantlement and disposition process, in the process identifying limitations and vulnerabilities. They expect that these considerations will play a large role in any future arms reduction effort and, therefore, should be addressed in a timely fashion

  13. Safety Verification for Probabilistic Hybrid Systems

    DEFF Research Database (Denmark)

    Zhang, Lijun; She, Zhikun; Ratschan, Stefan

    2010-01-01

    The interplay of random phenomena and continuous real-time control deserves increased attention for instance in wireless sensing and control applications. Safety verification for such systems thus needs to consider probabilistic variations of systems with hybrid dynamics. In safety verification o...... on a number of case studies, tackled using a prototypical implementation....

  14. Electrical installation calculations basic

    CERN Document Server

    Kitcher, Christopher

    2013-01-01

    All the essential calculations required for basic electrical installation workThe Electrical Installation Calculations series has proved an invaluable reference for over forty years, for both apprentices and professional electrical installation engineers alike. The book provides a step-by-step guide to the successful application of electrical installation calculations required in day-to-day electrical engineering practice. A step-by-step guide to everyday calculations used on the job An essential aid to the City & Guilds certificates at Levels 2 and 3Fo

  15. Nuclear Installations Act 1965

    International Nuclear Information System (INIS)

    1965-01-01

    This Act governs all activities related to nuclear installations in the United Kingdom. It provides for the licensing procedure for nuclear installations, the duties of licensees, the competent authorities and carriers of nuclear material in respect of nuclear occurrences, as well as for the system of third party liability and compensation for nuclear damage. The Act repeals the Nuclear Installations (Licensing and Insurance) Act 1959 and the Nuclear Installations (Amendment Act) 1965 except for its Section 17(2). (NEA) [fr

  16. SSN Verification Service

    Data.gov (United States)

    Social Security Administration — The SSN Verification Service is used by Java applications to execute the GUVERF02 service using the WebSphere/CICS Interface. It accepts several input data fields...

  17. Enhanced Verification Test Suite for Physics Simulation Codes

    Energy Technology Data Exchange (ETDEWEB)

    Kamm, J R; Brock, J S; Brandon, S T; Cotrell, D L; Johnson, B; Knupp, P; Rider, W; Trucano, T; Weirs, V G

    2008-10-10

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations. The key points of this document are: (1) Verification deals with mathematical correctness of the numerical algorithms in a code, while validation deals with physical correctness of a simulation in a regime of interest. This document is about verification. (2) The current seven-problem Tri-Laboratory Verification Test Suite, which has been used for approximately five years at the DOE WP laboratories, is limited. (3) Both the methodology for and technology used in verification analysis have evolved and been improved since the original test suite was proposed. (4) The proposed test problems are in three basic areas: (a) Hydrodynamics; (b) Transport processes; and (c) Dynamic strength-of-materials. (5) For several of the proposed problems we provide a 'strong sense verification benchmark', consisting of (i) a clear mathematical statement of the problem with sufficient information to run a computer simulation, (ii) an explanation of how the code result and benchmark solution are to be evaluated, and (iii) a description of the acceptance criterion for simulation code results. (6) It is proposed that the set of verification test problems with which any particular code be evaluated include some of the problems described in this document. Analysis of the proposed verification test problems constitutes part of a necessary--but not sufficient--step that builds confidence in physics and engineering simulation codes. More complicated test cases, including physics models of

  18. Lessons Learned From Microkernel Verification — Specification is the New Bottleneck

    Directory of Open Access Journals (Sweden)

    Thorsten Bormer

    2012-11-01

    Full Text Available Software verification tools have become a lot more powerful in recent years. Even verification of large, complex systems is feasible, as demonstrated in the L4.verified and Verisoft XT projects. Still, functional verification of large software systems is rare – for reasons beyond the large scale of verification effort needed due to the size alone. In this paper we report on lessons learned for verification of large software systems based on the experience gained in microkernel verification in the Verisoft XT project. We discuss a number of issues that impede widespread introduction of formal verification in the software life-cycle process.

  19. Advancing Disarmament Verification Tools: A Task for Europe?

    International Nuclear Information System (INIS)

    Göttsche, Malte; Kütt, Moritz; Neuneck, Götz; Niemeyer, Irmgard

    2015-01-01

    A number of scientific-technical activities have been carried out to establish more robust and irreversible disarmament verification schemes. Regardless of the actual path towards deeper reductions in nuclear arsenals or their total elimination in the future, disarmament verification will require new verification procedures and techniques. This paper discusses the information that would be required as a basis for building confidence in disarmament, how it could be principally verified and the role Europe could play. Various ongoing activities are presented that could be brought together to produce a more intensified research and development environment in Europe. The paper argues that if ‘effective multilateralism’ is the main goal of the European Union’s (EU) disarmament policy, EU efforts should be combined and strengthened to create a coordinated multilateral disarmament verification capacity in the EU and other European countries. The paper concludes with several recommendations that would have a significant impact on future developments. Among other things, the paper proposes a one-year review process that should include all relevant European actors. In the long run, an EU Centre for Disarmament Verification could be envisaged to optimize verification needs, technologies and procedures.

  20. The verification of DRAGON: progress and lessons learned

    International Nuclear Information System (INIS)

    Marleau, G.

    2002-01-01

    The general requirements for the verification of the legacy code DRAGON are somewhat different from those used for new codes. For example, the absence of a design manual for DRAGON makes it difficult to confirm that the each part of the code performs as required since these requirements are not explicitly spelled out for most of the DRAGON modules. In fact, this conformance of the code can only be assessed, in most cases, by making sure that the contents of the DRAGON data structures, which correspond to the output generated by a module of the code, contains the adequate information. It is also possible in some cases to use the self-verification options in DRAGON to perform additional verification or to evaluate, using an independent software, the performance of specific functions in the code. Here, we will describe the global verification process that was considered in order to bring DRAGON to an industry standard tool-set (IST) status. We will also discuss some of the lessons we learned in performing this verification and present some of the modification to DRAGON that were implemented as a consequence of this verification. (author)

  1. Simulation Environment Based on the Universal Verification Methodology

    CERN Document Server

    AUTHOR|(SzGeCERN)697338

    2017-01-01

    Universal Verification Methodology (UVM) is a standardized approach of verifying integrated circuit designs, targeting a Coverage-Driven Verification (CDV). It combines automatic test generation, self-checking testbenches, and coverage metrics to indicate progress in the design verification. The flow of the CDV differs from the traditional directed-testing approach. With the CDV, a testbench developer, by setting the verification goals, starts with an structured plan. Those goals are targeted further by a developed testbench, which generates legal stimuli and sends them to a device under test (DUT). The progress is measured by coverage monitors added to the simulation environment. In this way, the non-exercised functionality can be identified. Moreover, the additional scoreboards indicate undesired DUT behaviour. Such verification environments were developed for three recent ASIC and FPGA projects which have successfully implemented the new work-flow: (1) the CLICpix2 65 nm CMOS hybrid pixel readout ASIC desi...

  2. Hierarchical Representation Learning for Kinship Verification.

    Science.gov (United States)

    Kohli, Naman; Vatsa, Mayank; Singh, Richa; Noore, Afzel; Majumdar, Angshul

    2017-01-01

    Kinship verification has a number of applications such as organizing large collections of images and recognizing resemblances among humans. In this paper, first, a human study is conducted to understand the capabilities of human mind and to identify the discriminatory areas of a face that facilitate kinship-cues. The visual stimuli presented to the participants determine their ability to recognize kin relationship using the whole face as well as specific facial regions. The effect of participant gender and age and kin-relation pair of the stimulus is analyzed using quantitative measures such as accuracy, discriminability index d' , and perceptual information entropy. Utilizing the information obtained from the human study, a hierarchical kinship verification via representation learning (KVRL) framework is utilized to learn the representation of different face regions in an unsupervised manner. We propose a novel approach for feature representation termed as filtered contractive deep belief networks (fcDBN). The proposed feature representation encodes relational information present in images using filters and contractive regularization penalty. A compact representation of facial images of kin is extracted as an output from the learned model and a multi-layer neural network is utilized to verify the kin accurately. A new WVU kinship database is created, which consists of multiple images per subject to facilitate kinship verification. The results show that the proposed deep learning framework (KVRL-fcDBN) yields the state-of-the-art kinship verification accuracy on the WVU kinship database and on four existing benchmark data sets. Furthermore, kinship information is used as a soft biometric modality to boost the performance of face verification via product of likelihood ratio and support vector machine based approaches. Using the proposed KVRL-fcDBN framework, an improvement of over 20% is observed in the performance of face verification.

  3. Electrical installation calculations advanced

    CERN Document Server

    Kitcher, Christopher

    2013-01-01

    All the essential calculations required for advanced electrical installation workThe Electrical Installation Calculations series has proved an invaluable reference for over forty years, for both apprentices and professional electrical installation engineers alike. The book provides a step-by-step guide to the successful application of electrical installation calculations required in day-to-day electrical engineering practiceA step-by-step guide to everyday calculations used on the job An essential aid to the City & Guilds certificates at Levels 2 and 3For apprentices and electrical installatio

  4. Electrical installations and regulations

    CERN Document Server

    Whitfield, J F

    1966-01-01

    Electrical Installations and Regulations focuses on the regulations that apply to electrical installations and the reasons for them. Topics covered range from electrical science to alternating and direct current supplies, as well as equipment for providing protection against excess current. Cables, wiring systems, and final subcircuits are also considered, along with earthing, discharge lighting, and testing and inspection.Comprised of 12 chapters, this book begins with an overview of electrical installation work, traits of a good electrician, and the regulations governing installations. The r

  5. Self-verification motives at the collective level of self-definition.

    Science.gov (United States)

    Chen, Serena; Chen, Karen Y; Shaw, Lindsay

    2004-01-01

    Three studies examined self-verification motives in relation to collective aspects of the self. Several moderators of collective self-verification were also examined--namely, the certainty with which collective self-views are held, the nature of one's ties to a source of self-verification, the salience of the collective self, and the importance of group identification. Evidence for collective self-verification emerged across all studies, particularly when collective self-views were held with high certainty (Studies 1 and 2), perceivers were somehow tied to the source of self-verification (Study 1), the collective self was salient (Study 2), and group identification was important (Study 3). To the authors' knowledge, these studies are the first to examine self-verification at the collective level of self-definition. The parallel and distinct ways in which self-verification processes may operate at different levels of self-definition are discussed.

  6. [Requirements for the successful installation of an data management system].

    Science.gov (United States)

    Benson, M; Junger, A; Quinzio, L; Hempelmann, G

    2002-08-01

    Due to increasing requirements on medical documentation, especially with reference to the German Social Law binding towards quality management and introducing a new billing system (DRGs), an increasing number of departments consider to implement a patient data management system (PDMS). The installation should be professionally planned as a project in order to insure and complete a successful installation. The following aspects are essential: composition of the project group, definition of goals, finance, networking, space considerations, hardware, software, configuration, education and support. Project and finance planning must be prepared before beginning the project and the project process must be constantly evaluated. In selecting the software, certain characteristics should be considered: use of standards, configurability, intercommunicability and modularity. Our experience has taught us that vaguely defined goals, insufficient project planning and the existing management culture are responsible for the failure of PDMS installations. The software used tends to play a less important role.

  7. 24 CFR 5.512 - Verification of eligible immigration status.

    Science.gov (United States)

    2010-04-01

    ... immigration status. 5.512 Section 5.512 Housing and Urban Development Office of the Secretary, Department of... Noncitizens § 5.512 Verification of eligible immigration status. (a) General. Except as described in paragraph...) Primary verification—(1) Automated verification system. Primary verification of the immigration status of...

  8. Verification of RADTRAN

    International Nuclear Information System (INIS)

    Kanipe, F.L.; Neuhauser, K.S.

    1995-01-01

    This document presents details of the verification process of the RADTRAN computer code which was established for the calculation of risk estimates for radioactive materials transportation by highway, rail, air, and waterborne modes

  9. Dynamic Calibration and Verification Device of Measurement System for Dynamic Characteristic Coefficients of Sliding Bearing

    Science.gov (United States)

    Chen, Runlin; Wei, Yangyang; Shi, Zhaoyang; Yuan, Xiaoyang

    2016-01-01

    The identification accuracy of dynamic characteristics coefficients is difficult to guarantee because of the errors of the measurement system itself. A novel dynamic calibration method of measurement system for dynamic characteristics coefficients is proposed in this paper to eliminate the errors of the measurement system itself. Compared with the calibration method of suspension quality, this novel calibration method is different because the verification device is a spring-mass system, which can simulate the dynamic characteristics of sliding bearing. The verification device is built, and the calibration experiment is implemented in a wide frequency range, in which the bearing stiffness is simulated by the disc springs. The experimental results show that the amplitude errors of this measurement system are small in the frequency range of 10 Hz–100 Hz, and the phase errors increase along with the increasing of frequency. It is preliminarily verified by the simulated experiment of dynamic characteristics coefficients identification in the frequency range of 10 Hz–30 Hz that the calibration data in this frequency range can support the dynamic characteristics test of sliding bearing in this frequency range well. The bearing experiments in greater frequency ranges need higher manufacturing and installation precision of calibration device. Besides, the processes of calibration experiments should be improved. PMID:27483283

  10. TESLA accelerator installation

    International Nuclear Information System (INIS)

    Neskovic, N.; Ostojic, R.; Susini, A.; Milinkovic, Lj.; Ciric, D.; Dobrosavljevic, A.; Brajuskovic, B.; Cirkovic, S.; Bojovic, B.; Josipovic, M.

    1992-01-01

    The TESLA accelerator Installation is described. Its main parts are the VINCY Cyclotron, the multiply charged heavy-ion mVINIS Ion Source, and the negative light-ion pVINIS Ion Source. The Installation should be the principal installation of a regional center for basic and applied research in nuclear physics, atomic physics, surface physics and solid state physics, for production of radioisotopes, for research and therapy in nuclear medicine. The first extraction of the ion beam from the Cyclotron is planned for 1995. (R.P.) 3 refs.; 1 fig

  11. CASL Verification and Validation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Mousseau, Vincent Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dinh, Nam [North Carolina State Univ., Raleigh, NC (United States)

    2016-06-30

    This report documents the Consortium for Advanced Simulation of LWRs (CASL) verification and validation plan. The document builds upon input from CASL subject matter experts, most notably the CASL Challenge Problem Product Integrators, CASL Focus Area leaders, and CASL code development and assessment teams. This document will be a living document that will track progress on CASL to do verification and validation for both the CASL codes (including MPACT, CTF, BISON, MAMBA) and for the CASL challenge problems (CIPS, PCI, DNB). The CASL codes and the CASL challenge problems are at differing levels of maturity with respect to validation and verification. The gap analysis will summarize additional work that needs to be done. Additional VVUQ work will be done as resources permit. This report is prepared for the Department of Energy’s (DOE’s) CASL program in support of milestone CASL.P13.02.

  12. The monitoring and verification of nuclear weapons

    International Nuclear Information System (INIS)

    Garwin, Richard L.

    2014-01-01

    This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers

  13. Planning and installing micro-hydro systems a guide for designers, installers and engineers

    CERN Document Server

    Elliott, Chris

    2014-01-01

    An essential addition to the Earthscan Planning & Installing series, Planning and Installing Micro-Hydro Systems provides vital diagrams, pictures and tables detailing the planning and installing of a micro-hydro system, including information on the maintenance and economics once an installation is running. The book covers subjects such as measuring head and flow, ecological impacts, scheme layouts, practical advice, calculations and turbine choice. Archimedes screws are also covered in detail, as well as the main conventional choices relevant to small sites.Micro-hydro refers to hydropower sy

  14. DarcyTools, Version 2.1. Verification and validation

    International Nuclear Information System (INIS)

    Svensson, Urban

    2004-03-01

    DarcyTools is a computer code for simulation of flow and transport in porous and/or fractured media. The fractured media in mind is a fractured rock and the porous media the soil cover on the top of the rock; it is hence groundwater flows, which is the class of flows in mind. A number of novel methods and features form the present version of DarcyTools. In the verification studies, these methods are evaluated by comparisons with analytical solutions for idealized situations. The five verification groups, thus reflect the main areas of recent developments. The present report will focus on the Verification and Validation of DarcyTools. Two accompanying reports cover other aspects: - Concepts, Methods, Equations and Demo Simulations. - User's Guide. The objective of this report is to compile all verification and validation studies that have been carried out so far. After some brief introductory sections, all cases will be reported in Appendix A (verification cases) and Appendix B (validation cases)

  15. Verification and quality control of routine hematology analyzers.

    Science.gov (United States)

    Vis, J Y; Huisman, A

    2016-05-01

    Verification of hematology analyzers (automated blood cell counters) is mandatory before new hematology analyzers may be used in routine clinical care. The verification process consists of several items which comprise among others: precision, accuracy, comparability, carryover, background and linearity throughout the expected range of results. Yet, which standard should be met or which verification limit be used is at the discretion of the laboratory specialist. This paper offers practical guidance on verification and quality control of automated hematology analyzers and provides an expert opinion on the performance standard that should be met by the contemporary generation of hematology analyzers. Therefore (i) the state-of-the-art performance of hematology analyzers for complete blood count parameters is summarized, (ii) considerations, challenges, and pitfalls concerning the development of a verification plan are discussed, (iii) guidance is given regarding the establishment of reference intervals, and (iv) different methods on quality control of hematology analyzers are reviewed. © 2016 John Wiley & Sons Ltd.

  16. DarcyTools, Version 2.1. Verification and validation

    Energy Technology Data Exchange (ETDEWEB)

    Svensson, Urban [Computer-aided Fluid Engineering AB, Norrkoeping (Sweden)

    2004-03-01

    DarcyTools is a computer code for simulation of flow and transport in porous and/or fractured media. The fractured media in mind is a fractured rock and the porous media the soil cover on the top of the rock; it is hence groundwater flows, which is the class of flows in mind. A number of novel methods and features form the present version of DarcyTools. In the verification studies, these methods are evaluated by comparisons with analytical solutions for idealized situations. The five verification groups, thus reflect the main areas of recent developments. The present report will focus on the Verification and Validation of DarcyTools. Two accompanying reports cover other aspects: - Concepts, Methods, Equations and Demo Simulations. - User's Guide. The objective of this report is to compile all verification and validation studies that have been carried out so far. After some brief introductory sections, all cases will be reported in Appendix A (verification cases) and Appendix B (validation cases)

  17. Verification-Based Interval-Passing Algorithm for Compressed Sensing

    OpenAIRE

    Wu, Xiaofu; Yang, Zhen

    2013-01-01

    We propose a verification-based Interval-Passing (IP) algorithm for iteratively reconstruction of nonnegative sparse signals using parity check matrices of low-density parity check (LDPC) codes as measurement matrices. The proposed algorithm can be considered as an improved IP algorithm by further incorporation of the mechanism of verification algorithm. It is proved that the proposed algorithm performs always better than either the IP algorithm or the verification algorithm. Simulation resul...

  18. Safety culture in nuclear installations - The role of the regulator

    International Nuclear Information System (INIS)

    Karigi, Alice W.

    2002-01-01

    Safety culture is an amalgamation of values, standards, morals and norms of acceptable behavior by the licensees, Radiation workers and the Regulator. The role played by a Regulator in establishing safety culture in a nuclear installation is that related to Authorization, review, assessment, inspection and enforcement. The regulator is to follow the development of a facility or activity from initial selection of the site through design, construction, commissioning, radioactive waste management through to decommissioning and closure. He is to ensure safety measures are followed through out the operation of the facility by laying down in the license conditions of controlling construction of nuclear installations and ensuring competence of the operators. (author)

  19. Installation Art

    DEFF Research Database (Denmark)

    Petersen, Anne Ring

    . In Installation Art: Between Image and Stage, Anne Ring Petersen aims to change that. She begins by exploring how installation art developed into an interdisciplinary genre in the 1960s, and how its intertwining of the visual and the performative has acted as a catalyst for the generation of new artistic......Despite its large and growing popularity – to say nothing of its near-ubiquity in the world’s art scenes and international exhibitions of contemporary art –installation art remains a form whose artistic vocabulary and conceptual basis have rarely been subjected to thorough critical examination...... phenomena. It investigates how it became one of today’s most widely used art forms, increasingly expanding into consumer, popular and urban cultures, where installation’s often spectacular appearance ensures that it meets contemporary demands for sense-provoking and immersive cultural experiences. The main...

  20. Installation Art

    DEFF Research Database (Denmark)

    Petersen, Anne Ring

    Despite its large and growing popularity – to say nothing of its near-ubiquity in the world’s art scenes and international exhibitions of contemporary art –installation art remains a form whose artistic vocabulary and conceptual basis have rarely been subjected to thorough critical examination....... In Installation Art: Between Image and Stage, Anne Ring Petersen aims to change that. She begins by exploring how installation art developed into an interdisciplinary genre in the 1960s, and how its intertwining of the visual and the performative has acted as a catalyst for the generation of new artistic...... phenomena. It investigates how it became one of today’s most widely used art forms, increasingly expanding into consumer, popular and urban cultures, where installation’s often spectacular appearance ensures that it meets contemporary demands for sense-provoking and immersive cultural experiences. The main...

  1. The role of installers for thermo-technical installations when buying gas boilers

    Directory of Open Access Journals (Sweden)

    Jovičić Dragoljub

    2013-01-01

    Full Text Available This study presents the research of role installers for thermo-technical installations when buying gas boilers in the Serbian market. Considering the fact that installers are significantly different, they are grouped by specific, relevant characteristics. The research is focused on the evaluation of marketing mix instruments by nine identified segments of installers. Moreover, research has been explored deeper through conclusion installers about the most important and most credible sources of information on gas boilers. During the research were used secondary and primary data sources. Besides the research at the table, field research has been also done by unstructured personal communication. All collected data were analyzed in details and both hypothesis were tested, where one of them is partially confirmed, and another one fully confirm. Given results can be useful for marketers and their anticipation of demand. Also these results can be used for creating optimal marketing strategy in the Serbian market of gas boilers.

  2. Key Nuclear Verification Priorities: Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  3. Key Nuclear Verification Priorities - Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  4. Design and installation manual for thermal energy storage

    Energy Technology Data Exchange (ETDEWEB)

    Cole, R L; Nield, K J; Rohde, R R; Wolosewicz, R M [eds.

    1979-02-01

    The purpose for this manual is to provide information on the design and installation of thermal energy storage in solar heating systems. It is intended for contractors, installers, solar system designers, engineers, architects, and manufacturers who intend to enter the solar energy business. The reader should have general knowledge of how solar heating systems operate and knowledge of construction methods and building codes. Knowledge of solar analysis methods such as f-chart, SOLCOST, DOE-1, or TRNSYS would be helpful. The information contained in the manual includes sizing storage, choosing a location for the storage device, and insulation requirements. Both air-based and liquid-based systems are covered with topics on designing rock beds, tank types, pump and fan selection, installation, costs, and operation and maintenance. Topics relevant to heating domestic water include safety, single- and dual-tank systems, domestic water heating with air- and liquid-based space heating system, and stand-alone domestic hot water systems. Several appendices present common problems with storage systems and their solutions, heat transfer fluid properties, heat exchanger sizing, and sample specifications for heat exchangers, wooden rock bins, steel tanks, concrete tanks, and fiberglass-reinforced plastic tanks.

  5. On the organisation of program verification competitions

    NARCIS (Netherlands)

    Huisman, Marieke; Klebanov, Vladimir; Monahan, Rosemary; Klebanov, Vladimir; Beckert, Bernhard; Biere, Armin; Sutcliffe, Geoff

    In this paper, we discuss the challenges that have to be addressed when organising program verification competitions. Our focus is on competitions for verification systems where the participants both formalise an informally stated requirement and (typically) provide some guidance for the tool to

  6. Simulation environment based on the Universal Verification Methodology

    International Nuclear Information System (INIS)

    Fiergolski, A.

    2017-01-01

    Universal Verification Methodology (UVM) is a standardized approach of verifying integrated circuit designs, targeting a Coverage-Driven Verification (CDV). It combines automatic test generation, self-checking testbenches, and coverage metrics to indicate progress in the design verification. The flow of the CDV differs from the traditional directed-testing approach. With the CDV, a testbench developer, by setting the verification goals, starts with an structured plan. Those goals are targeted further by a developed testbench, which generates legal stimuli and sends them to a device under test (DUT). The progress is measured by coverage monitors added to the simulation environment. In this way, the non-exercised functionality can be identified. Moreover, the additional scoreboards indicate undesired DUT behaviour. Such verification environments were developed for three recent ASIC and FPGA projects which have successfully implemented the new work-flow: (1) the CLICpix2 65 nm CMOS hybrid pixel readout ASIC design; (2) the C3PD 180 nm HV-CMOS active sensor ASIC design; (3) the FPGA-based DAQ system of the CLICpix chip. This paper, based on the experience from the above projects, introduces briefly UVM and presents a set of tips and advices applicable at different stages of the verification process-cycle.

  7. Automated installation methods for photovoltaic arrays

    Science.gov (United States)

    Briggs, R.; Daniels, A.; Greenaway, R.; Oster, J., Jr.; Racki, D.; Stoeltzing, R.

    1982-11-01

    Since installation expenses constitute a substantial portion of the cost of a large photovoltaic power system, methods for reduction of these costs were investigated. The installation of the photovoltaic arrays includes all areas, starting with site preparation (i.e., trenching, wiring, drainage, foundation installation, lightning protection, grounding and installation of the panel) and concluding with the termination of the bus at the power conditioner building. To identify the optimum combination of standard installation procedures and automated/mechanized techniques, the installation process was investigated including the equipment and hardware available, the photovoltaic array structure systems and interfaces, and the array field and site characteristics. Preliminary designs of hardware for both the standard installation method, the automated/mechanized method, and a mix of standard installation procedures and mechanized procedures were identified to determine which process effectively reduced installation costs. In addition, costs associated with each type of installation method and with the design, development and fabrication of new installation hardware were generated.

  8. SITE-94. User Guide for Crystal version 2.1

    International Nuclear Information System (INIS)

    Worgan, K.

    1995-12-01

    The CRYSTAL program is described in report SKI-R--95-55, and this report describes how to install and run the code on a UNIX computer, preparation of data input files and format of output result files. Examples are given for a selection of verification problems. 1 ref

  9. IMRT plan verification in radiotherapy

    International Nuclear Information System (INIS)

    Vlk, P.

    2006-01-01

    This article describes the procedure for verification of IMRT (Intensity modulated radiation therapy) plan, which is used in the Oncological Institute of St. Elisabeth in Bratislava. It contains basic description of IMRT technology and developing a deployment plan for IMRT planning system CORVUS 6.0, the device Mimic (Multilammelar intensity modulated collimator) and the overall process of verifying the schedule created. The aim of verification is particularly good control of the functions of MIMIC and evaluate the overall reliability of IMRT planning. (author)

  10. Automatic Verification of Timing Constraints for Safety Critical Space Systems

    Science.gov (United States)

    Fernandez, Javier; Parra, Pablo; Sanchez Prieto, Sebastian; Polo, Oscar; Bernat, Guillem

    2015-09-01

    In this paper is presented an automatic process of verification. We focus in the verification of scheduling analysis parameter. This proposal is part of process based on Model Driven Engineering to automate a Verification and Validation process of the software on board of satellites. This process is implemented in a software control unit of the energy particle detector which is payload of Solar Orbiter mission. From the design model is generated a scheduling analysis model and its verification model. The verification as defined as constraints in way of Finite Timed Automatas. When the system is deployed on target the verification evidence is extracted as instrumented points. The constraints are fed with the evidence, if any of the constraints is not satisfied for the on target evidence the scheduling analysis is not valid.

  11. Calibration on Pegase of a selective D.R.G. installation for short life and long life fission gas

    International Nuclear Information System (INIS)

    Vasnier, F.

    1968-01-01

    Pegase irradiation loops are equipped with a detection installation which measures the global activity of short-life and long-life fission gases which are released in CO 2 , but the reduced size of circuits in the loop results in an accumulation of long life fission gases, and therefore in problems in the interpretation of measured signals. Thus, the authors propose an additional detection installation which allows long-life fission gases to be separately measured. The principle is to ensure a partial decay of the sampled gas by imposing an additional transit time in order to get rid of short-life fission gases which have a radioactive period of some tenths of a second. A second detector is then used to measure the residual activity of long-life fission gases. The author describes the installation (the normal circuit and the modified circuit), reports the performed tests and the calibration, presents and discusses the obtained results and the installation sensitivity (for short-life and long-life fission gases), and reports their application to the relationship between DRG (sheath failure detection) signals obtained on Pegase and on EDF and EL4 reactors

  12. Content-based Image Hiding Method for Secure Network Biometric Verification

    Directory of Open Access Journals (Sweden)

    Xiangjiu Che

    2011-08-01

    Full Text Available For secure biometric verification, most existing methods embed biometric information directly into the cover image, but content correlation analysis between the biometric image and the cover image is often ignored. In this paper, we propose a novel biometric image hiding approach based on the content correlation analysis to protect the network-based transmitted image. By using principal component analysis (PCA, the content correlation between the biometric image and the cover image is firstly analyzed. Then based on particle swarm optimization (PSO algorithm, some regions of the cover image are selected to represent the biometric image, in which the cover image can carry partial content of the biometric image. As a result of the correlation analysis, the unrepresented part of the biometric image is embedded into the cover image by using the discrete wavelet transform (DWT. Combined with human visual system (HVS model, this approach makes the hiding result perceptually invisible. The extensive experimental results demonstrate that the proposed hiding approach is robust against some common frequency and geometric attacks; it also provides an effective protection for the secure biometric verification.

  13. Design, installation and operating experience of 20 photovoltaic medical refrigerator systems on four continents

    Science.gov (United States)

    Hein, G. F.

    1982-01-01

    The NASA Lewis Research Center in cooperation with the World Health Organization, U.S.A. I.D., the Pan American Health Organization and national government agencies in some developing countries sponsored the installation of twenty photovoltaic powered medical vaccine storage refrigerator-freezer (R/F) systems. The Solar Power Corporation was selected as the contractor to perform the design, development and installation of these twenty units. Solar Power's experiences are described herein.

  14. The installation welding of pressure water reactor coolant piping

    International Nuclear Information System (INIS)

    Deng Feng

    2010-01-01

    Large pressure water reactor nuclear power plants are constructing in our country. There are three symmetry standard loops in reactor coolant system. Each loop possesses a steam generator and a primary poop, in which one of the loops is equipped with a pressurizer. These components are connected with reactor pressure vessel by installation welding of the coolant piping. The integrity of reactor coolant pressure boundary is the second barrier to protect the radioactive substance from release to outside, so the safe operation of nuclear power plant is closely related to the quality of coolant piping installation welding. The heavy tube with super low carbon content austenitic stainless steel is selected for coolant piping. This kind of material has good welding behavior, but the poor thermal conductivity, the big liner expansion coefficient and the big welding deformation will cause bigger welding stress. To reduce the welding deformation, to control the dimension precision, to reduce the residual stress and to ensure the welding quality the installation sequence should be properly designed and the welding technology should be properly controlled. (authors)

  15. A framework for nuclear agreement and verification

    International Nuclear Information System (INIS)

    Ali, A.

    1991-01-01

    This chapter assesses the prospects for a nuclear agreement between India and Pakistan. The chapter opens with a review of past and present political environments of the two countries. The discussion proceeds to describe the linkage of global arms control agreements, prospects for verification of a Comprehensive Test Ban Treaty, the role of nuclear power in any agreements, the intrusiveness of verification, and possible post-proliferation agreements. Various monitoring and verification technologies are described (mainly satellite oriented). The chapter concludes with an analysis of the likelihood of persuading India and Pakistan to agree to a nonproliferation arrangement

  16. Status on development and verification of reactivity initiated accident analysis code for PWR (NODAL3)

    International Nuclear Information System (INIS)

    Peng Hong Liem; Surian Pinem; Tagor Malem Sembiring; Tran Hoai Nam

    2015-01-01

    A coupled neutronics thermal-hydraulics code NODAL3 has been developed based on the nodal few-group neutron diffusion theory in 3-dimensional Cartesian geometry for a typical pressurized water reactor (PWR) static and transient analyses, especially for reactivity initiated accidents (RIA). The spatial variables are treated by using a polynomial nodal method (PNM) while for the neutron dynamic solver the adiabatic and improved quasi-static methods are adopted. A simple single channel thermal-hydraulics module and its steam table is implemented into the code. Verification works on static and transient benchmarks are being conducting to assess the accuracy of the code. For the static benchmark verification, the IAEA-2D, IAEA-3D, BIBLIS and KOEBERG light water reactor (LWR) benchmark problems were selected, while for the transient benchmark verification, the OECD NEACRP 3-D LWR Core Transient Benchmark and NEA-NSC 3-D/1-D PWR Core Transient Benchmark (Uncontrolled Withdrawal of Control Rods at Zero Power). Excellent agreement of the NODAL3 results with the reference solutions and other validated nodal codes was confirmed. (author)

  17. Verification of Many-Qubit States

    Directory of Open Access Journals (Sweden)

    Yuki Takeuchi

    2018-06-01

    Full Text Available Verification is a task to check whether a given quantum state is close to an ideal state or not. In this paper, we show that a variety of many-qubit quantum states can be verified with only sequential single-qubit measurements of Pauli operators. First, we introduce a protocol for verifying ground states of Hamiltonians. We next explain how to verify quantum states generated by a certain class of quantum circuits. We finally propose an adaptive test of stabilizers that enables the verification of all polynomial-time-generated hypergraph states, which include output states of the Bremner-Montanaro-Shepherd-type instantaneous quantum polynomial time (IQP circuits. Importantly, we do not make any assumption that the identically and independently distributed copies of the same states are given: Our protocols work even if some highly complicated entanglement is created among copies in any artificial way. As applications, we consider the verification of the quantum computational supremacy demonstration with IQP models, and verifiable blind quantum computing.

  18. Formal Verification -26 ...

    Indian Academy of Sciences (India)

    by testing of the components and successful testing leads to the software being ... Formal verification is based on formal methods which are mathematically based ..... scenario under which a similar error could occur. There are various other ...

  19. Border installations

    International Nuclear Information System (INIS)

    Lenaerts, Koen

    1988-01-01

    Border installations cover all nuclear plants located near the border with a neighbouring state. However, the actual distance depends on the context. The distance can vary considerably. Also the prohibition on siting near a heavily populated area also defines the actual distance variably. The distance criteria may be modified by other factors of topography, prevailing climate and so on. Various examples which illustrate the problems are given. For example, the Creys-Melville nuclear power plant is 80km from Geneva and the Cattonam installation is 12km from the French border with Luxembourg and Germany. The Cattenom case is explained and the legal position within the European Institutions is discussed. The French licensing procedures for nuclear power stations are described with special reference to the Cattenom power plant. Border installations are discussed in the context of European Community Law and Public International Law. (U.K.)

  20. Verification of wet blasting decontamination technology

    International Nuclear Information System (INIS)

    Matsubara, Sachito; Murayama, Kazunari; Yoshida, Hirohisa; Igei, Shigemitsu; Izumida, Tatsuo

    2013-01-01

    Macoho Co., Ltd. participated in the projects of 'Decontamination Verification Test FY 2011 by the Ministry of the Environment' and 'Decontamination Verification Test FY 2011 by the Cabinet Office.' And we tested verification to use a wet blasting technology for decontamination of rubble and roads contaminated by the accident of Fukushima Daiichi Nuclear Power Plant of the Tokyo Electric Power Company. As a results of the verification test, the wet blasting decontamination technology showed that a decontamination rate became 60-80% for concrete paving, interlocking, dense-grated asphalt pavement when applied to the decontamination of the road. When it was applied to rubble decontamination, a decontamination rate was 50-60% for gravel and approximately 90% for concrete and wood. It was thought that Cs-134 and Cs-137 attached to the fine sludge scraped off from a decontamination object and the sludge was found to be separated from abrasives by wet cyclene classification: the activity concentration of the abrasives is 1/30 or less than the sludge. The result shows that the abrasives can be reused without problems when the wet blasting decontamination technology is used. (author)

  1. Evaluation of Trenchless Installation Technology for Radioactive Wastewater Piping Applications

    International Nuclear Information System (INIS)

    Robinson, Sharon M.; Jubin, Robert Thomas; Patton, Bradley D.; Sullivan, Nicholas M.; Bugbee, Kathy P.

    2009-01-01

    The U.S. Department of Energy (DOE) Office of Environmental Management (EM) cleanup mission at Oak Ridge National Laboratory (ORNL) includes dispositioning facilities, contaminated legacy materials/waste, and contamination sources and remediation of soil under facilities, groundwater, and surface water to support final Records of Decision (RODs). The Integrated Facilities Disposition Project (IFDP) is a roughly $15B project for completion of the EM mission at Oak Ridge, with a project duration of up to 35 years. The IFDP Mission Need Statement - Critical Decision-0 (CD-0) - was approved by DOE in July 2007, and the IFDP Alternative Selection and Cost Range - Critical Decision-1 (CD-1) - was approved in November 2008. The IFDP scope includes reconfiguration of waste collection and treatment systems as needed to complete the IFDP remediation and decontamination and decommissioning (D and D) missions in a safe and cost-effective manner while maintaining compliance with all governing regulations and bodies and preserving the support of continuing operations at ORNL. A step in the CD-1 approval process included an external technical review (ETR) of technical approaches proposed in the CD-1 document related to the facility reconfiguration for the ORNL radioactive waste and liquid low-level waste management systems. The ETR team recommended that the IFDP team consider the use of trenchless technologies for installing pipelines underground in and around contaminated sites as part of the alternatives evaluations required in support of the CD-2 process. The team specifically recommended evaluating trenchless technologies for installing new pipes in existing underground pipelines as an alternative to conventional open trench installation methods. Potential benefits could include reduction in project costs, less costly underground piping, fewer disruptions of ongoing and surface activities, and lower risk for workers. While trenchless technologies have been used extensively in

  2. Engineering drawing field verification program. Revision 3

    International Nuclear Information System (INIS)

    Ulk, P.F.

    1994-01-01

    Safe, efficient operation of waste tank farm facilities is dependent in part upon the availability of accurate, up-to-date plant drawings. Accurate plant drawings are also required in support of facility upgrades and future engineering remediation projects. This supporting document establishes the procedure for performing a visual field verification of engineering drawings, the degree of visual observation being performed and documenting the results. A copy of the drawing attesting to the degree of visual observation will be paginated into the released Engineering Change Notice (ECN) documenting the field verification for future retrieval and reference. All waste tank farm essential and support drawings within the scope of this program will be converted from manual to computer aided drafting (CAD) drawings. A permanent reference to the field verification status will be placed along the right border of the CAD-converted drawing, referencing the revision level, at which the visual verification was performed and documented

  3. Verification of Open Interactive Markov Chains

    OpenAIRE

    Brazdil, Tomas; Hermanns, Holger; Krcal, Jan; Kretinsky, Jan; Rehak, Vojtech

    2012-01-01

    Interactive Markov chains (IMC) are compositional behavioral models extending both labeled transition systems and continuous-time Markov chains. IMC pair modeling convenience - owed to compositionality properties - with effective verification algorithms and tools - owed to Markov properties. Thus far however, IMC verification did not consider compositionality properties, but considered closed systems. This paper discusses the evaluation of IMC in an open and thus compositional interpretation....

  4. Earth Science Enterprise Scientific Data Purchase Project: Verification and Validation

    Science.gov (United States)

    Jenner, Jeff; Policelli, Fritz; Fletcher, Rosea; Holecamp, Kara; Owen, Carolyn; Nicholson, Lamar; Dartez, Deanna

    2000-01-01

    This paper presents viewgraphs on the Earth Science Enterprise Scientific Data Purchase Project's verification,and validation process. The topics include: 1) What is Verification and Validation? 2) Why Verification and Validation? 3) Background; 4) ESE Data Purchas Validation Process; 5) Data Validation System and Ingest Queue; 6) Shipment Verification; 7) Tracking and Metrics; 8) Validation of Contract Specifications; 9) Earth Watch Data Validation; 10) Validation of Vertical Accuracy; and 11) Results of Vertical Accuracy Assessment.

  5. SAFETY ALERT - Failure of brass non-return valves in gas point installations

    CERN Multimedia

    HSE Unit

    2016-01-01

    There have been three recent failures in brass non-return valves in separate high pressure gas point installations across CERN. Whilst each was in a different gas service, the visual nature of the failure has been similar.   In all three cases, these components were connected to stainless steel flexible connections and stainless steel pipework. From the metallurgical investigation of the failed component, it appears that the failure is linked to uncontrolled tightening, leading to a localised weakening resulting in premature failure when subjected to pressure. Lead levels in the examined components appear to be a contributing factor to the reduction in ductility but are not identified as the root cause. It has also not been possible to attribute failure to a particular batch of material. The Occupational Health & Safety and Environmental Protection Unit prescribes the following actions to be taken, aligned with the CERN Safety Rules: Verification of all brass non-return valves (prioritising...

  6. Reinforcing of QA/QC programs in radiotherapy departments in Croatia: Results of treatment planning system verification

    Energy Technology Data Exchange (ETDEWEB)

    Jurković, Slaven; Švabić, Manda; Diklić, Ana; Smilović Radojčić, Đeni; Dundara, Dea [Clinic for Radiotherapy and Oncology, Physics Division, University Hospital Rijeka, Rijeka (Croatia); Kasabašić, Mladen; Ivković, Ana [Department for Radiotherapy and Oncology, University Hospital Osijek, Osijek (Croatia); Faj, Dario, E-mail: dariofaj@mefos.hr [Department of Physics, School of Medicine, University of Osijek, Osijek (Croatia)

    2013-04-01

    Implementation of advanced techniques in clinical practice can greatly improve the outcome of radiation therapy, but it also makes the process much more complex with a lot of room for errors. An important part of the quality assurance program is verification of treatment planning system (TPS). Dosimetric verifications in anthropomorphic phantom were performed in 4 centers where new systems were installed. A total of 14 tests for 2 photon energies and multigrid superposition algorithms were conducted using the CMS XiO TPS. Evaluation criteria as specified in the International Atomic Energy Agency Technical Reports Series (IAEA TRS) 430 were employed. Results of measurements are grouped according to the placement of the measuring point and the beam energy. The majority of differences between calculated and measured doses in the water-equivalent part of the phantom were in tolerance. Significantly more out-of-tolerance values were observed in “nonwater-equivalent” parts of the phantom, especially for higher-energy photon beams. This survey was done as a part of continuous effort to build up awareness of quality assurance/quality control (QA/QC) importance in the Croatian radiotherapy community. Understanding the limitations of different parts of the various systems used in radiation therapy can systematically improve quality as well.

  7. Design verification for large reprocessing plants (Proposed procedures)

    International Nuclear Information System (INIS)

    Rolandi, G.

    1988-07-01

    In the 1990s, four large commercial reprocessing plants will progressively come into operation: If an effective and efficient safeguards system is to be applied to these large and complex plants, several important factors have to be considered. One of these factors, addressed in the present report, concerns plant design verification. Design verification provides an overall assurance on plant measurement data. To this end design verification, although limited to the safeguards aspects of the plant, must be a systematic activity, which starts during the design phase, continues during the construction phase and is particularly performed during the various steps of the plant's commissioning phase. The detailed procedures for design information verification on commercial reprocessing plants must be defined within the frame of the general provisions set forth in INFCIRC/153 for any type of safeguards related activities and specifically for design verification. The present report is intended as a preliminary contribution on a purely technical level, and focusses on the problems within the Agency. For the purpose of the present study the most complex case was assumed: i.e. a safeguards system based on conventional materials accountancy, accompanied both by special input and output verification and by some form of near-real-time accountancy involving in-process inventory taking, based on authenticated operator's measurement data. C/S measures are also foreseen, where necessary to supplement the accountancy data. A complete ''design verification'' strategy comprehends: informing the Agency of any changes in the plant system which are defined as ''safeguards relevant''; ''reverifying by the Agency upon receiving notice from the Operator on any changes, on ''design information''. 13 refs

  8. Material integrity verification radar

    International Nuclear Information System (INIS)

    Koppenjan, S.K.

    1999-01-01

    The International Atomic Energy Agency (IAEA) has the need for verification of 'as-built' spent fuel-dry storage containers and other concrete structures. The IAEA has tasked the Special Technologies Laboratory (STL) to fabricate, test, and deploy a stepped-frequency Material Integrity Verification Radar (MIVR) system to nondestructively verify the internal construction of these containers. The MIVR system is based on previously deployed high-frequency, ground penetrating radar (GPR) systems that have been developed by STL for the U.S. Department of Energy (DOE). Whereas GPR technology utilizes microwave radio frequency energy to create subsurface images, MTVR is a variation for which the medium is concrete instead of soil. The purpose is to nondestructively verify the placement of concrete-reinforcing materials, pipes, inner liners, and other attributes of the internal construction. The MIVR system underwent an initial field test on CANDU reactor spent fuel storage canisters at Atomic Energy of Canada Limited (AECL), Chalk River Laboratories, Ontario, Canada, in October 1995. A second field test at the Embalse Nuclear Power Plant in Embalse, Argentina, was completed in May 1996. The DOE GPR also was demonstrated at the site. Data collection and analysis were performed for the Argentine National Board of Nuclear Regulation (ENREN). IAEA and the Brazilian-Argentine Agency for the Control and Accounting of Nuclear Material (ABACC) personnel were present as observers during the test. Reinforcing materials were evident in the color, two-dimensional images produced by the MIVR system. A continuous pattern of reinforcing bars was evident and accurate estimates on the spacing, depth, and size were made. The potential uses for safeguard applications were jointly discussed. The MIVR system, as successfully demonstrated in the two field tests, can be used as a design verification tool for IAEA safeguards. A deployment of MIVR for Design Information Questionnaire (DIQ

  9. Installation for producing sealed radioactive sources; Installation de fabrication de sources radioactives scellees

    Energy Technology Data Exchange (ETDEWEB)

    Fradin, J; Hayoun, C [Commissariat a l' Energie Atomique, 91 - Saclay (France). Centre d' Etudes Nucleaires

    1969-07-01

    This installation has been designed and built for producing sealed sources of fission elements: caesium 137, strontium 90, promethium 147, ruthenium 106 and cerium 144 in particular. The installation consists of sealed and protected cells, each being assigned to a particular production. The safety and the operational reliability of the equipment are the principal considerations which have governed this work. The report describes the installation and, in particular, the apparatus used as well as the various control devices. In conclusion, a review as presented of six years operation. (authors) [French] Cette installation a ete concue et realisee pour effectuer des fabrications de sources scellees d'elements de fission: caesium 137 - strontium 90 - promethium 147 - ruthenium 106 - cerium 144 en particulier. L'installation est composee de cellules etanches et protegees, chacune d'elles etant affectee a une fabrication particuliere. La securite et la surete de fonctionnement de l'ensemble sont parmi les elements principaux qui ont guide l'etude. Le rapport decrit l'installation et plus particulierement l'appareillage utilise ainsi que les divers controles et commandes. Le bilan de fonctionnement apres 6 ans d'exploitation sert de conclusion. (auteurs)

  10. Installation for producing sealed radioactive sources; Installation de fabrication de sources radioactives scellees

    Energy Technology Data Exchange (ETDEWEB)

    Fradin, J.; Hayoun, C. [Commissariat a l' Energie Atomique, 91 - Saclay (France). Centre d' Etudes Nucleaires

    1969-07-01

    This installation has been designed and built for producing sealed sources of fission elements: caesium 137, strontium 90, promethium 147, ruthenium 106 and cerium 144 in particular. The installation consists of sealed and protected cells, each being assigned to a particular production. The safety and the operational reliability of the equipment are the principal considerations which have governed this work. The report describes the installation and, in particular, the apparatus used as well as the various control devices. In conclusion, a review as presented of six years operation. (authors) [French] Cette installation a ete concue et realisee pour effectuer des fabrications de sources scellees d'elements de fission: caesium 137 - strontium 90 - promethium 147 - ruthenium 106 - cerium 144 en particulier. L'installation est composee de cellules etanches et protegees, chacune d'elles etant affectee a une fabrication particuliere. La securite et la surete de fonctionnement de l'ensemble sont parmi les elements principaux qui ont guide l'etude. Le rapport decrit l'installation et plus particulierement l'appareillage utilise ainsi que les divers controles et commandes. Le bilan de fonctionnement apres 6 ans d'exploitation sert de conclusion. (auteurs)

  11. Specification and Automated Verification of Real-Time Behaviour

    DEFF Research Database (Denmark)

    Kristensen, C.H.; Andersen, J.H.; Skou, A.

    1995-01-01

    In this paper we sketch a method for specification and automatic verification of real-time software properties.......In this paper we sketch a method for specification and automatic verification of real-time software properties....

  12. Specification and Automated Verification of Real-Time Behaviour

    DEFF Research Database (Denmark)

    Andersen, J.H.; Kristensen, C.H.; Skou, A.

    1996-01-01

    In this paper we sketch a method for specification and automatic verification of real-time software properties.......In this paper we sketch a method for specification and automatic verification of real-time software properties....

  13. Chapter 4. Assessment and inspection of nuclear installations

    International Nuclear Information System (INIS)

    2001-01-01

    inspections: (1) Routine inspections performed mainly by site inspectors. They look whether the nuclear safety conditions and requirements are met. They also examine technical condition of nuclear equipment, performing surveillance testing of nuclear safety related equipment, observation of fulfilment of approved limits and conditions, selected operating procedures and programmes of quality assurance during construction and commissioning, operation and maintenance as well as in decommissioning nuclear installations. (2) Special inspections are focused on specific profession areas (such as fire safety, qualification and training of NPP personnel, etc.), especially on inspection of meeting specific requirements of nuclear safety. Team inspections are aimed at complex inspection of relevant nuclear equipment safety and they usually are being conducted simultaneously in several professional areas. The inspection of readiness of the nuclear installation for individual phases of commissioning is a typical example of a team inspection. This is the inspection of fulfilment of conditions imposed by UJD to the licensee to operate the nuclear power plant for issuing an approval to start up the unit after refuelling. Team inspections during operation are normally oriented to the areas, which are set based on long-term evaluation of results of nuclear installation's operator. (3) Extraordinary inspections are unplanned, evoked by unexpected operational events on nuclear installations, or the regulator responds by them to the situation in the organisation under supervision. In compliance with the 'Atomic Act' UJD performs inspections also during construction, reconstruction, repair and maintenance of nuclear installations in a form of participation of UJD inspectors at tests of selected equipment after its assembly is completed. The inspection activity of UJD has been performed by nuclear safety inspectors, the most of them having long-term experience in the relevant area. Inspectors

  14. Formal Verification of Continuous Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer

    2012-01-01

    and the verification procedures should be algorithmically synthesizable. Autonomous control plays an important role in many safety-critical systems. This implies that a malfunction in the control system can have catastrophic consequences, e.g., in space applications where a design flaw can result in large economic...... losses. Furthermore, a malfunction in the control system of a surgical robot may cause death of patients. The previous examples involve complex systems that are required to operate according to complex specifications. The systems cannot be formally verified by modern verification techniques, due...

  15. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  16. Runtime Verification Through Forward Chaining

    Directory of Open Access Journals (Sweden)

    Alan Perotti

    2014-12-01

    Full Text Available In this paper we present a novel rule-based approach for Runtime Verification of FLTL properties over finite but expanding traces. Our system exploits Horn clauses in implication form and relies on a forward chaining-based monitoring algorithm. This approach avoids the branching structure and exponential complexity typical of tableaux-based formulations, creating monitors with a single state and a fixed number of rules. This allows for a fast and scalable tool for Runtime Verification: we present the technical details together with a working implementation.

  17. Current status of verification practices in clinical biochemistry in Spain.

    Science.gov (United States)

    Gómez-Rioja, Rubén; Alvarez, Virtudes; Ventura, Montserrat; Alsina, M Jesús; Barba, Núria; Cortés, Mariano; Llopis, María Antonia; Martínez, Cecilia; Ibarz, Mercè

    2013-09-01

    Verification uses logical algorithms to detect potential errors before laboratory results are released to the clinician. Even though verification is one of the main processes in all laboratories, there is a lack of standardization mainly in the algorithms used and the criteria and verification limits applied. A survey in clinical laboratories in Spain was conducted in order to assess the verification process, particularly the use of autoverification. Questionnaires were sent to the laboratories involved in the External Quality Assurance Program organized by the Spanish Society of Clinical Biochemistry and Molecular Pathology. Seven common biochemical parameters were included (glucose, cholesterol, triglycerides, creatinine, potassium, calcium, and alanine aminotransferase). Completed questionnaires were received from 85 laboratories. Nearly all the laboratories reported using the following seven verification criteria: internal quality control, instrument warnings, sample deterioration, reference limits, clinical data, concordance between parameters, and verification of results. The use of all verification criteria varied according to the type of verification (automatic, technical, or medical). Verification limits for these parameters are similar to biological reference ranges. Delta Check was used in 24% of laboratories. Most laboratories (64%) reported using autoverification systems. Autoverification use was related to laboratory size, ownership, and type of laboratory information system, but amount of use (percentage of test autoverified) was not related to laboratory size. A total of 36% of Spanish laboratories do not use autoverification, despite the general implementation of laboratory information systems, most of them, with autoverification ability. Criteria and rules for seven routine biochemical tests were obtained.

  18. Sizewell 'B' cable installation

    International Nuclear Information System (INIS)

    Gemmell, D.R.

    1992-01-01

    N G Bailey and Co. Ltd., UK were awarded the contract for the procurement, manufacture, works testing, works finishing, supply, delivery, off-loading, storage, installation, site finishing, preservation, setting to work and site testing of the following; the main cable installation throughout the Station including the addition of the Radioactive Waste Building, earthing and lightning protection installation, cable supporting steelwork and carriers and glanding and termination of cables. The cabling installation comprises power distribution, control and instrumentation cabling including all the associated cabling accessories, terminal boxes and similar components. The way that the contract was set-up, awarded and is now being carried out is described. Planning and industrial relations have been key features of the contract. (Author)

  19. The study of the installation of spent fuel interim storage facility from safety aspect point of view

    International Nuclear Information System (INIS)

    Djunaidi, Prayogo S.

    1999-01-01

    The installation of the ISFSF of the RSG-GAS has been come a cureneed, since the RSG-GAS has been operating for more than 10 years. The spent fuel stored in the reactor storage pool in creasing from time to time and therefore a long time storage is needed until the decommissioning of the reactor. The safety aspect related to the installation of the ISFSF has been studied, but the most important aspect are prevention of criticality of the spen fuel in the storage. The radiation dose must be less than that has been recommended by ICRP and the release of the radioactive material must be avoided . In this paper one of the safety aspects i.e. the radiological aspect is described, while the other aspects are referenced to safety analysis report of the facility. From the calculation it can be seen that in accident condition the total radiation dose received by the handling operator is 1.06 mSv and 1.6 mSv resulted from Kr-85 and 1-131. This is lower than the limitation recommended by the ICRP No. 60.1990. Verification for other safety aspect of the facility in still needed

  20. Complementary technologies for verification of excess plutonium

    International Nuclear Information System (INIS)

    Langner, D.G.; Nicholas, N.J.; Ensslin, N.; Fearey, B.L.; Mitchell, D.J.; Marlow, K.W.; Luke, S.J.; Gosnell, T.B.

    1998-01-01

    Three complementary measurement technologies have been identified as candidates for use in the verification of excess plutonium of weapons origin. These technologies: high-resolution gamma-ray spectroscopy, neutron multiplicity counting, and low-resolution gamma-ray spectroscopy, are mature, robust technologies. The high-resolution gamma-ray system, Pu-600, uses the 630--670 keV region of the emitted gamma-ray spectrum to determine the ratio of 240 Pu to 239 Pu. It is useful in verifying the presence of plutonium and the presence of weapons-grade plutonium. Neutron multiplicity counting is well suited for verifying that the plutonium is of a safeguardable quantity and is weapons-quality material, as opposed to residue or waste. In addition, multiplicity counting can independently verify the presence of plutonium by virtue of a measured neutron self-multiplication and can detect the presence of non-plutonium neutron sources. The low-resolution gamma-ray spectroscopic technique is a template method that can provide continuity of knowledge that an item that enters the a verification regime remains under the regime. In the initial verification of an item, multiple regions of the measured low-resolution spectrum form a unique, gamma-radiation-based template for the item that can be used for comparison in subsequent verifications. In this paper the authors discuss these technologies as they relate to the different attributes that could be used in a verification regime

  1. An independent verification and validation of the Future Theater Level Model conceptual model

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, D.S. III; Kruse, K.L.; Martellaro, A.J.; Packard, S.L.; Thomas, B. Jr.; Turley, V.K.

    1994-08-01

    This report describes the methodology and results of independent verification and validation performed on a combat model in its design stage. The combat model is the Future Theater Level Model (FTLM), under development by The Joint Staff/J-8. J-8 has undertaken its development to provide an analysis tool that addresses the uncertainties of combat more directly than previous models and yields more rapid study results. The methodology adopted for this verification and validation consisted of document analyses. Included were detailed examination of the FTLM design documents (at all stages of development), the FTLM Mission Needs Statement, and selected documentation for other theater level combat models. These documents were compared to assess the FTLM as to its design stage, its purpose as an analytical combat model, and its capabilities as specified in the Mission Needs Statement. The conceptual design passed those tests. The recommendations included specific modifications as well as a recommendation for continued development. The methodology is significant because independent verification and validation have not been previously reported as being performed on a combat model in its design stage. The results are significant because The Joint Staff/J-8 will be using the recommendations from this study in determining whether to proceed with develop of the model.

  2. Remedial activities effectiveness verification in tailing areas

    International Nuclear Information System (INIS)

    Kluson, J.; Thinova, L.; Svoboda, T.; Neznal, M.

    2015-01-01

    The complex radiological study of the basin of sludge from the uranium ore mining and preprocessing was done. Air kerma rates (including its spectral analysis) at the reference height of 1 m above ground over the whole area were measured and radiation fields mapped during two measuring campaigns (years 2009 and 2014). K, U and Th concentrations in sludge and concentrations in depth profiles (including radon concentration and radon exhalation rates) in selected points were determined using gamma spectrometry for in situ as well as laboratory samples measurement. Results were used for the analysis, design evaluation and verification of the efficiency of the remediation measures. Efficiency of the sludge basin covering by the inert material was modelled using MicroShield code. (authors)

  3. A Synthesized Framework for Formal Verification of Computing Systems

    Directory of Open Access Journals (Sweden)

    Nikola Bogunovic

    2003-12-01

    Full Text Available Design process of computing systems gradually evolved to a level that encompasses formal verification techniques. However, the integration of formal verification techniques into a methodical design procedure has many inherent miscomprehensions and problems. The paper explicates the discrepancy between the real system implementation and the abstracted model that is actually used in the formal verification procedure. Particular attention is paid to the seamless integration of all phases of the verification procedure that encompasses definition of the specification language and denotation and execution of conformance relation between the abstracted model and its intended behavior. The concealed obstacles are exposed, computationally expensive steps identified and possible improvements proposed.

  4. Independent verification in operations at nuclear power plants

    International Nuclear Information System (INIS)

    Donderi, D.C.; Smiley, A.; Ostry, D.J.; Moray, N.P.

    1995-09-01

    A critical review of approaches to independent verification in operations used in nuclear power plant quality assurance programs in other countries, was conducted for this study. This report identifies the uses of independent verification and provides an assessment of the effectiveness of the various approaches. The findings indicate that at Canadian nuclear power plants as much, if not more, independent verification is performed than at power plants in the other countries included in the study. Additional requirements in this area are not proposed for Canadian stations. (author)

  5. Using GIS data and satellite derived irradiance to optimize siting of PV installations in Switzerland

    Science.gov (United States)

    Kahl, Annelen; Nguyen, Viet-Anh; Bartlett, Stuart; Sossan, Fabrizio; Lehning, Michael

    2016-04-01

    For a successful distribution strategy of PV installations, it does not suffice to choose the locations with highest annual total irradiance. Attention needs to be given to spatial correlation patterns of insolation to avoid large system-wide variations, which can cause extended deficits in supply or might even damage the electrical network. One alternative goal instead is to seek configurations that provide the smoothest energy production, with the most reliable and predictable supply. Our work investigates several scenarios, each pursuing a different strategy for a future renewable Switzerland without nuclear power. Based on an estimate for necessary installed capacity for solar power [Bartlett, 2015] we first use heuristics to pre-select realistic placements for PV installations. Then we apply optimization methods to find a subset of locations that provides the best possible combined electricity production. For the first part of the selection process, we use a DEM to exclude high elevation zones which would be difficult to access and which are prone to natural hazards. Then we use land surface cover information to find all zones with potential roof area, deemed suitable for installation of solar panels. The optimization employs Principal Component Analysis of satellite derived irradiance data (Surface Incoming Shortwave Radiation (SIS), based on Meteosat Second Generation sensors) to incorporate a spatial aspect into the selection process that does not simply maximize annual total production but rather provides the most robust supply, by combining regions with anti-correlated cloud cover patterns. Depending on the initial assumptions and constraints, the resulting distribution schemes for PV installations vary with respect to required surface area, annual total and lowest short-term production, and illustrate how important it is to clearly define priorities and policies for a future renewable Switzerland.

  6. Small wind planning and building successful installations

    CERN Document Server

    Clark, Nolan

    2013-01-01

    This book provides a cohesive guide to achieving successful small wind installations. It is a comprehensive information resource from one of the world's most experienced small wind professionals, covering all the key issues for small wind system development, from site and machine selection to international standards compliance. Engineers who are tasked with planning and developing these small wind systems, from choosing the best site and accurately estimating likely power output to obtaining proper permitting and troubleshooting operational inefficiencies, will find this book an ess

  7. Verification in Referral-Based Crowdsourcing

    Science.gov (United States)

    Naroditskiy, Victor; Rahwan, Iyad; Cebrian, Manuel; Jennings, Nicholas R.

    2012-01-01

    Online social networks offer unprecedented potential for rallying a large number of people to accomplish a given task. Here we focus on information gathering tasks where rare information is sought through “referral-based crowdsourcing”: the information request is propagated recursively through invitations among members of a social network. Whereas previous work analyzed incentives for the referral process in a setting with only correct reports, misreporting is known to be both pervasive in crowdsourcing applications, and difficult/costly to filter out. A motivating example for our work is the DARPA Red Balloon Challenge where the level of misreporting was very high. In order to undertake a formal study of verification, we introduce a model where agents can exert costly effort to perform verification and false reports can be penalized. This is the first model of verification and it provides many directions for future research, which we point out. Our main theoretical result is the compensation scheme that minimizes the cost of retrieving the correct answer. Notably, this optimal compensation scheme coincides with the winning strategy of the Red Balloon Challenge. PMID:23071530

  8. Nuclear Data Verification and Standardization

    Energy Technology Data Exchange (ETDEWEB)

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  9. The radiological installation in dental office: selection and performance

    International Nuclear Information System (INIS)

    Cirre, Christian

    2010-01-01

    This thesis for a PhD in dental surgery aimed at identifying and analysing different ways to optimise radiographs. In a first part, the author presents the characteristics of X rays, and dosimetric values used in dental offices. He describes the interaction of X rays with living cells by recalling the discovery of biological effects and the emergence of radiation protection, and by discussing the consequences for the patient as well as for the practician. In the next part, the author comments technological advances of devices, and means available to practicians to improve their performance. He presents X ray tubes, discusses factors which influence ray production, and selection criteria, indicates additional devices (beam application tubes, filtration, collimation), discusses the selection of the receiver (types of receivers used in intra-oral radiology, digital or silver film-based sensors), and describes the picture-taking process (radiological techniques, use of angulators and lead shielding). He finally discusses how to optimise intra-oral dental imagery through good practices which comprise optimisation, selection of apparatuses and devices, performance of the radiological act with a patient sitting in the armchair, and maintenance of a good image quality [fr

  10. Verification and quality control of routine hematology analyzers

    NARCIS (Netherlands)

    Vis, J Y; Huisman, A

    2016-01-01

    Verification of hematology analyzers (automated blood cell counters) is mandatory before new hematology analyzers may be used in routine clinical care. The verification process consists of several items which comprise among others: precision, accuracy, comparability, carryover, background and

  11. Solid waste operations complex engineering verification program plan

    International Nuclear Information System (INIS)

    Bergeson, C.L.

    1994-01-01

    This plan supersedes, but does not replace, the previous Waste Receiving and Processing/Solid Waste Engineering Development Program Plan. In doing this, it does not repeat the basic definitions of the various types or classes of development activities nor provide the rigorous written description of each facility and assign the equipment to development classes. The methodology described in the previous document is still valid and was used to determine the types of verification efforts required. This Engineering Verification Program Plan will be updated on a yearly basis. This EVPP provides programmatic definition of all engineering verification activities for the following SWOC projects: (1) Project W-026 - Waste Receiving and Processing Facility Module 1; (2) Project W-100 - Waste Receiving and Processing Facility Module 2A; (3) Project W-112 - Phase V Storage Facility; and (4) Project W-113 - Solid Waste Retrieval. No engineering verification activities are defined for Project W-112 as no verification work was identified. The Acceptance Test Procedures/Operational Test Procedures will be part of each project's Title III operation test efforts. The ATPs/OTPs are not covered by this EVPP

  12. 21 CFR 21.44 - Verification of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Verification of identity. 21.44 Section 21.44 Food... Verification of identity. (a) An individual seeking access to records in a Privacy Act Record System may be... identity. The identification required shall be suitable considering the nature of the records sought. No...

  13. Design and verification of electrical installations

    CERN Document Server

    Scaddan, Brian

    2012-01-01

    Fully up to date with the 17th Edition of IET Wiring Regulations.Simplifies the advice found in the Wiring Regulations, explaining what they mean in actual working practice for design and testing.Expert advice from an engineering training consultant, supported with colour diagrams, examples and key data.This popular guide provides an understanding of basic design criteria and calculations, along with current inspection and testing requirements and explains how to meet the requirements of the IEE IET Wiring Regulations. The b

  14. The study for installing noise barrier on highway route no.9

    Directory of Open Access Journals (Sweden)

    Jiradecha Chaddanai

    2018-01-01

    Full Text Available Highway Route No. 9 is a Bangkok bypass motorway that aims to alleviate traffic congestion in greater Bangkok areas. Presently, it is found a rapid expansion of new communities residing along both side of Highway No. 9. To lessen the noise level, Department of Highways installed the noise barrier on the sensitive locations. However, people from communities living on both sides of highway still demand some additional noise pollution improvement. To improve the efficiency of using noise barriers and to promote environmental and social quality for the people on the sensitive communities along the highway route, the Department of Highways, therefore, designs a new technique for installing noise barrier on the sensitive areas, i.e. education institutions, temple, residential area. In addition, the mathematic model is applied to 12 selected locations of sensitive areas for monitoring the effectiveness of the new installation technique. The mathematic model is used for predict the future noise level after installation of noise barrier in year 2037. The results confirm that the appropriate height and width of noise barrier can improve the comfortable of the people on the sensitive area.

  15. A methodology for the rigorous verification of plasma simulation codes

    Science.gov (United States)

    Riva, Fabio

    2016-10-01

    The methodology used to assess the reliability of numerical simulation codes constitutes the Verification and Validation (V&V) procedure. V&V is composed by two separate tasks: the verification, which is a mathematical issue targeted to assess that the physical model is correctly solved, and the validation, which determines the consistency of the code results, and therefore of the physical model, with experimental data. In the present talk we focus our attention on the verification, which in turn is composed by the code verification, targeted to assess that a physical model is correctly implemented in a simulation code, and the solution verification, that quantifies the numerical error affecting a simulation. Bridging the gap between plasma physics and other scientific domains, we introduced for the first time in our domain a rigorous methodology for the code verification, based on the method of manufactured solutions, as well as a solution verification based on the Richardson extrapolation. This methodology was applied to GBS, a three-dimensional fluid code based on a finite difference scheme, used to investigate the plasma turbulence in basic plasma physics experiments and in the tokamak scrape-off layer. Overcoming the difficulty of dealing with a numerical method intrinsically affected by statistical noise, we have now generalized the rigorous verification methodology to simulation codes based on the particle-in-cell algorithm, which are employed to solve Vlasov equation in the investigation of a number of plasma physics phenomena.

  16. Verification and Performance Analysis for Embedded Systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2009-01-01

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems.......This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems....

  17. A New Integrated Weighted Model in SNOW-V10: Verification of Categorical Variables

    Science.gov (United States)

    Huang, Laura X.; Isaac, George A.; Sheng, Grant

    2014-01-01

    This paper presents the verification results for nowcasts of seven categorical variables from an integrated weighted model (INTW) and the underlying numerical weather prediction (NWP) models. Nowcasting, or short range forecasting (0-6 h), over complex terrain with sufficient accuracy is highly desirable but a very challenging task. A weighting, evaluation, bias correction and integration system (WEBIS) for generating nowcasts by integrating NWP forecasts and high frequency observations was used during the Vancouver 2010 Olympic and Paralympic Winter Games as part of the Science of Nowcasting Olympic Weather for Vancouver 2010 (SNOW-V10) project. Forecast data from Canadian high-resolution deterministic NWP system with three nested grids (at 15-, 2.5- and 1-km horizontal grid-spacing) were selected as background gridded data for generating the integrated nowcasts. Seven forecast variables of temperature, relative humidity, wind speed, wind gust, visibility, ceiling and precipitation rate are treated as categorical variables for verifying the integrated weighted forecasts. By analyzing the verification of forecasts from INTW and the NWP models among 15 sites, the integrated weighted model was found to produce more accurate forecasts for the 7 selected forecast variables, regardless of location. This is based on the multi-categorical Heidke skill scores for the test period 12 February to 21 March 2010.

  18. Tolerance Verification of Micro and Nano Structures on Polycarbonate Substrates

    DEFF Research Database (Denmark)

    Gasparin, Stefania; Tosello, Guido; Hansen, Hans Nørgaard

    2010-01-01

    Micro and nano structures are an increasing challenge in terms of tolerance verification and process quality control: smaller dimensions led to a smaller tolerance zone to be evaluated. This paper focuses on the verification of CD, DVD and HD-DVD nanoscale features. CD tolerance features are defi......Micro and nano structures are an increasing challenge in terms of tolerance verification and process quality control: smaller dimensions led to a smaller tolerance zone to be evaluated. This paper focuses on the verification of CD, DVD and HD-DVD nanoscale features. CD tolerance features...

  19. 30 CFR 57.4504 - Fan installations.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Fan installations. 57.4504 Section 57.4504... Control Installation/construction/maintenance § 57.4504 Fan installations. (a) Fan houses, fan bulkheads... of combustible materials, except installed wiring, ground and track support, headframes, and direct...

  20. Standard Verification System (SVS)

    Data.gov (United States)

    Social Security Administration — SVS is a mainframe program that accesses the NUMIDENT to perform SSN verifications. This program is called by SSA Internal applications to verify SSNs. There is also...

  1. Packaged low-level waste verification system

    International Nuclear Information System (INIS)

    Tuite, K.T.; Winberg, M.; Flores, A.Y.; Killian, E.W.; McIsaac, C.V.

    1996-01-01

    Currently, states and low-level radioactive waste (LLW) disposal site operators have no method of independently verifying the radionuclide content of packaged LLW that arrive at disposal sites for disposal. At this time, disposal sites rely on LLW generator shipping manifests and accompanying records to insure that LLW received meets the waste acceptance criteria. An independent verification system would provide a method of checking generator LLW characterization methods and help ensure that LLW disposed of at disposal facilities meets requirements. The Mobile Low-Level Waste Verification System (MLLWVS) provides the equipment, software, and methods to enable the independent verification of LLW shipping records to insure that disposal site waste acceptance criteria are being met. The MLLWVS system was developed under a cost share subcontract between WMG, Inc., and Lockheed Martin Idaho Technologies through the Department of Energy's National Low-Level Waste Management Program at the Idaho National Engineering Laboratory (INEL)

  2. Mock-up development of new warship protective armor structure and feasibility analysis of ship installation

    Directory of Open Access Journals (Sweden)

    ZHENG Pan

    2017-05-01

    Full Text Available To ensure the installation of the new design of protective armor structure on larger warships,a study into the installation process of the structure of this armor is carried out to improve installation efficiency and ensure the protective effect. This paper proposes a typical composite armor structure design which is composed of ‘silicate aerogel/ballistic ceramic/high-strength polyethylene/silicate aerogel’. The study analyzes the modeling design,down-selection of materials and equipment,and real ship mock-up technical development. The reliability and application of high strength polyethylene in response to high temperatures in the real ship installation process is discussed. The results show that high-temperatures during welding have no negative impact on the high strength polyethylene of the armored structure. The design demonstrates that this installation process is feasible and can be provided as an alternative solution by virtues of its good maneuverability,controllable precision,checkable quality and high reliability.

  3. Experimental study of the density distribution of the particles of the material in screw installation

    Directory of Open Access Journals (Sweden)

    Demidov S. F.

    2017-02-01

    Full Text Available the experimental studies of density distribution of the particles of a mixture of wheat, oats, rye to feed pigs by infrared heating at the time of stay and temperature at the exit of the installation. The purpose of the work is to study the quality of treatment of the product with the settings with the screw and the screw with installed round jumper on the pen of the screw. Screw installations with infrared emitters of selected wavelength give the opportunity for intense and continuous heat treatment process. The authors used the optimal parameters of the process with the screw and the screw with installed round jumper on the pen of the screw. The parameters of screw installation during the study were the following: the number of revolutions of the screw was 10 rpm, density of heat flux was 12 kW/m2, output capacity – 250 kg/h.

  4. LHCb: Installation and operation of the LHCb Silicon Tracker detector

    CERN Multimedia

    Esperante Pereira, D

    2009-01-01

    The LHCb experiment has been designed to perform high-precision measurements of CP violation and rare decays of B hadrons. The construction and installation phases of the Silicon Tracker (ST) of the experiment were completed by early summer 2008. The LHCb Silicon Tracker sums up to a total sensitive area of about 12 m^2 using silicon micro-strip technology and withstands charged particle fluxes of up to 5 x 10^5cm^−2s^−1. We will report on the preparation of the detectors for the first LHC beams. Selected results from the commissioning in LHCb are shown, including the first beam-related events accumulated during LHC injection tests in September 2008. Lessons are drawn from the experience gathered during the installation and commissioning.

  5. Spent Nuclear Fuel (SNF) Project Design Verification and Validation Process

    International Nuclear Information System (INIS)

    OLGUIN, L.J.

    2000-01-01

    This document provides a description of design verification and validation activities implemented by the Spent Nuclear Fuel (SNF) Project. During the execution of early design verification, a management assessment (Bergman, 1999) and external assessments on configuration management (Augustenburg, 1999) and testing (Loscoe, 2000) were conducted and identified potential uncertainties in the verification process. This led the SNF Chief Engineer to implement corrective actions to improve process and design products. This included Design Verification Reports (DVRs) for each subproject, validation assessments for testing, and verification of the safety function of systems and components identified in the Safety Equipment List to ensure that the design outputs were compliant with the SNF Technical Requirements. Although some activities are still in progress, the results of the DVR and associated validation assessments indicate that Project requirements for design verification are being effectively implemented. These results have been documented in subproject-specific technical documents (Table 2). Identified punch-list items are being dispositioned by the Project. As these remaining items are closed, the technical reports (Table 2) will be revised and reissued to document the results of this work

  6. 3D Projection Installations

    DEFF Research Database (Denmark)

    Halskov, Kim; Johansen, Stine Liv; Bach Mikkelsen, Michelle

    2014-01-01

    Three-dimensional projection installations are particular kinds of augmented spaces in which a digital 3-D model is projected onto a physical three-dimensional object, thereby fusing the digital content and the physical object. Based on interaction design research and media studies, this article ...... Fingerplan to Loop City, is a 3-D projection installation presenting the history and future of city planning for the Copenhagen area in Denmark. The installation was presented as part of the 12th Architecture Biennale in Venice in 2010....

  7. As-Built Verification Plan Spent Nuclear Fuel Canister Storage Building MCO Handling Machine

    International Nuclear Information System (INIS)

    SWENSON, C.E.

    2000-01-01

    This as-built verification plan outlines the methodology and responsibilities that will be implemented during the as-built field verification activity for the Canister Storage Building (CSB) MCO HANDLING MACHINE (MHM). This as-built verification plan covers THE ELECTRICAL PORTION of the CONSTRUCTION PERFORMED BY POWER CITY UNDER CONTRACT TO MOWAT. The as-built verifications will be performed in accordance Administrative Procedure AP 6-012-00, Spent Nuclear Fuel Project As-Built Verification Plan Development Process, revision I. The results of the verification walkdown will be documented in a verification walkdown completion package, approved by the Design Authority (DA), and maintained in the CSB project files

  8. 37 CFR 262.7 - Verification of royalty payments.

    Science.gov (United States)

    2010-07-01

    ... Designated Agent have agreed as to proper verification methods. (b) Frequency of verification. A Copyright Owner or a Performer may conduct a single audit of the Designated Agent upon reasonable notice and... COPYRIGHT ARBITRATION ROYALTY PANEL RULES AND PROCEDURES RATES AND TERMS FOR CERTAIN ELIGIBLE...

  9. 40 CFR 1065.675 - CLD quench verification calculations.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false CLD quench verification calculations... POLLUTION CONTROLS ENGINE-TESTING PROCEDURES Calculations and Data Requirements § 1065.675 CLD quench verification calculations. Perform CLD quench-check calculations as follows: (a) Perform a CLD analyzer quench...

  10. Monitoring/Verification using DMS: TATP Example 8422

    International Nuclear Information System (INIS)

    Stephan Weeks; Kevin Kyle

    2008-01-01

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a 'smart dust' sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the use of explosives or chemical and biological weapons in terrorist activities. Two peroxide-based liquid explosives, triacetone triperoxide (TATP) and hexamethylene triperoxide diamine (HMTD), are synthesized from common chemicals such as hydrogen peroxide, acetone, sulfuric acid, ammonia, and citric acid (Figure 1). Recipes can be readily found on the Internet by anyone seeking to generate sufficient quantities of these highly explosive chemicals to cause considerable collateral damage. Detection of TATP and HMTD by advanced sensing systems can provide the early warning necessary to prevent terror plots from coming to fruition. DMS is currently one of the foremost emerging technologies for the separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. DMS separates and identifies ions at ambient pressures by utilizing the non-linear dependence of an ion's mobility on the radio frequency (rf) electric field strength. GC is widely considered to be one of the leading analytical methods for the separation of chemical species in complex mixtures. Advances in the technique have led to the development of low-thermal-mass fast GC columns. These columns are capable of

  11. Analysis and Transformation Tools for Constrained Horn Clause Verification

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick

    2014-01-01

    Several techniques and tools have been developed for verification of properties expressed as Horn clauses with constraints over a background theory (CHC). Current CHC verification tools implement intricate algorithms and are often limited to certain subclasses of CHC problems. Our aim in this work...... is to investigate the use of a combination of off-the-shelf techniques from the literature in analysis and transformation of Constraint Logic Programs (CLPs) to solve challenging CHC verification problems. We find that many problems can be solved using a combination of tools based on well-known techniques from...... abstract interpretation, semantics-preserving transformations, program specialisation and query-answer transformations. This gives insights into the design of automatic, more general CHC verification tools based on a library of components....

  12. Methods of Software Verification

    Directory of Open Access Journals (Sweden)

    R. E. Gurin

    2015-01-01

    Full Text Available This article is devoted to the problem of software verification (SW. Methods of software verification designed to check the software for compliance with the stated requirements such as correctness, system security and system adaptability to small changes in the environment, portability and compatibility, etc. These are various methods both by the operation process and by the way of achieving result. The article describes the static and dynamic methods of software verification and paid attention to the method of symbolic execution. In its review of static analysis are discussed and described the deductive method, and methods for testing the model. A relevant issue of the pros and cons of a particular method is emphasized. The article considers classification of test techniques for each method. In this paper we present and analyze the characteristics and mechanisms of the static analysis of dependencies, as well as their views, which can reduce the number of false positives in situations where the current state of the program combines two or more states obtained both in different paths of execution and in working with multiple object values. Dependences connect various types of software objects: single variables, the elements of composite variables (structure fields, array elements, the size of the heap areas, the length of lines, the number of initialized array elements in the verification code using static methods. The article pays attention to the identification of dependencies within the framework of the abstract interpretation, as well as gives an overview and analysis of the inference tools.Methods of dynamic analysis such as testing, monitoring and profiling are presented and analyzed. Also some kinds of tools are considered which can be applied to the software when using the methods of dynamic analysis. Based on the work a conclusion is drawn, which describes the most relevant problems of analysis techniques, methods of their solutions and

  13. NRC Information No. 90-23: Improper installation of Patel conduit seals

    International Nuclear Information System (INIS)

    Rossi, C.E.

    1992-01-01

    On November 6, 1989, the staff at the H.B. Robinson plant notified the NRC that they had discovered that some of the conduit seal grommets used to seal insulated wire conductors entering environmentally qualified instrument housings were oversized for the application. The seals are used to prevent moisture from entering safety-related electrical components following loss-of-coolant accidents. The problem was attributed to inadequate installation instructions that were used when the seals were installed in 1986 and 1987. These instructions listed the grommets by wire gauge size and gave maximum wire insulation diameters for each wire size. In accordance with these instructions, the seals were selected based on wire gauge alone. However, since the insulation thickness for a given wire gauge the correct grommet size would have been the minimum wire insulation diameter for which a particular grommet will achieve an effective seal. The selection of grommet size based only on wire gauge size resulted in the installation of some grommets that were too large to provide an effective seal. As a result, some of the seals failed pressure tests that were designed to simulate post-LOCA pressures. During the investigation of the grommet leakage problem, the Robinson staff also checked the torque on the conduit seal union nuts that are used to compress the seals. EGS Corporation recommends that the union nuts be torqued to 50 ft-lb. On approximately half of the 90 seals inspected, the union nut moved about 1/4 inch when this torque was applied. EGS Corporation reports that 1/4 inch of movement does not necessarily indicate a degraded seal but recommends that the correct torque be verified on a representative sample of installed conduit seals

  14. Verification and Validation in Systems Engineering

    CERN Document Server

    Debbabi, Mourad; Jarraya, Yosr; Soeanu, Andrei; Alawneh, Luay

    2010-01-01

    "Verification and validation" represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle. Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic verification and validation of systems engineering design models expressed in standardized modeling languages. Their presentation includes a bird's eye view of the most prominent modeling languages for software and systems engineering, namely the Unified Model

  15. 37 CFR 260.6 - Verification of royalty payments.

    Science.gov (United States)

    2010-07-01

    ... verification of the payment of royalty fees to those parties entitled to receive such fees, according to terms... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Verification of royalty... COPYRIGHT ARBITRATION ROYALTY PANEL RULES AND PROCEDURES RATES AND TERMS FOR PREEXISTING SUBSCRIPTION...

  16. Assessment of the nuclear installation's safety significant events

    International Nuclear Information System (INIS)

    Vidican, D.

    2005-01-01

    This document tries to establish, based on the available documentation, the main steps in development of Assessment of the Events in Nuclear Installations. It takes into account: selection of the safety significant occurrences, establishing the direct cause and contributors as well as the root cause and contributors. Also, the document presents the necessary corrective actions and generic lessons to be learned from the event. The document is based especially on IAEA - ASSET guidelines and DOE root cause analysis Guidance. (author)

  17. A Roadmap for the Implementation of Continued Process Verification.

    Science.gov (United States)

    Boyer, Marcus; Gampfer, Joerg; Zamamiri, Abdel; Payne, Robin

    2016-01-01

    In 2014, the members of the BioPhorum Operations Group (BPOG) produced a 100-page continued process verification case study, entitled "Continued Process Verification: An Industry Position Paper with Example Protocol". This case study captures the thought processes involved in creating a continued process verification plan for a new product in response to the U.S. Food and Drug Administration's guidance on the subject introduced in 2011. In so doing, it provided the specific example of a plan developed for a new molecular antibody product based on the "A MAb Case Study" that preceded it in 2009.This document provides a roadmap that draws on the content of the continued process verification case study to provide a step-by-step guide in a more accessible form, with reference to a process map of the product life cycle. It could be used as a basis for continued process verification implementation in a number of different scenarios: For a single product and process;For a single site;To assist in the sharing of data monitoring responsibilities among sites;To assist in establishing data monitoring agreements between a customer company and a contract manufacturing organization. The U.S. Food and Drug Administration issued guidance on the management of manufacturing processes designed to improve quality and control of drug products. This involved increased focus on regular monitoring of manufacturing processes, reporting of the results, and the taking of opportunities to improve. The guidance and practice associated with it is known as continued process verification This paper summarizes good practice in responding to continued process verification guidance, gathered from subject matter experts in the biopharmaceutical industry. © PDA, Inc. 2016.

  18. Land surface Verification Toolkit (LVT)

    Science.gov (United States)

    Kumar, Sujay V.

    2017-01-01

    LVT is a framework developed to provide an automated, consolidated environment for systematic land surface model evaluation Includes support for a range of in-situ, remote-sensing and other model and reanalysis products. Supports the analysis of outputs from various LIS subsystems, including LIS-DA, LIS-OPT, LIS-UE. Note: The Land Information System Verification Toolkit (LVT) is a NASA software tool designed to enable the evaluation, analysis and comparison of outputs generated by the Land Information System (LIS). The LVT software is released under the terms and conditions of the NASA Open Source Agreement (NOSA) Version 1.1 or later. Land Information System Verification Toolkit (LVT) NOSA.

  19. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  20. Regional MLEM reconstruction strategy for PET-based treatment verification in ion beam radiotherapy

    International Nuclear Information System (INIS)

    Gianoli, Chiara; Riboldi, Marco; Fattori, Giovanni; Baselli, Giuseppe; Baroni, Guido; Bauer, Julia; Debus, Jürgen; Parodi, Katia; De Bernardi, Elisabetta

    2014-01-01

    In ion beam radiotherapy, PET-based treatment verification provides a consistency check of the delivered treatment with respect to a simulation based on the treatment planning. In this work the region-based MLEM reconstruction algorithm is proposed as a new evaluation strategy in PET-based treatment verification. The comparative evaluation is based on reconstructed PET images in selected regions, which are automatically identified on the expected PET images according to homogeneity in activity values. The strategy was tested on numerical and physical phantoms, simulating mismatches between the planned and measured β + activity distributions. The region-based MLEM reconstruction was demonstrated to be robust against noise and the sensitivity of the strategy results were comparable to three voxel units, corresponding to 6 mm in numerical phantoms. The robustness of the region-based MLEM evaluation outperformed the voxel-based strategies. The potential of the proposed strategy was also retrospectively assessed on patient data and further clinical validation is envisioned. (paper)

  1. Portal verification for breast cancer radiotherapy

    International Nuclear Information System (INIS)

    Petkovska, Sonja; Pejkovikj, Sasho; Apostolovski, Nebojsha

    2013-01-01

    At the University Clinic in Skopje, breast cancer irradiation is being planned and performed by using a mono-iso centrical method, which means that a unique isocenter (I C) for all irradiation fields is used. The goal of this paper is to present the patient’s position in all coordinates before the first treatment session, relative to the position determined during the CT simulation. Deviation of up to 5 mm is allowed. The analysis was made by using a portal verification. Sixty female patients at random selection are reviewed. The matching results show that for each patient deviation exists at least on one axis. The largest deviations are in the longitudinal direction (head-feet) up to 4 mm, mean 1.8 mm. In 60 out of 85 analysed fields, the deviation is towards the head. In lateral direction, median deviation is 1.1 mm and in 65% of the analysed portals those deviations are in medial direction – contralateral breast which can increases the dose in the lung and in the contralateral breast. This deviation for supraclavicular field can increase the dose in the spinal cord. Although these doses are well below the limit, this fact should be taken into account in setting the treatment fields. The final conclusion from the research is that despite of the fact we are dealing with small deviations, in conditions when accuracy in positioning is done with portal, the portal verification needs to be done in the coming weeks of the treatment, not only before the first treatment. This provides information for an intra fractional set-up deviation. (Author)

  2. 78 FR 27882 - VA Veteran-Owned Small Business (VOSB) Verification Guidelines

    Science.gov (United States)

    2013-05-13

    ... Verification Self-Assessment Tool that walks the veteran through the regulation and how it applies to the...) Verification Guidelines AGENCY: Department of Veterans Affairs. ACTION: Advanced notice of proposed rulemaking... regulations governing the Department of Veterans Affairs (VA) Veteran-Owned Small Business (VOSB) Verification...

  3. Verification and validation for waste disposal models

    International Nuclear Information System (INIS)

    1987-07-01

    A set of evaluation criteria has been developed to assess the suitability of current verification and validation techniques for waste disposal methods. A survey of current practices and techniques was undertaken and evaluated using these criteria with the items most relevant to waste disposal models being identified. Recommendations regarding the most suitable verification and validation practices for nuclear waste disposal modelling software have been made

  4. Depression and selection of positive and negative social feedback: motivated preference or cognitive balance?

    Science.gov (United States)

    Alloy, L B; Lipman, A J

    1992-05-01

    In this commentary we examine Swann, Wenzlaff, Krull, and Pelham's (1992) findings with respect to each of 5 central propositions in self-verification theory. We conclude that although the data are consistent with self-verification theory, none of the 5 components of the theory have been demonstrated convincingly as yet. Specifically, we argue that depressed subjects' selection of social feedback appears to be balanced or evenhanded rather than biased toward negative feedback and that there is little evidence to indicate that depressives actively seek negative appraisals. Furthermore, we suggest that the studies are silent with respect to the motivational postulates of self-verification theory and that a variety of competing cognitive and motivational models can explain Swann et al.'s findings as well as self-verification theory.

  5. Property-driven functional verification technique for high-speed vision system-on-chip processor

    Science.gov (United States)

    Nshunguyimfura, Victor; Yang, Jie; Liu, Liyuan; Wu, Nanjian

    2017-04-01

    The implementation of functional verification in a fast, reliable, and effective manner is a challenging task in a vision chip verification process. The main reason for this challenge is the stepwise nature of existing functional verification techniques. This vision chip verification complexity is also related to the fact that in most vision chip design cycles, extensive efforts are focused on how to optimize chip metrics such as performance, power, and area. Design functional verification is not explicitly considered at an earlier stage at which the most sound decisions are made. In this paper, we propose a semi-automatic property-driven verification technique. The implementation of all verification components is based on design properties. We introduce a low-dimension property space between the specification space and the implementation space. The aim of this technique is to speed up the verification process for high-performance parallel processing vision chips. Our experimentation results show that the proposed technique can effectively improve the verification effort up to 20% for the complex vision chip design while reducing the simulation and debugging overheads.

  6. Design verification methodology for a solenoid valve for industrial applications

    International Nuclear Information System (INIS)

    Park, Chang Dae; Lim, Byung Ju; Chun, Kyung Yul

    2015-01-01

    Solenoid operated valves (SOV) are widely used in many applications due to their fast dynamic responses, cost effectiveness, and less contamination sensitive characteristics. In this paper, we tried to provide a convenient method of design verification of SOV to design engineers who depend on their experiences and experiment during design and development process of SOV. First, we summarize a detailed procedure for designing SOVs for industrial applications. All of the design constraints are defined in the first step of the design, and then the detail design procedure is presented based on design experiences as well as various physical and electromagnetic relationships. Secondly, we have suggested a verification method of this design using theoretical relationships, which enables optimal design of SOV from a point of view of safety factor of design attraction force. Lastly, experimental performance tests using several prototypes manufactured based on this design method show that the suggested design verification methodology is appropriate for designing new models of solenoids. We believe that this verification process is novel logic and useful to save time and expenses during development of SOV because verification tests with manufactured specimen may be substituted partly by this verification methodology.

  7. Design and installation manual for thermal energy storage

    Energy Technology Data Exchange (ETDEWEB)

    Cole, R L; Nield, K J; Rohde, R R; Wolosewicz, R M

    1980-01-01

    The purpose of this manual is to provide information on the design and installation of thermal energy storage in active solar systems. It is intended for contractors, installers, solar system designers, engineers, architects, and manufacturers who intend to enter the solar energy business. The reader should have general knowledge of how solar heating and cooling systems operate and knowledge of construction methods and building codes. Knowledge of solar analysis methods such as f-Chart, SOLCOST, DOE-1, or TRNSYS would be helpful. The information contained in the manual includes sizing storage, choosing a location for the storage device, and insulation requirements. Both air-based and liquid-based systems are covered with topics on designing rock beds, tank types, pump and fan selection, installation, costs, and operation and maintenance. Topics relevant to latent heat storage include properties of phase-change materials, sizing the storage unit, insulating the storage unit, available systems, and cost. Topics relevant to heating domestic water include safety, single- and dual-tank systems, domestic water heating with air- and liquid-based space heating systems, and stand alone domestics hot water systems. Several appendices present common problems with storage systems and their solutions, heat transfer fluid properties, economic insulation thickness, heat exchanger sizing, and sample specifications for heat exchangers, wooden rock bins, steel tanks, concrete tanks, and fiberglass-reinforced plastic tanks.

  8. Verification test report on a solar heating and hot water system

    Science.gov (United States)

    1978-01-01

    Information is provided on the development, qualification and acceptance verification of commercial solar heating and hot water systems and components. The verification includes the performances, the efficiences and the various methods used, such as similarity, analysis, inspection, test, etc., that are applicable to satisfying the verification requirements.

  9. Temporal Specification and Verification of Real-Time Systems.

    Science.gov (United States)

    1991-08-30

    of concrete real - time systems can be modeled adequately. Specification: We present two conservative extensions of temporal logic that allow for the...logic. We present both model-checking algorithms for the automatic verification of finite-state real - time systems and proof methods for the deductive verification of real - time systems .

  10. A verification regime for the spatial discretization of the SN transport equations

    Energy Technology Data Exchange (ETDEWEB)

    Schunert, S.; Azmy, Y. [North Carolina State Univ., Dept. of Nuclear Engineering, 2500 Stinson Drive, Raleigh, NC 27695 (United States)

    2012-07-01

    The order-of-accuracy test in conjunction with the method of manufactured solutions is the current state of the art in computer code verification. In this work we investigate the application of a verification procedure including the order-of-accuracy test on a generic SN transport solver that implements the AHOTN spatial discretization. Different types of semantic errors, e.g. removal of a line of code or changing a single character, are introduced randomly into the previously verified S{sub N} code and the proposed verification procedure is used to identify the coding mistakes (if possible) and classify them. Itemized by error type we record the stage of the verification procedure where the error is detected and report the frequency with which the errors are correctly identified at various stages of the verification. Errors that remain undetected by the verification procedure are further scrutinized to determine the reason why the introduced coding mistake eluded the verification procedure. The result of this work is that the verification procedure based on an order-of-accuracy test finds almost all detectable coding mistakes but rarely, 1.44% of the time, and under certain circumstances can fail. (authors)

  11. Installation of the LHC experimental insertions

    CERN Document Server

    Bartolome-Jimenez, S

    2004-01-01

    The installation of the LHC experimental insertions, and particularly the installation of the low-beta quadrupoles, raises many technical challenges due to the stringent alignment specifications and to the difficulty of access in very confined areas. The compact layout with many lattice elements, vacuum components, beam control instrumentation and the presence of shielding does not allow for any improvisation in the installation procedure. This paper reviews all the constraints that need to be taken into account when installing the experimental insertions. It describes the chronological sequence of installation and discusses the technical solutions that have been adopted.

  12. INSTALLATION OF THE LHC EXPERIMENTAL INSERTIONS

    CERN Document Server

    Bartolome-Jimenez, S

    2004-01-01

    The installation of the LHC experimental insertions, and particularly the installation of the Low-Beta quadrupoles, raises many technical challenges due to the stringent alignment specifications and to the difficulty of access in very confined areas. The compact layout with many lattice elements, vacuum components, beam control instrumentation and the presence of shielding does not allow for any improvisation in the installation procedure. This paper reviews all the constraints that need to be taken into account when installing the experimental insertions. It describes the chronological sequence of installation and discusses the technical solutions that have been adopted.

  13. Environmental technology verification methods

    CSIR Research Space (South Africa)

    Szewczuk, S

    2016-03-01

    Full Text Available Environmental Technology Verification (ETV) is a tool that has been developed in the United States of America, Europe and many other countries around the world to help innovative environmental technologies reach the market. Claims about...

  14. Installing Python Modules with pip

    OpenAIRE

    Fred Gibbs

    2013-01-01

    This lesson shows you how to download and install Python modules. There are many ways to install external modules, but for the purposes of this lesson, we’re going to use a program called pip. As of Python 2.7.9 and newer, pip is installed by default. This tutorial will be helpful for anyone using older versions of Python (which are still quite common).

  15. TU-H-CAMPUS-JeP1-02: Fully Automatic Verification of Automatically Contoured Normal Tissues in the Head and Neck

    Energy Technology Data Exchange (ETDEWEB)

    McCarroll, R [UT MD Anderson Cancer Center, Houston, TX (United States); UT Health Science Center, Graduate School of Biomedical Sciences, Houston, TX (United States); Beadle, B; Yang, J; Zhang, L; Kisling, K; Balter, P; Stingo, F; Nelson, C; Followill, D; Court, L [UT MD Anderson Cancer Center, Houston, TX (United States); Mejia, M [University of Santo Tomas Hospital, Manila, Metro Manila (Philippines)

    2016-06-15

    Purpose: To investigate and validate the use of an independent deformable-based contouring algorithm for automatic verification of auto-contoured structures in the head and neck towards fully automated treatment planning. Methods: Two independent automatic contouring algorithms [(1) Eclipse’s Smart Segmentation followed by pixel-wise majority voting, (2) an in-house multi-atlas based method] were used to create contours of 6 normal structures of 10 head-and-neck patients. After rating by a radiation oncologist, the higher performing algorithm was selected as the primary contouring method, the other used for automatic verification of the primary. To determine the ability of the verification algorithm to detect incorrect contours, contours from the primary method were shifted from 0.5 to 2cm. Using a logit model the structure-specific minimum detectable shift was identified. The models were then applied to a set of twenty different patients and the sensitivity and specificity of the models verified. Results: Per physician rating, the multi-atlas method (4.8/5 point scale, with 3 rated as generally acceptable for planning purposes) was selected as primary and the Eclipse-based method (3.5/5) for verification. Mean distance to agreement and true positive rate were selected as covariates in an optimized logit model. These models, when applied to a group of twenty different patients, indicated that shifts could be detected at 0.5cm (brain), 0.75cm (mandible, cord), 1cm (brainstem, cochlea), or 1.25cm (parotid), with sensitivity and specificity greater than 0.95. If sensitivity and specificity constraints are reduced to 0.9, detectable shifts of mandible and brainstem were reduced by 0.25cm. These shifts represent additional safety margins which might be considered if auto-contours are used for automatic treatment planning without physician review. Conclusion: Automatically contoured structures can be automatically verified. This fully automated process could be used to

  16. Verification and Optimization of a PLC Control Schedule

    NARCIS (Netherlands)

    Brinksma, Hendrik; Mader, Angelika H.; Havelund, K.; Penix, J.; Visser, W.

    We report on the use of the SPIN model checker for both the verification of a process control program and the derivation of optimal control schedules. This work was carried out as part of a case study for the EC VHS project (Verification of Hybrid Systems), in which the program for a Programmable

  17. Compressive sensing using optimized sensing matrix for face verification

    Science.gov (United States)

    Oey, Endra; Jeffry; Wongso, Kelvin; Tommy

    2017-12-01

    Biometric appears as one of the solutions which is capable in solving problems that occurred in the usage of password in terms of data access, for example there is possibility in forgetting password and hard to recall various different passwords. With biometrics, physical characteristics of a person can be captured and used in the identification process. In this research, facial biometric is used in the verification process to determine whether the user has the authority to access the data or not. Facial biometric is chosen as its low cost implementation and generate quite accurate result for user identification. Face verification system which is adopted in this research is Compressive Sensing (CS) technique, in which aims to reduce dimension size as well as encrypt data in form of facial test image where the image is represented in sparse signals. Encrypted data can be reconstructed using Sparse Coding algorithm. Two types of Sparse Coding namely Orthogonal Matching Pursuit (OMP) and Iteratively Reweighted Least Squares -ℓp (IRLS-ℓp) will be used for comparison face verification system research. Reconstruction results of sparse signals are then used to find Euclidean norm with the sparse signal of user that has been previously saved in system to determine the validity of the facial test image. Results of system accuracy obtained in this research are 99% in IRLS with time response of face verification for 4.917 seconds and 96.33% in OMP with time response of face verification for 0.4046 seconds with non-optimized sensing matrix, while 99% in IRLS with time response of face verification for 13.4791 seconds and 98.33% for OMP with time response of face verification for 3.1571 seconds with optimized sensing matrix.

  18. 340 and 310 drawing field verification

    International Nuclear Information System (INIS)

    Langdon, J.

    1996-01-01

    The purpose of the drawing field verification work plan is to provide reliable drawings for the 310 Treated Effluent Disposal Facility (TEDF) and 340 Waste Handling Facility (340 Facility). The initial scope of this work plan is to provide field verified and updated versions of all the 340 Facility essential drawings. This plan can also be used for field verification of any other drawings that the facility management directs to be so updated. Any drawings revised by this work plan will be issued in an AutoCAD format

  19. Verification of Scientific Simulations via Hypothesis-Driven Comparative and Quantitative Visualization

    Energy Technology Data Exchange (ETDEWEB)

    Ahrens, James P [ORNL; Heitmann, Katrin [ORNL; Petersen, Mark R [ORNL; Woodring, Jonathan [Los Alamos National Laboratory (LANL); Williams, Sean [Los Alamos National Laboratory (LANL); Fasel, Patricia [Los Alamos National Laboratory (LANL); Ahrens, Christine [Los Alamos National Laboratory (LANL); Hsu, Chung-Hsing [ORNL; Geveci, Berk [ORNL

    2010-11-01

    This article presents a visualization-assisted process that verifies scientific-simulation codes. Code verification is necessary because scientists require accurate predictions to interpret data confidently. This verification process integrates iterative hypothesis verification with comparative, feature, and quantitative visualization. Following this process can help identify differences in cosmological and oceanographic simulations.

  20. Getting ready for final disposal in Finland - Independent verification of spent fuel

    International Nuclear Information System (INIS)

    Tarvainen, Matti; Honkamaa, Tapani; Martikka, Elina; Varjoranta, Tero; Hautamaeki, Johanna; Tiitta, Antero

    2001-01-01

    based on the active independent verification of declared data One of the difficulties that may be related to the final disposal will be old fuel, especially fuel with missing verified knowledge or fuel with poorly maintained continuity of knowledge. The Finnish SSAC has avoided this potential future problem in time by carrying out NDA verification measurements of spent fuel in a systematic manner since the beginning of the interim storing 1987. Data and spectra of the measurements have been stored into a spent fuel measurement database FISDAM (Finnish Safeguards Database of Measurements) maintained by the safeguards office of STUK. The NDA methods used are based on the detection of spent fuel specific signals i.e. fission product gamma rays or passive neutron emission from actinides. Final verification of spent fuel upon the final disposal is planned to be based on the FISDAM data followed by partial defect/rod level verification of all declared irradiated nuclear material. This will allow the SSAC to gain very high assurance that the data of the disposed material will be correct and complete. The SSAC verification activities may also form of close future cooperation with the IAEA and Euratom according to the principles of the Additional Protocol. Systematic and accurate measurements are an essential feature of the Finnish SSAC understanding of good safeguards. All present and future questions concerning declared data will be verified in time. The approach selected ensures that no undue burden is transferred to the future generations due to partially or poorly filled safeguards obligations The paper discusses the activities and results gained by the SSAC in addition to the programs and plans related to preparing for the final disposal safeguards needs, with special emphasis on the spent fuel NDA verification issues. (author)

  1. Comparison of fingerprint and facial biometric verification technologies for user access and patient identification in a clinical environment

    Science.gov (United States)

    Guo, Bing; Zhang, Yu; Documet, Jorge; Liu, Brent; Lee, Jasper; Shrestha, Rasu; Wang, Kevin; Huang, H. K.

    2007-03-01

    As clinical imaging and informatics systems continue to integrate the healthcare enterprise, the need to prevent patient mis-identification and unauthorized access to clinical data becomes more apparent especially under the Health Insurance Portability and Accountability Act (HIPAA) mandate. Last year, we presented a system to track and verify patients and staff within a clinical environment. This year, we further address the biometric verification component in order to determine which Biometric system is the optimal solution for given applications in the complex clinical environment. We install two biometric identification systems including fingerprint and facial recognition systems at an outpatient imaging facility, Healthcare Consultation Center II (HCCII). We evaluated each solution and documented the advantages and pitfalls of each biometric technology in this clinical environment.

  2. Verification of whiplash-associated disorders in forensic medical practice. part I--assessment of the injury circumstances and biomechanics.

    Science.gov (United States)

    Teresiński, Grzegorz

    2013-01-01

    For many years, researchers involved in automotive industry and forensic medicine, as well as insurance companies have shown great interest in the issues of etiology and prevention of cervical spine distortion. The etiopathogenesis of whiplash-associated disorders (WADs) remains controversial and its morphological determinants have not been explicitly determined to date. The subjective nature of complaints causes great difficulties in objective assessment of the consequences of acceleration-deceleration injuries and in verification of compensation claims. The objective of the study was to present biomechanical relationships and circumstances accompanying WADs using population-based studies, statistical data of insurance companies and analysis of recordings of event data recorders installed by vehicle producers. The knowledge of technical aspects of WAD circumstances should facilitate medical assessment of the above-mentioned consequences.

  3. Formal verification of Simulink/Stateflow diagrams a deductive approach

    CERN Document Server

    Zhan, Naijun; Zhao, Hengjun

    2017-01-01

    This book presents a state-of-the-art technique for formal verification of continuous-time Simulink/Stateflow diagrams, featuring an expressive hybrid system modelling language, a powerful specification logic and deduction-based verification approach, and some impressive, realistic case studies. Readers will learn the HCSP/HHL-based deductive method and the use of corresponding tools for formal verification of Simulink/Stateflow diagrams. They will also gain some basic ideas about fundamental elements of formal methods such as formal syntax and semantics, and especially the common techniques applied in formal modelling and verification of hybrid systems. By investigating the successful case studies, readers will realize how to apply the pure theory and techniques to real applications, and hopefully will be inspired to start to use the proposed approach, or even develop their own formal methods in their future work.

  4. Verification of the LWRARC code for light-water-reactor afterheat rate calculations

    International Nuclear Information System (INIS)

    Murphy, B.D.

    1998-02-01

    This report describes verification studies carried out on the LWRARC (Light-Water-Reactor Afterheat Rate Calculations) computer code. The LWRARC code is proposed for automating the implementation of procedures specified in Draft Revision 1 of the U.S. Nuclear Regulatory Commission (NRC) Regulatory Guide 3.54, open-quotes Spent-Fuel Heat Generation in an Independent Spent-Fuel Storage Installation,close quotes which gives guidelines on the calculation of decay heat for spent nuclear fuel. Draft Regulatory Guide 3.54 allows one to estimate decay-heat values by means of a table lookup procedure with interpolation performed between table-entry values. The tabulated values of the relevant parameters span ranges that are appropriate for spent fuel from a boiling-water reactor (BWR) or a pressurized-water reactor (PWR), as the case may be, and decay-heat rates are obtained for spent fuel whose properties are within those parameter limits. In some instances, where these limits are either exceeded or where they approach critical regions, adjustments are invoked following table lookup. The LWRARC computer code is intended to replicate the manual process just described. In the code, the table lookup is done by entering a database and carrying out interpolations. The code then determines if adjustments apply, and, if this is the case, adjustment factors are calculated separately. The manual procedures in the Draft Regulatory Guide have been validated (i.e., they produce results that are good estimates of reality). The work reported in this document verifies that the LWRARC code replicates the manual procedures of the Draft Regulatory Guide, and that the code, taken together with the Draft Regulatory Guide, can support both verification and validation processes

  5. Electric and mechanical basic parameters to elaborate a process for a technical verification of safety related design modifications

    International Nuclear Information System (INIS)

    Lamuno Fernandez, Mercedes; La Roca Mallofre, GISEL; Bano Azcon, Alberto

    2010-01-01

    This paper presents a systematic process to check a design in order to achieve all the requirements that regulations demand. Nuclear engineers must verify that a design is done according to the safety requirements, and this paper presents how we have elaborated a process to improve the technical project verification. For a faster, better and easier verification process, here we summarize how to select the electric and mechanical basic parameters, which ensure the correct project verification of safety related design modifications. This process considers different aspects, which guarantee that the design preserves the availability, reliability and functional capability of the Structures, Systems and Components needed to operate the Nuclear Power Station with security. Electric and mechanical reference parameters are identified and discussed as well as others related ones, which are critical to safety. The implementation procedure to develop tasks performed in any company that has a quality plan is a requirement. On the engineering business, it is important not to use the personal criteria to do a technical analysis of a project; although, many times it is the checker's criteria and knowledge responsibility to ensure the correct development of a design modification. Then, the checker capabilities are the basis of the modification verification. This kind of procedure's development is not easy, because in an engineering project with important technical contents, there are multiple scenarios, but lots of them have a common basis. If we can identify the technical common basis of these projects, we will make good project verification but there are many difficulties we can encounter along this process. (authors)

  6. Ontology Matching with Semantic Verification.

    Science.gov (United States)

    Jean-Mary, Yves R; Shironoshita, E Patrick; Kabuka, Mansur R

    2009-09-01

    ASMOV (Automated Semantic Matching of Ontologies with Verification) is a novel algorithm that uses lexical and structural characteristics of two ontologies to iteratively calculate a similarity measure between them, derives an alignment, and then verifies it to ensure that it does not contain semantic inconsistencies. In this paper, we describe the ASMOV algorithm, and then present experimental results that measure its accuracy using the OAEI 2008 tests, and that evaluate its use with two different thesauri: WordNet, and the Unified Medical Language System (UMLS). These results show the increased accuracy obtained by combining lexical, structural and extensional matchers with semantic verification, and demonstrate the advantage of using a domain-specific thesaurus for the alignment of specialized ontologies.

  7. Interpolant tree automata and their application in Horn clause verification

    DEFF Research Database (Denmark)

    Kafle, Bishoksan; Gallagher, John Patrick

    2016-01-01

    This paper investigates the combination of abstract interpretation over the domain of convex polyhedra with interpolant tree automata, in an abstraction-refinement scheme for Horn clause verification. These techniques have been previously applied separately, but are combined in a new way in this ......This paper investigates the combination of abstract interpretation over the domain of convex polyhedra with interpolant tree automata, in an abstraction-refinement scheme for Horn clause verification. These techniques have been previously applied separately, but are combined in a new way...... clause verification problems indicates that the combination of interpolant tree automaton with abstract interpretation gives some increase in the power of the verification tool, while sometimes incurring a performance overhead....

  8. Free and Reduced-Price Meal Application and Income Verification Practices in School Nutrition Programs in the United States

    Science.gov (United States)

    Kwon, Junehee; Lee, Yee Ming; Park, Eunhye; Wang, Yujia; Rushing, Keith

    2017-01-01

    Purpose/Objectives: This study assessed current practices and attitudes of school nutrition program (SNP) management staff regarding free and reduced-price (F-RP) meal application and verification in SNPs. Methods: Stratified, randomly selected 1,500 SNP management staff in 14 states received a link to an online questionnaire and/or a printed…

  9. Displacement pile installation effects in sand

    NARCIS (Netherlands)

    Beijer-Lundberg, A.

    2015-01-01

    Installation effects govern the post-installation behaviour of displacement piles in sand. These effects are currently not completely understood. Suitable experimental techniques to model these installation effects include field, laboratory and experimental models. In the current thesis a

  10. Synergies across verification regimes: Nuclear safeguards and chemical weapons convention compliance

    International Nuclear Information System (INIS)

    Kadner, Steven P.; Turpen, Elizabeth

    2001-01-01

    In the implementation of all arms control agreements, accurate verification is essential. In setting a course for verifying compliance with a given treaty - whether the NPT or the CWC, one must make a technical comparison of existing information-gathering capabilities against the constraints in an agreement. Then it must be decided whether this level of verifiability is good enough. Generally, the policy standard of 'effective verification' includes the ability to detect significant violations, with high confidence, in sufficient time to respond effectively with policy adjustments or other responses, as needed. It is at this juncture where verification approaches have traditionally diverged. Nuclear safeguards requirements have taken one path while chemical verification methods have pursued another. However, recent technological advances have brought a number of changes affecting verification, and lately their pace has been accelerating. First, all verification regimes have more and better information as a result of new kinds of sensors, imagery, and other technologies. Second, the verification provisions in agreements have also advanced, to include on-site inspections, portal monitoring, data exchanges, and a variety of transparency, confidence-building, and other cooperative measures, Together these developments translate into a technological overlap of certain institutional verification measures such as the NPT's safeguards requirements and the IAEA and the CWC's verification visions and the OPCW. Hence, a priority of international treaty-implementing organizations is exploring the development of a synergistic and coordinated approach to WMD policy making that takes into account existing inter-linkages between nuclear, chemical, and biological weapons issues. Specific areas of coordination include harmonizing information systems and information exchanges and the shared application of scientific mechanisms, as well as collaboration on technological developments

  11. Heavy water physical verification in power plants

    International Nuclear Information System (INIS)

    Morsy, S.; Schuricht, V.; Beetle, T.; Szabo, E.

    1986-01-01

    This paper is a report on the Agency experience in verifying heavy water inventories in power plants. The safeguards objectives and goals for such activities are defined in the paper. The heavy water is stratified according to the flow within the power plant, including upgraders. A safeguards scheme based on a combination of records auditing, comparing records and reports, and physical verification has been developed. This scheme has elevated the status of heavy water safeguards to a level comparable to nuclear material safeguards in bulk facilities. It leads to attribute and variable verification of the heavy water inventory in the different system components and in the store. The verification methods include volume and weight determination, sampling and analysis, non-destructive assay (NDA), and criticality check. The analysis of the different measurement methods and their limits of accuracy are discussed in the paper

  12. Specifications, tests, and installation of wires and cables for the Diablo Canyon Nuclear Power Project

    International Nuclear Information System (INIS)

    Dan, F.J.

    1977-01-01

    The process of selecting wires and cables for the Diablo Canyon Nuclear Power Project is described. The criteria for the fire and environmental tests, the basis for the specifications, and the reasons for the final choice and acceptance are outlined. A short section is dedicated to the installation of cables in raceways with reference to separation and color coding. Also covered are the selection and testing of fire stops and the selection of seismic supports

  13. A Correctness Verification Technique for Commercial FPGA Synthesis Tools

    International Nuclear Information System (INIS)

    Kim, Eui Sub; Yoo, Jun Beom; Choi, Jong Gyun; Kim, Jang Yeol; Lee, Jang Soo

    2014-01-01

    Once the FPGA (Filed-Programmable Gate Array) designers designs Verilog programs, the commercial synthesis tools automatically translate the Verilog programs into EDIF programs so that the designers can have largely focused on HDL designs for correctness of functionality. Nuclear regulation authorities, however, require more considerate demonstration of the correctness and safety of mechanical synthesis processes of FPGA synthesis tools, even if the FPGA industry have acknowledged them empirically as correct and safe processes and tools. In order to assure of the safety, the industry standards for the safety of electronic/electrical devices, such as IEC 61508 and IEC 60880, recommend using the formal verification technique. There are several formal verification tools (i.e., 'FormalPro' 'Conformal' 'Formality' and so on) to verify the correctness of translation from Verilog into EDIF programs, but it is too expensive to use and hard to apply them to the works of 3rd-party developers. This paper proposes a formal verification technique which can contribute to the correctness demonstration in part. It formally checks the behavioral equivalence between Verilog and subsequently synthesized Net list with the VIS verification system. A Net list is an intermediate output of FPGA synthesis process, and EDIF is used as a standard format of Net lists. If the formal verification succeeds, then we can assure that the synthesis process from Verilog into Net list worked correctly at least for the Verilog used. In order to support the formal verification, we developed the mechanical translator 'EDIFtoBLIFMV,' which translates EDIF into BLIF-MV as an input front-end of VIS system, while preserving their behavior equivalence.. We performed the case study with an example of a preliminary version of RPS in a Korean nuclear power plant in order to provide the efficiency of the proposed formal verification technique and implemented translator. It

  14. A Correctness Verification Technique for Commercial FPGA Synthesis Tools

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Eui Sub; Yoo, Jun Beom [Konkuk University, Seoul (Korea, Republic of); Choi, Jong Gyun; Kim, Jang Yeol; Lee, Jang Soo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-10-15

    Once the FPGA (Filed-Programmable Gate Array) designers designs Verilog programs, the commercial synthesis tools automatically translate the Verilog programs into EDIF programs so that the designers can have largely focused on HDL designs for correctness of functionality. Nuclear regulation authorities, however, require more considerate demonstration of the correctness and safety of mechanical synthesis processes of FPGA synthesis tools, even if the FPGA industry have acknowledged them empirically as correct and safe processes and tools. In order to assure of the safety, the industry standards for the safety of electronic/electrical devices, such as IEC 61508 and IEC 60880, recommend using the formal verification technique. There are several formal verification tools (i.e., 'FormalPro' 'Conformal' 'Formality' and so on) to verify the correctness of translation from Verilog into EDIF programs, but it is too expensive to use and hard to apply them to the works of 3rd-party developers. This paper proposes a formal verification technique which can contribute to the correctness demonstration in part. It formally checks the behavioral equivalence between Verilog and subsequently synthesized Net list with the VIS verification system. A Net list is an intermediate output of FPGA synthesis process, and EDIF is used as a standard format of Net lists. If the formal verification succeeds, then we can assure that the synthesis process from Verilog into Net list worked correctly at least for the Verilog used. In order to support the formal verification, we developed the mechanical translator 'EDIFtoBLIFMV,' which translates EDIF into BLIF-MV as an input front-end of VIS system, while preserving their behavior equivalence.. We performed the case study with an example of a preliminary version of RPS in a Korean nuclear power plant in order to provide the efficiency of the proposed formal verification technique and implemented translator. It

  15. Logic verification system for power plant sequence diagrams

    International Nuclear Information System (INIS)

    Fukuda, Mitsuko; Yamada, Naoyuki; Teshima, Toshiaki; Kan, Ken-ichi; Utsunomiya, Mitsugu.

    1994-01-01

    A logic verification system for sequence diagrams of power plants has been developed. The system's main function is to verify correctness of the logic realized by sequence diagrams for power plant control systems. The verification is based on a symbolic comparison of the logic of the sequence diagrams with the logic of the corresponding IBDs (interlock Block Diagrams) in combination with reference to design knowledge. The developed system points out the sub-circuit which is responsible for any existing mismatches between the IBD logic and the logic realized by the sequence diagrams. Applications to the verification of actual sequence diagrams of power plants confirmed that the developed system is practical and effective. (author)

  16. Formal verification of complex properties on PLC programs

    CERN Document Server

    Darvas, D; Voros, A; Bartha, T; Blanco Vinuela, E; Gonzalez Suarez, V M

    2014-01-01

    Formal verification has become a recommended practice in the safety-critical application areas. However, due to the complexity of practical control and safety systems, the state space explosion often prevents the use of formal analysis. In this paper we extend our former verification methodology with effective property preserving reduction techniques. For this purpose we developed general rule-based reductions and a customized version of the Cone of Influence (COI) reduction. Using these methods, the verification of complex requirements formalised with temporal logics (e.g. CTL, LTL) can be orders of magnitude faster. We use the NuSMV model checker on a real-life PLC program from CERN to demonstrate the performance of our reduction techniques.

  17. Implementation and verification of global optimization benchmark problems

    Science.gov (United States)

    Posypkin, Mikhail; Usov, Alexander

    2017-12-01

    The paper considers the implementation and verification of a test suite containing 150 benchmarks for global deterministic box-constrained optimization. A C++ library for describing standard mathematical expressions was developed for this purpose. The library automate the process of generating the value of a function and its' gradient at a given point and the interval estimates of a function and its' gradient on a given box using a single description. Based on this functionality, we have developed a collection of tests for an automatic verification of the proposed benchmarks. The verification has shown that literary sources contain mistakes in the benchmarks description. The library and the test suite are available for download and can be used freely.

  18. Projected Impact of Compositional Verification on Current and Future Aviation Safety Risk

    Science.gov (United States)

    Reveley, Mary S.; Withrow, Colleen A.; Leone, Karen M.; Jones, Sharon M.

    2014-01-01

    The projected impact of compositional verification research conducted by the National Aeronautic and Space Administration System-Wide Safety and Assurance Technologies on aviation safety risk was assessed. Software and compositional verification was described. Traditional verification techniques have two major problems: testing at the prototype stage where error discovery can be quite costly and the inability to test for all potential interactions leaving some errors undetected until used by the end user. Increasingly complex and nondeterministic aviation systems are becoming too large for these tools to check and verify. Compositional verification is a "divide and conquer" solution to addressing increasingly larger and more complex systems. A review of compositional verification research being conducted by academia, industry, and Government agencies is provided. Forty-four aviation safety risks in the Biennial NextGen Safety Issues Survey were identified that could be impacted by compositional verification and grouped into five categories: automation design; system complexity; software, flight control, or equipment failure or malfunction; new technology or operations; and verification and validation. One capability, 1 research action, 5 operational improvements, and 13 enablers within the Federal Aviation Administration Joint Planning and Development Office Integrated Work Plan that could be addressed by compositional verification were identified.

  19. Towards automatic verification of ladder logic programs

    OpenAIRE

    Zoubek , Bohumir; Roussel , Jean-Marc; Kwiatkowska , Martha

    2003-01-01

    International audience; Control system programs are usually validated by testing prior to their deployment. Unfortunately, testing is not exhaustive and therefore it is possible that a program which passed all the required tests still contains errors. In this paper we apply techniques of automatic verification to a control program written in ladder logic. A model is constructed mechanically from the ladder logic program and subjected to automatic verification against requirements that include...

  20. Inventory verification measurements using neutron multiplicity counting

    International Nuclear Information System (INIS)

    Ensslin, N.; Foster, L.A.; Harker, W.C.; Krick, M.S.; Langner, D.G.

    1998-01-01

    This paper describes a series of neutron multiplicity measurements of large plutonium samples at the Los Alamos Plutonium Facility. The measurements were corrected for bias caused by neutron energy spectrum shifts and nonuniform multiplication, and are compared with calorimetry/isotopics. The results show that multiplicity counting can increase measurement throughput and yield good verification results for some inventory categories. The authors provide recommendations on the future application of the technique to inventory verification

  1. VACOSS 3, a versatile and tamper-resistant electronic sealing system

    International Nuclear Information System (INIS)

    Arning, F.; Reuters, H.; Bueker, H.

    1981-01-01

    Seal systems for c/s instrumentation used at present need considerable technical and personal expenditure for installation and verification. This paper describes new electronic seal system VACOSS 3, developed by ProCom GmbH, Aachen, and the Nuclear Research Center Juelich within the frame work of an IAEA research contract. This system allows simple installation, verification, the possibility of remote verification and has high tamper resistance

  2. Biometric Subject Verification Based on Electrocardiographic Signals

    Science.gov (United States)

    Dusan, Sorin V. (Inventor); Jorgensen, Charles C. (Inventor)

    2014-01-01

    A method of authenticating or declining to authenticate an asserted identity of a candidate-person. In an enrollment phase, a reference PQRST heart action graph is provided or constructed from information obtained from a plurality of graphs that resemble each other for a known reference person, using a first graph comparison metric. In a verification phase, a candidate-person asserts his/her identity and presents a plurality of his/her heart cycle graphs. If a sufficient number of the candidate-person's measured graphs resemble each other, a representative composite graph is constructed from the candidate-person's graphs and is compared with a composite reference graph, for the person whose identity is asserted, using a second graph comparison metric. When the second metric value lies in a selected range, the candidate-person's assertion of identity is accepted.

  3. Remedial activities effectiveness verification in tailing areas.

    Science.gov (United States)

    Kluson, J; Thinova, L; Neznal, M; Svoboda, T

    2015-06-01

    The complex radiological study of the basin of sludge from the uranium ore mining and preprocessing was done. Air kerma rates (including its spectral analysis) at the reference height of 1 m above ground over the whole area were measured and radiation fields mapped during two measuring campaigns (years 2009 and 2014). K, U and Th concentrations in sludge and concentrations in depth profiles (including radon concentration and radon exhalation rates) in selected points were determined using gamma spectrometry for in situ as well as laboratory samples measurement. Results were used for the analysis, design evaluation and verification of the efficiency of the remediation measures. Efficiency of the sludge basin covering by the inert material was modelled using MicroShield code. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  4. New fast reactor installation concept

    International Nuclear Information System (INIS)

    Anon.

    1976-01-01

    The large size and complexity of fast reactor installations are emphasised and these difficulties will be increased with the advent of fast reactors of higher power. In this connection a new concept of fast reactor installation is described with a view to reducing the size of the installation and enabling most components, including even the primary vessel, to be constructed within the confines of a workshop. Full constructional details are given. (U.K.)

  5. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards (including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  6. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards (including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security.

  7. FY 1998 report on the results of the New Sunshine Project - Development of the commercialization technology of the photovoltaic power system. Verification study of the photovoltaic power system - Research on engineering methods for cost effective PV installation (Data book. Survey of examples of PV systems in the world); 1998 nendo taiyoko hatsuden system jitsuyoka gijutsu kaihatsu seika hokokusho. Taiyoko hatsuden system no jissho kenkyu (tashu secchi koho no kenkyu kaihatsu (bessatsu data shu sekai no taiyoko hatsuden system jirei chosa))

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    For the purpose of promoting installations of PV system and making use of the unused space for which a rise in the PV demand equal to that in houses, building roofs, etc. is expected, examination/research for much newer forms of land installation are proceeded with, and evaluation/verification of reliability/durability are conducted of new installation processes using thin film solar cells, adhesives, etc. In this fiscal year, for the purpose of contributing to the study to be widely made on various installation processes, the actual survey was conducted of various applications of the system which are being planned and introduced in Japan and abroad. Emphasis was placed on making new forms of installation applicable to Japan clear. Concretely, in addition to the study of new examples, the following were conducted: renewal of existing details of the survey, and electronic filing of system block charts/pictures as a key to the information supply by electronic media such as CD-ROM. Also conducted was a study for translating the contents into English or writing them both in Japanese and English. Further, the database was made newer using these results of the most up-to-date survey, and at the same time, the results were indicated of the statistical analysis of the usage, system form, power generation scale and element equipment of various systems. (NEDO)

  8. Verification Games: Crowd-Sourced Formal Verification

    Science.gov (United States)

    2016-03-01

    additional paintbrushes. Additionally, in Paradox , human players are never given small optimization problems (for example, toggling the values of 50...were developed by the Center for Game Science: Pipe Jam, Traffic Jam, Flow Jam and Paradox . Verification tools and games were integrated to verify...4 4. Paradox …………………………………………………......5 5. MyClass ………………………………………………….....7 6. Results …………………………………………………......11 7. Time to

  9. Verification of product design using regulation knowledge base and Web services

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ik June [KAERI, Daejeon (Korea, Republic of); Lee, Jae Chul; Mun Du Hwan [Kyungpook National University, Daegu (Korea, Republic of); Kim, Byung Chul [Dong-A University, Busan (Korea, Republic of); Hwang, Jin Sang [PartDB Co., Ltd., Daejeom (Korea, Republic of); Lim, Chae Ho [Korea Institute of Industrial Technology, Incheon (Korea, Republic of)

    2015-11-15

    Since product regulations contain important rules or codes that manufacturers must follow, automatic verification of product design with the regulations related to a product is necessary. For this, this study presents a new method for the verification of product design using regulation knowledge base and Web services. Regulation knowledge base consisting of product ontology and rules was built with a hybrid technique combining ontology and programming languages. Web service for design verification was developed ensuring the flexible extension of knowledge base. By virtue of two technical features, design verification is served to various products while the change of system architecture is minimized.

  10. Verification of product design using regulation knowledge base and Web services

    International Nuclear Information System (INIS)

    Kim, Ik June; Lee, Jae Chul; Mun Du Hwan; Kim, Byung Chul; Hwang, Jin Sang; Lim, Chae Ho

    2015-01-01

    Since product regulations contain important rules or codes that manufacturers must follow, automatic verification of product design with the regulations related to a product is necessary. For this, this study presents a new method for the verification of product design using regulation knowledge base and Web services. Regulation knowledge base consisting of product ontology and rules was built with a hybrid technique combining ontology and programming languages. Web service for design verification was developed ensuring the flexible extension of knowledge base. By virtue of two technical features, design verification is served to various products while the change of system architecture is minimized.

  11. Compromises produced by the dialectic between self-verification and self-enhancement.

    Science.gov (United States)

    Morling, B; Epstein, S

    1997-12-01

    Three studies of people's reactions to evaluative feedback demonstrated that the dialectic between self-enhancement and self-verification results in compromises between these 2 motives, as hypothesized in cognitive-experiential self-theory. The demonstration was facilitated by 2 procedural improvements: Enhancement and verification were established by calibrating evaluative feedback against self appraisals, and degree of enhancement and of verification were varied along a continuum, rather than categorically. There was also support for the hypotheses that processing in an intuitive-experiential mode favors enhancement and processing in an analytical-rational mode favors verification in the kinds of situations investigated.

  12. Calibration and verification of surface contamination meters --- Procedures and techniques

    International Nuclear Information System (INIS)

    Schuler, C; Butterweck, G.; Wernli, C.; Bochud, F.; Valley, J.-F.

    2007-03-01

    A standardised measurement procedure for surface contamination meters (SCM) is presented. The procedure aims at rendering surface contamination measurements to be simply and safely interpretable. Essential for the approach is the introduction and common use of the radionuclide specific quantity 'guideline value' specified in the Swiss Radiation Protection Ordinance as unit for the measurement of surface activity. The according radionuclide specific 'guideline value count rate' can be summarized as verification reference value for a group of radionuclides ('basis guideline value count rate'). The concept can be generalized for SCM of the same type or for SCM of different types using he same principle of detection. A SCM multi source calibration technique is applied for the determination of the instrument efficiency. Four different electron radiation energy regions, four different photon radiation energy regions and an alpha radiation energy region are represented by a set of calibration sources built according to ISO standard 8769-2. A guideline value count rate representing the activity per unit area of a surface contamination of one guideline value can be calculated for any radionuclide using instrument efficiency, radionuclide decay data, contamination source efficiency, guideline value averaging area (100 cm 2 ), and radionuclide specific guideline value. n this way, instrument responses for the evaluation of surface contaminations are obtained for radionuclides without available calibration sources as well as for short-Iived radionuclides, for which the continuous replacement of certified calibration sources can lead to unreasonable costs. SCM verification is based on surface emission rates of reference sources with an active area of 100 cm 2 . The verification for a given list of radionuclides is based on the radionuclide specific quantity guideline value count rate. Guideline value count rates for groups of radionuclides can be represented within the maximum

  13. Engineering development of a digital replacement protection system at an operating US PWR nuclear power plant: Installation and operational experiences

    International Nuclear Information System (INIS)

    Miller, M.H.

    1995-01-01

    The existing Reactor Protection Systems (RPSs) at most US PWRs are systems which reflect 25 to 30 year-old designs, components and manufacturing techniques. Technological improvements, especially in relation to modern digital systems, offer improvements in functionality, performance, and reliability, as well as reductions in maintenance and operational burden. The Nuclear power industry and the US nuclear regulators are poised to move forward with the issues that have slowed the transition to modern digital replacements for nuclear power plant safety systems. The electric utility industry is now more than ever being driven by cost versus benefit decisions. Properly designed, engineered, and installed digital systems can provide adequate cost-benefit and allow continued nuclear generated electricity. This paper describes various issues and areas related to an ongoing RPS replacement demonstration project which are pertinant for a typical US nuclear plant to consider cost-effective replacement of an aging analog RPS with a modern digital RPS. The following subject areas relative to the Oconee Nuclear Station ISAT trademark Demonstrator project are discussed: Operator Interface Development; Equipment Qualification; Validation and Verification of Software; Factory Testing; Field Changes and Verification Testing; Utility Operational, Engineering and Maintenance; Experiences with Demonstration System; and Ability to operate in parallel with the existing Analog RPS

  14. Engineering development of a digital replacement protection system at an operating US PWR nuclear power plant: Installation and operational experiences

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M.H. [Duke Power Co., Seneca, SC (United States)

    1995-04-01

    The existing Reactor Protection Systems (RPSs) at most US PWRs are systems which reflect 25 to 30 year-old designs, components and manufacturing techniques. Technological improvements, especially in relation to modern digital systems, offer improvements in functionality, performance, and reliability, as well as reductions in maintenance and operational burden. The Nuclear power industry and the US nuclear regulators are poised to move forward with the issues that have slowed the transition to modern digital replacements for nuclear power plant safety systems. The electric utility industry is now more than ever being driven by cost versus benefit decisions. Properly designed, engineered, and installed digital systems can provide adequate cost-benefit and allow continued nuclear generated electricity. This paper describes various issues and areas related to an ongoing RPS replacement demonstration project which are pertinant for a typical US nuclear plant to consider cost-effective replacement of an aging analog RPS with a modern digital RPS. The following subject areas relative to the Oconee Nuclear Station ISAT{trademark} Demonstrator project are discussed: Operator Interface Development; Equipment Qualification; Validation and Verification of Software; Factory Testing; Field Changes and Verification Testing; Utility Operational, Engineering and Maintenance; Experiences with Demonstration System; and Ability to operate in parallel with the existing Analog RPS.

  15. DAQ INSTALLATION IN USC COMPLETED

    CERN Multimedia

    A. Racz

    After one year of work at P5 in the underground control rooms (USC55-S1&S2), the DAQ installation in USC55 is completed. The first half of 2006 was dedicated to the DAQ infrastructures installation (private cable trays, rack equipment for a very dense cabling, connection to services i.e. water, power, network). The second half has been spent to install the custom made electronics (FRLs and FMMs) and place all the inter-rack cables/fibers connecting all sub-systems to central DAQ (more details are given in the internal pages). The installation has been carried out by DAQ group members, coming from the hardware and software side as well. The pictures show the very nice team spirit !

  16. Integrated knowledge base tool for acquisition and verification of NPP alarm systems

    International Nuclear Information System (INIS)

    Park, Joo Hyun; Seong, Poong Hyun

    1998-01-01

    Knowledge acquisition and knowledge base verification are important activities in developing knowledge-based systems such as alarm processing systems. In this work, we developed the integrated tool, for knowledge acquisition and verification of NPP alarm processing systems, by using G2 tool. The tool integrates document analysis method and ECPN matrix analysis method, for knowledge acquisition and knowledge verification, respectively. This tool enables knowledge engineers to perform their tasks from knowledge acquisition to knowledge verification consistently

  17. Planning of installations in prefabricated buildings

    Directory of Open Access Journals (Sweden)

    Stanojević Ana D.

    2014-01-01

    Full Text Available Planning installations is becoming an increasing problem in construction, because the number of devices for technical supply is constantly increasing with continual progress in science and technology. Since the installations of the building can not be viewed unrelated of the construction, problem of its planning is more complicated in prefabricated buildings because the elements of construction are prefabricated. Planning was formerly performed by embedding the installation in prefabricated elements. This method had a lot of flaws, and modern approach tends setting installation out of prefabricated elements except when the traditional approach proves as economical. Although the hot water heating with radiators is the most practical way of heating in prefabricated buildings, the under floor heating systems have greater and greater use. Today, prefabricated sanitary cabins have a huge use and they are much more economical in comparison to special panels for bathrooms that were once create. Approaches in terms of planning electrical installation are different, but for conventional constructed buildings, as well as prefabricated buildings, the use of lightweight prefabricated walls with embedded installations, today is recommended, when the room is loaded with a large number of this installations and if it is possible.

  18. Electrical installations technology

    CERN Document Server

    Whitfield, J F

    1968-01-01

    Electrical Installations Technology covers the syllabus of the City and Guilds of London Institute course No. 51, the "Electricians B Certificate”. This book is composed of 15 chapters that deal with basic electrical science and electrical installations. The introductory chapters discuss the fundamentals and basic electrical principles, including the concept of mechanics, heat, magnetic fields, electric currents, power, and energy. These chapters also explore the atomic theory of electric current and the electric circuit, conductors, and insulators. The subsequent chapter focuses on the chemis

  19. Transmutation Fuel Performance Code Thermal Model Verification

    Energy Technology Data Exchange (ETDEWEB)

    Gregory K. Miller; Pavel G. Medvedev

    2007-09-01

    FRAPCON fuel performance code is being modified to be able to model performance of the nuclear fuels of interest to the Global Nuclear Energy Partnership (GNEP). The present report documents the effort for verification of the FRAPCON thermal model. It was found that, with minor modifications, FRAPCON thermal model temperature calculation agrees with that of the commercial software ABAQUS (Version 6.4-4). This report outlines the methodology of the verification, code input, and calculation results.

  20. Verification and Validation of RADTRAN 5.5.

    Energy Technology Data Exchange (ETDEWEB)

    Osborn, Douglas.; Weiner, Ruth F.; Mills, George Scott; Hamp, Steve C.

    2005-02-01

    This document contains a description of the verification and validation process used for the RADTRAN 5.5 code. The verification and validation process ensured the proper calculational models and mathematical and numerical methods were used in the RADTRAN 5.5 code for the determination of risk and consequence assessments. The differences between RADTRAN 5 and RADTRAN 5.5 are the addition of tables, an expanded isotope library, and the additional User-Defined meteorological option for accident dispersion. 3

  1. Comparing formal verification approaches of interlocking systems

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Nguyen, Hoang Nga; Roggenbach, Markus

    2016-01-01

    these approaches. As a first step towards this, in this paper we suggest a way to compare different formal approaches for verifying designs of route-based interlocking systems and we demonstrate it on modelling and verification approaches developed within the research groups at DTU/Bremen and at Surrey......The verification of railway interlocking systems is a challenging task, and therefore several research groups have suggested to improve this task by using formal methods, but they use different modelling and verification approaches. To advance this research, there is a need to compare....../Swansea. The focus is on designs that are specified by so-called control tables. The paper can serve as a starting point for further comparative studies. The DTU/Bremen research has been funded by the RobustRailS project granted by Innovation Fund Denmark. The Surrey/Swansea research has been funded by the Safe...

  2. Flat-plate solar collector - installation package

    Science.gov (United States)

    1978-01-01

    Package includes installation, operation and maintenance manual for collector, analysis of safety hazards, special handling instructions, materials list, installation drawings, and warranty and certification statement. Manual includes instructions for roof preparation and for preparing collector for installation. Several pages are devoted to major and minor repairs.

  3. A GIS support system for declaration and verification

    International Nuclear Information System (INIS)

    Poucet, A.; Contini, S.; Bellezza, F.

    2001-01-01

    Full text: The timely detection of a diversion of a significant amount of nuclear material from the civil cycle represents a complex activity that requires the use of powerful support systems. In this field the authors developed SIT (Safeguards Inspection Tool), an integrated platform for collecting, managing and analysing data from a variety of sources to support declarations and verification activities. Information dealt with is that requested by both INFCIRC/153 and INFCIRC/540 protocols. SIT is based on a low-cost Geographic Information System platform and extensive use is made of commercial software to reduce maintenance costs. The system has been developed using ARCVIEW GIS for Windows NT platforms. SIT is conceived as an integrator of multimedia information stored into local and remote databases; efforts have been focused on the automation of several tasks in order to produce a user-friendly system. Main characteristics of SIT are: Capability to deal with multimedia data, e.g. text, images, video, using user-selected COTS; Easy access to external databases, e.g. Oracle, Informix, Sybase, MS-Access, directly from the site map; Selected access to open source information via Internet; Capability to easily geo-reference site maps, to generate thematic layers of interest and to perform spatial analysis; Capability of performing aerial and satellite image analysis operations, e.g. rectification, change detection, feature extraction; Capability to easily add and run external models for e.g. material data accounting, completeness check, air dispersion models, material flow graph generation and to describe results in graphical form; Capability to use a Geo-positioning systems (GPS) with a portable computer, SIT is at an advanced stage of development and will be very soon interfaced with VERITY, a powerful Web search engine in order to allow open source information retrieval from geographical maps. The paper will describe the main features of SIT and the advantages of

  4. A GIS support system for declaration and verification

    Energy Technology Data Exchange (ETDEWEB)

    Poucet, A; Contini, S; Bellezza, F [European Commission, Joint Research Centre, Institute for Systems Informatics and Safety (ISIS), Ispra (Italy)

    2001-07-01

    Full text: The timely detection of a diversion of a significant amount of nuclear material from the civil cycle represents a complex activity that requires the use of powerful support systems. In this field the authors developed SIT (Safeguards Inspection Tool), an integrated platform for collecting, managing and analysing data from a variety of sources to support declarations and verification activities. Information dealt with is that requested by both INFCIRC/153 and INFCIRC/540 protocols. SIT is based on a low-cost Geographic Information System platform and extensive use is made of commercial software to reduce maintenance costs. The system has been developed using ARCVIEW GIS for Windows NT platforms. SIT is conceived as an integrator of multimedia information stored into local and remote databases; efforts have been focused on the automation of several tasks in order to produce a user-friendly system. Main characteristics of SIT are: Capability to deal with multimedia data, e.g. text, images, video, using user-selected COTS; Easy access to external databases, e.g. Oracle, Informix, Sybase, MS-Access, directly from the site map; Selected access to open source information via Internet; Capability to easily geo-reference site maps, to generate thematic layers of interest and to perform spatial analysis; Capability of performing aerial and satellite image analysis operations, e.g. rectification, change detection, feature extraction; Capability to easily add and run external models for e.g. material data accounting, completeness check, air dispersion models, material flow graph generation and to describe results in graphical form; Capability to use a Geo-positioning systems (GPS) with a portable computer, SIT is at an advanced stage of development and will be very soon interfaced with VERITY, a powerful Web search engine in order to allow open source information retrieval from geographical maps. The paper will describe the main features of SIT and the advantages of

  5. Implementation and verification of global optimization benchmark problems

    Directory of Open Access Journals (Sweden)

    Posypkin Mikhail

    2017-12-01

    Full Text Available The paper considers the implementation and verification of a test suite containing 150 benchmarks for global deterministic box-constrained optimization. A C++ library for describing standard mathematical expressions was developed for this purpose. The library automate the process of generating the value of a function and its’ gradient at a given point and the interval estimates of a function and its’ gradient on a given box using a single description. Based on this functionality, we have developed a collection of tests for an automatic verification of the proposed benchmarks. The verification has shown that literary sources contain mistakes in the benchmarks description. The library and the test suite are available for download and can be used freely.

  6. Remote age verification to prevent underage alcohol sales. First results from Dutch liquor stores and the economic viability of national adoption.

    Science.gov (United States)

    van Hoof, Joris J; van Velthoven, Ben C J

    2015-04-01

    Alcohol consumption among minors is a popular topic in the public health debate, also in the Netherlands. Compliance with the legal age limits for selling alcohol proves to be rather low. Some Dutch liquor stores (outlets with an exclusive license to sell off-premise drinks with 15% alcohol or more) have recently adopted a remote age verification system. This paper discusses the first results of the use of the system. We use data from 67 liquor stores that adopted Ageviewers, a remote age verification system, in 2011. A remote validator judges the customer's age using camera footage and asks for an ID if there is any doubt. The system then sends a signal to the cash register, which approves or rejects the alcohol purchase. From the 367346 purchase attempts in the database, 8374 were rejected or aborted for age-related reasons. This figure amounts to an average ratio of 1.12 underage alcohol purchase attempts per sales day in each participating liquor store. Scaling up to a national level, the figures suggest at least 1 million underage alcohol purchase attempts per year in Dutch liquor stores. Underage alcohol purchases can be prevented by the nationwide adoption of remote age verification. However, given the lax enforcement of the age limits by the government, adopting such a system on a voluntary basis is generally not in the economic interest of the liquor stores. Obligatory installation of the system in off-premise alcohol outlets may pass a social cost-benefit test if certain conditions are fulfilled. Copyright © 2014 Elsevier B.V. All rights reserved.

  7. Integrated Java Bytecode Verification

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian; Franz, Michael

    2005-01-01

    Existing Java verifiers perform an iterative data-flow analysis to discover the unambiguous type of values stored on the stack or in registers. Our novel verification algorithm uses abstract interpretation to obtain definition/use information for each register and stack location in the program...

  8. Radiochemical verification and validation in the environmental data collection process

    International Nuclear Information System (INIS)

    Rosano-Reece, D.; Bottrell, D.; Bath, R.J.

    1994-01-01

    A credible and cost effective environmental data collection process should produce analytical data which meets regulatory and program specific requirements. Analytical data, which support the sampling and analysis activities at hazardous waste sites, undergo verification and independent validation before the data are submitted to regulators. Understanding the difference between verification and validation and their respective roles in the sampling and analysis process is critical to the effectiveness of a program. Verification is deciding whether the measurement data obtained are what was requested. The verification process determines whether all the requirements were met. Validation is more complicated than verification. It attempts to assess the impacts on data use, especially when requirements are not met. Validation becomes part of the decision-making process. Radiochemical data consists of a sample result with an associated error. Therefore, radiochemical validation is different and more quantitative than is currently possible for the validation of hazardous chemical data. Radiochemical data include both results and uncertainty that can be statistically compared to identify significance of differences in a more technically defensible manner. Radiochemical validation makes decisions about analyte identification, detection, and uncertainty for a batch of data. The process focuses on the variability of the data in the context of the decision to be made. The objectives of this paper are to present radiochemical verification and validation for environmental data and to distinguish the differences between the two operations

  9. Installations of SNCR on bark-fired boilers; Uppfoeljning av SNCR-installationer paa barkpannor

    Energy Technology Data Exchange (ETDEWEB)

    Hjalmarsson, A.K.; Hedin, K. [AaF-Energikonsult, Stockholm (Sweden); Andersson, Lars [AaF-IPK (Sweden)

    1997-01-01

    Experience has been collected from the twelve bark-fired boilers in Sweden with selective non catalytic reduction (SNCR) installations to reduce emissions of nitrogen oxides. Most of the boilers have slope grates, but there are also two boilers with cyclone ovens and two fluidized bed boilers. In addition to oil there are also possibilities to burn other fuel types in most boilers, such as sludge from different parts of the pulp and paper mills, saw dust and wood chips. The SNCR installations seems in general to be of simple design. In most installations the injection nozzles are located in existing holes in the boiler walls. The availability is reported to be good from several of the SNCR installations. There has been tube leakage in several boilers. The urea system has resulted in corrosion and in clogging of one oil burner. This incident has resulted in a decision not to use SNCR system with the present design of the system. The fuel has also caused operational problems with the SNCR system in several of the installations due to variations in the moisture content and often high moisture content in bark and sludge, causing temperature variations. The availability is presented to be high for the SNCR system at several of the plants, in two of them about 90 %. The results in NO{sub x} reduction vary between the installations depending on boiler, fuel and operation. The emissions are between 45 and 100 mg NO{sub 2}/MJ fuel input and the NO{sub x} reduction rates are in most installations between 30 and 40 %, the lowest 20 and the highest 70 %. 13 figs, 3 tabs

  10. Project report: Experimental planning and verification of working fluids (WP 5)

    DEFF Research Database (Denmark)

    Babi, Deenesh Kavi

    working fluid candidates a database is required that can be simultaneously searched in order to differentiate and determine whether the generated candidates are existing or novel. Also, the next step upon selection of the candidates is performing experiments in order to test and verify the generated...... working fluids. If performed properly, the experimental step is solely verification. Experiments can either be performed virtually (in order to further reduce the number of required experiments) and/or physically. Therefore the objective of this work was the development of a database of existing working......Computer-aided molecular design (CAMD) helps in the reduction of experiments for the selection/design of optimal working fluids. In reducing the number of experiments, solutions obtain by trial and error is replaced by solutions that are based on mixture-process properties. In generating optimal...

  11. Automatic verification of a lip-synchronisation protocol using Uppaal

    NARCIS (Netherlands)

    Bowman, H.; Faconti, G.; Katoen, J.-P.; Latella, D.; Massink, M.

    1998-01-01

    We present the formal specification and verification of a lip-synchronisation protocol using the real-time model checker Uppaal. A number of specifications of this protocol can be found in the literature, but this is the first automatic verification. We take a published specification of the

  12. Numident Online Verification Utility (NOVU)

    Data.gov (United States)

    Social Security Administration — NOVU is a mainframe application that accesses the NUMIDENT to perform real-time SSN verifications. This program is called by other SSA online programs that serve as...

  13. TomoTherapy MLC verification using exit detector data

    Energy Technology Data Exchange (ETDEWEB)

    Chen Quan; Westerly, David; Fang Zhenyu; Sheng, Ke; Chen Yu [TomoTherapy Inc., 1240 Deming Way, Madison, Wisconsin 53717 (United States); Department of Radiation Oncology, University of Colorado School of Medicine, Aurora, Colorado 80045 (United States); Xinghua Cancer Hospital, Xinghua, Jiangsu 225700 (China); Department of Radiation Oncology, University of California-Los Angeles, Los Angeles, California 90095 (United States); TomoTherapy Inc., 1240 Deming Way, Madison, Wisconsin 53717 (United States)

    2012-01-15

    Purpose: Treatment delivery verification (DV) is important in the field of intensity modulated radiation therapy (IMRT). While IMRT and image guided radiation therapy (IGRT), allow us to create more conformal plans and enables the use of tighter margins, an erroneously executed plan can have detrimental effects on the treatment outcome. The purpose of this study is to develop a DV technique to verify TomoTherapy's multileaf collimator (MLC) using the onboard mega-voltage CT detectors. Methods: The proposed DV method uses temporal changes in the MVCT detector signal to predict actual leaf open times delivered on the treatment machine. Penumbra and scattered radiation effects may produce confounding results when determining leaf open times from the raw detector data. To reduce the impact of the effects, an iterative, Richardson-Lucy (R-L) deconvolution algorithm is applied. Optical sensors installed on each MLC leaf are used to verify the accuracy of the DV technique. The robustness of the DV technique is examined by introducing different attenuation materials in the beam. Additionally, the DV technique has been used to investigate several clinical plans which failed to pass delivery quality assurance (DQA) and was successful in identifying MLC timing discrepancies as the root cause. Results: The leaf open time extracted from the exit detector showed good agreement with the optical sensors under a variety of conditions. Detector-measured leaf open times agreed with optical sensor data to within 0.2 ms, and 99% of the results agreed within 8.5 ms. These results changed little when attenuation was added in the beam. For the clinical plans failing DQA, the dose calculated from reconstructed leaf open times played an instrumental role in discovering the root-cause of the problem. Throughout the retrospective study, it is found that the reconstructed dose always agrees with measured doses to within 1%. Conclusions: The exit detectors in the TomoTherapy treatment

  14. TomoTherapy MLC verification using exit detector data

    International Nuclear Information System (INIS)

    Chen Quan; Westerly, David; Fang Zhenyu; Sheng, Ke; Chen Yu

    2012-01-01

    Purpose: Treatment delivery verification (DV) is important in the field of intensity modulated radiation therapy (IMRT). While IMRT and image guided radiation therapy (IGRT), allow us to create more conformal plans and enables the use of tighter margins, an erroneously executed plan can have detrimental effects on the treatment outcome. The purpose of this study is to develop a DV technique to verify TomoTherapy's multileaf collimator (MLC) using the onboard mega-voltage CT detectors. Methods: The proposed DV method uses temporal changes in the MVCT detector signal to predict actual leaf open times delivered on the treatment machine. Penumbra and scattered radiation effects may produce confounding results when determining leaf open times from the raw detector data. To reduce the impact of the effects, an iterative, Richardson-Lucy (R-L) deconvolution algorithm is applied. Optical sensors installed on each MLC leaf are used to verify the accuracy of the DV technique. The robustness of the DV technique is examined by introducing different attenuation materials in the beam. Additionally, the DV technique has been used to investigate several clinical plans which failed to pass delivery quality assurance (DQA) and was successful in identifying MLC timing discrepancies as the root cause. Results: The leaf open time extracted from the exit detector showed good agreement with the optical sensors under a variety of conditions. Detector-measured leaf open times agreed with optical sensor data to within 0.2 ms, and 99% of the results agreed within 8.5 ms. These results changed little when attenuation was added in the beam. For the clinical plans failing DQA, the dose calculated from reconstructed leaf open times played an instrumental role in discovering the root-cause of the problem. Throughout the retrospective study, it is found that the reconstructed dose always agrees with measured doses to within 1%. Conclusions: The exit detectors in the TomoTherapy treatment systems

  15. Verification of Space Weather Forecasts using Terrestrial Weather Approaches

    Science.gov (United States)

    Henley, E.; Murray, S.; Pope, E.; Stephenson, D.; Sharpe, M.; Bingham, S.; Jackson, D.

    2015-12-01

    The Met Office Space Weather Operations Centre (MOSWOC) provides a range of 24/7 operational space weather forecasts, alerts, and warnings, which provide valuable information on space weather that can degrade electricity grids, radio communications, and satellite electronics. Forecasts issued include arrival times of coronal mass ejections (CMEs), and probabilistic forecasts for flares, geomagnetic storm indices, and energetic particle fluxes and fluences. These forecasts are produced twice daily using a combination of output from models such as Enlil, near-real-time observations, and forecaster experience. Verification of forecasts is crucial for users, researchers, and forecasters to understand the strengths and limitations of forecasters, and to assess forecaster added value. To this end, the Met Office (in collaboration with Exeter University) has been adapting verification techniques from terrestrial weather, and has been working closely with the International Space Environment Service (ISES) to standardise verification procedures. We will present the results of part of this work, analysing forecast and observed CME arrival times, assessing skill using 2x2 contingency tables. These MOSWOC forecasts can be objectively compared to those produced by the NASA Community Coordinated Modelling Center - a useful benchmark. This approach cannot be taken for the other forecasts, as they are probabilistic and categorical (e.g., geomagnetic storm forecasts give probabilities of exceeding levels from minor to extreme). We will present appropriate verification techniques being developed to address these forecasts, such as rank probability skill score, and comparing forecasts against climatology and persistence benchmarks. As part of this, we will outline the use of discrete time Markov chains to assess and improve the performance of our geomagnetic storm forecasts. We will also discuss work to adapt a terrestrial verification visualisation system to space weather, to help

  16. Verification of tritium production evaluation procedure using Monte Carlo code MCNP for in-pile test of fusion blanket with JMTR

    International Nuclear Information System (INIS)

    Nagao, Y.; Nakamichi, K.; Tsuchiya, M.; Ishitsuka, E.; Kawamura, H.

    2000-01-01

    To evaluate exactly the total amount of tritium production in tritium breeding materials during in-pile test with JMTR, the 'tritium monitor' has been produced and evaluation of total tritium generation was done by using 'tritium monitor' in preliminary in-pile mock-up, and verification of procedure concerning tritium production evaluation was conducted by using Monte Carlo code MCNP and nuclear cross section library of FSXLIBJ3R2. Li-Al alloy (Li 3.4 wt.%, 95.5% enrichment of 6 Li) was selected as tritium monitor material for the evaluation on the total amount of tritium production in high 6 Li enriched materials. From the results of preliminary experiment, calculated amounts of total tritium production at each 'tritium monitor', which was installed in the preliminary in-pile mock-up, were about 50-290% higher than the measured values. Concerning tritium measurement, increase of measurement error in tritium leak form measuring system to measure small amount of tritium (0.2-0.7 mCi in tritium monitor) was found in the results of present experiment. The tendency for overestimation of calculated thermal neutron flux in the range of 1-6x10 13 n cm -2 per s was found in JMTR and the reason may be due to the beryllium cross section data base in JENDL3.2

  17. Verification of tritium production evaluation procedure using Monte Carlo code MCNP for in-pile test of fusion blanket with JMTR

    Energy Technology Data Exchange (ETDEWEB)

    Nagao, Y. E-mail: nagao@jmtr.oarai.jaeri.go.jp; Nakamichi, K.; Tsuchiya, M.; Ishitsuka, E.; Kawamura, H

    2000-11-01

    To evaluate exactly the total amount of tritium production in tritium breeding materials during in-pile test with JMTR, the 'tritium monitor' has been produced and evaluation of total tritium generation was done by using 'tritium monitor' in preliminary in-pile mock-up, and verification of procedure concerning tritium production evaluation was conducted by using Monte Carlo code MCNP and nuclear cross section library of FSXLIBJ3R2. Li-Al alloy (Li 3.4 wt.%, 95.5% enrichment of {sup 6}Li) was selected as tritium monitor material for the evaluation on the total amount of tritium production in high {sup 6}Li enriched materials. From the results of preliminary experiment, calculated amounts of total tritium production at each 'tritium monitor', which was installed in the preliminary in-pile mock-up, were about 50-290% higher than the measured values. Concerning tritium measurement, increase of measurement error in tritium leak form measuring system to measure small amount of tritium (0.2-0.7 mCi in tritium monitor) was found in the results of present experiment. The tendency for overestimation of calculated thermal neutron flux in the range of 1-6x10{sup 13} n cm{sup -2} per s was found in JMTR and the reason may be due to the beryllium cross section data base in JENDL3.2.

  18. The role of the United Nations in the field of verification

    International Nuclear Information System (INIS)

    1991-01-01

    By resolution 43/81 B of 7 December 1988, the General Assembly requested the Secretary General to undertake, with the assistance of a group of qualified governmental experts, an in-depth study of the role of the United Nations in the field of verification. In August 1990, the Secretary-General transmitted to the General Assembly the unanimously approved report of the experts. The report is structured in six chapters and contains a bibliographic appendix on technical aspects of verification. The Introduction provides a brief historical background on the development of the question of verification in the United Nations context, culminating with the adoption by the General Assembly of resolution 43/81 B, which requested the study. Chapters II and III address the definition and functions of verification and the various approaches, methods, procedures and techniques used in the process of verification. Chapters IV and V examine the existing activities of the United Nations in the field of verification, possibilities for improvements in those activities as well as possible additional activities, while addressing the organizational, technical, legal, operational and financial implications of each of the possibilities discussed. Chapter VI presents the conclusions and recommendations of the Group

  19. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Directory of Open Access Journals (Sweden)

    Jin-Won Park

    2009-01-01

    Full Text Available As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  20. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Science.gov (United States)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  1. A practical approach to perform graded verification and validation

    International Nuclear Information System (INIS)

    Terrado, Carlos; Woolley, J.

    2000-01-01

    Modernization of instrumentation and control (I and C) systems in nuclear power plants often implies to go from analog to digital systems. One condition for the upgrade to be successful is that the new systems achieve at least the same quality level as the analog they replace. The most important part of digital systems quality assurance (QA) is verification and validation (V and V). V and V is concerned with the process as much as the product, it is a systematic program of review and testing activities performed throughout the system development life cycle. Briefly, we can say that verification is to build the product correctly, and validation is to build the correct product. Since V and V is necessary but costly, it is helpful to tailor the effort that should be performed to achieve the quality goal for each particular case. To do this, an accepted practice is to establish different V and V levels, each one with a proper degree of stringency or rigor. This paper shows a practical approach to estimate the appropriate level of V and V, and the resulting V and V techniques recommended for each specific system. The firs step purposed is to determine 'What to do', that is the selection of the V and V class. The main factors considered here are: required integrity, functional complexity, defense in depth and development environment. A guideline to classify the particular system using these factors and show how they lead to the selection of the V and V class is presented. The second step is to determine 'How to do it', that is to choose an appropriate set of V and V methods according to the attributes of the system and the V and V class already selected. A list of possible V and V methods that are recommended for each V and V level during different stages of the development life cycle is included. As a result of the application of this procedure, solutions are found for generalists interested in 'What to do', as well as for specialists, interested in 'How to do'. Finally

  2. 45 CFR 1626.7 - Verification of eligible alien status.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Verification of eligible alien status. 1626.7... CORPORATION RESTRICTIONS ON LEGAL ASSISTANCE TO ALIENS § 1626.7 Verification of eligible alien status. (a) An alien seeking representation shall submit appropriate documents to verify eligibility, unless the only...

  3. Python Introduction and Installation

    Directory of Open Access Journals (Sweden)

    William J. Turkel

    2012-07-01

    Full Text Available This first lesson in our section on dealing with Online Sources is designed to get you and your computer set up to start programming. We will focus on installing the relevant software – all free and reputable – and finally we will help you to get your toes wet with some simple programming that provides immediate results. In this opening module you will install the Python programming language, the Beautiful Soup HTML/XML parser, and a text editor. Screencaps provided here come from Komodo Edit, but you can use any text editor capable of working with Python. Here’s a list of other options: Python Editors. Once everything is installed, you will write your first programs, “Hello World” in Python and HTML.

  4. A Quantitative Approach to the Formal Verification of Real-Time Systems.

    Science.gov (United States)

    1996-09-01

    Computer Science A Quantitative Approach to the Formal Verification of Real - Time Systems Sergio Vale Aguiar Campos September 1996 CMU-CS-96-199...ptisiic raieaiSI v Diambimos Lboiamtad _^ A Quantitative Approach to the Formal Verification of Real - Time Systems Sergio Vale Aguiar Campos...implied, of NSF, the Semiconduc- tor Research Corporation, ARPA or the U.S. government. Keywords: real - time systems , formal verification, symbolic

  5. 46 CFR 111.60-5 - Cable installation.

    Science.gov (United States)

    2010-10-01

    ... REQUIREMENTS Wiring Materials and Methods § 111.60-5 Cable installation. (a) Each cable installation must meet... 46 Shipping 4 2010-10-01 2010-10-01 false Cable installation. 111.60-5 Section 111.60-5 Shipping... incorporated by reference; see 46 CFR 110.10-1), including clause 8. (b) Each cable installation made in...

  6. Performance of buried pipe installation.

    Science.gov (United States)

    2010-05-01

    The purpose of this study is to determine the effects of geometric and mechanical parameters : characterizing the soil structure interaction developed in a buried pipe installation located under : roads/highways. The drainage pipes or culverts instal...

  7. Compressors selection and sizing

    CERN Document Server

    Brown, Royce N

    2005-01-01

    This practical reference provides in-depth information required to understand and properly estimate compressor capabilities and to select the proper designs. Engineers and students will gain a thorough understanding of compression principles, equipment, applications, selection, sizing, installation, and maintenance. The many examples clearly illustrate key aspects to help readers understand the ""real world"" of compressor technology.Compressors: Selection and Sizing, third edition is completely updated with new API standards. Additions requested by readers include a new section on di

  8. Distorted Fingerprint Verification System

    Directory of Open Access Journals (Sweden)

    Divya KARTHIKAESHWARAN

    2011-01-01

    Full Text Available Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.

  9. Enhanced verification test suite for physics simulation codes

    Energy Technology Data Exchange (ETDEWEB)

    Kamm, James R.; Brock, Jerry S.; Brandon, Scott T.; Cotrell, David L.; Johnson, Bryan; Knupp, Patrick; Rider, William J.; Trucano, Timothy G.; Weirs, V. Gregory

    2008-09-01

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations.

  10. Test-driven verification/validation of model transformations

    Institute of Scientific and Technical Information of China (English)

    László LENGYEL; Hassan CHARAF

    2015-01-01

    Why is it important to verify/validate model transformations? The motivation is to improve the quality of the trans-formations, and therefore the quality of the generated software artifacts. Verified/validated model transformations make it possible to ensure certain properties of the generated software artifacts. In this way, verification/validation methods can guarantee different requirements stated by the actual domain against the generated/modified/optimized software products. For example, a verified/ validated model transformation can ensure the preservation of certain properties during the model-to-model transformation. This paper emphasizes the necessity of methods that make model transformation verified/validated, discusses the different scenarios of model transformation verification and validation, and introduces the principles of a novel test-driven method for verifying/ validating model transformations. We provide a solution that makes it possible to automatically generate test input models for model transformations. Furthermore, we collect and discuss the actual open issues in the field of verification/validation of model transformations.

  11. Verification Survey of Uranium Mine Remediation

    International Nuclear Information System (INIS)

    Ron, Stager

    2009-01-01

    The Canadian Nuclear Safety Commission (CNSC) contracted an independent verification of an intensive gamma radiation survey conducted by a mining company to demonstrate that remediation of disturbed areas was complete. This site was the first of the recent mines being decommissioned in Canada and experience gained here may be applied to other mines being decommissioned in the future. The review included examination of the site-specific basis for clean-up criteria and ALARA as required by CNSC guidance. A paper review of the company report was conducted to determine if protocols were followed and that the summarized results could be independently reproduced. An independent verification survey was conducted on parts of the site and comparisons were made between gamma radiation measurements from the verification survey and the original company survey. Some aspects of data collection using rate meters linked to GPS data loggers are discussed as are aspects for data management and analyses methods required for the large amount of data collected during these surveys. Recommendations were made for implementation of future surveys and reporting the data from those surveys in order to ensure that remediation was complete. (authors)

  12. Verification and validation of RADMODL Version 1.0

    International Nuclear Information System (INIS)

    Kimball, K.D.

    1993-03-01

    RADMODL is a system of linked computer codes designed to calculate the radiation environment following an accident in which nuclear materials are released. The RADMODL code and the corresponding Verification and Validation (V ampersand V) calculations (Appendix A), were developed for Westinghouse Savannah River Company (WSRC) by EGS Corporation (EGS). Each module of RADMODL is an independent code and was verified separately. The full system was validated by comparing the output of the various modules with the corresponding output of a previously verified version of the modules. The results of the verification and validation tests show that RADMODL correctly calculates the transport of radionuclides and radiation doses. As a result of this verification and validation effort, RADMODL Version 1.0 is certified for use in calculating the radiation environment following an accident

  13. Verification and validation of RADMODL Version 1.0

    Energy Technology Data Exchange (ETDEWEB)

    Kimball, K.D.

    1993-03-01

    RADMODL is a system of linked computer codes designed to calculate the radiation environment following an accident in which nuclear materials are released. The RADMODL code and the corresponding Verification and Validation (V&V) calculations (Appendix A), were developed for Westinghouse Savannah River Company (WSRC) by EGS Corporation (EGS). Each module of RADMODL is an independent code and was verified separately. The full system was validated by comparing the output of the various modules with the corresponding output of a previously verified version of the modules. The results of the verification and validation tests show that RADMODL correctly calculates the transport of radionuclides and radiation doses. As a result of this verification and validation effort, RADMODL Version 1.0 is certified for use in calculating the radiation environment following an accident.

  14. Online 3D EPID-based dose verification: Proof of concept

    Energy Technology Data Exchange (ETDEWEB)

    Spreeuw, Hanno; Rozendaal, Roel, E-mail: r.rozendaal@nki.nl; Olaciregui-Ruiz, Igor; González, Patrick; Mans, Anton; Mijnheer, Ben [Department of Radiation Oncology, The Netherlands Cancer Institute, Amsterdam 1066 CX (Netherlands); Herk, Marcel van [University of Manchester, Manchester Academic Health Science Centre, The Christie NHS Foundation Trust, Manchester M20 4BX (United Kingdom)

    2016-07-15

    Purpose: Delivery errors during radiotherapy may lead to medical harm and reduced life expectancy for patients. Such serious incidents can be avoided by performing dose verification online, i.e., while the patient is being irradiated, creating the possibility of halting the linac in case of a large overdosage or underdosage. The offline EPID-based 3D in vivo dosimetry system clinically employed at our institute is in principle suited for online treatment verification, provided the system is able to complete 3D dose reconstruction and verification within 420 ms, the present acquisition time of a single EPID frame. It is the aim of this study to show that our EPID-based dosimetry system can be made fast enough to achieve online 3D in vivo dose verification. Methods: The current dose verification system was sped up in two ways. First, a new software package was developed to perform all computations that are not dependent on portal image acquisition separately, thus removing the need for doing these calculations in real time. Second, the 3D dose reconstruction algorithm was sped up via a new, multithreaded implementation. Dose verification was implemented by comparing planned with reconstructed 3D dose distributions delivered to two regions in a patient: the target volume and the nontarget volume receiving at least 10 cGy. In both volumes, the mean dose is compared, while in the nontarget volume, the near-maximum dose (D2) is compared as well. The real-time dosimetry system was tested by irradiating an anthropomorphic phantom with three VMAT plans: a 6 MV head-and-neck treatment plan, a 10 MV rectum treatment plan, and a 10 MV prostate treatment plan. In all plans, two types of serious delivery errors were introduced. The functionality of automatically halting the linac was also implemented and tested. Results: The precomputation time per treatment was ∼180 s/treatment arc, depending on gantry angle resolution. The complete processing of a single portal frame

  15. Online 3D EPID-based dose verification: Proof of concept

    International Nuclear Information System (INIS)

    Spreeuw, Hanno; Rozendaal, Roel; Olaciregui-Ruiz, Igor; González, Patrick; Mans, Anton; Mijnheer, Ben; Herk, Marcel van

    2016-01-01

    Purpose: Delivery errors during radiotherapy may lead to medical harm and reduced life expectancy for patients. Such serious incidents can be avoided by performing dose verification online, i.e., while the patient is being irradiated, creating the possibility of halting the linac in case of a large overdosage or underdosage. The offline EPID-based 3D in vivo dosimetry system clinically employed at our institute is in principle suited for online treatment verification, provided the system is able to complete 3D dose reconstruction and verification within 420 ms, the present acquisition time of a single EPID frame. It is the aim of this study to show that our EPID-based dosimetry system can be made fast enough to achieve online 3D in vivo dose verification. Methods: The current dose verification system was sped up in two ways. First, a new software package was developed to perform all computations that are not dependent on portal image acquisition separately, thus removing the need for doing these calculations in real time. Second, the 3D dose reconstruction algorithm was sped up via a new, multithreaded implementation. Dose verification was implemented by comparing planned with reconstructed 3D dose distributions delivered to two regions in a patient: the target volume and the nontarget volume receiving at least 10 cGy. In both volumes, the mean dose is compared, while in the nontarget volume, the near-maximum dose (D2) is compared as well. The real-time dosimetry system was tested by irradiating an anthropomorphic phantom with three VMAT plans: a 6 MV head-and-neck treatment plan, a 10 MV rectum treatment plan, and a 10 MV prostate treatment plan. In all plans, two types of serious delivery errors were introduced. The functionality of automatically halting the linac was also implemented and tested. Results: The precomputation time per treatment was ∼180 s/treatment arc, depending on gantry angle resolution. The complete processing of a single portal frame

  16. Online 3D EPID-based dose verification: Proof of concept.

    Science.gov (United States)

    Spreeuw, Hanno; Rozendaal, Roel; Olaciregui-Ruiz, Igor; González, Patrick; Mans, Anton; Mijnheer, Ben; van Herk, Marcel

    2016-07-01

    Delivery errors during radiotherapy may lead to medical harm and reduced life expectancy for patients. Such serious incidents can be avoided by performing dose verification online, i.e., while the patient is being irradiated, creating the possibility of halting the linac in case of a large overdosage or underdosage. The offline EPID-based 3D in vivo dosimetry system clinically employed at our institute is in principle suited for online treatment verification, provided the system is able to complete 3D dose reconstruction and verification within 420 ms, the present acquisition time of a single EPID frame. It is the aim of this study to show that our EPID-based dosimetry system can be made fast enough to achieve online 3D in vivo dose verification. The current dose verification system was sped up in two ways. First, a new software package was developed to perform all computations that are not dependent on portal image acquisition separately, thus removing the need for doing these calculations in real time. Second, the 3D dose reconstruction algorithm was sped up via a new, multithreaded implementation. Dose verification was implemented by comparing planned with reconstructed 3D dose distributions delivered to two regions in a patient: the target volume and the nontarget volume receiving at least 10 cGy. In both volumes, the mean dose is compared, while in the nontarget volume, the near-maximum dose (D2) is compared as well. The real-time dosimetry system was tested by irradiating an anthropomorphic phantom with three VMAT plans: a 6 MV head-and-neck treatment plan, a 10 MV rectum treatment plan, and a 10 MV prostate treatment plan. In all plans, two types of serious delivery errors were introduced. The functionality of automatically halting the linac was also implemented and tested. The precomputation time per treatment was ∼180 s/treatment arc, depending on gantry angle resolution. The complete processing of a single portal frame, including dose verification, took

  17. Formal Verification of Real-Time System Requirements

    Directory of Open Access Journals (Sweden)

    Marcin Szpyrka

    2000-01-01

    Full Text Available The methodology of system requirements verification presented in this paper is a proposition of a practical procedure for reducing some negatives of the specification of requirements. The main problem that is considered is to create a complete description of the system requirements without any negatives. Verification of the initially defined requirements is based on the coloured Petri nets. Those nets are useful for testing some properties of system requirements such as completeness, consistency and optimality. An example ofthe litt controller is presented.

  18. Finite Countermodel Based Verification for Program Transformation (A Case Study

    Directory of Open Access Journals (Sweden)

    Alexei P. Lisitsa

    2015-12-01

    Full Text Available Both automatic program verification and program transformation are based on program analysis. In the past decade a number of approaches using various automatic general-purpose program transformation techniques (partial deduction, specialization, supercompilation for verification of unreachability properties of computing systems were introduced and demonstrated. On the other hand, the semantics based unfold-fold program transformation methods pose themselves diverse kinds of reachability tasks and try to solve them, aiming at improving the semantics tree of the program being transformed. That means some general-purpose verification methods may be used for strengthening program transformation techniques. This paper considers the question how finite countermodels for safety verification method might be used in Turchin's supercompilation method. We extract a number of supercompilation sub-algorithms trying to solve reachability problems and demonstrate use of an external countermodel finder for solving some of the problems.

  19. Technical workshop on safeguards, verification technologies, and other related experience

    International Nuclear Information System (INIS)

    1998-01-01

    The aim of the Technical Workshop on safeguards was to encourage a clearer understanding of the IAEA Safeguards System, its origins and evolution and the present state of the art. Presentations held by the IAEA officials and outside experts examined as well other components of the non-proliferation regime, the current practices and procedures, and the future prospects. A series of presentations described the characteristics of the interaction between global and regional verification systems and described relevant past and present experience. Prominence given to such state of the art verification technologies as environmental sampling, satellite imaging and monitoring thorough remote and unattended techniques demonstrated, beyond any doubt, the essentially dynamic nature of verification. It is generally acknowledged that there have been major achievements in preventing spread of nuclear weapons, but no verification system can in itself prevent proliferation

  20. Technical workshop on safeguards, verification technologies, and other related experience

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-12-31

    The aim of the Technical Workshop on safeguards was to encourage a clearer understanding of the IAEA Safeguards System, its origins and evolution and the present state of the art. Presentations held by the IAEA officials and outside experts examined as well other components of the non-proliferation regime, the current practices and procedures, and the future prospects. A series of presentations described the characteristics of the interaction between global and regional verification systems and described relevant past and present experience. Prominence given to such state of the art verification technologies as environmental sampling, satellite imaging and monitoring thorough remote and unattended techniques demonstrated, beyond any doubt, the essentially dynamic nature of verification. It is generally acknowledged that there have been major achievements in preventing spread of nuclear weapons, but no verification system can in itself prevent proliferation Refs, figs, tabs

  1. Learning a Genetic Measure for Kinship Verification Using Facial Images

    Directory of Open Access Journals (Sweden)

    Lu Kou

    2015-01-01

    Full Text Available Motivated by the key observation that children generally resemble their parents more than other persons with respect to facial appearance, distance metric (similarity learning has been the dominant choice for state-of-the-art kinship verification via facial images in the wild. Most existing learning-based approaches to kinship verification, however, are focused on learning a genetic similarity measure in a batch learning manner, leading to less scalability for practical applications with ever-growing amount of data. To address this, we propose a new kinship verification approach by learning a sparse similarity measure in an online fashion. Experimental results on the kinship datasets show that our approach is highly competitive to the state-of-the-art alternatives in terms of verification accuracy, yet it is superior in terms of scalability for practical applications.

  2. Professional operation and management of nuclear island installation

    International Nuclear Information System (INIS)

    Ma Limin

    2011-01-01

    As an important part of nuclear power plant construction, nuclear island installation mainly involves main equipment installation, pipeline installation, associated procedure examination and other important tasks. However, due to the nuclear island installation management changing from single project to multi-projects, the problems such as professional management of nuclear island installation and the lack of technical staff become more and more prominent and become one of the key restricts to the work of nuclear island installation. Based on analysis of the single project, single-base nuclear island installation management and practice, combined with the current situation that multi-project and multi-base construction of nuclear power are carrying out at the same time, this paper proposes a new management model of nuclear island installation. (author)

  3. Environmental settings for selected US Department of Energy installations - support information for the programmatic environmental impact statement and the baseline environmental management report

    Energy Technology Data Exchange (ETDEWEB)

    Holdren, G.R.; Glantz, C.S.; Berg, L.K.; Delinger, K.; Fosmire, C.J.; Goodwin, S.M.; Rustad, J.R.; Schalla, R.; Schramke, J.A.

    1995-05-01

    This report contains the environmental setting information developed for 25 U.S. Department of Energy (DOE) installations in support of the DOE`s Programmatic Environmental Impact Study (PEIS) and the Baseline Environmental Management Report (BEMR). The common objective of the PEIS and the BEMR is to provide the public with information about the environmental contamination problems associated with major DOE facilities across the country, and to assess the relative risks that radiological and hazardous contaminants pose to the public, onsite workers, and the environment. Environmental setting information consists of the site-specific data required to model (using the Multimedia Environmental Pollutant Assessment System) the atmospheric, groundwater, and surface water transport of contaminants within and near the boundaries of the installations. The environmental settings data describes the climate, atmospheric dispersion, hydrogeology, and surface water characteristics of the installations. The number of discrete environmental settings established for each installation was governed by two competing requirements: (1) the risks posed by contaminants released from numerous waste sites were to be modeled as accurately as possible, and (2) the modeling required for numerous release sites and a large number of contaminants had to be completed within the limits imposed by the PEIS and BEMR schedule. The final product is the result of attempts to balance these competing concerns in a way that minimizes the number of settings per installation in order to meet the project schedule while at the same, time providing adequate, if sometimes highly simplified, representations of the different areas within an installation. Environmental settings were developed in conjunction with installation experts in the fields of meteorology, geology, hydrology, and geochemistry.

  4. Environmental settings for selected US Department of Energy installations - support information for the programmatic environmental impact statement and the baseline environmental management report

    International Nuclear Information System (INIS)

    Holdren, G.R.; Glantz, C.S.; Berg, L.K.; Delinger, K.; Fosmire, C.J.; Goodwin, S.M.; Rustad, J.R.; Schalla, R.; Schramke, J.A.

    1995-05-01

    This report contains the environmental setting information developed for 25 U.S. Department of Energy (DOE) installations in support of the DOE's Programmatic Environmental Impact Study (PEIS) and the Baseline Environmental Management Report (BEMR). The common objective of the PEIS and the BEMR is to provide the public with information about the environmental contamination problems associated with major DOE facilities across the country, and to assess the relative risks that radiological and hazardous contaminants pose to the public, onsite workers, and the environment. Environmental setting information consists of the site-specific data required to model (using the Multimedia Environmental Pollutant Assessment System) the atmospheric, groundwater, and surface water transport of contaminants within and near the boundaries of the installations. The environmental settings data describes the climate, atmospheric dispersion, hydrogeology, and surface water characteristics of the installations. The number of discrete environmental settings established for each installation was governed by two competing requirements: (1) the risks posed by contaminants released from numerous waste sites were to be modeled as accurately as possible, and (2) the modeling required for numerous release sites and a large number of contaminants had to be completed within the limits imposed by the PEIS and BEMR schedule. The final product is the result of attempts to balance these competing concerns in a way that minimizes the number of settings per installation in order to meet the project schedule while at the same, time providing adequate, if sometimes highly simplified, representations of the different areas within an installation. Environmental settings were developed in conjunction with installation experts in the fields of meteorology, geology, hydrology, and geochemistry

  5. Planning and installing photovoltaic systems a guide for installers, architects and engineers

    CERN Document Server

    Deutsche Gesellschaft für Sonnenenergie (DGS)

    2013-01-01

    New third edition of the bestselling manual from the German Solar Energy Society (DGS), showing you the essential steps to plan and install a solar photovoltaic system. With a global focus, it has been updated to include sections on new technology and concepts, new legislation and the current PV market.Updates cover:new developments in inverter and module technologymarket situation worldwide and outlookintegration to the grid (voltage stabilization, frequency, remote control)new legal requirements for installation and planningoperational costs for dismantling and recyclingfeed-in managementnew requirements for fire protectionnew requirements in Europe for electric waste (Waste Electrical and Electronic Equipment, WEEE) and the restriction of the use of certain hazardous substances (RoHS).Also providing information on current developments in system design, economic analysis, operation and maintenance of PV systems, as well as new software tools, hybrid and tracking systems.An essential manual for installers, e...

  6. Towards Model Validation and Verification with SAT Techniques

    OpenAIRE

    Gogolla, Martin

    2010-01-01

    After sketching how system development and the UML (Unified Modeling Language) and the OCL (Object Constraint Language) are related, validation and verification with the tool USE (UML-based Specification Environment) is demonstrated. As a more efficient alternative for verification tasks, two approaches using SAT-based techniques are put forward: First, a direct encoding of UML and OCL with Boolean variables and propositional formulas, and second, an encoding employing an...

  7. Engineering a static verification tool for GPU kernels

    OpenAIRE

    Bardsley, E; Betts, A; Chong, N; Collingbourne, P; Deligiannis, P; Donaldson, AF; Ketema, J; Liew, D; Qadeer, S

    2014-01-01

    We report on practical experiences over the last 2.5 years related to the engineering of GPUVerify, a static verification tool for OpenCL and CUDA GPU kernels, plotting the progress of GPUVerify from a prototype to a fully functional and relatively efficient analysis tool. Our hope is that this experience report will serve the verification community by helping to inform future tooling efforts. ? 2014 Springer International Publishing.

  8. A General Purpose High Performance Linux Installation Infrastructure

    International Nuclear Information System (INIS)

    Wachsmann, Alf

    2002-01-01

    With more and more and larger and larger Linux clusters, the question arises how to install them. This paper addresses this question by proposing a solution using only standard software components. This installation infrastructure scales well for a large number of nodes. It is also usable for installing desktop machines or diskless Linux clients, thus, is not designed for cluster installations in particular but is, nevertheless, highly performant. The infrastructure proposed uses PXE as the network boot component on the nodes. It uses DHCP and TFTP servers to get IP addresses and a bootloader to all nodes. It then uses kickstart to install Red Hat Linux over NFS. We have implemented this installation infrastructure at SLAC with our given server hardware and installed a 256 node cluster in 30 minutes. This paper presents the measurements from this installation and discusses the bottlenecks in our installation

  9. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses. Addendum

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards ( including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  10. Formal verification of reactor process control software using assertion checking environment

    International Nuclear Information System (INIS)

    Sharma, Babita; Balaji, Sowmya; John, Ajith K.; Bhattacharjee, A.K.; Dhodapkar, S.D.

    2005-01-01

    Assertion Checking Environment (ACE) was developed in-house for carrying out formal (rigorous/ mathematical) functional verification of embedded software written in MISRA C. MISRA C is an industrially sponsored safe sub-set of C programming language and is well accepted in the automotive and aerospace industries. ACE uses static assertion checking technique for verification of MISRA C programs. First the functional specifications of the program are derived from the specifications in the form of pre- and post-conditions for each C function. These pre- and post-conditions are then introduced as assertions (formal comments) in the program code. The annotated C code is then formally verified using ACE. In this paper we present our experience of using ACE for the formal verification of process control software of a nuclear reactor. The Software Requirements Document (SRD) contained textual specifications of the process control software. The SRD was used by the designers to draw logic diagrams which were given as input to a code generator. The verification of the generated C code was done at 2 levels viz. (i) verification against specifications derived from logic diagrams, and (ii) verification against specifications derived from SRD. In this work we checked approximately 600 functional specifications of the software having roughly 15000 lines of code. (author)

  11. IP cores design from specifications to production modeling, verification, optimization, and protection

    CERN Document Server

    Mohamed, Khaled Salah

    2016-01-01

    This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection. Various trade-offs in the design process are discussed, including  those associated with many of the most common memory cores, controller IPs  and system-on-chip (SoC) buses. Readers will also benefit from the author’s practical coverage of new verification methodologies. such as bug localization, UVM, and scan-chain.  A SoC case study is presented to compare traditional verification with the new verification methodologies. ·         Discusses the entire life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection; ·         Introduce a deep introduction for Verilog for both implementation and verification point of view.  ·         Demonstrates how to use IP in applications such as memory controllers and SoC buses. ·         Describes a new ver...

  12. VAMOS: The verification and monitoring options study: Current research options for in-situ monitoring and verification of contaminant remediation and containment within the vadose zone

    International Nuclear Information System (INIS)

    Betsill, J.D.; Gruebel, R.D.

    1995-09-01

    The Verification and Monitoring Options Study Project (VAMOS) was established to identify high-priority options for future vadose-zone environmental research in the areas of in-situ remediation monitoring, post-closure monitoring, and containment emplacement and verification monitoring. VAMOS examined projected needs not currently being met with applied technology in order to develop viable monitoring and verification research options. The study emphasized a compatible systems approach to reinforce the need for utilizing compatible components to provide user friendly site monitoring systems. To identify the needs and research options related to vadose-zone environmental monitoring and verification, a literature search and expert panel forums were conducted. The search included present drivers for environmental monitoring technology, technology applications, and research efforts. The forums included scientific, academic, industry, and regulatory environmental professionals as well as end users of environmental technology. The experts evaluated current and future monitoring and verification needs, methods for meeting these needs, and viable research options and directions. A variety of high-priority technology development, user facility, and technology guidance research options were developed and presented as an outcome of the literature search and expert panel forums

  13. SASSYS-1 computer code verification with EBR-II test data

    International Nuclear Information System (INIS)

    Warinner, D.K.; Dunn, F.E.

    1985-01-01

    The EBR-II natural circulation experiment, XX08 Test 8A, is simulated with the SASSYS-1 computer code and the results for the latter are compared with published data taken during the transient at selected points in the core. The SASSYS-1 results provide transient temperature and flow responses for all points of interest simultaneously during one run, once such basic parameters as pipe sizes, initial core flows, and elevations are specified. The SASSYS-1 simulation results for the EBR-II experiment XX08 Test 8A, conducted in March 1979, are within the published plant data uncertainties and, thereby, serve as a partial verification/validation of the SASSYS-1 code

  14. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    International Nuclear Information System (INIS)

    Luke, S.J.

    2011-01-01

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  15. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    Energy Technology Data Exchange (ETDEWEB)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  16. Experimental preparation and verification of quantum money

    Science.gov (United States)

    Guan, Jian-Yu; Arrazola, Juan Miguel; Amiri, Ryan; Zhang, Weijun; Li, Hao; You, Lixing; Wang, Zhen; Zhang, Qiang; Pan, Jian-Wei

    2018-03-01

    A quantum money scheme enables a trusted bank to provide untrusted users with verifiable quantum banknotes that cannot be forged. In this work, we report a proof-of-principle experimental demonstration of the preparation and verification of unforgeable quantum banknotes. We employ a security analysis that takes experimental imperfections fully into account. We measure a total of 3.6 ×106 states in one verification round, limiting the forging probability to 10-7 based on the security analysis. Our results demonstrate the feasibility of preparing and verifying quantum banknotes using currently available experimental techniques.

  17. VBMC: a formal verification tool for VHDL programs

    International Nuclear Information System (INIS)

    Ajith, K.J.; Bhattacharjee, A.K.

    2014-01-01

    The design of Control and Instrumentation (C and I) systems used in safety critical applications such as nuclear power plants involves partitioning of the overall system functionality into subparts and implementing each subpart in hardware and/or software as appropriate. With increasing use of programmable devices like FPGA, the hardware subsystems are often implemented in Hardware Description Languages (HDL) like VHDL. Since the functional bugs in such hardware subsystems used in safety critical C and I systems have disastrous consequences, it is important to use rigorous reasoning to verify the functionalities of the HDL models. This paper describes an indigenously developed software tool named VBMC (VHDL Bounded Model Checker) for mathematically proving/refuting functional properties of hardware designs described in VHDL. VBMC accepts hardware design as VHDL program file, functional property in PSL, and verification bound (number of cycles of operation) as inputs. It either reports that the design satisfies the functional property for the given verification bound or generates a counter example providing the reason of violation. In case of satisfaction, the proof holds good for the verification bound. VBMC has been used for the functional verification of FPGA based intelligent I/O boards developed at Reactor Control Division, BARC. (author)

  18. VBMC: a formal verification tool for VHDL program

    International Nuclear Information System (INIS)

    Ajith, K.J.; Bhattacharjee, A.K.

    2014-08-01

    The design of Control and Instrumentation (C and I) systems used in safety critical applications such as nuclear power plants involves partitioning of the overall system functionality into sub-parts and implementing each sub-part in hardware and/or software as appropriate. With increasing use of programmable devices like FPGA, the hardware subsystems are often implemented in Hardware Description Languages (HDL) like VHDL. Since the functional bugs in such hardware subsystems used in safety critical C and I systems have serious consequences, it is important to use rigorous reasoning to verify the functionalities of the HDL models. This report describes the design of a software tool named VBMC (VHDL Bounded Model Checker). The capability of this tool is in proving/refuting functional properties of hardware designs described in VHDL. VBMC accepts design as a VHDL program file, functional property in PSL, and verification bound (number of cycles of operation) as inputs. It either reports that the design satisfies the functional property for the given verification bound or generates a counterexample providing the reason of violation. In case of satisfaction, the proof holds good for the verification bound. VBMC has been used for the functional verification of FPGA based intelligent I/O boards developed at Reactor Control Division, BARC. (author)

  19. Buckling of Bucket Foundations During Installation

    DEFF Research Database (Denmark)

    Madsen, Søren

    There is a great politically will to expand the green energy market in these times. A proven green technology is wind turbines. Wind turbines have been installed in great numbers on land over the last decades. However, the current development in wind turbine design leads to larger turbine sizes...... in order to reduce the cost of energy. This limits the on land application due to transportation limitations and unwillingness from prospect neighbours. Thus, offshore wind energy started developing over the last couple of years. Although installing the wind turbines offshore resolves the before men tioned...... issues, it brings up the cost of energy mainly due to increased installation and maintenance costs. A very large part—up to 30–50% using current technology—of the installation cost origins from the expenses related to the installation of foundations. A new foundation concept—the bucket foundation...

  20. Verification and validation of decision support software: Expert Choice{trademark} and PCM{trademark}

    Energy Technology Data Exchange (ETDEWEB)

    Nguyen, Q.H.; Martin, J.D.

    1994-11-04

    This report documents the verification and validation of two decision support programs: EXPERT CHOICE{trademark} and PCM{trademark}. Both programs use the Analytic Hierarchy Process (AHP) -- or pairwise comparison technique -- developed by Dr. Thomas L. Saaty. In order to provide an independent method for the validating the two programs, the pairwise comparison algorithm was developed for a standard mathematical program. A standard data set -- selecting a car to purchase -- was used with each of the three programs for validation. The results show that both commercial programs performed correctly.