WorldWideScience

Sample records for source boundary checking

  1. Calibration and check light source

    Energy Technology Data Exchange (ETDEWEB)

    Nejedla, B; Krotil, J

    1979-02-15

    The light source is designed for calibrating photomultipliers and checking the function of the thermoluminescent dosemeters evaluation equipment. The check light source consists of a polymer material-based (polyvinyl toluene) plastic scintillator and a 2-phenyl-5-(4-bisphenyl)-1,3,4-oxadiazol and/or paraterphenyl activator, and of emission spectrum shifters for response in the green and the blue light regions. The plastic scintillator is sealed in a case to whose bottom a radiation source is fixed, such as a /sup 90/Sr-/sup 90/Y source of an activity of 1.85x10/sup 3/s/sup -1/ to 0.74x10/sup 9/s/sup -1/.

  2. Radioactive check sources for alpha and beta sensitive radiological instrumentation

    International Nuclear Information System (INIS)

    Barnett, J.M.; Kane, J.E. II.

    1994-06-01

    Since 1991, the Westinghouse Hanford Company has examined the construction and use of alpha and beta radioactive check sources for calibrating instruments and for performing response checks of instruments used for operational and environmental radiation detection. The purpose of using a radioactive check source is to characterize the response of a radiation monitoring instrument in the presence of radioactivity. To accurately calibrate the instrument and check its response, the check source used must emulate as closely as possible the actual physical and isotopic conditions being monitored. The isotope employed and the physical methods used to fabricate the check source (among other factors) determine instrument response. Although information from applicable national and international standards, journal articles, books, and government documents was considered, empirical data collected is most valuable when considering the type of source to use for a particular application. This paper presents source construction methods, use considerations, and standard recommendations. The results of a Hanford Site evaluation of several types of alpha and beta sources are also given

  3. Cross-checking different sources of mobility information.

    Directory of Open Access Journals (Sweden)

    Maxime Lenormand

    Full Text Available The pervasive use of new mobile devices has allowed a better characterization in space and time of human concentrations and mobility in general. Besides its theoretical interest, describing mobility is of great importance for a number of practical applications ranging from the forecast of disease spreading to the design of new spaces in urban environments. While classical data sources, such as surveys or census, have a limited level of geographical resolution (e.g., districts, municipalities, counties are typically used or are restricted to generic workdays or weekends, the data coming from mobile devices can be precisely located both in time and space. Most previous works have used a single data source to study human mobility patterns. Here we perform instead a cross-check analysis by comparing results obtained with data collected from three different sources: Twitter, census, and cell phones. The analysis is focused on the urban areas of Barcelona and Madrid, for which data of the three types is available. We assess the correlation between the datasets on different aspects: the spatial distribution of people concentration, the temporal evolution of people density, and the mobility patterns of individuals. Our results show that the three data sources are providing comparable information. Even though the representativeness of Twitter geolocated data is lower than that of mobile phone and census data, the correlations between the population density profiles and mobility patterns detected by the three datasets are close to one in a grid with cells of 2×2 and 1×1 square kilometers. This level of correlation supports the feasibility of interchanging the three data sources at the spatio-temporal scales considered.

  4. The online sealing performance test of the primary circuit pressure boundary check valve in nuclear power plants

    International Nuclear Information System (INIS)

    Yang Yunfei; Huang Huimin

    2013-01-01

    The primary circuit pressure boundary check valves of 320 MW pressurized water reactor is a nuclear grade I key equipment. The sealing demand is very high, which is directly related to the internal leakage rate of the primary circuit system. After the welding check valve is repaired, the sealing performance is judged by color printing checks. If there is water or humid vapor in the pipe, it will affect the accuracy of the color printing checks. For the particularity of the online check valve tightness test, online detecting device is designed by the hydraulic pressure drop method in other nuclear power plants, but the method has some shortcomings and restrictions. In this paper, we design a reliable and portable test equipment by the low-pressure gas seal test flow measurement, which make accurate and quantitative judgment of sealing property after the pressure boundary check valves are repaired. (authors)

  5. 21 CFR 1301.93 - Sources of information for employee checks.

    Science.gov (United States)

    2010-04-01

    ... OF MANUFACTURERS, DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Employee Screening-Non-Practitioners § 1301.93 Sources of information for employee checks. DEA recommends that inquiries concerning... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Sources of information for employee checks. 1301...

  6. Stability check source measurements with a secondary standard dosimeter in SSDL-Pakistan

    International Nuclear Information System (INIS)

    Salman, S.; Mahmoud, K.; Orfi, S.D.

    1988-01-01

    The stability check source is an integral part of a Secondary Standard Dosimetry System. The purpose of the stability check source is to confirm that the overall response of the dosimeter has not changed significantly since the instrument was calibrated. In case any change in the sensitivity of the ionization chamber or measuring assembly occurs the same is reflected in the reference check source measurements. Stability check source measurements are taken in a Primary Standard Dosimetry Laboratory (PSDL) at the time of calibration of secondary standard dosimeter and mean time (in seconds) to the reference setting of 50 scale divisions with ambient conditions of air at 20 deg. C, 101.3 kPa and 50% RH is quoted in a calibration certificate. This quoted stability check source time figure is the basis for future confirmation of overall response of the secondary standard dosimeter system. This note presents the results of stability check source measurements carried out in SSDL Pakistan over a period of five years

  7. Semi-Automatic Registration of Airborne and Terrestrial Laser Scanning Data Using Building Corner Matching with Boundaries as Reliability Check

    Directory of Open Access Journals (Sweden)

    Liang Cheng

    2013-11-01

    Full Text Available Data registration is a prerequisite for the integration of multi-platform laser scanning in various applications. A new approach is proposed for the semi-automatic registration of airborne and terrestrial laser scanning data with buildings without eaves. Firstly, an automatic calculation procedure for thresholds in density of projected points (DoPP method is introduced to extract boundary segments from terrestrial laser scanning data. A new algorithm, using a self-extending procedure, is developed to recover the extracted boundary segments, which then intersect to form the corners of buildings. The building corners extracted from airborne and terrestrial laser scanning are reliably matched through an automatic iterative process in which boundaries from two datasets are compared for the reliability check. The experimental results illustrate that the proposed approach provides both high reliability and high geometric accuracy (average error of 0.44 m/0.15 m in horizontal/vertical direction for corresponding building corners for the final registration of airborne laser scanning (ALS and tripod mounted terrestrial laser scanning (TLS data.

  8. Crystal scintillators for use in check-light source for thermoluminescent systems

    Science.gov (United States)

    Nagpal, J. S.; Sabharwal, S. C.; Chougaonkar, M. P.; Godbole, S. V.

    1999-08-01

    Beta ( 63Ni, Emax 0.063 MeV) excited radioluminescence of indigenously grown crystal scintillators CsI(Tl), Bi 4Ge 3O 12 and CdWO 4 has been studied for its use in check-light source needed for thermoluminescence systems. Temperature coefficient of the light output over 298-323 K and the beta-induced TL of the scintillators over 298-553 K are reported.

  9. Crystal scintillators for use in check-light source for thermoluminescent systems

    Energy Technology Data Exchange (ETDEWEB)

    Nagpal, J.S.; Sabharwal, S.C.; Chougaonkar, M.P.; Godbole, S.V

    1999-08-11

    Beta ({sup 63}Ni, E{sub max} 0.063 MeV) excited radioluminescence of indigenously grown crystal scintillators CsI(Tl), Bi{sub 4}Ge{sub 3}O{sub 12} and CdWO{sub 4} has been studied for its use in check-light source needed for thermoluminescence systems. Temperature coefficient of the light output over 298-323 K and the beta-induced TL of the scintillators over 298-553 K are reported. (author)

  10. Studies on {sup 63}Ni based check-light sources for TL readers

    Energy Technology Data Exchange (ETDEWEB)

    Nagpal, J.S.; Venkataraman, G. [Bhabha Atomic Research Centre, Bombay (India). Radiation Protection Services Div.; Udhayakyumar, J. [Bhabha Atomic Research Centre, Bombay (India). Board of Radiation and Isotope Technology; Page, A.G. [Bhabha Atomic Research Centre, Bombay (India). Radiochemistry Div.

    1995-12-31

    The performance of indigenously produced, electrodeposited {sup 63}Ni sources having 10 mm x 10 mm active area and individually coupled to a plastic scintillator has been studied. TL phosphors such as CaF{sub 2}, CaF{sub 2}:Dy, CaF{sub 2}:Tm, CaF{sub 2}:Eu, TLD-100 and CaSO{sub 4}:Dy with {sup 63}Ni have been studied for their possible use as check-light sources for testing TL readers. Stability at ambient temperatures (298-323 K), build-up and decrease of light output with time have been examined. A preliminary study of the fluorescent species in the gamma irradiated plastic scintillator has been made. (author).

  11. Boundaries of magnetic anomaly sources in the Tyrrhenian region

    Directory of Open Access Journals (Sweden)

    A. Rapolla

    1998-06-01

    Full Text Available Analysis of the analytic signal of the aeromagnetic field in the Tyrrhenian region allowed the systematic location of the boundaries of magnetic shallow sources. This method was chosen because of its independence from the magnetization and inducing field direction, and the results were similar to those of the boundary analysis of the horizontal gradient of the pseudogravity transformed field. The analytic signal was computed by a stable algorithm based on the second order horizontal derivatives of the field and Laplace equation. The complexity of the investigated area is well reflected in the aeromagnetic field and an objective and systematic study, such as boundary analysis, provided a rather complete description of the main regional structures. Significant trends indicated the existence of structures, whose nature was still unknown or uncertain. These included structures located between the Vavilov and De Marchi seamounts, NW of Stromboli Island, south of Ponza Island, a buried horst immediately south of the Cilento coastline, a body located northwest of the Cassinis seamount and other small magnetized structures located south of the Tuscanian archipelago. In many cases, a better definition of several structures previously recognized was obtained as in the case of some tectonic alignments (e.g., the Elba ridge, the Romolo and Selli lines, etc., a large number of igneous seamounts (e.g., Magnaghi, Marsili, Vavilov, Anchise, Quirra, Enarete, Eolo and Sisifo seamounts and several crystalline outcrops (e.g., Ichnusa, Vercelli, M. della Rondine, Tiberino, Cassinis, Traiano, Glauco and Augusto seamounts.

  12. CrossCheck: an open-source web tool for high-throughput screen data analysis.

    Science.gov (United States)

    Najafov, Jamil; Najafov, Ayaz

    2017-07-19

    Modern high-throughput screening methods allow researchers to generate large datasets that potentially contain important biological information. However, oftentimes, picking relevant hits from such screens and generating testable hypotheses requires training in bioinformatics and the skills to efficiently perform database mining. There are currently no tools available to general public that allow users to cross-reference their screen datasets with published screen datasets. To this end, we developed CrossCheck, an online platform for high-throughput screen data analysis. CrossCheck is a centralized database that allows effortless comparison of the user-entered list of gene symbols with 16,231 published datasets. These datasets include published data from genome-wide RNAi and CRISPR screens, interactome proteomics and phosphoproteomics screens, cancer mutation databases, low-throughput studies of major cell signaling mediators, such as kinases, E3 ubiquitin ligases and phosphatases, and gene ontological information. Moreover, CrossCheck includes a novel database of predicted protein kinase substrates, which was developed using proteome-wide consensus motif searches. CrossCheck dramatically simplifies high-throughput screen data analysis and enables researchers to dig deep into the published literature and streamline data-driven hypothesis generation. CrossCheck is freely accessible as a web-based application at http://proteinguru.com/crosscheck.

  13. Preliminary fracture analysis of the core pressure boundary tube for the Advanced Neutron Source Research Reactor

    International Nuclear Information System (INIS)

    Schulz, K.C.

    1995-08-01

    The outer core pressure boundary tube (CPBT) of the Advanced neutron Source (ANS) reactor being designed at Oak Ridge National Laboratory is currently specified as being composed of 6061-T6 aluminum. ASME Boiler and Pressure Vessel Code fracture analysis rules for nuclear components are based on the use of ferritic steels; the expressions, tables, charts and equations were all developed from tests and analyses conducted for ferritic steels. Because of the nature of the Code, design with thin aluminum requires analytical approaches that do not directly follow the Code. The intent of this report is to present a methodology comparable to the ASME Code for ensuring the prevention of nonductile fracture of the CPBT in the ANS reactor. 6061-T6 aluminum is known to be a relatively brittle material; the linear elastic fracture mechanics (LEFM) approach is utilized to determine allowable flaw sizes for the CPBT. A J-analysis following the procedure developed by the Electric Power Research Institute was conducted as a check; the results matched those for the LEFM analysis for the cases analyzed. Since 6061-T6 is known to embrittle when irradiated, the reduction in K Q due to irradiation is considered in the analysis. In anticipation of probable requirements regarding maximum allowable flaw size, a survey of nondestructive inspection capabilities is also presented. A discussion of probabilistic fracture mechanics approaches, principally Monte Carlo techniques, is included in this report as an introduction to what quantifying the probability of nonductile failure of the CPBT may entail

  14. Reliability of published data on radionuclide half lives - relevance to the use of reference sources for checking instrument performance

    International Nuclear Information System (INIS)

    Waldock, P.M.

    1999-01-01

    Long-lived calibrated radioisotopes are frequently used for checking of instrumentation used in the measurement of radiation; examples include: radioisotope assay meters, radiation monitors and sample counting equipment. In 1986 we purchased a radioisotope calibrator (Capintec CRC120) which was supplied with a number of long-lived check sources by the manufacturer, one of which was barium-133. The source came with its own calibration certificate and a quoted half life of 10.74 years ± 0.05 years, traceable to the National Bureau of Standards in the USA, and is consistent with data published by the National Nuclear Data Center, Brookhaven National Laboratory in 1985 (Tuli 1985). However, we noted at the time that this is significantly different to the value of 7.2 years quoted in the Radiochemical Manual (Wilson 1966) published by the Radiochemical Centre, Amersham (now Nycomed-Amersham), and more recently we have noted that it is significantly different to the value of 10.53 years currently quoted on various Internet sites including the University of Sheffield Chemistry Department (Winter 1999). Further investigation showed similar or worse variations of published half lives with time for several radioisotopes. Letter-to-the-editor

  15. Checking Java Programs

    CERN Document Server

    Darwin, Ian

    2007-01-01

    This Short Cut tells you about tools that will improve the quality of your Java code, using checking above and beyond what the standard tools do, including: Using javac options, JUnit and assertions Making your IDE work harder Checking your source code with PMD Checking your compiled code (.class files) with FindBugs Checking your program's run-time behavior with Java PathFinder

  16. High angle grain boundaries as sources or sinks for point defects

    Energy Technology Data Exchange (ETDEWEB)

    Balluffi, R.W.

    1979-09-01

    A secondary grain boundary dislocation climb model for high angle grain boundaries as sources/sinks for point defects is described in the light of recent advances in our knowledge of grain boundary structure. Experimental results are reviewed and are then compared with the expected behavior of the proposed model. Reasonably good consistency is found at the level of our present understanding of the subject. However, several gaps in our present knowledge still exist, and these are identified and discussed briefly.

  17. Sound source reconstruction using inverse boundary element calculations

    DEFF Research Database (Denmark)

    Schuhmacher, Andreas; Hald, Jørgen; Rasmussen, Karsten Bo

    2003-01-01

    Whereas standard boundary element calculations focus on the forward problem of computing the radiated acoustic field from a vibrating structure, the aim in this work is to reverse the process, i.e., to determine vibration from acoustic field data. This inverse problem is brought on a form suited ...... it is demonstrated that the L-curve criterion is robust with respect to the errors in a real measurement situation. In particular, it is shown that the L-curve criterion is superior to the more conventional generalized cross-validation (GCV) approach for the present tire noise studies....

  18. Elimination of Fixed Checkin/Check-Out Time as a Source of Entrepreneurial Edge in Hotel Business

    OpenAIRE

    Uzonna Joseph, Onyemeh

    2013-01-01

    This research uses the travails of a young engineer, Nigel, during his international travels and challenges he encountered with erratic check-in/checkout time at hotels, to explore the elimination of fixed check-in/check-out as an entrepreneurial opportunity that can generate competitive advantage. The hotel industry in Malaysia, a Southeast Asian country of about 28million people, provides the contextual background for the study. The situation analysis of Malaysia hotel ind...

  19. Response in atmospheric circulation and sources of Greenland precipitation to glacial boundary conditions

    DEFF Research Database (Denmark)

    Langen, Peter Lang; Vinther, Bo Møllesøe

    2009-01-01

    The response in northern hemisphere atmospheric circulation and the resulting changes in moisture sources for Greenland precipitation to glacial boundary conditions are studied in NCAR's CCM3 atmospheric general circulation model fitted with a moisture tracking functionality. We employ both...... seasonality, condensation temperatures and source temperatures are assessed. Udgivelsesdato: June 2009...

  20. Multiscale electrophysiology format: an open-source electrophysiology format using data compression, encryption, and cyclic redundancy check.

    Science.gov (United States)

    Brinkmann, Benjamin H; Bower, Mark R; Stengel, Keith A; Worrell, Gregory A; Stead, Matt

    2009-01-01

    Continuous, long-term (up to 10 days) electrophysiological monitoring using hybrid intracranial electrodes is an emerging tool for presurgical epilepsy evaluation and fundamental investigations of seizure generation. Detection of high-frequency oscillations and microseizures could provide valuable insights into causes and therapies for the treatment of epilepsy, but requires high spatial and temporal resolution. Our group is currently using hybrid arrays composed of up to 320 micro- and clinical macroelectrode arrays sampled at 32 kHz per channel with 18-bits of A/D resolution. Such recordings produce approximately 3 terabytes of data per day. Existing file formats have limited data compression capabilities, and do not offer mechanisms for protecting patient identifying information or detecting data corruption during transmission or storage. We present a novel file format that employs range encoding to provide a high degree of data compression, a three-tiered 128-bit encryption system for patient information and data security, and a 32-bit cyclic redundancy check to verify the integrity of compressed data blocks. Open-source software to read, write, and process these files are provided.

  1. Study of the Dependence of the Source check ionization chamber with pressure; Estudio de la dependencia de la camara de ionizacion Sourcecheck con la presion

    Energy Technology Data Exchange (ETDEWEB)

    Tornero-Lopez, A. M.; Ruiz-Arrabola, S.; Moreno-Torres, M.; Simancas, F.; Guerrero, R.; Guirado, D.

    2013-07-01

    Because of the importance of accurate measurement of power low-energy photons, such as I-125 seeds used in brachytherapy, and the widespread use of Source Check in Europe, this work is to study whether this camera features any dependence the pressure and shows included in the pressure-temperature factor usual. (Author)

  2. Historical cartographic materials as a source for international and cadastral boundary management in rivers

    Science.gov (United States)

    Srebro, Haim

    2018-05-01

    adjacent to the river banks has stabilized them. In 2000, due to the construction of a dam on the Yarmuk River, both sides jointly fixed coordinates of the relevant boundary line in the river according to the boundary delineation in the peace treaty. The accumulated artificial changes along both rivers have cancelled their natural behavior and have influenced the changes in the river channels. This may justify an initiative to fix the boundary lines in both rivers by coordinates according to the peace treaty delimitation, enabling the cadastral boundaries to be fixed according to the fixed international boundary line. The article analyzes boundary line management in changing rivers in light of development of the legal approach and practice from the time of the Romans until today. It analyzes the special case of the boundary line in the Jordan and Yarmuk rivers, and introduces a proposal for stabilizing this boundary line. The research of the changes of these rivers is based on changes in the depiction of their channels on various kinds of maps and cartographic sources, produced through the last century by many producers. They include British, German, ANZAC, Israeli and Jordanian maps and charts. The cartographic materials include large scale field survey sheets and engineering charts from the 1920s, cadastral charts from the 1930s, topographic maps produced through the last century and orthophoto maps produced since the 1990s, including joint Israeli-Jordanian orthophoto and charts produced by the Joint Boundary Commission as part of the peace agreement and its implementation. The article includes a variety of cartographic examples.

  3. The acoustic field of a point source in a uniform boundary layer over an impedance plane

    Science.gov (United States)

    Zorumski, W. E.; Willshire, W. L., Jr.

    1986-01-01

    The acoustic field of a point source in a boundary layer above an impedance plane is investigated anatytically using Obukhov quasi-potential functions, extending the normal-mode theory of Chunchuzov (1984) to account for the effects of finite ground-plane impedance and source height. The solution is found to be asymptotic to the surface-wave term studies by Wenzel (1974) in the limit of vanishing wind speed, suggesting that normal-mode theory can be used to model the effects of an atmospheric boundary layer on infrasonic sound radiation. Model predictions are derived for noise-generation data obtained by Willshire (1985) at the Medicine Bow wind-turbine facility. Long-range downwind propagation is found to behave as a cylindrical wave, with attention proportional to the wind speed, the boundary-layer displacement thickness, the real part of the ground admittance, and the square of the frequency.

  4. CAREN-4, ENDF/B Utility, Discontinuity Check at Resonance Region Boundary. CHECK-4, ENDF/B Utility, Structure Consistency Check and Format Check. CRECT, ENDF/B Utility, Data Correlation and Data Update. DICT-4, ENDF/B Utility, Section Table of Contents Generator. LISTF-4, ENDF/B Utility, Data Listing. RIGEL-4, ENDF/B Utility, Data Retrieval, BCD to BIN Conversion. SUMUP-4, ENDF/B Utility, Partial Cross-Sections Sum Check Against Tot Cross-Sections

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1975-08-01

    Description of problem or function: These programs are updated versions of ENDF/B checking, retrieval, and display codes capable of processing the Version-IV data files. RIGEL4 retrieves ENDF/B data and changes mode (BCD-BIN) or arrangement. Updated version processes decay data (mf=1, mt=457) and error files. CHECK4 checks the structure, consistency, and formats of ENDF data files. Updated version recognizes newly defined mt and mf numbers, checks mt=457 and the formats of the error files, contains RSIC photon file changes. SUMUP4 checks whether partial cross sections add up to the total. Updated version flags grid points present in the partial cross section, absent in the total. LISTF4 produces interpreted listings of ENDF/B data. Updated version lists mt=457, skips over error files, contains minor corrections. PLOTF4 produces plots of ENDF/B data. Updated version plots mt=457, skips over error files, contains minor corrections. RESEND processes ENDF materials with resonance parameters into a pointwise form. Capability of processing Adler-Adler parameters added. CRECT corrects ENDF/B data files. DICT4 generates a section table of contents (dictionary) for ENDF/B materials. CAREN4 tests for discontinuities across the limits of resonance ranges of an ENDF/B material. Updated version contains minor corrections.

  5. Sources of spurious force oscillations from an immersed boundary method for moving-body problems

    Science.gov (United States)

    Lee, Jongho; Kim, Jungwoo; Choi, Haecheon; Yang, Kyung-Soo

    2011-04-01

    When a discrete-forcing immersed boundary method is applied to moving-body problems, it produces spurious force oscillations on a solid body. In the present study, we identify two sources of these force oscillations. One source is from the spatial discontinuity in the pressure across the immersed boundary when a grid point located inside a solid body becomes that of fluid with a body motion. The addition of mass source/sink together with momentum forcing proposed by Kim et al. [J. Kim, D. Kim, H. Choi, An immersed-boundary finite volume method for simulations of flow in complex geometries, Journal of Computational Physics 171 (2001) 132-150] reduces the spurious force oscillations by alleviating this pressure discontinuity. The other source is from the temporal discontinuity in the velocity at the grid points where fluid becomes solid with a body motion. The magnitude of velocity discontinuity decreases with decreasing the grid spacing near the immersed boundary. Four moving-body problems are simulated by varying the grid spacing at a fixed computational time step and at a constant CFL number, respectively. It is found that the spurious force oscillations decrease with decreasing the grid spacing and increasing the computational time step size, but they depend more on the grid spacing than on the computational time step size.

  6. Boundary Layer Fluid Flow in a Channel with Heat Source, Soret ...

    African Journals Online (AJOL)

    The boundary layer fluid flow in a channel with heat source, soret effects and slip condition was studied. The governing equations were solved using perturbation technique. The effects of different parameters such Prandtl number Pr , Hartmann number M, Schmidt number Sc, suction parameter ƒÜ , soret number Sr and the ...

  7. Source-to-Sink: An Earth/Mars Comparison of Boundary Conditions for Eolian Dune Systems

    OpenAIRE

    Kocurek, Gary; Ewing, Ryan C.

    2012-01-01

    Eolian dune fields on Earth and Mars evolve as complex systems within a set of boundary conditions. A source-to-sink comparison indicates that although differences exist in sediment production and transport, the systems largely converge at the dune-flow and pattern-development levels, but again differ in modes of accumulation and preservation. On Earth, where winds frequently exceed threshold speeds, dune fields are sourced primarily through deflation of subaqueous deposits as these sediments...

  8. Air density dependence of the response of the PTW SourceCheck 4pi ionization chamber for 125I brachytherapy seeds.

    Science.gov (United States)

    Torres Del Río, J; Tornero-López, A M; Guirado, D; Pérez-Calatayud, J; Lallena, A M

    2017-06-01

    To analyze the air density dependence of the response of the new SourceCheck 4pi ionization chamber, manufactured by PTW. The air density dependence of three different SourceCheck 4pi chambers was studied by measuring 125 I sources. Measurements were taken by varying the pressure from 746.6 to 986.6hPa in a pressure chamber. Three different HDR 1000 Plus ionization chambers were also analyzed under similar conditions. A linear and a potential-like function of the air density were fitted to experimental data and their achievement in describing them was analyzed. SourceCheck 4pi chamber response showed a residual dependence on the air density once the standard pressure and temperature factor was applied. The chamber response was overestimated when the air density was below that under normal atmospheric conditions. A similar dependence was found for the HDR 1000 Plus chambers analyzed. A linear function of the air density permitted a very good description of this residual dependence, better than with a potential function. No significant variability between the different specimens of the same chamber model studied was found. The effect of overestimation observed in the chamber responses once they are corrected for the standard pressure and temperature may represent a non-negligible ∼4% overestimation in high altitude cities as ours (700m AMSL). This overestimation behaves linearly with the air density in all cases analyzed. Copyright © 2017 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  9. Check valve

    Science.gov (United States)

    Upton, H.A.; Garcia, P.

    1999-08-24

    A check valve for use in a GDCS of a nuclear reactor and having a motor driven disk including a rotatable armature for rotating the check valve disk over its entire range of motion is described. In one embodiment, the check valve includes a valve body having a coolant flow channel extending therethrough. The coolant flow channel includes an inlet end and an outlet end. A valve body seat is located on an inner surface of the valve body. The check valve further includes a disk assembly, sometimes referred to as the motor driven disc, having a counterweight and a disk shaped valve. The disk valve includes a disk base having a seat for seating with the valve body seat. The disk assembly further includes a first hinge pin member which extends at least partially through the disk assembly and is engaged to the disk. The disk valve is rotatable relative to the first hinge pin member. The check valve also includes a motor having a stator frame with a stator bore therein. An armature is rotatably positioned within the stator bore and the armature is coupled to the disk valve to cause the disk valve to rotate about its full range of motion. 5 figs.

  10. Check valve

    International Nuclear Information System (INIS)

    Upton, H.A.; Garcia, P.

    1999-01-01

    A check valve for use in a GDCS of a nuclear reactor and having a motor driven disk including a rotatable armature for rotating the check valve disk over its entire range of motion is described. In one embodiment, the check valve includes a valve body having a coolant flow channel extending therethrough. The coolant flow channel includes an inlet end and an outlet end. A valve body seat is located on an inner surface of the valve body. The check valve further includes a disk assembly, sometimes referred to as the motor driven disc, having a counterweight and a disk shaped valve. The disk valve includes a disk base having a seat for seating with the valve body seat. The disk assembly further includes a first hinge pin member which extends at least partially through the disk assembly and is engaged to the disk. The disk valve is rotatable relative to the first hinge pin member. The check valve also includes a motor having a stator frame with a stator bore therein. An armature is rotatably positioned within the stator bore and the armature is coupled to the disk valve to cause the disk valve to rotate about its full range of motion. 5 figs

  11. OpenBEM - An open source Boundary Element Method software in Acoustics

    DEFF Research Database (Denmark)

    Cutanda Henriquez, Vicente; Juhl, Peter Møller

    2010-01-01

    OpenBEM is a collection of open source programs for solving the Helmholtz Equation using the Boundary Element Method. The collection is written in Matlab by the authors and contains codes for dealing with exterior and interior problems in two or three dimensions as well as implementation of axi...... with examples of its use. Previous research results where OpenBEM was employed will be mentioned....

  12. Boundary layer plasmas as a source for high-latitude, early afternoon, auroral arcs

    International Nuclear Information System (INIS)

    Lundin, R.; Evans, D.S.

    1985-02-01

    Simultaneous measurements of hot boundary layer plasma from PROGNOZ-7 and particle precipitation from the TIROS/NOAA satellite in nearly magnetically conjugate regions have been used to study the dynamo process responsible for the formation of high latitude, early afternoon, auroral arcs. Characteristic for the PROGNOZ-7 observations in the dayside boundary layer at high latitudes is the frequent occurrence of regions with injected magnetosheath plasma embedded in a 'halo' of antisunward flowing magnetosphere plasma. The injected magnetosheath plasma have several features which indicate that it also acts as a local source of EMF in the boundary layer. The process resembles that of a local MHD dynamo driven by the excess drift velocity of the injected magnetosheath plasma relative to the background magnetospheric plasma. The dynamo region is capable of driving fielc-aligned currents that couple to the ionosphere, where the upward current is associated with the high latitude auroral arcs. We demonstrate that the large-scale morphology as well as the detailed data intercomparison between PROGNOZ-7 and TIROS-N both agree well with a local injection of magnetosheath plasma into the dayside boundary layer as the main dynamo process powering the high-latitude, early afternoon auroral arcs. (Author)

  13. A Source-Term Based Boundary Layer Bleed/Effusion Model for Passive Shock Control

    Science.gov (United States)

    Baurle, Robert A.; Norris, Andrew T.

    2011-01-01

    A modeling framework for boundary layer effusion has been developed based on the use of source (or sink) terms instead of the usual practice of specifying bleed directly as a boundary condition. This framework allows the surface boundary condition (i.e. isothermal wall, adiabatic wall, slip wall, etc.) to remain unaltered in the presence of bleed. This approach also lends itself to easily permit the addition of empirical models for second order effects that are not easily accounted for by simply defining effective transpiration values. Two effusion models formulated for supersonic flows have been implemented into this framework; the Doerffer/Bohning law and the Slater formulation. These models were applied to unit problems that contain key aspects of the flow physics applicable to bleed systems designed for hypersonic air-breathing propulsion systems. The ability of each model to predict bulk bleed properties was assessed, as well as the response of the boundary layer as it passes through and downstream of a porous bleed system. The model assessment was performed with and without the presence of shock waves. Three-dimensional CFD simulations that included the geometric details of the porous plate bleed systems were also carried out to supplement the experimental data, and provide additional insights into the bleed flow physics. Overall, both bleed formulations fared well for the tests performed in this study. However, the sample of test problems considered in this effort was not large enough to permit a comprehensive validation of the models.

  14. Microlayer source of oxygenated volatile organic compounds in the summertime marine Arctic boundary layer

    Science.gov (United States)

    Mungall, Emma L.; Abbatt, Jonathan P. D.; Wentzell, Jeremy J. B.; Lee, Alex K. Y.; Thomas, Jennie L.; Blais, Marjolaine; Gosselin, Michel; Miller, Lisa A.; Papakyriakou, Tim; Willis, Megan D.; Liggio, John

    2017-06-01

    Summertime Arctic shipboard observations of oxygenated volatile organic compounds (OVOCs) such as organic acids, key precursors of climatically active secondary organic aerosol (SOA), are consistent with a novel source of OVOCs to the marine boundary layer via chemistry at the sea surface microlayer. Although this source has been studied in a laboratory setting, organic acid emissions from the sea surface microlayer have not previously been observed in ambient marine environments. Correlations between measurements of OVOCs, including high levels of formic acid, in the atmosphere (measured by an online high-resolution time-of-flight mass spectrometer) and dissolved organic matter in the ocean point to a marine source for the measured OVOCs. That this source is photomediated is indicated by correlations between the diurnal cycles of the OVOC measurements and solar radiation. In contrast, the OVOCs do not correlate with levels of isoprene, monoterpenes, or dimethyl sulfide. Results from box model calculations are consistent with heterogeneous chemistry as the source of the measured OVOCs. As sea ice retreats and dissolved organic carbon inputs to the Arctic increase, the impact of this source on the summer Arctic atmosphere is likely to increase. Globally, this source should be assessed in other marine environments to quantify its impact on OVOC and SOA burdens in the atmosphere, and ultimately on climate.

  15. Microlayer source of oxygenated volatile organic compounds in the summertime marine Arctic boundary layer.

    Science.gov (United States)

    Mungall, Emma L; Abbatt, Jonathan P D; Wentzell, Jeremy J B; Lee, Alex K Y; Thomas, Jennie L; Blais, Marjolaine; Gosselin, Michel; Miller, Lisa A; Papakyriakou, Tim; Willis, Megan D; Liggio, John

    2017-06-13

    Summertime Arctic shipboard observations of oxygenated volatile organic compounds (OVOCs) such as organic acids, key precursors of climatically active secondary organic aerosol (SOA), are consistent with a novel source of OVOCs to the marine boundary layer via chemistry at the sea surface microlayer. Although this source has been studied in a laboratory setting, organic acid emissions from the sea surface microlayer have not previously been observed in ambient marine environments. Correlations between measurements of OVOCs, including high levels of formic acid, in the atmosphere (measured by an online high-resolution time-of-flight mass spectrometer) and dissolved organic matter in the ocean point to a marine source for the measured OVOCs. That this source is photomediated is indicated by correlations between the diurnal cycles of the OVOC measurements and solar radiation. In contrast, the OVOCs do not correlate with levels of isoprene, monoterpenes, or dimethyl sulfide. Results from box model calculations are consistent with heterogeneous chemistry as the source of the measured OVOCs. As sea ice retreats and dissolved organic carbon inputs to the Arctic increase, the impact of this source on the summer Arctic atmosphere is likely to increase. Globally, this source should be assessed in other marine environments to quantify its impact on OVOC and SOA burdens in the atmosphere, and ultimately on climate.

  16. Improvements on the directional characteristics of a calibration sound source using the Boundary Element Method

    DEFF Research Database (Denmark)

    Henriquez, Vicente Cutanda; Barrera Figueroa, Salvador; Juhl, Peter Møller

    2008-01-01

    is of particular importance to achieve a sound field that reaches both microphones with the same level and that is sufficiently uniform at the microphone positions, in order to reduce the effect of misalignment. An existing sound source has been modeled using the Boundary Element Method, and the simulations have......The project Euromet-792 aims to investigate and improve methods for secondary free-field calibration of microphones. In this framework, the comparison method is being studied at DFM in relation to the more usual substitution method of microphone calibration. The design of the sound source...... been used to modify the source and make it suitable for this kind of calibration. It has been found that a central plug, already present in the device, can be re-shaped in such a way that makes the sound field on the microphone positions more uniform, even at rather high frequencies. Measurements have...

  17. Characteristics of sources and sinks of momentum in a turbulent boundary layer

    Science.gov (United States)

    Fiscaletti, D.; Ganapathisubramani, B.

    2018-05-01

    In turbulent boundary layers, the wall-normal gradient of the Reynolds shear stress identifies momentum sources and sinks (T =∂ [-u v ]/∂ y ). These motions can be physically interpreted in two ways: (1) as contributors to the turbulence term balancing the mean momentum equation, and (2) as regions of strong local interaction between velocity and vorticity fluctuations. In this paper, the space-time evolution of momentum sources and sinks is investigated in a turbulent boundary layer at the Reynolds number (Reτ) = 2700, with time-resolved planar particle image velocimetry in a plane along the streamwise and wall-normal directions. Wave number-frequency power spectra of T fluctuations reveal that the wave velocities of momentum sources and sinks tend to match the local streamwise velocity in proximity to the wall. However, as the distance from the wall increases, the wave velocities of the T events are slightly lower than the local streamwise velocities of the flow, which is also confirmed from the tracking in time of the intense momentum sources and sinks. This evidences that momentum sources and sinks are preferentially located in low-momentum regions of the flow. The spectral content of the T fluctuations is maximum at the wall, but it decreases monotonically as the distance from the wall grows. The relative spectral contributions of the different wavelengths remains unaltered at varying wall-normal locations. From autocorrelation coefficient maps, the characteristic streamwise and wall-normal extents of the T motions are respectively 60 and 40 wall units, independent of the wall distance. Both statistics and instantaneous visualizations show that momentum sources and sinks have a preferential tendency to be organized in positive-negative pairs in the wall-normal direction.

  18. Sources and Transport of Aerosol above the Boundary Layer over the Mediterranean Basin

    Science.gov (United States)

    Roberts, Greg; Corrigan, Craig; Ritchie, John; Pont, Veronique; Claeys, Marine; Sciare, Jean; Mallet, Marc; Dulac, François; Mihalopoulos, Nikos

    2015-04-01

    The Mediterranean Region has been identified as sensitive to changes in the hydrological cycle, which could affect the water resources for millions of people by the turn of the century. However, prior to recent observations, most climate models have not accounted for the impacts of aerosol in this region. Past airborne studies have shown that aerosol sources from Europe and Africa are often transported throughout the lower troposphere; yet, because of their complex vertical distribution, it is a challenge to capture the variability and quantify the contribution of these sources to the radiative budget and precipitation processes. The PAEROS ChArMEx Mountain Experiment (PACMEx) complemented the regional activities by collecting aerosol data from atop a mountain on the island of Corsica, France in order to assess boundary layer / free troposphere atmospheric processes. In June/July 2013, PACMEx instruments were deployed at 2000 m.asl near the center of Corsica, France to complement ground-based aerosol observations at 550 m.asl on the northern peninsula, as well as airborne measurements. Comparisons between the peninsula site and the mountain site show similar general trends in aerosol properties; yet, differences in aerosol properties reveal the myriad transport mechanisms over the Mediterranean Basin. Using aerosol physicochemical data coupled with back trajectory analysis, different sources have been identified including Saharan dust transport, residual dust mixed with sea salt, anthropogenic emissions from Western Europe, and a period of biomass burning from Eastern Europe. Each period exhibits distinct signatures in the aerosol related to transport processes above and below the boundary layer. In addition, the total aerosol concentrations at the mountain site revealed a strong diurnal cycling the between the atmospheric boundary layer and the free troposphere, which is typical of mountain-top observations. PACMEx was funded by the National Science Foundation

  19. Global existence and nonexistence for the viscoelastic wave equation with nonlinear boundary damping-source interaction

    KAUST Repository

    Said-Houari, Belkacem

    2012-09-01

    The goal of this work is to study a model of the viscoelastic wave equation with nonlinear boundary/interior sources and a nonlinear interior damping. First, applying the Faedo-Galerkin approximations combined with the compactness method to obtain existence of regular global solutions to an auxiliary problem with globally Lipschitz source terms and with initial data in the potential well. It is important to emphasize that it is not possible to consider density arguments to pass from regular to weak solutions if one considers regular solutions of our problem where the source terms are locally Lipschitz functions. To overcome this difficulty, we use an approximation method involving truncated sources and adapting the ideas in [13] to show that the existence of weak solutions can still be obtained for our problem. Second, we show that under some restrictions on the initial data and if the interior source dominates the interior damping term, then the solution ceases to exist and blows up in finite time provided that the initial data are large enough.

  20. Global existence and nonexistence for the viscoelastic wave equation with nonlinear boundary damping-source interaction

    KAUST Repository

    Said-Houari, Belkacem; Nascimento, Flá vio A Falcã o

    2012-01-01

    The goal of this work is to study a model of the viscoelastic wave equation with nonlinear boundary/interior sources and a nonlinear interior damping. First, applying the Faedo-Galerkin approximations combined with the compactness method to obtain existence of regular global solutions to an auxiliary problem with globally Lipschitz source terms and with initial data in the potential well. It is important to emphasize that it is not possible to consider density arguments to pass from regular to weak solutions if one considers regular solutions of our problem where the source terms are locally Lipschitz functions. To overcome this difficulty, we use an approximation method involving truncated sources and adapting the ideas in [13] to show that the existence of weak solutions can still be obtained for our problem. Second, we show that under some restrictions on the initial data and if the interior source dominates the interior damping term, then the solution ceases to exist and blows up in finite time provided that the initial data are large enough.

  1. Consideration of a ultracold neutron source in two-dimensional cylindrical geometry by taking simulated boundaries

    Energy Technology Data Exchange (ETDEWEB)

    Gheisari, R., E-mail: gheisari@pgu.ac.ir [Physics Department, Persian Gulf University, Bushehr 75169 (Iran, Islamic Republic of); Nuclear Energy Research Center, Persian Gulf University, Bushehr 75169 (Iran, Islamic Republic of); Firoozabadi, M. M.; Mohammadi, H. [Department of Physics, University of Birjand, Birjand 97175 (Iran, Islamic Republic of)

    2014-01-15

    A new idea to calculate ultracold neutron (UCN) production by using Monte Carlo simulation method to calculate the cold neutron (CN) flux and an analytical approach to calculate the UCN production from the simulated CN flux was given. A super-thermal source (UCN source) was modeled based on an arrangement of D{sub 2}O and solid D{sub 2} (sD{sub 2}). The D{sub 2}O was investigated as the neutron moderator, and sD{sub 2} as the converter. In order to determine the required parameters, a two-dimensional (2D) neutron balance equation written in Matlab was combined with the MCNPX simulation code. The 2D neutron-transport equation in cylindrical (ρ − z) geometry was considered for 330 neutron energy groups in the sD{sub 2}. The 2D balance equation for UCN and CN was solved using simulated CN flux as boundary value. The UCN source dimensions were calculated for the development of the next UCN source. In the optimal condition, the UCN flux and the UCN production rate (averaged over the sD{sub 2} volume) equal to 6.79 × 10{sup 6} cm{sup −2}s{sup −1} and 2.20 ×10{sup 5} cm{sup −3}s{sup −1}, respectively.

  2. Characteristics and dynamics of the boundary layer in RF-driven sources for negative hydrogen ions

    International Nuclear Information System (INIS)

    Wimmer, Christian

    2014-01-01

    The design of the neutral beam injection system of the upcoming ITER fusion device is based on the IPP (Max-Planck-Institut fuer Plasmaphysik, Garching) prototype source for negative hydrogen ions. The latter consists of a driver, in which hydrogen (or deuterium) molecules are dissociated in a large degree in a hydrogen plasma; the plasma expands then towards the plasma grid, on which negative hydrogen ions are formed by conversion of atoms or positive ions by the surface process and are extracted in the following accompanied by the co-extraction of electrons via a three grid system. Electrons are removed out of the extracted beam prior full acceleration using deflection magnets, bending them onto the second grid. The thermal load limits the tolerable amount of co-extracted electrons. A magnetic filter field in the expansion chamber reduces the electron temperature and density, on the one hand in order to minimize the destruction process of negative hydrogen ions by electron collisions and on the other hand in order to reduce the co-extracted electron current density. Caesium is evaporated into the source for an effective production of negative hydrogen ions, lowering the work function of the plasma grid. Due to the high chemical reactivity of caesium, the high vacuum condition in the source and the plasma-wall interaction, complex redistribution processes of Cs take place in the ion source. The boundary layer is the plasma volume between the magnetic filter field and the plasma grid, in which the most important physics of the negative ion source takes place: the production of negative hydrogen ions at the plasma grid, their transport through the plasma and the following extraction. A deeper understanding of the plasma and Cs dynamics in the boundary layer is desirable in order to achieve a stable long-pulse operation as well as to identify possible future improvements. For this reason, the boundary layer of the prototype source has been characterized in this work

  3. Ammonia in the summertime Arctic marine boundary layer: sources, sinks, and implications

    Directory of Open Access Journals (Sweden)

    G. R. Wentworth

    2016-02-01

    Full Text Available Continuous hourly measurements of gas-phase ammonia (NH3(g were taken from 13 July to 7 August 2014 on a research cruise throughout Baffin Bay and the eastern Canadian Arctic Archipelago. Concentrations ranged from 30 to 650 ng m−3 (40–870 pptv with the highest values recorded in Lancaster Sound (74°13′ N, 84°00′ W. Simultaneous measurements of total ammonium ([NHx], pH and temperature in the ocean and in melt ponds were used to compute the compensation point (χ, which is the ambient NH3(g concentration at which surface–air fluxes change direction. Ambient NH3(g was usually several orders of magnitude larger than both χocean and χMP (< 0.4–10 ng m3 indicating these surface pools are net sinks of NH3. Flux calculations estimate average net downward fluxes of 1.4 and 1.1 ng m−2 s−1 for the open ocean and melt ponds, respectively. Sufficient NH3(g was present to neutralize non-sea-salt sulfate (nss-SO42− in the boundary layer during most of the study. This finding was corroborated with a historical data set of PM2.5 composition from Alert, Nunavut (82°30′ N, 62°20′ W wherein the median ratio of NH4+/nss-SO42− equivalents was greater than 0.75 in June, July and August. The GEOS-Chem chemical transport model was employed to examine the impact of NH3(g emissions from seabird guano on boundary-layer composition and nss-SO42− neutralization. A GEOS-Chem simulation without seabird emissions underestimated boundary layer NH3(g by several orders of magnitude and yielded highly acidic aerosol. A simulation that included seabird NH3 emissions was in better agreement with observations for both NH3(g concentrations and nss-SO42− neutralization. This is strong evidence that seabird colonies are significant sources of NH3 in the summertime Arctic, and are ubiquitous enough to impact atmospheric composition across the entire Baffin Bay region. Large wildfires in the Northwest Territories were likely

  4. Context-aware compliance checking

    NARCIS (Netherlands)

    Werf, van der J.M.E.M.; Verbeek, H.M.W.; Aalst, van der W.M.P.; Barros, A.; Gal, A.; Kindler, E.

    2012-01-01

    Organizations face more and more the burden to show that their business is compliant with respect to many different boundaries. The activity of compliance checking is commonly referred to as auditing. As information systems supporting the organization’s business record their usage, process mining

  5. Effects of Heterogeneity and Uncertainties in Sources and Initial and Boundary Conditions on Spatiotemporal Variations of Groundwater Levels

    Science.gov (United States)

    Zhang, Y. K.; Liang, X.

    2014-12-01

    Effects of aquifer heterogeneity and uncertainties in source/sink, and initial and boundary conditions in a groundwater flow model on the spatiotemporal variations of groundwater level, h(x,t), were investigated. Analytical solutions for the variance and covariance of h(x, t) in an unconfined aquifer described by a linearized Boussinesq equation with a white noise source/sink and a random transmissivity field were derived. It was found that in a typical aquifer the error in h(x,t) in early time is mainly caused by the random initial condition and the error reduces as time goes to reach a constant error in later time. The duration during which the effect of the random initial condition is significant may last a few hundred days in most aquifers. The constant error in groundwater in later time is due to the combined effects of the uncertain source/sink and flux boundary: the closer to the flux boundary, the larger the error. The error caused by the uncertain head boundary is limited in a narrow zone near the boundary but it remains more or less constant over time. The effect of the heterogeneity is to increase the variation of groundwater level and the maximum effect occurs close to the constant head boundary because of the linear mean hydraulic gradient. The correlation of groundwater level decreases with temporal interval and spatial distance. In addition, the heterogeneity enhances the correlation of groundwater level, especially at larger time intervals and small spatial distances.

  6. An advanced boundary element method (BEM) implementation for the forward problem of electromagnetic source imaging

    International Nuclear Information System (INIS)

    Akalin-Acar, Zeynep; Gencer, Nevzat G

    2004-01-01

    The forward problem of electromagnetic source imaging has two components: a numerical model to solve the related integral equations and a model of the head geometry. This study is on the boundary element method (BEM) implementation for numerical solutions and realistic head modelling. The use of second-order (quadratic) isoparametric elements and the recursive integration technique increase the accuracy in the solutions. Two new formulations are developed for the calculation of the transfer matrices to obtain the potential and magnetic field patterns using realistic head models. The formulations incorporate the use of the isolated problem approach for increased accuracy in solutions. If a personal computer is used for computations, each transfer matrix is calculated in 2.2 h. After this pre-computation period, solutions for arbitrary source configurations can be obtained in milliseconds for a realistic head model. A hybrid algorithm that uses snakes, morphological operations, region growing and thresholding is used for segmentation. The scalp, skull, grey matter, white matter and eyes are segmented from the multimodal magnetic resonance images and meshes for the corresponding surfaces are created. A mesh generation algorithm is developed for modelling the intersecting tissue compartments, such as eyes. To obtain more accurate results quadratic elements are used in the realistic meshes. The resultant BEM implementation provides more accurate forward problem solutions and more efficient calculations. Thus it can be the firm basis of the future inverse problem solutions

  7. The Implications of Strike-Slip Earthquake Source Properties on the Transform Boundary Development Process

    Science.gov (United States)

    Neely, J. S.; Huang, Y.; Furlong, K.

    2017-12-01

    Subduction-Transform Edge Propagator (STEP) faults, produced by the tearing of a subducting plate, allow us to study the development of a transform plate boundary and improve our understanding of both long-term geologic processes and short-term seismic hazards. The 280 km long San Cristobal Trough (SCT), formed by the tearing of the Australia plate as it subducts under the Pacific plate near the Solomon and Vanuatu subduction zones, shows along-strike variations in earthquake behaviors. The segment of the SCT closest to the tear rarely hosts earthquakes > Mw 6, whereas the SCT sections more than 80 - 100 km from the tear experience Mw7 earthquakes with repeated rupture along the same segments. To understand the effect of cumulative displacement on SCT seismicity, we analyze b-values, centroid-time delays and corner frequencies of the SCT earthquakes. We use the spectral ratio method based on Empirical Green's Functions (eGfs) to isolate source effects from propagation and site effects. We find high b-values along the SCT closest to the tear with values decreasing with distance before finally increasing again towards the far end of the SCT. Centroid time-delays for the Mw 7 strike-slip earthquakes increase with distance from the tear, but corner frequency estimates for a recent sequence of Mw 7 earthquakes are approximately equal, indicating a growing complexity in earthquake behavior with distance from the tear due to a displacement-driven transform boundary development process (see figure). The increasing complexity possibly stems from the earthquakes along the eastern SCT rupturing through multiple asperities resulting in multiple moment pulses. If not for the bounding Vanuatu subduction zone at the far end of the SCT, the eastern SCT section, which has experienced the most displacement, might be capable of hosting larger earthquakes. When assessing the seismic hazard of other STEP faults, cumulative fault displacement should be considered a key input in

  8. Loss and source mechanisms of Jupiter's radiation belts near the inner boundary of trapping regions

    Science.gov (United States)

    Santos-Costa, Daniel; Bolton, Scott J.; Becker, Heidi N.; Clark, George; Kollmann, Peter; Paranicas, Chris; Mauk, Barry; Joergensen, John L.; Adriani, Alberto; Thorne, Richard M.; Bagenal, Fran; Janssen, Mike A.; Levin, Steve M.; Oyafuso, Fabiano A.; Williamson, Ross; Adumitroaie, Virgil; Ingersoll, Andrew P.; Kurth, Bill; Connerney, John E. P.

    2017-04-01

    We have merged a set of physics-based and empirical models to investigate the energy and spatial distributions of Jupiter's electron and proton populations in the inner and middle magnetospheric regions. Beyond the main source of plasma (> 5 Rj) where interchange instability is believed to drive the radial transport of charged particles, the method originally developed by Divine and Garrett [J. Geophys. Res., 88, 6889-6903, 1983] has been adapted. Closer to the planet where field fluctuations control the radial transport, a diffusion theory approach is used. Our results for the equatorial and mid-latitude regions are compared with Pioneer and Galileo Probe measurements. Data collected along Juno's polar orbit allow us to examine the features of Jupiter's radiation environment near the inner boundary of trapping regions. Significant discrepancies between Juno (JEDI keV energy particles and high energy radiation environment measurements made by Juno's SRU and ASC star cameras and the JIRAM infrared imager) and Galileo Probe data sets and models are observed close to the planet. Our simulations of Juno MWR observations of Jupiter's electron-belt emission confirm the limitation of our model to realistically depict the energy and spatial distributions of the ultra-energetic electrons. In this paper, we present our modeling approach, the data sets and resulting data-model comparisons for Juno's first science orbits. We describe our effort to improve our models of electron and proton belts. To gain a physical understanding of the dissimilarities with observations, we revisit the magnetic environment and the mechanisms of loss and source in our models.

  9. Interference by amplitude division with extended sources by paraxial boundary conditions

    International Nuclear Information System (INIS)

    Liñares, J; Nistal, M C

    2014-01-01

    We present a wave-optics paraxial approach to the interference by amplitude division produced by plane-parallel films (or plates) and non-plane-parallel films, or by equivalent optical devices such as a Michelson interferometer, when they are illuminated with extended (spatially incoherent) quasi-monochromatic sources. To the best of our knowledge, the most common approaches to the study of interference are based, for simplicity, on the combined use of geometrical optics concepts, such as the optical path length along a ray, together with some wave-optics concepts such as optical phases. However, interference phenomena have been the means by which the wave nature of light has been established and therefore geometrical and wave concepts are so far-off that their simultaneous use can give rise to misleading concepts. Therefore, the primary aim of this work is to provide an analytical homogeneous description of interference by amplitude division using only paraxial spherical waves and boundary conditions at smooth interfaces or discontinuities in such a way that the calculation of the total optical field, interference irradiance, fringe visibility, coherence degree, localization of the interference and so on, can be made in a unified way by taking a fully wave-optics approach. The paraxial regime is enough in most cases and, moreover, interference is generally collected by an optical instrument such as a lens or the eye itself, in which a paraxial approximation is required. This work is particularly aimed at university physics teachers and undergraduate and first year postgraduate students. (papers)

  10. Numerical design and testing of a sound source for secondary calibration of microphones using the Boundary Element Method

    DEFF Research Database (Denmark)

    Cutanda Henriquez, Vicente; Juhl, Peter Møller; Barrera Figueroa, Salvador

    2009-01-01

    Secondary calibration of microphones in free field is performed by placing the microphone under calibration in an anechoic chamber with a sound source, and exposing it to a controlled sound field. A calibrated microphone is also measured as a reference. While the two measurements are usually made...... apart to avoid acoustic interaction. As a part of the project Euromet-792, aiming to investigate and improve methods for secondary free-field calibration of microphones, a sound source suitable for simultaneous secondary free-field calibration has been designed using the Boundary Element Method...... of the Danish Fundamental Metrology Institute (DFM). The design and verification of the source are presented in this communication....

  11. Regular health checks

    DEFF Research Database (Denmark)

    Grønhøj Larsen, Christian; Jørgensen, Karsten Juhl; Gøtzsche, Peter C

    2012-01-01

    To investigate whether Danish providers of general health checks present a balanced account of possible benefits and harms on their websites and whether the health checks are evidence-based.......To investigate whether Danish providers of general health checks present a balanced account of possible benefits and harms on their websites and whether the health checks are evidence-based....

  12. Phonon cross-plane transport and thermal boundary resistance: effect of heat source size and thermal boundary resistance on phonon characteristics

    Science.gov (United States)

    Ali, H.; Yilbas, B. S.

    2016-09-01

    Phonon cross-plane transport across silicon and diamond thin films pair is considered, and thermal boundary resistance across the films pair interface is examined incorporating the cut-off mismatch and diffusive mismatch models. In the cut-off mismatch model, phonon frequency mismatch for each acoustic branch is incorporated across the interface of the silicon and diamond films pair in line with the dispersion relations of both films. The frequency-dependent and transient solution of the Boltzmann transport equation is presented, and the equilibrium phonon intensity ratios at the silicon and diamond film edges are predicted across the interface for each phonon acoustic branch. Temperature disturbance across the edges of the films pair is incorporated to assess the phonon transport characteristics due to cut-off and diffusive mismatch models across the interface. The effect of heat source size, which is allocated at high-temperature (301 K) edge of the silicon film, on the phonon transport characteristics at the films pair interface is also investigated. It is found that cut-off mismatch model predicts higher values of the thermal boundary resistance across the films pair interface as compared to that of the diffusive mismatch model. The ratio of equilibrium phonon intensity due to the cut-off mismatch over the diffusive mismatch models remains >1 at the silicon edge, while it becomes <1 at the diamond edge for all acoustic branches.

  13. Diffusion of hydrogen from plasma source by grain boundaries in EFG silicon

    International Nuclear Information System (INIS)

    Fedotov, A.; Saad, Anis M.H.; Drozdov, N.; Mazanik, A.; Ulyashin, A.; Fahrner, W.R.; Stognii, A.

    2001-01-01

    Diffusion of atomized hydrogen along grain boundaries (GBs) studied by transformation of their electrical activity in p-type silicon bi crystalline samples cut from EFG silicon crystals was investigated. The changes in electrical activity of GBs was estimated relative to both minority (MiC) and majority (MaC) carriers and demonstrated the correlation between the type, structure and thermal pre-history of GBs. It was shown on the base of this study that diffusion along GBs depends essentially on three factors: type of GBs, state of ribbons (as-grown or annealed) and concurrence of grain boundary dangling bonds and boron passivation effects. The model of the longitudinal hydrogen diffusion that explains these results is proposed

  14. Transient reaction of an elastic half-plane on a source of a concentrated boundary disturbance

    Science.gov (United States)

    Okonechnikov, A. S.; Tarlakovski, D. V.; Ul'yashina, A. N.; Fedotenkov, G. V.

    2016-11-01

    One of the key problems in studying the non-stationary processes of solid mechanics is obtaining of influence functions. These functions serve as solutions for the problems of effect of sudden concentrated loads on a body with linear elastic properties. Knowledge of the influence functions allows us to obtain the solutions for the problems with non-mixed boundary and initial conditions in the form of quadrature formulae with the help of superposition principle, as well as get the integral governing equations for the problems with mixed boundary and initial conditions. This paper offers explicit derivations for all nonstationary surface influence functions of an elastic half-plane in a plane strain condition. It is achieved with the help of combined inverse transform of a Fourier-Laplace integral transformation. The external disturbance is both dynamic and kinematic. The derived functions in xτ-domain are studied to find and describe singularities and are supplemented with graphs.

  15. Finite element time domain modeling of controlled-Source electromagnetic data with a hybrid boundary condition

    DEFF Research Database (Denmark)

    Cai, Hongzhu; Hu, Xiangyun; Xiong, Bin

    2017-01-01

    method which is unconditionally stable. We solve the diffusion equation for the electric field with a total field formulation. The finite element system of equation is solved using the direct method. The solutions of electric field, at different time, can be obtained using the effective time stepping...... method with trivial computation cost once the matrix is factorized. We try to keep the same time step size for a fixed number of steps using an adaptive time step doubling (ATSD) method. The finite element modeling domain is also truncated using a semi-adaptive method. We proposed a new boundary...... condition based on approximating the total field on the modeling boundary using the primary field corresponding to a layered background model. We validate our algorithm using several synthetic model studies....

  16. Large-eddy simulation of convective boundary layer generated by highly heated source with open source code, OpenFOAM

    International Nuclear Information System (INIS)

    Hattori, Yasuo; Suto, Hitoshi; Eguchi, Yuzuru; Sano, Tadashi; Shirai, Koji; Ishihara, Shuji

    2011-01-01

    Spatial- and temporal-characteristics of turbulence structures in the close vicinity of a heat source, which is a horizontal upward-facing round plate heated at high temperature, are examined by using well resolved large-eddy simulations. The verification is carried out through the comparison with experiments: the predicted statistics, including the PDF distribution of temperature fluctuations, agree well with measurements, indicating that the present simulations have a capability to appropriately reproduce turbulence structures near the heat source. The reproduced three-dimensional thermal- and fluid-fields in the close vicinity of the heat source reveals developing processes of coherence structures along the surface: the stationary- and streaky-flow patterns appear near the edge, and such patterns randomly shift to cell-like patterns with incursion into the center region, resulting in thermal-plume meandering. Both the patterns have very thin structures, but the depth of streaky structure is considerably small compared with that of cell-like patterns; this discrepancy causes the layered structures. The structure is the source of peculiar turbulence characteristics, the prediction of which is quite difficult with RANS-type turbulence models. The understanding such structures obtained in present study must be helpful to improve the turbulence model used in nuclear engineering. (author)

  17. Free troposphere as a major source of CCN for the equatorial pacific boundary layer: long-range transport and teleconnections

    Directory of Open Access Journals (Sweden)

    A. D. Clarke

    2013-08-01

    Full Text Available Airborne aerosol measurements in the central equatorial Pacific during PASE (Pacific Atmospheric Sulfur Experiment revealed that cloud condensation nuclei (CCN activated in marine boundary layer (MBL clouds were strongly influenced by entrainment from the free troposphere (FT. About 65% entered at sizes effective as CCN in MBL clouds, while ~25% entered the MBL too small to activate but subsequently grew via gas to particle conversion. The remaining ~10% were inferred to be sea salt aerosol. FT aerosols at low carbon monoxide (CO mixing ratios ( The observed FT transport over thousands of kilometers indicates teleconnections between MBL CCN and cloud-scavenged sources of both natural and/or residual combustion origin. Nonetheless, in spite of its importance, this source of CCN number is not well represented in most current models and is generally not detectable by satellite because of the low aerosol scattering in such layers as a result of cloud scavenging. In addition, our measurements confirm nucleation in the MBL was not evident during PASE and argue against a localized linear relation in the MBL between dimethyl sulfide (DMS and CCN suggested by the CLAW hypothesis. However, when the FT is not impacted by long-range transport, sulfate aerosol derived from DMS pumped aloft in the ITCZ (Inter-Tropical Convergence Zone can provide a source of CCN to the boundary layer via FT teleconnections involving more complex non-linear processes.

  18. Source term boundary adaptive estimation in a first-order 1D hyperbolic PDE: Application to a one loop solar collector through

    KAUST Repository

    Mechhoud, Sarra; Laleg-Kirati, Taous-Meriem

    2016-01-01

    In this paper, boundary adaptive estimation of solar radiation in a solar collector plant is investigated. The solar collector is described by a 1D first-order hyperbolic partial differential equation where the solar radiation models the source term

  19. Microlayer source of oxygenated volatile organic compounds in the summertime marine Arctic boundary layer

    OpenAIRE

    Mungall, Emma L.; Abbatt, Jonathan P. D.; Wentzell, Jeremy J. B.; Lee, Alex K. Y.; Thomas, Jennie L.; Blais, Marjolaine; Gosselin, Michel; Miller, Lisa A.; Papakyriakou, Tim; Willis, Megan D.; Liggio, John

    2017-01-01

    A biogeochemical connection between the atmosphere and the ocean is demonstrated whereby a marine source of oxygenated volatile organic compounds is identified. Compounds of this type are involved in the formation of secondary organic aerosol, which remains one of the most poorly understood components of Earth’s climate system due in part to the diverse sources of its volatile organic compound precursors. This is especially the case for marine environments, where there are more oxygenated vol...

  20. Noise source localization on tyres using an inverse boundary element method

    DEFF Research Database (Denmark)

    Schuhmacher, Andreas; Saemann, E-U; Hald, J

    1998-01-01

    A dominating part of tyre noise is radiated from a region close to the tyre/road contact patch, where it is very difficult to measure both the tyre vibration and the acoustic near field. The approach taken in the present paper is to model the tyre and road surfaces with a Boundary Element Model...... (BEM), with unknown node vibration data on the tyre surface. The BEM model is used to calculate a set of transfer functions from the node vibrations to the sound pressure at a set of microphone positions around the tyre. By approximate inversion of the matrix of transfer functions, the surface...... from tyre noise measurements will be presented at the conference....

  1. Magnetospheric source region of discrete auroras inferred from their relationship with isotropy boundaries of energetic particles

    Directory of Open Access Journals (Sweden)

    A. G. Yahnin

    1997-08-01

    Full Text Available According to observations, the discrete auroral arcs can sometimes be found, either deep inside the auroral oval or at the poleward border of the wide (so-called double auroral oval, which map to very different regions of the magnetotail. To find common physical conditions for the auroral-arc generation in these magnetotail regions, we study the spatial relationship between the diffuse and discrete auroras and the isotropic boundaries (IBs of the precipitating energetic particles which can be used to characterise locally the equatorial magnetic field in the tail. From comparison of ground observation of auroral forms with meridional profiles of particle flux measured simultaneously by the low-altitude NOAA satellites above the ground observation region, we found that (1 discrete auroral arcs are always situated polewards from (or very close to the IB of >30-keV electrons, whereas (2 the IB of the >30-keV protons is often seen inside the diffuse aurora. These relationships hold true for both quiet and active (substorm conditions in the premidnight-nightside (18-01-h MLT sector considered. In some events the auroral arcs occupy a wide latitudinal range. The most equatorial of these arcs was found at the poleward edge of the diffuse auroras (but anyway in the vicinity of the electron IB, the most poleward arcs were simultaneously observed on the closed field lines near the polar-cap boundary. These observations disagree with the notion that the discrete aurora originate exclusively in the near-Earth portion of plasma sheet or exclusively on the PSBL field lines. Result (1 may imply a fundamental feature of auroral-arc formation: they originate in the current-sheet regions having very curved and tailward-stretched magnetic field lines.

  2. Dynamical injections as the source of near geostationary quiet time particle spatial boundaries

    International Nuclear Information System (INIS)

    Mauk, B.H.; Meng, C.I.

    1983-01-01

    To test our understanding of quasi-stationary magnetospheric particle convection, we address here a particular class of particle feature (plasma dropouts at 0 eV to 5 keV) observed regularly by near geostationary satellites in the noon to dusk quadrant, often during the apparent absence of recent (hours) substorm activity. At first consideration the feature appears to result from the passage of the satellites toward and into the so-called ''forbidden zones'' of the quasi-stationary particle convection patterns. It is demonstrated here that the energy dispersion of the feature cannot be explained by simple stationary convection models even when loss processes are imposed on those particles that penetrate most closely to the earth. Also, the radial position of the feature does not vary with geomagnetic activity as expected from steady convection models. It is concluded that dynamical processes are responsible. However, models based on the modification of the so-called cross-tail field configuration against initial stationary convection patterns are rejected here because these models preserve the qualitative sense of the energy dispersions of the initial patterns. It is proposed that the spatial structures of pase (24 hours) dynamical, nightside particle injections determine to a great extent the character of the feature. It is shown that detailed simulations based on the double-spiraled ''injection boundary'' concept (used previously to reproduce the fast changing nighttime features) reproduce very well the character and dispersion senses of the noon-to-dusk feature by allowing the distributions to evolve for many hours. It is emphasized that the portion of the original injection boundary which gives rise to this feature of interest is the decidely ''non-Alfvenic'' portion

  3. Lead isotope ratios in six lake sediment cores from Japan Archipelago: Historical record of trans-boundary pollution sources.

    Science.gov (United States)

    Hosono, Takahiro; Alvarez, Kelly; Kuwae, Michinobu

    2016-07-15

    Sediment cores from six lakes situated from north to south on the Japanese Archipelago were collected during 2009-2010 to investigate the hypothesis that deposition of lead (Pb) was coming from East Asia (including China, South Korea and eastern part of Russia). Accumulation rates and ages of the lake sediment were estimated by the (210)Pb constant rate of supply model and (137)Cs inputs to reconstruct the historical trends of Pb accumulation. Cores from four lakes located in the north and central Japan, showed clear evidence of Pb pollution with a change in the (206)Pb/(207)Pb and (208)Pb/(207)Pb ratios in the recent sediment as compared to the deeper sediment. Among the six studied lakes, significant inputs of anthropogenic lead emissions were observed at Lake Mikazuki (north Hokkaido in north Japan), Lake Chokai (north of Honshu), and Lake Mikuriga (central part of Honshu). Pb isotopic comparison of collected core sediment and previously reported data for wet precipitation and aerosols from different Asian regions indicate that, before 1900, Pb accumulated in these three lakes was not affected by trans-boundary sources. Lake Mikazuki started to receive Pb emissions from Russia in early 1900s, and during the last two decades, this lake has been affected by trans-boundary Pb pollution from northern China. Lake Chokai has received Pb pollutant from northern China since early 1900s until 2009, whereas for the Lake Mikuriga the major Pb contaminant was transported from southern China during the past 100years. The results of our study demonstrate that Japan Archipelago has received trans-boundary Pb emissions from different parts of East Asian region depending on location, and the major source region has changed historically. Copyright © 2016 Elsevier B.V. All rights reserved.

  4. Source and Extent of Volcanic Ashes at the Permian-Triassic Boundary in South China and Its implications

    Science.gov (United States)

    Wang, M.; Zhong, Y. T.; Hou, Y. L.; He, B.

    2017-12-01

    Highly correlated with the Permian-Triassic Boundary (PTB) Mass Extinction in stratigraphic section, volcanic ashes around the P-T Boundary in South China have been suggested to be a likely cause of the PTB Mass Extinction. So the nature, source and extent of these volcanic ashes have great significance in figuring out the cause of the PTB Mass Extinction. In this study, we attempt to constrain the source and extent of the PTB volcanic ashes in South China by studying pyroclastic sedimentary rocks and the spatial distribution of tuffs and ashes in South China. The detrital zircons of tuffaceous sandstones from Penglaitan section yield an age spectrum peaked at 252Ma, with ɛHf(t) values varying from -20 to -5 ,and have Nb/Hf, Th/Nb and Hf/Th ratios similar to those from arc/orogenic-related settings. Coarse tuffaceous sandstones imply that their source is in limited distance. Those pyroclastic sedimentary rocks in Penglaitan are well correlated with the PTB volcanic ashes in Meishan GSSP section in stratigraphy. In the spatial distribution, pyroclastic sedimentary rocks and tuffs distribute only in southwest of South China, while finer volcanic ashes are mainly in the northern part. This spatial distribution suggests the source of tuffs and ashes was to the south or southwest of South China. Former studies especially that of Permian-Triassic magmatism in Hainan Island have supported the existence of a continental arc related to the subduction and closure of Palaeo-Tethys on the southwestern margin of South China during Permian to early Triassic. It is suggested that the PTB ashes possibly derived from this Paleo-Tethys continental arc. The fact that volcanic ashes haven't been reported or found in PTB stratum in North China or Northwest China implies a limited extent of the volcanism, which thus is too small to cause the PTB mass extinction.

  5. checkCIF/PLATON (full publication check)

    Indian Academy of Sciences (India)

    editor handling your paper, to upload your CIF via our web site. PLATON version of 05/02/2014; check.def file version of 05/02/2014. Datablock I - ellipsoid plot http://vm02b.iucr.org/cgi-bin/checkcif_hkl.pl(第 3/4 页)2014-2-12 09:09:12 ...

  6. Improvements on the directional characteristics of a calibration sound source using the Boundary Element Method

    DEFF Research Database (Denmark)

    Cutanda Henriquez, Vicente; Barrera Figueroa, Salvador; Juhl, Peter Møller

    2008-01-01

    The project Euromet-792 aims to investigate and improve methods for secondary free-field calibration of microphones. In this framework, the comparison method is being studied at DFM in relation to the more usual substitution method of microphone calibration. The design of the sound source is of p...

  7. Lead isotope ratios in six lake sediment cores from Japan Archipelago: Historical record of trans-boundary pollution sources

    International Nuclear Information System (INIS)

    Hosono, Takahiro; Alvarez, Kelly; Kuwae, Michinobu

    2016-01-01

    Sediment cores from six lakes situated from north to south on the Japanese Archipelago were collected during 2009–2010 to investigate the hypothesis that deposition of lead (Pb) was coming from East Asia (including China, South Korea and eastern part of Russia). Accumulation rates and ages of the lake sediment were estimated by the "2"1"0Pb constant rate of supply model and "1"3"7Cs inputs to reconstruct the historical trends of Pb accumulation. Cores from four lakes located in the north and central Japan, showed clear evidence of Pb pollution with a change in the "2"0"6Pb/"2"0"7Pb and "2"0"8Pb/"2"0"7Pb ratios in the recent sediment as compared to the deeper sediment. Among the six studied lakes, significant inputs of anthropogenic lead emissions were observed at Lake Mikazuki (north Hokkaido in north Japan), Lake Chokai (north of Honshu), and Lake Mikuriga (central part of Honshu). Pb isotopic comparison of collected core sediment and previously reported data for wet precipitation and aerosols from different Asian regions indicate that, before 1900, Pb accumulated in these three lakes was not affected by trans-boundary sources. Lake Mikazuki started to receive Pb emissions from Russia in early 1900s, and during the last two decades, this lake has been affected by trans-boundary Pb pollution from northern China. Lake Chokai has received Pb pollutant from northern China since early 1900s until 2009, whereas for the Lake Mikuriga the major Pb contaminant was transported from southern China during the past 100 years. The results of our study demonstrate that Japan Archipelago has received trans-boundary Pb emissions from different parts of East Asian region depending on location, and the major source region has changed historically. - Highlights: • Historical trend of Pb pollution was recorded in six Japanese Lakes. • Pb concentration and Pb isotope ratios were determined for sediment cores. • High [Pb] and less radiogenic Pb isotope ratios were observed since

  8. Lead isotope ratios in six lake sediment cores from Japan Archipelago: Historical record of trans-boundary pollution sources

    Energy Technology Data Exchange (ETDEWEB)

    Hosono, Takahiro, E-mail: hosono@kumamoto-u.ac.jp [Priority Organization for Innovation and Excellence, Kumamoto University, 2-39-1 Kurokami, Kumamoto 860-8555 (Japan); Alvarez, Kelly [Priority Organization for Innovation and Excellence, Kumamoto University, 2-39-1 Kurokami, Kumamoto 860-8555 (Japan); Kuwae, Michinobu [Senior Research Fellow Center, Ehime University, 2-5 Bunkyo-cho, Matsuyama 790-8577 (Japan)

    2016-07-15

    Sediment cores from six lakes situated from north to south on the Japanese Archipelago were collected during 2009–2010 to investigate the hypothesis that deposition of lead (Pb) was coming from East Asia (including China, South Korea and eastern part of Russia). Accumulation rates and ages of the lake sediment were estimated by the {sup 210}Pb constant rate of supply model and {sup 137}Cs inputs to reconstruct the historical trends of Pb accumulation. Cores from four lakes located in the north and central Japan, showed clear evidence of Pb pollution with a change in the {sup 206}Pb/{sup 207}Pb and {sup 208}Pb/{sup 207}Pb ratios in the recent sediment as compared to the deeper sediment. Among the six studied lakes, significant inputs of anthropogenic lead emissions were observed at Lake Mikazuki (north Hokkaido in north Japan), Lake Chokai (north of Honshu), and Lake Mikuriga (central part of Honshu). Pb isotopic comparison of collected core sediment and previously reported data for wet precipitation and aerosols from different Asian regions indicate that, before 1900, Pb accumulated in these three lakes was not affected by trans-boundary sources. Lake Mikazuki started to receive Pb emissions from Russia in early 1900s, and during the last two decades, this lake has been affected by trans-boundary Pb pollution from northern China. Lake Chokai has received Pb pollutant from northern China since early 1900s until 2009, whereas for the Lake Mikuriga the major Pb contaminant was transported from southern China during the past 100 years. The results of our study demonstrate that Japan Archipelago has received trans-boundary Pb emissions from different parts of East Asian region depending on location, and the major source region has changed historically. - Highlights: • Historical trend of Pb pollution was recorded in six Japanese Lakes. • Pb concentration and Pb isotope ratios were determined for sediment cores. • High [Pb] and less radiogenic Pb isotope ratios

  9. Boundary layer nucleation as a source of new CCN in savannah environment

    Directory of Open Access Journals (Sweden)

    L. Laakso

    2013-02-01

    Full Text Available The South African savannah region is a complex environment of air pollution and natural emissions influenced by a strong seasonal cycle in biomass burning and strong precipitation. However, the scarcity of long-term observations means that the knowledge of controlling aerosol processes in this environment is limited. Here we use a recent dataset of 18 months of aerosol size distribution observations trying to understand the annual cycle of cloud condensation nuclei (CCN.

    Our observations show that the concentration of CCN-sized particles remains, in line with previous studies, high throughout the year with the highest concentrations during the dry winter and the lowest during the wet summer. During the wet season with reduced anthropogenic and biomass burning primary emissions, this pool of CCN is partly filled by boundary layer nucleation with subsequent growth. The enhanced importance of formation and growth during the wet season is addressed to increased biogenic activity together with enhanced free tropospheric removal decreasing the concentration of pre-existing CCN. During the dry season, while frequent new particle formation takes place, particle growth is reduced due to reduced condensing vapour concentrations. Thus in the dry season particles are not able to grow to sizes where they may act as CCN nearly as efficiently as during the wet season.

    The observations are compared to simulations by a global aerosol model GLOMAP. To our surprise, the global aerosol model utilized to explain the observations was not capable of re-producing the characteristics of particle formation and the annual CCN cycle, despite earlier good performance in predicting the particle concentrations in a number of diverse environments, including the South African savannah region. While the average yearly CCN concentrations of modelled CCN is close to observed concentrations, the characteristics of nucleation bursts and subsequent growth are not

  10. 25 CFR 115.704 - May we accept for deposit into a trust account retirement checks/payments or pension fund checks...

    Science.gov (United States)

    2010-04-01

    ... checks/payments or pension fund checks/payments even though those funds are not specified in § 115.702... May we accept for deposit into a trust account retirement checks/payments or pension fund checks.../payments or pension fund checks/payments or any funds from sources that are not identified in the table in...

  11. Effects of Thermal Radiation and Chemical Reaction on MHD Free Convection Flow past a Flat Plate with Heat Source and Convective Surface Boundary Condition

    OpenAIRE

    E.Hemalatha; N. Bhaskar Reddy

    2015-01-01

    This paper analyzes the radiation and chemical reaction effects on MHD steady two-dimensional laminar viscous incompressible radiating boundary layer flow over a flat plate in the presence of internal heat generation and convective boundary condition. It is assumed that lower surface of the plate is in contact with a hot fluid while a stream of cold fluid flows steadily over the upper surface with a heat source that decays exponentially. The Rosseland approximation is used to desc...

  12. Identification of Major Risk Sources for Surface Water Pollution by Risk Indexes (RI) in the Multi-Provincial Boundary Region of the Taihu Basin, China

    Science.gov (United States)

    Yao, Hong; Li, Weixin; Qian, Xin

    2015-01-01

    Environmental safety in multi-district boundary regions has been one of the focuses in China and is mentioned many times in the Environmental Protection Act of 2014. Five types were categorized concerning the risk sources for surface water pollution in the multi-provincial boundary region of the Taihu basin: production enterprises, waste disposal sites, chemical storage sites, agricultural non-point sources and waterway transportations. Considering the hazard of risk sources, the purification property of environmental medium and the vulnerability of risk receptors, 52 specific attributes on the risk levels of each type of risk source were screened out. Continuous piecewise linear function model, expert consultation method and fuzzy integral model were used to calculate the integrated risk indexes (RI) to characterize the risk levels of pollution sources. In the studied area, 2716 pollution sources were characterized by RI values. There were 56 high-risk sources screened out as major risk sources, accounting for about 2% of the total. The numbers of sources with high-moderate, moderate, moderate-low and low pollution risk were 376, 1059, 101 and 1124, respectively, accounting for 14%, 38%, 5% and 41% of the total. The procedure proposed could be included in the integrated risk management systems of the multi-district boundary region of the Taihu basin. It could help decision makers to identify major risk sources in the risk prevention and reduction of surface water pollution. PMID:26308032

  13. Identification of Major Risk Sources for Surface Water Pollution by Risk Indexes (RI) in the Multi-Provincial Boundary Region of the Taihu Basin, China.

    Science.gov (United States)

    Yao, Hong; Li, Weixin; Qian, Xin

    2015-08-21

    Environmental safety in multi-district boundary regions has been one of the focuses in China and is mentioned many times in the Environmental Protection Act of 2014. Five types were categorized concerning the risk sources for surface water pollution in the multi-provincial boundary region of the Taihu basin: production enterprises, waste disposal sites, chemical storage sites, agricultural non-point sources and waterway transportations. Considering the hazard of risk sources, the purification property of environmental medium and the vulnerability of risk receptors, 52 specific attributes on the risk levels of each type of risk source were screened out. Continuous piecewise linear function model, expert consultation method and fuzzy integral model were used to calculate the integrated risk indexes (RI) to characterize the risk levels of pollution sources. In the studied area, 2716 pollution sources were characterized by RI values. There were 56 high-risk sources screened out as major risk sources, accounting for about 2% of the total. The numbers of sources with high-moderate, moderate, moderate-low and low pollution risk were 376, 1059, 101 and 1124, respectively, accounting for 14%, 38%, 5% and 41% of the total. The procedure proposed could be included in the integrated risk management systems of the multi-district boundary region of the Taihu basin. It could help decision makers to identify major risk sources in the risk prevention and reduction of surface water pollution.

  14. Identification of Major Risk Sources for Surface Water Pollution by Risk Indexes (RI in the Multi-Provincial Boundary Region of the Taihu Basin, China

    Directory of Open Access Journals (Sweden)

    Hong Yao

    2015-08-01

    Full Text Available Environmental safety in multi-district boundary regions has been one of the focuses in China and is mentioned many times in the Environmental Protection Act of 2014. Five types were categorized concerning the risk sources for surface water pollution in the multi-provincial boundary region of the Taihu basin: production enterprises, waste disposal sites, chemical storage sites, agricultural non-point sources and waterway transportations. Considering the hazard of risk sources, the purification property of environmental medium and the vulnerability of risk receptors, 52 specific attributes on the risk levels of each type of risk source were screened out. Continuous piecewise linear function model, expert consultation method and fuzzy integral model were used to calculate the integrated risk indexes (RI to characterize the risk levels of pollution sources. In the studied area, 2716 pollution sources were characterized by RI values. There were 56 high-risk sources screened out as major risk sources, accounting for about 2% of the total. The numbers of sources with high-moderate, moderate, moderate-low and low pollution risk were 376, 1059, 101 and 1124, respectively, accounting for 14%, 38%, 5% and 41% of the total. The procedure proposed could be included in the integrated risk management systems of the multi-district boundary region of the Taihu basin. It could help decision makers to identify major risk sources in the risk prevention and reduction of surface water pollution.

  15. Source term boundary adaptive estimation in a first-order 1D hyperbolic PDE: Application to a one loop solar collector through

    KAUST Repository

    Mechhoud, Sarra

    2016-08-04

    In this paper, boundary adaptive estimation of solar radiation in a solar collector plant is investigated. The solar collector is described by a 1D first-order hyperbolic partial differential equation where the solar radiation models the source term and only boundary measurements are available. Using boundary injection, the estimator is developed in the Lyapunov approach and consists of a combination of a state observer and a parameter adaptation law which guarantee the asymptotic convergence of the state and parameter estimation errors. Simulation results are provided to illustrate the performance of the proposed identifier.

  16. Geosfear? - Overcoming System Boundaries by Open-source Based Monitoring of Spatio-temporal Processes

    Science.gov (United States)

    Brandt, T.; Schima, R.; Goblirsch, T.; Paschen, M.; Francyk, B.; Bumberger, J.; Zacharias, S.; Dietrich, P.; Rubin, Y.; Rinke, K.; Fleckenstein, J. H.; Schmidt, C.; Vieweg, M.

    2016-12-01

    The impact of global change, intensive agriculture and complex interactions between humans and the environment show different effects on different scales. However, the desire to obtain a better understanding of ecosystems and process dynamics in nature accentuates the need for observing these processes at higher temporal and spatial resolutions. Especially with regard to the process dynamics and heterogeneity of rivers and catchment areas, a comprehensive monitoring of the ongoing processes and effects remains to be a challenging issue. What we need are monitoring systems which can collect most diverse data across different environmental compartments and scales. Today, open-source based electronics and innovative sensors and sensor components are offering a promising approach to investigate new possibilities of mobile data acquisition to improve our understanding of the geosphere. To start with, we have designed and implemented a multi-operable, embedded Linux platform for fast integration of different sensors within a single infrastructure. In addition, a GPS module in combination with a GSM transmitter ensures the synchronization and geo-referencing of all data, no matter how old-fashioned the sensors are. To this end, initial field experiments were conducted at a 3rd order stream in the Central German Lowland. Here, we linked in-stream DOC inputs with subsurface metabolism by coupling miniaturized DOC sensor probes with a modified vertical oxygen profiler in situ. Starting from metrological observations to water quality and subsurface conditions, the overarching goal is the detection of interlinked process dynamics across highly reactive biogeochemical interfaces. Overall, the field experiments demonstrated the feasibility of this emerging technology and its potential towards a cutting-edge strategy based on a holistic and integrated process. Now, we are only a few steps away from realizing adaptive and event-triggered observations close to real

  17. Environmental Reality Check.

    Science.gov (United States)

    Manicone, Santo

    2001-01-01

    Discusses the importance of educational facilities conducting "reality check" self-audits to uncover the real truth behind underlying environmental problems. An environmental compliance multimedia checklist is included. (GR)

  18. check cif.pdf

    Indian Academy of Sciences (India)

    AMMIN

    Calculated. Reported. Volume ... PLAT094_ALERT_2_C Ratio of Maximum / Minimum Residual Density .... 3.24 Report ... checkCIF was carefully designed to identify outliers and unusual parameters, but every test has its limitations and alerts ...

  19. Goat production check list

    DEFF Research Database (Denmark)

    Henriksen, Jørgen; Nielsen, Mette Benedicte Olaf; Madsen, Jørgen

    2009-01-01

    This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production.......This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production....

  20. Checking of seismic and tsunami hazard for coastal NPP of Chinese continent after Fukushima nuclear accident

    Institute of Scientific and Technical Information of China (English)

    Chang Xiangdong; Zhou Bengang; Zhao Lianda

    2013-01-01

    A checking on seismic and tsunami hazard for coastal nuclear power plant (NPP) of Chinese continent has been made after Japanese Fukushima nuclear accident caused by earthquake tsunami.The results of the checking are introduced briefly in this paper,including the evaluations of seismic and tsunami hazard in NPP siting period,checking results on seismic and tsunami hazard.Because Chinese coastal area belongs to the continental shelf and far from the boundary of plate collision,the tsunami hazard is not significant for coastal area of Chinese continent.However,the effect from tsunami still can' t be excluded absolutely since calculated result of Manila trench tsunami source although the tsunami wave is lower than water level from storm surge.The research about earthquake tsunami will continue in future.The tsunami warning system and emergency program of NPP will be established based on principle of defense in depth in China.

  1. Electromagnetic Scattering Analysis of Coated Conductors With Edges Using the Method of Auxiliary Sources (MAS) in Conjunction With the Standard Impedance Boundary Condition (SIBC)

    DEFF Research Database (Denmark)

    Anastassiu, H.T.; D.I.Kaklamani, H.T.; Economou, D.P.

    2002-01-01

    A novel combination of the method of auxiliary sources (MAS) and the standard impedance boundary condition (SIBC) is employed in the analysis of transverse magnetic (TM) plane wave scattering from infinite, coated, perfectly conducting cylinders with square cross sections. The scatterer is initia......A novel combination of the method of auxiliary sources (MAS) and the standard impedance boundary condition (SIBC) is employed in the analysis of transverse magnetic (TM) plane wave scattering from infinite, coated, perfectly conducting cylinders with square cross sections. The scatterer...

  2. Can i just check...? Effects of edit check questions on measurement error and survey estimates

    NARCIS (Netherlands)

    Lugtig, Peter; Jäckle, Annette

    2014-01-01

    Household income is difficult to measure, since it requires the collection of information about all potential income sources for each member of a household.Weassess the effects of two types of edit check questions on measurement error and survey estimates: within-wave edit checks use responses to

  3. Check valves aging assessment

    International Nuclear Information System (INIS)

    Haynes, H.D.

    1991-01-01

    In support of the NRC Nuclear Plant Aging Research (NPAR) program, the Oak Ridge National Laboratory (ORNL) has carried out an assessment of several check value diagnostic monitoring methods, in particular, those based on measurements of acoustic emission, ultrasonics, and magnetic flux. The evaluations have focussed on the capabilities of each method to provide information useful in determining check valve aging and service wear effects, check valve failures, and undesirable operating modes. This paper describes the benefits and limitations associated with each method and includes recent laboratory and field test data, including data obtained from the vendors who recently participated in a comprehensive series of tests directed by a nuclear industry users group. In addition, as part of the ORNL Advanced Diagnostic Engineering Research and Development Center (ADEC), two novel nonintrusive monitoring methods were developed that provide several unique capabilities. These methods, based on external ac- an dc-magnetic monitoring are also described. None of the examined methods could, by themselves, monitor both the instantaneous position and motion of check valve internals and valve leakage; however, the combination of acoustic emission monitoring with one of the other methods provides the means to determine vital check valve operational information

  4. CMM Interim Check (U)

    Energy Technology Data Exchange (ETDEWEB)

    Montano, Joshua Daniel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-03-23

    Coordinate Measuring Machines (CMM) are widely used in industry, throughout the Nuclear Weapons Complex and at Los Alamos National Laboratory (LANL) to verify part conformance to design definition. Calibration cycles for CMMs at LANL are predominantly one year in length. Unfortunately, several nonconformance reports have been generated to document the discovery of a certified machine found out of tolerance during a calibration closeout. In an effort to reduce risk to product quality two solutions were proposed – shorten the calibration cycle which could be costly, or perform an interim check to monitor the machine’s performance between cycles. The CMM interim check discussed makes use of Renishaw’s Machine Checking Gauge. This off-the-shelf product simulates a large sphere within a CMM’s measurement volume and allows for error estimation. Data was gathered, analyzed, and simulated from seven machines in seventeen different configurations to create statistical process control run charts for on-the-floor monitoring.

  5. Checking BEBC superconducting magnet

    CERN Multimedia

    CERN PhotoLab

    1974-01-01

    The superconducting coils of the magnet for the 3.7 m Big European Bubble Chamber (BEBC) had to be checked, see Annual Report 1974, p. 60. The photo shows a dismantled pancake. By December 1974 the magnet reached again the field design value of 3.5 T.

  6. [Memory Checking Tests].

    Science.gov (United States)

    Hart, Joseph T.

    Two basic tests for checking memory skills are included in these appendices. The first, the General Information Test, uses the same 150 items for each of its two versions. One version is a completion-type test which measures recall by requiring the examinee to supply a specific response. The other version supplements each of the 150 items with…

  7. Check Sample Abstracts.

    Science.gov (United States)

    Alter, David; Grenache, David G; Bosler, David S; Karcher, Raymond E; Nichols, James; Rajadhyaksha, Aparna; Camelo-Piragua, Sandra; Rauch, Carol; Huddleston, Brent J; Frank, Elizabeth L; Sluss, Patrick M; Lewandrowski, Kent; Eichhorn, John H; Hall, Janet E; Rahman, Saud S; McPherson, Richard A; Kiechle, Frederick L; Hammett-Stabler, Catherine; Pierce, Kristin A; Kloehn, Erica A; Thomas, Patricia A; Walts, Ann E; Madan, Rashna; Schlesinger, Kathie; Nawgiri, Ranjana; Bhutani, Manoop; Kanber, Yonca; Abati, Andrea; Atkins, Kristen A; Farrar, Robert; Gopez, Evelyn Valencerina; Jhala, Darshana; Griffin, Sonya; Jhala, Khushboo; Jhala, Nirag; Bentz, Joel S; Emerson, Lyska; Chadwick, Barbara E; Barroeta, Julieta E; Baloch, Zubair W; Collins, Brian T; Middleton, Owen L; Davis, Gregory G; Haden-Pinneri, Kathryn; Chu, Albert Y; Keylock, Joren B; Ramoso, Robert; Thoene, Cynthia A; Stewart, Donna; Pierce, Arand; Barry, Michelle; Aljinovic, Nika; Gardner, David L; Barry, Michelle; Shields, Lisa B E; Arnold, Jack; Stewart, Donna; Martin, Erica L; Rakow, Rex J; Paddock, Christopher; Zaki, Sherif R; Prahlow, Joseph A; Stewart, Donna; Shields, Lisa B E; Rolf, Cristin M; Falzon, Andrew L; Hudacki, Rachel; Mazzella, Fermina M; Bethel, Melissa; Zarrin-Khameh, Neda; Gresik, M Vicky; Gill, Ryan; Karlon, William; Etzell, Joan; Deftos, Michael; Karlon, William J; Etzell, Joan E; Wang, Endi; Lu, Chuanyi M; Manion, Elizabeth; Rosenthal, Nancy; Wang, Endi; Lu, Chuanyi M; Tang, Patrick; Petric, Martin; Schade, Andrew E; Hall, Geraldine S; Oethinger, Margret; Hall, Geraldine; Picton, Avis R; Hoang, Linda; Imperial, Miguel Ranoa; Kibsey, Pamela; Waites, Ken; Duffy, Lynn; Hall, Geraldine S; Salangsang, Jo-Anne M; Bravo, Lulette Tricia C; Oethinger, Margaret D; Veras, Emanuela; Silva, Elvia; Vicens, Jimena; Silva, Elvio; Keylock, Joren; Hempel, James; Rushing, Elizabeth; Posligua, Lorena E; Deavers, Michael T; Nash, Jason W; Basturk, Olca; Perle, Mary Ann; Greco, Alba; Lee, Peng; Maru, Dipen; Weydert, Jamie Allen; Stevens, Todd M; Brownlee, Noel A; Kemper, April E; Williams, H James; Oliverio, Brock J; Al-Agha, Osama M; Eskue, Kyle L; Newlands, Shawn D; Eltorky, Mahmoud A; Puri, Puja K; Royer, Michael C; Rush, Walter L; Tavora, Fabio; Galvin, Jeffrey R; Franks, Teri J; Carter, James Elliot; Kahn, Andrea Graciela; Lozada Muñoz, Luis R; Houghton, Dan; Land, Kevin J; Nester, Theresa; Gildea, Jacob; Lefkowitz, Jerry; Lacount, Rachel A; Thompson, Hannis W; Refaai, Majed A; Quillen, Karen; Lopez, Ana Ortega; Goldfinger, Dennis; Muram, Talia; Thompson, Hannis

    2009-02-01

    The following abstracts are compiled from Check Sample exercises published in 2008. These peer-reviewed case studies assist laboratory professionals with continuing medical education and are developed in the areas of clinical chemistry, cytopathology, forensic pathology, hematology, microbiology, surgical pathology, and transfusion medicine. Abstracts for all exercises published in the program will appear annually in AJCP.

  8. Swing check valve

    International Nuclear Information System (INIS)

    Eminger, H.E.

    1977-01-01

    A swing check valve which includes a valve body having an inlet and outlet is described. A recess in the valve body designed to hold a seal ring and a check valve disc swingable between open and closed positions. The disc is supported by a high strength wire secured at one end in a support spacer pinned through bearing blocks fixed to the valve body and at its other end in a groove formed on the outer peripheral surface of the disc. The parts are designed and chosen such to provide a lightweight valve disc which is held open by minimum velocity of fluid flowing through the valve which thus reduces oscillations and accompanying wear of bearings supporting the valve operating parts. (Auth.)

  9. Check Verbraucherpolitik und Verbraucherbeteiligung

    DEFF Research Database (Denmark)

    Hagen, Kornelia; Micklitz, Hans-W.; Oehler, Andreas

    2013-01-01

    The paper discusses the opportunities for an empirically grounded decision support system as an instrument for independent and scientifically based consumer policy consulting. To date, consumer policy is dominated by the information paradigm and the leitbild of the rational, sovereign...... and information-seeking consumer. Yet, both everyday practice and research in behavioural economics show that this view lacks empirical ground. In fact, there are different consumer types and different forms of rationalities at work. Effective consumer policy making should be based on the empirically revealed...... an empirically based “Check Consumer Policy and Consumer Participation” as a systematic decision and evaluation tool for policy makers. This check should be independent from the government and should be grounded on an empirical view of the consumer. Consumer policy tools should be tested with real consumers...

  10. Model Checking Feature Interactions

    DEFF Research Database (Denmark)

    Le Guilly, Thibaut; Olsen, Petur; Pedersen, Thomas

    2015-01-01

    This paper presents an offline approach to analyzing feature interactions in embedded systems. The approach consists of a systematic process to gather the necessary information about system components and their models. The model is first specified in terms of predicates, before being refined to t...... to timed automata. The consistency of the model is verified at different development stages, and the correct linkage between the predicates and their semantic model is checked. The approach is illustrated on a use case from home automation....

  11. Magnetically operated check valve

    Science.gov (United States)

    Morris, Brian G.; Bozeman, Richard J., Jr.

    1994-06-01

    A magnetically operated check valve is disclosed. The valve is comprised of a valve body and a movable poppet disposed therein. A magnet attracts the poppet to hold the valve shut until the force of fluid flow through the valve overcomes the magnetic attraction and moves the poppet to an unseated, open position. The poppet and magnet are configured and disposed to trap a magnetically attracted particulate and prevent it from flowing to a valve seating region.

  12. Turbulent diffusion downstream of a linear heat source installed in a turbulent boundary layer; Diffusion turbulente en aval d`une source lineaire de chaleur placee dans une couche limite turbulente

    Energy Technology Data Exchange (ETDEWEB)

    El Kabiri, M.; Paranthoen, P.; Rosset, L.; Lecordier, J.C. [Rouen Univ., 76 - Mont-Saint-Aignan (France)

    1997-12-31

    An experimental study of heat transport downstream of a linear source installed in a turbulent boundary layer is performed. Second and third order momenta of velocity and temperature fields are presented and compared to gradient-type modeling. (J.S.) 7 refs.

  13. The Tectonic Boundary Between Eastern Subbaisin and South-West Subbasin of the South China Sea Revealed from the Normalized Magnetic Source Strength

    Science.gov (United States)

    Guo, L.; Meng, X.

    2014-12-01

    The South China Sea (SCS), surrounded by the Eurasia, Pacific and India-Australia plates, is one of the largest marginal seas in the Western Pacific. It was formed by the interaction of the three plates and the seafloor spreading during Late Oligocene time to Early Miocene time. The boundary between Eastern Subbaisin and South-west Subbasin of the SCS has long been debated in the literature. Refining the boundary is one of the crucial tasks for correctly understanding the seafloor spreading model of the SCS. Due to few drills on the deep ocean basin of the SCS, magnetic data become important information for refining the boundary. However, the interpretation of magnetic data in the SCS suffers from the remanent magnetization of ocean crust as well as igneous rock and seamounts. The conventional reduction-to-pole anomalies at low latitudes usually neglect the remanent magnetization, making the interpretation incorrect. Here, we assembled high-resolution total magnetic intensity (TMI) data around the ocean basin of the SCS, and then did a special transformation of the TMI anomalies with a varying magnetic inclinations algorithm to obtain the normalized source strength (NSS). The NSS has advantage of insensitivity to remanent magnetization, benefitting correct interpretation. The NSS presents discriminative features from east to west in the ocean basin. The boundary of the discriminative features is clear and just ranges from the northeastern edge of the Zhongsha Islands running in the southeast direction to the northeastern edge of the Reed Bank. These imply that magnetic structure and tectonic features in the crust are discriminative between both sides of this boundary. It can be deduced that this boundary is the tectonic boundary between Eastern Subbaisin and South-west Subbasin. We acknowledge the financial support of the National Natural Science Foundation of China (41374093) and the SinoProbe-01-05 project.

  14. Magnetic Check Valve

    Science.gov (United States)

    Morris, Brian G.; Bozeman, Richard J., Jr.

    1994-01-01

    Poppet in proposed check valve restored to closed condition by magnetic attraction instead of spring force. Oscillations suppressed, with consequent reduction of wear. Stationary magnetic disk mounted just upstream of poppet, also containing magnet. Valve body nonmagnetic. Forward pressure or flow would push poppet away from stationary magnetic disk so fluid flows easily around poppet. Stop in valve body prevents poppet from being swept away. When flow stopped or started to reverse, magnetic attraction draws poppet back to disk. Poppet then engages floating O-ring, thereby closing valve and preventing reverse flow. Floating O-ring facilitates sealing at low loads.

  15. Check, check, double check: checking the autopilot causes distrust : Experimental studies on the effects of compulsive perseveration

    NARCIS (Netherlands)

    Dek, E.C.P.

    2015-01-01

    Obsessive-compulsive disorder (OCD) is characterized by persistent doubt. The majority of patients with OCD engage in repeated checking to reduce these feelings of uncertainty. However, numerous studies demonstrated that repetitive behavior ironically increases uncertainty: perseverative checking

  16. Repeated checking causes memory distrust

    NARCIS (Netherlands)

    van den Hout, M.; Kindt, M.

    2003-01-01

    This paper attempts to explain why in obsessive-compulsive disorder (OCD) checkers distrust in memory persists despite extensive checking. It is argued that: (1) repeated checking increases familiarity with the issues checked; (2) increased familiarity promotes conceptual processing which inhibits

  17. Parallel Algorithms for Model Checking

    NARCIS (Netherlands)

    van de Pol, Jaco; Mousavi, Mohammad Reza; Sgall, Jiri

    2017-01-01

    Model checking is an automated verification procedure, which checks that a model of a system satisfies certain properties. These properties are typically expressed in some temporal logic, like LTL and CTL. Algorithms for LTL model checking (linear time logic) are based on automata theory and graph

  18. Active control of flow noise sources in turbulent boundary layer on a flat-plate using piezoelectric bimorph film

    International Nuclear Information System (INIS)

    Song, Woo Seog; Lee, Seung Bae; Shin, Dong Shin; Na, Yang

    2006-01-01

    The piezoelectric bimorph film, which, as an actuator, can generate more effective displacement than the usual PVDF film, is used to control the turbulent boundary-layer flow. The change of wall pressures inside the turbulent boundary layer is observed by using the multi-channel microphone array flush-mounted on the surface when actuation at the non-dimensional frequency f b + =0.008 and 0.028 is applied to the turbulent boundary layer. The wall pressure characteristics by the actuation to produce local displacement are more dominantly influenced by the size of the actuator module than the actuation frequency. The movement of large-scale turbulent structures to the upper layer is found to be the main mechanism of the reduction in the wall-pressure energy spectrum when the 700ν/u τ -long bimorph film is periodically actuated at the non-dimensional frequency f b + =0.008 and 0.028. The bimorph actuator is triggered with the time delay for the active forcing at a single frequency when a 1/8' pressure-type, pin-holed microphone sensor detects the large-amplitude pressure event by the turbulent spot. The wall-pressure energy in the late-transitional boundary layer is partially reduced near the convection wavenumber by the open-loop control based on the large amplitude event

  19. Black carbon concentrations and sources in the marine boundary layer of the tropical Atlantic Ocean using four methodologies

    Science.gov (United States)

    Combustion-derived aerosols in the marine boundary layer have been poorly studied, especially in remote environments such as the open Atlantic Ocean. The tropical Atlantic has the potential to contain a high concentration of aerosols, such as black carbon, due to the African emis...

  20. AERMOD: A DISPERSION MODEL FOR INDUSTRIAL SOURCE APPLICATIONS PART I: GENERAL MODEL FORMULATION AND BOUNDARY LAYER CHARACTERIZATION

    Science.gov (United States)

    The formulations of the AMS/EPA Regulatory Model Improvement Committee's applied air dispersion model (AERMOD) as related to the characterization of the planetary boundary layer are described. This is the first in a series of three articles. Part II describes the formulation of...

  1. Ball check valve

    International Nuclear Information System (INIS)

    Bevilacqua, F.

    1978-01-01

    A pressurized nuclear reactor having an instrument assembly sheathed in a metallic tube which is extended vertically upward into the reactor core by traversing a metallic guide tube which is welded to the wall of the vessel is described. Sensors in each instrument assembly are connected to instruments outside the vessel to manifest the conditions within the core. Each instrument assembly probe is moved into position within a metallic guide channel. The guide channel penetrates the wall of the vessel and forms part of the barrier to the environment within the pressure vessel. Each channel includes a ball check valve which is opened by the instrument assembly probe when the probe passes through the valve. A ball valve element is moved from its seat by the probe to a position lateral of the bore of the channel and is guided to its seat along a sloped path within the valve body when the probe is removed. 5 claims, 3 figures

  2. Principle and opening-closing character analysis of DC check valve

    International Nuclear Information System (INIS)

    Han Xu; Zhou Yu

    2006-01-01

    When the behaviour of main pump in PWR power plant change, as a result of arresting fluid countercurrent current by check valve, water hammer phenomena met occur more or less in loop. Serious water hammer not only met brought incident of over pressure, imperil pressure boundary, but also may engender check valve lapse. DC check valve is a kind of new theory check valve, is designed to avoid serious water hammer phenomena at tradition check valve closing, the analyses and experiment indicate that DC check valve can availably solve water hammer problem in the loop, and be able to reliably prevent fluid countercurrent. (authors)

  3. Cycle time reduction by Html report in mask checking flow

    Science.gov (United States)

    Chen, Jian-Cheng; Lu, Min-Ying; Fang, Xiang; Shen, Ming-Feng; Ma, Shou-Yuan; Yang, Chuen-Huei; Tsai, Joe; Lee, Rachel; Deng, Erwin; Lin, Ling-Chieh; Liao, Hung-Yueh; Tsai, Jenny; Bowhill, Amanda; Vu, Hien; Russell, Gordon

    2017-07-01

    The Mask Data Correctness Check (MDCC) is a reticle-level, multi-layer DRC-like check evolved from mask rule check (MRC). The MDCC uses extended job deck (EJB) to achieve mask composition and to perform a detailed check for positioning and integrity of each component of the reticle. Different design patterns on the mask will be mapped to different layers. Therefore, users may be able to review the whole reticle and check the interactions between different designs before the final mask pattern file is available. However, many types of MDCC check results, such as errors from overlapping patterns usually have very large and complex-shaped highlighted areas covering the boundary of the design. Users have to load the result OASIS file and overlap it to the original database that was assembled in MDCC process on a layout viewer, then search for the details of the check results. We introduce a quick result-reviewing method based on an html format report generated by Calibre® RVE. In the report generation process, we analyze and extract the essential part of result OASIS file to a result database (RDB) file by standard verification rule format (SVRF) commands. Calibre® RVE automatically loads the assembled reticle pattern and generates screen shots of these check results. All the processes are automatically triggered just after the MDCC process finishes. Users just have to open the html report to get the information they need: for example, check summary, captured images of results and their coordinates.

  4. Numerical Modeling of Conjugate Thermogravitational Convection in a Closed System with a Radiant Energy Source in Conditions of Convective-Radiative Heat Exchange at the External Boundary

    Directory of Open Access Journals (Sweden)

    Nee Alexander

    2016-01-01

    Full Text Available Mathematical modeling of conjugate natural convection in a closed rectangular cavity with a radiant energy source in conditions of convective-radiative heat exchange at the external boundary was conducted. The radiant energy distribution was set by the Lambert’s law. Conduction and convection processes analysis showed that the air masses flow pattern is modified slightly over the time. The temperature increases in the gas cavity, despite the heat removal from the one of the external boundary. According to the results of the integral heat transfer analysis were established that the average Nusselt number (Nuav increasing occurs up to τ = 200 (dimensionless time. Further Nuav has changed insignificantly due to the temperature field equalization near the interfaces “gas – wall”.

  5. The Activity Check of Brachytherapy Isotope

    International Nuclear Information System (INIS)

    Kim, Gun Oh; Lee, Byung Koo; Kwon, Young Ho

    2004-01-01

    An isotope Ir-192, which is used in brachytherapy depends on import in whole quantities. There are a few ways for its activity. measurement using Welltype chamber or the way to rely on authentic decay table of manufacturer. In-air dosimetry using Farmer Chamber, etc. In this paper, let me introduce the way using Farmer chamber which is easier and simple. With the Farmer chamber and source calibration jig, take a measurement the activity of an isotope Ir-192 and compare the value with the value from decay table of manufacturer and check the activity of source. The result of measurement, compared the value from decay table, by ±2.1. (which belongs to recommendable value for AAPM ±5% as difference of error range). It is possible to use on clinical medicine. With the increase in use of brachytherapy, the increase of import is essential. And an accurate activity check of source is compulsory. For the activity check of source, it was possible to use Farmer chamber and source calibration jig without additional purchase of Well type chamber.

  6. The Use of Source-Sink and Doublet Distributions Extended to the Solution of Boundary-Value Problems in Supersonic Flow

    Science.gov (United States)

    Heaslet, Max A; Lomax, Harvard

    1948-01-01

    A direct analogy is established between the use of source-sink and doublet distributions in the solution of specific boundary-value problems in subsonic wing theory and the corresponding problems in supersonic theory. The correct concept of the "finite part" of an integral is introduced and used in the calculation of the improper integrals associated with supersonic doublet distributions. The general equations developed are shown to include several previously published results and particular examples are given for the loading on rolling and pitching triangular wings with supersonic leading edges.

  7. Compositional and Quantitative Model Checking

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2010-01-01

    This paper gives a survey of a composition model checking methodology and its succesfull instantiation to the model checking of networks of finite-state, timed, hybrid and probabilistic systems with respect; to suitable quantitative versions of the modal mu-calculus [Koz82]. The method is based...

  8. Diagnostic information in compliance checking

    NARCIS (Netherlands)

    Ramezani Taghiabadi, E.; Fahland, D.; Aalst, van der W.M.P.

    2012-01-01

    Compliance checking is gaining importance as today's organizations need to show that operational processes are executed in a controlled manner while satisfying predefined (legal) requirements. Deviations may be costly and expose the organization to severe risks. Compliance checking is of growing

  9. PSYCHE, ENDF/B Data Consistency Check in ENDF Format

    International Nuclear Information System (INIS)

    Dunford, Charles L.

    2007-01-01

    1 - Description of program or function: PSYCHE is a program for checking the physics content of an evaluated data file. It can recognise the difference between ENDF-5 or ENDF-6 formats and performs its tests accordingly. Version 7.01 (April 2005): set success flag after return from begin, added potential scattering test formerly in Fizcon. Version 7.02 (May 2005): Fixed bug in calculation of L=2 penetrability. 2 - Method of solution: PSYCHE checks for energy conservation for emitted neutrons and photons, checks Wick's limit for elastic scattering, analyses resonance parameter statistics, calculates thermal cross sections and resonance integrals, examines continuity across resonance region boundaries and checks 'Q' values against mass tables

  10. Scram system with continuos check

    International Nuclear Information System (INIS)

    Rodriguez Sacco, Walter.

    1976-02-01

    The equipment described pretends to be a further step to the use of integrated circuits in nuclear instrumentation, considering that this type of control was traditionally carried out on the bases of electromechanical elements. A continuous self-check method has been applied in accordance with the high reliability requiered for this type of equipments. The developed equipment fulfils the condition that any deficiency in its component elements, causes an anormal self-detected operation. The equipment covers two systems: the Scram one, that includes the sequence generator-detector, the rods check and scram chain, and the Check system that uses pulses from the sequence detector. (author) [es

  11. Adaptation of benthic invertebrates to food sources along marine-terrestrial boundaries as indicated by carbon and nitrogen stable isotopes

    Science.gov (United States)

    Lange, G.; Haynert, K.; Dinter, T.; Scheu, S.; Kröncke, I.

    2018-01-01

    Frequent environmental changes and abiotic gradients of the Wadden Sea require appropriate adaptations of the local organisms and make it suitable for investigations on functional structure of macrozoobenthic communities from marine to terrestrial boundaries. To investigate community patterns and food use of the macrozoobenthos, a transect of 11 stations was sampled for species number, abundance and stable isotope values (δ13C and δ15N) of macrozoobenthos and for stable isotope values of potential food resources. The transect was located in the back-barrier system of the island of Spiekeroog (southern North Sea, Germany). Our results show that surface and subsurface deposit feeders, such as Peringia ulvae and different oligochaete species, dominated the community, which was poor in species, while species present at the transect stations reached high abundance. The only exception was the upper salt marsh with low abundances but higher species richness because of the presence of specialized semi-terrestrial and terrestrial taxa. The macrozoobenthos relied predominantly on marine resources irrespective of the locality in the intertidal zone, although δ13C values of the consumers decreased from - 14.1 ± 1.6‰ (tidal flats) to - 21.5 ± 2.4‰ (salt marsh). However, the ubiquitous polychaete Hediste diversicolor showed a δ15N enrichment of 2.8‰ (an increase of about one trophic level) from bare sediments to the first vegetated transect station, presumably due to switching from suspension or deposit feeding to predation on smaller invertebrates. Hence, we conclude that changes in feeding mode represent an important mechanism of adaptation to different Wadden Sea habitats.

  12. Grain boundary structure and properties

    International Nuclear Information System (INIS)

    Balluffi, R.W.

    1979-01-01

    An attempt is made to distinguish those fundamental aspects of grain boundaries which should be relevant to the problem of the time dependent fracture of high temperature structural materials. These include the basic phenomena which are thought to be associated with cavitation and cracking at grain boundaries during service and with the more general microstructural changes which occur during both processing and service. A very brief discussion of the current state of our knowledge of these fundamentals is given. Included are the following: (1) structure of ideal perfect boundaries; (2) defect structure of grain boundaries; (3) diffusion at grain boundaries; (4) grain boundaries as sources/sinks for point defects; (5) grain boundary migration; (6) dislocation phenomena at grain boundaries; (7) atomic bonding and cohesion at grain boundaries; (8) non-equilibrium properties of grain boundaries; and (9) techniques for studying grain boundaries

  13. Dimethyl sulfide: Less important than long-range transport as a source of sulfate to the remote tropical Pacific marine boundary layer

    Science.gov (United States)

    Simpson, Rebecca M. C.; Howell, Steven G.; Blomquist, Byron W.; Clarke, Antony D.; Huebert, Barry J.

    2014-07-01

    During the Pacific Atmospheric Sulfur Experiment (PASE), dimethyl sulfide (DMS) was not the principal source of non-sea salt sulfate (NSS) mass in the remote marine boundary layer (MBL), according to an Eulerian sulfur budget based on observations of chemical concentrations from the NCAR C-130 in relatively dry, subsiding regions of the tropical Pacific. Our three (DMS, SO2, and NSS) monthly-average budgets are mutually consistent. The PASE-average DMS emission was 3.0 ± 0.5μmol m-2 d-1 (our budget "units"). SO2 sources include DMS + OH (1.4 ± 0.4 units, assuming 75% of reacted DMS forms SO2) and entrainment from the free troposphere (FT) (0.8 ± 0.2 units). Clouds were the most important chemical reactors for SO2 (-1.0 ± 0.5 units). SO2 loss terms also include divergence (-0.9 ± 0.3 units), dry deposition (-0.5 ± 0.2 units), and OH + SO2 (-0.22 ± 0.05 units). The total SO2 loss balanced the SO2 source. We assume that no SO2 was lost to ozone oxidation on sea salt particles; we found negligible NSS on particles from 2.6 μm (the sea salt mass peak) to 10 μm diameter. Fine-particle NSS sources include in-cloud oxidation of SO2 by H2O2 (1.0 ± 0.5 units), OH + SO2 (0.19 ± 0.05 units), and entrainment (1.1 ± 0.3 units in clean conditions; twice that when continental pollution is present). NSS sources balance NSS loss to divergence. Only about one fourth of emitted DMS becomes NSS. FT entrainment supplied two thirds and DMS oxidation produced one third of MBL NSS, rather similar source terms.

  14. Treasury Check Verification Query (TCVQ)

    Data.gov (United States)

    Social Security Administration — The TCVQ system determines the SSN of an individual whose check has been returned to a local field office. The FO is able to request this information via the TCVQ...

  15. Model Checking Algorithms for CTMDPs

    DEFF Research Database (Denmark)

    Buchholz, Peter; Hahn, Ernst Moritz; Hermanns, Holger

    2011-01-01

    Continuous Stochastic Logic (CSL) can be interpreted over continuoustime Markov decision processes (CTMDPs) to specify quantitative properties of stochastic systems that allow some external control. Model checking CSL formulae over CTMDPs requires then the computation of optimal control strategie...

  16. NM School District Boundaries

    Data.gov (United States)

    Earth Data Analysis Center, University of New Mexico — The dataset represents the boundaries of all public school districts in the state of New Mexico. The source for the data layer is the New Mexico Public Education...

  17. Site Area Boundaries

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset consists of site boundaries from multiple Superfund sites in U.S. EPA Region 8. These data were acquired from multiple sources at different times and...

  18. MHD Heat and Mass Transfer of Chemical Reaction Fluid Flow over a Moving Vertical Plate in Presence of Heat Source with Convective Surface Boundary Condition

    Directory of Open Access Journals (Sweden)

    B. R. Rout

    2013-01-01

    Full Text Available This paper aims to investigate the influence of chemical reaction and the combined effects of internal heat generation and a convective boundary condition on the laminar boundary layer MHD heat and mass transfer flow over a moving vertical flat plate. The lower surface of the plate is in contact with a hot fluid while the stream of cold fluid flows over the upper surface with heat source and chemical reaction. The basic equations governing the flow, heat transfer, and concentration are reduced to a set of ordinary differential equations by using appropriate transformation for variables and solved numerically by Runge-Kutta fourth-order integration scheme in association with shooting method. The effects of physical parameters on the velocity, temperature, and concentration profiles are illustrated graphically. A table recording the values of skin friction, heat transfer, and mass transfer at the plate is also presented. The discussion focuses on the physical interpretation of the results as well as their comparison with previous studies which shows good agreement as a special case of the problem.

  19. Coverage Metrics for Model Checking

    Science.gov (United States)

    Penix, John; Visser, Willem; Norvig, Peter (Technical Monitor)

    2001-01-01

    When using model checking to verify programs in practice, it is not usually possible to achieve complete coverage of the system. In this position paper we describe ongoing research within the Automated Software Engineering group at NASA Ames on the use of test coverage metrics to measure partial coverage and provide heuristic guidance for program model checking. We are specifically interested in applying and developing coverage metrics for concurrent programs that might be used to support certification of next generation avionics software.

  20. Atmospheric boundary layer CO2 remote sensing with a direct detection LIDAR instrument based on a widely tunable optical parametric source.

    Science.gov (United States)

    Cadiou, Erwan; Mammez, Dominique; Dherbecourt, Jean-Baptiste; Gorju, Guillaume; Pelon, Jacques; Melkonian, Jean-Michel; Godard, Antoine; Raybaut, Myriam

    2017-10-15

    We report on the capability of a direct detection differential absorption lidar (DIAL) for range resolved and integrated path (IPDIAL) remote sensing of CO 2 in the atmospheric boundary layer (ABL). The laser source is an amplified nested cavity optical parametric oscillator (NesCOPO) emitting approximately 8 mJ at the two measurement wavelengths selected near 2050 nm. Direct detection atmospheric measurements are taken from the ground using a 30 Hz frequency switching between emitted wavelengths. Results show that comparable precision measurements are achieved in DIAL and IPDIAL modes (not better than a few ppm) on high SNR targets such as near range ABL aerosol and clouds, respectively. Instrumental limitations are analyzed and degradation due to cloud scattering variability is discussed to explain observed DIAL and IPDIAL limitations.

  1. Determining water sources in the boundary layer from tall tower profiles of water vapor and surface water isotope ratios after a snowstorm in Colorado

    Directory of Open Access Journals (Sweden)

    D. Noone

    2013-02-01

    Full Text Available The D/H isotope ratio is used to attribute boundary layer humidity changes to the set of contributing fluxes for a case following a snowstorm in which a snow pack of about 10 cm vanished. Profiles of H2O and CO2 mixing ratio, D/H isotope ratio, and several thermodynamic properties were measured from the surface to 300 m every 15 min during four winter days near Boulder, Colorado. Coeval analysis of the D/H ratios and CO2 concentrations find these two variables to be complementary with the former being sensitive to daytime surface fluxes and the latter particularly indicative of nocturnal surface sources. Together they capture evidence for strong vertical mixing during the day, weaker mixing by turbulent bursts and low level jets within the nocturnal stable boundary layer during the night, and frost formation in the morning. The profiles are generally not well described with a gradient mixing line analysis because D/H ratios of the end members (i.e., surface fluxes and the free troposphere evolve throughout the day which leads to large uncertainties in the estimate of the D/H ratio of surface water flux. A mass balance model is constructed for the snow pack, and constrained with observations to provide an optimal estimate of the partitioning of the surface water flux into contributions from sublimation, evaporation of melt water in the snow and evaporation from ponds. Results show that while vapor measurements are important in constraining surface fluxes, measurements of the source reservoirs (soil water, snow pack and standing liquid offer stronger constraint on the surface water balance. Measurements of surface water are therefore essential in developing observational programs that seek to use isotopic data for flux attribution.

  2. Radiation systems for luggage and parcel checks

    International Nuclear Information System (INIS)

    Honomichl, V.

    1989-01-01

    The current radioscopic systems of luggage check in air traffic are based on the principle of intensifying the brightness of half-tone images on the fluorescent screen of an image intensifier, or use of very sensitive pick-up tubes with digital image processing. Computers are used for signal processing and the image is produced on a display unit. Sources of continuous or pulse X-ray radiation are used. The signals from the detector are amplified, converted and stored in a buffer and then displayed. The scanning systems use a narrow beam or, to improve rapidity and sensitivity of scanning, a sector beam of radiation. Equipment is described from Heinemann (FRG) featuring a band of 576 or 768 detectors and microprocessor controlled semiconductor tv cameras. Characteristics are also presented of equipment from Aeradio Ltd (U.K.) and Philips (FRG) companies. Attention is devoted to equipment from American Science and Engineering (U.S.) showing high quality imaging even at low radiation doses. Briefly described are portable check systems for inspection of small luggage and parcels. Characteristics are presented of systems for checking vehicles and containers in naval, air, rail and road transport. The principles and performance are described of the systems. (J.B.). 4 figs

  3. Checking behavioral conformance of artifacts

    NARCIS (Netherlands)

    Fahland, D.; Leoni, de M.; Dongen, van B.F.; Aalst, van der W.M.P.

    2011-01-01

    The usefulness of process models (e.g., for analysis, improvement, or execution) strongly depends on their ability to describe reality. Conformance checking is a technique to validate how good a given process model describes recorded executions of the actual process. Recently, artifacts have been

  4. Reducing Lookups for Invariant Checking

    DEFF Research Database (Denmark)

    Thomsen, Jakob Grauenkjær; Clausen, Christian; Andersen, Kristoffer Just

    2013-01-01

    This paper helps reduce the cost of invariant checking in cases where access to data is expensive. Assume that a set of variables satisfy a given invariant and a request is received to update a subset of them. We reduce the set of variables to inspect, in order to verify that the invariant is still...

  5. 27 CFR 70.101 - Bad checks.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Bad checks. 70.101 Section....101 Bad checks. If any check or money order in payment of any amount receivable under Title 26 of the... appropriate TTB officer that such check was tendered in good faith and that such person had reasonable cause...

  6. Model Checking Markov Chains: Techniques and Tools

    NARCIS (Netherlands)

    Zapreev, I.S.

    2008-01-01

    This dissertation deals with four important aspects of model checking Markov chains: the development of efficient model-checking tools, the improvement of model-checking algorithms, the efficiency of the state-space reduction techniques, and the development of simulation-based model-checking

  7. From Preventive to Permissive Checks

    DEFF Research Database (Denmark)

    Sharp, Paul Richard; Weisdorf, Jacob Louis

    The Malthusian "preventive check" mechanism has been well documented for pre-industrial England through evidence for a negativcorrelation between the marriage rate and the price of wheat. Other literature, however, speculates that the correlation was in fact positive from the early nineteenth cen...... shows that this result is not in fact inconsistent with a stylized Malthusian mechanism, and can be understood within the context of an increasing dominance of shocks to aggregate demand rather than to aggregate supply...

  8. From preventive to permissive checks

    DEFF Research Database (Denmark)

    Weisdorf, Jacob Louis; Sharp, Paul Richard

    2009-01-01

    The Malthusian "preventive check" mechanism has been well documented for pre-industrial England through evidence for a negative correlation between the marriage rate and the price of wheat. Other literature, however, speculates that the correlation was in fact positive from the early nineteenth c...... model shows that this result is not in fact inconsistent with a stylised Malthusian mechanism, and can be understood within the context of an increasing dominance of shocks to aggregate demand rather than to aggregate supply....

  9. Emerging boundaries

    DEFF Research Database (Denmark)

    Løvschal, Mette

    2014-01-01

    of temporal and material variables have been applied as a means of exploring the processes leading to their socioconceptual anchorage. The outcome of this analysis is a series of interrelated, generative boundary principles, including boundaries as markers, articulations, process-related devices, and fixation...

  10. Changing Boundaries

    DEFF Research Database (Denmark)

    Brodkin, Evelyn; Larsen, Flemming

    2013-01-01

    project that is altering the boundary between the democratic welfare state and the market economy. We see workfare policies as boundary-changing with potentially profound implications both for individuals disadvantaged by market arrangements and for societies seeking to grapple with the increasing...

  11. Negotiating boundaries

    DEFF Research Database (Denmark)

    Aarhus, Rikke; Ballegaard, Stinne Aaløkke

    2010-01-01

    to maintain the order of the home when managing disease and adopting new healthcare technology. In our analysis we relate this boundary work to two continuums of visibility-invisibility and integration-segmentation in disease management. We explore five factors that affect the boundary work: objects......, activities, places, character of disease, and collaboration. Furthermore, the processes are explored of how boundary objects move between social worlds pushing and shaping boundaries. From this we discuss design implications for future healthcare technologies for the home.......To move treatment successfully from the hospital to that of technology assisted self-care at home, it is vital in the design of such technologies to understand the setting in which the health IT should be used. Based on qualitative studies we find that people engage in elaborate boundary work...

  12. Sources

    International Nuclear Information System (INIS)

    Duffy, L.P.

    1991-01-01

    This paper discusses the sources of radiation in the narrow perspective of radioactivity and the even narrow perspective of those sources that concern environmental management and restoration activities at DOE facilities, as well as a few related sources. Sources of irritation, Sources of inflammatory jingoism, and Sources of information. First, the sources of irritation fall into three categories: No reliable scientific ombudsman to speak without bias and prejudice for the public good, Technical jargon with unclear definitions exists within the radioactive nomenclature, and Scientific community keeps a low-profile with regard to public information. The next area of personal concern are the sources of inflammation. This include such things as: Plutonium being described as the most dangerous substance known to man, The amount of plutonium required to make a bomb, Talk of transuranic waste containing plutonium and its health affects, TMI-2 and Chernobyl being described as Siamese twins, Inadequate information on low-level disposal sites and current regulatory requirements under 10 CFR 61, Enhanced engineered waste disposal not being presented to the public accurately. Numerous sources of disinformation regarding low level radiation high-level radiation, Elusive nature of the scientific community, The Federal and State Health Agencies resources to address comparative risk, and Regulatory agencies speaking out without the support of the scientific community

  13. Software tools for the simple processing of a real-time system input/output. Application to the survey/check of a ion source by a mini-computer

    International Nuclear Information System (INIS)

    Laudillay, Y.

    1979-01-01

    This I/0 software is composed by the set of modules allowing exchanges of data between computer and process to control. It is developed taking several types of problems into account. Particularly the use of I/0 must be easy for the pedestrian and I/0 system should be able to evolve because the number of parameters can increase or lessen and also, the characteristics of some parameters can change. The respect of these conditions requires some particular solutions. For example, it is preferable for the control process software to be written in high level language and the I/0 software to be accessible in this language. It is important, also that hardware and software intermediate levels for exchanges of data be easy for user writing a program. The other problems, typical of the real time check are determined by use of the computer standard I/0. However some further modules are necessary to obtain a real time I/0 system having satisfying performances [fr

  14. The Effects of Check-In, Check-Up, Check-Out for Students with Moderate Intellectual Disability during On- and Off-Site Vocational Training

    Science.gov (United States)

    Boden, Lauren J.; Jolivette, Kristine; Alberto, Paul A.

    2018-01-01

    Check-in/check-out is a secondary-tier intervention within the positive behavior interventions and supports framework. Check-in/check-out pairs the use of an adult mentor with a daily progress report to help students meet individualized behavioral goals. This study adds to the research base by examining the effects of check-in, check-up, check-out…

  15. Boundary Spanning

    DEFF Research Database (Denmark)

    Zølner, Mette

    The paper explores how locals span boundaries between corporate and local levels. The aim is to better comprehend potentialities and challenges when MNCs draws on locals’ culture specific knowledge. The study is based on an in-depth, interpretive case study of boundary spanning by local actors in...... approach with pattern matching is a way to shed light on the tacit local knowledge that organizational actors cannot articulate and that an exclusively inductive research is not likely to unveil....

  16. sources

    Directory of Open Access Journals (Sweden)

    Shu-Yin Chiang

    2002-01-01

    Full Text Available In this paper, we study the simplified models of the ATM (Asynchronous Transfer Mode multiplexer network with Bernoulli random traffic sources. Based on the model, the performance measures are analyzed by the different output service schemes.

  17. Conformal boundary state for the rectangular geometry

    Energy Technology Data Exchange (ETDEWEB)

    Bondesan, R., E-mail: roberto.bondesan@cea.fr [Institute de Physique Theorique, CEA Saclay, F-91191 Gif-sur-Yvette (France); LPTENS, Ecole Normale Superieure, 24 rue Lhomond, 75231 Paris (France); Institut Henri Poincare, 11 rue Pierre et Marie Curie, 75231 Paris (France); Dubail, J. [Department of Physics, Yale University, P.O. Box 208120, New Haven, CT 06520-8120 (United States); Jacobsen, J.L. [LPTENS, Ecole Normale Superieure, 24 rue Lhomond, 75231 Paris (France); Institut Henri Poincare, 11 rue Pierre et Marie Curie, 75231 Paris (France); Universite Pierre et Marie Curie, 4 place Jussieu, 75252 Paris (France); Saleur, H. [Institute de Physique Theorique, CEA Saclay, F-91191 Gif-sur-Yvette (France); Institut Henri Poincare, 11 rue Pierre et Marie Curie, 75231 Paris (France); Physics Department, USC, Los Angeles, CA 90089-0484 (United States)

    2012-09-11

    We discuss conformal field theories (CFTs) in rectangular geometries, and develop a formalism that involves a conformal boundary state for the 1+1d open system. We focus on the case of homogeneous boundary conditions (no insertion of a boundary condition changing operator), for which we derive an explicit expression of the associated boundary state, valid for any arbitrary CFT. We check the validity of our solution, comparing it with known results for partition functions, numerical simulations of lattice discretizations, and coherent state expressions for free theories.

  18. DEPUTY: analysing architectural structures and checking style

    International Nuclear Information System (INIS)

    Gorshkov, D.; Kochelev, S.; Kotegov, S.; Pavlov, I.; Pravilnikov, V.; Wellisch, J.P.

    2001-01-01

    The DepUty (dependencies utility) can be classified as a project and process management tool. The main goal of DepUty is to assist by means of source code analysis and graphical representation using UML, in understanding dependencies of sub-systems and packages in CMS Object Oriented software, to understand architectural structure, and to schedule code release in modularised integration. It also allows a new-comer to more easily understand the global structure of CMS software, and to void circular dependencies up-front or re-factor the code, in case it was already too close to the edge of non-maintainability. The authors will discuss the various views DepUty provides to analyse package dependencies, and illustrate both the metrics and style checking facilities it provides

  19. 25 CFR 11.421 - Bad checks.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Bad checks. 11.421 Section 11.421 Indians BUREAU OF... Criminal Offenses § 11.421 Bad checks. (a) A person who issues or passes a check or similar sight order for..., and the issuer failed to make good within 10 days after receiving notice of that refusal. ...

  20. Model Checking Structured Infinite Markov Chains

    NARCIS (Netherlands)

    Remke, Anne Katharina Ingrid

    2008-01-01

    In the past probabilistic model checking hast mostly been restricted to finite state models. This thesis explores the possibilities of model checking with continuous stochastic logic (CSL) on infinite-state Markov chains. We present an in-depth treatment of model checking algorithms for two special

  1. Model Checking as Static Analysis

    DEFF Research Database (Denmark)

    Zhang, Fuyuan

    fairness problems can be encoded into ALFP as well. To deal with multi-valued model checking problems, we have proposed multivalued ALFP. A Moore Family result for multi-valued ALFP is also established, which ensures the existence and uniqueness of the least model. When the truth values in multi-valued...... of states satisfying a CTL formula can be characterized as the least model of ALFP clauses specifying this CTL formula. The existence of the least model of ALFP clauses is ensured by the Moore Family property of ALFP. Then, we take fairness assumptions in CTL into consideration and have shown that CTL...... ALFP constitute a nite distributive complete lattice, multi-valued ALFP can be reduced to two-valued ALFP. This result enables to implement a solver for multi-valued ALFP by reusing existing solvers for twovalued ALFP. Our ALFP-based technique developed for the two-valued CTL naturally generalizes...

  2. New method for the quality check of food proteins of the maintenance metabolism. 4. Investigation of isolated proteins as well as some protein sources of plant and animal origin

    Energy Technology Data Exchange (ETDEWEB)

    Simon, O; Hernandez, M; Bergner, H [Humboldt-Universitaet, Berlin (German Democratic Republic). Sektion Tierproduktion und Veterinaermedizin

    1981-01-01

    Male adult rats (370 g body weight) were fed on maintenance level (460 kJ ME/kgsup(0,75). In a 10 days preliminary period they received a casein/methionine (95/5) diet supplemented with 10 mg /sup 15/N excess per 0.178 kg metabolic body weight in form of ammonium acetate. Thereafter the animals were put on 8 isonitrogenous diets containing as protein sources casein, soya protein, gelatine, whole-egg, fish meal, pea, wheat and yeast. The /sup 15/N excretion via urine and feces was used to evaluate the dietary proteins for maintenance. /sup 15/N in urine was lowest in animals fed on wheat diet and highest after feeding whole-egg diet. From these data a so called '/sup 15/N excretion biological valence (BV)' was calculated, which indicated the highest quality for wheat and soy protein in meeting the needs of the intermediary maintenance metabolism. On the other hand, dietary protein sources influence the loss of endogenous nitrogen as metabolic fecal nitrogen (MFN). It was found to be lowest in animals fed on diets containing isolated proteins (6 mg MFN/100 g body weight) and highest after feeding protein sources of plant origin with a high content in crude fibre (10 mg MFN/100 g). Both, losses of /sup 15/N via urine and via feces were combined in a parameter called 'total BV'. According to this parameter the differences in quality for maintenance were only little between the protein sources tested (casein 100, soy protein 100, pea 99, wheat 99, whole egg 92, fish meal 89, gelatin 89). It was concluded that in the state of maintenance the supply with essential amino acids is not critical and that the supply with dispensable amino acids (or nonspecific nitrogen) is of great importance.

  3. Blurring Boundaries

    DEFF Research Database (Denmark)

    Neergaard, Ulla; Nielsen, Ruth

    2010-01-01

    of welfare functions into EU law both from an internal market law and a constitutional law perspective. The main problem areas covered by the Blurring Boundaries project were studied in sub-projects on: 1) Internal market law and welfare services; 2) Fundamental rights and non-discrimination law aspects......; and 3) Services of general interest. In the Blurring Boundaries project, three aspects of the European Social Model have been particularly highlighted: the constitutionalisation of the European Social Model, its multi-level legal character, and the clash between market access justice at EU level...... and distributive justice at national level....

  4. 14 CFR 121.411 - Qualifications: Check airmen (airplane) and check airmen (simulator).

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Qualifications: Check airmen (airplane) and... § 121.411 Qualifications: Check airmen (airplane) and check airmen (simulator). (a) For the purposes of this section and § 121.413: (1) A check airman (airplane) is a person who is qualified, and permitted...

  5. STABILITAS CHECK DAM DI ARBORETUM DESA SUMBER BRANTAS

    Directory of Open Access Journals (Sweden)

    Endang Purwati

    2012-09-01

    Full Text Available Abstract: The stability of check-dam in arboretum of Sumber Brantas village. Sumber Brantas water sources area is arboretum territory which has to be maintained as conservation either for technical or vegetation (plants cover by sustainable development. Arboretum territory is made as asylum in irrigation system district of Brantas River. This research discusses technical conservation activity to build the check dam in conserving the area. Check dam is built dimensionally by using HEC-RAS Program to get safe and stable dimension for rolling, shifting and piping of Sf > 1.5, and based on hydrologic analysis to get maximum flood discharge of 48.01 m3second-1. Hydraulic analysis is used to get water level profile and pressure for the dam body. Stability of the structure will be controlled by construction load (weight of check dam and its fully sediment storage condition. The result of this research shows that the safe and stable dimension for check dam are as follows: 28 meter of width; 3 meter of main height; 1.5 meter of sub-height; 10 meter of stilling basin length (Main Dam–Sub Dam.

  6. From Transition Systems to Variability Models and from Lifted Model Checking Back to UPPAAL

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar; Wasowski, Andrzej

    2017-01-01

    efficient lifted (family-based) model checking for real-time variability models. This reduces the cost of maintaining specialized family-based real-time model checkers. Real-time variability models can be model checked using the standard UPPAAL. We have implemented abstractions as syntactic source...

  7. Overview of Prevention for Water Hammer by Check Valve Action in Nuclear Reactor

    International Nuclear Information System (INIS)

    Kim, Dayong; Yoon, Hyungi; Seo, Kyoungwoo; Kim, Seonhoon

    2016-01-01

    Water hammer can cause serious damage to pumping system and unexpected system pressure rise in the pipeline. In nuclear reactor, water hammer can influence on the integrity of safety related system. Water hammer in nuclear reactor have been caused by voiding in normally water-filled lines, steam condensation line containing both steam and water, as well as by rapid check valve action. Therefore, this study focuses on the water hammer by check valve among the sources of water hammer occurrence and suggests proper methodology for check valve type selection against water hammer. This study focuses on the water hammer by check valve action among the sources of water hammer occurrence and suggests proper methodology for check valve type selection against water hammer. If the inadvertent pump trip or pipe rupture in high velocity and pressure pipe is predicted, the fast response check valve such as tiled disc, dual disc and nozzle check valve should be installed in the system. If the inadvertent pump trip or pipe rupture in very high velocity and pressure pipe and excessively large revered flow velocity are predicted, the very slowly closing check valve such as controlled closure check valve should be installed in the system

  8. Overview of Prevention for Water Hammer by Check Valve Action in Nuclear Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Dayong; Yoon, Hyungi; Seo, Kyoungwoo; Kim, Seonhoon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Water hammer can cause serious damage to pumping system and unexpected system pressure rise in the pipeline. In nuclear reactor, water hammer can influence on the integrity of safety related system. Water hammer in nuclear reactor have been caused by voiding in normally water-filled lines, steam condensation line containing both steam and water, as well as by rapid check valve action. Therefore, this study focuses on the water hammer by check valve among the sources of water hammer occurrence and suggests proper methodology for check valve type selection against water hammer. This study focuses on the water hammer by check valve action among the sources of water hammer occurrence and suggests proper methodology for check valve type selection against water hammer. If the inadvertent pump trip or pipe rupture in high velocity and pressure pipe is predicted, the fast response check valve such as tiled disc, dual disc and nozzle check valve should be installed in the system. If the inadvertent pump trip or pipe rupture in very high velocity and pressure pipe and excessively large revered flow velocity are predicted, the very slowly closing check valve such as controlled closure check valve should be installed in the system.

  9. Reliability estimation for check valves and other components

    International Nuclear Information System (INIS)

    McElhaney, K.L.; Staunton, R.H.

    1996-01-01

    For years the nuclear industry has depended upon component operational reliability information compiled from reliability handbooks and other generic sources as well as private databases generated by recognized experts both within and outside the nuclear industry. Regrettably, these technical bases lacked the benefit of large-scale operational data and comprehensive data verification, and did not take into account the parameters and combinations of parameters that affect the determination of failure rates. This paper briefly examines the historic use of generic component reliability data, its sources, and its limitations. The concept of using a single failure rate for a particular component type is also examined. Particular emphasis is placed on check valves due to the information available on those components. The Appendix presents some of the results of the extensive analyses done by Oak Ridge National Laboratory (ORNL) on check valve performance

  10. 46 CFR 10.214 - Security Check.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...

  11. 7 CFR 1421.11 - Spot checks.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Spot checks. 1421.11 Section 1421.11 Agriculture... ASSISTANCE LOANS AND LOAN DEFICIENCY PAYMENTS FOR 2008 THROUGH 2012 General § 1421.11 Spot checks. (a) CCC... CCC access to the farm and storage facility as necessary to conduct collateral inspections, or “spot...

  12. SPEED ROLLER STAND MEASUREMENT SYSTEM CHECKING TECHNIQUE

    Directory of Open Access Journals (Sweden)

    Y. Zybtsev

    2011-01-01

    Full Text Available The study has shown that the accuracy of brakes checking by inertial stands depends upon the applied methods of measurement of braking parameters (stand slowing down, braking distance, brakes triggering time, current speed as well as the methods of metrological checking of measuring system canals.

  13. Model-Checking Discrete Duration Calculus

    DEFF Research Database (Denmark)

    Hansen, Michael Reichhardt

    1994-01-01

    can do model-checking. The subset we consider is expressive enough to formalize the requirements to the gas burner system given by A.P. Ravn (1993); but only for a discrete time domain. Model-checking is done by reducing the correctness problem ℳ|=𝒟 to the inclusion problem of regular...

  14. Checking and Balancing: Banking and Budgeting.

    Science.gov (United States)

    Thypin, Marilyn; Glasner, Lynne

    A short fictional work for limited English speakers is presented that relates a young couple's experience in learning about managing their money more carefully by budgeting and maintaining a checking account. Since the couple did not have a checking account, they had to go to their savings bank in order to pay each bill and they had to keep cash…

  15. Software tool for physics chart checks.

    Science.gov (United States)

    Li, H Harold; Wu, Yu; Yang, Deshan; Mutic, Sasa

    2014-01-01

    Physics chart check has long been a central quality assurance (QC) measure in radiation oncology. The purpose of this work is to describe a software tool that aims to accomplish simplification, standardization, automation, and forced functions in the process. Nationally recognized guidelines, including American College of Radiology and American Society for Radiation Oncology guidelines and technical standards, and the American Association of Physicists in Medicine Task Group reports were identified, studied, and summarized. Meanwhile, the reported events related to physics chart check service were analyzed using an event reporting and learning system. A number of shortfalls in the chart check process were identified. To address these problems, a software tool was designed and developed under Microsoft. Net in C# to hardwire as many components as possible at each stage of the process. The software consists of the following 4 independent modules: (1) chart check management; (2) pretreatment and during treatment chart check assistant; (3) posttreatment chart check assistant; and (4) quarterly peer-review management. The users were a large group of physicists in the author's radiation oncology clinic. During over 1 year of use the tool has proven very helpful in chart checking management, communication, documentation, and maintaining consistency. The software tool presented in this work aims to assist physicists at each stage of the physics chart check process. The software tool is potentially useful for any radiation oncology clinics that are either in the process of pursuing or maintaining the American College of Radiology accreditation.

  16. Repeated checking induces uncertainty about future threat

    NARCIS (Netherlands)

    Giele, C.L.|info:eu-repo/dai/nl/318754460; Engelhard, I.M.|info:eu-repo/dai/nl/239681533; van den Hout, M.A.|info:eu-repo/dai/nl/070445354; Dek, E.C.P.|info:eu-repo/dai/nl/313959552; Damstra, Marianne; Douma, Ellen

    2015-01-01

    Studies have shown that obsessive-compulsive (OC) -like repeated checking paradoxically increases memory uncertainty. This study tested if checking also induces uncertainty about future threat by impairing the distinction between danger and safety cues. Participants (n = 54) engaged in a simulated

  17. Diagnostic information in temporal compliance checking

    NARCIS (Netherlands)

    Ramezani Taghiabadi, E.; Fahland, D.; Dongen, van B.F.; Aalst, van der W.M.P.

    2012-01-01

    Compliance checking is gaining importance as today’s organizations need to show that operational processes are executed in a controlled manner while satisfying prede¿ned (legal) requirements. Deviations may be costly and expose the organization to severe risks. Compliance checking is of growing

  18. Automatization and familiarity in repeated checking

    NARCIS (Netherlands)

    Dek, E.C.P.|info:eu-repo/dai/nl/313959552; van den Hout, M.A.|info:eu-repo/dai/nl/070445354; Giele, C.L.|info:eu-repo/dai/nl/318754460; Engelhard, I.M.|info:eu-repo/dai/nl/239681533

    2015-01-01

    Repetitive, compulsive-like checking of an object leads to reductions in memory confidence, vividness, and detail. Experimental research suggests that this is caused by increased familiarity with perceptual characteristics of the stimulus and automatization of the checking procedure (Dek, van den

  19. Model Checking Infinite-State Markov Chains

    NARCIS (Netherlands)

    Remke, Anne Katharina Ingrid; Haverkort, Boudewijn R.H.M.; Cloth, L.

    2004-01-01

    In this paper algorithms for model checking CSL (continuous stochastic logic) against infinite-state continuous-time Markov chains of so-called quasi birth-death type are developed. In doing so we extend the applicability of CSL model checking beyond the recently proposed case for finite-state

  20. Model Checking Real-Time Systems

    DEFF Research Database (Denmark)

    Bouyer, Patricia; Fahrenberg, Uli; Larsen, Kim Guldstrand

    2018-01-01

    This chapter surveys timed automata as a formalism for model checking real-time systems. We begin with introducing the model, as an extension of finite-state automata with real-valued variables for measuring time. We then present the main model-checking results in this framework, and give a hint...

  1. 32 CFR 635.6 - Name checks.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Name checks. 635.6 Section 635.6 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Records Administration § 635.6 Name checks. (a) Information contained in military police records may be...

  2. 7 CFR 58.243 - Checking quality.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Checking quality. 58.243 Section 58.243 Agriculture... Procedures § 58.243 Checking quality. All milk, milk products and dry milk products shall be subject to inspection and analysis by the dairy plant for quality and condition throughout each processing operation...

  3. Vertical pump with free floating check valve

    International Nuclear Information System (INIS)

    Lindsay, M.

    1980-01-01

    A vertical pump is described which has a bottom discharge with a free floating check valve disposed in the outlet plenum thereof. The free floating check valve comprises a spherical member with a hemispherical cage-like member attached thereto which is capable of allowing forward or reverse flow under appropriate conditions while preventing reverse flow under inappropriate conditions

  4. 38 CFR 21.4505 - Check delivery.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Check delivery. 21.4505...) VOCATIONAL REHABILITATION AND EDUCATION Education Loans § 21.4505 Check delivery. (a) General. Education... surviving spouse is enrolled for delivery by the educational institution. (b) Delivery and certification. (1...

  5. Boundary issues

    Science.gov (United States)

    Townsend, Alan R.; Porder, Stephen

    2011-03-01

    What is our point of no return? Caesar proclaimed 'the die is cast' while crossing the Rubicon, but rarely does modern society find so visible a threshold in our continued degradation of ecosystems and the services they provide. Humans have always used their surroundings to make a living— sometimes successfully, sometimes not (Diamond 2005)—and we intuitively know that there are boundaries to our exploitation. But defining these boundaries has been a challenge since Malthus first prophesied that nature would limit the human population (Malthus 1798). In 2009, Rockström and colleagues tried to quantify what the 6.8 billion (and counting) of us could continue to get away with, and what we couldn't (Rockström et al 2009). In selecting ten 'planetary boundaries', the authors contend that a sustainable human enterprise requires treating a number of environmental thresholds as points of no return. They suggest we breach these Rubicons at our own peril, and that we've already crossed three: biodiversity loss, atmospheric CO2, and disruption of the global nitrogen (N) cycle. As they clearly hoped, the very act of setting targets has provoked scientific inquiry about their accuracy, and about the value of hard targets in the first place (Schlesinger 2009). Such debate is a good thing. Despite recent emphasis on the science of human-ecosystem interactions, understanding of our planetary boundaries is still in its infancy, and controversy can speed scientific progress (Engelhardt and Caplan 1987). A few weeks ago in this journal, Carpenter and Bennett (2011) took aim at one of the more controversial boundaries in the Rockström analysis: that for human alteration of the global phosphorus (P) cycle. Rockström's group chose riverine P export as the key indicator, suggesting that humans should not exceed a value that could trigger widespread marine anoxic events—and asserting that we have not yet crossed this threshold. There are defensible reasons for a marine

  6. boundary dissipation

    Directory of Open Access Journals (Sweden)

    Mehmet Camurdan

    1998-01-01

    are coupled by appropriate trace operators. This overall model differs from those previously studied in the literature in that the elastic chamber floor is here more realistically modeled by a hyperbolic Kirchoff equation, rather than by a parabolic Euler-Bernoulli equation with Kelvin-Voight structural damping, as in past literature. Thus, the hyperbolic/parabolic coupled system of past literature is replaced here by a hyperbolic/hyperbolic coupled model. The main result of this paper is a uniform stabilization of the coupled PDE system by a (physically appealing boundary dissipation.

  7. Effective ambiguity checking in biosequence analysis

    Directory of Open Access Journals (Sweden)

    Giegerich Robert

    2005-06-01

    Full Text Available Abstract Background Ambiguity is a problem in biosequence analysis that arises in various analysis tasks solved via dynamic programming, and in particular, in the modeling of families of RNA secondary structures with stochastic context free grammars. Several types of analysis are invalidated by the presence of ambiguity. As this problem inherits undecidability (as we show here from the namely problem for context free languages, there is no complete algorithmic solution to the problem of ambiguity checking. Results We explain frequently observed sources of ambiguity, and show how to avoid them. We suggest four testing procedures that may help to detect ambiguity when present, including a just-in-time test that permits to work safely with a potentially ambiguous grammar. We introduce, for the special case of stochastic context free grammars and RNA structure modeling, an automated partial procedure for proving non-ambiguity. It is used to demonstrate non-ambiguity for several relevant grammars. Conclusion Our mechanical proof procedure and our testing methods provide a powerful arsenal of methods to ensure non-ambiguity.

  8. What is a good health check? An interview study of health check providers' views and practices

    NARCIS (Netherlands)

    Y. Stol (Yrrah); E.C.A. Asscher (Eva); M.H.N. Schermer (Maartje)

    2017-01-01

    markdownabstract__Background:__ Health checks identify (risk factors for) disease in people without symptoms. They may be offered by the government through population screenings and by other providers to individual users as 'personal health checks'. Health check providers' perspective of 'good'

  9. 14 CFR 91.1089 - Qualifications: Check pilots (aircraft) and check pilots (simulator).

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Qualifications: Check pilots (aircraft) and check pilots (simulator). 91.1089 Section 91.1089 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION... RULES Fractional Ownership Operations Program Management § 91.1089 Qualifications: Check pilots...

  10. Reality Check Algorithm for Complex Sources in Early Warning

    Science.gov (United States)

    Karakus, G.; Heaton, T. H.

    2013-12-01

    In almost all currently operating earthquake early warning (EEW) systems, presently available seismic data are used to predict future shaking. In most cases, location and magnitude are estimated. We are developing an algorithm to test the goodness of that prediction in real time. We monitor envelopes of acceleration, velocity, and displacement; if they deviate significantly from the envelope predicted by Cua's envelope gmpe's then we declare an overfit (perhaps false alarm) or an underfit (possibly a larger event has just occurred). This algorithm is designed to provide a robust measure and to work as quickly as possible in real-time. We monitor the logarithm of the ratio between the envelopes of the ongoing observed event and the envelopes derived from the predicted envelopes of channels of ground motion of the Virtual Seismologist (VS) (Cua, G. and Heaton, T.). Then, we recursively filter this result with a simple running median (de-spiking operator) to minimize the effect of one single high value. Depending on the result of the filtered value we make a decision such as if this value is large enough (e.g., >1), then we would declare, 'that a larger event is in progress', or similarly if this value is small enough (e.g., <-1), then we would declare a false alarm. We design the algorithm to work at a wide range of amplitude scales; that is, it should work for both small and large events.

  11. Simple Check Valves for Microfluidic Devices

    Science.gov (United States)

    Willis, Peter A.; Greer, Harold F.; Smith, J. Anthony

    2010-01-01

    A simple design concept for check valves has been adopted for microfluidic devices that consist mostly of (1) deformable fluorocarbon polymer membranes sandwiched between (2) borosilicate float glass wafers into which channels, valve seats, and holes have been etched. The first microfluidic devices in which these check valves are intended to be used are micro-capillary electrophoresis (microCE) devices undergoing development for use on Mars in detecting compounds indicative of life. In this application, it will be necessary to store some liquid samples in reservoirs in the devices for subsequent laboratory analysis, and check valves are needed to prevent cross-contamination of the samples. The simple check-valve design concept is also applicable to other microfluidic devices and to fluidic devices in general. These check valves are simplified microscopic versions of conventional rubber- flap check valves that are parts of numerous industrial and consumer products. These check valves are fabricated, not as separate components, but as integral parts of microfluidic devices. A check valve according to this concept consists of suitably shaped portions of a deformable membrane and the two glass wafers between which the membrane is sandwiched (see figure). The valve flap is formed by making an approximately semicircular cut in the membrane. The flap is centered over a hole in the lower glass wafer, through which hole the liquid in question is intended to flow upward into a wider hole, channel, or reservoir in the upper glass wafer. The radius of the cut exceeds the radius of the hole by an amount large enough to prevent settling of the flap into the hole. As in a conventional rubber-flap check valve, back pressure in the liquid pushes the flap against the valve seat (in this case, the valve seat is the adjacent surface of the lower glass wafer), thereby forming a seal that prevents backflow.

  12. QuickChecking Static Analysis Properties

    DEFF Research Database (Denmark)

    Midtgaard, Jan; Møller, Anders

    2015-01-01

    A static analysis can check programs for potential errors. A natural question that arises is therefore: who checks the checker? Researchers have given this question varying attention, ranging from basic testing techniques, informal monotonicity arguments, thorough pen-and-paper soundness proofs...... of a lattice. Moreover, we offer a number of generic, type-safe combinators to check transfer functions and operators on lattices, to help ensure that these are, e.g., monotone, strict, or invariant. We substantiate our claims by quickchecking a type analysis for the Lua programming language...

  13. QuickChecking static analysis properties

    DEFF Research Database (Denmark)

    Midtgaard, Jan; Møller, Anders

    2017-01-01

    A static analysis can check programs for potential errors. A natural question that arises is therefore: who checks the checker? Researchers have given this question varying attention, ranging from basic testing techniques, informal monotonicity arguments, thorough pen-and-paper soundness proofs....... Moreover, we offer a number of generic, type-safe combinators to check transfer functions and operators on lattices, to help ensure that these are, eg, monotone, strict, or invariant. We substantiate our claims by quickchecking a type analysis for the Lua programming language....

  14. Engineering Abstractions in Model Checking and Testing

    DEFF Research Database (Denmark)

    Achenbach, Michael; Ostermann, Klaus

    2009-01-01

    Abstractions are used in model checking to tackle problems like state space explosion or modeling of IO. The application of these abstractions in real software development processes, however, lacks engineering support. This is one reason why model checking is not widely used in practice yet...... and testing is still state of the art in falsification. We show how user-defined abstractions can be integrated into a Java PathFinder setting with tools like AspectJ or Javassist and discuss implications of remaining weaknesses of these tools. We believe that a principled engineering approach to designing...... and implementing abstractions will improve the applicability of model checking in practice....

  15. Incremental Integrity Checking: Limitations and Possibilities

    DEFF Research Database (Denmark)

    Christiansen, Henning; Martinenghi, Davide

    2005-01-01

    Integrity checking is an essential means for the preservation of the intended semantics of a deductive database. Incrementality is the only feasible approach to checking and can be obtained with respect to given update patterns by exploiting query optimization techniques. By reducing the problem...... to query containment, we show that no procedure exists that always returns the best incremental test (aka simplification of integrity constraints), and this according to any reasonable criterion measuring the checking effort. In spite of this theoretical limitation, we develop an effective procedure...

  16. Notification: Purchase Card and Convenience Check Audit

    Science.gov (United States)

    Project #OA-FY13-0116, April 11, 2013. The U.S. Environmental Protection Agency, Office of Inspector General, is beginning the fieldwork phase of its audit of the agency’s purchase card and convenience check programs.

  17. Classification and checking model of pedestrian crossing

    Directory of Open Access Journals (Sweden)

    Luis Delgado Méndez

    2012-11-01

    After realizing this investigation it can be confirmed that the functionality of a pedestrian crossing depends on almost a hundred parameters which must be checked or measured, in turn proving that this design and construction process is indeed complex.

  18. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  19. CMM Interim Check Design of Experiments (U)

    Energy Technology Data Exchange (ETDEWEB)

    Montano, Joshua Daniel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-07-29

    Coordinate Measuring Machines (CMM) are widely used in industry, throughout the Nuclear Weapons Complex and at Los Alamos National Laboratory (LANL) to verify part conformance to design definition. Calibration cycles for CMMs at LANL are predominantly one year in length and include a weekly interim check to reduce risk. The CMM interim check makes use of Renishaw’s Machine Checking Gauge which is an off-the-shelf product simulates a large sphere within a CMM’s measurement volume and allows for error estimation. As verification on the interim check process a design of experiments investigation was proposed to test a couple of key factors (location and inspector). The results from the two-factor factorial experiment proved that location influenced results more than the inspector or interaction.

  20. WE-E-BRB-10: DosCheck - an Electronic Chart Checking Tool for Dosimetrists.

    Science.gov (United States)

    Yang, D; Wu, Y; Yaddanapudi, S; Moore, K; Pierbuxg, B; Brame, S; Mutic, S

    2012-06-01

    In addition to treatment planning, dosimetrists have to prepare documentation and manually enter data in treatment management system (TMS) which did not transfer or setup automatically. The required documents and data are dependent on the disease site, treatment machine and clinical workflow. Errors and inconsistencies can cause redundant work, treatment delays and potentially treatment errors. To address these issues, an electronic checking software tool, DosCheck was clinically implemented to check the existence of necessary documentations and the integrity of manually-entered data. The purpose of this software is to reduce the frequency of human errors and to improve efficiency. DosCheck reads data and documents from 1) TMS, 2) Pinnacle TPS, and 3) DICOM plan files stored in a DICOM-RT PACS. It processes documents in Word and PDF format, treatment plan data in Pinnacle native format and DICOM format, and Mosaiq data in database records. The software cross-checks data accuracy and consistency by following rules that are pre-defined according to the clinical requirements and treatment sties. It interacts with dosimetrists and presents instantaneous results via graphical user interface. DosCheck has been implemented in C#. It performs a full check for a patient with 20 seconds. It has been clinically commissioned and is used daily by all dosimetrists at our institution. Retrospective analysis shows that DosCheck identifies 30% to 40% of previously reported dosimetrist human errors. Additional ∼30% errors are checked by other tools that could be integrated DosCheck in the near future. As an electronic data checking tool, DosCheck can obtain and process data and documents from multiple clinical computer systems in the radiation oncology department, and perform checks according to clinical rules. It is able to improve the accuracy and efficiency of clinical data and document process, and therefore to reduce any potential inconsistencies and errors. © 2012 American

  1. VISIONS: Remote Observations of a Spatially-Structured Filamentary Source of Energetic Neutral Atoms near the Polar Cap Boundary During an Auroral Substorm

    Science.gov (United States)

    Collier, Michael R.; Chornay, D.; Clemmons, J.; Keller, J. W.; Klenzing, J.; Kujawski, J.; McLain, J.; Pfaff, R.; Rowland, D.; Zettergren, M.

    2015-01-01

    We report initial results from the VISualizing Ion Outflow via Neutral atom imaging during a Substorm (VISIONS) rocket that flew through and near several regions of enhanced auroral activity and also sensed regions of ion outflow both remotely and directly. The observed neutral atom fluxes were largest at the lower energies and generally higher in the auroral zone than in the polar cap. In this paper, we focus on data from the latter half of the VISIONS trajectory when the rocket traversed the polar cap region. During this period, many of the energetic neutral atom spectra show a peak at 100 electronvolts. Spectra with peaks around 100 electronvolts are also observed in the Electrostatic Ion Analyzer (EIA) data consistent with these ions comprising the source population for the energetic neutral atoms. The EIA observations of this low energy population extend only over a few tens of kilometers. Furthermore, the directionality of the arriving energetic neutral atoms is consistent with either this spatially localized source of energetic ions extending from as low as about 300 kilometers up to above 600 kilometers or a larger source of energetic ions to the southwest.

  2. AUTOMATED HOTEL CHECK-IN SERTA DAMPAKNYA PADA TENAGA KERJA LOKAL

    Directory of Open Access Journals (Sweden)

    Ni Gusti Nyoman Suci Murni

    2017-10-01

    Full Text Available The tourism sector is one of the most heavily influenced sectors of information technology. Hotels that are a component of tourism cannot be separated from these influences, especially in information services, room reservations, check-in / check-out service, and other services. With the sophistication of information technology, everyone can access any information, from anywhere; at a very cheap price even every country provides free facilities for that purpose. This study uses qualitative methods where the data source obtained by looking for some libraries related to self check-in. The results show that there are some differences that applied between the check-in manual and self check-in, and the impact caused by the application of self check-in. The positive impact of self check-in are speeding up the check-in process, saving payrolls, simplifying services, simplifying reporting, and saving time. While the negative impacts such as reducing employment in developing countries, reducing social communication / human touch, reducing the understanding of cross cultural understanding, allowing the occurrence of crime (cyber crime as well as very expensive initial cost.

  3. Recent improvements in check valve monitoring methods

    International Nuclear Information System (INIS)

    Haynes, H.D.

    1990-01-01

    In support of the NRC Nuclear Plant Aging Research (NPAR) program, ORNL has carried out an evaluation of three check valve monitoring methods: acoustic emission, ultrasonic inspection, and magnetic flux signature analysis (MFSA). This work has focused on determining the capabilities of each method to provide diagnostic information useful in determining check valve aging and service wear effects (degradation) and undesirable operating modes. In addition, as part of the ORNL Advanced Diagnostic Engineering Research and Development Center (ADEC), two noval nonintrusive monitoring methods were developed (external ac- and dc-magnetic monitoring) that provide several improvements over the other methods. None of the examined methods could, by themselves, monitor the instantaneous position and motion of check valve internals and valve leakage; however, the combination of acoustic emission monitoring with one of the other methods provides the means to determine vital check valve operational information. This paper describes the benefits and limitations associated with each method and includes recent laboratory and field test data to illustrate the capabilities of these methods to detect simulated check valve degradation. 3 refs., 22 figs., 4 tabs

  4. Recent improvements in check valve monitoring methods

    International Nuclear Information System (INIS)

    Haynes, H.D.

    1991-01-01

    In support of the NRC Nuclear Plant Aging Research (NPAR) program, ORNL has carried out an evaluation of three check valve monitoring methods: acoustic emission, ultrasonic inspection, and magnetic flux signature analysis (MFSA). This work has focussed on determining the capabilities of each method to provide diagnostic information useful in determining check valve aging and service wear effects (degradation) and undesirable operating modes. In addition, as part of the ORNL Advanced Diagnostic Engineering Research and Development Center (ADEC), two novel nonintrusive monitoring methods were developed (external ac- and dc-magnetic monitoring) that provide several improvements over the other methods. None of the examined methods could, by themselves, monitor the instantaneous position and motion of check valve internals and valve leakage; however, the combination of acoustic emission monitoring with one of the other methods provides the means to determine vital check valve operational information. This paper describes the benefits and limitations associated with each method and includes recent laboratory and field test data to illustrate the capabilities of these methods to detect simulated check valve degradation. 3 refs., 22 figs., 4 tabs

  5. Technology for Boundaries

    DEFF Research Database (Denmark)

    Bødker, Susanne; Kristensen, Jannie Friis; Nielsen, Christina

    2003-01-01

    .After analysing the history and the current boundary work, the paper will propose new technological support for boundary work. In particular the paper will suggest means of supporting boundaries when these are productive and for changing boundaries when this seems more appropriate. In total, flexible technologies......This paper presents a study of an organisation, which is undergoing a process transforming organisational and technological boundaries. In particular, we shall look at three kinds of boundaries: the work to maintain and change the boundary between the organisation and its customers; boundaries...... seem a core issue when dealing with technology for boundaries....

  6. Radicals in the marine boundary layer during NEAQS 2004: a model study of day-time and night-time sources and sinks

    Directory of Open Access Journals (Sweden)

    R. Sommariva

    2009-05-01

    Full Text Available This paper describes a modelling study of several HOx and NOx species (OH, HO2, organic peroxy radicals, NO3 and N2O5 in the marine boundary layer. A model based upon the Master Chemical Mechanism (MCM was constrained to observations of chemical and physical parameters made onboard the NOAA ship R/V Brown as part of the New England Air Quality Study (NEAQS in the summer of 2004. The model was used to calculate [OH] and to determine the composition of the peroxy radical pool. Modelled [NO3] and [N2O5] were compared to in-situ measurements by Cavity Ring-Down Spectroscopy. The comparison showed that the model generally overestimated the measurements by 30–50%, on average.

    The model results were analyzed with respect to several chemical and physical parameters, including uptake of NO3 and N2O5 on fog droplets and on aerosol, dry deposition of NO3 and N2O5, gas-phase hydrolysis of N2O5 and reactions of NO3 with NMHCs and peroxy radicals. The results suggest that fog, when present, is an important sink for N2O5 via rapid heterogeneous uptake. The comparison between the model and the measurements were consistent with values of the heterogeneous uptake coefficient of N2O5N2O5>1×10−2, independent of aerosol composition in this marine environment. The analysis of the different loss processes of the nitrate radical showed the important role of the organic peroxy radicals, which accounted for a significant fraction (median: 15% of NO3 gas-phase removal, particularly in the presence of high concentrations of dimethyl sulphide (DMS.

  7. Spectral asymmetry for bag boundary conditions

    International Nuclear Information System (INIS)

    Beneventano, C G; Santangelo, E M; Wipf, A

    2002-01-01

    We give an expression, in terms of boundary spectral functions, for the spectral asymmetry of the Euclidean Dirac operator in two dimensions, when its domain is determined by local boundary conditions and the manifold is of product type. As an application, we explicitly evaluate the asymmetry in the case of a finite-length cylinder and check that the outcome is consistent with our general result. Finally, we study the asymmetry in a disc, which is a non-product case, and propose an interpretation

  8. Quality checking of radioactive and hazardous waste

    International Nuclear Information System (INIS)

    Billington, D.M.; Burgoyne, S.M.J.; Dale, C.J.

    1992-01-01

    This report describes the work of the HMIP Waste Quality Checking Laboratory (WQCL) for the period September 1989 -August 1991. The WQCL has conducted research and development of procedures for the receipt, sampling and analysis of low level solid radioactive waste (LLW), intermediate level radioactive waste (ILW) and hazardous chemical waste (HW). Operational facilities have been commissioned for quality checking both LLW and HW. Waste quality checking has been completed on LLW packages seized from the UK waste disposal route by HMIP Inspectors. Packages have ranged in size from the 200 litre steel drum to half-height ISO freight container. Development work was continued on methods of sample extraction and radio-chemical analysis for cement encapsulated ILW in the form of magnox, graphite and stainless steel. This work was undertaken on non-radioactive simulants. (author)

  9. Glovebox pressure relief and check valve

    International Nuclear Information System (INIS)

    Blaedel, K.L.

    1986-01-01

    This device is a combined pressure relief valve and check valve providing overpressure protection and preventing back flow into an inert atmosphere enclosure. The pressure relief is embodied by a submerged vent line in a mercury reservior, the releif pressure being a function of the submerged depth. The pressure relief can be vented into an exhaust system and the relieving pressure is only slightly influenced by the varying pressure in the exhaust system. The check valve is embodied by a ball which floats on the mercury column and contacts a seat whenever vacuum exists within the glovebox enclosure. Alternatively, the check valve is embodied by a vertical column of mercury, the maximum back pressure being a function of the height of the column of mercury

  10. Glovebox pressure relief and check valve

    Energy Technology Data Exchange (ETDEWEB)

    Blaedel, K.L.

    1986-03-17

    This device is a combined pressure relief valve and check valve providing overpressure protection and preventing back flow into an inert atmosphere enclosure. The pressure relief is embodied by a submerged vent line in a mercury reservior, the releif pressure being a function of the submerged depth. The pressure relief can be vented into an exhaust system and the relieving pressure is only slightly influenced by the varying pressure in the exhaust system. The check valve is embodied by a ball which floats on the mercury column and contacts a seat whenever vacuum exists within the glovebox enclosure. Alternatively, the check valve is embodied by a vertical column of mercury, the maximum back pressure being a function of the height of the column of mercury.

  11. UTP and Temporal Logic Model Checking

    Science.gov (United States)

    Anderson, Hugh; Ciobanu, Gabriel; Freitas, Leo

    In this paper we give an additional perspective to the formal verification of programs through temporal logic model checking, which uses Hoare and He Unifying Theories of Programming (UTP). Our perspective emphasizes the use of UTP designs, an alphabetised relational calculus expressed as a pre/post condition pair of relations, to verify state or temporal assertions about programs. The temporal model checking relation is derived from a satisfaction relation between the model and its properties. The contribution of this paper is that it shows a UTP perspective to temporal logic model checking. The approach includes the notion of efficiency found in traditional model checkers, which reduced a state explosion problem through the use of efficient data structures

  12. UK Department of Environment Quality Checking Laboratory

    International Nuclear Information System (INIS)

    Burgoyne, K.E.; Green, T.H.; Maxwell, D.J.; Smith, D.L.G.

    1990-01-01

    The purpose of Taywood Engineering Ltd was to develop and evaluate techniques for the non-destructive and destructive examination of both low and intermediate level radioactive waste packages. The contract also included a study on the conceptual design and cost of a permanent Waste Quality Checking facility. The June 1986 contract was completed in November 1989. A second contract was awarded in September 1989 to extend the scope to include Quality Checking of hazardous waste and to increase the throughput of low level waste. This paper highlights the techniques developed during these programmes and applied to a range of real low level waste packages. The feasibility of operating a pilot scale facility for the independent Quality Checking of LLW has been successfully demonstrated. (orig.)

  13. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  14. Consistency Checking of Web Service Contracts

    DEFF Research Database (Denmark)

    Cambronero, M. Emilia; Okika, Joseph C.; Ravn, Anders Peter

    2008-01-01

    Behavioural properties are analyzed for web service contracts formulated in Business Process Execution Language (BPEL) and Choreography Description Language (CDL). The key result reported is an automated technique to check consistency between protocol aspects of the contracts. The contracts...... are abstracted to (timed) automata and from there a simulation is set up, which is checked using automated tools for analyzing networks of finite state processes. Here we use the Concurrency Work Bench. The proposed techniques are illustrated with a case study that include otherwise difficult to analyze fault...

  15. A Method for Model Checking Feature Interactions

    DEFF Research Database (Denmark)

    Pedersen, Thomas; Le Guilly, Thibaut; Ravn, Anders Peter

    2015-01-01

    This paper presents a method to check for feature interactions in a system assembled from independently developed concurrent processes as found in many reactive systems. The method combines and refines existing definitions and adds a set of activities. The activities describe how to populate the ...... the definitions with models to ensure that all interactions are captured. The method is illustrated on a home automation example with model checking as analysis tool. In particular, the modelling formalism is timed automata and the analysis uses UPPAAL to find interactions....

  16. Acoustic emission testing of piston check valves

    International Nuclear Information System (INIS)

    Stewart, D.L.

    1994-01-01

    Based on test experience at Comanche Peak Unit 1, an acoustic emission data evaluation matrix for piston check valves has been developed. The degradations represented in this matrix were selected based on Edwards piston check valve failure data reported in the Nuclear Plant Reliability Data System. Evidence to support this matrix was collected from site test data on a variety of valve types. Although still under refinement, the matrix provides three major attributes for closure verification, which have proven useful in developing test procedures for inservice testing and preventing unnecessary disassembly

  17. Implementing Check in/Check out for Students with Intellectual Disability in Self-Contained Classrooms

    Science.gov (United States)

    Boden, Lauren J.; Ennis, Robin P.; Jolivette, Kristine

    2012-01-01

    Check in/check out (CICO) is a secondary-tier intervention implemented within the framework of schoolwide positive behavior interventions and supports (SWPBIS) that uses school-based contingencies to encourage positive behavior. CICO is a five-step cycle which uses daily progress report cards (DPR) to monitor progress toward schoolwide or…

  18. Check In / Check Out. The Public Space as an Internet of Things

    NARCIS (Netherlands)

    van t Hof, C.C.G.; van Est, R.; Daemen, F.

    2011-01-01

    Mobile phones, public transport smart cards, security cameras and GPS systems in our car - we are surrounded by digital devices. They track us, guide us, help us, and control us. The book Check In / Check Out. The Public Space as an Internet of Things shows us how our digital and physical worlds are

  19. Check in / check out : the public space as an internet of things

    NARCIS (Netherlands)

    Hof, van 't C.; Est, van R.; Daemen, F.

    2011-01-01

    Mobile phones, public transport smart cards, security cameras and GPS systems in our car - we are surrounded by digital devices. They track us, guide us, help us, and control us. The book Check In / Check Out. The Public Space as an Internet of Things shows us how our digital and physical worlds are

  20. What is a good health check? An interview study of health check providers' views and practices.

    Science.gov (United States)

    Stol, Yrrah H; Asscher, Eva C A; Schermer, Maartje H N

    2017-10-02

    Health checks identify (risk factors for) disease in people without symptoms. They may be offered by the government through population screenings and by other providers to individual users as 'personal health checks'. Health check providers' perspective of 'good' health checks may further the debate on the ethical evaluation and possible regulation of these personal health checks. In 2015, we interviewed twenty Dutch health check providers on criteria for 'good' health checks, and the role these criteria play in their practices. Providers unanimously formulate a number of minimal criteria: Checks must focus on (risk factors for) treatable/preventable disease; Tests must be reliable and clinically valid; Participation must be informed and voluntary; Checks should provide more benefits than harms; Governmental screenings should be cost-effective. Aspirational criteria mentioned were: Follow-up care should be provided; Providers should be skilled and experienced professionals that put the benefit of (potential) users first; Providers should take time and attention. Some criteria were contested: People should be free to test on any (risk factor for) disease; Health checks should only be performed in people at high risk for disease that are likely to implement health advice; Follow up care of privately funded tests should not drain on collective resources. Providers do not always fulfil their own criteria. Their reasons reveal conflicts between criteria, conflicts between criteria and other ethical values, and point to components in the (Dutch) organisation of health care that hinder an ethical provision of health checks. Moreover, providers consider informed consent a criterion that is hard to establish in practice. According to providers, personal health checks should meet the same criteria as population screenings, with the exception of cost-effectiveness. Providers do not always fulfil their own criteria. Results indicate that in thinking about the ethics of health

  1. Type checking by domain analysis in Ampersand

    NARCIS (Netherlands)

    Joosten, S.M.M.; Joosten, S.J.C.; Kahl, W.; Winter, M.; Oliveira, J.N.

    2015-01-01

    In the process of incorporating subtyping in relation algebra, an algorithm was found to derive the subtyping relation from the program to be checked. By using domain analysis rather than type inference, this algorithm offers an attractive visualization of the type derivation process. This

  2. Inkjet 3D printed check microvalve

    International Nuclear Information System (INIS)

    Walczak, Rafał; Adamski, Krzysztof; Lizanets, Danylo

    2017-01-01

    3D printing enables fast and relatively easy fabrication of various microfluidic structures including microvalves. A check microvalve is the simplest valve enabling control of the fluid flow in microchannels. Proper operation of the check valve is ensured by a movable element that tightens the valve seat during backward flow and enables free flow for forward pressure. Thus, knowledge of the mechanical properties of the movable element is crucial for optimal design and operation of the valve. In this paper, we present for the first time the results of investigations on basic mechanical properties of the building material used in multijet 3D printing. Specified mechanical properties were used in the design and fabrication of two types of check microvalve—with deflecting or hinge-fixed microflap—with 200 µ m and 300 µ m thickness. Results of numerical simulation and experimental data of the microflap deflection were obtained and compared. The valves were successfully 3D printed and characterised. Opening/closing characteristics of the microvalve for forward and backward pressures were determined. Thus, proper operation of the check microvalve so developed was confirmed. (technical note)

  3. Statistical Model Checking for Biological Systems

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel

    2014-01-01

    Statistical Model Checking (SMC) is a highly scalable simulation-based verification approach for testing and estimating the probability that a stochastic system satisfies a given linear temporal property. The technique has been applied to (discrete and continuous time) Markov chains, stochastic...

  4. Separation of Powers: Checks and Balances.

    Science.gov (United States)

    Taylor, Bonnie

    1988-01-01

    This article offers a class activity on separation of powers and checks and balances within the U.S. government. Based on Franklin Delano Roosevelt's attempt to push through legislation for the New Deal of the 1930s by "packing" the U.S. Supreme Court, the activity includes worksheets and teaching suggestions. (JDH)

  5. Political and judicial checks on corruption

    DEFF Research Database (Denmark)

    Alt, James E.; Lassen, David Dreyer

    2008-01-01

    This paper investigates the effects of checks and balances on corruption. Within a presidential system, effective separation of powers is achieved under a divided government, with the executive and legislative branches being controlled by different political parties. When government is unified...

  6. Functional check of telescoping transfer pumps

    International Nuclear Information System (INIS)

    Sharpe, C.L.

    1994-01-01

    Activities are defined which constitute a functional check of a telescoping transfer pump (TTP). This report is written to the Procedures group of HLW and particularly applies to those TTP's which are the sole means of emergency transfer from a HLW waste tank

  7. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  8. Model Checking - Automated Verification of Computational Systems

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 14; Issue 7. Model Checking - Automated Verification of Computational Systems. Madhavan Mukund. General Article Volume 14 Issue 7 July 2009 pp 667-681. Fulltext. Click here to view fulltext PDF. Permanent link:

  9. checkCIF/PLATON report Datablock: Sm

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  10. checkCIF/PLATON report Datablock: neu

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  11. checkCIF/PLATON report Datablock: shelxl

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  12. checkCIF/PLATON report Datablock: 6

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  13. checkCIF/PLATON report Datablock: 1

    Indian Academy of Sciences (India)

    (Positive) Residual Density 13.61 eA-3. PLAT201_ALERT_2_B Isotropic non-H Atoms in Main Residue(s) . ... Weight Differ by .. 4.99 Check. PLAT094_ALERT_2_C Ratio of Maximum / Minimum Residual Density . ... 9 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 20 ALERT type 2 Indicator that ...

  14. Type checking with open type functions

    DEFF Research Database (Denmark)

    Schrijvers, Tom; Jones, Simon Peyton; Chakravarty, Manual

    2008-01-01

    We report on an extension of Haskell with open type-level functions and equality constraints that unifies earlier work on GADTs, functional dependencies, and associated types. The contribution of the paper is that we identify and characterise the key technical challenge of entailment checking; an...

  15. Discrete-time rewards model-checked

    NARCIS (Netherlands)

    Larsen, K.G.; Andova, S.; Niebert, Peter; Hermanns, H.; Katoen, Joost P.

    2003-01-01

    This paper presents a model-checking approach for analyzing discrete-time Markov reward models. For this purpose, the temporal logic probabilistic CTL is extended with reward constraints. This allows to formulate complex measures – involving expected as well as accumulated rewards – in a precise and

  16. Regular Check-Ups Are Important

    Science.gov (United States)

    ... Attack Wear Red for Heart Health Tools for Pregnant Women, New Moms, Women Considering Pregnancy Be a Healthy ... your community (i.e. a faith-based setting, workplace, school, or civic group) ... screening on National Women’s Check-Up Day (the day after Mother’s Day ...

  17. checkCIF/PLATON report Datablock: 2

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  18. checkCIF/PLATON report Datablock: sm

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  19. Type Checking with XML Schema in XACT

    DEFF Research Database (Denmark)

    Kirkegaard, Christian; Møller, Anders

    to support XML Schema as type formalism. The technique is able to model advanced features, such as type derivations and overloaded local element declarations, and also datatypes of attribute values and character data. Moreover, we introduce optional type annotations to improve modularity of the type checking...

  20. checkCIF/PLATON report Datablock: I

    Indian Academy of Sciences (India)

    The relevant atom site should be identified. STRVA01_ALERT_4_C. Flack test results are ambiguous. ... 7 ALERT type 3 Indicator that the structure quality may be low. 5 ALERT type 4 Improvement, methodology, query or ... paper, to upload your CIF via our web site. PLATON version of 20/08/2014; check.def file version of ...

  1. checkCIF/PLATON report Datablock: shelxl

    Indian Academy of Sciences (India)

    6 ALERT level G = General information/check it is not something unexpected. 1 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 15 ALERT type 2 Indicator that the structure model may be wrong or deficient. 9 ALERT type 3 Indicator that the structure quality may be low. 1 ALERT type 4 Improvement, ...

  2. checkCIF/PLATON report Datablock: shelx

    Indian Academy of Sciences (India)

    7 ALERT level G = General information/check it is not something unexpected. 0 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 3 ALERT type 2 Indicator that the structure ... However, the purpose of your study may justify the reported deviations and the more serious of these should normally be ...

  3. checkCIF/PLATON report Datablock: 1

    Indian Academy of Sciences (India)

    6 ALERT level G = General information/check it is not something unexpected. 2 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 8 ALERT type 2 Indicator that the structure ... However, the purpose of your study may justify the reported deviations and the more serious of these should normally be ...

  4. checkCIF/PLATON report Datablock: 3

    Indian Academy of Sciences (India)

    5 ALERT level G = General information/check it is not something unexpected. 5 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 15 ALERT type 2 Indicator that the structure ... However, the purpose of your study may justify the reported deviations and the more serious of these should normally be ...

  5. checkCIF/PLATON report Datablock: 3

    Indian Academy of Sciences (India)

    5 ALERT level G = General information/check it is not something unexpected. 0 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 3 ALERT type 2 Indicator that the structure ... However, the purpose of your study may justify the reported deviations and the more serious of these should normally be ...

  6. checkCIF/PLATON report Datablock: shelxl

    Indian Academy of Sciences (India)

    6 ALERT level G = General information/check it is not something unexpected. 0 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 4 ALERT type 2 Indicator that the structure ... However, the purpose of your study may justify the reported deviations and the more serious of these should normally be ...

  7. Slicing AADL specifications for model checking

    NARCIS (Netherlands)

    Odenbrett, M.R.; Nguyen, V.Y.; Noll, T.

    2010-01-01

    To combat the state-space explosion problem in model checking larger systems, abstraction techniques can be employed. Here, methods that operate on the system specification before constructing its state space are preferable to those that try to minimize the resulting transition system as they

  8. Blood Pressure Matters: Keep Hypertension in Check

    Science.gov (United States)

    ... 2016 Print this issue Blood Pressure Matters Keep Hypertension in Check En español Send us your comments ... 1 in 3 adults in the U.S. has high blood pressure, but many don’t realize it. High blood ...

  9. 31 CFR 248.6 - Recovery of original check.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Recovery of original check. 248.6... § 248.6 Recovery of original check. (a) If the claimant recovers an original check after he has... or agency concerned regarding the negotiability of such original check. (b) In the event the...

  10. ENDF-UTILITY-CODES, codes to check and standardize data in the Evaluated Nuclear Data File (ENDF)

    International Nuclear Information System (INIS)

    Dunford, Charles L.

    2007-01-01

    1 - Description of program or function: The ENDF Utility Codes include 9 codes to check and standardize data in the Evaluated Nuclear Data File (ENDF). Four programs of this release, GETMAT, LISTEF, PLOTEF and SETMDC are no more maintained since release 6.13. The suite of ENDF utility codes includes: - CHECKR (version 7.01) is a program for checking that an evaluated data file conforms to the ENDF format. - FIZCON (version 7.02) is a program for checking that an evaluated data file has valid data and conforms to recommended procedures. - GETMAT (version 6.13) is designed to retrieve one or more materials from an ENDF formatted data file. The output will contain only the selected materials. - INTER (version 7.01) calculates thermal cross sections, g-factors, resonance integrals, fission spectrum averaged cross sections and 14.0 MeV (or other energy) cross sections for major reactions in an ENDF-6 or ENDF-5 format data file. - LISTEF (version 6.13) is designed to produce summary and annotated listings of a data file in either ENDF-6 or ENDF-5 format. - PLOTEF (version 6.13) is designed to produce graphical displays of a data file in either ENDF-5 or ENDF-6 format. The form of graphical output depends on the graphical devices available at the installation where this code will be used. - PSYCHE (version 7.02) is a program for checking the physics content of an evaluated data file. It can recognise the difference between ENDF-5 or ENDF-6 formats and performs its tests accordingly. - SETMDC (version 6.13) is a utility program that converts the source decks of programs to different computers (DOS, UNIX, LINUX, VMS, Windows). - STANEF (version 7.01) performs bookkeeping operations on a data file containing one or more material evaluations in ENDF format. The version 7.02 of the ENDF Utility Codes corrects all bugs reported to NNDC as of April 1, 2005 and supersedes all previous releases. Three codes CHECKR, STANEF, and INTER were actually ported from the 7.01 release

  11. Study of check image using computed radiography

    International Nuclear Information System (INIS)

    Sato, Hiroshi

    2002-01-01

    There are two image forming methods both a check image and a portal image in the linacogram. It has been established the image forming method in the check image using computed radiography (CR). On the other hand, it is not established the image forming method in the portal image using CR yet. Usually, in the electric portal imaging device (EPID) is mainly used just before radiotherapy start. The usefulness of the portal image forming method by CR using in place of EPID is possible to confirm the precision for determining to specific position at the irradiate part and to the irradiate method for the human organs. There are some technical problems that, since in the early time, the linac graphy (LG) image have low resolution power. In order to improve to the resolution power in LG image, CR image technologies have been introduced to the check image forming method. Heavy metallic sheet (HMS) is used to the front side of CR-IP cassette, and high contactness sponge is used to the back side of the cassette. Improved contactness between HMS and imaging plate (IP) by means of the high contactness sponge contributed to improve the resolution power in the check images. A lot of paper which is connected with these information have been reported. Imaging plate ST-III should be used to maintain high sensitivity in the check film image forming method. The same image forming method in the check image established by CR has been introduced into the portal image forming method in order to improve the resolution power. However, as a result, it couldn't acquired high resolution image forming in the portal images because of the combination of ST-III and radiotherapy dose. After several trials, it has been recognized that HR-V imaging plate for mammography is the most useful application to maintain high resolution power in the portal images. Also, it is possible to modify the image quality by changing GS parameter which is one of image processing parameters in CR. Furthermore, in case

  12. Rigid supersymmetry with boundaries

    Energy Technology Data Exchange (ETDEWEB)

    Belyaev, D.V. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Van Nieuwenhuizen, P. [State Univ. of New York, Stony Brook, NY (United States). C.N. Yang Inst. for Theoretical Physics

    2008-01-15

    We construct rigidly supersymmetric bulk-plus-boundary actions, both in x-space and in superspace. For each standard supersymmetric bulk action a minimal supersymmetric bulk-plus-boundary action follows from an extended F- or D-term formula. Additional separately supersymmetric boundary actions can be systematically constructed using co-dimension one multiplets (boundary superfields). We also discuss the orbit of boundary conditions which follow from the Euler-Lagrange variational principle. (orig.)

  13. Model Checking the Remote Agent Planner

    Science.gov (United States)

    Khatib, Lina; Muscettola, Nicola; Havelund, Klaus; Norvig, Peter (Technical Monitor)

    2001-01-01

    This work tackles the problem of using Model Checking for the purpose of verifying the HSTS (Scheduling Testbed System) planning system. HSTS is the planner and scheduler of the remote agent autonomous control system deployed in Deep Space One (DS1). Model Checking allows for the verification of domain models as well as planning entries. We have chosen the real-time model checker UPPAAL for this work. We start by motivating our work in the introduction. Then we give a brief description of HSTS and UPPAAL. After that, we give a sketch for the mapping of HSTS models into UPPAAL and we present samples of plan model properties one may want to verify.

  14. Perencanaan Check Damsungai Lebugini Kabupatenkudus, Jawa Tengah

    OpenAIRE

    Amirullah, Fikri; Nalendro, Raditya; Wahyuni, Sri Eko; Salamun, Salamun

    2014-01-01

    Lebugini River is the branch of Juanariverswhich is under the authority of the Central River Region Pemali - Juana, precisely located in the administrative area of the Kudus District. The location, which is on the upstream,causes degradation of the river channel, thus, to stabilize the river channel, the local Goverment should have a plan to build the conservation building. The dataused for the planning of check dam areprimary data (geotechnical data, the geometry of Lebugini river, and also ...

  15. Perencanaan Check Dam Sungai Dawe Kudus

    OpenAIRE

    Mustaanah, Adibatul; Pinandoyo, Nur; Sugiyanto, Sugiyanto; Wahyuni, Sri Eko

    2013-01-01

    Juana river's located in two administrative regions Kudus and Pati had superficial. This is because the slope of the river is quite gentle and the level of environmental degradation in the watershed (DAS) Juana river's have increased. Based on these conditions, it is necessary to plan the construction of sediment control (check dams) to reduce sedimentation along the river and optimize the function of the Juana river's. Planning is performed on Dawe river's ,the branch of Juana river's. From ...

  16. Implementing a Self- Checking PROFIBUS Slave

    OpenAIRE

    Krug, Margrit R.; Lubaszewski, Marcelo S.; Ferreira, Jose M.; Alves, Gustavo R.

    2000-01-01

    This work presents the study and preliminary results of the high level implementation of a self-checking Profibus slave. From an existing VHDL description of the device, a test strategy was studied and implemented, so that the whole circuit has embedded test structures capable to perform at-speed test of the slave. In this paper, we show the used test strategies and implementation results achieved from a synthesis process in a FPGA environment. info:eu-repo/semantics/publishedVersion

  17. checkCIF/PLATON report Datablock: platon

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. Structure factors have been supplied for datablock(s) platon. No syntax errors found. CIF dictionary Interpreting this report. Datablock: platon. Bond precision: C-C = 0.0033 A. Wavelength=0.71073. Cell: a=16.345(7) b=6.288(3) c=19.938(8) alpha=90 beta=96.169(7) gamma=90. Temperature:.

  18. Photogrammetric approach to automated checking of DTMs

    DEFF Research Database (Denmark)

    Potucková, Marketa

    2005-01-01

    Geometrically accurate digital terrain models (DTMs) are essential for orthoimage production and many other applications. Collecting reference data or visual inspection are reliable but time consuming and therefore expensive methods for finding errors in DTMs. In this paper, a photogrammetric...... approach to automated checking and improving of DTMs is evaluated. Corresponding points in two overlapping orthoimages are found by means of area based matching. Provided the image orientation is correct, discovered displacements correspond to DTM errors. Improvements of the method regarding its...

  19. Speed checks on the CERN site

    CERN Multimedia

    2007-01-01

    In view of the significant number of speeding incidents that have been reported, CERN will shortly start to carry out speed checks on the site. The radar used for this purpose will show drivers the speed measured. The disciplinary measures taken against those exceeding the authorised limit (generally 50 k.p.h.) will include a ban from driving on the site for a minimum of one month. Maximilian Metzger
Secretary-General

  20. Application of 125I in micropipettor check

    International Nuclear Information System (INIS)

    Qian Xiaoyu; Gao Yunchao; Yang Yadong; Lu Hankui

    2006-01-01

    Gravimetric test is one of authoritative methods for the measurement and validation of the accuracy and precision of micropipettors. The feasibility of radioactive measurement in the check of micropipettors is studied. There are no significant difference in radioactive count rates of 125 I aspirated between 2 qualified micropipettors, but significant difference are recorded between qualified and unqualified micropipettors. So 125 I radiometry agrees with gravimetric tests, and can be used as a laboratory constant test of micropipettors. (authors)

  1. Delivery quality assurance with ArcCHECK

    International Nuclear Information System (INIS)

    Neilson, Christopher; Klein, Michael; Barnett, Rob; Yartsev, Slav

    2013-01-01

    Radiation therapy requires delivery quality assurance (DQA) to ensure that treatment is accurate and closely follows the plan. We report our experience with the ArcCHECK phantom and investigate its potential optimization for the DQA process. One-hundred seventy DQA plans from 84 patients were studied. Plans were classified into 2 groups: those with the target situated on the diodes of the ArcCHECK (D plans) and those with the target situated at the center (C plans). Gamma pass rates for 8 target sites were examined. The parameters used to analyze the data included 3%/3 mm with the Van Dyk percent difference criteria (VD) on, 3%/3 mm with the VD off, 2%/2 mm with the VD on, and x/3 mm with the VD on and the percentage dosimetric agreement “x” for diode plans adjusted. D plans typically displayed maximum planned dose (MPD) on the cylindrical surface containing ArcCHECK diodes than center plans, resulting in inflated gamma pass rates. When this was taken into account by adjusting the percentage dosimetric agreement, C plans outperformed D plans by an average of 3.5%. ArcCHECK can streamline the DQA process, consuming less time and resources than radiographic films. It is unnecessary to generate 2 DQA plans for each patient; a single center plan will suffice. Six of 8 target sites consistently displayed pass rates well within our acceptance criteria; the lesser performance of head and neck and spinal sites can be attributed to marginally lower doses and increased high gradient of plans

  2. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  3. [Pre-verbality in focusing and the need for self check. An attempt at "focusing check"].

    Science.gov (United States)

    Masui, T; Ikemi, A; Murayama, S

    1983-06-01

    Though the Focusing process is not entirely non-verbal, in Focusing, careful attention is paid by the Focuser and the Listener to the pre-verbal experiential process. In other words, Focusing involves attending to the felt sense that is not easily expressed in words immediately. Hence, during the process of learning to Focus, the Focusing teacher attempts to communicate the experiences of Focusing to the student which are not easily done by words. Due to such difficulties, the Focusing student may (and quite frequently does) mistake the experiential process in Focusing with other processes. Often, the felt sense can be confused with other phenomena such as "autogenic discharge". Also the Focuser may not stay with the felt sense and drift into "free association" or frequently, certain processes in "meditation" can be confused with Focusing. Therefore, there is a need for a "check" by which the Focusing student can confirm the Focusing experience for himself. For the Focusing student, such a "check" serves not only to confirm the Focusing process, but also an aid to learning Focusing. We will report here a "Focusing Check" which we developed by translating Eugene Gendlin's "Focusing Check" and making several modifications in it so that it will be more understandable to the Japanese. Along with the "Focusing Check" we developed, the authors discuss the need for such a check.

  4. Boundary Correct Real-Time Soft Shadows

    DEFF Research Database (Denmark)

    Jacobsen, Bjarke; Christensen, Niels Jørgen; Larsen, Bent Dalgaard

    2004-01-01

    This paper describes a method to determine correct shadow boundaries from an area light source using umbra and penumbra volumes. The light source is approximated by a circular disk as this gives a fast way to extrude the volumes. The method also gives a crude estimate of the visibility of the are...... for implementation on most programmable hardware. Though some crude approximations are used in the visibility function, the method can be used to produce soft shadows with correct boundaries in real time....

  5. Boundary layers of the earth's outer magnetosphere

    Science.gov (United States)

    Eastman, T. E.; Frank, L. A.

    1984-01-01

    The magnetospheric boundary layer and the plasma-sheet boundary layer are the primary boundary layers of the earth's outer magnetosphere. Recent satellite observations indicate that they provide for more than 50 percent of the plasma and energy transport in the outer magnetosphere although they constitute less than 5 percent by volume. Relative to the energy density in the source regions, plasma in the magnetospheric boundary layer is predominantly deenergized whereas plasma in the plasma-sheet boundary layer has been accelerated. The reconnection hypothesis continues to provide a useful framework for comparing data sampled in the highly dynamic magnetospheric environment. Observations of 'flux transfer events' and other detailed features near the boundaries have been recently interpreted in terms of nonsteady-state reconnection. Alternative hypotheses are also being investigated. More work needs to be done, both in theory and observation, to determine whether reconnection actually occurs in the magnetosphere and, if so, whether it is important for overall magnetospheric dynamics.

  6. Boundary layers of the earth's outer magnetosphere

    International Nuclear Information System (INIS)

    Eastman, T.E.; Frank, L.A.

    1984-01-01

    The magnetospheric boundary layer and the plasma-sheet boundary layer are the primary boundary layers of the earth's outer magnetosphere. Recent satellite observations indicate that they provide for more than 50 percent of the plasma and energy transport in the outer magnetosphere although they constitute less than 5 percent by volume. Relative to the energy density in the source regions, plasma in the magnetospheric boundary layer is predominantly deenergized whereas plasma in the plasma-sheet boundary layer has been accelerated. The reconnection hypothesis continues to provide a useful framework for comparing data sampled in the highly dynamic magnetospheric environment. Observations of flux transfer events and other detailed features near the boundaries have been recently interpreted in terms of nonsteady-state reconnection. Alternative hypotheses are also being investigated. More work needs to be done, both in theory and observation, to determine whether reconnection actually occurs in the magnetosphere and, if so, whether it is important for overall magnetospheric dynamics. 30 references

  7. Automata-Based CSL Model Checking

    DEFF Research Database (Denmark)

    Zhang, Lijun; Jansen, David N.; Nielson, Flemming

    2011-01-01

    For continuous-time Markov chains, the model-checking problem with respect to continuous-time stochastic logic (CSL) has been introduced and shown to be decidable by Aziz, Sanwal, Singhal and Brayton in 1996. The presented decision procedure, however, has exponential complexity. In this paper, we...... probability can then be approximated in polynomial time (using uniformization). This makes the present work the centerpiece of a broadly applicable full CSL model checker. Recently, the decision algorithm by Aziz et al. was shown to be incorrect in general. In fact, it works only for stratified CTMCs...

  8. Quantum anonymous voting with anonymity check

    International Nuclear Information System (INIS)

    Horoshko, Dmitri; Kilin, Sergei

    2011-01-01

    We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.

  9. Advanced techniques for efficient data integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide

    Integrity constraint checking, understood as the verification of data correctness and well-formedness conditions that must be satisfied in any state of a database, is not fully supported by current database technology. In a typical scenario, a database is required to comply with given semantic...... criteria (the integrity constraints) and to maintain the compliance each time data are updated. Since the introduction of the SQL2 standard, the SQL language started supporting assertions, which allow one to define general data consistency requirements expressing arbitrarily complex “business rules...

  10. A Framework for Online Conformance Checking

    DEFF Research Database (Denmark)

    Burattin, Andrea; Carmona, Josep

    2017-01-01

    is quantified after the completion of the process instance. In this paper we propose a framework for online conformance checking: not only do we quantify (non-)conformant behavior as the execution is running, we also restrict the computation to constant time complexity per event analyzed, thus enabling...... the online analysis of a stream of events. The framework is instantiated with ideas coming from the theory of regions, and state similarity. An implementation is available in ProM and promising results have been obtained....

  11. Optimal database locks for efficient integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide

    2004-01-01

    In concurrent database systems, correctness of update transactions refers to the equivalent effects of the execution schedule and some serial schedule over the same set of transactions. Integrity constraints add further semantic requirements to the correctness of the database states reached upon...... the execution of update transactions. Several methods for efficient integrity checking and enforcing exist. We show in this paper how to apply one such method to automatically extend update transactions with locks and simplified consistency tests on the locked entities. All schedules produced in this way...

  12. Political State Boundary (National)

    Data.gov (United States)

    Department of Transportation — State boundaries with political limit - boundaries extending into the ocean (NTAD). The TIGER/Line Files are shapefiles and related database files (.dbf) that are an...

  13. Allegheny County Municipal Boundaries

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset demarcates the municipal boundaries in Allegheny County. Data was created to portray the boundaries of the 130 Municipalities in Allegheny County the...

  14. HUD GIS Boundary Files

    Data.gov (United States)

    Department of Housing and Urban Development — The HUD GIS Boundary Files are intended to supplement boundary files available from the U.S. Census Bureau. The files are for community planners interested in...

  15. State Agency Administrative Boundaries

    Data.gov (United States)

    Kansas Data Access and Support Center — This database comprises 28 State agency boundaries and point of contact. The Kansas Geological Survey collected legal descriptions of the boundaries for various...

  16. On boundary superalgebras

    International Nuclear Information System (INIS)

    Doikou, Anastasia

    2010-01-01

    We examine the symmetry breaking of superalgebras due to the presence of appropriate integrable boundary conditions. We investigate the boundary breaking symmetry associated with both reflection algebras and twisted super-Yangians. We extract the generators of the resulting boundary symmetry as well as we provide explicit expressions of the associated Casimir operators.

  17. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  18. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  19. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  20. Space shuttle prototype check valve development

    Science.gov (United States)

    Tellier, G. F.

    1976-01-01

    Contaminant-resistant seal designs and a dynamically stable prototype check valve for the orbital maneuvering and reaction control helium pressurization systems of the space shuttle were developed. Polymer and carbide seal models were designed and tested. Perfluoroelastomers compatible with N2O4 and N2H4 types were evaluated and compared with Teflon in flat and captive seal models. Low load sealing and contamination resistance tests demonstrated cutter seal superiority over polymer seals. Ceramic and carbide materials were evaluated for N2O4 service using exposure to RFNA as a worst case screen; chemically vapor deposited tungsten carbide was shown to be impervious to the acid after 6 months immersion. A unique carbide shell poppet/cutter seat check valve was designed and tested to demonstrate low cracking pressure ( 2.0 psid), dynamic stability under all test bench flow conditions, contamination resistance (0.001 inch CRES wires cut with 1.5 pound seat load) and long life of 100,000 cycles (leakage 1.0 scc/hr helium from 0.1 to 400 psig).

  1. Polarity Checks in Sectors 23 & 78

    CERN Document Server

    Calaga, R; Lamont, M; Ponce, L; Sun, Y; Tomás, R; Venturini-Delsolaro, W; Zimmermann, F

    2009-01-01

    During the first three LHC synchronization tests on August 10, August 24, and September 7, 2008, linear and higher-order polarity checks were performed with beam 1 in Sector 23 and beam 2 in Sector 78. The main principle of these checks was to launch free betatron oscillations and use the difference trajectory measurements with respect to inverted polarities of circuits under investigation. In the case of zero nominal strength for a circuit, a finite value was introduced. The magnet circuits subjected to these tests were the QT and QTL trim quadrupoles, the MQS skew quadrupoles, the SF and SD arc sextupole circuits, the MCS b3 spool pieces, the OD and OF Landau octupoles, and the MSS skew sextupoles. For some of these circuits sensitivity was enhanced by introducing large momentum offsets. To detect and remove improve spurious contributions from initially off-center orbits, four sets of trajectories were recorded, namely with and without oscillation, and with two magnet strength settings, respectively. We rep...

  2. Influence of check dams on debris-flow run-out intensity

    Directory of Open Access Journals (Sweden)

    A. Remaître

    2008-12-01

    Full Text Available Debris flows are very dangerous phenomena claiming thousands of lives and millions of Euros each year over the world. Disaster mitigation includes non-structural (hazard mapping, insurance policies, active structural (drainage systems and passive structural (check dams, stilling basins countermeasures. Since over twenty years, many efforts are devoted by the scientific and engineering communities to the design of proper devices able to capture the debris-flow volume and/or break down the energy. If considerable theoretical and numerical work has been performed on the size, the shape and structure of check dams, allowing the definition of general design criteria, it is worth noting that less research has focused on the optimal location of these dams along the debris-flow pathway.

    In this paper, a methodological framework is proposed to evaluate the influence of the number and the location of the check dams on the reduction of the debris-flow intensity (in term of flow thickness, flow velocity and volume. A debris-flow model is used to simulate the run-out of the debris flow. The model uses the Janbu force diagram to resolve the force equilibrium equations; a bingham fluid rheology is introduced and represents the resistance term. The model has been calibrated on two muddy debris-flow events that occurred in 1996 and 2003 at the Faucon watershed (South French Alps.

    Influence of the check dams on the debris-flow intensity is quantified taking into account several check dams configurations (number and location as input geometrical parameters. Results indicate that debris-flow intensity is decreasing with the distance between the source area and the first check dams. The study demonstrates that a small number of check dams located near the source area may decrease substantially the debris-flow intensity on the alluvial fans.

  3. LHCb: Analysing DIRAC's Behavior using Model Checking with Process Algebra

    CERN Multimedia

    Remenska, Daniela

    2012-01-01

    DIRAC is the Grid solution designed to support LHCb production activities as well as user data analysis. Based on a service-oriented architecture, DIRAC consists of many cooperating distributed services and agents delivering the workload to the Grid resources. Services accept requests from agents and running jobs, while agents run as light-weight components, fulfilling specific goals. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check for changes in the service states, and react to these accordingly. A characteristic of DIRAC's architecture is the relatively low complexity in the logic of each agent; the main source of complexity lies in their cooperation. These agents run concurrently, and communicate using the services' databases as a shared memory for synchronizing the state transitions. Although much effort is invested in making DIRAC reliable, entities occasionally get into inconsistent states, leadi...

  4. The Plasmasphere Boundary Layer

    Directory of Open Access Journals (Sweden)

    D. L. Carpenter

    2004-12-01

    Full Text Available As an inner magnetospheric phenomenon the plasmapause region is of interest for a number of reasons, one being the occurrence there of geophysically important interactions between the plasmas of the hot plasma sheet and of the cool plasmasphere. There is a need for a conceptual framework within which to examine and discuss these interactions and their consequences, and we therefore suggest that the plasmapause region be called the Plasmasphere Boundary Layer, or PBL. Such a term has been slow to emerge because of the complexity and variability of the plasma populations that can exist near the plasmapause and because of the variety of criteria used to identify the plasmapause in experimental data. Furthermore, and quite importantly in our view, a substantial obstacle to the consideration of the plasmapause region as a boundary layer has been the longstanding tendency of textbooks on space physics to limit introductory material on the plasmapause phenomenon to zeroth order descriptions in terms of ideal MHD theory, thus implying that the plasmasphere is relatively well understood. A textbook may introduce the concept of shielding of the inner magnetosphere from perturbing convection electric fields, but attention is not usually paid to the variety of physical processes reported to occur in the PBL, such as heating, instabilities, and fast longitudinal flows, processes which must play roles in plasmasphere dynamics in concert with the flow regimes associated with the major dynamo sources of electric fields. We believe that through the use of the PBL concept in future textbook discussions of the plasmasphere and in scientific communications, much progress can be made on longstanding questions about the physics involved in the formation of the plasmapause and in the cycles of erosion and recovery of the plasmasphere.

    Key words. Magnetospheric physics (plasmasphere; plasma convection; MHD waves and instabilities

  5. The Plasmasphere Boundary Layer

    Directory of Open Access Journals (Sweden)

    D. L. Carpenter

    2004-12-01

    Full Text Available As an inner magnetospheric phenomenon the plasmapause region is of interest for a number of reasons, one being the occurrence there of geophysically important interactions between the plasmas of the hot plasma sheet and of the cool plasmasphere. There is a need for a conceptual framework within which to examine and discuss these interactions and their consequences, and we therefore suggest that the plasmapause region be called the Plasmasphere Boundary Layer, or PBL. Such a term has been slow to emerge because of the complexity and variability of the plasma populations that can exist near the plasmapause and because of the variety of criteria used to identify the plasmapause in experimental data. Furthermore, and quite importantly in our view, a substantial obstacle to the consideration of the plasmapause region as a boundary layer has been the longstanding tendency of textbooks on space physics to limit introductory material on the plasmapause phenomenon to zeroth order descriptions in terms of ideal MHD theory, thus implying that the plasmasphere is relatively well understood. A textbook may introduce the concept of shielding of the inner magnetosphere from perturbing convection electric fields, but attention is not usually paid to the variety of physical processes reported to occur in the PBL, such as heating, instabilities, and fast longitudinal flows, processes which must play roles in plasmasphere dynamics in concert with the flow regimes associated with the major dynamo sources of electric fields. We believe that through the use of the PBL concept in future textbook discussions of the plasmasphere and in scientific communications, much progress can be made on longstanding questions about the physics involved in the formation of the plasmapause and in the cycles of erosion and recovery of the plasmasphere. Key words. Magnetospheric physics (plasmasphere; plasma convection; MHD waves and instabilities

  6. 45 CFR 201.70 - Treatment of replacement checks.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Treatment of replacement checks. 201.70 Section... STATES FOR PUBLIC ASSISTANCE PROGRAMS Review and Audits § 201.70 Treatment of replacement checks. (a... (FFP) for replacement checks under titles I, VI-A, X, XIV, XVI (AABD) except under the circumstances...

  7. 40 CFR 86.327-79 - Quench checks; NOX analyzer.

    Science.gov (United States)

    2010-07-01

    ... any flow rate into the reaction chamber. This includes, but is not limited to, sample capillary, ozone... Quench checks; NOX analyzer. (a) Perform the reaction chamber quench check for each model of high vacuum reaction chamber analyzer prior to initial use. (b) Perform the reaction chamber quench check for each new...

  8. 7 CFR 1944.540 - Requesting TSA checks.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 13 2010-01-01 2009-01-01 true Requesting TSA checks. 1944.540 Section 1944.540... TSA checks. (a) The initial TSA check may cover the applicant's needs for the first calendar month. If... the next whole month. (b) The initial advance of TSA grant funds may not be requested simultaneously...

  9. 40 CFR 86.328-79 - Leak checks.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Leak checks. 86.328-79 Section 86.328... Gasoline-Fueled and Diesel-Fueled Heavy-Duty Engines; Gaseous Exhaust Test Procedures § 86.328-79 Leak checks. (a) Vacuum side leak check. (1) Any location within the analysis system where a vacuum leak could...

  10. 12 CFR 229.36 - Presentment and issuance of checks.

    Science.gov (United States)

    2010-01-01

    ... Section 229.36 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM AVAILABILITY OF FUNDS AND COLLECTION OF CHECKS (REGULATION CC) Collection of Checks § 229... on the check, whether in magnetic ink or in fractional form; (3) At any branch or head office, if the...

  11. Progress Check Module; Basic Electricity and Electronics Individualized Learning System. Progress Check Booklet.

    Science.gov (United States)

    Bureau of Naval Personnel, Washington, DC.

    The Progress Check Booklet is designed to be used by the student working in the programed course to determine if he has mastered the concepts in the course booklets on: electrical current; voltage; resistance; measuring current and voltage in series circuits; relationships of current, voltage, and resistance; parellel circuits; combination…

  12. Checking in: An Analysis of the (Lack of) Body Checking in Women's Ice Hockey

    Science.gov (United States)

    Weaving, Charlene; Roberts, Samuel

    2012-01-01

    Despite the growing popularity of women's ice hockey in North America, players continue to face limitations because of the prohibition of body checking. In this paper, we argue from a liberal feminist philosophical perspective that this prohibition reinforces existing traditional stereotypes of female athletes. Because the women's game does not…

  13. 12 CFR Appendix A to Part 229 - Routing Number Guide to Next-Day Availability Checks and Local Checks

    Science.gov (United States)

    2010-01-01

    ... Checks and Local Checks A Appendix A to Part 229 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM AVAILABILITY OF FUNDS AND COLLECTION OF CHECKS... Association. The routing number takes two forms: a fractional form and a nine-digit form. A paying bank...

  14. The Mars Science Laboratory Organic Check Material

    Science.gov (United States)

    Conrad, Pamela G.; Eigenbrode, J. E.; Mogensen, C. T.; VonderHeydt, M. O.; Glavin, D. P.; Mahaffy, P. M.; Johnson, J. A.

    2011-01-01

    The Organic Check Material (OCM) has been developed for use on the Mars Science Laboratory mission to serve as a sample standard for verification of organic cleanliness and characterization of potential sample alteration as a function of the sample acquisition and portioning process on the Curiosity rover. OCM samples will be acquired using the same procedures for drilling, portioning and delivery as are used to study martian samples with The Sample Analysis at Mars (SAM) instrument suite during MSL surface operations. Because the SAM suite is highly sensitive to organic molecules, the mission can better verify the cleanliness of Curiosity's sample acquisition hardware if a known material can be processed through SAM and compared with the results obtained from martian samples.

  15. The Mars Science Laboratory Organic Check Material

    Science.gov (United States)

    Conrad, Pamela G.; Eigenbrode, Jennifer L.; Von der Heydt, Max O.; Mogensen, Claus T.; Canham, John; Harpold, Dan N.; Johnson, Joel; Errigo, Therese; Glavin, Daniel P.; Mahaffy, Paul R.

    2012-09-01

    Mars Science Laboratory's Curiosity rover carries a set of five external verification standards in hermetically sealed containers that can be sampled as would be a Martian rock, by drilling and then portioning into the solid sample inlet of the Sample Analysis at Mars (SAM) suite. Each organic check material (OCM) canister contains a porous ceramic solid, which has been doped with a fluorinated hydrocarbon marker that can be detected by SAM. The purpose of the OCM is to serve as a verification tool for the organic cleanliness of those parts of the sample chain that cannot be cleaned other than by dilution, i.e., repeated sampling of Martian rock. SAM possesses internal calibrants for verification of both its performance and its internal cleanliness, and the OCM is not used for that purpose. Each OCM unit is designed for one use only, and the choice to do so will be made by the project science group (PSG).

  16. Model Checking JAVA Programs Using Java Pathfinder

    Science.gov (United States)

    Havelund, Klaus; Pressburger, Thomas

    2000-01-01

    This paper describes a translator called JAVA PATHFINDER from JAVA to PROMELA, the "programming language" of the SPIN model checker. The purpose is to establish a framework for verification and debugging of JAVA programs based on model checking. This work should be seen in a broader attempt to make formal methods applicable "in the loop" of programming within NASA's areas such as space, aviation, and robotics. Our main goal is to create automated formal methods such that programmers themselves can apply these in their daily work (in the loop) without the need for specialists to manually reformulate a program into a different notation in order to analyze the program. This work is a continuation of an effort to formally verify, using SPIN, a multi-threaded operating system programmed in Lisp for the Deep-Space 1 spacecraft, and of previous work in applying existing model checkers and theorem provers to real applications.

  17. The criticality check and its applicability for nuclear material accounting

    International Nuclear Information System (INIS)

    Sanchez Espinoza, V.H.; Adam, E.; Knorr, J.

    1988-01-01

    Different procedures are used by the realization of nuclear material check by the IAEA. The criticality check belongs to these methods and it appropriates especially to verification of the nuclear material inventory of reactors. General aspects of the applicability of this check procedure are formulated and application criteria are deduced. By the example of solid-moderated homogeneous zero-power reactors it is demonstrated the unsecurity which is to be reckoned by applying the criticality check. Finally a possibility for the reduction of errors in core material determination by additional measuring methods without questioning the criticality check method is presented. (author)

  18. Modelling classroom conditions with different boundary conditions

    DEFF Research Database (Denmark)

    Marbjerg, Gerd Høy; Jeong, Cheol-Ho; Brunskog, Jonas

    2014-01-01

    A model that combines image source modelling and acoustical radiosity with complex boundary condition, thus including phase shifts on reflection has been developed. The model is called PARISM (Phased Acoustical Radiosity and Image Source Model). It has been developed in order to be able to model...

  19. [Infection prevention check-in and infection prevention check-out to prevent nosocomial infections].

    Science.gov (United States)

    Kramer, A; Schilling, M; Heidecke, C D

    2010-02-01

    A precondition for the success of the prevention of SSI is the complete realisation of the proven anti-infective measures in form of the multi-barrier strategy or the so-called bundles. In daily practice it is important to follow the fixed instructions, i. e., to ensure a high compliance. In much the same way as an airline pilot or co-pilot must examine whether all instruments are functioning before each take-off, a comparable procedure should be developed as a pre-operative control for the observance of all -defined measures by the responsible surgeon and for the post-operative supervision by the patient. For the control of the observance of the defined pre-operative prevention measures, a check list with 12 items was developed, named the "infection prevention check-in". The check list is authorised by the responsible surgeon be-fore each operation. For the surveillance of the general hygiene in the post-operative period the "infection prevention check-out" with 14 items was developed. Thereby the patient is able to evaluate the staff's compliance with the hygienic measures at the time of dismissal. With the introduction of the check-lists a simple means is given to involve both the team of the surgeons and the ward staff, together with the patient, into the infection prophylaxis even more effectively. In order to assess the success of those measures, the influence on the rate of SSI is to be determined prospectively. Georg Thieme Verlag Stuttgart, New York.

  20. Analysing sensory panel performance in a proficiency test using the PanelCheck software

    DEFF Research Database (Denmark)

    Tomic, O.; Luciano, G.; Nilsen, A.

    2010-01-01

    Check software, a workflow is proposed that guides the user through the data analysis process. This allows practitioners and non-statisticians to get an overview over panel performances in a rapid manner without the need to be familiar with details on the statistical methods. Visualisation of data analysis...... results plays an important role as this provides a time saving and efficient way of screening and investigating sensory panel performances. Most of the statistical methods used in this paper are available in the open source software PanelCheck, which may be downloaded and used for free....

  1. Grain boundary migration

    International Nuclear Information System (INIS)

    Dimitrov, O.

    1975-01-01

    Well-established aspects of grain-boundary migration are first briefly reviewed (influences of driving force, temperature, orientation and foreign atoms). Recent developments of the experimental methods and results are then examined, by considering the various driving of resistive forces acting on grain boundaries. Finally, the evolution in the theoretical models of grain-boundary motion is described, on the one hand for ideally pure metals and, on the other hand, in the presence of solute impurity atoms [fr

  2. Stable Boundary Layer Issues

    OpenAIRE

    Steeneveld, G.J.

    2012-01-01

    Understanding and prediction of the stable atmospheric boundary layer is a challenging task. Many physical processes are relevant in the stable boundary layer, i.e. turbulence, radiation, land surface coupling, orographic turbulent and gravity wave drag, and land surface heterogeneity. The development of robust stable boundary layer parameterizations for use in NWP and climate models is hampered by the multiplicity of processes and their unknown interactions. As a result, these models suffer ...

  3. Cross-check of ex-situ and in-situ metrology of a bendable temperature stabilized KB mirror

    International Nuclear Information System (INIS)

    Yuan Sheng; Goldberg, Kenneth A.; Yashchuk, Valeriy V.; Celestre, Richard; McKinney, Wayne R.; Morrison, Gregory; Macdougall, James; Mochi, Iacopo; Warwick, Tony

    2011-01-01

    At the Advanced Light Source (ALS), we are developing broadly applicable, high-accuracy, in-situ, at-wavelength wavefront slope measurement techniques for Kirkpatrick-Baez (KB) mirror nano-focusing. In this paper, we report an initial cross-check of ex-situ and in-situ metrology of a bendable temperature stabilized KB mirror. This cross-check provides a validation of the in-situ shearing interferometry, currently under development at the ALS.

  4. On the wave equation with semilinear porous acoustic boundary conditions

    KAUST Repository

    Graber, Philip Jameson; Said-Houari, Belkacem

    2012-01-01

    The goal of this work is to study a model of the wave equation with semilinear porous acoustic boundary conditions with nonlinear boundary/interior sources and a nonlinear boundary/interior damping. First, applying the nonlinear semigroup theory, we show the existence and uniqueness of local in time solutions. The main difficulty in proving the local existence result is that the Neumann boundary conditions experience loss of regularity due to boundary sources. Using an approximation method involving truncated sources and adapting the ideas in Lasiecka and Tataru (1993) [28], we show that the existence of solutions can still be obtained. Second, we prove that under some restrictions on the source terms, then the local solution can be extended to be global in time. In addition, it has been shown that the decay rates of the solution are given implicitly as solutions to a first order ODE and depends on the behavior of the damping terms. In several situations, the obtained ODE can be easily solved and the decay rates can be given explicitly. Third, we show that under some restrictions on the initial data and if the interior source dominates the interior damping term and if the boundary source dominates the boundary damping, then the solution ceases to exists and blows up in finite time. Moreover, in either the absence of the interior source or the boundary source, then we prove that the solution is unbounded and grows as an exponential function. © 2012 Elsevier Inc.

  5. On the wave equation with semilinear porous acoustic boundary conditions

    KAUST Repository

    Graber, Philip Jameson

    2012-05-01

    The goal of this work is to study a model of the wave equation with semilinear porous acoustic boundary conditions with nonlinear boundary/interior sources and a nonlinear boundary/interior damping. First, applying the nonlinear semigroup theory, we show the existence and uniqueness of local in time solutions. The main difficulty in proving the local existence result is that the Neumann boundary conditions experience loss of regularity due to boundary sources. Using an approximation method involving truncated sources and adapting the ideas in Lasiecka and Tataru (1993) [28], we show that the existence of solutions can still be obtained. Second, we prove that under some restrictions on the source terms, then the local solution can be extended to be global in time. In addition, it has been shown that the decay rates of the solution are given implicitly as solutions to a first order ODE and depends on the behavior of the damping terms. In several situations, the obtained ODE can be easily solved and the decay rates can be given explicitly. Third, we show that under some restrictions on the initial data and if the interior source dominates the interior damping term and if the boundary source dominates the boundary damping, then the solution ceases to exists and blows up in finite time. Moreover, in either the absence of the interior source or the boundary source, then we prove that the solution is unbounded and grows as an exponential function. © 2012 Elsevier Inc.

  6. Do alcohol compliance checks decrease underage sales at neighboring establishments?

    Science.gov (United States)

    Erickson, Darin J; Smolenski, Derek J; Toomey, Traci L; Carlin, Bradley P; Wagenaar, Alexander C

    2013-11-01

    Underage alcohol compliance checks conducted by law enforcement agencies can reduce the likelihood of illegal alcohol sales at checked alcohol establishments, and theory suggests that an alcohol establishment that is checked may warn nearby establishments that compliance checks are being conducted in the area. In this study, we examined whether the effects of compliance checks diffuse to neighboring establishments. We used data from the Complying with the Minimum Drinking Age trial, which included more than 2,000 compliance checks conducted at more than 900 alcohol establishments. The primary outcome was the sale of alcohol to a pseudo-underage buyer without the need for age identification. A multilevel logistic regression was used to model the effect of a compliance check at each establishment as well as the effect of compliance checks at neighboring establishments within 500 m (stratified into four equal-radius concentric rings), after buyer, license, establishment, and community-level variables were controlled for. We observed a decrease in the likelihood of establishments selling alcohol to underage youth after they had been checked by law enforcement, but these effects quickly decayed over time. Establishments that had a close neighbor (within 125 m) checked in the past 90 days were also less likely to sell alcohol to young-appearing buyers. The spatial effect of compliance checks on other establishments decayed rapidly with increasing distance. Results confirm the hypothesis that the effects of police compliance checks do spill over to neighboring establishments. These findings have implications for the development of an optimal schedule of police compliance checks.

  7. CAPD Software Development for Automatic Piping System Design: Checking Piping Pocket, Checking Valve Level and Flexibility

    International Nuclear Information System (INIS)

    Ari Satmoko; Edi Karyanta; Dedy Haryanto; Abdul Hafid; Sudarno; Kussigit Santosa; Pinitoyo, A.; Demon Handoyo

    2003-01-01

    One of several steps in industrial plant construction is preparing piping layout drawing. In this drawing, pipe and all other pieces such as instrumentation, equipment, structure should be modeled A software called CAPD was developed to replace and to behave as piping drafter or designer. CAPD was successfully developed by adding both subprogram CHKUPIPE and CHKMANV. The first subprogram can check and gives warning if there is piping pocket in the piping system. The second can identify valve position and then check whether valve can be handled by operator hand The main program CAPD was also successfully modified in order to be capable in limiting the maximum length of straight pipe. By limiting the length, piping flexibility can be increased. (author)

  8. Personalized medicine: reality and reality checks.

    Science.gov (United States)

    Leeder, J Steven; Spielberg, Stephen P

    2009-05-01

    The evolving era of pharmacogenomics and personalized medicine is greeted with optimism by many, but this sentiment is not universally shared. The existence of diametrically opposed opinions concerning the potential benefits and obstacles facing the widespread implementation of genomic medicine should stimulate discussion and guide the design of studies to establish the value of interventions targeted at the level of individual patients. One of the more controversial aspects of personalized medicine is whether the anticipated benefits will be realized at an acceptable cost. Recently released analyses suggest that the returns on investment depend on the particular scenario and are different for different stakeholders. On the other hand, cost is only one of the challenges regarding implementation of personalized medicine. Among these are the development of universal standards for managing genomic information in electronic medical records, improvement in the collection and interpretation of clinical phenotype data, and new strategies to educate practitioners and patients/consumers. The reality is that personalized medicine is upon us; open discourse and periodic reality checks will be necessary as we confront it.

  9. Get Your Kids Moving and Check Some Chores off Your List

    Science.gov (United States)

    ... Check Recipe Certification Program Nutrition Requirements Heart-Check Professional Resources Contact the Heart-Check Certification Program Simple Cooking and Recipes Dining Out Choosing a Restaurant Deciphering ...

  10. Stable Boundary Layer Issues

    NARCIS (Netherlands)

    Steeneveld, G.J.

    2012-01-01

    Understanding and prediction of the stable atmospheric boundary layer is a challenging task. Many physical processes are relevant in the stable boundary layer, i.e. turbulence, radiation, land surface coupling, orographic turbulent and gravity wave drag, and land surface heterogeneity. The

  11. Development of boundary layers

    International Nuclear Information System (INIS)

    Herbst, R.

    1980-01-01

    Boundary layers develop along the blade surfaces on both the pressure and the suction side in a non-stationary flow field. This is due to the fact that there is a strongly fluctuating flow on the downstream blade row, especially as a result of the wakes of the upstream blade row. The author investigates the formation of boundary layers under non-stationary flow conditions and tries to establish a model describing the non-stationary boundary layer. For this purpose, plate boundary layers are measured, at constant flow rates but different interferent frequency and variable pressure gradients. By introducing the sample technique, measurements of the non-stationary boundary layer become possible, and the flow rate fluctuation can be divided in its components, i.e. stochastic turbulence and periodical fluctuation. (GL) [de

  12. Related Fact Checks: a tool for combating fake news

    OpenAIRE

    Guha, Sreya

    2017-01-01

    The emergence of "Fake News" and misinformation via online news and social media has spurred an interest in computational tools to combat this phenomenon. In this paper we present a new "Related Fact Checks" service, which can help a reader critically evaluate an article and make a judgment on its veracity by bringing up fact checks that are relevant to the article. We describe the core technical problems that need to be solved in building a "Related Fact Checks" service, and present results ...

  13. Next-generation nozzle check valve significantly reduces operating costs

    Energy Technology Data Exchange (ETDEWEB)

    Roorda, O. [SMX International, Toronto, ON (Canada)

    2009-01-15

    Check valves perform an important function in preventing reverse flow and protecting plant and mechanical equipment. However, the variety of different types of valves and extreme differences in performance even within one type can change maintenance requirements and life cycle costs, amounting to millions of dollars over the typical 15-year design life of piping components. A next-generation non-slam nozzle check valve which prevents return flow has greatly reduced operating costs by protecting the mechanical equipment in a piping system. This article described the check valve varieties such as the swing check valve, a dual-plate check valve, and nozzle check valves. Advancements in optimized design of a non-slam nozzle check valve were also discussed, with particular reference to computer flow modelling such as computational fluid dynamics; computer stress modelling such as finite element analysis; and flow testing (using rapid prototype development and flow loop testing), both to improve dynamic performance and reduce hydraulic losses. The benefits of maximized dynamic performance and minimized pressure loss from the new designed valve were also outlined. It was concluded that this latest non-slam nozzle check valve design has potential applications in natural gas, liquefied natural gas, and oil pipelines, including subsea applications, as well as refineries, and petrochemical plants among others, and is suitable for horizontal and vertical installation. The result of this next-generation nozzle check valve design is not only superior performance, and effective protection of mechanical equipment but also minimized life cycle costs. 1 fig.

  14. Mothers' use of and attitudes to BabyCheck.

    OpenAIRE

    Thomson, Hilary; Ross, Sue; Wilson, Philip; McConnachie, Alex; Watson, Richard

    2002-01-01

    A copy of BabyCheck was sent to 497 mothers shortly after the birth of their baby. Six months later they were sent a questionnaire asking about their use of and attitudes to, BabyCheck. Questionnaires were returned by 323 (65%) mothers; 215 (67%) of them reported reading BabyCheck, the majority found it easy to understand (74%) and agreed with the advice (67%). Eighty-four (26%) of the mothers who returned the questionnaires reported using BabyCheck when their baby was ill; of these, 71% agre...

  15. Safety and Availability Checking for User Authorization Queries in RBAC

    Directory of Open Access Journals (Sweden)

    Jian-feng Lu

    2012-09-01

    Full Text Available This paper introduces the notion of safety and availability checking for user authorization query processing, and develop a recursive algorithm use the ideas from backtracking-based search techniques to search for the optimal solution. For the availability checking, we introduce the notion of max activatable set (MAS, and show formally how MAS can be determined in a hybrid role hierarchy. For the safety checking, we give a formal definition of dynamic separation-of-duty (DSoD policies, and show how to reduce the safety checking for DSoD to a SAT instance.

  16. Reexamination of cross-sections for fast neutrons by computational checking of single material integral experiments

    International Nuclear Information System (INIS)

    Schriewer, J.; Hehn, G.; Mattes, M.

    1976-06-01

    Transmission experiments for fast neutrons and pure materials offer the possibility to check the accuracy of nuclear data compilations by recalculating the measured discharge spectra. In this paper the calculations were mainly based on two Benchmark experiments with pure iron carried out at the Karlsruhe Nuclear Research Center. One of the experiments employed a 252 Cf fission source and spherically symmetric arrangement; the other was based on transmission of an iron cylinder by 14-MeV neutrons from a D+T source. The checking calculations were based on the data compilation ENDF/B-IV (occasionally also ENDF/B-III) and on the transport codes ANISN (1D) and DOT-2 (2D) with lined up ESTOQ (for calculating the first-collision source). The calculations with the Cf source showed good agreement with the results of measurement, whereas the checking of the arrangement with 14 MeV neutrons yielded a marked underestimation of the neutron flux density in the range of 2 MeV up to 14 MeV. The discussion of the results including the choice of codes was done on the basis of a literature review on the Benchmark experiments for iron with fast neutrons carried out until now. (orig.) [de

  17. Modelling of boundary plasma in TOKES

    International Nuclear Information System (INIS)

    Igitkhanov, Yu.; Pestchanyi, S.; Landman, I.

    2009-12-01

    The main purpose of this report is the development of analytical and numerical transport models of tokamak plasmas, suitable for implementation into the integrated transport code TOKES [1-4]. Therefore this work is presented as an executive guideline for numerical implementation. The tokamak edge plasma in reactor configurations is expected to be rather thin outmost area with strong radial plasma gradients inside the separatrix and the area outside the separatrix, a scrape-off layer (SOL), with open magnetic field surfaces, terminated at the divertor plates. The region beyond the separatrix plays an important role because it serves as a shield, protecting the wall from the hot plasma and bulk plasma from the penetration of impurities and because it is mostly affected by transients. The transport model, proposed here, provides plasma density, temperature and velocity distribution along and across the magnetic field lines in bulk and the edge plasma region. It describes the dependence of temperature and density at the separatrix on the plasma conditions at the plate and the efficiency of the divertor operation in detached or attached conditions, depending on power and particle sources. The calculation gives eventually the power and particle loads on the divertor plates and side walls. During numerical implementation some simple models, allowing an analytical solution, were developed and used for comparison and checking. Some parts of the transport models were also benchmarked with experimental data from various tokamaks. In the frame of this work the following tasks have been completed: - The transport model with neoclassical and anomalous coefficients for bulk plasma and 2D transport model for the SOL have been prepared and implemented into the TOKES code. The coefficients are suitable for description of stationary plasma processes in the bulk and edge tokamak plasmas. - The model of pedestal formation at the plasma edge in H-mode operation was implemented in TOKES

  18. Administrative Area Boundaries 2 (State Boundaries), Region 9, 2010, NAVTEQ

    Data.gov (United States)

    U.S. Environmental Protection Agency — NAVTEQ Administrative Area Boundaries 2 (State Boundaries) for Region 9. There are five Administrative Area Boundaries layers (1, 2, 3, 4, 5). These layers contain...

  19. Administrative Area Boundaries 4 (City Boundaries), Region 9, 2010, NAVTEQ

    Data.gov (United States)

    U.S. Environmental Protection Agency — NAVTEQ Administrative Area Boundaries 4 (City Boundaries) for Region 9. There are five Administrative Area Boundaries layers (1, 2, 3, 4, 5). These layers contain...

  20. Quality Control Quantification (QCQ): A Tool to Measure the Value of Quality Control Checks in Radiation Oncology

    International Nuclear Information System (INIS)

    Ford, Eric C.; Terezakis, Stephanie; Souranis, Annette; Harris, Kendra; Gay, Hiram; Mutic, Sasa

    2012-01-01

    Purpose: To quantify the error-detection effectiveness of commonly used quality control (QC) measures. Methods: We analyzed incidents from 2007-2010 logged into a voluntary in-house, electronic incident learning systems at 2 academic radiation oncology clinics. None of the incidents resulted in patient harm. Each incident was graded for potential severity using the French Nuclear Safety Authority scoring scale; high potential severity incidents (score >3) were considered, along with a subset of 30 randomly chosen low severity incidents. Each report was evaluated to identify which of 15 common QC checks could have detected it. The effectiveness was calculated, defined as the percentage of incidents that each QC measure could detect, both for individual QC checks and for combinations of checks. Results: In total, 4407 incidents were reported, 292 of which had high-potential severity. High- and low-severity incidents were detectable by 4.0 ± 2.3 (mean ± SD) and 2.6 ± 1.4 QC checks, respectively (P<.001). All individual checks were less than 50% sensitive with the exception of pretreatment plan review by a physicist (63%). An effectiveness of 97% was achieved with 7 checks used in combination and was not further improved with more checks. The combination of checks with the highest effectiveness includes physics plan review, physician plan review, Electronic Portal Imaging Device-based in vivo portal dosimetry, radiation therapist timeout, weekly physics chart check, the use of checklists, port films, and source-to-skin distance checks. Some commonly used QC checks such as pretreatment intensity modulated radiation therapy QA do not substantially add to the ability to detect errors in these data. Conclusions: The effectiveness of QC measures in radiation oncology depends sensitively on which checks are used and in which combinations. A small percentage of errors cannot be detected by any of the standard formal QC checks currently in broad use, suggesting that further

  1. Quality control quantification (QCQ): a tool to measure the value of quality control checks in radiation oncology.

    Science.gov (United States)

    Ford, Eric C; Terezakis, Stephanie; Souranis, Annette; Harris, Kendra; Gay, Hiram; Mutic, Sasa

    2012-11-01

    To quantify the error-detection effectiveness of commonly used quality control (QC) measures. We analyzed incidents from 2007-2010 logged into a voluntary in-house, electronic incident learning systems at 2 academic radiation oncology clinics. None of the incidents resulted in patient harm. Each incident was graded for potential severity using the French Nuclear Safety Authority scoring scale; high potential severity incidents (score >3) were considered, along with a subset of 30 randomly chosen low severity incidents. Each report was evaluated to identify which of 15 common QC checks could have detected it. The effectiveness was calculated, defined as the percentage of incidents that each QC measure could detect, both for individual QC checks and for combinations of checks. In total, 4407 incidents were reported, 292 of which had high-potential severity. High- and low-severity incidents were detectable by 4.0 ± 2.3 (mean ± SD) and 2.6 ± 1.4 QC checks, respectively (P<.001). All individual checks were less than 50% sensitive with the exception of pretreatment plan review by a physicist (63%). An effectiveness of 97% was achieved with 7 checks used in combination and was not further improved with more checks. The combination of checks with the highest effectiveness includes physics plan review, physician plan review, Electronic Portal Imaging Device-based in vivo portal dosimetry, radiation therapist timeout, weekly physics chart check, the use of checklists, port films, and source-to-skin distance checks. Some commonly used QC checks such as pretreatment intensity modulated radiation therapy QA do not substantially add to the ability to detect errors in these data. The effectiveness of QC measures in radiation oncology depends sensitively on which checks are used and in which combinations. A small percentage of errors cannot be detected by any of the standard formal QC checks currently in broad use, suggesting that further improvements are needed. These data

  2. Quality Control Quantification (QCQ): A Tool to Measure the Value of Quality Control Checks in Radiation Oncology

    Energy Technology Data Exchange (ETDEWEB)

    Ford, Eric C., E-mail: eford@uw.edu [Department of Radiation Oncology and Molecular Radiation Sciences, Johns Hopkins University, Baltimore, Maryland (United States); Terezakis, Stephanie; Souranis, Annette; Harris, Kendra [Department of Radiation Oncology and Molecular Radiation Sciences, Johns Hopkins University, Baltimore, Maryland (United States); Gay, Hiram; Mutic, Sasa [Department of Radiation Oncology, Washington University, St. Louis, Missouri (United States)

    2012-11-01

    Purpose: To quantify the error-detection effectiveness of commonly used quality control (QC) measures. Methods: We analyzed incidents from 2007-2010 logged into a voluntary in-house, electronic incident learning systems at 2 academic radiation oncology clinics. None of the incidents resulted in patient harm. Each incident was graded for potential severity using the French Nuclear Safety Authority scoring scale; high potential severity incidents (score >3) were considered, along with a subset of 30 randomly chosen low severity incidents. Each report was evaluated to identify which of 15 common QC checks could have detected it. The effectiveness was calculated, defined as the percentage of incidents that each QC measure could detect, both for individual QC checks and for combinations of checks. Results: In total, 4407 incidents were reported, 292 of which had high-potential severity. High- and low-severity incidents were detectable by 4.0 {+-} 2.3 (mean {+-} SD) and 2.6 {+-} 1.4 QC checks, respectively (P<.001). All individual checks were less than 50% sensitive with the exception of pretreatment plan review by a physicist (63%). An effectiveness of 97% was achieved with 7 checks used in combination and was not further improved with more checks. The combination of checks with the highest effectiveness includes physics plan review, physician plan review, Electronic Portal Imaging Device-based in vivo portal dosimetry, radiation therapist timeout, weekly physics chart check, the use of checklists, port films, and source-to-skin distance checks. Some commonly used QC checks such as pretreatment intensity modulated radiation therapy QA do not substantially add to the ability to detect errors in these data. Conclusions: The effectiveness of QC measures in radiation oncology depends sensitively on which checks are used and in which combinations. A small percentage of errors cannot be detected by any of the standard formal QC checks currently in broad use, suggesting that

  3. In-phantom dosimetric measurements as quality control for brachytherapy. System check and constancy check; Messungen im Festkoerperphantom als Qualitaetskontrolle in der Brachytherapie. Systempruefung und Konstanzpruefung

    Energy Technology Data Exchange (ETDEWEB)

    Kollefrath, Michael; Bruggmoser, Gregor; Nanko, Norbert; Gainey, Mark [Universitaetsklinik Freiburg (Germany). Klinik fuer Strahlenheilkunde

    2015-09-01

    In brachytherapy dosimetric measurements are difficult due to the inherent dose-inhomogeneities. Typically in routine clinical practice only the nominal dose rate is determined for computer controlled afterloading systems. The region of interest lies close to the source when measuring the spatial dose distribution. In this region small errors in the positioning of the detector, and its finite size, lead to large measurement uncertainties that exacerbate the routine dosimetric control of the system in the clinic. The size of the measurement chamber, its energy dependence, and the directional dependence of the measurement apparatus are the factors which have a significant influence on dosimetry. Although ionisation chambers are relatively large, they are employed since similar chambers are commonly found on clinical brachytherapy units. The dose is determined using DIN 6800 [11] since DIN 6809-2 [12], which deals with dosimetry in brachytherapy, is antiquated and is currently in the process of revision. Further information regarding dosimetry for brachytherapy can be found in textbooks [1] and [2]. The measurements for this work were performed with a HDR (High-Dose-Rate) {sup 192}Ir source, type mHDR V2, and a Microselectron Afterloader V2 both from Nucletron/Elekta. In this work two dosimetric procedures are presented which, despite the aforemention difficulties, should assist in performing checks of the proper operation of the system. The first is a system check that measures the dose distribution along a line and is to be performed when first bringing the afterloader into operation, or after significant changes to the system. The other is a dosimetric constancy check, which with little effort can be performed monthly or weekly. It simultaneously verifies the positioning of the source at two positions, the functionality of the system clock and the automatic re-calculation of the source activity.

  4. 31 CFR 10.31 - Negotiation of taxpayer checks.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Negotiation of taxpayer checks. 10.31 Section 10.31 Money and Finance: Treasury Office of the Secretary of the Treasury PRACTICE BEFORE THE INTERNAL REVENUE SERVICE Duties and Restrictions Relating to Practice Before the Internal Revenue Service § 10.31 Negotiation of taxpayer checks. ...

  5. Simple nonparametric checks for model data fit in CAT

    NARCIS (Netherlands)

    Meijer, R.R.

    2005-01-01

    In this paper, the usefulness of several nonparametric checks is discussed in a computerized adaptive testing (CAT) context. Although there is no tradition of nonparametric scalability in CAT, it can be argued that scalability checks can be useful to investigate, for example, the quality of item

  6. 26 CFR 301.6657-1 - Bad checks.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Bad checks. 301.6657-1 Section 301.6657-1... Additions to the Tax and Additional Amounts § 301.6657-1 Bad checks. (a) In general. Except as provided in... district director that it was tendered in good faith with reasonable cause to believe that it would be duly...

  7. Employees are ambivalent about health checks in the occupational setting

    NARCIS (Netherlands)

    Damman, O.C.; van der Beek, A.J.; Timmermans, D.R.M.

    2015-01-01

    Background: Employees are increasingly provided with preventive health checks. However, participation rates are low and several ethical issues arise, such as a potential perceived threat to autonomy and privacy. Aims: To assess what employees think about preventive health checks in the occupational

  8. Not Just right experiences as ironic result of perseverative checking

    NARCIS (Netherlands)

    van Dis, E.A.M.; van den Hout, M.A.

    2016-01-01

    Objective: patients with obsessive-compulsive disorder (ocD) typically report to have “not just right experiences” (NJRE). up till now it is unclear which behavioral ocD features may give rise to NJREs. We used an induced checking paradigm to experimentally study whether perseverative checking

  9. Development of a stainless steel check valve for cryogenic applications

    NARCIS (Netherlands)

    Veenstra, T.T.; Venhorst, G.C.F.; Venhorst, G.C.F.; Burger, Johannes Faas; Holland, Herman J.; ter Brake, Hermanus J.M.; Sirbi, A.; Rogalla, Horst

    2007-01-01

    This paper describes the development of a check valve for use in a sorption compressor that will drive a 10 mW 4.5 K Joule–Thomson cryocooler. For the check valve extremely low backflow rates are tolerable at an operating temperature of the valve of 50 K. To fulfill these requirements, the sealing

  10. Check-up Measurement (update). Deliverable D5.22

    NARCIS (Netherlands)

    Holtzer, A.C.G.; Giessen, A.M.D. van der; Djurica, M.

    2015-01-01

    This deliverable D5.22 presents the GEN6 check-up measurement. It describes the most prominent outcomes of the GEN6 project up to this point in time. The check-up measurement helps to focus the monitoring towards the most relevant achievements of the project, such that an efficient and well-targeted

  11. Model Checking Markov Reward Models with Impulse Rewards

    NARCIS (Netherlands)

    Cloth, Lucia; Katoen, Joost-Pieter; Khattri, Maneesh; Pulungan, Reza; Bondavalli, Andrea; Haverkort, Boudewijn; Tang, Dong

    This paper considers model checking of Markov reward models (MRMs), continuous-time Markov chains with state rewards as well as impulse rewards. The reward extension of the logic CSL (Continuous Stochastic Logic) is interpreted over such MRMs, and two numerical algorithms are provided to check the

  12. Efficient probabilistic model checking on general purpose graphic processors

    NARCIS (Netherlands)

    Bosnacki, D.; Edelkamp, S.; Sulewski, D.; Pasareanu, C.S.

    2009-01-01

    We present algorithms for parallel probabilistic model checking on general purpose graphic processing units (GPGPUs). For this purpose we exploit the fact that some of the basic algorithms for probabilistic model checking rely on matrix vector multiplication. Since this kind of linear algebraic

  13. 16 CFR 240.12 - Checking customer's use of payments.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Checking customer's use of payments. 240.12 Section 240.12 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR ADVERTISING ALLOWANCES AND OTHER MERCHANDISING PAYMENTS AND SERVICES § 240.12 Checking customer's use of...

  14. Dynamic State Space Partitioning for External Memory Model Checking

    DEFF Research Database (Denmark)

    Evangelista, Sami; Kristensen, Lars Michael

    2009-01-01

    We describe a dynamic partitioning scheme usable by model checking techniques that divide the state space into partitions, such as most external memory and distributed model checking algorithms. The goal of the scheme is to reduce the number of transitions that link states belonging to different...

  15. 31 CFR 211.1 - Withholding delivery of checks.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Withholding delivery of checks. 211.1 Section 211.1 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE DELIVERY OF CHECKS AND WARRANTS TO...

  16. Checking Consistency of Pedigree Information is NP-complete

    DEFF Research Database (Denmark)

    Aceto, Luca; Hansen, Jens A.; Ingolfsdottir, Anna

    Consistency checking is a fundamental computational problem in genetics. Given a pedigree and information on the genotypes of some of the individuals in it, the aim of consistency checking is to determine whether these data are consistent with the classic Mendelian laws of inheritance. This probl...

  17. 40 CFR 89.317 - NOX converter check.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false NOX converter check. 89.317 Section 89.317 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED..., the chemiluminescent oxides of nitrogen analyzer shall be checked for NO2 to NO converter efficiency...

  18. Strategic Planning through Model Checking of ATL Formulae

    NARCIS (Netherlands)

    Jamroga, W.J.; Rutkowski, L.; Siekmann, J.; Tadeusiewicz, R.; Zadeh, L.A.

    2004-01-01

    Model checking of temporal logic has already been proposed for automatic planning. In this paper, we introduce a simple adaptation of the ATL model checking algorithm that returns a strategy to achieve given goal. We point out that the algorithm generalizes minimaxing, and that ATL models generalize

  19. Partial-Order Reduction for GPU Model Checking

    NARCIS (Netherlands)

    Neele, T.; Wijs, A.; Bosnacki, D.; van de Pol, Jan Cornelis; Artho, C; Legay, A.; Peled, D.

    2016-01-01

    Model checking using GPUs has seen increased popularity over the last years. Because GPUs have a limited amount of memory, only small to medium-sized systems can be verified. For on-the-fly explicit-state model checking, we improve memory efficiency by applying partial-order reduction. We propose

  20. Partial-order reduction for GPU model checking

    NARCIS (Netherlands)

    Neele, T.S.; Wijs, A.J.; Bošnački, D.; van de Pol, J.C.

    2016-01-01

    Model checking using GPUs has seen increased popularity over the last years. Because GPUs have a limited amount of memory, only small to medium-sized systems can be verified. For on-the-fly explicitstate model checking, we improve memory efficiency by applying partialorder reduction. We propose

  1. Fraud by using a check | Azarian | Journal of Fundamental and ...

    African Journals Online (AJOL)

    If someone used check as a tool to fraud and looting of property of others, should they just be subject to check law, and according to the provisions of the law are prosecuted? Are crook people the same as honorable merchants that due to some unwanted changes and fluctuations in the market and social conditions

  2. Tax Unit Boundaries

    Data.gov (United States)

    Kansas Data Access and Support Center — The Statewide GIS Tax Unit boundary file was created through a collaborative partnership between the State of Kansas Department of Revenue Property Valuation...

  3. 500 Cities: City Boundaries

    Data.gov (United States)

    U.S. Department of Health & Human Services — This city boundary shapefile was extracted from Esri Data and Maps for ArcGIS 2014 - U.S. Populated Place Areas. This shapefile can be joined to 500 Cities...

  4. National Forest Boundaries

    Data.gov (United States)

    Minnesota Department of Natural Resources — This theme shows the USFS national forest boundaries in the state. This data was acquired from the GIS coordinators at both the Chippewa National Forest and the...

  5. Allegheny County Parcel Boundaries

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset contains parcel boundaries attributed with county block and lot number. Use the Property Information Extractor for more control downloading a filtered...

  6. Boundary representation modelling techniques

    CERN Document Server

    2006-01-01

    Provides the most complete presentation of boundary representation solid modelling yet publishedOffers basic reference information for software developers, application developers and users Includes a historical perspective as well as giving a background for modern research.

  7. HUC 8 Boundaries

    Data.gov (United States)

    Kansas Data Access and Support Center — This data set is a digital hydrologic unit boundary that is at the 4-digit, 6-digit, 8-digit, and 11-digit level. The data set was developed by delineating the...

  8. State Park Statutory Boundaries

    Data.gov (United States)

    Minnesota Department of Natural Resources — Legislative statutory boundaries for sixty six state parks, six state recreation areas, and eight state waysides. These data are derived principally from DNR's...

  9. Statistical Model Checking of Rich Models and Properties

    DEFF Research Database (Denmark)

    Poulsen, Danny Bøgsted

    in undecidability issues for the traditional model checking approaches. Statistical model checking has proven itself a valuable supplement to model checking and this thesis is concerned with extending this software validation technique to stochastic hybrid systems. The thesis consists of two parts: the first part...... motivates why existing model checking technology should be supplemented by new techniques. It also contains a brief introduction to probability theory and concepts covered by the six papers making up the second part. The first two papers are concerned with developing online monitoring techniques...... systems. The fifth paper shows how stochastic hybrid automata are useful for modelling biological systems and the final paper is concerned with showing how statistical model checking is efficiently distributed. In parallel with developing the theory contained in the papers, a substantial part of this work...

  10. 31 CFR 245.8 - Receipt or recovery of original check.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Receipt or recovery of original check... CHECKS § 245.8 Receipt or recovery of original check. (a) If the original check is received or recovered... of instructions with respect to the negotiability of such check. (b) If the original check is...

  11. 137Cs radioactive check device for quality and stability control of dosimeters used in radiotherapy

    International Nuclear Information System (INIS)

    Alves, C.F.E.; Mondaini, C.V.; Leite, S.P.; Pires, E.J.; Magalhaes, L.A.G.; Daivd, M.G.; Almeida, C.E. de

    2015-01-01

    This paper describes the design and construction of a shielded container to store a used brachytherapy 137 Cs source. This system proposes a new option to check the periodical consistency and proper functioning of ionization chambers and electrometers used in radiotherapy. Since there is no similar equipment being produced in the Brazilian market and the chambers stability control is part of a licensing requirement this device was built to meet the needs of several radiotherapy centers without access to it. (author)

  12. Is Chicxulub Too Small to be the Source of the K/Pg Boundary Layer and the Cause of the Dinosaur Extinction Event and would the Amazon Basin Considered as an Impact Feature fit the Evidence Better?

    Science.gov (United States)

    Burgener, J. A.

    2016-12-01

    The Chicxulub impact is well associated with the K/Pg boundary layer and extinction event [Schulte et al., 2010]. However, most agree that Chicxulub is considered to be too small to have caused the extinction in itself [Kring, 2007; Keller, 2014]. Keller [2014] discusses how the K/Pg extinction event may have been due to many factors, of which Chicxulub would be part, but global warming or volcanic fumes or other factors were the main killers. There are several features in the K/Pg layer that require a much higher energy impact than Chicxulub. The worldwide distribution of shocked crystals does not fit Chicxulub - Chicxulub would only send such granules 400 km away [Morgan et al, 2006]. The Fern Spore anomaly extends too far from Chicxulub indicating a much larger fireball and impact [Fleming 1990; Robertson, 2103]. Fireballs falling around the planet have been proposed and dismissed as not possible. [Goldin & Melosh, 2009] and [Adair,2010] rule out a firestorm from ejecta. One of the reasons that Chicxulub is convincingly attributed with the K/Pg boundary layer is the calculation that the size of the impacting asteroid should have been about 10 km in diameter, based on the thickness of the boundary layer and the amount of iridium in the boundary layer [Alvarez, 1980]. Alvarez used the factor from the Krakatoa eruption (0.22) as the amount of asteroid material that would stay in the atmosphere. More recent studies imply that far less than 0.22 of an asteroid would stay in the atmosphere after an impact. When a comet hits at 55 - 72 km/sec, the vast majority of the comet material will be buried deep into the Earth or ejected at speeds in excess of the escape velocity, and very little would remain [Jeffers et al.2001]. Therefore a comet impact should leave a relatively small boundary layer, requiring a much larger impact by a comet to form what Alvaraz calculated for a 10 km asteroid. If a much larger impact occurred at the end of the Cretaceous, it would resolve the

  13. A quenched study of the Schroedinger functional with chirally rotated boundary conditions. Non-preturbative tuning

    Energy Technology Data Exchange (ETDEWEB)

    Lopez, J. Gonzalez [Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik; Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Jansen, K. [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Renner, D.B. [Jefferson Lab, Newport News, VA (United States); Shindler, A. [Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik

    2012-08-23

    The use of chirally rotated boundary conditions provides a formulation of the Schroedinger functional that is compatible with automatic O(a) improvement of Wilson fermions up to O(a) boundary contributions. The elimination of bulk O(a) effects requires the non-perturbative tuning of the critical mass and one additional boundary counterterm. We present the results of such a tuning in a quenched setup for several values of the renormalized gauge coupling, from perturbative to nonperturbative regimes, and for a range of lattice spacings. We also check that the correct boundary conditions and symmetries are restored in the continuum limit. (orig.)

  14. A quenched study of the Schroedinger functional with chirally rotated boundary conditions. Non-preturbative tuning

    International Nuclear Information System (INIS)

    Lopez, J. Gonzalez; Jansen, K.; Renner, D.B.; Shindler, A.

    2012-01-01

    The use of chirally rotated boundary conditions provides a formulation of the Schroedinger functional that is compatible with automatic O(a) improvement of Wilson fermions up to O(a) boundary contributions. The elimination of bulk O(a) effects requires the non-perturbative tuning of the critical mass and one additional boundary counterterm. We present the results of such a tuning in a quenched setup for several values of the renormalized gauge coupling, from perturbative to nonperturbative regimes, and for a range of lattice spacings. We also check that the correct boundary conditions and symmetries are restored in the continuum limit. (orig.)

  15. Systematic Review of the Check-In, Check-Out Intervention for Students at Risk for Emotional and Behavioral Disorders

    Science.gov (United States)

    Hawken, Leanne S.; Bundock, Kaitlin; Kladis, Kristin; O'Keeffe, Breda; Barret, Courtenay A.

    2014-01-01

    The purpose of this systematic literature review was to summarize outcomes of the Check-in Check-out (CICO) intervention across elementary and secondary settings. Twenty-eight studies utilizing both single subject and group (experimental and quasi-experimental) designs were included in this review. Median effect sizes across the eight group…

  16. Bulk-boundary correlators in the hermitian matrix model and minimal Liouville gravity

    International Nuclear Information System (INIS)

    Bourgine, Jean-Emile; Ishiki, Goro; Rim, Chaiho

    2012-01-01

    We construct the one matrix model (MM) correlators corresponding to the general bulk-boundary correlation numbers of the minimal Liouville gravity (LG) on the disc. To find agreement between both discrete and continuous approach, we investigate the resonance transformation mixing boundary and bulk couplings. It leads to consider two sectors, depending on whether the matter part of the LG correlator is vanishing due to the fusion rules. In the vanishing case, we determine the explicit transformation of the boundary couplings at the first order in bulk couplings. In the non-vanishing case, no bulk-boundary resonance is involved and only the first order of pure boundary resonances have to be considered. Those are encoded in the matrix polynomials determined in our previous paper. We checked the agreement for the bulk-boundary correlators of MM and LG in several non-trivial cases. In this process, we developed an alternative method to derive the boundary resonance encoding polynomials.

  17. Detecting Malicious Code by Binary File Checking

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2014-01-01

    Full Text Available The object, library and executable code is stored in binary files. Functionality of a binary file is altered when its content or program source code is changed, causing undesired effects. A direct content change is possible when the intruder knows the structural information of the binary file. The paper describes the structural properties of the binary object files, how the content can be controlled by a possible intruder and what the ways to identify malicious code in such kind of files. Because the object files are inputs in linking processes, early detection of the malicious content is crucial to avoid infection of the binary executable files.

  18. Calibration, checking and physical corrections for a new dual-spaced neutron porosity tool

    International Nuclear Information System (INIS)

    Smith, M.P.

    1986-01-01

    A new dual-spaced neutron tool has been developed that features high count rates and improved statistical precision and log repeatability. Environmental corrections including borehole diameter, standoff, and lithology are at acceptable levels for DSN-II. The effects of varying source-to-detector spacings and shielding are summarized. Porosity measurement resolution and statistical precision are discussed and it is indicated how tradeoffs between higher count rates and increased environmental corrections must be considered. The absolute calibration of a standard tool is based on its response to limestone test pits, field data, and theoretical calculations. Test data for actual manufactured tools are presented. Shop calibration and wellsite check procedures are discussed. The advantages of multiposition check operations are explained, including reduced sensitivity to check block positioning and external environment. An analysis is presented of errors from tool manufacturing, calibration, and check procedures. A generalized theory of neutron scattering and absorption has been developed to correct dual-spaced neutron logs for unusual minerals and fluids

  19. Emodnet Med Sea Check-Point - Indicators for decision- maker

    Science.gov (United States)

    Besnard, Sophie; Claverie, Vincent; Blanc, Frédérique

    2015-04-01

    the raw checkpoint descriptors.  Stage 2: to get a more sectorial status, aggregating level 1 results for instance depending on processing level.  Stage 3: to synthesize and focus view at characteristic level for decision making and actions plan. They are computed from stage 2 indicators. To produce this checkpoint information, we describe upstream data as input data sets which are uniquely identified as a combination of (variable, dataset, intended use) or of (geographical feature, dataset, intended use) depending on their nature. The information is called descriptors. The descriptors cover 8 sections: 1. Characteristics (= What) 2. Data sources (= From) 3. Overview elements (= Why for) 4. Spatial coverage (= Where) 5. Temporal coverage (= When) 6. Accessibility (= How) 7. Quality elements (= ISO 19113 quality elements) 8. Other information (= for administration/management needs) Check-Point services should be permanent services, because: • Monitoring systems will evolve and every few years there is need to re-assess; • Different/more use cases of monitoring are required to really show gaps and complementarities in the monitoring system components; • Monitoring system evolution for the European Sea and the global ocean require constant upgrade of the assessment indicators and descriptors; • Need to establish strong & permanent links with intermediate and end users from industry to public authorities and 'regional' approach is appropriate and feasible. • Need to maintain the process, methodology used and to be applied.

  20. Twisted boundary states in c=1 coset conformal field theories

    International Nuclear Information System (INIS)

    Ishikawa, Hiroshi; Yamaguchi, Atsushi

    2003-01-01

    We study the mutual consistency of twisted boundary conditions in the coset conformal field theory G/H. We calculate the overlap of the twisted boundary states of G/H with the untwisted ones, and show that the twisted boundary states are consistently defined in the charge-conjugation modular invariant. The overlap of the twisted boundary states is expressed by the branching functions of a twisted affine Lie algebra. As a check of our argument, we study the diagonal coset theory so(2n) 1 +so(2n) 1 /so(2n) 2 , which is equivalent to the orbifold S 1 /Z 2 at a particular radius. We construct the boundary states twisted by the automorphisms of the unextended Dynkin diagram of so(2n), and show their mutual consistency by identifying their counterpart in the orbifold. For the triality of so(8), the twisted states of the coset theory correspond to neither the Neumann nor the Dirichlet boundary states of the orbifold and yield conformal boundary states that preserve only the Virasoro algebra. (author)

  1. Improvement of seawater booster pump outlet check valve

    International Nuclear Information System (INIS)

    Li Xuning; Du Yansong; Huang Huimin

    2010-01-01

    Conventional island seawater booster pump set of QNPC 310 MWe unit are very important in the whole circulating cooling system, and the integrate function of seawater booster pump outlet check valve is the foundation of steady operation of the seawater booster pump set. The article mainly introduce that through the analyses to the reason to the problem that the seawater booster pump outlet check valve of QNPC 310 MWe unit appeared in past years by our team, and considering the influence of operation condition and circumstance, the team improve the seawater booster pump outlet check valve from swing check valve to shuttle check valve which operate more appropriately in the system. By the test of continuous practice, we make further modification to the inner structure of shuttle check valve contrapuntally, and therefore we solve the problem in seawater booster pump outlet check valve fundamentally which has troubled the security of system operation in past years, so we realize the aim of technical improvement and ensure that the system operate in safety and stability. (authors)

  2. Check valve diagnostics utilizing acoustic and magnetic technologies

    International Nuclear Information System (INIS)

    Agostinelli, A.

    1991-01-01

    The potential hazards associated with check valve failures make it necessary to detect check valve problems before they cause significant damage. In the nuclear industry, check valve failures are known to have resulted in damaging water hammer conditions, overpressurization of low pressure systems, steam binding of auxiliary feedwater pumps, and other serious component damage in power plant environments. Similar problems exist in fossil power and various process industries, but the resources dedicated to valve maintenance issues are greatly reduced. However, the trend toward plant life extension, predictive maintenance, and maximum operating efficiency will raise the general awareness of check valve maintenance in commercial (non-nuclear) applications. Although this paper includes specific references to the nuclear industry, the check valve problem conditions and diagnostic techniques apply across all power and process plant environments. The ability to accurately diagnose check valve conditions using non-intrusive, predictive maintenance testing methods allows for a more cost-efficient, productive maintenance program. One particular diagnostic system, called Quickcheck trademark, assists utilities in addressing these concerns. This article presents actual field test data and analysis that demonstrate the power of check valve diagnostics. Prior to presenting the field data, a brief overview of the system is overviewed

  3. Towards an automated checked baggage inspection system augmented with robots

    Science.gov (United States)

    DeDonato, Matthew P.; Dimitrov, Velin; Padır, Taskin

    2014-05-01

    We present a novel system for enhancing the efficiency and accuracy of checked baggage screening process at airports. The system requirements address the identification and retrieval of objects of interest that are prohibited in a checked luggage. The automated testbed is comprised of a Baxter research robot designed by Rethink Robotics for luggage and object manipulation, and a down-looking overhead RGB-D sensor for inspection and detection. We discuss an overview of current system implementations, areas of opportunity for improvements, robot system integration challenges, details of the proposed software architecture and experimental results from a case study for identifying various kinds of lighters in checked bags.

  4. PREREQUISITE PROGRAMMES IN OWN CHECKS IN STATUTORY AND VOLUNTARY LEGISLATION

    Directory of Open Access Journals (Sweden)

    E. Guidi

    2012-08-01

    Full Text Available Prerequisite Programmes approach is a requirement for implementing a correct own check plan. This new approach, born according to the European Legislation, is completely recognized by third Nation Authorities and private Inspection and Accreditation Bodies. This method is the basis to verify if an own check system is under control and to verify if corrective actions are built up to warrant hygienic production standards. The present work demonstrate that a correct own check plan is built up only by a Pre Requisites Program approach. The new UNI EN ISO 22000:2005 standard describe this concept specifying the difference between PRP and CCP.

  5. Implementing Model-Check for Employee and Management Satisfaction

    Science.gov (United States)

    Jones, Corey; LaPha, Steven

    2013-01-01

    This presentation will discuss methods to which ModelCheck can be implemented to not only improve model quality, but also satisfy both employees and management through different sets of quality checks. This approach allows a standard set of modeling practices to be upheld throughout a company, with minimal interaction required by the end user. The presenter will demonstrate how to create multiple ModelCheck standards, preventing users from evading the system, and how it can improve the quality of drawings and models.

  6. Plant experience with check valves in passive systems

    Energy Technology Data Exchange (ETDEWEB)

    Pahladsingh, R R [GKN Joint Nuclear Power Plant, Dodewaard (Netherlands)

    1996-12-01

    In the design of the advanced nuclear reactors there is a tendency to introduce more passive safety systems. The 25 year old design of the GKN nuclear reactor is different from the present BWR reactors because of some special features, such as the Natural Circulation - and the Passive Isolation Condenser system. When reviewing the design, one can conclude that the plant has 25 years of experience with check valves in passive systems and as passive components in systems. The result of this experience has been modeled in a plant-specific ``living PSA`` for the plant. A data-analysis has been performed on components which are related to the safety systems in the plant. As part of this study also the check valves have been taken in consideration. At GKN, the check valves have shown to be reliable components in the systems and no catastrophic failures have been experienced during the 25 years of operation. Especially the Isolation Condenser with its operation experience can contribute substantially to the insight of check valves in stand-by position at reactor pressure and operating by gravity under different pressure conditions. With the introduction of several passive systems in the SBWR-600 design, such as the Isolation Condensers, Gravity Driven Cooling, and Suppression Pool Cooling System, the issue of reliability of check valves in these systems is actual. Some critical aspects for study in connection with check valves are: What is the reliability of a check valve in a system at reactor pressure, to open on demand; what is the reliability of a check valve in a system at low pressure (gravity), to open on demand; what is the reliability of a check valve to open/close when the stand-by check wave is at zero differential pressure. The plant experience with check valves in a few essential safety systems is described and a brief introduction will be made about the application of check valves in the design of the new generation reactors is given. (author). 6 figs, 1 tab.

  7. The Bottom Boundary Layer.

    Science.gov (United States)

    Trowbridge, John H; Lentz, Steven J

    2018-01-03

    The oceanic bottom boundary layer extracts energy and momentum from the overlying flow, mediates the fate of near-bottom substances, and generates bedforms that retard the flow and affect benthic processes. The bottom boundary layer is forced by winds, waves, tides, and buoyancy and is influenced by surface waves, internal waves, and stratification by heat, salt, and suspended sediments. This review focuses on the coastal ocean. The main points are that (a) classical turbulence concepts and modern turbulence parameterizations provide accurate representations of the structure and turbulent fluxes under conditions in which the underlying assumptions hold, (b) modern sensors and analyses enable high-quality direct or near-direct measurements of the turbulent fluxes and dissipation rates, and (c) the remaining challenges include the interaction of waves and currents with the erodible seabed, the impact of layer-scale two- and three-dimensional instabilities, and the role of the bottom boundary layer in shelf-slope exchange.

  8. The Bottom Boundary Layer

    Science.gov (United States)

    Trowbridge, John H.; Lentz, Steven J.

    2018-01-01

    The oceanic bottom boundary layer extracts energy and momentum from the overlying flow, mediates the fate of near-bottom substances, and generates bedforms that retard the flow and affect benthic processes. The bottom boundary layer is forced by winds, waves, tides, and buoyancy and is influenced by surface waves, internal waves, and stratification by heat, salt, and suspended sediments. This review focuses on the coastal ocean. The main points are that (a) classical turbulence concepts and modern turbulence parameterizations provide accurate representations of the structure and turbulent fluxes under conditions in which the underlying assumptions hold, (b) modern sensors and analyses enable high-quality direct or near-direct measurements of the turbulent fluxes and dissipation rates, and (c) the remaining challenges include the interaction of waves and currents with the erodible seabed, the impact of layer-scale two- and three-dimensional instabilities, and the role of the bottom boundary layer in shelf-slope exchange.

  9. Local Type Checking for Linked Data Consumers

    Directory of Open Access Journals (Sweden)

    Gabriel Ciobanu

    2013-07-01

    Full Text Available The Web of Linked Data is the cumulation of over a decade of work by the Web standards community in their effort to make data more Web-like. We provide an introduction to the Web of Linked Data from the perspective of a Web developer that would like to build an application using Linked Data. We identify a weakness in the development stack as being a lack of domain specific scripting languages for designing background processes that consume Linked Data. To address this weakness, we design a scripting language with a simple but appropriate type system. In our proposed architecture some data is consumed from sources outside of the control of the system and some data is held locally. Stronger type assumptions can be made about the local data than external data, hence our type system mixes static and dynamic typing. Throughout, we relate our work to the W3C recommendations that drive Linked Data, so our syntax is accessible to Web developers.

  10. Exercise: When to Check with Your Doctor First

    Science.gov (United States)

    ... check with your doctor before you start to exercise. By Mayo Clinic Staff Regular exercise can help you control your weight, reduce your ... talk to your doctor before starting a new exercise routine. Although moderate physical activity such as brisk ...

  11. Additional considerations regarding the choice of measurement control check frequency

    International Nuclear Information System (INIS)

    Bruckner, L.A.

    1993-01-01

    In a previous paper, factors involved in the choice of frequency of instrument measurement control checks were presented. Unfortunately, some discussions were inadvertently omitted from the paper during the process of review, editing and printing. That material is presented here

  12. Reality Checks: The state of civil society organizations in Ethiopia ...

    African Journals Online (AJOL)

    Reality Checks: The state of civil society organizations in Ethiopia. ... limit the space for CSOs working on human rights and governance and it is legitimate and ... This paper contains contextualized arguments based on empirical data as reality ...

  13. Multi-Valued Modal Fixed Point Logics for Model Checking

    Science.gov (United States)

    Nishizawa, Koki

    In this paper, I will show how multi-valued logics are used for model checking. Model checking is an automatic technique to analyze correctness of hardware and software systems. A model checker is based on a temporal logic or a modal fixed point logic. That is to say, a system to be checked is formalized as a Kripke model, a property to be satisfied by the system is formalized as a temporal formula or a modal formula, and the model checker checks that the Kripke model satisfies the formula. Although most existing model checkers are based on 2-valued logics, recently new attempts have been made to extend the underlying logics of model checkers to multi-valued logics. I will summarize these new results.

  14. Automatic checking system of radioactivity in motor-cars 'AKKORD'

    International Nuclear Information System (INIS)

    Kuechler, L.; Seidler, M.; Zierenberg, B.

    1994-01-01

    A monitoring device has been developed for an automated checking of all vehicles leaving or entering a nuclear installation against uncontrolled lost of radioactive material. This device is an excellent tool for radioactive material flow control. (orig.) [de

  15. Review and analysis of check valve failure data

    International Nuclear Information System (INIS)

    Todd, M.D.; Casada, D.A.

    1992-01-01

    Check valve operating problems in recent years have resulted in significant operating transients, increased cost and decreased system availability. There has been, in response, additional attention given to check valves by utilities, as well as the US Nuclear Regulatory Commission and the American Society of Mechanical Engineers Operation and Maintenance Committee. All these organizations have the fundamental goal of ensuring reliable operation of check valves. A key ingredient to an engineering-oriented reliability improvement effort is a thorough understanding of relevant historical experience. Oak Ridge National Laboratory is currently conducting a detailed review of historical failure data available through the Institute of Nuclear Power Operation's Nuclear Plant Reliability Data System. The focus of the review is on check valve failures that have involved significant degradation of the valve internal parts. A variety of parameters are being considered during the review, including size, age, system of service, method of failure discovery, the affected valve parts, attributed causes, and corrective actions

  16. 48 CFR 22.406-7 - Compliance checking.

    Science.gov (United States)

    2010-10-01

    ... SOCIOECONOMIC PROGRAMS APPLICATION OF LABOR LAWS TO GOVERNMENT ACQUISITIONS Labor Standards for Contracts... inspections to check type of work performed, number and classification of workers, and fulfillment of posting...

  17. NRC valve performance test program - check valve testing

    International Nuclear Information System (INIS)

    Jeanmougin, N.M.

    1987-01-01

    The Valve Performance Test Program addresses the current requirements for testing of pressure isolation valves (PIVs) in light water reactors. Leak rate monitoring is the current method used by operating commercial power plants to survey the condition of their PIVs. ETEC testing of three check valves (4-inch, 6-inch, and 12-inch nominal diameters) indicates that leak rate testing is not a reliable method for detecting impending valve failure. Acoustic emission monitoring of check valves shows promise as a method of detecting loosened internals damage. Future efforts will focus on evaluation of acoustic emission monitoring as a technique for determining check valve condition. Three gate valves also will be tested to evaluate whether the check valve results are applicable to gate type PIVs

  18. Using reciprocity in Boundary Element Calculations

    DEFF Research Database (Denmark)

    Juhl, Peter Møller; Cutanda Henriquez, Vicente

    2010-01-01

    The concept of reciprocity is widely used in both theoretical and experimental work. In Boundary Element calculations reciprocity is sometimes employed in the solution of computationally expensive scattering problems, which sometimes can be more efficiently dealt with when formulated...... as the reciprocal radiation problem. The present paper concerns the situation of having a point source (which is reciprocal to a point receiver) at or near a discretized boundary element surface. The accuracy of the original and the reciprocal problem is compared in a test case for which an analytical solution...

  19. Progress realized by numerized Eddy current checking-chains

    International Nuclear Information System (INIS)

    Guerin, F.; Blanchet, A.

    1985-01-01

    Until the last ten years , the tubes of the Steam Generators of the Nuclear Stations were inspected by means of Eddy Current with analogical checkings-chains. HBS Company has perfected a numerized checking-chain allowing transmission up to 300 m of the E.C. signals. In a near future, it will be then possible to do periodical inspections of Steam Generators from cabins located out of the reactor building [fr

  20. SOLA-LOOP analysis of a back pressure check valve

    International Nuclear Information System (INIS)

    Travis, J.R.

    1984-01-01

    The SOLA-LOOP computer code for transient, nonequilibrium, two-phase flows in networks has been coupled with a simple valve model to analyze a feedwater pipe breakage with a back-pressure check valve. Three tests from the Superheated Steam Reactor Safety Program Project (PHDR) at Kahl, West Germany, are analyzed, and the calculated transient back-pressure check valve behavior and fluid dynamics effects are found to be in excellent agreement with the experimentally measured data

  1. Model checking biological systems described using ambient calculus

    DEFF Research Database (Denmark)

    Mardare, Radu Iulian; Priami, Corrado; Qualia, Paola

    2005-01-01

    Model checking biological systems described using ambient calculus. In Proc. of the second International Workshop on Computational Methods in Systems Biology (CMSB04), Lecture Notes in Bioinformatics 3082:85-103, Springer, 2005.......Model checking biological systems described using ambient calculus. In Proc. of the second International Workshop on Computational Methods in Systems Biology (CMSB04), Lecture Notes in Bioinformatics 3082:85-103, Springer, 2005....

  2. First experiences with the LHC BLM sanity checks

    OpenAIRE

    Emery, J; Dehning, B; Effinger, E; Nordt, A; Sapinski, M G; Zamantzas, C

    2010-01-01

    The reliability concerns have driven the design of the Large Hardron Collider (LHC) Beam Loss Monitoring (BLM) system from the early stage of the studies up to the present commissioning and the latest development of diagnostic tools. To protect the system against non-conformities, new ways of automatic checking have been developed and implemented. These checks are regularly and systematically executed by the LHC operation team to ensure that the system status is after each test "as good as ne...

  3. Assessment of diagnostic methods for determining degradation of check valves

    International Nuclear Information System (INIS)

    Haynes, H.D.; Farmer, W.S.

    1992-01-01

    The Oak Ridge National Laboratory (ORNL) has carried out a comprehensive aging assessment of check valves in support of the Nuclear Plant Aging Research (NPAR) program. This paper provides a summary of the ORNL check valve aging assessment with emphasis on the identification, evaluation, and application of check valve monitoring methods and techniques. Several check valve monitoring methods are described and compared. These methods include: acoustic emission monitoring, ultrasonic inspection, magnetic flux signature analysis (MFSA), external magnetics. These diagnostic technologies were shown to be useful in determining check valve condition (e.g., disc position, disc motion, and seat leakage), although none of the methods was by itself, successful in monitoring all three condition indicators. The combination of acoustic emission with either ultrasonics or one of the magnetic technologies, however, yields a monitoring system that succeeds in providing the sensitivity to detect all major check valve operating conditions. Other areas covered in the paper include descriptions of relevant regulatory issues, utility group activities, and interactions ORNL has had with outside organizations for the purpose of disseminating research results

  4. First experiences with the LHC BLM sanity checks

    Science.gov (United States)

    Emery, J.; Dehning, B.; Effinger, E.; Nordt, A.; Sapinski, M. G.; Zamantzas, C.

    2010-12-01

    The reliability concerns have driven the design of the Large Hardron Collider (LHC) Beam Loss Monitoring (BLM) system from the early stage of the studies up to the present commissioning and the latest development of diagnostic tools. To protect the system against non-conformities, new ways of automatic checking have been developed and implemented. These checks are regularly and systematically executed by the LHC operation team to ensure that the system status is after each test "as good as new". The sanity checks are part of this strategy. They are testing the electrical part of the detectors (ionisation chamber or secondary emission detector), their cable connections to the front-end electronics, further connections to the back-end electronics and their ability to request a beam abort. During the installation and in the early commissioning phase, these checks have shown their ability to find also non-conformities caused by unexpected failure event scenarios. In every day operation, a non-conformity discovered by this check inhibits any further injections into the LHC until the check confirms the absence of non-conformities.

  5. First experiences with the LHC BLM sanity checks

    International Nuclear Information System (INIS)

    Emery, J; Dehning, B; Effinger, E; Nordt, A; Sapinski, M G; Zamantzas, C

    2010-01-01

    The reliability concerns have driven the design of the Large Hardron Collider (LHC) Beam Loss Monitoring (BLM) system from the early stage of the studies up to the present commissioning and the latest development of diagnostic tools. To protect the system against non-conformities, new ways of automatic checking have been developed and implemented. These checks are regularly and systematically executed by the LHC operation team to ensure that the system status is after each test a s good as new . The sanity checks are part of this strategy. They are testing the electrical part of the detectors (ionisation chamber or secondary emission detector), their cable connections to the front-end electronics, further connections to the back-end electronics and their ability to request a beam abort. During the installation and in the early commissioning phase, these checks have shown their ability to find also non-conformities caused by unexpected failure event scenarios. In every day operation, a non-conformity discovered by this check inhibits any further injections into the LHC until the check confirms the absence of non-conformities.

  6. First experiences with the LHC BLM sanity checks

    Energy Technology Data Exchange (ETDEWEB)

    Emery, J; Dehning, B; Effinger, E; Nordt, A; Sapinski, M G; Zamantzas, C, E-mail: Jonathan.emery@cern.ch [CERN, CH-1211 Geneve 23 (Switzerland)

    2010-12-15

    The reliability concerns have driven the design of the Large Hardron Collider (LHC) Beam Loss Monitoring (BLM) system from the early stage of the studies up to the present commissioning and the latest development of diagnostic tools. To protect the system against non-conformities, new ways of automatic checking have been developed and implemented. These checks are regularly and systematically executed by the LHC operation team to ensure that the system status is after each test {sup a}s good as new{sup .} The sanity checks are part of this strategy. They are testing the electrical part of the detectors (ionisation chamber or secondary emission detector), their cable connections to the front-end electronics, further connections to the back-end electronics and their ability to request a beam abort. During the installation and in the early commissioning phase, these checks have shown their ability to find also non-conformities caused by unexpected failure event scenarios. In every day operation, a non-conformity discovered by this check inhibits any further injections into the LHC until the check confirms the absence of non-conformities.

  7. Double checking medicines: defence against error or contributory factor?

    Science.gov (United States)

    Armitage, Gerry

    2008-08-01

    The double checking of medicines in health care is a contestable procedure. It occupies an obvious position in health care practice and is understood to be an effective defence against medication error but the process is variable and the outcomes have not been exposed to testing. This paper presents an appraisal of the process using data from part of a larger study on the contributory factors in medication errors and their reporting. Previous research studies are reviewed; data are analysed from a review of 991 drug error reports and a subsequent series of 40 in-depth interviews with health professionals in an acute hospital in northern England. The incident reports showed that errors occurred despite double checking but that action taken did not appear to investigate the checking process. Most interview participants (34) talked extensively about double checking but believed the process to be inconsistent. Four key categories were apparent: deference to authority, reduction of responsibility, automatic processing and lack of time. Solutions to the problems were also offered, which are discussed with several recommendations. Double checking medicines should be a selective and systematic procedure informed by key principles and encompassing certain behaviours. Psychological research may be instructive in reducing checking errors but the aviation industry may also have a part to play in increasing error wisdom and reducing risk.

  8. Minnesota County Boundaries - lines

    Data.gov (United States)

    Minnesota Department of Natural Resources — Minnesota county boundaries derived from a combination of 1:24,000 scale PLS lines, 1:100,000 scale TIGER, 1:100,000 scale DLG, and 1:24,000 scale hydrography lines....

  9. Boundary-Object Trimming

    DEFF Research Database (Denmark)

    Bossen, Claus; Jensen, Lotte Groth; Udsen, Flemming Witt

    2014-01-01

    implementation, which also coupled the work of medical secretaries more tightly to that of other staff, and led to task drift among professions. Medical secretaries have been relatively invisible to health informatics and CSCW, and we propose the term ‘boundary-object trimming’ to foreground and conceptualize...

  10. Minnesota County Boundaries

    Data.gov (United States)

    Minnesota Department of Natural Resources — Minnesota county boundaries derived from a combination of 1:24,000 scale PLS lines, 1:100,000 scale TIGER, 1:100,000 scale DLG, and 1:24,000 scale hydrography lines....

  11. Boundaries of the universe

    CERN Document Server

    Glasby, John S

    2013-01-01

    The boundaries of space exploration are being pushed back constantly, but the realm of the partially understood and the totally unknown is as great as ever. Among other things this book deals with astronomical instruments and their application, recent discoveries in the solar system, stellar evolution, the exploding starts, the galaxies, quasars, pulsars, the possibilities of extraterrestrial life and relativity.

  12. Lithologic boundaries from gravity and magnetic anomalies over ...

    Indian Academy of Sciences (India)

    Pramod Kumar Yadav

    2018-03-02

    Mar 2, 2018 ... nature of causative source using Euler depth solutions and radially averaged power spectrum (RAPS). Residual anomaly maps of gravity and ... the lateral boundaries and nature of the source. It seems that the source is of ..... Goldfarb R J and Richards J P,. The Economic Geology Publishing Company, pp.

  13. EPA Region 1 Sole Source Aquifers

    Data.gov (United States)

    U.S. Environmental Protection Agency — This coverage contains boundaries of EPA-approved sole source aquifers. Sole source aquifers are defined as an aquifer designated as the sole or principal source of...

  14. Conformal boundary loop models

    International Nuclear Information System (INIS)

    Jacobsen, Jesper Lykke; Saleur, Hubert

    2008-01-01

    We study a model of densely packed self-avoiding loops on the annulus, related to the Temperley-Lieb algebra with an extra idempotent boundary generator. Four different weights are given to the loops, depending on their homotopy class and whether they touch the outer rim of the annulus. When the weight of a contractible bulk loop x≡q+q -1 element of (-2,2], this model is conformally invariant for any real weight of the remaining three parameters. We classify the conformal boundary conditions and give exact expressions for the corresponding boundary scaling dimensions. The amplitudes with which the sectors with any prescribed number and types of non-contractible loops appear in the full partition function Z are computed rigorously. Based on this, we write a number of identities involving Z which hold true for any finite size. When the weight of a contractible boundary loop y takes certain discrete values, y r ≡([r+1] q )/([r] q ) with r integer, other identities involving the standard characters K r,s of the Virasoro algebra are established. The connection with Dirichlet and Neumann boundary conditions in the O(n) model is discussed in detail, and new scaling dimensions are derived. When q is a root of unity and y=y r , exact connections with the A m type RSOS model are made. These involve precise relations between the spectra of the loop and RSOS model transfer matrices, valid in finite size. Finally, the results where y=y r are related to the theory of Temperley-Lieb cabling

  15. Plasma transport near material boundaries

    International Nuclear Information System (INIS)

    Singer, C.E.

    1985-06-01

    The fluid theory of two-dimensional (2-d) plasma transport in axisymmetric devices is reviewed. The forces which produce flow across the magnetic field in a collisional plasma are described. These flows may lead to up-down asymmetries in the poloidal rotation and radial fluxes. Emphasis is placed on understanding the conditions under which the known 2-d plasma fluid equations provide a valid description of these processes. Attempts to extend the fluid treatment to less collisional, turbulent plasmas are discussed. A reduction to the 1-d fluid equations used in many computer simulations is possible when sources or boundary conditions provide a large enough radial scale length. The complete 1-d fluid equations are given in the text, and 2-d fluid equations are given in the Appendix

  16. The European Gas Market. A Reality Check

    International Nuclear Information System (INIS)

    Parmigiani, Laura

    2013-01-01

    With the approach of the 2014 deadline for the completion of a truly European liberalised energy market, there is growing concern on the adequacy of the market structure with the changed economic and geopolitical environment. Market-based and short-term approaches have been fostered for both gas and electricity markets. Energy and climate policies have therefore a primary function in designing the basic rules for these markets to develop. This study addresses two key issues related to the market design envisaged for the gas sector in Europe. The first raises questions about the adequacy of the market design proposed for the gas market with respect to security of supply. In fact, despite a higher dependence to external gas sources, the gas system has been developing all over Europe and it is becoming a key component of the European energy mix, in particular thanks to its back-up role for intermittent electricity generation and its lower content of CO 2 emissions with respect to coal. The external dimension of the gas market is thus taking a greater place in the approach to gas supply strategies. Security of supply is a key component in the gas sector and cannot be ignored in the creation of a European gas market. Moreover, the oligopolistic characteristic of the supply side has to be carefully assessed as it is well recognized that two countries (Norway and Russia) provide up to almost 60% of total external supplies. The study therefore investigates to what extent the gas market design and its implementation rules take into consideration this dimension. It will be argued that the gas target model envisaged by regulators and the EC, by aiming at increasing the number of market exchanges based on market hubs or virtual exchange points, will not significantly contribute to security of supply. On the contrary, a greater concentration could be an undesired outcome of this process. The second issue thus relates to the more practical on-going reforms that establish common

  17. Grain Boundary Segregation in Metals

    CERN Document Server

    Lejcek, Pavel

    2010-01-01

    Grain boundaries are important structural components of polycrystalline materials used in the vast majority of technical applications. Because grain boundaries form a continuous network throughout such materials, their properties may limit their practical use. One of the serious phenomena which evoke these limitations is the grain boundary segregation of impurities. It results in the loss of grain boundary cohesion and consequently, in brittle fracture of the materials. The current book deals with fundamentals of grain boundary segregation in metallic materials and its relationship to the grain boundary structure, classification and other materials properties.

  18. Reactor pressure boundary materials

    International Nuclear Information System (INIS)

    Hong, Jun Hwa; Chi, S. H.; Lee, B. S.

    2002-04-01

    With a long-term operation of nuclear power plants, the component materials are degraded under severe reactor conditions such as neutron irradiation, high temperature, high pressure and corrosive environment. It is necessary to establish the reliable and practical technologies for improving and developing the component materials and for evaluating the mechanical properties. Especially, it is very important to investigate the technologies for reactor pressure boundary materials such as reactor vessel and pipings in accordance with their critical roles. Therefore, this study was focused on developing and advancing the microstructural/micro-mechanical evaluation technologies, and on evaluating the neutron irradiation characteristics and radiation effects analysis technology of the reactor pressure boundary materials, and also on establishing a basis of nuclear material property database

  19. Temperature jump boundary conditions in radiation diffusion

    International Nuclear Information System (INIS)

    Alonso, C.T.

    1976-12-01

    The radiation diffusion approximation greatly simplifies radiation transport problems. Yet the application of this method has often been unnecessarily restricted to optically thick regions, or has been extended through the use of such ad hoc devices as flux limiters. The purpose of this paper is to review and draw attention to the use of the more physically appropriate temperature jump boundary conditions for extending the range of validity of the diffusion approximation. Pioneering work has shown that temperature jump boundary conditions remove the singularity in flux that occurs in ordinary diffusion at small optical thicknesses. In this review paper Deissler's equations for frequency-dependent jump boundary conditions are presented and specific geometric examples are calculated analytically for steady state radiation transfer. When jump boundary conditions are applied to radiation diffusion, they yield exact solutions which are naturally flux- limited and geometry-corrected. We believe that the presence of temperature jumps on source boundaries is probably responsible in some cases for the past need for imposing ad hoc flux-limiting constraints on pure diffusion solutions. The solution for transfer between plane slabs, which is exact to all orders of optical thickness, also provides a useful tool for studying the accuracy of computer codes

  20. Estimated emission reductions from California's enhanced Smog Check program.

    Science.gov (United States)

    Singer, Brett C; Wenzel, Thomas P

    2003-06-01

    The U.S. Environmental Protection Agency requires that states evaluate the effectiveness of their vehicle emissions inspection and maintenance (I/M) programs. This study demonstrates an evaluation approach that estimates mass emission reductions over time and includes the effect of I/M on vehicle deterioration. It includes a quantitative assessment of benefits from pre-inspection maintenance and repairs and accounts for the selection bias effect that occurs when intermittent high emitters are tested. We report estimates of one-cycle emission benefits of California's Enhanced Smog Check program, ca. 1999. Program benefits equivalent to metric tons per day of prevented emissions were calculated with a "bottom-up" approach that combined average per vehicle reductions in mass emission rates (g/gal) with average per vehicle activity, resolved by model year. Accelerated simulation mode test data from the statewide vehicle information database (VID) and from roadside Smog Check testing were used to determine 2-yr emission profiles of vehicles passing through Smog Check and infer emission profiles that would occur without Smog Check. The number of vehicles participating in Smog Check was also determined from the VID. We estimate that in 1999 Smog Check reduced tailpipe emissions of HC, CO, and NO(x) by 97, 1690, and 81 t/d, respectively. These correspond to 26, 34, and 14% of the HC, CO, and NO(x) that would have been emitted by vehicles in the absence of Smog Check. These estimates are highly sensitive to assumptions about vehicle deterioration in the absence of Smog Check. Considering the estimated uncertainty in these assumptions yields a range for calculated benefits: 46-128 t/d of HC, 860-2200 t/d of CO, and 60-91 t/d of NO(x). Repair of vehicles that failed an initial, official Smog Check appears to be the most important mechanism of emission reductions, but pre-inspection maintenance and repair also contributed substantially. Benefits from removal of nonpassing

  1. Remote preenrollment checking of consent forms to reduce nonconformity.

    Science.gov (United States)

    Journot, Valérie; Pérusat-Villetorte, Sophie; Bouyssou, Caroline; Couffin-Cadiergues, Sandrine; Tall, Aminata; Chêne, Geneviève

    2013-01-01

    In biomedical research, the signed consent form must be checked for compliance with regulatory requirements. Checking usually is performed on site, most frequently after a participant's final enrollment. We piloted a procedure for remote preenrollment consent forms checking. We applied it in five trials and assessed its efficiency to reduce form nonconformity before participant enrollment. Our clinical trials unit (CTU) routinely uses a consent form with an additional copy that contains a pattern that partially masks the participant's name and signature. After completion and signatures by the participant and investigator, this masked copy is faxed to the CTU for checking. In case of detected nonconformity, the CTU suspends the participant's enrollment until the form is brought into compliance. We checked nonconformities of consent forms both remotely before enrollment and on site in five trials conducted in our CTU. We tabulated the number and nature of nonconformities by location of detection: at the CTU or on site. We used these data for a pseudo before-and-after analysis and estimated the efficiency of this remote checking procedure in terms of reduction of nonconformities before enrollment as compared to the standard on-site checking procedure. We searched for nonconformity determinants among characteristics of trials, consent forms, investigator sites, and participants through multivariate logistic regression so as to identify opportunities for improvement in our procedure. Five trials, starting sequentially but running concurrently, with remote preenrollment and on-site checking of consent forms from 415 participants screened in 2006-2009 led to 518 consent forms checked; 94 nonconformities were detected in 75 forms, 75 (80%) remotely and 19 more (20%) on site. Nonconformities infrequently concerned dates of signatures (7%) and information about participants (12%). Most nonconformities dealt with investigator information (76%), primarily contact information

  2. Grain Boundary Complexions

    Science.gov (United States)

    2014-05-01

    Cantwell et al. / Acta Materialia 62 (2014) 1–48 challenging from a scientific perspective, but it can also be very technologically rewarding , given the...energy) is a competing explanation that remains to be explored. Strategies to drive the grain boundary energy toward zero have produced some success...Thompson AM, Soni KK, Chan HM, Harmer MP, Williams DB, Chabala JM, et al. J Am Ceram Soc 1997;80:373. [172] Behera SK. PhD dissertation, Materials Science

  3. Boundary-layer theory

    CERN Document Server

    Schlichting (Deceased), Hermann

    2017-01-01

    This new edition of the near-legendary textbook by Schlichting and revised by Gersten presents a comprehensive overview of boundary-layer theory and its application to all areas of fluid mechanics, with particular emphasis on the flow past bodies (e.g. aircraft aerodynamics). The new edition features an updated reference list and over 100 additional changes throughout the book, reflecting the latest advances on the subject.

  4. Intelligent Data Visualization for Cross-Checking Spacecraft System Diagnosis

    Science.gov (United States)

    Ong, James C.; Remolina, Emilio; Breeden, David; Stroozas, Brett A.; Mohammed, John L.

    2012-01-01

    Any reasoning system is fallible, so crew members and flight controllers must be able to cross-check automated diagnoses of spacecraft or habitat problems by considering alternate diagnoses and analyzing related evidence. Cross-checking improves diagnostic accuracy because people can apply information processing heuristics, pattern recognition techniques, and reasoning methods that the automated diagnostic system may not possess. Over time, cross-checking also enables crew members to become comfortable with how the diagnostic reasoning system performs, so the system can earn the crew s trust. We developed intelligent data visualization software that helps users cross-check automated diagnoses of system faults more effectively. The user interface displays scrollable arrays of timelines and time-series graphs, which are tightly integrated with an interactive, color-coded system schematic to show important spatial-temporal data patterns. Signal processing and rule-based diagnostic reasoning automatically identify alternate hypotheses and data patterns that support or rebut the original and alternate diagnoses. A color-coded matrix display summarizes the supporting or rebutting evidence for each diagnosis, and a drill-down capability enables crew members to quickly view graphs and timelines of the underlying data. This system demonstrates that modest amounts of diagnostic reasoning, combined with interactive, information-dense data visualizations, can accelerate system diagnosis and cross-checking.

  5. Independent checks of linear accelerators equipped with multileaf collimators

    International Nuclear Information System (INIS)

    Pavlikova, I.; Ekendahl, D.; Horakova, I.

    2005-01-01

    National Radiation Protection Institute (NRPI) provides independent checks of therapeutic equipment as a part of state supervision. In the end of 2003, the audit was broaden for linear accelerators equipped with multileaf collimators (MLC). NRPI provides TLD postal audits and on-site independent checks. This contribution describes tests for multileaf collimators and intensity modulated radiation therapy (IMRT) technique that are accomplished within the independent on-site check of linear accelerators. The character and type of tests that are necessary to pursue for multileaf collimator depends on application technique. There are three basic application of the MLC. The first we call 'static MLC' and it serves for replacing conventional blocking or for adjusting the field shape to match the beam's-eye view projection of a planning target volume during an arc rotation of the x-ray beam. This procedure is called conformal radiotherapy. The most advanced technique with MLC is intensity modulated radiation therapy. The dose can be delivered to the patient with IMRT in various different ways: dynamic MLC, segmented MLC and IMRT arc therapy. Independent audits represent an important instrument of quality assurance. Methodology for independent check of static MLC was successfully verified on two types of accelerators: Varian and Elekta. Results from pilot measurements with dynamic MLC imply that the methodology is applicable for Varian accelerators. In the future, the experience with other types of linear accelerators will contribute to renovation, modification, and broaden independent checks methodology. (authors)

  6. Model Checking Temporal Logic Formulas Using Sticker Automata

    Science.gov (United States)

    Feng, Changwei; Wu, Huanmei

    2017-01-01

    As an important complex problem, the temporal logic model checking problem is still far from being fully resolved under the circumstance of DNA computing, especially Computation Tree Logic (CTL), Interval Temporal Logic (ITL), and Projection Temporal Logic (PTL), because there is still a lack of approaches for DNA model checking. To address this challenge, a model checking method is proposed for checking the basic formulas in the above three temporal logic types with DNA molecules. First, one-type single-stranded DNA molecules are employed to encode the Finite State Automaton (FSA) model of the given basic formula so that a sticker automaton is obtained. On the other hand, other single-stranded DNA molecules are employed to encode the given system model so that the input strings of the sticker automaton are obtained. Next, a series of biochemical reactions are conducted between the above two types of single-stranded DNA molecules. It can then be decided whether the system satisfies the formula or not. As a result, we have developed a DNA-based approach for checking all the basic formulas of CTL, ITL, and PTL. The simulated results demonstrate the effectiveness of the new method. PMID:29119114

  7. Deployment of check-in nodes in complex networks

    Science.gov (United States)

    Jiang, Zhong-Yuan; Ma, Jian-Feng

    2017-01-01

    In many real complex networks such as the city road networks and highway networks, vehicles often have to pass through some specially functioned nodes to receive check-in like services such as gas supplement at gas stations. Based on existing network structures, to guarantee every shortest path including at least a check-in node, the location selection of all check-in nodes is very essential and important to make vehicles to easily visit these check-in nodes, and it is still remains an open problem in complex network studies. In this work, we aim to find possible solutions for this problem. We first convert it into a set cover problem which is NP-complete and propose to employ the greedy algorithm to achieve an approximate result. Inspired by heuristic information of network structure, we discuss other four check-in node location deployment methods including high betweenness first (HBF), high degree first (HDF), random and low degree first (LDF). Finally, we compose extensive simulations in classical scale-free networks, random networks and real network models, and the results can well confirm the effectiveness of the greedy algorithm. This work has potential applications into many real networks.

  8. FIZCON, ENDF/B Cross-Sections Redundancy Check

    International Nuclear Information System (INIS)

    Dunford, Charles L.

    2007-01-01

    1 - Description of program or function: FIZCON is a program for checking that an evaluated data file has valid data and conforms to recommended procedures. Version 7.01 (April 2005): set success flag after return from beginning; fixed valid level check for an isomer; fixed subsection energy range test in ckf9; changed lower limit on potential scattering test; fixed error in j-value test when l=0 and i=0; added one more significant figure to union grid check and sum up output messages; partial fission cross sections mt=19,20,21 and 38 did not require secondary energy distributions in file 5; corrected product test for elastic scattering; moved potential scattering test to psyche. Version 7.02 (May 2005): Fixed resonance parameter sum test. 2 - Method of solution: FIZCON can recognise the difference between ENDF-6 and ENDF-5 formats and performs its tests accordingly. Some of the tests performed include: data arrays are in increasing energy order; resonance parameter widths add up to the total; Q-values are reasonable and consistent; no required sections are missing and all cover the proper energy range; secondary distributions are normalized to 1.0; energy conservation in decay spectra. Optional tests can be performed to check the redundant cross sections, and algorithms can be used to check for possible incorrect entry of data values (Deviant Point test)

  9. A voice-actuated wind tunnel model leak checking system

    Science.gov (United States)

    Larson, William E.

    1989-01-01

    A computer program has been developed that improves the efficiency of wind tunnel model leak checking. The program uses a voice recognition unit to relay a technician's commands to the computer. The computer, after receiving a command, can respond to the technician via a voice response unit. Information about the model pressure orifice being checked is displayed on a gas-plasma terminal. On command, the program records up to 30 seconds of pressure data. After the recording is complete, the raw data and a straight line fit of the data are plotted on the terminal. This allows the technician to make a decision on the integrity of the orifice being checked. All results of the leak check program are stored in a database file that can be listed on the line printer for record keeping purposes or displayed on the terminal to help the technician find unchecked orifices. This program allows one technician to check a model for leaks instead of the two or three previously required.

  10. The Atmospheric Boundary Layer

    Science.gov (United States)

    Garratt, J. R.

    1994-05-01

    A comprehensive and lucid account of the physics and dynamics of the lowest one to two kilometers of the Earth's atmosphere in direct contact with the Earth's surface, known as the atmospheric boundary layer (ABL). Dr. Garratt emphasizes the application of the ABL problems to numerical modeling of the climate, which makes this book unique among recent texts on the subject. He begins with a brief introduction to the ABL before leading to the development of mean and turbulence equations and the many scaling laws and theories that are the cornerstone of any serious ABL treatment. Modeling of the ABL is crucially dependent for its realism on the surface boundary conditions, so chapters four and five deal with aerodynamic and energy considerations, with attention given to both dry and wet land surfaces and the sea. The author next treats the structure of the clear-sky, thermally stratified ABL, including the convective and stable cases over homogeneous land, the marine ABL, and the internal boundary layer at the coastline. Chapter seven then extends this discussion to the cloudy ABL. This is particularly relevant to current research because the extensive stratocumulus regions over the subtropical oceans and stratus regions over the Arctic have been identified as key players in the climate system. In the final chapters, Dr. Garratt summarizes the book's material by discussing appropriate ABL and surface parameterization schemes in general circulation models of the atmosphere that are being used for climate stimulation.

  11. Regional boundaries study

    International Nuclear Information System (INIS)

    Zavatsky, S.; Phaneuf, P.; Topaz, D.; Ward, D.

    1978-02-01

    The NRC Office of Inspection and Enforcement (IE) has elected to evaluate the effectiveness and efficiency of its existing regional boundary alignment because of the anticipated future growth of nuclear power generating facilities and corresponding inspection requirements. This report documents a management study designed to identify, analyze, and evaluate alternative regional boundary configurations for the NRC/IE regions. Eight boundary configurations were chosen for evaluation. These configurations offered alternatives ranging from two to ten regions, and some included the concepts of subregional or satellite offices. Each alternative configuration was evaluated according to three major criteria: project workload, cost, and office location. Each major criterion included elements such as management control, program uniformity, disruption, costs, and coordination with other agencies. The conclusion reached was that regional configurations with regions of equal and relatively large workloads, combined with the concepts of subregional or satellite offices, may offer a significant benefit to the Office of Inspection and Enforcement and the Commission and are worthy of further study. A phased implementation plan, which is suitable to some configurations, may help mitigate the disruption created by realignment

  12. Shared care and boundaries:

    DEFF Research Database (Denmark)

    Winthereik, Brit Ross

    2008-01-01

    Purpose – The paper seeks to examine how an online maternity record involving pregnant women worked as a means to create shared maternity care. Design/methodology/approach – Ethnographic techniques have been used. The paper adopts a theoretical/methodological framework based on science and techno......Purpose – The paper seeks to examine how an online maternity record involving pregnant women worked as a means to create shared maternity care. Design/methodology/approach – Ethnographic techniques have been used. The paper adopts a theoretical/methodological framework based on science...... and technology studies. Findings – The paper shows how a version of “the responsible patient” emerges from the project which is different from the version envisioned by the project organisation. The emerging one is concerned with the boundary between primary and secondary sector care, and not with the boundary......, IT designers and project managers should attend to the specific ways in which boundaries are inevitably enacted and to the ways in which care is already shared. This will provide them with opportunities to use the potentials of new identities and concerns that emerge from changing the organisation...

  13. The use of check valve performance data to support new concepts (probabilistic risk assessment, condition monitoring) for check valve program

    Energy Technology Data Exchange (ETDEWEB)

    Hart, K.A.; Gower, D.

    1996-12-01

    The concept of developing an integrated check valve database based on the Nuclear Power Reliability Data System (NPRDS) data was presented at the last Symposium. The Nuclear Industry Check Valve Group (NIC), working in cooperation with the Oak Ridge National Laboratory (ORNL), has completed an operational database of check valve performance from 1984 to the present. NIC has committed to the nuclear industry to periodically update the data and maintain this information accessible. As the new concepts of probabilistic risk analysis and condition monitoring are integrated into the American Society of Mechanical Engineers (ASME) Code, a critical element will be performance data. From check valve performance data, feasible failure modes and rates can be established. When a failure rate or frequency of failures can be established based on a significant enough population (sampling), a more solid foundation for focusing resources and determining appropriate frequencies and testing can be determined. The presentation will give the updated status of the NIC Check Valve Performance Database covering (1) methodology used to combine the original ORNL data; (2) process/controls established for continuing update and refinement of the data; (3) discussion of how this data is being utilized by (a) OM-22 for condition monitoring, and (b) risk-based inservice testing work of Westinghouse Owners` Group; and (4) results/trends of data evaluations. At the 1994 Symposium, ORNL provided an update as of 1991 to their original work of 1984 -1990 which they had performed to characterize check valve degradations and failures in the nuclear industry. These characterizations will be updated to 1995 and additional reviews provided to give insight into the current condition and trends of check valve performance.

  14. The use of check valve performance data to support new concepts (probabilistic risk assessment, condition monitoring) for check valve program

    International Nuclear Information System (INIS)

    Hart, K.A.; Gower, D.

    1996-01-01

    The concept of developing an integrated check valve database based on the Nuclear Power Reliability Data System (NPRDS) data was presented at the last Symposium. The Nuclear Industry Check Valve Group (NIC), working in cooperation with the Oak Ridge National Laboratory (ORNL), has completed an operational database of check valve performance from 1984 to the present. NIC has committed to the nuclear industry to periodically update the data and maintain this information accessible. As the new concepts of probabilistic risk analysis and condition monitoring are integrated into the American Society of Mechanical Engineers (ASME) Code, a critical element will be performance data. From check valve performance data, feasible failure modes and rates can be established. When a failure rate or frequency of failures can be established based on a significant enough population (sampling), a more solid foundation for focusing resources and determining appropriate frequencies and testing can be determined. The presentation will give the updated status of the NIC Check Valve Performance Database covering (1) methodology used to combine the original ORNL data; (2) process/controls established for continuing update and refinement of the data; (3) discussion of how this data is being utilized by (a) OM-22 for condition monitoring, and (b) risk-based inservice testing work of Westinghouse Owners' Group; and (4) results/trends of data evaluations. At the 1994 Symposium, ORNL provided an update as of 1991 to their original work of 1984 -1990 which they had performed to characterize check valve degradations and failures in the nuclear industry. These characterizations will be updated to 1995 and additional reviews provided to give insight into the current condition and trends of check valve performance

  15. Cell boundary fault detection system

    Science.gov (United States)

    Archer, Charles Jens [Rochester, MN; Pinnow, Kurt Walter [Rochester, MN; Ratterman, Joseph D [Rochester, MN; Smith, Brian Edward [Rochester, MN

    2009-05-05

    A method determines a nodal fault along the boundary, or face, of a computing cell. Nodes on adjacent cell boundaries communicate with each other, and the communications are analyzed to determine if a node or connection is faulty.

  16. Model Checking Timed Automata with Priorities using DBM Subtraction

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Pettersson, Paul

    2006-01-01

    In this paper we describe an extension of timed automata with priorities, and efficient algorithms to compute subtraction on DBMs (difference bounded matrices), needed in symbolic model-checking of timed automata with priorities. The subtraction is one of the few operations on DBMs that result...... in a non-convex set needing sets of DBMs for representation. Our subtraction algorithms are efficient in the sense that the number of generated DBMs is significantly reduced compared to a naive algorithm. The overhead in time is compensated by the gain from reducing the number of resulting DBMs since...... this number affects the performance of symbolic model-checking. The uses of the DBM subtraction operation extend beyond timed automata with priorities. It is also useful for allowing guards on transitions with urgent actions, deadlock checking, and timed games....

  17. CheckMATE 2: From the model to the limit

    Science.gov (United States)

    Dercks, Daniel; Desai, Nishita; Kim, Jong Soo; Rolbiecki, Krzysztof; Tattersall, Jamie; Weber, Torsten

    2017-12-01

    We present the latest developments to the CheckMATE program that allows models of new physics to be easily tested against the recent LHC data. To achieve this goal, the core of CheckMATE now contains over 60 LHC analyses of which 12 are from the 13 TeV run. The main new feature is that CheckMATE 2 now integrates the Monte Carlo event generation via MadGraph5_aMC@NLO and Pythia 8. This allows users to go directly from a SLHA file or UFO model to the result of whether a model is allowed or not. In addition, the integration of the event generation leads to a significant increase in the speed of the program. Many other improvements have also been made, including the possibility to now combine signal regions to give a total likelihood for a model.

  18. Schedulability of Herschel revisited using statistical model checking

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel

    2015-01-01

    -approximation technique. We can safely conclude that the system is schedulable for varying values of BCET. For the cases where deadlines are violated, we use polyhedra to try to confirm the witnesses. Our alternative method to confirm non-schedulability uses statistical model-checking (SMC) to generate counter...... and blocking times of tasks. Consequently, the method may falsely declare deadline violations that will never occur during execution. This paper is a continuation of previous work of the authors in applying extended timed automata model checking (using the tool UPPAAL) to obtain more exact schedulability...... analysis, here in the presence of non-deterministic computation times of tasks given by intervals [BCET,WCET]. Computation intervals with preemptive schedulers make the schedulability analysis of the resulting task model undecidable. Our contribution is to propose a combination of model checking techniques...

  19. Radiotherapy treatment checking procedures throughout Australasia: results of a survey

    International Nuclear Information System (INIS)

    Duggan, L.; Kron, T.; Howlett, S.

    1996-01-01

    In July 1995, a questionnaire was forwarded to thirty two physicists overseeing Radiation Oncology Departments and brachytherapy in hospitals throughout Australia and New Zealand. From the thirty seven hospitals reached by this survey, details were gathered on thirty hospitals, including the Newcastle In most radiotherapy centres where treatment planning is performed by radiation therapists, at least some of the treatment sheets and their calculations are double checked by radiotherapy physicists. While 23% checked the treatment sheets of all patients, in the majority of centres physicists were found to check only a minor selection, that is, less than 20% of all treatment sheets. Only in six centres physicists were not involved. 5 refs., 4 tabs., 5 figs

  20. System for automatic checking of nuclear radiation detectors of sparkle type

    International Nuclear Information System (INIS)

    Gutierrez O, E.; Vilchis P, A.; Romero G, M.; Torres B, M.A.; Garcia H, J.M.

    2001-01-01

    In this work an automatic system of checking of nuclear detectors of sparkle type is described. This system is used in laboratory for the checking of the parameters which define the reliable operation of each detector, also it compares the obtained results with those proportionated by the manufacturer for the operator can emit the acceptance or rejection criteria. The checking system consists of an acquisition data card with a digital signal processor (DSP) as central device, a programmable high voltage source and an insertion and conversion module. These components interact with a personal computer to provide to the operator the energy spectra, the nuclear pulse form and the merit figure. The obtained results are showed in graphic form and/or numerical values and it is possible store them in a data file and/or in printed form. For facilitating the interaction of the computer with the user, the system software was realized with a commercial language of graphic programming (virtual instrumentation). (Author)

  1. Diagnosis checking of statistical analysis in RCTs indexed in PubMed.

    Science.gov (United States)

    Lee, Paul H; Tse, Andy C Y

    2017-11-01

    Statistical analysis is essential for reporting of the results of randomized controlled trials (RCTs), as well as evaluating their effectiveness. However, the validity of a statistical analysis also depends on whether the assumptions of that analysis are valid. To review all RCTs published in journals indexed in PubMed during December 2014 to provide a complete picture of how RCTs handle assumptions of statistical analysis. We reviewed all RCTs published in December 2014 that appeared in journals indexed in PubMed using the Cochrane highly sensitive search strategy. The 2014 impact factors of the journals were used as proxies for their quality. The type of statistical analysis used and whether the assumptions of the analysis were tested were reviewed. In total, 451 papers were included. Of the 278 papers that reported a crude analysis for the primary outcomes, 31 (27·2%) reported whether the outcome was normally distributed. Of the 172 papers that reported an adjusted analysis for the primary outcomes, diagnosis checking was rarely conducted, with only 20%, 8·6% and 7% checked for generalized linear model, Cox proportional hazard model and multilevel model, respectively. Study characteristics (study type, drug trial, funding sources, journal type and endorsement of CONSORT guidelines) were not associated with the reporting of diagnosis checking. The diagnosis of statistical analyses in RCTs published in PubMed-indexed journals was usually absent. Journals should provide guidelines about the reporting of a diagnosis of assumptions. © 2017 Stichting European Society for Clinical Investigation Journal Foundation.

  2. Forgetting what you have checked: a link between working memory impairment and checking behaviors in obsessive-compulsive disorder.

    Science.gov (United States)

    Jaafari, N; Frasca, M; Rigalleau, F; Rachid, F; Gil, R; Olié, J-P; Guehl, D; Burbaud, P; Aouizerate, B; Rotgé, J-Y; Vibert, N

    2013-02-01

    Compulsive checking behaviors are common in obsessive-compulsive disorder (OCD). Several authors have suggested that these checking rituals could be related to memory deficits. Our aim was to test whether patients with OCD show working memory impairment in relation to their checking behavior. We evaluated the verbal and visuospatial components of patients' and controls' working memory using the reading span and backward location span tests. Checking behaviors were measured by recording participants' eye movements during an image comparison task using a non-invasive, infra-red TOBII 1750 eyetracker. Participants were seated, head-free, in a natural position in front of the eyetracker screen where the images were displayed. Patients with OCD made more gaze moves to compare images than controls. Both patients' working memory spans were reduced, and the patients' deficit in the comparison task was negatively related to their working memory spans. This work demonstrates that checking behavior in OCD is linked to a general reduction of the patients' verbal and visuospatial working memory span. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  3. Perencanaan Check Dam Sungai Glugu Kabupaten Grobogan, Jawa Tengah

    OpenAIRE

    Kusuma, Abhibawa Tegar; Wijayanti, Deny; Atmojo, Pranoto Sapto; Edhisono, Sutarto

    2015-01-01

    Glugu River is a tributary of the Lusi River under the authority of the Central River Region Pemali - Juana, precisely located in the administrative area of the Grobogan Regency. Location of Glugu River located upstream, gave effect to the degradation of the river channel, so as to stabilize the river flow necessary to design coservation structure on Glugu River, that is check dam.The data used for design check dam are the primary data (geotechnical, geometry Glugu River, and water when the f...

  4. Stochastic Local Search for Core Membership Checking in Hedonic Games

    Science.gov (United States)

    Keinänen, Helena

    Hedonic games have emerged as an important tool in economics and show promise as a useful formalism to model multi-agent coalition formation in AI as well as group formation in social networks. We consider a coNP-complete problem of core membership checking in hedonic coalition formation games. No previous algorithms to tackle the problem have been presented. In this work, we overcome this by developing two stochastic local search algorithms for core membership checking in hedonic games. We demonstrate the usefulness of the algorithms by showing experimentally that they find solutions efficiently, particularly for large agent societies.

  5. Error Checking for Chinese Query by Mining Web Log

    Directory of Open Access Journals (Sweden)

    Jianyong Duan

    2015-01-01

    Full Text Available For the search engine, error-input query is a common phenomenon. This paper uses web log as the training set for the query error checking. Through the n-gram language model that is trained by web log, the queries are analyzed and checked. Some features including query words and their number are introduced into the model. At the same time data smoothing algorithm is used to solve data sparseness problem. It will improve the overall accuracy of the n-gram model. The experimental results show that it is effective.

  6. A procedure for routine radiation protection checking of mammography equipment

    International Nuclear Information System (INIS)

    Bengtsson, L.G.; Lundehn, I.

    1980-01-01

    A procedure was developed for checking of mammography equipment used in screening for mammary cancer. The procedure will be handled by hospital physicists or x-ray inspectors and is intended to permit checking of x-ray equipment performance as well as evaluation of mean dose or eneray imparted to groups of patients. Measurement methods studied involve TLD, ionization chambers and a new plastic scintillator designed to measure energy imparted. After careful study of sizes and attenuation properties of breasts, a 50 mm polymethylmetacrylate phantom seemed the most appropriate. The choice of measuring equipment is reported as well as some preliminary results from field measurements. (author)

  7. Automation of Geometry Input for Building Code Compliance Check

    DEFF Research Database (Denmark)

    Petrova, Ekaterina Aleksandrova; Johansen, Peter Lind; Jensen, Rasmus Lund

    2017-01-01

    Documentation of compliance with the energy performance regulations at the end of the detailed design phase is mandatory for building owners in Denmark. Therefore, besides multidisciplinary input, the building design process requires various iterative analyses, so that the optimal solutions can...... be identified amongst multiple alternatives. However, meeting performance criteria is often associated with manual data inputs and retroactive modifications of the design. Due to poor interoperability between the authoring tools and the compliance check program, the processes are redundant and inefficient...... from building geometry created in Autodesk Revit and its translation to input for compliance check analysis....

  8. Symbolic Dependency Graphs for PCTL Model-Checking

    DEFF Research Database (Denmark)

    Mariegaard, Anders; Larsen, Kim Guldstrand

    2017-01-01

    We consider the problem of model-checking a subset of probabilistic CTL, interpreted over (discrete-time) Markov reward models, allowing the specification of lower bounds on the probability of the set of paths satisfying a cost-bounded path formula. We first consider a reduction to fixed-point co......We consider the problem of model-checking a subset of probabilistic CTL, interpreted over (discrete-time) Markov reward models, allowing the specification of lower bounds on the probability of the set of paths satisfying a cost-bounded path formula. We first consider a reduction to fixed...

  9. An influence of extremal edges on boundary extension.

    Science.gov (United States)

    Hale, Ralph G; Brown, James M; McDunn, Benjamin A; Siddiqui, Aisha P

    2015-08-01

    Studies have shown that people consistently remember seeing more of a studied scene than was physically present (e.g., Intraub & Richardson Journal of Experimental Psychology: Learning, Memory, and Cognition, 15, 179-187, 1989). This scene memory error, known as boundary extension, has been suggested to occur due to an observer's failure to differentiate between the contributing sources of information, including the sensory input, amodal continuation beyond the view boundaries, and contextual associations with the main objects and depicted scene locations (Intraub, 2010). Here, "scenes" made of abstract shapes on random-dot backgrounds, previously shown to elicit boundary extension (McDunn, Siddiqui, & Brown Psychonomic Bulletin & Review, 21, 370-375, 2014), were compared with versions made with extremal edges (Palmer & Ghose Psychological Science, 19, 77-84, 2008) added to their borders, in order to examine how boundary extension is influenced when amodal continuation at the borders' view boundaries is manipulated in this way. Extremal edges were expected to reduce boundary extension as compared to the same scenes without them, because extremal edge boundaries explicitly indicate an image's end (i.e., they do not continue past the view boundary). A large and a small difference (16 % and 40 %) between the close and wide-angle views shown during the experiment were tested to examine the effects of both boundary extension and normalization with and without extremal edges. Images without extremal edges elicited typical boundary extension for the 16 % size change condition, whereas the 40 % condition showed signs of normalization. With extremal edges, a reduced amount of boundary extension occurred for the 16 % condition, and only normalization was found for the 40 % condition. Our findings support and highlight the importance of amodal continuation at the view boundaries as a component of boundary extension.

  10. Photonic entanglement-assisted quantum low-density parity-check encoders and decoders.

    Science.gov (United States)

    Djordjevic, Ivan B

    2010-05-01

    I propose encoder and decoder architectures for entanglement-assisted (EA) quantum low-density parity-check (LDPC) codes suitable for all-optical implementation. I show that two basic gates needed for EA quantum error correction, namely, controlled-NOT (CNOT) and Hadamard gates can be implemented based on Mach-Zehnder interferometer. In addition, I show that EA quantum LDPC codes from balanced incomplete block designs of unitary index require only one entanglement qubit to be shared between source and destination.

  11. Dual boundary spanning

    DEFF Research Database (Denmark)

    Li-Ying, Jason

    2016-01-01

    The extant literature runs short in understanding openness of innovation regarding and the different pathways along which internal and external knowledge resources can be combined. This study proposes a unique typology for outside-in innovations based on two distinct ways of boundary spanning......: whether an innovation idea is created internally or externally and whether an innovation process relies on external knowledge resources. This yields four possible types of innovation, which represent the nuanced variation of outside-in innovations. Using historical data from Canada for 1945...

  12. A non-local computational boundary condition for duct acoustics

    Science.gov (United States)

    Zorumski, William E.; Watson, Willie R.; Hodge, Steve L.

    1994-01-01

    A non-local boundary condition is formulated for acoustic waves in ducts without flow. The ducts are two dimensional with constant area, but with variable impedance wall lining. Extension of the formulation to three dimensional and variable area ducts is straightforward in principle, but requires significantly more computation. The boundary condition simulates a nonreflecting wave field in an infinite duct. It is implemented by a constant matrix operator which is applied at the boundary of the computational domain. An efficient computational solution scheme is developed which allows calculations for high frequencies and long duct lengths. This computational solution utilizes the boundary condition to limit the computational space while preserving the radiation boundary condition. The boundary condition is tested for several sources. It is demonstrated that the boundary condition can be applied close to the sound sources, rendering the computational domain small. Computational solutions with the new non-local boundary condition are shown to be consistent with the known solutions for nonreflecting wavefields in an infinite uniform duct.

  13. Information dynamics of boundary perception

    DEFF Research Database (Denmark)

    Kragness, Haley; Hansen, Niels Christian; Vuust, Peter

    It has long been noted that expert musicians lengthen notes at phrase boundaries in expressive performance. Recently, we have extended research on this phenomenon by showing that undergraduates with no formal musical training and children as young as 3 years lengthen phrase boundaries during self...... uncertain than low-entropy contexts. Because phrase boundaries tend to afford high-entropy continuations, thus generating uncertain expectations in the listener, one possibility is that boundary perception is directly related to entropy. In other words, it may be hypothesized that entropy underlies...... on predictive uncertainty to the timing domain, as well as potentially answer key questions relating to boundary perception in musical listening....

  14. 31 CFR 240.15 - Checks issued to deceased payees.

    Science.gov (United States)

    2010-07-01

    ...) Handling of checks when an executor or administrator has been appointed. (1) An executor or administrator.... securities; payments for tax refunds; and payments for goods and services. (i) An executor or administrator... the executor or administrator is indorsing. An example would be: “John Jones by Mary Jones, executor...

  15. modelling of queuing process at airport check-in system

    African Journals Online (AJOL)

    HOD

    Key words: Airport check-in system, discrete time events, analytical models, simulation model, SimEvents toolbox. 1. ..... [6] Gross, D. and Harris, C. M. Fundamentals of. Queueing ... [11] Manataki I. E. and Zogra os K. G. “A Generic. System ...

  16. Bayesian inference with information content model check for Langevin equations

    DEFF Research Database (Denmark)

    Krog, Jens F. C.; Lomholt, Michael Andersen

    2017-01-01

    The Bayesian data analysis framework has been proven to be a systematic and effective method of parameter inference and model selection for stochastic processes. In this work we introduce an information content model check which may serve as a goodness-of-fit, like the chi-square procedure...

  17. 17 CFR 230.419 - Offerings by blank check companies.

    Science.gov (United States)

    2010-04-01

    ... derivative securities relating to securities held in the escrow or trust account may be exercised or... other derivative securities issued in the initial offering are exercisable, there is a continuous... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Offerings by blank check...

  18. Financial Record Checking in Surveys: Do Prompts Improve Data Quality?

    Science.gov (United States)

    Murphy, Joe; Rosen, Jeffrey; Richards, Ashley; Riley, Sarah; Peytchev, Andy; Lindblad, Mark

    2016-01-01

    Self-reports of financial information in surveys, such as wealth, income, and assets, are particularly prone to inaccuracy. We sought to improve the quality of financial information captured in a survey conducted by phone and in person by encouraging respondents to check records when reporting on income and assets. We investigated whether…

  19. Consistency checks in beam emission modeling for neutral beam injectors

    International Nuclear Information System (INIS)

    Punyapu, Bharathi; Vattipalle, Prahlad; Sharma, Sanjeev Kumar; Baruah, Ujjwal Kumar; Crowley, Brendan

    2015-01-01

    In positive neutral beam systems, the beam parameters such as ion species fractions, power fractions and beam divergence are routinely measured using Doppler shifted beam emission spectrum. The accuracy with which these parameters are estimated depend on the accuracy of the atomic modeling involved in these estimations. In this work, an effective procedure to check the consistency of the beam emission modeling in neutral beam injectors is proposed. As a first consistency check, at a constant beam voltage and current, the intensity of the beam emission spectrum is measured by varying the pressure in the neutralizer. Then, the scaling of measured intensity of un-shifted (target) and Doppler shifted intensities (projectile) of the beam emission spectrum at these pressure values are studied. If the un-shifted component scales with pressure, then the intensity of this component will be used as a second consistency check on the beam emission modeling. As a further check, the modeled beam fractions and emission cross sections of projectile and target are used to predict the intensity of the un-shifted component and then compared with the value of measured target intensity. An agreement between the predicted and measured target intensities provide the degree of discrepancy in the beam emission modeling. In order to test this methodology, a systematic analysis of Doppler shift spectroscopy data obtained on the JET neutral beam test stand data was carried out

  20. Towards Model Checking a Spi-Calculus Dialect

    NARCIS (Netherlands)

    Gnesi, S.; Latella, D.; Lenzini, Gabriele

    We present a model checking framework for a spi-calculus dialect which uses a linear time temporal logic for expressing security properties. We have provided our spi-calculus dialect, called SPID, with a semantics based on labeled transition systems (LTS), where the intruder is modeled in the

  1. Accuracy Test of Software Architecture Compliance Checking Tools : Test Instruction

    NARCIS (Netherlands)

    Prof.dr. S. Brinkkemper; Dr. Leo Pruijt; C. Köppe; J.M.E.M. van der Werf

    2015-01-01

    Author supplied: "Abstract Software Architecture Compliance Checking (SACC) is an approach to verify conformance of implemented program code to high-level models of architectural design. Static SACC focuses on the modular software architecture and on the existence of rule violating dependencies

  2. 31 CFR 240.14 - Checks issued to incompetent payees.

    Science.gov (United States)

    2010-07-01

    ...) FISCAL SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE INDORSEMENT AND PAYMENT OF CHECKS... without submission of documentary proof of the authority of the guardian or other fiduciary, with the... the certifying agency with information as to the incompetence of the payee and documentary evidence...

  3. checkCIF/PLATON report Datablock: 1b

    Indian Academy of Sciences (India)

    checkCIF was carefully designed to identify outliers and unusual parameters, but every test has its limitations and alerts that are not important in a particular case may appear. Conversely, the absence of alerts does not guarantee there are no aspects of the results needing attention. It is up to the individual to critically assess ...

  4. A review of historical check valve failure data

    International Nuclear Information System (INIS)

    Casada, D.A.; Todd, M.D.

    1992-01-01

    Check valve operating problems in recent years have resulted in significant operating transients, increased cost, and decreased system availability. In response, additional attention has been given to check valves by utilities, as well as the US Nuclear Regulatory Commission (NRC) and the American Society of Mechanical Engineers Operation and Maintenance Committee. All these organizations have the fundamental goal of ensuring reliable operation of check valves. A key ingredient of an engineering-oriented reliability improvement effort is a thorough understanding of relevant historical experience. Oak Ridge National Laboratory is currently conducting a detailed review of historical failure data available through the Institute of Nuclear Power Operation's Nuclear Plant Reliability Data System. The focus of the review is on check valve failures that have involved significant degradation of the valve internal parts. A variety of parameters are being considered during the review, including size, age, system of service, method of failure discovery, the affected valve parts, attributed causes, and corrective actions. This work is being carried out under the auspices of the NRC's Nuclear Plant Aging Research program. At this time, the study is approximately 50% complete. All failure records have been reviewed and categorized, and preliminary tabulation and correlation of data is underway. The bulk of the tabulation and correlation portion of the work is expected to be completed by the end of June 1992. A report draft is expected in the fall of 1992

  5. Symbolic Game Semantics for Model Checking Program Families

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar

    2016-01-01

    represent program families with infinite integers as so-called (finite-state) featured symbolic automata. Specifically designed model checking algorithms are then employed to verify safety of all programs from a family at once and pinpoint those programs that are unsafe (respectively, safe). We present...... a prototype tool implementing this approach, and we illustrate it with several examples....

  6. checkCIF/PLATON report Datablock: fa083

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. Structure factors have been supplied for datablock(s) fa083. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC REFEREE. No syntax errors ...

  7. checkCIF/PLATON report Datablock: gitam035

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. Structure factors have been supplied for datablock(s) gitam035. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC REFEREE. No syntax ...

  8. checkCIF/PLATON report Datablock: rup-re

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  9. checkCIF/PLATON report Datablock: compound1

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  10. Fast flux test facility primary sodium check valve

    International Nuclear Information System (INIS)

    Rabe, G.B.; Nash, C.F.

    1975-01-01

    The design and development of a tilting-disc check valve for the primary sodium coolant loop of the Fast Flux Test Facility is described. The demanding design requirements specified for this system dictated a design with unique features. These features, along with the structural design and analysis requirements and the testing program used to develop and justify the design, are described

  11. Model checking: one can do much more than you think!

    NARCIS (Netherlands)

    Katoen, Joost P.

    2012-01-01

    Model checking is an automated verification technique that actively is applied to find bugs in hardware and software designs. Companies like IBM and Cadence developed their in-house model checkers, and acted as driving forces behind the design of the IEEE-standardized temporal logic PSL. On the

  12. Application of Model-Checking Technology to Controller Synthesis

    DEFF Research Database (Denmark)

    David, Alexandre; Grunnet, Jacob Deleuran; Jessen, Jan Jacob

    2011-01-01

    In this paper we present two frameworks that have been implemented to link traditional model-checking techniques to the domain of control. The techniques are based on solving a timed game and using the resulting solution (a strategy) as a controller. The obtained discrete controller must fit with...

  13. Mandatory Identification Bar Checks: How Bouncers Are Doing Their Job

    Science.gov (United States)

    Monk-Turner, Elizabeth; Allen, John; Casten, John; Cowling, Catherine; Gray, Charles; Guhr, David; Hoofnagle, Kara; Huffman, Jessica; Mina, Moises; Moore, Brian

    2011-01-01

    The behavior of bouncers at on site establishments that served alcohol was observed. Our aim was to better understand how bouncers went about their job when the bar had a mandatory policy to check identification of all customers. Utilizing an ethnographic decision model, we found that bouncers were significantly more likely to card customers that…

  14. Recent advances in importance sampling for statistical model checking

    NARCIS (Netherlands)

    Reijsbergen, D.P.; de Boer, Pieter-Tjerk; Scheinhardt, Willem R.W.; Haverkort, Boudewijn R.H.M.

    2013-01-01

    In the following work we present an overview of recent advances in rare event simulation for model checking made at the University of Twente. The overview is divided into the several model classes for which we propose algorithms, namely multicomponent systems, Markov chains and stochastic Petri

  15. checkCIF/PLATON report Datablock: rupret_0m

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  16. checkCIF/PLATON report Datablock: 8_plus_2

    Indian Academy of Sciences (India)

    checkCIF/PLATON report. You have not supplied any structure factors. As a result the full set of tests cannot be run. THIS REPORT IS FOR GUIDANCE ONLY. IF USED AS PART OF A REVIEW PROCEDURE. FOR PUBLICATION, IT SHOULD NOT REPLACE THE EXPERTISE OF AN EXPERIENCED. CRYSTALLOGRAPHIC ...

  17. Diagnostic information for compliance checking of temporal compliance requirements

    NARCIS (Netherlands)

    Ramezani Taghiabadi, E.; Fahland, D.; Dongen, van B.F.; Aalst, van der W.M.P.; Salinesi, C.; Norrie, M.C.; Pastor, O.

    2013-01-01

    Compliance checking is gaining importance as today’s organizations need to show that operational processes are executed in a controlled manner while satisfying predefined (legal) requirements or service level agreements. Deviations may be costly and expose an organization to severe risks. Compliance

  18. Online Conformance Checking for Petri Nets and Event Streams

    DEFF Research Database (Denmark)

    Burattin, Andrea

    2017-01-01

    Within process mining, we can identify conformance checking as the task of computing the extent to which executions of a process model are in line with the reference behavior. Most approaches currently available in the literature (for imperative models, such as Petri nets) perform just a-posterio...

  19. Preservation Health Check: Monitoring Threats to Digital Repository Content

    Science.gov (United States)

    Kool, Wouter; van der Werf, Titia; Lavoie, Brian

    2014-01-01

    The Preservation Health Check (PHC) project, undertaken as a joint effort by Open Planets Foundation (OPF) and OCLC Research, aims to evaluate the usefulness of the preservation metadata created and maintained by operational repositories for assessing basic preservation properties. The PHC project seeks to develop an implementable logic to support…

  20. Performability assessment by model checking of Markov reward models

    NARCIS (Netherlands)

    Baier, Christel; Cloth, L.; Haverkort, Boudewijn R.H.M.; Hermanns, H.; Katoen, Joost P.

    2010-01-01

    This paper describes efficient procedures for model checking Markov reward models, that allow us to evaluate, among others, the performability of computer-communication systems. We present the logic CSRL (Continuous Stochastic Reward Logic) to specify performability measures. It provides flexibility

  1. 12 CFR 229.53 - Substitute check indemnity.

    Science.gov (United States)

    2010-01-01

    ... expenses of representation) related to the substitute check. (2) Comparative negligence. (i) If a loss... negligence or failure to act in good faith, then the indemnity amount described in paragraph (b)(1) of this section shall be reduced in proportion to the amount of negligence or bad faith attributable to the...

  2. 1b_white_isomer-2_Check cif.pdf

    Indian Academy of Sciences (India)

    checkCIF was carefully designed to identify outliers and unusual parameters, but every test has its limitations and alerts that are not important in a particular case may appear. Conversely, the absence of alerts does not guarantee there are no aspects of the results needing attention. It is up to the individual to critically assess ...

  3. Model checking conditional CSL for continuous-time Markov chains

    DEFF Research Database (Denmark)

    Gao, Yang; Xu, Ming; Zhan, Naijun

    2013-01-01

    In this paper, we consider the model-checking problem of continuous-time Markov chains (CTMCs) with respect to conditional logic. To the end, we extend Continuous Stochastic Logic introduced in Aziz et al. (2000) [1] to Conditional Continuous Stochastic Logic (CCSL) by introducing a conditional...

  4. 40 CFR 90.325 - Analyzer interference checks.

    Science.gov (United States)

    2010-07-01

    ... broadening the absorption band of the measured gas, and in CLD instruments by the interfering gas quenching... quench check. The two gases of concern for CLD (and HCLD) analyzers are CO2 and water vapor. Quench... the CO2 NDIR and CLD (or HCLD). Record the CO2 and NO values as “b” and “c” respectively. (iii) Shut...

  5. State Space Reduction for Model Checking Agent Programs

    NARCIS (Netherlands)

    S.-S.T.Q. Jongmans (Sung-Shik); K.V. Hindriks; M.B. van Riemsdijk; L. Dennis; O. Boissier; R.H. Bordini (Rafael)

    2012-01-01

    htmlabstractState space reduction techniques have been developed to increase the efficiency of model checking in the context of imperative programming languages. Unfortunately, these techniques cannot straightforwardly be applied to agents: the nature of states in the two programming paradigms

  6. checkCIF/PLATON report Datablock: 1b

    Indian Academy of Sciences (India)

    4 ALERT level G = General information/check it is not something unexpected. 1 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 2 ALERT type 2 Indicator that the structure ... However, the purpose of your study may justify the reported deviations and the more serious of these should normally be ...

  7. checkCIF/PLATON report Datablock: exp_2816

    Indian Academy of Sciences (India)

    4 ALERT level G = General information/check it is not something unexpected. 1 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 2 ALERT type 2 Indicator that the structure ... However, the purpose of your study may justify the reported deviations and the more serious of these should normally be ...

  8. Payload specialist Ronald Parise checks on ASTRO-2 payload

    Science.gov (United States)

    1995-01-01

    Payload specialist Ronald A. Parise, a senior scientist in the Space Observatories Department of Computer Sciences Corporation (CSC), checks on the ASTRO-2 payload (out of frame in the cargo bay of the Space Shuttle Endeavour). Parise is on the aft flight deck of the Earth orbiting Endeavour during STS-67.

  9. Apparatus for checking the dimensions of nuclear fuel pellets

    International Nuclear Information System (INIS)

    Marmo, A.R.

    1978-01-01

    The description is given of an apparatus for checking the dimensions of pellets comprising a housing, a feeding device near this housing to move a pellet towards the latter and away from it, and a platform with a hole, this platform being fitted to the housing near the feeding system in order to hold the pellet [fr

  10. First experiences with the LHC BLM sanity checks

    CERN Document Server

    Emery, J; Effinger, E; Nordt, A; Sapinski, M G; Zamantzas, C

    2010-01-01

    The reliability concerns have driven the design of the Large Hardron Collider (LHC) Beam Loss Monitoring (BLM) system from the early stage of the studies up to the present commissioning and the latest development of diagnostic tools. To protect the system against non-conformities, new ways of automatic checking have been developed and implemented. These checks are regularly and systematically executed by the LHC operation team to ensure that the system status is after each test "as good as new". The sanity checks are part of this strategy. They are testing the electrical part of the detectors (ionisation chamber or secondary emission detector), their cable connections to the front-end electronics, further connections to the back-end electronics and their ability to request a beam abort. During the installation and in the early commissioning phase, these checks have shown their ability to find also non-conformities caused by unexpected failure event scenarios. In every day operation, a non-conformity discovere...

  11. Operational workforce planning for check-in counters at airports

    DEFF Research Database (Denmark)

    Stolletz, Raik

    2010-01-01

    This paper addresses operation models for workforce planning for check-in systems at airports. We characterize different tasks of the hierarchical workforce planning problem with time-dependent demand. A binary linear programming formulation is developed for the fortnightly tour scheduling problem...

  12. checkCIF/PLATON report Datablock: gitam035

    Indian Academy of Sciences (India)

    Moiety formula C7 H3 N2 O8 Sm, O ? Sum formula ... SHFSU01_ALERT_2_B The absolute value of parameter shift to su ratio > 0.10. Absolute value of the ... PLAT934_ALERT_3_C Number of (Iobs-Icalc)/SigmaW > 10 Outliers .... 1 Check.

  13. Using GIS to check co-ordinates of genebank accessions

    NARCIS (Netherlands)

    Hijmans, R.J.; Schreuder, M.; Cruz, de la J.; Guarino, L.

    1999-01-01

    The geographic co-ordinates of the locations where germplasm accessions have been collected are usually documented in genebank databases. However, the co-ordinate data are often incomplete and may contain errors. This paper describes procedures to check for errors, to determine the cause of these

  14. Combining monitoring with run-time assertion checking

    NARCIS (Netherlands)

    Gouw, Stijn de

    2013-01-01

    We develop a new technique for Run-time Checking for two object-oriented languages: Java and the Abstract Behavioral Specification language ABS. In object-oriented languages, objects communicate by sending each other messages. Assuming encapsulation, the behavior of objects is completely

  15. Numerical consistency check between two approaches to radiative ...

    Indian Academy of Sciences (India)

    approaches for a consistency check on numerical accuracy, and find out the stabil- ... ln(MR/1 GeV) to top-quark mass scale t0(= ln(mt/1 GeV)) where t0 ≤ t ≤ tR, we ..... It is in general to tone down the solar mixing angle through further fine.

  16. Verifying large SDL-specifications using model checking

    NARCIS (Netherlands)

    Sidorova, N.; Steffen, M.; Reed, R.; Reed, J.

    2001-01-01

    In this paper we propose a methodology for model-checking based verification of large SDL specifications. The methodology is illustrated by a case study of an industrial medium-access protocol for wireless ATM. To cope with the state space explosion, the verification exploits the layered and modular

  17. Decentralized Consistency Checking in Cross-organizational Workflows

    NARCIS (Netherlands)

    Wombacher, Andreas

    Service Oriented Architectures facilitate loosely coupled composed services, which are established in a decentralized way. One challenge for such composed services is to guarantee consistency, i.e., deadlock-freeness. This paper presents a decentralized approach to consistency checking, which

  18. Check list of the Hungarian Salticidae with biogeographical notes

    Directory of Open Access Journals (Sweden)

    Szüts, Tamás

    2003-04-01

    Full Text Available An updated check list of the Hungarian jumping spider fauna is presented. 70 species are recorded from Hungary so far. Four species are new to the Hungarian fauna: Hasarius adansoni, Neon valentulus, Sitticus caricis, Synageles subcingulatus. With 12 original drawings.

  19. 42 CFR 493.1254 - Standard: Maintenance and function checks.

    Science.gov (United States)

    2010-10-01

    ...'s equipment, instruments, or test systems. The laboratory must perform and document the following... available and modified by the laboratory, or maintenance and function check protocols are not provided by the manufacturer. The laboratory must do the following: (1)(i) Establish a maintenance protocol that...

  20. Astronaut James Lovell checks body temperature with oral temperature probe

    Science.gov (United States)

    1965-01-01

    Gemini 7 pilot Astronaut James A. Lovell Jr. has temperature check with oral temperature probe attached to his space suit during final preflight preparations for the Gemini 7 space mission. The temperature probe allows doctors to monitor astronauts body temperature at any time during the mission.

  1. Accurate LC peak boundary detection for ¹⁶O/¹⁸O labeled LC-MS data.

    Science.gov (United States)

    Cui, Jian; Petritis, Konstantinos; Tegeler, Tony; Petritis, Brianne; Ma, Xuepo; Jin, Yufang; Gao, Shou-Jiang S J; Zhang, Jianqiu Michelle

    2013-01-01

    In liquid chromatography-mass spectrometry (LC-MS), parts of LC peaks are often corrupted by their co-eluting peptides, which results in increased quantification variance. In this paper, we propose to apply accurate LC peak boundary detection to remove the corrupted part of LC peaks. Accurate LC peak boundary detection is achieved by checking the consistency of intensity patterns within peptide elution time ranges. In addition, we remove peptides with erroneous mass assignment through model fitness check, which compares observed intensity patterns to theoretically constructed ones. The proposed algorithm can significantly improve the accuracy and precision of peptide ratio measurements.

  2. REDEFINING THE BOUNDARIES OF INTERPLANETARY CORONAL MASS EJECTIONS FROM OBSERVATIONS AT THE ECLIPTIC PLANE

    Energy Technology Data Exchange (ETDEWEB)

    Cid, C.; Palacios, J.; Saiz, E.; Guerrero, A. [Space Research Group—Space Weather, Departamento de Física y Matemáticas, Universidad de Alcalá, Alcalá de Henares (Spain)

    2016-09-01

    On 2015 January 6–7, an interplanetary coronal mass ejection (ICME) was observed at L1. This event, which can be associated with a weak and slow coronal mass ejection, allows us to discuss the differences between the boundaries of the magnetic cloud and the compositional boundaries. A fast stream from a solar coronal hole surrounding this ICME offers a unique opportunity to check the boundaries’ process definition and to explain differences between them. Using Wind and ACE data, we perform a complementary analysis involving compositional, magnetic, and kinematic observations providing relevant information regarding the evolution of the ICME as travelling away from the Sun. We propose erosion, at least at the front boundary of the ICME, as the main reason for the difference between the boundaries, and compositional signatures as the most precise diagnostic tool for the boundaries of ICMEs.

  3. The use of a wave boundary layer model in SWAN

    DEFF Research Database (Denmark)

    Du, Jianting; Bolaños, Rodolfo; Larsén, Xiaoli Guo

    2017-01-01

    A Wave Boundary Layer Model (WBLM) is implemented in the third-generation ocean wave model SWAN to improve the wind-input source function under idealized, fetch-limited condition. Accordingly, the white capping dissipation parameters are re-calibrated to fit the new wind-input source function...

  4. Operable Unit Boundaries

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset consists of operable unit data from multiple Superfund sites in U.S. EPA Region 8. These data were acquired from multiple sources at different times and...

  5. 42 CFR 433.40 - Treatment of uncashed or cancelled (voided) Medicaid checks.

    Science.gov (United States)

    2010-10-01

    ...) Medicaid checks. 433.40 Section 433.40 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT...) Medicaid checks. (a) Purpose. This section provides the rules to ensure that States refund the Federal...— Cancelled (voided) check means a Medicaid check issued by a State or fiscal agent which prior to its being...

  6. Pre-Alignment Checks. Automotive Mechanics. Steering & Suspension. Instructor's Guide [and] Student Guide.

    Science.gov (United States)

    Spignesi, B.

    This instructional package, one in a series of individualized instructional units on automotive steering and suspension, consists of a student guide and an instructor guide dealing with prealignment checks. Covered in the module are the following steps in a prealignment check: checking the ride height of a vehicle, checking the ball joints and the…

  7. Patterns of attendance to health checks in a municipality setting: the Danish ‘Check Your Health Preventive Program’

    Directory of Open Access Journals (Sweden)

    Anne-Louise Bjerregaard

    2017-03-01

    More than half of a general population voluntarily attended a general health check, despite a resource intensive offer. People with low resources had lower attendance rates. This study adds a detailed description of mutually exclusive groups of attenders, for use in future planning and implementation of preventive actions.

  8. Challenging the Boundaries

    DEFF Research Database (Denmark)

    Nørgaard, Nina

    2004-01-01

    To many people, challenging the boundaries between the traditional disciplines in foreign language studies means doing cultural studies. The aim of this article is to pull in a different direction by suggesting how the interface between linguistics and literature may be another fertile field...... to explore in the study and teaching of foreign languages. Not only may linguistics and literature be employed to shed light on each other, the insights gained may furthermore prove useful in a broader context in our foreign language studies. The article begins with a brief introduction to literary...... linguistics in general and to Hallidayan linguistics in particular. The theoretical framework thus laid out, it is exemplified how Halliday's theory of language may be employed in the analysis of literature. The article concludes by considering the possible status of literary linguistics in a broader...

  9. Negotiating Cluster Boundaries

    DEFF Research Database (Denmark)

    Giacomin, Valeria

    2017-01-01

    Palm oil was introduced to Malay(si)a as an alternative to natural rubber, inheriting its cluster organizational structure. In the late 1960s, Malaysia became the world’s largest palm oil exporter. Based on archival material from British colonial institutions and agency houses, this paper focuses...... on the governance dynamics that drove institutional change within this cluster during decolonization. The analysis presents three main findings: (i) cluster boundaries are defined by continuous tug-of-war style negotiations between public and private actors; (ii) this interaction produces institutional change...... within the cluster, in the form of cumulative ‘institutional rounds’ – the correction or disruption of existing institutions or the creation of new ones; and (iii) this process leads to a broader inclusion of local actors in the original cluster configuration. The paper challenges the prevalent argument...

  10. Transcending Organizational Boundaries

    DEFF Research Database (Denmark)

    Kringelum, Louise Tina Brøns

    by applying the engaged scholarship approach, thereby providing a methodological contribution to both port and business model research. Emphasizing the interplay of intra- and inter-organizational business model innovation, the thesis adds insight into the roles of port authorities, business model trends......This thesis explores how processes of business model innovation can unfold in a port authority by transcending organizational boundaries through inter-organizational collaboration. The findings contribute to two fields of academic inquiry: the study of business model innovation and the study of how...... the roles of port authorities evolve. This contribution is made by combining the two fields, where the study of business model innovation is used as an analytical concept for understanding the evolution of port authorities, and where the study of port authorities is used as a contextual setting...

  11. Superfluid Boundary Layer.

    Science.gov (United States)

    Stagg, G W; Parker, N G; Barenghi, C F

    2017-03-31

    We model the superfluid flow of liquid helium over the rough surface of a wire (used to experimentally generate turbulence) profiled by atomic force microscopy. Numerical simulations of the Gross-Pitaevskii equation reveal that the sharpest features in the surface induce vortex nucleation both intrinsically (due to the raised local fluid velocity) and extrinsically (providing pinning sites to vortex lines aligned with the flow). Vortex interactions and reconnections contribute to form a dense turbulent layer of vortices with a nonclassical average velocity profile which continually sheds small vortex rings into the bulk. We characterize this layer for various imposed flows. As boundary layers conventionally arise from viscous forces, this result opens up new insight into the nature of superflows.

  12. Stove checking behaviour in people with OCD vs. anxious controls.

    Science.gov (United States)

    Bucarelli, Bianca; Purdon, Christine

    2016-12-01

    A growing body of research suggests that the repetition of an action degrades memory for that action, as well as confidence that is has been done correctly. This has important implications for understanding the compulsive repetition of actions characteristic of obsessive compulsive disorder (OCD). At this time, though, much of the research has been conducted on analogue or nonclinical OCD samples in comparison to healthy controls and often using virtual, as opposed to actual, threat stimuli. Furthermore, although it has been argued that people with OCD are overly attentive to threat stimuli, the research on actual attention to threat is scant. People with a principal diagnosis of OCD (n = 30) and people with a clinically significant diagnosis of an anxiety disorder, but no OCD (n = 18) completed measures of memory confidence and responsibility and then underwent a stove-checking task in a functioning kitchen while wearing a portable eye tracking device. Pre- and post-task ratings of harm and responsibility were taken, along with post-task ratings of memory and certainty. People with OCD did not exhibit poorer memory confidence than the anxious control (AC) group, but did report greater trait and state responsibility for harm. The OCD group checked longer than did the AC group and check duration predicted post-task ratings of harm, but to the same extent in both groups. People with OCD attended to threat items less than did the AC group. Greater visual attention to the stove during the checking period was associated with greater post-task ratings of responsibility and harm and with less certainty in and memory for the check - but only for the AC group. The sample size was modest, women were over-represented and problems with the eye tracking device reduced the amount of reliable data available for analysis. Compulsions are complex actions that are mediated by many trait, state and contextual factors. People with OCD may be able to circumvent self

  13. Computation of airfoil buffet boundaries

    Science.gov (United States)

    Levy, L. L., Jr.; Bailey, H. E.

    1981-01-01

    The ILLIAC IV computer has been programmed with an implicit, finite-difference code for solving the thin layer compressible Navier-Stokes equation. Results presented for the case of the buffet boundaries of a conventional and a supercritical airfoil section at high Reynolds numbers are found to be in agreement with experimentally determined buffet boundaries, especially at the higher freestream Mach numbers and lower lift coefficients where the onset of unsteady flows is associated with shock wave-induced boundary layer separation.

  14. Boundary fluxes for nonlocal diffusion

    Science.gov (United States)

    Cortazar, Carmen; Elgueta, Manuel; Rossi, Julio D.; Wolanski, Noemi

    We study a nonlocal diffusion operator in a bounded smooth domain prescribing the flux through the boundary. This problem may be seen as a generalization of the usual Neumann problem for the heat equation. First, we prove existence, uniqueness and a comparison principle. Next, we study the behavior of solutions for some prescribed boundary data including blowing up ones. Finally, we look at a nonlinear flux boundary condition.

  15. Diversified boundaries of the firm

    OpenAIRE

    Kimura, Koichiro

    2012-01-01

    We analyze diversification of boundaries of local firms in developing countries under the economic globalization. The globalization has an aspect of homogenization of the world economy, but also has another aspect of diversification through international economic activities. Focusing on boundary-level of the firm, this article shows that the diversification from a comparison with boundaries of foreign firms in developed countries is brought by a disadvantage of technology deficit and a home a...

  16. Conformal boundaries of warped products

    DEFF Research Database (Denmark)

    Kokkendorff, Simon Lyngby

    2006-01-01

    In this note we prove a result on how to determine the conformal boundary of a type of warped product of two length spaces in terms of the individual conformal boundaries. In the situation, that we treat, the warping and conformal distortion functions are functions of distance to a base point....... The result is applied to produce examples of CAT(0)-spaces, where the conformal and ideal boundaries differ in interesting ways....

  17. Technology of irradiation processing for checking garlic sprouting

    International Nuclear Information System (INIS)

    Chen Yuntang

    1999-01-01

    Study on technology of irradiation processing for checking garlic sprouting was carried out. The results are as follows. 1. the suitable irradiation time of garlic could be prolonged when the garlic was preserved at low temperature (-2 +- 1 degree C). When the garlic was stored till the end of the year and then irradiated, the sprouting could be checked effectively. When the garlic was stored till the next March, the effect of sprouting inhibition decreased; 2. When garlic was irradiated at suitable time and then subsequently stored at low temperature, the effect of sprouting inhibition was the same as that with cold storage before irradiation. However, if the cold storage period was rather long, the effect was not as good as that with cold storage after irradiation; 3. Browning of irradiated garlic did not occur when the garlic was preserved at low temperature (-2 +- 1 degree C), indicating that the browning of sprout and bud was caused by higher storage temperature

  18. Rejuvinasi Sistem Checks and Balances Dalam Sistem Ketatanegaraan di Indonesia

    Directory of Open Access Journals (Sweden)

    Indra Rahmatullah

    2016-04-01

    Full Text Available Rejuvenation of Check and Balance System in Statehood System in Indonesia. Instead of delegated to only a person or an Institution, State Sovereignty shall be divided into some Institutions (separation of power.  The concept of Separation of power is difficult to be implemented because the each State Institution cannot share their power, therefore the concept of distribution of power has been introduced as alternative. This concept recognise Check and balances system. However, It will not guarantee harmony between State Institution. It exist the tension between State Institutions because They feel having the same authority, as seen in some cases such as between Parliament and president on Bill of  head of regional election, Police Department and Commission of Eradication Corruption and the latest is the conflict between Supreme Court and Judicial Commission. DOI: 10.15408/jch.v1i2.2992

  19. Recent research on the pharmaceutical checking of radioelements (1961)

    International Nuclear Information System (INIS)

    Cohen, Y.; Ingrand, J.

    1960-01-01

    Checking on radioactive preparations for medical use is complicated by difficulties due to the radioactivity, the instability and the methods of using these solutions. In effect it is necessary, in order to draw up a practicable set of rules governing such checks, to know both the method of preparation and the properties of the radioelement, as well as special and often contradictory features of its use. These tests fall into three categories: physical, chemical and biological. Preparations of chromium 51, iron 59 and arsenic 76 have been dealt with in recent studies. In each case special tests were necessary, and these will be described in this paper. The practice of these tests is of twofold interest: firstly they provide a maximum guarantee to the user, and secondly they guide the chemist in his manipulations, immediately and thoroughly. (author) [fr

  20. Analysis of DIRAC's behavior using model checking with process algebra

    CERN Document Server

    Remenska, Daniela; Willemse, Tim; Bal, Henri; Verstoep, Kees; Fokkink, Wan; Charpentier, Philippe; Diaz, Ricardo Graciani; Lanciotti, Elisa; Roiser, Stefan; Ciba, Krzysztof

    2012-01-01

    DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple, the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike con...

  1. Technician checks the mirrors of the Starshine-2 experiment

    Science.gov (United States)

    2001-01-01

    Technician checks the mirrors of the Starshine-2 experiment KSC-01PD-1715 KENNEDY SPACE CENTER, Fla. -- A technician checks the mirrors on the Starshine-2 experiment inside a canister in the payload bay of Space Shuttle Endeavour. The deployable experiment is being carried on mission STS-108. Starshine-2's 800 aluminum mirrors were polished by more than 25,000 students from 26 countries. Top priorities for the STS-108 (UF-1) mission of Endeavour are rotation of the International Space Station Expedition Three and Expedition Four crews, bringing water, equipment and supplies to the station in the Multi-Purpose Logistics Module Raffaello, and completion of robotics tasks and a spacewalk to install thermal blankets over two pieces of equipment at the bases of the Space Station's solar wings. Liftoff of Endeavour on mission STS-108 is scheduled for 7:41 p.m. EST.

  2. Changes to criminal records checks used to safeguard vulnerable patients.

    Science.gov (United States)

    Griffith, Richard; Tengnah, Cassam

    2012-07-01

    The Protection of Freedoms Act 2012 is introducing changes to the Criminal Records Bureau (CRB) checks carried out on those people who work with vulnerable groups. The new law is the coalition Government's response to the criticism of the Safeguarding Vulnerable Group Act 2006. It will merge the CRB and Independent Safeguarding Authority into a new Disclosure and Barring Service and will enhance the rights of applicants to challenge the CRB's right to disclose non-conviction information as part of an enhanced criminal records check. In the first of two articles on the Protection of Freedoms Act 2012, Richard Griffith and Cassam Tengnah discuss the current framework for disclosing criminal records and the impact of the changes on district nurses applying for new posts.

  3. Efficient family-based model checking via variability abstractions

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar; Al-Sibahi, Ahmad Salim; Brabrand, Claus

    2016-01-01

    with the abstract model checking of the concrete high-level variational model. This allows the use of Spin with all its accumulated optimizations for efficient verification of variational models without any knowledge about variability. We have implemented the transformations in a prototype tool, and we illustrate......Many software systems are variational: they can be configured to meet diverse sets of requirements. They can produce a (potentially huge) number of related systems, known as products or variants, by systematically reusing common parts. For variational models (variational systems or families...... of related systems), specialized family-based model checking algorithms allow efficient verification of multiple variants, simultaneously, in a single run. These algorithms, implemented in a tool Snip, scale much better than ``the brute force'' approach, where all individual systems are verified using...

  4. Mixed Portmanteau Test for Diagnostic Checking of Time Series Models

    Directory of Open Access Journals (Sweden)

    Sohail Chand

    2014-01-01

    Full Text Available Model criticism is an important stage of model building and thus goodness of fit tests provides a set of tools for diagnostic checking of the fitted model. Several tests are suggested in literature for diagnostic checking. These tests use autocorrelation or partial autocorrelation in the residuals to criticize the adequacy of fitted model. The main idea underlying these portmanteau tests is to identify if there is any dependence structure which is yet unexplained by the fitted model. In this paper, we suggest mixed portmanteau tests based on autocorrelation and partial autocorrelation functions of the residuals. We derived the asymptotic distribution of the mixture test and studied its size and power using Monte Carlo simulations.

  5. Asymptomatic brain tumor detected at brain check-up

    International Nuclear Information System (INIS)

    Onizuka, Masanari; Suyama, Kazuhiko; Shibayama, Akira; Hiura, Tsuyoshi; Horie, Nobutaka; Miyazaki, Hisaya

    2001-01-01

    Brain check-up was performed in 4000 healthy subjects who underwent medical and radiological examinations for possible brain diseases in our hospital from April 1996 to March 2000. Magnetic resonance imaging revealed 11 brain tumors which consisted of six meningiomas, three pituitary adenomas, one astrocytoma, and one epidermoid cyst. The detection rate of incidental brain tumor in our hospital was 0.3%. Nine patients underwent surgery, with one case of morbidity due to postoperative transient oculomotor nerve paresis. The widespread use of brain check-up may increasingly detect asymptomatic brain tumors. Surgical indications for such lesions remain unclear, and the strategy for treatment should be determined with consideration of the patient's wishes. (author)

  6. Optimization analysis of swing check valve closing induced water hammer

    International Nuclear Information System (INIS)

    Han Wenwei; Han Weishi; Guo Qing; Wang Xin; Liu Chunyu

    2014-01-01

    A mathematical-physics model of double pump parallel feed system was constructed. The water hammer was precisely calculated, which was formed in the closing process of swing check valve. And a systematic analysis was carried out to determine the influence of the torques from both valve plate and damping torsion spring on the valve closing induced water hammer. The results show that the swing check valve would distinctly produce the water hammer during the closing procedure in the double pump parallel feed water system. The torques of the valve plate can partly reduce the water hammer effect, and implying appropriate materials of valve plate and appropriate spring can effectively relieve the harm of water hammer. (authors)

  7. Constraint-based deadlock checking of high-level specifications

    DEFF Research Database (Denmark)

    Hallerstede, Stefan; Leuschel, Michael

    2011-01-01

    Establishing the absence of deadlocks is important in many applications of formal methods. The use of model checking for finding deadlocks in formal models is limited because in many industrial applications the state space is either infinite or much too large to be explored exhaustively. In this ......Establishing the absence of deadlocks is important in many applications of formal methods. The use of model checking for finding deadlocks in formal models is limited because in many industrial applications the state space is either infinite or much too large to be explored exhaustively......B's Prolog kernel, such as reification of membership and arithmetic constraints. ProB typically finds counter examples to deadlock-freedom constraints, a formula of about 900 partly nested conjunctions and disjunction among them 80 arithmetic and 150 set-theoretic predicates (in total a formula of 30 pages...

  8. The Boundary Function Method. Fundamentals

    Science.gov (United States)

    Kot, V. A.

    2017-03-01

    The boundary function method is proposed for solving applied problems of mathematical physics in the region defined by a partial differential equation of the general form involving constant or variable coefficients with a Dirichlet, Neumann, or Robin boundary condition. In this method, the desired function is defined by a power polynomial, and a boundary function represented in the form of the desired function or its derivative at one of the boundary points is introduced. Different sequences of boundary equations have been set up with the use of differential operators. Systems of linear algebraic equations constructed on the basis of these sequences allow one to determine the coefficients of a power polynomial. Constitutive equations have been derived for initial boundary-value problems of all the main types. With these equations, an initial boundary-value problem is transformed into the Cauchy problem for the boundary function. The determination of the boundary function by its derivative with respect to the time coordinate completes the solution of the problem.

  9. Analysis of turbulent boundary layers

    CERN Document Server

    Cebeci, Tuncer

    1974-01-01

    Analysis of Turbulent Boundary Layers focuses on turbulent flows meeting the requirements for the boundary-layer or thin-shear-layer approximations. Its approach is devising relatively fundamental, and often subtle, empirical engineering correlations, which are then introduced into various forms of describing equations for final solution. After introducing the topic on turbulence, the book examines the conservation equations for compressible turbulent flows, boundary-layer equations, and general behavior of turbulent boundary layers. The latter chapters describe the CS method for calculati

  10. SU-F-T-60: A Quick Dose Calculation Check for Accuboost Breast Treatment

    Energy Technology Data Exchange (ETDEWEB)

    Sen, A [Cancer Treatment Center of America, Tulsa, OK (United States)

    2016-06-15

    Purpose: Accuboost treatment planning uses dwell times from a nomogram designed with Monte Carlo calculations for round and D-shaped applicators. A quick dose calculation method has been developed for verification of the HDR Brachytherapy dose as a second check. Methods: Accuboost breast treatment uses several round and D-shaped applicators to be used non-invasively with an Ir-192 source from a HDR Brachytherapy afterloader after the breast is compressed in a mammographic unit for localization. The breast thickness, source activity, the prescription dose and the applicator size are entered into a nomogram spreadsheet which gives the dwell times to be manually entered into the delivery computer. Approximating the HDR Ir-192 as a point source, and knowing the geometry of the round and D-applicators, the distances from the source positions to the midpoint of the central plane are calculated. Using the exposure constant of Ir-192 and medium as human tissue, the dose at a point is calculated as: D(cGy) = 1.254 × A × t/R2, where A is the activity in Ci, t is the dwell time in sec and R is the distance in cm. The dose from each dwell position is added to get the total dose. Results: Each fraction is delivered in two compressions: cranio-caudally and medial-laterally. A typical APBI treatment in 10 fractions requires 20 compressions. For a patient treated with D45 applicators and an average of 5.22 cm thickness, this calculation was 1.63 % higher than the prescription. For another patient using D53 applicators in the CC direction and 7 cm SDO applicators in the ML direction, this calculation was 1.31 % lower than the prescription. Conclusion: This is a simple and quick method to double check the dose on the central plane for Accuboost treatment.

  11. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  12. Model Checking Processes Specified In Join-Calculus Algebra

    Directory of Open Access Journals (Sweden)

    Sławomir Piotr Maludziński

    2014-01-01

    Full Text Available This article presents a model checking tool used to verify concurrent systems specified in join-calculus algebra. The temporal properties of systems under verification are expressed in CTL logic. Join-calculus algebra with its operational semantics defined by the chemical abstract machine serves as the basic method for the specification of concurrent systems and their synchronization mechanisms, and allows the examination of more complex systems.

  13. FIXUP2007, ENDF Format Redundant Cross-Sections Check

    International Nuclear Information System (INIS)

    2007-01-01

    1 - Description of program or function: FIXUP is designed to read evaluated data in the ENDF/B format, perform corrections and output the results in the ENDF/B format. One of the most important functions of this code is to redefine all redundant cross sections to be exactly equal to the sum of its parts. IAEA1309/11: This version includes the updates up to January 30, 2007. Changes in ENDF/B-VII Format and procedures, as well as the evaluations themselves, make it impossible for versions of the ENDF/B pre-processing codes earlier than PREPRO 2007 (2007 Version) to accurately process current ENDF/B-VII evaluations. The present code can handle all existing ENDF/B-VI evaluations through release 8, which will be the last release of ENDF/B-VI. Modifications from previous versions: - Fixup VERS. 2007-1 (Jan. 2007): checked against all ENDF/B-VII; increased page size from 60,000 to 600,000 data points 2 - Method of solution: FIXUP: All MAT numbers on an ENDF/B tape are processed; each MAT is treated separately. Within each MAT, each section before and after MF=3 is read, checked/corrected and output. When MF=3 is located, all cross sections are read, sections deleted, created, checked/corrected (based on user input) and after several intermediate stages written to output. 3 - Restrictions on the complexity of the problem: The program uses only the ENDF/B BCD format tape and copy all sections except File 3 as read. It is assumed that the data is correctly coded. No error checking is performed. Since File 3 data are in identical format for ENDF/B versions I through VI, the program can be used with all these versions. - All data in file 3 and 23 must be linearly interpolable

  14. What is the purpose of the Stress Check Program?

    OpenAIRE

    Sugawara, Norio; Saito, Manabu; Nakamura, Kazuhiko

    2016-01-01

    Since December 1, 2015, the Japanese government has required employers to conduct the Stress Check Program. The Ministry of Health, Labour and Welfare announced that this program should focus on the primary prevention of mental health problems. Although employers are obliged to perform screening for mental health problems and a physician's interview, employees are not mandated to participate in this program. Classical occupational health studies have accumulated evidence indicating that quant...

  15. A framework for automatically checking anonymity with μ CRL

    OpenAIRE

    Chothia, T.; Orzan, S.M.; Pang, J.; Torabi Dashti, M.; Montanari, U.; Sannella, D.; Bruni, R.

    2007-01-01

    We present a powerful and flexible method for automatically checking anonymity in a possibilistic general-purpose process algebraic verification toolset. We propose new definitions of a choice anonymity degree and a player anonymity degree, to quantify the precision with which an intruder is able to single out the true originator of a given event or to associate the right event to a given protocol participant. We show how these measures of anonymity can be automatically calculated from a prot...

  16. Logic Model Checking of Unintended Acceleration Claims in Toyota Vehicles

    Science.gov (United States)

    Gamble, Ed

    2012-01-01

    Part of the US Department of Transportation investigation of Toyota sudden unintended acceleration (SUA) involved analysis of the throttle control software, JPL Laboratory for Reliable Software applied several techniques including static analysis and logic model checking, to the software; A handful of logic models were build, Some weaknesses were identified; however, no cause for SUA was found; The full NASA report includes numerous other analyses

  17. Astronauts Parise and Jernigan check helmets prior to training session

    Science.gov (United States)

    1994-01-01

    Attired in training versions of the Shuttle partial-pressure launch and entry suits, payload specialist Dr. Ronald A Parise (left) and astronaut Tamara E. Jernigan, payload commander, check over their helmets prior to a training session. Holding the helmets is suit expert Alan M. Rochford, of NASA. The two were about to join their crew mates in a session of emergency bailout training at JSC's Weightless Environment Training Facility (WETF).

  18. Saturn V Instrument Unit Being Checked At MSFC

    Science.gov (United States)

    1967-01-01

    A technician checks the systems of the Saturn V instrument unit in a test facility in Huntsville. This instrument unit was flown aboard Apollo 4 on November 7, 1967, which was the first test flight of the Saturn V. The towering 363-foot Saturn V was a multi-stage, multi-engine launch vehicle standing taller than the Statue of Liberty. Altogether, the Saturn V engines produced as much power as 85 Hoover Dams.

  19. Collaboration in Healthcare Through Boundary Work and Boundary Objects

    DEFF Research Database (Denmark)

    Meier, Ninna

    2015-01-01

    This article contributes to our understanding of how boundary work is practiced in healthcare settings. Previous studies have shown how boundaries are constantly changing, multiple, and co-existing, and can also be relatively stable cognitive and social distinctions between individuals and groups...

  20. African boundary politics: a case of Ethiopian-Eritrean boundary ...

    African Journals Online (AJOL)

    This paper examined the boundary discord between Ethiopia and Eritrea over the region around Badme which started as a result of artificial boundaries created by the Italian imperialists. The study depicts the evolution of Italian colonialism in Ethiopia between 1936 and 1941. It exposes the differentials existing between the ...