WorldWideScience

Sample records for technology verification protocol

  1. GENERIC VERIFICATION PROTOCOL FOR AQUEOUS CLEANER RECYCLING TECHNOLOGIES

    Science.gov (United States)

    This generic verification protocol has been structured based on a format developed for ETV-MF projects. This document describes the intended approach and explain plans for testing with respect to areas such as test methodology, procedures, parameters, and instrumentation. Also ...

  2. ENVIRONMENTAL TECHNOLOGY PROTOCOL VERIFICATION REPORT, EMISSIONS OF VOCS AND ALDEHYDES FROM COMMERCIAL FURNITURE (WITH APPENDICES)

    Science.gov (United States)

    As part of a U.S. Environmental Protection Agency Environmental Technology Verification program, the Research Triangle Institute (RTI) developed a test protocol for measuring volatile organic compounds and aldehydes in a large chamber. RTI convened stakeholders for the commercial...

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM: PROTOCOL FOR THE VERIFICATION OF GROUTING MATERIALS FOR INFRASTRUCTURE REHABILITATION AT THE UNIVERSITY OF HOUSTON - CIGMAT

    Science.gov (United States)

    This protocol was developed under the Environmental Protection Agency's Environmental Technology Verification (ETV) Program, and is intended to be used as a guide in preparing laboratory test plans for the purpose of verifying the performance of grouting materials used for infra...

  4. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS FROM SELECTIVE CATALYTIC REDUCTIONS CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    Science.gov (United States)

    The protocol describes the Environmental Technology Verification (ETV) Program's considerations and requirements for verification of emissions reduction provided by selective catalytic reduction (SCR) technologies. The basis of the ETV will be comparison of the emissions and perf...

  5. Environmental technology verification methods

    CSIR Research Space (South Africa)

    Szewczuk, S

    2016-03-01

    Full Text Available Environmental Technology Verification (ETV) is a tool that has been developed in the United States of America, Europe and many other countries around the world to help innovative environmental technologies reach the market. Claims about...

  6. Behaviour Protocols Verification: Fighting State Explosion

    Czech Academy of Sciences Publication Activity Database

    Mach, M.; Plášil, František; Kofroň, Jan

    2005-01-01

    Roč. 6, č. 2 (2005), s. 22-30 ISSN 1525-9293 R&D Projects: GA ČR(CZ) GA102/03/0672 Institutional research plan: CEZ:AV0Z10300504 Keywords : formal verification * software components * stateexplos ion * behavior protocols * parse trees Subject RIV: JC - Computer Hardware ; Software

  7. Turf Conversion Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  8. Outdoor Irrigation Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  9. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  10. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  11. Automated Verification of Quantum Protocols using MCMAS

    Directory of Open Access Journals (Sweden)

    F. Belardinelli

    2012-07-01

    Full Text Available We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC, an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  12. Biometric Technologies and Verification Systems

    CERN Document Server

    Vacca, John R

    2007-01-01

    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavior

  13. Automatic verification of a lip-synchronisation protocol using Uppaal

    NARCIS (Netherlands)

    Bowman, H.; Faconti, G.; Katoen, J.-P.; Latella, D.; Massink, M.

    1998-01-01

    We present the formal specification and verification of a lip-synchronisation protocol using the real-time model checker Uppaal. A number of specifications of this protocol can be found in the literature, but this is the first automatic verification. We take a published specification of the

  14. INNOVATIVE TECHNOLOGY VERIFICATION REPORT " ...

    Science.gov (United States)

    The RemediAidTm Total Petroleum Hydrocarbon Starter Kit (RemediAidTm kit) developed by CHEMetries, Inc. (CHEMetrics), and AZUR Environmental Ltd was demonstrated under the U.S. Environmental Protection Agency Superfund Innovative Technology Evaluation Program in June 2000 at the Navy Base Ventura County site in Port Hueneme, California. The purpose of the demonstration was to collect reliable performance and cost data for the RemediAid Tm kit and six other field measurement devices for total petroleum hydrocarbons (TPH) in soil. In addition to assessing ease of device operation, the key objectives of the demonstration included determining the (1) method detection limit, (2) accuracy and precision, (3) effects of interferents and soil moisture content on TPH measurement, (4) sample throughput, and (5) TPH measurement costs for each device. The demonstration involved analysis of both performance evaluation samples and environmental samples collected in five areas contaminated with gasoline, diesel, lubricating oil, or other petroleum products. The performance and cost results for a given field measurement device were compared to those for an off-site laboratory reference method,

  15. Mechanical verification of concurrency control and recovery protocols

    NARCIS (Netherlands)

    Chkliaev, D.

    2001-01-01

    The thesis concerns the formal specification and mechanized verification of concurrency control and recovery protocols for distributed databases. Such protocols are needed for many modern application such as banking and are often used in safety-critical applications. Therefore it is very important

  16. Environmental Technology Verification: Supplement to Test/QA Plan for Biological and Aerosol Testing of General Ventilation Air Cleaners; Bioaerosol Inactivation Efficiency by HVAC In-Duct Ultraviolet Light Air Cleaners

    Science.gov (United States)

    The Air Pollution Control Technology Verification Center has selected general ventilation air cleaners as a technology area. The Generic Verification Protocol for Biological and Aerosol Testing of General Ventilation Air Cleaners is on the Environmental Technology Verification we...

  17. Interactive verification of Markov chains: Two distributed protocol case studies

    Directory of Open Access Journals (Sweden)

    Johannes Hölzl

    2012-12-01

    Full Text Available Probabilistic model checkers like PRISM only check probabilistic systems of a fixed size. To guarantee the desired properties for an arbitrary size, mathematical analysis is necessary. We show for two case studies how this can be done in the interactive proof assistant Isabelle/HOL. The first case study is a detailed description of how we verified properties of the ZeroConf protocol, a decentral address allocation protocol. The second case study shows the more involved verification of anonymity properties of the Crowds protocol, an anonymizing protocol.

  18. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    OpenAIRE

    Wei, Songjie; Li, Shuai; Liu, Peilong; Liu, Meilin

    2018-01-01

    LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively...

  19. Experiences in the formalisation and verification of medical protocols

    OpenAIRE

    Balser, Michael

    2003-01-01

    Experiences in the formalisation and verification of medical protocols / M. Balser ... - In: Artificial intelligence in medicine : 9th Conference on Artificial Intelligence in Medicine in Europe, AIME 2003, Protaras, Cyprus, October 18 - 22, 2003 ; proceedings / Michel Dojat ... (eds.). - Berlin u.a. : Springer, 2003. - S. 132-141. - (Lecture notes in computer science ; 2780 : Lecture notes in artificial intelligence)

  20. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco

    2015-01-01

    We present ParTypes, a type-based methodology for the verification of Message Passing Interface (MPI) programs written in the C programming language. The aim is to statically verify programs against protocol specifications, enforcing properties such as fidelity and absence of deadlocks. We develo...

  1. Protocol for the verification of minimum criteria

    International Nuclear Information System (INIS)

    Gaggiano, M.; Spiccia, P.; Gaetano Arnetta, P.

    2014-01-01

    This Protocol has been prepared with reference to the provisions of article 8 of the Legislative Decree of May 26, 2000 No. 187. Quality controls of radiological equipment fit within the larger 'quality assurance Program' and are intended to ensure the correct operation of the same and the maintenance of that State. The pursuit of this objective guarantees that the radiological equipment subjected to those controls also meets the minimum criteria of acceptability set out in annex V of the aforementioned legislative decree establishing the conditions necessary to allow the functions to which each radiological equipment was designed, built and for which it is used. The Protocol is established for the purpose of quality control of radiological equipment of Cone Beam Computer Tomography type and reference document, in the sense that compliance with stated tolerances also ensures the subsistence minimum acceptability requirements, where applicable.

  2. Modeling and Verification of the Bitcoin Protocol

    OpenAIRE

    Chaudhary, Kaylash; Fehnker, Ansgar; van de Pol, Jaco; Stoelinga, Marielle

    2015-01-01

    Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would...

  3. Modeling and Verification of the Bitcoin Protocol

    Directory of Open Access Journals (Sweden)

    Kaylash Chaudhary

    2015-11-01

    Full Text Available Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would happen if one user could force a majority to believe that a ledger without his previous payment is the correct one. We are interested in the probability of success of such a double spending attack, which is linked to the computational power of the attacker. This paper examines the Bitcoin protocol and provides its formalization as an UPPAAL model. The model will be used to show how double spending can be done if the parties in the Bitcoin protocol behave maliciously, and with what probability double spending occurs.

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: GREEN BUILDING TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  5. Complementary technologies for verification of excess plutonium

    International Nuclear Information System (INIS)

    Langner, D.G.; Nicholas, N.J.; Ensslin, N.; Fearey, B.L.; Mitchell, D.J.; Marlow, K.W.; Luke, S.J.; Gosnell, T.B.

    1998-01-01

    Three complementary measurement technologies have been identified as candidates for use in the verification of excess plutonium of weapons origin. These technologies: high-resolution gamma-ray spectroscopy, neutron multiplicity counting, and low-resolution gamma-ray spectroscopy, are mature, robust technologies. The high-resolution gamma-ray system, Pu-600, uses the 630--670 keV region of the emitted gamma-ray spectrum to determine the ratio of 240 Pu to 239 Pu. It is useful in verifying the presence of plutonium and the presence of weapons-grade plutonium. Neutron multiplicity counting is well suited for verifying that the plutonium is of a safeguardable quantity and is weapons-quality material, as opposed to residue or waste. In addition, multiplicity counting can independently verify the presence of plutonium by virtue of a measured neutron self-multiplication and can detect the presence of non-plutonium neutron sources. The low-resolution gamma-ray spectroscopic technique is a template method that can provide continuity of knowledge that an item that enters the a verification regime remains under the regime. In the initial verification of an item, multiple regions of the measured low-resolution spectrum form a unique, gamma-radiation-based template for the item that can be used for comparison in subsequent verifications. In this paper the authors discuss these technologies as they relate to the different attributes that could be used in a verification regime

  6. Cooling Tower (Evaporative Cooling System) Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Boyd, Brian [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, Taylor [Colorado Energy Office, Denver, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with cooling tower efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  7. Verification of wet blasting decontamination technology

    International Nuclear Information System (INIS)

    Matsubara, Sachito; Murayama, Kazunari; Yoshida, Hirohisa; Igei, Shigemitsu; Izumida, Tatsuo

    2013-01-01

    Macoho Co., Ltd. participated in the projects of 'Decontamination Verification Test FY 2011 by the Ministry of the Environment' and 'Decontamination Verification Test FY 2011 by the Cabinet Office.' And we tested verification to use a wet blasting technology for decontamination of rubble and roads contaminated by the accident of Fukushima Daiichi Nuclear Power Plant of the Tokyo Electric Power Company. As a results of the verification test, the wet blasting decontamination technology showed that a decontamination rate became 60-80% for concrete paving, interlocking, dense-grated asphalt pavement when applied to the decontamination of the road. When it was applied to rubble decontamination, a decontamination rate was 50-60% for gravel and approximately 90% for concrete and wood. It was thought that Cs-134 and Cs-137 attached to the fine sludge scraped off from a decontamination object and the sludge was found to be separated from abrasives by wet cyclene classification: the activity concentration of the abrasives is 1/30 or less than the sludge. The result shows that the abrasives can be reused without problems when the wet blasting decontamination technology is used. (author)

  8. A Proof-checked Verification of a Real-Time Communication Protocol

    NARCIS (Netherlands)

    Polak, I.

    We present an analysis of a protocol developed by Philips to connect several components of an audio-system. The verification of the protocol is carried out using the timed I/O-automata model of Lynch and Vaandrager. The verification has been partially proof-checked with the interactive proof

  9. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    Directory of Open Access Journals (Sweden)

    Songjie Wei

    2018-01-01

    Full Text Available LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively, are investigated, which further enhance the authentication reliability and efficiency in LEO constellation. Experiments on OPNET simulation platform evaluate and demonstrate the effectiveness, reliability, and fast-switching efficiency of the proposed protocol. For LEO networks, BAVP surpasses the well-known existing solutions with significant advantages in both performance and scalability which are supported by theoretical analysis and simulation results.

  10. CATS Deliverable 5.1 : CATS verification of test matrix and protocol

    OpenAIRE

    Uittenbogaard, J.; Camp, O.M.G.C. op den; Montfort, S. van

    2016-01-01

    This report summarizes the work conducted within work package (WP) 5 "Verification of test matrix and protocol" of the Cyclist AEB testing system (CATS) project. It describes the verification process of the draft CATS test matrix resulting from WP1 and WP2, and the feasibility of meeting requirements set by CATS consortium based on requirements in Euro NCAP AEB protocols regarding accuracy, repeatability and reproducibility using the developed test hardware. For the cases where verification t...

  11. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  12. Advanced Technologies for Design Information Verification

    International Nuclear Information System (INIS)

    Watkins, Michael L.; Sheen, David M.; Rose, Joseph L.; Cumblidge, Stephen E.

    2009-01-01

    This paper discusses several technologies that have the potential to enhance facilities design verification. These approaches have shown promise in addressing the challenges associated with the verification of sub-component geometry and material composition for structures that are not directly accessible for physical inspection. A simple example is a pipe that extends into or through a wall or foundation. Both advanced electromagnetic and acoustic modalities will be discussed. These include advanced radar imaging, transient thermographic imaging, and guided acoustic wave imaging. Examples of current applications are provided. The basic principles and mechanisms of these inspection techniques are presented along with the salient practical features, advantages, and disadvantages of each technique. Other important considerations, such as component geometries, materials, and degree of access are also treated. The importance of, and strategies for, developing valid inspection models are also discussed. Beyond these basic technology adaptation and evaluation issues, important user interface considerations are outlined, along with approaches to quantify the overall performance reliability of the various inspection methods.

  13. Subsurface barrier verification technologies, informal report

    International Nuclear Information System (INIS)

    Heiser, J.H.

    1994-06-01

    One of the more promising remediation options available to the DOE waste management community is subsurface barriers. Some of the uses of subsurface barriers include surrounding and/or containing buried waste, as secondary confinement of underground storage tanks, to direct or contain subsurface contaminant plumes and to restrict remediation methods, such as vacuum extraction, to a limited area. To be most effective the barriers should be continuous and depending on use, have few or no breaches. A breach may be formed through numerous pathways including: discontinuous grout application, from joints between panels and from cracking due to grout curing or wet-dry cycling. The ability to verify barrier integrity is valuable to the DOE, EPA, and commercial sector and will be required to gain full public acceptance of subsurface barriers as either primary or secondary confinement at waste sites. It is recognized that no suitable method exists for the verification of an emplaced barrier's integrity. The large size and deep placement of subsurface barriers makes detection of leaks challenging. This becomes magnified if the permissible leakage from the site is low. Detection of small cracks (fractions of an inch) at depths of 100 feet or more has not been possible using existing surface geophysical techniques. Compounding the problem of locating flaws in a barrier is the fact that no placement technology can guarantee the completeness or integrity of the emplaced barrier. This report summarizes several commonly used or promising technologies that have been or may be applied to in-situ barrier continuity verification

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: EXEL INDUSTRIAL AIRMIX SPRAY GUN

    Science.gov (United States)

    The Environmental Technology Verification Program has partnered with Concurrent Technologies Corp. to verify innovative coatings and coating equipment technologies for reducing air emissions. This report describes the performance of EXEL Industrial's Kremlin Airmix high transfer ...

  15. Towards a CPN-Based Modelling Approach for Reconciling Verification and Implementation of Protocol Models

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael

    2013-01-01

    Formal modelling of protocols is often aimed at one specific purpose such as verification or automatically generating an implementation. This leads to models that are useful for one purpose, but not for others. Being able to derive models for verification and implementation from a single model...... is beneficial both in terms of reduced total modelling effort and confidence that the verification results are valid also for the implementation model. In this paper we introduce the concept of a descriptive specification model and an approach based on refining a descriptive model to target both verification...... how this model can be refined to target both verification and implementation....

  16. Consortium for Verification Technology Fellowship Report.

    Energy Technology Data Exchange (ETDEWEB)

    Sadler, Lorraine E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    As one recipient of the Consortium for Verification Technology (CVT) Fellowship, I spent eight days as a visiting scientist at the University of Michigan, Department of Nuclear Engineering and Radiological Sciences (NERS). During this time, I participated in multiple department and research group meetings and presentations, met with individual faculty and students, toured multiple laboratories, and taught one-half of a one-unit class on Risk Analysis in Nuclear Arms control (six 1.5 hour lectures). The following report describes some of the interactions that I had during my time as well as a brief discussion of the impact of this fellowship on members of the consortium and on me/my laboratory’s technical knowledge and network.

  17. Environmental Technology Verification Report: Taconic Energy, Inc. TEA Fuel Additive

    Science.gov (United States)

    The Greenhouse Gas Technology Center (GHG Center) is one of six verification organizations operating under EPA’s ETV program. One sector of significant interest to GHG Center stakeholders is transportation - particularly technologies that result in fuel economy improvements. Taco...

  18. CATS Deliverable 5.1 : CATS verification of test matrix and protocol

    NARCIS (Netherlands)

    Uittenbogaard, J.; Camp, O.M.G.C. op den; Montfort, S. van

    2016-01-01

    This report summarizes the work conducted within work package (WP) 5 "Verification of test matrix and protocol" of the Cyclist AEB testing system (CATS) project. It describes the verification process of the draft CATS test matrix resulting from WP1 and WP2, and the feasibility of meeting

  19. Verification of communication protocols in web services model-checking service compositions

    CERN Document Server

    Tari, Zahir; Mukherjee, Anshuman

    2014-01-01

    Gathers recent advancements in the field of self-organizing wireless sensor networks and provides readers with the essential, state-of-the-art information about sensor networking. In the near future, wireless sensor networks will become an integral part of our day-to-day life. To solve different sensor networking related issues, researchers have put a great deal of effort into coming up with innovative ideas. Verification of Communication Protocols in Web Services: Model-Checking Service Compositions gathers recent advancements in the field of self-organizing wireless sensor networks and provides readers with integral information about sensor networking. It introduces current technological trends, particularly in node organization, and provides implementation details of each networking type to help readers set up sensor networks in their related job fields. In addition, it identifies the limitations of current technologies, as well as future research directions.

  20. Technology for bolus verification in proton therapy

    Science.gov (United States)

    Shipulin, K. N.; Mytsin, G. V.; Agapov, A. V.

    2015-01-01

    To ensure the conformal depth-dose distribution of a proton beam within a target volume, complex shaped range shifters (so-called boluses), which account for the heterogeneous structure of patient tissue and organs in the beam path, were calculated and manufactured. The precise manufacturing of proton compensators used for patient treatment is a vital step in quality assurance in proton therapy. In this work a software-hardware complex that verifies the quality and precision of bolus manufacturing at the Medico-Technical Complex (MTC) was developed. The boluses consisted of a positioning system with two photoelectric biosensors. We evaluated 20 boluses used in proton therapy of five patients. A total number of 2562 experimental points were measured, of which only two points had values that differed from the calculated value by more than 0.5 mm. The other data points displayed a deviation within ±0.5 mm from the calculated value. The technology for bolus verification developed in this work can be used for the high precision testing of geometrical parameters of proton compensators in radiotherapy.

  1. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  2. VERIFICATION TESTING OF AIR POLLUTION CONTROL TECHNOLOGY QUALITY MANAGEMENT PLAN

    Science.gov (United States)

    This document is the basis for quality assurance for the Air Pollution Control Technology Verification Center (APCT Center) operated under the U.S. Environmental Protection Agency (EPA). It describes the policies, organizational structure, responsibilities, procedures, and qualit...

  3. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten; Kobayashi, Naoki; Sun, Yunde

    2011-01-01

    Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without any...... type annotations or explicit type casts. We have implemented a protocol verifier SpiCa based on the algorithm, and confirmed its effectiveness....

  4. Verification of the safety communication protocol in train control system using colored Petri net

    International Nuclear Information System (INIS)

    Chen Lijie; Tang Tao; Zhao Xianqiong; Schnieder, Eckehard

    2012-01-01

    This paper deals with formal and simulation-based verification of the safety communication protocol in ETCS (European Train Control System). The safety communication protocol controls the establishment of safety connection between train and trackside. Because of its graphical user interface and modeling flexibility upon the changes in the system conditions, this paper proposes a composition Colored Petri Net (CPN) representation for both the logic and the timed model. The logic of the protocol is proved to be safe by means of state space analysis: the dead markings are correct; there are no dead transitions; being fair. Further analysis results have been obtained using formal and simulation-based verification approach. The timed models for the open transmit system and the application process are created for the purpose of performance analysis of the safety communication protocol. The models describe the procedure of data transmission and processing, and also provide relevant timed and stochastic factors, as well as time delay and lost packet, which may influence the time for establishment of safety connection of the protocol. Time for establishment of safety connection of the protocol in normal state is verified by formal verification, and then time for establishment of safety connection with different probability of lost packet is simulated. After verification it is found that the time for establishment of safety connection of the safety communication protocol satisfies the safety requirements.

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION: TEST/QA PLAN FOR THE VERIFICATION TESTING OF SELECTIVE CATALYTIC REDUCTION CONTROL TECHNOLOGIES FOR HIGHWAY, NONROAD, AND STATIONARY USE DIESEL ENGINES

    Science.gov (United States)

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  6. Modelling and Verification of Web Services Business Activity Protocol

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2011-01-01

    WS-Business Activity specification defines two coordination protocols in order to ensure a consistent agreement on the outcome of long-running distributed applications. We use the model checker Uppaal to analyse the Business Agreement with Coordination Completion protocol type. Our analyses show ...

  7. U.S. ENVIRONMENTAL PROTECTION AGENCY (EPA) ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: ARSENIC MONITORING TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency Environmental Technology Verification (ETV) program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This technology ...

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT LASER TOUCH AND TECHNOLOGIES, LLC LASER TOUCH MODEL LT-B512

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of Laser Touch model LT-B512 targeting device manufactured by Laser Touch and Technologies, LLC, for manual spray painting operations. The relative transfer efficiency (TE) improved an avera...

  9. Environmental Technology Verification Report - Electric Power and Heat Production Using Renewable Biogas at Patterson Farms

    Science.gov (United States)

    The U.S. EPA operates the Environmental Technology Verification program to facilitate the deployment of innovative technologies through performance verification and information dissemination. A technology area of interest is distributed electrical power generation, particularly w...

  10. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DUST SUPPRESSANT PRODUCTS: SYNTECH PRODUCTS CORPORATION'S PETROTAC

    Science.gov (United States)

    Dust suppressant products used to control particulate emissions from unpaved roads are among the technologies evaluated by the Air Pollution Control Technology (APCT) Verification Center, part of the U.S. Environmental Protection Agency's Environmental Technology Verification (ET...

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DUST SUPPRESSANT PRODUCTS: SYNTECH PRODUCTS CORPORATION'S TECHSUPPRESS

    Science.gov (United States)

    Dust suppressant products used to control particulate emissions from unpaved roads are among the technologies evaluated by the Air Pollution Control Technology (APCT) Verification Center, part of the U.S. Environmental Protection Agency's Environmental Technology Verification (ET...

  12. Technical workshop on safeguards, verification technologies, and other related experience

    International Nuclear Information System (INIS)

    1998-01-01

    The aim of the Technical Workshop on safeguards was to encourage a clearer understanding of the IAEA Safeguards System, its origins and evolution and the present state of the art. Presentations held by the IAEA officials and outside experts examined as well other components of the non-proliferation regime, the current practices and procedures, and the future prospects. A series of presentations described the characteristics of the interaction between global and regional verification systems and described relevant past and present experience. Prominence given to such state of the art verification technologies as environmental sampling, satellite imaging and monitoring thorough remote and unattended techniques demonstrated, beyond any doubt, the essentially dynamic nature of verification. It is generally acknowledged that there have been major achievements in preventing spread of nuclear weapons, but no verification system can in itself prevent proliferation

  13. Technical workshop on safeguards, verification technologies, and other related experience

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-12-31

    The aim of the Technical Workshop on safeguards was to encourage a clearer understanding of the IAEA Safeguards System, its origins and evolution and the present state of the art. Presentations held by the IAEA officials and outside experts examined as well other components of the non-proliferation regime, the current practices and procedures, and the future prospects. A series of presentations described the characteristics of the interaction between global and regional verification systems and described relevant past and present experience. Prominence given to such state of the art verification technologies as environmental sampling, satellite imaging and monitoring thorough remote and unattended techniques demonstrated, beyond any doubt, the essentially dynamic nature of verification. It is generally acknowledged that there have been major achievements in preventing spread of nuclear weapons, but no verification system can in itself prevent proliferation Refs, figs, tabs

  14. A Formal Verification of the Alternating Bit Protocol in the Calculus of Constructions

    NARCIS (Netherlands)

    Bezem, M.A.; Groote, J.F.

    We report on a formal verification of the Alternating Bit Protocol (ABP) in the Calculus of Constructions. We outline a semi-formal correctness proof of the ABP with sufficient detail to be formalised. Thereafter we show by examples how the formalised proof has been verified by the automated proof

  15. An Improved Constraint-Based System for the Verification of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov [30]. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect flaws associated to partial

  16. An Improved Constraint-based system for the verification of security protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hermenegildo, Manuel V.; Puebla, German

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect aws associated to partial runs

  17. Security Protocol Verification and Optimization by Epistemic Model Checking

    Science.gov (United States)

    2010-11-05

    Three cryptographers are sitting down to dinner at their favourite restau- rant. Their waiter informs them that arrangements have been made with the...Unfortunately, the protocol cannot be expected to satisfy this: suppose that all agents manage to broadcast their mes- sage and all messages have the

  18. Certificateless Public Auditing Protocol with Constant Verification Time

    Directory of Open Access Journals (Sweden)

    Dongmin Kim

    2017-01-01

    Full Text Available To provide the integrity of outsourced data in the cloud storage services, many public auditing schemes which allow a user to check the integrity of the outsourced data have been proposed. Since most of the schemes are constructed on Public Key Infrastructure (PKI, they suffer from several concerns like management of certificates. To resolve the problems, certificateless public auditing schemes also have been studied in recent years. In this paper, we propose a certificateless public auditing scheme which has the constant-time verification algorithm. Therefore, our scheme is more efficient than previous certificateless public auditing schemes. To prove the security of our certificateless public auditing scheme, we first define three formal security models and prove the security of our scheme under the three security models.

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - TETRATEC PTFE TECHNOLOGIES TETRATEX 8005

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, GROUNDWATER SAMPLING TECHNOLOGIES, GEOPROBE INC., PNEUMATIC BLADDER PUMP GW 1400 SERIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) design efficient processes for conducting has created the Environmental Technology perfofl1lance tests of innovative technologies. Verification Program (E TV) to facilitate the deployment of innovative or improved environmental techn...

  1. U.S. ENVIRONMENTAL PROTECTION AGENCY (EPA) ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: ARSENIC TREATMENT TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techn...

  2. Environmental Technology Verification: Baghouse Filtration Products--TDC Filter Manufacturing, Inc., SB025 Filtration Media

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. ETV seeks to ach...

  3. Verification Testing of Air Pollution Control Technology Quality Management Plan Revision 2.3

    Science.gov (United States)

    The Air Pollution Control Technology Verification Center was established in 1995 as part of the EPA’s Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technologies’ performance.

  4. Security protocol specification and verification with AnBx

    DEFF Research Database (Denmark)

    Bugliesi, Michele; Calzavara, Stefano; Mödersheim, Sebastian Alexander

    2016-01-01

    Designing distributed protocols is complex and requires actions at very different levels: from the design of an interaction flow supporting the desired application-specific guarantees to the selection of the most appropriate network-level protection mechanisms. To tame this complexity, we propose...... with a novel notion of forwarding channels, enforcing specific security guarantees from the message originator to the final recipient along a number of intermediate forwarding agents. We give a formal semantics of AnBx in terms of a state transition system expressed in the AVISPA Intermediate Format. We devise...

  5. DIESEL ENGINE RETROFIT TECHNOLOGY VERIFICATION (POSTER)

    Science.gov (United States)

    ETV is presenting a poster at the EPA's 2005 Science Forum from May 16-18, 2005 in Washington, DC. This poster will contain a summary of the performance results realized by the six verified diesel retrofit technologies, as well as potential impacts that could be realized if sigi...

  6. Climate change scenarios and Technology Transfer Protocols

    International Nuclear Information System (INIS)

    Kypreos, Socrates; Turton, Hal

    2011-01-01

    We apply a specific version of MERGE-ETL, an integrated assessment model, to study global climate policies supported by Technology Transfer Protocols (TTPs). We model a specific formulation of such a TTP where donor countries finance via carbon tax revenues, the diffusion of carbon-free technologies in developing countries (DCs) and quantify its benefits. Industrialized countries profit from increased technology exports, global diffusion of advanced technology (leading to additional technology learning and cost reductions) and reduced climate damages through the likelihood of greater global participation in a new international agreement. DCs experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and expected secondary benefits of carbon abatement (such as reduced local and regional air pollution). The analysis identifies potential candidate technologies that could be supported under a TTP, and the impact of a TTP on economic development (including the flow of transfer subsidies) and global emissions. Although a TTP may encourage additional participation, such a proposal is only likely to be successful if an increased willingness to pay to avoid climate damages is accepted, first by the present and future generations of the industrialized world and later on, when sufficient economic growth is accumulated, by today's developing countries. - Research Highlights: → Climate policy scenarios are assessed with differentiated commitments in carbon emission control supported by Technology Transfer Protocols. → Donor countries finance, via carbon-tax revenues, the exports of carbon-free technologies in developing countries helping to get a new international agreement. → Developing countries experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and secondary benefits. → Under Technology Protocols alone and

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PORTABLE GAS CHROMATOGRAPH ELECTRONIC SENSOR TECHNOLOGY MODEL 4100

    Science.gov (United States)

    The U.S. Environmental Protection Agency, through the Environmental Technology Verification Program, is working to accelerate the acceptance and use of innovative technologies that improve the way the United States manages its environmental problems. As part of this program, the...

  8. Advanced Communication Technology Satellite (ACTS) multibeam antenna technology verification experiments

    Science.gov (United States)

    Acosta, Roberto J.; Larko, Jeffrey M.; Lagin, Alan R.

    1992-01-01

    The Advanced Communication Technology Satellite (ACTS) is a key to reaching NASA's goal of developing high-risk, advanced communications technology using multiple frequency bands to support the nation's future communication needs. Using the multiple, dynamic hopping spot beams, and advanced on board switching and processing systems, ACTS will open a new era in communications satellite technology. One of the key technologies to be validated as part of the ACTS program is the multibeam antenna with rapidly reconfigurable hopping and fixed spot beam to serve users equipped with small-aperature terminals within the coverage areas. The proposed antenna technology experiments are designed to evaluate in-orbit ACTS multibeam antenna performance (radiation pattern, gain, cross pol levels, etc.).

  9. A New Approach to Nuclear Warhead Verification Using a Zero-Knowledge Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Glaser,; Alexander, [Princeton University

    2012-05-16

    Warhead verification systems proposed to date fundamentally rely on the use of information barriers to prevent the release of classified design information. Measurements with information carriers significantly increase the complexity of inspection systems, make their certification and authentication difficult, and may reduce the overall confidence in the verifiability of future arms- control agreements. This talk presents a proof-of-concept of a new approach to nuclear warhead verification that minimizes the role of information barriers from the outset and envisions instead an inspection system that a priori avoids leakage of sensitive information using a so-called zero-knowledge protocol. The proposed inspection system is based on the template-matching approach and relies on active interrogation of a test object with 14-MeV neutrons. The viability of the method is examined with MCNP Monte Carlo neutron transport calculations modeling the experimental setup, an investigation of different diversion scenarios, and an analysis of the simulated data showing that it does not contain information about the properties of the inspected object.

  10. Implementation of the Additional Protocol: Verification activities at uranium mines and mills

    International Nuclear Information System (INIS)

    Bragin, V.; Carlson, J.; Leslie, R.

    2001-01-01

    Full text: The mining and milling of uranium is the first in a long chain of processes required to produce nuclear materials in a form suitable for use in nuclear weapons. Misuse of a declared uranium mining/milling facility, in the form of understatement of production, would be hard to detect with the same high level of confidence as afforded by classical safeguards on other parts of the nuclear fuel cycle. For these reasons, it would not be cost-effective to apply verification techniques based on classical safeguards concepts to a mining/milling facility in order to derive assurance of the absence of misuse. Indeed, these observations have been recognised in the Model Protocol (INFCIRC/540): 'the Agency shall not mechanistically or systematically seek to verify' information provided to it by States (Article 4.a.). Nevertheless, complementary access to uranium mining/milling sites 'on a selective basis in order to assure the absence of undeclared nuclear material and activities' (Article 4.a.(i)) is provided for. On this basis, therefore, this paper will focus predominantly on options other than site access, which are available to the Agency for deriving assurance that declared mining/milling operations are not misused. Such options entail the interpretation and analysis of information provided to the Agency including, for example, from declarations, monitoring import/export data, open source reports, commercial satellite imagery, aerial photographs, and information provided by Member States. Uranium mining techniques are diverse, and the inventories, flows and uranium assays which arise at various points in the process will vary considerably between mines, and over the operating cycle of an individual mine. Thus it is essentially impossible to infer any information, which can be used precisely to confirm, or otherwise, declared production by measuring or estimating any of those parameters at points within the mining/milling process. The task of attempting to

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SHARPE MANUFACTURING TITANIUM T1-CG SPRAY GUN

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, the pollution prevention capabilities of a high transfer efficiency liquid spray gun was tested. This ...

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, ANEST IWATA CORPORATION W400-LV SPRAY GUN

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, the pollution prevention capabilities of a high transfer efficiency liquid spray gun was tested. This ...

  13. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: BIOQUELL, INC. CLARIS C HYDROGEN PEROXIDE GAS GENERATOR

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Clarus C Hydrogen Peroxide Gas Generator, a biological decontamination device manufactured by BIOQUELL, Inc. The unit was tested by evaluating its ability to decontaminate seven types...

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, ENVIRONMENTAL DECISION SUPPORT SOFTWARE, UNIVERSITY OF TENNESSEE RESEARCH CORPORATION, SPATIAL ANALYSIS AND DECISION ASSISTANCE (SADA)

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification Program (ETV) to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The goal of the...

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF CONTROL OF BIOAEROSOLS IN HVAC SYSTEMS, COLUMBUS INDUSTRIES HIGH EFFICIENCY MINI PLEAT

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The goal of the...

  16. TET-1- A German Microsatellite for Technology On -Orbit Verification

    Science.gov (United States)

    Föckersperger, S.; Lattner, K.; Kaiser, C.; Eckert, S.; Bärwald, W.; Ritzmann, S.; Mühlbauer, P.; Turk, M.; Willemsen, P.

    2008-08-01

    Due to the high safety standards in the space industry every new product must go through a verification process before qualifying for operation in a space system. Within the verification process the payload undergoes a series of tests which prove that it is in accordance with mission requirements in terms of function, reliability and safety. Important verification components are the qualification for use on the ground as well as the On-Orbit Verification (OOV), i.e. proof that the product is suitable for use under virtual space conditions (on-orbit). Here it is demonstrated that the product functions under conditions which cannot or can only be partially simulated on the ground. The OOV-Program of the DLR serves to bridge the gap between the product tested and qualified on the ground and the utilization of the product in space. Due to regular and short-term availability of flight opportunities industry and research facilities can verify their latest products under space conditions and demonstrate their reliability and marketability. The Technologie-Erprobungs-Tr&äger TET (Technology Experiments Carrier) comprises the core elements of the OOV Program. A programmatic requirement of the OOV Program is that a satellite bus already verified in orbit be used in the first segment of the program. An analysis of suitable satellite buses showed that a realization of the TET satellite bus based on the BIRD satellite bus fulfilled the programmatic requirements best. Kayser-Threde was selected by DLR as Prime Contractor to perform the project together with its major subcontractors Astro- und Feinwerktechnik, Berlin for the platform development and DLR-GSOC for the ground segment development. TET is now designed to be a modular and flexible micro-satellite for any orbit between 450 and 850 km altitude and inclination between 53° and SSO. With an overall mass of 120 kg TET is able to accommodate experiments of up to 50 kg. A multipurpose payload supply systemThere is

  17. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services

    Directory of Open Access Journals (Sweden)

    Alexandre Pinheiro

    2018-03-01

    Full Text Available Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance.

  18. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.

    Science.gov (United States)

    Pinheiro, Alexandre; Dias Canedo, Edna; de Sousa Junior, Rafael Timoteo; de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-03-02

    Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance.

  19. Development of evaluation and performance verification technology for radiotherapy radiation

    Energy Technology Data Exchange (ETDEWEB)

    Kim, J. Y.; Jang, S. Y.; Kim, B. H. and others

    2005-02-15

    No matter how much the importance is emphasized, the exact assessment of the absorbed doses administered to the patients to treat the various diseases such as lately soaring malignant tumors with the radiotherapy practices is the most important factor. In reality, several over-exposed patients from the radiotherapy practice become very serious social issues. Especially, the development of a technology to exactly assess the high doses and high energies (In general, dose administered to the patients with the radiotherapy practices are very huge doses, and they are about three times higher than the lethal doses) generated by the radiation generators and irradiation equipment is a competing issue to be promptly conducted. Over fifty medical centers in Korea operate the radiation generators and irradiation equipment for the radiotherapy practices. However, neither the legal and regulatory systems to implement a quality assurance program are sufficiently stipulated nor qualified personnel who could run a program to maintain the quality assurance and control of those generators and equipment for the radiotherapy practices in the medical facilities are sufficiently employed. To overcome the above deficiencies, a quality assurance program such as those developed in the technically advanced countries should be developed to exactly assess the doses administered to patients with the radiotherapy practices and develop the necessary procedures to maintain the continuing performance of the machine or equipment for the radiotherapy. The QA program and procedures should induce the fluent calibration of the machine or equipment with quality, and definitely establish the safety of patients in the radiotherapy practices. In this study, a methodology for the verification and evaluation of the radiotherapy doses is developed, and several accurate measurements, evaluations of the doses delivered to patients and verification of the performance of the therapy machine and equipment are

  20. Transparencies used in describing the CTBT verification regime and its four monitoring technologies

    International Nuclear Information System (INIS)

    Basham, P.

    1999-01-01

    This presentation includes description of the CTBT verification regime and its four monitoring technologies, (namely, seismic monitoring, hydro acoustic monitoring, infrasound monitoring and radionuclides monitoring) CTBT global verification system, sequence of steps needed for installing an international monitoring system station which includes: site survey, site preparation and construction, equipment procurement and installation, final tests and certification

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: MOBILE SOURCE RETROFIT AIR POLLUTION CONTROL DEVICES: CLEAN CLEAR FUEL TECHNOLOGIES, INC.’S, UNIVERSAL FUEL CELL

    Science.gov (United States)

    The U.S. EPA's Office of Research and Development operates the Environmental Technology Verification (ETV) program to facilitate the deployment of innovative technologies through performance verification and information dissemination. Congress funds ETV in response to the belief ...

  2. Technology verification phase. Dynamic isotope power system. Final report

    International Nuclear Information System (INIS)

    Halsey, D.G.

    1982-01-01

    The Phase I requirements of the Kilowatt Isotope Power System (KIPS) program were to make a detailed Flight System Conceptual Design (FSCD) for an isotope fueled organic Rankine cycle power system and to build and test a Ground Demonstration System (GDS) which simulated as closely as possible the operational characteristics of the FSCD. The activities and results of Phase II, the Technology Verification Phase, of the program are reported. The objectives of this phase were to increase system efficiency to 18.1% by component development, to demonstrate system reliability by a 5000 h endurance test and to update the flight system design. During Phase II, system performance was improved from 15.1% to 16.6%, an endurance test of 2000 h was performed while the flight design analysis was limited to a study of the General Purpose Heat Source, a study of the regenerator manufacturing technique and analysis of the hardness of the system to a laser threat. It was concluded from these tests that the GDS is basically prototypic of a flight design; all components necessary for satisfactory operation were demonstrated successfully at the system level; over 11,000 total h of operation without any component failure attested to the inherent reliability of this type of system; and some further development is required, specifically in the area of performance

  3. Technology verification phase. Dynamic isotope power system. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Halsey, D.G.

    1982-03-10

    The Phase I requirements of the Kilowatt Isotope Power System (KIPS) program were to make a detailed Flight System Conceptual Design (FSCD) for an isotope fueled organic Rankine cycle power system and to build and test a Ground Demonstration System (GDS) which simulated as closely as possible the operational characteristics of the FSCD. The activities and results of Phase II, the Technology Verification Phase, of the program are reported. The objectives of this phase were to increase system efficiency to 18.1% by component development, to demonstrate system reliability by a 5000 h endurance test and to update the flight system design. During Phase II, system performance was improved from 15.1% to 16.6%, an endurance test of 2000 h was performed while the flight design analysis was limited to a study of the General Purpose Heat Source, a study of the regenerator manufacturing technique and analysis of the hardness of the system to a laser threat. It was concluded from these tests that the GDS is basically prototypic of a flight design; all components necessary for satisfactory operation were demonstrated successfully at the system level; over 11,000 total h of operation without any component failure attested to the inherent reliability of this type of system; and some further development is required, specifically in the area of performance. (LCL)

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: NEW CONDENSATOR, INC.--THE CONDENSATOR DIESEL ENGINE RETROFIT CRANKCASE VENTILATION SYSTEM

    Science.gov (United States)

    EPA's Environmental Technology Verification Program has tested New Condensator Inc.'s Condensator Diesel Engine Retrofit Crankcase Ventilation System. Brake specific fuel consumption (BSFC), the ratio of engine fuel consumption to the engine power output, was evaluated for engine...

  5. Development of requirements tracking and verification technology for the NPP software

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Chul Hwan; Kim, Jang Yeol; Lee, Jang Soo; Song, Soon Ja; Lee, Dong Young; Kwon, Kee Choon

    1998-12-30

    Searched and analyzed the technology of requirements engineering in the areas of aerospace and defense industry, medical industry and nuclear industry. Summarized the status of tools for the software design and requirements management. Analyzed the software design methodology for the safety software of NPP. Development of the design requirements for the requirements tracking and verification system. Development of the background technology to design the prototype tool for the requirements tracking and verification.

  6. Development of requirements tracking and verification technology for the NPP software

    International Nuclear Information System (INIS)

    Jung, Chul Hwan; Kim, Jang Yeol; Lee, Jang Soo; Song, Soon Ja; Lee, Dong Young; Kwon, Kee Choon

    1998-01-01

    Searched and analyzed the technology of requirements engineering in the areas of aerospace and defense industry, medical industry and nuclear industry. Summarized the status of tools for the software design and requirements management. Analyzed the software design methodology for the safety software of NPP. Development of the design requirements for the requirements tracking and verification system. Development of the background technology to design the prototype tool for the requirements tracking and verification

  7. Clinical Simulation: A Protocol for Evaluation of Mobile Technology.

    Science.gov (United States)

    Mather, Carey; Jensen, Sanne; Cummings, Elizabeth

    2017-01-01

    For mobile technology to be accepted at point of care in healthcare environments there is a need to demonstrate benefits whilst ameliorating the risks and challenges. To provide a standardised approach to evaluation of mobile technology a simulation protocol was developed to provide guidance for its use in healthcare environments. Simulated conditions provide the opportunity to assess intended and unintended consequences and identify potential workarounds when using technology. The protocol can also be used to demonstrate the importance of the development of digital professionalism by end-users prior to students entering the clinical practice setting. The mobile technology protocol was adapted from a health information systems protocol developed and used at the ITX Lab, Denmark for use in other simulation laboratories. Use case scenarios were developed to enable evaluation of mobile technology for mobile learning of nurses, nurse supervisors, students and patients. The scenarios can be used in a range of simulated environments including hospital bedside, outpatient clinic or community settings. A case study exemplar of a nurse and patient is included to demonstrate how the mobile technology protocol can be applied.

  8. Dynamic Isotope Power System: technology verification phase, program plan, 1 October 1978

    International Nuclear Information System (INIS)

    1979-01-01

    The technology verification phase program plan of the Dynamic Isotope Power System (DIPS) project is presented. DIPS is a project to develop a 0.5 to 2.0 kW power system for spacecraft using an isotope heat source and a closed-cycle Rankine power-system with an organic working fluid. The technology verification phase's purposes are to increase the system efficiency to over 18%, to demonstrate system reliability, and to provide an estimate for flight test scheduling. Progress toward these goals is reported

  9. Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Delzanno, Giorgio; Esparza, Javier; Srba, Jiri

    2006-01-01

    of messages) some verification problems become decidable. In particular we give an algorithm to decide control state reachability, a problem related to security properties like secrecy and authenticity. The proof is via a reduction to a new prefix rewriting model called Monotonic Set-extended Prefix rewriting...

  10. Wireless Cognitive Networks Technologies and Protocols

    OpenAIRE

    Loscri , Valeria; Maskooki , Arash; Mitton , Nathalie; Vegni , Anna Maria

    2015-01-01

    International audience; Software Defined Radio and Cognitive Radio applied to Wireless Sensor Networks and Body Area Networks represent an intriguing and really recent paradigm, which represents an objective of study of several researchers. In order to make this technology effective, it is necessary to consider an analytical model of communication capacity, energy consumption and congestion, to effectively exploit the Software Defined Radio and Cognitive Radio in this type of systems. This ch...

  11. Reliability program plan for the Kilowatt Isotope Power System (KIPS) technology verification phase

    International Nuclear Information System (INIS)

    1978-01-01

    Ths document is an integral part of the Kilowatt Isotope Power System (KIPS) Program Plan. This document defines the KIPS Reliability Program Plan for the Technology Verification Phase. This document delineates the reliability assurance tasks that are to be accomplished by Sundstrand and its suppliers during the design, fabrication and testing of the KIPS

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, BAGHOUSE FILTRATION PRODUCTS, TETRATEC PTFE PRODUCTS, TETRATEX 6212 FILTER SAMPLE

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) Verification Center. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of the size of those particles equal to and smalle...

  13. ENVIORNMENTAL TECHNOLOGY VERIFICATION REPORT: ANEST IWATA CORPORATION LPH400-LV HVLP SPRAY GUN

    Science.gov (United States)

    This Enviornmental Technology Verification reports on the characteristics of a paint spray gun. The research showed that the spray gun provided absolute and relative increases in transfer efficiency over the base line and provided a reduction in the use of paint.

  14. TEST DESIGN FOR ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) OF ADD-ON NOX CONTROL UTILIZING OZONE INJECTION

    Science.gov (United States)

    The paper discusses the test design for environmental technology verification (ETV) of add-0n nitrogen oxides (NOx) control utilizing ozone injection. (NOTE: ETV is an EPA-established program to enhance domestic and international market acceptance of new or improved commercially...

  15. ANIMAL WASTE IMPACT ON SOURCE WATERSAIDED BY EPA/NSF ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) SOURCE WATER PROTECTION PILOT

    Science.gov (United States)

    The Environmental Technology Verification Program (ETV) was established in 1995 by the U.S. Environmental Protection Agency to encourage the development and commercialization of new environmental technologies through third part testing and reporting of performance data. By ensur...

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION--TEST REPORT OF MOBILE SOURCE EMISSION CONTROL DEVICES, FLINT HILLS RESOURCES, LP, CCD15010 DIESEL FUEL FORMULATION WITH HITEC4121 ADDITIVE

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification (ETV) Program to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. ETV seeks to ach...

  17. Environmental Technology Verification: Biological Inactivation Efficiency by HVAC In-Duct Ultraviolet Light Systems--American Ultraviolet Corporation, DC24-6-120 [EPA600etv08005

    Science.gov (United States)

    The Air Pollution Control Technology Verification Center (APCT Center) is operated by RTI International (RTI), in cooperation with EPA's National Risk Management Research Laboratory. The APCT Center conducts verifications of technologies that clean air in ventilation systems, inc...

  18. Modelling, Verification, and Comparative Performance Analysis of the B.A.T.M.A.N. Protocol

    NARCIS (Netherlands)

    Chaudhary, Kaylash; Fehnker, Ansgar; Mehta, Vinay; Hermanns, Holger; Höfner, Peter

    2017-01-01

    This paper considers on a network routing protocol known as Better Approach to Mobile Ad hoc Networks (B.A.T.M.A.N.). The protocol serves two aims: first, to discover all bidirectional links, and second, to identify the best-next-hop for every other node in the network. A key element is that each

  19. Optimization and Verification of the TR-MAC Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    Morshed, S.; Heijenk, Geert

    2015-01-01

    Energy-efficiency is an important requirement in the design of communication protocols for wireless sensor networks (WSN). TR-MAC is an energy-efficient medium access control (MAC) layer protocol for low power WSN that exploits transmitted-reference (TR) modulation in the physical layer. The

  20. Update on Monitoring Technologies for International Safeguards and Fissile Material Verification

    International Nuclear Information System (INIS)

    Croessmann, C. Dennis; Glidewell, Don D.; Mangan, Dennis L.; Smathers, Douglas C.

    1999-01-01

    Monitoring technologies are playing an increasingly important part in international safeguards and fissile material verification. The developments reduce the time an inspector must spend at a site while assuring continuity of knowledge. Monitoring technologies' continued development has produced new seal systems and integrated video surveillance advances under consideration for Trilateral Initiative use. This paper will present recent developments for monitoring systems at Embalse, Argentina, VNHEF, Sarov, Russian, and Savannah River Site, Aiken, South Carolina

  1. Independent Verification Survey Report For Zone 1 Of The East Tennessee Technology Park In Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    King, David A.

    2012-01-01

    Oak Ridge Associated Universities (ORAU) conducted in-process inspections and independent verification (IV) surveys in support of DOE's remedial efforts in Zone 1 of East Tennessee Technology Park (ETTP) in Oak Ridge, Tennessee. Inspections concluded that the remediation contractor's soil removal and survey objectives were satisfied and the dynamic verification strategy (DVS) was implemented as designed. Independent verification (IV) activities included gamma walkover surveys and soil sample collection/analysis over multiple exposure units (EUs)

  2. Re-verification of a Lip Synchronization Protocol using Robust Reachability

    Directory of Open Access Journals (Sweden)

    Piotr Kordy

    2010-03-01

    Full Text Available The timed automata formalism is an important model for specifying and analysing real-time systems. Robustness is the correctness of the model in the presence of small drifts on clocks or imprecision in testing guards. A symbolic algorithm for the analysis of the robustness of timed automata has been implemented. In this paper, we re-analyse an industrial case lip synchronization protocol using the new robust reachability algorithm. This lip synchronization protocol is an interesting case because timing aspects are crucial for the correctness of the protocol. Several versions of the model are considered: with an ideal video stream, with anchored jitter, and with non-anchored jitter.

  3. Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool

    OpenAIRE

    Hazem A Elbaz

    2015-01-01

    The mostly cloud computing authentication mechanisms use public key infrastructure (PKI). Hierarchical Identity Based Cryptography (HIBC) has several advantages that sound well align with the demands of cloud computing. The main objectives of cloud computing authentication protocols are security and efficiency. In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we...

  4. RAPID FREEFORM SHEET METAL FORMING: TECHNOLOGY DEVELOPMENT AND SYSTEM VERIFICATION

    Energy Technology Data Exchange (ETDEWEB)

    Kiridena, Vijitha [Ford Scientific Research Lab., Dearborn, MI (United States); Verma, Ravi [Boeing Research and Technology (BR& T), Seattle, WA (United States); Gutowski, Timothy [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States); Roth, John [Pennsylvania State Univ., University Park, PA (United States)

    2018-03-31

    The objective of this project is to develop a transformational RApid Freeform sheet metal Forming Technology (RAFFT) in an industrial environment, which has the potential to increase manufacturing energy efficiency up to ten times, at a fraction of the cost of conventional technologies. The RAFFT technology is a flexible and energy-efficient process that eliminates the need for having geometry-specific forming dies. The innovation lies in the idea of using the energy resource at the local deformation area which provides greater formability, process control, and process flexibility relative to traditional methods. Double-Sided Incremental Forming (DSIF), the core technology in RAFFT, is a new concept for sheet metal forming. A blank sheet is clamped around its periphery and gradually deformed into a complex 3D freeform part by two strategically aligned stylus-type tools that follow a pre-described toolpath. The two tools, one on each side of the blank, can form a part with sharp features for both concave and convex shapes. Since deformation happens locally, the forming force at any instant is significantly decreased when compared to traditional methods. The key advantages of DSIF are its high process flexibility, high energy-efficiency, low capital investment, and the elimination of the need for massive amounts of die casting and machining. Additionally, the enhanced formability and process flexibility of DSIF can open up design spaces and result in greater weight savings.

  5. A comparison of the use of bony anatomy and internal markers for offline verification and an evaluation of the potential benefit of online and offline verification protocols for prostate radiotherapy.

    Science.gov (United States)

    McNair, Helen A; Hansen, Vibeke N; Parker, Christopher C; Evans, Phil M; Norman, Andrew; Miles, Elizabeth; Harris, Emma J; Del-Acroix, Louise; Smith, Elizabeth; Keane, Richard; Khoo, Vincent S; Thompson, Alan C; Dearnaley, David P

    2008-05-01

    To evaluate the utility of intraprostatic markers in the treatment verification of prostate cancer radiotherapy. Specific aims were: to compare the effectiveness of offline correction protocols, either using gold markers or bony anatomy; to estimate the potential benefit of online correction protocol's using gold markers; to determine the presence and effect of intrafraction motion. Thirty patients with three gold markers inserted had pretreatment and posttreatment images acquired and were treated using an offline correction protocol and gold markers. Retrospectively, an offline protocol was applied using bony anatomy and an online protocol using gold markers. The systematic errors were reduced from 1.3, 1.9, and 2.5 mm to 1.1, 1.1, and 1.5 mm in the right-left (RL), superoinferior (SI), and anteroposterior (AP) directions, respectively, using the offline correction protocol and gold markers instead of bony anatomy. The subsequent decrease in margins was 1.7, 3.3, and 4 mm in the RL, SI, and AP directions, respectively. An offline correction protocol combined with an online correction protocol in the first four fractions reduced random errors further to 0.9, 1.1, and 1.0 mm in the RL, SI, and AP directions, respectively. A daily online protocol reduced all errors to markers is effective in reducing the systematic error. The value of online protocols is reduced by intrafraction motion.

  6. International Performance Measurement & Verification Protocol: Concepts and Practices for Improved Indoor Environmental Quality, Volume II (Revised)

    Energy Technology Data Exchange (ETDEWEB)

    2002-03-01

    This protocol serves as a framework to determine energy and water savings resulting from the implementation of an energy efficiency program. It is also intended to help monitor the performance of renewable energy systems and to enhance indoor environmental quality in buildings.

  7. Pragmatics Annotated Coloured Petri Nets for Protocol Software Generation and Verification

    DEFF Research Database (Denmark)

    Fagerland Simonsen, Kent Inge; Kristensen, Lars Michael; Kindler, Ekkart

    2015-01-01

    PetriCode is a tool that supports automated generation of protocol software from a restricted class of Coloured Petri Nets (CPNs) called Pragmatics Annotated Coloured Petri Nets (PA-CPNs). Petri-Code and PA-CPNs have been designed with five main requirements in mind, which include the same model...

  8. Pragmatics annotated coloured petri nets for protocol software generation and verification

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge Fagerland; Kristensen, Lars M.; Kindler, Ekkart

    2016-01-01

    Pragmatics Annotated Coloured Petri Nets (PA-CPNs) are a restricted class of Coloured Petri Nets (CPNs) developed to support automated generation of protocol software. The practical application of PA-CPNs and the supporting PetriCode software tool have been discussed and evaluated in earlier papers...

  9. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services †

    Science.gov (United States)

    2018-01-01

    Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance. PMID:29498641

  10. Current Research on Containment Technologies for Verification Activities: Advanced Tools for Maintaining Continuity of Knowledge

    International Nuclear Information System (INIS)

    Smartt, H.; Kuhn, M.; Krementz, D.

    2015-01-01

    The U.S. National Nuclear Security Administration (NNSA) Office of Non-proliferation and Verification Research and Development currently funds research on advanced containment technologies to support Continuity of Knowledge (CoK) objectives for verification regimes. One effort in this area is the Advanced Tools for Maintaining Continuity of Knowledge (ATCK) project. Recognizing that CoK assurances must withstand potential threats from sophisticated adversaries, and that containment options must therefore keep pace with technology advances, the NNSA research and development on advanced containment tools is an important investment. The two ATCK efforts underway at present address the technical containment requirements for securing access points (loop seals) and protecting defined volumes. Multiple U.S. national laboratories are supporting this project: Sandia National Laboratories (SNL), Savannah River National Laboratory (SRNL), and Oak Ridge National Laboratory (ORNL). SNL and SRNL are developing the ''Ceramic Seal,'' an active loop seal that integrates multiple advanced security capabilities and improved efficiency housed within a small-volume ceramic body. The development includes an associated handheld reader and interface software. Currently at the prototype stage, the Ceramic Seal will undergo a series of tests to determine operational readiness. It will be field tested in a representative verification trial in 2016. ORNL is developing the Whole Volume Containment Seal (WCS), a flexible conductive fabric capable of enclosing various sizes and shapes of monitored items. The WCS includes a distributed impedance measurement system for imaging the fabric surface area and passive tamper-indicating features such as permanent-staining conductive ink. With the expected technology advances from the Ceramic Seal and WCS, the ATCK project takes significant steps in advancing containment technologies to help maintain CoK for various verification

  11. A Comparison of the Use of Bony Anatomy and Internal Markers for Offline Verification and an Evaluation of the Potential Benefit of Online and Offline Verification Protocols for Prostate Radiotherapy

    International Nuclear Information System (INIS)

    McNair, Helen A.; Hansen, Vibeke N.; Parker, Christopher; Evans, Phil M.; Norman, Andrew; Miles, Elizabeth; Harris, Emma J.; Del-Acroix, Louise; Smith, Elizabeth; Keane, Richard; Khoo, Vincent S.; Thompson, Alan C.; Dearnaley, David P.

    2008-01-01

    Purpose: To evaluate the utility of intraprostatic markers in the treatment verification of prostate cancer radiotherapy. Specific aims were: to compare the effectiveness of offline correction protocols, either using gold markers or bony anatomy; to estimate the potential benefit of online correction protocol's using gold markers; to determine the presence and effect of intrafraction motion. Methods and Materials: Thirty patients with three gold markers inserted had pretreatment and posttreatment images acquired and were treated using an offline correction protocol and gold markers. Retrospectively, an offline protocol was applied using bony anatomy and an online protocol using gold markers. Results: The systematic errors were reduced from 1.3, 1.9, and 2.5 mm to 1.1, 1.1, and 1.5 mm in the right-left (RL), superoinferior (SI), and anteroposterior (AP) directions, respectively, using the offline correction protocol and gold markers instead of bony anatomy. The subsequent decrease in margins was 1.7, 3.3, and 4 mm in the RL, SI, and AP directions, respectively. An offline correction protocol combined with an online correction protocol in the first four fractions reduced random errors further to 0.9, 1.1, and 1.0 mm in the RL, SI, and AP directions, respectively. A daily online protocol reduced all errors to <1 mm. Intrafraction motion had greater impact on the effectiveness of the online protocol than the offline protocols. Conclusions: An offline protocol using gold markers is effective in reducing the systematic error. The value of online protocols is reduced by intrafraction motion

  12. Protocol for the quality control systems of electronic portal imaging used in verification of radiotherapy treatment

    International Nuclear Information System (INIS)

    Silvestre, Ileana; Alfonso, Rodolfo; Garcia, Fernando

    2009-01-01

    Following the approach of quality control of radiotherapy equipment, conceived in the IAEA TECDOC-1151, we analyzed the different tests must be to an EPID to guarantee levels of accuracy required in the administration of radiation treatments, including the study of the impact of different parameters, geometric and dosimetric imaging, involved in the process. Established the types and frequency of checks, as well as procedures for their implementation, the allowable tolerances set of values records and forms for recording . Was carried out assessment protocol in various services based on amorphous silicon EPID for its applicability and scope. Was designed and validated in clinical practice protocol for EPID quality control, demonstrating its applicability with a minimum of material and human resources. It We concluded that with proper and systematic quality control program, tests including dosimetry, the EPID can provide valuable information about physico-beam dosimetry, and ensure adequate accuracy geometric in the patient's location. (author)

  13. New Approaches and New Technologies for the Verification of Nuclear Disarmament

    International Nuclear Information System (INIS)

    Keir, David

    2013-01-01

    ESARDA’s New Approaches/Novel Technologies Working group has recently begun to take a great interest in technology for use in arms control verification, in parallel with a focus on Nuclear Safeguards technology. A topic-based meeting of members of the NA/NT Subgroup was hosted at Joint Research Centre (JRC), ITU-Nuclear Security Unit in Ispra (Italy), to further explore the technical issues and opportunities presented by the need for new approaches and technologies in a future verified nuclear weapons dismantlement regime. Nuclear warheads must contain radioactive material and, by their nature, gamma rays and neutrons are likely to penetrate to the outside of the warhead casing and even metal containers. Therefore radiation signatures should be detectable by appropriate pieces of equipment. For this reason, researchers in the field of technical verification of nuclear warhead dismantlement have studied and developed technologies for Non-Destructive Assay (NDA). This paper presents a generic dismantlement pathway for verified nuclear warhead dismantlement, based on the scenario employed by the UK-Norway initiative for their exercise in 2008/9. Using this as a framework the types of measurement challenge likely to be presented to a verifying inspector are discussed. The problem of intrusiveness of measurements in relation to the issue of proliferative release of classified information about the warhead attributes is discussed and the concept of ‘information barriers is introduced as a possible solution to this issue. A list of candidate technologies for use in verification activities, with or without information barriers is then presented and, since most of these are new or novel approaches to the issue, an already-established system for classifying them – in terms of state of development and complexity of use in this context – is proposed. Finally, the concept of capturing this information as a library of ‘data sheets’, designed for periodic review as

  14. Application verification research of cloud computing technology in the field of real time aerospace experiment

    Science.gov (United States)

    Wan, Junwei; Chen, Hongyan; Zhao, Jing

    2017-08-01

    According to the requirements of real-time, reliability and safety for aerospace experiment, the single center cloud computing technology application verification platform is constructed. At the IAAS level, the feasibility of the cloud computing technology be applied to the field of aerospace experiment is tested and verified. Based on the analysis of the test results, a preliminary conclusion is obtained: Cloud computing platform can be applied to the aerospace experiment computing intensive business. For I/O intensive business, it is recommended to use the traditional physical machine.

  15. DOE/LLNL verification symposium on technologies for monitoring nuclear tests related to weapons proliferation

    International Nuclear Information System (INIS)

    Nakanishi, K.K.

    1993-01-01

    The rapidly changing world situation has raised concerns regarding the proliferation of nuclear weapons and the ability to monitor a possible clandestine nuclear testing program. To address these issues, Lawrence Livermore National Laboratory's (LLNL) Treaty Verification Program sponsored a symposium funded by the US Department of Energy's (DOE) Office of Arms Control, Division of Systems and Technology. The DOE/LLNL Symposium on Technologies for Monitoring Nuclear Tests Related to Weapons Proliferation was held at the DOE's Nevada Operations Office in Las Vegas, May 6--7,1992. This volume is a collection of several papers presented at the symposium. Several experts in monitoring technology presented invited talks assessing the status of monitoring technology with emphasis on the deficient areas requiring more attention in the future. In addition, several speakers discussed proliferation monitoring technologies being developed by the DOE's weapons laboratories

  16. Non proliferation regimes undertakings: Benefits and limits of synergies in verification technologies and procedures

    International Nuclear Information System (INIS)

    Richard, M.

    2001-01-01

    Full text: Thirty years ago the NPT was entering into force. Therewith, when a State became party to the NPT, it had, in accordance with article III.1 of the Treaty, an undertaking to conclude a Comprehensive Safeguards agreement with the IAEA and accept safeguards verification on source or special fissionable material in all peaceful nuclear activities within its territories in order to verify that such material is not diverted. This multilateral instrument was the foundation stone of the non-proliferation regime and marked the actual birth of internationally accepted measures to verily compliance with politically stringent agreements. Since that time several important multilateral or bilateral instruments on non-proliferation and disarmament have been negotiated and adopted to curb the development and the acquisition of Weapons of Mass Destruction (WMD) most of them since the middle of the eighties and the collapse of the Soviet Union. Amongst the multilateral instruments are the Convention on the Prohibition of Bacteriological Weapon and Toxin Weapons (1972), the Convention on the Prohibition of Chemical Weapons (1993), the Comprehensive Test Ban Treaty (1996), the Strengthening of the IAEA Safeguards and the Additional Protocol (1997), with some still in negotiation like the Protocol of the Convention on the Prohibition of Bacteriological and Toxin Weapons, and some on which negotiation is still a wish like the Fissile Material Cut-off Treaty. Bilateral disarmament agreements between the United States of America and the Russian Federation such as the INF Treaty, START I and II, the agreements on the elimination of excess defence nuclear material as well as the Trilateral Initiative with the IAEA pave the way to nuclear disarmament with the reduction of both the number of nuclear weapons arsenal and the fissile material inventories. The politically stringent undertakings of States that have become parties to those agreements would not be possible without the

  17. Pragmatics Annotated Coloured Petri Nets for Protocol Software Generation and Verification

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael; Kindler, Ekkart

    This paper presents the formal definition of Pragmatics Annotated Coloured Petri Nets (PA-CPNs). PA-CPNs represent a class of Coloured Petri Nets (CPNs) that are designed to support automated code genera-tion of protocol software. PA-CPNs restrict the structure of CPN models and allow Petri net...... elements to be annotated with so-called pragmatics, which are exploited for code generation. The approach and tool for gen-erating code is called PetriCode and has been discussed and evaluated in earlier work already. The contribution of this paper is to give a formal def-inition for PA-CPNs; in addition...

  18. A review of technology for verification of waste removal from Hanford Underground Storage Tanks (WHC Issue 30)

    International Nuclear Information System (INIS)

    Thunborg, S.

    1994-09-01

    Remediation of waste from Underground Storage Tanks (UST) at the Hanford Waste storage sites will require removal of all waste to a nearly clean condition. Current requirements are 99% clean. In order to meet remediation legal requirements, a means to remotely verify that the waste has been removed to sufficient level is needed. This report discusses the requirements for verification and reviews major technologies available for inclusion in a verification system. The report presents two operational scenarios for verification of residual waste volume. Thickness verification technologies reviewed are Ultrasonic Sensors, Capacitance Type Sensors, Inductive Sensors, Ground Penetrating Radar, and Magnetometers. Of these technologies Inductive (Metal Detectors) and Ground Penetrating Radar appear to be the most suitable for use as waste thickness sensors

  19. Working Group 2: Future Directions for Safeguards and Verification, Technology, Research and Development

    International Nuclear Information System (INIS)

    Zykov, S.; Blair, D.

    2013-01-01

    For traditional safeguards it was recognized that the hardware presently available is, in general, addressing adequately fundamental IAEA needs, and that further developments should therefore focus mainly on improving efficiencies (i.e. increasing cost economies, reliability, maintainability and user-friendliness, keeping abreast of continual advancements in technologies and of the evolution of verification approaches). Specific technology areas that could benefit from further development include: -) Non-destructive measurement systems (NDA), in particular, gamma-spectroscopy and neutron counting techniques; -) Containment and surveillance tools, such as tamper indicating seals, video-surveillance, surface identification methods, etc.; -) Geophysical methods for design information verification (DIV) and safeguarding of geological repositories; and -) New tools and methods for real-time monitoring. Furthermore, the Working Group acknowledged that a 'building block' (or modular) approach should be adopted towards technology development, enabling equipment to be upgraded efficiently as technologies advance. Concerning non-traditional safeguards, in the area of satellite-based sensors, increased spatial resolution and broadened spectral range were identified as priorities. In the area of wide area surveillance, the development of LIDAR-like tools for atmospheric sensing was discussed from the perspective of both potential benefits and certain limitations. Recognizing the limitations imposed by the human brain in terms of information assessment and analysis, technologies are needed that will enable the more effective utilization of all information, regardless of its format and origin. The paper is followed by the slides of the presentation. (A.C.)

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF MOBILE SOURCE EMISSIONS CONTROL DEVICES/CLEAN DIESEL TECHNOLOGIES FUEL BORNE CATALYST WITH CLEANAIR SYSTEM'S DIESEL OXIDATION CATALYST

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Fuel-Borne Catalyst with CleanAir System's Diesel Oxidation Catalyst manufactured by Clean Diesel Technologies, Inc. The technology is a fuel-borne catalyst used in ultra low sulfur d...

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF MOBILE SOURCE EMISSIONS CONTROL DEVICES: CLEAN DIESEL TECHNOLOGIES FUEL-BORNE CATALYST WITH MITSUI/PUREARTH CATALYZED WIRE MESH FILTER

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Fuel-Borne Catalyst with Mitsui/PUREarth Catalyzed Wire Mesh Filter manufactured by Clean Diesel Technologies, Inc. The technology is a platinum/cerium fuel-borne catalyst in commerci...

  2. From the Copenhagen Accord to efficient technology protocols

    International Nuclear Information System (INIS)

    Kypreos, Socrates

    2012-01-01

    As the Copenhagen Conference of Parties (COP) failed to negotiate a binding Post-Kyoto agreement, an alternative is proposed based on the Copenhagen Accord (CA). The CA, as endorsed by COP16 in Cancun, aims to combat global warming with differentiated reduction targets of greenhouse gas emissions and by mobilizing resources supporting adaptation and carbon-free technology in developing countries (DCs). Using a special version of MERGE, we study the global implications of the CA postulating extensions of the Accord in the direction of Technology Transfer Protocols (TTPs). We assess scenarios needed to reach sustainable climate targets under such Protocols. It is shown that without binding commitments for DCs, the warming target of 2 °C will be exceeded with a probability above 50%, even if Annex B countries eliminate their emissions. However, moderate commitments of DCs (when they reach sufficient economic development), make the 2 °C scenario feasible. TTPs combined with binding emission reduction targets thus provide a mechanism to reduce climate change damages, and may generate significant secondary benefits. For example, the reduced tax-subsidy scenario (RTS20) has 77% to 40% chances to remain below 2 °C of warming and an undiscounted cumulative gross domestic product (GDP) cost of 0.75% relative to baseline (not accounting for the benefits of avoided damages). - Highlights: ► Based on the Copenhagen Accord we propose an extension of the Kyoto Protocol. ► The carbon tax-revenue of industrialized countries subsidizes Technology Transfer to DCs and R and D. ► Emissions of Kyoto gases are reduced such that the probability of exceeding 2 °C is well below 50%. ► These scenarios assume moderate binding commitments for DCs after 2030. ► The undiscounted cumulative GDP costs are 0.75% above baseline.

  3. US monitoring and verification technology: on-site inspection experience and future challenges

    International Nuclear Information System (INIS)

    Gullickson, R.L.; Carlson, D.; Ingraham, J.; Laird, B.

    2013-01-01

    The United States has a long and successful history of cooperation with treaty partners in monitoring and verification. For strategic arms reduction treaties, our collaboration has resulted in the development and application of systems with limited complexity and intrusiveness. As we progress beyond New START (NST) along the 'road to zero', the reduced number of nuclear weapons is likely to require increased confidence in monitoring and verification techniques. This may place increased demands on the technology to verify the presence of a nuclear weapon and even confirm the presence of a certain type. Simultaneously, this technology must include the ability to protect each treaty partner's sensitive nuclear weapons information. Mutual development of this technology by treaty partners offers the best approach for acceptance in treaty negotiations. This same approach of mutual cooperation and development is essential for developing nuclear test monitoring technology in support of the Comprehensive Nuclear Test Ban Treaty (CTBT). Our ability to detect low yield and evasive testing will be enhanced through mutually developed techniques and experiments using laboratory laser experiments and high explosives tests in a variety of locations and geologies. (authors)

  4. Technology Foresight and nuclear test verification: a structured and participatory approach

    Science.gov (United States)

    Noack, Patrick; Gaya-Piqué, Luis; Haralabus, Georgios; Auer, Matthias; Jain, Amit; Grenard, Patrick

    2013-04-01

    As part of its mandate, the CTBTO's nuclear explosion monitoring programme aims to maintain its sustainability, effectiveness and its long-term relevance to the verification regime. As such, the PTS is conducting a Technology Foresight programme of activities to identify technologies, processes, concepts and ideas that may serve said purpose and become applicable within the next 20 years. Through the Technology Foresight activities (online conferences, interviews, surveys, workshops and other) we have involved the wider science community in the fields of seismology, infrasound, hydroacoustics, radionuclide technology, remote sensing and geophysical techniques. We have assembled a catalogue of over 200 items, which incorporate technologies, processes, concepts and ideas which will have direct future relevance to the IMS (International Monitoring System), IDC (International Data Centre) and OSI (On-Site Inspection) activities within the PTS. In order to render this catalogue as applicable and useful as possible for strategy and planning, we have devised a "taxonomy" based on seven categories, against which each technology is assessed through a peer-review mechanism. These categories are: 1. Focus area of the technology in question: identify whether the technology relates to (one or more of the following) improving our understanding of source and source physics; propagation modelling; data acquisition; data transport; data processing; broad modelling concepts; quality assurance and data storage. 2. Current Development Stage of the technology in question. Based on a scale from one to six, this measure is specific to PTS needs and broadly reflects Technology Readiness Levels (TRLs). 3. Impact of the technology on each of the following capabilities: detection, location, characterization, sustainment and confidence building. 4. Development cost: the anticipated monetary cost of validating a prototype (i.e. Development Stage 3) of the technology in question. 5. Time to

  5. Research on database realization technology of seismic information system in CTBT verification

    International Nuclear Information System (INIS)

    Zheng Xuefeng; Shen Junyi; Zhang Huimin; Jing Ping; Sun Peng; Zheng Jiangling

    2005-01-01

    Developing CTBT verification technology has become the most important method that makes sure CTBT to be fulfilled conscientiously. The seismic analysis based on seismic information system (SIS) is playing an important rule in this field. Based on GIS, the SIS will be very sufficient and powerful in spatial analysis, topologic analysis and visualization. However, the critical issue to implement the whole system function depends on the performance of SIS DB. Based on the ArcSDE Geodatabase data model, not only have the spatial data and attribute data seamless integrated management been realized with RDBMS ORACLE really, but also the most functions of ORACLE have been reserved. (authors)

  6. CTBT verification-related technologies for peaceful purposes: the French experiences of international cooperation

    International Nuclear Information System (INIS)

    Massinon, B.

    1999-01-01

    The French experience concerning CTBT verification-related technologies for peaceful purposes as well a the international cooperation in this field are presented. Possible objectives and cooperation program needs are cited. French experience in international cooperation is related to seismology and seismic hazards in Bolivia, Madagascar, Nepal and Indonesia and is considered as very constructive, meaning that technical experience is developed, consistent scientific results are obtained, and a considerable yield to the CTBT task is achieved. Large scientific benefits are expected from the CTBTO

  7. A Cloud-User Protocol Based on Ciphertext Watermarking Technology

    Directory of Open Access Journals (Sweden)

    Keyang Liu

    2017-01-01

    Full Text Available With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS. Since these data are stored in the form of plain text, they bring about users’ worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP, into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system’s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol.

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION: JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT: TRITON SYSTEMS, LLC SOLID BOWL CENTRIFUGE, MODEL TS-5000

    Science.gov (United States)

    Verification testing of the Triton Systems, LLC Solid Bowl Centrifuge Model TS-5000 (TS-5000) was conducted at the Lake Wheeler Road Field Laboratory Swine Educational Unit in Raleigh, North Carolina. The TS-5000 was 48" in diameter and 30" deep, with a bowl capacity of 16 ft3. ...

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SWINE WASTE ELECTRIC POWER AND HEAT PRODUCTION--MARTIN MACHINERY INTERNAL COMBUSTION ENGINE

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system designed by Martin Machinery was evaluated. This paper provides test result...

  10. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, SWINE WASTE ELECTRIC POWER AND HEAT PRODUCTION--CAPSTONE 30KW MICROTURBINE SYSTEM

    Science.gov (United States)

    Under EPA’s Environmental Technology Verification program, which provides objective and scientific third party analysis of new technology that can benefit the environment, a combined heat and power system was evaluated based on the Capstone 30kW Microturbine developed by Cain Ind...

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: RESIDENTIAL ELECTRIC POWER GENERATION USING THE PLUG POWER SU1 FUEL CELL SYSTEM

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the Plug Power SU1 Fuel Cell System manufactured by Plug Power. The SU1 is a proton exchange membrane fuel cell that requires hydrogen (H2) as fuel. H2 is generally not available, so the ...

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF CONTROL OF BIOAEROSOLS IN HVAC SYSTEMS, COLUMBUS INDUSTRIES SL-3 RING PANEL

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the High Efficiency Mini Pleat air filter for dust and bioaerosol filtration manufactured by Columbus Industries. The pressure drop across the filter was 142 Pa clean and 283 Pa dust load...

  13. ENVIRONMENTAL TECHNOLOGY VERIFICATION--TEST REPORT OF MOBILE SOURCE EMISSION CONTROL DEVICES, CUMMINS EMISSION SOLUTIONS AND CUMMINS FILTRATION DIESEL OXIDATION CATALYST AND CLOSED CRANKCASE VENTILATION SYSTEM

    Science.gov (United States)

    The U.S. EPA has created the Environmental Technology Verification (ETV) Program. ETV seeks to provide high-quality, peer-reviewed data on technology performance. The Air Pollution Control Technology (APCT) Verification Center, a center under the ETV Program, is operated by Res...

  14. Sandia technology. Volume 13, number 2 Special issue: verification of arms control treaties

    International Nuclear Information System (INIS)

    1989-01-01

    Nuclear deterrence, a cornerstone of US national security policy, has helped prevent global conflict for over 40 years. The DOE and DoD share responsibility for this vital part of national security. The US will continue to rely on nuclear deterrence for the foreseeable future. In the late 1950s, Sandia developed satellite-borne nuclear burst detection systems to support the treaty banning atmospheric nuclear tests. This activity has continued to expand and diversify. When the Non-Proliferation Treaty was ratified in 1970, we began to develop technologies to protect nuclear materials from falling into unauthorized hands. This program grew and now includes systems for monitoring the movement and storage of nuclear materials, detecting tampering, and transmiting sensitive data securely. In the late 1970s, negotiations to further limit underground nuclear testing were being actively pursued. In less than 18 months, we fielded the National Seismic Station, an unattended observatory for in-country monitoring of nuclear tests. In the mid-l980s, arms-control interest shifted to facility monitoring and on-site inspection. Our Technical On-site Inspection Facility is the national test bed for perimeter and portal monitoring technology and the prototype for the inspection portal that was recently installed in the USSR under the Intermediate-Range Nuclear Forces accord. The articles in the special issue of Sundiu Technology describe some of our current contributions to verification technology. This work supports the US policy to seek realistic arms control agreements while maintaining our national security.

  15. Experimental verification of active IR stealth technology by controlling the surface temperature using a thermoelectric element

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Dong Geon; Han, Kuk Il; Choi, Jun Hyuk; Kim, Tae Kuk [Dept. of Mechanical Engineering, Chung Ang University, Seoul (Korea, Republic of)

    2016-10-15

    In this paper, we propose a technique for IR low-observability that uses an active IR signal tuning through the real time control of the object surface temperature according to the varying background environment. This is achieved by applying the proper object surface temperature obtained to result in the minimum radiance difference between the object and the background. Experimental verification by using the thermoelectric temperature control element shows that the IR radiance contrast between the object and the background can be reduced up to 99% during the night and up to 95% during the day time as compared to the un-tuned original radiance contrast values. The stealth technology demonstrated in this paper may be applied for many military systems needed for the IR stealth performance when a suitable temperature control unit is developed.

  16. Experimental verification of active IR stealth technology by controlling the surface temperature using a thermoelectric element

    International Nuclear Information System (INIS)

    Kim, Dong Geon; Han, Kuk Il; Choi, Jun Hyuk; Kim, Tae Kuk

    2016-01-01

    In this paper, we propose a technique for IR low-observability that uses an active IR signal tuning through the real time control of the object surface temperature according to the varying background environment. This is achieved by applying the proper object surface temperature obtained to result in the minimum radiance difference between the object and the background. Experimental verification by using the thermoelectric temperature control element shows that the IR radiance contrast between the object and the background can be reduced up to 99% during the night and up to 95% during the day time as compared to the un-tuned original radiance contrast values. The stealth technology demonstrated in this paper may be applied for many military systems needed for the IR stealth performance when a suitable temperature control unit is developed

  17. AN ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) TESTING OF TWO HYDROGEN SULFIDE ANALYZERS: HORIBA INSTRUMENTS, INC., APSA-360 AND TELEDYNE-API MODEL 101E

    Science.gov (United States)

    The Environmental Technology Verification (ETV) Program, beginning as an initiative of the U.S. Environmental Protection Agency (EPA) in 1995, verifies the performance of commercially available, innovative technologies that can be used to measure environmental quality. The ETV p...

  18. Environmental Technology Verification Coatings and Coating Equipment Program (ETV CCEP). High Transfer Efficiency Spray Equipment - Generic Verification Protocol (Revision 0)

    Science.gov (United States)

    2006-09-30

    High-Pressure Waterjet • CO2 Pellet/Turbine Wheel • Ultrahigh-Pressure Waterjet 5 Process Water Reuse/Recycle • Cross-Flow Microfiltration ...documented on a process or laboratory form. Corrective action will involve taking all necessary steps to restore a measuring system to proper working order...In all cases, a nonconformance will be rectified before sample processing and analysis continues. If corrective action does not restore the

  19. Performance Testing of Homeland Security Technologies in U.S. EPA's Environmental Technology Verification (ETV) Program

    National Research Council Canada - National Science Library

    Kelly, Thomas J; Hofacre, Kent C; Derringer, Tricia L; Riggs, Karen B; Koglin, Eric N

    2004-01-01

    ... (reports and test plans available at www.epa.gov/etv). In the aftermath of the terrorist attacks of September 11, 2001, the ETV approach has also been employed in performance tests of technologies relevant to homeland security (HS...

  20. Remote sensing and geoinformation technologies in support of nuclear non-proliferation and arms control verification regimes

    Energy Technology Data Exchange (ETDEWEB)

    Niemeyer, Irmgard [Forschungszentrum Juelich GmbH, Institut fuer Energie- und Klimaforschung, IEK-6: Nukleare Entsorgung und Reaktorsicherheit (Germany)

    2013-07-01

    A number of international agreements and export control regimes have been concluded in order to reduce the risk and proliferation of weapons of mass destruction. In order to provide confidence that Member States are complying with the agreed commitments, most of the treaties and agreements include verification provisions. Different types of verification measures exist, e.g. cooperative measures; national technical means; technical monitoring or measurement devices placed at or near sites; on-site inspections; intelligence information; open-source information, such as commercial internet data and satellite imagery. The study reviews the technical progress in the field of satellite imaging sensors and explores the recent advances in satellite imagery processing and geoinformation technologies as to the extraction of significant observables and signatures. Moreover, it discusses how satellite data and geoinformation technologies could be used complementary for confirming information gathered from other systems or sources. The study also aims at presenting the legal and political aspects and the cost benefits of using imagery from both national and commercial satellites in the verification procedure. The study concludes that satellite imagery and geoinformation technologies are expected to enhance the verification efficiency and effectiveness.

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, JCH FUEL SOLUTIONS, INC., JCH ENVIRO AUTOMATED FUEL CLEANING AND MAINTENANCE SYSTEM

    Science.gov (United States)

    The verification testing was conducted at the Cl facility in North Las Vegas, NV, on July 17 and 18, 2001. During this period, engine emissions, fuel consumption, and fuel quality were evaluated with contaminated and cleaned fuel.To facilitate this verification, JCH repre...

  2. Research on key technology of the verification system of steel rule based on vision measurement

    Science.gov (United States)

    Jia, Siyuan; Wang, Zhong; Liu, Changjie; Fu, Luhua; Li, Yiming; Lu, Ruijun

    2018-01-01

    The steel rule plays an important role in quantity transmission. However, the traditional verification method of steel rule based on manual operation and reading brings about low precision and low efficiency. A machine vison based verification system of steel rule is designed referring to JJG1-1999-Verificaiton Regulation of Steel Rule [1]. What differentiates this system is that it uses a new calibration method of pixel equivalent and decontaminates the surface of steel rule. Experiments show that these two methods fully meet the requirements of the verification system. Measuring results strongly prove that these methods not only meet the precision of verification regulation, but also improve the reliability and efficiency of the verification system.

  3. Development of Out-pile Test Technology for Fuel Assembly Performance Verification

    Energy Technology Data Exchange (ETDEWEB)

    Chun, Tae Hyun; In, W. K.; Oh, D. S. [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)] (and others)

    2007-03-15

    Out-pile tests with full scale fuel assembly are to verify the design and to evaluate the performance of the final products. HTL for the hydraulic tests and FAMeCT for mechanical/structural tests were constructed in this project. The maximum operating conditions of HTL are 30 bar, 320 .deg. C, and 500 m3/hr. This facility can perform the pressure drop test, fuel assembly uplift test, and flow induced vibration test. FAMeCT can perform the bending and vibration tests. The verification of the developed facilities were carried out by comparing the reference data of the fuel assembly which was obtained at the Westinghouse Co. The compared data showed a good coincidence within uncertainties. FRETONUS was developed for high temperature and high pressure fretting wear simulator and performance test. A performance test was conducted for 500 hours to check the integrity, endurance, data acquisition capability of the simulator. The technology of turbulent flow analysis and finite element analysis by computation was developed. From the establishments of out-pile test facilities for full scale fuel assembly, the domestic infrastructure for PWR fuel development has been greatly upgraded.

  4. Quality Assurance in Environmental Technology Verification (ETV): Analysis and Impact on the EU ETV Pilot Programme Performance

    Science.gov (United States)

    Molenda, Michał; Ratman-Kłosińska, Izabela

    2018-03-01

    Many innovative environmental technologies never reach the market because they are new and cannot demonstrate a successful track record of previous applications. This fact is a serious obstacle on their way to the market. Lack of credible data on the performance of a technology causes mistrust of investors in innovations, especially from public sector, who seek effective solutions however without compromising the technical and financial risks associated with their implementation. Environmental technology verification (ETV) offers a credible, robust and transparent process that results in a third party confirmation of the claims made by the providers about the performance of the novel environmental technologies. Verifications of performance are supported by high quality, independent test data. In that way ETV as a tool helps establish vendor credibility and buyer confidence. Several countries across the world have implemented ETV in the form of national or regional programmes. ETV in the European Union was implemented as a voluntary scheme if a form of a pilot programme. The European Commission launched the Environmental Technology Pilot Programme of the European Union (EU ETV) in 2011. The paper describes the European model of ETV set up and put to operation under the Pilot Programme of Environmental Technologies Verification of the European Union. The goal, objectives, technological scope, involved entities are presented. An attempt has been made to summarise the results of the EU ETV scheme performance available for the period of 2012 when the programme has become fully operational until the first half of 2016. The study was aimed at analysing the overall organisation and efficiency of the EU ETV Pilot Programme. The study was based on the analysis of the documents the operation of the EU ETV system. For this purpose, a relevant statistical analysis of the data on the performance of the EU ETV system provided by the European Commission was carried out.

  5. Generic Protocol for the Verification of Ballast Water Treatment Technology. Version 5.1

    Science.gov (United States)

    2010-09-01

    and to build the scientific knowledge base needed to manage our ecological resources wisely, to understand how pollutants affect our health, and to...occurring in the water at the TF location. Ballast Water Treatment System (or System): Prefabricated , commercial-ready, treatment systems designed to...pathway to begin the development of technical procedures for approving BWTSs for installation on ships. EPA’s interest includes the ecological , economic

  6. Development of the advanced PHWR technology -Verification tests for CANDU advanced fuel-

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Jang Hwan; Suk, Hoh Chun; Jung, Moon Kee; Oh, Duk Joo; Park, Joo Hwan; Shim, Kee Sub; Jang, Suk Kyoo; Jung, Heung Joon; Park, Jin Suk; Jung, Seung Hoh; Jun, Ji Soo; Lee, Yung Wook; Jung, Chang Joon; Byun, Taek Sang; Park, Kwang Suk; Kim, Bok Deuk; Min, Kyung Hoh [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-07-01

    This is the `94 annual report of the CANDU advanced fuel verification test project. This report describes the out-of pile hydraulic tests at CANDU-hot test loop for verification of CANFLEX fuel bundle. It is also describes the reactor thermal-hydraulic analysis for thermal margin and flow stability. The contents in this report are as follows; (1) Out-of pile hydraulic tests for verification of CANFLEX fuel bundle. (a) Pressure drop tests at reactor operation condition (b) Strength test during reload at static condition (c) Impact test during reload at impact load condition (d) Endurance test for verification of fuel integrity during life time (2) Reactor thermal-hydraulic analysis with CANFLEX fuel bundle. (a) Critical channel power sensitivity analysis (b) CANDU-6 channel flow analysis (c) Flow instability analysis. 61 figs, 29 tabs, 21 refs. (Author).

  7. Development of the advanced PHWR technology -Verification tests for CANDU advanced fuel-

    International Nuclear Information System (INIS)

    Jung, Jang Hwan; Suk, Hoh Chun; Jung, Moon Kee; Oh, Duk Joo; Park, Joo Hwan; Shim, Kee Sub; Jang, Suk Kyoo; Jung, Heung Joon; Park, Jin Suk; Jung, Seung Hoh; Jun, Ji Soo; Lee, Yung Wook; Jung, Chang Joon; Byun, Taek Sang; Park, Kwang Suk; Kim, Bok Deuk; Min, Kyung Hoh

    1995-07-01

    This is the '94 annual report of the CANDU advanced fuel verification test project. This report describes the out-of pile hydraulic tests at CANDU-hot test loop for verification of CANFLEX fuel bundle. It is also describes the reactor thermal-hydraulic analysis for thermal margin and flow stability. The contents in this report are as follows; (1) Out-of pile hydraulic tests for verification of CANFLEX fuel bundle. (a) Pressure drop tests at reactor operation condition (b) Strength test during reload at static condition (c) Impact test during reload at impact load condition (d) Endurance test for verification of fuel integrity during life time (2) Reactor thermal-hydraulic analysis with CANFLEX fuel bundle. (a) Critical channel power sensitivity analysis (b) CANDU-6 channel flow analysis (c) Flow instability analysis. 61 figs, 29 tabs, 21 refs. (Author)

  8. BEval: A Plug-in to Extend Atelier B with Current Verification Technologies

    Directory of Open Access Journals (Sweden)

    Valério Medeiros Jr.

    2014-01-01

    Full Text Available This paper presents BEval, an extension of Atelier B to improve automation in the verification activities in the B method or Event-B. It combines a tool for managing and verifying software projects (Atelier B and a model checker/animator (ProB so that the verification conditions generated in the former are evaluated with the latter. In our experiments, the two main verification strategies (manual and automatic showed significant improvement as ProB's evaluator proves complementary to Atelier B built-in provers. We conducted experiments with the B model of a micro-controller instruction set; several verification conditions, that we were not able to discharge automatically or manually with AtelierB's provers, were automatically verified using BEval.

  9. Alpha radioactivity measurement technology with ionized air type measurement. Applicability evaluation to verification of the clearance level

    International Nuclear Information System (INIS)

    Mita, Yutaka; Matsumura, Toshihiro; Yokoyama, Kaoru; Sugitsue, Noritake

    2008-10-01

    The purpose of this test is to evaluate the applicability of the clearance level measuring system by Ionized Air Type Measurement after decontaminated by sulfuric acid sample. In Ningyo-toge Environmental Engineering Center. The equipment and radioactive waste which were contaminated with uranium are generated so much in future dismantling stage. In our plan, some of equipments and radioactive waste are contaminated to a clearance level, and cut down on decommission and disposal expense. This plan needs the alpha-rays measurement technology of the very low level. We think that ionized Air transfer measurement technology is promising as of clearance verification technology. The ionized Air transfer measurement technology applied to the Ionized Air Type Measurement can measure plan radioactivity of a very low level. Moreover, as compared with a direct survey, there is the merit which can be measured in a short time. However ionized Air transfer measurement technology is new technology. Therefore, there is almost no measurement track record. Furthermore, the date about the influence of a background, a detection limit, measurement performance, and reliability is insufficient. So, this measurement test estimated applicability as clearance level verification of an Ionized Air Type Measurement. (author)

  10. The development of advanced instrumentation and control technology -The development of verification and validation technology for instrumentation and control in NPPs-

    International Nuclear Information System (INIS)

    Kwon, Kee Choon; Ham, Chang Sik; Lee, Byung Sun; Kim, Jung Taek; Park, Won Man; Park, Jae Chang; Lee, Jang Soo; Um, Heung Sub; Kim, Jang Yul; Ryoo, Chan Hoh; Joo, Jae Yoon; Song, Soon Ja

    1995-07-01

    We collected and analyzed the domestic/international codes, standards and guidelines to develop high reliable software verification and validation methodology which is satisfied to our real situation. The three major parts of work are performed that is the construction of the frame for high reliable software development environment, establishment of high reliable software development methodology and study for the basic technology related to safety-critical software. These three parts are tightly coupled each other to achieve self-reliable software verification and validation technology for digital I and C in NPPs. The configuration of hardware and software are partly performed using requirements which is developed in first stage for the development of I and C test facility. In hardware part, expanded interface using VXI bus and driving software is completed. The main program for math, modelling and supervisor program for instructions are developed. 27 figs, 22 tabs, 69 refs. (Author)

  11. The development of advanced instrumentation and control technology -The development of verification and validation technology for instrumentation and control in NPPs-

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Kee Choon; Ham, Chang Sik; Lee, Byung Sun; Kim, Jung Taek; Park, Won Man; Park, Jae Chang; Lee, Jang Soo; Um, Heung Sub; Kim, Jang Yul; Ryoo, Chan Hoh; Joo, Jae Yoon; Song, Soon Ja [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-07-01

    We collected and analyzed the domestic/international codes, standards and guidelines to develop high reliable software verification and validation methodology which is satisfied to our real situation. The three major parts of work are performed that is the construction of the frame for high reliable software development environment, establishment of high reliable software development methodology and study for the basic technology related to safety-critical software. These three parts are tightly coupled each other to achieve self-reliable software verification and validation technology for digital I and C in NPPs. The configuration of hardware and software are partly performed using requirements which is developed in first stage for the development of I and C test facility. In hardware part, expanded interface using VXI bus and driving software is completed. The main program for math, modelling and supervisor program for instructions are developed. 27 figs, 22 tabs, 69 refs. (Author).

  12. Verification of an algorithm of cono collapsed through the IAEA TECDOC 1583 protocol and dosimetry with radiochromic films

    International Nuclear Information System (INIS)

    Martin-Viera Cueto, J. A.; Benitez Villegas, E. M.; Bodineau Gil, C.; Parra Osorio, V.; Garcia Pareja, S.; Casado Villalon, F. J.

    2013-01-01

    The objective of this study is to verify the characterization of the collapsed cone algorithm of an SP using this Protocol. In addition, given that it only offers details of dose values measured at discrete points, measures are complemented by a gamma test distributions 2D of doses in different cases using film radiochromic. (Author)

  13. International Performance Measurement and Verification Protocol: Concepts and Options for Determining Energy and Water Savings, Volume I (Revised)

    Energy Technology Data Exchange (ETDEWEB)

    2002-03-01

    This protocol serves as a framework to determine energy and water savings resulting from the implementation of an energy efficiency program. It is also intended to help monitor the performance of renewable energy systems and to enhance indoor environmental quality in buildings.

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION: TEST REPORT OF MOBILE SOURCE EMISSION CONTROL DEVICES--PUREM NORTH AMERICA LLC, PMF GREENTEC 1004205.00.0 DIESEL PARTICULATE FILTER

    Science.gov (United States)

    The U.S. EPA has created the Environmental Technology Verification (ETV) program to provide high quality, peer reviewed data on technology performance to those involved in the design, distribution, financing, permitting, purchase, and use of environmental technologies. The Air Po...

  15. The sentence verification task: a reliable fMRI protocol for mapping receptive language in individual subjects

    International Nuclear Information System (INIS)

    Sanjuan, Ana; Avila, Cesar; Forn, Cristina; Ventura-Campos, Noelia; Rodriguez-Pujadas, Aina; Garcia-Porcar, Maria; Belloch, Vicente; Villanueva, Vicente

    2010-01-01

    To test the capacity of a sentence verification (SV) task to reliably activate receptive language areas. Presurgical evaluation of language is useful in predicting postsurgical deficits in patients who are candidates for neurosurgery. Productive language tasks have been successfully elaborated, but more conflicting results have been found in receptive language mapping. Twenty-two right-handed healthy controls made true-false semantic judgements of brief sentences presented auditorily. Group maps showed reliable functional activations in the frontal and temporoparietal language areas. At the individual level, the SV task showed activation located in receptive language areas in 100% of the participants with strong left-sided distributions (mean lateralisation index of 69.27). The SV task can be considered a useful tool in evaluating receptive language function in individual subjects. This study is a first step towards designing the fMRI task which may serve to presurgically map receptive language functions. (orig.)

  16. The sentence verification task: a reliable fMRI protocol for mapping receptive language in individual subjects

    Energy Technology Data Exchange (ETDEWEB)

    Sanjuan, Ana; Avila, Cesar [Universitat Jaume I, Departamento de Psicologia Basica, Clinica y Psicobiologia, Castellon de la Plana (Spain); Hospital La Fe, Unidad de Epilepsia, Servicio de Neurologia, Valencia (Spain); Forn, Cristina; Ventura-Campos, Noelia; Rodriguez-Pujadas, Aina; Garcia-Porcar, Maria [Universitat Jaume I, Departamento de Psicologia Basica, Clinica y Psicobiologia, Castellon de la Plana (Spain); Belloch, Vicente [Hospital La Fe, Eresa, Servicio de Radiologia, Valencia (Spain); Villanueva, Vicente [Hospital La Fe, Unidad de Epilepsia, Servicio de Neurologia, Valencia (Spain)

    2010-10-15

    To test the capacity of a sentence verification (SV) task to reliably activate receptive language areas. Presurgical evaluation of language is useful in predicting postsurgical deficits in patients who are candidates for neurosurgery. Productive language tasks have been successfully elaborated, but more conflicting results have been found in receptive language mapping. Twenty-two right-handed healthy controls made true-false semantic judgements of brief sentences presented auditorily. Group maps showed reliable functional activations in the frontal and temporoparietal language areas. At the individual level, the SV task showed activation located in receptive language areas in 100% of the participants with strong left-sided distributions (mean lateralisation index of 69.27). The SV task can be considered a useful tool in evaluating receptive language function in individual subjects. This study is a first step towards designing the fMRI task which may serve to presurgically map receptive language functions. (orig.)

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DEVILBISS JGHV-531-46FF HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss JGHV-531-46FF high-volume, low-pressure pressure-feed spray gun, hereafter referred to as the DeVilbiss JGHV, which is designed for use in industrial finishing. The test coating chosen by ITW Industrial Fi...

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, HVLP COATING EQUIPMENT, SHARPE MANUFACTURING COMPANY PLATINUM 2012 HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the Sharpe Platinum 2013 high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the Sharpe Platinum, which is designed for use in automotive refinishing. The test coating chosen by Sharpe Manufacturi...

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: IN-DRAIN TREATMENT DEVICE. HYDRO INTERNATIONAL UP-FLO™ FILTER

    Science.gov (United States)

    Verification testing of the Hydro International Up-Flo™ Filter with one filter module and CPZ Mix™ filter media was conducted at the Penn State Harrisburg Environmental Engineering Laboratory in Middletown, Pennsylvania. The Up-Flo™ Filter is designed as a passive, modular filtr...

  20. An overview of CTBT verification technologies and status of IMS networks

    International Nuclear Information System (INIS)

    Basham, P.

    2002-01-01

    The CTBT history is described in brief. Nuclear test environments and verification regime are presented with illustrations. Geographical location of seismic, hydroacoustic, infrasound and radionuclide monitoring networks are indicated on globe maps. Benefits of the International Monitoring System (IMS) to host countries are listed

  1. Utterance Verification for Text-Dependent Speaker Recognition

    DEFF Research Database (Denmark)

    Kinnunen, Tomi; Sahidullah, Md; Kukanov, Ivan

    2016-01-01

    Text-dependent automatic speaker verification naturally calls for the simultaneous verification of speaker identity and spoken content. These two tasks can be achieved with automatic speaker verification (ASV) and utterance verification (UV) technologies. While both have been addressed previously...

  2. Evaluation of detector array technology for the verification of advanced intensity-modulated radiotherapy

    Science.gov (United States)

    Hussien, Mohammad

    Purpose: Quality assurance (QA) for intensity modulated radiotherapy (IMRT) has evolved substantially. In recent years, various ionization chamber or diode detector arrays have become commercially available, allowing pre-treatment absolute dose verification with near real-time results. This has led to a wide uptake of this technology to replace point dose and film dosimetry and to facilitate QA streamlining. However, arrays are limited by their spatial resolution giving rise to concerns about their response to clinically relevant deviations. The common factor in all commercial array systems is the reliance on the gamma index (γ) method to provide the quantitative evaluation of the measured dose distribution against the Treatment Planning System (TPS) calculated dose distribution. The mathematical definition of the gamma index presents computational challenges that can cause a variation in the calculation in different systems. The purpose of this thesis was to evaluate the suitability of detector array systems, combined with their implementation of the gamma index, in the verification and dosimetry audit of advanced IMRT. Method: The response of various commercial detector array systems (Delta4®, ArcCHECK®, and the PTW 2D-Array seven29™ and OCTAVIUS II™ phantom combination, Gafchromic® EBT2 and composite EPID measurements) to simulated deliberate changes in clinical IMRT and VMAT plans was evaluated. The variability of the gamma index calculation in the different systems was also evaluated by comparing against a bespoke Matlab-based gamma index analysis software. A novel methodology for using a commercial detector array in a dosimetry audit of rotational radiotherapy was then developed. Comparison was made between measurements using the detector array and those performed using ionization chambers, alanine and radiochromic film. The methodology was developed as part of the development of a national audit of rotational radiotherapy. Ten cancer centres were

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF CONTROL OF BIOAEROSOLS IN HVAC SYSTEMS, FILTRATION GROUP, AEROSTAR FP-98 MINIPLEAT V-BLANK FILTER

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the AeroStar FP-98 Minipleat V-Bank Filter air filter for dust and bioaerosol filtration manufactured by Filtration Group. The pressure drop across the filter was 137 Pa clean and 348 Pa ...

  4. ENVIRONMENTAL TECHNOLOGY VERIFICATION, TEST REPORT OF CONTROL OF BIOAEROSOLS IN HVAC SYSTEMS:AAF INTERNATIONAL, PERFECTPLEAT ULTRA, 175-102-863

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of the PerfectPleat Ultra 175-102-863 air filter for dust and bioaerosol filtration manufactured by AAF International. The pressure drop across the filter was 112 Pa clean and 229 Pa dust lo...

  5. The monitoring, evaluation, reporting, and verification of climate change mitigation projects: Discussion of issues and methodologies and review of existing protocols and guidelines

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.; Sathaye, J.

    1997-12-01

    Because of concerns with the growing threat of global climate change from increasing emissions of greenhouse gases, the US and other countries are implementing, by themselves or in cooperation with one or more other nations (i.e., joint implementation), climate change mitigation projects. These projects will reduce greenhouse gas (GHG) emissions or sequester carbon, and will also result in non-GHG impacts (i.e., environmental, economic, and social impacts). Monitoring, evaluating, reporting, and verifying (MERV) guidelines are needed for these projects in order to accurately determine their net GHG, and other, benefits. Implementation of MERV guidelines is also intended to: (1) increase the reliability of data for estimating GHG benefits; (2) provide real-time data so that mid-course corrections can be made; (3) introduce consistency and transparency across project types and reporters; and (4) enhance the credibility of the projects with stakeholders. In this paper, the authors review the issues and methodologies involved in MERV activities. In addition, they review protocols and guidelines that have been developed for MERV of GHG emissions in the energy and non-energy sectors by governments, nongovernmental organizations, and international agencies. They comment on their relevance and completeness, and identify several topics that future protocols and guidelines need to address, such as (1) establishing a credible baseline; (2) accounting for impacts outside project boundaries through leakage; (3) net GHG reductions and other impacts; (4) precision of measurement; (5) MERV frequency; (6) persistence (sustainability) of savings, emissions reduction, and carbon sequestration; (7) reporting by multiple project participants; (8) verification of GHG reduction credits; (9) uncertainty and risk; (10) institutional capacity in conducting MERV; and (11) the cost of MERV.

  6. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards (including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  7. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards (including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security.

  8. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses. Addendum

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards ( including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  9. Environmental Technology Verification Report: Pesticide spray drift reduction technologies--Evaluation of the verification protocol for low and high speed wind tunnel testing

    Science.gov (United States)

    Pesticide spray drift is defined as the movement of spray droplets through the air at the time of application or soon thereafter from the target site to any non- or off-target site, excluding pesticide movements by erosion, migration, volatility, or windblown soil particles after...

  10. A technology training protocol for meeting QSEN goals: Focusing on meaningful learning.

    Science.gov (United States)

    Luo, Shuhong; Kalman, Melanie

    2018-01-01

    The purpose of this paper is to describe and discuss how we designed and developed a 12-step technology training protocol. The protocol is meant to improve meaningful learning in technology education so that nursing students are able to meet the informatics requirements of Quality and Safety Education in Nursing competencies. When designing and developing the training protocol, we used a simplified experiential learning model that addressed the core features of meaningful learning: to connect new knowledge with students' prior knowledge and real-world workflow. Before training, we identified students' prior knowledge and workflow tasks. During training, students learned by doing, reflected on their prior computer skills and workflow, designed individualized procedures for integration into their workflow, and practiced the self-designed procedures in real-world settings. The trainer was a facilitator who provided a meaningful learning environment, asked the right questions to guide reflective conversation, and offered scaffoldings at critical moments. This training protocol could significantly improve nurses' competencies in using technologies and increase their desire to adopt new technologies. © 2017 Wiley Periodicals, Inc.

  11. Verification and the safeguards legacy

    International Nuclear Information System (INIS)

    Perricos, Demetrius

    2001-01-01

    A number of inspection or monitoring systems throughout the world over the last decades have been structured drawing upon the IAEA experience of setting up and operating its safeguards system. The first global verification system was born with the creation of the IAEA safeguards system, about 35 years ago. With the conclusion of the NPT in 1968, inspections were to be performed under safeguards agreements, concluded directly between the IAEA and non-nuclear weapon states parties to the Treaty. The IAEA developed the safeguards system within the limitations reflected in the Blue Book (INFCIRC 153), such as limitations of routine access by the inspectors to 'strategic points', including 'key measurement points', and the focusing of verification on declared nuclear material in declared installations. The system, based as it was on nuclear material accountancy. It was expected to detect a diversion of nuclear material with a high probability and within a given time and therefore determine also that there had been no diversion of nuclear material from peaceful purposes. The most vital element of any verification system is the inspector. Technology can assist but cannot replace the inspector in the field. Their experience, knowledge, intuition and initiative are invaluable factors contributing to the success of any inspection regime. The IAEA inspectors are however not part of an international police force that will intervene to prevent a violation taking place. To be credible they should be technically qualified with substantial experience in industry or in research and development before they are recruited. An extensive training program has to make sure that the inspectors retain their professional capabilities and that it provides them with new skills. Over the years, the inspectors and through them the safeguards verification system gained experience in: organization and management of large teams; examination of records and evaluation of material balances

  12. The construction of environments for development of test and verification technology -The development of advanced instrumentation and control technology-

    International Nuclear Information System (INIS)

    Kwon, Kee Choon; Ham, Chang Shick; Lee, Byung Sun; Kim, Jung Taek; Park, Won Man; Park, Jae Chang; Kim, Jae Hee; Lee, Chang Soo

    1994-07-01

    Several problems were identified in digitalizing the I and C systems of NPPs. A scheme is divided into hardware and software to resolve these problems. Hardware verification and validation analyzed about common mode failure, commercial grade dedication process, electromagnetic competibility. We have reviewed codes and standards to be a consensus criteria among vendor, licenser. Then we have described the software licensing procedures under 10 CFR 50 and 10 CFR 52 in the United States Nuclear Regulatory Commision (NRC) and presented vendor's approaches to scope with the licensing barrier. At last, we have surveyed the technical issues related to developing and licensing the high integrity software for digital I and C systems. (Author)

  13. An access technology delivery protocol for children with severe and multiple disabilities: a case demonstration.

    Science.gov (United States)

    Mumford, Leslie; Lam, Rachel; Wright, Virginia; Chau, Tom

    2014-08-01

    This study applied response efficiency theory to create the Access Technology Delivery Protocol (ATDP), a child and family-centred collaborative approach to the implementation of access technologies. We conducted a descriptive, mixed methods case study to demonstrate the ATDP method with a 12-year-old boy with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with a custom smile-based access technology. At the 16 week mark, the new access technology offered better response quality; teacher satisfaction was high; average technology usage was 3-4 times per week for up to 1 h each time; switch sensitivity and specificity reached 78% and 64%, respectively, and participation scores increased by 38%. This case supports further development and testing of the ATDP with additional children with multiple or severe disabilities.

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION: JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT HYDRO COMPLIANCE MANAGEMENT, INC. HYDRO-KLEEN FILTRATION SYSTEM, 03/07/WQPC-SWP, SEPTEMBER 2003

    Science.gov (United States)

    Verification testing of the Hydro-Kleen(TM) Filtration System, a catch-basin filter designed to reduce hydrocarbon, sediment, and metals contamination from surface water flows, was conducted at NSF International in Ann Arbor, Michigan. A Hydro-Kleen(TM) system was fitted into a ...

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION: JOINT (NSF-EPA) VERIFICATION STATEMENT AND REPORT: BROME AGRI SALES, LTD., MAXIMIZER SEPARATOR, MODEL MAX 1016 - 03/01/WQPC-SWP

    Science.gov (United States)

    Verification testing of the Brome Agri Sales Ltd. Maximizer Separator, Model MAX 1016 (Maximizer) was conducted at the Lake Wheeler Road Field Laboratory Swine Educational Unit in Raleigh, North Carolina. The Maximizer is an inclined screen solids separator that can be used to s...

  16. Application of an access technology delivery protocol to two children with cerebral palsy.

    Science.gov (United States)

    Mumford, Leslie; Chau, Tom

    2015-07-14

    This study further delineates the merits and limitations of the Access Technology Delivery Protocol (ATDP) through its application to two children with severe disabilities. We conducted mixed methods case studies to demonstrate the ATDP with two children with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with custom access technologies. After 16 weeks, one child's switch offered improved response efficiency, high teacher satisfaction and increased participation. The other child's switch resulted in improved satisfaction and switch effectiveness but lower overall efficiency. The latter child was no longer using his switch by the end of the study. These contrasting findings indicate that changes to any contextual factors that may impact the user's switch performance should mandate a reassessment of the access pathway. Secondly, it is important to ensure that individuals who will be responsible for switch training be identified at the outset and engaged throughout the ATDP. Finally, the ATDP should continue to be tested with individuals with severe disabilities to build an evidence base for the delivery of response efficient access solutions. Implications for Rehabilitation A data-driven, comprehensive access technology delivery protocol for children with complex communication needs could help to mitigate technology abandonment. Successful adoption of an access technology requires personalized design, training of the technology user, the teaching staff, the caregivers and other communication partners, and integration with functional activities.

  17. Biosafety assessment protocols for new organisms in New Zealand: Can they apply internationally to emerging technologies?

    International Nuclear Information System (INIS)

    Barratt, B.I.P.; Moeed, A.; Malone, L.A.

    2006-01-01

    An analysis of established biosafety protocols for release into the environment of exotic plants and biological control agents for weeds and arthropod pests has been carried out to determine whether such protocols can be applied to relatively new and emerging technologies intended for the primary production industries, such as transgenic plants. Example case studies are described to indicate the scope of issues considered by regulators who make decisions on new organism releases. No transgenic plants have been released to date in New Zealand, but two field test approvals are described as examples. An analysis of the biosafety protocols has shown that, while many of the risk criteria considered for decision-making by regulators are similar for all new organisms, a case-by-case examination of risks and potential impacts is required in order to fully assess risk. The value of post-release monitoring and validation of decisions made by regulators is emphasised

  18. Comparison of fingerprint and facial biometric verification technologies for user access and patient identification in a clinical environment

    Science.gov (United States)

    Guo, Bing; Zhang, Yu; Documet, Jorge; Liu, Brent; Lee, Jasper; Shrestha, Rasu; Wang, Kevin; Huang, H. K.

    2007-03-01

    As clinical imaging and informatics systems continue to integrate the healthcare enterprise, the need to prevent patient mis-identification and unauthorized access to clinical data becomes more apparent especially under the Health Insurance Portability and Accountability Act (HIPAA) mandate. Last year, we presented a system to track and verify patients and staff within a clinical environment. This year, we further address the biometric verification component in order to determine which Biometric system is the optimal solution for given applications in the complex clinical environment. We install two biometric identification systems including fingerprint and facial recognition systems at an outpatient imaging facility, Healthcare Consultation Center II (HCCII). We evaluated each solution and documented the advantages and pitfalls of each biometric technology in this clinical environment.

  19. CANDU RU fuel manufacturing basic technology development and advanced fuel verification tests

    International Nuclear Information System (INIS)

    Chung, Chang Hwan; Chang, S.K.; Hong, S.D.

    1999-04-01

    A PHWR advanced fuel named the CANFLEX fuel has been developed through a KAERI/AECL joint Program. The KAERI made fuel bundle was tested at the KAERI Hot Test Loop for the performance verification of the bundle design. The major test activities were the fuel bundle cross-flow test, the endurance fretting/vibration test, the freon CHF test, and the fuel bundle heat-up test. KAERI also has developing a more advanced PHWR fuel, the CANFLEX-RU fuel, using recovered uranium to extend fuel burn-up in the CANDU reactors. For the purpose of proving safety of the RU handling techniques and appraising feasibility of the CANFLEX-RU fuel fabrication in near future, a physical, chemical and radiological characterization of the RU powder and pellets was performed. (author). 54 refs., 46 tabs., 62 figs

  20. CANDU RU fuel manufacturing basic technology development and advanced fuel verification tests

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Chang Hwan; Chang, S.K.; Hong, S.D. [and others

    1999-04-01

    A PHWR advanced fuel named the CANFLEX fuel has been developed through a KAERI/AECL joint Program. The KAERI made fuel bundle was tested at the KAERI Hot Test Loop for the performance verification of the bundle design. The major test activities were the fuel bundle cross-flow test, the endurance fretting/vibration test, the freon CHF test, and the fuel bundle heat-up test. KAERI also has developing a more advanced PHWR fuel, the CANFLEX-RU fuel, using recovered uranium to extend fuel burn-up in the CANDU reactors. For the purpose of proving safety of the RU handling techniques and appraising feasibility of the CANFLEX-RU fuel fabrication in near future, a physical, chemical and radiological characterization of the RU powder and pellets was performed. (author). 54 refs., 46 tabs., 62 figs.

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - FIELD PORTABLE GAS CHROMATOGRAPH/MASS SPECTROMETER - VIKING INSTRUMENTS CORPORATION

    Science.gov (United States)

    The performance evaluation of innovative and alternative environmental technologies is an integral part of the U.S. Environmental Protection Agency's (EPA) mission. Early efforts focused on evaluation technologies that supported the implementation of the Clean Air and Clean Wate...

  2. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PHYSICAL REMOVAL OF MICROBIOLOGICAL AND PARTICULATE CONTAMINANTS IN DRINKING WATER : SEPARMATIC™ FLUID SYSTEMS DIATOMACEOUS EARTH PRESSURE TYPE FILTER SYSTEM MODEL 12P-2

    Science.gov (United States)

    The verification test of the SeparmaticTM DE Pressure Type Filter System Model 12P-2 was conducted at the UNH Water Treatment Technology Assistance Center (WTTAC) in Durham, New Hampshire. The source water was finished water from the Arthur Rollins Treatment Plant that was pretr...

  4. Data exchange technology based on handshake protocol for industrial automation system

    Science.gov (United States)

    Astafiev, A. V.; Shardin, T. O.

    2018-05-01

    In the article, questions of data exchange technology based on the handshake protocol for industrial automation system are considered. The methods of organizing the technology in client-server applications are analyzed. In the process of work, the main threats of client-server applications that arise during the information interaction of users are indicated. Also, a comparative analysis of analogue systems was carried out, as a result of which the most suitable option was chosen for further use. The basic schemes for the operation of the handshake protocol are shown, as well as the general scheme of the implemented application, which describes the entire process of interaction between the client and the server.

  5. Technology transfer metrics: Measurement and verification of data/reusable launch vehicle business analysis

    Science.gov (United States)

    Trivoli, George W.

    1996-01-01

    Congress and the Executive Branch have mandated that all branches of the Federal Government exert a concentrated effort to transfer appropriate government and government contractor-developed technology to the industrial use in the U.S. economy. For many years, NASA has had a formal technology transfer program to transmit information about new technologies developed for space applications into the industrial or commercial sector. Marshall Space Flight Center (MSFC) has been in the forefront of the development of U.S. industrial assistance programs using technologies developed at the Center. During 1992-93, MSFC initiated a technology transfer metrics study. The MSFC study was the first of its kind among the various NASA centers. The metrics study is a continuing process, with periodic updates that reflect on-going technology transfer activities.

  6. The research and application of the NDP protocol vulnerability attack and the defense technology based on SEND

    Science.gov (United States)

    Xi, Huixing

    2017-05-01

    Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.

  7. Development of the Diabetes Technology Society Blood Glucose Monitor System Surveillance Protocol.

    Science.gov (United States)

    Klonoff, David C; Lias, Courtney; Beck, Stayce; Parkes, Joan Lee; Kovatchev, Boris; Vigersky, Robert A; Arreaza-Rubin, Guillermo; Burk, Robert D; Kowalski, Aaron; Little, Randie; Nichols, James; Petersen, Matt; Rawlings, Kelly; Sacks, David B; Sampson, Eric; Scott, Steve; Seley, Jane Jeffrie; Slingerland, Robbert; Vesper, Hubert W

    2016-05-01

    Inaccurate blood glucsoe monitoring systems (BGMSs) can lead to adverse health effects. The Diabetes Technology Society (DTS) Surveillance Program for cleared BGMSs is intended to protect people with diabetes from inaccurate, unreliable BGMS products that are currently on the market in the United States. The Surveillance Program will provide an independent assessment of the analytical performance of cleared BGMSs. The DTS BGMS Surveillance Program Steering Committee included experts in glucose monitoring, surveillance testing, and regulatory science. Over one year, the committee engaged in meetings and teleconferences aiming to describe how to conduct BGMS surveillance studies in a scientifically sound manner that is in compliance with good clinical practice and all relevant regulations. A clinical surveillance protocol was created that contains performance targets and analytical accuracy-testing studies with marketed BGMS products conducted by qualified clinical and laboratory sites. This protocol entitled "Protocol for the Diabetes Technology Society Blood Glucose Monitor System Surveillance Program" is attached as supplementary material. This program is needed because currently once a BGMS product has been cleared for use by the FDA, no systematic postmarket Surveillance Program exists that can monitor analytical performance and detect potential problems. This protocol will allow identification of inaccurate and unreliable BGMSs currently available on the US market. The DTS Surveillance Program will provide BGMS manufacturers a benchmark to understand the postmarket analytical performance of their products. Furthermore, patients, health care professionals, payers, and regulatory agencies will be able to use the results of the study to make informed decisions to, respectively, select, prescribe, finance, and regulate BGMSs on the market. © 2015 Diabetes Technology Society.

  8. Mechanical Verification of Cryptographic Protocols

    Science.gov (United States)

    Cheng, Xiaochun; Ma, Xiaoqi; Huang, Scott C.-H.; Cheng, Maggie

    Information security is playing an increasingly important role in modern society, driven especially by the uptake of the Internet for information transfer. Large amount of information is transmitted everyday through the Internet, which is often the target of malicious attacks. In certain areas, this issue is vital. For example, military departments of governments often transmit a great amount of top-secret data, which, if divulged, could become a huge threat to the public and to national security. Even in our daily life, it is also necessary to protect information. Consider e-commerce systems as an example. No one is willing to purchase anything over the Internet before being assured that all their personal and financial information will always be kept secure and will never be leaked to any unauthorised person or organisation.

  9. Transparency in practice: Evidence from 'verification analyses' issued by the Polish Agency for Health Technology Assessment in 2012-2015.

    Science.gov (United States)

    Ozierański, Piotr; Löblová, Olga; Nicholls, Natalia; Csanádi, Marcell; Kaló, Zoltán; McKee, Martin; King, Lawrence

    2018-01-08

    Transparency is recognised to be a key underpinning of the work of health technology assessment (HTA) agencies, yet it has only recently become a subject of systematic inquiry. We contribute to this research field by considering the Polish Agency for Health Technology Assessment (AHTAPol). We situate the AHTAPol in a broader context by comparing it with the National Institute for Health and Care Excellence (NICE) in England. To this end, we analyse all 332 assessment reports, called verification analyses, that the AHTAPol issued from 2012 to 2015, and a stratified sample of 22 Evidence Review Group reports published by NICE in the same period. Overall, by increasingly presenting its key conclusions in assessment reports, the AHTAPol has reached the transparency standards set out by NICE in transparency of HTA outputs. The AHTAPol is more transparent than NICE in certain aspects of the HTA process, such as providing rationales for redacting assessment reports and providing summaries of expert opinions. Nevertheless, it is less transparent in other areas of the HTA process, such as including information on expert conflicts of interest. Our findings have important implications for understanding HTA in Poland and more broadly. We use them to formulate recommendations for policymakers.

  10. Research on Digital Output Verification Technology of Electronic DC Current Transformer

    Science.gov (United States)

    Chen, Yuanjie; Wang, Bin; Hu, Haoliang; Xiong, Qianzhu; Yang, Chunyan

    2017-05-01

    Aiming at the error of calibration system when conducting field calibration by electronic DC current transformer’s digital calibration system, an electronic DC current transformer’s digital calibration system based on protocol conversion is proposed and researched. Data frames outputted from merging unit are collected and converted by the system, the digital synchronization is realized by using the synchronous clock device to trigger the second pulse, and it is verified by the virtual instrument design software. The field calibration is conducted to some converter station digital dc current transformer under the rated current of 500A by using the calibration system. By calibrating and analyzing errors, the error is less than 0.075% when tested current is more than 40% of the rated current. According the standard in literature[1], performance of the calibration system is perfect, measured results perfectly meet the requirements of design, and the calibration system has great practical application value.

  11. Development of the Diabetes Technology Society Blood Glucose Monitor System Surveillance Protocol

    Science.gov (United States)

    Klonoff, David C.; Lias, Courtney; Beck, Stayce; Parkes, Joan Lee; Kovatchev, Boris; Vigersky, Robert A.; Arreaza-Rubin, Guillermo; Burk, Robert D.; Kowalski, Aaron; Little, Randie; Nichols, James; Petersen, Matt; Rawlings, Kelly; Sacks, David B.; Sampson, Eric; Scott, Steve; Seley, Jane Jeffrie; Slingerland, Robbert; Vesper, Hubert W.

    2015-01-01

    Background: Inaccurate blood glucsoe monitoring systems (BGMSs) can lead to adverse health effects. The Diabetes Technology Society (DTS) Surveillance Program for cleared BGMSs is intended to protect people with diabetes from inaccurate, unreliable BGMS products that are currently on the market in the United States. The Surveillance Program will provide an independent assessment of the analytical performance of cleared BGMSs. Methods: The DTS BGMS Surveillance Program Steering Committee included experts in glucose monitoring, surveillance testing, and regulatory science. Over one year, the committee engaged in meetings and teleconferences aiming to describe how to conduct BGMS surveillance studies in a scientifically sound manner that is in compliance with good clinical practice and all relevant regulations. Results: A clinical surveillance protocol was created that contains performance targets and analytical accuracy-testing studies with marketed BGMS products conducted by qualified clinical and laboratory sites. This protocol entitled “Protocol for the Diabetes Technology Society Blood Glucose Monitor System Surveillance Program” is attached as supplementary material. Conclusion: This program is needed because currently once a BGMS product has been cleared for use by the FDA, no systematic postmarket Surveillance Program exists that can monitor analytical performance and detect potential problems. This protocol will allow identification of inaccurate and unreliable BGMSs currently available on the US market. The DTS Surveillance Program will provide BGMS manufacturers a benchmark to understand the postmarket analytical performance of their products. Furthermore, patients, health care professionals, payers, and regulatory agencies will be able to use the results of the study to make informed decisions to, respectively, select, prescribe, finance, and regulate BGMSs on the market. PMID:26481642

  12. Satellite Power Systems (SPS) concept definition study. Volume 6: SPS technology requirements and verification

    Science.gov (United States)

    Hanley, G.

    1978-01-01

    Volume 6 of the SPS Concept Definition Study is presented and also incorporates results of NASA/MSFC in-house effort. This volume includes a supporting research and technology summary. Other volumes of the final report that provide additional detail are as follows: (1) Executive Summary; (2) SPS System Requirements; (3) SPS Concept Evolution; (4) SPS Point Design Definition; (5) Transportation and Operations Analysis; and Volume 7, SPS Program Plan and Economic Analysis.

  13. System Verification Through Reliability, Availability, Maintainability (RAM) Analysis & Technology Readiness Levels (TRLs)

    Energy Technology Data Exchange (ETDEWEB)

    Emmanuel Ohene Opare, Jr.; Charles V. Park

    2011-06-01

    The Next Generation Nuclear Plant (NGNP) Project, managed by the Idaho National Laboratory (INL), is authored by the Energy Policy Act of 2005, to research, develop, design, construct, and operate a prototype fourth generation nuclear reactor to meet the needs of the 21st Century. A section in this document proposes that the NGNP will provide heat for process heat applications. As with all large projects developing and deploying new technologies, the NGNP is expected to meet high performance and availability targets relative to current state of the art systems and technology. One requirement for the NGNP is to provide heat for the generation of hydrogen for large scale productions and this process heat application is required to be at least 90% or more available relative to other technologies currently on the market. To reach this goal, a RAM Roadmap was developed highlighting the actions to be taken to ensure that various milestones in system development and maturation concurrently meet required availability requirements. Integral to the RAM Roadmap was the use of a RAM analytical/simulation tool which was used to estimate the availability of the system when deployed based on current design configuration and the maturation level of the system.

  14. Remote communications technology redefines integrity verification and monitoring of low pressure isolation

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-01-15

    In 2007, a ship collided with the southeast face of a satellite platform jacket in the North Sea, damaging the 12-inch export riser. Emergency shutdown valves immediately shut-in production from the platform, leaving the pressure in the pipeline at approximately 4 barg. The riser had to be repaired before production could resume. TDW Offshore Services (TDW) was hired to develop a low pressure solution to isolate the damaged section of the pipeline riser from the export pipeline gas inventory. TDW used its range of specialist pipeline pigging, pig tracking and remote communications technology to solve the problem. The solution consisted of a custom-designed TDW pig trap and pigging spread; a high friction pig train furnished with the SmartTrack remote tracking and pressure-monitoring system; a SmartTrack subsea remote tracking and pressure-monitoring system; a SmartTrack topside tracking and monitoring system with radio link to the dive support vessel; and a pipeline isolation ball valve. TDW was able to monitor the downstream pressure of each isolation pig continuously throughout the operation using its innovative technology that sends isolation integrity data by radio link to a dive support vessel through pipe wall communications. The use of remote tracking and pressure monitoring technology enabled TDW to make repairs to the damaged riser while maintaining a continuous flow throughout the duration of the operation. 4 figs.

  15. Integration of multidisciplinary technologies for real time target visualization and verification for radiotherapy

    Directory of Open Access Journals (Sweden)

    Chang WC

    2014-06-01

    Full Text Available Wen-Chung Chang,1,* Chin-Sheng Chen,2,* Hung-Chi Tai,3 Chia-Yuan Liu,4,5 Yu-Jen Chen3 1Department of Electrical Engineering, National Taipei University of Technology, Taipei, Taiwan; 2Graduate Institute of Automation Technology, National Taipei University of Technology, Taipei, Taiwan; 3Department of Radiation Oncology, Mackay Memorial Hospital, Taipei, Taiwan; 4Department of Internal Medicine, Mackay Memorial Hospital, Taipei, Taiwan; 5Department of Medicine, Mackay Medical College, New Taipei City, Taiwan  *These authors contributed equally to this work Abstract: The current practice of radiotherapy examines target coverage solely from digitally reconstructed beam's eye view (BEV in a way that is indirectly accessible and that is not in real time. We aimed to visualize treatment targets in real time from each BEV. The image data of phantom or patients from ultrasound (US and computed tomography (CT scans were captured to perform image registration. We integrated US, CT, US/CT image registration, robotic manipulation of US, a radiation treatment planning system, and a linear accelerator to constitute an innovative target visualization system. The performance of this algorithm segmented the target organ in CT images, transformed and reconstructed US images to match each orientation, and generated image registration in real time mode with acceptable accuracy. This image transformation allowed physicians to visualize the CT image-reconstructed target via a US probe outside the BEV that was non-coplanar to the beam's plane. It allowed the physicians to remotely control the US probe that was equipped on a robotic arm to dynamically trace and real time monitor the coverage of the target within the BEV during a simulated beam-on situation. This target visualization system may provide a direct remotely accessible and real time way to visualize, verify, and ensure tumor targeting during radiotherapy. Keywords: ultrasound, computerized tomography

  16. CTBT verification-related technologies for peaceful purposes: Implementation of CTBT in Iran

    International Nuclear Information System (INIS)

    Ghafory-Ashtiany, M.; Hosseinie, Mohammad-Taghi

    1999-01-01

    Based on its strong policy on disarmament and non proliferation, Islamic Republic of Iran considers CTBT as one of the measures towards the safe world and free from nuclear weapons. It is believed that full implementation of this treaty increases international security as well as national security of every state signatory. It is also considered that it has many scientific and technological benefits for sustainable development of the countries. This paper deals with international monitoring system in Iran, including primary and auxiliary seismic stations, infrasound and radionuclides monitoring systems

  17. Nuclear cooperation targets global challenges. States back main pillars of the IAEA's work to strengthen nuclear safety, verification and technology transfer

    International Nuclear Information System (INIS)

    2000-01-01

    States meeting at the 44th IAEA General Conference in Vienna have set a challenging agenda for international nuclear cooperation into the 21st century that targets issues of global safety, security, and sustainable development. They adopted resolutions endorsing the Agency's programmes for strengthening activities under its three main pillars of work - nuclear verification, safety, and technology - that are closely linked to major challenges before the world. The document presents the main actions taken during the conference

  18. Verification of best available technology for the 300 Area Treated Effluent Disposal Facility (310 Facility)

    International Nuclear Information System (INIS)

    Wagner, R.N.

    1994-01-01

    This compilation of Project L-045H reference materials documents that the 300 Area Treated Effluent Disposal Facility (TEDF, also designated the 310 Facility) was designed, built, and will be operated in accordance with the best available technology (BAT) identified in the Engineering Summary Report. The facility is intended for treatment of 300 Area process sewer wastewater. The following unit operations for 300 Area process sewer water treatment are specified as: influent receipt; iron co-precipitation and sludge handling for removal of heavy metals and initial suspended solids; ion exchanged for removal of mercury and other heavy metals; ultraviolet (UV)/peroxide treatment for destruction of organic compounds, cyanide, coliforms, sulfide, and nitrite; and effluent discharge to the Columbia River with pH monitoring/control capability

  19. Development of the SEAtrace{trademark} barrier verification and validation technology. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Dunn, S.D.; Lowry, W.; Walsh, R.; Rao, D.V. [Science and Engineering Associates, Santa Fe, NM (United States); Williams, C. [Sandia National Labs., Albuquerque, NM (United States). Underground Storage Technology Dept.

    1998-08-01

    In-situ barrier emplacement techniques and materials for the containment of high-risk contaminants in soils are currently being developed by the Department of Energy (DOE). Because of their relatively high cost, the barriers are intended to be used in cases where the risk is too great to remove the contaminants, the contaminants are too difficult to remove with current technologies, or the potential movement of the contaminants to the water table is so high that immediate action needs to be taken to reduce health risks. Assessing the integrity of the barrier once it is emplaced, and during its anticipated life, is a very difficult but necessary requirement. Science and Engineering Associates, Inc., (SEA) and Sandia National Laboratories (SNL) have developed a quantitative subsurface barrier assessment system using gaseous tracers in support of the Subsurface Contaminants Focus Area barrier technology program. Called SEAtrace{trademark}, this system integrates an autonomous, multi-point soil vapor sampling and analysis system with a global optimization modeling methodology to locate and size barrier breaches in real time. The methodology for the global optimization code was completed and a prototype code written using simplifying assumptions. Preliminary modeling work to validate the code assumptions were performed using the T2VOC numerical code. A multi-point field sampling system was built to take soil gas samples and analyze for tracer gas concentration. The tracer concentration histories were used in the global optimization code to locate and size barrier breaches. SEAtrace{trademark} was consistently able to detect and locate leaks, even under very adverse conditions. The system was able to locate the leak to within 0.75 m of the actual value, and was able to determine the size of the leak to within 0.15 m.

  20. Development of the SEAtrace trademark barrier verification and validation technology. Final report

    International Nuclear Information System (INIS)

    Dunn, S.D.; Lowry, W.; Walsh, R.; Rao, D.V.; Williams, C.

    1998-08-01

    In-situ barrier emplacement techniques and materials for the containment of high-risk contaminants in soils are currently being developed by the Department of Energy (DOE). Because of their relatively high cost, the barriers are intended to be used in cases where the risk is too great to remove the contaminants, the contaminants are too difficult to remove with current technologies, or the potential movement of the contaminants to the water table is so high that immediate action needs to be taken to reduce health risks. Assessing the integrity of the barrier once it is emplaced, and during its anticipated life, is a very difficult but necessary requirement. Science and Engineering Associates, Inc., (SEA) and Sandia National Laboratories (SNL) have developed a quantitative subsurface barrier assessment system using gaseous tracers in support of the Subsurface Contaminants Focus Area barrier technology program. Called SEAtrace trademark, this system integrates an autonomous, multi-point soil vapor sampling and analysis system with a global optimization modeling methodology to locate and size barrier breaches in real time. The methodology for the global optimization code was completed and a prototype code written using simplifying assumptions. Preliminary modeling work to validate the code assumptions were performed using the T2VOC numerical code. A multi-point field sampling system was built to take soil gas samples and analyze for tracer gas concentration. The tracer concentration histories were used in the global optimization code to locate and size barrier breaches. SEAtrace trademark was consistently able to detect and locate leaks, even under very adverse conditions. The system was able to locate the leak to within 0.75 m of the actual value, and was able to determine the size of the leak to within 0.15 m

  1. Testing and Demonstrating Speaker Verification Technology in Iraqi-Arabic as Part of the Iraqi Enrollment Via Voice Authentication Project (IEVAP) in Support of the Global War on Terrorism (GWOT)

    National Research Council Canada - National Science Library

    Withee, Jeffrey W; Pena, Edwin D

    2007-01-01

    This thesis documents the findings of an Iraqi-Arabic language test and concept of operations for speaker verification technology as part of the Iraqi Banking System in support of the Iraqi Enrollment...

  2. The design of verification regimes

    International Nuclear Information System (INIS)

    Gallagher, N.W.

    1991-01-01

    Verification of a nuclear agreement requires more than knowledge of relevant technologies and institutional arrangements. It also demands thorough understanding of the nature of verification and the politics of verification design. Arms control efforts have been stymied in the past because key players agreed to verification in principle, only to disagree radically over verification in practice. In this chapter, it is shown that the success and stability of arms control endeavors can be undermined by verification designs which promote unilateral rather than cooperative approaches to security, and which may reduce, rather than enhance, the security of both sides. Drawing on logical analysis and practical lessons from previous superpower verification experience, this chapter summarizes the logic and politics of verification and suggests implications for South Asia. The discussion begins by determining what properties all forms of verification have in common, regardless of the participants or the substance and form of their agreement. Viewing verification as the political process of making decisions regarding the occurrence of cooperation points to four critical components: (1) determination of principles, (2) information gathering, (3) analysis and (4) projection. It is shown that verification arrangements differ primarily in regards to how effectively and by whom these four stages are carried out

  3. Mobile Health Technology Interventions for Suicide Prevention: Protocol for a Systematic Review and Meta-Analysis.

    Science.gov (United States)

    Melia, Ruth; Francis, Kady; Duggan, Jim; Bogue, John; O'Sullivan, Mary; Chambers, Derek; Young, Karen

    2018-01-26

    Previous research has reported that two of the major barriers to help-seeking for individuals at risk of suicide are stigma and geographical isolation. Mobile technology offers a potential means of delivering evidence-based interventions with greater specificity to the individual, and at the time that it is needed. Despite documented motivation by at-risk individuals to use mobile technology to track mental health and to support psychological interventions, there is a shortfall of outcomes data on the efficacy of mobile health (mHealth) technology on suicide-specific outcomes. The objective of this study is to develop a protocol for a systematic review and meta-analysis that aims to evaluate the effectiveness of mobile technology-based interventions for suicide prevention. The search includes the Cochrane Central Register of Controlled Trials (CENTRAL: The Cochrane Library), MEDLINE, Embase, PsycINFO, CRESP and relevant sources of gray literature. Studies that have evaluated psychological or nonpsychological interventions delivered via mobile computing and communication technology, and have suicidality as an outcome measure will be included. Two authors will independently extract data and assess the study suitability in accordance with the Cochrane Collaboration Risk of Bias Tool. Studies will be included if they measure at least one suicide outcome variable (ie, suicidal ideation, suicidal intent, nonsuicidal self-injurious behavior, suicidal behavior). Secondary outcomes will be measures of symptoms of depression. Where studies are sufficiently homogenous and reported outcomes are amenable for pooled synthesis, meta-analysis will be performed. A narrative synthesis will be conducted if the data is unsuitable for a meta-analysis. The review is in progress, with findings expected by summer 2018. To date, evaluations of mobile technology-based interventions in suicide prevention have focused on evaluating content as opposed to efficacy. Indeed, previous research has

  4. Integrating addiction treatment into primary care using mobile health technology: protocol for an implementation research study.

    Science.gov (United States)

    Quanbeck, Andrew R; Gustafson, David H; Marsch, Lisa A; McTavish, Fiona; Brown, Randall T; Mares, Marie-Louise; Johnson, Roberta; Glass, Joseph E; Atwood, Amy K; McDowell, Helene

    2014-05-29

    Healthcare reform in the United States is encouraging Federally Qualified Health Centers and other primary-care practices to integrate treatment for addiction and other behavioral health conditions into their practices. The potential of mobile health technologies to manage addiction and comorbidities such as HIV in these settings is substantial but largely untested. This paper describes a protocol to evaluate the implementation of an E-Health integrated communication technology delivered via mobile phones, called Seva, into primary-care settings. Seva is an evidence-based system of addiction treatment and recovery support for patients and real-time caseload monitoring for clinicians. Our implementation strategy uses three models of organizational change: the Program Planning Model to promote acceptance and sustainability, the NIATx quality improvement model to create a welcoming environment for change, and Rogers's diffusion of innovations research, which facilitates adaptations of innovations to maximize their adoption potential. We will implement Seva and conduct an intensive, mixed-methods assessment at three diverse Federally Qualified Healthcare Centers in the United States. Our non-concurrent multiple-baseline design includes three periods - pretest (ending in four months of implementation preparation), active Seva implementation, and maintenance - with implementation staggered at six-month intervals across sites. The first site will serve as a pilot clinic. We will track the timing of intervention elements and assess study outcomes within each dimension of the Reach, Effectiveness, Adoption, Implementation, and Maintenance framework, including effects on clinicians, patients, and practices. Our mixed-methods approach will include quantitative (e.g., interrupted time-series analysis of treatment attendance, with clinics as the unit of analysis) and qualitative (e.g., staff interviews regarding adaptations to implementation protocol) methods, and assessment of

  5. Early economic evaluation of emerging health technologies: protocol of a systematic review

    Science.gov (United States)

    2014-01-01

    Background The concept of early health technology assessment, discussed well over a decade, has now been collaboratively implemented by industry, government, and academia to select and expedite the development of emerging technologies that may address the needs of patients and health systems. Early economic evaluation is essential to assess the value of emerging technologies, but empirical data to inform the current practice of early evaluation is limited. We propose a systematic review of early economic evaluation studies in order to better understand the current practice. Methods/design This protocol describes a systematic review of economic evaluation studies of regulated health technologies in which the evaluation is conducted prior to regulatory approval and when the technology effectiveness is not well established. Included studies must report an economic evaluation, defined as the comparative analysis of alternatives with respect to their associated costs and health consequences, and must evaluate some regulated health technology such as pharmaceuticals, biologics, high-risk medical devices, or biomarkers. We will conduct the literature search on multiple databases, including MEDLINE, EMBASE, the Centre for Reviews and Dissemination Databases, and EconLit. Additional citations will be identified via scanning reference lists and author searching. We suspect that many early economic evaluation studies are unpublished, especially those conducted for internal use only. Additionally, we use a chain-referral sampling approach to identify authors of unpublished studies who work in technology discovery and development, starting out with our contact lists and authors who published relevant studies. Citation screening and full-text review will be conducted by pairs of reviewers. Abstracted data will include those related to the decision context and decision problem of the early evaluation, evaluation methods (e.g., data sources, methods, and assumptions used to

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT. STORMWATER SOURCE AREA TREATMENT DEVICE. THE TERRE HILL CONCRETE PRODUCTS TERRE KLEEN™ 09

    Science.gov (United States)

    Verification testing of the Terre Hill Concrete Products Terre Kleen™ 09 was conducted on a 1.27 acre portion of the City of Harrisburg, Pennsylvania Department of Public Works facility. The Terre Kleen™ devices combines primary and secondary chambers, baffles, a screen, and incl...

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: HVLP COATING EQUIPMENT, ITW AUTOMOTIVE REFINISHING, DEVILBISS FLG-631-318 HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss FLG-631-318 high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the DeVilbiss FLG, which is designed for use in automotive refinishing. The test coating chosen by ITW Automotive Refi...

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: HVLP COATING EQUIPMENT, ITW AUTOMOTIVE REFINISHING, DEVILBISS GTI-600G, HVLP SPRAY GUN

    Science.gov (United States)

    This report presents the results of the verification test of the DeVilbiss GTi-600G high-volume, low-pressure gravity-feed spray gun, hereafter referred to as the DeVilbiss GTi, which is designed for use in automotive refinishing. The test coating chosen by ITW Automotive Refinis...

  9. AN ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PERFORMANCE TESTING OF THE INDUSTRIAL TEST SYSTEM, INC. CYANIDE REAGENTSTRIP™ TEST KIT

    Science.gov (United States)

    Cyanide can be present in various forms in water. The cyanide test kit evaluated in this verification study (Industrial Test System, Inc. Cyanide Regent Strip ™ Test Kit) was designed to detect free cyanide in water. This is done by converting cyanide in water to cyanogen...

  10. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  11. Nuclear disarmament verification

    International Nuclear Information System (INIS)

    DeVolpi, A.

    1993-01-01

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification

  12. A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.

    Science.gov (United States)

    Xu, He; Ding, Jie; Li, Peng; Zhu, Feng; Wang, Ruchuan

    2018-03-02

    With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.

  13. Verification study on technology for preliminary investigation for HLW geological disposal. Part 2. Verification of surface geophysical prospecting through establishing site descriptive models

    International Nuclear Information System (INIS)

    Kondo, Hirofumi; Suzuki, Koichi; Hasegawa, Takuma; Goto, Keiichiro; Yoshimura, Kimitaka; Muramoto, Shigenori

    2012-01-01

    The Yokosuka demonstration and validation project using Yokosuka CRIEPI site has been conducted since FY 2006 as a cooperative research between NUMO (Nuclear Waste Management Organization of Japan) and CRIEPI. The objectives of this project are to examine and to refine the basic methodology of the investigation and assessment of properties of geological environment in the stage of Preliminary Investigation for HLW geological disposal. Within Preliminary Investigation technologies, surface geophysical prospecting is an important means of obtaining information from deep geological environment for planning borehole surveys. In FY 2010, both seismic prospecting (seismic reflection and vertical seismic profiling methods) for obtaining information about geological structure and electromagnetic prospecting (magneto-telluric and time domain electromagnetic methods) for obtaining information about resistivity structure reflecting the distribution of salt water/fresh water boundary to a depth of over several hundred meters were conducted in the Yokosuka CRIEPI site. Through these surveys, the contribution of geophysical prospecting methods in the surface survey stage to improving the reliability of site descriptive models was confirmed. (author)

  14. Optimizing the Information Presentation on Mining Potential by using Web Services Technology with Restful Protocol

    Science.gov (United States)

    Abdillah, T.; Dai, R.; Setiawan, E.

    2018-02-01

    This study aims to develop the application of Web Services technology with RestFul Protocol to optimize the information presentation on mining potential. This study used User Interface Design approach for the information accuracy and relevance as well as the Web Service for the reliability in presenting the information. The results show that: the information accuracy and relevance regarding mining potential can be seen from the achievement of User Interface implementation in the application that is based on the following rules: The consideration of the appropriate colours and objects, the easiness of using the navigation, and users’ interaction with the applications that employs symbols and languages understood by the users; the information accuracy and relevance related to mining potential can be observed by the information presented by using charts and Tool Tip Text to help the users understand the provided chart/figure; the reliability of the information presentation is evident by the results of Web Services testing in Figure 4.5.6. This study finds out that User Interface Design and Web Services approaches (for the access of different Platform apps) are able to optimize the presentation. The results of this study can be used as a reference for software developers and Provincial Government of Gorontalo.

  15. Study protocol: mobile improvement of self-management ability through rural technology (mI SMART).

    Science.gov (United States)

    Mallow, Jennifer A; Theeke, Laurie A; Long, Dustin M; Whetsel, Tara; Theeke, Elliott; Mallow, Brian K

    2015-01-01

    There are 62 million Americans currently residing in rural areas who are more likely to have multiple chronic conditions and be economically disadvantaged, and in poor health, receive less recommended preventive services and attend fewer visits to health care providers. Recent advances in mobile healthcare (mHealth) offer a promising new approach to solving health disparities and improving chronic illness care. It is now possible and affordable to transmit health information, including values from glucometers, automated blood pressure monitors, and scales, through Bluetooth-enabled devices. Additionally, audio and video communications technologies can allow healthcare providers to conduct many parts of a physical exam remotely from varied settings. These technologies could remove geographical distance as a barrier to care and diminish the access to care issues faced by patients who live rurally. However, currently there is lack of studies that provide evidence of feasibility, acceptability, and effectiveness of mHealth initiatives on improved outcomes of care, a needed step to make the translation to implementation studies in healthcare systems. The purpose of this paper is to present the protocol for the first study of mI SMART (mobile Improvement of Self-Management Ability through Rural Technology), a new integrated mHealth intervention. Our objective is to provide evidence of feasibility and acceptability for the use of mI SMART in an underserved population and establish evidence for the refinement of mI SMART. The proposed study will take place at Milan Puskar Health Right, a free primary care clinic in the state of West Virginia. The clinic provides health care at no cost to uninsured, low income; adults aged 18-64 living in West Virginia. We will enroll 30 participants into this feasibility study with plans of implementing a longitudinal randomized, comparative effectiveness design in the future. Data collection will include tracking of barriers and

  16. Environmental Technology Verification Report for Abraxis Ecologenia® 17β-Estradiol (E2) Microplate Enzyme-Linked Immunosorbent Assay (ELISA) Test Kits

    Science.gov (United States)

    This verification test was conducted according to procedures specifiedin the Test/QA Planfor Verification of Enzyme-Linked Immunosorbent Assay (ELISA) Test Kis for the Quantitative Determination of Endocrine Disrupting Compounds (EDCs) in Aqueous Phase Samples. Deviations to the...

  17. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  18. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  19. A survey on the high reliability software verification and validation technology for instrumentation and control in NPP.

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Kee Choon; Lee, Chang Soo; Dong, In Sook [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1994-01-01

    This document presents the technical status of the software verification and validation (V and V) efforts to support developing and licensing digital instrumentation and control (I and C) systems in nuclear power plants. We have reviewed codes and standards to be concensus criteria among vendor, licensee and licenser. Then we have described the software licensing procedures under 10 CFR 50 and 10 CFR 52 of the United States cope with the licensing barrier. At last, we have surveyed the technical issues related to developing and licensing the high integrity software for digital I and C systems. These technical issues let us know the development direction of our own software V and V methodology. (Author) 13 refs., 2 figs.,.

  20. HEART: heart exercise and remote technologies: A randomized controlled trial study protocol

    Directory of Open Access Journals (Sweden)

    Kira Geoffrey

    2011-05-01

    Full Text Available Abstract Background Cardiovascular disease (CVD is the leading cause of death worldwide. Cardiac rehabilitation (CR is aimed at improving health behaviors to slow or reverse the progression of CVD disease. Exercise is a central element of CR. Technologies such as mobile phones and the Internet (mHealth offer potential to overcome many of the psychological, physical, and geographical barriers that have been associated with lack of participation in exercise-based CR. We aim to trial the effectiveness of a mobile phone delivered exercise-based CR program to increase exercise capacity and functional outcomes compared with usual CR care in adults with CVD. This paper outlines the rationale and methods of the trial. Methods A single-blinded parallel two-arm randomized controlled trial is being conducted. A total of 170 people will be randomized at 1:1 ratio either to receive a mHealth CR program or usual care. Participants are identified by CR nurses from two metropolitan hospitals in Auckland, New Zealand through outpatient clinics and existing databases. Consenting participants are contacted to attend a baseline assessment. The intervention consists of a theory-based, personalized, automated package of text and video message components via participants' mobile phones and the Internet to increase exercise behavior, delivered over six months. The control group will continue with usual CR. Data collection occurs at baseline and 24 weeks (post-intervention. The primary outcome is change in maximal oxygen uptake from baseline to 24 weeks. Secondary outcomes include post-intervention measures on self-reported physical activity (IPAQ, cardiovascular risk factors (systolic blood pressure, weight, and waist to hip ratio, health related quality of life (SF-36, and cost-effectiveness. Discussion This manuscript presents the protocol for a randomized controlled trial of a mHealth exercise-based CR program. Results of this trial will provide much needed

  1. Digital technologies in occupational therapy and physiotherapy undergraduate and postgraduate education: a scoping review protocol.

    Science.gov (United States)

    Olivier, Benita; Verdonck, Michele; Casteleijn, Daleen

    2017-11-01

    How have digital technologies been used in occupational therapy and physiotherapy undergraduate and postgraduate education?Specifically, the objective of this scoping review is to present an overview of research on the use of digital technologies in terms of type of digital technology used, pedagogy associated with the use of digital technology, subject/topic/area of application, experiences/perception of digital technology used, outcomes of the digital technology used and challenges to the use of digital technologies in occupational therapy and physiotherapy undergraduate and postgraduate education.

  2. to the Question of IPv6-protocol Logical Characteristics Properties Using in order to Increase of the Security Level of the Russian Federation National Information Technology Infrastructure

    Directory of Open Access Journals (Sweden)

    Dmitry Anatolevich Melnikov

    2014-02-01

    Full Text Available This paper proposes a method of IPv6-protocol logical characteristics using in order to increase the security level of the Russian Federation national information technology infrastructure and the global information society.

  3. Draft Technical Protocol: A Treatability Test for Evaluating the Potential Applicability of the Reductive Anaerobic Biological in Situ Treatment Technology (Rabitt) to Remediate Chloroethenes

    National Research Council Canada - National Science Library

    Morse, Jeff

    1998-01-01

    This draft, unvalidated protocol describes a comprehensive approach for conducting a phased treatability test to determine the potential for employing the Reductive Anaerobic Biological In Situ Treatment Technology (RABITT...

  4. Environmental Technology Verification Report. Field Portable Gas Chromatograph/Mass Spectrometer. Viking Instruments Corporation SpectraTrak (Trademark) 672

    National Research Council Canada - National Science Library

    Enfield, Wayne

    1997-01-01

    .... This self-contained, field transportable system, whose design has been adapted from laboratory technology, uses a contained, chromatographic column and accompanying mass spectrometer to provide...

  5. An Experimental Protocol for Assessing the Performance of New Ultrasound Probes Based on CMUT Technology in Application to Brain Imaging.

    Science.gov (United States)

    Matrone, Giulia; Ramalli, Alessandro; Savoia, Alessandro Stuart; Quaglia, Fabio; Castellazzi, Gloria; Morbini, Patrizia; Piastra, Marco

    2017-09-24

    The possibility to perform an early and repeatable assessment of imaging performance is fundamental in the design and development process of new ultrasound (US) probes. Particularly, a more realistic analysis with application-specific imaging targets can be extremely valuable to assess the expected performance of US probes in their potential clinical field of application. The experimental protocol presented in this work was purposely designed to provide an application-specific assessment procedure for newly-developed US probe prototypes based on Capacitive Micromachined Ultrasonic Transducer (CMUT) technology in relation to brain imaging. The protocol combines the use of a bovine brain fixed in formalin as the imaging target, which ensures both realism and repeatability of the described procedures, and of neuronavigation techniques borrowed from neurosurgery. The US probe is in fact connected to a motion tracking system which acquires position data and enables the superposition of US images to reference Magnetic Resonance (MR) images of the brain. This provides a means for human experts to perform a visual qualitative assessment of the US probe imaging performance and to compare acquisitions made with different probes. Moreover, the protocol relies on the use of a complete and open research and development system for US image acquisition, i.e. the Ultrasound Advanced Open Platform (ULA-OP) scanner. The manuscript describes in detail the instruments and procedures involved in the protocol, in particular for the calibration, image acquisition and registration of US and MR images. The obtained results prove the effectiveness of the overall protocol presented, which is entirely open (within the limits of the instrumentation involved), repeatable, and covers the entire set of acquisition and processing activities for US images.

  6. Decontamination technology verification test on scraping surface soil on the highway roadside slopes using unmanned scraping machine

    International Nuclear Information System (INIS)

    Fujinaka, Hiroyuki; Kubota, Mitsuru; Shibuya, Susumu; Kasai, Yoshimitsu

    2013-01-01

    The restore the normal life in the contaminated area, reconstruction of the infrastructure is necessary and early decontamination of roads and roadside slopes of highway are required. Decontamination work of roadside slopes is conducted only by hand working so far, but on the high and steep roadside slopes it is desirable to carry out decontamination work by an unmanned scraping machine to reduce working hours and improve safety. In this verification test, decontamination work of the roadside slope of highway, of which area was 20m W x 15m L and divided into two sections, was implemented by the machine or by hand, and working hours and radiation exposure dose were measured. As the results of the test, working hours and radiation exposure dose by the machine were 49% and 63% respectively compared to those by hand. Based on the results, cost and radiation dose for decontamination work on larger slopes were evaluated. Cost by the machine is estimated to be less than that by hand where the area is over 4,000m 2 . It is confirmed that the decontamination work of roadside slopes by the machine can be done more quickly and safely in comparison with hand working. (author)

  7. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  8. Material integrity verification radar

    International Nuclear Information System (INIS)

    Koppenjan, S.K.

    1999-01-01

    The International Atomic Energy Agency (IAEA) has the need for verification of 'as-built' spent fuel-dry storage containers and other concrete structures. The IAEA has tasked the Special Technologies Laboratory (STL) to fabricate, test, and deploy a stepped-frequency Material Integrity Verification Radar (MIVR) system to nondestructively verify the internal construction of these containers. The MIVR system is based on previously deployed high-frequency, ground penetrating radar (GPR) systems that have been developed by STL for the U.S. Department of Energy (DOE). Whereas GPR technology utilizes microwave radio frequency energy to create subsurface images, MTVR is a variation for which the medium is concrete instead of soil. The purpose is to nondestructively verify the placement of concrete-reinforcing materials, pipes, inner liners, and other attributes of the internal construction. The MIVR system underwent an initial field test on CANDU reactor spent fuel storage canisters at Atomic Energy of Canada Limited (AECL), Chalk River Laboratories, Ontario, Canada, in October 1995. A second field test at the Embalse Nuclear Power Plant in Embalse, Argentina, was completed in May 1996. The DOE GPR also was demonstrated at the site. Data collection and analysis were performed for the Argentine National Board of Nuclear Regulation (ENREN). IAEA and the Brazilian-Argentine Agency for the Control and Accounting of Nuclear Material (ABACC) personnel were present as observers during the test. Reinforcing materials were evident in the color, two-dimensional images produced by the MIVR system. A continuous pattern of reinforcing bars was evident and accurate estimates on the spacing, depth, and size were made. The potential uses for safeguard applications were jointly discussed. The MIVR system, as successfully demonstrated in the two field tests, can be used as a design verification tool for IAEA safeguards. A deployment of MIVR for Design Information Questionnaire (DIQ

  9. VEG-01: Veggie Hardware Verification Testing

    Science.gov (United States)

    Massa, Gioia; Newsham, Gary; Hummerick, Mary; Morrow, Robert; Wheeler, Raymond

    2013-01-01

    The Veggie plant/vegetable production system is scheduled to fly on ISS at the end of2013. Since much of the technology associated with Veggie has not been previously tested in microgravity, a hardware validation flight was initiated. This test will allow data to be collected about Veggie hardware functionality on ISS, allow crew interactions to be vetted for future improvements, validate the ability of the hardware to grow and sustain plants, and collect data that will be helpful to future Veggie investigators as they develop their payloads. Additionally, food safety data on the lettuce plants grown will be collected to help support the development of a pathway for the crew to safely consume produce grown on orbit. Significant background research has been performed on the Veggie plant growth system, with early tests focusing on the development of the rooting pillow concept, and the selection of fertilizer, rooting medium and plant species. More recent testing has been conducted to integrate the pillow concept into the Veggie hardware and to ensure that adequate water is provided throughout the growth cycle. Seed sanitation protocols have been established for flight, and hardware sanitation between experiments has been studied. Methods for shipping and storage of rooting pillows and the development of crew procedures and crew training videos for plant activities on-orbit have been established. Science verification testing was conducted and lettuce plants were successfully grown in prototype Veggie hardware, microbial samples were taken, plant were harvested, frozen, stored and later analyzed for microbial growth, nutrients, and A TP levels. An additional verification test, prior to the final payload verification testing, is desired to demonstrate similar growth in the flight hardware and also to test a second set of pillows containing zinnia seeds. Issues with root mat water supply are being resolved, with final testing and flight scheduled for later in 2013.

  10. Verification of hypergraph states

    Science.gov (United States)

    Morimae, Tomoyuki; Takeuchi, Yuki; Hayashi, Masahito

    2017-12-01

    Hypergraph states are generalizations of graph states where controlled-Z gates on edges are replaced with generalized controlled-Z gates on hyperedges. Hypergraph states have several advantages over graph states. For example, certain hypergraph states, such as the Union Jack states, are universal resource states for measurement-based quantum computing with only Pauli measurements, while graph state measurement-based quantum computing needs non-Clifford basis measurements. Furthermore, it is impossible to classically efficiently sample measurement results on hypergraph states unless the polynomial hierarchy collapses to the third level. Although several protocols have been proposed to verify graph states with only sequential single-qubit Pauli measurements, there was no verification method for hypergraph states. In this paper, we propose a method for verifying a certain class of hypergraph states with only sequential single-qubit Pauli measurements. Importantly, no i.i.d. property of samples is assumed in our protocol: any artificial entanglement among samples cannot fool the verifier. As applications of our protocol, we consider verified blind quantum computing with hypergraph states, and quantum computational supremacy demonstrations with hypergraph states.

  11. Swarm Verification

    Science.gov (United States)

    Holzmann, Gerard J.; Joshi, Rajeev; Groce, Alex

    2008-01-01

    Reportedly, supercomputer designer Seymour Cray once said that he would sooner use two strong oxen to plow a field than a thousand chickens. Although this is undoubtedly wise when it comes to plowing a field, it is not so clear for other types of tasks. Model checking problems are of the proverbial "search the needle in a haystack" type. Such problems can often be parallelized easily. Alas, none of the usual divide and conquer methods can be used to parallelize the working of a model checker. Given that it has become easier than ever to gain access to large numbers of computers to perform even routine tasks it is becoming more and more attractive to find alternate ways to use these resources to speed up model checking tasks. This paper describes one such method, called swarm verification.

  12. Facilitating Administrators' Instructional Leadership through the Use of a Technology Integration Discussion Protocol

    Science.gov (United States)

    McLeod, Scott

    2015-01-01

    Digital learning tools are increasingly prevalent in classrooms, yet too often technology integration efforts by educators replicate rather than transform traditional instructional practices. Opportunities to take advantage of the new affordances that technologies bring to the learning environment thus become forfeit. Administrators' use of a…

  13. The Effect of Health Information Technology on Health Care Provider Communication: A Mixed-Method Protocol.

    Science.gov (United States)

    Manojlovich, Milisa; Adler-Milstein, Julia; Harrod, Molly; Sales, Anne; Hofer, Timothy P; Saint, Sanjay; Krein, Sarah L

    2015-06-11

    Communication failures between physicians and nurses are one of the most common causes of adverse events for hospitalized patients, as well as a major root cause of all sentinel events. Communication technology (ie, the electronic medical record, computerized provider order entry, email, and pagers), which is a component of health information technology (HIT), may help reduce some communication failures but increase others because of an inadequate understanding of how communication technology is used. Increasing use of health information and communication technologies is likely to affect communication between nurses and physicians. The purpose of this study is to describe, in detail, how health information and communication technologies facilitate or hinder communication between nurses and physicians with the ultimate goal of identifying how we can optimize the use of these technologies to support effective communication. Effective communication is the process of developing shared understanding between communicators by establishing, testing, and maintaining relationships. Our theoretical model, based in communication and sociology theories, describes how health information and communication technologies affect communication through communication practices (ie, use of rich media; the location and availability of computers) and work relationships (ie, hierarchies and team stability). Therefore we seek to (1) identify the range of health information and communication technologies used in a national sample of medical-surgical acute care units, (2) describe communication practices and work relationships that may be influenced by health information and communication technologies in these same settings, and (3) explore how differences in health information and communication technologies, communication practices, and work relationships between physicians and nurses influence communication. This 4-year study uses a sequential mixed-methods design, beginning with a

  14. Pilot study: Assessing the effect of continual position monitoring technology on compliance with patient turning protocols

    OpenAIRE

    Schutt, Suann Cirigliano; Tarver, Christine; Pezzani, Michelle

    2017-01-01

    Abstract Aim The study aim was to evaluate if continual patient position monitoring, taking into account self‐turns and clinician‐assisted turns, would increase the percentage of time a patient's position changed at least every 2 hr. Background While patient turning has clinical benefits, current models to help staff remember to turn patients, such as “turn clocks” and timers, have not resulted in high compliance with turning protocols. In addition, reminders are based on arbitrary 2‐hr windo...

  15. Pilot study: Assessing the effect of continual position monitoring technology on compliance with patient turning protocols.

    Science.gov (United States)

    Schutt, Suann Cirigliano; Tarver, Christine; Pezzani, Michelle

    2018-01-01

    The study aim was to evaluate if continual patient position monitoring, taking into account self-turns and clinician-assisted turns, would increase the percentage of time a patient's position changed at least every 2 hr. While patient turning has clinical benefits, current models to help staff remember to turn patients, such as "turn clocks" and timers, have not resulted in high compliance with turning protocols. In addition, reminders are based on arbitrary 2-hr windows (such as turning on "even" hours) rather than on individual patient activity, including self-turns. This is a first inpatient, non-randomized, pre-/postintervention study. Data collection occurred from May 2013-February 2014 on a 39-bed medical unit in a community hospital. Baseline patient turning data were recorded by a sensor; however, the patient data were not displayed at the nurses' station to establish compliance with the hospital's turning protocol. Postintervention, patient position information was wirelessly displayed on nurses' station computer monitors in real time. A Student t test was used to compare baseline to postintervention "mean time in compliance." Data from 138 patients ( N  =   7,854 hr of monitoring) were collected. The baseline phase yielded 4,322 hr of position monitoring data and the postintervention phase yielded 3,532 hr of data. Statistically significant improvement was demonstrated in the percentage of time a patient's position changed at least every 2 hr from baseline to postintervention.

  16. Exploitation of Existing Voice Over Internet Protocol Technology for Department of the Navy Application

    National Research Council Canada - National Science Library

    Vegter, Henry

    2002-01-01

    ..., reduced cost associated with toll calls and the merger of the telephone with the desktop will keep adoption of this technology on the path to ubiquitous use, Topics explored in the thesis include...

  17. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  18. Challenges for effective WMD verification

    International Nuclear Information System (INIS)

    Andemicael, B.

    2006-01-01

    Effective verification is crucial to the fulfillment of the objectives of any disarmament treaty, not least as regards the proliferation of weapons of mass destruction (WMD). The effectiveness of the verification package depends on a number of factors, some inherent in the agreed structure and others related to the type of responses demanded by emerging challenges. The verification systems of three global agencies-the IAEA, the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO, currently the Preparatory Commission), and the Organization for the Prohibition of Chemical Weapons (OPCW)-share similarities in their broad objectives of confidence-building and deterrence by assuring members that rigorous verification would deter or otherwise detect non-compliance. Yet they are up against various constraints and other issues, both internal and external to the treaty regime. These constraints pose major challenges to the effectiveness and reliability of the verification operations. In the nuclear field, the IAEA safeguards process was the first to evolve incrementally from modest Statute beginnings to a robust verification system under the global Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The nuclear non-proliferation regime is now being supplemented by a technology-intensive verification system of the nuclear test-ban treaty (CTBT), a product of over three decades of negotiation. However, there still remain fundamental gaps and loopholes in the regime as a whole, which tend to diminish the combined effectiveness of the IAEA and the CTBT verification capabilities. He three major problems are (a) the lack of universality of membership, essentially because of the absence of three nuclear weapon-capable States-India, Pakistan and Israel-from both the NPT and the CTBT, (b) the changes in US disarmament policy, especially in the nuclear field, and (c) the failure of the Conference on Disarmament to conclude a fissile material cut-off treaty. The world is

  19. Development of a Wearable Instrumented Vest for Posture Monitoring and System Usability Verification Based on the Technology Acceptance Model

    Science.gov (United States)

    Lin, Wen-Yen; Chou, Wen-Cheng; Tsai, Tsai-Hsuan; Lin, Chung-Chih; Lee, Ming-Yih

    2016-01-01

    Body posture and activity are important indices for assessing health and quality of life, especially for elderly people. Therefore, an easily wearable device or instrumented garment would be valuable for monitoring elderly people’s postures and activities to facilitate healthy aging. In particular, such devices should be accepted by elderly people so that they are willing to wear it all the time. This paper presents the design and development of a novel, textile-based, intelligent wearable vest for real-time posture monitoring and emergency warnings. The vest provides a highly portable and low-cost solution that can be used both indoors and outdoors in order to provide long-term care at home, including health promotion, healthy aging assessments, and health abnormality alerts. The usability of the system was verified using a technology acceptance model-based study of 50 elderly people. The results indicated that although elderly people are anxious about some newly developed wearable technologies, they look forward to wearing this instrumented posture-monitoring vest in the future. PMID:27999324

  20. Development of a Wearable Instrumented Vest for Posture Monitoring and System Usability Verification Based on the Technology Acceptance Model.

    Science.gov (United States)

    Lin, Wen-Yen; Chou, Wen-Cheng; Tsai, Tsai-Hsuan; Lin, Chung-Chih; Lee, Ming-Yih

    2016-12-17

    Body posture and activity are important indices for assessing health and quality of life, especially for elderly people. Therefore, an easily wearable device or instrumented garment would be valuable for monitoring elderly people's postures and activities to facilitate healthy aging. In particular, such devices should be accepted by elderly people so that they are willing to wear it all the time. This paper presents the design and development of a novel, textile-based, intelligent wearable vest for real-time posture monitoring and emergency warnings. The vest provides a highly portable and low-cost solution that can be used both indoors and outdoors in order to provide long-term care at home, including health promotion, healthy aging assessments, and health abnormality alerts. The usability of the system was verified using a technology acceptance model-based study of 50 elderly people. The results indicated that although elderly people are anxious about some newly developed wearable technologies, they look forward to wearing this instrumented posture-monitoring vest in the future.

  1. Data Exchanges and Verifications Online (DEVO)

    Data.gov (United States)

    Social Security Administration — DEVO is the back-end application for processing SSN verifications and data exchanges. DEVO uses modern technology for parameter driven processing of both batch and...

  2. Modeling and Verification of the Bitcoin Protocol

    NARCIS (Netherlands)

    Chaudhary, Kaylash; Fehnker, Ansgar; van de Pol, Jan Cornelis; Stoelinga, Mariëlle Ida Antoinette; van Glabbeek, R.J.; Groote, J.F.; Höfner, P.

    2015-01-01

    Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double

  3. IMRT plan verification in radiotherapy

    International Nuclear Information System (INIS)

    Vlk, P.

    2006-01-01

    This article describes the procedure for verification of IMRT (Intensity modulated radiation therapy) plan, which is used in the Oncological Institute of St. Elisabeth in Bratislava. It contains basic description of IMRT technology and developing a deployment plan for IMRT planning system CORVUS 6.0, the device Mimic (Multilammelar intensity modulated collimator) and the overall process of verifying the schedule created. The aim of verification is particularly good control of the functions of MIMIC and evaluate the overall reliability of IMRT planning. (author)

  4. Does assistive technology contribute to social inclusion for people with intellectual disability? A systematic review protocol.

    Science.gov (United States)

    Owuor, John; Larkan, Fiona; Kayabu, Bonnix; Fitzgerald, Geraldine; Sheaf, Greg; Dinsmore, John; McConkey, Roy; Clarke, Mike; MacLachlan, Malcolm

    2018-02-10

    The aim of this review is to answer the following question: Does assistive technology contribute to social inclusion for people with intellectual disability? Previous research on assistive technology has focused on socioeconomic impacts such as education, employment and access to healthcare by people with intellectual disability. There is a need to consolidate evidence on the interaction between intellectual disability, assistive technology, community living and social inclusion. The review will consider studies from all settings: geographical, socioeconomic and care (institutional and community care), published in English. Studies reported in other languages with abstracts in English will be included if they can be translated using Google Translate, otherwise such studies will be included in the appendix. The review will include both qualitative and quantitative studies. The intervention in this review refers to the use of assistive technology to promote community participation or interpersonal relationships (social inclusion) for people with intellectual disability. The outcomes will be behavioural and social benefits of using assistive technology by people with intellectual disability. Enhanced interpersonal relationships and community participation by people with intellectual disability. Data analysis will be in two phases. The first phase will involve analysis of individual study designs separately. The second phase will be narrative/thematic synthesis of all study groups. The review will not create any ethical or safety concerns. At least one peer-reviewed article in a leading journal such as the BMJ is planned. The findings will also be disseminated through a seminar session involving internal audience at Trinity College Dublin and within the Assistive Technologies for people with Intellectual Disability and Autism research programme. CRD42017065447; Pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article

  5. BAGHOUSE FILTRATION PRODUCTS VERIFICATION TESTING, HOW IT BENEFITS THE BOILER BAGHOUSE OPERATOR

    Science.gov (United States)

    The paper describes the Environmental Technology Verification (ETV) Program for baghouse filtration products developed by the Air Pollution Control Technology Verification Center, one of six Centers under the ETV Program, and discusses how it benefits boiler baghouse operators. A...

  6. Strategies for merging microbial fuel cell technologies in water desalination processes: Start-up protocol and desalination efficiency assessment

    Science.gov (United States)

    Borjas, Zulema; Esteve-Núñez, Abraham; Ortiz, Juan Manuel

    2017-07-01

    Microbial Desalination Cells constitute an innovative technology where microbial fuel cell and electrodialysis merge in the same device for obtaining fresh water from saline water with no energy-associated cost for the user. In this work, an anodic biofilm of the electroactive bacteria Geobacter sulfurreducens was able to efficiently convert the acetate present in synthetic waste water into electric current (j = 0.32 mA cm-2) able to desalinate water. .Moreover, we implemented an efficient start-up protocol where desalination up to 90% occurred in a desalination cycle (water production:0.308 L m-2 h-1, initial salinity: 9 mS cm-1, final salinity: osmosis (RO) or reverse electrodialysis.

  7. Environmental Technology Verification Report for Abraxis Ecologenia® Ethynylestradiol (EE2) Microplate Enzyme-Linked Immunosorbent Assay (ELISA) Test Kits

    Science.gov (United States)

    The EPA's National Risk Management Research Laboratory (NRMRL) and its verification organization partner, Battelle, operate the Advanced Monitoring Systems (AMS) Center under ETV. The AMS Center recently evaluated the performance of the Abraxis Ecologenia Ethynylestradiol (EE2) ...

  8. Fatty acid methyl ester (FAME) technology for monitoring biological foaming in activated sludge: full scale plant verification.

    Science.gov (United States)

    Lee, J W; Cha, D K; Kim, I; Son, A; Ahn, K H

    2008-02-01

    Fatty acid methyl ester (FAME) technology was evaluated as a monitoring tool for quantification of Gordonia amarae in activated sludge systems. The fatty acid, 19:1 alcohol, which was identified as a unique fatty acid in G. amarae was not only confirmed to be present in foaming plant samples, but the quantity of the signature peak correlated closely with the degree of foaming. Foaming potential experiment provided a range of critical foaming levels that corresponded to G. amarae population. This range of critical Gordonia levels was correlated to the threshold signature FAME amount. Six full-scale wastewater treatment plants were selected based on a survey to participate in our full-scale study to evaluate the potential application of the FAME technique as the Gordonia monitoring tool. Greater amounts of signature FAME were extracted from the mixed liquor samples obtained from treatment plants experiencing Gordonia foaming problems. The amounts of signature FAME correlated well with the conventional filamentous counting technique. These results demonstrated that the relative abundance of the signature FAMEs can be used to quantitatively monitor the abundance of foam-causing microorganism in activated sludge.

  9. Utilizing 3D Printing Technology to Merge MRI with Histology: A Protocol for Brain Sectioning

    Science.gov (United States)

    Luciano, Nicholas J; Sati, Pascal; Nair, Govind; Guy, Joseph R; Ha, Seung-Kwon; Absinta, Martina; Chiang, Wen-Yang; Leibovitch, Emily C; Jacobson, Steven; Silva, Afonso C; Reich, Daniel S.

    2016-01-01

    Magnetic resonance imaging (MRI) allows for the delineation between normal and abnormal tissue on a macroscopic scale, sampling an entire tissue volume three-dimensionally. While MRI is an extremely sensitive tool for detecting tissue abnormalities, association of signal changes with an underlying pathological process is usually not straightforward. In the central nervous system, for example, inflammation, demyelination, axonal damage, gliosis, and neuronal death may all induce similar findings on MRI. As such, interpretation of MRI scans depends on the context, and radiological-histopathological correlation is therefore of the utmost importance. Unfortunately, traditional pathological sectioning of brain tissue is often imprecise and inconsistent, thus complicating the comparison between histology sections and MRI. This article presents novel methodology for accurately sectioning primate brain tissues and thus allowing precise matching between histology and MRI. The detailed protocol described in this article will assist investigators in applying this method, which relies on the creation of 3D printed brain slicers. Slightly modified, it can be easily implemented for brains of other species, including humans. PMID:28060281

  10. Utilizing 3D Printing Technology to Merge MRI with Histology: A Protocol for Brain Sectioning.

    Science.gov (United States)

    Luciano, Nicholas J; Sati, Pascal; Nair, Govind; Guy, Joseph R; Ha, Seung-Kwon; Absinta, Martina; Chiang, Wen-Yang; Leibovitch, Emily C; Jacobson, Steven; Silva, Afonso C; Reich, Daniel S

    2016-12-06

    Magnetic resonance imaging (MRI) allows for the delineation between normal and abnormal tissue on a macroscopic scale, sampling an entire tissue volume three-dimensionally. While MRI is an extremely sensitive tool for detecting tissue abnormalities, association of signal changes with an underlying pathological process is usually not straightforward. In the central nervous system, for example, inflammation, demyelination, axonal damage, gliosis, and neuronal death may all induce similar findings on MRI. As such, interpretation of MRI scans depends on the context, and radiological-histopathological correlation is therefore of the utmost importance. Unfortunately, traditional pathological sectioning of brain tissue is often imprecise and inconsistent, thus complicating the comparison between histology sections and MRI. This article presents novel methodology for accurately sectioning primate brain tissues and thus allowing precise matching between histology and MRI. The detailed protocol described in this article will assist investigators in applying this method, which relies on the creation of 3D printed brain slicers. Slightly modified, it can be easily implemented for brains of other species, including humans.

  11. Mithramycin encapsulated in polymeric micelles by microfluidic technology as novel therapeutic protocol for beta-thalassemia

    Science.gov (United States)

    Capretto, Lorenzo; Mazzitelli, Stefania; Brognara, Eleonora; Lampronti, Ilaria; Carugo, Dario; Hill, Martyn; Zhang, Xunli; Gambari, Roberto; Nastruzzi, Claudio

    2012-01-01

    This report shows that the DNA-binding drug, mithramycin, can be efficiently encapsulated in polymeric micelles (PM-MTH), based on Pluronic® block copolymers, by a new microfluidic approach. The effect of different production parameters has been investigated for their effect on PM-MTH characteristics. The compared analysis of PM-MTH produced by microfluidic and conventional bulk mixing procedures revealed that microfluidics provides a useful platform for the production of PM-MTH with improved controllability, reproducibility, smaller size, and polydispersity. Finally, an investigation of the effects of PM-MTH, produced by microfluidic and conventional bulk mixing procedures, on the erythroid differentiation of both human erythroleukemia and human erythroid precursor cells is reported. It is demonstrated that PM-MTH exhibited a slightly lower toxicity and more pronounced differentiative activity when compared to the free drug. In addition, PM-MTH were able to upregulate preferentially γ-globin messenger ribonucleic acid production and to increase fetal hemoglobin (HbF) accumulation, the percentage of HbF-containing cells, and their HbF content without stimulating α-globin gene expression, which is responsible for the clinical symptoms of β-thalassemia. These results represent an important first step toward a potential clinical application, since an increase in HbF could alleviate the symptoms underlying β-thalassemia and sickle cell anemia. In conclusion, this report suggests that PM-MTH produced by microfluidic approach warrants further evaluation as a potential therapeutic protocol for β-thalassemia. PMID:22287841

  12. Mithramycin encapsulated in polymeric micelles by microfluidic technology as novel therapeutic protocol for beta-thalassemia

    Directory of Open Access Journals (Sweden)

    Capretto L

    2012-01-01

    Full Text Available Lorenzo Capretto1, Stefania Mazzitelli2, Eleonora Brognara2, Ilaria Lampronti2, Dario Carugo1, Martyn Hill1, Xunli Zhang1, Roberto Gambari2, Claudio Nastruzzi31Engineering Sciences, University of Southampton, Southampton, UK; 2Department of Biochemistry and Molecular Biology, 3Department of Pharmaceutical Sciences, University of Ferrara, Ferrara, ItalyAbstract: This report shows that the DNA-binding drug, mithramycin, can be efficiently encapsulated in polymeric micelles (PM-MTH, based on Pluronic® block copolymers, by a new microfluidic approach. The effect of different production parameters has been investigated for their effect on PM-MTH characteristics. The compared analysis of PM-MTH produced by microfluidic and conventional bulk mixing procedures revealed that microfluidics provides a useful platform for the production of PM-MTH with improved controllability, reproducibility, smaller size, and polydispersity. Finally, an investigation of the effects of PM-MTH, produced by microfluidic and conventional bulk mixing procedures, on the erythroid differentiation of both human erythroleukemia and human erythroid precursor cells is reported. It is demonstrated that PM-MTH exhibited a slightly lower toxicity and more pronounced differentiative activity when compared to the free drug. In addition, PM-MTH were able to upregulate preferentially γ-globin messenger ribonucleic acid production and to increase fetal hemoglobin (HbF accumulation, the percentage of HbF-containing cells, and their HbF content without stimulating α-globin gene expression, which is responsible for the clinical symptoms of ß-thalassemia. These results represent an important first step toward a potential clinical application, since an increase in HbF could alleviate the symptoms underlying ß-thalassemia and sickle cell anemia. In conclusion, this report suggests that PM-MTH produced by microfluidic approach warrants further evaluation as a potential therapeutic protocol

  13. Compositional verification of real-time systems using Ecdar

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel

    2012-01-01

    We present a specification theory for timed systems implemented in the Ecdar tool. We illustrate the operations of the specification theory on a running example, showing the models and verification checks. To demonstrate the power of the compositional verification, we perform an in depth case study...... of a leader election protocol; Modeling it in Ecdar as Timed input/output automata Specifications and performing both monolithic and compositional verification of two interesting properties on it. We compare the execution time of the compositional to the classical verification showing a huge difference...

  14. Smart Home Communication Technologies and Applications: Wireless Protocol Assessment for Home Area Network Resources

    Directory of Open Access Journals (Sweden)

    Tiago D. P. Mendes

    2015-07-01

    Full Text Available The paper discusses Home Area Networks (HAN communication technologies for smart home and domestic application integration. The work is initiated by identifying the application areas that can benefit from this integration. A broad and inclusive home communication interface is analysed utilizing as a key piece a Gateway based on machine-to-machine (M2M communications that interacts with the surrounding environment. Then, the main wireless networks are thoroughly assessed, and later, their suitability to the requirements of HAN considering the application area is analysed. Finally, a qualitative analysis is portrayed.

  15. Mental distress and personality in women undergoing GnRH agonist versus GnRH antagonist protocols for assisted reproductive technology

    DEFF Research Database (Denmark)

    Stenbæk, D. S.; Toftager, M.; Hjordt, L. V.

    2015-01-01

    STUDY QUESTION: Do mental distress and mood fluctuations in women undergoing GnRH agonist and GnRH antagonist protocols for assisted reproductive technology (ART) differ depending on protocol and the personality trait, neuroticism? SUMMARY ANSWER: ART treatment did not induce elevated levels...... of mental distress in either GnRH antagonist or agonist protocols but neuroticism was positively associated with increased mental distress, independent of protocols. WHAT IS KNOWN ALREADY: ART treatment may increase mental distress by mechanisms linked to sex hormone fluctuations. General psychological...... characteristics, such as personality traits indexing negative emotionality, e.g. neuroticism, are likely to affect mental distress during ART treatment. STUDY DESIGN, SIZE, DURATION: A total of 83 women undergoing their first ART cycle were consecutively randomized 1:1 to GnRH antagonist (n = 42) or GnRH agonist...

  16. Report on achievements in fiscal 1999 of energy and environment technology verification project formation assisting project and international joint verification and research project. Verification of discrete power generation system utilizing mini-power generation that utilizes micro gas turbine; 1999 nendo micro gas turbine riyo mini hatsuden wo riyoshita bunsangata hatsuden system no kensho seika hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    This paper describes the verification test on power generation by using natural gas driven micro gas turbines (rated at 28 kW) in Thailand. The turbine presented excellent result of providing a maximum power generation output of 25 kW, having no efficiency deterioration even at the 50% output point (about 22%). Its exhaust gas emitted under the normal operation is clean. The waste heat is as low as 290 degrees C, which can be used for hot water supply, but may be difficult for steam generation. Under the severe condition for building large power plants in remote areas due to environmental issues and power transmission loss, proliferation of the discrete power generation system in the suburbs of the city of Bangkok draws expectation. This system can be more advantageous than the existing facilities if the end user gas price is 6.7 Bht/m{sup 3} or less. Discussions were given on a hybrid electric vehicle (HEV) bus driven by electric power generated from the gas turbine mounted on the bus. The bus is overwhelmingly superior in the environmental aspect to diesel fueled buses. The HEV bus emits no black smoke at all, and NOx emission is as low as about 1/70. Fuel consumption is less than half (when regenerative braking is used). However, the vehicle body cost is higher by 40%. Smooth operation of the buses requires indispensably deployment of compressed natural gas service stations (to be located at 40-km interval ideally). Assistance is required also on the fund for gas line installations, and civil engineering construction technologies. (NEDO)

  17. Independent verification survey report for exposure units Z2-24, Z2-31, Z2-32, AND Z2-36 in zone 2 of the East Tennessee technology park Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    King, David A. [Oak Ridge Inst. for Science and Education (ORISE), Oak Ridge, TN (United States)

    2013-10-01

    The U.S. Department of Energy (DOE) Oak Ridge Office of Environmental Management selected Oak Ridge Associated Universities (ORAU), through the Oak Ridge Institute for Science and Education (ORISE) contract, to perform independent verification (IV) at Zone 2 of the East Tennessee Technology Park (ETTP) in Oak Ridge, Tennessee. ORAU has concluded IV surveys, per the project-specific plan (PSP) (ORAU 2013a) covering exposure units (EUs) Z2-24, -31, -32, and -36. The objective of this effort was to verify the target EUs comply with requirements in the Zone 2 Record of Decision (ROD) (DOE 2005), as implemented by using the dynamic verification strategy presented in the dynamic work plan (DWP) (BJC 2007); and confirm commitments in the DWP were adequately implemented, as verified via IV surveys and soil sampling.

  18. Quantifying the Impacts of Timebased Rates, Enabling Technology, and Other Treatments in Consumer Behavior Studies: Protocols and Guidelines

    Energy Technology Data Exchange (ETDEWEB)

    Cappers, Peter [Ernest Orlando Lawrence Berkeley National Laboratory (LBNL), Berkeley, CA (United States); Todd, Annika [Ernest Orlando Lawrence Berkeley National Laboratory (LBNL), Berkeley, CA (United States); Perry, Michael [Ernest Orlando Lawrence Berkeley National Laboratory (LBNL), Berkeley, CA (United States); Neenan, Bernie [Ernest Orlando Lawrence Berkeley National Laboratory (LBNL), Berkeley, CA (United States); Boisvert, Richard [Ernest Orlando Lawrence Berkeley National Laboratory (LBNL), Berkeley, CA (United States)

    2013-06-27

    This report offers guidelines and protocols for measuring the effects of time-based rates, enabling technology, and various other treatments on customers’ levels and patterns of electricity usage. Although the focus is on evaluating consumer behavior studies (CBS) that involve field trials and pilots, the methods can be extended to assessing the large-scale programs that may follow. CBSs are undertaken to resolve uncertainties and ambiguities about how consumers respond to inducements to modify their electricity demand. Those inducements include price structures; feedback and information; and enabling technologies embedded in programs such as: critical peak, time-of use, real-time pricing; peak time rebate or critical peak rebate; home energy reports and in-home displays; and all manner of device controls for appliances and plug loads. Although the focus of this report is on consumer studies—where the subjects are households—the behavioral sciences principles discussed and many of the methods recommended apply equally to studying commercial and industrial customer electricity demand.

  19. Software verification for nuclear industry

    International Nuclear Information System (INIS)

    Wilburn, N.P.

    1985-08-01

    Why verification of software products throughout the software life cycle is necessary is considered. Concepts of verification, software verification planning, and some verification methodologies for products generated throughout the software life cycle are then discussed

  20. Verification and disarmament

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H. [IAEA, Vienna (Austria)

    1998-07-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed.

  1. Verification and disarmament

    International Nuclear Information System (INIS)

    Blix, H.

    1998-01-01

    The main features are described of the IAEA safeguards verification system that non-nuclear weapon states parties of the NPT are obliged to accept. Verification activities/problems in Iraq and North Korea are discussed

  2. Cholera diagnosis in human stool and detection in water: protocol for a systematic review of available technologies.

    Science.gov (United States)

    Diaconu, Karin; Falconer, Jennifer; O'May, Fiona; Jimenez, Miguel; Matragrano, Joe; Njanpop-Lafourcade, Betty; Ager, Alastair

    2018-02-20

    Cholera is a highly infectious diarrheal disease spread via fecal contamination of water and food sources; it is endemic in parts of Africa and Asia and recent outbreaks have been reported in Haiti, the Zambia and Democratic Republic of the Congo. If left untreated, the disease can be fatal in less than 24 h and result in case fatality ratios of 30-50%. Cholera disproportionately affects those living in areas with poor access to water and sanitation: the long-term public health response is focused on improving water and hygiene facilities and access. Short-term measures for infection prevention and control, and disease characterization and surveillance, are impaired by diagnostic delays: culture methods are slow and rely on the availability of infrastructure and specialist equipment. Rapid diagnostic tests have shown promise under field conditions and further innovations in this area have been proposed. This paper is the protocol for a systematic review focused on identifying current technologies and methods used for cholera diagnosis in stool, and detection in water. We will synthesize and appraise information on product technical specifications, accuracy and design features in order to inform infection prevention and control and innovation development. Embase, MEDLINE, CINAHL, Proquest, IndMed and the WHO and Campbell libraries will be searched. We will include studies reporting on field evaluations, including within-study comparisons against a reference standard, and laboratory evaluations reporting on product validation against field stool or water samples. We will extract data according to protocol and attempt meta-analyses if appropriate given data availability and quality. The systematic review builds on a previous scoping review in this field and expands upon this by synthesising data on both product technical characteristics and design features. The review will be of particular value to stakeholders engaged in diagnostic procurement and manufacturers

  3. Cholera diagnosis in human stool and detection in water: protocol for a systematic review of available technologies

    Directory of Open Access Journals (Sweden)

    Karin Diaconu

    2018-02-01

    Full Text Available Abstract Background Cholera is a highly infectious diarrheal disease spread via fecal contamination of water and food sources; it is endemic in parts of Africa and Asia and recent outbreaks have been reported in Haiti, the Zambia and Democratic Republic of the Congo. If left untreated, the disease can be fatal in less than 24 h and result in case fatality ratios of 30–50%. Cholera disproportionately affects those living in areas with poor access to water and sanitation: the long-term public health response is focused on improving water and hygiene facilities and access. Short-term measures for infection prevention and control, and disease characterization and surveillance, are impaired by diagnostic delays: culture methods are slow and rely on the availability of infrastructure and specialist equipment. Rapid diagnostic tests have shown promise under field conditions and further innovations in this area have been proposed. Methods This paper is the protocol for a systematic review focused on identifying current technologies and methods used for cholera diagnosis in stool, and detection in water. We will synthesize and appraise information on product technical specifications, accuracy and design features in order to inform infection prevention and control and innovation development. Embase, MEDLINE, CINAHL, Proquest, IndMed and the WHO and Campbell libraries will be searched. We will include studies reporting on field evaluations, including within-study comparisons against a reference standard, and laboratory evaluations reporting on product validation against field stool or water samples. We will extract data according to protocol and attempt meta-analyses if appropriate given data availability and quality. Discussion The systematic review builds on a previous scoping review in this field and expands upon this by synthesising data on both product technical characteristics and design features. The review will be of particular value to

  4. A Qualitative Study of the Treatment Improvement Protocols (TIPs): An Assessment of the Use of TIPs by Individuals Affiliated with the Addiction Technology Transfer Centers (ATTCs).

    Science.gov (United States)

    Hayashi, Susan W.; Suzuki, Marcia; Hubbard, Susan M.; Huang, Judy Y.; Cobb, Anita M.

    2003-01-01

    Evaluated the Addiction Technology Transfer Centers (ATTCs) of the Center for Substance Abuse Treatment (CSAT) as a means of diffusion of innovations, focusing on use of the Treatment Improvement Protocols (TIPs). Qualitative studies at 6 ATTCs that included 57 interviews show that the CSAT is at the forefront of providing resources to the…

  5. Participation of nurses in the execution of clinical research protocol about technological innovation

    Directory of Open Access Journals (Sweden)

    Luciane Patrícia Andreani Cabral

    2015-10-01

    Full Text Available AbstractOBJECTIVETo report the nurse's experience of inclusion in interdisciplinary clinical study about technological innovation, involving people with spinal cord injury.METHODDescriptive experience report. The empirical support was based on notes about perspectives and practice of clinical research, with a multi-professional nursing, physical education, physiotherapy and engineering staff.RESULTThe qualification includes the elaboration of the document for the Ethics Committee, familiarization among the members of staff and with the studied topic, and also an immersion into English. The nurse's knowledge gave support to the uptake of participants and time adequacy for data collection, preparation and assistance of the participants during the intervention and after collection. Nursing theories and processes have contributed to reveal risky diagnoses and the plan of care. It was the nurse's role to monitor the risk of overlapping methodological strictness to the human aspect. The skills for the clinical research must be the object of learning, including students in multidisciplinary researches.CONCLUSIONTo qualify the nurse for clinical research and to potentialize its caregiver essence, some changes are needed in the educational system, professional behavior, attitude and educational assistance.

  6. DIESEL ENGINE RETROFIT TECHNOLOGY VERIFICATION

    Science.gov (United States)

    This presentation wil be given at the EPA Science Forum 2005 in Washington, DC. According to recent estimates, there are approximately 7.9 million heavy-duty diesel trucks and buses in use in the United States. Emissions from these vehicles account for substantial portions of t...

  7. A framework for nuclear agreement and verification

    International Nuclear Information System (INIS)

    Ali, A.

    1991-01-01

    This chapter assesses the prospects for a nuclear agreement between India and Pakistan. The chapter opens with a review of past and present political environments of the two countries. The discussion proceeds to describe the linkage of global arms control agreements, prospects for verification of a Comprehensive Test Ban Treaty, the role of nuclear power in any agreements, the intrusiveness of verification, and possible post-proliferation agreements. Various monitoring and verification technologies are described (mainly satellite oriented). The chapter concludes with an analysis of the likelihood of persuading India and Pakistan to agree to a nonproliferation arrangement

  8. Impacts of information and communication technologies on nursing care: an overview of systematic reviews (protocol).

    Science.gov (United States)

    Rouleau, Geneviève; Gagnon, Marie-Pierre; Côté, José

    2015-05-23

    Information and communication technologies (ICTs) used in the health sector have well-known advantages. They can promote patient-centered healthcare, improve quality of care, and educate health professionals and patients. However, implementation of ICTs remains difficult and involves changes at different levels: patients, healthcare providers, and healthcare organizations. Nurses constitute the largest health provider group of the healthcare workforce. The use of ICTs by nurses can have impacts in their practice. The main objective of this review of systematic reviews is to systematically summarize the best evidence regarding the effects of ICTs on nursing care. We will include all types of reviews that aim to evaluate the influence of ICTs used by nurses on nursing care. We will consider four types of ICTs used by nurses as a way to provide healthcare: management systems, communication systems, information systems, and computerized decision support systems. We will exclude nursing management systems, educational systems, and telephone systems. The following types of comparisons will be carried out: ICT in comparison with usual care/practice, ICT compared to any other ICT, and ICT versus other types of interventions. The primary outcomes will include nurses' practice environment, nursing processes/scope of nursing practice, nurses' professional satisfaction as well as nursing sensitive outcomes, such as patient safety, comfort, and quality of life related to care, empowerment, functional status, satisfaction, and patient experience. Secondary outcomes will include satisfaction with ICT from the nurses and patients' perspective. Reviews published in English, French, or Spanish from 1 January 1995 will be considered. Two reviewers will independently screen the title and abstract of the papers in order to assess their eligibility and extract the following information: characteristics of the population and setting, type of interventions (e.g., type of ICTs and service

  9. Protocol between the National Laboratory of Industrial Engineering and Technology of Portugal and the Junta de Energia Nuclear of Spain on supply and transfer of technology on uranium extraction from phosphoric acid

    International Nuclear Information System (INIS)

    1982-01-01

    This Protocol was signed between the JEN and the LNETI, in the framework of the Agreement of 14th January 1971 between Spain and Portugal for co-operation in the peaceful uses of nuclear energy. It is provided that the JEN and the LNETI will promote the application of their respective technologies in the field in Portugal as well as that of technology jointly developed on such extraction. The Protocol, which became operational on its date of signature will remain in force for five years. (NEA) [fr

  10. The mPED randomized controlled clinical trial: applying mobile persuasive technologies to increase physical activity in sedentary women protocol

    Directory of Open Access Journals (Sweden)

    Fukuoka Yoshimi

    2011-12-01

    Full Text Available Abstract Background Despite the significant health benefits of regular physical activity, approximately half of American adults, particularly women and minorities, do not meet the current physical activity recommendations. Mobile phone technologies are readily available, easily accessible and may provide a potentially powerful tool for delivering physical activity interventions. However, we need to understand how to effectively apply these mobile technologies to increase and maintain physical activity in physically inactive women. The purpose of this paper is to describe the study design and protocol of the mPED (mobile phone based physical activity education randomized controlled clinical trial that examines the efficacy of a 3-month mobile phone and pedometer based physical activity intervention and compares two different 6-month maintenance interventions. Methods A randomized controlled trial (RCT with three arms; 1 PLUS (3-month mobile phone and pedometer based physical activity intervention and 6-month mobile phone diary maintenance intervention, 2 REGULAR (3-month mobile phone and pedometer based physical activity intervention and 6-month pedometer maintenance intervention, and 3 CONTROL (pedometer only, but no intervention will be conducted. A total of 192 physically inactive women who meet all inclusion criteria and successfully complete a 3-week run-in will be randomized into one of the three groups. The mobile phone serves as a means of delivering the physical activity intervention, setting individualized weekly physical activity goals, and providing self-monitoring (activity diary, immediate feedback and social support. The mobile phone also functions as a tool for communication and real-time data capture. The primary outcome is objectively measured physical activity. Discussion If efficacy of the intervention with a mobile phone is demonstrated, the results of this RCT will be able to provide new insights for current behavioral

  11. The mPED randomized controlled clinical trial: applying mobile persuasive technologies to increase physical activity in sedentary women protocol.

    Science.gov (United States)

    Fukuoka, Yoshimi; Komatsu, Judith; Suarez, Larry; Vittinghoff, Eric; Haskell, William; Noorishad, Tina; Pham, Kristin

    2011-12-14

    Despite the significant health benefits of regular physical activity, approximately half of American adults, particularly women and minorities, do not meet the current physical activity recommendations. Mobile phone technologies are readily available, easily accessible and may provide a potentially powerful tool for delivering physical activity interventions. However, we need to understand how to effectively apply these mobile technologies to increase and maintain physical activity in physically inactive women. The purpose of this paper is to describe the study design and protocol of the mPED (mobile phone based physical activity education) randomized controlled clinical trial that examines the efficacy of a 3-month mobile phone and pedometer based physical activity intervention and compares two different 6-month maintenance interventions. A randomized controlled trial (RCT) with three arms; 1) PLUS (3-month mobile phone and pedometer based physical activity intervention and 6-month mobile phone diary maintenance intervention), 2) REGULAR (3-month mobile phone and pedometer based physical activity intervention and 6-month pedometer maintenance intervention), and 3) CONTROL (pedometer only, but no intervention will be conducted). A total of 192 physically inactive women who meet all inclusion criteria and successfully complete a 3-week run-in will be randomized into one of the three groups. The mobile phone serves as a means of delivering the physical activity intervention, setting individualized weekly physical activity goals, and providing self-monitoring (activity diary), immediate feedback and social support. The mobile phone also functions as a tool for communication and real-time data capture. The primary outcome is objectively measured physical activity. If efficacy of the intervention with a mobile phone is demonstrated, the results of this RCT will be able to provide new insights for current behavioral sciences and mHealth. ClinicalTrials.gov#:NCTO1280812.

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, REMOVAL OF ARSENIC IN DRINKING WATER: WATTS PREMIER M-SERIES M-15,000 REVERSE OSMOSIS TREATMENT SYSTEM

    Science.gov (United States)

    Verification testing of the Watts Premier M-Series M-15,000 RO Treatment System was conducted over a 31-day period from April 26, 2004, through May 26, 2004. This test was conducted at the Coachella Valley Water District (CVWD) Well 7802 in Thermal, California. The source water...

  13. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, REMOVAL OF ARSENIC IN DRINKING WATER: PHASE 1-ADI PILOT TEST UNIT NO. 2002-09 WITH MEDIA G2®

    Science.gov (United States)

    Integrity verification testing of the ADI International Inc. Pilot Test Unit No. 2002-09 with MEDIA G2® arsenic adsorption media filter system was conducted at the Hilltown Township Water and Sewer Authority (HTWSA) Well Station No. 1 in Sellersville, Pennsylvania from October 8...

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, REMOVAL OF ARSENIC IN DRINKING WATER: ADI INTERNATIONAL INC. ADI PILOT TEST UNIT NO. 2002-09 WITH MEDIA G2®; PHASE II

    Science.gov (United States)

    Verification testing of the ADI International Inc. Unit No. 2002-09 with MEDIA G2® arsenic adsorption media filter system was conducted at the Hilltown Township Water and Sewer Authority (HTWSA) Well Station No. 1 in Sellersville, Pennsylvania from October 8, 2003 through May 28,...

  15. Environmental Technology Verification Report for Abraxis 17β-Estradiol (E2) Magnetic Particle Enzyme-Linked Immunosorbent Assay (ELISA) Test Kits

    Science.gov (United States)

    The EPA's National Risk Management Research Laboratory (NRMRL) and its verification organization partner, Battelle, operate the Advanced Monitoring Systems (AMS) Center under ETV. The AMS Center recently evaluated the performance of the Abraxis 17(beta)-estradiol (E2) magnetic p...

  16. Effect of affordable technology on physical activity levels and mobility outcomes in rehabilitation: a protocol for the Activity and MObility UsiNg Technology (AMOUNT) rehabilitation trial.

    Science.gov (United States)

    Hassett, Leanne; van den Berg, Maayken; Lindley, Richard I; Crotty, Maria; McCluskey, Annie; van der Ploeg, Hidde P; Smith, Stuart T; Schurr, Karl; Killington, Maggie; Bongers, Bert; Howard, Kirsten; Heritier, Stephane; Togher, Leanne; Hackett, Maree; Treacy, Daniel; Dorsch, Simone; Wong, Siobhan; Scrivener, Katharine; Chagpar, Sakina; Weber, Heather; Pearson, Ross; Sherrington, Catherine

    2016-06-06

    People with mobility limitations can benefit from rehabilitation programmes that provide a high dose of exercise. However, since providing a high dose of exercise is logistically challenging and resource-intensive, people in rehabilitation spend most of the day inactive. This trial aims to evaluate the effect of the addition of affordable technology to usual care on physical activity and mobility in people with mobility limitations admitted to inpatient aged and neurological rehabilitation units compared to usual care alone. A pragmatic, assessor blinded, parallel-group randomised trial recruiting 300 consenting rehabilitation patients with reduced mobility will be conducted. Participants will be individually randomised to intervention or control groups. The intervention group will receive technology-based exercise to target mobility and physical activity problems for 6 months. The technology will include the use of video and computer games/exercises and tablet applications as well as activity monitors. The control group will not receive any additional intervention and both groups will receive usual inpatient and outpatient rehabilitation care over the 6-month study period. The coprimary outcomes will be objectively assessed physical activity (proportion of the day spent upright) and mobility (Short Physical Performance Battery) at 6 months after randomisation. Secondary outcomes will include: self-reported and objectively assessed physical activity, mobility, cognition, activity performance and participation, utility-based quality of life, balance confidence, technology self-efficacy, falls and service utilisation. Linear models will assess the effect of group allocation for each continuously scored outcome measure with baseline scores entered as a covariate. Fall rates between groups will be compared using negative binomial regression. Primary analyses will be preplanned, conducted while masked to group allocation and use an intention-to-treat approach. The

  17. mHealth Technology and Nurse Health Coaching to Improve Health in Diabetes: Protocol for a Randomized Controlled Trial.

    Science.gov (United States)

    Miyamoto, Sheridan; Dharmar, Madan; Fazio, Sarina; Tang-Feldman, Yajarayma; Young, Heather M

    2018-02-15

    Chronic diseases, including diabetes mellitus, are the leading cause of mortality and disability in the United States. Current solutions focus primarily on diagnosis and pharmacological treatment, yet there is increasing evidence that patient-centered models of care are more successful in improving and addressing chronic disease outcomes. The objective of this clinical trial is to evaluate the impact of a mobile health (mHealth) enabled nurse health coaching intervention on self-efficacy among adults with type-2 diabetes mellitus. A randomized controlled trial was conducted at an academic health system in Northern California. A total of 300 participants with type-2 diabetes were scheduled to be enrolled through three primary care clinics. Participants were randomized to either usual care or intervention. All participants received training on use of the health system patient portal. Participants in the intervention arm received six scheduled health-coaching telephone calls with a registered nurse and were provided with an activity tracker and mobile application that integrated data into the electronic health record (EHR) to track their daily activity and health behavior decisions. All participants completed a baseline survey and follow-up surveys at 3 and 9 months. Primary and secondary outcomes include diabetes self-efficacy, hemoglobin A 1c (HbA 1c ), and quality of life measures. Data collection for this trial, funded by the Patient-Centered Outcomes Research Institute, will be completed by December 2017. Results from the trial will be available mid-2018. This protocol details a patient-centered intervention using nurse health coaching, mHealth technologies, and integration of patient-generated data into the EHR. The aim of the intervention is to enhance self-efficacy and health outcomes by providing participants with a mechanism to track daily activity by offering coaching support to set reasonable and attainable health goals, and by creating a complete feedback

  18. Test/QA Plan for Verification of Cavity Ringdown Spectroscopy Systems for Ammonia Monitoring in Stack Gas

    Science.gov (United States)

    The purpose of the cavity ringdown spectroscopy (CRDS) technology test and quality assurance plan is to specify procedures for a verification test applicable to commercial cavity ringdown spectroscopy technologies. The purpose of the verification test is to evaluate the performa...

  19. Biometrics based authentication scheme for session initiation protocol

    OpenAIRE

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when co...

  20. Physics Verification Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doebling, Scott William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-12

    The purpose of the verification project is to establish, through rigorous convergence analysis, that each ASC computational physics code correctly implements a set of physics models and algorithms (code verification); Evaluate and analyze the uncertainties of code outputs associated with the choice of temporal and spatial discretization (solution or calculation verification); and Develop and maintain the capability to expand and update these analyses on demand. This presentation describes project milestones.

  1. Mobile Health Technology (mDiab) for the Prevention of Type 2 Diabetes: Protocol for a Randomized Controlled Trial.

    Science.gov (United States)

    Muralidharan, Shruti; Mohan, Viswanathan; Anjana, Ranjit Mohan; Jena, Sidhant; Tandon, Nikhil; Allender, Steven; Ranjani, Harish

    2017-12-12

    The prevalence of type 2 diabetes is increasing in epidemic proportions in low- and middle-income countries. There is an urgent need for novel methods to tackle the increasing incidence of diabetes. The ubiquity of mobile phone use and access to Internet makes mobile health (mHealth) technology a viable tool to prevent and manage diabetes. The objective of this randomized controlled trial is to implement and evaluate the feasibility, cost-effectiveness, and sustainability of a reality television-based lifestyle intervention program. This intervention program is delivered via a mobile phone app (mDiab) to approximately 1500 Android smartphone users who are adults at a high risk for type 2 diabetes from three cities in India, namely, Chennai, Bengaluru, and New Delhi. The mDiab intervention would be delivered via a mobile phone app along with weekly coach calls for 12 weeks. Each participant will go through a maintenance phase of 6 to 8 months post intervention. Overall, there would be 3 testing time points in the study: baseline, post intervention, and the end of follow-up. The app will enable individuals to track their weight, physical activity, and diet alongside weekly video lessons on type 2 diabetes prevention. The study outcomes are weight loss (primary measure of effectiveness); improvement in cardiometabolic risk factors (ie, waist circumference, blood pressure, glucose, insulin, and lipids); and improvement in physical activity, quality of life, and dietary habits. Sustainability will be assessed through focus group discussions. If successful, mDiab can be used as a model for translational and implementation research in the use of mHealth technology for diabetes prevention and may be further expanded for the prevention of other noncommunicable diseases such as hypertension and cardiovascular diseases. Clinical Trials Registry of India CTRI/2015/07/006011 http://ctri.nic.in/Clinicaltrials/pdf_generate.php? trialid=11841 (Archived by WebCite at http

  2. Fiscal 1997 report of the development of high efficiency waste power generation technology. No.2 volume. Pilot plant verification test; Kokoritsu haikibutsu hatsuden gijutsu kaihatsu (pilot plant jissho shiken). 1997 nendo hokokusho (daini bunsatsu)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    As to a high efficiency waste power generation system using general waste as fuel, the details of the following were described: design/construction management and operational study of pilot plant, design/manufacture/construction of pilot plant, and study of an optimal total system. Concerning the construction management and operational study, the paper described the application for governmental/official inspection procedures and taking inspection, process management of pilot plant, site patrol, safety management, management of trial run of pilot plant, drawing-up of a verification test plan and test run, etc. Relating to the design/manufacture/construction of pilot plant, an outline of the pilot plant was described. The paper also stated points to be considered in design of furnace structure and boiler structure, points to be considered of the verification test, etc. As to the study of an optimal total system, the following were described: survey of waste gasification/slagging power generation technology, basic study on RDF production process, survey of trends of waste power generation technology in the U.S., etc. 52 refs., 149 figs., 121 tabs.

  3. Inspector measurement verification activities

    International Nuclear Information System (INIS)

    George, R.S.; Crouch, R.

    e most difficult and complex activity facing a safeguards inspector involves the verification of measurements and the performance of the measurement system. Remeasurement is the key to measurement verification activities. Remeasurerements using the facility's measurement system provide the bulk of the data needed for determining the performance of the measurement system. Remeasurements by reference laboratories are also important for evaluation of the measurement system and determination of systematic errors. The use of these measurement verification activities in conjunction with accepted inventory verification practices provides a better basis for accepting or rejecting an inventory. (U.S.)

  4. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  5. Verification and Demonstration for Transition of Nonhexavalent Chromium, Low-Volatile Organic Compound (VOC) Alternative Technologies to Replace DOD-P-15328 Wash Primer for Multimetal Applications

    Science.gov (United States)

    2017-09-28

    Technical Report 3. DATES COVERED (From - To) October 2012–September 2017 4. TITLE AND SUBTITLE Verification and Demonstration for Transition of...surfaces to protect against corrosion and improve the adhesion of the subsequent primer to the base metal. The wash primer contains hexavalent chromium (Cr...Adhesion 6 2.3 Dry Tape Adhesion 7 2.4 Pencil Hardness 8 2.5 Chip Resistance Test 8 2.6 Accelerated Corrosion Testing 10 2.7 Outdoor Exposure Testing at

  6. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    Science.gov (United States)

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  7. Nuclear Data Verification and Standardization

    Energy Technology Data Exchange (ETDEWEB)

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  8. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  9. Using concurrent think-aloud and protocol analysis to explore student nurses' social learning information communication technology knowledge and skill development.

    Science.gov (United States)

    Todhunter, Fern

    2015-06-01

    Observations obtained through concurrent think-aloud and protocol analysis offer new understanding about the influence of social learning on student nurses' acquisition of Information and Communication Technology (ICT) knowledge and skills. The software used provides a permanent record of the underpinning study method, events and analyses. The emerging themes reflect the dimensions of social engagement, and the characteristics of positive and negative reactions to ICT. The evidence shows that given the right conditions, stronger learners will support and guide their peers. To explore the use of concurrent think-aloud and protocol analysis as a method to examine how student nurses approach ICT. To identify the benefits and challenges of using observational technology to capture learning behaviours. To show the influence of small group arrangement and student interactions on their ICT knowledge and skills development. Previous studies examining social interaction between students show how they work together and respond to interactive problem solving. Social interaction has been shown to enhance skills in both ICT and collaborative decision making. Structured observational analysis using concurrent think-aloud and protocol analysis. Students displayed varying degrees of pastoral support and emotional need, leadership, reflection, suggestion and experimentation skills. Encouraging student nurses to work in small mixed ability groups can be conducive for social and ICT skill and knowledge development. Observational software gives a permanent record of the proceedings. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. Experimental inventory verification system

    International Nuclear Information System (INIS)

    Steverson, C.A.; Angerman, M.I.

    1991-01-01

    As Low As Reasonably Achievable (ALARA) goals and Department of Energy (DOE) inventory requirements are frequently in conflict at facilities across the DOE complex. The authors wish, on one hand, to verify the presence of correct amounts of nuclear materials that are in storage or in process; yet on the other hand, we wish to achieve ALARA goals by keeping individual and collective exposures as low as social, technical, economic, practical, and public policy considerations permit. The Experimental Inventory Verification System (EIVSystem) is a computer-based, camera-driven system that utilizes image processing technology to detect change in vault areas. Currently in the test and evaluation phase at Idaho National Engineering Laboratory, this system guards personnel. The EIVSystem continually monitors the vault, providing proof of changed status for objects sorted within the vault. This paper reports that these data could provide the basis for reducing inventory requirements when no change has occurred, thus helping implement ALARA policy; the data will also help describe there target area of an inventory when change has been shown to occur

  11. FMCT verification: Case studies

    International Nuclear Information System (INIS)

    Hui Zhang

    2001-01-01

    Full text: How to manage the trade-off between the need for transparency and the concern about the disclosure of sensitive information would be a key issue during the negotiations of FMCT verification provision. This paper will explore the general concerns on FMCT verification; and demonstrate what verification measures might be applied to those reprocessing and enrichment plants. A primary goal of an FMCT will be to have the five declared nuclear weapon states and the three that operate unsafeguarded nuclear facilities become parties. One focus in negotiating the FMCT will be verification. Appropriate verification measures should be applied in each case. Most importantly, FMCT verification would focus, in the first instance, on these states' fissile material production facilities. After the FMCT enters into force, all these facilities should be declared. Some would continue operating to produce civil nuclear power or to produce fissile material for non- explosive military uses. The verification measures necessary for these operating facilities would be essentially IAEA safeguards, as currently being applied to non-nuclear weapon states under the NPT. However, some production facilities would be declared and shut down. Thus, one important task of the FMCT verifications will be to confirm the status of these closed facilities. As case studies, this paper will focus on the verification of those shutdown facilities. The FMCT verification system for former military facilities would have to differ in some ways from traditional IAEA safeguards. For example, there could be concerns about the potential loss of sensitive information at these facilities or at collocated facilities. Eventually, some safeguards measures such as environmental sampling might be seen as too intrusive. Thus, effective but less intrusive verification measures may be needed. Some sensitive nuclear facilities would be subject for the first time to international inspections, which could raise concerns

  12. Monitoring and verification R and D

    International Nuclear Information System (INIS)

    Pilat, Joseph F.; Budlong-Sylvester, Kory W.; Fearey, Bryan L.

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R and D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R and D required to address these gaps and other monitoring and verification challenges.

  13. Advanced verification topics

    CERN Document Server

    Bhattacharya, Bishnupriya; Hall, Gary; Heaton, Nick; Kashai, Yaron; Khan Neyaz; Kirshenbaum, Zeev; Shneydor, Efrat

    2011-01-01

    The Accellera Universal Verification Methodology (UVM) standard is architected to scale, but verification is growing and in more than just the digital design dimension. It is growing in the SoC dimension to include low-power and mixed-signal and the system integration dimension to include multi-language support and acceleration. These items and others all contribute to the quality of the SOC so the Metric-Driven Verification (MDV) methodology is needed to unify it all into a coherent verification plan. This book is for verification engineers and managers familiar with the UVM and the benefits it brings to digital verification but who also need to tackle specialized tasks. It is also written for the SoC project manager that is tasked with building an efficient worldwide team. While the task continues to become more complex, Advanced Verification Topics describes methodologies outside of the Accellera UVM standard, but that build on it, to provide a way for SoC teams to stay productive and profitable.

  14. Verification of an algorithm of cono collapsed through the IAEA TECDOC 1583 protocol and dosimetry with radiochromic films; Verificacion de un algoritmo de cono colapso mediante en protocolo IAEA TECDOC 1583 y dosimetria con peliculas radiocromicas

    Energy Technology Data Exchange (ETDEWEB)

    Martin-Viera Cueto, J. A.; Benitez Villegas, E. M.; Bodineau Gil, C.; Parra Osorio, V.; Garcia Pareja, S.; Casado Villalon, F. J.

    2013-07-01

    The objective of this study is to verify the characterization of the collapsed cone algorithm of an SP using this Protocol. In addition, given that it only offers details of dose values measured at discrete points, measures are complemented by a gamma test distributions 2D of doses in different cases using film radiochromic. (Author)

  15. Voice over Internet Protocol (VoIP) Technology as a Global Learning Tool: Information Systems Success and Control Belief Perspectives

    Science.gov (United States)

    Chen, Charlie C.; Vannoy, Sandra

    2013-01-01

    Voice over Internet Protocol- (VoIP) enabled online learning service providers struggling with high attrition rates and low customer loyalty issues despite VoIP's high degree of system fit for online global learning applications. Effective solutions to this prevalent problem rely on the understanding of system quality, information quality, and…

  16. Results of verifications of the control automatic exposure in equipment of RX with CR systems

    International Nuclear Information System (INIS)

    Ruiz Manzano, P.; Rivas Ballarin, M. A.; Ortega Pardina, P.; Villa Gazulla, D.; Calvo Carrillo, S.; Canellas Anoz, M.; Millan Cebrian, E.

    2013-01-01

    After the entry into force in 2012, the new Spanish Radiology quality control protocol lists and discusses the results obtained after verification of the automatic control of exposure in computed radiography systems. (Author)

  17. Development of nuclear thermal hydraulic verification test and evaluation technology - Development of fundamental technique for experiment of natural circulation phenomena in PWR systems

    Energy Technology Data Exchange (ETDEWEB)

    Park, Goon Cherl; Lee, Tae Ho; Kim, Moon Oh; Kim, Hak Joon [Seoul National University, Seoul (Korea)

    2000-04-01

    The dimensional analysis applied two-fluid model of CFX-4,2 were performed. For verification of analysis results, experimental measurement data of two-phase flow parameters in subcooled boiling flow were produced for vertical(0 deg) and inclination (60 deg). And through comparison analysis and experiments the application possibility of various two -phase flow models and the analysis ability of code were evaluated. Measurement technique of bubble velocity in two-phase flow using backscattering standard LDV was investigated from slug to bubbly flow regime. The range of velocity measured is from 0.2 to 1.5 m/s and that of bubble size is from 2 to 20 mm. For local temperature of boiling flow measurement, microthermocouple were manufactured and local liquid and vapor temperatures were measured in pool boiling and boiling flow. 66 refs., 74 figs., 4 tabs. (Author)

  18. Nuclear test ban verification

    International Nuclear Information System (INIS)

    Chun, Kin-Yip

    1991-07-01

    This report describes verification and its rationale, the basic tasks of seismic verification, the physical basis for earthquake/explosion source discrimination and explosion yield determination, the technical problems pertaining to seismic monitoring of underground nuclear tests, the basic problem-solving strategy deployed by the forensic seismology resarch team at the University of Toronto, and the scientific significance of the team's research. The research carried out at the Univeristy of Toronto has two components: teleseismic verification using P wave recordings from the Yellowknife Seismic Array (YKA), and regional (close-in) verification using high-frequency L g and P n recordings from the Eastern Canada Telemetered Network. Major differences have been found in P was attenuation among the propagation paths connecting the YKA listening post with seven active nuclear explosion testing areas in the world. Significant revisions have been made to previously published P wave attenuation results, leading to more interpretable nuclear explosion source functions. (11 refs., 12 figs.)

  19. Standard Verification System (SVS)

    Data.gov (United States)

    Social Security Administration — SVS is a mainframe program that accesses the NUMIDENT to perform SSN verifications. This program is called by SSA Internal applications to verify SSNs. There is also...

  20. Formal Verification -26 ...

    Indian Academy of Sciences (India)

    by testing of the components and successful testing leads to the software being ... Formal verification is based on formal methods which are mathematically based ..... scenario under which a similar error could occur. There are various other ...

  1. SSN Verification Service

    Data.gov (United States)

    Social Security Administration — The SSN Verification Service is used by Java applications to execute the GUVERF02 service using the WebSphere/CICS Interface. It accepts several input data fields...

  2. Verification of RADTRAN

    International Nuclear Information System (INIS)

    Kanipe, F.L.; Neuhauser, K.S.

    1995-01-01

    This document presents details of the verification process of the RADTRAN computer code which was established for the calculation of risk estimates for radioactive materials transportation by highway, rail, air, and waterborne modes

  3. Experimental verification of layout physical verification of silicon photonics

    Science.gov (United States)

    El Shamy, Raghi S.; Swillam, Mohamed A.

    2018-02-01

    Silicon photonics have been approved as one of the best platforms for dense integration of photonic integrated circuits (PICs) due to the high refractive index contrast among its materials. Silicon on insulator (SOI) is a widespread photonics technology, which support a variety of devices for lots of applications. As the photonics market is growing, the number of components in the PICs increases which increase the need for an automated physical verification (PV) process. This PV process will assure reliable fabrication of the PICs as it will check both the manufacturability and the reliability of the circuit. However, PV process is challenging in the case of PICs as it requires running an exhaustive electromagnetic (EM) simulations. Our group have recently proposed an empirical closed form models for the directional coupler and the waveguide bends based on the SOI technology. The models have shown a very good agreement with both finite element method (FEM) and finite difference time domain (FDTD) solvers. These models save the huge time of the 3D EM simulations and can be easily included in any electronic design automation (EDA) flow as the equations parameters can be easily extracted from the layout. In this paper we present experimental verification for our previously proposed models. SOI directional couplers with different dimensions have been fabricated using electron beam lithography and measured. The results from the measurements of the fabricate devices have been compared to the derived models and show a very good agreement. Also the matching can reach 100% by calibrating certain parameter in the model.

  4. Distributed Engine Control Empirical/Analytical Verification Tools, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — In this Phase I project, Impact Technologies, in collaboration with Prof. R.K. Yedavalli, propose a novel verification environment for eventual rapid certification...

  5. Formal Modeling and Verification for MVB

    Directory of Open Access Journals (Sweden)

    Mo Xia

    2013-01-01

    Full Text Available Multifunction Vehicle Bus (MVB is a critical component in the Train Communication Network (TCN, which is widely used in most of the modern train techniques of the transportation system. How to ensure security of MVB has become an important issue. Traditional testing could not ensure the system correctness. The MVB system modeling and verification are concerned in this paper. Petri Net and model checking methods are used to verify the MVB system. A Hierarchy Colored Petri Net (HCPN approach is presented to model and simulate the Master Transfer protocol of MVB. Synchronous and asynchronous methods are proposed to describe the entities and communication environment. Automata model of the Master Transfer protocol is designed. Based on our model checking platform M3C, the Master Transfer protocol of the MVB is verified and some system logic critical errors are found. Experimental results show the efficiency of our methods.

  6. Verification of Many-Qubit States

    Directory of Open Access Journals (Sweden)

    Yuki Takeuchi

    2018-06-01

    Full Text Available Verification is a task to check whether a given quantum state is close to an ideal state or not. In this paper, we show that a variety of many-qubit quantum states can be verified with only sequential single-qubit measurements of Pauli operators. First, we introduce a protocol for verifying ground states of Hamiltonians. We next explain how to verify quantum states generated by a certain class of quantum circuits. We finally propose an adaptive test of stabilizers that enables the verification of all polynomial-time-generated hypergraph states, which include output states of the Bremner-Montanaro-Shepherd-type instantaneous quantum polynomial time (IQP circuits. Importantly, we do not make any assumption that the identically and independently distributed copies of the same states are given: Our protocols work even if some highly complicated entanglement is created among copies in any artificial way. As applications, we consider the verification of the quantum computational supremacy demonstration with IQP models, and verifiable blind quantum computing.

  7. Multilateral disarmament verification

    International Nuclear Information System (INIS)

    Persbo, A.

    2013-01-01

    Non-governmental organisations, such as VERTIC (Verification Research, Training and Information Centre), can play an important role in the promotion of multilateral verification. Parties involved in negotiating nuclear arms accords are for the most part keen that such agreements include suitable and robust provisions for monitoring and verification. Generally progress in multilateral arms control verification is often painstakingly slow, but from time to time 'windows of opportunity' - that is, moments where ideas, technical feasibility and political interests are aligned at both domestic and international levels - may occur and we have to be ready, so the preparatory work is very important. In the context of nuclear disarmament, verification (whether bilateral or multilateral) entails an array of challenges, hurdles and potential pitfalls relating to national security, health, safety and even non-proliferation, so preparatory work is complex and time-greedy. A UK-Norway Initiative was established in order to investigate the role that a non-nuclear-weapon state such as Norway could potentially play in the field of nuclear arms control verification. (A.C.)

  8. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  9. The Importance of Trust in the Adoption and Use of Intelligent Assistive Technology by Older Adults to Support Aging in Place: Scoping Review Protocol.

    Science.gov (United States)

    McMurray, Josephine; Strudwick, Gillian; Forchuk, Cheryl; Morse, Adam; Lachance, Jessica; Baskaran, Arani; Allison, Lauren; Booth, Richard

    2017-11-02

    Intelligent assistive technologies that complement and extend human abilities have proliferated in recent years. Service robots, home automation equipment, and other digital assistant devices possessing artificial intelligence are forms of assistive technologies that have become popular in society. Older adults (>55 years of age) have been identified by industry, government, and researchers as a demographic who can benefit significantly from the use of intelligent assistive technology to support various activities of daily living. The purpose of this scoping review is to summarize the literature on the importance of the concept of "trust" in the adoption of intelligent assistive technologies to assist aging in place by older adults. Using a scoping review methodology, our search strategy will examine the following databases: ACM Digital Library, Allied and Complementary Medicine Database (AMED), Cumulative Index to Nursing and Allied Health Literature (CINAHL), Medline, PsycINFO, Scopus, and Web of Science. Two reviewers will independently screen the initial titles obtained from the search, and these results will be further inspected by other members of the research team for inclusion in the review. This review will provide insights into how the concept of trust is actualized in the adoption of intelligent assistive technology by older adults. Preliminary sensitization to the literature suggests that the concept of trust is fluid, unstable, and intimately tied to the type of intelligent assistive technology being examined. Furthermore, a wide range of theoretical lenses that include elements of trust have been used to examine this concept. This review will describe the concept of trust in the adoption of intelligent assistive technology by older adults, and will provide insights for practitioners, policy makers, and technology vendors for future practice. ©Josephine McMurray, Gillian Strudwick, Cheryl Forchuk, Adam Morse, Jessica Lachance, Arani Baskaran, Lauren

  10. Packaged low-level waste verification system

    International Nuclear Information System (INIS)

    Tuite, K.T.; Winberg, M.; Flores, A.Y.; Killian, E.W.; McIsaac, C.V.

    1996-01-01

    Currently, states and low-level radioactive waste (LLW) disposal site operators have no method of independently verifying the radionuclide content of packaged LLW that arrive at disposal sites for disposal. At this time, disposal sites rely on LLW generator shipping manifests and accompanying records to insure that LLW received meets the waste acceptance criteria. An independent verification system would provide a method of checking generator LLW characterization methods and help ensure that LLW disposed of at disposal facilities meets requirements. The Mobile Low-Level Waste Verification System (MLLWVS) provides the equipment, software, and methods to enable the independent verification of LLW shipping records to insure that disposal site waste acceptance criteria are being met. The MLLWVS system was developed under a cost share subcontract between WMG, Inc., and Lockheed Martin Idaho Technologies through the Department of Energy's National Low-Level Waste Management Program at the Idaho National Engineering Laboratory (INEL)

  11. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  12. Modeling and Verification of Insider Threats Using Logical Analysis

    DEFF Research Database (Denmark)

    Kammuller, Florian; Probst, Christian W.

    2017-01-01

    and use a common trick from the formal verification of security protocols, showing that it is applicable to insider threats. We introduce briefly a three-step process of social explanation, illustrating that it can be applied fruitfully to the characterization of insider threats. We introduce the insider...

  13. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  14. Remotely-Supervised Transcranial Direct Current Stimulation (tDCS for Clinical Trials: Guidelines for Technology and Protocols

    Directory of Open Access Journals (Sweden)

    Leigh E Charvet

    2015-03-01

    Full Text Available The effect of transcranial direct current stimulation (tDCS is cumulative. Treatment protocols typically require multiple consecutive sessions spanning weeks or months. However, traveling to clinic for a tDCS session can present an obstacle to subjects and their caregivers. With modified devices and headgear, tDCS treatment can be administered remotely under clinical supervision, potentially enhancing recruitment, throughput, and convenience. Here we propose standards and protocols for clinical trials utilizing remotely-supervised tDCS with the goal of providing safe, reproducible and well-tolerated stimulation therapy outside of the clinic. The recommendations include: 1 training of staff in tDCS treatment and supervision, 2 assessment of the user’s capability to participate in tDCS remotely, 3 ongoing training procedures and materials including assessments of the user and/or caregiver, 4 simple and fail-safe electrode preparation techniques and tDCS headgear, 5 strict dose control for each session, 6 ongoing monitoring to quantify compliance (device preparation, electrode saturation/placement, stimulation protocol, with corresponding corrective steps as required, 7 monitoring for treatment-emergent adverse effects, 8 guidelines for discontinuation of a session and/or study participation including emergency failsafe procedures tailored to the treatment population’s level of need. These guidelines are intended to provide a minimal level of methodological rigor for clinical trials seeking to apply tDCS outside a specialized treatment center. We outline indication-specific applications (Attention Deficit Hyperactivity Disorder, Depression, Multiple Sclerosis, Palliative Care following these recommendations that support a standardized framework for evaluating the tolerability and reproducibility of remote-supervised tDCS that, once established, will allow for translation of tDCS clinical trials to a greater size and range of patient populations.

  15. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  16. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  17. Procedure generation and verification

    International Nuclear Information System (INIS)

    Sheely, W.F.

    1986-01-01

    The Department of Energy has used Artificial Intelligence of ''AI'' concepts to develop two powerful new computer-based techniques to enhance safety in nuclear applications. The Procedure Generation System, and the Procedure Verification System, can be adapted to other commercial applications, such as a manufacturing plant. The Procedure Generation System can create a procedure to deal with the off-normal condition. The operator can then take correct actions on the system in minimal time. The Verification System evaluates the logic of the Procedure Generator's conclusions. This evaluation uses logic techniques totally independent of the Procedure Generator. The rapid, accurate generation and verification of corrective procedures can greatly reduce the human error, possible in a complex (stressful/high stress) situation

  18. The MOBI-Kids Study Protocol: Challenges in Assessing Childhood and Adolescent Exposure to Electromagnetic Fields from Wireless Telecommunication Technologies and Possible Association with Brain Tumor Risk

    Science.gov (United States)

    Sadetzki, Siegal; Langer, Chelsea Eastman; Bruchim, Revital; Kundi, Michael; Merletti, Franco; Vermeulen, Roel; Kromhout, Hans; Lee, Ae-Kyoung; Maslanyj, Myron; Sim, Malcolm R.; Taki, Masao; Wiart, Joe; Armstrong, Bruce; Milne, Elizabeth; Benke, Geza; Schattner, Rosa; Hutter, Hans-Peter; Woehrer, Adelheid; Krewski, Daniel; Mohipp, Charmaine; Momoli, Franco; Ritvo, Paul; Spinelli, John; Lacour, Brigitte; Delmas, Dominique; Remen, Thomas; Radon, Katja; Weinmann, Tobias; Klostermann, Swaantje; Heinrich, Sabine; Petridou, Eleni; Bouka, Evdoxia; Panagopoulou, Paraskevi; Dikshit, Rajesh; Nagrani, Rajini; Even-Nir, Hadas; Chetrit, Angela; Maule, Milena; Migliore, Enrica; Filippini, Graziella; Miligi, Lucia; Mattioli, Stefano; Yamaguchi, Naohito; Kojimahara, Noriko; Ha, Mina; Choi, Kyung-Hwa; Mannetje, Andrea ’t; Eng, Amanda; Woodward, Alistair; Carretero, Gema; Alguacil, Juan; Aragones, Nuria; Suare-Varela, Maria Morales; Goedhart, Geertje; Schouten-van Meeteren, A. Antoinette Y. N.; Reedijk, A. Ardine M. J.; Cardis, Elisabeth

    2014-01-01

    The rapid increase in mobile phone use in young people has generated concern about possible health effects of exposure to radiofrequency (RF) and extremely low frequency (ELF) electromagnetic fields (EMF). MOBI-Kids, a multinational case–control study, investigates the potential effects of childhood and adolescent exposure to EMF from mobile communications technologies on brain tumor risk in 14 countries. The study, which aims to include approximately 1,000 brain tumor cases aged 10–24 years and two individually matched controls for each case, follows a common protocol and builds upon the methodological experience of the INTERPHONE study. The design and conduct of a study on EMF exposure and brain tumor risk in young people in a large number of countries is complex and poses methodological challenges. This manuscript discusses the design of MOBI-Kids and describes the challenges and approaches chosen to address them, including: (1) the choice of controls operated for suspected appendicitis, to reduce potential selection bias related to low response rates among population controls; (2) investigating a young study population spanning a relatively wide age range; (3) conducting a large, multinational epidemiological study, while adhering to increasingly stricter ethics requirements; (4) investigating a rare and potentially fatal disease; and (5) assessing exposure to EMF from communication technologies. Our experience in thus far developing and implementing the study protocol indicates that MOBI-Kids is feasible and will generate results that will contribute to the understanding of potential brain tumor risks associated with use of mobile phones and other wireless communications technologies among young people. PMID:25295243

  19. The MOBI-Kids study protocol: challenges in assessing childhood and adolescent exposure to electromagnetic fields from wireless telecommunication technologies and possible association with brain tumor risk

    Directory of Open Access Journals (Sweden)

    Siegal eSadetzki

    2014-09-01

    Full Text Available The rapid increase in mobile phone use in young people has generated concern about possible health effects of exposure to radiofrequency (RF, extremely low frequency (ELF electromagnetic fields (EMF. MOBI-Kids, a multinational case-control study, investigates the potential effects of childhood and adolescent exposure to EMF from mobile communications technologies on brain tumor risk in 14 countries. The study, which aims to include approximately 1,000 brain tumor cases aged 10-24 years and two individually matched controls for each case, follows a common protocol and builds upon the methodological experience of the INTERPHONE study. The design and conduct of a study on EMF exposure and brain tumor risk in young people in a large number of countries is complex and poses methodological challenges. This manuscript discusses the design of MOBI-Kids and describes the challenges and approaches chosen to address them, including: 1 the choice of controls operated for suspected appendicitis, to reduce potential selection bias related to low response rates among population controls; 2 investigating a young study population spanning a relatively wide age-range. 3 conducting a large, multinational epidemiological study, while adhering to increasingly stricter ethics requirements; 4 investigating a rare and potentially fatal disease; and 5 assessing exposure to EMF from communication technologies. Our experience thus far developing and implementing the study protocol indicates that MOBI-Kids is feasible and will generate results that will contribute to the understanding of potential brain tumor risks associated with use of mobile phones and other wireless communications technologies among young people.

  20. Development of Motivate4Change Using the Intervention Mapping Protocol: An Interactive Technology Physical Activity and Medication Adherence Promotion Program for Hospitalized Heart Failure Patients.

    Science.gov (United States)

    Oosterom-Calo, Rony; Te Velde, Saskia J; Stut, Wim; Brug, Johannes

    2015-07-20

    It is important that heart failure (HF) patients adhere to their medication regimen and engage in physical activity. Evidence shows that adherence to these HF self-management behaviors can be improved with appropriate interventions. To further promote medication adherence and physical activity among HF patients, we developed an intervention for hospitalized HF patients. The intervention mapping protocol was applied in the development of the intervention. This entailed performing a needs assessment, defining change objectives, selecting determinants and strategies, and developing the materials. The resulting intervention, Motivate4Change, makes use of interactive technology and provides HF patients with personalized feedback and advice. Specific change objectives were defined. The relevant behavioral determinants for the physical activity program were practical knowledge on physical activity performance and self-efficacy for, and perceived benefits of, physical activity. For medication-taking, the selected determinants were practical knowledge on medication-taking, perceived barriers to medication-taking, beliefs about the necessity and harm regarding the medication prescribed, and beliefs about overprescribing and harm of medication in general. The change objectives and behavior change determinants were translated in feedback and advice strategies in an interactive technology program that included tailored feedback and advice, and role models in videos in which the behaviors and overcoming barriers were demonstrated. Relevant stakeholders were involved in the interventions development process. The intervention was pretested among HF patients and adjustments were made accordingly. The interactive technology physical activity and medication adherence promotion program for hospitalized HF patients was systematically developed using the intervention mapping protocol and was based on the available theory and evidence regarding HF self-management behavior change. The

  1. Verification of Ceramic Structures

    Science.gov (United States)

    Behar-Lafenetre, Stephanie; Cornillon, Laurence; Rancurel, Michael; De Graaf, Dennis; Hartmann, Peter; Coe, Graham; Laine, Benoit

    2012-07-01

    In the framework of the “Mechanical Design and Verification Methodologies for Ceramic Structures” contract [1] awarded by ESA, Thales Alenia Space has investigated literature and practices in affiliated industries to propose a methodological guideline for verification of ceramic spacecraft and instrument structures. It has been written in order to be applicable to most types of ceramic or glass-ceramic materials - typically Cesic®, HBCesic®, Silicon Nitride, Silicon Carbide and ZERODUR®. The proposed guideline describes the activities to be performed at material level in order to cover all the specific aspects of ceramics (Weibull distribution, brittle behaviour, sub-critical crack growth). Elementary tests and their post-processing methods are described, and recommendations for optimization of the test plan are given in order to have a consistent database. The application of this method is shown on an example in a dedicated article [7]. Then the verification activities to be performed at system level are described. This includes classical verification activities based on relevant standard (ECSS Verification [4]), plus specific analytical, testing and inspection features. The analysis methodology takes into account the specific behaviour of ceramic materials, especially the statistical distribution of failures (Weibull) and the method to transfer it from elementary data to a full-scale structure. The demonstration of the efficiency of this method is described in a dedicated article [8]. The verification is completed by classical full-scale testing activities. Indications about proof testing, case of use and implementation are given and specific inspection and protection measures are described. These additional activities are necessary to ensure the required reliability. The aim of the guideline is to describe how to reach the same reliability level as for structures made of more classical materials (metals, composites).

  2. Verification and validation benchmarks.

    Energy Technology Data Exchange (ETDEWEB)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of

  3. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  4. Verification and validation benchmarks

    International Nuclear Information System (INIS)

    Oberkampf, William L.; Trucano, Timothy G.

    2008-01-01

    Verification and validation (V and V) are the primary means to assess the accuracy and reliability of computational simulations. V and V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V and V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the

  5. Reload core safety verification

    International Nuclear Information System (INIS)

    Svetlik, M.; Minarcin, M.

    2003-01-01

    This paper presents a brief look at the process of reload core safety evaluation and verification in Slovak Republic. It gives an overview of experimental verification of selected nuclear parameters in the course of physics testing during reactor start-up. The comparison of IAEA recommendations and testing procedures at Slovak and European nuclear power plants of similar design is included. An introduction of two level criteria for evaluation of tests represents an effort to formulate the relation between safety evaluation and measured values (Authors)

  6. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  7. SoC Design Approach Using Convertibility Verification

    Directory of Open Access Journals (Sweden)

    Basu Samik

    2008-01-01

    Full Text Available Abstract Compositional design of systems on chip from preverified components helps to achieve shorter design cycles and time to market. However, the design process is affected by the issue of protocol mismatches, where two components fail to communicate with each other due to protocol differences. Convertibility verification, which involves the automatic generation of a converter to facilitate communication between two mismatched components, is a collection of techniques to address protocol mismatches. We present an approach to convertibility verification using module checking. We use Kripke structures to represent protocols and the temporal logic to describe desired system behavior. A tableau-based converter generation algorithm is presented which is shown to be sound and complete. We have developed a prototype implementation of the proposed algorithm and have used it to verify that it can handle many classical protocol mismatch problems along with SoC problems. The initial idea for -based convertibility verification was presented at SLA++P '07 as presented in the work by Roopak Sinha et al. 2008.

  8. Protocol for evaluation of the cost-effectiveness of ePrescribing systems and candidate prototype for other related health information technologies

    Science.gov (United States)

    2014-01-01

    Background This protocol concerns the assessment of cost-effectiveness of hospital health information technology (HIT) in four hospitals. Two of these hospitals are acquiring ePrescribing systems incorporating extensive decision support, while the other two will implement systems incorporating more basic clinical algorithms. Implementation of an ePrescribing system will have diffuse effects over myriad clinical processes, so the protocol has to deal with a large amount of information collected at various ‘levels’ across the system. Methods/Design The method we propose is use of Bayesian ideas as a philosophical guide. Assessment of cost-effectiveness requires a number of parameters in order to measure incremental cost utility or benefit – the effectiveness of the intervention in reducing frequency of preventable adverse events; utilities for these adverse events; costs of HIT systems; and cost consequences of adverse events averted. There is no single end-point that adequately and unproblematically captures the effectiveness of the intervention; we therefore plan to observe changes in error rates and adverse events in four error categories (death, permanent disability, moderate disability, minimal effect). For each category we will elicit and pool subjective probability densities from experts for reductions in adverse events, resulting from deployment of the intervention in a hospital with extensive decision support. The experts will have been briefed with quantitative and qualitative data from the study and external data sources prior to elicitation. Following this, there will be a process of deliberative dialogues so that experts can “re-calibrate” their subjective probability estimates. The consolidated densities assembled from the repeat elicitation exercise will then be used to populate a health economic model, along with salient utilities. The credible limits from these densities can define thresholds for sensitivity analyses. Discussion The

  9. An Evaluation Methodology for Protocol Analysis Systems

    Science.gov (United States)

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  10. Accuracy Verification of Magnetic Resonance Imaging (MRI) Technology for Lower-Limb Prosthetic Research: Utilising Animal Soft Tissue Specimen and Common Socket Casting Materials

    OpenAIRE

    Safari, Mohammad Reza; Rowe, Philip; Buis, Arjan

    2012-01-01

    Lower limb prosthetic socket shape and volume consistency can be quantified using MRI technology. Additionally, MRI images of the residual limb could be used as an input data for CAD-CAM technology and finite element studies. However, the accuracy of MRI when socket casting materials are used has to be defined. A number of six, 46 mm thick, cross-sections of an animal leg were used. Three specimens were wrapped with Plaster of Paris (POP) and the other three with commercially available silico...

  11. Is flow verification necessary

    International Nuclear Information System (INIS)

    Beetle, T.M.

    1986-01-01

    Safeguards test statistics are used in an attempt to detect diversion of special nuclear material. Under assumptions concerning possible manipulation (falsification) of safeguards accounting data, the effects on the statistics due to diversion and data manipulation are described algebraically. A comprehensive set of statistics that is capable of detecting any diversion of material is defined in terms of the algebraic properties of the effects. When the assumptions exclude collusion between persons in two material balance areas, then three sets of accounting statistics are shown to be comprehensive. Two of the sets contain widely known accountancy statistics. One of them does not require physical flow verification - comparisons of operator and inspector data for receipts and shipments. The third set contains a single statistic which does not require physical flow verification. In addition to not requiring technically difficult and expensive flow verification, this single statistic has several advantages over other comprehensive sets of statistics. This algebraic approach as an alternative to flow verification for safeguards accountancy is discussed in this paper

  12. Integrated Java Bytecode Verification

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian; Franz, Michael

    2005-01-01

    Existing Java verifiers perform an iterative data-flow analysis to discover the unambiguous type of values stored on the stack or in registers. Our novel verification algorithm uses abstract interpretation to obtain definition/use information for each register and stack location in the program...

  13. Proceedings of the Defense Nuclear Agency Conference on Arms Control and Verification Technology (ACT) Held in Williamsburg, Virginia on 1-4 June 1992

    Science.gov (United States)

    1993-12-01

    antigens and protein toxins (further information can be found in the Appendix on Identity Testing of Agents in the full FAS report, 1992). The...express their surprise over these "living dinosaurs " because the United States had abandoned this enrichment technology in the late 1940s as more

  14. Environmental Technology Verification: Test Report of Mobile Source Emission Control Devices--Johnson Matthey PCRT2 1000, Version 2, Filter + Diesel Oxidation Catalyst

    Science.gov (United States)

    The Johnson Matthey PCRT2 1000, v.2 system is a partial continuously regenerating technology (PCRT) system that consists of a flow-through partial filter combined with a DOC. The system is designed for low temperature exhaust resulting from intermittent loads from medium and heav...

  15. Seismic verification of underground explosions

    International Nuclear Information System (INIS)

    Glenn, L.A.

    1985-06-01

    The first nuclear test agreement, the test moratorium, was made in 1958 and lasted until the Soviet Union unilaterally resumed testing in the atmosphere in 1961. It was followed by the Limited Test Ban Treaty of 1963, which prohibited nuclear tests in the atmosphere, in outer space, and underwater. In 1974 the Threshold Test Ban Treaty (TTBT) was signed, limiting underground tests after March 1976 to a maximum yield of 250 kt. The TTBT was followed by a treaty limiting peaceful nuclear explosions and both the United States and the Soviet Union claim to be abiding by the 150-kt yield limit. A comprehensive test ban treaty (CTBT), prohibiting all testing of nuclear weapons, has also been discussed. However, a verifiable CTBT is a contradiction in terms. No monitoring technology can offer absolute assurance that very-low-yield illicit explosions have not occurred. The verification process, evasion opportunities, and cavity decoupling are discussed in this paper

  16. Verification Games: Crowd-Sourced Formal Verification

    Science.gov (United States)

    2016-03-01

    additional paintbrushes. Additionally, in Paradox , human players are never given small optimization problems (for example, toggling the values of 50...were developed by the Center for Game Science: Pipe Jam, Traffic Jam, Flow Jam and Paradox . Verification tools and games were integrated to verify...4 4. Paradox …………………………………………………......5 5. MyClass ………………………………………………….....7 6. Results …………………………………………………......11 7. Time to

  17. The effectiveness of M-health technologies for improving health and health services: a systematic review protocol

    Directory of Open Access Journals (Sweden)

    Patel Vikram

    2010-10-01

    Full Text Available Abstract Background The application of mobile computing and communication technology is rapidly expanding in the fields of health care and public health. This systematic review will summarise the evidence for the effectiveness of mobile technology interventions for improving health and health service outcomes (M-health around the world. Findings To be included in the review interventions must aim to improve or promote health or health service use and quality, employing any mobile computing and communication technology. This includes: (1 interventions designed to improve diagnosis, investigation, treatment, monitoring and management of disease; (2 interventions to deliver treatment or disease management programmes to patients, health promotion interventions, and interventions designed to improve treatment compliance; and (3 interventions to improve health care processes e.g. appointment attendance, result notification, vaccination reminders. A comprehensive, electronic search strategy will be used to identify controlled studies, published since 1990, and indexed in MEDLINE, EMBASE, PsycINFO, Global Health, Web of Science, the Cochrane Library, or the UK NHS Health Technology Assessment database. The search strategy will include terms (and synonyms for the following mobile electronic devices (MEDs and a range of compatible media: mobile phone; personal digital assistant (PDA; handheld computer (e.g. tablet PC; PDA phone (e.g. BlackBerry, Palm Pilot; Smartphone; enterprise digital assistant; portable media player (i.e. MP3 or MP4 player; handheld video game console. No terms for health or health service outcomes will be included, to ensure that all applications of mobile technology in public health and health services are identified. Bibliographies of primary studies and review articles meeting the inclusion criteria will be searched manually to identify further eligible studies. Data on objective and self-reported outcomes and study quality will

  18. The effectiveness of M-health technologies for improving health and health services: a systematic review protocol.

    Science.gov (United States)

    Free, Caroline; Phillips, Gemma; Felix, Lambert; Galli, Leandro; Patel, Vikram; Edwards, Philip

    2010-10-06

    The application of mobile computing and communication technology is rapidly expanding in the fields of health care and public health. This systematic review will summarise the evidence for the effectiveness of mobile technology interventions for improving health and health service outcomes (M-health) around the world. To be included in the review interventions must aim to improve or promote health or health service use and quality, employing any mobile computing and communication technology. This includes: (1) interventions designed to improve diagnosis, investigation, treatment, monitoring and management of disease; (2) interventions to deliver treatment or disease management programmes to patients, health promotion interventions, and interventions designed to improve treatment compliance; and (3) interventions to improve health care processes e.g. appointment attendance, result notification, vaccination reminders.A comprehensive, electronic search strategy will be used to identify controlled studies, published since 1990, and indexed in MEDLINE, EMBASE, PsycINFO, Global Health, Web of Science, the Cochrane Library, or the UK NHS Health Technology Assessment database. The search strategy will include terms (and synonyms) for the following mobile electronic devices (MEDs) and a range of compatible media: mobile phone; personal digital assistant (PDA); handheld computer (e.g. tablet PC); PDA phone (e.g. BlackBerry, Palm Pilot); Smartphone; enterprise digital assistant; portable media player (i.e. MP3 or MP4 player); handheld video game console. No terms for health or health service outcomes will be included, to ensure that all applications of mobile technology in public health and health services are identified. Bibliographies of primary studies and review articles meeting the inclusion criteria will be searched manually to identify further eligible studies. Data on objective and self-reported outcomes and study quality will be independently extracted by two review

  19. Research on Emissions, Air quality, Climate, and Cooking Technologies in Northern Ghana (REACCTING): study rationale and protocol.

    Science.gov (United States)

    Dickinson, Katherine L; Kanyomse, Ernest; Piedrahita, Ricardo; Coffey, Evan; Rivera, Isaac J; Adoctor, James; Alirigia, Rex; Muvandimwe, Didier; Dove, MacKenzie; Dukic, Vanja; Hayden, Mary H; Diaz-Sanchez, David; Abisiba, Adoctor Victor; Anaseba, Dominic; Hagar, Yolanda; Masson, Nicholas; Monaghan, Andrew; Titiati, Atsu; Steinhoff, Daniel F; Hsu, Yueh-Ya; Kaspar, Rachael; Brooks, Bre'Anna; Hodgson, Abraham; Hannigan, Michael; Oduro, Abraham Rexford; Wiedinmyer, Christine

    2015-02-12

    Cooking over open fires using solid fuels is both common practice throughout much of the world and widely recognized to contribute to human health, environmental, and social problems. The public health burden of household air pollution includes an estimated four million premature deaths each year. To be effective and generate useful insight into potential solutions, cookstove intervention studies must select cooking technologies that are appropriate for local socioeconomic conditions and cooking culture, and include interdisciplinary measurement strategies along a continuum of outcomes. REACCTING (Research on Emissions, Air quality, Climate, and Cooking Technologies in Northern Ghana) is an ongoing interdisciplinary randomized cookstove intervention study in the Kassena-Nankana District of Northern Ghana. The study tests two types of biomass burning stoves that have the potential to meet local cooking needs and represent different "rungs" in the cookstove technology ladder: a locally-made low-tech rocket stove and the imported, highly efficient Philips gasifier stove. Intervention households were randomized into four different groups, three of which received different combinations of two improved stoves, while the fourth group serves as a control for the duration of the study. Diverse measurements assess different points along the causal chain linking the intervention to final outcomes of interest. We assess stove use and cooking behavior, cooking emissions, household air pollution and personal exposure, health burden, and local to regional air quality. Integrated analysis and modeling will tackle a range of interdisciplinary science questions, including examining ambient exposures among the regional population, assessing how those exposures might change with different technologies and behaviors, and estimating the comparative impact of local behavior and technological changes versus regional climate variability and change on local air quality and health outcomes

  20. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  1. Key Nuclear Verification Priorities: Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  2. Key Nuclear Verification Priorities - Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  3. Verification Survey of Uranium Mine Remediation

    International Nuclear Information System (INIS)

    Ron, Stager

    2009-01-01

    The Canadian Nuclear Safety Commission (CNSC) contracted an independent verification of an intensive gamma radiation survey conducted by a mining company to demonstrate that remediation of disturbed areas was complete. This site was the first of the recent mines being decommissioned in Canada and experience gained here may be applied to other mines being decommissioned in the future. The review included examination of the site-specific basis for clean-up criteria and ALARA as required by CNSC guidance. A paper review of the company report was conducted to determine if protocols were followed and that the summarized results could be independently reproduced. An independent verification survey was conducted on parts of the site and comparisons were made between gamma radiation measurements from the verification survey and the original company survey. Some aspects of data collection using rate meters linked to GPS data loggers are discussed as are aspects for data management and analyses methods required for the large amount of data collected during these surveys. Recommendations were made for implementation of future surveys and reporting the data from those surveys in order to ensure that remediation was complete. (authors)

  4. Accuracy verification of magnetic resonance imaging (MRI) technology for lower-limb prosthetic research: utilising animal soft tissue specimen and common socket casting materials.

    Science.gov (United States)

    Safari, Mohammad Reza; Rowe, Philip; Buis, Arjan

    2012-01-01

    Lower limb prosthetic socket shape and volume consistency can be quantified using MRI technology. Additionally, MRI images of the residual limb could be used as an input data for CAD-CAM technology and finite element studies. However, the accuracy of MRI when socket casting materials are used has to be defined. A number of six, 46 mm thick, cross-sections of an animal leg were used. Three specimens were wrapped with Plaster of Paris (POP) and the other three with commercially available silicone interface liner. Data was obtained by utilising MRI technology and then the segmented images compared to corresponding calliper measurement, photographic imaging, and water suspension techniques. The MRI measurement results were strongly correlated with actual diameter, surface area, and volume measurements. The results show that the selected scanning parameters and the semiautomatic segmentation method are adequate enough, considering the limit of clinical meaningful shape and volume fluctuation, for residual limb volume and the cross-sectional surface area measurements.

  5. Accuracy Verification of Magnetic Resonance Imaging (MRI Technology for Lower-Limb Prosthetic Research: Utilising Animal Soft Tissue Specimen and Common Socket Casting Materials

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Safari

    2012-01-01

    Full Text Available Lower limb prosthetic socket shape and volume consistency can be quantified using MRI technology. Additionally, MRI images of the residual limb could be used as an input data for CAD-CAM technology and finite element studies. However, the accuracy of MRI when socket casting materials are used has to be defined. A number of six, 46 mm thick, cross-sections of an animal leg were used. Three specimens were wrapped with Plaster of Paris (POP and the other three with commercially available silicone interface liner. Data was obtained by utilising MRI technology and then the segmented images compared to corresponding calliper measurement, photographic imaging, and water suspension techniques. The MRI measurement results were strongly correlated with actual diameter, surface area, and volume measurements. The results show that the selected scanning parameters and the semiautomatic segmentation method are adequate enough, considering the limit of clinical meaningful shape and volume fluctuation, for residual limb volume and the cross-sectional surface area measurements.

  6. Improving active Mealy machine learning for protocol conformance testing

    NARCIS (Netherlands)

    Aarts, F.; Kuppens, H.; Tretmans, J.; Vaandrager, F.; Verwer, S.

    2014-01-01

    Using a well-known industrial case study from the verification literature, the bounded retransmission protocol, we show how active learning can be used to establish the correctness of protocol implementation I relative to a given reference implementation R. Using active learning, we learn a model M

  7. Component Verification and Certification in NASA Missions

    Science.gov (United States)

    Giannakopoulou, Dimitra; Penix, John; Norvig, Peter (Technical Monitor)

    2001-01-01

    Software development for NASA missions is a particularly challenging task. Missions are extremely ambitious scientifically, have very strict time frames, and must be accomplished with a maximum degree of reliability. Verification technologies must therefore be pushed far beyond their current capabilities. Moreover, reuse and adaptation of software architectures and components must be incorporated in software development within and across missions. This paper discusses NASA applications that we are currently investigating from these perspectives.

  8. System Description: Embedding Verification into Microsoft Excel

    OpenAIRE

    Collins, Graham; Dennis, Louise Abigail

    2000-01-01

    The aim of the PROSPER project is to allow the embedding of existing verification technology into applications in such a way that the theorem proving is hidden, or presented to the end user in a natural way. This paper describes a system built to test whether the PROSPER toolkit satisfied this aim. The system combines the toolkit with Microsoft Excel, a popular commercial spreadsheet application.

  9. Assessment of unsaturated zone transport for shallow land burial of radioactive waste: summary report of technology needs, model verification, and measurement efforts (FY 1978 to FY 1983)

    International Nuclear Information System (INIS)

    Jones, T.L.; Gee, G.W.

    1984-01-01

    Two main topics are addressed in this report. The first topic relates to the assessment process for shallow land burial site design. This overview includes basic descriptions of water balance, transport processes and technology needs for waste management at an arid (dry) site. The second topic deals with specific results of research activities at PNL related to water and radionuclide transport under arid, shallow land burial conditions. Technology needs at arid-zone (dry) sites are summarized and unique features of radionuclide disposal at dry sites are explained. The report emphasizes the need to understand the interaction between climate, soil, plants, engineered barriers, and buried waste in order to evaluate performance of a waste disposal system at a dry site. Water balance data, collected since FY 1978 at the Buried Waste Test Facility (BWTF) at Hanford, are used to illustrate the influence of climate variables (rainfall distribution patterns and evaporative conditions) on soil water storage and drainage at an arid site. For dry site conditions, with no vegetation and coarse soil, significant deep drainage was measured. Deep drainage below the root zone was also measured at a grass-covered site on the Hanford site after early spring rains, which emphasizes the need to carefully monitor site water balances even at arid (dry) sites. The monitoring technology, water balance, and radionuclide transport at arid sites are discussed, and the use of neutron probes, electrical resistance units, tensiometers, and psychrometers are explained, and examples are given on their applications in arid-site monitoring. Measurements of water flow and radionuclide transport coefficients needed to describe movement in unsaturated soils are documented. 40 references, 21 figures, 5 tables

  10. Impact of mobile phone-based technology to improve health, population and nutrition services in Rural Bangladesh: a study protocol.

    Science.gov (United States)

    Uddin, Jasim; Biswas, Tuhin; Adhikary, Gourab; Ali, Wazed; Alam, Nurul; Palit, Rajesh; Uddin, Nizam; Uddin, Aftab; Khatun, Fatema; Bhuiya, Abbas

    2017-07-06

    Mobile phone-based technology has been used in improving the delivery of healthcare services in many countries. However, data on the effects of this technology on improving primary healthcare services in resource-poor settings are limited. The aim of this study is to develop and test a mobile phone-based system to improve health, population and nutrition services in rural Bangladesh and evaluate its impact on service delivery. The study will use a quasi-experimental pre-post design, with intervention and comparison areas. Outcome indicators will include: antenatal care (ANC), delivery care, postnatal care (PNC), neonatal care, expanded programme on immunization (EPI) coverage, and contraceptive prevalence rate (CPR). The study will be conducted over a period of 30 months, using the existing health systems of Bangladesh. The intervention will be implemented through the existing service-delivery personnel at various primary-care levels, such as community clinic, union health and family welfare centre, and upazila health complex. These healthcare providers will be given mobile phones equipped with Apps for sending text and voice messages, along with the use of Internet and device for data-capturing. Training on handling of the Smartphones, data-capturing and monitoring will be given to selected service providers. They will also be trained on inputs, editing, verifying, and monitoring the outcome variables. Mobile phone-based technology has the potential to improve primary healthcare services in low-income countries, like Bangladesh. It is expected that our study will contribute to testing and developing a mobile phone-based intervention to improve the coverage and quality of services. The learning can be used in other similar settings in the low-and middle-income countries.

  11. Distorted Fingerprint Verification System

    Directory of Open Access Journals (Sweden)

    Divya KARTHIKAESHWARAN

    2011-01-01

    Full Text Available Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.

  12. RESRAD-BUILD verification

    International Nuclear Information System (INIS)

    Kamboj, S.; Yu, C.; Biwer, B. M.; Klett, T.

    2002-01-01

    The results generated by the RESRAD-BUILD code (version 3.0) were verified with hand or spreadsheet calculations using equations given in the RESRAD-BUILD manual for different pathways. For verification purposes, different radionuclides--H-3, C-14, Na-22, Al-26, Cl-36, Mn-54, Co-60, Au-195, Ra-226, Ra-228, Th-228, and U-238--were chosen to test all pathways and models. Tritium, Ra-226, and Th-228 were chosen because of the special tritium and radon models in the RESRAD-BUILD code. Other radionuclides were selected to represent a spectrum of radiation types and energies. Verification of the RESRAD-BUILD code was conducted with an initial check of all the input parameters for correctness against their original source documents. Verification of the calculations was performed external to the RESRAD-BUILD code with Microsoft Excel to verify all the major portions of the code. In some cases, RESRAD-BUILD results were compared with those of external codes, such as MCNP (Monte Carlo N-particle) and RESRAD. The verification was conducted on a step-by-step basis and used different test cases as templates. The following types of calculations were investigated: (1) source injection rate, (2) air concentration in the room, (3) air particulate deposition, (4) radon pathway model, (5) tritium model for volume source, (6) external exposure model, (7) different pathway doses, and (8) time dependence of dose. Some minor errors were identified in version 3.0; these errors have been corrected in later versions of the code. Some possible improvements in the code were also identified

  13. Methods of Software Verification

    Directory of Open Access Journals (Sweden)

    R. E. Gurin

    2015-01-01

    Full Text Available This article is devoted to the problem of software verification (SW. Methods of software verification designed to check the software for compliance with the stated requirements such as correctness, system security and system adaptability to small changes in the environment, portability and compatibility, etc. These are various methods both by the operation process and by the way of achieving result. The article describes the static and dynamic methods of software verification and paid attention to the method of symbolic execution. In its review of static analysis are discussed and described the deductive method, and methods for testing the model. A relevant issue of the pros and cons of a particular method is emphasized. The article considers classification of test techniques for each method. In this paper we present and analyze the characteristics and mechanisms of the static analysis of dependencies, as well as their views, which can reduce the number of false positives in situations where the current state of the program combines two or more states obtained both in different paths of execution and in working with multiple object values. Dependences connect various types of software objects: single variables, the elements of composite variables (structure fields, array elements, the size of the heap areas, the length of lines, the number of initialized array elements in the verification code using static methods. The article pays attention to the identification of dependencies within the framework of the abstract interpretation, as well as gives an overview and analysis of the inference tools.Methods of dynamic analysis such as testing, monitoring and profiling are presented and analyzed. Also some kinds of tools are considered which can be applied to the software when using the methods of dynamic analysis. Based on the work a conclusion is drawn, which describes the most relevant problems of analysis techniques, methods of their solutions and

  14. Ocean fertilization, carbon credits and the Kyoto Protocol

    Science.gov (United States)

    Westley, M. B.; Gnanadesikan, A.

    2008-12-01

    Commercial interest in ocean fertilization as a carbon sequestration tool was excited by the December 1997 agreement of the Kyoto Protocol to the United Nations Convention on Climate Change. The Protocol commits industrialized countries to caps on net greenhouse gas emissions and allows for various flexible mechanisms to achieve these caps in the most economically efficient manner possible, including trade in carbon credits from projects that reduce emissions or enhance sinks. The carbon market was valued at 64 billion in 2007, with the bulk of the trading (50 billion) taking place in the highly regulated European Union Emission Trading Scheme, which deals primarily in emission allowances in the energy sector. A much smaller amount, worth $265 million, was traded in the largely unregulated "voluntary" market (Capoor and Ambrosi 2008). As the voluntary market grows, so do calls for its regulation, with several efforts underway to set rules and standards for the sale of voluntary carbon credits using the Kyoto Protocol as a starting point. Four US-based companies and an Australian company currently seek to develop ocean fertilization technologies for the generation of carbon credits. We review these plans through the lens of the Kyoto Protocol and its flexible mechanisms, and examine whether and how ocean fertilization could generate tradable carbon credits. We note that at present, ocean sinks are not included in the Kyoto Protocol, and that furthermore, the Kyoto Protocol only addresses sources and sinks of greenhouse gases within national boundaries, making open-ocean fertilization projects a jurisdictional challenge. We discuss the negotiating history behind the limited inclusion of land use, land use change and forestry in the Kyoto Protocol and the controversy and eventual compromise concerning methodologies for terrestrial carbon accounting. We conclude that current technologies for measuring and monitoring carbon sequestration following ocean fertilization

  15. TEST/QA PLAN FOR THE VERIFICATION TESTING OF ALTERNATIVES OR REFORMULATED LIQUID FUELS, FUEL ADDITIVES, FUEL EMULSONS, AND LUBRICANTS FOR HIGHWAY AND NONROAD USE HEAVY DUTY DIESEL ENGINES AND LIGHT DUTY GASOLINE ENGINES AND VEHICLES

    Science.gov (United States)

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  16. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  17. Implementation of a Low Frame-Rate Protocol and Noise-Reduction Technology to Minimize Radiation Dose in Transcatheter Aortic Valve Replacement.

    Science.gov (United States)

    Maccagni, Davide; Candilio, Luciano; Latib, Azeem; Godino, Cosmo; Chieffo, Alaide; Montorfano, Matteo; Colombo, Antonio; Azzalini, Lorenzo

    2018-05-01

    Limiting radiation exposure is necessary in radiological procedures. This study evaluates the impact of a radiological low frame-rate protocol in a standard angiographic system and the implementation of a noise-reduction technology (NRT) on patient radiation exposure during transcatheter aortic valve replacement (TAVR). Transfemoral TAVR procedures performed between February 2016 and February 2017 were analyzed according to two angiographic systems, Standard and NRT, and further divided in four subgroups: (1) Standard 15 frames per second (fps) with 15 fps for both fluoroscopy and cine acquisitions; (2) Standard 7.5 fps with 7.5 fps for both fluoroscopy and cine acquisitions; (3) NRT 15 fps with 15 fps for both fluoroscopy and cine acquisitions; and (4) NRT 7.5 fps with 15 fps for fluoroscopy and 7.5 fps for cine acquisitions. Study endpoints were kerma area product (KAP) and cumulative air kerma at interventional reference point (AK at IRP). Significant differences were found in KAP (153 Gy·cm² [IQR, 95-234 Gy·cm²] vs 78.3 Gy·cm² [IQR, 54.4-103.5 Gy·cm²]; Pfps and Standard 7.5 fps groups (184 Gy·cm² [IQR, 128-262 Gy·cm²] vs 106.8 Gy·cm² [IQR, 76.87-181 Gy·cm²] [P<.01] and 0.973 Gy [IQR, 0.642-1.786 Gy] vs 0.64 Gy [IQR, 0.489-0.933 Gy] [P<.01], respectively). The present study suggests that the low frame-rate protocol in Standard system and NRT implementation allows a marked reduction of patient radiation exposure in TAVR procedures.

  18. Comparison of Nutrigenomics Technology Interface Tools for Consumers and Health Professionals: Protocol for a Mixed-Methods Study.

    Science.gov (United States)

    Littlejohn, Paula; Cop, Irene; Brown, Erin; Afroze, Rimi; Davison, Karen M

    2018-06-11

    because they did not complete all required data collection forms or were later found to be ineligible. The final sample (n=55) was mostly female (75%), married (85%), and those who had completed postsecondary education (62%). This study will leverage quantitative and qualitative findings, which will guide the development of nutrigenomics-based products in electronic formats that are user-friendly for consumers and health professionals. Although the quantitative data have not been analyzed yet, the overwhelming interest in the study and the extremely high retention rate show that there is a great degree of interest in this field. Given this interest and the fact that nutrigenomics is an evolving science, a need for continued research exists to further the understanding of the role of genetic variation and its role and applications in nutrition practice. Clinicaltrials.gov NCT03310814; http://clinicaltrials.gov/ct2/show/NCT03310814 (Archived by WebCite at http://www.webcitation.org/6yGnU5deB). RR1-10.2196/9846. ©Paula Littlejohn, Irene Cop, Erin Brown, Rimi Afroze, Karen M Davison. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 11.06.2018.

  19. Using mobile technology to deliver a cognitive behaviour therapy-informed intervention in early psychosis (Actissist): study protocol for a randomised controlled trial.

    Science.gov (United States)

    Bucci, Sandra; Barrowclough, Christine; Ainsworth, John; Morris, Rohan; Berry, Katherine; Machin, Matthew; Emsley, Richard; Lewis, Shon; Edge, Dawn; Buchan, Iain; Haddock, Gillian

    2015-09-10

    Cognitive behaviour therapy (CBT) is recommended for the treatment of psychosis; however, only a small proportion of service users have access to this intervention. Smartphone technology using software applications (apps) could increase access to psychological approaches for psychosis. This paper reports the protocol development for a clinical trial of smartphone-based CBT. We present a study protocol that describes a single-blind randomised controlled trial comparing a cognitive behaviour therapy-informed software application (Actissist) plus Treatment As Usual (TAU) with a symptom monitoring software application (ClinTouch) plus TAU in early psychosis. The study consists of a 12-week intervention period. We aim to recruit and randomly assign 36 participants registered with early intervention services (EIS) across the North West of England, UK in a 2:1 ratio to each arm of the trial. Our primary objective is to determine whether in people with early psychosis the Actissist app is feasible to deliver and acceptable to use. Secondary aims are to determine whether Actissist impacts on predictors of first episode psychosis (FEP) relapse and enhances user empowerment, functioning and quality of life. Assessments will take place at baseline, 12 weeks (post-treatment) and 22-weeks (10 weeks post-treatment) by assessors blind to treatment condition. The trial will report on the feasibility and acceptability of Actissist and compare outcomes between the randomised arms. The study also incorporates semi-structured interviews about the experience of participating in the Actissist trial that will be qualitatively analysed to inform future developments of the Actissist protocol and app. To our knowledge, this is the first controlled trial to test the feasibility, acceptability, uptake, attrition and potential efficacy of a CBT-informed smartphone app for early psychosis. Mobile applications designed to deliver a psychologically-informed intervention offer new possibilities to

  20. Design of verification platform for wireless vision sensor networks

    Science.gov (United States)

    Ye, Juanjuan; Shang, Fei; Yu, Chuang

    2017-08-01

    At present, the majority of research for wireless vision sensor networks (WVSNs) still remains in the software simulation stage, and the verification platforms of WVSNs that available for use are very few. This situation seriously restricts the transformation from theory research of WVSNs to practical application. Therefore, it is necessary to study the construction of verification platform of WVSNs. This paper combines wireless transceiver module, visual information acquisition module and power acquisition module, designs a high-performance wireless vision sensor node whose core is ARM11 microprocessor and selects AODV as the routing protocol to set up a verification platform called AdvanWorks for WVSNs. Experiments show that the AdvanWorks can successfully achieve functions of image acquisition, coding, wireless transmission, and obtain the effective distance parameters between nodes, which lays a good foundation for the follow-up application of WVSNs.

  1. Claims to success: advocacy for the protocol on the rights of women in Africa – solidarity for African women’s rights and the use of information and communication technologies

    NARCIS (Netherlands)

    K. Kemp (Karoline)

    2010-01-01

    textabstractThe goal of this particular research has been to examine the role of information and communication technologies (ICTs) in policy advocacy as applied by civil society. Taking the Solidarity for African Women’s Rights coalition and their work towards the ratification of the Protocol on

  2. Public preferences for engagement in Health Technology Assessment decision-making: protocol of a mixed methods study.

    Science.gov (United States)

    Wortley, Sally; Tong, Allison; Lancsar, Emily; Salkeld, Glenn; Howard, Kirsten

    2015-07-14

    Much attention in recent years has been given to the topic of public engagement in health technology assessment (HTA) decision-making. HTA organizations spend substantial resources and time on undertaking public engagement, and numerous studies have examined challenges and barriers to engagement in the decision-making process however uncertainty remains as to optimal methods to incorporate the views of the public in HTA decision-making. Little research has been done to ascertain whether current engagement processes align with public preferences and to what extent their desire for engagement is dependent on the question being asked by decision-makers or the characteristics of the decision. This study will examine public preferences for engagement in Australian HTA decision-making using an exploratory mixed methods design. The aims of this study are to: 1) identify characteristics about HTA decisions that are important to the public in determining whether public engagement should be undertaken on a particular topic, 2) determine which decision characteristics influence public preferences for the extent, or type of public engagement, and 3) describe reasons underpinning these preferences. Focus group participants from the general community, aged 18-70 years, will be purposively sampled from the Australian population to ensure a wide range of demographic groups. Each focus group will include a general discussion on public engagement as well as a ranking exercise using a modified nominal group technique (NGT). The NGT will inform the design of a discrete choice study to quantitatively assess public preferences for engagement in HTA decision-making. The proposed research seeks to investigate under what circumstances and how the public would like their views and preferences to be considered in health technology assessments. HTA organizations regularly make decisions about when and how public engagement should occur but without consideration of the public's preferences on

  3. The effectiveness of technology-based strategies to promote engagement with digital interventions: a systematic review protocol.

    Science.gov (United States)

    Alkhaldi, Ghadah; Hamilton, Fiona L; Lau, Rosa; Webster, Rosie; Michie, Susan; Murray, Elizabeth

    2015-04-28

    Digital interventions provide effective and potentially cost-effective models for improving health outcomes as they deliver health information and services that are widely disseminated, confidential, and can be tailored to needs of the individual user. Digital interventions have been used successfully for health promotion, mental health, and for enabling self-management of long-term conditions. However, their effectiveness is limited by low usage rates, with non-engagement a major challenge. Hence, it is crucial to find effective strategies to increase user engagement with digital interventions. This systematic review will aim to evaluate the effectiveness of technology-based strategies to promote engagement with digital interventions. We will follow Cochrane Collaboration guidelines on systematic review methodology. The search strategy will be executed across seven e-databases (including MEDLINE, EMBASE, PsycINFO, CINAHL) using the concepts "digital intervention" and "engagement", limited by study type (randomized controlled trial). Grey literature and reference lists of included studies will be searched. Titles and abstracts will be independently screened by 2 authors. Then the full text of potentially eligible papers will be obtained and double screened. Data from eligible papers will be extracted by 1 author and checked for accuracy by another author. Bias will be assessed using the Cochrane bias assessment tool. Narrative synthesis will report on all included studies, and where appropriate, data will be pooled using meta-analysis. All findings will be reported according to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines. Sources of heterogeneity will be further investigated if required. Our research is in progress. The final draft of the systematic review is being written and will be submitted before the end of 2015. The review findings will inform researchers and digital intervention providers about optimal use of technology

  4. The effectiveness of information and communication technology-based psychological interventions for paediatric chronic pain: protocol for a systematic review, meta-analysis and intervention content analysis.

    Science.gov (United States)

    Traynor, Angeline; Morrissey, Eimear; Egan, Jonathan; McGuire, Brian E

    2016-10-18

    Resource and geographic barriers are the commonly cited constraints preventing the uptake of psychological treatment for chronic pain management. For adults, there is some evidence to support the use of information and communication technology (ICT) as a mode of treatment delivery. However, mixed findings have been reported for the effectiveness and acceptability of psychological interventions delivered using information and communication technology for children and adolescents. This is a protocol for a review that aims to (i) evaluate the effectiveness of psychological interventions delivered using information and communication technology for children and adolescents with chronic pain and (ii) identify the intervention components and usability factors in technology-based treatments associated with behaviour change. We will conduct a systematic review to evaluate the effectiveness of psychological interventions for paediatric chronic pain delivered using ICT. We plan to directly compare ICT-based, psychological interventions with active control, treatment as usual or waiting list control conditions. This systematic review will be reported in line with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidance. Published and unpublished randomised controlled trials will be included and the literature search will comprise Ovid MEDLINE, Ovid Embase, PsycINFO and the Cochrane Library on Wiley, including CENTRAL and Cochrane Database of Systematic Reviews. Grey literature including theses, dissertations, technical and research reports will also be examined. Two review authors will independently conduct study selection, relevant data extraction and assessment of methodological quality. Risk of bias in included studies will be assessed using the Cochrane Collaboration risk of bias tool criteria. Two qualified coders will independently code behaviour change techniques according to the behaviour change taxonomy (v1) of 93 hierarchically

  5. Engagement Strategies for Self-Monitoring Symptoms of Bipolar Disorder With Mobile and Wearable Technology: Protocol for a Randomized Controlled Trial.

    Science.gov (United States)

    Cochran, Amy; Belman-Wells, Livia; McInnis, Melvin

    2018-05-10

    Monitoring signs and symptoms in bipolar disorder (BP) is typically based on regular assessments from patient-clinician interactions. Mobile and wearable technology promises to make monitoring symptoms in BP easier, but little is known about how best to engage individuals with BP in monitoring symptoms. The objective of this study was to provide the rationale and protocol for a randomized controlled trial that investigates engagement strategies for monitoring symptoms of BP, including the strategies of using activity trackers compared with self-reports and reviewing recorded symptoms weekly with an interviewer. A total of 50 individuals with BP will be recruited from the Prechter Longitudinal Study of Bipolar Disorder at the University of Michigan to participate in a 6-week study. Participants will monitor their symptoms through an activity tracker (Fitbit Alta HR) and a mobile phone app designed for this study. In addition to monitoring symptoms, participants have a 50-50 chance of being assigned to an arm that reviews self-reports and activity information weekly. Statistical tests will be performed to test hypotheses that participants adhere to activity tracking significantly more than self-reporting, prefer activity tracking significantly more than self-reporting, and better adhere to both activity tracking and self-reporting when reviewing collected information weekly. Recruitment commenced in November 2017. The first group of participants began the study in January 2018. This study aims to establish strategies to engage individuals with BP in monitoring their symptoms with mobile and wearable technology. Better engagement strategies are expected to aid current efforts in bipolar research and clinical care, from the development of new mobile phone apps to providing the right intervention to the right individual at the right moment. ClinicalTrials.gov NCT03358238; https://clinicaltrials.gov/ct2/show/NCT03358238 (Archived by WebCite at http

  6. Effectiveness of a Technology-Based Supportive Educational Parenting Program on Parental Outcomes in Singapore: Protocol for a Randomized Controlled Trial.

    Science.gov (United States)

    Shorey, Shefaly; Ng, Yvonne Peng Mei; Siew, An Ling; Yoong, Joanne; Mörelius, Evalotte

    2018-01-10

    Supportive educational programs during the perinatal period are scarce in Singapore. There is no continuity of care available in terms of support from community care nurses in Singapore. Parents are left on their own most of the time, which results in a stressful transition to parenthood. There is a need for easily accessible technology-based educational programs that can support parents during this crucial perinatal period. The aim of this study was to describe the study protocol of a randomized controlled trial on a technology-based supportive educational parenting program. A randomized controlled two-group pretest and repeated posttest experimental design will be used. The study will recruit 118 parents (59 couples) from the antenatal clinics of a tertiary public hospital in Singapore. Eligible parents will be randomly allocated to receive either the supportive educational parenting program or routine perinatal care from the hospital. Outcome measures include parenting self-efficacy, parental bonding, postnatal depression, social support, parenting satisfaction, and cost evaluation. Data will be collected at the antenatal period, immediate postnatal period, and at 1 month and 3 months post childbirth. Recruitment of the study participants commenced in December 2016 and is still ongoing. Data collection is projected to finish within 12 months, by December 2017. This study will identify a potentially clinically useful, effective, and cost-effective supportive educational parenting program to improve parental self-efficacy and bonding in newborn care, which will then improve parents' social support-seeking behaviors, emotional well-being, and satisfaction with parenting. It is hoped that better supported and satisfied parents will consider having more children, which may in turn influence Singapore's ailing birth rate. International Standard Randomized Controlled Trial Number (ISRCTN): 48536064; https://www.isrctn.com/ISRCTN48536064 (Archived by WebCite at http

  7. Quantum money with classical verification

    Energy Technology Data Exchange (ETDEWEB)

    Gavinsky, Dmitry [NEC Laboratories America, Princeton, NJ (United States)

    2014-12-04

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  8. Quantum money with classical verification

    International Nuclear Information System (INIS)

    Gavinsky, Dmitry

    2014-01-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it

  9. Verification study on technology for site investigation for geological disposal. Confirmation of the applicability of survey methods through establishing site descriptive models in accordance with stepwise investigation approach

    International Nuclear Information System (INIS)

    Kondo, Hirofumi; Suzuki, Koichi; Hasegawa, Takuma; Hamada, Takaomi; Yoshimura, Kimitaka

    2014-01-01

    The Yokosuka Demonstration and Validation Project, which uses the Yokosuka Central Research Institute of Electric Power Industry (CRIEPI) site, a Neogene sedimentary and coastal environment, has been conducted since the 2006 fiscal year as a cooperative research project between NUMO (Nuclear Waste Management Organization of Japan) and CRIEPI. The objectives of this project were to examine and refine the basic methodology of the investigation and assessment in accordance with the conditions of geological environment at each stage of investigations from the surface (Preliminary Investigation and the first half of Detailed Investigation conducted by NUMO) for high level radioactive waste geological disposal. Within investigation technologies at these early stages, a borehole survey is an important means of directly obtaining various properties of the deep geological environment. On the other hand, surface geophysical prospecting data provide information about the geological and resistivity structures at depth for planning borehole surveys. During the 2006-2009 fiscal years, a series of on-site surveys and tests, including borehole surveys of YDP-1 (depth: 350 m) and YDP-2 (depth: 500 m), were conducted in this test site. Furthermore, seismic surveys (including seismic reflection method) and electromagnetic surveys (including magnetotelluric method) were conducted within the expanded CRIEPI site in the 2010 fiscal year to obtain information about the geological structure, and the resistivity structure reflecting the distribution of the salt water/fresh water boundary, respectively, to a depth of over several hundred meters. The validity of existing survey and testing methods for stepwise investigations (from surface to borehole surveys) for obtaining properties of the geological environment (in various conditions relating to differences in the properties of the Miura and the Hayama Groups at this site) was confirmed through establishing site descriptive models based on

  10. Systematic study of source mask optimization and verification flows

    Science.gov (United States)

    Ben, Yu; Latypov, Azat; Chua, Gek Soon; Zou, Yi

    2012-06-01

    Source mask optimization (SMO) emerged as powerful resolution enhancement technique (RET) for advanced technology nodes. However, there is a plethora of flow and verification metrics in the field, confounding the end user of the technique. Systemic study of different flows and the possible unification thereof is missing. This contribution is intended to reveal the pros and cons of different SMO approaches and verification metrics, understand the commonality and difference, and provide a generic guideline for RET selection via SMO. The paper discusses 3 different type of variations commonly arise in SMO, namely pattern preparation & selection, availability of relevant OPC recipe for freeform source and finally the metrics used in source verification. Several pattern selection algorithms are compared and advantages of systematic pattern selection algorithms are discussed. In the absence of a full resist model for SMO, alternative SMO flow without full resist model is reviewed. Preferred verification flow with quality metrics of DOF and MEEF is examined.

  11. Improving coronary heart disease self-management using mobile technologies (Text4Heart): a randomised controlled trial protocol.

    Science.gov (United States)

    Dale, Leila Pfaeffli; Whittaker, Robyn; Jiang, Yannan; Stewart, Ralph; Rolleston, Anna; Maddison, Ralph

    2014-03-04

    Cardiac rehabilitation (CR) is a secondary prevention program that offers education and support to assist patients with coronary heart disease (CHD) make lifestyle changes. Despite the benefits of CR, attendance at centre-based sessions remains low. Mobile technology (mHealth) has potential to reach more patients by delivering CR directly to mobile phones, thus providing an alternative to centre-based CR. The aim of this trial is to evaluate if a mHealth comprehensive CR program can improve adherence to healthy lifestyle behaviours (for example, physically active, fruit and vegetable intake, not smoking, low alcohol consumption) over and above usual CR services in New Zealand adults diagnosed with CHD. A two-arm, parallel, randomised controlled trial will be conducted at two Auckland hospitals in New Zealand. One hundred twenty participants will be randomised to receive a 24-week evidence- and theory-based personalised text message program and access to a supporting website in addition to usual CR care or usual CR care alone (control). The primary outcome is the proportion of participants adhering to healthy behaviours at 6 months, measured using a composite health behaviour score. Secondary outcomes include overall cardiovascular disease risk, body composition, illness perceptions, self-efficacy, hospital anxiety/depression and medication adherence. This study is one of the first to examine an mHealth-delivered comprehensive CR program. Strengths of the trial include quality research design and in-depth description of the intervention to aid replication. If effective, the trial has potential to augment standard CR practices and to be used as a model for other disease prevention or self-management programs. Australian New Zealand Clinical Trials Registry: ACTRN12613000901707.

  12. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  13. A Practitioners Perspective on Verification

    Science.gov (United States)

    Steenburgh, R. A.

    2017-12-01

    NOAAs Space Weather Prediction Center offers a wide range of products and services to meet the needs of an equally wide range of customers. A robust verification program is essential to the informed use of model guidance and other tools by both forecasters and end users alike. In this talk, we present current SWPC practices and results, and examine emerging requirements and potential approaches to satisfy them. We explore the varying verification needs of forecasters and end users, as well as the role of subjective and objective verification. Finally, we describe a vehicle used in the meteorological community to unify approaches to model verification and facilitate intercomparison.

  14. Systems Approach to Arms Control Verification

    Energy Technology Data Exchange (ETDEWEB)

    Allen, K; Neimeyer, I; Listner, C; Stein, G; Chen, C; Dreicer, M

    2015-05-15

    Using the decades of experience of developing concepts and technologies for verifying bilateral and multilateral arms control agreements, a broad conceptual systems approach is being developed that takes into account varying levels of information and risk. The IAEA has already demonstrated the applicability of a systems approach by implementing safeguards at the State level, with acquisition path analysis as the key element. In order to test whether such an approach could also be implemented for arms control verification, an exercise was conducted in November 2014 at the JRC ITU Ispra. Based on the scenario of a hypothetical treaty between two model nuclear weapons states aimed at capping their nuclear arsenals at existing levels, the goal of this exercise was to explore how to use acquisition path analysis in an arms control context. Our contribution will present the scenario, objectives and results of this exercise, and attempt to define future workshops aimed at further developing verification measures that will deter or detect treaty violations.

  15. CTBT integrated verification system evaluation model supplement

    Energy Technology Data Exchange (ETDEWEB)

    EDENBURN,MICHAEL W.; BUNTING,MARCUS; PAYNE JR.,ARTHUR C.; TROST,LAWRENCE C.

    2000-03-02

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia's Monitoring Systems and Technology Center and has been funded by the U.S. Department of Energy's Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, ''top-level,'' modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM's unique features is that it integrates results from the various CTBT sensor technologies (seismic, in sound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection), location accuracy, and identification capability of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system's performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. The original IVSEM report, CTBT Integrated Verification System Evaluation Model, SAND97-25 18, described version 1.2 of IVSEM. This report describes the changes made to IVSEM version 1.2 and the addition of identification capability estimates that have been incorporated into IVSEM version 2.0.

  16. CTBT integrated verification system evaluation model supplement

    International Nuclear Information System (INIS)

    EDENBURN, MICHAEL W.; BUNTING, MARCUS; PAYNE, ARTHUR C. JR.; TROST, LAWRENCE C.

    2000-01-01

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia's Monitoring Systems and Technology Center and has been funded by the U.S. Department of Energy's Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, ''top-level,'' modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM's unique features is that it integrates results from the various CTBT sensor technologies (seismic, in sound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection), location accuracy, and identification capability of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system's performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. The original IVSEM report, CTBT Integrated Verification System Evaluation Model, SAND97-25 18, described version 1.2 of IVSEM. This report describes the changes made to IVSEM version 1.2 and the addition of identification capability estimates that have been incorporated into IVSEM version 2.0

  17. "FIND Technology": investigating the feasibility, efficacy and safety of controller-free interactive digital rehabilitation technology in an inpatient stroke population: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Bird, M L; Cannell, J; Callisaya, M L; Moles, E; Rathjen, A; Lane, K; Tyson, A; Smith, S

    2016-04-16

    Stroke results in significant disability, which can be reduced by physical rehabilitation. High levels of repetition and activity are required in rehabilitation, but patients are typically sedentary. Using clinically relevant and fun computer games may be one way to achieve increased activity in rehabilitation. A single-blind randomized controlled trial will be conducted to evaluate the feasibility, efficacy and safety of novel stroke-specific rehabilitation software. This software uses controller-free client interaction and inertial motion sensors. Elements of feasibility include recruitment into the trial, ongoing participation (adherence and dropout), perceived benefit, enjoyment and ease of use of the games. Efficacy will be determined by measuring activity and using upper-limb tasks as well as measures of balance and mobility. The hypothesis that the intervention group will have increased levels of physical activity within rehabilitation and improved physical outcomes compared with the control group will be tested. Results from this study will provide a basis for discussion of feasibility of this interactive video technological solution in an inpatient situation. Differences in activity levels between groups will be the primary measure of efficacy. It will also provide data on measures of upper-limb function, balance and mobility. ACTRN12614000427673 . Prospectively registered 17 April 2014.

  18. High-level verification

    CERN Document Server

    Lerner, Sorin; Kundu, Sudipta

    2011-01-01

    Given the growing size and heterogeneity of Systems on Chip (SOC), the design process from initial specification to chip fabrication has become increasingly complex. This growing complexity provides incentive for designers to use high-level languages such as C, SystemC, and SystemVerilog for system-level design. While a major goal of these high-level languages is to enable verification at a higher level of abstraction, allowing early exploration of system-level designs, the focus so far for validation purposes has been on traditional testing techniques such as random testing and scenario-based

  19. A Roadmap for the Implementation of Continued Process Verification.

    Science.gov (United States)

    Boyer, Marcus; Gampfer, Joerg; Zamamiri, Abdel; Payne, Robin

    2016-01-01

    In 2014, the members of the BioPhorum Operations Group (BPOG) produced a 100-page continued process verification case study, entitled "Continued Process Verification: An Industry Position Paper with Example Protocol". This case study captures the thought processes involved in creating a continued process verification plan for a new product in response to the U.S. Food and Drug Administration's guidance on the subject introduced in 2011. In so doing, it provided the specific example of a plan developed for a new molecular antibody product based on the "A MAb Case Study" that preceded it in 2009.This document provides a roadmap that draws on the content of the continued process verification case study to provide a step-by-step guide in a more accessible form, with reference to a process map of the product life cycle. It could be used as a basis for continued process verification implementation in a number of different scenarios: For a single product and process;For a single site;To assist in the sharing of data monitoring responsibilities among sites;To assist in establishing data monitoring agreements between a customer company and a contract manufacturing organization. The U.S. Food and Drug Administration issued guidance on the management of manufacturing processes designed to improve quality and control of drug products. This involved increased focus on regular monitoring of manufacturing processes, reporting of the results, and the taking of opportunities to improve. The guidance and practice associated with it is known as continued process verification This paper summarizes good practice in responding to continued process verification guidance, gathered from subject matter experts in the biopharmaceutical industry. © PDA, Inc. 2016.

  20. Rationale and study protocol for a multi-component Health Information Technology (HIT) screening tool for depression and post-traumatic stress disorder in the primary care setting.

    Science.gov (United States)

    Biegler, Kelly; Mollica, Richard; Sim, Susan Elliott; Nicholas, Elisa; Chandler, Maria; Ngo-Metzger, Quyen; Paigne, Kittya; Paigne, Sompia; Nguyen, Danh V; Sorkin, Dara H

    2016-09-01

    The prevalence rate of depression in primary care is high. Primary care providers serve as the initial point of contact for the majority of patients with depression, yet, approximately 50% of cases remain unrecognized. The under-diagnosis of depression may be further exacerbated in limited English-language proficient (LEP) populations. Language barriers may result in less discussion of patients' mental health needs and fewer referrals to mental health services, particularly given competing priorities of other medical conditions and providers' time pressures. Recent advances in Health Information Technology (HIT) may facilitate novel ways to screen for depression and other mental health disorders in LEP populations. The purpose of this paper is to describe the rationale and protocol of a clustered randomized controlled trial that will test the effectiveness of an HIT intervention that provides a multi-component approach to delivering culturally competent, mental health care in the primary care setting. The HIT intervention has four components: 1) web-based provider training, 2) multimedia electronic screening of depression and PTSD in the patients' primary language, 3) Computer generated risk assessment scores delivered directly to the provider, and 4) clinical decision support. The outcomes of the study include assessing the potential of the HIT intervention to improve screening rates, clinical detection, provider initiation of treatment, and patient outcomes for depression and post-traumatic stress disorder (PTSD) among LEP Cambodian refugees who experienced war atrocities and trauma during the Khmer Rouge. This technology has the potential to be adapted to any LEP population in order to facilitate mental health screening and treatment in the primary care setting. Copyright © 2016 Elsevier Inc. All rights reserved.

  1. Rationale and Study Protocol for a Multi-component Health Information Technology (HIT) Screening Tool for Depression and Post-traumatic Stress Disorder in the Primary Care Setting

    Science.gov (United States)

    Biegler, Kelly; Mollica, Richard; Sim, Susan Elliott; Nicholas, Elisa; Chandler, Maria; Ngo-Metzger, Quyen; Paigne, Kittya; Paigne, Sompia; Nguyen, Danh V.; Sorkin, Dara H.

    2016-01-01

    The prevalence rate of depression in primary care is high. Primary care providers serve as the initial point of contact for the majority of patients with depression, yet, approximately 50% of cases remain unrecognized. The under-diagnosis of depression may be further exacerbated in limited English-language proficient (LEP) populations. Language barriers may result in less discussion of patients’ mental health needs and fewer referrals to mental health services, particularly given competing priorities of other medical conditions and providers’ time pressures. Recent advances in Health Information Technology (HIT) may facilitate novel ways to screen for depression in LEP populations. The purpose of this paper is to describe the rationale and protocol of a clustered-randomized controlled trial that will test the effectiveness of an HIT intervention that provides a multi-component approach to delivering culturally competent, mental health care in the primary care setting. The HIT intervention has four components: 1) web-based provider training, 2) multimedia electronic screening of depression and PTSD in the patients’ primary language, 3) Computer generated risk assessment scores delivered directly to the provider, and 4) clinical decision support. The outcomes of the study include assessing the potential of the HIT intervention to improve screening rates, clinical detection, provider initiation of treatment, and patient outcomes for depression and PTSD among LEP Cambodian refugees who experienced war atrocities and trauma during the Khmer Rouge. This technology has the potential to be adapted to any LEP population in order to facilitate mental health screening and treatment in the primary care setting. PMID:27394385

  2. Survey on Offline Finger Print Verification System

    NARCIS (Netherlands)

    Suman, R.; Kaur, R.

    2012-01-01

    The fingerprint verification, means where "verification" implies a user matching a fingerprint against a single fingerprint associated with the identity that the user claims. Biometrics can be classified into two types Behavioral (signature verification, keystroke dynamics, etc.) And Physiological

  3. Real-Time System Verification by Kappa-Induction

    Science.gov (United States)

    Pike, Lee S.

    2005-01-01

    We report the first formal verification of a reintegration protocol for a safety-critical, fault-tolerant, real-time distributed embedded system. A reintegration protocol increases system survivability by allowing a node that has suffered a fault to regain state consistent with the operational nodes. The protocol is verified in the Symbolic Analysis Laboratory (SAL), where bounded model checking and decision procedures are used to verify infinite-state systems by k-induction. The protocol and its environment are modeled as synchronizing timeout automata. Because k-induction is exponential with respect to k, we optimize the formal model to reduce the size of k. Also, the reintegrator's event-triggered behavior is conservatively modeled as time-triggered behavior to further reduce the size of k and to make it invariant to the number of nodes modeled. A corollary is that a clique avoidance property is satisfied.

  4. Inventory of present verification techniques. Viewpoint of EURATOM

    International Nuclear Information System (INIS)

    Kloeckner, W.; Eecken, D. Van der; Gmelin, W.

    1998-01-01

    Starting from the role of Euratom as an established regional safeguards system, an overview is given of verification techniques currently practised by Euratom. In the stage-light of a rapidly changing and complex international safeguards scene, Euratom considers it has an important role to play. Having in mind the possibilities created by accelerating modern technology, recommendations are given for an enhanced use of technological means in safeguards. The viewpoint of Euratom is that the majority of methodologies and techniques in place may very well be copied to or used for a cut-off verification system currently under discussion

  5. Enhancing mHealth Technology in the Patient-Centered Medical Home Environment to Activate Patients With Type 2 Diabetes: A Multisite Feasibility Study Protocol.

    Science.gov (United States)

    Gimbel, Ronald; Shi, Lu; Williams, Joel E; Dye, Cheryl J; Chen, Liwei; Crawford, Paul; Shry, Eric A; Griffin, Sarah F; Jones, Karyn O; Sherrill, Windsor W; Truong, Khoa; Little, Jeanette R; Edwards, Karen W; Hing, Marie; Moss, Jennie B

    2017-03-06

    Diabetes Self-care Activities Measure scores, clinical measures, comorbid conditions, health services resource consumption, and technology system usage statistics. We have completed phase 1 data collection. Formal analysis of phase 1 data has not been completed. We have obtained institutional review board approval and began phase 1 research in late fall 2016. The study hypotheses suggest that patients can, and will, improve their activation in chronic care management. Improved activation should translate into improved diabetes self-care. Expected benefits of this research to the scientific community and health care services include improved understanding of how to leverage mHealth technology to activate patients living with type 2 diabetes in self-management behaviors. The research will shed light on implementation strategies in integrating mHealth into the clinical workflow of the PCMH setting. ClinicalTrials.gov NCT02949037. https://clinicaltrials.gov/ct2/show/NCT02949037. (Archived by WebCite at http://www.webcitation.org/6oRyDzqei). ©Ronald Gimbel, Lu Shi, Joel E Williams, Cheryl J Dye, Liwei Chen, Paul Crawford, Eric A Shry, Sarah F Griffin, Karyn O Jones, Windsor W Sherrill, Khoa Truong, Jeanette R Little, Karen W Edwards, Marie Hing, Jennie B Moss. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 06.03.2017.

  6. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  7. Verification of the thermal design of electronic equipment

    Energy Technology Data Exchange (ETDEWEB)

    Hienonen, R.; Karjalainen, M.; Lankinen, R. [VTT Automation, Espoo (Finland). ProTechno

    1997-12-31

    The project `Verification of the thermal design of electronic equipment` studied the methodology to be followed in the verification of thermal design of electronic equipment. This project forms part of the `Cool Electronics` research programme funded by TEKES, the Finnish Technology Development Centre. This project was carried out jointly by VTT Automation, Lappeenranta University of Technology, Nokia Research Center and ABB Industry Oy VSD-Technology. The thermal design of electronic equipment has a significant impact on the cost, reliability, tolerance to different environments, selection of components and materials, and ergonomics of the product. This report describes the method for verification of thermal design. It assesses the goals set for thermal design, environmental requirements, technical implementation of the design, thermal simulation and modelling, and design qualification testing and the measurements needed. The verification method covers all packaging levels of electronic equipment from the system level to the electronic component level. The method described in this report can be used as part of the quality system of a corporation. The report includes information about the measurement and test methods needed in the verification process. Some measurement methods for the temperature, flow and pressure of air are described. (orig.) Published in Finnish VTT Julkaisuja 824. 22 refs.

  8. HDL to verification logic translator

    Science.gov (United States)

    Gambles, J. W.; Windley, P. J.

    1992-01-01

    The increasingly higher number of transistors possible in VLSI circuits compounds the difficulty in insuring correct designs. As the number of possible test cases required to exhaustively simulate a circuit design explodes, a better method is required to confirm the absence of design faults. Formal verification methods provide a way to prove, using logic, that a circuit structure correctly implements its specification. Before verification is accepted by VLSI design engineers, the stand alone verification tools that are in use in the research community must be integrated with the CAD tools used by the designers. One problem facing the acceptance of formal verification into circuit design methodology is that the structural circuit descriptions used by the designers are not appropriate for verification work and those required for verification lack some of the features needed for design. We offer a solution to this dilemma: an automatic translation from the designers' HDL models into definitions for the higher-ordered logic (HOL) verification system. The translated definitions become the low level basis of circuit verification which in turn increases the designer's confidence in the correctness of higher level behavioral models.

  9. Shear Ram Verification Test Protocol (VTP) Best Practices

    Energy Technology Data Exchange (ETDEWEB)

    Lindley, Roy A. [Argonne National Lab. (ANL), Argonne, IL (United States); Braun, Joseph C. [Argonne National Lab. (ANL), Argonne, IL (United States)

    2017-01-01

    A blowout preventer (BOP) is a critical component used on subsea oil and gas wells during drilling, completion, and workover operations on the U. S. outer continental shelf (OCS). The purpose of the BOP is to seal oil and gas wells, and in the case of an emergency well-control event, to prevent the uncontrolled release of hydrocarbons. One of the most important components of the BOP is the hydraulically operated blind shear ram (BSR) that shears drilling-related components, such as drill pipes, casings, tubings, and wire-related tools that may have been placed in the well. In addition to shearing these components, the BSR must form a seal to keep hydrocarbons within the well bore, even when under the highest well-fluid pressures expected. The purpose of this document is for Argonne National Laboratory (ANL) to provide an independent view, based on current regulations, and best practices for testing and confirming the operability and suitability of BSRs under realistic (or actual) well conditions.

  10. A Type Theoretic Investigation of the Verification of Voting Protocols

    DEFF Research Database (Denmark)

    Gustafsson, Daniel

    is correct, and on the other hand we can we trust that the secrecy of the vote is preserved. These seemingly contradictory statements have fuelled new developments in cryptography, but the question remain can we trust these developments? The thesis of my dissertation is that it possible to formalise...... and calculation of probabilities, in particular ∑-types are used as they correspond to summation. Furthermore, I extend the type theory with process algebraic constructions in order to capture attack games as defined by semantic security in cryptography. To type these processes I propose a session type system...

  11. Advancing Disarmament Verification Tools: A Task for Europe?

    International Nuclear Information System (INIS)

    Göttsche, Malte; Kütt, Moritz; Neuneck, Götz; Niemeyer, Irmgard

    2015-01-01

    A number of scientific-technical activities have been carried out to establish more robust and irreversible disarmament verification schemes. Regardless of the actual path towards deeper reductions in nuclear arsenals or their total elimination in the future, disarmament verification will require new verification procedures and techniques. This paper discusses the information that would be required as a basis for building confidence in disarmament, how it could be principally verified and the role Europe could play. Various ongoing activities are presented that could be brought together to produce a more intensified research and development environment in Europe. The paper argues that if ‘effective multilateralism’ is the main goal of the European Union’s (EU) disarmament policy, EU efforts should be combined and strengthened to create a coordinated multilateral disarmament verification capacity in the EU and other European countries. The paper concludes with several recommendations that would have a significant impact on future developments. Among other things, the paper proposes a one-year review process that should include all relevant European actors. In the long run, an EU Centre for Disarmament Verification could be envisaged to optimize verification needs, technologies and procedures.

  12. Verification of Simulation Tools

    International Nuclear Information System (INIS)

    Richard, Thierry

    2015-01-01

    Before qualifying a simulation tool, the requirements shall first be clearly identified, i.e.: - What type of study needs to be carried out? - What phenomena need to be modeled? This phase involves writing a precise technical specification. Once the requirements are defined, the most adapted product shall be selected from the various software options available on the market. Before using a particular version of a simulation tool to support the demonstration of nuclear safety studies, the following requirements shall be met. - An auditable quality assurance process complying with development international standards shall be developed and maintained, - A process of verification and validation (V and V) shall be implemented. This approach requires: writing a report and/or executive summary of the V and V activities, defining a validated domain (domain in which the difference between the results of the tools and those of another qualified reference is considered satisfactory for its intended use). - Sufficient documentation shall be available, - A detailed and formal description of the product (software version number, user configuration, other settings and parameters) in the targeted computing environment shall be available. - Source codes corresponding to the software shall be archived appropriately. When these requirements are fulfilled, the version of the simulation tool shall be considered qualified for a defined domain of validity, in a given computing environment. The functional verification shall ensure that: - the computer architecture of the tool does not include errors, - the numerical solver correctly represents the physical mathematical model, - equations are solved correctly. The functional verification can be demonstrated through certification or report of Quality Assurance. The functional validation shall allow the user to ensure that the equations correctly represent the physical phenomena in the perimeter of intended use. The functional validation can

  13. Societal Verification: Intellectual Game or International Game-Changer

    International Nuclear Information System (INIS)

    Hartigan, Kelsey; Hinderstein, Corey

    2013-01-01

    Within the nuclear nonproliferation and arms control field, there is an increasing appreciation for the potential of open source information technologies to supplement existing verification and compliance regimes. While clearly not a substitute for on-site inspections or national technical means, it may be possible to better leverage information gleaned from commercial satellite imagery, international trade records and the vast amount of data being exchanged online and between publics (including social media) so as to develop a more comprehensive set of tools and practices for monitoring and verifying a state’s nuclear activities and helping judge compliance with international obligations. The next generation “toolkit” for monitoring and verifying items, facility operations and activities will likely include a more diverse set of analytical tools and technologies than are currently used internationally. To explore these and other issues, the Nuclear Threat Initiative has launched an effort that examines, in part, the role that emerging technologies and “citizen scientists” might play in future verification regimes. This paper will include an assessment of past proliferation and security “events” and whether emerging tools and technologies would have provided indicators concurrently or in advance of these actions. Such case studies will be instrumental in understanding the reliability of these technologies and practices and in thinking through the requirements of a 21st century verification regime. Keywords: Verification, social media, open-source information, arms control, disarmament.

  14. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  15. Shift Verification and Validation

    Energy Technology Data Exchange (ETDEWEB)

    Pandya, Tara M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Evans, Thomas M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Davidson, Gregory G [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Johnson, Seth R. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Godfrey, Andrew T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-09-07

    This documentation outlines the verification and validation of Shift for the Consortium for Advanced Simulation of Light Water Reactors (CASL). Five main types of problems were used for validation: small criticality benchmark problems; full-core reactor benchmarks for light water reactors; fixed-source coupled neutron-photon dosimetry benchmarks; depletion/burnup benchmarks; and full-core reactor performance benchmarks. We compared Shift results to measured data and other simulated Monte Carlo radiation transport code results, and found very good agreement in a variety of comparison measures. These include prediction of critical eigenvalue, radial and axial pin power distributions, rod worth, leakage spectra, and nuclide inventories over a burn cycle. Based on this validation of Shift, we are confident in Shift to provide reference results for CASL benchmarking.

  16. Online fingerprint verification.

    Science.gov (United States)

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.

  17. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  18. 76 FR 54810 - Submission for Review: 3206-0215, Verification of Full-Time School Attendance, RI 25-49

    Science.gov (United States)

    2011-09-02

    ... other technological collection techniques or other forms of information technology, e.g., permitting... or faxed to (202) 395-6974. SUPPLEMENTARY INFORMATION: RI 25-49, Verification of Full-Time School... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: 3206-0215, Verification of Full-Time School...

  19. Verification report for SIMREP 1.1

    International Nuclear Information System (INIS)

    Tarapore, P.S.

    1987-06-01

    SIMREP 1.1 is a discrete event computer simulation of repository operations in the surface waste-handling facility. The logic for this model is provided by Fluor Technology, Inc., the Architect/Engineer of the salt repository. The verification methods included a line-by-line review of the code, a detailed examination of a generated trace of all simulated events over a given period of operations, and a comparison of the simulation output results with expected values. SIMREP 1.1 performs in the required manner under the given range of input conditions

  20. Study Protocol of MINI SALTEN: a technology-based multi-component intervention in the school environment targeting healthy habits of first grade children and their parents.

    Science.gov (United States)

    Kovalskys, Irina; Rausch Herscovici, Cecile; Indart Rougier, Paula; De Gregorio, María José; Zonis, Luciana; Orellana, Liliana

    2017-05-06

    MINI SALTEN is a program developed to increase moderate to vigorous physical activity (PA) and improve eating habits at home and school in first grade children. It aims to assess the effects of a technology family-based and PA school-based intervention. The purpose of this manuscript is to describe the protocol design and the MINISALTEN intervention. This is cluster-randomized controlled trial designed to run from July 2015 to November 2016 in 12 public schools of the city of Buenos Aires, matched for socio-demographic characteristics. The intervention is based on two main components: (a) "active breaks" (AB): implemented during school breaks by a PA instructor; (b) "virtual" (V): web-based contents delivered to the families via a multiplatform application. Using a computer generated random sequence participants are allocated to one of four intervention conditions: (AB), (V), (AB + V), and control (C). Outcomes are measured at baseline and 12 months post intervention, and will include data collected from the child and her/his mother/father or guardian. Primary outcome measures are: PA and sedentary behaviour (measured with accelerometers). Secondary outcome measures related are: percentage of kilocalories (kcal) from added sugars, and from total and saturated fats; grams of fruits and vegetables; and number of snacks and kcal coming from their added sugars and total and saturated fats. Family socio-economic level, home environment, and school environment will also be assessed. Statistical analysis is on an intention-to-treat principle. Baseline characteristics are described using summary measures and mixed models (with school as random effect). The effect of the two interventions will be estimated using a generalized mixed linear model with link and distribution selected according to the type of outcome. Included random effects are: child (or mother/father or guardian) accounting for repeated measures; school accounting for cluster induced by school. The most

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - REMOVAL OF PRECURSORS TO DISINFECTION BY-PRODUCTS IN DRINKING WATER, PCI MEMBRANE SYSTEMS FYNE PROCESS MODEL ROP 1434 WITH AFC-30 NANOFILTRATON AT BARROW, AK - NSF 00/19/EPADW395

    Science.gov (United States)

    Equipment testing and verification of PCI Membrane Systems Inc. Fyne Process nanofiltraton systems Model ROP 1434 equipped with a C10 module containing AFC-30 tubular membranes was conducted from 3/16-5/11/2000 in Barrow, AS. The source water was a moderate alkalinity, moderately...

  2. Improved verification methods for safeguards verifications at enrichment plants

    International Nuclear Information System (INIS)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D.

    2009-01-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF 6 cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  3. Improved verification methods for safeguards verifications at enrichment plants

    Energy Technology Data Exchange (ETDEWEB)

    Lebrun, A.; Kane, S. C.; Bourva, L.; Poirier, S.; Loghin, N. E.; Langlands, D. [Department of Safeguards, International Atomic Energy Agency, Wagramer Strasse 5, A1400 Vienna (Austria)

    2009-07-01

    The International Atomic Energy Agency (IAEA) has initiated a coordinated research and development programme to improve its verification methods and equipment applicable to enrichment plants. The programme entails several individual projects to meet the objectives of the IAEA Safeguards Model Approach for Gas Centrifuge Enrichment Plants updated in 2006. Upgrades of verification methods to confirm the absence of HEU (highly enriched uranium) production have been initiated and, in particular, the Cascade Header Enrichment Monitor (CHEM) has been redesigned to reduce its weight and incorporate an electrically cooled germanium detector. Such detectors are also introduced to improve the attended verification of UF{sub 6} cylinders for the verification of the material balance. Data sharing of authenticated operator weighing systems such as accountancy scales and process load cells is also investigated as a cost efficient and an effective safeguards measure combined with unannounced inspections, surveillance and non-destructive assay (NDA) measurement. (authors)

  4. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  5. From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

    Directory of Open Access Journals (Sweden)

    Tieming Chen

    2016-01-01

    Full Text Available Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN and wireless body area networks (WBAN, formal modeling and verification for these domain-specific systems are quite challenging. In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification. At first, an abstract modeling data structure for CSP#, which is built in PAT, is developed to support the node mobility related specification for modeling location-based node activity. Then, the traditional Dolev-Yao model is redefined to facilitate modeling of location-specific attack behaviors on security mechanism. A throughout formal verification application on a location-based security protocol in WSN is described in detail to show the usability and effectiveness of the proposed methodology. Furthermore, also a novel location-based authentication security protocol in WBAN can be successfully modeled and verified directly using our method, which is, to the best of our knowledge, the first effort on employing model checking for automatic analysis of authentication protocol for WBAN.

  6. Numident Online Verification Utility (NOVU)

    Data.gov (United States)

    Social Security Administration — NOVU is a mainframe application that accesses the NUMIDENT to perform real-time SSN verifications. This program is called by other SSA online programs that serve as...

  7. Achievement report for fiscal 1999 on project for supporting the formation of energy/environmental technology verification project. International joint verification research project (Verification project relative to ignition and NOx reduction using plasma sub-burner in pulverized coal-fired furnace); 1999 nendo plasma sabubana ni yoru bifuntan nenshoro ni okeru chakka oyobi NO{sub x} teigen gijutsu ni kansuru jissho project seika hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    This project is executed through the cooperation of a Russian research institute, Akita Prefectural University, and the Ishikawajima-Harima Heavy Industries Co., Ltd. In the development of a plasma sub-burner and the basic research for its verification, a pulverized coal burning plasma sub-burner is designed and fabricated, a basic burning experiment is conducted for the plasma sub-burner, and plasma stabilization in a pulverized coal flow is simulated. In the verification study of the ignition by the plasma sub-burner in a pulverized coal-fired furnace, it is found that the newly-developed plasma sub-burner satisfies the prescribed operating conditions in the system and that the ignition of pulverized coal takes place across the air ratio range of 0.5-1.5 when pulverized coal is fed to the sub-burner. It is also found that NOx is reduced a great deal when a plasma operating on an orifice gas of air or nitrogen is generated in a gas which contains NOx. (NEDO)

  8. System and Component Software Specification, Run-time Verification and Automatic Test Generation, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The following background technology is described in Part 5: Run-time Verification (RV), White Box Automatic Test Generation (WBATG). Part 5 also describes how WBATG...

  9. European Train Control System: A Case Study in Formal Verification

    Science.gov (United States)

    Platzer, André; Quesel, Jan-David

    Complex physical systems have several degrees of freedom. They only work correctly when their control parameters obey corresponding constraints. Based on the informal specification of the European Train Control System (ETCS), we design a controller for its cooperation protocol. For its free parameters, we successively identify constraints that are required to ensure collision freedom. We formally prove the parameter constraints to be sharp by characterizing them equivalently in terms of reachability properties of the hybrid system dynamics. Using our deductive verification tool KeYmaera, we formally verify controllability, safety, liveness, and reactivity properties of the ETCS protocol that entail collision freedom. We prove that the ETCS protocol remains correct even in the presence of perturbation by disturbances in the dynamics. We verify that safety is preserved when a PI controlled speed supervision is used.

  10. NPP Temelin instrumentation and control system upgrade and verification

    International Nuclear Information System (INIS)

    Ubra, O.; Petrlik, J.

    1998-01-01

    Two units of Ver 1000 type of the Czech nuclear power plant Temelin, which are under construction are being upgraded with the latest instrumentation and control system delivered by WEC. To confirm that the functional design of the new Reactor Control and Limitation System, Turbine Control System and Plant Control System are in compliance with the Czech customer requirements and that these requirements are compatible with NPP Temelin upgraded technology, the verification of the control systems has been performed. The method of transient analysis has been applied. Some details of the NPP Temelin Reactor Control and Limitation System verification are presented.(author)

  11. Behavioral biometrics for verification and recognition of malicious software agents

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2008-04-01

    Homeland security requires technologies capable of positive and reliable identification of humans for law enforcement, government, and commercial applications. As artificially intelligent agents improve in their abilities and become a part of our everyday life, the possibility of using such programs for undermining homeland security increases. Virtual assistants, shopping bots, and game playing programs are used daily by millions of people. We propose applying statistical behavior modeling techniques developed by us for recognition of humans to the identification and verification of intelligent and potentially malicious software agents. Our experimental results demonstrate feasibility of such methods for both artificial agent verification and even for recognition purposes.

  12. IDEF method for designing seismic information system in CTBT verification

    International Nuclear Information System (INIS)

    Zheng Xuefeng; Shen Junyi; Jin Ping; Zhang Huimin; Zheng Jiangling; Sun Peng

    2004-01-01

    Seismic information system is of great importance for improving the capability of CTBT verification. A large amount of money has been appropriated for the research in this field in the U.S. and some other countries in recent years. However, designing and developing a seismic information system involves various technologies about complex system design. This paper discusses the IDEF0 method to construct function models and the IDEF1x method to make information models systemically, as well as how they are used in designing seismic information system in CTBT verification. (authors)

  13. Woodward Effect Experimental Verifications

    Science.gov (United States)

    March, Paul

    2004-02-01

    The work of J. F. Woodward (1990 1996a; 1996b; 1998; 2002a; 2002b; 2004) on the existence of ``mass fluctuations'' and their use in exotic propulsion schemes was examined for possible application in improving space flight propulsion and power generation. Woodward examined Einstein's General Relativity Theory (GRT) and assumed that if the strong Machian interpretation of GRT as well as gravitational / inertia like Wheeler-Feynman radiation reaction forces hold, then when an elementary particle is accelerated through a potential gradient, its rest mass should fluctuate around its mean value during its acceleration. Woodward also used GRT to clarify the precise experimental conditions necessary for observing and exploiting these mass fluctuations or ``Woodward effect'' (W-E). Later, in collaboration with his ex-graduate student T. Mahood, they also pushed the experimental verification boundaries of these proposals. If these purported mass fluctuations occur as Woodward claims, and his assumption that gravity and inertia are both byproducts of the same GRT based phenomenon per Mach's Principle is correct, then many innovative applications such as propellantless propulsion and gravitational exotic matter generators may be feasible. This paper examines the reality of mass fluctuations and the feasibility of using the W-E to design propellantless propulsion devices in the near to mid-term future. The latest experimental results, utilizing MHD-like force rectification systems, will also be presented.

  14. Enhanced Verification Test Suite for Physics Simulation Codes

    Energy Technology Data Exchange (ETDEWEB)

    Kamm, J R; Brock, J S; Brandon, S T; Cotrell, D L; Johnson, B; Knupp, P; Rider, W; Trucano, T; Weirs, V G

    2008-10-10

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations. The key points of this document are: (1) Verification deals with mathematical correctness of the numerical algorithms in a code, while validation deals with physical correctness of a simulation in a regime of interest. This document is about verification. (2) The current seven-problem Tri-Laboratory Verification Test Suite, which has been used for approximately five years at the DOE WP laboratories, is limited. (3) Both the methodology for and technology used in verification analysis have evolved and been improved since the original test suite was proposed. (4) The proposed test problems are in three basic areas: (a) Hydrodynamics; (b) Transport processes; and (c) Dynamic strength-of-materials. (5) For several of the proposed problems we provide a 'strong sense verification benchmark', consisting of (i) a clear mathematical statement of the problem with sufficient information to run a computer simulation, (ii) an explanation of how the code result and benchmark solution are to be evaluated, and (iii) a description of the acceptance criterion for simulation code results. (6) It is proposed that the set of verification test problems with which any particular code be evaluated include some of the problems described in this document. Analysis of the proposed verification test problems constitutes part of a necessary--but not sufficient--step that builds confidence in physics and engineering simulation codes. More complicated test cases, including physics models of

  15. Testing the implementation and sustainment facilitation (ISF) strategy as an effective adjunct to the Addiction Technology Transfer Center (ATTC) strategy: study protocol for a cluster randomized trial.

    Science.gov (United States)

    Garner, Bryan R; Zehner, Mark; Roosa, Mathew R; Martino, Steve; Gotham, Heather J; Ball, Elizabeth L; Stilen, Patricia; Speck, Kathryn; Vandersloot, Denna; Rieckmann, Traci R; Chaple, Michael; Martin, Erika G; Kaiser, David; Ford, James H

    2017-11-17

    Improving the extent to which evidence-based practices (EBPs)-treatments that have been empirically shown to be efficacious or effective-are integrated within routine practice is a well-documented challenge across numerous areas of health. In 2014, the National Institute on Drug Abuse funded a type 2 effectiveness-implementation hybrid trial titled the substance abuse treatment to HIV Care (SAT2HIV) Project. Aim 1 of the SAT2HIV Project tests the effectiveness of a motivational interviewing-based brief intervention (MIBI) for substance use as an adjunct to usual care within AIDS service organizations (ASOs) as part of its MIBI Experiment. Aim 2 of the SAT2HIV Project tests the effectiveness of implementation and sustainment facilitation (ISF) as an adjunct to the Addiction Technology Transfer Center (ATTC) model for training staff in motivational interviewing as part of its ISF Experiment. The current paper describes the study protocol for the ISF Experiment. Using a cluster randomized design, case management and leadership staff from 39 ASOs across the United States were randomized to receive either the ATTC strategy (control condition) or the ATTC + ISF strategy (experimental condition). The ATTC strategy is staff-focused and includes 10 discrete strategies (e.g., provide centralized technical assistance, conduct educational meetings, provide ongoing consultation). The ISF strategy is organization-focused and includes seven discrete strategies (e.g., use an implementation advisor, organize implementation team meetings, conduct cyclical small tests of change). Building upon the exploration-preparation-implementation-sustainment (EPIS) framework, the effectiveness of the ISF strategy is examined via three staff-level measures: (1) time-to-proficiency (i.e., preparation phase outcome), (2) implementation effectiveness (i.e., implementation phase outcome), and (3) level of sustainment (i.e., sustainment phase outcome). Although not without limitations, the ISF

  16. Testing the implementation and sustainment facilitation (ISF strategy as an effective adjunct to the Addiction Technology Transfer Center (ATTC strategy: study protocol for a cluster randomized trial

    Directory of Open Access Journals (Sweden)

    Bryan R. Garner

    2017-11-01

    Full Text Available Abstract Background Improving the extent to which evidence-based practices (EBPs—treatments that have been empirically shown to be efficacious or effective—are integrated within routine practice is a well-documented challenge across numerous areas of health. In 2014, the National Institute on Drug Abuse funded a type 2 effectiveness–implementation hybrid trial titled the substance abuse treatment to HIV Care (SAT2HIV Project. Aim 1 of the SAT2HIV Project tests the effectiveness of a motivational interviewing-based brief intervention (MIBI for substance use as an adjunct to usual care within AIDS service organizations (ASOs as part of its MIBI Experiment. Aim 2 of the SAT2HIV Project tests the effectiveness of implementation and sustainment facilitation (ISF as an adjunct to the Addiction Technology Transfer Center (ATTC model for training staff in motivational interviewing as part of its ISF Experiment. The current paper describes the study protocol for the ISF Experiment. Methods Using a cluster randomized design, case management and leadership staff from 39 ASOs across the United States were randomized to receive either the ATTC strategy (control condition or the ATTC + ISF strategy (experimental condition. The ATTC strategy is staff-focused and includes 10 discrete strategies (e.g., provide centralized technical assistance, conduct educational meetings, provide ongoing consultation. The ISF strategy is organization-focused and includes seven discrete strategies (e.g., use an implementation advisor, organize implementation team meetings, conduct cyclical small tests of change. Building upon the exploration–preparation–implementation–sustainment (EPIS framework, the effectiveness of the ISF strategy is examined via three staff-level measures: (1 time-to-proficiency (i.e., preparation phase outcome, (2 implementation effectiveness (i.e., implementation phase outcome, and (3 level of sustainment (i.e., sustainment phase outcome

  17. Advanced verification methods for OVI security ink

    Science.gov (United States)

    Coombs, Paul G.; McCaffery, Shaun F.; Markantes, Tom

    2006-02-01

    OVI security ink +, incorporating OVP security pigment* microflakes, enjoys a history of effective document protection. This security feature provides not only first-line recognition by the person on the street, but also facilitates machine-readability. This paper explores the evolution of OVI reader technology from proof-of-concept to miniaturization. Three different instruments have been built to advance the technology of OVI machine verification. A bench-top unit has been constructed which allows users to automatically verify a multitude of different banknotes and OVI images. In addition, high speed modules were fabricated and tested in a state of the art banknote sorting machine. Both units demonstrate the ability of modern optical components to illuminate and collect light reflected from the interference platelets within OVI ink. Electronic hardware and software convert and process the optical information in milliseconds to accurately determine the authenticity of the security feature. Most recently, OVI ink verification hardware has been miniaturized and simplified providing yet another platform for counterfeit protection. These latest devices provide a tool for store clerks and bank tellers to unambiguously determine the validity of banknotes in the time period it takes the cash drawer to be opened.

  18. FY 1995 report on verification of geothermal exploration technology. Development of fracture reservoir exploration technology (development of seismic exploration); 1995 nendo chinetsu tansa gijutsunado kensho chosa. Danretsugata choryuso tansaho kaihatsu (danseiha riyo tansaho kaihatsu) hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    This report provides the development of new exploration technology using elastic waves, such as reflection seismic survey, VSP, and seismic tomography, for precisely characterizing subsurface fractures in geothermal reservoirs. In order to investigate and improve the effective data acquisition and analysis methods for detecting a fault type of fractures, an experiment of a seismic tomography method was conducted using wells drilled in the Ogiri geothermal field, Aira-gun, Kagoshima Prefecture. An experiment of propagation characteristics of piezo type underground seismic source in the volcanic field was also conducted as a trend survey of underground seismic sources. The fracture type in the model field was systematically analyzed by measuring the core samples obtained in the demonstration test field through remanence measurement, fluid inclusion measurement, and zircon measurement using test equipment, and by analyzing results obtained from cores and results of seismic tomography obtained from the wells. Based on these results, the effectiveness and practical application of exploration methods using elastic waves were investigated. 80 refs., 250 figs., 49 tabs.

  19. Projected Impact of Compositional Verification on Current and Future Aviation Safety Risk

    Science.gov (United States)

    Reveley, Mary S.; Withrow, Colleen A.; Leone, Karen M.; Jones, Sharon M.

    2014-01-01

    The projected impact of compositional verification research conducted by the National Aeronautic and Space Administration System-Wide Safety and Assurance Technologies on aviation safety risk was assessed. Software and compositional verification was described. Traditional verification techniques have two major problems: testing at the prototype stage where error discovery can be quite costly and the inability to test for all potential interactions leaving some errors undetected until used by the end user. Increasingly complex and nondeterministic aviation systems are becoming too large for these tools to check and verify. Compositional verification is a "divide and conquer" solution to addressing increasingly larger and more complex systems. A review of compositional verification research being conducted by academia, industry, and Government agencies is provided. Forty-four aviation safety risks in the Biennial NextGen Safety Issues Survey were identified that could be impacted by compositional verification and grouped into five categories: automation design; system complexity; software, flight control, or equipment failure or malfunction; new technology or operations; and verification and validation. One capability, 1 research action, 5 operational improvements, and 13 enablers within the Federal Aviation Administration Joint Planning and Development Office Integrated Work Plan that could be addressed by compositional verification were identified.

  20. Evaluation factors for verification and validation of low-level waste disposal site models

    International Nuclear Information System (INIS)

    Moran, M.S.; Mezga, L.J.

    1982-01-01

    The purpose of this paper is to identify general evaluation factors to be used to verify and validate LLW disposal site performance models in order to assess their site-specific applicability and to determine their accuracy and sensitivity. It is intended that the information contained in this paper be employed by model users involved with LLW site performance model verification and validation. It should not be construed as providing protocols, but rather as providing a framework for the preparation of specific protocols or procedures. A brief description of each evaluation factor is provided. The factors have been categorized according to recommended use during either the model verification or the model validation process. The general responsibilities of the developer and user are provided. In many cases it is difficult to separate the responsibilities of the developer and user, but the user is ultimately accountable for both verification and validation processes. 4 refs

  1. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk [Korea Hydro and Nuclear Power Co. (KHNP), Central Research Institute, Daejeon (Korea, Republic of); Lyou, Joon [Dept. of Electronics Engineering, Chungnam National University, Daejeon (Korea, Republic of)

    2015-10-15

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  2. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    Directory of Open Access Journals (Sweden)

    Song-Hae Ye

    2015-10-01

    Full Text Available Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard, Internet Protocol (IP phones, personal digital assistant (PDA for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

  3. Verification of electromagnetic effects from wireless devices in operating nuclear power plants

    International Nuclear Information System (INIS)

    Ye, Song Hae; Kim, Young Sik; Lyou, Ho Sun; Kim, Min Suk; Lyou, Joon

    2015-01-01

    Wireless communication technologies, especially smart phones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smart phones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs

  4. VAMOS: The verification and monitoring options study: Current research options for in-situ monitoring and verification of contaminant remediation and containment within the vadose zone

    International Nuclear Information System (INIS)

    Betsill, J.D.; Gruebel, R.D.

    1995-09-01

    The Verification and Monitoring Options Study Project (VAMOS) was established to identify high-priority options for future vadose-zone environmental research in the areas of in-situ remediation monitoring, post-closure monitoring, and containment emplacement and verification monitoring. VAMOS examined projected needs not currently being met with applied technology in order to develop viable monitoring and verification research options. The study emphasized a compatible systems approach to reinforce the need for utilizing compatible components to provide user friendly site monitoring systems. To identify the needs and research options related to vadose-zone environmental monitoring and verification, a literature search and expert panel forums were conducted. The search included present drivers for environmental monitoring technology, technology applications, and research efforts. The forums included scientific, academic, industry, and regulatory environmental professionals as well as end users of environmental technology. The experts evaluated current and future monitoring and verification needs, methods for meeting these needs, and viable research options and directions. A variety of high-priority technology development, user facility, and technology guidance research options were developed and presented as an outcome of the literature search and expert panel forums

  5. A Hybrid Analysis for Security Protocols with State

    Science.gov (United States)

    2014-07-16

    http://www.mitre.org/publications/ technical-papers/completeness-of-cpsa. [19] Simon Meier, Cas Cremers , and David Basin. Efficient construction of...7] Cas Cremers and Sjouke Mauw. Operational semantics and verification of security protocols. Springer, 2012. [8] Anupam Datta, Ante Derek, John C

  6. Disarmament Verification - the OPCW Experience

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  7. Verification of Chemical Weapons Destruction

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  8. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  9. CASL Verification and Validation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Mousseau, Vincent Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dinh, Nam [North Carolina State Univ., Raleigh, NC (United States)

    2016-06-30

    This report documents the Consortium for Advanced Simulation of LWRs (CASL) verification and validation plan. The document builds upon input from CASL subject matter experts, most notably the CASL Challenge Problem Product Integrators, CASL Focus Area leaders, and CASL code development and assessment teams. This document will be a living document that will track progress on CASL to do verification and validation for both the CASL codes (including MPACT, CTF, BISON, MAMBA) and for the CASL challenge problems (CIPS, PCI, DNB). The CASL codes and the CASL challenge problems are at differing levels of maturity with respect to validation and verification. The gap analysis will summarize additional work that needs to be done. Additional VVUQ work will be done as resources permit. This report is prepared for the Department of Energy’s (DOE’s) CASL program in support of milestone CASL.P13.02.

  10. Technical challenges for dismantlement verification

    International Nuclear Information System (INIS)

    Olinger, C.T.; Stanbro, W.D.; Johnston, R.G.; Nakhleh, C.W.; Dreicer, J.S.

    1997-01-01

    In preparation for future nuclear arms reduction treaties, including any potential successor treaties to START I and II, the authors have been examining possible methods for bilateral warhead dismantlement verification. Warhead dismantlement verification raises significant challenges in the political, legal, and technical arenas. This discussion will focus on the technical issues raised by warhead arms controls. Technical complications arise from several sources. These will be discussed under the headings of warhead authentication, chain-of-custody, dismantlement verification, non-nuclear component tracking, component monitoring, and irreversibility. The authors will discuss possible technical options to address these challenges as applied to a generic dismantlement and disposition process, in the process identifying limitations and vulnerabilities. They expect that these considerations will play a large role in any future arms reduction effort and, therefore, should be addressed in a timely fashion

  11. Study of Wireless Transmission Protocol Technology for Use in Flight Line Environment to Assist the Data Loading and Downloading on Aircraft

    National Research Council Canada - National Science Library

    Meng, Ow

    2004-01-01

    ... into the use of wireless tmnsmission technology to complement or replace the manual method of loading the critical data file from the command station onto every F-16 aircraft, The present wireless technology...

  12. CTBT Integrated Verification System Evaluation Model

    Energy Technology Data Exchange (ETDEWEB)

    Edenburn, M.W.; Bunting, M.L.; Payne, A.C. Jr.

    1997-10-01

    Sandia National Laboratories has developed a computer based model called IVSEM (Integrated Verification System Evaluation Model) to estimate the performance of a nuclear detonation monitoring system. The IVSEM project was initiated in June 1994, by Sandia`s Monitoring Systems and Technology Center and has been funded by the US Department of Energy`s Office of Nonproliferation and National Security (DOE/NN). IVSEM is a simple, top-level, modeling tool which estimates the performance of a Comprehensive Nuclear Test Ban Treaty (CTBT) monitoring system and can help explore the impact of various sensor system concepts and technology advancements on CTBT monitoring. One of IVSEM`s unique features is that it integrates results from the various CTBT sensor technologies (seismic, infrasound, radionuclide, and hydroacoustic) and allows the user to investigate synergy among the technologies. Specifically, IVSEM estimates the detection effectiveness (probability of detection) and location accuracy of the integrated system and of each technology subsystem individually. The model attempts to accurately estimate the monitoring system`s performance at medium interfaces (air-land, air-water) and for some evasive testing methods such as seismic decoupling. This report describes version 1.2 of IVSEM.

  13. A hardware-software system for the automation of verification and calibration of oil metering units secondary equipment

    Science.gov (United States)

    Boyarnikov, A. V.; Boyarnikova, L. V.; Kozhushko, A. A.; Sekachev, A. F.

    2017-08-01

    In the article the process of verification (calibration) of oil metering units secondary equipment is considered. The purpose of the work is to increase the reliability and reduce the complexity of this process by developing a software and hardware system that provides automated verification and calibration. The hardware part of this complex carries out the commutation of the measuring channels of the verified controller and the reference channels of the calibrator in accordance with the introduced algorithm. The developed software allows controlling the commutation of channels, setting values on the calibrator, reading the measured data from the controller, calculating errors and compiling protocols. This system can be used for checking the controllers of the secondary equipment of the oil metering units in the automatic verification mode (with the open communication protocol) or in the semi-automatic verification mode (without it). The peculiar feature of the approach used is the development of a universal signal switch operating under software control, which can be configured for various verification methods (calibration), which allows to cover the entire range of controllers of metering units secondary equipment. The use of automatic verification with the help of a hardware and software system allows to shorten the verification time by 5-10 times and to increase the reliability of measurements, excluding the influence of the human factor.

  14. Formal Verification of Continuous Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer

    2012-01-01

    and the verification procedures should be algorithmically synthesizable. Autonomous control plays an important role in many safety-critical systems. This implies that a malfunction in the control system can have catastrophic consequences, e.g., in space applications where a design flaw can result in large economic...... losses. Furthermore, a malfunction in the control system of a surgical robot may cause death of patients. The previous examples involve complex systems that are required to operate according to complex specifications. The systems cannot be formally verified by modern verification techniques, due...

  15. K Basins Field Verification Program

    International Nuclear Information System (INIS)

    Booth, H.W.

    1994-01-01

    The Field Verification Program establishes a uniform and systematic process to ensure that technical information depicted on selected engineering drawings accurately reflects the actual existing physical configuration. This document defines the Field Verification Program necessary to perform the field walkdown and inspection process that identifies the physical configuration of the systems required to support the mission objectives of K Basins. This program is intended to provide an accurate accounting of the actual field configuration by documenting the as-found information on a controlled drawing

  16. Runtime Verification Through Forward Chaining

    Directory of Open Access Journals (Sweden)

    Alan Perotti

    2014-12-01

    Full Text Available In this paper we present a novel rule-based approach for Runtime Verification of FLTL properties over finite but expanding traces. Our system exploits Horn clauses in implication form and relies on a forward chaining-based monitoring algorithm. This approach avoids the branching structure and exponential complexity typical of tableaux-based formulations, creating monitors with a single state and a fixed number of rules. This allows for a fast and scalable tool for Runtime Verification: we present the technical details together with a working implementation.

  17. Nonintrusive verification attributes for excess fissile materials

    International Nuclear Information System (INIS)

    Nicholas, N.J.; Eccleston, G.W.; Fearey, B.L.

    1997-10-01

    Under US initiatives, over two hundred metric tons of fissile materials have been declared to be excess to national defense needs. These excess materials are in both classified and unclassified forms. The US has expressed the intent to place these materials under international inspections as soon as practicable. To support these commitments, members of the US technical community are examining a variety of nonintrusive approaches (i.e., those that would not reveal classified or sensitive information) for verification of a range of potential declarations for these classified and unclassified materials. The most troublesome and potentially difficult issues involve approaches for international inspection of classified materials. The primary focus of the work to date has been on the measurement of signatures of relevant materials attributes (e.g., element, identification number, isotopic ratios, etc.), especially those related to classified materials and items. The authors are examining potential attributes and related measurement technologies in the context of possible verification approaches. The paper will discuss the current status of these activities, including their development, assessment, and benchmarking status

  18. Monitoring/Verification Using DMS: TATP Example

    International Nuclear Information System (INIS)

    Kevin Kyle; Stephan Weeks

    2008-01-01

    Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a 'smart dust' sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. GC is the leading analytical method for the separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15-300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements

  19. DESIGN INFORMATION VERIFICATION FOR NUCLEAR SAFEGUARDS

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Bean; Richard R. M. Metcalf; Phillip C. Durst

    2009-07-01

    A critical aspect of international safeguards activities performed by the International Atomic Energy Agency (IAEA) is the verification that facility design and construction (including upgrades and modifications) do not create opportunities for nuclear proliferation. These Design Information Verification activities require that IAEA inspectors compare current and past information about the facility to verify the operator’s declaration of proper use. The actual practice of DIV presents challenges to the inspectors due to the large amount of data generated, concerns about sensitive or proprietary data, the overall complexity of the facility, and the effort required to extract just the safeguards relevant information. Planned and anticipated facilities will (especially in the case of reprocessing plants) be ever larger and increasingly complex, thus exacerbating the challenges. This paper reports the results of a workshop held at the Idaho National Laboratory in March 2009, which considered technologies and methods to address these challenges. The use of 3D Laser Range Finding, Outdoor Visualization System, Gamma-LIDAR, and virtual facility modeling, as well as methods to handle the facility data issues (quantity, sensitivity, and accessibility and portability for the inspector) were presented. The workshop attendees drew conclusions about the use of these techniques with respect to successfully employing them in an operating environment, using a Fuel Conditioning Facility walk-through as a baseline for discussion.

  20. What Diplomacy in the Ancient Near East Can Tell Us About Blockchain Technology

    Directory of Open Access Journals (Sweden)

    Chris Berg

    2017-12-01

    Full Text Available A blockchain is an institutional technology—a protocol—that allows for economic coordination between agents separated by boundaries of possible mistrust. Blockchains are not the only technology in history to have these characteristics. The paper looks at the role of the diplomatic protocol at the very beginning of human civilisation in the ancient near east. These two protocols—diplomatic and blockchain—have significant similarities. They were created to address to similar economic problems using similar mechanisms: a permanent record of past dealings, public and ritualistic verification of transactions, and game-theoretic mechanisms of reciprocity. The development of the diplomatic protocol allowed for the creation of the first international community and facilitated patterns of peaceful trade and exchange. Some questions about a generalised ‘protocol economics’ are drawn.

  1. A Scalable Approach for Hardware Semiformal Verification

    OpenAIRE

    Grimm, Tomas; Lettnin, Djones; Hübner, Michael

    2018-01-01

    The current verification flow of complex systems uses different engines synergistically: virtual prototyping, formal verification, simulation, emulation and FPGA prototyping. However, none is able to verify a complete architecture. Furthermore, hybrid approaches aiming at complete verification use techniques that lower the overall complexity by increasing the abstraction level. This work focuses on the verification of complex systems at the RT level to handle the hardware peculiarities. Our r...

  2. Test/QA Plan for Verification of Radio Frequency Identification (RFID) for Tracking Hazardous Waste Shipments across International Borders

    Science.gov (United States)

    The verification test will be conducted under the auspices of the U.S. Environmental Protection Agency (EPA) through the Environmental Technology Verification (ETV) Program. It will be performed by Battelle, which is managing the ETV Advanced Monitoring Systems (AMS) Center throu...

  3. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  4. Likelihood-ratio-based biometric verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    2002-01-01

    This paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that for single-user verification the likelihood ratio is optimal.

  5. Likelihood Ratio-Based Biometric Verification

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    The paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that, for single-user verification, the likelihood ratio is optimal.

  6. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  7. Automated Verification of Virtualized Infrastructures

    DEFF Research Database (Denmark)

    Bleikertz, Sören; Gross, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    Virtualized infrastructures and clouds present new challenges for security analysis and formal verification: they are complex environments that continuously change their shape, and that give rise to non-trivial security goals such as isolation and failure resilience requirements. We present a pla...

  8. Future of monitoring and verification

    International Nuclear Information System (INIS)

    Wagenmakers, H.

    1991-01-01

    The organized verification entrusted to IAEA for the implementation of the NPT, of the Treaty of Tlatelolco and of the Treaty of Rarotonga, reaches reasonable standards. The current dispute with the Democratic People's Republic of Korea about the conclusion of a safeguards agreement with IAEA, by its exceptional nature, underscores rather than undermines the positive judgement to be passed on IAEA's overall performance. The additional task given to the Director General of IAEA under Security Council resolution 687 (1991) regarding Iraq's nuclear-weapons-usable material is particularly challenging. For the purposes of this paper, verification is defined as the process for establishing whether the States parties are complying with an agreement. In the final stage verification may lead into consideration of how to respond to non-compliance. Monitoring is perceived as the first level in the verification system. It is one generic form of collecting information on objects, activities or events and it involves a variety of instruments ranging from communications satellites to television cameras or human inspectors. Monitoring may also be used as a confidence-building measure

  9. Hot cell verification facility update

    International Nuclear Information System (INIS)

    Titzler, P.A.; Moffett, S.D.; Lerch, R.E.

    1985-01-01

    The Hot Cell Verification Facility (HCVF) provides a prototypic hot cell mockup to check equipment for functional and remote operation, and provides actual hands-on training for operators. The facility arrangement is flexible and assists in solving potential problems in a nonradioactive environment. HCVF has been in operation for six years, and the facility is a part of the Hanford Engineering Development Laboratory

  10. Static Verification for Code Contracts

    Science.gov (United States)

    Fähndrich, Manuel

    The Code Contracts project [3] at Microsoft Research enables programmers on the .NET platform to author specifications in existing languages such as C# and VisualBasic. To take advantage of these specifications, we provide tools for documentation generation, runtime contract checking, and static contract verification.

  11. Verification of safety critical software

    International Nuclear Information System (INIS)

    Son, Ki Chang; Chun, Chong Son; Lee, Byeong Joo; Lee, Soon Sung; Lee, Byung Chai

    1996-01-01

    To assure quality of safety critical software, software should be developed in accordance with software development procedures and rigorous software verification and validation should be performed. Software verification is the formal act of reviewing, testing of checking, and documenting whether software components comply with the specified requirements for a particular stage of the development phase[1]. New software verification methodology was developed and was applied to the Shutdown System No. 1 and 2 (SDS1,2) for Wolsung 2,3 and 4 nuclear power plants by Korea Atomic Energy Research Institute(KAERI) and Atomic Energy of Canada Limited(AECL) in order to satisfy new regulation requirements of Atomic Energy Control Boars(AECB). Software verification methodology applied to SDS1 for Wolsung 2,3 and 4 project will be described in this paper. Some errors were found by this methodology during the software development for SDS1 and were corrected by software designer. Outputs from Wolsung 2,3 and 4 project have demonstrated that the use of this methodology results in a high quality, cost-effective product. 15 refs., 6 figs. (author)

  12. Eggspectation : organic egg verification tool

    NARCIS (Netherlands)

    Ruth, van S.M.; Hoogenboom, L.A.P.

    2011-01-01

    In 2009 RIKILT conducted a study on about 2,000 eggs to evaluate three different analytical verification methods: carotenoid profiling, fatty acid profiling and isotope ratio mass spectrometry. The eggs were collected from about 50 Dutch farms. The selection was based on the farms’ location and

  13. A briefing to verification and validation of computer software

    International Nuclear Information System (INIS)

    Zhang Aisen; Xie Yalian

    2012-01-01

    Nowadays, the computer equipment and information processing technology is coming into the engineering of instrument and process control. Owing to its convenient and other advantages, more and more utilities are more than happy to use it. After initial utilization in basic functional controlling, the computer equipment and information processing technology is widely used in safety critical control. Consequently, the people pay more attentions to the quality of computer software. How to assess and ensure its quality are the most concerned problems. The verification and validation technology of computer software are important steps to the quality assurance. (authors)

  14. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  15. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  16. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  17. University of Washington/ Northwest National Marine Renewable Energy Center Tidal Current Technology Test Protocol, Instrumentation, Design Code, and Oceanographic Modeling Collaboration: Cooperative Research and Development Final Report, CRADA Number CRD-11-452

    Energy Technology Data Exchange (ETDEWEB)

    Driscoll, Frederick R. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2016-11-01

    The University of Washington (UW) - Northwest National Marine Renewable Energy Center (UW-NNMREC) and the National Renewable Energy Laboratory (NREL) will collaborate to advance research and development (R&D) of Marine Hydrokinetic (MHK) renewable energy technology, specifically renewable energy captured from ocean tidal currents. UW-NNMREC is endeavoring to establish infrastructure, capabilities and tools to support in-water testing of marine energy technology. NREL is leveraging its experience and capabilities in field testing of wind systems to develop protocols and instrumentation to advance field testing of MHK systems. Under this work, UW-NNMREC and NREL will work together to develop a common instrumentation system and testing methodologies, standards and protocols. UW-NNMREC is also establishing simulation capabilities for MHK turbine and turbine arrays. NREL has extensive experience in wind turbine array modeling and is developing several computer based numerical simulation capabilities for MHK systems. Under this CRADA, UW-NNMREC and NREL will work together to augment single device and array modeling codes. As part of this effort UW NNMREC will also work with NREL to run simulations on NREL's high performance computer system.

  18. Role of IGRT in patient positioning and verification

    International Nuclear Information System (INIS)

    Mijnheer, Ben

    2008-01-01

    Image-guided radiation therapy is 'Frequent imaging in the treatment room during a course of radiotherapy to guide the treatment process'. Instrumentation related to IGRT is highlighted. Focus of the lecture was on clinical experience gained by NKI-AVL, such as the use of EPID (electronic portal imaging devices) and CBCT (cone beam computed tomography) and their comparison: good results for head and neck and prostate/bladder patients: portal imaging was replaced by CBCT. After further investigation convincing results for lung patients were obtained: portal imaging was replaced by CBCT. Scan protocols were developed for these patient groups. Since February 2004 CBCT-based decision rules have been developed for: Head and Neck (Bony anatomy); Prostate (Bony anatomy; Soft tissue registration); Lung (Bony anatomy, Soft tissue registration); Brain (Bony anatomy); and Breast, bladder and liver (in progress). Final remarks are as follows: The introduction of various IGRT techniques allowed 3D verification of the position of target volumes and organs at risk just before or during treatment. Because the information is in 3D, or sometimes even in 4D, in principle these IGRT approaches provide more information compared to the use of 2D verification methods (e.g. EPIDs). Clinical data are becoming available to assess quantitatively for which treatment techniques IGRT approaches are advantageous compared to the use of conventional verification methods taking the additional resources (time, money, manpower) into account. (P.A.)

  19. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    OpenAIRE

    Jin-Won Park; Sung Bum Pan; Yongwha Chung; Daesung Moon

    2009-01-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification i...

  20. Fiscal 1987 Sunshine Program achievement report. Development for practical application of photovoltaic system (Verification of experimental low cost silicon refining - Development of technology for chlorosilane hydrogen-reduction process); 1987 nendo taiyoko hatsuden system jitsuyoka gijutsu kaihatsu seika hokokusho. Tei cost silicon jikken seisei kensho (Chlorosilane no suiso kangen kotei no gijutsu kaihatsu)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1988-03-01

    Since its construction in 1982, the experimental device capable of 10 tons/year production of SOG (spun on glass)-Si has been in operation, and the trichlorosilane processing fluidized bed reactor has achieved its goals in performance and product quality. Element studies continue for the enlargement of the reactor unit for practical application and for the designing of a large plant of the commercially viable scale. In fiscal 1987, element studies are conducted for the enlargement of the reactor unit. Concerning the development of technologies for the manufacture of large reactor tubes strong enough to withstand practical application, efforts are made to strengthen materials for the fabrication of reactor element tubes (230mm and 500mm in diameter), to develop SiC-CVD (chemical vapor deposition) technology to provide reactor tube materials with resistance to corrosion, and to develop a single reactor tube structure indispensable for device enlargement. For the verification of such element technologies, in line with the study of experimental device operation capable of 10 tons/year SOG-Si production, studies are conducted on continuous stable operation technologies for the fluidized bed reactor, maintenance and improvement of product quality, and enhancement of durability of constituent parts and components. (NEDO)

  1. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  2. Evaluation of a lateral flow-based technology card for blood typing using a simplified protocol in a model of extreme blood sampling conditions.

    Science.gov (United States)

    Clavier, Benoît; Pouget, Thomas; Sailliol, Anne

    2018-02-01

    Life-threatening situations requiring blood transfusion under extreme conditions or in remote and austere locations, such as the battlefield or in traffic accidents, would benefit from reliable blood typing practices that are easily understood by a nonscientist or nonlaboratory technician and provide quick results. A simplified protocol was developed for the lateral flow-based device MDmulticard ABO-D-Rh subgroups-K. Its performance was compared to a reference method (PK7300, Beckman Coulter) in native blood samples from donors. The method was tested on blood samples stressed in vitro as a model of hemorrhage cases (through hemodilution using physiologic serum) and dehydration (through hemoconcentration by removing an aliquot of plasma after centrifugation), respectively. A total of 146 tests were performed on 52 samples; 126 in the hemodilution group (42 for each native, diluted 1/2, and diluted 1/4 samples) and 20 in the hemoconcentration group (10 for each native and 10% concentrated samples). Hematocrit in the tested samples ranged from 9.8% to 57.6% while hemoglobin levels ranged from 3.2 to 20.1 g/dL. The phenotype profile detected with the MDmulticard using the simplified protocol resulted in 22 A, seven B, 20 O, and three AB, of which nine were D- and five were Kell positive. No discrepancies were found with respect to the results obtained with the reference method. The simplified protocol for MDmulticard use could be considered a reliable method for blood typing in extreme environment or emergency situations, worsened by red blood cell dilution or concentration. © 2017 AABB.

  3. IAEA to implement Safeguards Additional Protocols in the EU

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: IAEA Director General Mohamed ElBaradei welcomed the entry into force today of the Additional Protocols for 15 States of the European Union - France, the United Kingdom and the 13 non-nuclear weapon States of the EU - and the European Atomic Energy Community (EURATOM). The Protocols, which provide the Agency with better tools to verify compliance with nuclear non-proliferation commitments, entered into force when the European Commission informed the Agency that EURATOM's own requirements for entry into force had been met. The 15 States had provided similar notifications over the past years since signing the Protocols in 1998. The simultaneous entry into force of Additional Protocols for the 15 EU States is 'a very positive development and a milestone in our efforts to strengthen the verification regime', said Dr. ElBaradei. 'In my view, the Additional Protocol should become the standard for verification under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT).' He added that the Agency had been preparing for the entry into force of the EU protocols and was confident that, in co-operation with the 15 States and EURATOM, it would be able to ensure effective and efficient implementation in the EU States. The Model Additional Protocol was developed following the discovery of Iraq's clandestine nuclear weapons programme to ensure that the IAEA is given the information and access it needs for timely discovery of any similar activities in States that have pledged not to use nuclear material and activities for weapons purposes. In the past year, Additional Protocols entered into force for 22 countries, and the Agency will now implement Additional Protocols in 58 States, which includes the 15 EU States. The 10 countries joining the EU on 1 May 2004 - seven of which already have brought into force Additional Protocols to their respective safeguards agreements - are expected to gradually accede to the Safeguards Agreement and Additional Protocol covering

  4. Methods of Verification, Accountability and Control of Special Nuclear Material

    International Nuclear Information System (INIS)

    Stewart, J.E.

    1999-01-01

    This session demonstrates nondestructive assay (NDA) measurement, surveillance and analysis technology required to protect, control and account (MPC and A) for special nuclear materials (SNM) in sealed containers. These measurements, observations and analyses comprise state-of-the art, strengthened, SNM safeguards systems. Staff member specialists, actively involved in research, development, training and implementation worldwide, will present six NDA verification systems and two software tools for integration and analysis of facility MPC and A data

  5. Evaluation of verification methods for input-accountability measurements

    International Nuclear Information System (INIS)

    Maeck, W.J.

    1980-01-01

    As part of TASTEX related programs two independent methods have been evaluated for the purpose of providing verification of the amount of Pu charged to the head-end of a nuclear fuel processing plant. The first is the Pu/U (gravimetric method), TASTEX Task-L, and the second is the Tracer Method, designated Task-M. Summaries of the basic technology, results of various studies under actual plant conditions, future requirements, are given for each of the Tasks

  6. Experimental verification of internal dosimetry calculations. Annual progress report

    International Nuclear Information System (INIS)

    1980-05-01

    During the past year a dosimetry research program has been established in the School of Nuclear Engineering at the Georgia Institute of Technology. The major objective of this program has been to provide research results upon which a useful internal dosimetry system could be based. The important application of this dosimetry system will be the experimental verification of internal dosimetry calculations such as those published by the MIRD Committee

  7. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    International Nuclear Information System (INIS)

    Luke, S.J.

    2011-01-01

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  8. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    Energy Technology Data Exchange (ETDEWEB)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  9. Synergies across verification regimes: Nuclear safeguards and chemical weapons convention compliance

    International Nuclear Information System (INIS)

    Kadner, Steven P.; Turpen, Elizabeth

    2001-01-01

    In the implementation of all arms control agreements, accurate verification is essential. In setting a course for verifying compliance with a given treaty - whether the NPT or the CWC, one must make a technical comparison of existing information-gathering capabilities against the constraints in an agreement. Then it must be decided whether this level of verifiability is good enough. Generally, the policy standard of 'effective verification' includes the ability to detect significant violations, with high confidence, in sufficient time to respond effectively with policy adjustments or other responses, as needed. It is at this juncture where verification approaches have traditionally diverged. Nuclear safeguards requirements have taken one path while chemical verification methods have pursued another. However, recent technological advances have brought a number of changes affecting verification, and lately their pace has been accelerating. First, all verification regimes have more and better information as a result of new kinds of sensors, imagery, and other technologies. Second, the verification provisions in agreements have also advanced, to include on-site inspections, portal monitoring, data exchanges, and a variety of transparency, confidence-building, and other cooperative measures, Together these developments translate into a technological overlap of certain institutional verification measures such as the NPT's safeguards requirements and the IAEA and the CWC's verification visions and the OPCW. Hence, a priority of international treaty-implementing organizations is exploring the development of a synergistic and coordinated approach to WMD policy making that takes into account existing inter-linkages between nuclear, chemical, and biological weapons issues. Specific areas of coordination include harmonizing information systems and information exchanges and the shared application of scientific mechanisms, as well as collaboration on technological developments

  10. Design and Verification of Critical Pressurised Windows for Manned Spaceflight

    Science.gov (United States)

    Lamoure, Richard; Busto, Lara; Novo, Francisco; Sinnema, Gerben; Leal, Mendes M.

    2014-06-01

    The Window Design for Manned Spaceflight (WDMS) project was tasked with establishing the state-of-art and explore possible improvements to the current structural integrity verification and fracture control methodologies for manned spacecraft windows.A critical review of the state-of-art in spacecraft window design, materials and verification practice was conducted. Shortcomings of the methodology in terms of analysis, inspection and testing were identified. Schemes for improving verification practices and reducing conservatism whilst maintaining the required safety levels were then proposed.An experimental materials characterisation programme was defined and carried out with the support of the 'Glass and Façade Technology Research Group', at the University of Cambridge. Results of the sample testing campaign were analysed, post-processed and subsequently applied to the design of a breadboard window demonstrator.Two Fused Silica glass window panes were procured and subjected to dedicated analyses, inspection and testing comprising both qualification and acceptance programmes specifically tailored to the objectives of the activity.Finally, main outcomes have been compiled into a Structural Verification Guide for Pressurised Windows in manned spacecraft, incorporating best practices and lessons learned throughout this project.

  11. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  12. Results of verifications of the control automatic exposure in equipment of RX with CR systems; Resultados de las verificaciones del control automatico de exposicion en equipos de RX con sistemas CR

    Energy Technology Data Exchange (ETDEWEB)

    Ruiz Manzano, P.; Rivas Ballarin, M. A.; Ortega Pardina, P.; Villa Gazulla, D.; Calvo Carrillo, S.; Canellas Anoz, M.; Millan Cebrian, E.

    2013-07-01

    After the entry into force in 2012, the new Spanish Radiology quality control protocol lists and discusses the results obtained after verification of the automatic control of exposure in computed radiography systems. (Author)

  13. Applying State-of-the-Art Technologies to Reduce Escape Times from Fires Using Environmental Sensing, Improved Occupant Egress Guidance, and Multiple Communication Protocols

    National Research Council Canada - National Science Library

    Street, Thomas T; Hammond, Mark H; Williams, Frederick W

    2009-01-01

    ...) was tasked with investigating various technology and concepts--such as visual signals and unique audible sounds--that have the potential to improve residential occupant escape in the event of fire...

  14. Technology.

    Science.gov (United States)

    Online-Offline, 1998

    1998-01-01

    Focuses on technology, on advances in such areas as aeronautics, electronics, physics, the space sciences, as well as computers and the attendant progress in medicine, robotics, and artificial intelligence. Describes educational resources for elementary and middle school students, including Web sites, CD-ROMs and software, videotapes, books,…

  15. Authentication Protocols for Internet of Things: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Mohamed Amine Ferrag

    2017-01-01

    Full Text Available In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1 Machine to Machine Communications (M2M, (2 Internet of Vehicles (IoV, (3 Internet of Energy (IoE, and (4 Internet of Sensors (IoS. Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.

  16. Land surface Verification Toolkit (LVT)

    Science.gov (United States)

    Kumar, Sujay V.

    2017-01-01

    LVT is a framework developed to provide an automated, consolidated environment for systematic land surface model evaluation Includes support for a range of in-situ, remote-sensing and other model and reanalysis products. Supports the analysis of outputs from various LIS subsystems, including LIS-DA, LIS-OPT, LIS-UE. Note: The Land Information System Verification Toolkit (LVT) is a NASA software tool designed to enable the evaluation, analysis and comparison of outputs generated by the Land Information System (LIS). The LVT software is released under the terms and conditions of the NASA Open Source Agreement (NOSA) Version 1.1 or later. Land Information System Verification Toolkit (LVT) NOSA.

  17. Ontology Matching with Semantic Verification.

    Science.gov (United States)

    Jean-Mary, Yves R; Shironoshita, E Patrick; Kabuka, Mansur R

    2009-09-01

    ASMOV (Automated Semantic Matching of Ontologies with Verification) is a novel algorithm that uses lexical and structural characteristics of two ontologies to iteratively calculate a similarity measure between them, derives an alignment, and then verifies it to ensure that it does not contain semantic inconsistencies. In this paper, we describe the ASMOV algorithm, and then present experimental results that measure its accuracy using the OAEI 2008 tests, and that evaluate its use with two different thesauri: WordNet, and the Unified Medical Language System (UMLS). These results show the increased accuracy obtained by combining lexical, structural and extensional matchers with semantic verification, and demonstrate the advantage of using a domain-specific thesaurus for the alignment of specialized ontologies.

  18. Novel augmented reality solution for improving health literacy around antihypertensives in people living with type 2 diabetes mellitus: protocol of a technology evaluation study

    Science.gov (United States)

    Ahmadvand, Alireza; Drennan, Judy; Burgess, Jean; Clark, Michele; Kavanagh, David; Burns, Kara; Howard, Sarah; Kelly, Fleur; Campbell, Chris; Nissen, Lisa

    2018-01-01

    Introduction Low health literacy is common in people with type 2 diabetes mellitus (T2DM) (up to 40%), associated with decreased self-efficacy in managing T2DM and its important complications, mainly hypertension. This study introduces, for the first time, an easy-to-use solution based on augmented reality (AR) on smartphones, to enhance health literacy around antihypertensive medicines. It assesses the feasibility of the solution for improving health literacy, oriented specifically to angiotensin II receptor blockers; embedding the health literacy improvement into the use cycle of angiotensin II receptor blockers and providing continuous access to information as a form of patient engagement. Methods and analysis This is a technology evaluation study with one technology group (AR plus usual care) and one non-technology group (usual care). Both groups receive face-to-face communications with community pharmacists regarding angiotensin II receptor blockers; the technology group receive additional AR-enhanced digital consumer medicine information throughout the use of their medications. The primary outcome is the change in health literacy and the hypothesis is that the proportions of people who show high health literacy will be larger in the technology group. Mixed effects models will be used to analyse solution effectiveness on outcomes. Multiple regression models will be used to find additional variables that might affect the relationship between health literacy and the AR solution. Ethics and dissemination Queensland University of Technology (QUT) Human Research Ethics Committee has approved the study as a low-risk technology evaluation study (approval number: 1700000275). Findings will be disseminated via attending scientific conferences and publishing in peer-reviewed journals. Facilitated by QUT, two press releases have been published in public media and two presentations have been made in university classrooms. PMID:29705754

  19. Novel augmented reality solution for improving health literacy around antihypertensives in people living with type 2 diabetes mellitus: protocol of a technology evaluation study.

    Science.gov (United States)

    Ahmadvand, Alireza; Drennan, Judy; Burgess, Jean; Clark, Michele; Kavanagh, David; Burns, Kara; Howard, Sarah; Kelly, Fleur; Campbell, Chris; Nissen, Lisa

    2018-04-28

    Low health literacy is common in people with type 2 diabetes mellitus (T2DM) (up to 40%), associated with decreased self-efficacy in managing T2DM and its important complications, mainly hypertension. This study introduces, for the first time, an easy-to-use solution based on augmented reality (AR) on smartphones, to enhance health literacy around antihypertensive medicines. It assesses the feasibility of the solution for improving health literacy, oriented specifically to angiotensin II receptor blockers; embedding the health literacy improvement into the use cycle of angiotensin II receptor blockers and providing continuous access to information as a form of patient engagement. This is a technology evaluation study with one technology group (AR plus usual care) and one non-technology group (usual care). Both groups receive face-to-face communications with community pharmacists regarding angiotensin II receptor blockers; the technology group receive additional AR-enhanced digital consumer medicine information throughout the use of their medications. The primary outcome is the change in health literacy and the hypothesis is that the proportions of people who show high health literacy will be larger in the technology group. Mixed effects models will be used to analyse solution effectiveness on outcomes. Multiple regression models will be used to find additional variables that might affect the relationship between health literacy and the AR solution. Queensland University of Technology (QUT) Human Research Ethics Committee has approved the study as a low-risk technology evaluation study (approval number: 1700000275). Findings will be disseminated via attending scientific conferences and publishing in peer-reviewed journals. Facilitated by QUT, two press releases have been published in public media and two presentations have been made in university classrooms. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All

  20. Test/QA Plan For Verification Of Anaerobic Digester For Energy Production And Pollution Prevention

    Science.gov (United States)

    The ETV-ESTE Program conducts third-party verification testing of commercially available technologies that improve the environmental conditions in the U.S. A stakeholder committee of buyers and users of such technologies guided the development of this test on anaerobic digesters...

  1. Mobile Pit verification system design based on passive special nuclear material verification in weapons storage facilities

    Energy Technology Data Exchange (ETDEWEB)

    Paul, J. N.; Chin, M. R.; Sjoden, G. E. [Nuclear and Radiological Engineering Program, George W. Woodruff School of Mechanical Engineering, Georgia Institute of Technology, 770 State St, Atlanta, GA 30332-0745 (United States)

    2013-07-01

    A mobile 'drive by' passive radiation detection system to be applied in special nuclear materials (SNM) storage facilities for validation and compliance purposes has been designed through the use of computational modeling and new radiation detection methods. This project was the result of work over a 1 year period to create optimal design specifications to include creation of 3D models using both Monte Carlo and deterministic codes to characterize the gamma and neutron leakage out each surface of SNM-bearing canisters. Results were compared and agreement was demonstrated between both models. Container leakages were then used to determine the expected reaction rates using transport theory in the detectors when placed at varying distances from the can. A 'typical' background signature was incorporated to determine the minimum signatures versus the probability of detection to evaluate moving source protocols with collimation. This established the criteria for verification of source presence and time gating at a given vehicle speed. New methods for the passive detection of SNM were employed and shown to give reliable identification of age and material for highly enriched uranium (HEU) and weapons grade plutonium (WGPu). The finalized 'Mobile Pit Verification System' (MPVS) design demonstrated that a 'drive-by' detection system, collimated and operating at nominally 2 mph, is capable of rapidly verifying each and every weapon pit stored in regularly spaced, shelved storage containers, using completely passive gamma and neutron signatures for HEU and WGPu. This system is ready for real evaluation to demonstrate passive total material accountability in storage facilities. (authors)

  2. Verification of industrial x-ray machine: MINTs experience

    International Nuclear Information System (INIS)

    Aziz Amat; Saidi Rajab; Eesan Pasupathi; Saipo Bahari Abdul Ratan; Shaharudin Sayuti; Abd Nassir Ibrahim; Abd Razak Hamzah

    2005-01-01

    Radiation and electrical safety of the industrial x-ray equipment required to meet Atomic Energy Licensing Board(AELB) guidelines ( LEM/TEK/42 ) at the time of installation and subsequently a periodic verification should be ensured. The purpose of the guide is to explain the requirements employed in conducting the test on industrial x-ray apparatus and be certified in meeting with our local legislative and regulation. Verification is aimed to provide safety assurance information on electrical requirements and the minimum radiation exposure to the operator. This regulation is introduced on new models imported into the Malaysian market. Since June, 1997, Malaysian Institute for Nuclear Technology Research (MINT) has been approved by AELB to provide verification services to private company, government and corporate body throughout Malaysia. Early January 1997, AELB has made it mandatory that all x-ray equipment for industrial purpose (especially Industrial Radiography) must fulfill certain performance test based on the LEM/TEK/42 guidelines. MINT as the third party verification encourages user to improve maintenance of the equipment. MINT experiences in measuring the performance on intermittent and continuous duty rating single-phase industrial x-ray machine in the year 2004 indicated that all of irradiating apparatus tested pass the test and met the requirements of the guideline. From MINT record, 1997 to 2005 , three x-ray models did not meet the requirement and thus not allowed to be used unless the manufacturers willing to modify it to meet AELB requirement. This verification procedures on electrical and radiation safety on industrial x-ray has significantly improved the the maintenance cultures and safety awareness in the usage of x-ray apparatus in the industrial environment. (Author)

  3. An Unattended Verification Station for UF6 Cylinders: Development Status

    International Nuclear Information System (INIS)

    Smith, E.; McDonald, B.; Miller, K.; Garner, J.; March-Leuba, J.; Poland, R.

    2015-01-01

    In recent years, the International Atomic Energy Agency (IAEA) has pursued innovative techniques and an integrated suite of safeguards measures to address the verification challenges posed by advanced centrifuge technologies and the growth in separative work unit capacity at modern centrifuge enrichment plants. These measures would include permanently installed, unattended instruments capable of performing the routine and repetitive measurements previously performed by inspectors. Among the unattended instruments currently being explored by the IAEA is an Unattended Cylinder Verification Stations (UCVS) that could provide independent verification of the declared relative enrichment, U-235 mass and total uranium mass of all declared cylinders moving through the plant, as well as the application and verification of a ''Non-destructive Assay Fingerprint'' to preserve verification knowledge on the contents of each cylinder throughout its life in the facility. As IAEA's vision for a UCVS has evolved, Pacific Northwest National Laboratory (PNNL) and Los Alamos National Laboratory have been developing and testing candidate non-destructive assay (NDA) methods for inclusion in a UCVS. Modeling and multiple field campaigns have indicated that these methods are capable of assaying relative cylinder enrichment with a precision comparable to or substantially better than today's high-resolution handheld devices, without the need for manual wall-thickness corrections. In addition, the methods interrogate the full volume of the cylinder, thereby offering the IAEA a new capability to assay the absolute U-235 mass in the cylinder, and much-improved sensitivity to substituted or removed material. Building on this prior work, and under the auspices of the United States Support Programme to the IAEA, a UCVS field prototype is being developed and tested. This paper provides an overview of: a) hardware and software design of the prototypes, b) preparation

  4. The threat of a dirty bomb and possible verification measures

    International Nuclear Information System (INIS)

    Meer, Klaas van der; Hardeman, Frank; Meier, Oliver

    2003-01-01

    source term, the damage due to the dispersion of radioactive material can be assessed. Radioactive material for a dirty bomb is currently easier to obtain for non-state actors than safeguarded fissile material. The current safeguards system for fissile material is not designed to address the diversion of radiological material to states or non-state actors intent on constructing a radiological device. The paper examines possible lessons from the transparency, monitoring, verification, material accountancy and other control measures under the Chemical Weapons Convention and those discussed under a compliance protocol for the Biological Weapons Convention. Preventing acts of terrorism involving materials for weapons of mass destruction requires effective oversight and control of dual-use activities and material. The paper discusses differences and similarities between the biological, chemical and nuclear control regime and draws preliminary conclusions about ways to strengthen the control of radiological materials

  5. Genomics protocols [Methods in molecular biology, v. 175

    National Research Council Canada - National Science Library

    Starkey, Michael P; Elaswarapu, Ramnath

    2001-01-01

    .... Drawing on emerging technologies in the fields of bioinformatics and proteomics, these protocols cover not only those traditionally recognized as genomics, but also early therapeutich approaches...

  6. Impact of new technologies on stress, attrition and well-being in emergency call centers: the NextGeneration 9-1-1 study protocol.

    Science.gov (United States)

    Baseman, Janet; Revere, Debra; Painter, Ian; Stangenes, Scott; Lilly, Michelle; Beaton, Randal; Calhoun, Rebecca; Meischke, Hendrika

    2018-05-04

    Our public health emergency response system relies on the "first of the first responders"-the emergency call center workforce that handles the emergency needs of a public in distress. Call centers across the United States have been preparing for the "Next Generation 9-1-1" initiative, which will allow citizens to place 9-1-1 calls using a variety of digital technologies. The impacts of this initiative on a workforce that is already highly stressed is unknown. There is concern that these technology changes will increase stress, reduce job performance, contribute to maladaptive coping strategies, lower employee retention, or change morale in the workplace. Understanding these impacts to inform approaches for mitigating the health and performance risks associated with new technologies is crucial for ensuring the 911 system fulfills its mission of providing optimal emergency response to the public. Our project is an observational, prospective cohort study framed by the first new technology that will be implemented: text-to-911 calling. Emergency center call takers will be recruited nationwide. Data will be collected by online surveys distributed at each center before text-to-911 implementation; within the first month of implementation; and 6 months after implementation. Primary outcome measures are stress as measured by the Calgary Symptoms of Stress Index, use of sick leave, job performance, and job satisfaction. Primary analyses will use mixed effects regression models and mixed effects logistic regression models to estimate the change in outcome variables associated with text-to-911 implementation. Multiple secondary analyses will examine effects of stress on absenteeism; associations between technology attitudes and stress; effects of implementation on attitudes towards technology; and mitigating effects of job demands, job satisfaction, attitudes towards workplace technology and workplace support on change in stress. Our public health dependence on this workforce

  7. Investigation into Practical Implementations of a Zero Knowledge Protocol.

    Energy Technology Data Exchange (ETDEWEB)

    Marleau, Peter [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Krentz-Wee, Rebecca E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    In recent years, the concept of Zero Knowledge Protocols (ZKP) as a useful approach to nuclear warhead verification has become increasingly popular. Several implementations of ZKP have been proposed, driving technology development toward proof of concept demonstrations. Whereas proposed implementations seem to fall within the general class of template-based techniques, all physical implementations of ZKPs proposed to date have a complication: once the instrumentation is prepared, it is no longer authenticatable; the instrument physically contains sensitive information. In this work we explore three different concepts that may offer more authenticatable and practical ZKP implementations and evaluate the sensitive information that may be at risk when doing so: sharing a subset of detector counts in a preloaded image (with spatial information removed), real-time image subtraction, and a new concept, CONfirmation using a Fast-neutron Imaging Detector with Anti-image NULL-positive Time Encoding (CONFIDANTE). CONFIDANTE promises to offer an almost ideal implementation of ZKP: a positive result is indicated by a constant rate at all times enabling the monitoring party the possibility of full access to the instrument before, during, and after confirmation. A prototype of CONFIDANTE was designed, built, and its performance evaluated in a series of measurements of several objects including a set of plutonium dioxide Hemispheres. Very encouraging results proving feasibility are presented. 1 Rebecca is currently a graduate student in Nuclear Engineering at UC Berkeley

  8. Entanglement verification and its applications in quantum communication

    International Nuclear Information System (INIS)

    Haeseler, Hauke

    2010-01-01

    In this thesis, we investigate the uses of entanglement and its verification in quantum communication. The main object here is to develop a verification procedure which is adaptable to a wide range of applications, and whose implementation has low requirements on experimental resources. We present such a procedure in the form of the Expectation Value Matrix. The structure of this thesis is as follows: Chapters 1 and 2 give a short introduction and background information on quantum theory and the quantum states of light. In particular, we discuss the basic postulates of quantum mechanics, quantum state discrimination, the description of quantum light and the homodyne detector. Chapter 3 gives a brief introduction to quantum information and in particular to entanglement, and we discuss the basics of quantum key distribution and teleportation. The general framework of the Expectation Value Matrix is introduced. The main matter of this thesis is contained in the subsequent three chapters, which describe different quantum communication protocols and the corresponding adaptation of the entanglement verification method. The subject of Chapter 4 is quantum key distribution, where the detection of entanglement is a means of excluding intercept-resend attacks, and the presence of quantum correlations in the raw data is a necessary precondition for the generation of secret key. We investigate a continuous-variable version of the two-state protocol and develop the Expectation Value Matrix method for such qubit-mode systems. Furthermore, we analyse the role of the phase reference with respect to the security of the protocol and raise awareness of a corresponding security threat. For this, we adapt the verification method to different settings of Stokes operator measurements. In Chapter 5, we investigate quantum memory channels and propose a fundamental benchmark for these based on the verification of entanglement. After describing some physical effects which can be used for the

  9. New data structures and algorithms for logic synthesis and verification

    CERN Document Server

    Amaru, Luca Gaetano

    2017-01-01

    This book introduces new logic primitives for electronic design automation tools. The author approaches fundamental EDA problems from a different, unconventional perspective, in order to demonstrate the key role of rethinking EDA solutions in overcoming technological limitations of present and future technologies. The author discusses techniques that improve the efficiency of logic representation, manipulation and optimization tasks by taking advantage of majority and biconditional logic primitives. Readers will be enabled to accelerate formal methods by studying core properties of logic circuits and developing new frameworks for logic reasoning engines. · Provides a comprehensive, theoretical study on majority and biconditional logic for logic synthesis; · Updates the current scenario in synthesis and verification – especially in light of emerging technologies; · Demonstrates applications to CMOS technology and emerging technologies.

  10. A Protocol Analysis of the Influence of Technology on Students' Actions, Verbal Commentary, and Thought Processes During the Performance of Acid-Base Titrations.

    Science.gov (United States)

    Nakhleh, Mary B.; Krajcik, Joseph S.

    1993-01-01

    From an analysis of 14 secondary student's actions and thought processes, it was found that technology's level of information affected the focus of student observations. The microcomputer group focused primarily on the graph while other groups exhibited multiple foci. The discussion data also reveal that students have three main ideas about how…

  11. Verification of classified fissile material using unclassified attributes

    International Nuclear Information System (INIS)

    Nicholas, N.J.; Fearey, B.L.; Puckett, J.M.; Tape, J.W.

    1998-01-01

    This paper reports on the most recent efforts of US technical experts to explore verification by IAEA of unclassified attributes of classified excess fissile material. Two propositions are discussed: (1) that multiple unclassified attributes could be declared by the host nation and then verified (and reverified) by the IAEA in order to provide confidence in that declaration of a classified (or unclassified) inventory while protecting classified or sensitive information; and (2) that attributes could be measured, remeasured, or monitored to provide continuity of knowledge in a nonintrusive and unclassified manner. They believe attributes should relate to characteristics of excess weapons materials and should be verifiable and authenticatable with methods usable by IAEA inspectors. Further, attributes (along with the methods to measure them) must not reveal any classified information. The approach that the authors have taken is as follows: (1) assume certain attributes of classified excess material, (2) identify passive signatures, (3) determine range of applicable measurement physics, (4) develop a set of criteria to assess and select measurement technologies, (5) select existing instrumentation for proof-of-principle measurements and demonstration, and (6) develop and design information barriers to protect classified information. While the attribute verification concepts and measurements discussed in this paper appear promising, neither the attribute verification approach nor the measurement technologies have been fully developed, tested, and evaluated

  12. Technology

    Directory of Open Access Journals (Sweden)

    Xu Jing

    2016-01-01

    Full Text Available The traditional answer card reading method using OMR (Optical Mark Reader, most commonly, OMR special card special use, less versatile, high cost, aiming at the existing problems proposed a method based on pattern recognition of the answer card identification method. Using the method based on Line Segment Detector to detect the tilt of the image, the existence of tilt image rotation correction, and eventually achieve positioning and detection of answers to the answer sheet .Pattern recognition technology for automatic reading, high accuracy, detect faster

  13. Report on fiscal 1999 survey for geothermal exploration technology verification. Survey of deep-seated geothermal resources; 1999 nendo chinetsu tansa gijutsu nado kensho chosa hokokusho. Shinbu chinetsu shigen chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    To promote the development of deep-seated geothermal resources in a rationalized way, studies were conducted about deep-seated geothermal resource assessment techniques, development guidelines, and the like. For the development of techniques for estimating deep-seated geothermal reservoir parameters, the Uenotai district, Akita Prefecture, and the Hatchobaru district, Oita Prefecture, were designated as model fields, and a geothermal system conceptual model was fabricated. Data of the two districts were registered in a database. Using these data, verification was performed of the validity of stochastic estimation techniques, large area flow simulation, rock/water equilibrium reaction simulation, and the like. As for the technique of deep-seated resource amount estimation, a simplified reservoir model was experimentally constructed based on parameters determined by the stochastic estimation of deep-seated reservoirs and on the conceptual model, and a method was studied for TOUGH2-based production prediction. Studies were also made about deep-seated geothermal resource development guidelines, such as exploration guidelines, exploration well boring guidelines, and geothermal fluid production guidelines. (NEDO)

  14. Achievement report on developing superconductor power applied technologies in fiscal 1999 (2). Research and development of superconductor wire materials, research and development of superconductor power generators, research of total systems, research and development of freezing systems, and verification tests; 1999 nendo chodendo denryoku oyo gijutsu kaihatsu seika hokokusho. 2. Chodendo senzai no kenkyu kaihatsu / chodendo hatsudenki no kenkyu kaihatsu / total system no kenkyu / reito system no kenkyu kaihatsu / jissho shiken

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    With an objective to achieve higher efficiency, higher density, and higher stability in power systems, research and development has been performed on superconductor power generators. This paper summarizes the achievements thereof in fiscal 1999. A verification test was given on the rotor of an ultra high speed responding generator. In a sudden short circuit test using the different phase charging method, no anomalies were found such as quench generation and vibration changes, wherein the healthiness of the generator was verified. In the VVVF actuation test, knowledge was acquired on the actuation method when the ultra high speed responding generator is applied to a combined cycle plant. After the verification test has been completed, the disassembly inspections such as visual check and non-destructive test were performed. With regard to the vacuum leakage found in the rotor under very low temperatures, the causes were presumed and the countermeasures were discussed by observing the weld structures. In the design research, the conception design on the 200-MW pilot generator was reviewed by reflecting the results of the verification tests on the model generator. At the same time, trial design was made on a 600-MW target generator. In summarizing the overall research achievements, the achievements and evaluations were summarized on technological issues that have been allotted to each research member. (NEDO)

  15. Evaluating Data Abstraction Assistant, a novel software application for data abstraction during systematic reviews: protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Ian J. Saldanha

    2016-11-01

    abstraction approaches. Trial registration The trial is registered at National Information Center on Health Services Research and Health Care Technology (NICHSR under Registration # HSRP20152269: https://wwwcf.nlm.nih.gov/hsr_project/view_hsrproj_record.cfm?NLMUNIQUE_ID=20152269&SEARCH_FOR=Tianjing%20Li . All items from the World Health Organization Trial Registration Data Set are covered at various locations in this protocol. Protocol version and date: This is version 2.0 of the protocol, dated September 6, 2016. As needed, we will communicate any protocol amendments to the Institutional Review Boards (IRBs of Johns Hopkins Bloomberg School of Public Health (JHBSPH and Brown University. We also will make appropriate as-needed modifications to the NICHSR website in a timely fashion.

  16. The Healy Clean Coal Project: Design verification tests

    International Nuclear Information System (INIS)

    Guidetti, R.H.; Sheppard, D.B.; Ubhayakar, S.K.; Weede, J.J.; McCrohan, D.V.; Rosendahl, S.M.

    1993-01-01

    As part of the Healy Clean Coal Project, TRW Inc., the supplier of the advanced slagging coal combustors, has successfully completed design verification tests on the major components of the combustion system at its Southern California test facility. These tests, which included the firing of a full-scale precombustor with a new non-storage direct coal feed system, supported the design of the Healy combustion system and its auxiliaries performed under Phase 1 of the project. Two 350 million BTU/hr combustion systems have been designed and are now ready for fabrication and erection, as part of Phase 2 of the project. These systems, along with a back-end Spray Dryer Absorber system, designed and supplied by Joy Technologies, will be integrated with a Foster Wheeler boiler for the 50 MWe power plant at Healy, Alaska. This paper describes the design verification tests and the current status of the project

  17. Metering and energy audit : the key to success; Mesurage et verification energetique : la cle du succes

    Energy Technology Data Exchange (ETDEWEB)

    Milot, J. [Econoler, Quebec, PQ (Canada)

    2010-01-01

    The most widely used measurement and verification (M and V) procedure for energy performance contracting (EPC) projects is the International Performance Measurement and Verification Protocol (IPMVP). This article discussed the IPMVP as a tool for measuring the success of energy efficiency projects. The IPMVP provides an overview of current best practice techniques available for verifying results of energy efficiency, water efficiency and renewable energy projects in commercial and industrial facilities. Facility operators can use the IPMVP to evaluate and improve facility performance. Energy conservation measures (ECMs) covered in the protocol include fuel saving measures, water efficiency measures, load shifting and energy reductions through installation or retrofit of equipment, or modification of operating procedures. 2 figs.

  18. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  19. HEMISPHERIC CENTER FOR ENVIRONMENTAL TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    M.A. Ebadian

    1999-04-30

    The final data package has been completed for the Mississippi State University, DIAL FTP Wall Depth Removal Characterization Technology. The package has been sent to DIAL for comments. Work is progressing on completing the transfer of glove boxes and tanks from Rocky Flats to FIU-HCET for the purpose of performing size reduction technology assessments. Vendors are being identified and security measures are being put in place to meet the High Risk Property criteria required by Rocky Flats. The FIU-HCET Technology Assessment Program has been included as one of 11 verification programs across the US and Canada described in the Interstate Technology Regulatory Cooperation (ITRC) document, ''Multi-state Evaluation of Elements Important to the Verification of Remediation Technologies'', dated January 1999. FIU-HCET will also participate in a panel discussion on technology verification programs at the International Environmental Technology Expo '99.

  20. Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks

    Science.gov (United States)

    Seedorf, Jan; Beckers, Kristian; Huici, Felipe

    The Session Initiation Protocol (SIP) is widely used for signaling in multimedia communications. However, many SIP implementations are still in their infancy and vulnerable to malicious messages. We investigate flaws in the SIP implementations of eight phones, showing that the deficient verification of SIP dialogs further aggravates the problem by making it easier for attacks to succeed. Our results show that the majority of the phones we tested are susceptible to these attacks.